1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
oksian1 [2.3K]
3 years ago
10

Kim wants to buy a car. Help kim compute the monthly payment on a loan, given the loan amount, the annual percentage rate of int

erest, and the number of monthly payments. The program should allow kim to input the loan amount, interest rate, and how many payments she wants to make. It should then compute and display the monthly payment in a raptor program
Computers and Technology
1 answer:
Dmitriy789 [7]3 years ago
4 0

#include <iostream>

#include <math.h>

using namespace std;

int main()

{

   double Payment, LoanAmt, InterestRate, MonthlyRate;

   int NumberMonths;

   cout<<"LOAN INTEREST CALCULATOR:"<<endl;

   cout<<"Enter the loan amount: ";

   cin>>LoanAmt;

   cout<<endl<<"Enter the interest amount: ";

   cin>>InterestRate;

   MonthlyRate = InterestRate/1200;

   InterestRate = InterestRate / 100;

   cout<<endl<<"Enter the number of years: ";

   cin>>NumberMonths;

   NumberMonths = NumberMonths * 12;

   Payment = (LoanAmt * MonthlyRate * pow ((1.0 + MonthlyRate), NumberMonths)) / pow((1.0 + MonthlyRate), NumberMonths -1; //monthly payment formula

   cout<<endl<<"The monthly payment is: "<<Payment; //display monthly payment

   return 0;

}

You might be interested in
quizlet ann is a security professional for a midsize business and typically handles log analysis and security monitoring tasks f
Sergio039 [100]

At this point in the incident response process, the term that best describes what has occurred in Ann's organization is known to be C. Security event.

What is the security event?

A security event is known to be an alteration  in the day to day running of the operations of a network or an information technology service and it is one that tends to show the point that a security policy need to have been violated or a security safeguard could have failed.

Note that in the above point in the process, Ann is a person who see no reason to believe that any real security compromise or policy violation has occurred as this kind of situation does not meet the stage of been called a security incident or intrusion.

Therefore, based on the above, At this point in the incident response process, the term that best describes what has occurred in Ann's organization is known to be C. Security event.

Learn more about Security event from

brainly.com/question/27225071
#SPJ1

Ann is a security professional for a mid-sized business and typically handles log analysis and security monitoring tasks for her organization. One of her roles is to monitor alerts originating from the organization's intrusion detection system. The system typically generates several dozen alerts each day, any many of those alerts turn out to be false alarms after her investigation.

This morning, the intrusion detection system alerted because that network began to recieve an unusually high volume of inbound traffic. Ann recieved this alert and began looking into the orgin of the traffic.

65. At this point in the incident response process, what term best describes what has occurred in Ann's organization?

A. Security occurrence

B. Security incident

C. Security event

D. Security intrusion

8 0
1 year ago
Databases offer many security features including passwords to provide authentication, access levels to determine who can access
Murljashka [212]

Answer:

True

Explanation:

When using databases in a project, not everyone has the same access level, e.g the database admin may have the highest level of access (access to data on live mode), the software testers have their own level of access (access to data on test mode) and so on.  

7 0
4 years ago
You also learn in class that one kilobyte of computer memory will hold about 2/3 of a page of typical text (without formatting).
Travka [436]

Answer:

The flashdrive can hold 35389 400-pages-books

Explanation:

If \frac{2}{3} of a page occupies 1 kB of memory, we can calculate how much memory a book will take

2/3kB=1 page\\ x kB=400 pages\\266.67 kB=400 pages

Now that we know that a book average file size is about 266,67 kB, we calculate how many of them can a 9 GB flash drive hold.

To do the calculation, we have to know how many kilobytes are in 9 gigabytes.

There is 1024 kilobytes in a megabyte, and 1024 megabytes in a gigabyte, so:

Memory_{in _kilobytes}^{} =1024\frac{kilobytes}{megabytes} *1024\frac{megabytes}{gigabytes}*9=9437184 kilobytes

Finally, knowing the average file size of a book and how much memory in kilobytes the 9 GB flash drive holds, we calculate how many books can it hold.

Books=\frac{Flash drive memory}{Filesize of a book} =\frac{9437184kilobytes}{266.67\frac{kilobytes}{book} } =35389,4 books

The flashdrive can hold 35389 400-pages-books, or 14155776 pages of typical text.

8 0
4 years ago
)Dynamically allocate an object of Banana, using the pointer variable daco.
zepelin [54]

Answer:

d) daco = new Banana;

Explanation:

Dynamically allocated variables have their memory allocated in the heap memory.We declare a dynamical variable like this:-

int *a=new int ;

It means a pointer a is created on the stack memory which hold the address of the block that hold the value of variable a in heap memory.

We already have the pointer daco. We just have to initialize with keyword new.

It will be like daco=new Banana; which matches the option d.

5 0
3 years ago
If you accidentally put an envelope in the Express Mail box will it still get to its destination?
Gnoma [55]
It depends because if you put a stamp on the envelope. But I think that it will still get to the destination. I think that it will either get sent to the destination or not. But you never know what is going to happen.
8 0
3 years ago
Other questions:
  • Ideation includes all of the following EXCEPT
    5·1 answer
  • According to the partnership for 21st-century learning critical thinking ability includes all the following skills except
    15·1 answer
  • Which symbol is used to separate a worksheet name from a cell reference?
    10·1 answer
  • Which of the following statements about the FAFSA process are TRUE?
    6·1 answer
  • Write the definition of a function half , which receives an integer parameter and returns an integer that is half the value of t
    7·1 answer
  • What is the function of a breadcrumb trail website
    7·1 answer
  • Charlie does not think he will be able to finish his project by the deadline at this point in the decision making progress to so
    13·1 answer
  • According to the video, what kinds of projects would Computer Programmers be most likely to work on? Check all that apply.
    13·2 answers
  • How many pieces can be connected on to a to an SPS​
    11·1 answer
  • Taylor and Rory are hosting a party. They sent out invitations, and each one collected responses into dictionaries, with names o
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!