1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SpyIntel [72]
3 years ago
6

Write a program in Python that reads in investment amount, annual interest rate, and number of years, and displays the future in

vestment value using the following formula:and displays the future investment value using the following formula:futureInvestmentValue = investmentAmount * (1 + monthlyInterestRate)numberOfYears*12
Computers and Technology
1 answer:
pickupchik [31]3 years ago
4 0

Answer:

investmentAmount = float(input("enter the investment amount: "))

annualInterestRate = float(input("enter the Annual Interest Rate: "))

numYears = int(input("Enter NUmber of Years: "))

monthlyInterestRate = annualInterestRate/12

futureInvestmentValue = investmentAmount * (1 + monthlyInterestRate)*(numYears*12)

print("The Future Investment Value is: ")

print(futureInvestmentValue)

Explanation:

Using python programming language as required, we use the input function to prompt user for inputs for each of the variables.

There is a conversion from the variable annualInterestRate  to monthlyInterestRate before the formula for the futureInvestmentValue is applied

You might be interested in
Please submit the following assignment prior to Sunday at 11:59 pm. Eastern time: 1. Using a Microsoft Word document, please dis
GenaCL600 [577]

Answer:

Answer explained

Explanation:

United States of America versus Ross Ulbrecht :-

The Fourth Amendment guards against unreasonable searches and seizures by requiring (with limited exceptions) that government agents first obtain a warrant before they go snooping around or confiscating someone’s property. But what exactly does this mean in the modern world of smart phones, wi-fi, and extended Socratic dialogues with Siri? If the New York-based U.S. Court of Appeals for the Second Circuit is to be believed, it means that the government can monitor and collect your internet traffic if this information is merely “likely” to be “relevant” to an ongoing criminal investigation.

That is exactly what happened to Ross Ulbricht, the creator of a website known as “Silk Road,” which enabled users to anonymously buy and sell goods and services. In the course of an investigation into illegal activities associated with the website, the government obtained five “pen/trap” orders authorizing law enforcement to collect IP (internet protocol) addresses for any internet traffic going to or from Ulbricht’s wireless router and other electronic devices. These orders were obtained in lieu of a warrant under a statutory “relevance” standard that falls well short of the Fourth Amendment’s requirement for probable cause.

How could this standard possibly not be constitutionally insufficient? The Second Circuit relied on the “third party doctrine,” ruling that there was no Fourth Amendment issue because users voluntarily conveyed their information to ISPs (internet service providers) and third-party servers, and thus assumed the risk that it would later be turned over without their permission or knowledge. This doctrine, which was developed in the days of pay phones and file cabinets, cannot be fairly extended to online activity given that internet access is—for all intents and purposes—a necessity of modern life for any functioning member of society. Recognizing this simple fact undermines any claim that users have somehow assumed the risk of disclosure to the government, which would have assumed that these users had any real choice in the matter to begin with.

The court also reasoned that because pen/trap devices only reveal IP addresses associated with the user’s online browsing, the collected information doesn’t count as “content” worthy of protection—despite the direct correlation between individual IP addresses and websites, along with the ample information that can be gleaned from knowledge of an individual’s browsing history. The court seemed to conclude that there was no content revealed because an IP address only uncovers the website visited rather than any individual webpage within that site. This superficial approach utterly ignores digital reality.

Finally, the court failed to recognize that the statute authorizing pen/trap data seizure imposes virtually no limits on government attorneys’ discretion. These orders are exceedingly broad in scope and available to nearly any government agency conducting a criminal investigation. Worse still, the court’s role in approving the orders is merely ministerial, with the statute mandating that “the court shall enter an ex parte order authorizing the installation” of these devices.

Because the Second Circuit has stretched both the third-party doctrine and the content/non-content distinction far beyond their logical limitations, Cato—along with the Reason Foundation, Competitive Enterprise Institute, and R Street Institute—has filed an amicus brief asking the Supreme Court to take this case and firmly establish that the internet doesn’t constitute some sort of Constitution-free zone.

5 0
3 years ago
Give reasons why you care for your sense organs​
Cerrena [4.2K]

HI!the resaon why should you care for you sense organs is that they help us to contact with our surroundings.

8 0
2 years ago
Read 2 more answers
You are out on the water. you do not understand what another boater intends to do. what sound signal should you make?
olchik [2.2K]
When you do not understand what another boater intends to do, you are required to communicate this to the boater by sounding five or more short and rapid blasts. A short blast means a blast that takes about one second. The two vessel must stop or slow down until they clearly understand each other intent.
7 0
3 years ago
You use a(n) ____ program to create, send, receive, forward, store, print, and delete e-mail messages.
tigry1 [53]

Answer:

B - E-Mail

Explanation:

This is a program to create, send, receive, forward, store, print, and delete e-mail messages.

3 0
3 years ago
What query class will you choose<br> for this query "women are evil"?
nikklg [1K]

Answer:

A) Gibberish or Vague Profane

Explanation:

Hope this helps

7 0
2 years ago
Other questions:
  • A group of computers that are interconnected order to share information or document is called a
    12·2 answers
  • Why don’t we need to know and memorize the IP addresses for our favorite websites?
    15·1 answer
  • Which of the following is part of the cycle of dating violence
    8·1 answer
  • A junior network administrator tells you that he can ping a DNS server successfully using its IP address, but he has not tested
    11·1 answer
  • Write a program which will enter information relating to a speeding violation and then compute the amount of the speeding ticket
    14·1 answer
  • Need to know? Anyone feel like helping me not fail
    13·1 answer
  • Janice’s grandmother stayed at home and took care of her family while her grandfather worked. Today Janice lives on her own and
    15·2 answers
  • Which group scope can be used to assign permissions to resources only in the domain in which the group is created
    12·1 answer
  • A local router is configured to limit the bandwidth of guest users connecting to the Internet. Which of the following best expla
    15·1 answer
  • Which of these is not enumerated as a motivation to create accessible web content?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!