1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Klio2033 [76]
3 years ago
8

If you wanted to buy a house that cost $150,000 and you knew you needed a down payment of five percent, how much would you need

for the down payment?
Computers and Technology
1 answer:
andrew11 [14]3 years ago
8 0

Answer:

7,500 is the answer

Explanation:

7,500 is 5% of 150,000

You might be interested in
Choose 2 statements that correctly describe the time complexity of data structures with N data.
Softa [21]

The  statements that correctly describe the time complexity of data structures with N data are:

  • The average time complexity of the data lookup in a hash table is O(N).
  • The average time complexity of inserting data into a heap is O(logN)

<h3>What is time complexity of data structures?</h3>

Time Complexity of an algorithm is known to be the depiction of the amount of time needed by the algorithm to carry out to completion.

Note that The  statements that correctly describe the time complexity of data structures with N data are:

  • The average time complexity of the data lookup in a hash table is O(N).
  • The average time complexity of inserting data into a heap is O(logN)

Learn more about data from

brainly.com/question/17350816

#SPJ1

6 0
2 years ago
_________ cards contain a chip that can store a large amount of information as well as on a magnetic stripe for backward compati
wariber [46]

Answer:

Smart

Explanation:

The RFID or the radio frequency identification is an electronic device that stores information electronically. It stores and makes available the information which is stored electromagnetically, once the user is authenticated.

This technology is implemented in market places and other individual activities. It is implemented in cards called smart card for ease of payment transaction and promote online commerce (e-commerce). It is also implemented in smartphones.

3 0
3 years ago
The Chief Information Officer (CIO) has determined the company’s new PKI will not use OCSP. The purpose of OCSP still needs to
Step2247 [10]

Answer:

B. Implement a key escrow.

Explanation:

A key escrow can be defined as a data security method of storing very essential cryptographic keys.

Simply stated, key escrow involves a user entrusting his or her cryptographic key to a third party for storage.

As a standard, each cryptographic key stored or kept in an escrow system are directly linked to the respective users and are encrypted in order to prevent breach, theft or unauthorized access.

Hence, the cryptographic keys kept in an escrow system are protected and would not be released to anyone other than the original user (owner).

In this scenario, the Chief Information Officer (CIO) has determined the company's new public key infrastructure (PKI) will not use online certificate status protocol (OCSP). However, the purpose of online certificate status protocol (OCSP) still needs to be addressed. Thus, what should be implemented is a key escrow because the online certificate status protocol (OCSP) is an internet protocol used for maintaining the security of a server and obtaining a digital certificate that has been revoked.

8 0
2 years ago
Enter just the letter of the correct answer
astraxan [27]

purchase a router from the aisle

8 0
3 years ago
which of the following is one way that developers and organizations who produce open-source software can generate revenue from t
BlackZzzverrR [31]

The option that is one way that developers and organizations who produce open-source software can generate revenue from the software is option B. The flagship OSS product is the Linux operating system, now available on all scales of computing devices.

<h3>What is the revenue generation about?</h3>

Although it is not particularly popular, charging people for open source software is a possibility. Paid support contracts are already permitted by some businesses, such as Red Hat, which helps to support the business model and keep the programmers employed.

It is feasible to demand a predetermined payment in exchange for access to your open source code.

Therefore, one option to make money is to ask for paid support or a one-time fee for access to an open source project or piece of code.

Even if you will get ROI right away if you demand paid support from your open source provider, there are numerous potential disadvantages and drawbacks that could prevent you from realizing the full potential of the open source software or solution you choose.

Learn more about open-source software from

brainly.com/question/28905225
#SPJ1

See full question below

which of the following is one way that developers and organizations who produce open-source software can generate revenue from the software?

A. The source code for open source software may be modified and redistributed, provided it is priced reasonably and part of the proceeds is contributed to the Linux Foundation.

B. The flagship OSS product is the Linux operating system, now available on all scales of computing devices.

C. The vast majority of people who work on efforts like Linux are now paid to do so by non-profit organizations such as the Linux foundation.

D. Major hardware firms no longer employ paid staff contributing to open source projects.

E. Open source software is available for anyone to download from the Internet, but the code should not be modified.

B. The flagship OSS product is the Linux operating system, now available on all scales of computing devices.

8 0
1 year ago
Other questions:
  • What file formats can you safely use in a video presentation
    14·1 answer
  • A layer of control in each communicating device that provides functions such as flow control, error detection, and error control
    13·1 answer
  • One type of technology that can verify a person's identity is _____.
    6·2 answers
  • What is the purpose for the refresh button?
    10·2 answers
  • You may nest while and do-while loops, but you may not nest for loops<br><br><br><br> True False
    10·1 answer
  • Digital on a smart phone means the camera is actually zooming in on the photo itself not the subject that you are shooting true
    8·1 answer
  • Modify your main.c file so that it allocates a two dimensional array of integers so that the array has 20 rows of 30 integers in
    14·1 answer
  • Create a Python program that computes the cost of carpeting a room. Your program should prompt the user for the width and length
    10·1 answer
  • What is an automatic update and when should you use it
    10·1 answer
  • What does the asterisk (*) after select tell the database to do in this query?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!