1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Klio2033 [76]
2 years ago
8

If you wanted to buy a house that cost $150,000 and you knew you needed a down payment of five percent, how much would you need

for the down payment?
Computers and Technology
1 answer:
andrew11 [14]2 years ago
8 0

Answer:

7,500 is the answer

Explanation:

7,500 is 5% of 150,000

You might be interested in
A body performing Shm has a velacity of 12m/s when the displacement is 100mm the displacement
Assoli18 [71]

Answer:

vjcyfuy

Explanation:

yjvjy

4 0
3 years ago
If someone has the IP address 127.0.0.1 and tries to connect to the address 127.255.252.255, which are they attempting to connec
sertanlavr [38]
B is the answer i think
6 0
2 years ago
There are a variety of common user interfaces. How would you decide which interface to use and on what should this decision be b
enot [183]

Answer: There are many different types of user interfaces. To decide on the user interface depends entirely on the requirement of the client.

Explanation:

There are different types of interfaces such as command line user interface, graphical user interface, menu based, form based. Therefore to choose among them it depend on the requirement specified by a client. Mostly nowadays GUI is used. to maintain records form based is preferred. For system software CUI is better due to decrease its pressure on the processor. Networking is also both GUI and CUI. So it depend mainly on the type of application developed , client requirements, power consumption based on its dependence on processor power.

5 0
3 years ago
Where could an identity theft access your personal information
Nikolay [14]
Hello!

The identity theif could establish a new identity for ciminal purposes using YOUR identity and personal information, and the theif could aquire money or goods from it.

*PLAGIARISM FREE*
5 0
3 years ago
Read 2 more answers
Similarities between human and computer​
Zielflug [23.3K]

Answer: Both have a center for knowledge; motherboard and brain. Both have a way of translating messages to an action. Both have a way of creating and sending messages to different parts of the system.

5 0
3 years ago
Other questions:
  • Hudson has to maintain confidential college data in a workbook. He needs two team members to help him update data in the specifi
    7·2 answers
  • Please I need all the help I can get Thank You So Much
    14·1 answer
  • While the zyLab platform can be used without training, a bit of training may help some students avoid common issues. The assignm
    6·1 answer
  • What is the most common way for an attacker outside of the system to gain unauthorized access to the target system?
    15·1 answer
  • Which table attributes would this code produce?
    15·1 answer
  • NEED BY 15 MINUTES PLEASE! WILL MARK BRAINLIEST!You can create special effects in an image using a camera or a photo-editing too
    5·1 answer
  • Which cable would you check if you can't access any web pages?
    12·1 answer
  • What is the output?<br> &gt;&gt;&gt; phrase = "hello mom"<br> &gt;&gt;&gt; phrase upper()
    6·2 answers
  • How does 5G technology enhance the Internet of Things (IoT)?
    9·1 answer
  • Range paramters - for loop<br> question in picture
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!