1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Talja [164]
4 years ago
10

Write a program with two inputs, current price and last month's price (both integers). Then, output a summary listing the price,

the change since last month, and the estimated monthly mortgage computed as (current_price * 0.051)
Computers and Technology
1 answer:
poizon [28]4 years ago
6 0

Answer:

current_price = int(input("Enter the current price: "))

last_months_price = int(input("Enter the last month's price: "))

print("Current price is: " + str(current_price) + ", Last month's price was: " + str(last_months_price))

print("The change since last month is: " + str(current_price - last_months_price))

print("The estimated monthly mortgage is: " + str(current_price * 0.051))

Explanation:

Get the inputs for the current price and last month's price

Print the prices

Calculate and print the change, current_price - last_months_price, since last month

Calculate, using given formula, and print the estimated monthly mortgage

You might be interested in
Applications require you to provide the following basic elements: availability, social security number, and education.
chubhunter [2.5K]
This is true.

Applications simply want the basic information about you. Some other things an application might ask for are references and work experience.
8 0
4 years ago
Which of these is an example of an open source software
AURORKA [14]

Answer:

Thunderbird

Explanation:

When we talk about open source software, we are talking about software that is free to download and its source code repository is made available and public to its users. Open source code can be modified and distributed with the users’ rights if they want to. Thunderbird is an example of open source developed by the Mozilla foundation. All known web browsers like Chromium and Safari are open source apart from Internet Explorer. Internet Explorer has remained closed source for a long time now.

6 0
4 years ago
What is the GCF of 48mn and 81mn??<br> O 3mn<br> O 3m?n<br> O 48mºn<br> O 129mn
vitfil [10]

Answer:

A. 3mn

Explanation:

48 divides by 2 48 = 24 x 2

then =2 x 2 x 12

then = 2 x 2 x 2 x 2 x 3

greatest factorization is 3 therefore,

3mn is the answer

8 0
3 years ago
The function ________ comprises one or more statements that are executed when the function is called.
spin [16.1K]

Answer:

Option B(Body) is the correct answer for the above question.

Explanation:

The function is a defined processor of some specific task, which is used to perform some action of the task. The function is of two types one is predefined, which is defined by the compiler and, the other is user-defined, which is defined by the programmer. Any user-defined function has three parts--

  • Function prototype: It states the type of function.
  • Function body: It holds the collection of instruction that needs to perform by the function.
  • Function call: From where the function is called.

The above question asked about the term, which holds the statement of the function and that term is function Body, which is defined above. So the answer body, which is stated from the option 'B'. Hence 'B', is the correct option while the other is not because--

  • Option 'A' states about the header, which is not the part of the function
  • Option 'C' states about data type, which defines the types of data.
  • Option 'D' states none of these, but the answer is option B.
  • Option 'E' states about the definition, which is not the correct answer.
5 0
3 years ago
Why might your coworker suggest encrypting an archive file before e-mailing it??
Genrish500 [490]
Because to prevent MITD (Man in the middle is a man that in the middle of the network. For example: You are sending a text, the man in the middle or in the modem will receive the text and can edit it and send it to the receiver, or the man will put the virus in...) and to prevent server snooping
8 0
3 years ago
Other questions:
  • I’m having trouble with my computer. It’s stuck on this automatic repair screen and every time I try to reset it, it says “Your
    5·1 answer
  • What are operational databases
    12·1 answer
  • You need to write a loop that will repeat exactly 125 times. which is the preferred loop construct to use?
    12·1 answer
  • FOR 15 POINTS AND BRAINLIEST!<br> What are the possible consequences of Invasion of privacy?
    8·1 answer
  • Which is a good guideline to follow for adding animation to a presentation?
    12·1 answer
  • LISTEN I NEED EVERY SINGLE BRAINLY USER TO RE POST THIS THERE IS A USER WHO JUST SAID THEY ARE GOING TO KILL THEMSELVES PLEASE C
    12·2 answers
  • Write a function writel that will write the length of a side of a square. If only one argument is passed to the function, it is
    10·1 answer
  • You are configuring NIC Teaming on a Windows Server system using two physical network adapters. You want to aggregate the bandwi
    10·1 answer
  • write pseudocode to represent the logic of a program that allows the user to enter two values. The program outputs the sum of an
    13·1 answer
  • what new technology led to the chaos that spurred the establishment of the federal communications commission?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!