1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Valentin [98]
3 years ago
14

true or false then EXPLAIN why. Since many forms of money do not earn interest, people's demand for money is unaffected by chang

es in interest rates. HTML EditorKeyboard Shortcuts
Computers and Technology
2 answers:
katrin [286]3 years ago
3 0

Answer:

False

Explanation:

It is true that many forms of money do not earn interest. However, it is not true that this means that people's demand for money is unaffected by changes in interest rates. One of the ways interest rates can change the demand for money is because this can influence the way people divide their money. When a person has money, he can decide whether to keep this in teh form of money, or whether to keep wealth through another asset. When interest rates decrease, people are more likely to keep money in the form of money, as opposed to other assets. This is the source of the demand for money.

kirill115 [55]3 years ago
3 0

Answer:

False. Demand for money is affected by changes in interest rates

Explanation:

The demand for money is the amount of assets individuals wish to hold in monetary form. It is a choice between holding cash and buying bonds. The demand for money can vary based on factors such as income, interest rates, changes in technology, individual definition of money, technological changes, credit availability, etc.

An interest rate is the amount of interest charged over a certain period based on the amount of money lent, deposited or borrowed.

The demand for money is inversely proportional to the interest rate. At high interests rate, people will not want to hold cash, they will rather prefer to buy bonds. When interest rate is reduced, people will prefer to hold cash because they can't get enough return from the bond bought.

You might be interested in
What steps can you take to secure your private information?.
pogonyaev

Answer:

Below:

Explanation:

1. Practice mail security. Use a public mailbox rather than your home mailbox to send bill payments and other mail containing sensitive information. Pick your mail up promptly and ask the post office to hold it while you’re away.

2. Guard your Social Security number. Don’t carry your Social Security card, military ID, Medicare, or other cards that have your Social Security number on them unless you are going somewhere where you will need them. Only provide your Social Security number when there is a legitimate need to do so.

3. Lock and shred. Keep your billing and banking statements and other personal records locked up and shred them when no longer needed.

4. Stop prescreened credit and insurance mailings. Call toll-free 1-888-567-8688 to get off mailing lists for credit and insurance offers. Your Social Security number will be required. This keeps thieves from intercepting and accepting the offers in your name and doesn’t affect your eligibility for credit or insurance.

5. Keep private information to yourself. Never respond to phone calls or emails asking to confirm your Social Security number or account numbers. Don’t leave PIN numbers, passwords or other personal information around for others to see.

6. Be safe online. Use anti-virus and anti-spyware software and a firewall on your computer and keep them updated. When you provide financial or other sensitive information online, the address should change from “http” to “https” or “shttp.” A symbol such as a lock that closes may also indicate that the transmission is secure.

7. Look at your bills and bank statements promptly. If you find any charges or debits that you never made, contact the bank or company immediately.

Hope it helps.......

It's Muska...  

6 0
2 years ago
Data administration is a special organizational function that manages the policies and procedures through which data can be mana
aleksandr82 [10.1K]
That is a true statement sir.
5 0
2 years ago
Briefly define each components of information systems (hardware, software, data, networking, people and procedure). While you ar
WARRIOR [948]

Answer:

1. Hardware is the physical components that compose a system and provide physical quantity and quality to software applications and accomplish information processing tasks

2. Software is a program that carries out a set of instructions written in a programming language. It instructs a computer on how to carry out specific tasks. Programs can be saved permanently or temporarily.

3. Data may be mostly the raw resources used by information systems experts to give business intelligence to users. Traditional alphanumeric data, which is made up of numbers and alphabetical and other characters, is one type of data.

4. Networking is a resource of any computer system connected to other systems via a communications. It refers to the physical connections between all of the network's nodes. Communication networks are a critical resource component of all information systems, according to networking.

5. People are those who are directly or indirectly involved in the system. Direct users include developers, programmers, designers, and system administrators. Direct users can also be the stakeholder or end user who receives an output from the system. Indirect can be a manager who takes a brief check at the system to check that all criteria are satisfied.

6. Procedure is made up of stages or phases that result in an output. A method of continually receiving feedback on each part while analyzing the overall system by observing various inputs being processed or altered to create outputs.

7 0
1 year ago
What are benefits of using debugging tools? Check all that apply.
vivado [14]

Answer:

It's

A. Debugging tools help programmers catch errors they might otherwise miss.

B. Debugging tools can save time.

D. Debugging tools help programmers make methodical assessments of the problem.

Explanation:

got it right on edge.

6 0
3 years ago
When somthing is trustworthy we call it what?
Gnom [1K]

Answer:

dependable

Explanation:

5 0
2 years ago
Read 2 more answers
Other questions:
  • While you are working with a document using a program such as wordpad, the document is stored in ___________?
    15·2 answers
  • Identify the false statement.
    8·1 answer
  • 4. How can you select non-adjacent cells (i.e. cells that are not all together in one block)?
    5·2 answers
  • What of the following is not a benefit of active listening
    8·2 answers
  • Doctors at a regional hospital access an online database of patient records that is being developed and tested by a conglomerate
    13·1 answer
  • 3. Describe at least 3 nonprice competition strategies a company could use to convince customers that its product is better than
    5·2 answers
  • The _____ method randomly rearranges the items in the list provided in the parentheses.
    5·2 answers
  • FIRST TO Answer for free brainlest. GOG GOGOGO
    6·1 answer
  • Tạo biến
    8·1 answer
  • Which directory stores the cron configuration file?.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!