1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sashaice [31]
3 years ago
13

Enter a formula in cell C9 using the PMT function to calculate the monthly payment on a loan using the assumptions listed in the

Status Quo scenario. In the PMT formula, use C6 as the monthly interest rate (rate), C8 as the total number of payments (nper), and C4 as the loan amount (pv). Enter this formula in cell C9, and then copy the formula to the range D9:F9.

Computers and Technology
1 answer:
Wewaii [24]3 years ago
8 0

Answer:

=PMT(C6,C8,C4)

Put that in cell c9

Then use the lower right of the cell to drag it from D9:F9

You might be interested in
QUESTION 2
Len [333]

Answer:

Group of answer choices.

A. Apply numbering to the list.

B. Apply bullets to the list.

C. Apply multilevel numbering to the list.

D. Manually enter a ">" character at the beginning of each item in the list.

Answer:

B. Apply bullets to the list.

Explanation:

Formatting is a feature found in a lot of word processing software applications such as Microsoft Word, Notepad, etc., which is designed to avail end users the ability to apply specific formatting options such as cut, bold, italics, underline, list, etc., to texts based on certain criteria defined by an end user.

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users type, format and save text-based documents.

In Microsoft Word, a list can be formatted using a numbered or bulleted arrangement style. A numbered style (1, 2, 3, 4, etc) is typically used for an ordered list while a bullet is designed to be used for an unordered list.

Hence, the best way to format a document containing a list of items that appear in no particular order is to apply bullets to the list.

For example, a bulleted list of my favorite subjects arranged in no particular order would appear as this;

English language

Mathematics

Geography

Biology

Chemistry

Physics

Computer technology

8 0
3 years ago
What is displayed in the alert dialog box after the following code is executed? var scores = [70, 20, 35, 15]; scores[scores.len
kvv77 [185]

Answer:

The scores array: 70,20,35,15,40

Explanation:

I will explain the code line by line:

var scores = [70, 20, 35, 15];  

The above statement declares and assigns values to an array named scores

scores[scores.length] = 40;  

The above statement uses length to set the length of the scores array. It sets the last element of the scores array to 40. So this means 40 is set as the last element of scores.

scores.length returns the length of the scores array i.e. 4 as there are 4 elements in scores array 70,20,35,15

So the statement becomes:

scores[4] = 40;

This assigns value 40 to the 4th index of the scores array. Do not confuse 4th index with 4th element of the array because array element location starts from 0. So scores[4] does not mean 4th element but scores[4] means 4th index position of scores array. This makes 5th element of scores. So set the element 40 as 5th element at 4th index of scores.

alert("The scores array: " + scores);

This displays an alert box with the following message:

The scores array: 70,20,35,15,40

4 0
3 years ago
Who is the first computer programmer​
enot [183]

Answer:

Ada Lovelace was the first computer programmer

8 0
2 years ago
Read 2 more answers
True or False <br><br> MAC addresses are assigned by the router along with your IP address.
Oduvanchick [21]
True. If you look at the router it will correspond with your MAC address
4 0
3 years ago
How are authentication and authorization alike and how are they different? what is the relationship, if any, between the two\?
Helen [10]
  Both authentication and authorization are terms used in information security and <span>intelligently controlling access to </span>computer<span> resources. </span><span>Authentication is the process where by an individual’s (user's) identity is confirmed, whereas authorization is the association of that identity with rights/</span>privileges and permissions to resources related to information security.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Charges of the opposite tend to repel each other.
    9·2 answers
  • Which is better intel or amd real debate.
    12·2 answers
  • X = 19 y = 5 print (x % y)
    11·1 answer
  • A hotel salesperson enters sales in a text file. Each line contains the following, separated by semicolons: The name of the clie
    8·1 answer
  • Name the written test a potential driver must pass and list the minimum required score to earn a learner’s license.
    8·2 answers
  • Read two numbers from user input. Then, print the sum of those numbers. Hint - Copy/paste the following code, then just type cod
    9·1 answer
  • The _______ displays the name of the open file and the program
    11·1 answer
  • How many times will it tack when you fill 1 - liter of jar with water from the pond and uses 100 - milliliter cup to scoop water
    12·1 answer
  • Um ok that makes sooo much sence
    11·2 answers
  • Which validation method would you use for first name on a data form
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!