1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliya0001 [1]
2 years ago
9

No down payment, 18 percent / year, payment of $50/month, payment goes first to interest, balance to principal. Write a program

that determines the number of months it will take to pay off a $1000 stereo. Write code also outputs the monthly status of the loan.
Computers and Technology
1 answer:
GrogVix [38]2 years ago
5 0

Answer:

10000

Explanation:

You might be interested in
How does the internet works
eduard

Answer:

It works by using a packet routing network that follows Internet Protocol (IP) and Transport Control Protocol (TCP) [5]. ... TCP and IP work together to ensure that data transmission across the internet is consistent and reliable, no matter which device you're using or where you're using it.

Explanation:

:)

7 0
2 years ago
The _____ hijacking attack uses ip spoofing to enable an attacker to impersonate another entity on the network.
Annette [7]

The <u>TCP</u> hijacking attack uses ip spoofing to enable an attacker to impersonate another entity on the network.

<h3>What is a TCP hijacking attack?</h3>

TCP is a term that connote the Transmission Control Protocol a communications standard that helps application programs as well as computing devices to pass messages over a network.

This hijack is known to be a kind of cyber attack where it is found to be an authorized user that tend to gets control to a legitimate linkage of another client in the network.

Note that by the hijacked of the said TCP/IP session, the attacker can be able to read and change transmitted data packets and thus,The <u>TCP</u> hijacking attack uses ip spoofing to enable an attacker to impersonate another entity on the network.

Learn more about <u>TCP</u> hijacking attack from

brainly.com/question/15052311

#SPJ1

4 0
1 year ago
What will be the output after the following code is executed?
Gnesinka [82]

Answer:

D) Gaddis, Tony

Explanation:

- When you look at the function <em>pass_it</em>, it takes two arguments and returns these arguments with a comma between them.

- <em>name1</em> and <em>name2</em> variables are assigned as Gaddis and Tony.

<em>fullname</em> variable calls the the <em>pass_it</em> and gives above variables as arguments.

<em>fullname </em>variable (which is now equal to Gaddis, Tony) is printed.

4 0
3 years ago
Devices on a network are identified by what?
Ne4ueva [31]

Answer:

devices on a network are identified by their IP and MAC addresses

5 0
1 year ago
A user calls the help desk and reports that the workstation, when powering up, displays error messages about an invalid system d
Nutka1998 [239]

Answer:

Option (A) is the right answer.

Explanation:

According to the scenario, the system is giving error of invalid boot disk when booting, which shows that the system is unable to detect the hard drive used to boot the system.

MBR / GPT is the partition format, which contains the coding which is useful in booting the system. some times the partition files, which contain the coding to boot system corrupts which results in giving an error message of invalid boot disk while booting the system.

Hence the most appropriate answer is option (A).

While the other options are wrong because of the following reasons :

  • If the boot system fails to start, it can not give the error of invalid boot disk.
  • If the operating system files corrupt it gives the error of missing file.
  • The device driver can not affect the booting system of the workstation.
5 0
3 years ago
Other questions:
  • What type of device is the printer?
    13·2 answers
  • ______ is the software that blocks a user from being able to access your computer.
    9·1 answer
  • ____ are programs that run independently and travel between computers and across networks.
    7·1 answer
  • Which approach to knowledge management capitalizes on tacit knowledge and requires heavy IT investment?
    7·1 answer
  • The moon has less mass than the earth, so what happens to objects on the moon?
    11·1 answer
  • Where is voice data stored in Android?
    11·1 answer
  • Pick a web browser (a leading one or perhaps a lesser-known one that you use) and examine the Privacy and Security features and
    10·1 answer
  • Daniel would like to send a letter to more than one hundred people. He should type each letter separately.
    9·2 answers
  • Need the answer ASAP!!! I’ll mark brainliest if correct
    5·1 answer
  • True or false, USBs are slower than RAM.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!