1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aliya0001 [1]
3 years ago
9

No down payment, 18 percent / year, payment of $50/month, payment goes first to interest, balance to principal. Write a program

that determines the number of months it will take to pay off a $1000 stereo. Write code also outputs the monthly status of the loan.
Computers and Technology
1 answer:
GrogVix [38]3 years ago
5 0

Answer:

10000

Explanation:

You might be interested in
What are some commands found in the Sort dialog box? Check all that apply.
Novosadov [1.4K]

Answer:

A. add level

D. Delete level

E. Copy level

F. Move up or down

Explanation:

I just did it on edg. 2020

4 0
3 years ago
Read 2 more answers
Katrina studied hard for a biology test about the anatomy of a frog, but she did poorly and is using the "glows and grows” strat
melomori [17]

Answer:

how the frog grows through its life

Explanation:

7 0
2 years ago
When you respond to an e-mail message, a good skill to develop is ___________-editing, which involves inserting your responses t
Drupady [299]

Answer: Down editing

Explanation:

Down editing is a method of replying emails which allows you to respond point by point to an email. It add certainty, precision and quality to your response and helps prevent misunderstanding of email response.

7 0
3 years ago
The security manager assigned a new security administrator the task of implementing secure protocols on all wireless access poin
Agata [3.3K]

Answer:

It was not a good choice and the administrator could have gone with a much better option.

Explanation:

Choosing WPA over WEP is a good option. It is however, still considered vulnerable despite its improved security and has been superseded by the WPA2 security protocol. TKIP is an example of an encryption method that was introduced around the same time with WPA and replaced WEP. This encryption is not secure and is now out of date and I would highly recommend against its use. If the access points support WPA2 – AES, then this would be the best and is the most optimal for wireless security.  

5 0
3 years ago
The Tab dialog helps you set tabs in your word processing document, what does this dialog box control the movement of when you p
Anna71 [15]
The answer is D the cursor.
4 0
3 years ago
Other questions:
  • You support Richman Investments, a brokerage firm that employs 20 brokers. Each broker has his own client computer, and the firm
    15·1 answer
  • .Although SQL is a language, you don’t use it to write applications? (true, false)
    8·1 answer
  • How much health did a supply drop balloon originally have??
    7·2 answers
  • Name and describe the two (2) broad categories of files
    9·1 answer
  • Which ORDER BY clause causes 10 rows to be retrieved from the result set, starting with the 20th row?
    5·1 answer
  • Which of the following statements holds true for the term "html"? It refers to a system that connects end users to the Internet.
    10·2 answers
  • If someone you don”t know asks where you go to school, what should you do?
    7·2 answers
  • ___________ key encryption in wep uses the rc4 encryption algorithm.
    9·1 answer
  • What is a trojan horse
    8·2 answers
  • Compare and contrast the advantages and disadvantages of a LAN to a WLAN.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!