1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Elza [17]
3 years ago
9

Sites like Zillow get input about house prices from a database and provide nice summaries for readers. Write a program with two

inputs, current price and last month's price (both integers). Then, output a summary listing the price, the change since last month, and the estimated monthly mortgage computed as (currentPrice * 0.051) / 12 (Note: Output directly. Do not store in a variable.). Ex: If the input is: 200000 210000 the output is: This house is $200000. The change is $-10000 since last month. The estimated monthly mortgage is $850.0. Note: Getting the precise spacing, punctuation, and newlines exactly right is a key point of this assignment. Such precision is an important part of programming.
Computers and Technology
1 answer:
Alexeev081 [22]3 years ago
8 0

Answer:

In Python:

cprice= int(input("Current price: "))

lmonth= int(input("Last month's price: "))

print("This house is $"+str(cprice))

print("The change is $"+str(cprice-lmonth)+" since last month")

print("The current mortage $"+str((cprice * 0.051) / 12)+" since last month")

Explanation:

Get current price

cprice= int(input("Current price: "))

Get last month's price

lmonth= int(input("Last month's price: "))

Print the current price

print("This house is $"+str(cprice))

Print the change

print("The change is $"+str(cprice-lmonth)+" since last month")

Print the mortgage

print("The current mortage $"+str((cprice * 0.051) / 12)+" since last month")

You might be interested in
What version of bluetooth is installed on the yaesu ft-5dr?.
Olin [163]

Answer:

version 4.2

Explanation:

5 0
2 years ago
After a Hacker has selects her target, performed reconnaissance on the potential target's network, and probed active Internet Ad
Gnoma [55]

After a Hacker has selects her target,  the thing she scan next on the target's network to see if any are open System Ports.

<h3>How do hackers scan ports?</h3>

In port scan, hackers often send a message to all the port, once at a time. The response they tend to receive from each port will help them to known if it's being used and reveals the various weaknesses.

Security techs often conduct port scanning for a lot of network inventory and to show any possible security vulnerabilities.

Learn more about Hacker from

brainly.com/question/23294592

7 0
3 years ago
A hot site consists of computers, devices, and connectivity necessary to rebuild a network exist, but without appropriate config
andreyandreev [35.5K]

Answer:

False.

Explanation:

Hot site :- It is a backup service it is always working it allows a enterprise to continue  it's computer and network operations in case of a equipment or computer disaster. A hot site contains all the equipment required for the business to continue it's working, including space for office,furniture, telephone jacks and computer equipment with appropriate configuration.

4 0
3 years ago
Q: The first step to format your spreadsheet data is to _____
Semmy [17]
Add your headings in the row of cells at the top of the sheet
6 0
2 years ago
Which of the following algorithmic efficiencies would be considered LEAST efficient?
LenaWriter [7]

Answer:exponential

Explanation: I believe

8 0
3 years ago
Other questions:
  • Achieving a degree in computer forensics, information technology, or even information systems can provide a strong foundation in
    11·1 answer
  • The first thing to do when your computer gives you a error message is
    7·2 answers
  • In Word, the default typing mode is ____ mode, which means as you type a character, Word moves all the characters to the right o
    14·2 answers
  • Why CD-ROM is more reliable than floppy disk?​
    14·1 answer
  • If you have an equipment failure while driving on an expressway, you should
    8·1 answer
  • How to do row of circles in phyton programming ?
    11·1 answer
  • I live in Pennsylvania which observes eastern standard time.
    13·1 answer
  • Where does Reiner take eren after they have a fight?
    7·2 answers
  • Which type of vulnerability scan mimics the work of a threat actor who has already exploited a vulnerability and compromised cre
    5·1 answer
  • A ____________________ machine is used to gather or arrange in their proper sequence.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!