1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Gnoma [55]
3 years ago
11

People often want to save money for a future purchase. You are writing a program to determine how much to save each week given t

he cost of the purchase and the number of weeks. For example, if the cost of the purchase is $100 and the desired number of weeks is 5, then you divide $100 by 5. You find that you need to save $20 each week. Some of the steps in your plan are followed. Put them in order of which occurs first. Some steps are not listed.
Computers and Technology
2 answers:
GenaCL600 [577]3 years ago
7 0
.................................
vekshin13 years ago
6 0

Answer:

First:  Ask the user for the cost of the purchase and the number of weeks.  

Next: Divide the cost of the purchase by the number of weeks.  

Last:  Check for accuracy.

Explanation:

Edg

You might be interested in
The Occupational Outlook Handbook is published by the Bureau of Labor Statistics.
nika2105 [10]
HEY THEIR

The correct answer is A. true.

It was written in 1948 by the bureau of Labor statistics .

HOPE IT HELPS YOU
7 0
3 years ago
Which tag denotes the end of an element in HTML? A. / B. * C. > D. ) E. _
Lilit [14]

C. ">" denotes the end of an element. For instance <b>Hello!</b> or <hr />

6 0
3 years ago
Identity theft, where people steal personal information, continues to be a problem for consumers and businesses. Assume that you
svetlana [45]

Answer:

Secure the personal information with complex multi-factor authentication and configure intrusion detection and prevention and a firewall.

Explanation:

Multi-factor authentication is a method of securing a client's personal information from the client's side to the data centre. It uses more than one security processes not policies. There key be three authentications process like a password, security token and biometrics or two authentications like password and biometrics or token.

The firewall and intrusion detection and prevention are vulnerability preventive method to detect and stop cyber attacks.

5 0
3 years ago
Which is an acceptable practice when a photographer shoots in windy conditions?
VARVARA [1.3K]

Answer:

d) attach a bag of weights to the tripod

Explanation:

5 0
3 years ago
What are some of the challenges that could arise from setting up a file management system on a computer?
kherson [118]
YOU COULD POTTENTIALLY HAVE TO WIPE ALL CURRENT FILES CLEAN OR U MAY HAVE TO PAY FOR CERTAIN PROGRAMS
7 0
3 years ago
Other questions:
  • What happens to formulas with relative cell references when they are copied using the fill handle?
    12·1 answer
  • What should the timing of transition slides be per minute?
    9·2 answers
  • A _________ consists of a set of computers that interconnect by means of a relatively unsecure network and makes use of encrypti
    5·1 answer
  • Difference between volatile and non volatile memory
    14·2 answers
  • If Asa changes the text to bold, he has changed the style. True False
    8·2 answers
  • During a night flight, you observe a steady red light and a flashing red light ahead and at the same altitude. What is the gener
    11·1 answer
  • Write the definition of a function named printstarbucks that receives a non-negative integer n and prints a line consisting of n
    6·1 answer
  • How do you create a formula in excel​
    10·1 answer
  • Suppose that you have the following definitions:
    8·1 answer
  • 4.8% complete this is a single choice question; skip ahead to question content a b c d confirm difficulty level: moderate an int
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!