How can computer without software can be working

Answers

Answer 1

Answer:

Explanation:

Un ordinateur sans aucun logiciel serait essentiellement une ardoise vierge. Bien que les composants matériels de l'ordinateur puissent être fonctionnels,


Related Questions

how to set brainlyest

Answers

Yeah he or she is right

Which of the following best describes an insider attack on a network?
OA. an attack by someone who uses fake emails to gather information related to user credentials
OB. an attack by someone who becomes an intermediary between two communication devices in an organizatio
OC. an attack by a current or former employee who misuses access to an organization's network
O D. an attack by an employee who tricks coworkers into divulging critical information to compromise a network

Answers

An attack by a current or former employee who misuses access to an organization's network ca be an insider attack on a network. The correct option is C.

An insider attack on a network refers to an attack carried out by a person who has authorized access to an organization's network infrastructure, either as a current or former employee.

This individual intentionally misuses their access privileges to compromise the network's security or to cause harm to the organization.

Option C best describes an insider attack as it specifically mentions the misuse of network access by a current or former employee.

The other options mentioned (A, B, and D) describe different types of attacks, but they do not specifically involve an insider with authorized access to the network.

Thus, the correct option is C.

For more details regarding network, visit:

https://brainly.com/question/29350844

#SPJ1

Paravirtualization is ideal for

Answers

Answer:to allow many programs, through the efficient use of computing resources including processors and memory, to operate on a single hardware package.

Explanation:

What does a list code block do?

Question 2 options:

stores many pieces of information


stores a single piece of information


completes a set algorithm when a condition is met


repeatrepeats a process a set number of times

Answers

Answer: stores many pieces of information.

Explanation:

how would you share information and communicate news and events​

Answers

Answer:

You could use Print things (mail, books, etc.) or Online things (internet, social media, etc.)

Hope this helps :)

Chris wants to view a travel blog her friend just created. Which tool will she use?

HTML
Web browser
Text editor
Application software

Answers

Answer:

i think html

Explanation:

Answer:

Web browser

Explanation:

c) Based on your own experiences, what are some symbols (e.g., letters of the alphabet) people use to communicate?

Answers

Based on my own experience, some symbols people use to communicate and they are:

Emojis/emoticonsGifshand gestures

What do people use to communicate?

Individuals utilize composed images such as letters, numbers, and accentuation marks to communicate through composing.

For occasion, letters of the letter set are utilized to make words, sentences, and sections in composed communication. Individuals moreover utilize images such as emojis and emoticons in computerized communication to communicate feelings, expressions, and responses.

Learn more about communication from

https://brainly.com/question/28153246

#SPJ1

Programming CRe-type the code and fix any errors. The code should convert non-positive numbers to 1.
if (userNum > 0)
printf("Positive.\n");
else
printf("Non-positive, converting to 1.\n");
user Num = 1;
printf("Final: %d\n", userNum);
1 #include Hem
int main(void) {
int userNum;
scanf("%d", &userNum);
return 0;

Answers

Answer:

Given

The above lines of code

Required

Rearrange.

The code is re-arrange d as follows;.

#include<iostream>

int main()

{

int userNum;

scanf("%d", &userNum);

if (userNum > 0)

{

printf("Positive.\n");

}

else

{

printf("Non-positive, converting to 1.\n");

userNum = 1;

printf("Final: %d\n", userNum);

}

return 0;

}

When rearranging lines of codes. one has to be mindful of the programming language, the syntax of the language and control structures in the code;

One should take note of the variable declarations and usage

See attachment for .cpp file

Please help ASAP!
Combined with a set number of steps to determine size, what number of degrees would you use for turn degrees to command a sprite to trace a triangle with three equal sides?

A. 90, 90

B. 45, 45

C. 90, 180

D. 120, 120

Answers

Answer:

GIVE this man Brainliest!

Explanation:

Read three integers from user input without a prompt. Then, print the product of those integers. Ex: If input is 2 3 5, output is 30. Note: Our system will run your program several times, automatically providing different input values each time, to ensure your program works for any input values. See How to Use zyBooks for info on how our automated program grader works.

Answers

Answer:

Explanation:

The following code is written in Java and simply grabs the three inputs and saves them into three separate variables. Then it multiplies those variables together and saves the product in a variable called product. Finally, printing out the value of product to the screen.

import java.util.Scanner;

public class Main{

   public static void main(String[] args){

       Scanner in = new Scanner(System.in);

       int num1 = in.nextInt();

       int num2 = in.nextInt();

       int num3 = in.nextInt();

       int product = num1 * num2 * num3;

       System.out.println(product);

   }

}

Answer: Python

Explanation:

num1 = int(input())

num2 = int(input())

num3 = int(input())

product = num1 * num2 * num3

print(product)

Create a console-based computerized game of War named WarCardGameConsole in the Final Project Part 1 folder. This is C#
1. Use an array of 52 integers to store unique values for each card.
2. Write a method named FillDeck() that places 52 unique values into this array.
3. Write another method named SelectCard() that you call twice on each deal to randomly
select a unique card for each player, with no repetition of cards in 26 deals.
4. To pause the play between each dealt hand, use a call to ReadLine().
5. At the end of a play of the game of the 26 deals:
a. display the Computer’s and Player’s final scores
b. display who won the game
c. record the results in a text file (see step 6)
d. give the player the choice of stopping or playing again.
6. Record the results of each game in a text file:
a. The text file should be saved as FirstNameLastName Results.txt in your project
folder. The file will automatically save in WarCardGameConsole\bin\Debug folder.
b. At the beginning of your program you should check to see if your file exists;
 If not, your program will create it
 If it does exist, you program will open it.
c. At the of a play of the game you will record the results
d. When the player indicates they want to stop playing, the program should close the
file.
7. Your program must have meaningful comments, including your name.

Answers

Answer:

Here is a console-based C# program for the card game War:

Explanation:

using System;

using System.IO;

namespace WarCardGameConsole

{

   class WarCardGame

   {

       // Array to hold 52 cards

       int[] deck = new int[52];

       // Player and computer scores

       int playerScore;

       int computerScore;

       // File to record results

       StreamWriter results;

       // Fill deck with cards

       void FillDeck()

       {

           // Add cards to deck

           for (int i = 0; i < deck.Length; i++)

           {

               deck[i] = i;

           }

       }

       // Select random card

       int SelectCard()

       {

           // Generate random index

           Random rand = new Random();

           int index = rand.Next(deck.Length);

           // Remove selected card from deck

           int card = deck[index];

           deck[index] = deck[deck.Length - 1];

           Array.Resize(ref deck, deck.Length - 1);

           // Return selected card

           return card;

       }

       // Play one round of war

       void PlayRound()

       {

           // Select cards for player and computer

           int playerCard = SelectCard();

           int computerCard = SelectCard();

           // Display cards

           Console.WriteLine($"Player card: {playerCard}  Computer card: {computerCard}");

           // Check who has higher card

           if (playerCard > computerCard)

           {

               playerScore++;

               Console.WriteLine("Player wins this round!");

           }

           else if (computerCard > playerCard)

           {

               computerScore++;

               Console.WriteLine("Computer wins this round!");

           }

           else

           {

               Console.WriteLine("Tie! No points awarded.");

           }

           // Pause before next round

           Console.WriteLine("Press any key to continue...");

           Console.ReadKey();

       }

       void PlayGame()

       {

           // Fill deck with cards

           FillDeck();

           // Play 26 rounds

           for (int i = 0; i < 26; i++)

           {

               PlayRound();

           }

           // Display final scores

           Console.WriteLine($"Player final score: {playerScore}");

           Console.WriteLine($"Computer final score: {computerScore}");

           // Determine winner

           if (playerScore > computerScore)

           {

               Console.WriteLine("Player wins the game!");

           }

           else if (computerScore > playerScore)

           {

               Console.WriteLine("Computer wins the game!");

           }

           else

           {

               Console.WriteLine("Tie game!");

           }

           // Record results in file

           results.WriteLine($"{DateTime.Now} - {playerScore} to {computerScore}");

           // Play again?

           Console.Write("Play again? (Y/N) ");

           string input = Console.ReadLine();

           if (input.ToUpper() == "Y")

           {

               // Restart game

               playerScore = 0;

               computerScore = 0;

               PlayGame();

           }

           else

           {

               // Close file and exit

               results.Close();

               Environment.Exit(0);

           }

       }

       static void Main(string[] args)

       {

           // Create game object

           WarCardGame game = new WarCardGame();

           // Check if results file exists

           if (!File.Exists("JohnDoe Results.txt"))

           {

               // Create file

               game.results = File.CreateText("JohnDoe Results.txt");

           }

           else

           {

               // Open existing file

               game.results = File.AppendText("JohnDoe Results.txt");

           }

           // Play game

           game.PlayGame();

       }

   }

}

website is a collection of (a)audio files(b) image files (c) video files (d)HTML files​

Answers

Website is a collection of (b) image files (c) video files and  (d)HTML files​

What is website

Many websites feature a variety of pictures to improve aesthetic appeal and provide visual substance. The formats available for these image files may include JPEG, PNG, GIF, or SVG.

To enhance user engagement, websites can also introduce video content in their files. Web pages have the capability to display video files either by embedding them or by providing links, thereby enabling viewers to watch videos without leaving the site. Various formats such as MP4, AVI and WebM can be utilized for video files.

Learn more about  website  from

https://brainly.com/question/28431103

#SPJ1

Take a number N as input and output the sum of all numbers from 1 to N (including N).​

Answers

Answer:

Incluint respuet

Explanation:

espero que te sirva

where do you think data mining by companies will take us in the coming years

Answers

In the near future, the practice of companies engaging in data mining is expected to greatly influence diverse  facets of our daily existence.

What is data mining

There are several possible paths that data mining could lead us towards.

Businesses will sustain their use of data excavation techniques to obtain knowledge about each individual customer, leading to personalization and customization. This data will be utilized to tailor products, services, and advertising strategies to suit distinctive tastes and requirements.

Enhanced Decision-Making: Through the use of data mining, companies can gain valuable perspectives that enable them to make more knowledgeable decisions.

Learn more about data mining from

https://brainly.com/question/2596411

#SPJ1

the following figure represents a network of physically linked devices labeled p through s. a line between two devices indicates a connection. devices can communicate only through the connections shown. the figure presents a diagram of a network of physically linked devices labeled p through s. device p is connected to devices q, r, and s. device q is connected to devices p, r, and s. device r is connected to devices p, q and s. device s is connected to devices p, q, and r. which of the following statements best explains the ability of the network to provide fault tolerance? responses the network is considered fault-tolerant because there are redundant paths between each pair of devices. the network is considered fault-tolerant because there are redundant paths between each pair of devices. the network is considered fault-tolerant because it guarantees that no individual component will fail. the network is considered fault-tolerant because it guarantees that no individual component will fail. the network is not considered fault-tolerant because it relies on physical connections. the network is not considered fault-tolerant because it relies on physical connections. the network is not considered fault-tolerant because it provides more paths than are needed.

Answers

The statement that best explains the ability of the network to provide fault tolerance is option A: The network is considered fault-tolerant because there are redundant paths between each pair of devices.

What attributes can tell about a network fault tolerance?

The usage of backup components in fault-tolerant systems ensures that there will be no service interruptions by replacing defective components automatically. A few of these include systems that are similar to or equal to the hardware systems they are backing up.

In this question, the concept of "redundancy" refers to the capacity to set up one or more backup components (or cards) to take the place of a component that fails. Redundancy offers system-wide fault tolerance, assisting in ensuring that the CSP continues to handle calls despite a hardware or software issue.

Therefore, A system's ability to keep running uninterrupted when one or more of its components fail is referred to as fault tolerance (computer, network, cloud cluster, etc.).

Learn more about fault tolerance from

https://brainly.com/question/27408287
#SPJ1

What is the relationship model in this ER digram?

What is the relationship model in this ER digram?

Answers

Answer:

ER (ENTITY RELATIONSHIP)

Explanation:

An ER diagram is the type of flowchart that illustrates how "entities" such a person, object or concepts relate to each other within a system

James is researching his online image. Which of the following does checking NOT involve?

Reviewing whether his online image is positive

Using multiple search engines to search his first and last name

Asking site administrator to take down negative footprints

Setting a strong password to protect his personal information

Answers

James is researching his online image the following does checking NOT to involve Using multiple search engines to search his first and last name.

What are search engines?

A seek engine is a web-primarily based totally device that permits customers to find data at the World Wide Web. Popular examples of search engines like like and yahoo are, Yahoo!, and MSN Search.

The app becomes a photo reputation cellular app with the use of visible seeks generation to pick out items via a cellular device's camera. Users take an image of a bodily object, and search and retrieve data approximately the photo.

Read more about the research:

https://brainly.com/question/968894

#SPJ1

a network administrator would like to increase network bandwidth to 1gbps between two office buildings that are 0.5mi(805m) apart. which of the following would be the best solution?

Answers

The best solution would be to install fiber optic cables between the two buildings.

What is fiber optic cables?

Fiber optic cables are a type of cable that transmit information through light pulses along a glass or plastic strand. They have replaced traditional copper cables as the preferred method of data transmission due to their superior speed, increased data capacity, and immunity to electrical interference.

Fiber optic cables are capable of much greater speeds than copper cables, and the distance of 0.5 miles (805m) would not be a problem. Fiber optic cables can easily support speeds of up to and exceeding 1Gbps, making them the ideal solution for this situation. Additionally, fiber optic cables are immune to electromagnetic interference which can be a problem with copper cables over long distances.

To learn more about fiber optic cables
https://brainly.com/question/14592320
#SPJ4

By using the cloud to support their application or website, developers have access to services like that increases the capacity of the system automatically, with preset limits. Cloud solutions also offer which divides the tasks between network resources based on traffic and their individual capacities.

load balancing
autoscaling​

Answers

Answer:

Autoscaling, loud balancing.

Explanation:

By using the cloud to support their application or website, developers have access to services like autoscaling that increases the capacity of the system automatically, with preset limits. Cloud solutions also offer loud balancing, which divides the tasks between network resources based on traffic and their individual capacities.

Good luck on any future assignments!

Developers that use the cloud to support their application or website have access to services like autoscaling, which automatically increases system capacity within certain boundaries. Loud balancing, another feature of cloud solutions, allocates duties to network resources according to traffic and their particular capacity.

What is Load Balancing and autoscaling?

The major networking method used in a server farm to distribute traffic among its several machines is load balancing. Applications' responsiveness and availability are improved by load balancers, which also guard against server overload. The position of each load balancer is between the client devices and the backend servers. It receives incoming requests and then distributes them to any available and competent server.

A cloud computing technique for dynamically assigning computational resources is called autoscaling, sometimes known as autoscaling, auto-scaling, and occasionally automatic scaling. The number of servers that are active will normally change automatically as user needs change, depending on the demand on a server farm or pool.

Because an application often scales based on load balancing serving capacity, autoscaling and load balancing go hand in hand. In other words, the autoscaling policy is shaped by a number of parameters, including the load balancer's serving capacity and CPU utilization from cloud monitoring.

To get more information about Load Balancing and autoscaling :

https://brainly.com/question/27252527

#SPJ2

Directions: Everyone around the world plays the lottery. Today we are going to design our own lottery game and see if we can win and rig the game to help us win. For this project we are going to simplify the lottery systems and follow the following rules:
There are 3 lottery numbers that we have to match
The 3 numbers can only be between 0-10
Winning Outcomes:
Option 1 - You match all 3 numbers and have them in order -> you win 1,000
Option 2 - You match all 3 numbers in any order -> you win 500
Option 3 - You match 2 numbers in any order -> you win 250
Option 4 - You match 1 number in any order-> you win 100
Option 5 - You match nothing -> you don't win


When creating this project you can use a while loop to ensure that each of the 3 values do not repeat.

Use random.randint() to generate your random numbers.

Have the user enter their 3 numbers for the lottery and then run the program to see if they have won or not. You can use different .py files or create methods to run parts of the program.

Answers

The code is given below.

What do you mean by Python programming?

Python is a high-level, interpreted programming language that was first released in 1991. It is named after the Monty Python comedy group and was created by Guido van Rossum. Python is known for its readability, simplicity, and ease of use. It supports multiple programming paradigms, including procedural, object-oriented, and functional programming.

Python is widely used in a variety of applications, including web development, scientific computing, data analysis, artificial intelligence, and more. It has a large and active community of developers who contribute to its development and provide support to users. Python also has a vast library of pre-written code that can be easily imported and used, making it a great choice for rapid prototyping and development.

Here is an example code in Python to implement the lottery game:

python

Copy code

import random

def check_numbers(user_numbers, lottery_numbers):

   user_numbers_set = set(user_numbers)

   lottery_numbers_set = set(lottery_numbers)

   # Check if all 3 numbers match

   if user_numbers_set == lottery_numbers_set:

       # Check if the numbers are in order

       if user_numbers == lottery_numbers:

           return 1000

       # If the numbers are not in order

       else:

           return 500

   # Check if 2 numbers match

   elif len(user_numbers_set.intersection(lottery_numbers_set)) >= 2:

       return 250

   # Check if 1 number matches

   elif len(user_numbers_set.intersection(lottery_numbers_set)) >= 1:

       return 100

   # If no numbers match

   else:

       return 0

def main():

   # Generate 3 random numbers between 0 and 10

   lottery_numbers = random.sample(range(0, 11), 3)

   # Ask the user for their 3 numbers

   user_numbers = [int(input("Enter number 1: ")), int(input("Enter number 2: ")), int(input("Enter number 3: "))]

   # Check if the user has won the lottery

   winnings = check_numbers(user_numbers, lottery_numbers)

   # Print the result

   if winnings > 0:

       print(f"Congratulations! You have won ${winnings}")

   else:

       print("Sorry, you did not win the lottery.")

if __name__ == "__main__":

   main()

In this code, the check_numbers function takes in two lists, user_numbers and lottery_numbers, and returns the amount won based on the number of matches and their order. The main function generates the 3 random lottery numbers, asks the user for their numbers, and calls the check_numbers function to determine if they have won the lottery. The final result is displayed to the user with a message indicating the amount won or a message saying that they did not win.

To know more about function  visit:

https://brainly.com/question/29797102

#SPJ1

Define a SCHEME function, unzip, which takes a list of pairs ((a .b)... (an .bn)) and returns a pair consisting of the two lists (a ...an) and (b. ... bn).

Answers

A scheme function can simply be defined as a programming language which allows us to build our own proce- dures and add them to the set of existing ones

However too, function call is given by as fa-rgs

Where, f is the name of the function and args a space-separated sequence of arguments

What is scheme?

It simply refers to an orderly large-scale plan or systematic arrangement for attaining a particular object or putting a particular idea into effect

So therefore, a scheme function can simply be defined as a programming language which allows us to build our own procedures and add them to the set of existing ones

Learn more about exponential scheme function:

https://brainly.com/question/11464095

What is one outcome of an integration point?

Answers

Answer:

What is one outcome of an integration point? It provides information to a system builder to potentially pivot the course of action. It bring several Kanban processes to conclusion. It supports SAFe budgeting milestones.

In order to average together values that match two different conditions in different ranges, an excel user should use the ____ function.

Answers

Answer: Excel Average functions

Explanation: it gets the work done.

Answer:

excel average

Explanation:

What would game programmers do when decomposing a task in a modular program?

Answers

When game programmers decompose a task in a modular program, they would typically break down the task into smaller, more manageable modules or functions. Here are some steps they might take during the decomposition process:

1. Identify the overall task or feature: Game programmers start by identifying the larger task or feature they want to implement, such as player movement, enemy AI, or collision detection.

2. Analyze the task: They analyze the task to understand its requirements, inputs, and desired outputs. This helps them determine the necessary functionality and behavior.

3. Identify subtasks or components: They identify the subtasks or components that make up the larger task. For example, in the case of player movement, this could involve input handling, character animation, physics simulation, and rendering.

4. Break down the subtasks further: Each subtask can be further decomposed into smaller, more specific functions or modules. For example, input handling might involve separate functions for keyboard input, mouse input, or touch input.

5. Define interfaces: They define clear interfaces between the modules, specifying how they interact and communicate with each other. This helps ensure modularity and maintainability of the code.

6. Implement and test modules: Game programmers then proceed to implement each module or function, focusing on their specific responsibilities. They can test and iterate on these smaller units of functionality independently.

7. Integrate and test the modules: Finally, they integrate the modules together, ensuring they work harmoniously and produce the desired outcome. Thorough testing is conducted to verify that the overall task or feature functions correctly.

By decomposing tasks in this manner, game programmers can effectively manage the complexity of game development, promote code reusability, enhance collaboration, and facilitate the maintenance and future expansion of the game.

When decomposing a task in a modular program, game programmers follow a structured approach to break down the task into smaller, more manageable components.

This process is crucial for code organization, maintainability, and reusability. Here's an outline of what game programmers typically do:

1. Identify the task: The programmer begins by understanding the task at hand, whether it's implementing a specific game feature, optimizing performance, or fixing a bug.

2. Break it down: The task is broken down into smaller subtasks or functions that can be handled independently. Each subtask focuses on a specific aspect of the overall goal.

3. Determine dependencies: The programmer analyzes the dependencies between different subtasks and identifies any order or logical flow required.

4. Design modules: Modules are created for each subtask, encapsulating related code and functionality. These modules should have well-defined interfaces and be independent of each other to ensure reusability.

5. Implement and test: The programmer then implements the modules by writing the necessary code and tests their functionality to ensure they work correctly.

6. Integrate modules: Once individual modules are tested and verified, they are integrated into the larger game program, ensuring that they work together seamlessly.

By decomposing tasks into modules, game programmers promote code organization, readability, and ease of maintenance. It also enables parallel development by allowing different team members to work on separate modules simultaneously, fostering efficient collaboration.

For more such questions on programmers,click on

https://brainly.com/question/30130277

#SPJ8

2. What is MOST TRUE of a mature technology?

Answers

Answer:

A mature technology is a technology that has been in use for long enough that most of its initial faults and inherent problems have been removed or reduced by further development.

Explanation:

Write and compile a java code to add 18+6?

Answers

Answer:

public class testing

{

   public static void main(String[] args)

   {

       int x = 18;

       int y = 6;

       System.out.println(addNumbers(x, y));

   }

   public static int addNumbers(int a, int b)

   {

       return a + b;

   }

}

3
5. (a) Identify some key internet search engines

Answers

Answer:

google, bing,yahoo,aol

Explanation:

Google
Bing
MSN
Yahoo
DuckDuckGo
Thank You!

Which of these terms describe a facility that stores hundreds, if not thousands, of servers?
a) KVM
b) switchWeb server
c) Data center
d) SSH server

Answers

Answer:

(c) Data center

Explanation:

A data center is a centralized location that stores several computing and networking devices such as servers, routers, switches, e.t.c. The main purpose of the data center is to ensure the smooth collection, storage, processing, distribution and access of very large amount of data.

They (data centers) can also store and provide web application, email application and instant messaging services and lots of other things.

Because of the massive number of servers they store, they are sometimes regarded to as server farms.

Some data centers in Africa include:

i. Main One.

ii. DigiServ.

iii. Rack Center.

What does it NOT mean for something to be open source?
It’s available for anyone to use
It’s free for all
It’s available for anyone to modify
Free to use but you have to pay a fee to modify

Answers

Answer:

Free to use but you have to pay a fee to modify

Explanation:

You NEVER have to pay for OPEN SOURCE

12.2 E-Z LOAN
A loan obtained from a lending institution is typically paid off over time using equal monthly payments over a term of many months. For each payment, a portion goes toward interest and the remaining amount is deducted from the balance. This process is repeated until the balance is zero. Interest is calculated by multiplying the current balance by the monthly interest rate, which is usually expressed in terms of an Annual Percentage Rate (APR). This process produces an Amortization Schedule where the amount applied to interest is gradually reduced each month and the amount applied to the balance grows. For example, the following amortization schedule is for a loan of $ 10.000 at an APR of 3.9% over a term of 30 months:3 will match months 12, 24, and 30 respectively.

Answers

Following an amortization schedule, the monthly payments will be $350.39 and the total payment in 30 months will be $10511.7.

How much should be paid monthly to complete loan payment in 30 months?

The loan payment follows an amortization schedule where the amount applied to interest is gradually reduced each month and the amount applied to the balance grows.

The amounts to be paid is calculated using the amortization formula:

P = a ÷ {{[(1 + r/n)^nt] - 1} ÷ [r/n(1 + r/n)^nt]}

where

P is monthly paymenta is credit amountr is the interest ratet is the time in yearsn is number of times the interest is compounded

For the loan of $10000;

a = $10000r = 3.9% = 0.039nt = 30 months

Hence,

P = $10000 ÷ {{[(1 + 0.039/12)^60] - 1} ÷ [0.039/12(1 + 0.0.039/12)^60]}

P = $350.39 per month

Total payment in 30 months = $350.39 × 30 = $10511.7

Therefore, the monthly payments will be $350.39 and the total payment in 30 months will be $10511.7.

Learn more about amortization schedule at: https://brainly.com/question/26433770

Other Questions
setting up a unit conversionplease list stepsA student sets up the following equation to convert a measurement. (The ? stands for a number the student is going to calculate.) Fill in the missing part of this equation. Note: your answer should be True or False: The parent-child relationship is often one-sided. For many years, parents are "givers" and children are the "takers." Parents must put their childrens needs before their own needs Copperfield's Books operated six retail bookstores -- four new and two used - in five locations in Sonoma and Napa counties in Northern California. Founded in 1981, it enjoyed thirteen unbroken years of growth, and owing to the absence of serious competition, came to dominate the bookselling market in its two county area. By 1995, Copperfield's seven retail outlets posted sales approaching $9MM. Borders and Barnes & Noble then entered, Internet book retailing began its rapid rise, and literary reading rates declined nationwide. These developments curtailed Copperfield's revenue growth, eroded its profit margins and market share, and led to closure of several stores. After the death of a founder in 2002, Copperfield's board promoted its Marketing Director, Tom Montan, to the position of CEO. He inherited a top-heavy organization in which 22% of the company's payroll was attributable to the corporate office, an amount in excess of industry averages and by 2003, equal to 7% of annual revenues. Montan needed to curtail the erosion in revenues and profits, deal with a shortage of capital resources, and assess existing and prospective store locations. He began by cutting costs and adopted a goal of growing chain-wide sales from $8MM in 2003 to $15MM in 2007, hoping to spread corporate overhead expenses over a wider trading base. The case opens as Montan debates whether to close an existing downtown Napa store and open a new Napa store in a shopping mall two miles away. He hopes to replicate the format and scale of his upscale Santa Rosa Montgomery Village location, yet Napa's demographics differ from Santa Rosa's. Other options include: entering new market territories, more rapid Using the Hf for SO3(g) and SO2(g) calculate H for the following reaction:SO3(g) SO2(g) +1/2O2(g)Hf for SO3(g) = __________ kJThe equations for SO3(g) and SO2(g) are as follows in the image attachedUse correct number of significant digits; How does Chekhov depict the cultural experience of high-rankingofficials in this passage?People of high rank have egos that are easily inflatedby false or excessive praise.People of high rank believe they are required to makesacrifices for people of low rank.People of high rank feel sincerely humble in the face oftheir inferiors' devotion.People of high rank are so involved in their work that Can someone help with this? the last person who answer was improper. What makes the "prehistoric" era prehistoric, as you know, is that it took place before the existence of a written record. This often proves frustrating to students of art history, since we don't have any accounts of what these people believed, what (if any) religion they practiced, or what was important to them in their lives. Then how can we know? Please consider what archaeologists, anthropologists, and art historians might use as evidence for some of the claims made by your textbook about life in the Paleolithic Era. Choose one work of art or architecture (just not 1-7, which is the subject of the supplementary discussion) and in 400 words discuss the prevailing theory of its function or purpose. Remember also to post replies to two of your classmates' essays. In an effort to increase their membership enrollment, the Hamilton Fitness Center was offering a 15% discount (good for one full calendar year) off of the regular monthly membership fee to new members who joined anytime during the past month. The regular monthly membership fee is $35. What is the promotional discounted monthly rate? Select the correct statement about the function represented by the table A certain type of ship has two tanks in its engine. Each tank contains a different type of fuel. When the engine turns on, the same amount of energy is transferred out of both fuels as shown in the diagram below. Why did fuel 1 change phase, but fuel 2 stayed the same? Explain what happened to the molecules of both fuels. Fuel1: Has phase change because the first diagram has the engine off and has only gas in the container but then the phase changed because the second part of the diagram the engine is now on.Know there is liquid in the fuel 2. The energy from each fuel changes from gas to liquid so there is almost like evaporation but backwards. So its from liquid to gas. What are the four main styles of Latin American music? You need to borrow $20,000 to buy a car. Bank A is charging you a stated rate of 4% compounded every month, you must make monthly payments for 5 years. Bank B is charging you 3.9% compounded continuously, you must also make monthly payments for 5 years. Which deal do you like better A or B? Replacing native gel electrophoresis with nonreducing sodium dodecyl sulfate (SDS) polyacrylamide gel electrophoresis (PAGE) during the purification step results in eluates with no enzymatic activity. The best explanation of this observation would be: which group identified themselves with zoroastrianism and the birth of christ? group of answer choices amesha spentis kings magi mani Which data provide the best evidence of supermassive black holes at the centers of galaxies?A.sonar observations of the black holeB.observations of infrared radiation coming from the black holeC.observations of visible light coming from the black holeD.X-ray observations of superheated gas around the black hole Explain all of the steps needed to simplify the equation 8(x+2) = 4(2x+9) using the order of operations. What is the correct Set-builder form for the following set written in Roster form: {4, 5, 6, 7, 8} Choose the products created during nuclear fusion. Check all that apply.energyhelium gashigh temperatureshydrogen gaslow pressure What are benefits of social media? Your classmates from the University of Chicago are planning to go to Miami for spring break, and you are undecided about whether you should go with them. The round-trip airfare is $600, but you have a frequent-flyer coupon worth $500 that you could use to pay part of the airfare. All other costs for the vacation are exactly $900. The most you would be willing to pay for the trip is $1,400. Your only alternative use for your frequent-flyer coupon is for your trip to Atlanta two weeks after the break to attend your sister's graduation, which your parents are forcing you to attend. The Chicago-Atlanta round-trip airfare is $450. If the Chicago-Atlanta round-trip air fare were $350, should you use the coupon to go to Miami? What do presentation and spreadsheet software have in common?a. Both analyze numeric data.b. Both calculate numeric formulas.c. Both convey numeric and/or text data.d. Both illustrate animations.