Write a program that lets the user enter the loan amount and loan period in number of years and displays the monthly and total payments for each interest rate starting from 5% to 8%, with an increment of 1/8.

Answers

Answer 1

Answer:

Following are the code to this question:

import java.util.*;//import package

public class Main //defining a class

{

public static void main(String[] axc)//main method  

{

double Loan_Amount,years,Annual_Interest_Rate=5.0,Monthly_Interest_Rate,Total_Amount,Monthly_Payment;//defining variables

Scanner ax = new Scanner(System.in);//creating Scanner class object

System.out.print("Enter loan amount:");//print message

Loan_Amount = ax.nextDouble();//input Loan_Amount value

System.out.print("Enter number of years: ");//print message

years= ax.nextInt();//input number of years value

System.out.printf("   %-20s%-20s%-20s\n", "Interest Rate", "Monthly Payment","Total Payment");//print message

while (Annual_Interest_Rate <= 8.0) //use while loop to calculate Interest rate table

{

Monthly_Interest_Rate = Annual_Interest_Rate / 1200;//calculating the interest Rate

Monthly_Payment = Loan_Amount * Monthly_Interest_Rate/(1 - 1 / Math.pow(1 + Monthly_Interest_Rate,years * 12));//calculating monthly payment

Total_Amount = Monthly_Payment * years * 12;//calculating yearly Amount

System.out.printf("\t %-19.3f%-19.2f%-19.2f\n", Annual_Interest_Rate,Monthly_Payment,Total_Amount);//use print meethod to print table

Annual_Interest_Rate = Annual_Interest_Rate + 1.0 / 8;//use Annual_Interest_Rate to increating the yearly Rate

}

}

}

Output:

Please find the attached file.

Explanation:

In this code inside the class, several double variables are declared in which the "Loan_Amount and years" is used for input value from the user-end, and another variable is used for calculating the value.

In this code a while loop is declared that checks the "Annual_Interest_Rate" value and creates the interest rate table which is defined in the image file please find it.

Write A Program That Lets The User Enter The Loan Amount And Loan Period In Number Of Years And Displays

Related Questions

what does ICT stand for?​

Answers

Information Communication Technology

ICT stands for 'Information Communication Technology'. Everyday usage of digital technology includes when you use a computer, tablet or mobile phone, send email, browse the internet, make a video call - these are all examples of using basic ICT skills and technology to communicate.

Information Communication Technology

Explain why microcomputers are installed with TCP/IP protocols?​

Answers

Answer:

microcomputers are installed with TCP/IP protocols because its a set of standardized rule that allows the computer to communicate on a network such as the internet

If D3=30 and D4=20, what is the result of the function
=IF(D4 D3, D3-D4, "FULL")?
0-10
O Unknown
O 10
O Full

Answers

Answer:

c. 10

Explanation:

Given

[tex]D3 = 30[/tex]

[tex]D4 = 20[/tex]

Required

The result of: [tex]=IF(D4 < D3,D3-D4,"FULL")[/tex]

First, the condition D4 < D3 is tested.

[tex]D4 < D3 = 20 < 30[/tex]

Since 20 < 30, then:

[tex]D4 < D3 = True[/tex]

The condition is true, so:

D3 - D4 will be executed.

[tex]D3 - D4 = 30 - 20[/tex]

[tex]D3 - D4 = 10[/tex]

Hence, the result of the function is 10

You are helping a friend in college with his network connection. He would like a high speed connection between his computers so he can play Super Blast with others. In this lab, your task is to complete the following: Choose an appropriate router that will provide security and the fastest local connection. Connect the router to both computers and to the dorm internet connection. Request new TCP/IP information from the router on both computers. Configure Windows Firewall on both computers. Turn on Windows Firewall for both the Private and the Public network profiles. Add an exception for the SuperBlast program only for the Private network profile.

Answers

Solution :

Set up the router as follows:

On the Shelf, expand the Routers. And read the description for each of the devices. Drag the Ethernet [tex]$100/1000TX$[/tex] router with the firewall to the Workspace.

Connection of the router as follows:

Above the router, select the Back to switch to the back view of the router. Then select the cable currently connected to the wall plate and then drag it to a [tex]$LAN$[/tex] port on the router. Above the Dorm-[tex]$PC2$[/tex] computer, select [tex]$\text{back}$[/tex] to switch to the back view of the computer. On the Shelf, expand Cables. Select a Cat5e [tex]$RJ45$[/tex] cable. In the Selected Component window, drag the connector to the [tex]$LAN$[/tex] port on the computer. In the Selected Component window, drag the other connector to a [tex]$LAN$[/tex] port on the router. Select a Cat5e [tex]$RJ45$[/tex] cable. In the Selected Component window, drag a connector to the [tex]$WAN$[/tex] port on the router. In the Selected Component window, drag the other connector to the port on the wall plate.

Provide power to the router as follows:

On the Shelf, select the power adapter. In the Selected Component window, drag the DC power connector to the power port on the router. In the Selected Component window, drag the AC adapter connector to the surge protector. Above the router, select Front to switch to the front view to verify power and network activity lights.

Request new [tex]$TCP/IP$[/tex] information from the router for Dorm-PC as follows:

On the [tex]$\text{Dorm-PC}$[/tex] monitor, select Click to view [tex]$\text{Windows 10}$[/tex].In the Search field on the taskbar, enter command prompt. Under Best Match, select Command Prompt. Enter [tex]$\text{ipconfig}$[/tex] /renew and press [tex]$\text{Enter}$[/tex] to request new [tex]$TCP/IP$[/tex] information from the router. In the notification area, right-click the Network icon and select Open Network and Sharing Center. The network information map should indicate an active connection to the Firewall Network and the internet.

Configure Windows Firewall on [tex]$\text{Dorm-PC}$[/tex] as follows:

In Network and Sharing, select Windows Firewall. From the left menu, select Turn Windows Firewall on or off. Under Private network settings, select Turn on Windows Firewall. Under Public network settings, select Turn on Windows Firewall. Click OK.

In order to implement the classic DoS flood attack, the attacker must generate a sufficiently large volume of packets to exceed the capacity of the link to the target organization. Consider an attack using ICMP echo request (ping) packets that are 500 bytes in size (ignoring framing overhead). How many of these packets per second must the attacker send to flood a target organization using a 0.5-Mbps link

Answers

Answer:

131 packets

Explanation:

Given

W (link ) =0.5 M bits,  and Ping packets ( P ) = 500bytes

To flood a target organization that has a bandwidth of W bits using a packet Mbits, you will require a W / P packet

P ( required ) = 500  * 8 = 4000 bits

therefore the W /P packet is calculated as

= 0.5 M bits / 4000 bits

given that :  1 M bits =  1,048,576 bits

0.5 M bits / 4000 bits=  131.07  

hence approximately 131 packets/ sec is required to flood the target organization

What are some of the strategies that you use for confronting a complex problem and breaking it down into smaller pieces? How might some of these strategies be useful to a computer programmer working on a CPU scheduler?

Answers

Answer:

Breaking it down I guess for me, you could take down all the possible things that you could do. Eliminating things, one by one. It could help working on a computer by not letting yourself get over-whelmed by all your programming and thinking "alright, this THEN this."

Explanation:

The strategies that you use for confronting a complex problem are:

First, define the issue.Use your inner eyes to visualize the issue. Break the problem into little pieces

Why are problem-solving strategies vital?

Solving problems involves the act of making the right choices. It is known to be a good and  effective way of problem-solving as one can get a good result from it.

Conclusively, by using the strategies give above, a computer programmer working on a CPU scheduler can be able to find out the issues that needs to be handled, where the problem is coming from and then solve it.

Learn more about CPU from

https://brainly.com/question/474553

arrange the following numbers from the highest to the lowest. ⅔,-7,0. no file or photo​

Answers

Answer:

2/3, 0, -7

Explanation:

Project Description:
In the following project, you will edit a worksheet that will be used to summarize the operations costs for the Public Works Department.
Instructions:
For the purpose of grading the project you are required to perform the following tasks:
Step Instructions Points Possible
1. Start Excel. Download and open the file named go16_xl_ch03_grader_3g_hw.xlsx. 0.000
2. In the Expenses worksheet, calculate row totals for each Expense item in the range F5:F9. Calculate column totals for each quarter and for the Annual Total in the range B10:F10. 8.000
3. In cell G5, construct a formula to calculate the Percent of Total by dividing the Annual Total for Salaries and Benefits by the Annual Total for Totals by Quarter. Use absolute cell references as necessary, format the result in Percent Style, and then Center. Fill the formula down through cell G9. 12.000
4. Use a 3-D Pie chart to chart the Annual Total for each item. Move the chart to a new sheet and then name the sheet Annual Expenses Chart. 8.000
5. For the Chart Title, type Summary of Annual Expenses and format the chart title using WordArt Style Fill - Blue, Accent 1, Shadow. Change the Chart Title font size to 28. 6.000
6. Remove the Legend from the chart and then add Data Labels formatted so that only the Category Name and Percentage display positioned in the Center. Change the Data Labels font size to 12, and apply Bold and Italic. 8.000
7. Format the Data Series using a 3-D Format effect. Change the Top bevel and Bottom bevel to Circle. Set the Top bevel Width and Height to 50 pt and then set the Bottom bevel Width and Height to 256 pt. Change the Material to the Standard Effect Metal.
Note, the bevel name may be Round, depending on the version of Office used. 4.000
8. Display the Series Options, and then set the Angle of first slice to 125 so that the Salaries and Benefits slice is in the front of the pie. Select the Salaries and Benefits slice, and then explode the slice 10%. Change the Fill Color of the Salaries and Benefits slice to a Solid fill using Green, Accent 6, Lighter 40%. 4.000
9. Format the Chart Area by applying a Gradient fill using the Preset gradients Light Gradient – Accent 4 (fourth column, first row). Format the Border of the Chart Area by adding a Solid line border using Gold, Accent 4 and a 5 pt Width. 6.000
10. Display the Page Setup dialog box, and then for this chart sheet, insert a custom footer in the left section with the file name. 4.000

Answers

Answer:

pelo o que diz na database é que você n é ser humano normal por perguntar isso!!

(3) reasons why users attach speakers to their computer

Answers

Explanation

1.we connected speakers with computers for listening voices or sound . because the computer has not their own speaker.

2.Speakers are popular output devices used with computer systems.

3.Speakers are one of the most common output devices used with computer systems

NEED HELP ASAP! You are looking for information in the online catalog for your local library. Which field would you not expect to see in a library's catalog or database?
A. Author
B. Title
C. Year
D. Phone number

Answers

Answer:

The answer is D

Explanation:

     

Implement a class Clock whose getHours and getMinutes methods return the current time at your location. (Call java.time.LocalTime.now().toString() and extract the time from that string.) Also provide a getTime method that returns a string with the hours and minutes by calling the getHours and getMinutes methods. Provide a subclass WorldClock whose constructor accepts a time offset. For example, if you live in California, a new WorldClock(3) should show the time in New York, three time zones ahead. Which methods did you override

Answers

Answer:

Explanation:

The following code was written in Java. It uses the LocalTime import to detect the current time. Then it creates a getHours, getMinutes, and getTime method to correctly print out only the hours and minutes in a simple format. Then it does the same for the WorldClock subclass which takes in the time offset as an int parameter and adds that to the hours in your own timezone.

class Clock {

   public String getHours() {

       String hours = java.time.LocalTime.now().toString().substring(0,2);

       return hours;

   }

   public String getMinutes() {

       String min = java.time.LocalTime.now().toString().substring(3,5);

       return min;

   }

   public String getTime() {

       String time = getHours() + ":" + getMinutes();

       return time;

   }

}

class WorldClock extends Clock {

   int timeZone = 0;

   public WorldClock(int timeZone) {

       super();

       this.timeZone = timeZone;

   }

   public String getHours() {

       String hours = String.valueOf(Integer.parseInt(super.getHours()) + 3);

       return hours;

   }

   public String getTime() {

       String time = getHours() + ":" + super.getMinutes();

       return time;

   }

}

class Test {

   public static void main(final String[] args) {

       Clock myClock = new Clock();

       System.out.println("My Time: " + myClock.getTime());

       WorldClock worldClock = new WorldClock(3);

       System.out.println("My Time + 3: " + worldClock.getTime());

   }

}

what is a computer and what is the work of it​

Answers

Answer:

A computer is an electronic machine that processes information. It is an information processor. It takes data, stores it, and then gives the result or answer.

It is a machine composed of hardare and software componests to be manually ised or atonomosly used.

Hope this helps!

Answer:

A computer is a machine that accepts data as input, processes that data using programs, and outputs the processed data as information. Many computers can store and retrieve information using hard drives. Computers can be connected together to form networks, allowing connected computers to communicate with each other.

A _______ is one typed character.
-gigabyte
-byte
-megabyte
-kilobyte
-terabyte

Answers

A bite byte bight beight

Which of the following does cloud computing allow users to do? Check all of the boxes that apply.

access data from anywhere with an Internet connection

store pictures and music

store data

have a unique address for their computer

Answers

Answer:

a b c

Explanation:

there just right

Answer: a b c d

Explanation edge 2023

Christopher was looking at the TV while getting feedback on his opinion essay. What should he do differently? Don't get feedback from a trusted adult. Finish watching his TV show. Make sure the trusted adult likes the show on TV, too. Turn off the TV and face the person who is speaking.

Answers

Answer:

Turn off the TV and face the person who is speaking.

“What is an example of the vocabulary word foreshadow?” This question could be a
a.
Potential question
c.
Flashcards question
b.
Vocabulary definition
d.
Both A and C


Please select the best answer from the choices provided

A
B
C
D

Answers

Answer:

D) Both A and C

Explanation:

Answer:

D

Explanation:

what is digital literacy? describe three examples of digital literacy skills

Answers

Digital literacy means having the skills you need to live, learn, and work in a society where communication and access to information is increasingly through digital technologies like internet platforms, social media, and mobile device

Examples of Digital Literacy skills:

What is digital literacy?

ICT proficiency.

Information literacy.

Digital scholarship.

Communications and collaborations.

Digital learning.

Digital identity.

In the reverse outlining technique, which of the following techniques is involved in assessing the structure of the new outline? Select one.

Question 3 options:

Discovering content that should be deleted, added, or rearranged


Identifying confusing sentences that mischaracterize the content


Incorporating various forms of advanced organizers, such as headings or bulleted lists


Identifying citations or paraphrases that are improperly formatted

Answers

In the reverse outlining technique, the technique involved in assessing the structure of the new outline is incorporating various forms of advanced organizers, such as headings or bulleted lists

The correct answer to the given question is option C.

Reverse outlining is a revision strategy that helps writers evaluate the organization and coherence of their written work. It involves creating an outline based on an existing draft and then analyzing the outline to assess the structure and flow of the content.

By examining the outline, writers can identify sections or points that may need to be deleted if they are irrelevant or repetitive. They can also determine areas where additional content should be added to provide clarity or support their arguments. Additionally, the outline allows writers to assess the order and sequence of their ideas and make necessary rearrangements to improve the overall structure of the piece.

While identifying confusing sentences that mischaracterize the content, incorporating advanced organizers, or identifying improperly formatted citations or paraphrases are important aspects of the writing and revising process, they are not specifically involved in assessing the structure of the new outline in the reverse outlining technique. The focus of reverse outlining is primarily on evaluating the organization and coherence of the content.

For more such questions on technique, click on:

https://brainly.com/question/12601776

#SPJ8

If a 9V, 7W radio is on from 9am to 12pm. Calculate the amount of charge that flows through it, hence or otherwise the total number of free electrons that pass through at a point at the power supply terminals​

Answers

Answer:

Q=It

and

p=IV

Given, v=9V P= 7W

I=P/V

I =7/9

Also, time(t) from 9am to 12pm is 3hrs

Converting into sec =3×3600

t=10800

Q= 7/9 ×10800

Q =8400C

Create another method: getFactorial(int num) that calculates a Product of same numbers, that Sum does for summing them up. (1,2,3 ... num) Make sure you use FOR loop in it, and make sure that you pass a number such as 4, or 5, or 6, or 7 that you get from a Scanner, and then send it as a parameter while calling getFactorial(...) method from main().

Answers

Answer:

The program in Java is as follows;

import java.util.*;

public class Main{

public static int getFactorial(int num){

    int fact = 1;

    for(int i =1;i<=num;i++){

        fact*=i;

    }

    return fact;

}

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 System.out.print("Number: ");

 int num = input.nextInt();  

 System.out.println(num+"! = "+getFactorial(num)); }}

Explanation:

The method begins here

public static int getFactorial(int num){

This initializes the factorial to 1

    int fact = 1;

This iterates through each digit of the number

    for(int i =1;i<=num;i++){

Each of the digits are then multiplied together

        fact*=i;     }

This returns the calculated factorial

    return fact; }

The main begins here

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

This prompts the user for number

 System.out.print("Number: ");

This gets input from the user

 int num = input.nextInt();  

This passes the number to the function and also print the factorial

 System.out.println(num+"! = "+getFactorial(num)); }}

In a multimedia presentation, when might voice-over be a better choice than placing the text on the screen?
when you have very little to say
when your audience is bored
when you have a lot to say
when you don’t want to write

Answers

Um, it is quite the battle between C and D, but knowing school they probably think D is lazy, so my final answer is C. Sorry if I'm wrong <3

In a multimedia presentation, the option that might be the voice-over  when you have a lot to say.

What is multimedia presentation?

A multimedia presentation is known to be a presentation where a person is said to often stand by themselves to present information via slides, video, etc.

In a multimedia presentation, the option that might be in the case of voice-over is when you have a lot to say as it is better to put it in a video format.

Learn more about multimedia from

https://brainly.com/question/24138353

#SPJ2

reasons why users attach speakers to their computer

Answers

Answer:

To listen to sounds or voices because maybe the computer doesn't have its own speakers

You are a Data Scientist at Anthem Blue Cross Blue Shield. You want to check if a patient will develop diabetes. Please write the R code to split the dataframe into test and training data. The proportion of split is 85/15, and the sample stratification needs to be done on the variable - age.

Answers

Answer:

666

Explanation:

You are a Data Scientist at Anthem Blue Cross Blue Shield. You want to check if a patient will develop diabetes. Please write the R code to split the dataframe into test and training data. The proportion of split is 85/15, and the sample stratification needs to be done on the variable

Write a program that replaces words in a sentence. The input begins with word replacement pairs (original and replacement). The next line of input is the sentence where any word on the original list is replaced. Ex: If the input is: automobile car manufacturer maker children kids The automobile manufacturer recommends car seats for children if the automobile doesn't already have one.

Answers

Answer:

In Python:

toreplace = input("Word and replacement: ")

sentence = input("Sentence: ")

wordsplit = toreplace.split(" ")

for i in range(0,len(wordsplit),2):

   sentence = sentence.replace(wordsplit[i], wordsplit[i+1])

print(sentence)

Explanation:

This gets each word and replacement from the user

toreplace = input("Word and replacement: ")

This gets the sentence from the user

sentence = input("Sentence: ")

This splits the word and replacement using split()

wordsplit = toreplace.split(" ")

This iterates through the split words

for i in range(0,len(wordsplit),2):

Each word is then replaced by its replacement in the sentence

   sentence = sentence.replace(wordsplit[i], wordsplit[i+1])

This prints the new sentence

print(sentence)

What are the two functions in C that allow a programmer to randomly move the file cursor within a file stream, thus enabling random access. Please write down the names of the two functions and separate them by a comma only. As an example, assume the two functions are abc, and abe, you will write down your answer as abc,abe

Answers

Answer:

seekp(),tellp()

Explanation:

The two functions in c ++ that allow a programmer to randomly move the file cursor within a file stream are : seekp(),tellp()

The functions place cursor in file stream and also access the values

Write a static generic method PairUtil.minmax that computes the minimum and maximum elements of an array of type T and returns a pair containing the minimum and maximum value. Require that the array elements implement the Measurable interface of Section 10.1.2.

Answers

Answer:

Explanation:

The following code is written in Java. It is hard to fully create the code without the rest of the needed code including the T class and the Measurable interface. Regardless the following code can be implemented if you have that code available.

 public static T minmax(ArrayList<T> mylist) {

       T min = new T();

       T max = new T();

       for (int x = 0; x < mylist.size(); x++) {

           if (mylist.get(x) > max) {

               max = mylist.get(x);

           } else if (mylist.get(x) < min) {

               min = mylist.get(x);

           }

       }

       

       return (min, max);

   }

explain the different type of shift register counter ​

Answers

Answer:

Shift registers are also used as counters. There are two types of counters based on the type of output from right most D flip-flop is connected to the serial input. Those are Ring counter and Johnson Ring counter.

There are two types of shift register counters. They are given below:

Ring counter.Johnson ring counter.

What do you mean by Shift register counter?

The shift register counter may be defined as a sequence of a specific number of core registers that are significantly interconnected to one another in order to provide a clock-driven data shift.

A shift register is a set of f FFs that can be connected within the series and the stored data can be moved in the registers sequentially as per the command or instruction is given.

They are also utilized as counters. The type of shift register counter is based on the output from the D flip-flop which is connected to the serial input from the rightmost side.

Therefore, the two types of shift register counters are well mentioned above.

To learn more about Shift register, refer to the link:

https://brainly.com/question/14096550

#SPJ6

c program that calculates the summation of integers from one to N. Allow the user to input an integer, then pass that number to a function that will calculate the sum of all integers up to N. For example, if the user inputs the number 5, then the function will return the sum 1 2 3 4 5. Allow the user to enter multiple integers, calling the function for each number. Use a sentinel value or similar method to terminate user input.

Answers

Answer:

Answered below.

Explanation:

#include <studio.h>

#include<conio.h>

void main(){

int I = 0;

int sumOfNumbers = 0;

int number;

printf("Input an integer: ");

("%d", &sumOfNumbers);

//Loop over while adding numbers

while(I <= number){

sumOfNumbers = sumOfNumbers + I;

I++;

}

printf("\n Sum of N numbers is: %d", sumOfNumbers);

getch();

}

what is subnetting. what does subnetting mean

Answers

Answer:

Subnetting is the practice of dividing a network into two or more smaller networks. It increases routing efficiency, enhances the security of the network and reduces the size of the broadcast domain.

Explanation:

Create a function that returns a dictionary containing the number of upper and lower case characters in a string (e.g. {'lower': 8, 'upper': 2}). Ignore whitespace characters. Your function should be able to handle an empty string, though.

Answers

Answer:

Explanation:

The following is written in Python and takes in the input string, then loops through it counting all of the upper and lower case letters and adds it to the dictionary.

string = input("input string: ")

upper_case = 0

lower_case = 0

for char in string:

   if char.isupper() == True:

       upper_case += 1

   elif char == ' ':

       pass

   else:

       lower_case += 1

letter_dict = {'upper_case': upper_case, 'lower_case': lower_case}

Other Questions
question is on the picture The spaceship Enterprise 1 is moving directly away from earth at a velocity that an earth-based observer measures to be 0.62c. A sister ship, Enterprise 2, is ahead of Enterprise 1 and is also moving directly away from earth along the same line. The veolcity of Enterprise 2 relative to Enterprise 1 is 0.30c. What is the velocity of Enterprise 2 Wk 7 Question 4-6, pg 259I asked for help with these questions and they said I needed more information on them, what other information do you need?4. Would you characterize the leadership style at W. L. Gore & Associates as job-centered or employee-centered (Chapter 3)? Support your answer.. Based on the types of power discussed in the text, what types(s) of power do sponsors have in their relationships with associates (Chapter 5)?6. what role, if any, does coaching play in W. L. Gore's lattice structure (Chapter 6)? The ratio of red cars to blue cars in a parking lot was 5 : 3. If there were 40 red cars, how many blue cars were there? Novak corp. had the rollowing transactionsSold land (cost $7,440) for $9,300.Issued common stock at par for $23,900.Recorded depreciation on buildings for $14,600.Paid salaries of $6,300.issued 50o shares or s par value common stock tor equoment worth s9.200.Sold equioment (cost $14.200, accumulated depreciation $9,9401 for $1.704.(a)For each transaction above, prepare the journal entry. Your company has two legal entities in the US (Balancing Segment Values [BSV] 101 and 102), one legal entity in France (BSV 401), and one legal entity in the UK (BSV 402). Both US legal entities share the same ledger, whereas the UK and France have their own ledgers. Assuming intercompany transactions are not being entered, what is the minimal action you can take and still configure the ledgers correctly? A. You should assign a balancing segment value to identify each legal entity in the US Ledger and assign the balancing segment values to the ledger in the UK and France. B. You should assign a balancing segment value to identify each legal entity in the US ledger. C. You should assign a balancing segment value to identify each legal entity in each ledger. D. You should assign the balancing segment value to the ledger in the US and assign a balancing segment value to identify each legal entity in the UK and France ledgers. what do you know about policy? Can someone please help me on this What is the complement of an angle of 41?(A) 41(B) 49(C) 139(D) 90(E) 180 Why camels can't live in the other places except the dessert? ASSESSMENTGenerate Explanations Explain how MartinLuther King, Jr.'s assassination marked a turningpoint for the civil rights movement. What is a pathway for acquiring training in information support and services skills? Choose four correct answers.Question options:Wait until you graduate from high school to take IT classes.Join an IT CTSO and participate in meetings and competitions.Enroll in an IT-related associate's degree program.Obtain an internship in the IT department at a company in your area.Spend a lot of time posting pictures and videos on social media.Volunteer at a senior center to help others learn about computers. HELP MEEEEEE i dont get it my teaher didnt teach me dis?? A source follower amplifier has a phase shift between the input and the output A. 90 B. 180 C. 0 D.360 In the figure below if M(ABD) 45 M(ABC)=100then find A,M( What is so important about DNA? Select all correct answers.A. DNA is found in all organisms and carries instructions to build those organismsB. DNA found in one organism probably shares similar instructions found in another speciesC. DNA is composed of only four bases that repeat in a sequence that is different for eachspeciesD. Some organisms don't actually have DNAE. The DNA of each organism is made out of different types of chemicals Why could the policeman not find the footprints from among the others in the shop?A. because they were clearly markedO B. there were dozens of footprintsC. there were no footprints to be foundO D. the footprints had been cleaned Now assume a 95% confidence level. Without performing any calculations, complete the sentence below. The margin of error for a 95% confidence level will be What is cyber bullying about what are the potential costs and risks to boeing of outsourcing