It took her 9 more months but Marina has managed to save the full $725 plus more to cover fees to pay off the pay-day loan company. However, she forgot to account for the interest that had been compounding over time. Consider it is now 275 days later, the remaining loan was $725 and the APR is 47% compounded daily.

What is the total amount that Marina must now pay in order to pay off her the loan, accounting for interest?

What is the total amount of interest paid (not including fees)?

Answers

Answer 1

Answer:

she loaned 750 dollars.

it took her 9 months to repay it.

it was 275 days since she took out the loan.

the interest rate was 47% per year compounded daily.

the daily interest rate would be 47% / 365 / 100 = .0012876712 per day.

this assumes 365 days in a year, which is the standard assumption that i know of.

the future value of 750 for 275 days would be based on the formula of f = p * (1 + r) ^ n

f is the future value

p is the present value

r is the interest rate per time period (days in this case)

 

n is the number of time periods (days in this case).

the formula becomes:

f = 750 * (1 + .0012876712) ^ 275

solve for f to get:

f = 1068.440089.

that's the future value of the loan.

it's what she owes.

the interest rate on the loan is that value minus 750 = 318.440089.

that's how much extra she needs to pay in addition to whatever fees she was charged.


Related Questions

what does coding mean​

Answers

the process or activity of writing computer programs.

Answer: Computer coding is the use of computer programming languages to give computers and machines a set of instructions on what actions to perform. It's how humans communicate with machines. It's what allows us to create computer software like programs, operating systems, and mobile apps.

Explanation: I hope that helps

— If NOT temp == 32.0 Then. Set temp = 32.0. End If.
What is the error

Answers

Answer:

im sorry so sorry i needed the pts

Explanation:

alendar year. The current calendar is called the Gregorian calendar, was introduced in 1582. Every year divisible by four was created to be a leap yer, with exception of the years ending with 00 (that is, those divisible by 100) and not divisible by 400. For instance, the years 1600 and 2000 are leap years, but 1700, 1800, and 1900 are not. Write a ptogram that requests a year as input states wether it is a leap year.

Answers

Answer

Tough question.

i dont know

Explanation:

the keyboard,mouse, display,and system units are:​

Answers

Answer:

input devices?

Explanation:

Keyboard: It is used to give input through typing of the keys in keyboard. Mouse: It is used to give input through clicking mouse or selecting the options. System unit: It collectively defines the motherboard and CPU of the computer.

The keyboard, mouse, display, and system units are the four main components of a computer system.

Given that,

The devices are Keyboard, Mouse, Display, and System units.

A computer comprises hardware and software.

The hardware is the devices that are used for the input and output of the data.

The software is the devices that are integrated into the devices of the computer. This processes the data and provides the result.

The output devices show the result of our actions on the computer. Example: Screen.

The storage devices are used to store the data which are given as input. Example: Hard disk.

Thus, these all come under the hardware devices of the computer.

Read more on computer hardware here:

brainly.com/question/959479

#SPJ6

Write a C program that does the following: Creates a 100-element array, either statically or dynamically Fills the array with random integers between 1 and 100 inclusive Then, creates two more 100-element arrays, one holding odd values and the other holding even values (copied from the original array). These arrays might not be filled completely. Prints both of the new arrays to the console.

Answers

Answer:

Following are the code to this question:

#include <iostream>//header file

using namespace std;

int main()//main method

{

   int axb[100];//defining 1-array of 100 elements

   int odd_axb[100], even_axb[100];//defining two array that holds 100-elements

   int i,size=0,size1=0;

   for(i = 0; i < 100; i++)//defining for loop to assign value in array

   {

       axb[i] = rand() % 100 + 1;//using rand method to assign value with random numbers between 1 and 100

   }

   for(i = 0; i < 100; i++)//defining for loop that seprates array value in odd and even array

   {

       if(axb[i] % 2 == 0)//checking even condition  

       {

           even_axb[size++] = axb[i];//holding even number

       }

       else//else block

       {

           odd_axb[size1++] = axb[i];//holding Odd number

       }

   }

   //printing values

   cout << "Odd array: ";//print message  

   for(i = 0; i <size1; i++)//use for loop for print odd numbers

   {

   cout << odd_axb[i]<<" ";//printing values

   }

   

   cout <<"\n\n"<< "Even array: ";//print message

   for(i = 0; i <size; i++)//use for loop for print even_axb numbers

   {

       cout << even_axb[i] << " ";//printing values

   }

   return 0;

}

Output:

Odd array: 87 87 93 63 91 27 41 27 73 37 69 83 31 63 3 23 59 57 43 85 99 25 71 27 81 57 63 71 97 85 37 47 25 83 15 35 65 51 9 77 79 89 85 55 33 61 77 69 13 27 87 95  

Even array: 84 78 16 94 36 50 22 28 60 64 12 68 30 24 68 36 30 70 68 94 12 30 74 22 20 38 16 14 92 74 82 6 26 28 6 30 14 58 96 46 68 44 88 4 52 100 40 40

Explanation:

In the above-program, three arrays "axb, odd_axb, and even_axb" is defined, that holds 100 elements in each, in the next step, three integer variable "i, size, and size1" is defined, in which variable "i" used in the for a loop.

In the first for loop, a rand method is defined that holds 100 random numbers in the array, and in the next, for-loop a condition statement is used that separates even, odd number and store its respective array, and in the last for loop, it prints its store values  

application of computer in insurance​

Answers

Answer:

To keep a list of insured members in the offices.

Explanation:

Compunters can be used to keep records of insured individual and their details

is English-like, easy to learn and use. uses short descriptive word to represent each of the machine-language instructions. is computer's native language. translates the entire source code into a machine-code file. processes one statement at a time, translates it to the machine code, and executes it. is a program written in a high-level programming language. is a program that translates assembly-language code into machine code.

Answers

Answer:

The appropriate choice is "Assembly Language ".

Explanation:

Such assembly languages were indeed low-level software packages designed for something like a mobile device or indeed any programmable machine. Written primarily throughout assembly languages shall be constructed by the assembler. Each assembler seems to have its programming languages, which would be focused on a particular computational physics.

ahmed is attending a conference and wants to learn more about python lists. Which conference is mostly likely to meet ahmed's needs

Answers

New Validation Methods  meets is most likely to suit Ahmed's requirements.

Define New Validation Methods ?

Python validation protects third-party users from mistakenly or maliciously misusing code. It may be used to determine whether or not the input data type is valid. It may be used to see if the provided input has any incorrect values. Validation may be classified into four types:

Validation in the future.

Validation at the same time.

Validation retroactively.

Revalidation (Periodic and After Change) (Periodic and After Change)

Learn more about Python validation from here;

https://brainly.com/question/21600820

#SPJ1

You are implementing a wireless network in a dentist's office. The dentist's practice is small, so you choose to use an inexpensive consumer-grade access point. While reading the documentation, you notice that the access point supports Wi-Fi Protected Setup (WPS) using a PIN. You are concerned about the security implications of this functionality. What should you do to reduce risk

Answers

Answer:

You should disable WPS in the access point's configuration.

Explanation:

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

In wireless access points, the encryption technologies used for preventing unauthorized access includes WEP, WPA, and WPA2.

In this scenario, you notice that an access point supports Wi-Fi Protected Setup (WPS) using a PIN and you are concerned about the security implications of this functionality. Therefore, to reduce this risk you should disable Wi-Fi Protected Setup (WPS) in the access point's configuration.

This ultimately implies that, the wireless access point will operate in an open state and as such would not require any form of password or PIN for use.

How does PowerPoint know which objects to group? The objects are aligned side by side. The objects are placed in one part of the slide. The objects are selected using the Ctrl key. The objects are highlighted and dragged together.

Answers

Answer:the objects are selected using the Ctrl key

Explanation:

Just took it

Answer:      C

Explanation:

What styles can the calendar be printed in? Check all that apply.

Quick
Daily style
Weekly Agenda style
Weekly Calendar style
Monthly Agenda style
Monthly style
Bifold style
Trifold style

Answers

Please Help! Unit 6: Lesson 1 - Coding Activity 2
Instructions: Hemachandra numbers (more commonly known as Fibonacci numbers) are found by starting with two numbers then finding the next number by adding the previous two numbers together. The most common starting numbers are 0 and 1 giving the numbers 0, 1, 1, 2, 3, 5...
The main method from this class contains code which is intended to fill an array of length 10 with these Hemachandra numbers, then print the value of the number in the array at the index entered by the user. For example if the user inputs 3 then the program should output 2, while if the user inputs 6 then the program should output 8. Debug this code so it works as intended.

The Code Given:

import java.util.Scanner;

public class U6_L1_Activity_Two{
public static void main(String[] args){
int[h] = new int[10];
0 = h[0];
1 = h[1];
h[2] = h[0] + h[1];
h[3] = h[1] + h[2];
h[4] = h[2] + h[3];
h[5] = h[3] + h[4];
h[6] = h[4] + h[5];
h[7] = h[5] + h[6];
h[8] = h[6] + h[7]
h[9] = h[7] + h[8];
h[10] = h[8] + h[9];
Scanner scan = new Scanner(System.in);
int i = scan.nextInt();
if (i >= 0 && i < 10)
System.out.println(h(i));
}
}

Answer:

Daily style

Weekly Agenda style

Weekly Calendar style

Monthly style

Trifold style

or

B, C, D, F, H

Package Newton’s method for approximating square roots (Case Study: Approximating Square Roots) in a function named newton. This function expects the input number as an argument and returns the estimate of its square root. The program should also include a main function that allows the user to compute the square roots of inputs from the user and python's estimate of its square roots until the enter/return key is pressed.An example of the program input and output is shown below:Enter a positive number or enter/return to quit: 2 The program's estimate is 1.4142135623746899 Python's estimate is 1.4142135623730951 Enter a positive number or enter/return to quit: 4 The program's estimate is 2.0000000929222947 Python's estimate is 2.0 Enter a positive number or enter/return to quit: 9 The program's estimate is 3.000000001396984 Python's estimate is 3.0 Enter a positive number or enter/return to quit

Answers

I’m confused what are you asking

The python program that calculates the volume and the square of the volume is as follows

radius = float(input("Radius: "))

volume = (4.0/3.0) * (22.0/7.0) * radius**3

sqrtVolume = volume**0.5

print(f'The volume is {volume} units cubed')

print(f'The square root of that number is {sqrtVolume}')

How to write the program?

The complete program written in Python where comments are used to explain each line is as follows

This gets the radius

radius = float(input("Radius: "))

#This calculates the volume

volume = (4.0/3.0) * (22.0/7.0) * radius**3

#This calculates the square root of the volume

sqrtVolume = volume**0.5

#This prints the volume

print(f'The volume is {volume} units cubed')

#This prints the square root of the volume

print(f'The square root of that number is {sqrtVolume}')

Therefore, The python program that calculates the volume and the square of the volume is as follows

radius = float(input("Radius: "))

volume = (4.0/3.0) * (22.0/7.0) * radius**3

sqrtVolume = volume**0.5

Read more about python programs at

brainly.com/question/26497128

#SPJ2

A car dealership needs a program to store information about the cars for sale. For each car, they want to keep track of the following information number of doors (2 or 4), whether the car has air conditioning, and its average number of miles per gallon. Which of the following is the best design?
a. Use classes: Doors, Airconditioning, and MilesPerGallon, each with a subclass Car.
b. Use a class Car, with subclasses of Doors, Airconditioning, and MilesPerGallon.
c. Use a class Car with three subclasses: Doors, Airconditioning, and MilesPerGallon.
d. Use a class Car, with fields: numDoors, hasAir, and milesPerGallon.
e. Use four unrelated classes: Car, Doors, Airconditioning, and MilesPerGallon.

Answers

Answer:

The answer is "Choice d".

Explanation:

In this topic, the option d, which is "Use a class Car, with fields: numDoors, hasAir, and milesPerGallon" is right because the flag, if air-conditioned, of its numbers of doors, was its average kilometers per gallon, qualities of either an automobile, in which each one is a basic value so that they're being fields of a class of cars.

The best design for the given program will be;

D: Use a class Car, with fields: numDoors, hasAir, and milesPerGallon.

What is the best design for the program?

In this question, the best design for the program to keep track of the number of doors (2 or 4), whether the car has air conditioning, and its average number of miles per gallon is to "Use a class Car, with fields: numDoors, hasAir, and milesPerGallon"

That option is right because has classified the cars with the accurate parameters to be searched which are its numbers of doors, average miles per gallon, air condition.

Read more about programming at; https://brainly.com/question/22654163

Giving brainliest if you answer question.

Answers

The length of the inclined plane divided by the vertical rise, or you can call it run to rise ratio. The mechanical advantage would increase as the slope of the incline decreases, but problem is that the load will have to go a longer distance. The mechanical advantage would be slope of the incline. I also got confused on a question like this and did some research. Hope this helps!

What is the value of the variable answer after the following code is executed?
String strl = "apple", str2 = "banana";
boolean answer = stri.equals(str2) && (stri.length() < str2.length());
true
false

Answers

Answer:

false

Explanation:

1.) Define Technology
2.) List 2 examples of Technology that you use everyday
3.) The building you live in is an example of this kind of technology
4.) This is technology of making things
5.) This kind of technology helps us talk to each other.
6.) This technology helps us move from one place to another

Answers

need more than 5 points for this wth

Which type of chart would best display data on the flavors of ice cream that customers prefer?

Answers

Answer: pie chart

Explanation: cause i said so

Pie chart is a type of chart would best display data on the flavors of ice cream that customers prefer.

What do you mean by Pie chart?

A circular statistical visual with slices illustrating numerical proportion is called a pie chart. Each slice's arc length in a pie chart corresponds to the quantity it represents.

Although it was given that name because it resembles a slice of pie, there are other ways to serve it. The Statistical Breviary by William Playfair, published in 1801, is largely credited with creating the first known pie chart.

In the business sector and in the media, pie charts are used a lot. They have been criticized, though, and many experts advise against using them since it can be challenging to compare data from one pie chart to another or between numerous pie charts, according to study.

Learn more about Pie chart, here

https://brainly.com/question/9979761

#SPJ6

Consider this scenario: A major software company finds that code has been executed on an infected machine in its operating system. As a result, the company begins working to manage the risk and eliminates the vulnerability 12 days later. Which of the following statements best describes the company’s approach?

Answers

Answer:

The company effectively implemented patch management.

Explanation:

From the question we are informed about a scenario whereby A major software company finds that code has been executed on an infected machine in its operating system. As a result, the company begins working to manage the risk and eliminates the vulnerability 12 days later. In this case The company effectively implemented patch management. Patch management can be regarded as process involving distribution and application of updates to software. The patches helps in error correction i.e the vulnerabilities in the software. After the release of software, patch can be used to fix any vulnerability found. A patch can be regarded as code that are used in fixing vulnerabilities

The return value is a one-dimensional array that contains two elements. These two elements indicate the rows and column indices of the largest element in the two-dimensional array. Write a test program that prompts the user to enter a two-dimensional array and displays the location of the largest element in the array.

Answers

Answer:

In Java:

import java.util.Scanner;  

import java.util.Arrays;  

public class Main  {  

public static void main(String args[])  {  

Scanner input = new Scanner(System.in);

int row, col;  

System.out.print("Rows: ");    row = input.nextInt();

System.out.print("Cols: ");     col = input.nextInt();  

int[][] Array2D = new int[row][col];

System.out.print("Enter array elements: ");

for(int i =0;i<row;i++){    

    for(int j =0;j<col;j++){

        Array2D[i][j] = input.nextInt();  

    }     }

 

int[] maxarray = findmax(Array2D,row,col);

System.out.println("Row: "+(maxarray[0]+1));

System.out.println("Column: "+(maxarray[1]+1));

}  

public static int[] findmax(int[][] Array2D,int row, int col)   {  

int max = Array2D[0][0];

int []maxitem = new int [2];

for(int i =0;i<row;i++){

    for(int j =0;j<col;j++){

        if(Array2D[i][j] > max){  

            maxitem[0] = i;

            maxitem[1] = j; } }    }

 

return maxitem;  

}  

}

Explanation:

The next two lines import the scanner and array libraries

import java.util.Scanner;  

import java.util.Arrays;  

The class of the program

public class Main  {  

The main method begins here

public static void main(String args[])  {  

The scanner function is called in the program

Scanner input = new Scanner(System.in);

This declares the array row and column

int row, col;

This next instructions prompt the user for rows and get the row input  

System.out.print("Rows: ");    row = input.nextInt();

This next instructions prompt the user for columns and get the column input  

System.out.print("Cols: ");     col = input.nextInt();  

This declares the 2D array

int[][] Array2D = new int[row][col];

This prompts the user for array elements

System.out.print("Enter array elements: ");

The following iteration populates the 2D array

for(int i =0;i<row;i++){    

    for(int j =0;j<col;j++){

        Array2D[i][j] = input.nextInt();  

    }     }

This calls the findmax function. The returned array of the function is saved in maxarray  

int[] maxarray = findmax(Array2D,row,col);

This prints the row position

System.out.println("Row: "+(maxarray[0]+1));

This prints the column position

System.out.println("Column: "+(maxarray[1]+1));

The main method ends here

}  

The findmax function begins here

public static int[] findmax(int[][] Array2D,int row, int col)   {  

This initializes the maximum to the first element of the array

int max = Array2D[0][0];

This declares maxitem. The array gets the position of the maximum element

int []maxitem = new int [2];

The following iteration gets the position of the maximum element

for(int i =0;i<row;i++){

    for(int j =0;j<col;j++){

        if(Array2D[i][j] > max){  

            maxitem[0] = i; -- The row position is saved in index 0

            maxitem[1] = j;  -- The column position is saved in index 1} }    }

This returns the 1 d array

return maxitem;  

}  

usually it is a rectangular box placeed or underneath your desk​

Answers

Answer:

Uh... there is no question here.

Explanation:

No question to answer.

Jerome falls sick after eating a burger at a restaurant. After a visit to the doctor, he finds out he has a foodborne illness. One of the symptoms of foodborne illness Jerome has is .
Jerome likely got the illness after eating food.

Answers

Answer: food poisning

Explanation:

either the food wasnt

cooked properly or the food was out of date and went bad

6. Which is not considered a storage device a. USB Flash Drive b. External hard Drive c. MS-Windows d. Internal Hard Drive e. Memory Cards​

Answers

Answer:

MS-Windows

Explanation:

MS-Windows is an operating system not a storage device.

Write a program, named sortlist, that reads three to four integers from the command line arguments and returns the sorted list of the integers on the standard output screen. You need to use strtok() function to convert a string to a long integer. For instance,

Answers

Answer:

In C++:

void sortlist(char nums[],int charlent){    

   int Myarr[charlent];

const char s[4] = " ";  

char* tok;  

tok = strtok(nums, s);  

int i = 0;  

while (tok != 0) {  

 int y = atoi(tok);

 Myarr[i] = y;

 tok = strtok(0, s);  

 i++;

}  

int a;  

for (int i = 0; i < charlent; ++i) {

for (int j = i + 1; j < charlent; ++j) {

 if (Myarr[i] > Myarr[j]) {

  a =  Myarr[i];

  Myarr[i] = Myarr[j];

  Myarr[j] = a;

       }   }  }

 

for(int j = 0;j<charlent;j++){ printf(" %d",Myarr[j]); }  

}

Explanation:

This line defines the sortlist function. It receives chararray and its length as arguments

void sortlist(char nums[],int charlent){    

This declares an array

   int Myarr[len];

This declares a constant char s and also initializes it to space

const char s[4] = " ";  

This declares a token as a char pointer

char* tok;

This line gets the first token from the char

tok = strtok(nums, s);

This initializes variable i to 0

int i = 0;

The following while loop passes converts each token to integer and then passes the tokens to the array  

while (tok != 0) {  

 int y = atoi(tok); -> Convert token to integer

 Myarr[i] = y; -> Pass token to array

 tok = strtok(0, s); -> Read token

 i++;

}  

Next, is to sort the list.

int a;

This iterates through the list  

for (int i = 0; i < charlent; ++i) {

This iterates through every other elements of the list

for (int j = i + 1; j < charlent; ++j) {

This condition checks if the current element is greater than next element

 if (Myarr[i] > Myarr[j]) {

If true, swap both elements

  a =  Myarr[i];

  Myarr[i] = Myarr[j];

  Myarr[j] = a;

       }   }  }

The following iteration prints the sorted array

for(int j = 0;j<charlent;j++){ printf(" %d",Myarr[j]); }  

}

See attachment for illustration of how to call the function from main

where did the command line first get its beginning?​

Answers

Answer:

About twenty years ago Jobs and Wozniak, the founders of Apple, came up with the very strange idea of selling information processing machines for use in the home. The business took off, and its founders made a lot of money and received the credit they deserved for being daring visionaries. But around the same time, Bill Gates and Paul Allen came up with an idea even stranger and more fantastical: selling computer operating systems. This was much weirder than the idea of Jobs and Wozniak. A computer at least had some sort of physical reality to it. It came in a box, you could open it up and plug it in and watch lights blink. An operating system had no tangible incarnation at all. It arrived on a disk, of course, but the disk was, in effect, nothing more than the box that the OS came in. The product itself was a very long string of ones and zeroes that, when properly installed and coddled, gave you the ability to manipulate other very long strings of ones and zeroes. Even those few who actually understood what a computer operating system was were apt to think of it as a fantastically arcane engineering prodigy, like a breeder reactor or a U-2 spy plane, and not something that could ever be (in the parlance of high-tech) "productized."

The program which handles the interface is called a command-line interpreter or command-line processor. Operating systems implement a command-line interface in a shell for interactive access to operating system functions or services. Such access was primarily provided to users by computer terminals starting in the mid-1960s, and continued to be used throughout the 1970s and 1980s on VAX/VMS, Unix systems and personal computer systems including DOS, CP/M and Apple DOS.

Write a function endpoints that takes a list of numbers (eg. [5, 10, 15, 20, 25]) and returns a new list of only the first and last elements of the given list (eg. [5, 25]). If the input list is [5], the returned should be [5,5]. The function should return an empty list if an empty list is passed in. The function should not use any variables besides the passed in argument list_.
def endpoints(it) -> list: # YOUR CODE HERE raise NotImplementedError() ] ### BEGIN TESTS assert endpoints([5, 10, 15, 20, 251) -- 15, 25] **# END TESTS U # BEGIN TESTS assert endpoints([5]) - (5, 51 *** END TESTS [] ### BEGIN TESTS assert endpoints(0) -- 0 #*# END TESTS

Answers

I included a picture of my code below. Best of luck with your assignment.

Play now? Play later?
You can become a millionaire! That's what the junk mail said. But then there was the fine print:

If you send in your entry before midnight tonight, then here are your chances:
0.1% that you win $1,000,000
75% that you win nothing
Otherwise, you must PAY $1,000

But wait, there's more! If you don't win the million AND you don't have to pay on your first attempt,
then you can choose to play one more time. If you choose to play again, then here are your chances:
2% that you win $100,000
20% that you win $500
Otherwise, you must PAY $2,000

What is your expected outcome for attempting this venture? Solve this problem using
a decision tree and clearly show all calculations and the expected monetary value at each node.
Use maximization of expected value as your decision criterion.

Answer these questions:
1) Should you play at all? (5%) If you play, what is your expected (net) monetary value? (15%)
2) If you play and don't win at all on the first try (but don't lose money), should you try again? (5%) Why? (10%)
3) Clearly show the decision tree (40%) and expected net monetary value at each node (25%)

Answers

Answer:

wow what a scam

Explanation:

List the operating system you recommend, and write a sentence explaining why.

Answers

Answer:

The type of operating system I reccommend really depends on how you use computers

Explanation:

If you want strict productivity/gaming: Windows

If you are a programmer/pen tester: Linux

If you want an easy interface: MacOS X

If you believe in God's third temple: Temple OS

Windows is probably the best for most users due to its balance of a simple interface and its many capabilities. It is also the best OS for gaming due to lack of support in many other OS's.

Linux is pretty much terminal-based with an interface if you need help. Only use this if you know your way around computers well. However, this OS allows you to use many tools that are impossible to use on another OS. This is the OS that many programmers, hackers, and other computer people use due to its coding-oriented environment.

If you like simple then use MacOS. The only problem is that it's only available on apple devices, so you have to pay a pretty penny to use it. This is also a unix-based OS meaning it has SOME linux capabilities.

RIP Terry A. Davis. Temple OS was designed to be the 3rd temple of God prophesized in the bible and created by Terry Davis ALONE over a bunch of years. He made this OS after receiving a revelation from God to make this. According to Davis, all other Operating Systems are inferior and Temple OS is the OS that God uses.

What does the term "death by powerpoint" refer to when dealing with Powerpoint presentations?

Answers

Answer:

Death by PowerPoint is a phenomenon caused by the poor use of presentation software. Key contributors to death by PowerPoint include confusing graphics, slides with too much text and presenters whose idea of a good presentation is to read 40 slides out loud.

Explanation:

Hope this helps :)

Write the Number class that can be used to test if the number is odd, even, and perfect. A perfect number is any number that is equal to the sum of its divisors. Write the NumberAnalyzer class that has an ArrayList of Number to determine how many numbers in the list are odd, even, and perfect.

Answers

Answer:

Explanation:

The following code is written in Python. It creates a class that takes in one ArrayList parameter and loops through it and calls two functions that check if the numbers are Perfect, Odd, or Even. Then it goes counting each and printing the final results to the screen.

class NumberAnalyzer:

   def __init__(self, myArray):

       perfect = 0

       odd = 0

       even = 0

       for element in myArray:

           if self.isPerfect(element) == True:

               perfect += 1

           else:

               if self.isEven(element) == True:

                   even += 1

               else:

                   odd += 1

       print("# of Perfect elements: " + str(perfect))

       print("# of Even elements: " + str(even))

       print("# of Odd elements: " + str(odd))

   def isPerfect(self, number):

       sum = 1

       i = 2

       while i * i <= number:

           if number % i == 0:

               sum = sum + i + number / i

           i += 1

       if number == sum:

           return True

       else:

           return False

   def isEven(self, number):

       if (number % 2) == 0:

           return True

       else:

           return False

What is the maximum ream size on an agile project?

Answers

Most Agile and Scrum training courses refer to a 7 +/- 2 rule, that is, agile or Scrum teams should be 5 to 9 members. Scrum enthusiasts may recall that the Scrum guide says Scrum teams should not be less than 3 or more than 9

Explanation:

Other Questions
Find the volume of a locker that is 30cm long, 40cm wide, and 200 cm high. PLEASE HURRY NEED THIS DONE BY 11:50 BRAINLIST IF U ARE CORRECT PLEASE HURRY THOUGH!!!!!!! Refer to your Who Is Sonia Sotomayor? book for a complete version of this text.Select Fact or Opinion for each statement from Chapter 2 of the text.He was smart and interesting.Fact or Opinion?But he said an Ivy League education would change her life forever.Fact or Opinion?Ken coached her on how to speak in front of an audience.Fact or Opinion?They both had to help out because the family was so poor.Fact or Opinion? 10. If you have ever noticed a sharp odor in the air after a thunderstormyou might be smelling ozone. Ozone can be formed from oxygen gaswhen lightning passes through the air. Which statement is true aboutozone? Convert to standard form: 3y -17 = 2x HELP ASAPSimplified the expression help me please I am very confused T-T what 80s Disney movie was called the movie that nearly killed Disney? P.S. look it up what is 832+609+5430 help pls i fell asleep i wanna go back help ;;-;; Ok so I don't understand how to do this-Can someone explain how?Shanghai, China (31 N, 121 E)1. 24-hr Average Yearly Temperature in C2. Total Yearly Precipitation in mm I have a triangle: Angle A = 3x +28; Angle B = 5x +52; Angle C = 2x - 10: Solve for X Type an equation for the line shown in the graph. What is the circumference and area of this circle? (Use 3.14 for pi) which two number are 10 away from 20? A jelly bean factory packaged 913 special ordered bags last Tuesday. The shift manager randomly picked seven bags to count the number of jelly beans.8, 6, 11, 15, 6, 11, 6If the sample was representative of all the bags packaged on Tuesday, what was the mode of the number of jelly beans of all the bags? A. 6 B. 15 C. 8 D. 11 Percent of changeFind the Percent of decrease for the following problems:1. Chad played three hours of Pokmon Go per day during the summer. Sinceschool began, he is only allowed to play one hour per day.2. Karen has 7 Eevees in her Pokmon stash. She transferred some in to theProfessor and now only has 2 Eevees.3. It takes 200 coins to get a bag upgrade in Pokmon Go. The creatorsdecided to throw a sale on bag upgrades. For one day only, anybody canupgrade their bag for 125 coins. The author writes, "Who would lug 1,000 pennies to the movies when they could bring a $10 bill?" What literary device is he using?Group of answer choicesrhetorical questionhyperbolemetahorsymbolism Lipids may contain ____ and small amounts of phosphorus and nitrogen While working a summer job, London earned $182 in 7 hours. Find therate of change. El _________ y la _________crecen en lugares de clima clido.A. banano, cafB. caf, caa de azcarC. caf, gallinaD. mango, maz