User asks you to develop a program that calculates and then prints interest earned on a bank
balance. Program should print interest earned for the same balance when interest is accumulated
annually, semiannually and quarterly.
Interest earned yearly-balance * rate /100
Interest earned semiannually balance*rate/2/100
Interest earned quarterly= balance*rate/4/100
for annual
for semi annual
for quarterly
00 is Current (1) times resistance (R)

Answers

Answer 1

The program that calculates and then prints interest earned on a bank balance is given below:

The Program

#include <bits/stdc++.h>

using namespace std;

int main()

{

   double principle = 10000, rate = 5, time = 2;

   /* Calculate compound interest */

   double A = principle * (pow((1 + rate / 100), time));

     double CI = A- principle;

   cout << "Compound interest is " << CI;

   return 0;

}

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1


Related Questions

Given the snippet of codes, identify the passing mechanism used for x (in function) void func(int *x, int y) {
*x = *x + y; y = 2;
}
call-by-name call-by-value call-by-reference call-by-address

Answers

The passing mechanism used for x in the given snippet of codes is "call-by-address".

The passing mechanism used for x in the given function is call-by-address. What is a passing mechanism? A passing mechanism is a method for passing parameters to a function. It determines the technique used to provide values to a function call's formal parameters, which are its local variables. Depending on the programming language and compiler, different passing mechanisms may be used. Given the snippet of codes, the passing mechanism used for x (in function)void func(int *x, int y) {
*x = *x + y; y = 2;
}The code is utilizing a call-by-address method because the variable "x" is being passed as a pointer in the function. When a pointer is used, instead of the actual value, the function gets the address of the variable being passed. This means that the function will modify the value of the variable passed, and the changes will be permanent.

learn more about coding here:

https://brainly.com/question/17204194

#SPJ11

A pop up blocker is a web browser feature that?

Answers

Answer:

blocks websites so you cant do them if your taking a test some of them wont allow pop up blockers and you will not be able to take the test or a website that does not accpet pop up blockers

Explanation:

Answer: prevents unwanted advertisements

Explanation:

New forensics certifications are offered constantly. Research certifications online and find one not discussed in this chapter. Write a short paper stating what organization offers the certification, who endorses the certification, how long the organization has been in business, and the usefulness of the certification or its content. Can you find this certification being requested in job boards?

Answers

Answer:

Computer forensics is gathering information or evidence from a computer system in order to use it in the court of law. The evidence gotten should be legal and authentic.

These organization gives certifications for computer forensics

1. Perry4law: they provide training to students, law enforcement officers. There services includes forensics training, research and consultancy.

2. Dallas forensics also offers similar services

3. The New York forensics and electronic discovery also teach how to recover files when deleted, how to get information from drives and how to discover hidden information.

I lost the charger. How do I charge this camera without the charger?​

I lost the charger. How do I charge this camera without the charger?

Answers

Answer:

possibly a new battery????

Answer:

See below

Explanation:

This is from the manual for your camera:

(just plug the larger USB into a USB power source/brick/computer to charge the battery )

I lost the charger. How do I charge this camera without the charger?

What can you do using the start menu in windows 10

Answers

Answer:

The start menu in windows 10 has similarities.

Explanation:The windows 10 is start menu and start screen. Installed windows 10 on a PC, the start button after windows appear start menu.Windows app you can access windows apps right the menu. click the left display all apps installed your personal computer. click right to open a window app NEWS,MAIL, or CALENDAR. POWER button at the bottom of the left side, and display the to shut down and restart.

Right click your account name at the top the menu.You add files explorer to taskbar.Simply click the option you needed

Explain how you would find a book on a given subject in the library.

Answers

Answer:

In case I am looking for a specific book in a library, the way in which I would try to find it would be through consulting the library guide, or through inspection of the different books of the specific sector with which the book I'm looking for is listed, or by asking the library staff to help me with my search.

What will the operator 1 AND 1 return ?

Answers

When you perform a & 1 it will always return 0 or 1 depending upon the the last binary digit of a.

The operator 1 AND 1 return will be Basic Binary Math" module for a refresher as CIDR simplifies how routers and different community gadgets want to consider the elements of an IP address.

What is the operator ?

In arithmetic and on occasion in pc programming, an operator is an individual that represents an action, as for instance, x is a mathematics operator that represents multiplication.

The 1 and 1 return 1 if the least good sized little bit of x is 1 else zero . 1 & 1 = 1 , zero & 1 = zero . That's how the operator is defined. Any bit besides the ultimate one is zero due to the fact it is zero in 1.

Read more about operator:

https://brainly.com/question/25974538

#SPJ2

Q1: Which of the following three is the
strongest password?
1 starwars
2 1qaz2wsx
3 trEEGCV-

Answers

Answer:

2

Explanation:

It has a lot of different alphabets and numbers

Among the given ones, the most strong password is trEEGCV-. The correct option is 3.

What is password?

Passwords are character sequences used to authenticate and gain access to a computer system, application, or online account.

A strong password should be unique, complex, and difficult to guess. It is typically made up of upper and lowercase letters, numbers, and symbols.

It is a secret word or expression used by authorized individuals to demonstrate their right to access, information, and so on.

The strongest password is "trEEGCV-," which contains a mix of upper and lowercase letters, numbers, and special characters. It is also longer than the other two passwords, making cracking it more difficult.

Thus, the correct option is 3.

For more details regarding password, visit:

https://brainly.com/question/30482767

#SPJ2

What’s the output of the following code?

Whats the output of the following code?

Answers

The output for the given program is 3.

What is a Computer Program?

This refers to the set of instructions that a programmer gives to a computer that is converted from the source code to machine-readable format in order to perform a specific task.

Hence, it can be seen that from the given code:

C = 1

sum = 0

Then, the conditional statement while ( c < 10), is given which means that the next lines of code are valid if the values of c ranges from 1 to 9.

But if it is from 10 and above, it would terminate at that line.

Then, c= c + 2

Which means the value of c would be added to 2

Which is 1 + 2 = 3

Then sum is sum + the value of c which is 3

Recall that sum = 0

Thus, 0 + 3 is 3

Read more about computer programs here:

https://brainly.com/question/23275071

#SPJ1

Which level of abstraction in computing systems uses a series of switches
that can be turned on and off?
A. Communication systems
OB. Applications
OC. Data
OD. Programming

Answers

Answer: C. Data

Explanation:

Identify the class of the address, the number of octets in the network part of the address, the number of octets in the host part of the address, the network number, and the network broadcast address g

Answers

Answer:

1.

190.190.190.190

Class B

Number of octets in the network part of the address: 2

Number of octets in the host part of the address: 2

Network number: 190.190.0.0/16

Network broadcast address: 190.190.255.255

2.

200.1.1.1

Class C

Number of octets in the network part of the address: 3

Number of octets in the host part of the address: 1

Network number: 200.1.1.0/24

Network broadcast address: 200.1.1.255

Explanation:

What word can you type using only the left home row keys and the right reach keys?

Band
Hands
Finds
Kind

Answers

Answer:

bands or hand is your answer

The word that can be typed using only the left home row keys and the right reach keys is "Hands".

Given,

Words.

Here,

''Hands'' : This word can be typed by placing your left hand on the ASDF keys (the left home row keys) and reaching your right hand to the JKL; keys (the right reach keys).

By doing so, you can type the word "Hands" without having to move your hands from the home row position.

Know more about keyboard typing,

https://brainly.com/question/6603125

#SPJ4

Difference between Extended partition and logical partition

Answers

The difference between extended partition and logical partition is extended partition creates four types of partition and the partition created by extended partition are called logical partition.

What is logical partition?

A logical partition (LPAR) is a type of computer division of memory, processor, and storage into several compartments so that each of one can be operated individual.

Thus, the difference between extended partition and logical partition is extended partition creates four types of partition and the partition created by extended partition are called logical partition.

Learn more about logical partition

https://brainly.com/question/4671389

#SPJ1

java an array of ints, arr, has been declared and initialized. write the statements needed to reverse the elements in the array. so, if the elements were originally 5, 13, 4, 97 then after your code executes they would be 97, 4, 13, 5.

Answers

Java allows you to use a straightforward loop to swap the first and last elements, the second and second-to-last elements, and so on until the array's middle is reached.

What if the elements were 5 13 4 97 at first?

As a result, if the elements were initially 5, 13, 4, 97, they would become 97, 4, 13, 5 after your code had run.

INT(ARR) = 5, 13, 4, 97;

Use a loop for (int I = 0; I arr.length / 2; i++) to swap the components. Integer temp equals arr[i], arr[i] equals arr[arr.length - 1 - I and arr[arr.length - 1 - I equals temp.

System.out.println(Arrays.to String(arr)); / Display the array in reverse. / Output: [97, 4, 13, 5]

To know  more about Java visit:-

https://brainly.com/question/29897053

#SPJ1

What is wrong with the following circuit?




Nothing. This circuit has no mistakes.

The NOT gate should only two input.

There should be only one output from the OR gate.

The AND gate should have one input and two outputs.

Answers

Do you have a pic so i can answer it?

How are special characters added to a Word document

Answers

Answer:

through symbols

Explanation:

you have to press insert, symbols, more and then scroll until you find your symbol

The symbols thing might look like ♎

Identify and describe the three basic operations used to extract useful sets of data from a relational database?

Answers

The select operation, The join operation, The project operation are the three basic operations used to extract useful sets of data from a relational database.

Describe the three basic operations used to extract useful sets of data from a relational database?

The select operation generates a subset from the table's records (rows) that satisfy the specified criteria. Relational tables are joined together to offer the user access to more data than is contained in each table alone. The project procedure generates a subset of the table's columns, enabling the user to construct new tables that only include the necessary data.

What actions are performed in a relational DBMS?

Relational algebra has five fundamental operations: Set Difference, Union, Cartesian Product, and Selection. Most required data retrieval activities are carried out by them.

To know more about database visit

brainly.com/question/29412324

#SPJ4

T/F - Performing regular system backups and identifying potential problem areas are examples of reactive maintenance.

Answers

False. Performing regular system backups and identifying potential problem areas are examples of proactive maintenance.

What is proactive maintenance?

Proactive maintenance involves taking preventative measures to reduce the likelihood of equipment failures or other issues. It can include activities such as performing regular system backups to protect against data loss, identifying potential problem areas and addressing them before they cause issues, and performing routine inspections and maintenance to keep equipment in good working order.

What is reactive maintenance?

Reactive maintenance, on the other hand, involves repairing equipment or addressing issues after they have already occurred. It is a more reactive approach that focuses on fixing problems as they arise, rather than taking preventative measures to avoid them.

To learn more about System maintenance, visit: https://brainly.com/question/13484623

#SPJ4

Describe how customer facing and technical data roles differ in their approach to data security policies.​

Answers

Customer-facing data roles as well as the technical data roles are those that often differ in  terms of their method to data security policies and this is as a result of their different responsibilities as well as functions inside of an organization.

What is the data security policies?

In terms of   Customer-facing data roles, the Customer-facing data roles is one that entails  interacting with customers or  any kind of clients as well as managing their data.

Therefore , In the area of data security policies, customer-facing data roles can have focus on : Data privacy as well as Access control:

Learn more about data security policies from

https://brainly.com/question/29790745

#SPJ1

Represent the following code in using Flowchart:
Using while loop, write a Python program that will print on the screen numbers from 1 till 100.

Represent the following code in using Flowchart:Using while loop, write a Python program that will print

Answers

Answer:

n=100

while n>0:

  print(n)

  n=n-1

Explanation:    

you'll substact 1 from n(which is 100) until n is equal to 0

Click on three software applications that you can use to create a resume?

Answers

The three software applications that are applied for creating the resume are the word, writer, and the pages.

The information related to the resume is as follows:

It is a formal document made by the applicant for applying to the job. It should be along with the cover letter where the applicant shows interest in the particular job. Also, three types of software applications should be used for developing the resume i.e. word, writer, and the pages.

Therefore we can conclude that the three software applications that are applied for creating the resume are the word, writer, and the pages.

Learn more about the resume here: brainly.com/question/22931067


Some commands listed in a menu cannot be selected.


True or False

Answers

True! Have a nice week

Answer:

Explanation:

it is true

Your point of view regarding the comparison of G suite vs MS Office 365

Answers

Easy-to-use online versions of Office 365's well-known programs, including Word, Excel, Outlook, and PowerPoint, are available. G Suite provides online versions of its well-known applications.

How do Drive and Microsoft Office 365 differ from one another?

For Outlook, Word, Excel, PowerPoint, and OneNote, Microsoft 365, formerly known as Office 365, offers web, desktop, and mobile programs. To access files and documents and save them safely, use  Drive, a cloud storage and backup platform.

How do Microsoft 365 and Microsoft Suite differ from one another?

Products included in the Office 365 suite are referred to as "Microsoft Office 365." Microsoft has made a set of teamwork tools called the Office 365 suite available to help with business. These include Microsoft Teams, OneDrive, Microsoft Word, and Microsoft Exchange.

To know more about MS Office 365 visit:-

https://brainly.com/question/13785978

#SPJ1

Select the correct answer.
Hari has purchased a new computer. Which software will start running the moment he turns on his system?
O A. word processor
О в. disk cleaner
O C. operating system
O D. data recovery utility

Answers

Answer:

I think operating system

Explanation:

Write a program in Java to implement a recursive boolean function verify that returns True if the given array contents remain the same when array is reversed, i.e., when last element is equal to the first element, second last element is equal to the second element and so on. Otherwise function verify must returns False. Examples: Input: arr[] = {12, 32, 67, 32, 12} Output: True Input: arr[] = {1, 2, 3, 4, 5} Output: False

Answers

Answer:

class Main {

 public static boolean verify(int[] a) {    

   for(int i=0;i<a.length/2;i++) {

     if (a[i] != a[a.length-i-1]) {

       return false;

     }

   }

   return true;

 }

 public static void main(String[] args) {

   int arr1[] = {12, 32, 67, 32, 12};

   int arr2[] = {1, 2, 3, 4, 5};

   System.out.println("arr1: " + (verify(arr1) ? "True" : "False"));

   System.out.println("arr2: " + (verify(arr2) ? "True" : "False"));

 }

}

Explanation:

This is called a palindrome.

On line two, you take a string, word, as input. Then, using that string...
1. In the first line of your output, print the third character of this string.
2. In the second line, print the second to last character of this string.
3. In the third line, print the first five characters of this string.
4. In the fourth line, print all but the last two characters of this string.
5. In the fifth line, print all the characters of this string with even indices
(remember indexing starts at 0, so the characters are displayed starting
with the first)
6. In the sixth line, print all the characters of this string with odd indices
(1.e. starting with the second character in the string).
7. In the seventh line, print all the characters of the string in reverse order.
8. In the eighth line, print every second character of the string in reverse
order starting from the last one.
9. In the ninth line, print the length of the given string,

Answers

Answer:

7

Explanation:

This one obtains results that the others in particular do not have, whether it is even one more word or another initial sentence

What is output if the user enters -5?
What is the output if the user enters 7? Edhesive 7.4 Lesson Practice

What is output if the user enters -5? What is the output if the user enters 7? Edhesive 7.4 Lesson Practice

Answers

Answer:

for question 3 answer : 4               question4: its 28

Explanation:

x+7*2

The output if the user enters -5 is 4, while the output if the user enters 7 is 28. Both of these outputs will eventually depend on the program which is executed by a specific language.

What is the significance of the output of programming language?

Programming languages use classes and functions that control commands. The reason that programming is so important is that it directs a computer to complete these commands over and over again, so people do not have to do the task repeatedly. Instead, the software can do it automatically and accurately.

According to the context of this question, the actual number is the first output is found to be 1 and when -5 is added into it, it gives an output of 4. The same principle is applied in the second question as well but the actual number, in this case, would be different to it determines a different output.

Therefore, the output if the user enters -5 is 4, while the output if the user enters 7 is 28. Both of these outputs will eventually depend on the program which is executed by a specific language.

To learn more about Programming languages, refer to the link:

https://brainly.com/question/16936315

#SPJ2

ITIL 4: Which of the following TRUE with respect to Practices in ITIL®?

A Practices are independents activities outside SVC
B: practice is just a new name given for process
C: practices support multiple activities within Value chain
D: every practice is tightly linked to a specific activity within value chain ​

Answers

Answer:

m

Explanation:

it would be c cause i take the test

The option that is true with respect to Practices in ITIL is that its practices support multiple activities within Value chain.

What are ITIL practices?

ITIL is known to be the background of all the  best methods used for delivering IT services.

Conclusively, the key element in the ITIL SVS is known to be the Service Value Chain as it uses an operating model for service delivery. Its practices aids the use of different activities within Value chain.

Learn more about Practices from

https://brainly.com/question/1147194

Write a SELECT statement to create a lesson schedule for Feb 1, 2020 with the lesson date/time, student's first and last names, and the horse's registered name. Order the results in ascending order by lesson date/time, then by the horse's registered name. Make sure unassigned lesson times (student ID is NULL) appear in the results.

Answers

SELECT statement are used to retrieve data from a database table

The SELECT statement that creates the lesson schedule is:

SELECT LessonDateTime, HorseID, FirstName, LastName FROM LessonSchedule JOIN Student ON LessonSchedule.StudentID = Student.ID ORDER BY LessonDateTime ASC, HorseID

How to determine the SELECT statement

To write the select statement, we start by writing the following query that retrieves Lesson date/time, horse ID, first name, and last name from the lesson schedule table.

So, we have:

SELECT LessonDateTime, HorseID, FirstName, LastName FROM LessonSchedule

Next, the query would confirm the presence of a student ID in the lesson schedule table and the student table using the JOIN statement

JOIN Student ON LessonSchedule.StudentID = Student.ID

From the question, we understand that:

The result should be sorted in ascending order by lesson date/time.

This is represented as:

ORDER BY LessonDateTime ASC, HorseID

Hence, the complete query is:

SELECT LessonDateTime, HorseID, FirstName, LastName FROM LessonSchedule JOIN Student ON LessonSchedule.StudentID = Student.ID ORDER BY LessonDateTime ASC, HorseID

Read more about database at:

https://brainly.com/question/24223730

What is the software of Apple

Answers

IOS
I hope it’s correct :)
Other Questions
why should the wearing of uniforms be discontinued in highscho Physical activities teaches an individual sense of responsibility and initiative.True Or False Let T: R3 R3 be defined by T(x,y,z) = (x + y,x - y - z, x +z). (A) Show that T is a matrix transformation by finding its standard matrix. (solution) (B) Find the determinant of the matrix in (A) above. (solution) (C) Show that the matrix in (A) above is invertible without finding its inverse. [Do NOT use your answer in (B) above.] (solution) (D) Find the inverse of the matrix in (A) above Solve the triangle if a=15 cm,b=47 cm, and c=59 cm. Assume is opposite side a, is opposite side b, and is opposite side c. It is best to calculate all 3 angles, then check by seeing if they add to 180 . If you wish to use the law of sines to calculate any of angles, the angle do you need to calculate first is (Hint answer is C) because it is the opposite the (Hint: Answer is longest or largest) side. Enter your answer as a number rounded to 2 decimal places. ABC PART A QUESTION 1 (a) (b) (c) (d) Use an appropriate diagram to elucidate the generation of characteristic X-ray in an atom. Explain how the X-rays are produced in an X-ray tube. C2 SP1 C2 SP3 Are X rays reflected by bone tissues? Provide your comments on the image difference between soft and hard tissue obtained in an X-ray film. C5 SP4 State ONE (1) type of physical injury where an X-ray device is used for diagnostic purpose. C2 SP3 The general ledger of Apollo Corporation as of December 31, 2022, includes the following accounts: Copyrights P 30,000 Deposits with advertising agency (will be used to promote goodwill) 27,000 Bond sinking fund 70,000 Excess of cost over fair value of identifiable net assets of acquired subsidiary 390,000 Trademarks 120,000 In the preparation of Apollo's statement of financial position as of December 31, 2022, what should be reported as total intangible assets? a. P567,000. b. P537,000. c. P510,000. d. P540,000 Pablo and max's follows a flight pattern approximatley modled by the equation h(t)=-8t^2+16t+2 where h(t)is their rocket's height in meters t seconds after launch. How many seconds was their rocket in the air Does this sound like a good intro paragraph for a compare and contrast essay? Please be honest and if it doesn't then pls tell me how to improve.The characters I chose in Anne Frank: Diary of a young girl, are Anne and Mrs. Van Daan. I chose these characters because I thought it was very interesting how differently the two reacted to being stuck in hiding from the Germans. Mrs. Van Daan, who always criticized poor Anne and Anne, who was terrified at certain points, but tried to make the best of it. Nature helped Anne in a way, so she would use nature motifs in her diary to express what she was feeling in the most detailed way possible. It was almost like she was describing it that way so her future readers would be able to understand her clearly. Although, there is no way she could have known that her diary would be later published. So, I feel comparing and contrasting the feelings and reactions of Anne and Mrs. Van Daan to hiding away from the Nazis and trying very hard to live in secret, was the best way for me to go. Which fnaf character is the scariest?A. Springtrap Fnaf 3 B. Golden Freddy Fnaf 1 C. Nightmare Fnaf 4 D. Ennard Fnaf Sister Location E. Circus Baby Fnaf sister location F. Mangle Fnaf 2 under what circumstances may an agency use current-year funds to purchase supplies that are not a bona fide need of the current fiscal year A Calorie unit used in food is equal to the amount of energy necessary to raise the temperature of 1 kilogram of water ________ degrees) Celsius. The movable type printing press was invented byA. Koenig.B. Wagner.C. Bach.D. Gutenberg. Workout value of x and why Identify one or more examples of Raw data or Primary Sources flawed reporting and demonstrate how to correct them in your paper. Close your paper with a discussion about why the author failed to do good research. Were they lazy, deliberately deceptive, or something else? When US troops were deployed to Europe, who filled the void in labor that was created? Consider a perfectly competitive market that is in the long run equilibrium. There is now a fall in the market demand. Illustrate and explain what will happen in the market and for a firm in both In the Doppler effect it Is important to distinguish between frequency and speed. speed and velocity: speed and acceleration: distance and displacement please help me with this under what circumstances may a licensee advertise specific loan rates or terms? If two motors are to be started at the same time, the standby power system must have the capacity to provide the _____ of the starting kilovolt-ampere values for the two motors *