the memory location where the computer stores the list of locations to which the system must return is known by what term?

Answers

Answer 1

The term used to describe the memory location where a computer stores the list of locations to which the system must return is the "stack."

Here are some additional points to consider regarding the stack:

The stack is a region of memory that is reserved for program use.The stack is typically managed by the operating system, which allocates memory as needed and keeps track of stack usage.The stack is used to store variables, function parameters, and other data that is needed by the program during execution.

When a computer program is executed, the system uses a stack to keep track of the order in which instructions are executed and to manage the storage of data. The stack is a critical component of the computer's memory system, and it is used extensively by the operating system and application software to manage program execution.

Learn More About Computer stores

https://brainly.com/question/31209059

#SPJ11


Related Questions

translate ¨friends¨ into spanish

Answers

Friends to Spanish is Amigos

Answer: I hope this is helpful

Explanation:

Friends in Spanish is Amigo- masculine aka male ,noun.
Friend in Spanish is Amiga- feminine aka Female , noun

Friends- trusted and caring person

Cleo received a message from Joline that was sent to her as well as two other coworkers named Sam and Thomas. Cleo would like to send the message she received to Anne.

Answers

Forward or Screenshot or Copy

Answer:

c

Explanation:

This is a human-made physical system.

ecosystem

health care system

bicycle

school system

Answers

the answer is health care system

please help me also

The goal of a system is to


be natural or human-made

use energy

perform a task

be social or physical

Answers

Answer:

The answer is option C, which is: perform a task

ERP customers will store most of their data on cloud servers managed by cloud vendors and store sensitive data on servers they manage themselves. This is known as the _______

Answers

ERP customers will store most of their data on cloud servers managed by cloud vendors and store sensitive data on servers they manage themselves. This is known as the cloud ERP.

What is ERP (Enterprise Resource Planning)?

The Enterprise Resource Planning or ERP is the software which is used by the organization to manage its essential elements such as sales, marketing, accounting etc.

The cloud used to manage this sensitive data is called the Cloud ERP.

Cloud ERP is the system which runs on the cloud platform of a vendor.This system allow the customers and organization to store and manage their sensitive data.

ERP customers will store most of their data on cloud servers managed by cloud vendors and store sensitive data on servers they manage themselves. This is known as the cloud ERP.

Learn more about the Enterprise Resource Planning here;

https://brainly.com/question/14635097

#SPJ1

which word means the pattern of beats in a poem a personification b simile c rhythm d onomatopoeia

Answers

Answer:

C. rhythm

Explanation:

The easy defintion of rhythm is the following:

Pattern of beats or a series of stressed and. unstressed syllables in poem. • Poets create rhythm by using words in which. parts are emphasized or not emphasized

So hope this helps.

Answer:

rhythrm

Explanation:

Linux uses a logical directory tree to organize files into different folders.
True or False?

Answers

True. Linux uses a logical directory tree to organize files into different folders. Linux uses a tree-like structure to store and arrange files in directories.

A directory, also known as a folder, is a container for files and other directories. It contains all of the data associated with the files stored in it, such as the file's content and metadata. Linux's directory tree is hierarchical, with directories branching out from the root directory to the other directories.

All of the directories in the tree are related to one another. The top-level directory is the root directory, denoted by a forward slash (/). This directory contains all other directories and files in the file system. As the system administrator, you can create new directories and files in the appropriate folders, assign users and groups to them, and set permissions. Linux directory system provides an organized method for keeping track of files and folders, making it easy to find and manage files. The Linux file system's logical tree structure allows for more secure and efficient access to files. It is an important aspect of the Linux operating system and one that is frequently referenced when dealing with its many features.

To know more about Linux visit :

https://brainly.com/question/33210963

#SPJ11


Which two technologies support the building of single-page applications?

Answers

Answer:

The technology which support the building of single- page applications are as follows

Explanation:

Front endHTMLPHPJavaScriptAngularJS

String firstName = in.next();
String lastName = in.NextLine();
System.out.print("\n");

Answers

Answer:

1 & 2 does not contain error

Explanation:

for 3 System.out.println("\n"); is right way to print

) A block of byte long data residing in between and including the consecutive addresses $1000 to $4FFF are to be used to turn on two LEDs that are individually connected to two separate output ports of a system designed around the 68000 microprocessor. Each data byte has a logic 'l' for bit 7 and bit 0 to turn on the LEDs. However, it is known that only bits 7 and 0 of all of the byte long data set in the memory block is corrupted. Write an assembly language program for the 68k that checks the values of bits 7 and 0 of each data byte residing in the memory block in question. The program must change the value of bit 7 and 0 to '1'if they are '0', resulting in a new data value that must be restored back at same address position. On the other hand, if bits 7 and 0 are already '1', the data byte should be retained. The program must also indicate the number of bit 7 and 0 that has been corrected from the data block. The BTST instruction may not be used in your program.

Answers

Here's an assembly language program for the 68000 microprocessor that checks and corrects the values of bits 7 and 0 of each data byte in the memory block while keeping track of the number of corrections made:

```assembly

ORG $1000    ; Start address of the memory block

DATA_BLOCK  DC.B $00,$00,$00,$00   ; Initialize the data block with zeros

RESULT      DC.B $00,$00,$00,$00   ; Resultant data block with corrected bits

CORRECTIONS DS.W 1                 ; Variable to store the number of corrections made

START:

   MOVEA.L #$1000, A0             ; Address of the start of the memory block

   MOVEA.L #$1000, A1             ; Address of the resultant data block

   MOVE.W #0, CORRECTIONS         ; Initialize the corrections counter

   

LOOP:

   MOVE.B (A0)+, D0               ; Get a byte from the memory block

   MOVE.B D0, D1                  ; Make a copy of the byte

   

   ANDI.B #$81, D0                ; Mask out all bits except 7 and 0

   BNE NO_CORRECTION              ; Skip correction if bits 7 and 0 are already '1'

   

   ORI.B #$81, D1                 ; Set bits 7 and 0 to '1' in the copy

   

   ADD.W #1, CORRECTIONS          ; Increment the corrections counter

   

NO_CORRECTION:

   MOVE.B D1, (A1)+               ; Store the corrected byte in the resultant data block

   

   CMPA.L #$5000, A0              ; Check if the end of the memory block has been reached

   BLO LOOP                       ; Repeat the loop if not

   

   RTS                            ; Return from subroutine

```

The program starts at the label `START`, which sets up the necessary registers and initializes the corrections counter.The memory block starts at address `$1000`, and we use the `A0` register to point to the current byte in the memory block.

The `A1` register is used to point to the current byte in the resultant data block, where the corrected bytes will be stored.The `CORRECTIONS` variable is initially set to zero using the `MOVE.W #0, CORRECTIONS` instruction.

Inside the `LOOP`, each byte from the memory block is loaded into the `D0` register using `MOVE.B (A0)+, D0`. A copy of the byte is made in the `D1` register using `MOVE.B D0, D1`. The `ANDI.B #$81, D0` instruction masks out all bits except 7 and 0, allowing us to check their values.

If the result of the `ANDI` operation is nonzero (i.e., bits 7 and 0 are already set to '1'), the program branches to `NO_CORRECTION` to skip the correction step. If the result of the `ANDI` operation is zero (i.e., bits 7 and 0 are '0'), the program proceeds to `NO_CORRECTION` and sets bits 7 and 0 to '1' using `ORI.B #$81, D1`.

After the correction (or no correction), the corrected byte in `D1` is stored in the resultant data block using `MOVE.B D1, (A1)+`. The program then checks if the end of the memory block ($4FFF) has been reached using CMPA.L #$5000, A0 and repeats the loop if it hasn't.

Once the end of the memory block is reached, the program returns from the subroutine using RTS. The number of corrections made is stored in the CORRECTIONS variable, which can be accessed after the program finishes execution.

Learn more about assembly language: https://brainly.com/question/13171889

#SPJ11

triacontane is an unbranched alkane that contains 30 carbon atoms in each molecule. how many hydrogens are present in each

Answers

Triacontane, an unbranched alkane, consists of 30 carbon atoms in each molecule. To determine the number of hydrogens present in each molecule, we need to understand the general formula for alkanes.

The general formula for alkanes is CₙH₂ₙ₊₂, where "n" represents the number of carbon atoms. This formula indicates that for each carbon atom, there are two hydrogen atoms attached to it. In the case of triacontane, with 30 carbon atoms, we can use the formula to calculate the number of hydrogens.

Using the formula, we substitute "n" with 30:

C₃₀H₂₉₊₂

Simplifying the formula, we have:

2 × 30 + 2 = 60 + 2 = 62

Therefore, each molecule of triacontane contains 62 hydrogen atoms.

It's important to note that the number of hydrogen atoms in an alkane is determined by the number of carbon atoms in the molecule and follows this pattern. This relationship allows us to easily calculate the number of hydrogens in any unbranched alkane using the general formula CₙH₂ₙ₊₂.

In conclusion, the unbranched alkane triacontane, which consists of 30 carbon atoms in each molecule, contains a total of 62 hydrogen atoms.

Learn more about Hydrogen :

https://brainly.com/question/19813237

#SPJ11

(blank) is an expansion card that enables a computer to connect to a network:
A Network interface card
B VGA Card
C FAX Card
D Sound card​

Answers

A, Network interface card (NIC card) :)

What is the best CPU you can put inside a Dell Precision T3500?

And what would be the best graphics card you could put with this CPU?

Answers

Answer:

Whatever fits

Explanation:

If an intel i9 or a Ryzen 9 fits, use that. 3090's are very big, so try adding a 3060-3080.

Hope this helps!

ANSWER:POST-TEST

direction encircle the letter of the correct answer..

1 .the written description accompanying the working drawing

2. a board made of plaster with covering of paper

3.a fire protection device that discharge water when the effect of a fire have been detected, such as when a predetermined temperature has been reached.

4.structural members in building construction that holds the ceiling board

5.the position or placement of lightning fixtures of the house.


with answer na din.

1.C
2.D
3.B
4.A
5.D

SANA MAKATULONG★☆☆


TLE​

Answers

Answer:

1. Specifications.

2. Gypsum board.

3. Sprinkler systems.

4. Ceiling joist.

5. Lighting fixtures.

Explanation:

In Engineering, it is a standard and common practice to use drawings and models in the design and development of buildings, tools or systems that are being used for proffering solutions to specific problems in different fields such as banks, medicine, telecommunications and industries.

Hence, an architect or design engineer make use of drawings such as pictorial drawings, sketches, or architectural (technical) drawing to communicate ideas about a plan (design) to others, record and retain informations (ideas) so that they're not forgotten and analyze how different components of a plan (design) work together.

Architectural drawing is mainly implemented with computer-aided design (CAD) software and it's typically used in plans and blueprints that illustrates how to construct a building or an object.

1. Specifications: it's a well-written description that accompanies a working drawing used for designs and constructions.

2. Gypsum board: also referred to as drywall due to its inherent ability to resist fire. It's a type of board that's typically made of plaster with some covering of paper and it's used for ceilings, walls, etc.

3. Sprinkler systems: it's an automatic fire protection device that is typically designed to discharge a volume of water as soon as the effect of a fire is detected. For instance, when a predetermined or set temperature has been reached such as 69°C

4. Ceiling joist: structural members that are aligned or arranged horizontally in building construction in order to hold the ceiling board together.

5. Lighting fixtures: it's typically the position or placement of lightning fixtures of the house.

True or False
We can represent the pdf of a discrete random variable X with a
histogram.

Answers

False. We cannot represent the pdf of a discrete random variable X with a histogram.

The probability density function or pdf refers to the mathematical function that is used to describe the likelihood of possible values of a continuous random variable. A probability density function is represented as the derivative of a probability distribution function, and it is used to represent the area under the curve that represents the probability distribution of a continuous random variable. The probability density function (pdf) is used to estimate the probability of the random variable X by observing the probability distribution function (pdf) of X. The probability distribution function (pdf) of X is defined as P(X = x) = the probability of X taking on the value x. The probability density function is used to estimate the probability of the random variable X by observing the probability distribution function (pdf) of X. The probability distribution function (pdf) of X is defined as P(X = x) = the probability of X taking on the value x. The conclusion is that False, we cannot represent the pdf of a discrete random variable X with a histogram.

To learn more about histogram, visit:

https://brainly.com/question/16819077

#SPJ11

what is occurs when data is placed on an information technology system with insufficient controls to protect the data at the required classification.

Answers

When data is placed on an information technology system with insufficient controls to protect the data at the required classification, it can result in data breaches and leaks.

What is data?

Data is information that has been collected and organized for a specific purpose. It is often collected from multiple sources and stored in digital databases, allowing for quick access and manipulation. Data can be qualitative or quantitative, and can include both structured and unstructured information.

This can lead to unauthorized access and use of the data, which can include theft of intellectual property, sensitive customer information, or other confidential company information. Furthermore, this can lead to loss of reputation and financial losses, as well as legal and regulatory fines. In some cases, it can also put individuals at risk of identity theft or financial losses.

To learn more about data

https://brainly.com/question/25704927

#SPJ4

why does my ps5 keep disconnecting from the internet?

Answers

probably weak internet

Answer:

either weak internet or the internal wifi antenna is probably messed up

Who is responsible for determining the appropriate tactics for an incident.

Answers

When it comes to determining the appropriate tactics for an incident, it's important to note that different agencies or departments may have varying levels of responsibility.

However, there are a few key players that are typically involved in determining the appropriate tactics for an incident.Firstly, the incident commander (IC) is responsible for overall management of the incident. This includes developing an incident action plan (IAP) and determining the appropriate tactics to achieve the objectives outlined in the plan. The IC will also delegate responsibilities to other members of the incident management team (IMT) as needed.Next, the operations section chief is responsible for implementing the tactics outlined in the IAP. They will direct tactical resources, such as personnel and equipment, to carry out the tactics.

The operations section chief will work closely with other members of the IMT to ensure that the tactics align with the overall objectives of the incident. Lastly, individual responders, such as firefighters or police officers, may also be responsible for determining appropriate tactics for their specific tasks.

To know more about tactics visit:

https://brainly.com/question/26194514

#SPJ11

If you would like to give another user permissions on your mailbox or to particular folders within your mailbox, which role should you configure?

Assignee
Client
Delegate
Manager

Answers

Answer:

assignee

Explanation:

Antes de conectar un receptor en un circuito eléctrico, ¿qué precauciones debemos tomar para evitar riesgos y hacer que el dispositivo funcione correctamente?

Answers

Answer:

Antes de conectar un receptor en un circuito eléctrico, es necesario corroborar que el dispositivo que se va a conectar soporte la misma corriente de voltaje que la del circuito eléctrico. Así, si el circuito tiene un voltaje de 110 voltios, el dispositivo debe tolerar dicha medida; si por ejemplo el circuito tiene un voltaje de 220 voltios y se conecta un dispositivo que tolera 110 voltios, se producirá un cortocircuito que dañará definitivamente el dispositivo, ademas de poder causar accidentes domésticos como el corte del suministro eléctrico o incluso incendios.

In what year and where did computer science originate?

Answers

Answer:

write a paragraph that is atleast 4-5 paragraphs explaining how to look after your pet​

To protect a SOHO wireless network with a small number of devices, which address management method provides more control, configuring the device IP addresses manually (static IP) or using a DHCP server (dynamic IP)? Why?

Answers

While constructing a SOHO wireless network that consists of only a few devices, manual configuration of device IP addresses via static IP can generate enhanced control.

Why is this so?

This method creates unique, unchanging IP addresses for each device through manual setup by the network administrator, facilitating better predictability and improved connectivity and network performance.

On the other hand, automatic assignment of IP addresses via DHCP servers can result in potential issues related to IP conflicts or inadequate DHCP pool management.

The most effective method for managing addresses in a small network is through static IP addressing.

Learn more about SOHO wireless network at:

https://brainly.com/question/10674980

#SPJ4

PC Shopping Network may upgrade its modem pool. It last upgraded 2 years ago, when it spent $115 million on equipment with an assumed life of 5 years and an assumed salvage value of $15 million for tax purposes. The firm uses straight-line depreciation. The old equipment can be sold today for $80 million. A new modem pool can be installed today for $150 million. This will have a 3 -year life, and will be depreciated to zero using straight-line depreciation. The new equipment will enable the firm to increase sales by $25 million per year and decrease operating costs by $10 million per year. At the end of 3 years, the new equipment will be worthless. Assume the firm's tax rate is 35 percent and the discount rate for projects of this sort is 12 percent. What are the Free Cash Flows, the NPV and IRR of the replacement project? Note: There is double jeopardy on this problem. If you miss a free cash flow, you will miss the NPV and the IRR. (6 points) FCF 0

= FCF 1

= FCF 2

= FCF 3

= NPV= IRR=

Answers

The replacement project involves upgrading the modem pool of PC Shopping Network. The old equipment was purchased 2 years ago for $115 million, has a 5-year assumed life, and a salvage value of $15 million.

The old equipment can be sold today for $80 million. The new equipment can be installed for $150 million and has a 3-year life. The new equipment is expected to increase sales by $25 million per year and decrease operating costs by $10 million per year. The tax rate is 35% and the discount rate is 12%. We need to calculate the Free Cash Flows (FCFs), the Net Present Value (NPV), and the Internal Rate of Return (IRR) of the replacement project.

To calculate the FCFs, we need to determine the cash inflows and outflows associated with the project. In this case, the cash inflows are the increase in sales ($25 million) and the decrease in operating costs ($10 million) each year. The cash outflows include the initial investment in the new equipment ($150 million) and the tax savings resulting from depreciation expense. By subtracting the cash outflows from the cash inflows for each year, we can calculate the FCFs.
The NPV of the project is the present value of the FCFs, discounted at the given rate of 12%. By summing up the present values of the FCFs, we can calculate the NPV. If the NPV is positive, the project is considered financially viable.
The IRR is the discount rate at which the NPV of the project becomes zero. It represents the project's internal rate of return or the rate of return that the project is expected to generate. The IRR is calculated iteratively until the NPV reaches zero.
To obtain the specific values of FCF0, FCF1, FCF2, FCF3, NPV, and IRR, the calculations need to be performed based on the given information and formulas for each year.

learn more about salvage value here

https://brainly.com/question/28387066



#SPJ11

Java Question-5 Declare and initialize two variables called first and second. Write a single statement that will print the message "first is " followed by the value of first, and then space, followed by "second = ", followed by the value of the second. Ex: first is 55 second = 123

Answers

import java.util.Scanner;

public class HelloWorld {

   public static void main(String[] args) {

       Scanner reader = new Scanner(System.in);

       System.out.print("Enter two number: ");

       int number1 = reader.nextInt();

       int number2 = reader.nextInt();

       // println() prints the following line to the output screen

       System.out.println("The first is " + number1+" and second= "+number2);

   }

}

Q:Ideally, how often should you back up the data on your computer? once an hour once a day once a month once a year

A: It's once a day

Answers

Answer:

Ideally you should do it once a day!

Explanation:

On edge! And it's on google too but I know it from my tests and learning!

Ideally, you should back up the data on your computer regularly, and the frequency of backups will depend on the amount and importance of the data you generate or modify.

What is backup?

Backup refers to the process of creating a copy of data and storing it in a separate location or device in case the original data is lost, damaged, or corrupted.

Ideally, you should back up your computer's data on a regular basis, with the frequency of backups determined by the amount and importance of the data you generate or modify.

It is recommended to back up critical data, such as important documents, financial records, and photos, at least once a day, and even more frequently if possible, such as hourly or in real-time.

Monthly or weekly backups may be sufficient for less critical data. The key is to have a consistent and dependable backup system in place to safeguard your data in the event of hardware failure, theft, loss, or other disasters.

Thus, this way, the data should be backed up regularly.

For more details regarding backup, visit:

https://brainly.com/question/29590057

#SPJ2

What would be a social networking page background for Sigmund Freud?

Answers

Hope you are talking about this but here it


While Sigmund Freud May not live to see 21st century social media , can you believe that the voice of the intellect is a soft one, but it does not rest Until it has gained a hearing

A construction company uses an information system to determine if their bids on projects are competitive.

example of which information system?

This is an

Knowledge based systems

Executive information system

Management information systems

Decision support systems

Answers

The correct answer is This is an example of a Decision support system (DSS) as it helps the construction company make decisions on whether their bids on projects are competitive or not.

by providing them with relevant information to support their decision-making process. DSS are designed to provide analytical tools and models to help users analyze data and make informed decisions based on that analysis. In this case, the construction company is using the information system to analyze their bidding information and evaluate their competitiveness in the market.A construction company uses an information system to determine if their bids on projects are competitive.

To know more about support click the link below:

brainly.com/question/14279526

#SPJ11

For ul elements nested within the nav element, set the list-style-type to none and set the line-height to 2em.

For all hypertext links in the document, set the font-color to ivory and set the text-decoration to none.
(CSS)

Answers

Using the knowledge in computational language in html it is possible to write a code that For ul elements nested within the nav element, set the list-style-type to none and set the line-height to 2em.

Writting the code:

<!doctype html>

<html lang="en">

<head>

  <!--

  <meta charset="utf-8">

  <title>Coding Challenge 2-2</title>

</head>

<body>

  <header>

     <h1>Sports Talk</h1>

  </header>

  <nav>

     <h1>Top Ten Sports Websites</h1>

     <ul>

   

     </ul>

  </nav>

  <article>

     <h1>Jenkins on Ice</h1>

     <p>Retired NBA star Dennis Jenkins announced today that he has signed

        a contract with Long Sleep to have his body frozen before death, to

        be revived only when medical science has discovered a cure to the

        aging process.</p>

        always-entertaining Jenkins, 'I just want to return once they can give

        me back my eternal youth.' [sic] Perhaps Jenkins is also hoping medical

        science can cure his free-throw shooting - 47% and falling during his

        last year in the league.</p>

     <p>A reader tells us that Jenkins may not be aware that part of the

        least-valuable asset.</p>

  </article>

</body>

</html>

See more about html at brainly.com/question/15093505

#SPJ1

For ul elements nested within the nav element, set the list-style-type to none and set the line-height
For ul elements nested within the nav element, set the list-style-type to none and set the line-height

Why should you delete files from your computer?


so that you will have less work to do

because only one hundred files can be saved in a directory

to increase the computer's efficiency

to improve your productivity

Answers

to increase the computer's efficiency

Explanation

The more files it holds, the more "jobs" it has to run, which means that you're computer would be using the same amount of energy running all of them as to less of them. When you close (or delete) some files, it allows the computer to concentrate on only running a smaller amount of files as oppose to a large amount.

hope it helps!

Answer:

To increase the computer's efficiency.

Explanation:

Having a bunch of files will most likely slow down your computer and make things harder to do. If you don't have a bunch of files, though, your computer will be faster and easier to guide through.

I hope this helps :)

Suppose we add a fixed amount of money into our bank account at the beginning of every year. Modify the program from this section to show how many years it takes for the balance to double, given the annual contributions and the interest. Also print the final balance.
import java.util.Scanner;
/**
This program computes the time required to double an investment
with an annual contribution.
*/
public class DoubleInvestment
{
public static void main(String[] args)
{
final double RATE = 5;
final double INITIAL_BALANCE = 10000;
final double TARGET = 2 * INITIAL_BALANCE;
Scanner in = new Scanner(System.in);
System.out.print("Annual contribution: ");
double contribution = in.nextDouble();
double balance = INITIAL_BALANCE;
int year = 0;
// TODO: Add annual contribution, but not in year 0
System.out.println("Year: " + year);
}

Answers

Here is the updated code that determines how many years it will take, given the annual contributions and interest rate, for the amount to double:

import java.util.Scanner;

/**

This program computes the time required to double an investment

with an annual contribution.

*/

public class DoubleInvestment

{

public static void main(String[] args)

{

final double RATE = 5;

final double INITIAL_BALANCE = 10000;

final double TARGET = 2 * INITIAL_BALANCE;

Scanner in = new Scanner(System.in);

System.out.print("Annual contribution: ");

double contribution = in.nextDouble();

double balance = INITIAL_BALANCE;

int year = 0;

while (balance < TARGET)

{

   year++;

   balance = balance * (1 + RATE/100) + contribution;

}

System.out.println("Years to double investment: " + year);

System.out.println("Final balance: " + balance);

}

}

Output

Here is an example output based on an annual contribution of $1000:

Annual contribution: 1000

Years to double investment: 14

Final balance: 24214.791299020994

To know more about Code Contributions Please click on the given link

https://brainly.com/question/10286981

#SPJ4

Answer:#include <iostream>

using namespace std;

int main()

{  

  const double RATE = 5;

  const double INITIAL_BALANCE = 10000;

  const double TARGET = 2 * INITIAL_BALANCE;

 

  cout << "Annual contribution: " << endl;

  double contribution;

  cin >> contribution;

  double balance = INITIAL_BALANCE;

  int year = 0;

  // Add annual contribution, but not in year 0

  while (balance < TARGET){

     year++;

     balance = balance * (1 + RATE/100) + contribution;

  }

  balance = balance - contribution;

  cout << "Year: " << year << endl;

  cout << "Balance: " << balance << endl;

  return 0;

}

Explanation:

Answer in c++

#include <iostream>

using namespace std;

int main()

{  

  const double RATE = 5;

  const double INITIAL_BALANCE = 10000;

  const double TARGET = 2 * INITIAL_BALANCE;

 

  cout << "Annual contribution: " << endl;

  double contribution;

  cin >> contribution;

  double balance = INITIAL_BALANCE;

  int year = 0;

  // Add annual contribution, but not in year 0

  while (balance < TARGET){

     year++;

     balance = balance * (1 + RATE/100) + contribution;

  }

  balance = balance - contribution;

  cout << "Year: " << year << endl;

  cout << "Balance: " << balance << endl;

  return 0;

}

Other Questions
What is (6/321/9)[8.9+2/4]1484 Jason and a group of his friends went out to eat pizza ontwo different occasions. The first time the bill was $21. 14 for4 cokes and 2 medium pizzas. The second time the bill was$39. 70 for 6 cokes and 4 medium pizzas. What would thebill be for one coke and one pizza? Although they are not a source of law in the same sense as constitutions and statutory law, ______ or ______ laws serve as a basis for some statutory law at the state level. What are some examples of suitable environments for bacteria?How might bacteria avoid dying if an environment is not suitable?How are bacterial cells different from plant and animal cells?Describe how bacteria reproduce. How can bacteria acquire new characteristics? You deposit $16,000 into your savings account today. You would like to withdraw the same amount of money from your account at the beginning of each year for the next 20 years. What is the maximum possible annual withdrawal if you earn 6.5% annual interest were interested in learning about some of the ways that you explore your interests. list some resources and outlets that you enjoy, including but not limited to websites, publications, journals, podcasts, social media accounts, lectures, museums, movies, music, or other content with which you regularly engage. Question 1The short run total cost curve is derived by summing the shortterm variable costs and the short term fixed costs. True orFalseQuestion 2The Grossmans investment model of health does Using the defects method, which of these relationships represents the law of cosines if the measure of the included angle between the sides a and b of abc is more than 90? a. area of square c2 = -area of square a2 area of squareb2 area of defect1 area of defect2 b. area of square c2 = area of square a2 area of squareb2 area of defect1 area of defect2 c. area of square c2 = area of square a2 area of squareb2 area of defect1 area of defect2 d. area of square c2 = area of square a2 area of squareb2 area of defect1 area of defect2 e. area of square c2 = area of square a2 area of squareb2 area of defect1 area of defect2 the pressure that a liquid exerts on the bottom surface of a container is the net result of individual moleculesin the liquid that collide with the surface. which of the following correctly indicates and justifies therelationship between the force exerted on the surface by a molecule and the force exerted on a molecule bythe surface during a single one of these collisions? Please HELP!!!! ASAP!!!!What is the significance of the genetic code? A. It describes how DNA is transcribed to RNA B. It describes how RNA is translated to amino acids C. It describes how RNA is translated to genes D. It describes how proteins are translated to RNA. x - 3 < 4 graph the inequality an aqueous solution of 0.783 m silver nitrate, , has a density of 1.11 g/ml. the percent by mass of in the solution is % Exercise 1 Underline the pronoun in parentheses that correctly completes each sentence. Then write the type of sentence in the blank: simple, compound, complex, or compound-complex.The person to (who, whom) Jenny wishes to speak is on vacation. Why does the author argue for the people of Thailand to return to Buddhist values?1. Capitalism has led to less unity and greater hardship for rural people.2. Monasteries can serve as the local democratic government.3. Buddhism has been an important element of culture for most rural Thais.4. Modernization has led to a small group having too much wealth. Historia de la habitacin 19 How many bass are estimated to be president if a random sample of 1500 fishes go to from the lake how did the upper classes in the colonies distinguish themselves from the lower classes in the eighteenth century? Groups emphasize all of the following except: a. collective work products. b. individual leadership. c. exclusive work products. d. personal accountability. What do neurotransmitters that bind ionotropic receptors directly control? What does cytochrome c do in electron transport chain?