Answer:
Alizeh
The total value (AFTER FEES) of Alizeh’s mutual fund is:
$10,570.
Explanation:
a) Data and Calculations:
Investment in mutual fund = $10,000
Annual expense ratio = 1.3%
Rate of return on investment = 7%
b) Annual return on investment = $700 ($10,000 * 7%)
c) Annual fees for her actively managed mutual fund = $130 ($10,000 * 1.3%)
d) At the end of the year, the total value (after fees) of Alizeh's mutual fund:
Investment in mutual fund = $10,000
Annual return on investment = $700
Annual fees for mutual fund = ($130)
Total value = $10,570
The total amount at the end of the year is the sum of the Principal ,ROI and
the expense which is $10,570
Mutual Fund/InvestmentGiven Data
Principal = $10,000Expense ratio = 1.3%Ratet = 7%1. Let us find the ROI
= 7/00*10000
=0.07*10000
= $700
2. Let us find the fees/expense
= 1.3/100*10000
= 0.013*10000
= $130
hence the total amount at the end will be = 10,000+700+130 = $10,570
learn more about mutual funds here:
https://brainly.com/question/25300925
This road sign means
O road work ahead
vehicle breakdown
O service stations
O construction zone has ended
Answer:
A
Explanation:
Uh, yeah, I sure hope it does (to everyone who watched vine)
When speed increases, what happen to the value of torque?
Answer:
Torque increases as rotational speed increase from idle to a certain figure and then falls as the rotational speed increase
Explanation:
What pets are on Terraria and how can you get them?
Answer:
There are over 15 new pets that can be found in chests and dropped rarely off enemies: Baby Dinosaur, Baby Eater, Baby Hornet, Baby Penguin, Baby Skeletron Head, Baby Snowman, Baby Truffle, Black Cat, Eyeball Spring, Pet Lizard, Pet Parrot, Pet Sapling, Pet Turtle, Squashling, and Tiki Spirit.
Explanation:
There are over 15 new pets that can be found in chests and dropped rarely off enemies: Baby Dinosaur, Baby Eater, Baby Hornet, Baby Penguin, Baby Skeletron Head, Baby Snowman, Baby Truffle, Black Cat, Eyeball Spring, Pet Lizard, Pet Parrot, Pet Sapling, Pet Turtle, Squashling, and Tiki Spirit.
Answer:
Depends on version
Explanation:
Check ther official website entering your vertion in ther
Who benefits from digital technology?
Answer:
Well, the answer is simple. Everybody!
Explanation:
What do microphone means
Answer:
A tiny phone
Explanation:
It means a tiny phone
Question 8 of 10
What can be defined as an information technology environment?
A. The tools and processes that surround us to gather and interpret
data
O B. The rules and regulations that government and businesses must
follow to be secure from hackers
C. The energy used to create and maintain technology
D. The buildings and materials that house computer services
SUBMIT
Answer:
C. The energy used to create and maintain technology
#Carry on learning po
You want to use the dist() method. Which line will allow you to enter the following code in IDLE?
>>>dist([2.5).(5.9))
5.0
from dist import math
from math import dist
from random import dist
from dist import random
Answer:
from math import dist
Explanation:
The dist() method is a part of the math module. So, to include it you have to use the following line of code:
from math import dist
hope this helped :D
The line which will allows you to enter the following code in IDLE is from math import dist.
What is dist() method?The dist() function can be used to calculate a distance matrix, which shows the distances between the rows of a matrix.
The dist() method is a part of the mathematics module. Then, for
>>>dist([2.5).(5.9))
5.0 ,
we have to use code in IDLE as;
from math import dist
Thus, the line which will allows you to enter the following code in IDLE is from math import dist.
Learn more about dist() method.
https://brainly.com/question/25373810
#SPJ2
William is working on a term paper. He finds an online article on the same subject as his paper. He downloads the article and paraphrases a portion of it in his paper. He does not include the article in his list of references because he did not use the exact wording of the article. What illegal and unethical conduct is William guilty of?
A.
software piracy
B.
plagiarism
C.
patent infringement
D.
trademark violation
Answer:
B. Plagiarism
Explanation:
Answer:
B. Plagiarism
----------------------------------------------------------------------------------------------------------------
Explanation:
It's pretty simple--
- Software piracy is the unauthorized downloading, copying, use, or distribution of software, so it would not be A.
- Patent infringement is when someone sells, imports, uses, or makes a product that someone else invented without permission, so it is not C.
- Trademark infringement is a violation of the exclusive rights attached to a trademark without the authorization of the trademark owner or any licenses, so it wouldn't be D.
- It is plagiarism because William is taking someone else's work and passing it off as his own. He did not credit the original author of the article so it counts as Plagiarism. Hope this helped you out a bit :D
A workspace that an employee accesses using a Web browser fits the definition of a _____.
•mobile device
•Wifi-enabled device
•collaborative environment
•virtual workspace
Answer:
virtual workspace
Explanation:
I hope I've helped
WILL GIVE BRAINLIEST!!!!!!
New space suits are being designed for future trips to the moon.
True
False
Answer:
True
Explanation:
Today, NASA unveiled its designs for future spacesuits that astronauts will wear during trips to the lunar surface.
The advancements in which of the following technologies has most changed the American job market in recent years?
A.
computer and Internet
B.
manufacturing
C.
transportation
D.
health care
Makayla is cre iting a brochure for her computer consulting company. She designed the layout and placed a banner containing the
company name in the center of the page. Being unsatisfied with the effect, she has decided to move the text box containing the name
to the top of the page. In 3-5 sentences, describe the procedure Makayla will use to move the banner.
The procedure depends on the software and methods she uses.
In photoshop or InDesign she might need to fdrag and drop the title to the new location.
In Word/Publisher she has to cut and paste the title to the new location or to drag the box to the top.
what is a feature only used in powerpoint
I think powerpoint is the only presentation maker in which you can use 3D objects
Answer:
Slide transitions
Explanation: cause i got right
i'm sure 100%
HELP PLEASEEEE!!!!!!!
Eric would like to have a callout text box that makes it look as if the character in an image is speaking. Which object should he insert into the Word document?
standard text box
WordArt
callout
shape
picture
Answer:
C: Callout shape
Explanation:
The object that should he insert into the Word document is the callout function. The correct option is b.
What is Microsoft Word?A component of Microsoft Office is Microsoft Word. The office is a collection of Microsoft products that can be used on Windows or macOS and contains Word, PowerPoint, Excel, Outlook, and numerous other tools for both private and professional usage. They aren't the same thing; Microsoft Word is merely one of such app.
A callout function is one of the functions that specifies a callout and is implemented by a callout driver.
The following collection of callout functions makes up a callout: a notification processing notifying function. A function called classifying handles classifications.
Therefore, the correct option is b. callout.
To learn more about Microsoft Word, refer to the below link:
https://brainly.com/question/2579888
#SPJ5
1.
PART A: Which of the follovling best identifies the author's claim in the text?
A Hopper was often underestimated because of her gender and unable to
contribute her ideas and insights.
Without the influence of Hopper, it is unlikely that women would be allowed to
work in the field of computer science today.
C. Hopper's contributions helped develop computers and expand the presence of
female programmers in computer science.
D. While Hopper was successful with technology, she struggled to connect with
other people.
Answer:
C. Hopper's contributions helped develop computers and expand the presence of female programmers in computer science.
Explanation:
The answer would be C, as all throughout the article, Slavin gives numerous examples of ways Hopper had contributed to the development of computers. She was a technologist in the Navy, working on machines such as Mark I, Mark II, and Mark III, a marketer, a teacher at Harvard, a politician, and a great business lady. Overall, with everything said in the article, answer C fits the best, as it covers the main idea of the article itself.
Wires,plugs,speakers, chis are all examples of what
Answer:
Ch1kenT3nders
Explanation:
Write the steps to open file and folder
Answer:
1. Launch the File Open dialog. In the File menu, select the Open menu item.
2. Open the folder containing the desired file.
Select the desired file within the folder.
3. (Optional) Specify a file format type.
4. (Optional) Specify the character encoding.
5. Click on the Open button.
What is a composite primary key made up of?
O an autonumber field/
a reference to a different table
more than one field
multiple records in the table
Answer:
what
Explanation:
1 Which of the following could work as bits for a binary system?
А The flip sides of a coin
B The fingers on one hand
C The days of the week
D The colors of the rainbow
How many passes will it take to find the five in this list? 1, 5, 10, 15, 20, 22, 30 edgenutiy 2020
Answer:
1
Explanation:
Answer:
The answer is 2
Explanation:
edge 2020
All the following are the basis of the World Wide Web except:
Web browser programs
Infrastructure
Web servers
HTML
Answer:
Web browser programs
Explanation:
Web broswer programs arent very important because they arent being used to maintain the servers or contail the contents of all the sites, they are only used by people to easily view the world wide web without using advanced commands in a terminal to view sites. all the other selections are very important when it comes to maintaining the entirety of the internet.
Answer:
web browser'
Explanation:
True or False, A variable can be called or referenced before it has been defined.
Answer:
false?
Explanation:
im 99% sure
Question 2 of 10
Aubrey didn't like to use graphics or images on her slides. She preferred to
use only a title for her slides and bullet-pointed text: What is the best thing
you could say to Aubrey about using media that might change her mind?
O A. As long as you use it responsibly, it will only enhance your slides
and engage your audience.
B. Media will keep your audience entertained and take the pressure
off of the presenter.
C. You should always try
slide.
include as much media as you can on a
D. Actually, Aubrey's beliefs are well founded and backed up by
research
Answer:
A
Explanation:
Answer: it is a
Explanation:
ten(10) examples of wearables or wearable technologies?
Answer:read
Explanation:
airpods
headphones
earbuds
AirPods pro
watch
fitbit (type of watch that counts your miles) &you can say workout watch&
VR set
technology bracelet
smart glasses
Smart ring
Big Bob's Construction has many construction sites where computers are located. At the remote sites, Internet connectivity can be of poor quality and intermittent. Because the computers are onsite and have poor connectivity to the main office, they are not currently domain joined. However, they could be domain joined if required. You want to be able to manage the computers at the construction sites. Which technology can allow you to do this and not force users to reconnect constantly?
Answer:
WAN or wide area network using satellite
Explanation:
A WAN or wide area network is a network of local area networks that could span beyond a geographical region.
For a network administrator to manage the remote construction site, a stable network connection should be established using a wireless medium like a satellite to connect the site's network to the office network.
What is ur Favorite Musical Artist
Answer:
dani
Explanation:
Which technique will you use to make listening to audio a pleasant experience?
Audio _____ is the smooth shift of one audio file into another.
Don't quote me on this, but I *think* the answer is "Audio transition/transitioning is the smooth shift of one audio file into another." I hope I was able to help and I apologize if I was wrong. ♡♡
Answer:
Sample response: Good thriller has beginning, middle, and end. Reader has to care about the characters. A character should be mysterious so readers are interested. Crime is a good way to talk about human condition. Good thrillers change people’s point of view in some way.
Explanation:
Which position would a photographer typically use to make the viewer feel like an observer?
from below?
from the side?
from above?
from the front?
Answer:
From the side.
Explanation:
When the subject is faced away from the camera entirely, it’s easy to feel more like an unseen observer rather than an active presence. The further the distance between the camera and subject, the more the effect is intensified.
Robert is risk manager at TPT Bank has been asked to implement an updated badge reader system for addressing access control risk. Even though the risk was migrated, Robert observes some remaining risk linked with access control. What type of risk has been observed by Robert
Answer:
Disruption of computer service
Explanation:
Access control is a method or technique used by network administrators to organize and limit access to resources in a network. In a computer network, there several threats and risk experienced by users and technician, that threatens the confidentially of information and other resources.
The configured badge reader system needs data and draws bandwidth. When this bandwidth is in use, it reduces the network efficiency and computer services causing low productivity in the organization.