Account today that earns

Assignment Help Basic Computer Science
Reference no: EM131823472

Suppose you deposit $1,061.00 into an account today that earns 14.00%. It will take ___ years for the account to be worth $2,708.00.

I have:

2,708 = 1061 (1+14%)^n

2.5523^(1/n) = 1.14

The answer is 7.15 but how did they get to that number. Please explain how to solve for "n" when it is an exponent (might be saying the wrong thing but for the n)? Am I on the right track

Reference no: EM131823472

Questions Cloud

What is a public-key certificate : What is the difference between a private key and a secret key? What is a digital signature?
Challenges rational behavioral assumptions of the utility : Give three examples on how prospect theory challenges rational behavioral assumptions of the utility theory & What two factors should be considered.
Evaluate how your lifestyle affects the planet : Evaluate how your lifestyle affects the planet. Your explanation needs to include the number of planet that would be necessary if everyone lived your lifestyle.
Discussion about the cloud computing in an organization : Determine whether or not government agencies such as the National Security Agency (NSA) or Central Intelligence Agency (CIA) would be good candidates.
Account today that earns : Suppose you deposit $1,061.00 into an account today that earns 14.00%. It will take ___ years for the account to be worth $2,708.00.
Provide an overview of either bandura or kelly theory : Question - Emotional and Cognitive View - For this discussion, provide an overview of either Bandura's or Kelly's theory of personality development
Annualized yield based on an annual effective yield : What is the annualized yield based on an Annual Effective Yield (EAR or AER or compound) basis?
Find the 1-year forward exchange rate : Find the 1-year forward exchange rate in $ per € that satisfies IRP (interest rate parity) from the perspective of a customer that borrowed.
Create a random bit string using given information : Suppose that someone suggests the following way to confirm that the two of you are both in possession of the same secret key.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Direct manipulation and virtual environments

Your software development company has been contracted to build a tool that will manage user accounts and rights in an Active Directory environment. One of your developers tells you that he wants the tool to make use of direct manipulation. A s..

  Customer appreciation sale

A retail store is having a customer appreciation sale. Depending on the total dollars purchased, the customer could receive a discount on his or her total purchases.

  Explain problems with gathering information requirements

One of the potential problems with gathering information requirements by observing potential system users is that people may change their behavior when observed.

  Will these data also be received uncorrupted

TFTP's timeout-and-retransmission scheme implies that all data packets will eventually be received by the destination host. Will these data also be received uncorrupted? Why or why not?

  Explain performance measures for balanced scorecard system

Explain three specific performance measures which could be utilized in Balanced Scorecard system in industry of your choice.

  Information security management facing the nation

In your opinion what is the most important ethical issue concerning information security management facing the nation?

  Design an enhanced entity relationship

Develop, document and design an Enhanced Entity Relationship (EER) model for this situation.  You are working for country club with thousands of members. You have been tasked with designing a database to keep track of the members and their guests.

  Java source code listing

Java class files for all parts and a short report (word document) the report should include details of: 1.Input 2.output 3.Problem analysis and Algorithm design 4.Variables 5. Formatting the output 6. Main Algorithm 7. Java source code Listing 8...

  Types of eai approaches

As your text explains, there are four different approaches to systems integration: data, application interface, method, and user interface. Each approach has its benefits and drawbacks. In this assignment, you will evaluate each of the four approa..

  Printing the decimal equivalent of a binary number

(Printing the Decimal Equivalent of a Binary Number) Input an integer (5 digits or fewer) containing only 0s and 1s (i.e., a "binary" integer).

  Regions and memory management

There are a wide variety of algorithms to chose from when implementing garbage collection for a speci?c language. In this problem, we examine one algorithm for ?nding garbage in pure Lisp (Lisp without side effects) based on the concept of regions..

  What is meant by globalization

What is meant by Globalization? Explain the impact of globalization on Saudi economy, its advantages and disadvantages.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd