Math 1201 Research Paper

Decent Essays
MATH 1201: COLLEGE ALGEBRA DISCUSSION ASSIGNMENT UNIT 5
Which is the better deal, $10,000 invested at 5%, compounded yearly, for 20 years, or $5,000 invested at 10%, compounded continuously, for 20 years?
Solutions:
→$10,000 investment at 5%, compounded yearly, for 20 years→
→Formula for the compound interest: → A= p (1+i) ^n,
→ p = initial investment
→ i = interest rate per compound period
→ n = number of the given periods,
→ A = amt after n- periods
For the given equation number one: p = $10,000 i = 5%→ .05 n =20 A = 10,000(1+.05) ^20 A = 10000(1.05) ^20 this will be ≈ $26,533
→ $ 5,000 investment at 10%, compound continuously, for 20 years→
→Formula for compound continuously is →
→ A=Pe^rt,
→P=initial investment,

Related Documents

  • Decent Essays

    1. Name two creatures that have been discovered since you were born. Titi Monkey and Dumbo Octopus have been discovered since I was born. 2. How tall would a redwood be compared to you right now?…

    • 317 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Pt1420 Unit 6 Paper

    • 651 Words
    • 3 Pages

    1. What is the average debt for individuals 22-29? The average individual 22-29 years of age has 16,120$ dollars in debt. This is typically due to careless spending, because they are young and have no idea how to spend their money wisely.…

    • 651 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    ASSESSMENT ITEM 3 - ASSIGNMENT 1 SUDHEER KUMAR NANDIGAM 11622446 1. -29 Binary Format of 29: 11101 16 bit binary representation of 29 is 00000000 00011101 16 bit signed magnitude representation of -29 is 10000000 00011101 2’s complement form of -29 is NOT (00000000 00011101) +1 NOT (00000000 00011101) is 11111111 11100010 11111111 11100010 +1 11111111 11100011 2’s complement form of -29 is 11111111 11100011 2.…

    • 533 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Nt1330 Unit 1 Term Paper

    • 455 Words
    • 2 Pages

    5.2.3Direct Access DirectAccess is new to the Windows 7 operating systems. DirectAccess enables a remote user to work on their corporate network when they are away from the office without the need of a VPN. As long as the remote user is connected to the Internet, DirectAccess will automatically connect the remote user to the corporate network without the need of any user intervention.…

    • 455 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 1 Paper

    • 521 Words
    • 3 Pages

    The rational for having Rouge One communications data centralize on a file server using a Distributed File System (DFS) is simple. When the data is centralized, instead of being spread out and existing on multiple computers will make it be easier to manage. The way this is going to be solve is a backup of the user data will be taken. This is to ensure that nothing will be lost. Then a Distributed File System (DFS) will be setup on the Rouge One communications file server.…

    • 521 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    I have to agree with you that waterway ports are the busiest at the same time I do not believe that are the hardest to secure. Living here in Jacksonville, FL I have several ports around me. There is Jacksonville Port Authority (Jaxport) that controls three cargo terminals, a cruise terminal and an intermodal rail terminal. Blount Island (controlled by the Marines) is one terminal that I am familiar with because of the military. This facility has some of the tightest security even more than some operational bases.…

    • 455 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Installing a custom recovery replaces the stock recovery on your Samsung smartphone. If you are not an advanced Android user, it doesn't matter which recovery you have on your device. However, people who want to install custom ROMs must replace the stock recovery for a custom recovery. Installing a new custom recovery on a Samsung device is usually easy thanks to the Odin flashing tool. You can just install the file as you would any other official software update for upgrading or downgrading the operating system.…

    • 432 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Application / Files sharing between computers Windows Homegroup Windows home networking has been extremely complicated to configure in the past, but Homegroup is easy to set up. Just create a Homegroup from the Homegroup option within Windows Explorer (File Explorer on Windows 8) and you’ll get a password which enables you to access fromyour nearby computers and they can join your Homegroup. The other members of the Homegroup will now have access to your shared files when they log ON to the same network — then you may select the libraries whichever you want to share while you create a Homegroup. Dropbox LAN Sync Many people exchange files between their computers by synchronising them with any one of the cloud storage solutions like Dropbox, Google Drive, or SkyDrive. This can take a while — the file first gets uploaded to your cloud storage provider’s servers and then it gets downloaded back to your other computers.…

    • 457 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Protocol for the Prohibition of the Use in War of Asphyxiating, Poisonous or Other Gases, and of Bacterial Methods of Warfare (Geneva Protocol) was penned and signed on 17 June, 1925. This was a treaty signed by the Allies at the close of World War I, which was actually just an extension and re-verification of the Treaty of Versailles (signed in 1919) prior to WWI. The Geneva Protocol furthered the Treaty of Versailles in that it expanded the weapons ban to include a ban on bacteriological warfare. In 1969, this protocol was further expanded to include CS gas agents and harassing agents (probably due to their use by the U.S. during the Vietnam War).…

    • 656 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Introduction Often, team members of both Apple and Microsoft convocate to ameliorate the upcoming operating system that they plan to release in a certain period of time. Many different features are added to technology each day to facilitate the use of it. For example, Cortana (the Windows Phone Assistant), the Snap Assist feature on Microsoft, and Phone Companion are qualities that aid the success of an operating system. In Apple, features such as Control center, Task manager and fingerprints contribute to the success in IOS Seven. I will be discussing the advantages of Cortana (the Windows Phone Assistant), the Snap Assist feature on Microsoft, and Phone Companion.…

    • 682 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Securing your Macintosh(Mac) OS computer Apple producing their computers with a lot of security features already in them. Mac OS X is one of the most secure operating systems in the market. Still a lot of people make mistakes while using their computers on their daily bases. These mistakes can notably weaken the security of their operation system. To be sure that you computer secure we will consider how to secure your user account, your web browsing, and we will maximize the privacy.…

    • 867 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    NT1410 Module 5 Exercise 1 Securing Desktop & Mobile Operating Systems Sierra Baltins Friday Whether or not a person uses a desktop or mobile operating system, there are forms of protection available. There are several operating systems that offer protection to the user, but some operating systems are more vulnerable than others. Mobile devices may automatically provide the user with different security systems than the desktop can offer. Either way, these security systems are designed to stop cyber-attacks.…

    • 635 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Sb 2529 Research Paper

    • 722 Words
    • 3 Pages

    I am an undergrad Human Biology student studying nutrition at the University of Wisconsin Green Bay. I am asking you to cosponsor the CONC US SB 2529 (or CONG US HR 4617) bill that would amend the Richard B. Russell National School Lunch Act requiring that the Buy American purchases for the school lunch program include fish harvested within United States waters, and for other purposes. Fish caught outside of US waters runs a higher risk for contamination by substances banned in the United States. Most of the seafood the US consumes is imported, with 80-90% being imported and half of that is farm raised.…

    • 722 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Allowing kids under the age of fourteen to play tackle football can have severe consequences to their young minds. I personally do not like football but I’m sure there are other ways that younger kids can play football without tackling each other and getting hurt. “ Goldstein and his colleagues advocate for no tackle football before 14 because children’s bodies, particularly their necks and upper bodies, aren’t strong enough to counteract the bobbling of the head and shaking of the brain that occurs during tackles” (Kounang 1). Not only does that sound painful but why would a parent want that for their child.…

    • 280 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    “The golden ratio is a special number found by dividing a line into two parts so that the longer part divided by the smaller part is also equal to the whole length divided by the longer part.” (Elaine J. Hom ) After the 21st century, golden ratio represents as a phi in Greek alphabet. The equation for golden ratio is a/b = (a+b)/a = 1.6180339887498948420 …,but if we round it two places, it will be 1.62.the golden ratio is also called the golden mean, golden section, golden number and so on. The symbol for golden ratio is phi, it is known as the Greek symbol.…

    • 921 Words
    • 4 Pages
    Superior Essays