Individuals may restructure their investment portfolios because

Answers

Answer 1

Answer:

the results are below expectations


Related Questions

When adding new hardware, such as a printer, to a computer you often have to add associated software that allows the printer to work with your computer's operating system. This associated software is called a ________. When adding new hardware, such as a printer, to a computer you often have to add associated software that allows the printer to work with your computer's operating system. This associated software is called a ________.

Answers

Answer:

It is called a driver.

Explanation:

Growing up with dyslexia, Stephanie always struggled in English and Reading. Math was a breeze for her, though. Along the way, there were a few teachers who really worked closely with Stephanie to help her absorb the information she needed, and they showed her how to make learning fun! Stephanie particularly loved studying trigonometry and even her high school teacher is having difficulty keeping up with her. Now that she has been able to figure out how to study, education no longer scares Stephanie. In fact, she finds it a great way to explore and understand the world around her

Answers

Explanation:

A lot of people with dyslexia can relate to Stephanie.

explain at least three important events during the first generation of programming language?

Answers

Answer:

Python, Ruby, Java, JavaScript, C, C++, and C#.

Explanation:

A programming language is a type of written language that tells computers what to do. Examples are: Python, Ruby, Java, JavaScript, C, C++, and C#. Programming languages are used to write all computer programs and computer software.

Which of the following is an example of a law that governs the information IT workers may have access to in the course of their work?

Answers

Answer:

HIPAA

Explanation:

The Health Insurance Portability and Accountability Act of 1996 is a United States federal statute enacted by the 104th United States Congress and signed into law by President Bill Clinton on August 21, 1996.

Which of the following numeric values is considered a floating point?
A. 16
B. -16
C. 1.6
D. 160

Answers

Explanation:

B.-16

Because the things is that idk

what sort of software programs are used to determine are of origin

Answers

Answer:

Explanation: Tools used to determine area of convergence and area of origin include: Elastic strings and protractors. Mathematical equations - (tangent trigonometric function) Computer software programs such as BackTrack™ or Hemospat.

Is 1/5 a rational number, interger, whole number, and natural

Answers

Answer:

1/5 is a rational number.

Explanation:

Natural numbers are the numbers you use to count with (1, 2, 3, etc.). Nobody uses fractions while counting whole objects unless they think they're funny and want to stall, so 1/5 wouldn't be a rational number.

Whole numbers are the exact same as natural numbers, but with the addition of the number 0 (think about it, no one starts from zero when counting).

Integers include whole numbers as well as their opposites (for example, the opposite of 4 is –4).

As a basic rule of thumb, if the number includes a fraction or a decimal point of any kind, it would be a rational number.

please help me i will give brainly

Answers

Answer:

CPU: central processing unit.

Operating System: system software that is installed on a computer to control and organize its component parts.

RAM: random access memory.

save as: command in the File menu that enables users to save their file to a different location.

Folder: an object that contains multiple documents or files.

icons: pictures that represent different commands or actions that you want the computer to perform.

Directory: index of all the files stored on the computer.

FAT: an organizational system used to organize files.

what type of malware prevents you from accessing files

Answers

the anwser is _______________ ———_____

what guidance identifies federal information security controls?

Answers

Answer:

FIPS Publication 200, the second of the mandatory security standards, specifies minimum security requirements for information and information systems supporting the executive agencies of the federal government and a risk-based process for selecting the security controls necessary to satisfy the minimum security..

Explanation:

Hope it helps you..

Your welcome in advance..

(ㆁωㆁ)

The guidance identifies federal information security controls is THE PRIVACY ACT OF 1974.

What is Personally Identifiable statistics?

Personally Identifiable statistics (PII) is any statistics approximately a person maintained with the aid of using an organization, inclusive of statistics that may be used to differentiate or hint a person's identification like name, social safety number, date and region of birth, mother's maiden name, or biometric records.

The Privacy Act states the guidelines that a federal enterprise need to observe to collect, use, transfer, and expose a person's PII.

Read more about the security :

https://brainly.com/question/26260220

#SPJ2

unable to find valid certification path to requested target

Answers

Answer:

Explanation:

This issue might arise if you are using a self-signed certificate or a certificate that's been issued by an internal certificate authority, or if your clients (e.g., browser, Java) are outdated. Trust is handled by having the root and intermediate certificates of your SSL certificate on a trusted keystore.

What is a network?
A. The main idea or information contained in a media piece
B. Many people or things that are individually connected to one
another
C. A means of mass communication in print and other forms
D. A group of individuals who share the same ideas and values

Answers

Answer:

it is A and have a wonderful day

your motherboard has sockets for 184-pin dimm ram. which type of ram should you install?

Answers

Answer:

DDR

Explanation:

DDR is the only type of RAM that runs on 184 pins, its successor DDR2 was upgraded to run on 240 pins.

Hope this helps!

algorithm to convert Fahrenheit temperature into celsius temperature​

Answers

Lets use python

[tex]\\ \tt F=(float(input("Enter\:temperature\:in\:Fahrenheit:")))[/tex]

[tex]\tt C=(F-32)*5/9[/tex]

[tex]\tt print("Temperature\:in\:Celsius\:is",C°C)[/tex]

Output:-

[tex]\tt Enter\:temperature\;in\:Fahrenheit:32[/tex]

[tex]\tt Temperature\:in\:Celsius\:is\:0°C[/tex]

Answer:

Using c++ variable names

double c;

double f;

//set f to some temperature value or pass the value to the function

c=f-32;

c=f*(5/9);

//c is now the temp in celcius

what is the answer ??​

Answers

Answer:

option 1 is correct go with 1s .

qbasic program to check whether the given number is odd or even​

Answers

Answer:

CLS

INPUT "Enter a Number: ", n

IF n MOD 2 = 0 THEN

PRINT "Input Number is Even"

END IF

IF n MOD 2 = 1 THEN

PRINT "Input Number is Odd"

END IF

END

Explanation:

CLS

INPUT "Enter a number:",N

IF N MOD 2=0 THEN

PRINT "given number is even"

ELSE

PRINT"given number is odd"

END IF

END

Which THREE of the following practices conform to good email etiquette?

using a large font
including a salutation
using a page background
including a closing
using correct spelling and punctuation

Answers

Answer:

including a salutation, including a closing, and using correct spelling and punctuation.

Explanation:

A salutation is a greeting. It is always good etiquette to greet someone.

You do not want to end your email abruptly. Use a good closing.

It is never fun to read an email with bad spelling or punctuation. Using correct spelling and punctuation will make your email look more professional.

Using correct spelling and punctuation, include a closing, and including a salutation

PLEASE HELP PLEAAASSSSSEEEE!


When search engines republish content, it refers to _____.


a leaking data exhaust

an active data exhaust


an active digital footprint


a passive digital footprint

Answers

Answer:

a passive digital footprint

Explanation:

When search engines republish content, it was not information that was intentionally re-released by the owner. This makes it a passive digital footprint.

Answer:

D. a passive digital footprint.

Explanation: got it right

when backing up an ios device to a cloud service the first recommended step is to

Answers

Answer:

make sure that your device is connected to wifi

Explanation:

I think that's the answer because cloud service needs wifi (duh). Hope this helps!

Answer:

The first recommended step is to connect to an internet connect, and not your mobile WiFi as it can take a lot of GB.

how can a robot differentiate between positive or negative product reviews?

Answers

Answer:

Some of the sites have the rating system for example 3 stars, or the bot has a feature that can capture keywords that include a list of possible indicator that it is a negative review. For example if a user review includes a word "bad" or "horrible" the bot will flag that as a negative review.

Please give brainliest.

figures and tables are always accompanied by legends or captions located ________ figures and ________ tables.

Answers

Captions are texts that provide the description of a figure or a table.

Complete the blanks using: below and above

When adding captions to an object, the location of the caption is as important as the caption itself.

The location of the caption for the objects of word documents are:

Images - Caption are placed below imagesFigures- Caption are placed below figuresTables- Caption are placed above tables

Hence, the complete text is:

figures and tables are always accompanied by legends or captions located ____below____ figures and ___above_____ tables.

Read more about captions of figures and tables at:

https://brainly.com/question/18710734

Please answer this thank you

As a good housekeeper, list down at least 5 ideal traits and why you should practice them in terms of housekeeping​

Answers

Cooking, for good food
Cleaning, a clean house

1. Define the term M.A.N.

Answers

He is right I got it correct Thanks:)

Imagine that over the past few weeks, you have experienced an abundance of pop-up ads

appearing when you are using the Internet. You'll also noticed that your computer is

working more slowly than usual.

In a 200 - 300 word essay, diagnose the problem with your computer and explain what can be done to remedy the issue. In your essay, use information from the lesson to justify your

diagnosis and solution.

I

Answers

Answer:

Look below

Explanation:

You open the computer that you recently purchased and it is running slower than usual and your experiencing popups

What most people would think is that a virus has infected their computer. This can be diagnosed via a free online (REPUTABLE) tool such as Malwarebytes. If the tool detects a virus it can remove it and this will 99% of the time fix the problem.

Now after you have solved the problem there is another thing to learn, viruses don't just catch computers like a real virus so its User Error either by the owner of the computer or someone with access, If you are the only one who uses the computer you should learn some online safety such as not visiting websites people wouldn't consider reputable and don't run sketchy files (EXE, JAR, etc) don't download anything from a source you don't trust.

If it was a family member or friend's fault explain internet safety to them and how sometimes a simple mistake of not double-checking the website can lead to a virus. One time I was installing java on a friend's computer and just clicked the first link (an ad) not Javas website and it ended up in me getting in some trouble.

However, if you have solved the virus issue and your computer is still being slow you should check if Windows has been damaged, you can do this via Command Prompt a program that comes with your Windows Machine. Just type "sfc /verifyonly" and it will find if your windows files have been damaged.

-END

256 words

Pls mark me Brainliest i worked hard on this. Your assignment asks for information on the lesson however i used some complicated solutions to make up for that so your teacher/professor thinks your smart

did someone hang themselves on set of wizard of oz

Answers

Answer:

One of the most ubiquitous of film legends holds that a munchkin hanged himself on-camera during the filming of 'The Wizard of Oz.' A lovelorn actor portraying one of the munchkins hanged himself on the set during the filming of The Wizard of Oz.

Explanation:

Language learning programs like Rosetta Stone would not be considered a simulation game because you aren’t really practicing verbal skills, you are just memorizing words.

A.
True

B.
Fale

Answers

Answer:

True

Explanation:

it refers to the kind of activity that you are going to perform or methods of training to used

A.type
B.frequency
C.intensity
D.time

Answers

I believe the correct answer is “type”

4.) Food cost for your restaurant is about $.38 on the dollar. That means for every dollar
in sales, you spend 38 cents in food cost.
Figure out the food costs for the following days' sales:
Monday: $3,459.00
Tuesday: $2,976.81
Wednesday: $3,185.32
Thursday: $3,562.91

Answers

Answer:

38 cents on the dollar means that the cost is 38%. So for each of the costs, multiply by 0.38 (38%) to get the cost.

$3459*0.38=$1314.42

$2976.81*0.38 = 1131.1878 or about $1131.19

etc.

Which decimal number is equivalent to this hexadecimal number?
F8

A.
24
B.
143
C.
248
D.
264

Answers

Answer:

So, the number 248 is the decimal equivalent of hexadecimal number F8 (Answer).

(F8)16 = (248)10

Step by step solution

Step 1: Write down the hexadecimal number:

(F8)16

Show each digit place as an increasing power of 16:

Fx161 + 8x160

Convert each hexadecimal digits values to decimal values then perform the math:

15x16 + 8x1 = (248)10

So, the number 248 is the decimal equivalent of hexadecimal number F8 (Answer).

how can an attacker execute malware through a script?

Answers

Answer:

An attacker can attach a script to a program that you download which then infects your computer.

Other Questions
POST-QUIZQuestion 2 of 5One way that the vaping industry is following in the footsteps of the cigarette industry is by trying to...attract former smokers as replacement customers.attract stay-at-home moms as new smokers.attract young people as replacement smokers.9 attract single men as new smokers. My grandmothers ______ is wrinkled, but she is a beautiful woman. Sara says, "If you subtract 12 from my number and multiply the difference by - 3, the result is- 45." What is Sara's number? : 11 = 1 /3 : 6plz help Pliss help meeee helppppo pliss no links ok no links carla wants to investigate whether a persons political party affiliation causes the person to be more vocal about political issues. she plans to administer a survey to a large sample of people. which of the following describes why the method of data collection used will prevent carla from achieving her goal? In the function f(x) = 2x + 3, x is the dependent variable.True or false why do people keep exotic animals fo commercial reasons? FIND THE NUMBERR!!!!!! 1. True or False: The newly freed men and women feared they would nothave to resources, tools and education to turn their freedom intosomething * help-i dont remember how to do this or what the answer would be Draw a picture and write an equation to help you solve the following problems What events during the Neoclassical period most likely contributed to the enslavement of Olaudah Equiano? Select all answers that apply. A. The death of Queen Elizabeth B. A contract to provide slaves to the Spanish EmpireC. The expansion of the British Empire D. The establishment of the British Navy Some of the proposed expanded health care coverage policies such as Medicaid as a public option does not violate free markets because? Question 7) Amy and Delilah are writing a vignette scene of drama to present to their class on Tuesday. What genre of writing does their project MOST likely fall under?A. comedy writingB. sketch writingC. screenwritingD. historical writing Use the graph of the quadratic function, g(x), to answer each question. a. g(-1) = b.g(-3) = c. Find x when g(x) = 4. X = ____ is the most northern New England state. What differences are there between heartwood and sapwood? translate this into an equation, use n for the number: "the different of 3 times a number and 6 is twice the number." Two skaters face one another and stand motionless, then push against each other on the ice. If one's mass is 55 kg and he moves to the left after the push at a velocity of 4.3 m/s, how fast was the other skater traveling after the push if her mass was 48 kg.