1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hitman42 [59]
3 years ago
15

Anderson uses his computer and internet link to chart the movement of his favorite 46 stocks. He buys and sells according to the

analysis he does of the price charts on these stocks. If he can generate consistent abnormal returns in this manner then this is a failure of weak form efficeincy semi-strong form efficeincy strong form efficincy all of the above none of the above
Computers and Technology
1 answer:
gulaghasi [49]3 years ago
8 0

Answer:

The answer is: weak form efficiency

Explanation:

The efficient market hypothesis is a financial theory that puts forward the concept of informational efficiency in capital markets. The weak form of informational efficiency dictates that the past price data and market expectations are already included in the price movements of an asset in a given capital market. If this holds true, then technical analysis (examining historical price data of an asset) will not yield any benefits when evaluating investment decisions. If Anderson can generate abnormal returns via technical analysis then the market is not weak form efficient.

You might be interested in
When an attacker promotes themselves as reputable third-party advertisers to distribute their malware through the Web ads,
pshichka [43]

Answer:

This type of attack is called Malvertising

Explanation:

Malvertising (Malware Advertising)  is a term in computer security that refers to the act of spreading computer malware through online advertisements. It is done by injecting malicious code into genuine online advertisement platforms or malicious webpages that appear as though they are genuine and from reputable third-party advertisers. While it is quite a new concept it is difficult to combact because content for advertisement can be placed in genuine and reputable websites that users trust.

3 0
3 years ago
How many times do you need to click the Format Painter button to apply copied formats to multiple paragraphs one right after the
const2013 [10]

The answer is (A) Twice

Format painter is that icon tool that looks like a paintbrush that is used to pick up formatting of an existing text and then paints it on the next text you select. If you wish to apply the formatting to more than one element, you should double-click the format painter and press esc key to deactivate.


5 0
4 years ago
Read 2 more answers
Does anybody want to be my friend
Gekata [30.6K]

Answer:

Yeah sure, mines aatelophxbia, i'm 14. what games you play?

6 0
4 years ago
Read 2 more answers
A company wishes to deploy a wireless network. Management insists that each individual user should have to authentic.ate with a
kap26 [50]

Answer:

A company wishes to deploy a wireless network. Management insists that each individual user should have to authentic.ate with a unique username and password before being able to associate with the wireless access points. Which of the following wireless features would be the MOST appropriate to achieve this objective?

Option A is the correct answer -  WPA2 PSK.

Explanation:

Data is the most essential asset for obtaining knowledge and information. Therefore, it has to be protected from various threats. However, the wireless network provides the option of sharing data without wires, but it is flying in the air. Thus, to secure it, we need to secure it with the right tools.

Option A: WI-FI Protected Access Pre-shared-Key (WPA2 PSK) is the best protection tool because it has 2 modes-PSK and Enterprise mode.

7 0
3 years ago
Read 2 more answers
Create a method called nicknames that passes an array as a parameter. Inside the method initialize it to hold 5 names of your ch
Gre4nikov [31]
<h2>Answer:</h2>

    //======METHOD DECLARATION=========//          

    //method name: nicknames                                          

    //method return type: void                                            

    //method parameter: an array reference                    

    public static void nicknames(String [] names){      

       //initialize the array with 5 random names              

       names = new String[] {"John", "Doe", "Brian", "Loveth", "Chris"};

       //using an enhanced for loop, print out the elements in the array

       for(String n: names){

           System.out.print(n + " ");

       }

       

    }

<h2>Explanation:</h2>

The program is written in Java. It contains comments explaining important parts of the code. Kindly go through these comments.

A few things to note.

i. Since the method does not return any value, its return type is <em>void</em>

ii. The method is made public so that it can be accessible anywhere in and out of the class the uses it.

iii. The method is made static since it will most probably be called in the static main method (at least for testing in this case)

iv. The method receives an array of type <em>String </em>as parameter since the names to be stored are of type <em>String</em>.

v. The format of initializing an array manually should follow as shown on line 7. The <em>new</em> keyword followed by the array type (String), followed by the square brackets ([]) are all important.

vi. An enhanced for loop (lines 9 - 11) is a shorthand way of writing a for loop. The format is as follows;

=> The keyword <em>for</em>

=> followed by an opening parenthesis

=> followed by the type of each of the elements in the array. Type String in this case.

=> followed by a variable name. This holds an element per cycle of the loop.

=> followed by a column

=> followed by the array

=> followed by the closing parenthesis.

=> followed by a pair of curly parentheses serving as a block containing the  code to be executed in every cycle of the loop. In this case, the array elements, each held in turn by variable n, will be printed followed by a space.

A complete code and sample output for testing purposes are shown as follows:

==================================================

public class Tester{

    //The main method

    public static void main(String []args){

       

       String [] names = new String[5];

       nicknames(names);

    }

   

  //The nicknames method

    public static void nicknames(String [] names){

       names = new String[] {"John", "Doe", "Brian", "Loveth", "Chris"};

       for(String n: names){

           System.out.print(n + " ");

       }

       

    }

}

==================================================

<h2>Output:</h2>

John Doe Brian Loveth Chris

<em>NB: To run this program, copy the complete code, paste in an IDE or editor and save as Tester.java</em>

6 0
3 years ago
Other questions:
  • What are some of the challenges that could arise from setting up a file management system on a computer?
    11·1 answer
  • Where is the Outlook Search Folder located?
    5·1 answer
  • When you ____ software, you are adapting it from one type of computer or operating system to run on a different computer or oper
    13·1 answer
  • A company that manufactures machine parts order a new system that makes Products at ten times the speed of earlier machines. the
    13·2 answers
  • As a safe driver, you cannot, __________
    13·1 answer
  • sara has just started using the Internet. She would like to be more efficient . In 3-4, give sara some advice about how to be mo
    5·1 answer
  • If your computer has a ________, someone else can gain access to it undetected.
    10·1 answer
  • Two-dimensional random walk (20 points). A two-dimensional random walk simulates the behavior of a particle moving in a grid of
    14·1 answer
  • You have an audio that contains one pause for 0.2 seconds and another one for 0.6 seconds. When do you need to create a new segm
    5·1 answer
  • True or False? A website for a certain political party or candidate is likely to have unbiased information.
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!