1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Hitman42 [59]
3 years ago
15

Anderson uses his computer and internet link to chart the movement of his favorite 46 stocks. He buys and sells according to the

analysis he does of the price charts on these stocks. If he can generate consistent abnormal returns in this manner then this is a failure of weak form efficeincy semi-strong form efficeincy strong form efficincy all of the above none of the above
Computers and Technology
1 answer:
gulaghasi [49]3 years ago
8 0

Answer:

The answer is: weak form efficiency

Explanation:

The efficient market hypothesis is a financial theory that puts forward the concept of informational efficiency in capital markets. The weak form of informational efficiency dictates that the past price data and market expectations are already included in the price movements of an asset in a given capital market. If this holds true, then technical analysis (examining historical price data of an asset) will not yield any benefits when evaluating investment decisions. If Anderson can generate abnormal returns via technical analysis then the market is not weak form efficient.

You might be interested in
echnician A says that underinflation can increase the rolling resistance of a tire. Technician B says that underinflation can ca
max2010maxim [7]

Answer:

c)both a and b

Explanation:

If the tires are under inflated the the rolling resistance increases due to more surface are of tire now touches the ground hence there is more friction.Since the rolling resistance increases the tire will face difficulty in turning hence the steering the tires will become more hard.Since rolling resistance is increased so the engine has to work more to run the car hence it will consume more fuel.

4 0
3 years ago
Write any two rules for writing algorithm​
inessss [21]

Answer:

1) = input and output should be defines precisely

2) = it shouldn't include computer code

5 0
3 years ago
How can you tell if a hacker has administrative access?
olga55 [171]
I don't think you can know because if the hacker is smart he or she will know to cover up their tracks
8 0
3 years ago
Read 2 more answers
Discuss what repetitions structures are, and how they differ from the vectorization approaches we have previously studied in the
gogolik [260]

Repetition structures, or loops, are used when a program needs to repeatedly process one or more instructions until some condition is met, at which time the loop ends. Many programming tasks are repetitive, having little variation from one item to the next. Vectorized mathematical code appears more like the mathematical expressions found in textbooks, making the code easier to understand. That is the difference. Hope I could help you on Brainly.com!

6 0
3 years ago
Write at least and explain four types of escape sequences and create an example in an IDE which consist of the mentioned escape
slamgirl [31]

Answer:

- \' is used to escape a single quote in a string enclosed in single quotes like;

my_string = 'this is John\'s ball'.

- \n is used to jump to a new line, Eg;

my_string = "Johns is a good boy\nbut he hates going to school."

the next set of the string after the '\n' character is displayed on the next line.

- \t is used to add a tab space to a string.

my_string = 'Jane is \thungry'

the character adds four character spaces before the word 'hungry'.

- \r adds a carriage return (or enter in keyboards) to start a new block paragraph in a string.

my_string = "Johns is a good boy\rbut he hates going to school."

Explanation:

Escape sequences in programming are used to format strings or output syntax of a program. They always begin with the backslash. Examples of escape sequence are " \' ", "\n", "\t", "\r", etc.

5 0
3 years ago
Other questions:
  • User accounts will be locked out after authentication is attempted
    7·1 answer
  • What is one problem you should keep in mind when researching information on the Internet?
    6·2 answers
  • Which does plug-and-play refer to?
    13·2 answers
  • Websites that group individuals and organizations into clusters or groups based on some sort are considered to be what type of n
    11·1 answer
  • Provide the instruction type, assembly language instruction, and binary representation of instruction described by the following
    7·1 answer
  • What is the difference between amplifier and the repeater?
    11·1 answer
  • You buy a new workstation that features an embedded RAID controller on the motherboard. You want to setup hardware RAID 10. How
    10·2 answers
  • How many characters does the "short text" have?
    9·1 answer
  • What are the origins of the parking barrier?
    12·1 answer
  • PLS HURRY<br> Look at the image below
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!