1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natali [406]
3 years ago
6

Simonne is developing a program. She names a variable %due, but then recognizes that this name violates a variable naming conven

tion. What naming convention does it violate?
Variable names must be at least five characters in length.
Variable names must begin with a number.
Variables names cannot include a percent sign (%).
Variables names cannot include the letter e.
Business
1 answer:
umka21 [38]3 years ago
8 0

Answer:

Variables names cannot include a percent sign (%).

Explanation:

You might be interested in
A city government uses eminent domain to seize property for a new public high school complex. Which of the following statements
Evgesh-ka [11]

Answer:hi

Explanation:

The format for the equation of a circle is (x-h)^2+(y-k)^2=r^2, where (h,k) is your center and r is your radius. All we have to do is substitute the correct values, giving us the equation (x+2)^2+(y-1)^2=4

7 0
3 years ago
You own a portfolio of two stocks, a and
Furkat [3]
Stock a is $2000. Calculate 10.5% of $2000, which equals $210.
Stock b is $3000. Calculate 14.7% of $3000, which is $441.

The expected return on the portfolio is $210 + $441, which equals $651. 
7 0
3 years ago
You own the following portfolio of stocks. What is the portfolio weight of Stock C?
LuckyWell [14K]

Answer:

38?59%

Explanation:

Calculation for the portfolio weight of Stock C

First step is to calculate the Total Value of Stock A to Stock D in the Portfolio using this formula

Total Value of stock A to stock D in Portfolio = Number of Shares * Stock Price

Let plug in the formula

Total Value of stock A to stock D in Portfolio = (A 120 *$32)+ (B 750* $28)+ (C 450* $52) +(D 240* $51)

Total Value of stock A to stock D in Portfolio = A $3,840+ B$21,000+C$23,400+D$12,240

Total Value of stock A to stock D in Portfolio=$60,480

Last step is to calculate the portfolio weight of Stock C using this formula

Portfolio weight of Stock C =Stock C /Total Value of stock A to stock D in Portfolio

Let plug in the formula

Portfolio weight of Stock C= 450 *$52/$60,480

Portfolio weight of Stock C=$23,400/$60,480

Portfolio weight of Stock C=0.3869*100

Portfolio weight of Stock C=38.69%

Therefore the Portfolio weight of Stock C will be 38.69%

7 0
3 years ago
Which of the following will require you to pay back any money you recieve
AlexFokin [52]
That's not a question, but the proper answer should be a loan.
6 0
3 years ago
Which security procedure is being demonstrated if an administrator is using Wireshark to watch for specific inbound and outbound
REY [17]

Answer:

The correct answer is firewall monitoring.

Explanation:

Only implementing the necessary security tools (Firewall and other security devices) in itself will not secure your network, since the security data of the tools should be analyzed and the security information extracted should be informed or alerted to ensure that the network is secure. Therefore, the analysis of Firewall logs and other logs of security devices is vital to network security.

Firewall logs provide a lot of information about security threats attempts at the periphery of the network and about the nature of incoming and outgoing traffic from the firewall. The analyzed firewall log information provides administrators with real-time data about security threats attempts so that they can quickly initiate a remediation action. It allows you to plan your bandwidth requirement based on its use in all firewalls. The analysis of firewall security logs plays an important role in the assessment of business risks. The analysis of firewall traffic logs is vital to understand the use of bandwidth and network. OpManager, in addition to monitoring the network, also analyzes firewall logs and offers many features that help in the collection, analysis and generation of reports about firewall logs.

5 0
3 years ago
Other questions:
  • What advice does Lisa Marie Ford have for people interested in a career in marketing or business? (Site 1)
    9·2 answers
  • Describe an example of an equity investment that can also produce income. (1-3 sentences)
    14·1 answer
  • Helpp please 10 points!<br><br> 2. What are Internal and external factors.
    5·1 answer
  • Fixed cost refers to: Group of answer choices the consideration exchanged for the ownership or use of a good or service. total e
    7·1 answer
  • On November 1, 2018, Taylor signed a one-year contract to provide handyman services on an as-needed basis to King Associates, wi
    12·1 answer
  • Indicate how each item should be classified in the statement of cash flows using these four major classifications: operating act
    14·1 answer
  • Which of the following statements correctly describe a contemporary approach to create the Work Breakdown Structure (WBS) for a
    10·1 answer
  • You arrive at the local convenience store to find out that a robbery has just occurred. The store clerk appears to have been sta
    9·2 answers
  • Hale Company purchased two identical inventory items. The item purchased first cost $22.00. The item purchased second cost $25.0
    10·1 answer
  • 2. If information is disseminated, what happens to it?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!