Answer:
An environmental support group creates a spoof of the advertisement of a popular beverage company, highlighting its degradation of the environment by releasing waste products into the water bodies near its bottling plant.
Explanation:
An example of typosquatting is an environmental support group creates a spoof of the advertisement of a popular beverage company, highlighting its degradation of the environment by releasing waste products into the water bodies near its bottling plant.
Answer:
You need to deposit $58,481.53 today.
Explanation:
a) Data and Calculations:
Future value expected = $125,000
Period of investment = 7 years
Interest rate = 11% compounded quarterly
The amount of deposit needed today to earn $125,000 in 7 years at annual interest rate of 11% is calculated as follows:
N (# of periods) 28
I/Y (Interest per year) 11
PMT (Periodic Payment) 0
FV (Future Value) 125000
Results
PV = $58,481.53
Total Interest $66,518.47
Answer:
The price of 3 months call option on stock is 8.03.
Explanation:
Acording to the details we have the following:
P = Price of 3-months put option is $6
So = Current price is $95
X = Exrecise price is $95
r = Risk free interest rate is 9%
T = Time is 3 months=1/4
C=Price of call option?
Hence, to calculate what must be the price of a 3-month call option on C.A.L.L. stock at an exercise price of $95 if it is at the money, we have to use the formula from put-call parity.
C=P+So-<u> X </u>
(1+r)∧T
C=$6+$95- ( <u>$95 )</u>
(1+0.09)∧1/4
C=$6+$95-$92.97
C=8.03
The price of 3 months call option on stock is 8.03
Please find attached full question Answera and Explanation:
Risk posture or cybersecurity posture is the general status or overall defense of the cybersecurity program in place in an organization to guard against cyber attacks and data breaches. For a company to maintain reasonable cyber security posture as there is no fool proof cybersecurity posture, there is need for regular continuous assessment of risk exposures and potential loopholes across the company's digital infrastructure. There are different digital and sophisticated infrastructures utilized by am organizations and most if not all are well prone to cyber attacks. These infrastructures are used by employees for work e. g-email, went servers, phones, networking devices and cloud programs etc . Therefore each employee must be educated in the need to safeguard company data by looking out for traps set by cyber attackers such as phishing in email and many other loopholes. Vulnerability tests need to be performed at regular intervals and reports monitored and analyzed to protect against a potential source of cyber attack.
