1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotykmax [81]
3 years ago
9

Which of the following would be considered the highest risk portfolio?

Computers and Technology
1 answer:
sashaice [31]3 years ago
4 0

The best option is (C) A portfolio made up of 60% stocks, 30% mutual funds, and 10% Treasury bonds.

There are a lot of risks involved when investing in almost anything. You may end up paying a lot for something that may not be worthwhile and at the end of it all end up losing a lot more than you get. In this case, more than half of the money has been invested in stocks and the prices of stocks change daily. Investing in stocks may give a good return but remains high risk to involve yourself in and should be avoided as much as possible.






You might be interested in
What is the purpose of the overload keyword in the ip nat inside source list 1 pool nat_pool overload command?
Deffense [45]
<span>The purpose of the overload keyword in the ip nat inside source list 1 pool nat_pool overload command is that </span>It allows many inside hosts to share one or a few inside global addresses. 
8 0
3 years ago
Under the Gramm-Leach-Bliley-Act (GLBA), banks must protect customer privacy. A given bank has just implemented its online banki
d1i1m1o1n [39]

Answer:

System/Application Domain and LAN-to-WAN Domain.

Explanation:

The Gramm-Leach-Bliley-Act is also referred to as the Financial Services Modernization Act of 1999. It was enacted by the 106th Congress of the United States of America and it requires that financial institutions explain to their customers the information sharing policies and ensure that customer sensitive data (privacy) is safeguarded.

This, under the Gramm-Leach-Bliley-Act (GLBA), banks must protect customer privacy.

In this scenario, a given bank has just implemented its online banking solution that allows customers to access their accounts and perform transactions via their computers or personal digital assistant (PDA) devices.

Hence, online banking servers and their public Internet hosting would fall within the System/Application Domain and LAN-to-WAN Domain.

In an IT infrastructure, there are seven main domains and these are the: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, Remote Access Domain, WAN Domain, and System/Application.

3 0
3 years ago
What is a device that connects to the system unit and is controlled by the processor in the computer called !
Airida [17]
Most computers have three types of ports: serial, parallel, and USB. A serial port is a type of interface that connects a device to the system unit by transmitting data only one bit at a time. Serial ports usually connect devices that do not require fast data transmission rates, such as a mouse, keyboard, or modem.
4 0
3 years ago
You view a portion of a document on the screen through a
Stells [14]

Answer:

Document window is through which we view the portion of a document.

Explanation:

We have many portions like tabs, ruler, ribbon, etc in word. There is one another feature called Document Window in word where it represents the actual view of a document in GUI (Graphical User Interface) operating system.

Here the actual contents of the page are created and the user can also insert various shapes based on the need.  Any feature in the tabs can be included in the document window. You can set the zoom size of the document according to the need.

6 0
3 years ago
Date Time Manipulation Exploration If you start from Jan 1st, 1757, and repeatedly add 8 days, until you hit 1800, how many time
zimovet [89]

Answer:

from datetime import datetime, date, timedelta

def count_weekdays(start_date, add_days, stop_year, weekday):

   my_date = start_date

   m = 0  

   while my_date.year != stop_year:  

       my_date = my_date + timedelta(days = add_days)

       if my_date.isoweekday() == weekday:

           m += 1

   return m

date_val = date(1757,1,1)

try:

   date_val = datetime.fromisoformat(input("Enter date in the format yyyy-mm-dd: "))

except ValueError:

   print("Wrong isoformat string")

print(count_weekdays(date_val, 8, 1800, 1))

Explanation:

The datetime package of the python programming language has several time modules like the date, datetime, pytz, timedelta, etc, used to manipulate date and time in documents. The function count_weekdays has four parameters and returns the number of a specified weekday in a period of time.

4 0
3 years ago
Other questions:
  • When an object is selected, it is surrounded by ________, which allow you to change the size of the object.?
    5·1 answer
  • For Official Use Only (FOUO) and Controlled Unclassified Information (CUI) may include all of the following except: (circle one)
    10·1 answer
  • A(n) _____ might be written by a programmer or it might be created through a DBMS utility program.
    6·1 answer
  • How can a network design project benefit from the principles of itsm? How might itsm impede a network design project?
    11·1 answer
  • Which feature does the web designer fail to apply in this layout for a web page? A. harmony
    8·2 answers
  • Create a class named Circle with fields named radius, diameter, and area. Include a constructor that sets the radius to 1 and ca
    7·1 answer
  • Which of the following is the largest unit of information?
    15·2 answers
  • A pangram is a sentence that contains all the letters of the English alphabet at least once. For example, the quick brown fox ju
    6·1 answer
  • What is the Keyboard shortcut to change the case of selected text?
    6·1 answer
  • Using the _____, you can direct the browser to retrieve specific information about the URL, to reload the current page, or to lo
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!