1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotykmax [81]
3 years ago
9

Which of the following would be considered the highest risk portfolio?

Computers and Technology
1 answer:
sashaice [31]3 years ago
4 0

The best option is (C) A portfolio made up of 60% stocks, 30% mutual funds, and 10% Treasury bonds.

There are a lot of risks involved when investing in almost anything. You may end up paying a lot for something that may not be worthwhile and at the end of it all end up losing a lot more than you get. In this case, more than half of the money has been invested in stocks and the prices of stocks change daily. Investing in stocks may give a good return but remains high risk to involve yourself in and should be avoided as much as possible.






You might be interested in
Which environment variable affects the number of past commands used in the current shell session?
scoray [572]
HISTSIZE is the environment variable affects the number of past commands used in the current shell session.
4 0
3 years ago
What is the mean of 9, 25, and 53?
Alex17521 [72]

Answer:

i think its 29

- add all the numbers up and divide by how many numbers there are.

8 0
3 years ago
. What is an APT? What are some practical strategies to protect yourself from an APT?
viva [34]

Answer and Explanation:

Advanced Persistent Threat abbreviated as APT is a type of cyber attack which gives access to the unauthorized user  to enter the network without being detected for a long period.

APTs are generally sponsored by the government agencies of the nation or large firms. For example, one of the ATPs used was Stuxnet in the year 2010 against Iran, in order to put off the nuclear program of Iran.

Some of the practical strategies for protection against APT are:

  • Sound Internal Auditing
  • Strong Password Accessing Policies
  • Stringent policies for accessing any device
  • Introduction and implementation of multi factor authentication
  • Strong IDs and sound honeypot solutions
3 0
3 years ago
Which method(s) must a serializable class, implement?
Cloud [144]

Answer: None of the given option is correct

Explanation:

A serializable class is implemented, when an object is serializable interface. If you want to serialize one of your classes, then the class must implemented in the Serializable interface. To implement the serializable interface, convert a class into the series of bytes and when serializable object might reference your class. Serializable classes are useful when you wanted to persist cases of the class or send them over wire.

5 0
3 years ago
Please add thenodes given below to construct the AVL tree show all the necessarysteps,
Paha777 [63]

Answer:

30,33,37,18,23,34,15,38,40,17

To construct the AVL tree, follow these steps and diagrams are shown in the image:

• Add 30 to the tree as the root node. Then add 33 as the right child because of 33 is greater than 30 and AVL tree is a binary search tree.

• Then add 37 as the right child of 33. Here the balance factor of node 30 becomes 0-2 = -2, unbalanced.

Use RR rotation, make node 33 the root node, 30 as the left child of 33 and 37 as the right child of 33.

• Now add 18 as the left child of 30. And 23 as the right child of 18. Here the balance factor of 30 becomes 2-0 = 2. It’s unbalanced.

Use LR rotation, make 23 the parent of 18 and 30.  

• Now add 34 as the left child of 37 and 15 as the left child of 18. Add 38 as the right child of 37. And then add 40 as the right child of 38.

• Now adding 17 as the right child of 15 makes the tree unbalanced at 18.

Use LR rotation, make 17 as the parent of 15 and 18.

Explanation:

The balance factor of a node can be either 0,1 or -1. Else the tree is called unbalanced at the node.

If the inserted node is in the left subtree of the left subtree of the unbalance node, then perform LL rotation.

If the inserted node is in the right subtree of the right subtree of the unbalance node, then perform RR rotation.

If the inserted node is in the left subtree of the right subtree of the unbalance node, then perform RL rotation.

If the inserted node is in the right subtree of the left subtree of the unbalance node, then perform LR rotation.

7 0
3 years ago
Other questions:
  • _______________________ is a short-term program, typically 30 hours long, in which a therapist, social worker, or trained probat
    5·1 answer
  • All of the following are aspects of the search process except?
    5·2 answers
  • Can you help me, please
    10·1 answer
  • Choose the type of collection described.
    9·1 answer
  • What is the final gear reduction of a compound gear reduction of 36 to 12 for the first stage and 60 to 12 for the second stage?
    7·1 answer
  • Full meaning of CASE in system analysis
    11·2 answers
  • Why is my speedtest is very good but chrome is slow
    11·1 answer
  • ____ is an example of a set of prewritten classes that allows you to access data stored in a database.
    8·1 answer
  • How do I fix when it hits the second session it skips scanf.
    6·1 answer
  • Criminal investigations are limited to finding data defined in the search ____.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!