1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
cluponka [151]
3 years ago
11

Stock ____ firms trade financial securities between a buyer and a seller.

Computers and Technology
1 answer:
diamong [38]3 years ago
3 0
<span>Stock market firms, also known as brokerage firms, assist in the act of buying and selling financial securities. These trades are financed through financial institutions for security.</span>
You might be interested in
1) SuperFetch is a memory-management technique that a) determines the type of RAM your system requires. b) makes the boot-up tim
Ira Lisetskai [31]

Answer:

c

Explanation:

It preloads the apps and softwares that you use most into thr memory so that they can boot up faster.But it consumes more ram.

5 0
3 years ago
The picture that graphically represents the items you use in windows is called a/an
oee [108]
<span>The picture that graphically represents the items you use in windows is called a/an icon.</span>
7 0
4 years ago
Write the function lettersOnly(s) that takes in a string called s, and returns a string containing only the alphabetic character
Phantasy [73]

Answer:

The program to this question as follows:

Program:

def lettersOnly(s): #defining method lettersOnly

   val="" #defining string variable that return value

   for i in s: #defining loop to calculate value

       if(i.isalpha()): #check condition that value is string

           val=val+ i #add value

   return val #return value

print(lettersOnly("data3base_ro1c3k5s")) #call method and print value

Output:

databaserocks

Explanation:

In the above python code, a method lettersOnly is declared that accepts a string variable  "s" in its parameter. Inside the method, a string variable "val", and loop is declared, in which the "val" variable holds method return value.

  • In the loop and if block is used that uses "isalpha" string method, which checks the check alphabetic character in the given value. if this is true it will calculate all value in "val" variable and return its value.    
  • At the last, the print method is used, which calls the lettersOnly method and prints its return value.
4 0
3 years ago
While conducting a vulnerability assessment, you're given a set of documents representing the network's intended security config
Sophie [7]

Answer:

The baseline review

Explanation:

Solution:

The baseline review: this can be defined as the gap analysis or the beginning environmental review (IER). it is an assess study to get information about an organisation's present activities and associated environmental impacts,  impacts and legal requirements.

This review issues an overview of the quality and weaknesses of an organisation’s environmental execution and opportunities for improvement.

6 0
3 years ago
To assign a conditional value, use the ____ function.
zubka84 [21]
<span>To assign a conditional value, use the IFF function.  It is an abbreviation for  Immediate If.  It is a function </span>on spreadsheets that returns the second or third parameter based on the evaluation of the first parameter.  <span>You use </span>IIf<span> to determine if another expression is true or false. If the expression is true, 
</span>IIf<span> returns one value; if it is false, </span>IIf<span> returns another.</span>
3 0
3 years ago
Other questions:
  • Austin works as a department head and frequently uses presentations to deliver information to his staff. He relies heavily on pr
    5·2 answers
  • The ListIterator interface
    13·1 answer
  • At what two layers of the osi model are lan and wan protocols likely to differ??
    7·1 answer
  • Diane wants to maintain a record of percent change in sales from the year 2000 to the present year. She enters the values of per
    10·1 answer
  • What are the reasons why is it necessary to evaluate online sources and content?
    6·1 answer
  • rite a program that prompts the user to enter an integer and displays each of its numbers one by one.
    9·1 answer
  • The domain is the part of an Internet address that refers to a group of computers on a network
    13·1 answer
  • Help me plzzzz ASAP T-T and it's Cyber Security but my last day of school is tomorrow and I'll graduate in June 24 so plzzzzz I
    12·1 answer
  • How can you ensure that the website you are using is secured?
    8·1 answer
  • Write down the stages in the information prcessing cycle in correct order​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!