1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BabaBlast [244]
3 years ago
7

According to the video, what are some employers of Personal Financial Advisors? Check all that apply.

Social Studies
2 answers:
Tatiana [17]3 years ago
7 0

Answer:

B banks, C brokerage firms, E insurance companies

Explanation:

Novosadov [1.4K]3 years ago
6 0

Answer:

B, C, and E.

Explanation:

Got it right on Edge 2020. Trust me.

You might be interested in
Gwendolyn is held up at knifepoint and her young son is kidnapped. Eventually, her son is found and returned. However, she is un
serious [3.7K]

Answer:

The correct answer to the following question will be "Generalized".

Explanation:

Amnesia corresponds to either the memory problems, including data, knowledge, and perceptions.

  • Though losing your identification seems to be a frequent narrative device in films and tv, in actual-life amnesia this is usually not a problem.
  • Generalized Amnesia would be when the amnesia or memory loss of a person covers his or her whole life, including their personality.

So that the given scenario is the example of such type of Generalized Amnesia.

8 0
3 years ago
Shawna is a teacher in a preschool where the classroom has a prepared environment and many sensory-based materials. There is an
liberstina [14]

Answer:

D

Explanation:

Maria Montessori.

Maria Montessori was an Italian educator whose method of making preschool children learn naturally is widely credited and adopted

8 0
3 years ago
How many people are in the world today?
salantis [7]

Answer:

There are about 7.674 billion people in the world.

Explanation:

Hope this helps!! :)

3 0
3 years ago
There are several steps in Information Risks planning. How can you utilize these steps to create a "Security Data Policy for emp
Mariana [72]

Answer: among the many steps in information risk planning, below are the 5 basic steps:

• STEP 1: Identify the risk

• STEP 2: Analyze the risk

• STEP 3: Evaluate or rank the risk

• STEP 4: Treat the risk

• STEP 5: Monitor the risk.

I WILL NOT CONSIDER STEP THREE, BECAUSE I SEE ALL RISK TO BE THE SAME, THE ONE YOU ASSUME TO BE A HIGH RISK MAY NEVER OCCUR, WHILE THE ONE YOU ASSUME TO BE A LOW RISK MAY OCCUR FREQUENTLY. SO I WILL GIVE EQUAL ATTENTION TO ALL RISK IDENTIFIED.

In using this steps I have to take is orderly.

FIRST STEP: identifying the risk, in this first step I will have to identify all the risk that are involved in information security, which could be data lost from a computer or data theft from a personal computer.

SECOND STEP: Analyse the risk. I will study easy risk, how can data be stolen from an employee personal work computer, and how can data be lost from an employee work computer. To analyze this risk, data can be lost from an employee computer, if the system has been corrupted by a virus, if the system hard disc crash, if the system was mistakenly formated, and if the system is poorly maintained. Data can be stolen from a system if the system is been hacked, if the system has no password, and by stealing the hard disc in the system.

THIRD STEP: Evaluate or rank the risk. This is where you evaluate each risk, to know the high risk and the low risk, and to know the level of precaution to be used. I will not consider this step because I believe all risk are high and anyone can occurs any day, so the chance of all risk is the same, and the level of precaution to be taken in all risk should be the same.

FOURTH STEP: Treat the risk. In this step I will treat all the risk I discovered in the second step. For data security in terms of theft, special security code will be generated for all employee computer, which will be known only by the employee who use the computer. All staff are meant to leave the office when working hours is over, or work with the security personnel if the staff works overtime, to avoid theft of hard disc. Staffs will be educated to avoid clicking links from an unknown source, to avoid been hacked. For data security in terms of lost. All staff will back up their files in a cloud. All staff will be educated on the usage of computers to avoid formating the system by mistake. They will be an updated anti virus, to quarantine the system from virus, which can damage data.

FIFTH STEP: Monitor and review the risk. The risk will be monitored constantly, by updating virus always, changing of password to each system at least once in a month, monitoring each staff usage of the computer, updating the IT unit with recent technologies and softwares, updating the security on their duties. As the risk is been monitored, I will watch out for more risk to be identified.

5 0
3 years ago
<br />ENTREPRENEURSHIP<br />1. What is entrepreneurship? (1)<br />2. What are good the characteristics of an e
nadya68 [22]

Answer:

Entrepreneurship is the creation or extraction of value.

Passion

Decision making

Vision

Confidence

Management skills

Explanation:

Entrepreneurship is defined as the act of starting and running your own business or a tendency to be creative and wish to work for yourself in your own ventures.

3 0
3 years ago
Other questions:
  • Dinesh takes a look through his office desk and makes a mental note of the supplies he needs to replenish. On the way to the sup
    9·1 answer
  • Researchers gave participants varying amounts of a new "memory" drug. Then they gave them a story to read, and measured their sc
    6·2 answers
  • Can someone give me a summary about Cars (the movie) the original movie
    14·1 answer
  • The Greece empire spread all the way in the East to India
    10·2 answers
  • Under the United States Constitution, some powers belong to the federal government. Which of these is NOT a power solely of the
    5·1 answer
  • Many people who lived in cities
    6·1 answer
  • State and explain four attitudes and<br> behaviours of a responsible family member
    10·1 answer
  • In western societies, the typical family form is the _____, composed of married parents and their biological or adopted children
    7·1 answer
  • In the context of the sociocultural factors in emotion, paul ekman's careful observations reveal that?
    14·1 answer
  • Most deaths in tropical cyclones (hurricanes, typhoons, etc.) are the result of ________
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!