1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mash [69]
3 years ago
12

Before you ever buy your first stock or bond, it's important to understand what type of investor you are. This depends on a numb

er of factors, including your investment objectives, your time horizon, your tolerance for risk, your personal investment experience, and your overall financial situation. There are three general categories of investors: The conservative investor values protecting principal over seeking capital appreciation. This investor is comfortable accepting lower returns for a higher degree of stability and/or liquidity. The conservative investor wants to minimize risk and loss of principal. The moderate investor values reducing risks and enhancing returns equally. This investor is willing to accept modest risks to seek higher long-term returns. A moderate investor may endure short-term loss of principal and a lower degree of liquidity in exchange for long-term capital appreciation. The aggressive investor values maximizing returns and is willing to accept substantial risk. This investor believes that maximizing long-term returns is more important than protecting principal in the short term and understands that this may mean enduring volatility and significant losses. Liquidity generally isn't a consideration for the aggressive investor. Which of these categories best describes you?
Computers and Technology
1 answer:
Oksi-84 [34.3K]3 years ago
6 0

Answer:

Moderate investor

Explanation:

The moderate investors are most popularly known as 'Balanced investors'. They accepts the risk to principal and they adopt the balanced approach. They mainly uses a mixture of bonds and stocks.

They values the reducing risks and then enhancing the returns equally. They accepts modest risks so as to ensure higher long term returns.

You might be interested in
1. Potential incidents represent threats that have yet to happen. Why is the identification of the threat important to maintaini
lawyer [7]

Any test practices end-user he or she does by step by step process for quality testing. Some end-user will have a checklist to do while testing any software or hardware installing.

A hacking end-user has to do the test process if he or she has to follow some steps during testing.

<u>Explanation:</u>

This process is called penetration testing, in other words, it is called pen-testing.

1. In the digital world, security plays an important role. Before any potential incidents taking place, security threats have to handle properly. Before hacking takes place for pc or workstation or desktop, the end-user has to identify and take proper action.

Mostly all threats happen in c:\users\appdata folder in windows operating system

2. Penetration testing is used to for hacking purpose testing.

a. Step by step method is followed.

b. Best practice testing on network security, computer system, web system and find vulnerability check.

c. The pen test method is involved in legal achievements on network

d. To identify vulnerability assessment inside a network

6 0
3 years ago
You select a database or change to a different database with the ____ function.
saw5 [17]
The USE statement switches to a different database.
8 0
3 years ago
Assume that x is a string variable has been given a value. Write an expression whose value is true if and only if x is an hexade
Lady bird [3.3K]

Answer:

import string

all(c in string.hexdigits for c in s)

Explanation:

The hexadecimal number system, often abbreviated as "hex", is a numeral system which consist of 16 symbols (base 16). The standard numeral system we are all use to, called decimal (base 10) and utilizes ten symbols: 0,1,2,3,4,5,6,7,8,9.

Using python programming language

import the  string module

the second expression iterate through the digit in s and confirm if they all are within the rage of 0 -9 ad A -F. If yes , it returns True and else, it returns false

6 0
3 years ago
Dropbox and Microsoft's OneDrive are both popular applications for storing files. What is a fundamental difference between Dropb
Paha777 [63]

The difference is that Dropbox  offers just 2 GB free storage space while  Microsoft's OneDrive gives 5 GB in terms of free storage space.

<h3>What is Microsoft OneDrive?</h3>

This  is known to be a file hosting software and it also does synchronization service given by Microsoft.

Some other  fundamental difference between Dropbox and OneDrive in terms of  Business is that Dropbox is known to often give unlimited storage for about $20 to paid user/month while OneDrive is said to only give unlimited storage for $10 per paid user/month.

Learn more about Dropbox from

brainly.com/question/20935392

5 0
2 years ago
Assume a future where security counter measures against DoS attacks are much more widely implemented than at present. In this fu
Amiraneli [1.4K]

Answer:

yes administrators have to be concerned

Explanation:

It is necessary for countermeasures to be taken against DoS attacks

The types of attacks that can still occur are:

If the network connection get to be overloaded,  there could be flash crown of this computer system and fraudulent activities maybe initiated. By flash crowd  we mean that the there is a great deal of traffic on the system and this could cause the network connection to be destroyed.

To reduce the impact of this kind of attacks,

1. there should be enough or excess network bandwidth  and distributed servers should be replicated if there is a possibility that network could get to be overloaded.

2. restriction is more commonly done on sporting sites. Restriction brings about an increase in implementation cost.

3. The impact of this type of attack can be reduced by stopping unwanted traffic throught the implementation of filters

4. Use strong antivirus on computer sytems that are used to connect to the internet

7 0
3 years ago
Other questions:
  • You are preparing to program a replacement system board, but the "system is booting in mpm mode" message is not displayed. what
    10·2 answers
  • The computer mouse is used to
    7·1 answer
  • Which of the following is an unintended consequence of pesticide use on crops?
    10·1 answer
  • In a game, your character cleverly places an electronic bug on an unsuspecting felon's jacket to track his movements. The bug tr
    10·2 answers
  • During a night flight, you observe a steady red light and a flashing red light ahead and at the same altitude. What is the gener
    11·1 answer
  • What is the safest way to shut down a desktop or laptop computer?
    8·1 answer
  • When using file explorer, the right-hand pane that shows the files and folders of the selected area is called the pane?
    7·1 answer
  • Anyone wanna join zoo m???????​
    10·2 answers
  • Which person would be the best fit for a career in the Information Technology field?
    6·2 answers
  • which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!