1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inessa [10]
3 years ago
6

Who would be a tippee for purposes of insider trading? a. a janitor who gathers information by reading files on corporate counse

l's desk b. an MBA student who tracks the market very closely c. a broker who once worked in the pharmaceutical industry d. All of the above would be tippees.
Computers and Technology
1 answer:
vesna_86 [32]3 years ago
3 0

Answer:

Option A is correct.

Explanation:

A janitor that collects data through reviewing reports on a business counsel's desk could be a tippee for insider trading activities.

Probably, the justification for insider trading remains wrong being that it offers each insider the undue benefit on and around the marketplace, gets the insider's preferences beyond them for which they assume the trustee responsibility, as well as enables the insider to unfairly manipulate the cost of the inventory of a business.

So, the following are the reason the other options are not correct according to the given scenario.

You might be interested in
This semester we looked at three languages (C++, Java and Python). One common rule in all three class checklists (for C++, Java
Marysya12 [62]

Answer:

The languages C++, Java, Python are Object Oriented Programming languages. What this means is that we create classes and then instantiate those classes. In C++ and Java, we use the new operator to instantiate the classes. So, if we want to display some data when we try to print the instance just like we print the variables of data types like int, double, string etc, we need to define what we need to display. It is because, class are just like data types like int, double etc. But as they are defined by the developer according to his/her needs, so the developer has to define what to print when they are printed.

5 0
3 years ago
Universal Containers has the following requirements:• Enable VIP community access once a customer has reached $1 million in reve
Dima020 [189]

Answer:

A. Create a profile that has permissions to the VIP information and assign it to the VIP community users.

Explanation:

Salesforce is a customer rapport management platform that is based on the cloud. There are program applications for sales, marketing and services. The platforms are utilized to achieve an enhanced relationship with customers because they have a better understanding the need of their customers and how to solve their problems by organization and managing their customers' information and interactions.

VIP users will get access to the information they want when there are permissions set for the VIP users. VIP information will be given to the VIP customers in order for them to carry out activities that they need to do to execute their job.

6 0
3 years ago
Which of the following software is an
krok68 [10]
The answer is B:McAfee
3 0
2 years ago
Read 2 more answers
Eve has tricked Alice into decrypting a bunch of ciphertexts that Alice encrypted last month but forgot about. What type of atta
NISA [10]

Answer:

Eve is employing a <u>chosen-ciphertext attack.</u>

Explanation:

Encryption is a strategy employed in the cyber world to allow sensitive and private data to be unreadable in the form of text or make the content of the data inaccessible by intruders. This is imperative to guard data and can only be accessed with the use of a key (password). Whoever has the authorized key could get access to the data thereby making the encrypted data readable in the process called Decryption.

The Ciphertext is a term used to explain data encrypted in the form of text.

When Eve tricked Alice into decrypting a bunch of ciphertexts, she was interested in having the general public key or private key depending on what she wants to get access to which makes it a chosen-ciphertext attack. Usually, these keys are in algorithm formats with long characters. When the chosen-ciphertext is analyzed by Eve, then she could guess the user secret key.

3 0
3 years ago
Oops, we made a mistake: we created a key "short" and gave it the value "tall", but we wanted to give it the value "long" instea
AnnZ [28]
Be consistent in whether you use single or double quotes to declare your strings: our autograder assumes you'll be consistent.
3 0
3 years ago
Other questions:
  • You can leave out the ____ statements in a switch structure.
    15·1 answer
  • How does emotional awareness help you with non-verbal communication?
    13·2 answers
  • An application with which you can perform calculations on numbers and work with other data
    8·1 answer
  • Which of the following is true about sorting functions?
    14·1 answer
  • Decision support systems help managers use structured data to identify problems and find solutions to business-related problems.
    10·1 answer
  • Why is a computer called"a computer"?​
    12·2 answers
  • Busco a talcotalco38
    14·2 answers
  • Which type of attack can be addressed using a switched ethernet gateway and software on every host on your network that makes su
    7·1 answer
  • (e) The entries in each column of the array A are sorted into strictly increasing order.
    11·1 answer
  • what option can be used to create vpn connections that can be distributed to users' computers so that vpn clients do not have to
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!