1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Inessa [10]
4 years ago
6

Who would be a tippee for purposes of insider trading? a. a janitor who gathers information by reading files on corporate counse

l's desk b. an MBA student who tracks the market very closely c. a broker who once worked in the pharmaceutical industry d. All of the above would be tippees.
Computers and Technology
1 answer:
vesna_86 [32]4 years ago
3 0

Answer:

Option A is correct.

Explanation:

A janitor that collects data through reviewing reports on a business counsel's desk could be a tippee for insider trading activities.

Probably, the justification for insider trading remains wrong being that it offers each insider the undue benefit on and around the marketplace, gets the insider's preferences beyond them for which they assume the trustee responsibility, as well as enables the insider to unfairly manipulate the cost of the inventory of a business.

So, the following are the reason the other options are not correct according to the given scenario.

You might be interested in
Write a C Program to Print the initial letter of Name Ferdous
Murrr4er [49]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The question is about writing a C program that prints the initial letter of Name Ferdous.

Therefore, below is the given complete code that prints the first letter of the name Ferdous.

<em>#include <stdio.h> </em><em>/*import strandard input/output library*/</em>

<em>#include<string.h></em><em> /*import string library to handle string type of data*/</em>

<em> </em>

<em>int main(void) </em><em> /*started the program execution- program entry point*/</em>

<em>{ </em>

<em>char *str = "Firdous";</em><em>   /*char to pointer str contains string "Firdous"*/</em>

<em>int len = strlen(str);  </em><em> /*this line of code is not neccary, but if you print other character for example last character of the name then you can use it*/</em>

<em>printf("First Letter of the name is: %c", str[0]); </em><em>  /*print first letter of the name*/</em>

<em>} </em><em>  /**program terminated*/</em>

5 0
3 years ago
What is a risk or an effect of software piracy?
Butoxors [25]
Piracy is a term used to describe the practice of obtaining or using software in a manner that is illegal or not in keeping with the terms under which the software was distributed. This can range from purchasing or copying the software, to using the software without a license, to selling, renting, or otherwise distributing it without authorization.<span>The Business Software Alliance estimated the losses to software companies in 2005 as a result of piracy at over $30 billion.</span>
5 0
4 years ago
Read 2 more answers
What should the shutter speed be on the camera?<br> A. 1/30<br> B. 1/50<br> C. 1/60<br> D. 1/15
11Alexandr11 [23.1K]

Answer:

C. 1/60

Explanation:

Shutter speed is most commonly measured in fractions of a second, like 1/20 seconds or 1/10 seconds. Some high-end cameras offer shutter speeds as fast as 1/80 seconds. But, shutter speeds can extend to much longer times, generally up to 30 seconds on most cameras.

But in this case C. 1/60 is the answer.

6 0
3 years ago
You are setting up a small network. The customer has decided to change his internet service provider (ISP) to EtherSpeed. The IS
salantis [7]

Home pc1 becouse it is the right one

3 0
3 years ago
Which functions are available in a Word table? Check all that apply.
dexar [7]
All of them are available
3 0
3 years ago
Other questions:
  • Alex is setting up a network for his company's computers. He installs a circuit board into each computer, enabling it to be conn
    15·1 answer
  • Choose the reasons why Windows Server operating systems are a popular choice for a network because they _____. Select all that a
    12·1 answer
  • Which type of page of replacement algorithm is Windows XP and Unix are using?
    15·1 answer
  • Developers and organizations all around the world leverage ______ extensively.
    9·2 answers
  • Which data type requires the greatest number of bytes in computer memory? A. character B. integer C. single-precision number D.
    14·1 answer
  • Does the brain play a role in smartphone addiction
    7·2 answers
  • Which of the following does Moore's law predict?
    15·1 answer
  • What do “phone-copying” systems allow investigators to do?
    9·1 answer
  • MAN speeds are faster than WAN speeds because of ________. technological limitations regulatory limitations
    6·1 answer
  • Consider the following code segment, which is intended to create and initialize the two-dimensional (2D) integer array num so th
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!