TRUE/FALSE. under the uniform securities act, a person who owns a business providing advice on commodity futures contracts as well as limiting its securities advi

Answers

Answer 1

The person who owns a business providing advice on commodity futures contracts is not required to register as an investment adviser in the state.

The question is referring to federal covered adviser which the futures contracts doesn't considered as securities. The Investment Advisers Act of 1940 explained that the definition of investment adviser is specifically excluded for a person whose securities advice is confined to securities guaranteed or issued by the Treasury.

So, from the Investment Advisers Act of 1940 we know that person is covered under NSMIA so that person is not subject to state regulation as an investment adviser.

You question is incomplete, but most probably your full question was

Under the Uniform Securities Act, a person who owns a business providing advice on commodity futures contracts as well as limiting its securities advice to those issued or guaranteed by the U.S. government is

not required to register as an investment adviser in the state

required to be a registered investment adviser in the state

required to be a registered investment adviser representative in the state

required to be a registered agent in the state

Learn more about futures contract here:

brainly.com/question/29802405

#SPJ4


Related Questions

Fill in the blank: To keep your content calendar agile, it shouldn’t extend more than ___________.

two weeks

one month

three months

six month

Answers

To keep your content calendar agile, it shouldn’t extend more than three months.

Thus, A written schedule for when and where content will be published is known as a content calendar.

Maintaining a well-organized content marketing strategy is crucial since it protects you from last-minute crisis scenarios and enables you to consistently generate new material and calender agile.

As a result, after the additional three months, it was unable to maintain your content calendar's agility.

Thus, To keep your content calendar agile, it shouldn’t extend more than three months.

Learn more about Calendar, refer to the link:

https://brainly.com/question/4657906

#SPJ1

Match the example with the type of collection.
___('casa': 'house')
___[3,5]
___(3, 5, 'dog')
A) list
B)tuple
C)dictionary

Answers

Answer:

1.c

2.list

3.tuple

Explanation:

Dictionary—('casa': 'house'), List - [3,5], Tuple - (3, 5, 'dog') are the example with the type of collection. Hence,

What is collection?

A collection is a group of things, usually one that someone has assembled. For instance, many kids have a collection of comic books. The term "collection" contains the word "collect." If you enjoy collecting things, there's a good chance you already have a collection of some kind.

4 The Concept of "Collection" A collection is a gathering of things that have been picked out with a specific goal in mind. Similar ideas include Set, Aggregation (data modeling), Dataset (science and business), and Corpus (linguistics and literary analysis). We favor collecting since it is less defined and has fewer connotations.

Old French collection, a noun of action from the past-participle stem of colligere ('gather together'), is derived from Latin collectionem (nominative collectio), which means 'a gathering together'.

Thus, words are arranged above,

For more information about collection, click here:

https://brainly.com/question/19053793

#SPJ5

Can someone help me by showing how to convert this java in HIGH LEVEL ASSEMBLY(HLA).That would be great.

import java.util.Scanner;

public class DollarValueMenu {
public static void main(String[] args) {
Scanner scanner = new Scanner(System.in);
System.out.print("Feed me your order as 4 hex digits: ");
String input = scanner.nextLine();

// Extract the individual digits from the input string
int digit1 = Character.digit(input.charAt(0), 16);
int digit2 = Character.digit(input.charAt(1), 16);
int digit3 = Character.digit(input.charAt(2), 16);
int digit4 = Character.digit(input.charAt(3), 16);

// Calculate the cost of each item
int cost1 = digit1;
int cost2 = digit2 * 2;
int cost3 = digit3 * 3;
int cost4 = digit4 * 4;
int cost5 = digit4 * 5;

// Calculate the total order cost
int totalCost = cost1 + cost2 + cost3 + cost4 + cost5;

// Print the item quantities and total cost
System.out.println(digit1 + " $1 item");
System.out.println(digit2 + " $2 item");
System.out.println(digit3 + " $3 item");
System.out.println(digit4 + " $4 item");
System.out.println(digit4 + " $5 item");
System.out.println("Total Order Costs: $" + totalCost);
}
}

Answers

Converting Java code to High-Level Assembly (HLA) requires understanding the syntax and semantics of both languages. Here's an example of how the given Java code can be converted to HLA:

assembly:

program DollarValueMenu;

#include("stdlib.hhf")

static

  digit1:      int8;

  digit2:      int8;

  digit3:      int8;

  digit4:      int8;

  cost1:       int8;

  cost2:       int8;

  cost3:       int8;

  cost4:       int8;

  cost5:       int8;

  totalCost:   int8;

begin DollarValueMenu;

  stdout.put("Feed me your order as 4 hex digits: ");

  stdin.get(digit1);

  stdin.get(digit2);

  stdin.get(digit3);

  stdin.get(digit4);

  movzx(cost1, digit1);

  movzx(cost2, digit2);

  movzx(cost3, digit3);

  movzx(cost4, digit4);

  movzx(cost5, digit4);

  mul(cost2, 2);

  mul(cost3, 3);

  mul(cost4, 4);

  mul(cost5, 5);

  add(totalCost, cost1);

  add(totalCost, cost2);

  add(totalCost, cost3);

  add(totalCost, cost4);

  add(totalCost, cost5);

  stdout.put(digit1, " $1 item", nl);

  stdout.put(digit2, " $2 item", nl);

  stdout.put(digit3, " $3 item", nl);

  stdout.put(digit4, " $4 item", nl);

  stdout.put(digit4, " $5 item", nl);

  stdout.put("Total Order Costs: $");

  stdout.puti(totalCost, nl);

end DollarValueMenu;

In this HLA version, we use the `stdout.put` function to display output and `stdin.get` to read input. The `movzx` instruction is used to move values into the appropriate variables and zero-extend them to 8 bits. The `mul` instruction multiplies the values, and the `add` instruction sums the costs.

Please note that HLA code may require additional setup and includes specific libraries, so ensure that you have the necessary environment and libraries set up before running the code.

For more questions on HLA, click on:

https://brainly.com/question/31365734

#SPJ8

100 point question, with Brainliest and ratings promised if a correct answer is recieved.
Irrelevant answers will be blocked, reported, deleted and points extracted.

I have an Ipad Mini 4, and a friend of mine recently changed its' password ( they knew what the old password was ). Today, when I tried to login to it, my friend claimed they forgot the password but they could remember a few distinct details :

- It had the numbers 2,6,9,8,4, and 2 ( not all of them, but these are the only possible numbers used )
- It's a six digit password
- It definitely isn't 269842
- It definitely has a double 6 or a double 9

I have already tried 26642 and 29942 and my Ipad is currently locked. I cannot guarantee a recent backup, so I cannot reset it as I have very important files on it and lots of memories. It was purchased for me by someone very dear to me. My question is, what are the password combinations?

Help is very much appreciated. Thank you for your time!

Answers

Answer: 266299         669922         292629        969622        Also just saying did you backup your files to the cloud?  If not you can buy a usb-c flash drive or a lighting cable flashdrive. Best Luck.

Explanation:

Date: Page: • Write the advantage and disadvantages of Computer >The advantages and disadvantages of computer a ares Advantages 1​

Answers

Answer:

Advantages of Computers:

1. Speed and Efficiency: Computers can process vast amounts of data and perform complex calculations at incredible speeds, making tasks quicker and more efficient.

2. Automation: Computers can automate repetitive tasks, reducing human effort and increasing productivity.

3. Storage and Organization: Computers can store and organize large amounts of data in various formats, making it easily accessible and searchable.

4. Communication: Computers facilitate communication through email, messaging, video conferencing, and social media, enabling instant and global connectivity.

5. Information Access: With internet access, computers provide a wealth of information and resources, allowing users to gather knowledge and stay updated on various topics.

Disadvantages of Computers:

1. Dependency: Over-reliance on computers can lead to a loss of essential skills and human interaction.

2. Health Issues: Prolonged computer use can contribute to health problems such as eye strain, musculoskeletal disorders, and sedentary lifestyle-related issues.

3. Security Risks: Computers are vulnerable to hacking, viruses, and data breaches, which can compromise privacy and sensitive information.

4. Cost: Computers and their associated software and maintenance can be expensive, especially for individuals or small businesses.

5. Social Impact: Computers can contribute to social isolation, reduced physical activity, and the digital divide between those with access to technology and those without.

It's important to note that this is not an exhaustive list, and the advantages and disadvantages of computers may vary depending on individual perspectives and specific contexts.

identify another natural cyclic event, other than phases and eclipses, that is caused by the moon's gravitational pull on earth

Answers

Answer:

TEKS Navigation

Earth Rotation.

Moon Phases.

Tides.

Cyclical events happen in a particular order, one following the other, and are often repeated: Changes in the economy have followed a cyclical pattern. an example would be pamdemic and vircus it is belived that a new pamdemic starts every 100 years.

Explanation:

The rise and fall of ocean tides is the natural cyclic event caused by the moon's gravitational pull on earth

The gravitational pull of the moon's causes the two bulges of water on the Earth's oceans:

where ocean waters face the moon and the pull is strongestwhere ocean waters face away from the moon and the pull is weakest

In conclusion, the rise and fall of ocean tides is the natural cyclic event caused by the moon's gravitational pull on earth

Read more about gravitational pull

brainly.com/question/856541

Write a Java program that will be using the string that the user input. That string will be used as a screen
saver with a panel background color BLACK. The panel will be of a size of 500 pixels wide and 500 pixels in
height. The text will be changing color and position every 50 milliseconds. You need to have a variable
iterator that will be used to decrease the RGB color depending on if it is 0 for Red, 1 for Green, or 2 for Blue,
in multiples of 5. The initial color should be the combination for 255, 255, 255 for RGB. The text to display
should include the Red, Green, and Blue values. The initial position of the string will be the bottom right of
the panel and has to go moving towards the top left corner of the panel.

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that string will be used as a screen saver with a panel background color BLACK.

Writting the code:

import java.awt.*;

import java.util.*;

import javax.swing.JFrame;

class ScreenSaver

{

    public static void main( String args[] )

   {

       Scanner sc=new Scanner(System.in);

       System.out.println("Enter a name you want add as a Screen_saver:");

       String s=sc.nextLine(); //read input

       sc.close();

           JFrame frame = new JFrame( " Name ScreenSaver " );

       frame.setDefaultCloseOperation( JFrame.EXIT_ON_CLOSE );

             JPanalSaver saver1JPanel = new JPanalSaver(s);

               saver1JPanel.setPreferredSize(new Dimension(500,500));

               frame.add( saver1JPanel );

       frame.setSize( 500, 500 ); // set the frame size (if panel size is not equal to frame size, text will not go to top left corner)

       frame.setVisible( true ); // displaying frame

   }

}

JPanalSaver.java

import java.awt.Color;

import java.awt.Graphics;

import javax.swing.JPanel;

public class JPanalSaver extends JPanel {

   int x1 = 500, y1 = 500;

   int r = 255, g1 = 255, b = 255;

   String color;

   int iterator = 0;

   JPanalSaver(String c) {

       color = c;

   }

   public void paintComponent(Graphics g) {

       super.paintComponent(g); // call super class's paintComponent

       x1 = x1 - 5;

       y1 = y1 - 5;

              if (iterator ==0) {

                     r = Math.abs((r - 5) % 255);

           iterator = 1;

       } else if (iterator == 1) {

           g1 = Math.abs((g1 - 5) % 255);

           iterator = 2;

       } else {

           b = Math.abs((b - 5) % 255);

           iterator = 0;

       }

       g.setColor(new Color(r, g1, b));

       g.drawString(color + " " + r + " " + g1 + " " + b, x1, y1); //string + value of RGB

       //top left position (0,0 will not display the data, hence used 5,10)

       if (x1 > 5 && y1 > 10)

       {

           repaint(); // repaint component

           try {

               Thread.sleep(50);

           } catch (InterruptedException e) {

           }   //50 milliseconds sleep

       } else

           return;

   }

See more about JAVA at brainly.com/question/13208346

#SPJ1

Write a Java program that will be using the string that the user input. That string will be used as a

An array called numbers contains 35 valid integer numbers. Determine and display how many of these values are greater than the average value of all the values of the elements. Hint: Calculate the average before counting the number of values higher than the average

Answers

python

Answer:

# put the numbers array here

average=sum(numbers)/35 # find average

count=0 #declare count

for i in numbers: #loop through list for each value

if i > average: #if the list number is greater than average

count+=1 #increment the count

print(count) #print count

[80 points] Fill in the missing word.

class CatLady(Exception):
pass

answer = input("How many cats do you have? ")
cats = int(answer)
try:
if cats > 5:
raise CatLady
else:
print("You have", cats, "cats")
_________ CatLady:
print("You have a lot of cats!")

Answers

Answer:

except

you can use github copilot for this  question

Answer: except

Explanation: i took the test


In Excel, which of the following data types is used for description purposes only and
not for calculations?

Answers

Which of the following what?

Either way, Excel has number, text, logical, error

Go for text

Briefly explain the conceptual of effective computer based instruction for adults outlining the three units output process and input

Answers

Based on the research analysis, the concept of effective computer-based instruction for adults is the integration of the key organs of computer-based instruction to deliver desired guidelines for research in CBI for adults.

The three units output process and inputOutput processExternal supportCBI DesignInstructional Strategy design

Input ProcessSelf DirectednessComputer Self EfficacyLearning Goal Level

Hence, in this case, it is concluded that computer-based instructions can be practical for adult learning.

Learn more about CBI here: https://brainly.com/question/15697793

Create a Java application using arrays that sorts a list of integers in descending order. For example, if an array has values 106, 33, 69, 52, 17 your program should have an array with 106, 69, 52, 33, 17 in it. It is important that these integers be read from the keyboard. Implement the following methods – getIntegers, printArray and sortIntegers. • getIntegers returns an array of entered integers from the keyboard. • printArray prints out the contents of the array • sortIntegers should sort the array and return a new array contained the sorted numbers. in javascript

Answers

Answer: import java.util.Scanner;

public class SortArray {

   public static void main(String[] args) {

       int[] array = getIntegers(5);

       System.out.print("Original array: ");

       printArray(array);

       int[] sortedArray = sortIntegers(array);

       System.out.print("Sorted array: ");

       printArray(sortedArray);

   }

   public static int[] getIntegers(int size) {

       Scanner scanner = new Scanner(System.in);

       int[] array = new int[size];

       System.out.println("Enter " + size + " integers:");

       for (int i = 0; i < size; i++) {

           array[i] = scanner.nextInt();

       }

       return array;

   }

   public static void printArray(int[] array) {

       for (int i = 0; i < array.length; i++) {

           System.out.print(array[i] + " ");

       }

       System.out.println();

   }

   public static int[] sortIntegers(int[] array) {

       int[] sortedArray = new int[array.length];

       for (int i = 0; i < array.length; i++) {

           sortedArray[i] = array[i];

       }

       boolean flag = true;

       int temp;

       while (flag) {

           flag = false;

           for (int i = 0; i < sortedArray.length - 1; i++) {

               if (sortedArray[i] < sortedArray[i + 1]) {

                   temp = sortedArray[i];

                   sortedArray[i] = sortedArray[i + 1];

                   sortedArray[i + 1] = temp;

                   flag = true;

               }

           }

       }

       return sortedArray;

   }

}

Explanation: This program peruses 5 integrability from the console, sorts them in plummeting arrange, and prints out the initial and sorted clusters. The getIntegers strategy employments a Scanner protest to examined integrability from the support and store them in an cluster. The printArray strategy basically repeats over the cluster and prints out each component. The sortIntegers strategy makes a modern cluster with the same elements as the input cluster, and after that sorts it employing a basic bubble sort calculation. At last, the most strategy calls the other strategies and prints out the comes about.

Present an example that uses correctly a local variable inside a function to mask (hide) it from a global variable. Explain the purpose of masking the variable, how it should be declared, and how it is used. Show as much C/C++ code as needed to explain your example.

Answers

The code example that uses correctly a local variable inside a function to mask (hide) it from a global variable is:

int i = 5;

void function (){

...

for(int i = 0; i < 13; i++)

}

What are local and global variables?

Local variables are variables that have the scope only inside the function that it was declared.

Global variables are variables that have an entire program as a scope.

If a global variable is "re-declared" inside a function, then the scope is only the function, meaning that the local variable inside the function hides it from the global variable.

This is the case in the code we gave for this problem, in which:

The global variable i is declared with a value of 10.Inside the function function(), another variable i is declared, this time with a scope only inside the function f, masking it from the global variable.

More can be learned about local and global variables at https://brainly.com/question/13109296

#SPJ1

Create the logic for a program that prompts a user for 10 numbers and stores them in an array. Pass the numbers to a method that reverses the order of the numbers. Display the array in the main module after invoking the method.

Create the logic for a program that prompts a user for 10 numbers and stores them in an array. Pass the

Answers

The logic of the program that prints a reversed list is:

def reverse_list(my_list, lent):

   my_list.reverse()

   return my_list

my_list = []

for i in range(10):

   my_list.append(int(input()))

print(reverse_list(my_list, 10))

How to determine the logic of the program?

From the question, we have the following parameters that can be used in our computation:

Logic 1:

Get 10 integer inputs for a listPass this list to a method

Logic 2

Get the integer inputs for the list from logic 1Reverse the listPass the reversed list to the main method

Logic 4

Get the reversed integer inputs from logic 3Print the reversed list

There are several ways to do this:

One of them is the following code segment

#Logic 2

def reverse_list(my_list, lent):

   my_list.reverse()

   return my_list

#Logic 1

my_list = []

#Logic 3

for i in range(10):

   my_list.append(int(input()))

print(reverse_list(my_list, 10))

Read more about code segments at

https://brainly.com/question/20734416

#SPJ1

By itself, the human eye cannot see anything in three dimensions. What does the passage say enables us to see the world in 3-D?

Answers

Answer:

he miracle of our depth perception comes from our brain's ability to put together two 2D images in such a way as to extrapolate depth. This is called stereoscopic vision.

Explanation:

Answer:

the way our brain and eyes work together

Explanation:

An ArrayList object acts like:

a. An array of primitive values.
b. An array of references to objects of a particlar class.
c. An array of references to objects of class Object.
d. An array of primitive values or of object references.

Answers

Answer:

C

Explanation:

Java's Arraylist is implemented as an object that stores groups of other objects much like the simple array thereby allowing the traversal of element by element in the list. Unlike simple arrays however, the arraylist allows objects only so can't store primitives like (int, double, float, char) in an Arraylist. Note however that java provides wrapper classes for these primitives and in most cases carries out autoboxing (Converting primitives to their wrapper classes) for us.

In the five C's, how is cost different from price?
A. It includes the company's operating costs.
B. It makes it easier to promote the product.
C. It reduces the company's operating expenses.
D. It includes all of the costs related to the product.
Please select the best answer from the choices provided
А
B
Ο Ο Ο Ο
С
OD

Answers

Answer:

D

Explanation:

Well you cost is the opposite meaning of price

Option D It includes all of the costs related to the product is cost different from price.

What are five C's while the product is priced?

1. Cost - While pricing the product, the product price should contain all the costs interconnected to the product exists marketing, selling and distribution, and another cost.

2. Customers - Whether the customer will be capable to pay the price and exists the best judge.

3. Channels of distribution - Through which method it will reach its customers

4. Competition - which exists the competitors in the market and at what price the product stands sold by them.

5. Compatibility - Pricing stands to be done based on how much the product exists compatible with its supplement products.

Hence, Option D It includes all of the costs related to the product is cost different from price.

To learn more about product pricing refer to:

https://brainly.com/question/27432513

#SPJ2

Complete the code to generate a pseudo-random integer between 1 and 44, including the possibility of both 1 and
44.
>>> import secrets
>>> secret

Answers

Answer:

Explanation:

.randbelow(44) + 1

The code above uses the secrets module, which is a part of the Python standard library and uses a cryptographically strong random number generator. The randbelow() function generates a random integer below the number given as an argument. In this case, the argument is 44, which means that the function will generate a random integer between 0 and 43. To get a random integer between 1 and 44, we add 1 to the result of the function.

Write a function longer_string() with two string input parameters that returns the string that has more characters in it. If the strings are the same size, return the string that occurs later according to the dictionary order. Use the function in a program that takes two string inputs, and outputs the string that is longer.

Answers

Answer:

Here you go :)

Explanation:

Change this to your liking:

def longer_string(s1, s2):

   if len(s1) > len(s2):

       return s1

   elif len(s1) < len(s2):

       return s2

   else:

       return s2

x = input("Enter string 1: ")

y = input("Enter string 2: ")

print(longer_string(x, y))

Lab 11
Reading Read the sections on parameters (Sobell, pages 460–470), control structures (Sobell, pages 419–435), and environment (Sobell, pages 471–474).
Procedure
The shell expands $0 to the name of the calling program (Sobell, page 461), $1–$n to the individual command-line arguments (positional parameters; Sobell, page 462), $* (Sobell, page 465) to all positional parameters, and $# (Sobell, page 466) to the number of positional parameters.
1. Write a script named all that displays (sends to standard output) the name of the calling program, the number of positional parameters, and a list of positional parameters. Include the #! line (Sobell, page 287) and a comment (Sobell, page 288). Remember to make the file executable (Sobell, page 100). Test the script with 0, 1, and 5 positional parameters.
2. Make a symbolic link (Sobell, page 113) named linkto to the all script you wrote in the previous step. Call linkto with two arguments. What does the script report as the name it was called as?
3. Write a script named myname that uses echo (most of the examples in Chap- ter 10 use this utility) to prompt the user with Enter your name: , reads into a variable the string the user types in response to the prompt, and then dis- plays Hello followed by the string the user typed. When you run the program it should look like this: $ ./myname Enter your name: Max Wild Hello Max Wild
4. Rewrite myname from the previous step, calling it myname2. Have this version of the program prompt the user for a string, but instead of displaying Hello and the string on the screen (sending it to standard output) redirect the output so the program writes only the string the user entered (and not Hello) to the temporary file named PID.name where PID is the process ID number (Sobell, page 467) of the process running the script. Display the contents of the PID.name file.
5. Write and run a script named looper that uses the for (Sobell, page 434) control structure to loop through the command-line arguments and display each argument on a separate line.
6. Rewrite looper from the previous step, calling it looper2. Have this version of the program use the for...in control structure (Sobell, page 432) to perform the same task.
7. Write a script named ifthen that prompts the user with >> and reads a string of text from the user. If the user enters a nonnull string, the script displays You entered: followed by the string; otherwise it displays Where is your input?. Use an if...then...else control structure (Sobell, page 424) to imple- ment the two-way branch in the script. Use the test (Sobell, pages 420 and 978) builtin to determine if the user enters a null string. What do you have to do to avoid getting an error message when you prompt with >>? (There are several ways to construct the test statement.)
8. Write and run a simple shell script named echomyvar that displays the PID (Sobell, page 467) of the process running the script and value of the variable named myvar. Display the PID of the interactive shell you are working with. What is the value of the variable within the process running the shell script? Are the interactive shell and the shell running the script run by the same or different processes (do they have the same PID)?
$ cat echomyvar
echo The PID of this process is $$
echo The value of myvar is: $myvar
$ echo $$
2651
$ ./echomyvar
The PID of this process is 4392
The value of myvar is:
The example near the top of Sobell, page 473, demonstrates a way to put a variable in the environment of a script you are calling without declaring the variable in the interactive shell you are running. Use this technique to assign a value to myvar, place it in the environment of echomyvar, and run echo myvar. After running the script, is myvar set in the interactive shell?
On the command line, assign a value to the variable named myvar and then run echomyvar again. Which value does the script display?
Use the export (Sobell, page 472) builtin in the interactive shell to place myvar in the environment and run echomyvar. (You can export myvar with out assigning a new value to it.) Did the script display the value of myvar this time?
Is the PID of the interactive shell the same or different from the PID of the script?
Call export without an argument and send the output through grep to dis- play the export attribute for myvar. The export builtin and declare –x perform the same function.
Use export –n (Sobell, page 473) to unexport myvar. Show that myvar is a shell variable but is no longer in the environment.
Use the unset (Sobell, page 304) builtin to remove myvar. Show that myvar is not available in the interactive shell or in the environment.
Deliverables Please submit the contents of scripts written, the command line calls that you make and the answers to any questions asked

Answers

Echo "The arguments were: $*" #List of positional parametersThe output are This script was called as ./all.sh, This script was called with 5 arguments .

What is parameters?

Parameters are variables that can be used to control the behavior of a system or process. They are used to customize and fine-tune the performance of a system or process, and can be adjusted to suit the needs of a particular application or situation.

Parameters can be adjusted manually, or automatically based on feedback from the system or process. Examples of parameters include settings such as speed, temperature, pressure, frequency, voltage, and current.

Therefore,  This script was called with 5 arguments .

To learn more about parameters on

brainly.com/question/30365448

#SPJ1

An organization requires secure configuration baselines for all platforms and technologies that are used. If any system cannot conform to the secure baseline, the organization must process a risk acceptance and receive approval before the system is placed into production. It may have non-conforming systems in its lower environments (development and staging) without risk acceptance, but must receive risk approval before the system is placed in production. Weekly scan reports identify systems that do not conform to any secure baseline. The application team receives a report with the following results:
Host Environment Baseline deviation ID(criticality)
NYAccountingDev Development
NYAccountingStg Staging
NYAccounting Prod Production 2633 (low), 3124 (high)
There are currently no risk acceptances for baseline deviations. This is a mission-critical application, and the organization cannot operate if the application is not running. The application fully functions in the development and staging environments. Which of the following actions should the application team take?
A. Remediate 2633 and 3124 immediately.
B. Process a risk acceptance for 2633 and 3124.
C. Process a risk acceptance for 2633 and remediate 3124.
D. Shut down NYAccounting Prod and investigate the reason for the different scan results.

Answers

Answer:

C. Process a risk acceptance for 2633 and remediate 3124.

Explanation:

There are various business risks. Some are inherited risks while other are risks are associated with nature of business. It is dependent on business owners that they want to accept risk or mitigate the risk. Risk acceptance is based on the strategy of the management. In the given scenario Accounting Prod Production has low risk 2633 which is accepted while 3124 is high risk which is remediated.

Which financial aid program may require you to serve in the military after
earning a degree?
Scholarships and grants
Work-study
Reserve Officer Training Corps (ROTC)
Subsidized loans

Answers

Answer:

Reserve Officer Training Corps (ROTC)

Explanation:

Daily requirements of 70 g of protein, 1 g calcium, 12 mg iron, and 3000 calories are needed for a balanced diet. The following foods are available for consumption with the cost and nutrients per 100 g as shown.
 
Protein
(g)
Calories
Calcium
(g)
Iron
Cost
GH¢
Brown Bread
12
246
0.1
3.2
0.5
Cheese
24.9
423
0.2
0.3
2
Butter
0.1
793
0.03
0
1
Baked Beans
6
93
0.05
2.3
0.25
Spinach
3
26
0.1
2
0.25
 
The objective is to find a balanced diet with minimum cost.
(a) Formulate a linear programming model for this problem.
(b) Use solver to find optimal solution and sensitivity report.         ​

Answers

Answer:

i think i know

Explanation:

Write a recursive method named digitSum that accepts an integer as a parameter and returns the sum of its digits. For example, calling digitSum(1729) should return 1 7 2 9, which is 19. If the number is negative, return the negation of the value. For example, calling digitSum(-1729) should return -19.

Answers

Answer:

The function in Python is as follows:

def digitSum( n ):

if n == 0:

 return 0

if n>0:

    return (n % 10 + digitSum(int(n / 10)))

else:

    return -1 * (abs(n) % 10 + digitSum(int(abs(n) / 10)))

Explanation:

This defines the method

def digitSum( n ):

This returns 0 if the number is 0

if n == 0:

 return 0

If the number is greater than 0, this recursively sum up the digits

if n>0:

    return (n % 10 + digitSum(int(n / 10)))

If the number is lesser than 0, this recursively sum up the absolute value of the digits (i.e. the positive equivalent). The result is then negated

else:

    return -1 * (abs(n) % 10 + digitSum(int(abs(n) / 10)))

The questions are attached below, please provide solutions asap

The questions are attached below, please provide solutions asap

Answers

Q1 In a Symmetric MultiProcessing SMP system data residing in memory can have different values in each of the local caches This occurs when multiple processors or CPUs in the system have their own local caches and access the same data from memory

When the data could have different memory

Due to caching mechanisms and timing if one processor modifies the value of the data in its cache the other processors caches may still hold the old value

Q2 Three kernel data structures implemented at the operating system level are the Process Control Block PCB File Control Block FCB and Page Table

The PCB stores information about a running process the FCB manages file information and the Page Table is used in virtual memory management to map virtual addresses to physical addresses

Q3 Kernel mode and user mode are privilege levels in a computer system Kernel mode provides unrestricted access to system resources and sensitive operations while user mode imposes restrictions for system stability and security

Kernel mode allows the operating system to perform critical tasks and manage resources while user mode provides a controlled environment for user applications

Q4 Operating system level virtualization involves running multiple virtual machines VMs with their own separate kernels on a single physical machine

This allows for better utilization of hardware resources and provides isolation between different VMs By implementing a virtual machine manager it becomes possible to run multiple operating systems and applications independently enhancing flexibility scalability and security

Read more on computer memory here https://brainly.com/question/24688176

#SPJ1

Is it possible to beat the final level of Halo Reach?

Answers

It is impossible to beat this level no matter how skilled the player is.

Using an engineer’s helps create efficient drawings by providing the engineer with a model of common ratios in design.

Answers

An engineer can benefit from a model of common ratios in design to create efficient drawings and ensure accurate and proportionate designs.

When an engineer is provided with a model of common ratios   in design, it helps them create efficient drawings in the following steps:

Understanding the model: The engineer familiarizes themselves with the model of common ratios, which includes proportions and relationships commonly used in design.Applying the ratios: The engineer applies the appropriate ratios from the model to their drawing. These ratios can include dimensions, scaling factors, or geometric relationships.Ensuring accuracy: By using the model of common ratios, the engineer ensures that their drawing is accurate and follows established design principles. This helps in maintaining consistency and precision in theoduct.Achieving efficiency: The use of common ratios streamlines the drawing process, allowing the engineer to work more efficiently. It reduces the time and effort required to determine appropriate dimensions and proportions, leading to faster and more effective design iterations.

Overall, the model of common ratios in design serves as a valuable tool for engineers, enabling them to create efficient drawings that adhere to9 established standards and principles.

For more such  question on design

https://brainly.com/question/29541505

#SPJ8

sa kumbensiyon naihalal si andres bonofacio bilang​

Answers

Answer:

the contemporary Supremo (supreme leader) of the Katipunan

Execute and explain this program using // in Layman's language. Thank you!

Execute and explain this program using // in Layman's language. Thank you!

Answers

The explanation of the program using layman's language is:

It wants to find the highest and lowest contributions madeIt wants to discover how many individual contributions were needed to reach the targetThe total amount of contributions collectedThe program wants to test various input data for contributions and how many contributions are needed to reach the goal.

What is a Program?

This refers to the sequence of instructions in a programming language that executes the instruction given to the computer.

Hence, we can see that different input sizes would be used to test the program as it is in the testing stage to see just how efficient the program is.

Read more about programs here:

https://brainly.com/question/1538272

#SPJ1

What is a shell programming? Write a shell program to get the following details from the student: NAME, AGE, USN and GENDER. Output all the details to the terminal and also display message whether the student is eligible to vote or not

Answers

Shell programs are computer programs designed to run on the Unix/Linux shell

The shell program where comments are used to explain each line is as follows:

#This gets input for NAME

read NAME  

#This gets input for AGE

read AGE  

#This gets input for USN

read USN

#This gets input for GENDER

read GENDER

#This prints the name

echo "Name: $NAME"

#This prints the age

echo "Age: AGE"

#This prints the usn

echo "USN: USN"

#This prints the gender

echo "GENDER: $GENDER"

#The following if condition determines, if the user is eligible to vote or not

if [ $USN -gt 50 ] then

echo "You are not eligible"

else

echo "You are eligible"

Read more about computer programs at:

https://brainly.com/question/13795586

Other Questions
HELPP IF WRONG ILL REPROT A store employee conducted a survey of 590 randomly selected customers. According to the survey, 177 of the customers often use coupons. How many people would you expect to use a coupon if all 5,000 people in the community visited the store?Question 7 options:5,310 people1,250 people3,750 people1,500 people Question 11 of 20Which argument is most clearly making an ad hominem fallacy?O A. All I can say about my rival's idea is that he's a thief and he shouldbe ignored.OB. My opponent thinks eating meat is fine, but I, for one, am againstanimal cruelty.OC. The movie deserves to win an Oscar because it's more deservingthan other films.O D. That meteor hit the day after Mayor Rice was elected. Mayor Riceis to blame.4SUBMIT On December 31, 2015, Hidd Corporation leased a ship from Fort Company for an eight-year period expiring December 30, 2023. Equal annual payments of $200,000 are due on December 31 of each year, beginning with December 31, 2015. The lease is properly classified as a finance lease on Hidd 's books. The present value at December 31, 2015 of the eight lease payments over the lease term discounted at 10% is $1,173,685. Assuming all payments are made on time, the amount that should be reported by Hidd Corporation as the total lease liability on its December 31, 2016 statement of financial position. A $871,054 B. $1,000,159 c. $1,091,054 D. $1,200,000 Select the correct answer. Which sentence describes William Henry Harrison's contribution to the US efforts in the War of 1812? A. He was responsible for securing the US coast against British warships. B. He successfully kept the American Indians out of the war against Britain. C. He defeated the American Indian forces at the Battle of the Thames. D. He was responsible for building an alliance with the Creek tribe. E. He successfully kept the British army from entering Washington DC. what's - 5 3/4 + (-4 5/6) in simplest form Harriet bought 2 steers when she was young. How much did she pay? Challenge in the first week of July, a record 1,120 people went to the local swimming pool. In the second week, 100 fewer people went to the pool than in the first week. In the third week, 130 morepeople went to the pool than in the second week. In the fourth week, 254 fewer people went to the pool than in the third week. What is the percent decrease in the number of people who went to the poolover these four weeks?The percent decrease of people who went to the pool is%C What does input allow a computer to do a classification tree guide to soil-water characteristic curve test for soils with bimodal grain-size distribution an approach to healing that directs the combined efforts of multiple people toward treating illness is called Please help asap!! I will mark you as brainliest :) These four historical figures are best known for their contributions to A) the "Roman Republic." B) the "Roman Empire." C) the "Athenian Golden Age." D) the "Byzantine Empire." Plz help me give me answer For two organisms engaged inoneorganism benefits whilst the other is neither harmed norhelped. The majority of students who receive special education services fall within which age range?a. 3-12b. 6-17c. 9-18d. 12-21 a municipal issuer publishes an official notice of sale to indicate that the offering will be made Although your shift has just ended, before you may leave you are tasked to screen the detainees so that they can be transferred to another location. They have just knelt for mid-day prayer. The MPs tell you that this procession usually requires about half an hour. What do you do A biologist calculated that 272 g of glucose should have been formed during the reaction of CO and H2O. What is the percent yield if 32.3 g of glucose are collected at the end of the reaction? 6CO + 6HO 602 + C6H12O6 [? ] % Percent Yield 1.Financial leverage involves the decisions of the firm to utilize fixed types of operating costs. true or false?2.Financial risk involves both the possibility of insolvency and the increased variability of earnings per share caused by borrowing. true or false? What receptors are affected by opioid?