in most operating systems what is running application called?

Answers

Answer 1

Answer:

I believe it is just a task. Since there exists(on windows) the Task Manager application, where you can stop any running task, I think that they are called tasks

Explanation:

Answer 2

In most operating systems, a running application is typically referred to as a process. A process is an instance of a program that is being executed by the operating system. It represents the execution of a set of instructions and includes the program code, data, and resources required for its execution.

Each process has its own virtual address space, which contains the program's code, variables, and dynamically allocated memory. The operating system manages and schedules these processes, allocating system resources such as CPU time, memory, and input/output devices to ensure their proper execution.

The operating system provides various mechanisms to manage processes, such as process creation, termination, scheduling, and inter-process communication.

Learn more about operating systems here:

brainly.com/question/33924668

#SPJ6


Related Questions

fine the average of 5,2,3​

Answers

Answer:

3 1/3

Explanation:

What is cybersecurity? Cybersecurity refers to the protection of hardware?

What is cybersecurity? Cybersecurity refers to the protection of hardware?

Answers

Cybersecurity is the practice of safeguarding computer systems, networks, and mathematical data from unauthorized approach, theft, damage, or additional malicious attacks.

What is cybersecurity?

It involves the use of differing technologies, processes, and practices to secure digital maneuvers, networks, and data from a wide range of dangers, including cybercrime, cyber-spying, cyber-terrorism, and different forms of malicious endeavor.

While cybersecurity does involve protecting fittings, it also involves looking after software, networks, and digital dossier. In addition to protecting against external warnings, etc.

Learn more about cybersecurity from

https://brainly.com/question/28004913

#SPJ1

PLEASE HELP ME I WILL GIVE BRAINIEST AND 40 POINTSPython Project Worksheet
________________________________________
Output: Your goal

You will write a program that asks a user to fill in a story. Store each response in a variable, then print the story based on the responses. ________________________________________
Part 1: Plan and Write the Pseudocode

Use the following guidelines to write your pseudocode for a fill-in story program.
1. Decide on a list of items the program will ask the user to input.
2. Your program should include at least four interactive prompts.
3. Input from the user should be assigned to variables and used in the story.
4. Use concatenation to join strings together in the story.
5. Print the story for the user to read.

Write your pseudocode here:










________________________________________

Part 2: Code the Program
Use the following guidelines to code your program.
1. Use the Python IDLE to write your program.
2. Using comments, type a heading that includes your name, today’s date, and a short description.
3. Set up your def main(): statement. (Don’t forget the parentheses and colon.)
4. Conclude the program with the main() statement.
5. Include at least two print statements and two variables.
6. Include at least four input prompts.
7. Use concatenation to join strings.
8. Follow the Python style conventions regarding indentation in your program.
9. Run your program to ensure it is working properly. Fix any errors you may observe.

Example of expected output: The output below is an example of a “Favorite Animal” message. Your specific results will vary depending on the choices you make about your message.

Output
The kangaroo is the cutest of all. It has 5 toes and a beautiful heart. It loves to eat chips and salsa, although it will eat pretty much anything. It lives in New York, and you must be super sweet to it, or you may end up as its meal!

When you've completed writing your program code, save your work by selecting 'Save' in the Python IDLE.
When you submit your assignment, you will attach this Python file separately.
________________________________________
Part 3: Post Mortem Review (PMR)
Using complete sentences, respond to all the questions in the PMR chart.
Review Question Response
What was the purpose of your program?



How could your program be useful in the real world?



What is a problem you ran into, and how did you fix it?



Describe one thing you would do differently the next time you write a program.

btw don't talk unless you are answering the question

Answers

Answer:

i can only give you pseudocode my fren

Explanation:

# information about me

def main():

MyName =  “malaki”

print(myName)

myInfo = “I was born in wichita, Kansas U.S. I live in japan. I love hotdogs.”

print(myInfo)

main()

sorry if this did not help :( i tried

In this exercise we want to write a pseudocode, so this way we will find how the code is in the attached image.

What is pseudocode?

Pseudocode is a generic way of writing an algorithm, using a simple language (native to whoever writes it, so that it can be understood by anyone) without the need to know the syntax of any programming language.

Pseudocode is a description of the steps in an algorithm using simple or everyday language. In essence, a pseudocode uses straightforward (concise) words and symbols to summarize the steps taken during a software development process.

Consequently, the following are some characteristics of a pseudocode as the Pseudocode needs to be clear, Pseudocode ought to be ending. Executable pseudocode is required.

Therefore, In this exercise we want to write a pseudocode, so this way we will find how the code is in the attached image.

Learn more about language on:

https://brainly.com/question/20921887

#SPJ2

package Unit3_Mod2;


public class ImageExample3 {

public static void main (String[] argv)
{
int[][][] A = {
{
{255,200,0,0}, {255,150,0,0}, {255,100,0,0}, {255,50,0,0},
},
{
{255,0,200,0}, {255,0,150,0}, {255,0,100,0}, {255,50,0,0},
},
{
{255,0,0,200}, {255,0,0,150}, {255,0,0,100}, {255,0,0,50},
},
};

// Add one pixel on each side to give it a "frame"
int[][][] B = frameIt (A);

ImageTool im = new ImageTool ();
im.showImage (B, "test yellow frame");
}

public static int[][][] frameIt (int[][][] A)
{
//add code here
}
}
Make a yellow frame , one pixel to each side.

Answers

Answer:

To add a yellow frame of one pixel to each side of the input image represented by a 3D array A, we can create a new 3D array B with dimensions A.length + 2 by A[0].length + 2 by A[0][0].length, and set the values of the pixels in the frame to the RGB values for yellow (255, 255, 0).

Here is the implementation of the frameIt method:

public static int[][][] frameIt(int[][][] A) {

   int height = A.length;

   int width = A[0].length;

   int depth = A[0][0].length;

   int[][][] B = new int[height + 2][width + 2][depth];

   // Set the values for the corners of the frame

   B[0][0] = new int[] {255, 255, 0, 0};

   B[0][width + 1] = new int[] {255, 255, 0, 0};

   B[height + 1][0] = new int[] {255, 255, 0, 0};

   B[height + 1][width + 1] = new int[] {255, 255, 0, 0};

   // Set the values for the top and bottom rows of the frame

for (int j = 1; j <= width; j++) {

       B[0][j] = new int[] {255, 255, 0, 0};

       B[height + 1][j] = new int[] {255, 255, 0, 0};

   }

   // Set the values for the left and right columns of the frame

   for (int i = 1; i <= height; i++) {

       B[i][0] = new int[] {255, 255, 0, 0};

       B[i][width + 1] = new int[] {255, 255, 0, 0};

   }

   // Copy the original image into the center of the new array

   for (int i = 0; i < height; i++) {

       for (int j = 0; j < width; j++) {

           for (int k = 0; k < depth; k++) {

               B[i + 1][j + 1][k] = A[i][j][k];

           }

       }

   }

   return B;

}

Note that the RGB values for yellow are (255, 255, 0), but since the input array is using a 4-channel representation with an alpha channel (transparency), we are setting the alpha channel to 0 for all the yellow pixels. This means that the yellowframe will be fully opaque.

Hope this helps!

A customer calls in and is very upset with recent service she received. You are trying to calm the customer down to come to a resolution but you are not sure how to best do so

Answers

It's crucial to maintain your composure and show empathy while interacting with a frustrated customer. Actively listen to their worries and express your regret for any hardship you may have caused.

Can you describe a moment where you dealt with an angry or upset customer in the past?

You can use the STAR approach to share a tale about a time when you had to face an irate client in person. Situation: "A client arrived at my former employment screaming and cursing the workers. She was lamenting because she didn't have her receipt when she tried to return an item.

What are the 5 C's of complaint?

The 5Cs approach of formal presentation, where the Cs stand for Principal complaint, Course of sickness.

To know more about customer visit:-

https://brainly.com/question/13472502

#SPJ1

Lynn would like to insert a hyperlink into an email message without using the ribbon. What is the keyboard shortcut to do so?

Ctrl+G
Ctrl+K
Ctrl+C
Ctrl+Shift+G

Answers

Answer:

Ctrl+K

Explanation:

Edg 2020

B on edg 2021, hope i could help

describe each of the following circuits symbolically. use the principles you have derived in this activity to simplify the expressions and thus the design of the circuits

describe each of the following circuits symbolically. use the principles you have derived in this activity

Answers

The Ohm's law states that the current passing through the conductor is proportional to the voltage applied across its ends. Kirchhoff's law applies to the conservation of charge and energy in an electric circuit. Series resistors are combined end-to-end, and their combined value is equal to the sum of the individual resistors. Parallel resistors, on the other hand, are combined side-by-side, and their combined value is equal to the reciprocal of the sum of the individual resistors.

In electronic circuit diagrams, symbols represent circuit components and interconnections. Electronic circuit symbols are used to depict the electrical and electronic devices in a schematic diagram of an electrical or electronic circuit. Each symbol in the circuit is assigned a unique name, and their values are typically shown on the schematic.In the design of circuits, it is crucial to use the principles to simplify expressions.

These principles include Ohm's law, Kirchhoff's laws, and series and parallel resistance principles. The Ohm's law states that the current passing through the conductor is proportional to the voltage applied across its ends. Kirchhoff's law applies to the conservation of charge and energy in an electric circuit. Series resistors are combined end-to-end, and their combined value is equal to the sum of the individual resistors. Parallel resistors, on the other hand, are combined side-by-side, and their combined value is equal to the reciprocal of the sum of the individual resistors. Therefore, in circuit design, simplification of the circuits can be achieved by applying these principles.

For more such questions on Ohm's law, click on:

https://brainly.com/question/231741

#SPJ8

Identify a logical operation (along
with a corresponding mask) that, when
applied to an input string of 8 bits,
produces an output string of all 0s if and
only if the input string is 10000001.​

Answers

Answer: Provided in the explanation section

Explanation:

The Question says;

Identify a logical operation (along

with a corresponding mask) that, when

applied to an input string of 8 bits,

produces an output string of all 0s if and

only if the input string is 10000001.​

The Answer (Explanation):

XOR, exclusive OR only gives 1 when both the bits are different.

So, if we want to have all 0s, and the for input only 10000001, then we have only one operation which satisfies this condition - XOR 10000001. AND

with 00000000 would also give 0,

but it would give 0 with all the inputs, not just 10000001.

Cheers i hope this helped !!

Miranda works in a product-testing laboratory. New products come in for testing frequently. As the products come in, test protocols are developed. Testers in several different departments perform different tests and record their results. The results are then compiled into a database. The project manager reviews the test results and writes up a report describing the findings. When the business was small, it was easy for the company to share these documents using e-mail. But now the laboratory has grown. It receives many more products for testing and has hired many more employees. As a result, e-mail is no longer an efficient way in which to handle the exchange of documents. For this reason, Miranda implemented the use of a new tool. What technology did Miranda adopt?

Answers

The technology that Miranda adopt is a wiki. The correct option is d.

What is technology?

Technology is the application of scientific knowledge and information to make new gadgets and equipment which work for the welfare of society. Technology is overcoming the problems of society with new scientific gadgets.

Here, Miranda works in a product-testing laboratory. The lab should make new and technical equipment. She needed a new tool for the lab, so she should opt for a wiki for the information on new techniques.

Therefore, the correct option is d, a wiki.

To learn more about technology, refer to the link:

https://brainly.com/question/28288301

#SPJ1

The question is incomplete. Your most probably complete question is given below:

a blog

e-mail

a fax machine

a wiki

will give brainlyist

Which sentence in the following paragraph correctly describes mobile technology?
Mobile devices have become the main source of communication for many people around the world. However, businesses are still to capitalize on the wide reach mobile communication. Social media is being increasingly used in marketing research. Customized advertising can be integrated based on specific users' location. Smartphones do not have videoconferencing capabilities that is becoming a major business tool.

Answers

i think its the first sentence: Mobile devices have become the main source of communication for many people around the world

if im wrong im dum ;-;

Answer:

Customized advertising can be integrated based on specific users location.

Explanation:

Right for Plato/edmentum

1. Railroad tracks present no problems for a motorcyclist.
A. O TRUE
B. O FALSE

2. Which of the following is considered to be a vulnerable road user?
A. Bicyclists
B. Motorcyclists
C. Pedestrians
D. all of the above

Answers

Answer: 1 is A

2 is D

Explanation:

Describe why some people prefer an AMD processor over an Intel processor and vice versa.

Answers

Answer: AMD’s Ryzen 3000 series of desktop CPUs are very competitive against Intel’s desktop line up offering more cores (16 core/32 thread for AMD and 8 core/16 thread for Intel) but with a lower power draw - Intel may have a lower TDP on paper but my 12 core/24 thread 3900x tops out at around 140W while a i9 9900K can easily hit 160W-180W at stock settings despite having a 10W lower TDP.

At which stage of problem solving should you discuss the problem with colleagues?

Answers

The stage of problem solving one should discuss the problem with a colleague is defining the problem.

How to explain the information

To begin developing a problem-solving approach, it's critical to recognize the issue at hand. It will be more difficult to determine a solution if you can't collectively recognize the issue.

Although each phase in the problem-solving process is critical, defining the problem comes first since without it, the other processes are meaningless.

The stage of problem solving one should discuss the problem with a colleague is defining the problem.

Learn more about problem on

https://brainly.com/question/7507783

#SPJ1

Computer one on network A, with IP address of 10.1.1.8 want to send a package to computer to with IP address of 10.1.1.205. Taking in consideration that computer one is sending an FTP request to computer to the store support on computer one is 21086, which of the following contains the correct information for the first TCP segment of data

Answers

Note that the right information for the first TCP segment of data in the given scenario is  -

Source Port - 21086Destination Port - 21Sequence Number - 1 Acknowledgment   Number - 2

Why  is this so?

Since   Computer 1 is sending an FTP request to Computer 2, the source port on Computer 1 would be 21086,the destination port would be 21   (FTP default port),the sequence number   would start at 1, and the acknowledgment number would be 2.

A TCP segment is a  unit of data encapsulatedin a TCP /IP packet used for communication between devices over a   network.

Learn more about TCP at:

https://brainly.com/question/18956070

#SPJ1

Full Question:

Although part of your question is missing, you might be referring to this full question:

Computer 1 on network A, with IP address of 10.1.1.8, wants to send a packet to Computer 2, with IP address of 10.1.1.205. Taking in consideration that computer 1 is sending a FTP request to computer 2, and the source port on computer 1 is 21086, which of the following contains the correct information for the first TCP segment of data?

Source Port: 5000

Destination Port: 80

Sequence Number: 1

Acknowledgment Number: 2

Source Port: 21086

Destination Port: 21

Sequence Number: 1

Acknowledgment Number: 2

Source Port: 21

Destination Port: 21

Sequence Number: 4

Acknowledgment Number: 1

Source Port: 80

Destination Port: 5000

Sequence Number: 1

Acknowledgment Number: 1

Answer:

Explanation:

Note that the right information for the first TCP segment of data in the given scenario is  -

   Source Port - 21086

   Destination Port - 21

   Sequence Number - 1

   Acknowledgment   Number - 2

Why  is this so?

Since   Computer 1 is sending an FTP request to Computer 2, the source port on Computer 1 would be 21086,the destination port would be 21   (FTP default port),the sequence number   would start at 1, and the acknowledgment number would be 2.

A TCP segment is a  unit of data encapsulatedin a TCP /IP packet used for communication between devices over a   network.

What is an online payment gateway?​

Answers

Answer:

it is the key component of the electronic payment processing system, or through which type of payment you are giving through.

Explanation:

brainiliest

I’m c language Print the two strings, firstString and secondString, in alphabetical order. Assume the strings are lowercase. End with newline. Sample output:
capes rabbits

Answers

Answer:

#include <stdio.h>

void printStringsInSameLine(char *firstString, char *secondString) {

 printf("%s %s \n", firstString, secondString);

}

int main() {

 char *firstString = "capes";

 char *secondString = "rabbits";

 printStringsInSameLine(firstString, secondString);

 return 0;

}

Explanation:

In an executing process, the program counter points __________.

Answers

Answer:

To the next instruction to be executed and is incremented after each instruction has been executed.

Explanation:

Given that Program counter is a form of record or directory in a computer processor that has the location of the instruction that is currently being executed.

This it does in such a way that, following the execution of each instruction, the program counter increases the number of instructions it stored and immediately points to the subsequent instruction that follows.

Hence, in an executing process, the program counterpoints "To the next instruction to be executed and is incremented after each instruction has been executed."

How does one take personal responsibility when choosing healthy eating options? Select three options.

1 create a log of what one eats each day
2 increase one’s consumption of fast food
3 critique one’s diet for overall balance of key nutrients
4 identify personal barriers that prevent an individual from making poor food choices
5 eat only what is shown on television advertisements

Answers

The three options to a healthier eating culture are:

create a log of what one eats each daycritique one’s diet for overall balance of key nutrientsidentify personal barriers that prevent an individual from making poor food choices

How can this help?

Create a log of what one eats each day: By keeping track of what you eat, you become more aware of your eating habits and can identify areas where you may need to make changes. This can also help you to monitor your intake of certain nutrients, and ensure that you are getting enough of what your body needs.

Critique one’s diet for overall balance of key nutrients: A balanced diet should include a variety of foods from different food groups. By assessing your diet, you can determine whether you are consuming enough fruits, vegetables, whole grains, lean proteins, and healthy fats. If you find that you are lacking in any of these areas, you can adjust your eating habits accordingly.

Read more about healthy eating here:

https://brainly.com/question/30288452

#SPJ1

о
O
A. cache
C. URL
Attempts
A browser stores images and page elements in a on your device.
Save Answer
O
B. vault
D. cookie

Answers

A browser stores images and page elements in a on your device is cache. Therefore, option A is the correct answer.

Browser cache stores files needed by your browser to display the web sites it visits. This includes elements like the HTML file that describe the site, along with CSS style sheets, Javascripts, cookies, and images.

A browser cache is used to store web page elements such as images, scripts, and HTML files, so that when a user visits the same website again, the browser does not have to re-download all the elements. This helps to speed up page loading time and reduce bandwidth usage.

Therefore, option A is the correct answer.

Learn more about the browser stores here:

https://brainly.com/question/30549903.

#SPJ6

describe the impact of technology in your life . how does it affects your human relations with other people .​

Answers

Answer:

Technology has a huge impact on my life, it has helped me visit places, talk to people, and captivate me. For example, using a car I have visited my friends and family. This is making a stronger bond with those people I visited. And, using my phone I can call and text people. this has led to making lots of friends and stronger relationships. Technology is important for human contact unless you want to ride carriages around the streets.

You can Hyperlink by:

Question 5 options:

Press CTRL+K (shortcut)


Go to Insert tab, Link Group, Click on Link Icon


Right click on a word / shape / picture and choose Link


All of the above /

Answers

Answer:

All of the above

Explanation:

I tryed them all

Answer: All of thee above

Which statement best describes Link State routing? Group of answer choices Each router builds a cost-weighted graph of the network of all the routers and the shortest links between them, based on information received from each router regarding only its nearest neighbors All of these Each router uses a HELLO packet to announce its presence to its neighbors Each router builds a table with the best distance between each router and the link to use, based on each router’s providing data on distances to all the routers in its routing table to its nearest neighbors

Answers

Answer:

Each router builds a cost-weighted graph of the network of all the routers and the shortest links between them, based on information received from each router regarding only its nearest neighbors.

Explanation:

A routing protocol can be defined as a set of defined rules or algorithms used by routers to determine the communication paths unto which data should be exchanged between the source router and destination or host device.

Additionally, in order for packets to be sent to a remote destination, these three parameters must be configured on a host.

I. Default gateway

II. IP address

III. Subnet mask

After a router successfully determines the destination network, the router checks the routing table for the resulting destination network number. If a match is found, the interface associated with the network number receives the packets. Else, the default gateway configured is used. Also, If there is no default gateway, the packet is dropped.

Basically, there are two (2) main categories of routing protocols used in packet switching networks and these includes;

1. Distance-vector routing.

2. Link state routing.

Link state routing refers to a complex routing technique in which each router learns about it's own neighborhood or directly connected networks (links) and shares the information with every other router present in the network.

Hence, the statement which best describes Link State routing is that, each router builds a cost-weighted graph of the network of all the routers and the shortest links between them, based on information received from each router regarding only its nearest neighbors. Some examples are intermediate system to intermediate system (IS-IS) and open shortest path first (OSPF).

Which of the following is a real job title on The interactive media career pathway?

Which of the following is a real job title on The interactive media career pathway?

Answers

Answer:

The right answer is A

Explanation:

Plzzzzzzzzzzzzz give me brainiest

The answer to your question is B

You are about to deploy a new server that will contain sensitive data about your clients. You want to test the server to look for problems that might allow an attacker to gain unauthorized access to the server. This testing should not attempt to exploit weaknesses, only report them. What type of test should you perform?

Answers

Answer:

Vulnerability Scan

Explanation:

PLEASE PEOPLE WHO DO PYTHON PLEASE HELP ITS DUE IN THE NIGHT
if you do not know the answer please do not answer otherwise I will report.
the answer that works will get brainliest


Please help me debug this code

PLEASE PEOPLE WHO DO PYTHON PLEASE HELP ITS DUE IN THE NIGHTif you do not know the answer please do not

Answers

Answer:Yo i was just on this in codehs

Explanation:

def turn_right():

   turn_left()

   turn_left()

   turn_left()

def jump_hurdle():

   turn_left()

   move()

   turn_right()

   move()

   turn_right()

   move()

   turn_left()

while front_is_blocked():

   jump_hurdle()

   

while front_is_clear():

   move()

In the program below, numA is a
def multiply(numA, numB):
product = numA* numB
return product
answer = multiply(8,2)
print (answer)

parameter

qualifier

accumulator

return value

Answers

Answer:

parameter

Explanation:

In the function 'multiply' you can pass values in that are to be used inside the function. These are called 'parameters' and are in parentheses after the function name.

- A qualifier is a name that adds extra information, such as 'final' to prevent reassignment

- An accumulator is a variable you use to sum up a bunch of values

- A return value is a mechanism to pass the result of a function back to the calling program (into 'answer' in above example).


If you wanted readers to know a document was confidential, you could include a ____ behind the text stating
"confidential".
watermark
theme
text effect
page color

Answers

I have no idea for that

Answer:

watermark

Explanation:

A pop up blocker is a web browser feature that?

Answers

Answer:

blocks websites so you cant do them if your taking a test some of them wont allow pop up blockers and you will not be able to take the test or a website that does not accpet pop up blockers

Explanation:

Answer: prevents unwanted advertisements

Explanation:

Starting with a context diagram, draw as many nested DFDs as you consider necessary to represent all of the details of the engineering document management system described in the following narrative. You must draw at least a context diagram and a level-0 diagram. In drawing these diagrams, if you discover that the narrative is incomplete, make up reasonable explanations to complete the story. Provide these extra explanations along with the diagrams.

Projects, Inc. is an engineering firm with approximately 500 engineers that provide mechanical engineering assistance to organizations, which requires managing many documents. Projects, Inc. is known for its strong emphasis on change management and quality assurance procedures. The customer provides detailed information when requesting a document through a web portal. An engineer is assigned to write the first draft of the requested document. Upon completion, two peer engineers review the document to ensure that it is correct and meets the requirements. These reviewers may require changes or may approve the document as-is. The document is updated until the reviewers are satisfied with the quality of the document. The document is then sent to the customer for approval. The customer can require changes or accept the document. When the customer requires changes, an engineer is assigned to make the changes to the document. When those changes are made, two other engineers must review those changes. When those reviewers are satisfied with the changes, the document is sent back to the customer. This may happen through several iterations until the customer is satisfied with the document

Answers

DFDs come in two varieties: logical and physical. Logical diagrams show the theoretical flow of information through a system, including the origin, route, transformation, and destination of the data.

What is context data flow diagram?Context diagrams concentrate on the interactions of your system with external elements. It is the most straightforward type of data flow diagram, offering a comprehensive perspective of the system and external entities in a manner that is simple to understand. It is also referred to as a level 0 data flow diagram due to its simplicity.DFD Another name for Level 0 is a context diagram. It provides a basic summary of the entire system or process that is being studied or modeled. The system is displayed as a single, high-level process, along with its relationship to external entities, in what is intended to be an overview view.The context diagram is divided into many bubbles and processes in 1-level DFD. In this level, we emphasize the system's primary functions and decompose the high-level DFD process into smaller processes.

Learn more about context data flow diagram refer to :

https://brainly.com/question/12972996

#SPJ1

Starting with a context diagram, draw as many nested DFDs as you consider necessary to represent all
Starting with a context diagram, draw as many nested DFDs as you consider necessary to represent all

What does this button mean in the computer ????????

What does this button mean in the computer ????????

Answers

Answer:

Context menu

Explanation:

If you want to open a context menu this is the one

Alternative is Shift+F10 in most applications to open a context menu. It's basically the same thing as the menu key

Answer:

Context Menu

Explanation:

this button mean in the computer

Other Questions
Credit-driven bubbles are _______ to identify and pose a _____ threat to the financial system compared to bubbles driven solely by irrational exuberance. 24) Find center vertices foci asymptotes Axons of the corticobulbar tract synapse in the motor nuclei of cranial nerves. autonomic motor neurons in the spinal cord. somatic motor neurons in the spinal cord. nuclei in the thalamus. why are the repirometers incubated at 37 degrees C in this experiment instead of a cooler temperature? Sven immigrated to the United States at age 12 and obtained citizenship at age 18. He speaks with a thick accent . When he applied for a job as a bank clerk, someone else was selected because the other person was more accurate in counting money Has Sven been the subject of illegal discrimination ? 17Select ALL the correct answers.Which two statements describe impacts of the death of George Floyd?It created a public discussion about systemic racism.It caused nationwide protests against new immigration laws.It mobilized public support for policies to control global climate change.It resulted in renewed concerns about police brutality,OIt helped to ease tensions between law enforcement and Black communities. Security Commission Is Liberising The Unit Trust Industry With New FrameworkBy Editor -December 21, 2021The Securities Commission Malaysia has announced that it will liberalise the unit trust fund framework, enabling retail funds to invest in and offer a wider range of investment instruments and activities. Accordingly, this will enable management companies to develop more innovative products whilst ensuring adequate investor protection.Under the new framework, a robust investment ecosystem is expected to provide a catalyst for product offerings as part of a wealth management solution to meet investors retirement objectives, including the offering of wealth decumulation products. The liberalisation is also in line with the Capital Market Masterplan 3s aspiration to become a capital market that is relevant, efficient, and diversified in the next five years benefitting each and every stakeholder.According to SC, unit trust funds continue to be the largest component of the Malaysian Collective Investment Scheme industry. As of 31 October 2021, there are 39 locally-incorporated management companies approved to offer 734 unit trust funds with a total net asset value (NAV) of RM551.36 billion. "These enhancements will enable retail funds to offer more diverse offerings to meet the demand and risk appetites of a wide range of investors. It will encourage the growth and development of unit trust management companies and also, enable investors to rebalance their short and long term objectives with more diversified investment offerings," said SC Chairman Datuk Syed Zaid Albar.The amendments in the Guidelines on Unit Trust Funds (Guidelines) will take effect on 1 March 2022, it took into account the SCs findings following an extensive benchmarking exercise and feedback received from the public consultation process.Additionally, the SC has engaged with key stakeholders to ensure a seamless implementation of the amendments. The key amendments to the enhanced Guidelines include expanding the list of permissible investments by unit trust funds, enhancing the operational processes in managing a fund, and providing further clarity on existing requirements for market participants.Other measures include allowing unit trust funds to undertake more activities for the purpose of efficient portfolio management. Risk management requirements at enterprise and fund levels have also been strengthened, including the requirement for fund information to be made available on the management companies websites. Consequential amendments to the Guidelines on Private Retirement Schemes and Guidelines on Exchange-traded Funds will also be implemented, with appropriate modifications.Questions:a) Critique the above article and explain the important steps in portfolio theory that should be applied when managing a Unit Trust. (600 words)(i will be appreciate if you can answer by screenshoot or write on paper. Thanks!) the equation p=2/5m what is the independent variable? In President Lincoln's Second Inaugural Address, he suggestedThe fault of the war laid with both the North and South due to their roles in centuries of slavery.The Northern States were to blame for the Civil War because they were destructive to the Southern economy.The Confederate States were at fault for the war and should be harshly punished for their actions.Neither side was at fault because the war was inevitable due to British and French intervention playing the North and South off each ot wanda drinks frequently and requires more alcohol now than she did six months ago to achieve the same effect. she reports that she can out-drink most people. wanda is probably Quadrilateral A B C D is shown. Angle A is 128 degrees, angle B is 126 degrees, and angle C is 54 degrees.What is the measure of angle D?52o54o57o126o 3/8+1/4 in to simplest form?explain steps not true of the mystery cults: a, were popular throughout the mediterranean and near east. b. promised immortality. c. involved strict initiation rituals. d. emphasized a strict ethical code of conduct. according to your textbook, motivation _____ behavior and emotion _____. PLEASE HELP ASAP!!If an element has the atomic number of 13 and a mass number of 27, whatis that element?-cobalt-aluminum-silicon Which sentence uses the correct capitalization? Parallel field lines evenly spaced and all pointing left labeled B. There is a point with a vector down labeled v. There is a circle next to the point labeled F. Use the right-hand rule for magnetic force to determine the charge on the moving particle. This is a charge. Name all 50 states. Just thinking of fun ways to give away a lot of points. Good luck 3773 more points to go. Whats morewhats your purpose for reading?PURPOSEACTIVITY>get an overview of the text>search for a specific fact>check what theory the autor is using>under stand a concept>Analyze the steps in a argument>compare ideas with what the author say Select the correct answer.Which set of absolute values is compared correctly?A. -71