AWS CDN is O CloudFormation O CloudFront O CloudCDN O CloudCache Question 44 A CloudFront origin can be 53 Bucket ELB/ALB EC2 Instance Lambda Function ? (Select 3) Question 45 CloudFront will cache web for how long? TLL TTL RFC SNMP Question 46 WAF can protect against which of the following threats? O SYN Floods O Shell Shock O Heart Bleed O Back Doors Question 47 WAF can be configured to be dynamically updated by a Lambda function. True O Fale Question 48 Shield Standard must be enabled before providing DDOS protection. O True O False Question 49 WAF can be configured to block all traffic from specified countries. True O False Question 50 If your business or industry is a likely target of DDoS attacks, or if you prefer to let AWS handle the majority of DDoS protection and mitigation responsibilities for layer 3, layer 4, and layer 7 attacks, AWS Shield Advanced might be the best choice. O True O False

Answers

Answer 1

True. Amazon Web Services (AWS) provides an easy-to-use, pay-as-you-go cloud computing service that can help you develop and deploy applications and services quickly and easily.

AWS CDN is CloudFront.A CloudFront origin can be S3 Bucket, ELB/ALB, EC2 Instance, Lambda Function.CloudFront will cache web for how long? The TTL can be set between 0 seconds and 365 days.WAF can protect against SYN Floods, Shell Shock, Heart Bleed, Back Doors.WAF can be configured to be dynamically updated by a Lambda function. True.Shield Standard must be enabled before providing DDOS protection. True.WAF can be configured to block all traffic from specified countries.

You can configure your CloudFront distribution to pull content from one or more of these origins, depending on your application requirements.CloudFront caches web content for a default time-to-live (TTL) of 24 hours, but you can configure this value to be as short as 0 seconds or as long as 365 days. This gives you control over how long your content is cached on the edge locations, which can help you reduce latency and improve performance. CloudFront also supports several cache invalidation methods, such as invalidating individual files or directories, or purging the entire cache, which can be used to force CloudFront to fetch updated content from the origin.CloudFront integrates with AWS WAF (Web Application Firewall) to provide additional security features like IP blocking, SQL injection protection, cross-site scripting (XSS) protection, and more.

You can configure your CloudFront distribution to use an AWS WAF rule set to block or allow traffic based on specific criteria, such as IP address, user agent, or HTTP header.WAF can be configured to be dynamically updated by a Lambda function. This means that you can write a Lambda function that updates your WAF rule set based on real-time events, such as an increase in traffic or an attack on your website.  Shield Advanced also includes AWS WAF and AWS Firewall Manager at no extra cost. If your business or industry is a likely target of DDoS attacks, or if you prefer to let AWS handle the majority of DDoS protection and mitigation responsibilities for layer 3, layer 4, and layer 7 attacks, AWS Shield Advanced might be the best choice.

To know more about Lambda Function visit :

https://brainly.com/question/30754754

#SPJ11


Related Questions

You have been hired to perform a penetration test for an organization. You are given full knowledge of the network before the test begins. Which type of penetration test are you performing

Answers

Answer:

If you are performing a penetration test with knowledge you are known as a white-hat hacker.

The
Patterns, Fonts, and Document History tabs are located in the right
panel. Enter the answer.

Answers

Answer:

No

Explanation:

It is FALSE that the Patterns, Fonts, and Document History tabs are located in the right panel.

This is because the Patterns and Fonts are means of formatting documents in the Microsoft Word application and it can be found in the Formatting toolbar which in the latest Microsoft Word application can be found on the left side of the window panel.

Similarly, the Document History is found on the left panel of the window.

Hence, in this case, the correct answer is "NO."

Answer:

The Brushes, Patterns, Fonts, and Document History tabs are located in the right panel

Explanation:

I took the test so its Brushes.

(Please hurry will give brainliest and anything else please Due in 5 min)

Dacey wants to calculate and display the result for the quotient of 180 divided by 60.

Which Python statement should Dacey use?

print(60 / 180)
print("60 / 180")
print = (180 / 60)
print(180 / 60)

Answers

Answer:

Number 4

Explanation:

I would say Option 4 as well

Elements in a SmartArt graphic are grouped in ____.
Answers:
a.
aggregates
b.
fields
c.
levels
d.
clusters

Answers

In a SmartArt graphic, elements are grouped or organized based on different levels. Each level represents a distinct category or hierarchy within the graphic.

What is the smartArt

For example, in a hierarchical SmartArt graphic, such as an organizational chart, the elements represent different positions or roles within an organization. The top-level element typically represents the highest level of authority or the overall organization, while subsequent levels represent different departments, teams, or individuals within the structure.

These levels in a SmartArt graphic help visually represent the relationships and hierarchy between different elements or categories. They provide a structured and organized way to present information, making it easier to understand complex concepts or relationships.

Read moer on SmartArt graphic here https://brainly.com/question/23922320

#SPJ4

What are three primary reasons for asking others to review and comment on a presentation?
O to document feedback, edit images, or share credit for the presentation
O to review content for accuracy, suggest improvements, or document feedback
O to suggest improvements, maintain record keeping, or review images for accuracy
O to maintain record keeping, share credit for the presentation, or suggest improvements

Answers

Answer:

to review content for accuracy, suggest improvements, or document feedback

Explanation: answer is b

Explain the expression below
volume = 3.14 * (radius ** 2) * height

Answers

Answer:

Explanation:

Cylinder base area:

A = π·R²

Cylinder volume:

V = π·R²·h

π = 3.14

R - Cylinder base radius

h - Cylinder height

means an intruder has managed to extract a database of passwords (for example with a reverse shell) for cracking at a later time.

Answers

If an intruder has managed to extract a database of passwords, it means that they have gained unauthorized access to a system or network and have collected sensitive information and managed to extract sensitive information, such as user credentials.

How an intruder has managed to extract a database of passwords?

This is a serious security breach and can have significant consequences for the affected parties. It is important to take immediate action to prevent any further unauthorized access and to secure the compromised system. This may involve resetting all passwords, implementing additional security measures such as two-factor authentication, and investigating the source and extent of the intrusion. It is also important to educate users on the importance of strong passwords and to regularly update and monitor the security of the system and its database. An intruder obtaining a database of passwords typically means that they have gained unauthorized access to a system This can be done using methods like a reverse shell, which allows the intruder to remotely control the compromised system. The intruder may then attempt to crack these passwords at a later time to gain further access to user accounts or sensitive data.

To know more about security breach visit:

https://brainly.com/question/30300203

#SPJ11

What is true about Electronic Business Cards in Outlook 2016? Check all that apply.
They are a way to share contact information with other users.
You can choose what is included on the business card.
You can create multiple electronic business cards.
They can be shared only with users in the organization.
You cannot send electronic business cards by email.

Answers

Answer:

A. B. C.

Explanation:

They are a way to share contact information with other users and You can choose what is included on the business card.

What is Electronic business cards?

Information exchange in the modern era is done through digital business cards.

Digital business cards, also referred to as virtual or electronic cards, are more interactive, economical, and environmentally friendly than traditional cards.

The ability to distribute digital business cards with anybody, everywhere is a big advantage. You can design your own digital business cards with  on a computer, an iOS device, or an Android device.

Therefore, They are a way to share contact information with other users and You can choose what is included on the business card.

To learn more about Business card, refer to the link:

https://brainly.com/question/28850206

#SPJ2

Including the word OR will make a search less specific.
O False
O True

Answers

Answer:

true, the word or makes it sound like there is a option.

True, it will make the search less specific.

hris has received an email that was entirely written using capitalization. He needs to paste this text into another document but also ensure that the capitalization is removed.

What should Chris do?

Answers

He should un caps lock it

When the function ƒ is very hard to compute with respect to the function ƒ, then such a function is known as ___________ function.
Select one:
(a). Encrypted
(b) Public Key
(c). Trapdoor
(d). Asymmetric

Answers

When the function ƒ is very hard to compute with respect to the function ƒ, then such a function is known as (c) Trapdoor function.

When the function ƒ is very hard to compute with respect to the function ƒ, it is known as a trapdoor function. A trapdoor function is a mathematical function that is easy to add in one direction but computationally difficult to reverse, unless you possess certain additional information called the "trapdoor." The trapdoor information allows for efficient computation of the inverse function. This property makes trapdoor functions useful in cryptography, particularly in asymmetric encryption schemes. By using trapdoor functions, it is possible to create cryptographic systems where encryption can be easily performed by anyone, but decryption requires possessing specific trapdoor information. This enables secure communication and protects sensitive information.

To learn more about function: https://brainly.com/question/11624077

#SPJ11

A central bank can help stop a bank panic by a. decreasing income taxes. b. raising the required reserve ratio c. acting as a lender of last resort. d. calling in consumer loans

Answers

The correct answer is: A central bank can help stop a bank panic by c. acting as a lender of last resort.
Here's a step-by-step explanation:
1. A bank panic occurs when many people withdraw their money from banks simultaneously, fearing that the banks may become insolvent.
2. When a large number of withdrawals occur, banks may run out of liquid assets and struggle to fulfill the withdrawal requests.
3. To prevent this situation, the central bank steps in as the lender of last resort, providing liquidity support to the troubled banks.
4. By lending money to banks in need, the central bank ensures that these banks can meet their customers' withdrawal demands.
5. This action restores confidence in the banking system and prevents further panic, ultimately stopping the bank panic.
I hope this helps! If you have any further questions, please don't hesitate to ask.

To know more about central bank visit:

https://brainly.com/question/31729012

#SPJ11

11
Type the correct answer in the box. Spell all words correctly.
What is the name of the option in most presentation applications with which you can modify slide elements?
The
option enables you to modify a slide element in most presentation applications.
Reset
Next

Answers

The View master is option enables you to modify a slide element in most presentation applications.

What is the slide elements?

The tool empowers you to alter different slide components such as content boxes, shapes, images, charts, and tables. You'll be able utilize this choice to alter the estimate, position, color, text style, and other properties of the chosen component.

The tool choice is utilized to fix any changes you made to the chosen slide component and return it to its unique state. The options is utilized to move to the following slide within the introduction.

Learn more about slide elements from

https://brainly.com/question/16599634

#SPJ1

In python Implement functions successor and predecessor. These functions will take two arguments: the root of a tree and an integer. The successor function returns the smallest item in the tree that is greater than the given item. The predecessor function returns the largest item in the tree that is smaller than the given item. Both functions will return -1 if not found. Note that the predecessor or successor may exist even if the given item is not present in the tree. Template:
# Node definition provided, please don't modify it.
class TreeNode:
def __init__(self, val=None):
self.val = val
self.left = None
self.right = None
# TODO: Please implement the following functions that return an integer
# Return the largest value in the tree that is smaller than given value. Return -1 if not found.
def predecessor(root, value):
pass
# Return the smallest value in the tree that is bigger than given value. Return -1 if not found.
def successor(root, value):
pass
if __name__ == "__main__":
# TODO: (Optional) your test code here.
my_root = TreeNode(3)
my_root.left = TreeNode(1)
my_root.right = TreeNode(5)
my_root.right.left = TreeNode(4)
print(successor(my_root, 2)) # expected 3
print(predecessor(my_root, 2)) # expected 1
print(successor(my_root, 3)) # expected 4

Answers

Here's a concise implementation of the successor and predecessor functions in Python:

The Python Program

class TreeNode:

   def __init__(self, val=None):

       self.val = val

       self.left = None

       self.right = None

def predecessor(root, value):

   if not root:

       return -1

   if root.val >= value:

       return predecessor(root.left, value)

   pred = predecessor(root.right, value)

   return pred if pred != -1 else root.val

# Test example

my_root = TreeNode(3)

my_root.left = TreeNode(1)

my_root.right = TreeNode(5)

my_root.right.left = TreeNode(4)

print(successor(my_root, 2))  # Output: 3

print(predecessor(my_root, 2))  # Output: 1

print(successor(my_root, 3))  # Output: 4

This implementation uses a recursive approach to traverse the tree and find the predecessor and successor values. The predecessor function compares the current node value with the given value and recursively searches in the left or right subtree accordingly. The successor function follows a similar logic but searches in the opposite direction. If a predecessor or successor is not found, it returns -1 as specified.

Read more about python program here:

https://brainly.com/question/26497128
#SPJ4

In comparison with a flat file system, _____ in a database.

Answers

In comparison with a flat file system,data organization in a database.

What is the database?

A database is an organized collection of structured data, generally stored and accessed electronically from a computer system. It is the collection of schemas, tables, queries, reports, views, and other objects. Database systems are used to store and manage large amounts of data. They can provide quick and easy access to data for applications, as well as ensuring data integrity and accuracy. Databases are used for a variety of purposes, including data warehousing, e-commerce, online transaction processing, data mining, and more.

To learn more about database

https://brainly.com/question/24027204

#SPJ1

What are cyber criminals like today?

Answers

Answer:

here's the answer I found

What are cyber criminals like today?

place the steps in order to keep a graphic from spilling over into the next page and to include the text it is assciated with.
highlight the text.
open the paragraph dialogue box,
select keep with text.
select the line and page break, click OK.

Answers

Answer:

1.highlight text and the graphic

2.open the paragraph dialog box

3.select the line and page breaks tab

4.select keep with text

5.click ok

Explanation:

Answer:

Highlight the text and the graphic

Open the paragraph dialogue box

Select the line and page breaks tab

Select keep with test

Click ok

Explanation:

An organization with multiple facilities wishes to reduce its water consumption. Is the following practice a 3G approach, a 4G approach, consistent with both 3G and 4G approaches, or neither a 3G nor a 4G approach. The EHS department might develop a generic approach to reduce facility water consumption, based on its expert knowledge. Yet each EHS expert would have the flexibility to work with a facility in any way he or she saw fit to reduce water consumption. Within a facility, the focus will be on high water consumption areas. That is a third generation approach, but not a fourth generation approach. That a fourth generation approach, but not a third generation approach. That is both a third and fourth generation approach. That is neither a third or fourth generation approach.

Answers

The described practice combines elements of both 3G and 4G approaches, as it involves developing a generic approach while allowing flexibility for individual experts and emphasizes targeting high water consumption areas within facilities.

The described practice is consistent with both 3G and 4G approaches.

Explanation:

Third Generation (3G) approach: The practice aligns with a 3G approach as it involves the EHS department developing a generic approach to reduce water consumption based on expert knowledge. Each EHS expert has the flexibility to work with facilities in their own way to achieve the goal, indicating a decentralized and adaptable approach.

Fourth Generation (4G) approach: The practice also aligns with a 4G approach as it focuses on specific areas within each facility that have high water consumption. This demonstrates a targeted and data-driven approach to identify and address areas of improvement.

To know more about 4G visit :

https://brainly.com/question/29761693

#SPJ11

When using the box model, the _____ is always transparent.

Answers

The "content" area of the box model is always transparent. The box model is a way to represent the layout of HTML elements.

The box model is a way to represent the layout of HTML elements. It consists of four components: content, padding, border, and margin. The content area is the space inside the element where its content is displayed. This area is always transparent because it does not have a background color or image by default. The padding, border, and margin areas can have background colors or images and can be styled in various ways, but the content area is always transparent unless explicitly styled.

learn more about HTML here:

https://brainly.com/question/17959015

#SPJ11

Where can a user add, rename, and reorder slides in order to create a custom slide show?
O Define Custom Show dialog box
O Navigation pane
O Set Up Slide Show dialog box
O Slide Sorter view

Answers

Answer:

Slide Sorter view

Explanation:

In PowerPoint, the Slide Sorter view allows a user to add, rename, and reorder slides in order to create a custom slide show. The user can select the slides they want to include in their custom show, and then use the options in the Ribbon or right-click menu to arrange the slides in the desired order. The user can also add new slides to the custom show by clicking the "New Slide" button in the Home tab, or by copying and pasting existing slides from the original presentation. Additionally, the user can rename slides in the Slide Sorter view by double-clicking the slide's title and typing in a new name.

User
Application Software
Operating System
Hardware

Assignment #1
•Explain the meaning of this graphics organizer base on what you have learned from this lesson.

• Is an "app" same in meaning with "application"? ​

User Application Software Operating System HardwareAssignment #1 Explain the meaning of this graphics

Answers

This graphics organizer base talks about Software and how it is divided into two groups such as the operating systems and application software.

What are Software?

Software are said to be often shared into  two categories such as:

The operating systems The application software.

Note that the Operating systems functions by helping the hardware and produce a kind of interface between the hardware and its user while the Application software is said to be a stage of a programs that help the user to do anything meaningful just as seen in the diagram.

Conclusively, The word "app" has the in meaning with "application". It is known to be the short form of application.

Learn more about Application Software from

https://brainly.com/question/1538272

PLEASE HELP Type the correct answer in the box. Spell all words correctly. Ross wants to add a graph from a text file format into his database. Which feature will enable him to add the graph in his database? Ross can use the______data feature to add the graph in his database.

Answers

Answer:

the answer to your problem is (insert)

Explanation:

Click Chart under the Illustrations group on the Insert tab.The Insert Chart dialogue box's arrows can be used to cycle through the various chart kinds.Click OK after selecting the type of chart you like.

What insert data feature to add the graph?

Select Data by selecting with the right mouse button on the chart. The Select Data Source dialogue box appears on the worksheet where the chart's source data are placed.

Click in the worksheet, then click and drag to choose all the data you wish to use for the chart, including the new data series, while keeping the dialogue box open.

The Insert SQL command is used to add new records or data to tables. Because it is used to alter database data, it is seen as falling within the umbrella of statements known as Data Manipulation Language (DML).

Therefore, insert data feature to add the graph in his database.

Learn more about insert data here:

https://brainly.com/question/14331259

#SPJ2

which would you use to replace the contents of an html page with the value stored in a variable named student?

Answers

Answer:

(Student.innerHTML);

Question #1
Describe the issues regarding controlled airspace and minimum safe altitudes that affects an airborne pilot's decision-making.


Question #2
Describe how basic weather conditions such as wind, temperature, and precipitation will
affect a drone’s flight.


Question #3
Explain the role of the “Pilot-in-Command” and the “Remote-Pilot-in-Command.”


Question #4
Explain how a quadcopter maintains balanced flight while hovering.


Question #4
Explain how a quadcopter differs from an airplane to accomplish the maneuvers of pitch, roll, and yaw.

Answers

Answer:

1) Separation

2) Weather impacts on the ability to fly a drone

3) The Pilot-in-Command is in charge of a manned aircraft

The Remote-Pilot-in-Command is in charge of an unmanned aircraft

4) With the aid of a flight controller

5) A quadcopter is controlled by adjusting the rotor speeds

An airplane is controlled by adjusting the ailerons, elevator and rudder

Explanation:

1) Separation

Issues regarding controlled airspace and minimum safe altitudes that affects an airborne pilot's decision-making is called separation related issues

The concept of separation pertains to ensuring that an aircraft stays outside the minimum distance from other aircraft, obstacles or controlled airspace

Vertical Separation

The allowable vertical separation distance between two aircraft from  the ground surface up to 29000 feet is 300 meters

The allowable vertical separation distance between two aircraft above 29000 feet is 600 meters

Horizontal separation

Horizontal separation are required for two aircraft that are closer to each other than the allowable minimum vertical separation. Horizontal separation includes, procedural separation, longitudinal separation, radar separation and reduced separation

2)

Wind

When the wind speed is high, it limits the drone's ability to maintain its position drifting the aircraft to undesired direction of flight

Temperature

High temperatures causes the the drone's motor to work harder generating more lift force which lead to shorter flight times

Cold temperatures reduces the battery efficiency and can also lower the battery voltage below the critical voltage.

Precipitation

A drone's is not waterproof and flying a drone i the rain can damage the equipment

Flying a drone in the rain increases the difficulty in its operation especially in drones that makes use of cameras for their flight stability

Rainy conditions reduces the strength and control of remote controllers

There is reduced visibility of flight during rainfall

3) In an aircraft, the Pilot-in-Command (PIC) is the pilot primarily responsible for the safety and operation of the aircraft during flight

The Remote-Pilot-in-Command has the primary responsibility and authority for the operation of a remotely operated (small) aircraft system

4) A quadcopter maintains balanced flight by the information sent to control  the direction of the propeller and the orientation as well as the speed of the rotor controlled by flight controller through the electronic speed control circuit (ESC) to control the thrust, revolutions per minute (RPM) and the direction of the quadcopter

5) Pitch in a quadcopter is achieved by tilting to move forward

In an airoplane the pitch is controlled by the elevators

Roll in a quadcopter is achieved by increasing the rotation of the rotors on the one side and decreasing the rotor speed on the other side

Roll in an airplane is achieved by adjusting ailerons

Yaw in a quadcopter is the spin achieved by reducing the speed of the front rotor on the side opposite to the direction of the intended spin motion

Yaw in an airplane is achieved by adjusting the ruder and ailerons to turn the plane

List out first 10 decimal equivalent numbers in binary, octal
hexadecimal number systems.

Answers

Answer:

Explanation:Base 10 (Decimal) — Represent any number using 10 digits [0–9]

Base 2 (Binary) — Represent any number using 2 digits [0–1]

Base 8 (Octal) — Represent any number using 8 digits [0–7]

Base 16(Hexadecimal) — Represent any number using 10 digits and 6 characters [0–9, A, B, C, D, E, F]

In any of the number systems mentioned above, zero is very important as a place-holding value. Take the number 1005. How do we write that number so that we know that there are no tens and hundreds in the number? We can’t write it as 15 because that’s a different number and how do we write a million (1,000,000) or a billion (1,000,000,000) without zeros? Do you realize it’s significance?

First, we will see how the decimal number system is been built, and then we will use the same rules on the other number systems as well.

So how do we build a number system?

We all know how to write numbers up to 9, don’t we? What then? Well, it’s simple really. When you have used up all of your symbols, what you do is,

you add another digit to the left and make the right digit 0.

Then again go up to until you finish up all your symbols on the right side and when you hit the last symbol increase the digit on the left by 1.

When you used up all the symbols on both the right and left digit, then make both of them 0 and add another 1 to the left and it goes on and on like that.

If you use the above 3 rules on a decimal system,

Write numbers 0–9.

Once you reach 9, make rightmost digit 0 and add 1 to the left which means 10.

Then on right digit, we go up until 9 and when we reach 19 we use 0 on the right digit and add 1 to the left, so we get 20.

Likewise, when we reach 99, we use 0s in both of these digits’ places and add 1 to the left which gives us 100.

So you see when we have ten different symbols, when we add digits to the left side of a number, each position is going to worth 10 times more than it’s previous one.

When the computer translates digital information to information humans can use, it is called.

Answers

Machine Translation (MT) is the process of using Artificial Intelligence (AI) to translate computer language to human visual interfaces.

Or you may be looking for the term User Interface or (UI)

Which communication device uses wireless data transmission? Select 4 options.

Answers

Answer:

Satellite Internet providers, Smart Speakers, Smartphones and Bluetooth headphones are all wireless data transmissions.

Explanation:

The transmission device that uses wireless data transmission are the smartphones, Bluetooth headphones, satellite internet providers and the smart speakers.

What is wireless data transmission?

Wireless data transmission is the transfer of digital or analogue signals using radio spectrum through the atmosphere. It doesn't involve wire or cables.

The examples of devices that makes use of wireless data transmission include the following:

Smartphones,

Bluetooth headphones,

satellite internet providers and

smart speakers.

A typical example of a device that makes use of cable is the Ethernet. An Ethernet connection transmits data over cable.

Learn more about data transmission here:

https://brainly.com/question/24373056

#SPJ2

The Excel file "Coco Cola Retum and Beta" shows monthly returns of Coca Cola and S8.P500 index over past 60 months. The arithmetic mean of Coca Cola's monthly return is \( \% \) (in 3 decimal places).

Answers

The arithmetic mean of Coca Cola's monthly return is approximately 0.982%.

Based on the provided data, let's calculate the arithmetic mean of Coca Cola's monthly return.

Month      | Coca Cola

------------------------

1/31/20    | 5.364%

12/31/19   | 3.587%

11/30/19   | -1.910%

10/31/19   | -0.018%

9/30/19    | -1.096%

8/31/19    | 4.477%

7/31/19    | 3.303%

6/30/19    | 3.579%

5/31/19    | 0.143%

4/30/19    | 4.588%

3/31/19    | 3.297%

2/28/19    | -5.972%

1/31/19    | 1.634%

12/31/18   | -6.242%

11/30/18   | 5.129%

10/31/18   | 3.593%

9/30/18    | 3.570%

8/31/18    | -4.518%

7/31/18    | 6.124%

6/30/18    | 1.980%

5/31/18    | -0.487%

4/30/18    | -0.508%

3/31/18    | 0.485%

2/28/18    | -9.632%

1/31/18    | 3.659%

12/31/17   | 0.240%

11/30/17   | -0.458%

10/31/17   | 2.132%

9/30/17    | -1.193%

8/31/17    | -0.635%

7/31/17    | 2.183%

6/30/17    | -1.373%

5/31/17    | 5.237%

4/30/17    | 1.659%

3/31/17    | 1.137%

2/28/17    | 0.934%

1/31/17    | 0.265%

12/31/16   | 2.714%

11/30/16   | -4.956%

10/31/16   | 0.189%

9/30/16    | -2.589%

8/31/16    | -0.459%

7/31/16    | -3.822%

6/30/16    | 1.624%

5/31/16    | -0.447%

4/30/16    | -3.488%

3/31/16    | 7.287%

2/29/16    | 0.488%

1/31/16    | -0.093%

12/31/15   | 0.795%

11/30/15   | 0.636%

10/31/15   | 5.409%

9/30/15    | 2.014%

8/31/15    | -4.379%

7/31/15    | 4.608%

6/30/15    | -4.315%

5/31/15    | 0.981%

4/30/15    | 0.025%

3/31/15    | -6.562%

2/28/15    | 5.044%

To calculate the arithmetic mean, we sum up all the monthly returns and divide by the number of months:

Arithmetic Mean of Coca Cola's Monthly Return = (5.364 + 3.587 - 1.910 - 0.018 - 1.096 + 4.477 + 3.303 + 3.579 + 0.143 + 4.588 + 3.297 - 5.972 + 1.634 - 6.242 + 5.129 + 3.593 + 3.570 - 4.518 + 6.124 + 1.980 - 0.487 - 0.508 + 0.485 - 9.632 + 3.659 + 0.240 - 0.458 + 2.132 - 1.193 - 0.635 + 2.183 - 1.373 + 5.237 + 1.659 + 1.137 + 0.934 + 0.265 + 2.714 - 4.956 + 0.189 - 2.589 - 0.459 - 3.822 + 1.624 - 0.447 - 3.488 + 7.287 + 0.488 - 0.093 + 0.795 + 0.636 + 5.409 + 2.014 - 4.379 + 4.608 - 4.315 + 0.981 + 0.025 - 6.562 + 5.044) / 60

Calculating the above expression, we find that the arithmetic mean of Coca Cola's monthly return is approximately 0.982% (rounded to three decimal places).

Learn more about data here:

https://brainly.com/question/32203721

#SPJ11

(25 POINTS) Some applications work on all devices while others work on some devices. True or False?

Answers

Answer:

True.

Explanation:

It is true that some applications work on some devices but not on others. This is so because it depends on the operating system of each device, that is, if the device has an operating system compatible with the application in question, said application will work, but if, on the contrary, the operating system is not compatible, the application will not be useful in this.

which issue of computer ethics is concerned about the technological division in the society?​

Answers

Answer:

There are many legal and ethical issues with computers that can be exploited by bad people to do bad things. Some of those issues include illegal music and video file downloading, spyware, identity theft, phishing, keystroke logging, packet sniffing and cyberbullying

The issue of computer ethics concerned with technological division in society is known as "Digital Divide."

What is Digital Divide?

It refers to the unequal access and disparities in the use of technology, where certain groups or individuals have limited or no access to digital resources, skills, and opportunities, leading to social and economic inequalities.

The digital divide can be caused by factors such as socioeconomic status, geographic location, education, and infrastructure availability, raising ethical concerns about fairness, inclusivity, and the potential for exacerbating existing societal divisions.

Read more about computer ethics here:  

https://brainly.com/question/20264892

#SPJ2

Other Questions
Tom Brotherton decided at age 44 to purchase a five-year term policy for $500,000. What is his monthly premium? (Round your answer to the nearest cent.) Monthly premium per month find the measure of each angle in the problem hey anyone know this ? every other customer entering a shoe store was given one of two different coupons. one coupon offered a second pair of shoes for 50% off. the other coupon offered to reduce the total price by 25% if two pairs of shoes were purchased. the purpose was to determine which coupon was more effective in getting individuals to buy two pairs of shoes. in this experiment the independent variable is: group of answer choices the type of coupon Which of the 3 things did George Washington NOT warn us about? 1.Agreements with foreign nations could work against the United States best interests 2.American leaders should remain neutral 3.Personal political attacks could weaken the nation 4.Two or more political parties would benefit the nation Show all your work. Indicate clearly the methods you use, because you will be scored on the correctness of your methods as well as on the accuracy and completeness of your results and explanationsCompany F sells fabrics known as fat quarters, which are rectangles of fabric created by cutting a yard of fabric into four pieces. Occasionally the manufacturing process results in a fabric defect. Let therandom variable X represent the number of defects on a fat quarter created by Company F. The following table shows the probability distribution of X02 34 or moreProbability 0. 5810. 230. 110. 050. 03If a fat quarter has more than 2 defects, it cannot be sold and is discarded. Let the random variable Y represent the number of defects on a fat quarter that can be sold by Company F FILL THE BLANK. When examining the core competence-market matrix, the most challenging diversification strategy occurs when firms attempt to combine ______ with ______. Hello! I have this question Im stumped on Why did ji li hold mixed emotions By bundling share purchases of many investors together mutual funds can take advantage of economies of scale and thereby lower. Given m = (3,-6) and n = (-10,4), evaluate 5m + 11n. a (-95, 10) b (-7, -2) c (-17,-46) d (-95, 14) The sum of 9 and thequantity 2 times anumber t. compared to its average speed in air, the average speed of a beam of light in glass isA) the same. B) more. C) less. describe the ethical foundations and approaches that underline modern codes of ethics if point c is between points A and B then AC + CB= Sarah is x years old Thomas is 3 years older than Sarah David is twice as old as Sarah the total of their ages is 51 form an equation in x and solve it to work out Sarah's age if you break down the word interactions, it means the actions between. How would you define interactions between two species? A biologist uses the chi-square test to determine whether the observed distribution of 5 species matches an expected theoretical distribution. The chi-square test yields a 2 test statistic of 11.143.What is the null hypothesis? What is the alternative hypothesis? What is the number of degrees of freedom? What is the p-value? Does the data differ from expected distribution at the =0.01 significance level? Is time travel possible? Can we go to the past or the future? Two students are planning to carry out an experiment to infer the strength of intermolecular forces. Which three experiments would accomplish this goal?.