The agent under the terms of the uniform securities act is I and II.
What is agent?Agent under the terms of the uniform securities act in sections 36b-2 to 36b-34 is "any individual, other than a broker-dealer, who represents a broker-dealer or issuer in effecting or attempting to effect purchases or sales of securities."
For the first statement, a sales that representative of a broker-dealer is a agent in terms of uniform securities act.
For the second statement, a assistant to the president of a broker-dealer is a administrative person if he/she take order individually from a public is considered as an agent, because he/she considered not part of broker-dealer.
For the third statement, is not agent because is registered as broker-dealer.
For the fourth statement, is not agent because is registered as issuer.
Your question is incomplete, but most probably your full question was
Which of the following would be an agent under the terms of the Uniform Securities Act?
I. A sales representative of a licensed broker-dealer who sells secondary securities to the general public
II. An assistant to the president of a broker-dealer who, for administrative purposes, accepts orders on behalf of senior partners
III. A subsidiary of a major commercial bank registered as a broker-dealer that sells securities to the public
IV. An issuer of nonexempt securities that are registered in the state and sold to the general public
Learn more about broker-dealer here:
brainly.com/question/28168486
#SPJ4
A __________ variable is used to keep track of the number of loops that have been executed. python (it is not 'counter' as the answer)
We use enumerate instead of counter.
How to use Python’s enumerate() ?It is almost identical to using the original iterable object that you can use enumerate() in a loop. Place the iterable inside the parentheses of the enumerate statement rather than right after in the for loop (). Additionally, as demonstrated in the following example, you must slightly alter the loop variable:
>>> for count, value in enumerate(values):
print(count, value)
Enumerate() returns two loop variables when used, as follows:
number of the most recent iteration
The item's value as of the current iteration
The loop variables can have any name you want, just like with a regular for loop. In this example, count and value are used, but they could also be called I and v or any other legal Python names.
Enumerate() eliminates the need to recall both accessing the item from the iterable and remembering to advance the index at the conclusion of loop. Python's magic takes care of everything for you automatically!
To know more about loop, check out:
brainly.com/question/25955539
#SPJ1
How could these same commands be used on a computer or network operating system?
Answer:
To manipulate data into information
Which button, when pressed, allows light from the subject to fall on the sensor?
Pressing the _____ button allows light from the subject to fall on the sensor.
Answer:
You press the shutter button
Explanation:
How does a bag represent a variable?
Answer:
it is there to stand for something
Explanation:
Which option provides an easy ability to label documents that can then be used as the basis for a document search?
author
title
tags
modified
The option which provides an easy ability to label documents that can then be used as the basis for a document search is referred to as: B. title.
A document can be defined as a computer resource that enable end users to easily store data as a single unit on a computer storage device.
Generally, all computer documents can be identified by a title, size, date modified, and type such as;
SystemTextAudioImageVideoA title is a feature that avail end users the ability to easily label a document, as well as serve as the basis for a document search on a computer. For example, "My list" is a title and it can be used to search for a document on a computer.
Read more on document here: https://brainly.com/question/24849072
Answer:
B: Title
Explanation: Edge 2023
How can I write a program in c language that calculates and produces these 2 columns sequence numbers using looping statement?
Enter a number: 5
Sequence: 1, 2, 3, 4, 5
Squared: 1, 4, 9, 16, 25
Do you want to continue? Y/N
N
Answer:
#include <stdio.h>
int main(void) {
// Declare variables to store the number and the loop counter
int num, i;
char cont;
do {
// Prompt the user to enter a number
printf("Enter a number: ");
scanf("%d", &num);
// Print the sequence of numbers from 1 to the user-specified number
printf("Sequence: ");
for (i = 1; i <= num; i++) {
printf("%d, ", i);
}
printf("\n");
// Print the squares of the numbers from 1 to the user-specified number
printf("Squared: ");
for (i = 1; i <= num; i++) {
printf("%d, ", i * i);
}
printf("\n");
// Ask the user if they want to continue
printf("Do you want to continue? Y/N: ");
scanf(" %c", &cont);
} while (cont == 'Y' || cont == 'y');
return 0;
}
what is Converting digital data and see information to display screen can use to create an image?
Answer:
Most displays in current use employ cathode ray tube ( CRT ) technology similar to that used in most television sets. The CRT technology requires a certain distance from the beam projection device to the screen in order to function.
Can anyone give me $2 (Reddem code/Promo Code)
Veronica observes how the force of friction causes an object to slow down. She writes the following observation: When an object moves across a smooth surface, there is less friction created than when an object moves across a rough surface. When the object stops moving, friction is created. Which statement corrects the error(s) in Veronica's observations?
The statement corrects the error in Veronica's observations is "when an object stops moving, there is no friction." The correct option is D.
What is friction?Friction is the force that prevents one solid object from sliding or rolling over another.
Frictional forces, such as the traction required to walk without slipping, are beneficial, but they also present a significant amount of resistance to motion.
When an object begins to move on a surface, friction is created. Veronica's conclusions about friction being less on a smooth surface and more on a rough surface were correct.
However, she stated that friction occurs when an object stops moving, which is incorrect. When an object is static, friction cannot be produced.
Thus, the correct option is D.
For more details regarding friction, visit:
https://brainly.com/question/28356847
#SPJ1
Your question seems incomplete, the missing options are:
It is not smooth or rough surfaces that affects friction. It is the size of the push.When an object moves across a rough surface, there is no friction.When an object moves across a smooth surface, the friction increases.When an object stops moving, there is no friction.Write a Java program that will be using the string that the user input. That string will be used as a screen
saver with a panel background color BLACK. The panel will be of a size of 500 pixels wide and 500 pixels in
height. The text will be changing color and position every 50 milliseconds. You need to have a variable
iterator that will be used to decrease the RGB color depending on if it is 0 for Red, 1 for Green, or 2 for Blue,
in multiples of 5. The initial color should be the combination for 255, 255, 255 for RGB. The text to display
should include the Red, Green, and Blue values. The initial position of the string will be the bottom right of
the panel and has to go moving towards the top left corner of the panel.
Using the knowledge in computational language in JAVA it is possible to write a code that string will be used as a screen saver with a panel background color BLACK.
Writting the code:import java.awt.*;
import java.util.*;
import javax.swing.JFrame;
class ScreenSaver
{
public static void main( String args[] )
{
Scanner sc=new Scanner(System.in);
System.out.println("Enter a name you want add as a Screen_saver:");
String s=sc.nextLine(); //read input
sc.close();
JFrame frame = new JFrame( " Name ScreenSaver " );
frame.setDefaultCloseOperation( JFrame.EXIT_ON_CLOSE );
JPanalSaver saver1JPanel = new JPanalSaver(s);
saver1JPanel.setPreferredSize(new Dimension(500,500));
frame.add( saver1JPanel );
frame.setSize( 500, 500 ); // set the frame size (if panel size is not equal to frame size, text will not go to top left corner)
frame.setVisible( true ); // displaying frame
}
}
JPanalSaver.java
import java.awt.Color;
import java.awt.Graphics;
import javax.swing.JPanel;
public class JPanalSaver extends JPanel {
int x1 = 500, y1 = 500;
int r = 255, g1 = 255, b = 255;
String color;
int iterator = 0;
JPanalSaver(String c) {
color = c;
}
public void paintComponent(Graphics g) {
super.paintComponent(g); // call super class's paintComponent
x1 = x1 - 5;
y1 = y1 - 5;
if (iterator ==0) {
r = Math.abs((r - 5) % 255);
iterator = 1;
} else if (iterator == 1) {
g1 = Math.abs((g1 - 5) % 255);
iterator = 2;
} else {
b = Math.abs((b - 5) % 255);
iterator = 0;
}
g.setColor(new Color(r, g1, b));
g.drawString(color + " " + r + " " + g1 + " " + b, x1, y1); //string + value of RGB
//top left position (0,0 will not display the data, hence used 5,10)
if (x1 > 5 && y1 > 10)
{
repaint(); // repaint component
try {
Thread.sleep(50);
} catch (InterruptedException e) {
} //50 milliseconds sleep
} else
return;
}
See more about JAVA at brainly.com/question/13208346
#SPJ1
select all of the following expressions that evaluate to true. assume that the following code is executed first:
"word" in "The last word", " " in title, "" in title, "Alabama" < "Virginia", "Coward" <= "Coward", "Dog" == "Dog"
What does "executed" mean in practice?The sale of a car in one lump sum is an illustration of a contract that has been carried out. As soon as the deal is done, the contract is over. However, before fulfilling expunction contracts, both parties must satisfy their obligations. An apartment lease is an illustration of an executory contract.
How many innocents have been put to death?The possibility of putting a guilty individual to be executed exists with the death sentence. At least 190 persons who were wrongfully convicted and given the death penalty in the United States have been cleared of all charges since 1973.
To know more about Executed visit:
https://brainly.com/question/28619736
#SPJ4
The complete question is-
Mark each of the following expressions if they evaluate to True. Assume that the following code is executed first:
title = "Harry Potter"
Discuss the impact of vision on your actions to keep a clean environment
Answer:
For healthy living a clean environment is crucial: The more you care about our environment, the more contaminants and toxins that have a detrimental effect on our health are polluted. Air pollution can lead, among other problems and diseases, to respiratory and cancer problems
Explanation:
Ensuring and improving the climate is an important resource for Irelanders. To safeguard against radiation and contamination damage our kin and the climate.
We have the vision:
A perfect environment to promote practical society and economy, which is sound and very secure.
Very few people are working to keep the environment clean. Although municipal authorities are responsible for making sure the environment is clean, the clean and green environment must also be supported.
Reasons Why We Should Care About the Environment
An essential part of human survival is the environment in which we live. I believe that people who don't care about the environment simply don't know how important it is for us all and how it doesn't directly affect them, which is why I want you to worry about the environment.
Earth Is Warming: We must do more to fight climate change for our children and our future. Yes, no single event trends. Yes, it is true. You can't ignore that now.
Biodiversity is essential: the diversity of plants, animals and the rest of our world is concerned with biodiversity. Habitat loss and degradation due, among other things, to human activity, climate change, and pollution could be negatively affected.
big data technologies typically employ nonrelational data storage capabilities to process unstructured and semistructured data. true or false
The correct answer is True. big data technologies typically employ nonrelational data storage capabilities to process unstructured and semistructured data.
Big data technologies are the computer programs that are used to handle all kinds of datasets and turn them into commercially useful information. Big data engineers, for example, use complex analytics to assess and handle amounts of data in their work. Big data's initial three qualities are its volume, velocity, and diversity. Variability, veracity, utility, and visualization are further traits of large data. The secret to correctly comprehending Big Data's utilization and application is to comprehend its qualities. Explanation: In the conventional sense, Apache Pytarch is not a big data technology. Apache , Apache Spark, and Apache are used as a component of a big data solution.
To learn more about big data technologies click the link below:
brainly.com/question/29555990
#SPJ4
Declare an arrray of integers and use the pointer variable and pointer arithmetic to delete a particular element of an array
An array is a type of data structure that contains a collection of items (values or variables), each of which may be located using an array index or key. Array types may overlap (or be distinguished from) other data types that express collections of values, such as lists and strings, depending on the language.
What is array?A collection of elements, each of which is identified by at least one array index or key, make up an array, a type of data structure. An array is stored in a way that allows a mathematical formula to determine each element's position given its index tuple.
#include<stdio.h>
#include<stdlib.h>
void delete(int n,int *a,int pos);
int main(){
int *a,n,i,pos;
printf("enter the size of array:");
scanf("%d",&n);
a=(int*)malloc(sizeof(int)*n);
printf("enter the elements:
");
for(i=0;i<n;i++){
scanf("%d",(a+i));
}
printf("enter the position of element to be deleted:");
scanf("%d",&pos);
delete(n,a,pos);
return 0;
}
void delete(int n,int *a,int pos){
int i,j;
if(pos<=n){
for(i=pos-1;i<n;i++){
j=i+1;
*(a+i)=*(a+j);
}
printf("after deletion the array elements is:
");
for(i=0;i<n-1;i++){
printf("%d
",(*(a+i)));
}
}
else{
printf("Invalid Input");
}
}
Outputenter the size of array:5
enter the elements:
12
34
56
67
78
enter the position of element to be deleted:4
After deletion the array elements are:
12
34
56
78
A data structure called an array consists of a set of elements (values or variables), each of which is identifiable by an array index or key. Depending on the language, additional data types that describe aggregates of values, like lists and strings, may overlap (or be identified with) array types.
To learn more about array refer to:
https://brainly.com/question/26104158
#SPJ1
Select the correct answer from each drop-down menu.
Maria is preparing a slide show on procedural programming. She wants to define procedural programming in one of the slides. Help Maria complete
the definition.
Procedural-oriented programming is a programming paradigm that views a problem as a series of ____ to be performed in a _____ manner.
a series of (objects, tasks, statements)
to be preformed in a (sequential, random, logical)
Answer:
Procedural-oriented programming is a programming paradigm that views a problem as a series of tasks to be performed in a sequential manner. In procedural programming, a program is broken down into a series of steps or procedures that are executed in a particular order to achieve a desired outcome. Each procedure is designed to perform a specific task, and the program flows from one procedure to the next until the final task is completed. This approach to programming is often used for creating small to medium-sized programs and is known for its simplicity, modularity, and ease of debugging.
Explanation:
Question 41
What is an another name of Personal Computer?
A OMicro-Computer
BOPrivate Computer
CODistinctive Computer
DOIndividual Computer
A personal computer, also known as a micro-computer, is a type of computer designed for individual use by a single person. Option A
It is a general-purpose computer that is meant to be used by an individual for various tasks, such as word processing, web browsing, gaming, and multimedia consumption. Personal computers are widely used by individuals in homes, offices, and educational institutions.
Option B, "Private Computer," is not a commonly used term to refer to a personal computer. The term "private" does not accurately describe the nature or purpose of a personal computer.
Option C, "Distinctive Computer," is not an appropriate term to refer to a personal computer. The term "distinctive" does not convey the common characteristics or usage of personal computers.
Option D, "Individual Computer," is not a commonly used term to refer to a personal computer. While the term "individual" implies that it is meant for individual use, the term "computer" alone is sufficient to describe the device.
Therefore, the most accurate and commonly used term to refer to a personal computer is A. Micro-Computer. This term highlights the small size and individual-focused nature of these computers. Option A
For more such questions micro-computer visit:
https://brainly.com/question/26497473
#SPJ11
How many bits are reserved for the Transmission Control Protocol (TCP) flags?
The movie polar express was critically acclaimed due to the unbelievably lifelike movements of Tom Hanks character
Answer:
False
Explanation:
xamine the following output:
Reply from 64.78.193.84: bytes=32 time=86ms TTL=115
Reply from 64.78.193.84: bytes=32 time=43ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=47ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=44ms TTL=115
Reply from 64.78.193.84: bytes=32 time=73ms TTL=115
Reply from 64.78.193.84: bytes=32 time=46ms TTL=115
Which of the following utilities produced this output?
The output provided appears to be from the "ping" utility.
How is this so?Ping is a network diagnostic tool used to test the connectivity between two network devices,typically using the Internet Control Message Protocol (ICMP).
In this case, the output shows the successful replies received from the IP address 64.78.193.84,along with the response time and time-to-live (TTL) value.
Ping is commonly used to troubleshoot network connectivity issues and measureround-trip times to a specific destination.
Learn more about utilities at:
https://brainly.com/question/30049978
#SPJ1
How will Excel summarize the data to create PivotTables? summarize by row but not by column summarize by column but not by row summarize by individual cells summarize by row and by column
Answer:
D. summarize by row and by column
Answer:
D.
Explanation:
int r=6;
int v=20;
System.out.println( r % v );
Answer:
output: 6
Explanation:
6 is the remainder of 6/20
Which of the following will increase the level of security for personal information on a mobile device if the device is lost or stolen
Answer:
this is a very cool day for me yeah know
Which one of these statements about digital signatures is true? A digital signature:
a. Is used to add a personal touch to e-mail messages.
b. Automatically encrypts the contents of an e-mail.
c. Is a scanned image of your real signature.
d. Is used to verify the identity of the sender of a message.
Answer:
A. Is used to add a personal touch to e-mail messages.Explanation:
A digital signature—a type of electronic signature—is a mathematical algorithm routinely used to validate the authenticity and integrity of a message (e.g., an email, a credit card transaction, or a digital document). ... Digital signatures are significantly more secure than other forms of electronic signatures.What is the last valid host on the subnet 172.29.72.0/23
The last valid host on the subnet 172.29.72.0/23 is 172.29.73.254.
To determine the last valid host on the subnet 172.29.72.0/23, we need to understand the concept of subnetting and how it affects the range of available host addresses.
In IPv4, subnetting allows for the division of a network into smaller subnetworks, each with its own range of usable host addresses.
The subnet 172.29.72.0/23 has a subnet mask of 255.255.254.0. The subnet mask determines the size of the network and the number of host addresses it can accommodate.
In this case, the /23 notation indicates that the first 23 bits are used to represent the network address, while the remaining 9 bits are available for host addresses.
To find the last valid host on this subnet, we need to determine the maximum number of hosts it can support. With 9 bits available for host addresses, we have 2^9 (512) possible combinations.
However, two of these combinations are reserved, one for the network address (172.29.72.0) and one for the broadcast address (172.29.73.255). Therefore, the actual number of usable host addresses is 512 - 2 = 510.
To find the last valid host address, we subtract 1 from the broadcast address.
In this case, the broadcast address is 172.29.73.255, so the last valid host address would be 172.29.73.254.
This is because the last address is reserved for the broadcast address and cannot be assigned to a specific host.
For more questions on host
https://brainly.com/question/27075748
#SPJ8
Attempting to write a pseudocode and flowchart for a program that displays 1) Distance from sun. 2) Mass., and surface temp. of Mercury, Venus, Earth and Mars, depending on user selection.
Below is a possible pseudocode and flowchart for the program you described:
What is the pseudocode about?Pseudocode:
Display a menu of options for the user to choose from: Distance, Mass, or Surface Temperature.Prompt the user to select an option.If the user selects "Distance":a. Display the distance from the sun for Mercury, Venus, Earth, and Mars.If the user selects "Mass":a. Display the mass for Mercury, Venus, Earth, and Mars.If the user selects "Surface Temperature":a. Display the surface temperature for Mercury, Venus, Earth, and Mars.End the program.Therefore, the Flowchart:
[start] --> [Display menu of options] --> [Prompt user to select an option]
--> {If "Distance" is selected} --> [Display distance from sun for Mercury, Venus, Earth, and Mars]
--> {If "Mass" is selected} --> [Display mass for Mercury, Venus, Earth, and Mars]
--> {If "Surface Temperature" is selected} --> [Display surface temperature for Mercury, Venus, Earth, and Mars]
--> [End program] --> [stop]
Read more about pseudocode here:
https://brainly.com/question/24953880
#SPJ1
GIVING BRAINLIEST AND 30 PTS
Overall this is a coding project that is like wordle but with three numbers. The compputer generates a three digit number and you have to guess the three digit number. You have three turns. (Use python coding please)
The rest of this desc is teacher instructions:
The player has to guess it and given clues if incorrect. The clues are: Pico One digit is correct but in the wrong position. Fermi One digit is correct and in the right position. Bagels The digit is not in the number
____________________________________________________________________
Create a game where there is a 3-digit secret number.
The player has to guess it and given clues if incorrect.
The clues are:
Pico One digit is correct but in the wrong position.
Fermi One digit is correct and in the right position.
Bagels The digit is not in the number.
The player is given 10 guesses.
Guess #1: 123 Fermi Bagels Bagels
Guess #2: 153 Fermi Pico Bagels
Guess #3: 185 Fermi Bagels Fermi
Guess #4: 165 Fermi Bagels Fermi
Guess #5: 175 Fermi Fermi Fermi
You got it!
Here's the Python code for the game:
The Programimport random
def generate_secret_number():
"""Generate a 3-digit secret number with no repeating digits."""
digits = list(range(10))
random.shuffle(digits)
if digits[0] == 0:
digits[0], digits[1] = digits[1], digits[0]
return digits[:3]
def get_guess():
"""Ask the player for their guess and validate it."""
while True:
guess = input("Enter your guess (3 digits with no repeating digits): ")
if len(guess) != 3 or not guess.isdigit():
print("Invalid input. Please enter 3 digits.")
elif len(set(guess)) != 3:
print("Digits cannot be repeated. Please enter 3 different digits.")
else:
return [int(digit) for digit in guess]
def get_clues(secret_number, guess):
"""Compare the secret number and the guess and return the clues."""
clues = []
for i, digit in enumerate(guess):
if digit == secret_number[i]:
clues.append("Fermi")
elif digit in secret_number:
clues.append("Pico")
else:
clues.append("Bagels")
return clues
def play_game():
"""Play the game until the player guesses the secret number or runs out of guesses."""
secret_number = generate_secret_number()
print("I'm thinking of a 3-digit number. Can you guess it?")
for i in range(1, 11):
guess = get_guess()
clues = get_clues(secret_number, guess)
print("Guess #{}: {} {}".format(i, " ".join(clues), " ".join(map(str, guess))))
if clues == ["Fermi", "Fermi", "Fermi"]:
print("You got it!")
return
print("Sorry, you didn't guess the number. It was {}.".format("".join(map(str, secret_number))))
play_game()
The game starts by generating a 3-digit secret number using the generate_secret_number function, which shuffles the digits 0 to 9 and picks the first three, ensuring that the first digit is not 0 and there are no repeating digits.
Read more about programming here:
https://brainly.com/question/23275071
#SPJ1
Jose is very careful about preventing malware from infecting his computer. In addition to avoiding suspicious email attachments and resisting the
temptation of clicking on pop-up ads, which of the following methods could Jose use to keep his computer safe?
Answer: There is many apps on the computer that may help Jose. Look up malware or software protection and perhaps you'll find one you like and that fits his computer. I hope this helps Jose!!!
Explanation:
Many adds pop up for safety and protection for your computer, the hard part is knowing which ones are true and which ones are false! I wouldn't risk buying any plans in that area unless your positive they are real. There are free apps that can help you without paying for them. I hope this helps!
6. Which of the following items is not a storage
medium?
A. Plotters
B. Zip disk
C. Hard disk
D. Memory stick
Answer:
Plotters
Explanation:
A 'plotter' is an external hardware device like a printer used with a computer to 'print vector graphics' - basically in english it no hold storage like that
1. A network administrator was to implement a solution that will allow authorized traffic, deny unauthorized traffic and ensure that appropriate ports are being used for a number of TCP and UDP protocols.
Which of the following network controls would meet these requirements?
a) Stateful Firewall
b) Web Security Gateway
c) URL Filter
d) Proxy Server
e) Web Application Firewall
Answer:
Why:
2. The security administrator has noticed cars parking just outside of the building fence line.
Which of the following security measures can the administrator use to help protect the company's WiFi network against war driving? (Select TWO)
a) Create a honeynet
b) Reduce beacon rate
c) Add false SSIDs
d) Change antenna placement
e) Adjust power level controls
f) Implement a warning banner
Answer:
Why:
3. A wireless network consists of an _____ or router that receives, forwards and transmits data, and one or more devices, called_____, such as computers or printers, that communicate with the access point.
a) Stations, Access Point
b) Access Point, Stations
c) Stations, SSID
d) Access Point, SSID
Answer:
Why:
4. A technician suspects that a system has been compromised. The technician reviews the following log entry:
WARNING- hash mismatch: C:\Window\SysWOW64\user32.dll
WARNING- hash mismatch: C:\Window\SysWOW64\kernel32.dll
Based solely ono the above information, which of the following types of malware is MOST likely installed on the system?
a) Rootkit
b) Ransomware
c) Trojan
d) Backdoor
Answer:
Why:
5. An instructor is teaching a hands-on wireless security class and needs to configure a test access point to show students an attack on a weak protocol.
Which of the following configurations should the instructor implement?
a) WPA2
b) WPA
c) EAP
d) WEP
Answer:
Why:
Network controls that would meet the requirements is option a) Stateful Firewall
Security measures to protect against war driving: b) Reduce beacon rate and e) Adjust power level controlsComponents of a wireless network option b) Access Point, StationsType of malware most likely installed based on log entry option a) RootkitConfiguration to demonstrate an attack on a weak protocol optio d) WEPWhat is the statement about?A stateful firewall authorizes established connections and blocks suspicious traffic, while enforcing appropriate TCP and UDP ports.
A log entry with hash mismatch for system files suggest a rootkit is installed. To show a weak protocol attack, use WEP on the access point as it is an outdated and weak wireless network security protocol.
Learn more about network administrator from
https://brainly.com/question/28729189
#SPJ1
What is an automatic update and when should you use it