Security analysis, Computer Engineering

Security Analysis:

Suppose you are a young securities analyst, working in a small brokerage firm. You have access to publicly available information relevant to valuation of the ASX 300 listed shares in the following sectors.
 
Energy
Industrials 
Financials
 
A list of the GICS sectors and corresponding companies can be found at the Aspect FinAnalysis site,
 
As a starter in the brokerage firm, you are asked to assist a senior financial analyst by collecting relevant company-specific and market data and conducting analysis to determine whether a share should be bought, sold or excluded from a client's portfolio.

Required 

Select a publicly listed company from each of the above sectors. 

Undertake fundamental analyses to recommend whether the share should be bought, sold or excluded from the portfolio. Identify and discuss relevant macro, industry-specific and company-specific factors governing your decision.

Posted Date: 2/23/2013 2:53:16 AM | Location : United States







Related Discussions:- Security analysis, Assignment Help, Ask Question on Security analysis, Get Answer, Expert's Help, Security analysis Discussions

Write discussion on Security analysis
Your posts are moderated
Related Questions
Poor Technology or System Requirements Definition - Information System Previously we looked at product design and specifically the importance of requirements capture as part o

Knowledge Representation: To recap, now we have some characterizations of Artificial Intelligence, so  when an Artificial Intelligence problem arises, you will enable  to put i

LDAP stands for LDAP- Light weight Directory Access Protocol.

Subscript refers to the array of occurrence, whereas Index shown an occurrence of a table element. An index can only modified using perform, search & set. Require to have an index

What is parsing? The target of parsing is to find out the syntactic validity of a source string. A tree is built for use through subsequent phase of compiler, if the string is

Address symbol table is generated by the  (A) memory management software.  (B) assembler.  (C) match logic of associative memory.   (D) generated by operating system

Q. What do you mean by Perfect Shuffle Permutation? Perfect Shuffle Permutation: It was proposed by Harold Stone (1971). Consider N objects each is represented by n bit number

Autonomous Rational an Agents: In many cases, it is inaccurate to talk about a single program or a single robot, as the multi-purpose and multi-tasking system of hardware and

Explain Session Layer of OSI Model. The session layer manages, establishes and terminates communication sessions. Communication sessions contain service of requests and serv

What is a subroutine? A subroutine is a named, independent section of C code that performs a particular task and optionally returns a value to the calling program.