Security analysis, Computer Engineering

Security Analysis:

Suppose you are a young securities analyst, working in a small brokerage firm. You have access to publicly available information relevant to valuation of the ASX 300 listed shares in the following sectors.
 
Energy
Industrials 
Financials
 
A list of the GICS sectors and corresponding companies can be found at the Aspect FinAnalysis site,
 
As a starter in the brokerage firm, you are asked to assist a senior financial analyst by collecting relevant company-specific and market data and conducting analysis to determine whether a share should be bought, sold or excluded from a client's portfolio.

Required 

Select a publicly listed company from each of the above sectors. 

Undertake fundamental analyses to recommend whether the share should be bought, sold or excluded from the portfolio. Identify and discuss relevant macro, industry-specific and company-specific factors governing your decision.

Posted Date: 2/23/2013 2:53:16 AM | Location : United States







Related Discussions:- Security analysis, Assignment Help, Ask Question on Security analysis, Get Answer, Expert's Help, Security analysis Discussions

Write discussion on Security analysis
Your posts are moderated
Related Questions
Define race condition.  When several process access and manipulate similar data concurrently, then the outcome of the implementation depends on particular order in which the ac

What is cache memory? It is a small, fast memory that is inserted among large, slower main memory and the processor. It decreases the memory access time

How would you implement inheritance using VB.NET/C#? When we set out to execute a class using inheritance, we must first start with an existing class from which we will derive

list and explain the contents of pcb

Program about railway reservation system using structure . Get 10 names,their gender ,address , seats availability according to trains and some extra datas


Q. Amdahl Law to measure speed up performance? Remember that speed up factor assists us in knowing relative gain attained in shifting execution of a task from sequential comput

1. The Consultant : A consultant is an experts person who possesses a high level of expertise in the area. He guide and educate the executives regarding establishing the e

What are the user interfaces of interactive lists? If you require the user to communicate with the system during list display, the list must be interactive.  You can describe

Give explanation about the use of SSL to secure the network. SS L stands for Secure Sockets Layer is a protocol developed through Netscape for transmitting private document