Security analysis, Computer Engineering

Security Analysis:

Suppose you are a young securities analyst, working in a small brokerage firm. You have access to publicly available information relevant to valuation of the ASX 300 listed shares in the following sectors.
 
Energy
Industrials 
Financials
 
A list of the GICS sectors and corresponding companies can be found at the Aspect FinAnalysis site,
 
As a starter in the brokerage firm, you are asked to assist a senior financial analyst by collecting relevant company-specific and market data and conducting analysis to determine whether a share should be bought, sold or excluded from a client's portfolio.

Required 

Select a publicly listed company from each of the above sectors. 

Undertake fundamental analyses to recommend whether the share should be bought, sold or excluded from the portfolio. Identify and discuss relevant macro, industry-specific and company-specific factors governing your decision.

Posted Date: 2/23/2013 2:53:16 AM | Location : United States







Related Discussions:- Security analysis, Assignment Help, Ask Question on Security analysis, Get Answer, Expert's Help, Security analysis Discussions

Write discussion on Security analysis
Your posts are moderated
Related Questions
CGI is significant whenever you require to retain state information about a user, or run an application which communicates with the server. Things like guestbook's, Chat clients, d

Q. Describe about directory in DOC? We all know that, the volume of the hard disk is generally quite large (10 MB to a few GB). You can keep hundreds or even thousands of files

What is meant by super scalar processor?  Super scalar processors are designed to exploit more instruction level parallelism in user programs. This means that multiple function

Explain the role of a bus arbiter in a multiprocessor configuration. Bus arbiter: Which functions to resolve priority between bus masters and allows only one device at a time t

Differences between inter statement and intra statement delay? //define register variables reg a, b, c; //intra assignment delays initial begin a = 0; c = 0;

If voice is converted to digital form using PCM, how many bits of data will be produced in half a second? While voice is converted to digital by using PCM that is Pulse Code Mo

Shift Microoperations Shift microoperation can be used for serial transfer of the data. They are used generally with arithmetic, logic and other data-processing operations. The


how to implement the multiple stack

Q. What is Charge-coupled Devices? CCDs are employed for storing information. They have arrays of cells that can hold charge packets of electron. A word is signified by a set o