Security analysis, Computer Engineering

Security Analysis:

Suppose you are a young securities analyst, working in a small brokerage firm. You have access to publicly available information relevant to valuation of the ASX 300 listed shares in the following sectors.
 
Energy
Industrials 
Financials
 
A list of the GICS sectors and corresponding companies can be found at the Aspect FinAnalysis site,
 
As a starter in the brokerage firm, you are asked to assist a senior financial analyst by collecting relevant company-specific and market data and conducting analysis to determine whether a share should be bought, sold or excluded from a client's portfolio.

Required 

Select a publicly listed company from each of the above sectors. 

Undertake fundamental analyses to recommend whether the share should be bought, sold or excluded from the portfolio. Identify and discuss relevant macro, industry-specific and company-specific factors governing your decision.

Posted Date: 2/23/2013 2:53:16 AM | Location : United States







Related Discussions:- Security analysis, Assignment Help, Ask Question on Security analysis, Get Answer, Expert's Help, Security analysis Discussions

Write discussion on Security analysis
Your posts are moderated
Related Questions
can i get a prepared ppt for this topic to present it in a seminar??

Full form of is DHCP: Dynamic Host Control Protocol. It is mainly used to bound MAC Addresses of system. Especially for Wireless System.

Q. Describe about Frameset? Now make a master page in which you write below code. My Frame Page -- The Master Page

Q. Basic working of Hard Disk Drive? This is one of the components of today's personal computer having a capacity of order of quite a lot of Giga Bytes and above. A magnetic di

In which A/D converter has the speed of conversion is maximum ? Ans. In Parallel-comparator A/D converter, the speed of conversion is maximum. Speed of conversion is maximum a

Relocatable programs? Ans. Relocatable programs can be loaded almost anywhere inside the memory.

Bernstein Conditions for Detection of Parallelism For execution of a number of instructions or a block of instructions in parallel, it must be made certain that instructions ar

With respect to security, which one is the better choice? .Net or J2EE? Explain? As per majority programmers .NET is the best one which have single vendor compare to, the

Discuss the advantages of Firewalls Firewalls also offer additional protection to local users who like to browse or surf out from the Intranet to the Internet, by acting as pro

What are the differences between one hot and binary encoding? Common classifications used to explain the state encoding of an FSM is Binary or highly encoded and one hot. A bin