Show example on hedge fund, Computer Networking

Assignment Help:

Q. Show example on Hedge Fund?

Hedge Fund have been playing a no-lose game

In the easiest strategy a hedge fund borrows Hong Kong dollars (HKD) and then sells them in the market against USD that is they short the HKD. Note that this will results the money supply to shrink. A reduce in money supply leads to an interest rates increase. Raise in interest rates have several effects on the stock market. First borrowing HKD to purchase stocks becomes more expensive.

2275_Show example on Hedge Fund.png

Therefore fewer investors would use margin. Second a raise in deposit interest rates will draw funds from stocks to deposits. Third interest rate raise are negative for businesses and their value will go down. Yet again stocks decline.

Alternatively higher interest rates lure more investors to park their money in Hong Kong boosting the currency. But they as well slam the stock market because rising rates hurt company's ability to borrow and expand.

However several of these Hedge Funds involved in the speculation didn't operate in the cash market. In its place they shorted the HKD in the futures markets. This doesn't require borrowing HKD. It is the counterparty who has to hedge the long HKD position that requires to borrow HKD from the banking system.

In the particular situation discussed here Hedge Fund managers believed that they were taking little risk

The hedge funds stake on the collapse of the peg. If the dowel breaks the HKD is expected to fall. Specified the psychology of those days the casual view was that the HKD was overvalued. The merely risk to Hedge Funds is that the peg holds.

Under these conditions their loss will be the dissimilarity between the initial cost of entering the trade to sell HKD in futures markets and the pegged rate. The reading proposed that this cost is low.


Related Discussions:- Show example on hedge fund

Hyper cube, Hyper Cube A Hypercube interconnection network is increamen...

Hyper Cube A Hypercube interconnection network is increament  of cube network. Hypercube interconnection network for n ≥ 3, can be distinct recursively as follow: For n = 3,

Tcp, how tcp is redefined for wireless network

how tcp is redefined for wireless network

What automatic repeat request, What Automatic Repeat Request (ARQ)? Err...

What Automatic Repeat Request (ARQ)? Error control is both error detection and error correction. It allows the receiver to inform the sender of any frames lost or damaged in tr

What is the advantage of address sharing, What is the advantage of address ...

What is the advantage of address sharing? By using address translation instead of routing, address sharing gives an inherent security benefit. That's because host PCs on the In

Introduction-pram algorithms, One of the most popular models for designing ...

One of the most popular models for designing parallel algorithms is PRAM (Parallel Random Access Machine). A PRAM consists of unbounded number of processors interrelating with each

What is medium access control of ethernet, What is Medium Access Control of...

What is Medium Access Control of Ethernet? The set of rules which make sure that each node in an Ethernet gets a fair amount of frame transmission opportunity, are known as the

What is session layer in osi model, Q. What is Session Layer in osi model? ...

Q. What is Session Layer in osi model? Session Layer : Allows two applications to establish, utilize and disconnect a connection  between them known as a session. Gives for na

Advantages of ls over dv algorithm, Advantages of LS over DV algorithm ...

Advantages of LS over DV algorithm There  are a number of advantages to link  state  protocols  especially when  compared to  the distance vector based  routing  protocols. The

Describe the various fibre channel standards, Network Data Storage 1. W...

Network Data Storage 1. What is the Small Computer System Interface Architecture 2. Describe the various Fibre Channel standards. 3. What is the difficulties in building

Give the solutions to the threats, Give the solutions to the threats In...

Give the solutions to the threats In order to implement solutions to the threats, it is advisable that the company should maintain proper password protected hardware. Wherever

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd