Show example on hedge fund, Computer Networking

Assignment Help:

Q. Show example on Hedge Fund?

Hedge Fund have been playing a no-lose game

In the easiest strategy a hedge fund borrows Hong Kong dollars (HKD) and then sells them in the market against USD that is they short the HKD. Note that this will results the money supply to shrink. A reduce in money supply leads to an interest rates increase. Raise in interest rates have several effects on the stock market. First borrowing HKD to purchase stocks becomes more expensive.

2275_Show example on Hedge Fund.png

Therefore fewer investors would use margin. Second a raise in deposit interest rates will draw funds from stocks to deposits. Third interest rate raise are negative for businesses and their value will go down. Yet again stocks decline.

Alternatively higher interest rates lure more investors to park their money in Hong Kong boosting the currency. But they as well slam the stock market because rising rates hurt company's ability to borrow and expand.

However several of these Hedge Funds involved in the speculation didn't operate in the cash market. In its place they shorted the HKD in the futures markets. This doesn't require borrowing HKD. It is the counterparty who has to hedge the long HKD position that requires to borrow HKD from the banking system.

In the particular situation discussed here Hedge Fund managers believed that they were taking little risk

The hedge funds stake on the collapse of the peg. If the dowel breaks the HKD is expected to fall. Specified the psychology of those days the casual view was that the HKD was overvalued. The merely risk to Hedge Funds is that the peg holds.

Under these conditions their loss will be the dissimilarity between the initial cost of entering the trade to sell HKD in futures markets and the pegged rate. The reading proposed that this cost is low.


Related Discussions:- Show example on hedge fund

Network devices - network layer and routing , Network Devices a.Hub ...

Network Devices a.Hub b.Repeater c.Bridge d.Gateway e.Switch f.Router Connecting devices can  classified  into networking and internetworking  devices when

State the methods to keep the attackers at bay, State the methods to keep t...

State the methods to keep the attackers at bay Another best methods to keep the attackers at bay is known as network address translator or NAT. The philosophy behind the design

Question, On a lan where are ip datagram transported?

On a lan where are ip datagram transported?

What is OSPF, What is OSPF? It is an Internet routing protocol that scal...

What is OSPF? It is an Internet routing protocol that scales well, can route traffic with multiple paths, and uses knowledge of an Internet's topology to make precise routing de

Html, Write an HTML program segment that contains hypertext links from one ...

Write an HTML program segment that contains hypertext links from one document to another.

What is explicit congestion signalling, What is Explicit congestion signall...

What is Explicit congestion signalling In general way, for explicit congestion avoidance, the network alerts end systems to growing congestion within the network and the end sy

Explain how tcp handles connection-setup management, Problem: (a) Expla...

Problem: (a) Explain how TCP handles connection-setup management. (b) Each host on the Internet is currently assigned an IP address 32 bits long (IPv4). IPv4 addresses are u

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd