Mbanotesindia.com

Mba Global Network

Options trading

OPTIONS TRADING  What is Options It is a derivative security used for the purpose of risk management in the investment market, based on some security. Futures, forwards, swaps, options etc., are all examples of hedge against risk. Investors are risk averse and want to reduce the risk. Individuals and corporations have a strong urge to reduce or manage risk and this is secured by trading in derivative markets. The volatility in share prices require to be hedge. Thus, the larger the volatility the larger is the hedging demand. This is secured through the options and futures. Thus the volume of futures or options can cause higher or lower volatility in underlying share/securities. These are all tools for risk management and no correlation is empirically found for options to increase or reduce volatility of shares prices Characteristics of Options Derivatives have many distinctive characteristics. 1. Their origin is from some other security, commodity or reference point, (such as indexes.) 2. They are instruments of hedge against risk of undue volatility. 3.They are leveraged instruments for risk management based on original security or instrument. Calls and puts The two major type of stock options are calls and puts. A call gives the investors the right to purchase 100 shares of a particular stock at a fixed price until a specific date. An investor who purchases a call option locks in a price on 100 shares of stock for a predetermined time. A put option gives an investor the right to sell 100 shares of a particular stock at a fixed price until a specific date. A put in a price at which to sell stock rather than a price at which to buy stock. Both puts and c alls provide the investor with the right, but not the obligation, to use the option. Stock options are created, or �written�, by other investors who wish to earn income from selling the options. The writers then become obligated to sell (if a call has been sold) or purchase (if a put has been sold) the stock if and when the owner of the option decides to exercise the put or call. Puts and calls derive their values from the values of the stock that they can be used to sell or purchase. Stock options pay no dividends or interest and expire without any value if not used by the expiration date. The value of call option is directly related to the value of the underlying stock(i.e. the option value increase when the stock value increase) and the value of a put is inversely related to the value of the underlying stock (i.e., the option value increase when the stock value decrease ). Option values are also affected by the time remaining until expiration, the price volatility of the underlying common stock and the market rate of interest. Types of Derivatives The security or asset classes on which the derivatives depend are : (1) Debt or Bonds, (2) Equities ,(3) Indexes, (4) Commodities, (5) Currencies. Options vs. Badla  The age old method of badla financing facilities the carry forward transactions in the stock market and serves almost the same purpose of helping speculation and imparting greater volume and better liquidity , as in the case of options. In both methods, no delivery of securities is envisaged and both depend on some underlying securities traded on cash/delivery basis. Then why do SEBI and other influential sources advocate the substitution of badla by options in India? Their perception is that badla adds to spec ulation and it is better to separate the speculative market from real investment market, so that genuine investors are protected from the effect of excessive speculation. Options would have the same effects and objectives as badla trading. Both increase liquidity, cater to the instinct of speculation and provide a hedge against risk. Both are tools of risk management and based on some rules and regulations, margins and other terms. The differences between them and the advantages of options over Badla may be set out as follows: The risk can be limited and kept with in a range both in upward and downward direction in the case of options. Transparency in operations is possible due to well organized trading in contrasts in options. No manoeurvrability of terms, margins, expiration dates and no flexibility in operations are possible. Cash outlay is limited to the premiums paid and risk taken can be kept in limits. But once the contract period is over the right to nexercise option ceases and no advantage can be taken of any favourable change in price. But in the case of badla, money lending is used as a tool. There is flexibility of margin fixation, and in fixation of carry forward prices. Badla terms can be bargained and the trader has the chance to adjust his purchase and sale position depending on the price movements after settlement, which is not possible for the option purchaser once the contract period is over. Thus, options and badla have both advantages and disadvantages. The edge of options over badla will come in due to electronic trading possible through the use of computer network and this will also ensure greater transparency to trading in options. Otherwisw the time tested method of badla is by itself not inferior as a method of facilitating speculative trading and to increase the volume of trade and liquidity in the securities markets.

  729 Hits
  0 Comments

COMPUTER FUNDAMENTALS

COMPUTER FUNDAMENTALS

1. (a) Convert the following decimal numbers to binary equivalent :

(i)  39.37

Continue reading
  516 Hits
  0 Comments

INTRODUCTION TO SOFTWARE

INTRODUCTION TO SOFTWARE.

 1. (a) Design an algorithm and draw a 6 corresponding flow chart to convert binary

number to hexadecimal number.

(b)Write a shell program to find Greatest 6 Common Divisor (GCD) for the two given

numbers.

Continue reading
  457 Hits
  0 Comments

Operating System Concepts and Networking Management

Operating System Concepts and Networking Management

  

(1) What are the Goals of Computer Security'?

(2) Justifj, the following statement.  There is no confidentiality without integrity"

Continue reading
  481 Hits
  0 Comments

Top Operating System Concepts and Networking Management

(52) What is meant by being in invisible mode in Yahoo Messenger?

(53) How do you being chatting with a friend?

Continue reading
  491 Hits
  0 Comments

WEBSITE MANAGEMENT

WEBSITE MANAGEMENT  1. Write an HTML code to generate the study centre name, study centre coordinator, place and the state where you are studying your BIT programme. use frame based approach. Make necessary assumptions and indicate them. 2.What is JSP ? Write at least five advantages of JSP 3. Design a feedback form for any of the Universitys websites. Use HTML. Your form should have basic formatting features. Make necessary assumptions and indicate them. 4. Design a home page for any movie theatre. Use HTML. Use frame-based approach. .Assumptions can be made wherever necessary. 5.. Design an Order-form for any online store (for an E-commerce website). Appropriate controls are to be placed for various inputs and events. Write necessary code for the above problem using ASP or CGI program using PERL. 6)Design a web page similar to any of the user-registration for a free email account. The form should consist of all the details with appropriate controls on them. VI should be user-friendly. Implement using ASP OR CGI programming using PERL. 7) Design a web page for any Computer Institute for the students' registration into a particular course./programme/module. Design the user interface with appropriate controls. Implement using ASP OR CGI programming using PERL. 8)Write HTML code to generate the home page of any Educational Institute. It should watch all the essential features on the home - page. Assumption can be made wherever necessary. 9) Explain the role of ASP in the web page design. Illustrate with an example. 10) Design a registration form for an e-mail account. Use ASP/CGI using PERL to make it functional. Draw the sample layout of the form. 11) Design a homepage for a news-website. Use HTML, ASP/CGI using PERL. 12) Explain at least five main menu options of any of the web - browses. 13) Write HTML code to generate the UNIVERSITY NAME, ADDRESS and a logo at the left corner of the page- Use frame based approach to add the options like About university, For students, Regional Centres, Divisions, schools and Recruitments to the left' side of the page and corresponding text should be displayed on the right frame/main frame. 14) What is the role of the VBScript in HTML pages ? Explain with' the help of an example. 15) Design an online Examination form for the students to apply for the exams of theory as well as practical courses. Try to place appropriate controls on the form. Write necessary code for the above problem using ASP or CGI using PERL. 16) Design a home page for an enterprise which has E-Commerce application launched on it. Use HTML. Use frame-based approach 17) Design an online-poll application. The application should consist of a question(s) and 3 answers (YES, NO and CANT' SAY). Depending upon the selection of the choice, it should display the results in a Bar chart form. Write the necessary code for the above problem using ASP or CGI using PERL. 18) write atleast five advantages of use of Javascript in HTML documents' 19) Design a suggestion feedback form for any of the review of the product whose information is placed online. Assumptions can be made wherever necessary . 20) Design an order-form for an online electronics store Appropriate controls should be placed for various inputs and events' Write necessary code for the above problem Use ASP or PERL  21) Design a webpage that consists of a form whose title and heading is FIND ADDRESS. It should consist of a text box labelled as ENROLLMENT NUMBER. It should also consist of SUBMIT and RESET buttons. On clicking SUBMIT button, the address of student whose enrollment number is input in text box should be displayed. Make necessary assumptions. Implement using ASP or CGI programming using PERL. 22) Design a web page similar to any of the on-line polling applications (in the form of objective questions) and display the statistics as per the result (YES, NO' CAN'T SAY)' UI should be user-friendly.

  588 Hits
  0 Comments

Computer NETWORKING

COMPUTER NETWORKING  1) A software company named "Hindsoft" wants to design its network. The company has three departments at different locations in India, like Administration in Bangalore, sales in Bombay and Development at Delhi. Each Department has 30 computers, 4 printers and 2 FAX machines whileadministration department is working as the central office to maintain all databases and main server. The main server is connected with the servers of other two departments. Give answers of the following, based on the network specification defined above :  (a) Draw and explain the best suited physical and logical topology. (b) Justify the need of each network device you may use in the network. ( c ) Which cable is best suited for this all the available cables to justify your answer. (d) Which operating system is best for this 4 company ? Justify your answer. (d) Explain the best hardware and software you should use in the network to implement the security. 2) (a) Explain any two functionalities of each of the following : (i) Data link layer of OSI model (ii) Internet layer of TCP/IP model (iii) Session layer of OSI model (b) What are print servers ? Why do we need them ? Explain the print queue management. 3) Write three difference between each of the following pairs :  (a) Fiber optics and Coaxial cable (b) Bridge and Gateways (c) Connection Oriented and Connectionless Services (d) Peer to Peer and Client-Server Networking (e) ATM and Frame Relay 4) (a) What are the main difference between proxy server and Firewall ? Explain different types of firewalls that use different strategies for protecting network resources. (b) What is meant by Trust Relationship ? 7 Explain the Domain Trust Relationship and Alternative Domain Trust Relationship. 5) (a) What is Token Ring ? How does it work ? In what way is it different from Ethernet ? Also, explain the purpose of fields in Token Ring frame header. (b) Explain the "Resource Password Security Model". 6) (a) Why disk administration is an important part of network Management ? Does it provide security and reliability ? Also, explain the important options provided by disk administrator in Windows NT. 7) Assume you are designing a LAN for library, which has three departments in the library buildinglike Administration, Purchase unit and Maintenance. purchase unit and Maintenance department have 25 computers, o printers each, while Administration department, which is functioning as the Central department has 38 computers, 4 printers and 2 FAX machines Administration department maintains all databases and the main server. The main server is connected with the servers of other departments. Give answers of the following, based on the network defined above : (i) Draw and explain the best suited physical and logical topology for the above network specification. (ii) Justify the need of each hardware device you may use in the network at different t of all (iii) Which cable is best suited for this library ? Compare merits and demerits of all the available cables to justify your answer. (iv) Which operating system is best for this network ? Justify your answer. (v) Explain the best hard wares and soft wares you should use in the network to implement the securitv. 8) (a) Explain the importance of User Access security model. Also, Recursive Password security model, with their advantages and (b) Explain different aspects of print queue management. (c) Explain the importance of disk administration in networking. 9) (a) Explain, how windows NT manages the domains. Also, explain the trust relationship domain with the help of an example. (b) What is the role of Network Interface Card NIC) ? ( c ) How does Stateful Inspection Technique provide security in networks ? 10 )(a) What is a difference between Viruses' and' Trojan Horses' ? Explain the possible precautions an administrator has to take for controlling Viruses and Trojan Horses. (b) Explain the different file systems explain the NTFS master file table supported by Windows NT. Also, draw and structure and define its components' 11) Assume you are designing a network for a university, which has 25 Lecture rooms' ,Administration department, 20 Teachers rooms and one management department' Each Lecture room and Teacher room is having a computer, while administration and managernent department has 20 computers, 10 printers and 2 FAX machines each. Administration is working as the central office which maintains all databases and main serverThe main server is connected to all computers and servers of other departments. Give answers of the following, based on the network defined above : (i) Draw and explain the best suited physical and logical topology for the network specification (ii) justify. the need of each hardware device you may use in the network at different locations. (iii) Which cable is best suited for this company ? Compare merits and demerits of all the available cables to justify your answer. (iv) Which operating system is best for this company ? Justify your answer. (v) Explain the best hard wares and soft wares that can be used in the network to implement the security 12) Explain. any two functionalities of each of the following :  (i) Physical layer ' (ii) Data link layer (iii) Transport layer (b) What is Token Ring ? How does it work ? In what way is it different from Ethernet ? Explain the fields in a Token Ring frame header.. 13) write three differences between each of the following pairs :  (a) IEEE 802.6 and IEEE 802.4 ( b) Iterative and Recursive name resolution (c) Coaxial cable and Fiber optics (d) Centralized computing and Distributed computing (e) Internet and Intranet 14) (a) How does Windows NT manage file system ? Explain different systems supported by Windows NT. Write two advantages and two disadvantages of each model.  (b) Explain the 'flow control' and 'error control' mechanism in X.25 protocol. 15)(a) What are print servers? Why do we need them ? What do you understand by - print queue management ? b) Explain the "Resource Password Security Model 16) Assume you are designing a network for a hospital, which has four departments in the hospital building like administration, OPD, Lab, and Maintenance. Each department has 20 computers, 4printers and 1 FAX machine, while Administration department is working as the Central department which maintains all databases and the main server. The main server is connected with the servers of other departments. Give answers of the following, based on the network defined above : (i)Draw and explain the best suited physical and logical topology for the network specification (ii) Justify the need of each hardware device you may use in the network at different locations. (iii)Which cable is best suited for this company ? Compare merits and demerits of all the available cables to justify your answer. (iv) Which operating system is best for this company ? justify your answer. (v) Explain the best hard wares and soft wares you should use in the network to. implement the security.  17) Assume you are designing a network for a Gargent manufacturing and distribution company. The company has 3 departments at different locations in India like Administration, Manufacturing and Distribution departments at New Delhi, Gujarat and Mumbai respectively. Further, distribution department has .4 sub distribution departments in Mumbai at different locations. Each department has 25 computers, 2 printers and one FAX machine, and each sub-department has 10 computers and 2 printers while Administration department is working as the central office which maintains all database, transactions and main server. The main server is connected with servers of other departments and sub-departments. Give answer of the following, based on the network defined above : (i) Draw and explain the best suited physical and logical topology for the network specification. (ii) justify the need of each hardware device you may use in the network at different locations. (iii) Which cable is best suited for this company ? Compare merits and demerits of all the available cables, to justify your answer. (iv) Which operating system is best for this company? Justify your answer. (v) Explain the best hard wares and soft wares you should use in the network to implement the security 18) Explain any two functionalities of each of the following : (i) Presentation layer (ii) Data link layer (iii) Internet layer of TCP/IP (b) Explain, how the microwave communication works. In what ways is it different ' from the satellite communication ? Give at least three differences. (c) In OSI model, how does the transport layer ensure the complete reliability of the message and the proper ordering of the message ? 19) Write three differences between each of the following pairs (a) Token ring and Token bus (b) Message switching and Packet switching (c) Connection oriented and Connection-less services (d) 10 Base 2 and 100 Base T cable (e) Gateway and Router 14)(a) What is the importance of mirroring ? How do we mirror a disk partition on : I server ? can we establish the mirror of boot partition ? If yes, how f If no, why not ? (b) How does NTFS file system provide the 'recoverability' and 'compression' of files ? Explain your answer with the help of suitable examples for each. 15) (a) What is disk stripping ? What are the differences between strip set with parity and. without -parity ? .Explain, how you can create and remove strip set with parity and without parity. 16) (a) What are the different types of activities that could be administrator in the security policy ? Also, explain addressed by the network why these activities are included in the security policy. (b) How are the configuration of a Explain with suitable diagram. local printer and a network printer different ?

  569 Hits
  0 Comments

COMPUTER NETWORKS

COMPUTER NETWORKS 1) Draw a hybrid topology having a star backbone with four ring networks. 2) Make a diagram (topology) of the network existing in your centre showing the various nodes, and what they actually represent (Computer, Printer, Hub, Router, Switches). Also show how this network is connected with another network (LAN,WAN). What is the Internet bandwidth of the network ? What network OS is used ? 3) Draw a hybrid topology having a star backbone with three bus networks. (a) Carefully examine the network interface card of your node and write the detailed specification. (b) Write IP address of your machine. 4)Draw a fully connected Five node networks. How many links are there ? 5) (a) Write all the steps for file sharing mechanism on your machine. (b) Write the specification of hubs used in networking of the Lab. 6) Draw a .hybrid topology having a ring network backbone with 4 bus networks. 7) (a) Write all the steps to share and access the printer in the network environment. (b) How can you check the MAC address of your machine ? 8) (a) Draw a fully connected 4 node networks. How many links are there ? (b) Draw a hybrid topology having a ring network with 3 bus networks. 9) (a) Write all the steps for assigning IP address to your machine. (b) Write the specification of the following devices of your study centre being used in networking. (i) Hub (ii) UTP cable 10) (a) Draw a fully connected 6 node networks. How many links are there ? (b) Draw a hybrid topology having a star backbone with 3 ring networks. 11)(a) Write the specification of the following devices of your study centre being used in networking. (i) Router (ii) Network Printer (b) Write all the steps for accessing data from another computer in a network. 12 (i) Write all the steps for enabling file sharing mechanism on your machine (ii) What do you understand by these specifications. 10 base 2 hubs 10 base T hubs 13) Write complete specification of your network interface cards. 14) Write all the specifications of routers, hubs and switches of your study centre. 15) (i) What is IP address of your machine ? Which class it belongs to ? (ii) What is IP address of "IGNOU.ac.in" ? Which class it belongs to ?

  496 Hits
  0 Comments

Windows Proagramming

Windows Proagramming 1)Write an event procedure to find and display the string - length of an input string. 2) Create a simple VB application to simulate the billing application of a gas - agency. The bill should contain the bill-no (auto generated), date and time also. Design the user - interface with appropriate controls. Also, design the splash - screen for this application. 3)Write an event procedure to sort list of n - numbers in ascending order. Design an user - friendly interface for the application with appropriate controls. 4)Create a simple VB application to simulate the generation of a LIC premium receipt . The premium receipt should contain the Policy No. date, time, details of the policy, name of the policy holder, address and amount. Design the splash screen for this application. 5) Write an event procedure to concatenate two strings given as input and should display the resultant string. Use appropriate controls to design the user-interface. 6) Create a VB application to simulate the menu-design NOTE-PAD. Note : No need of doing any programming for the application menu - design is enough 7) Create a form with a picture-box. Find 3 interesting pictures and use a timer control to cycle these 3 pictures every one second. Place an exit button to close the application. 8) Write an event procedure to display the type of the triangle, given the measurements of its 3 sides by the user. 9) Create a form where the user enters some text into a text-box control and have the result output into a label in a different font with the colour change in the background of the form. 10) Write an event procedure to collect an ,integer from the user and find out whether the given integer is an odd integer or an even one. Design a splash screen for this application. Use appropriate controls on the form. 11) Collect the first name, middle name and the last name from the user on three separate , text-boxes and display the user's short J name. 12) Write a Visula Basic program to compute the FV (Future Value)of an investment. The formula to be used is as follows : FV - Investment * (1 + Interest rate ) years Also, design a splash screen for this application. Use appropriate controls to design the User Interface.   13) Design a simple application DVD's, writing pads, pens, wherever necessary. to generate a bill for a stationery shop which sells books, CD's, pencils and other stationery items. Assumptions can be made 14) create a VB program to introduce yourself should provide the complete information appropriate controls on the form. to the lab faculty. when the program is run,it about yourself. Design a good interface with 15) Create a VB application to simulate a simple calculator to perform the arithmetic operations like addition , multiplication , division and finding out percentage, Select and place appropriate controls on the form to provide user - friendly interface .  Create a menu similar to that of a note-pad application using menu editor  16) Create VB application to calculate and display the Gross-pay ,Deductions and the Net-pay for the employees of the company , given the Basic Pay, TA , DA, Perks, HRA and deductions(GPF, medical contribution , pension scheme , loans).The pay-slip should consist of all the details of the employee along with the pay details . Consider the following details for calculating the DA,HRA perks, allowances. TA=RS800/ for the employees DA=40% of basic pay Perks =3% of basic pay HRA = 30% of basic pay 17) Create a VB application to check whether the given string is a palindrome or not. 18) Create a simple application to simulate the billing system for an automobile spare parts shop .Also design the splash screen for this application. The UI should be user-friendly with appropriate controls.

  545 Hits
  0 Comments

Software engineering

 

Software engineering 1) Suppose we wish to computerize the activities of study centers, which offer various programmers of the university. The activities are as follows :

(i) Forwarding the counselor's biodata to Regional Centre. (ii) Schedule the classes (both theory and practical) (iii) Identify Practical Centers. (iv) Collect TMA's from students and get it evaluated \l the counselors (v) Student's enquiry (vi) Dispatch of Award lists of TMA's to University

For the above mentioned system,

(1) Develop SRS. (2, Draw DFDs upto second level. (3) Identify the software modules and their functions. (4) Propose a testing strategy for any two software modules mentioned in above.

Continue reading
  485 Hits
  0 Comments

DATA AND FILE STRUCTURES

 

DATA AND FILE STRUCTURES

1 What are the preconditions for applying binary search on any list containing integer values ? Write the algorithm and manually run it on the following list of number 

11 22 33 44 55 66 77 88

2 What is worst case complexity of the above algorithm ?

Continue reading
  381 Hits
  0 Comments

West Bengal

 

Haryana Vidya Mandir Ba-193 Sector-1 Salt Lake City Calcutta - West Bengal (-/- )

Gurbachan Singh Sondhi Girls School 65 Pratapaditya Road Calcutta - West Bengal (-/- )

Lakshmipat Singhania Academy 12-b Alipur Road Calcutta - West Bengal (-/- )

Kendriya Vidyalaya Fort William Calcutta - West Bengal (-/- )

Continue reading
  670 Hits
  0 Comments

Uttar Pradesh

 

 

UttarPradesh part1 (-/237 )

 

UttarPradesh part2 (-/242 )

Continue reading
  657 Hits
  0 Comments

Uttaranchal

 

Central School For Tibetans Happy Valley Mussoorie - Uttaranchal (-/- )

Johnson School Paonta Road Dehradun - Uttaranchal (-/- )

Dav Centenary Public School P.o.box No -25 Haldwani Nainital - Uttaranchal (-/- )

Rainbow Public School Srinagar Garhwal - Uttaranchal (-/- )

Continue reading
  650 Hits
  0 Comments

Tripura

Assam Rifles School 11 Assam Rifles C/o 99 Apo Agartala - Tripura (-/- )

Assam Rifles Middle School 22 Ar Betbagan (ambassa) Dhalai - Tripura (-/- )

Kendriya Vidyalaya Kunjaban Agartala - Tripura (-/- )

Kendriya Vidyalaya Ongc Base Complex Agartala - Tripura (-/- )

Kendriya Vidyalaya Bsf Campus Santir Bazar - Tripura (-/- )

Continue reading
  568 Hits
  0 Comments

Tamil Nadu

 

Kendriya Vidyalaya D G Q A Complex Chennai - Tamil Nadu (-/- )

Kendriya Vidyalaya Ordnance Clothing Factory Chennai - Tamil Nadu (-/- )

Kendriya Vidyalaya No 2 H A P P Township Tiruchirapalli - Tamil Nadu (-/- )

Kendriya Vidyalaya Mandapam Camp Ramanathapuram - Tamil Nadu (-/- )

Continue reading
  646 Hits
  0 Comments

Sikkim

 

Government Senior Secondary School Assam Lingzey East Sikkim - Sikkim (-/- )

Assam Rifles School Pegong North Sikkim - Sikkim (-/- )

Kendriya Vidyalaya Tadong East Sikkim - Sikkim (-/- )

Kendriya Vidyalaya Nhpc , Singtam East - Sikkim (-/- )

Continue reading
  601 Hits
  0 Comments

Punjab

 

 

Punjab part1 (-/183 )

 

Punjab part2 (-/168 )

  597 Hits
  0 Comments

Pondicherry

 

Jawahar Navodaya Vidyalayas Rayanalayam,p.o.kottucherry, Karaikal, - Pondicherry (-/- )

Jawahar Navodaya Vidyalayas Pandakkal,naluthara, Mahe - Pondicherry (-/- )

Jawahar Navodaya Vidyalayas Pariakalpet,kalapet, Pondicherry - Pondicherry (-/- )

Jawahar Navodaya Vidyalayas Mettakur,via Kakinada Yanam  (-/- )

  593 Hits
  0 Comments

Orissa

Saraswati Vidya Mandir Haryana Nagrik Sangh Rourkela - Orissa (-/- )

Jawahar Navodaya Vidyalayas Rengali Dam Site, Angul - Orissa (-/- )

Jawahar Navodaya Vidyalayas Bagudi, Post Mohumuhan, Balasore - Orissa (-/- )

Jawahar Navodaya Vidyalayas Belpada, Bolangir - Orissa (-/- )

Jawahar Navodaya Vidyalayas Palijhar, Post Salunki, Boudh, - Orissa (-/- )

Continue reading
  585 Hits
  0 Comments
You are here: Home Latest Authors sales@mbaonlinepapers.com sales@mbaonlinepapers.com