Next group of questions deal

Assignment Help Basic Computer Science
Reference no: EM131205963

The next group of questions deal with the same data. The original chart will be displayed on all questions. You may have to use your answers from an earlier question to be able to solve the answer on a later part. You can go back to that question to see your work if you didn't write it down elsewhere. I recommend that in your answer, you show the work you are computing to answer the question, so that I might be able to give some extra credit points to you in the event that your answer is not correct. You are interested in investing, and are considering a portfolio comprised of the following two stocks. Their estimated returns under varying market conditions are provided: (note: it is difficult to get this to format precisely, but the first number you see after the name of the economic scenario, such as "economy sluggish" is the probability of that scenario. Then the next number is A's expected return in a sluggish economy, followed by B's expected return in a sluggish economy. To clarify, the Probability of a sluggish, normal, or boom economy is .3, .4, and .3 respectively. The expected returns for A for sluggish, normal, and , boom are .16, .06, and -.02 respectively. Finally, the expected returns for B for sluggish, normal, and boom are -.05, .1, and .21 respectively.This basic table will be used in all sections of this problem, so the overall predicted returns for A and B will not change.)

Condition Probability of condition Security A Security B

Economy sluggish .3 .16 -.05

Economy normal .4 .06 .1

Economy booms .3 -.02 .21

What is the expected return for security A?

Reference no: EM131205963

Questions Cloud

Portfolio comprised of the following two stocks : You are interested in investing, and are considering a portfolio comprised of the following two stocks. Their estimated returns under varying market conditions are provided:
Analyze type of internal records used to support health care : Analyze the types of internal records used to support health care marketing applications and make at least one recommendation for an additional source of data and/or information that would prove useful. Explain your rationale.
Show that such a set of truncations can always be found : Now the company's question to you is the following: Given the schedule for each ship, find a truncation of each so that condition (†) continues to hold: no two ships are ever in the same port on the same day. Show that such a set of truncations ca..
Reconcile your records with the bank statement : FNSACC406A Create the company using your name, student number and an address - Veterinary clinic for domestic animals and Veterinary clinic for domestic animals
Next group of questions deal : The next group of questions deal with the same data. The original chart will be displayed on all questions. You may have to use your answers from an earlier question to be able to solve the answer on a later part. You can go back to that question ..
Discussion of the program for the campaign or movement : Discussion of the program for the campaign or movement (Taking us through the stages of the campaign discussed in lecture and text). Evidence that the program was/or was not effective.
How much longer will it take for vc to drop : Calculate vC, iC, and vR1 at 0.5 s and 1 s after the switch makes contact with position 1.-  How much longer will it take for vC to drop to 10 V?
Using the double declining-balance depreciation method : Warren Company plans to depreciate a new building using the double declining-balance depreciation method. The building cost $790,000. The estimated residual value of the building is $49,000 and it has an expected useful life of 10 years. Assuming the..
Message does this circumstance convey : The D/E ratio as measured by book value for a company is lower than measured by market value. What message does this circumstance convey about the financial state of CAB Ltd?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Find the inverse of a and call it matrix x

Define the matrices: A = [12 16 4;23 1 21;9 10 1] and B = [2 7 14;3 11 2;-9 10 12]. Perform matrix multiplication AB. Perform matrix multiplication BA. Are the answers from Parts (a) and (b) the same? If yes, explain why. If not, explain why. Find th..

  Pipelined machine versus the single cycle machine

What is the speedup of the pipelined machine versus the single cycle machine assuming there are no stalls?What is the speedup of the pipelined machine versus the single cycle machine if the pipeline stalls 1 cycle for 30% of the instructions?

  Organizations in self-governance

How does the COBIT framework assist organizations in self-governance? Specifically, what areas of the COBIT framework relate to governance?

  Confidentiality and integrity for transaction to secure

Make a list of at least 10 confidentiality, integrity, and availability requirements which should be met for transaction to be secure.

  Self-contained section of code that performs specific task

A method is an identifiable, self-contained section of code that performs a specific task, such as calculating the square root of a number or resetting the text boxes on an interface. Methods have many uses and are a common way to add functionalit..

  Software developer development and improvement

Software Developer Development and Improvement.Due Week 9 and worth 60 points This assignment consists of two (2) sections: an improvement plan and a PowerPoint presentation. You must submit the two (2) sections as separate files for the completion o..

  Provide an explanation of hash tables

Provide an explanation of hash tables, including a description of a realistic scenario that could be solved with the application of a hash table.

  Discuss some of the key considerations in designing network

What approaches have worked for you in your present role or would you propose in a future systems planning role for an organization?

  Influence or change users relationship with information

How does the technology of information feed influence or change users' relationship with information?

  What happens if host a attempts to send to host b

What happens if host A attempts to connect to host B, using the virtual circuit setup mechanism discussed in the text?

  What will be the cpu utilization

Consider a multiprogrammed system with degree of 6 (i.e., six programs in memory at the same time). Assume that each process spends 40% of its time waiting for I/O. What will be the CPU utilization?

  Write a house class that has the following properties

Total number of rooms ( calculated: number of bedrooms + formal dining room if present + 1 for kitchen)Number of baths (house can have any number of 1/2 bath or 1/4 of a bath in addition to a full bath - example 1.5, 1.75 or 1.25 bath)

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd