Publicised the shares rise

Assignment Help Basic Computer Science
Reference no: EM131503624

Solly is a well-known investment adviser. He is selling his luxury motorboat to Mr Lock, the CEO of a large public company. Solly phones Mr Lock and threatens to sell his boat to someone else unless the deal is done soon. Mr Lock says to Solly "Don't say anything but our company is just about to be taken over by Telstrate the largest communications company in Asia, once that is done I will have the $10 million in cash" The next day Solly buys $100,000 worth of Telstrate shares at $5 per share. When news of the successful takeover is publicised the shares rise to $10 per share. Solly sells and makes $5 profit per share. Is this insider trading? Explain your answer.

Reference no: EM131503624

Questions Cloud

Create a database design for library management system : Create a database design for library management system with at least three tables in it. Draw an Entity-Relationship diagram for a library system
What is a company takeover : What is a company takeover? What interests does the Corporations Act seek to protect?
Obligations apply to directors during a takeover : What legal obligations apply to directors during a takeover? Does liability attach to other persons whose statements appear in a takeover document.
Concerning the law in relation to takeovers : What issues concerning the law in relation to takeovers do these facts raise and what must the directors of A Ltd do to achieve their aim?
Publicised the shares rise : When news of the successful takeover is publicised the shares rise to $10 per share. Solly sells and makes $5 profit per share. Is this insider trading?
What is cyberstalking : Do you think that they should have used these laws to prosecute Drew - What is cyberstalking? Research the Megan Meier case. Do you agree with the ruling?
Explain the financial and political risk of spain. : Explain the Economic of Spain, Financial and Political Risk of Spain and Hotel and Tourism Industry & Regulartory Structure of Spain.
On what issues are the activists mobilizing : On what issues are the activists mobilizing?What were some of the "dots" Michelle Alexander realized she was not connecting?
Explain the meaning of the terms cultural intelligence : Explain the meaning of the terms cultural intelligence, multiculturalism, and diversity from a global leadership perspective.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Describing the challenges businesses

Develop a 1,400-word summary describing the challenges businesses have in securing data in today's technological environment:

  Most beneficial new features of active directory

"Most Beneficial New Features of Active Directory from a Security Standpoint"  Please respond to the following:

  Database environment

An appropriate database environment within your workplace (must be approved by your instructor)

  Equation of motion for heisenberg operators

Assume that the Schrodinger Hamiltonian H = H ( p, q ) is time independent. In this case the time-i ndependent Schrodinger operator yields a Heisenberg operator ( t ) = ei H t e-i H t .

  Likelihood of a threat associated

What affect will this have on the likelihood of a threat associated with the vulnerability actually occurring?

  Advantages and disadvantages of asymmetric or symmetric key

The Institute has collaborated with XYZ inc. for research on genetics. Information should be kept top secret at any cost. At ABC Institute, researchers are not sure about kind of key.

  Creating and commercializing a new technology

There are a number of factors and precautions that need to be considered when developing and introducing new technologies to the marketplace. This is especially the case when this could be a technology without a known history. One specific considerat..

  Compare operation of the bsl and bsr bit shift instruction

When using a sensor as the input to the bit address of a BSL instruction, what is its function?

  List out the various steps of software life cycle

Que.1: List out the various steps of Software Life Cycle. Draw the diagram of Software Life Cycle and explain all the steps in details.

  Complexity of performing operations on arrays

Discuss how the complexity of performing operations on arrays goes up when moving from one-dimensional to (square) two-dimensional arrays (linear to quadratic complexity).

  Declaring the instance variable

This chapter uses the class rectangleType to illustrate how to overload the operators +, *, ==, !=, >>, and

  Installation of the various handling equipment

State the factors that must be considered in the selection and installation of the various handling equipment.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd