Show example on hedge fund, Computer Networking

Assignment Help:

Q. Show example on Hedge Fund?

Hedge Fund have been playing a no-lose game

In the easiest strategy a hedge fund borrows Hong Kong dollars (HKD) and then sells them in the market against USD that is they short the HKD. Note that this will results the money supply to shrink. A reduce in money supply leads to an interest rates increase. Raise in interest rates have several effects on the stock market. First borrowing HKD to purchase stocks becomes more expensive.

2275_Show example on Hedge Fund.png

Therefore fewer investors would use margin. Second a raise in deposit interest rates will draw funds from stocks to deposits. Third interest rate raise are negative for businesses and their value will go down. Yet again stocks decline.

Alternatively higher interest rates lure more investors to park their money in Hong Kong boosting the currency. But they as well slam the stock market because rising rates hurt company's ability to borrow and expand.

However several of these Hedge Funds involved in the speculation didn't operate in the cash market. In its place they shorted the HKD in the futures markets. This doesn't require borrowing HKD. It is the counterparty who has to hedge the long HKD position that requires to borrow HKD from the banking system.

In the particular situation discussed here Hedge Fund managers believed that they were taking little risk

The hedge funds stake on the collapse of the peg. If the dowel breaks the HKD is expected to fall. Specified the psychology of those days the casual view was that the HKD was overvalued. The merely risk to Hedge Funds is that the peg holds.

Under these conditions their loss will be the dissimilarity between the initial cost of entering the trade to sell HKD in futures markets and the pegged rate. The reading proposed that this cost is low.


Related Discussions:- Show example on hedge fund

What is raid in ccna, A method used to standardize and categorize fault-tol...

A method used to standardize and categorize fault-tolerant disk systems. RAID levels give lot of mixes of performance, reliability, and cost. Some servers give three of the RAID le

Working of internet, As discussed in the earlier section each computer link...

As discussed in the earlier section each computer linked to the Internet has a unique address. Let's assume your IP address is 1.2.3.4 & you wish to send a message to the computer

What are the two types of transmission technologies, What are the two types...

What are the two types of Transmission technologies, basis on which computer networks can be categorized? Broadly there are two types of transmission technology: 1. Broadc

Unused reserved - trannsport layer, Unused Reserved This  is a 6 bi...

Unused Reserved This  is a 6 bite field  reserved for future use.

What is the internal ip address, What is the internal IP address There ...

What is the internal IP address There is a separate set of IP address for a company's internal use, more popularly known as "internal IP address" or subnet IP address. This IP

Enumerate about the star topology, Enumerate about the Star networks C...

Enumerate about the Star networks Comments: 1 - If one connection/station fails the other devices aren't affected 2 - If central hub breaks down, the whole network fail

What are the communication tools, What are the Communication tools ? Voic...

What are the Communication tools ? Voice mail ? Email ? Fax ? Video conferencing applications

Explain data processing, Question - 1 Define MIS and its objectives. What ...

Question - 1 Define MIS and its objectives. What are the characteristics of MIS? Question - 2 Explain data processing Question - 3 What are the recent developments in database

What is the difference between a hub and a switch, What is the difference b...

What is the difference between a hub and a switch? A hub acts as a multiport repeater. Though, as more and more devices connect to it, it would not be able to efficiently manag

Connectionless protocol at the transport layer, User Datagram Protocol - UD...

User Datagram Protocol - UDP is a connectionless oriented transport protocol for use when the upper layers give error-recovery and reliability. UDP does not sequence data or re-ass

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd