Show example on hedge fund, Computer Networking

Assignment Help:

Q. Show example on Hedge Fund?

Hedge Fund have been playing a no-lose game

In the easiest strategy a hedge fund borrows Hong Kong dollars (HKD) and then sells them in the market against USD that is they short the HKD. Note that this will results the money supply to shrink. A reduce in money supply leads to an interest rates increase. Raise in interest rates have several effects on the stock market. First borrowing HKD to purchase stocks becomes more expensive.

2275_Show example on Hedge Fund.png

Therefore fewer investors would use margin. Second a raise in deposit interest rates will draw funds from stocks to deposits. Third interest rate raise are negative for businesses and their value will go down. Yet again stocks decline.

Alternatively higher interest rates lure more investors to park their money in Hong Kong boosting the currency. But they as well slam the stock market because rising rates hurt company's ability to borrow and expand.

However several of these Hedge Funds involved in the speculation didn't operate in the cash market. In its place they shorted the HKD in the futures markets. This doesn't require borrowing HKD. It is the counterparty who has to hedge the long HKD position that requires to borrow HKD from the banking system.

In the particular situation discussed here Hedge Fund managers believed that they were taking little risk

The hedge funds stake on the collapse of the peg. If the dowel breaks the HKD is expected to fall. Specified the psychology of those days the casual view was that the HKD was overvalued. The merely risk to Hedge Funds is that the peg holds.

Under these conditions their loss will be the dissimilarity between the initial cost of entering the trade to sell HKD in futures markets and the pegged rate. The reading proposed that this cost is low.


Related Discussions:- Show example on hedge fund

Administrative distance of 0 mean, Directly linked network have the lowest ...

Directly linked network have the lowest administrative distance of 0. They are considered the most reliable.

Why routine security audits are essential, Why Routine security audits are ...

Why Routine security audits are essential It is essential that regular security audits are conducted to find out physically which computer is connected and permits access to

State about data and data files - information, State about data and data fi...

State about data and data files - Information The third and major component of the system liable to be attacked is the data and data files used by the company. It is the most s

Determine about the security systems, Determine about the Security Systems ...

Determine about the Security Systems If the company intends to connect to the Internet, then it should pay great attention to the configuration of firewalls. Just as no one wo

Explain about stored procedure, A stored procedure is a named collection of...

A stored procedure is a named collection of SQL statements and procedural logic that is compiled, verified and kept in a server database. It is typically treated like any other dat

Question, On a lan where are ip datagram transported?

On a lan where are ip datagram transported?

Explain the term- congestion, Explain the term- congestion The average ...

Explain the term- congestion The average queue size over the last cycle and the current cycle is calculated. This value is the threshold. By averaging over two cycles instead o

Explain the concept of router-root path, Explain the concept of router-root...

Explain the concept of router-root path The mean router-router path is double the mean router-root path. Number levels of tree with root as 1 and the deepest level as n. The pa

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd