Suppose we have two numbers a and b. Amal and Bimal are playing a game. First each of them writes an integer from 1 to 6, then a dice is thrown. The player whose written number got closer to the number written on the paper, he wins that round, if both of them has the same difference, then that is a draw. If Amal writes the number a, and Bimal writes b, then we have to count the number of possible ways the Amal will win, number of possible draw and number of ways Bimal can win.So, if the input ... Read More
Share buyback is the process by which a company repurchases its own shares from the investors. It results in a decrease in the total number of outstanding shares which in turn increases the value of shares.Companies may tend to buy shares back for a host of reasons. Some of the reasons for share buyback are as follows −Too Much Cash with Very Few Investment OpportunitiesMature companies that have with too much cash on their books but too few opportunities to invest money can resort to share buyback in order to increase the value of shares. The expense in the form ... Read More
Physical security is represented as the security of personnel, hardware, programs, networks, and data from physical situations and events that can support severe losses or harm to an enterprise, agency, or organization. This contains security from fire, natural disasters, robbery, theft, destruction, and terrorism.There are several elements of physical security which are as follows −It can be alternative physical security strategies should be performed. When appropriate, consider the need of window bars, anti-theft cabling (with alarm when cable is disconnected from system), magnetic key cards, and motion detectors.It can be prepared for fire emergencies with suitable automatic non-water fire fighting ... Read More
It has been observed that most shareholders prefer the stability of dividend payouts. The firms may choose to pay dividends in regular intervals to satisfy the needs of the shareholders. Although the amount of dividend paid may change a little from year to year, payouts made every year is usually considered a wise policy.There are three forms of stability of dividends −Constant Dividend Per ShareConstant PayoutConstant Dividend Per Share Plus Extra dividendNow, let's analyze each of these forms in detail.Constant Dividend Per ShareIn some countries, companies prefer to pay dividends which are a portion of the paid-up capital. It is ... Read More
A risk treatment plan should be recognized for all risks identified. Identified risk can be and is generally managed by several approaches such as Risk transfer, risk avoidance, risk reduction and risk acceptance.Risk Acceptance − Risk acceptance is called by the name of risk retention. It is easily accepting the identified risk without creating any measures to avoid loss or the probability of the risk happening. It contains a decision by management to accept a given risk without more mitigation or transfer, for a period of time.This appears in two classes of circumstances. For risks that are too low to ... Read More
Book Building is a method of pricing the shares in the market. There are usually two types of share pricing methods −The Fixed Priced Method −The price of shares when issued remains constant and fixed. The price is usually mentioned before the IPO and the investors are aware of the fixed price of each share.The Book Building Method − There is no fixed price. Instead, there are limits (a lowest and the highest price) in which the shares are traded. When the IPO takes place, the issuers of the securities adjust the price depending on the demand of the shares ... Read More
Suppose we have a number n. A number is a binary decimal if it's a positive integer and all digits in its decimal notation are either 0 or 1. For example, 1001 (one thousand and one) is a binary decimal, while 1021 are not. From the number n, we have to represent n as a sum of some (not necessarily distinct) binary decimals. Then compute the smallest number of binary decimals required for that.So, if the input is like n = 121, then the output will be 2, because this can be represented as 110 + 11 or 111 + ... Read More
Walter's model is one of the most important theories of dividend in financial management. Proposed by Professor James E. Walter, the model states that the dividend policy is a precursor of the value of a company. As companies pay dividends depending on the earnings, the payout of dividends can show how much the company was valued.Walter's model is based on the relationship between a company's Internal Rate of Return (IRR) and the Cost of Capital (CoC). These two factors are used to find the dividend theory that will reflect the want of the company to maximize the shareholder's wealth. As ... Read More
Risk assessments should be conducted by teams that involves both functional managers and information technology administrators. Business operations, workflow, or technologies change, periodic reviews must be conducted to analyze these changes. The result of new threats and vulnerabilities produced by these changes has to be decided. A comprehensive testing of the effectiveness of existing controls also needed.The objective of a risk assessment is to provide management create appropriate strategies and controls for managing of information assets. The basic goals of risk assessment should always be to deal with those elements of decision making that are uncertain.If the results of actions ... Read More
Suppose we have an array A with n elements and a number k. There are n students in a class. The rating of ith student is A[i]. We have to form a team with k students such that rating of all team members are distinct. If not possible return "Impossible", otherwise return the sequence of indices.So, if the input is like A = [15, 13, 15, 15, 12]; k = 3, then the output will be [1, 2, 5].StepsTo solve this, we will follow these steps −Define two large arrays app and ans and fill them with cnt := 0 ... Read More
Data Structure
Networking
RDBMS
Operating System
Java
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP