John Lintner was a professor at the Harvard Business School who had researched on the factors that guide a company's dividend payout policy. Lintner came up with a formula for determining an optimal corporate dividend policy. His dividend policy model is founded on the principle that all companies tend to grow the dividend payouts to a target level and this process starts slowly in the beginning but takes a certain speed with passing time. This speed is known as the speed of adjustment.However, it has also been observed that there is a danger in increasing the speed of adjustment abruptly. ... Read More
Information security risk is the procedure of managing risks related to the use of information technology. It contains identifying, assessing, and considering risks to the confidentiality, integrity, and accessibility of an organization’s assets. The objective of this process is to treat risks in accordance with an organization’s complete risk tolerance.Risk is essentially anything that threatens or edge the ability of an organization to implement its mission. Risk Management should be a group of continuous and developing procedure that are used throughout an organization’s approaches and should methodically address some risks surrounding previous, present and future activities.The information security risks facing ... Read More
What are Ordinary Shares?Ordinary shares are tools that provide the investors the ownership rights to a company. There are two types of shares available for purchase −Ordinary SharesPreference SharesPreference shares are treated before the ordinary shares in case a company goes into liquidation.Attributes of Ordinary SharesInvestors can buy or sell ordinary shares anytime they wish in the share market. The share market is therefore the trading hub of ordinary shares and the shares of all listed companies are traded in the markets.Ordinary shares are the source of permanent capital for a company.Ordinary shares do not have a maturity date.The price ... Read More
Suppose we have an array A with n elements. Consider there is a password with n positive integers. We apply the following operations on the array. The operations is to remove two adjacent elements that are not same as each other, then put their sum at that location. So this operation will reduce the size of array by 1. We have to find the shortest possible length of the array after performing these operations.So, if the input is like A = [2, 1, 3, 1], then the output will be 1, because if we select (1, 3), the array will ... Read More
A botnet is a set of web connected devices such as servers, PCs, mobile devices, and IoT devices that are infected and controlled by shared malware. A system generally becomes part of a botnet without the user even realizing it. These hijacked devices can be used to give out distributed denial-of-service attacks, steal records, send spam or even remotely access the local web of a device.A high-scale volumetric DDoS attack can create traffic measured in tens of Gigabits per second. A regular network will not be able to manage such traffic.Attackers construct a network of hacked machines called a botnets ... Read More
Open-end and closed-end mutual funds are sub-divided into certain categories depending on their objectives. The objective of mutual funds is an important parameter because most mutual fund investors have specific aims when they invest in MFs. Therefore, the types of mutual funds vary with the primary objectives of the funds.Income FundsThe primary objective of income funds is to generate high current income. Therefore, the mutual fund managers of income funds invest in high-yielding shares in the market.It must be noted that income funds invest in high-risk shares because the investors of income funds seek to take a little risk to earn ... Read More
Information system is group of people, information technology, and business process to achieve a business goals. Information systems are a group of interconnected elements working to collect, process, store, and distribute data to provide coordination, visualization in an organization, analysis, and decision-making.The Information system can be represented as a set of software, hardware, and telecommunications network that people create and use to gather, produce, and distribute beneficial data, generally in organizational settings.Information System is a particular discipline or department of learning that is concerned with the application of data to organizational needs. The scope of information system involves manual, computer-based ... Read More
It is observed that in most of the hypotheses of dividends and shares, analysts consider the capital markets to be efficient. However, from the point of view of an investor, there are no markets in the world that can be regarded as perfectly efficient. In fact, it is hard to define a perfectly efficient capital market. However, the efficiency of capital markets can be determined by incorporating some aspects of the capital market attributes.In general, capital markets are envisioned to have enough liquidity and fair price mechanism.Liquidity measures mean that the market can offer cash in lieu of securities instantaneously ... Read More
Suppose we have a numeric string S with n digits. Consider S represents a digital clock and whole string shows an integer from 0 to 10^n - 1. If there are a smaller number of digits, it will show leading 0s. Follow the operations −Decrease the number on clock by 1, orSwap two digitsWe want the clock will show 0 with minimum number of operations needed. We have to count the number of operations needed to do that.So, if the input is like S = "1000", then the output will be 2, because we can swap first 1 with last ... Read More
Authorized, Issued, Subscribed, and Paid-up capital are issues related to the reporting of shares. It is important to divide the total capital earned from the share market into Authorized, Issued, Subscribed, and Paid-up capital to measure the various attributes of a share. These factors may affect the book value of a share and hence are important factors to recognize.Authorized CapitalAuthorized share capital represents the maximum amount of capital a company can raise from the market. It is the maximum amount a company is permitted or capable of raising from the shareholders in the market. To alter the value of authorized ... Read More
Data Structure
Networking
RDBMS
Operating System
Java
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP