Suppose we have a number n. We perform any one of these operations arbitrary number of times −Replace n with n/2 when n is divisible by 2Replace n with 2n/3 when n is divisible by 3Replace n with 4n/5 when n is divisible by 5We have to count minimum number of moves needed to make number 1. If not possible, return -1.So, if the input is like n = 10, then the output will be 4, because use n/2 to get 5, then 4n/5 to get 4, then n/2 again to get 2 and n/2 again to get 1.StepsTo solve ... Read More
Risk management defines the review of risks related to the particular action or event. The risk management is used to information technology, projects, security problems and some other activities where risks can be analysed based on a quantitative and qualitative basis.Risks are an element of each IT project and business organizations. The management of risk should be appeared on a regular basis and be updated to recognize new potential threats. The strategic risk management provides to minimize the future risk probability and damage.Risk management involves the following steps which are as follows −Identify the Risk − The first step is ... Read More
Myron Gordon proposed a dividend model that included some more assumptions than the Walter's model. Gordon's model increased the assumptions of Walter's model and it reflected the evaluation of projects of those firms that have palpable tax and cost of capital greater than growth rate.Gordon's model has all the assumptions of Walter's model. In addition, it has three more assumptions which include −No Taxes − No corporate taxes should exist with the firm.Constant Retention Ratio − The Retention ratio is constant and does not change with changing income or expenses.The cost of capital is greater than the growth rate. In ... Read More
Information security risk management is the ongoing procedure of discovering, correcting, and avoiding security issues. Risk assessment is an elemental part of an organization's risk management procedure, designed to support appropriate security levels for its data systems and data.Risk is basically anything that threatens or limits the ability of an organization to implement its mission. Risk Management should be a group of continuous and developing processes that are used throughout an organization’s approaches and should methodically address some risks surrounding previous, present and future activities.The information security risks facing an organization will vary with the feature of the processing implemented ... Read More
John Lintner was a professor at the Harvard Business School who had researched on the factors that guide a company's dividend payout policy. Lintner came up with a formula for determining an optimal corporate dividend policy. His dividend policy model is founded on the principle that all companies tend to grow the dividend payouts to a target level and this process starts slowly in the beginning but takes a certain speed with passing time. This speed is known as the speed of adjustment.However, it has also been observed that there is a danger in increasing the speed of adjustment abruptly. ... Read More
Information security risk is the procedure of managing risks related to the use of information technology. It contains identifying, assessing, and considering risks to the confidentiality, integrity, and accessibility of an organization’s assets. The objective of this process is to treat risks in accordance with an organization’s complete risk tolerance.Risk is essentially anything that threatens or edge the ability of an organization to implement its mission. Risk Management should be a group of continuous and developing procedure that are used throughout an organization’s approaches and should methodically address some risks surrounding previous, present and future activities.The information security risks facing ... Read More
What are Ordinary Shares?Ordinary shares are tools that provide the investors the ownership rights to a company. There are two types of shares available for purchase −Ordinary SharesPreference SharesPreference shares are treated before the ordinary shares in case a company goes into liquidation.Attributes of Ordinary SharesInvestors can buy or sell ordinary shares anytime they wish in the share market. The share market is therefore the trading hub of ordinary shares and the shares of all listed companies are traded in the markets.Ordinary shares are the source of permanent capital for a company.Ordinary shares do not have a maturity date.The price ... Read More
Suppose we have an array A with n elements. Consider there is a password with n positive integers. We apply the following operations on the array. The operations is to remove two adjacent elements that are not same as each other, then put their sum at that location. So this operation will reduce the size of array by 1. We have to find the shortest possible length of the array after performing these operations.So, if the input is like A = [2, 1, 3, 1], then the output will be 1, because if we select (1, 3), the array will ... Read More
A botnet is a set of web connected devices such as servers, PCs, mobile devices, and IoT devices that are infected and controlled by shared malware. A system generally becomes part of a botnet without the user even realizing it. These hijacked devices can be used to give out distributed denial-of-service attacks, steal records, send spam or even remotely access the local web of a device.A high-scale volumetric DDoS attack can create traffic measured in tens of Gigabits per second. A regular network will not be able to manage such traffic.Attackers construct a network of hacked machines called a botnets ... Read More
Open-end and closed-end mutual funds are sub-divided into certain categories depending on their objectives. The objective of mutual funds is an important parameter because most mutual fund investors have specific aims when they invest in MFs. Therefore, the types of mutual funds vary with the primary objectives of the funds.Income FundsThe primary objective of income funds is to generate high current income. Therefore, the mutual fund managers of income funds invest in high-yielding shares in the market.It must be noted that income funds invest in high-risk shares because the investors of income funds seek to take a little risk to earn ... Read More
Data Structure
Networking
RDBMS
Operating System
Java
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP