Articles on Trending Technologies

Technical articles with clear explanations and examples

What is the Information Security Risk?

Ginni
Ginni
Updated on 03-Mar-2022 896 Views

Information security risk is the procedure of managing risks related to the use of information technology. It contains identifying, assessing, and considering risks to the confidentiality, integrity, and accessibility of an organization’s assets. The objective of this process is to treat risks in accordance with an organization’s complete risk tolerance.Risk is essentially anything that threatens or edge the ability of an organization to implement its mission. Risk Management should be a group of continuous and developing procedure that are used throughout an organization’s approaches and should methodically address some risks surrounding previous, present and future activities.The information security risks facing ...

Read More

How to calculate the Book Value of an Ordinary Share?

Probir Banerjee
Probir Banerjee
Updated on 03-Mar-2022 1K+ Views

What are Ordinary Shares?Ordinary shares are tools that provide the investors the ownership rights to a company. There are two types of shares available for purchase −Ordinary SharesPreference SharesPreference shares are treated before the ordinary shares in case a company goes into liquidation.Attributes of Ordinary SharesInvestors can buy or sell ordinary shares anytime they wish in the share market. The share market is therefore the trading hub of ordinary shares and the shares of all listed companies are traded in the markets.Ordinary shares are the source of permanent capital for a company.Ordinary shares do not have a maturity date.The price ...

Read More

C++ program to find reduced size of the array after removal operations

Arnab Chakraborty
Arnab Chakraborty
Updated on 03-Mar-2022 259 Views

Suppose we have an array A with n elements. Consider there is a password with n positive integers. We apply the following operations on the array. The operations is to remove two adjacent elements that are not same as each other, then put their sum at that location. So this operation will reduce the size of array by 1. We have to find the shortest possible length of the array after performing these operations.So, if the input is like A = [2, 1, 3, 1], then the output will be 1, because if we select (1, 3), the array will ...

Read More

What are Botnets in information security?

Ginni
Ginni
Updated on 03-Mar-2022 444 Views

A botnet is a set of web connected devices such as servers, PCs, mobile devices, and IoT devices that are infected and controlled by shared malware. A system generally becomes part of a botnet without the user even realizing it. These hijacked devices can be used to give out distributed denial-of-service attacks, steal records, send spam or even remotely access the local web of a device.A high-scale volumetric DDoS attack can create traffic measured in tens of Gigabits per second. A regular network will not be able to manage such traffic.Attackers construct a network of hacked machines called a botnets ...

Read More

What are Income Funds, Growth Funds, and Balanced Funds?

Probir Banerjee
Probir Banerjee
Updated on 03-Mar-2022 508 Views

Open-end and closed-end mutual funds are sub-divided into certain categories depending on their objectives. The objective of mutual funds is an important parameter because most mutual fund investors have specific aims when they invest in MFs. Therefore, the types of mutual funds vary with the primary objectives of the funds.Income FundsThe primary objective of income funds is to generate high current income. Therefore, the mutual fund managers of income funds invest in high-yielding shares in the market.It must be noted that income funds invest in high-risk shares because the investors of income funds seek to take a little risk to earn ...

Read More

What is the Information System?

Ginni
Ginni
Updated on 03-Mar-2022 3K+ Views

Information system is group of people, information technology, and business process to achieve a business goals. Information systems are a group of interconnected elements working to collect, process, store, and distribute data to provide coordination, visualization in an organization, analysis, and decision-making.The Information system can be represented as a set of software, hardware, and telecommunications network that people create and use to gather, produce, and distribute beneficial data, generally in organizational settings.Information System is a particular discipline or department of learning that is concerned with the application of data to organizational needs. The scope of information system involves manual, computer-based ...

Read More

What is Capital Market Efficiency?

Probir Banerjee
Probir Banerjee
Updated on 03-Mar-2022 2K+ Views

It is observed that in most of the hypotheses of dividends and shares, analysts consider the capital markets to be efficient. However, from the point of view of an investor, there are no markets in the world that can be regarded as perfectly efficient. In fact, it is hard to define a perfectly efficient capital market. However, the efficiency of capital markets can be determined by incorporating some aspects of the capital market attributes.In general, capital markets are envisioned to have enough liquidity and fair price mechanism.Liquidity measures mean that the market can offer cash in lieu of securities instantaneously ...

Read More

Types of Capital: Authorized, Issued, Subscribed, and Paid-Up

Probir Banerjee
Probir Banerjee
Updated on 03-Mar-2022 9K+ Views

Authorized, Issued, Subscribed, and Paid-up capital are issues related to the reporting of shares. It is important to divide the total capital earned from the share market into Authorized, Issued, Subscribed, and Paid-up capital to measure the various attributes of a share. These factors may affect the book value of a share and hence are important factors to recognize.Authorized CapitalAuthorized share capital represents the maximum amount of capital a company can raise from the market. It is the maximum amount a company is permitted or capable of raising from the shareholders in the market. To alter the value of authorized ...

Read More

What is information classification in information security?

Ginni
Ginni
Updated on 03-Mar-2022 2K+ Views

Information Classification is the procedure of classifying data into relevant categories. For instance, inside a company, the financial documents should not be diverse with public relation department documents. Instead, they must be kept in independent folders, and limited to the responsible individuals who are named to and entrusted with access. In this method, the stored data will be safe, and it will be simpler to be found when required.Information Security Classification needed that information first be recognized. An initiative is needed to actively discover data that is created, stored and managed by multiple business groups within the organization. By finding ...

Read More

What are the major functions of capital markets?

Probir Banerjee
Probir Banerjee
Updated on 03-Mar-2022 702 Views

Usually, all types of securities are traded in capital markets. Therefore, capital markets perform their duties as a place of security exchange and trade without any limits of investments.Capital markets usually perform the following two functions −Maintain LiquidityMaintain Fair Price of SecuritiesLet's discuss these two major functions of capital market in detail −Maintaining LiquidityLiquidity is a measure of speed and convenience of transferring assets into cash. Liquidity shows how much and at what speed do the assets are converted to cash. Capital markets perform the duty of converting assets into cash with a certain speed and convenience. Depending on the ...

Read More
Showing 45531–45540 of 61,297 articles
Advertisements