Accounting and Financial Management (3) Analog and Digital Communication (2) Artificial Intelligence (2) BE(Civil) (2) BE(CSE) (83) BE(ECE) (11) BE(Mech) (10) Business Processes (3) C# and .NET Framework (2) Communication Skills (1) Compiler Design (1) COMPONENT BASED TECHNOLOGY (1) COMPUTER ARCHITECTURE (1) COMPUTER GRAPHICS and MULTIMEDIA SYSTEMS (6) COMPUTER INTEGRATED MANUFACTURING (1) Computer Networks (9) Computer Organization (2) Computer Programming (1) Consumer Behaviour (1) Control Systems (1) Cryptography and Network Security (3) Datastructures and Algorithms (10) Datawarehousing and Mining (1) DBMS (5) DESIGN AND ANALYSIS OF ALGORITHMS (9) DESIGN OF MACHINE ELEMENTS (1) DIGITAL PRINCIPLES AND SYSTEMS DESIGN (3) Discrete Mathematics (1) DISTRIBUTED COMPUTING (2) DSP (8) DYNAMICS OF MACHINERY (2) Economic Foundations (1) ELECTRICAL ENGINEERING (1) ELECTRICAL ENGINEERING AND CONTROL SYSTEMS (1) Electromagnetic Fields (3) ELECTRONIC CIRCUITS (1) ELECTRONIC COMMERCE (4) ELECTRONIC DEVICES AND CIRCUITS (1) EMBEDDED SYSTEMS (1) FUNDAMENTALS OF COMPUTING (2) Graphics and Multimedia (3) HEAT AND MASS TRANSFER (1) HUMAN RESOURCE MANAGEMENT (1) Internet Programming (9) INTRODUCTION TO FINITE ELEMENT ANALYSIS (1) Legal Aspects of Business (1) MANAGEMENT INFORMATION SYSTEMS (1) Marketing Management (1) MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE (4) MATHEMATICS - I (1) MBA (9) MCA (83) MCA QUESTION BANK (2) MECHATRONICS (1) MicroProcessor and Controllers (4) MICROPROCESSORS AND APPLICATIONS (5) MIDDLE WARE TECHNOLOGIES (3) MOBILE COMPUTING (5) NETWORK PROGRAMMING (1) NUMERICAL METHODS (1) OBJECT ORIENTED ANALYSIS AND DESIGN (5) Object Oriented Programming (18) Operating System (2) OPERATING SYSTEMS (9) Organizational Behaviour (2) POWER ELECTRONICS (1) Principles of Management (8) PROBABILITY AND QUEUEING THEORY (2) Probability and Statistics (1) PROBLEM SOLVING AND PROGRAMMING (2) PROCESS PLANNING AND COST ESTIMATION (1) PROFESSIONAL ETHICS AND HUMAN VALUES (1) RANDOM PROCESSES (1) RESOURCE MANAGEMENT TECHNIQUES (2) ROBOTICS (1) Security analysis (1) Service Marketing (1) SIGNALS AND SYSTEMS (1) Software Engineering (8) SOFTWARE PROJECT MANAGEMENT (4) SOFTWARE QUALITY MANAGEMENT (2) System Software (2) TCP/IP PROTOCOL SUITE (3) Theory of Computation (4) Total Quality Management (2) UNIX AND NETWORK PROGRAMMING (4) Visual Programming (2) WEB GRAPHICS (2) WEB TECHNOLOGY (2) XML AND WEB SERVICES (4)

Sunday, July 6, 2008



Part –a 
1. WHAT ARE the two major types of information necessary for security analysis
2. What are the features of preference shares.
3. What do you mean by underwriting.
4. What is demutualization of stock exchanges
5. What do you understand by fundamental approach to security analysis 
6. Define multiplier
7. Explain the three types of trends in stock prices
8. What do you infer from the moving average theory of technical analysis
9. What is an index fund.
10. What is the difference between SML AND CML.

Part –b
11. A) as an investment advisor what features would you suggest to be included in the investment bunch of a client explain the features briefly.
b) security analysis requires as first step the sources of information on the basis of which analysis is made. What are different types of information used for security analysis

12. A) who are the key players involved in the new issues market.
b)what are the objectives and functions of SEBI

13. A)industry life cycle exhibits the status of the industry and gives the clue to entry and exit for investors. Elucidate.
b) how does ratio analysis reflect the financial health of a company.

14. a) how would you use ROC to predict the stock price movement . kindly elucidate with example.
b)chart patterns are helpful in predicting the stock price movement comment.

15). A) the following three portfolios provide the particulars given below .
Portfolio average annual return standard deviation correlation co-efficient
A 18 27 0.8
B 14 18 0.6
C 15 8 0.9
MARKET 13 12 -
RISK free rate of interest 9%
i. rank these portfolios using sharpe’s and treynor’s methods
ii. compare both the indices
b).what are the basic assumptions of CAPM. What are the advantages of adopting CAPM model in the portfolio management.

1 comment:

  1. Thanks for sharing the previous year question papers of Anna University .It makes the pattern more clear and you know the way questions are actually put up and important questions that you need to prepare well .Specially for subject like SECURITY ANALYSIS AND PORTFOLIO MANAGEMENT