Questões de Concurso Comentadas para analista de mercado de capitais

Foram encontradas 14 questões

Resolva questões gratuitamente!

Junte-se a mais de 4 milhões de concurseiros!

Ano: 2003 Banca: FCC Órgão: CVM Prova: FCC - 2003 - CVM - Analista - Mercado de Capitais |
Q2242611 Inglês
From the IPO to the First Trade: Is Underpricing Related to the Trading Mechanism?

Sonia Falconieri, Albert Murphy and Daniel Weaver

    As documented by a vast empirical literature, IPOs are characterized by underpricing. Most of the theoretical literature has linked the size of underpricing to the IPO procedure used on the primary market. In this paper, by using a matched sample of NYSE and Nasdaq IPOs, we show that the size of underpricing also depends on the trading method used in the IPO aftermarket.
    There are two major methods of opening trading of initial public offerings (IPOs) in the U.S. The NYSE is an order-driven market ....56.... a call auction allows supply and demand to be aggregated (at one location) prior to the start of trading. ....57.... , Nasdaq is a quote-driven market. Dealers can only specify their best quotes, and participants have ....58.... idea of supply and demand away from the inside quotes.
      We propose a new proxy for ex ante uncertainty of firm value and test it. Our results show that there is a larger level of uncertainty at the beginning of trading on Nasdaq than on the NYSE. This in turn is associated with larger levels of underpricing for Nasdaq IPOs. We suggest that this may be due to the different informational efficiency of the two trading systems.

(http://www.nyse.com/marketinfo/p1020656068262.html?displayPage=% 2Fmarketinfo%2Fmarketinfo.html)
Para responder à questão, assinale, na folha de respostas, a letra correspondente à alternativa que preenche corretamente a lacuna do texto apresentado (....56....). 
Alternativas
Q526081 Inglês
Read the text below entitled “10 Ways to Protect Your Privacy Online" in order to answer question:


10 Ways to Protect Your Privacy Online


Source: www.newsweek.com (Adapted) Oct, 22nd 2010




    Up to a couple of years ago, I used to say that the average person could protect his or her privacy on the Web. Even as the founder of an online reputation-management company, I believed it was possible – so long as you were willing to commit some time doing it. Today, I tell people this: the landscape of personal data mining and exploitation is shifting faster than ever; trying to protect your online privacy is like trying to build your own antivirus software – really, really difficult. But whether or not you have the time (or money) to invest in the pros, there are a few simple steps we can all take to reduce the risk to our private data.


1. Do not put your full birth date on your social-networking profiles.


Identity thieves use birth dates as cornerstones of their craft. If you want your friends to know your birthday, try just the month and day, and leave out the year.

2. Use multiple usernames and passwords.

Keep your usernames and passwords for social networks, online banking, e-mail, and online shopping all separate. Having distinct passwords is not enough nowadays: if you have the same username across different Web sites, your entire life can be mapped and re-created with simple algorithms.

3. Shred. If you are going to throw away credit-card offers, bank statements, or anything else that might come in hard copy to your house, rip them up into tiny bits first.

According to the author, the year of your birthday must be
Alternativas
Q92106 Inglês
Read the text below entitled “10 Ways to Protect Your
Privacy Online” in order to answer questions 17 to
20:

10 Ways to Protect Your Privacy Online
Source: www.newsweek.com (Adapted) Oct, 22nd 2010


Up to a couple of years ago, I used to say that
the average person could protect his or her privacy
on the Web. Even as the founder of an online
reputation-management company, I believed it was
possible – so long as you were willing to commit some
time doing it. Today, I tell people this: the landscape
of personal data mining and exploitation is shifting
faster than ever; trying to protect your online privacy
is like trying to build your own antivirus software –
really, really dif?cult. But whether or not you have the
time (or money) to invest in the pros, there are a few
simple steps we can all take to reduce the risk to our
private data.

1. Do not put your full birth date on your social-
networking pro?les.

Identity thieves use birth dates as cornerstones
of their craft. If you want your friends to know your
birthday, try just the month and day, and leave out
the year.

2. Use multiple usernames and passwords.
Keep your usernames and passwords for social
networks, online banking, e-mail, and online shopping
all separate. Having distinct passwords is not enough
nowadays: if you have the same username across
different Web sites, your entire life can be mapped
and re-created with simple algorithms.

3. Shred.
If you are going to throw away credit-card offers, bank
statements, or anything else that might come in hard
copy to your house, rip them up into tiny bits ?rst.

According to the author, when throwing away credit card offers or bank statements, one should
Alternativas
Q91977 Contabilidade Geral
Ao apurar o resultado no fim do período contábil, a empresa encontrou um lucro líquido, antes dos tributos sobre o lucro e das participações, no montante de R$ 1.520,00.
A planilha de custos trazida para compor o resultado do período continha juros relativos a dezembro de 2009, já pagos, no valor de R$ 125,00; juros relativos a janeiro de 2010, ainda não pagos, no valor de R$ 180,00; juros relativos a dezembro de 2009, ainda não pagos, no valor de R$ 160,00; juros relativos a janeiro de 2010, já pagos, no valor de R$ 200,00. Referida planilha já havia sido contabilizada segundo o regime de caixa.   As demais contas estavam certas, com saldos já contabilizados, segundo o regime de competência. A empresa, então, mandou promover o registro contábil das alterações necessárias para apresentar os eventos segundo o regime de competência, em obediência à regulamentação vigente.  Após os lançamentos cabíveis, o rédito do período passou a ser lucro de
Alternativas
Q91975 Contabilidade Geral
Aponte abaixo a opção que contém uma assertiva incorreta.
Alternativas
Respostas
6: C
7: A
8: C
9: D
10: C