Chapter Review

1812 words - 8 pages

Presented to:
JIMA A. DE LEON, B.S.I.M., M.B.A School of Graduate Studies
Central Philippine University
Jaro, Iloilo City

Chapter Two and Three of Mishkin’s The Economics of Money, Banking and Financial Market
Chapter Review

Faculty, College of Business and Accountancy Graduate Programs
Central Philippine University
Iloilo City

In partial fulfilment
Of the Course Requirements
In Philippine Financial System
MBA 612a

Presented by:

July 24, 2015

Chapter 2: An Overview of the Financial System

This chapter gives an overview of the financial markets and institutions as well as explain the concept and role of financial intermediaries in the economy.
According to ...view middle of the document...

3. Exchanges and Over-the-Counter Markets
Secondary markets can be organized either through exchanges, where buyers and sellers of securities meet in one central location to trade or through over-the-counter (OTC) market, in which dealers at different locations who have an inventory of securities are ready to buy and sell.
4. Money and Capital markets
The money market is the market for shorter-term securities, generally those with one year or less remaining to maturity and capital market is the market for longer-term securities, generally those with more than one year to maturity

Mishkin also noted that financial market instruments traded are classified into two. Those which are traded in the money market: U.S Treasury Bills, Negotiable Bank Certificates of Deposit, Commercial Paper, Repurchase Agreements and Federal Funds and those traded in the capital market: stocks, mortgages, corporate bonds, US Government Securities, US Government Agency Securities, State and Local Government Bonds and Consumer and Bank Commercial Loans.

It was also mentioned in this chapter that internationalization of financial markets has become an importrant trend where various types of financial assets issued by one country may be purchased by nationals of another country. The traditional instruments in the international bond market are as follows:
* Eurocurrencies are currencies deposited in banks outside the country of issue. For example, eurodollars, a major form of eurocurrency, are U.S. dollars deposited in foreign banks outside the U.S. or in foreign branches of U.S. banks. That is, eurodollars are dollar-denominated bank deposits held in banks outside the U.S.
* International bond is a bond available for sale outside the country of its issuer.Example of which is a bond issued by a U.S. firm that is available for sale both in the U.S. and abroad.
* Foreign bond is an international bond issued by a country that is denominated in a foreign currency and that is for sale exclusively in the country of that foreign currency. Example is a bond issued by a U.S. firm that is denominated in Japanese yen and that is for sale exclusively in Japan.
* Eurobond is an international bond denominated in a currency other than that of the country in which it is sold. An example would be a bond issued by a U.S. borrower, denominated in U.S. dollars, and sold outside the U.S.

It is also in this chapter, where Mishkin explained the function of financial intermediaries. According to him, financial intermediaries are institutions that acquire funds by issuing liabilities and use those funds to acquire assets by purchasing securities or making loans. Financial intermediaries are essential because they reduce transaction costs, allows risk sharing and solve problem caused by adverse selection and moral hazards. They are categorized into three types: banks (commercial, S&Ls and Mutual Savings Banks, credit union), contractual savings institutions (insurance...

Other Papers Like Chapter Review

Chapter 2 Review Questions Solutions

913 words - 4 pages Chapter 2 Review Questions Solutions 1. Describe and compare the six sources of software. The six sources of software identified in the textbook are: (1) information technology services firms, (2) packaged software providers, (3) vendors of enterprise solution software, (4) application service providers and managed service providers, (5) open-source software, and (6) in-house development. IT services firms help companies develop custom

Mcts Server 2008 Chapter Seven Review

879 words - 4 pages Chapter Seven Review Questions  MCTS Guide to Microsoft Windows Network Infrastructure Configuration  1. What protocol is used by Windows clients for accessing shared resources in Windows Server 2008?    c. SMB  2. User‐level permissions in Windows Server 2008 are based on NTFS, or the New Technology File  Service.  3. Which of the following are not share‐level permissions in Windows Server 2008?  b. Execute  c. Write  e. Modify

Chapter 3 Ghatt Chart Review Questions

697 words - 3 pages Review Questions - Chapter 3 Page 77 1. Contrast the following terms: a) Critical path scheduling, Gantt network diagramming, slack time Network diagramming is a critical path scheduling technique whose sequence of task activities directly affect the completion date of a project. A major strength for network diagramming is its ability to represent how completion dates can vary for activates or task and is more used that Gantt Charts

Principles of Information Security Chapter 3 Review

1301 words - 6 pages Chapter 3 Review 1. What is the difference between law and ethics? The difference between law and ethics is that law is a set of rules and regulations that are universal and should be accepted and followed by society and organizations. Ethics on the other hand was derived from the latin word mores and Greek word Ethos means the beliefs and customs that help shape the character of individuals and how people interact with one another 2

Chapter 1-3 Computer Structure And Logic Review

2681 words - 11 pages Chapter 1 review questions 1. Which of the following is an example of a PC? The 8088 processor marked the start of the home and office based PC’s given that it had a 1mb address limit making a more efficient machine. 2. Who is credited with the patent of the first computer? John V. Atanasoff was the first person accredited for the invention of the computer due to his use of modern digital switching techniques. 3. In the Von Neumann

Pricinples of Information Security, Chapter 3 Review Questions

1536 words - 7 pages Week 2, Chapter 3 Name: ------------------------------------------------- Review Questions p. 114 Assignment 3          1. What is the difference between law and ethics? Laws are formally adopted rules for acceptable behavior in modern society. Ethics are socially acceptable behaviors. The key difference between laws and ethics is that laws carry the authority of a governing body, and ethics do not. Ethics in turn are based on

Chapter 1 Review Questions

870 words - 4 pages 1. What is the difference between a threat agent and a threat? A. A threat agent is the person who facilitates the attack while the threat is a constant danger to something. 2. What is the difference between vulnerability and exposure? A. Vulnerability is a flaw within the system or a weakness, usually where the attackers attack. While Exposure is a single situation when the system is prone to be harmed. 3. How is infrastructure

Chapter 1 Review

760 words - 4 pages 1. Your boss drops by your office in a hurry to ask you to attend a meeting at 10:30 on Friday morning and you can’t find a pen to make a note as a reminder. What Linux command can you use to make a quick note to store in a file called Meeting? B. cat > Meeting 2. Before you make the note in Question 1, you decide to determine Friday’s date, so that you can include it in your note. What Linux command can you use to quickly determine the

Chapter 12 Review Questions

1571 words - 7 pages SOLUTIONS TO REVIEW QUESTIONS 1. NFPOs provide goods and/or services to society without the expectation of profit, while profit-oriented organizations provide goods and/or services with the expectation of earning a profit. Many resources are provided to NFPOs without any expectation of remuneration or repayment, including volunteer services and gifts in cash or in kind. Providers of resources to a profit-oriented organization expect

Analytical Review Chapter 15 & 16 Yukl Leadership in Organizations (Eighth Edition)

807 words - 4 pages ANALYTICAL REVIEW CHAPTER 15 & 16 YUKL Leadership in Organizations (eighth edition) CAVRIL ROMBLEY 4/13/2015 Facilitating conditions for leadership development Leaders face new challenges and changes in organizations on a daily basis. In order to better prepare for these changes leaders need to continue to develop their skills and competencies. There are different leadership training programs but the effectiveness of

Chapter 9 Review Questions and Answers

1855 words - 8 pages 1. a) What is a database? A database is an organized collection of related data. b) How does an RDBMS store data? An RDBMS stores related data in tables. 2. What is one benefit of dividing data into tables? Dividing data into tables eliminates unnecessary data duplication, or data redundancy. 3. a) What is a database schema? A database schema is a

Related Essays

Chapter Review

789 words - 4 pages CHAPTER 8 through 10 REVIEW The "hierarchical" fief-holding system in which vassals in turn had vassals owing them services was known as subinfeudation. The VIKINGS used iron weapons, had superior shipbuilding skills, did raids onto continent (they came from Scandinavia) , established settlements, aided growth of fief-holding., and in time - Christianity assimilated them into European civilization. In Western Europe, the chief political

Chapter Review


Chapter 2 Review Questions

744 words - 3 pages Chapter 1 PLD Review questions Multiple choice 1. A program is a set of instructions that a computer follows to perform a task. 2. The physical devices that a computer is made of are referred to as Hardware. 3. The part of a computer that runs programs is called the CPU. 4. Today, CPUS are small chips known as Microprocessors. 5. The computer stores a program while the program is running, as well as the data that the

Chapter 6 Review Questions

541 words - 3 pages Miguel Berrios July 28, 2013 Chapter 6 Review Questions 1. How does the WBS differ from the project network? The WBS differs from the project network in several ways. The WBS is hierarchical while the project network is sequential. The work packages of the WBS are identified independently of other work packages, have definite start and finish points, require specific resources, include technical specifications and