Commit 50f8c714 authored by AMAN BANSAL's avatar AMAN BANSAL

lab3

parent 8632af41
#!/bin/bash
cat $1 | awk 'BEGIN {RS="[[:space:]]"} {print $0}' | sed -n 's/^\([[:alpha:]][A-Za-z0-9_.]*@[A-Za-z][A-Za-z]*\.[A-Za-z.][A-Za-z.]*\)/\1/gp'
\ No newline at end of file
./script1.sh testcase/input1 > out
diff testcase/output1 out > result
if [[ -s result ]];
then
echo failed
else
echo passed
fi
rm out result
Electronic mail is a method of exchanging digital messages between computer users; such messaging first entered substantial use in the 1960s and by the 1970s had taken the form now recognised as email. These are spams email ids:
intizar_08@yahoo.co.in , manu29809@gmail.com, pankajdhaka.dav@hotmail.com, pranav165@yahoo.com .
These are ok emails say youare.afool@g.com.:
arya.anit3@gmail.com ; meetshrotriya@gmail.com ; vikas221965@yahoo.com ; manugarg1592@yahoo.in
praveen_solanki29@yahoo.com
tanmaysharma07@gmail.com
kartikkumar781@gmail.com
arun.singh2205@gmail.com
sukalyan_bhakat@us.in.y.z
These are incorrect:
rohitneema065@gmail
shashikant.1975.com
ram#dhar@gmail.com
123aahdhf@gmail.com
_rma2367@gmail.com
Corruption not only has become a pervasive aspect of shukalyan24738.sdfj@gmail.com Indian politics but also has become an increasingly important factor in Indian elections.
The extensive role of the Indian state in providing services and promoting economic ram@cse.iitb.ac.in development has always created the opportunity for using public resources for private benefit.
As government regulation of business was extended in dharm@yahoo.com the 1960s and corporate donations were banned in 1969, trading economic favours for under-the-table contributions to political parties became an increasingly widespread political practice. During the 1980s and 1990s, corruption became associated with the occupants of the highest echelons of India’s political system.
Rajiv Gandhi’s government was rocked by scandals, as was the government rohit@cse.iitb.ac.in of P.V. Narasimha Rao. Politicians have become so closely identified with corruption in the public eye that a Times of India poll of 1,554 adults in six metropolitan cities found that 98 percent of the public is convinced that politicians and ministers are corrupt, with 85 percent observing that corruption is on the increase.
The prominence of political corruption in India in the 1990s is hardly unique to India. Other abhijitpatil@gmail.com countries also have experienced corruption that has rocked their political systems. What is remarkable about India is the persistent anti-incumbent sentiment among its electorate. Since Indira’s victory in her 1971 “garibi hatao” election, only one ruling party has been re-elected to power in the Central Government.
In an important sense, the exception proves the rule because diptesh_23x@yahoo.com the Congress (I) won reelection in 1984 in no small measure because the electorate saw in Rajiv Gandhi a “Mr. Clean” who would lead a new generation of politicians in cleansing the political system. Anti-incumbent sentiment is just as strong at the state level, where the ruling parties of all political persuasions in India’s major states lost eleven of thirteen legislative assembly elections held from 1991 through spring 1995.
Corruption in simple terms may be rohit@yahoo.co.in described as ‘an act of bribery’. Corruption is defined as the use of public office for private gains in a way that constitutes a breach of law or a deviation from the norms of society. Scales of corruption can be Grand, Middling or Petty and payment of bribes can be due to collusion between the bribe taker and the bribe giver, due to coercion or even anticipatory.
This was the outburst of Mahatma Gandhi against rampant deepak@iitb.ac.in corruption in Congress ministries formed under 1935 Act in six states in the year 1937. The disciples of Gandhi however, ignored his concern over corruption in post-Independence India, when they came to power.
Over sixty years of democratic rule has made the people so immune to corruption that they have learnt how to live with the system even though the cancerous growth of this malady may finally kill it. The Tehelka episode surcharged the political atmosphere of the country but it hardly exposed anything that was unknown to the people of this biggest democratic polity.
Politicians are fully aware of the corruption and nepotism as the main reasons behind the fall of Roman Empire, the French Revolution, October Revolution in Russia, fall of Chiang Kai-Shek Gov­ernment on the mainland of China-and even the defeat of the mighty Congress party in India. But they are not ready to take any lesson from the pages of history.
intizar_08@yahoo.co.in
manu29809@gmail.com
pankajdhaka.dav@hotmail.com
pranav165@yahoo.com
arya.anit3@gmail.com
meetshrotriya@gmail.com
vikas221965@yahoo.com
manugarg1592@yahoo.in
praveen_solanki29@yahoo.com
tanmaysharma07@gmail.com
kartikkumar781@gmail.com
arun.singh2205@gmail.com
sukalyan_bhakat@us.in.y.z
dhar@gmail.com
shukalyan24738.sdfj@gmail.com
ram@cse.iitb.ac.in
dharm@yahoo.com
rohit@cse.iitb.ac.in
abhijitpatil@gmail.com
diptesh_23x@yahoo.com
rohit@yahoo.co.in
deepak@iitb.ac.in
#!/bin/bash
a=$(awk 'BEGIN{RS="[[:space:]]";}{print $0}' $1 | sed -n 's/[^0-9]*\([0-9]\{1,3\}\.[0-9]\{1,3\}\.[0-9]\{1,3\}\.[0-9]\{1,3\}\)\b/\1/p')
#echo $a
#b=$(awk 'BEGIN{RS="\ ";}{print $0}' $a | sed -n 's/[^0-9]*\([0-9]\{1,3\}\.[0-9]\{1,3\}\.[0-9]\{1,3\}\.[0-9]\{1,3\}\).*/\1/p')
for ipad in $a
do
IFS='.' read -r -a dummy <<< "$ipad"
if [ ${#dummy[@]} -gt 4 ]
then
continue
fi
for ((i = ${#dummy[@]} - 1;i >= 0;i--)); do
if [ ${dummy[i]} -lt 0 ] ||[ ${dummy[$i]} -gt 255 ]
then
break
elif [ $i -eq 0 ] && [ ${dummy[$i]} -lt 128 ] && [ ${dummy[$i]} -gt -1 ]
then
echo "$ipad A" >> temp
elif [ $i -eq 0 ] && [ ${dummy[$i]} -lt 192 ] && [ ${dummy[$i]} -gt 127 ]
then
echo "$ipad B" >> temp
elif [ $i -eq 0 ] && [ ${dummy[$i]} -lt 224 ] && [ ${dummy[$i]} -gt 191 ]
then
echo "$ipad C" >> temp
elif [ $i -eq 0 ] && [ ${dummy[$i]} -lt 240 ] && [ ${dummy[$i]} -gt 223 ]
then
echo "$ipad D" >> temp
elif [ $i -eq 0 ] && [ ${dummy[$i]} -lt 248 ] && [ ${dummy[$i]} -gt 239 ]
then
echo "$ipad E" >> temp
elif [ $i -eq 0 ] && [ ${dummy[$i]} -lt 256 ] && [ ${dummy[$i]} -gt 247 ]
then
echo "$ipad Not Defined" >> temp
fi
done
done
cat temp
rm temp
\ No newline at end of file
./script2.sh testcase/input2 > out
diff -Z testcase/output2 out > result
if [[ -s result ]];
then
echo failed
else
echo passed
fi
rm out result
An Internet Protocol 172.16.254.1 address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.[1] An IP address serves two principal functions: host or network interface 345.45.48.45 identification and location addressing.
Version 4 of the Internet Protocol (IPv4) defines 256.2.3.5 an IP address as a 32-bit number.[1] However, because of the 78.54.259.6 growth of the Internet and the depletion of available IPv4 addresses, a new version of IP (IPv6), using 128 bits for the IP address, was developed in 1995,[2] and standardized as RFC 2460 in 1998.[3] IPv6 deployment has been ongoing since the mid-2000s.
IP addresses are usually 192.45.78.248 written and displayed in human-readable notations, such as in IPv4, and 2001:db8:0:1234:0:567:8:1 in IPv6.
The IP address 489.56.49. space is managed globally by the 234.456.3.5 Internet Assigned Numbers Authority (IANA), and by five regional Internet registries (RIR) responsible in their designated territories for assignment 82.45.12.3 to end users and local Internet registries, such as Internet service providers. IPv4 addresses 1.0.1.289 have been distributed by IANA to the RIRs in blocks of approximately 16.8 million addresses each. Each ISP or private network administrator assigns 456.25.15.23 an IP address to each device connected to its network. Such assignments 240.2.1.3 may be on a static (fixed or permanent) or dynamic basis, depending on 45.2.1.45.48 its software and practices.
An IP address serves two principal functions. It identifies the host, or more specifically its network interface, and it provides the location of the host in the network, and thus the 249.56.2.3 capability of addressing 45.89.12.45.36 that host. Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there."[4]
The header of each IP packet contains the IP address of the 456.258.2.3 sending host, and that of the destination 0.0.0.0 host. A host may use geolocation software to deduce the geolocation 255.255.255.255 of its communicating peer.[5][6]
wo versions of the Internet Protocol 12.59.126.23 are in common use in the Internet today. The original 123.45.78.1 version of the Internet Protocol for use in the Internet is Internet Protocol version 4 (IPv4), first installed in 1983.
The rapid exhaustion of IPv4 address space available 195.26.56.45 for assignment to Internet service 56.236.256.4895 providers and end user organizations by the early 1990s, prompted the Internet Engineering Task Force (IETF) to explore new technologies to expand the addressing capability in the Internet. The result was a redesign 123.456.789.2 of the Internet Protocol which became eventually known as Internet Protocol Version 6 (IPv6) in 1995.[2][3] IPv6 technology was in various testing stages until the mid-2000s, when commercial production deployment commenced.
IANA's primary IPv4 address pool was exhausted on 3 February 2011, when 250.0.0.0 the last five blocks were allocated to the five RIRs.[7][8] APNIC was the first RIR to exhaust its regional pool on 15 April 2011, except for a small amount of address space reserved for the transition to IPv6, intended to be allocated in a restricted process.[9] Individual ISPs still had unassigned pools of IP addresses, and could recycle addresses no longer needed by their subscribers.
Today, these two versions of the Internet Protocol are in simultaneous 156.25.78.89 use. Among other technical changes, each version defines the format of addresses differently. Because of the historical prevalence of IPv4, the generic term IP address typically still refers to the addresses defined by IPv4. The gap in version sequence 0.0.0.0.0 between IPv4 and IPv6 resulted from the assignment of version 5 to the experimental Internet Stream Protocol in 1979, which however was never referred to as IPv5.
An IP address in IPv4 is 32-bits in size, which limits the address space to 4294967296 (232) IP addresses. Of this number, IPv4 reserves some addresses for special purposes such as private networks (~18 million addresses) or multicast addresses (~270 million addresses).
IPv4 addresses are usually represented in dot-decimal notation, consisting of four decimal numbers, each ranging from 0 to 255, separated by dots, e.g., 172.16.254.1 Each part represents a group of 8 bits (octet) of the address. In some cases of technical writing, IPv4 addresses may be presented in various hexadecimal, octal, or binary representations.
n the early stages of development of the Internet Protocol,[1] network administrators interpreted an IP address in two parts: network number portion and host number portion. The highest order octet (most significant eight bits) in an address was designated as the network number and the remaining bits were called the rest field or host identifier and were used for host numbering within a network.
This early method soon proved inadequate as additional networks developed that were independent of the existing networks already designated by a network number. In 1981, the Internet addressing specification was revised with the introduction of classful network architecture.[4]
Classful network design allowed for a larger number 78.89.45.258 of individual network assignments and fine-grained subnetwork design. The first three bits of the most significant octet of an IP address were defined as the class of the address. Three classes (A, B, and C) were defined for universal unicast addressing. Depending on the 236.45.89.456 class derived, the network identification was based on octet boundary segments of the entire address. Each class used successively additional octets in the network identifier, thus reducing the possible number of hosts in the higher order classes (B and C). The following table gives an overview of this now obsolete system.
IP addresses are assigned to a host either 456.23.56.48 dynamically at the time of booting, or permanently by fixed configuration of the host hardware or software. Persistent configuration is also known as using a static IP address. In contrast, when a computer's IP address is assigned newly each time it restarts, this is known as using a dynamic IP address.
The configuration 0.1236.45.890 of a static IP address depends in detail on the 0.2.3.1 software or hardware installed in the computer. Computers used for the network infrastructure, such as routers and mail servers, are typically configured with static addressing, Static addresses are also sometimes convenient for locating servers inside an enterprise.[citation needed]
Dynamic IP addresses 89.56.123.256 are assigned using 2.2.3.3.0.2.56 methods such as 236.2.56.45 Zeroconf for self-configuration, or by the Dynamic Host Configuration Protocol (DHCP) from a network server. The address assigned with DHCP usually has an expiration period, after which the address may be assigned to another device, or to the originally associated host if it is still powered up. A network administrator may implement a DHCP method so that the same host always receives a specific address.
DHCP is the most frequently used technology for assigning 1236.23.5.1 addresses. It avoids the 230.56.19.68 administrative burden of assigning specific static addresses to each device on a network. It also allows devices to share the limited address space on a network if only some of them are online at a particular time. Typically, dynamic IP configuration is enabled by default in modern desk top operating systems. DHCP is not the only technology used to assign IP addresses dynamically. Dialup and some broadband networks use dynamic address features of the Point-to-Point Protocol.
In the absence or failure of static or stateful (DHCP) address configurations, an operating system may assign an IP address to a network interface using state-less auto-configuration methods, such as Zeroconf.
172.16.254.1 B
192.45.78.248 C
82.45.12.3 A
240.2.1.3 E
249.56.2.3 Not Defined
0.0.0.0 A
255.255.255.255 Not Defined
12.59.126.23 A
123.45.78.1 A
195.26.56.45 C
250.0.0.0 Not Defined
156.25.78.89 B
172.16.254.1 B
0.2.3.1 A
236.2.56.45 D
230.56.19.68 D
s/\/\/.*$//g
s#\/\*[^/*]*\*\/##g
/\/\*/,/\*\//s/.*//g
\ No newline at end of file
sed -f script9.sed testcase/input3 > out
diff -Z out testcase/output3 > result
if [[ -s result ]];
then
echo failed
else
echo passed
fi
rm out result
#include<stdio.h>
int main() {
// this is a dummy function
// testing the sed commands.
int x = 6;
/* logic starts from here*/
x = x + 5;
/* end of c asdasd*/
}
#include<stdio.h>
int main() {
int x = 6;
x = x + 5;
}
BEGIN {
FS=",";
RS="!";
OFS="\t";
printf("Value\tSensorNumber\n");
}
{
print $1,$2
}
awk -f script4.awk testcase/input41 > tmpout1
diff -Z tmpout1 testcase/output41 > result1
if [ -s result1 ]
then
echo "Test case-1 failed"
else
echo "Test case-1 passed"
fi
awk -f script4.awk testcase/input42 > tmpout2
diff tmpout2 testcase/output42 > result2
if [ -s result2 ]
then
echo "Test case-2 failed"
else
echo "Test case-2 passed"
fi
rm tmpout1 tmpout2 result1 result2
1,Y!34,T!34,T!23,H!78,K!789,K!34,T!89,H!567,G!45,T!56,Z!5896,R!45,X
2.3,T!8,Y!7,R!6.7,D!45,S!7.9,A!2,T!7,W!78.9,E!9.1,M!45.1,S!5.2,P!4,A!5,K
Value SensorNumber
1 Y
34 T
34 T
23 H
78 K
789 K
34 T
89 H
567 G
45 T
56 Z
5896 R
45 X
Value SensorNumber
2.3 T
8 Y
7 R
6.7 D
45 S
7.9 A
2 T
7 W
78.9 E
9.1 M
45.1 S
5.2 P
4 A
5 K
#!/bin/bash
cat $1 | awk 'BEGIN {RS="[[:space:]]"} {print $0}' | sed -n 's/\b\([AEIOUaeiou][A-Za-z]*[AEIOUaeiou]\b\)/\1/pI' | sed 's/[[:punct:]]*$//g' | sed 's/^[[:punct:]]*//g' | sort | awk '!seen[$0]++'
./script5.sh testcase/input5 > out
diff testcase/output5 out > result
if [[ -s result ]];
then
echo failed
else
echo passed
fi
rm out result
We are the sum of experiences that we encounter as we go through life.
Day to day struggles and triumphs are experienced by all of the worlds creatures.
As human beings, when we encounter a challenge, we have freedom to choose how to react.
Every decision that we make leads us down a different road. We will never come to exactly the same crossroads.
Every decision that we make has significance. The tiniest choice that we make reverberates throughout the entire universe.
I sleep in the clouds, dream in the sky,
Ill keep dreaming as life passes me by,
I think my dreams keep me sane,
I dream of happiness, a life without pain,
some people say Im stuck in this place,
and Ill never go anywhere,
but in my dreams Ive already been there,
I know some day Ill have to wake up,
but I feel the real world is more like a nightmare,
Im safe in my closed eye wonderland,
this poem goes to all the dreamers that understand,
no matter what they say...
keep your dreams but dont dream your life away,
Electoral systems are the detailed constitutional arrangements and voting systems that convert the vote into a political decision. The first step is to tally the votes, for which various vote counting systems and ballot types are used. Voting systems then determine the result on the basis of the tally. Most systems can be categorized as either proportional or majoritarian
When elections are called, politicians and their supporters attempt to influence policy by competing directly for the votes of constituents in what are called campaigns. Supporters for a campaign can be either formally organized or loosely affiliated, and frequently utilize campaign advertising. It is common for political scientists to attempt to predict elections via Political Forecasting methods
Ransomware is a type of malware that prevents or limits users aMMA from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid. More modern ransomware families, collectively categorized as crypto-ransomware, encrypt certain file types on infected systems and forces users to pay the ransom through certain online payment methods to get a decrypt key.
Ransom prices vary depending on the ransomware variant and the price or exchange rates of digital currencies. Thanks to the perceived anonymity offered by cryptocurrencies, ransomware operators commonly specify ransom payments in bitcoins. Recent ransomware variants ave also listed alternative payment options such as iTunes and Amazon gift cards. It should be noted, however, that paying the ransom does not guarantee that users will get the decryption key or unlock tool required to regain access to the infected system or hostaged files.
Users may encounter this threat through a variety of means. Ransomware can be downloaded onto systems when unwitting users visit malicious or compromised websites. It can also arrive as a payload either dropped or downloaded by other malware. Some ransomware are known to be delivered as attachments from spammed email, downloaded from malicious pages through malvertisements, or dropped by exploit kits onto vulnerable systems.
Once executed in the system, ransomware can either lock the computer screen, or, in the case of crypto-ransomware, encrypt predetermined files. In the first scenario, a full-screen image or notification is displayed on the infected system's screen, which prevents victims from using their system. This also shows the instructions on how users can pay for the ransom. The second type of ransomware prevents access to files to potentially critical or valuable files like documents and spreadsheets.
Ransomware is considered scareware as it forces users to pay a fee (or ransom) by scaring or intimidati them. In this sense, it is similar to FAKEAV malware, but instead of capturing the infected system or encrypting files, FAKEAV shows fake antimalware scanning results to coax users into purchasing bogus antimalware software.
But this massive wave wasn’t the only one. A few weeks later, a ransomware strain resembling Petya started spreading around Europe, affecting companies, Ukrainian institutions and banks, and even the even the radiation monitoring system at Chernobyl.
Ransomware has been a growing trend for the past two years, and this is just a culmination, a grand reveal to the wider world of just how big of a threat it is. But we’ve been writing about this for a while now.
The entity that creates the securities for sale is known as the issuer, and those that buy them are, of course, investors. Generally, securities represent an investment and a means by which municipalities, companies and other commercial enterprises can raise new capital. Companies can generate a lot of money when they go public, selling stock in an initial public offering, for example. City, state or county governments can raise funds for a particular project by floating a municipal bond issue. Depending on an institutions market demand or pricing structure, raising capital through securities can be a preferred alternative to financing through a bank loan.
Bearer securities are those that are negotiable and entitle the shareholder to the rights under the security. They are transferred from investor to investor, in certain cases by endorsement and delivery. In terms of proprietary nature, pre-electronic bearer securities were always divided, meaning each security constituted a separate asset, legally distinct from others in the ame issue. Depending on market practice, divided security assets can be fungible or less commonly non-fungible, meaning that upon lending, the borrower can return assets equivalent either to the original asset or to a specific identical asset at the end of the loan. In some cases, bearer ecuritie may be used to aid tax evasion, and thus can sometimes be viewed negatively by issuers, shareholders and fiscal regulatory bodies alike. They are therefore rare in the United States.
alike
also
alternative
ame
aMMA
antimalware
anywhere
are
arrive
ave
ecuritie
entire
entitle
Europe
example
exchange
eye
image
influence
intimidati
into
issue
Ive
Once
one
online
onto
universe
utilize
#!/bin/bash
cat $1 | tr '[:upper:]' '[:lower:]' | awk 'BEGIN {RS="[[:space:]]"} {print $0}' | sed 's/[[:punct:]]*$//g' | sed 's/^[[:punct:]]*//g' | sed '/^$/d'| sort | awk '!seen[$0]++'
./script6.sh testcase/input6 > out
diff testcase/output6 out > result
if [[ -s result ]];
then
echo failed
else
echo passed
fi
rm out result
We are the sum of experiences that we encounter as we go through life.
Day to day struggles and triumphs are experienced by all of the worlds creatures.
As human beings, when we encounter a challenge, we have freedom to choose how to react.
Every decision that we make leads us down a different road. We will never come to exactly the same crossroads.
Every decision that we make has significance. The tiniest choice that we make reverberates throughout the entire universe.
I sleep in the clouds, dream in the sky,
Ill keep dreaming as life passes me by,
I think my dreams keep me sane,
I dream of happiness, a life without pain,
some people say Im stuck in this place,
and Ill never go anywhere,
but in my dreams Ive already been there,
I know some day Ill have to wake up,
but I feel the real world is more like a nightmare,
Im safe in my closed eye wonderland,
this poem goes to all the dreamers that understand,
no matter what they say...
keep your dreams but dont dream your life away,
Electoral systems are the detailed constitutional arrangements and voting systems that convert the vote into a political decision. The first step is to tally the votes, for which various vote counting systems and ballot types are used. Voting systems then determine the result on the basis of the tally. Most systems can be categorized as either proportional or majoritarian
When elections are called, politicians and their supporters attempt to influence policy by competing directly for the votes of constituents in what are called campaigns. Supporters for a campaign can be either formally organized or loosely affiliated, and frequently utilize campaign advertising. It is common for political scientists to attempt to predict elections via Political Forecasting methods
Ransomware is a type of malware that prevents or limits users aMMA from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid. More modern ransomware families, collectively categorized as crypto-ransomware, encrypt certain file types on infected systems and forces users to pay the ransom through certain online payment methods to get a decrypt key.
Ransom prices vary depending on the ransomware variant and the price or exchange rates of digital currencies. Thanks to the perceived anonymity offered by cryptocurrencies, ransomware operators commonly specify ransom payments in bitcoins. Recent ransomware variants ave also listed alternative payment options such as iTunes and Amazon gift cards. It should be noted, however, that paying the ransom does not guarantee that users will get the decryption key or unlock tool required to regain access to the infected system or hostaged files.
Users may encounter this threat through a variety of means. Ransomware can be downloaded onto systems when unwitting users visit malicious or compromised websites. It can also arrive as a payload either dropped or downloaded by other malware. Some ransomware are known to be delivered as attachments from spammed email, downloaded from malicious pages through malvertisements, or dropped by exploit kits onto vulnerable systems.
Once executed in the system, ransomware can either lock the computer screen, or, in the case of crypto-ransomware, encrypt predetermined files. In the first scenario, a full-screen image or notification is displayed on the infected system's screen, which prevents victims from using their system. This also shows the instructions on how users can pay for the ransom. The second type of ransomware prevents access to files to potentially critical or valuable files like documents and spreadsheets.
Ransomware is considered scareware as it forces users to pay a fee or ransom by scaring or intimidati them. In this sense, it is similar to FAKEAV malware, but instead of capturing the infected system or encrypting files, FAKEAV shows fake antimalware scanning results to coax users into purchasing bogus antimalware software.
But this massive wave wasn’t the only one. A few weeks later, a ransomware strain resembling Petya started spreading around Europe, affecting companies, Ukrainian institutions and banks, and even the even the radiation monitoring system at Chernobyl.
Ransomware has been a growing trend for the past two years, and this is just a culmination, a grand reveal to the wider world of just how big of a threat it is. But we’ve been writing about this for a while now.
The entity that creates the securities for sale is known as the issuer, and those that buy them are, of course, investors. Generally, securities represent an investment and a means by which municipalities, companies and other commercial enterprises can raise new capital. Companies can generate a lot of money when they go public, selling stock in an initial public offering, for example. City, state or county governments can raise funds for a particular project by floating a municipal bond issue. Depending on an institutions market demand or pricing structure, raising capital through securities can be a preferred alternative to financing through a bank loan.
Bearer securities are those that are negotiable and entitle the shareholder to the rights under the security. They are transferred from investor to investor, in certain cases by endorsement and delivery. In terms of proprietary nature, pre-electronic bearer securities were always divided, meaning each security constituted a separate asset, legally distinct from others in the ame issue. Depending on market practice, divided security assets can be fungible or less commonly non-fungible, meaning that upon lending, the borrower can return assets equivalent either to the original asset or to a specific identical asset at the end of the loan. In some cases, bearer ecuritie may be used to aid tax evasion, and thus can sometimes be viewed negatively by issuers, shareholders and fiscal regulatory bodies alike. They are therefore rare in the United States.
a
about
access
accessing
advertising
affecting
affiliated
aid
alike
all
already
also
alternative
always
amazon
ame
amma
an
and
anonymity
antimalware
anywhere
are
around
arrangements
arrive
as
asset
assets
at
attachments
attempt
ave
away
ballot
bank
banks
basis
be
bearer
been
beings
big
bitcoins
bodies
bogus
bond
borrower
but
buy
by
called
campaign
campaigns
can
capital
capturing
cards
case
cases
categorized
certain
challenge
chernobyl
choice
choose
city
closed
clouds
coax
collectively
come
commercial
common
commonly
companies
competing
compromised
computer
considered
constituents
constituted
constitutional
convert
counting
county
course
creates
creatures
critical
crossroads
cryptocurrencies
cryptoransomware
culmination
currencies
day
decision
decrypt
decryption
delivered
delivery
demand
depending
detailed
determine
different
digital
directly
displayed
distinct
divided
documents
does
dont
down
downloaded
dream
dreamers
dreaming
dreams
dropped
each
ecuritie
either
elections
electoral
email
encounter
encrypt
encrypting
end
endorsement
enterprises
entire
entitle
entity
equivalent
europe
evasion
even
every
exactly
example
exchange
executed
experienced
experiences
exploit
eye
fake
fakeav
families
fee
feel
few
file
files
financing
first
fiscal
floating
for
forces
forecasting
formally
freedom
frequently
from
fullscreen
funds
fungible
generally
generate
get
gift
go
goes
governments
grand
growing
guarantee
happiness
has
have
hostaged
how
however
human
i
identical
ill
im
image
in
infected
influence
initial
instead
institutions
instructions
intimidati
into
investment
investor
investors
is
issue
issuer
issuers
it
itunes
ive
just
keep
key
kits
know
known
later
leads
legally
lending
less
life
like
limits
listed
loan
lock
locking
loosely
lot
majoritarian
make
malicious
malvertisements
malware
market
massive
matter
may
me
meaning
means
methods
modern
money
monitoring
more
most
municipal
municipalities
my
nature
negatively
negotiable
never
new
nightmare
no
nonfungible
not
noted
notification
now
of
offered
offering
on
once
one
online
only
onto
operators
options
or
organized
original
other
others
pages
paid
pain
particular
passes
past
pay
paying
payload
payment
payments
people
perceived
petya
place
poem
policy
political
politicians
potentially
practice
predetermined
predict
preelectronic
preferred
prevents
price
prices
pricing
project
proportional
proprietary
public
purchasing
radiation
raise
raising
ransom
ransomware
rare
rates
react
real
recent
regain
regulatory
represent
required
resembling
result
results
return
reveal
reverberates
rights
road
safe
sale
same
sane
say
scanning
scareware
scaring
scenario
scientists
screen
second
securities
security
selling
sense
separate
shareholder
shareholders
should
shows
significance
similar
sky
sleep
software
some
sometimes
spammed
specific
specify
spreading
spreadsheets
started
state
states
step
stock
strain
structure
struggles
stuck
such
sum
supporters
system
systems
system's
tally
tax
terms
thanks
that
the
their
them
then
there
therefore
they
think
this
those
threat
through
throughout
thus
tiniest
to
tool
transferred
trend
triumphs
two
type
types
ukrainian
under
understand
united
universe
unless
unlock
unwitting
up
upon
us
used
users
users'
using
utilize
valuable
variant
variants
variety
various
vary
via
victims
viewed
visit
vote
votes
voting
vulnerable
wake
wasn’t
wave
we
websites
weeks
were
we’ve
what
when
which
while
wider
will
without
wonderland
world
worlds
writing
years
your
Mostly, everyone has contributed to all questions.
The following are the contributions -
q.1 - 160050005,160050008,160050028
q.2 - 160050005,160050008,160050028
q.3 - 160050005,160050008,160050028
q.4 - 160050005,160050008,160050028
q.5 - 160050005,160050008,160050028
q.6 - 160050005,160050008,160050028
The following references have been used -
1)
2)Slides uploaded by sir
\ No newline at end of file
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment