The use of credit derivatives by banks was appealing to them for the following reasons:I. It was a way to remove and decrease their exposure to credit risk.II. It was an opaque, relatively unregulated market.III. The spreads that they earned were high (return on a CDS minus return on a T-Bill).IV. All of their net positions were balance sheet items (i.e. all transactions were on their balance sheet).
Proponents argue that HFT aids our markets by providing incr…
Proponents argue that HFT aids our markets by providing increased ____________________. What is one counter-argument to this claim? If we desire to thwart HFT, what is one legislative move that we can do to get them out of the market (i.e. not just banning them outright). Describe what this would do.
Since late 2008, with T-bill rates near zero, the Fed decide…
Since late 2008, with T-bill rates near zero, the Fed decided to try _____________________________. Describe this process in general in a few short sentences. What does it entail and how is it different from the typical levers which the Fed pulls on:
An 18 year T-Bond can be stripped into how many separate sec…
An 18 year T-Bond can be stripped into how many separate securities?
In theory, a decrease in reserve requirements will lead to a…
In theory, a decrease in reserve requirements will lead to an:
The duration of a bond increases when the coupon rate goes _…
The duration of a bond increases when the coupon rate goes ______, and the maturity goes _____.
The Fed changes reserve requirements from 10% to 9%, thereby…
The Fed changes reserve requirements from 10% to 9%, thereby creating $900 million in excess reserves. The total change in deposits (with no drains) would be
(30 pts) Consider the overall linear, time-invariant (LTI…
(30 pts) Consider the overall linear, time-invariant (LTI) system shown below with discrete-time (DT) input sequence and output sequence . The overall system has impulse response and transfer function . In the block diagram,
“How much do I value the rewards I will receive for completi…
“How much do I value the rewards I will receive for completing this task?” This question addresses:
Are the following statements True/False? Explain your reason…
Are the following statements True/False? Explain your reasoning in no more than two sentences8.1. Increasing the entropy of a cryptographic key reduces its predictability and improves its resistance to brute-force attacks. (2 points) 8.2. Because modeling is an abstraction of the system that will surely miss a lot of details, when we do modeling, we should model the system to as much detail as possible in all perspectives, such that the model is more realistic and a better approximation to the real system. (2 points) 8.3. Clustering is a supervised learning method. (2 points) 8.4. The difference between supervised learning and unsupervised learning is that supervised learning aims to identify patterns within data, while unsupervised learning focuses on predicting outcomes based on labeled examples. (2 points) 8.5. A basic backdoor attack requires modifying all training data samples with the same unique trigger to embed malicious behavior into the model. (2 points) 8.6. A Backdoor Attack requires the attacker to have full access to the model parameters during training. (2 points) 8.7. Access Control Lists are more suitable than Capabilities Lists for distributed systems because permissions are managed centrally. (2 points) 8.8. In a system using Access Control Lists, permissions are attached to users as tokens, making it suitable for distributed environments. (2 points)