Question

Question 1 (26 marks) (a) Explain purchased liquidity approach in liquidity management and point out 2...

Question 1
(a) Explain purchased liquidity approach in liquidity management and point out 2 advantages of that

approach. (b) Explain stored liquidity approach in liquidity management and point out 2 advantages of that

approach. (c) An FI has 2 kinds of assets: 60% in 1 month T-bill and 40% in 1 month consumer loan. In a month, the T-bill will yield $100, but now it worths only $97. The consumer loan will yield $88 in a month, but now it is worth $76. Calculate the 1 month liquidity index.

  1. (d) Refer to (c), if the market conditions change suddenly and the T-bill now worths $98, while the

    consumer loan worths $72. Calculate the new 1 month liquidity index.

  2. (e) Based on the results from (c) and (d), interpret the liquidity risk faced by the FI before and after the

Homework Answers

Answer #1

(a) Purchase Liquidity Approach

•Liquidity can be purchased in financial markets, e.g. borrowed funds from other banks and other institutional investors.

–Federal funds market in the U.S. and the repurchase agreement market

Benefit:- preserving asset side of balance sheet.

Downsides: –Borrowed funds are likely to be at higher rates than interest paid on deposits, i.e. funds to be borrowed at market rates.

–Deposits are insured but borrowed funds not necessarily protected

–Funding risk is high, especially during credit crisis period.

(b) Stored Liquidity Approach

•Maintain sufficient liquid assets on the balance sheet.

•Liquidate assets when needed

–If there is no reserve requirement, banks tend to hold excess reserve assets.

Downside

–opportunity cost of holding excessive liquid assets

–Decreases size of balance sheet by liquidating assets to meet liquidity needs

–Low returns.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Question 1 (1 point) Question 1 Unsaved The contingency management approach is a treatment approach designed...
Question 1 (1 point) Question 1 Unsaved The contingency management approach is a treatment approach designed to modify the cognitive processes of individuals. Question 1 options: a) True b) False Question 2 (1 point) Question 2 Unsaved When individuals are ready to make change regarding their addiction, they are in which of the following stages: Question 2 options: a) contemplation b) preparation c) action d) maintenance Question 3 (1 point) Question 3 Unsaved Successful treatment programs focus on biopsychosocial functioning...
Question 1. (Total: 25 marks) You want to buy a car valued at $48,000. You wi...
Question 1. (Total: 25 marks) You want to buy a car valued at $48,000. You wi ll make an upfront down -payment of $5,000 on the car , and borrow the rest of the money from your bank. Your bank will give you a 5- year loan at 2.5% APR compounded semi -annually . You plan to make biweek ly payments (i.e., one payment every two weeks) on the loan . The bank requires that you make the first payment...
1.         When banks encounter liquidity issues experiencing deposit withdrawal or even bank run, which alternative is...
1.         When banks encounter liquidity issues experiencing deposit withdrawal or even bank run, which alternative is more appropriate to deal with the situation? ____ A)        Increasing overnight funds borrowed B)        Contacting an investment banker to find new corporate deposits C)        Issuance of a negotiable certificate of deposit D)        Selling the bank’s holdings of T-bills 2.         Focus on exploiting the tendency of the equities of companies in a time of change to drop in price. Such an approach belongs to which...
Question 1 of 15 Which of the following is not a recommended starting point to enter...
Question 1 of 15 Which of the following is not a recommended starting point to enter sales of products/services? A. Quick Create > Invoice B. Register > New transaction C. Quick Create > Sales Receipt D. Customer detail page > New transaction E. Transactions > Sales > New transaction Question 2 of 15 Which of the following statements accurately describes bank rules? A. Bank rules are imported from the Bank's website into the For Review tab in the Banking Center...
1. What is an ISP (Integrated Service Provider) for supply chains? (1 point) A. A consultant...
1. What is an ISP (Integrated Service Provider) for supply chains? (1 point) A. A consultant agency which integrates the supply chain for companies B. A 2 PL or a 3PL, but not a 4PL C. A company supplying transportation and warehousing services D. A logistics service company specialized in suppling VAS (value added services) 2. What characterizes a 4 PL? (1 point) A. They are non-asset based and provides integrated services primarily supplied by asset based providers, for example...
1.Establishing the virtual Management: As known, managing virtual staff requires a different method or approach than...
1.Establishing the virtual Management: As known, managing virtual staff requires a different method or approach than managing local staff. Due to that reason, Golden Scent has developed a strategic plan to successfully manage its virtual staff in the USA. Identify the suitable manager. to make sure our work will proceed as we planned, Golden Scent willrecruit a virtual manager with the essential skills and knowledge required to manage virtual employees. Find the skilled people to work with. Since not everyone...
Case 13 ✍ It Was Really So Simple Background Information Brenda Galway leaned back in her...
Case 13 ✍ It Was Really So Simple Background Information Brenda Galway leaned back in her chair, sighed heavily, and slowly rubbed her eyes in big circular motions. “I don’t need all this aggravation,” she thought to herself. She had just finished reviewing the report she had requested from her new employee, Bill Stanley. The entire report was incorrect and would have to be redone. Brenda supervised Unit B of the Audit Department. The Unit B team had earned the...
SECTION A: READ THE PASSAGE AND ANSWER QUESTIONS 1-3 Emma, a monthly salaried worker, received 1,300...
SECTION A: READ THE PASSAGE AND ANSWER QUESTIONS 1-3 Emma, a monthly salaried worker, received 1,300 cedis as her net salary; she heard that this year’s inflation is at 18%. This situation caused prices to soar so high that she complained about everything she buys. In the previous year she was able to buy herself, dresses, a basket of foodstuffs, a small bag of oranges, a dozen of drinks and her transportation. However, this year, she couldn’t afford the full...
Question 1) Which of the following are considered valid criticisms of the legalistic model of crime...
Question 1) Which of the following are considered valid criticisms of the legalistic model of crime and criminology? a. Law in action departs substantially from the ideal behavior of the law. b. Focusing only on legally criminalized behavior makes it impossible to consider the impact of gender, race, age and ethnicity. c. Legalistic definitions ignore acts that cause great harm. d. The legalistic model suggests that these are absolute standards for judging right and wrong. e. All of the above....
What strategy would you recommend for Dove (1) in responding (or in not responding) to consumers...
What strategy would you recommend for Dove (1) in responding (or in not responding) to consumers and (2) going forward (or not going forward) with the campaign? If they were to go forward with this campaign, should Dove revise its Real Beauty message and if, so, how? The Dove Real Beauty Campaign In 2004, with sales at approximately $2.5 billion, Dove saw an opportunity to tap into women’s self-perceptions of beauty to address female insecurities while building a connection between...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT
Active Questions
  • Question One: Basic security concepts and terminology                         (2 marks) Computer security is the protection of...
    asked 2 minutes ago
  • In program P83.cpp, make the above changes, save the program as ex83.cpp, compile and run the...
    asked 10 minutes ago
  • the determination of aspirin in commercial preparations experment explain why the FeCl3-KCl-HCl solution was ased as...
    asked 22 minutes ago
  • Describe important events and influences in the life of Wolfgang Amadeus Mozart. What styles, genres, and...
    asked 25 minutes ago
  • 3.12 Grade Statistics Write a python module "school.py" that prints school information (first 3 lines of...
    asked 26 minutes ago
  • Using python, please explain. The factorial of an integer N is the product of the integers...
    asked 30 minutes ago
  • alamoto Co. manufactures a single product that goes through two processes — mixing and cooking. The...
    asked 35 minutes ago
  • QUESTION 21 _______ is the ease of use with which network users can access the network...
    asked 40 minutes ago
  • Configure IP static routing using 6 pc's, 3 routers & 3 switches by using CISCO PACKET...
    asked 52 minutes ago
  • Write a C++ program that calculates the series and parallel resistance for a group of resister...
    asked 1 hour ago
  • 1. A host computer is assigned the IP address 192.168.12.8 and a subnet mask of 255.255.255.192....
    asked 1 hour ago
  • Employees checking their cell phones and whispering to each other during a meeting are causing which...
    asked 1 hour ago