Free Essay

Computer Fundamentals

In: Computers and Technology

Submitted By jatp2v82
Words 1885
Pages 8
Details of Assessment | Term and Year | | Time allowed | | Assessment Type | Written | Assessment Weighting | 40% | Due Date | Week 5 | Room | |

Details of Subject | Qualification | ICA20111Cert II in IT, Digital Media & Technology | Subject Name | Computer Fundamentals | Details of Unit(s) of competency | Unit Code | I ICAICT201A | Unit Title | Use Computer Operating Systems and Hardware | Unit Code | ICASAS206A | Unit Title | Detect and Protect from SPAM and Destructive Software |

Details of Student | Student Name | | Student ID | | College | |

Student Declaration: I declare that the work submitted is my own, and has not been copied or plagiarised from any person or source. | Signature: ___________________________ Date: _______/________/_______________ |

Details of Assessor | Assessor’s Name | | Assessor’s Signature | | Date | | Assessment Outcome | Results | Satisfactory Not Satisfactory | Marks/Grade | | Reasonable Adjustments (if applicable) | |

FEEDBACK TO STUDENTProgressive feedback to students, identifying gaps in competency and comments on positive improvements: | ________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ | Student Declaration: I declare that I have been assessed in this unit, and I have been advised of my result. I also am aware of my appeal rights and reassessment procedure. Signature: ____________________________ Date: ____/_____/_____ | Assessor Declaration: I declare that I have conducted a fair, valid, reliable and flexible assessment with this student, and I have provided appropriate feedback Signature: ____________________________ Date: ____/_____/_____ | Purpose of the Assessment | The purpose of this assessment is to assess students in following element and performance criteria’s: * Identify operating system and hardware components * Install and configure operating system and application software with hardware components * Optimise operating system and hardware components * Detect and remove destructive software * Identify and take action to stop spam | Assessment/evidence gathering conditions | These questions involve knowledge, attitude, skills as well as employability skills. Conditions: This is a cumulative score based on each assessment task and it’s weighting. Student must obtain a minimum of 50% in each assessment task to be deemed competent. | Resources required for this Assessment | * Computer Fundamentals * Any additional material will be provided by Trainer | Unit of Competency: ICAICT201A Use Computer Operating Systems and Hardware | Skills assessment | Knowledge assessment | | Question and Answer | Workbook | Role Play | Observation | Written | Element 1: Identify operating system and hardware components | | 1.1 Determine ICT organisational requirements and specifications | | | | | | 1.2 Identify and select operating system | | | | | | 1.3 Identify appropriate external hardware components | | | | | | 1.4 Identify internal hardware components | | | | | | Element 2: Gather Data | | 2.1 Install and configure operating system to meet organisational requirements | | | | | | 2.2 Identify the functions associated with the operating system and associated boot process | | | | | | 2.3 Configure power-management settings to minimise power consumption as an environmentally sustainable measure | | | | | | 2.4 Use both the graphical user interface and the command line interface to perform basic tasks | | | | | | 2.5 Install or upgrade application software onto the operating system and hardware configuration | | | | | | 2.6 Determine the relationship between an application program, the operating system and hardware | | | | | | 2.7 Identify general differences between the different computer platforms and their respective operating systems | | | | | | Element 3: Optimise operating system and hardware components | | 3.1 Analyse group and individual responses to clearly define business priorities | | | | | | 3.1 Analyse group and individual responses to clearly define business priorities | | | | | | 3.1 Analyse group and individual responses to clearly define business priorities | | | | | | 3.2 Document data analysis for review according to organisational standards | | | | | |

Unit of Competency: ICASAS206A Detect and protect from spam and destructive software | Practical skills assessment* | Knowledge assessment* | | Project | Workbook | Role Play | Observation | Written | Element 1: Detect and remove destructive software | | 1.1 Identify common types of destructive software | | | | | | 1.2 Select and install virus protection compatible with the operating system in use | | | | | | 1.3 Investigate other advanced systems of protection for further options | | | | | | 1.4 Install software updates on a regular basis | | | | | | 1.5 Configure software security settings to prevent destructive software from infecting computer | | | | | | 1.6 Run or schedule to run virus-protection software on a regular basis | | | | | | 1.7 Report detected destructive software to appropriate person and remove the destructive software | | | | | | Element 2: Identify and take action to stop spam | | 2.1 Identify common types of spam | | | | | | 2.2 Take appropriate action in regard to spam | | | | | | 2.3 Configure and use a spam filter | | | | | | 2.4 Report spam to appropriate organisation | | | | | | Instructions for Students | Please read the following instructions carefully * This assessment is to be completed according to the instructions given by your assessor. * Students are allowed to take this assessment home. * Feedback on each task will be provided to enable you to determine how your work could be improved. You will be provided with feedback on your work within 2 weeks of the assessment due date. * Should you not answer the questions correctly, you will be given feedback on the results and your gaps in knowledge. You will be given another opportunity to demonstrate your knowledge and skills to be deemed competent for this unit of competency. * If you are not sure about any aspect of this assessment, please ask for clarification from your assessor. * Please refer to the College re-assessment and re-sit policy for more information. |

Assessment/evidence gathering conditions | TOTAL SCORE: _____ out of ______=______%OVERALL RESULT: Satisfactory (score of 50% or higher) Not Yet Satisfactory (score of 50% or lower) |

-------------------------------------------------
Assessment 1

Part A: Question and Answers (16%)

1. List and explain three areas that would require investigation before you were able to choose an operating system to be utilised within your workplace. (2 Marks)

a. Compatibility with current hardware: it is necessary to check if the new software we want to use is compatible with the hardware we already have. b. Why is it necessary to install a new OS? -> There should be a good reason to change the current OS for a new one, since that change may imply economic and training sacrifices to the company. c. Cost: the price of the chosen OS has to be considered to make sure it is affordable for the company.

2. List at least two external/two Internal hardware components in the computers at your workplace and explain their functions. (2 Marks)

d. External i. Monitor: to visualize the use of the computer ii. Mouse: to move around the UI (user interface) e. Internal iii. RAM memory: data storage. Direct and quick iv. CPU: Unit that performs all main processes

3. Briefly explain the steps that a standard windows PC goes through as it boots up. (2 Marks)

- PC Power On -> CPU loads BIOS ->BIOS verify Hardware ->Partition Loader ->OS Loading

4. When adding new hardware such as a digital camera, what is the reason for the loading of valid, up to date drivers? What could be the ramifications If a valid, up to date driver is not available? (2 Marks)

- Necessary for full compatibility with the Operating System. If a up-to-date driver is not provided, the device might not be accessible from the OS, so the user can not interact with it.

5. List three (3) type of destructive software and explain the damage that they can cause to a computer system. (3 Marks)

f. Malware -> malicious software used to disrupt computer operations

g. Spyware -> malicious software used to gather sensitive information about a person or organization h. Adware -> malicious software that adds unwanted advertisements in an application

6. Explain how the use of the following maintenance tools can assist you in protecting your PC from threats. (3 Marks)

* Firewall ->It helps to prevent your computer from intruders that try to connect to certain ports or access sensitive data. It can be configured to avoid execution of some applications. * Internet Security options ->To customize security levels in the browser. Setup proxy, restrict access to certain websites or configure use of cookies, javascript, ect.

7. List and explain three common types of SPAM? (2 Marks)
Adult Spam: emails with information about adult content sites
Commercial Spam: emails with information about products or items with the purpose to sell
Ideological Spam: emails with information about religion, political parties, ect. This kind of spam pretend to convince the recipient to follow certain religion, vote some political party or behave in a certain way.
Part B: Practical Exercise/Evidence
In the presence of your assessor complete the following exercises on your personal computer (record all steps undertaken and add to captured screen dumps as evidence)
Exercise 1 (6 Marks) a. Change the desktop wallpaper, screen saver and picture resolution.

b. Install an application software program (such as Microsoft Word)onto the operating system of your PC.

c. Add a shortcut to the desktop to allow quick access to the softwareprogram.

d. Use the desktop shortcut to open the newly installed program.

e. Uninstall the software application and if necessary, remove theprogram shortcut from the desktop.

Exercise 2 (5 Marks)

a. Install a new hardware device such as a digital camera to your PC including drivers and specified software. * Device selected: Sony Xperia Z

b. Perform any configuration changes that may be required to the software.
Not needed.

c. Demonstrate to your assessor the usage and functionality of the hardware device and software. * Synchronizing the device with the computer:

d. Add a shortcut to your desktop to allow simple access to the software. * After installing the software, a shortcut is automatically created in the desktop. e. If necessary, remove hardware and uninstall software from your operating system.

Exercise 3 (4 Marks) a. On your computer operating system, perform the following functions utilising operating system commands. * Run the disk cleanup function

* Access Windows Security Centre and record firewall, Automatic update and Virus protection status.

b. Run the following commands using the command line commands: * Check Disk
Start -> Run -> cmd -> chkdsk E:

* Disk Defrag a. Start -> Run -> cmd -> defrag.exe c:

Exercise 4 (4 Marks) a. Locate and install compatible anti-virus software

b. Run a virus scan and report any located viruses as per software functions

c. Update anti-virus software as per software functions

d. Set auto update function to check and update on a daily basis

Exercise 5 (5 Marks) a. Log onto your network Email system and locate SPAM filter functions

b. Configure SPAM filters to block known senders of SPAM.

c. Create a report to send to The Australian Communications and Media Authorityin line with the SPAM act 2003.

Email spam report. Forward the message to the Spam Intelligence Database at eport@submit.spam.acma.gov.au

Dear Australian Comunications and Media Authority, I am writing to you to report an spam email that recently I received and I would like you to invastigate it.
Find attached a snipet of the content of that email for your help.
MIME-Version: 1.0
From: Dropbox <no-reply@dropbox.com>
To: 201329420@studentmail.academies.edu.au
Subject: =?utf-8?q?Complete_your_Dropbox_setup!?=
Date: Thu, 16 Jan 2014 06:13:40 +0000
Message-Id: <20140116061340.4B0D6206E1BE3@snt-ra10-20c.sjc.dropbox.com>

Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: quoted-printable

Hi Jose,

Your account is almost ready! To get the most out of Dropbox, be sure to in= stall Dropbox on your computer and phone.

Install Dropbox: https://www.dropbox.com/l/MkjJmtUe4cvCoctyeaLu2b/downloading?text=3D1 Any file you save to your Dropbox will automatically save to all your compu= ters, phones and even the Dropbox website. =

Thank you in advance.
Jose

Similar Documents

Premium Essay

Computer Fundamentals

...Chris Wilson M14 – Computer Fundamentals Paul Ashby Computer Evaluation (AS1) 29th January 2010 Contents Briefing Page 3 Required Software Packages Page 3, 4 & 5 Computer Hardware Page 5 Computer Software Page 5 Design of Computer Page 6 Breakdown of Hardware Page 7 Short Brief on Hardware Page 7 Software Installed on Computer Page 7 Software Breakdown Page 7 Hardware Test Sheet with Brief Page 8 Software Test Sheet with Brief Page 9 User Support Page 10 Security Setup ...

Words: 2784 - Pages: 12

Premium Essay

Computer Hardware Fundamentals

...in regards to disposing of old computers, was making sure all of your personal data was wiped, not about recycling. I think one of the most important things you can do when getting ready to dispose of a computer is to make sure you properly delete all personal information that may be left over on your hard drive. People have computers that “die” or are not able to work anymore, so they might think just throwing them away is safe. But someone who has even a little knowledge about computers can easily open up your laptop or desktop and take out your hard drive. Hooked up to another computer, it would be very easy for them to scan it for personal information. t’s odd to think about replacing a motherboard, because I have actually considered this on personal computers I have owned in the past. But when I talk with some friends who are not as comfortable with changing out hardware, they often times feel so lost because they are not really sure what to look for when purchasing components, such as a motherboard. I think the first thing you need to decide on when shopping for a motherboard, is what is it going to be used for? Are you using your computer for just checking emails and Facebook? Or will you be doing some heavy processing, such as gaming or video editing? I would assume that someone who is actually shopping for a motherboard is doing so because they want to upgrade their computer. So it’s probably a safe bet to...

Words: 3676 - Pages: 15

Free Essay

Computer Fundamentals

...Activity 1 I. Data and Process Modeling A. Business Activities/Current Operations Supply Checking The business process also have its supply checking where they check the status of their supply checking where they check the status of their supply. If the supply is still enough for future use, they’ll just continue other business processes and if the supply will not be available, they need to call their supplier for the needed supply. Reservation Process The business also have an on-call reservations, where they get order from calls for a certain date. If the stocks is available on the date it will be needed, the reservation will be accepted right away but, if the stocks will not be enough, they’ll need to perform plans for their supplies first, to ensure that they’ll be able to give what the customer needs. But, if the time is not manageable, they’ll need to decline the order. This is for the customer to not get half-worked products. Order Process The current operation manages the orders occurred in everyday business transactions. They get the order of the customer and check if the order is available on the products. If it is available they give the order and get the payment. If not then, they still have time to prepare the product for the order. B. Context Diagram Entity Relationship Diagram C. Diagram 0 – DFD (Data Flow Diagram) Activity 2 System Requirements Checklist Input * Supplies must be entered manually in the system...

Words: 481 - Pages: 2

Premium Essay

Cisco Stock Analysis

...Stock Analysis – Cisco Systems Timothy L. Miller FI560 Securities Analysis Miriam Benard December 11, 2011 Abstract The purpose of this paper is to make a buy or sell recommendation for Cisco Systems stock based on technical and fundamental analysis. The technical analysis consists of analysis of the following; * Return on Equity (ROE) * The company’s projected future growth of earnings * Analysis of its required rate of return using the CAPM measurement * The company’s intrinsic value using the discount valuation technique. The fundamental analysis consists of describing the competitive forces in the industry including the company’s relative advantages and disadvantages to its competitors and a discussion on ROE as the basis for growth. Based on the technical analysis, it appears that Cisco’s stock is under priced. Its intrinsic value is $23.55 in 2011 (see calculation in CAPM section) which is quite a bit higher than its current price. Background Cisco designs, manufactures, and sells Internet Protocol (IP)-based networking and other products related to the communications and information technology (IT) industry and provides services associated with these products and their use. They provide a broad line of products for transporting data, voice, and video within buildings, across campuses, and around the world. These products are designed to transform how people connect, communicate, and collaborate. Cisco conducts its business globally...

Words: 1247 - Pages: 5

Premium Essay

Wongxiaoming

...-1? “ The Aim of the Course To develop and apply technologies for valuing firms and for strategic planning to generate value within the firm. • • Features of the approach: A disciplined approach to valuation: minimizes ad hockery – Built on theoretical and empirical findings from scientific research I ‘_ Marries fundamental analysis and financial statement analysis – Exploits accounting as a system for measuring value added – Exposes good (and “bad”) accounting from a valuation perspective L Financial Statement Analysis and Security Valuation • • • Integrates financial statement analysis with corporate finance Focuses on technologies that can be used in practice – Based on real world examples Adopts activist point of view to investing – The market may be inefficient 0-1 What Will You Learn from the Course Part I Financial statements and valuation Ch. 1-7 • How intrinsic values are calculated • What determines a firm’s value • How businesses are analyzed to assess the value they create • How financial analysis is developed for strategy and planning • The role of financial statements in determining firms’ values • How to pull apart the financial statements to get at the relevant information • How ratio analysis is employed in valuation • How growth is analyzed and valued • How to calculate the P/E and P/B ratio and what they should be • The value of operations • How to make forecasts and develop valuations • How to assess the quality of the...

Words: 2057 - Pages: 9

Free Essay

Ford: Ressurecting an Iconic Company

... Ford decided to reorganize its production in a way to satisfiying the most they could their customers without being really aware of their competitors’offers. I think that Ford should continue to develop their level of technologies embedded in cars but should also take care about creatings more events, promotion like do its contestants. 3) Ford’s Sync maintain its competitive advantage by offering always new devises like for example the vocal recognition which allow customers to direclty control the onboard computer monitoring all the electric components of the car but also the connectivity of the driver with the internet. This is definitely a substainable advantage for Ford which even more improvable due to the constant progress of technology which allows each year, big manufacturers to propose these improvements in their finished goods. 4) Mulally can totally succeed with small cars because every day, more space is used and pollution increased. It is a fundamental issue which trains customers to ask for smaller cars, which are cheaper, less polluting but mainly convenient. 5) To the CEO, I would...

Words: 371 - Pages: 2

Free Essay

Four Approaches to Information

...FOUR APPROACHES TO INFORMATION TECHNOLOGY INFRASTRUCTURE INVESTMENT Presented by: Kemeasoudei Fanama (u0856287) WHAT IS INFORMATION TECHNOLOGY? Information technology is defined as the study, design, development, implementation, support or management of computer- based information systems, particularly software applications and computer hardware. IT deals with the use of electronic computers and computer software to convert, store, transmit, process, protect and securely retrieve information. APPROACHES TO INFORMATION TECHNOLOGY INFRASTRUCTURE INVESTMENT 1. Fundamental Approach: The basic tenets of the fundamental approach, which is perhaps most commonly advocated by investment professionals, are as follows: There is an intrinsic value of a security and this depends upon underlying economic (fundamental) factors. The intrinsic value can be established by a penetrating analysis of the fundamental factors relating to the company, industry, and economy. At any given point of time, there are some securities for which the prevailing market price would differ from the intrinsic value. Sooner or later, of course, the market price would fall in line with the intrinsic value.    Superior returns can be earned by buying under-valued securities (securities whose intrinsic value exceeds the market price) and selling over-valued securities (securities whose intrinsic value is less than the market price). APPROACHES TO INFORMATION TECHNOLOGY INFRASTRUCTURE...

Words: 828 - Pages: 4

Premium Essay

Microsoft

...investment opportunities to investors. One of my clients seeks to invest in Microsoft Corporation. Microsoft is a multinational Corporation based in America. It specializes in technology products. The headquarters for Microsoft are in Washington a place known as Redmond. This Company manufactures, develops, licenses, sells and supports consumer electronics, computer software, services and personal computers. Bill Gates and Paul Allen initiated this Company way back in 1975. My client wishes to invest in Microsoft. Analyzing Microsoft stock and financial performance is critical to allow me advice my client appropriately. 2.0 An Overview of Microsoft Corporation Microsoft is best known for its software products such as the line of operating systems, Microsoft Windows, Internet Explorer, Microsoft Office suite, Skype and Edge web browsers. Microsoft is the world’s largest software producer or maker by revenue. Microsoft is one of the most valuable companies in the world (MSFT: Summary for Microsoft Corporation- Yahoo! Finance). Microsoft is a worldwide Company traded as NASDAQ component. It operates in the computer software and hardware industry. The chairperson of Microsoft Corporation is John W. Thompson. Bill Gates is the Founder and Technology Advisor. Brad Smith is the President and Satya Nadella the CEO (Microsoft – Official Home Page). As of 2015, Microsoft had a total revenue of US$ 93.58 billion, a net income of...

Words: 4833 - Pages: 20

Premium Essay

Stock Trak Report

...Investment Principles and Analysis Trinity University FNCE 3352 Spring 2010 INSTRUCTOR: Carl M. Hubbard, Ph.D., CFA Office: CGC N3l6; phone 999-7283, carl.hubbard@trinity.edu OFFICE HOURS: 9:30 – 11:30 MW; 2:30 – 4:00 TTh; Other times available by appointment. TEXTBOOK: Zvi Bodie, Alex Kane, and Alan J. Marcus. Essentials of Investments, 7th Edition. New York: McGraw-Hill, 2008. CALCULATOR: Texas Instruments BAII Plus Calculator COURSE OBJECTIVES The learning objectives for students in this course are: (l) improve your understanding of financial securities and markets, (2) develop the ability to analyze investment companies, common stocks, and bonds for investment decisions, (3) understand how options are valued and how option contracts are used in hedging and speculating, (4) understand how to apply security analysis techniques in relatively efficient capital markets, and (5) gain practical experience in trading securities. The prerequisite for this course is the completion of FNCE 3301 with a grade of C- or better. REQUIREMENTS OF THE COURSE 1. Complete the assigned readings and problems. 2. Attend and participate in each class meeting. 3. Complete the security analysis project. 4. Complete the three examinations as scheduled. READING AND PROBLEM ASSIGNMENTS The reading and problem assignments are designed to achieve the goals of the course and are to be completed in preparation...

Words: 1970 - Pages: 8

Free Essay

Financial Management

...incorporated on October 28, 1968, is a financial holding company. The Company is a global financial services firm and a banking institution in the United States, with global operations. The Company is engaged in investment banking, financial services for consumers and small businesses, commercial banking, financial transaction processing, assets management and private equity. Bear Stearns was acquire by JP Morgan at $10 dollars a share. The government grantee $100 billion of loss. 3. Wall Street trader’s NYSE Trading Floor Tour How a broker works on the NYSE Trading Floor. And how technology has change the trading floor, there are less people on the floor in 2008 then in 1988. 4. How NASDAQ Works Behind the Scenes Computer systems that handles the exchange of stocks between buyers and sellers, and to set opening and closing prices. Efficient Market Hypothesis Efficient Market Hypothesis is an investment theory that sates its is...

Words: 640 - Pages: 3

Free Essay

Fundamental Analysis

...■ Fundamental Analysis: Fundamental analysis is a technique that attempts to determine a security’s value by focusing on underlying factors that affect a company's actual business and its future prospects. On a broader scope, you can perform fundamental analysis on industries or the economy as a whole. The term simply refers to the analysis of the economic well-being of a financial entity as opposed to only its price movements Fundamental analysis serves to answer questions, such as: • Is the company’s revenue growing? • Is it actually making a profit? • Is it in a strong-enough position to beat out its competitors in the future? • Is it able to repay its debts? • Is management trying to "cook the books"? The term fundamental analysis is used most often in the context of stocks, but we can perform fundamental analysis on any security, from a bond to a derivative. As long as we look at the economic fundamentals, we are doing fundamental analysis. For the purpose of this tutorial, fundamental analysis always is referred to in the context of stocks. Intrinsic Value of Fundamental Analysis: Intrinsic value is one of the primary assumptions of fundamental analysis is that the price on the stock market does not fully reflect a stock’s “real” value. In financial jargon, this true value is known as the intrinsic value. For example, let’s say that a company’s stock was trading at $20. After doing extensive homework on the company, we determine...

Words: 3957 - Pages: 16

Premium Essay

Mr Mohammed

...education, with the opportunity for professional growth based on performance. I feel that my heterogeneous experience has provided me with the ability to perform well under pressure, meeting deadlines and successfully achieving targets while effectively utilizing my management, business and technical skills as part of a team. Work Experience: - Oct 2010 Till Now Cairo University-Banha University Technical Analysis Fundamental Analysis Stock markets Futures & Options Assistant Lecture (Mandatory) Economics Finance Portfolio Management Forex - Sept 2014 ADMIRAL MARKETS INTERNATIONAL BROKERAGE SENIOR TECHNICAL ANALYST & FUTURES TRADER TRAINER - Dec 2012 VENUS INTERNATIONAL SENIOR TECHNICAL ANALYST & FUTURES TRADER (OPTIONS &COMMODITIES) - June 2009 ELHORREYA BROKERAGE SENIOR TECHNICAL ANALYST - Oct 2006 - Oct 2005 - Oct 2004 TECHNICAL ANALYST & OPERATION MANAGER. INTERNATIONAL SHARES & BONDS CENTER (ISBC) U.A.E LUXOR SECURITIES BROKERAGE & BOOK KEEPING EL-REBDI FOR STOCK EXCHANGE INVESTMENTS IN SAUDI ARABIA TECHNICAL ANALYST & FUNDAMENTAL ANALYST. TECHNICAL ANALYST & MONITORING & EXECUTION. Education: - Preparing (PHD) in Economics in Faculty of Commerce Ain-shams University Under Supervision of Dr.Ali Lotfy the previous former prime minister and Dr. Essam Khalifa The President of the National Bank Funds. - Completed Preliminary of Doctoral Degree in Economics in Faculty of Commerce Ain-Shams University with grade (very good) – May 2012. - Master...

Words: 484 - Pages: 2

Premium Essay

John

...definitions * Live help – 24/7 with knowledgeable people. Uses Bloomberg explain address. Rescourses to help yourself are available. * Description page is very important, links to other tools. Pricing info, dividends etc. * Menu Key to take you back to previous page. * Historical pricing (HP) – amber is always something that can be edited. Can be exported to excel. * Diff between static (raw data can be taking out without being protected) and dynamic data. There’s a way to pull Bloomberg data in excel without being in Bloomberg. * Financial analysis page. (equity analysis )Useful if taking accounting. For public companies. Market cap, revenue. For fundamental analysis, see what makes a company tick. Can be transported to excel * Only work if on same computer. If values are formula, just copy and paste the info in other cells and there will be no formulas. - if I want to save on thumb drive. * Weighed ave cost of captial – WACC. HELP page shows...

Words: 523 - Pages: 3

Premium Essay

Students

...Chapter 8 Valuation of Company Shares: Earnings Based Methods The objectives of this chapter are to present the earnings based methods of share valuation, to critically appraise the available empirical evidence, and to provide examples of the problems, issues and limitations of share valuation. Chapter Outline • Overview of the relationship between earnings and value. • Compounding versus Discounting • Long Event Windows and Discounted/Compounded Earnings. • Earnings Capitalisation and P/E Valuations. • Permanent versus Transitory Earnings and Financial Analysis. • Ohlson’s Theory of Value. • Example of Ohlson Style Valuation. Why focus on earnings for valuation? In chapter 7 we argued that cash flow and dividend based valuation models were conceptually and empirically inappropriate. Earnings based valuation methods, in particular Ohlson style valuation models, are shown in this chapter to be conceptually superior to dividend and cash flow valuation approaches. There is growing empirical evidence consistent with our arguments, some of which is reviewed in this chapter. Chapter 9 provides some detailed examples of the Ohlson style earnings valuation methodology and should be studied after digesting the current chapter. Why focus on earnings? The actions and statements of the professional investment community provide compelling anecdotal evidence that earnings are important in the...

Words: 4439 - Pages: 18

Premium Essay

Ohsol

...Chapter 8 Valuation of Company Shares: Earnings Based Methods The objectives of this chapter are to present the earnings based methods of share valuation, to critically appraise the available empirical evidence, and to provide examples of the problems, issues and limitations of share valuation. Chapter Outline • Overview of the relationship between earnings and value. • Compounding versus Discounting • Long Event Windows and Discounted/Compounded Earnings. • Earnings Capitalisation and P/E Valuations. • Permanent versus Transitory Earnings and Financial Analysis. • Ohlson’s Theory of Value. • Example of Ohlson Style Valuation. Why focus on earnings for valuation? In chapter 7 we argued that cash flow and dividend based valuation models were conceptually and empirically inappropriate. Earnings based valuation methods, in particular Ohlson style valuation models, are shown in this chapter to be conceptually superior to dividend and cash flow valuation approaches. There is growing empirical evidence consistent with our arguments, some of which is reviewed in this chapter. Chapter 9 provides some detailed examples of the Ohlson style earnings valuation methodology and should be studied after digesting the current chapter. Why focus on earnings? The actions and statements of the professional investment community provide compelling anecdotal evidence that earnings are important in the...

Words: 4439 - Pages: 18