Question
Under the Basel III guidelines, it is advised to create
a countercyclical capital buffer of 0-2.5%. Which of the following is not true about this buffer:Solution
Losses incurred in the banking sector can be extremely large when a downturn is preceded by a period of excess credit growth. The countercyclical buffer (CCyB) is intended to protect the banking sector against losses that could be caused by cyclical systemic risks. CCyB will be deployed by national regulators when excess aggregate credit growth is judged to be associated with a build-up of system-wide risk to ensure the banking system has a buffer of capital to protect it against future potential losses. This focus on excess aggregate credit growth means that regulators are likely to only need to deploy the buffer on an infrequent basis. Banks will be subject to a countercyclical buffer that varies between zero and 2.5% to total risk-weighted assets. The buffer that will apply to each bank will reflect the geographic composition of its portfolio of credit exposures’ on the other hand is a separate buffer that is mandatory to be maintained by the banks at 2.5% of risk-weighted assets over and above their Min Tier I and Min CAR requirements.
___________ is a passage to connect two networks that may work on different networking models.
In Excel paper spreadsheets can have all the same advantages as an electronic spreadsheet except which of the following?
In MS-Excel 365 which of the following appears across the top of the screen and below the title bar and contains all the commands, formulas and features...
Which of the following operating systems is the most expensive?
A/An ________ is a computer program that spreads by inserting copies of itself into other executable code or documents.
‘www’ stands for
What is the principal role of the primary key in a database system?
Which among the following defects in the computer software, prevents the software from working ?
What is the difference between a CD-ROM and a CD-RW?
What is the purpose of a subnet mask in IP addressing?