Question
What is the limit of number of select group of persons
who can be identified by the Board for offer of securities or invitation to subscribe securities under Private Placement?Solution
Section 42.Offer or invitation for subscription of securities on private placement- (2) A private placement shall be made only to a select group of persons who have been identified by the Board (herein referred to as āidentified personsā), whose number shall not exceed fifty or such higher number as may be prescribed [excluding the qualified institutional buyers and employees of the company being offered securities under a scheme of employees stock option in terms of provisions of clause (b) of sub-section (1) of section 62, in a financial year subject to such conditions as may be prescribed. Companies (Prospectus and Allotment of Securities) Rules,2014- Rule 14. PrivateĀ Placement-(2) For the purpose of sub-section (2) of section 42, an offer or invitation to subscribe securities under private placement shall not be made to persons more than two hundred in the aggregate in a financial year: Provided that any offer or invitation made to qualified institutional buyers, or to employees of the company under a scheme of employees stock option as per provisions of clause (b) of sub-section (1) of section 62 shall not be considered while calculating the limit of two hundred persons. Ā
Which of the following is not a method of inter-process communication (IPC) in modern operating systems?Ā
- Which of the following is NOT a property of database transactions according to the ACID model?
Which of the following best describes the main advantage of a Management Information System (MIS)?
Truncate command in SQL
Ā The term "FAT" is stands for_____
Which of the following best describes a significant difference between distributed parallel computing and cloud computing?Ā
State True/False
With a data mart, teams can access data and gain insights faster, because they donāt have to spend time searching within a ...
Which type of firewall is specifically designed to monitor and filter incoming and outgoing traffic based on predetermined security rules and is capable...
In an enterprise environment, which of the following backup strategies provides the best balance between minimizing storage usage and ensuring data reco...
What is the primary difference between SQL Injection and Command Injection?