BNK612 Assignment 1 Solution and Discussion


  • Cyberian's Gold

       SEMESTER FALL 2019
    

    FINANCIAL JURISPRUDENCE IN ISLAM (BNK612)
    ASSIGNMENT NO.01
    DUE DATE: 02ND DECEMBER, 2019 MARKS: 10
    ASSIGNMENT:
    Learning Objectives:
    The objective of this assignment is to enable the students to understand the forms of Fraud in Islamic Sharia’h.
    Requirements:
    Under Islamic Sharia’h, apart from Riba, Gharar and Maysir; Fraud causing misrepresentation is also forbidden in business transactions. Muslim jurists have discussed various types of fraud/deception, which make the contract voidable on part of buyer. Consider the following situations and answer the given questions.
     A butcher used to sell the meat after excessive watering in order to increase weight and to give impression of fresh meat.
     A real estate agent while dealing with his potential client deliberately bid for 15 million for a house which is higher than the market value. To give the impression of fair dealing, two of his agents deliberately offered 15.5 million to induce the client to pay higher than the actual market price.
    Keeping in view the types of Fraud in Islamic Jurisprudence laws, answer the following questions
    i. Briefly explain what type of Fraud is involved in above mentioned cases?
    ii. What is the legal status of the transactions caused by such deception and fraud? Also discuss the view of
    all four schools of thought (Hanafi, Hanbali, Shafai, Maliki) on the given scenario?
    iii. In order to give the innocent party right to revoke the transaction, what conditions should be fulfilled to
    prove an act of fraud?
    NOTE: You are advised to use your own language while writing your assignment as the copied assignments will be marked as ZERO.

     IMPORTANT:
    

    24 hours extra / grace period after the due date are usually available to overcome uploading difficulties. This extra time should only be used to meet the emergencies and above mentioned due dates should always be treated as final to avoid any inconvenience.
    IMPORTANT INSTRUCTIONS/ SOLUTION GUIDELINES/ SPECIAL INSTRUCTIONS
    DO YOUR WORK CLEAN & COMPLETE
    OTHER IMPORTANT INSTRUCTIONS: DEADLINE:
     Make sure to upload the solution file before the due date on VULMS.
     Any submission made via email after the due date will not be accepted. FORMATTING GUIDELINES:
     Use the font style “Times New Roman” or “Arial” and font size “12”.
     It is advised to compose your document in MS-Word format.
     You may also compose your assignment in Open Office format.
     Use black and blue font colors only.
    REFERENCING GUIDELINES:
     Use APA style for referencing and citation. For guidance search “APA reference style” in Google and read various websites containing information for better understanding or visit http://linguistics.byu.edu/faculty/henrichsenl/apa/APA01.html
    RULES FOR MARKING
    Please note that your assignment will not be graded or graded as Zero (0), if:
     It is submitted after the due date.
     The file you uploaded does not open or is corrupt.
     It is in any format other than MS-Word or Open Office; e.g. Excel, PowerPoint, PDF etc.
     It is cheated or copied from other students, internet, books, journals etc.

     Note related to load shedding: Please be proactive
    

    Dear students!
    As you know that Pre Mid-Term semester activities have started and load shedding problem is also prevailing in our country. Keeping in view the fact, you all are advised to post your activities as early as possible without waiting for the due date. For your convenience; activity schedule has already been uploaded on VULMS for the current semester, therefore no excuse will be entertained after due date of assignments, quizzes or GDBs.



Jan
27
(2 Views / 0 Upvotes)
0 Replies

10. COGNITIVE | CLOUD COMPUTING
709a4b58-3423-4963-9e29-bd995cadb5fc-image.png
Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet.

Aug
19
(33 Views / 0 Upvotes)
2 Replies

Dear Students if you have any query regarding Final Term Exam
Please Feel Free to Ask Cyberian’s

Sep
18
(29 Views / 0 Upvotes)
0 Replies

یہ ۵ جی کیا ہے؟
دوسرے سیلولر نیٹ ورکوں کی طرح ، 5 جی نیٹ ورک سیلولرکلز کرنے کے انتظامات کو استعمال کرتے ہیں جو اپنے ڈومین کو علاقوں میں الگ کرتے ہیں اور ریڈیو لہروں کے ذریعہ انکوڈڈ معلومات بھیجتے ہیں۔ ہر سیل سائٹ کو سسٹم کی ریڑھ کی ہڈی سے وابستہ ہوتا ہے، اس سے قطع نظر کہ وائرڈ یا ریموٹ بیک ہاؤل ایسوسی ایشن کے ذریعے۔ 5 جی نیٹ ورک ایک قسم کی انکوڈنگ کا استعمال کریں گے جسے آف ڈی ایم کہتے ہیں ، جو انکوڈنگ کی طرح ہے جس میں 4 جی ایل ٹی ای کام کرتا ہے۔ تاہم ، ہوائی انٹرفیس کا مقصد...

Dec
17
(15 Views / 0 Upvotes)
21 Replies

Live Updates:
Pakistan’s former dictator Pervez Musharraf was on Tuesday sentenced to loss of life in the excessive treason case by way of a special court docket here, turning into the first navy ruler to get hold of the capital punishment in the country’s history.
567e9088-009d-47b4-a689-988ca233129e-image.png
A three-member bench of the special courtroom, hea...

Sep
6
(44 Views / 0 Upvotes)
0 Replies

فیس بک ڈیٹنگ اپنی پسند کی چیزوں کے ذریعہ پیار تلاش کرنا آسان بناتا ہے - اپنی مشترکہ چیزوں ، جیسے مفادات ، واقعات اور گروہوں کے ذریعہ معنی خیز تعلقات شروع کرنے میں مدد کرتا ہے۔ یہ ڈیٹنگ پروفائل بنانے میں کام کرتا ہے اور آپ کو زیادہ مستند نظر دیتا ہے کہ کوئی کون ہے۔
a5068e0f-944c-4e27-b28d-bec69b167543-image.png
آج ، ہم امریکہ میں فیس بک ڈیٹنگ کا آغاز کر رہے ہیں۔ ہم لوگوں کو انسٹاگرام ...

Aug
22
(101 Views / 1 Upvotes)
1 Replies

I’d say as a blogger and a IT student that it’s a great achievement for a local operator. As we know, communication is expanding globally and we do need faster networks to communicate.
IMG_20190822_194412.jpg

I’d say as a blogger and a IT student that it’s a great achievement for a local operator. As we know, communication is expanding globally and we do need faster netwo...

Sep
6
(15 Views / 0 Upvotes)
0 Replies

b244dd88-39a0-47bb-95f5-5af7cf1991c7-image.png

Image: justin sullivan / Getty Images

کمپنی نے منگل کو اعلان کیا کہ فیس بک اپنی چہرے کی شناخت کی خصوصیات کو بند کرنے میں آسان تر بنا رہا ہے اور اب وہ خود بخود نئے صارفین کو فیس ٹیگنگ کا انتخاب نہیں کرے گا۔

فیس بک اپنے صارفین کے اپ لوڈ کردہ فوٹو میں چہروں کی شناخت کے لئے چہرے کی پہچان کا استعمال...

Aug
6
(22 Views / 0 Upvotes)
0 Replies

Join the celebration at the all-new Apple Aventura.
Our new location opens Saturday, August 10 at 10:00 a.m.
Join us for the grand opening of our new store - located in a bigger space right across from the Aventura Slide Tower. Come celebrate your creativity during opening weekend with free Today at Apple sessions in music, photography, art, and more. And enjoy our vibrant Latin Music Fridays happening throughout the month of August.

Sep
6
(21 Views / 0 Upvotes)
0 Replies

آئی فونز اور ہیکرز پر حالیہ ہیک حملے کی وجہ سے جس کو دنیا میں سب سے زیادہ محفوظ فون سمجھا جاتا تھا اس کی سیکیورٹی کو نظرانداز کیا جارہا ہے۔ کیا آپ کو ایسی کوششوں سے بچایا گیا ہے؟ آپ خود کو ڈیجیٹل طور پر کیسے محفوظ کرسکتے ہیں؟

آئی فون ہیکنگ آپریشنوں کی ایک حالیہ لہر جنہوں نے جنوری تک “ایک ہفتے میں ہزاروں صارفین” کو متاثر کیا ، گوگل کے پروجیکٹ زیرو سیکیورٹی ٹیم کے محققین نے انکشاف کیا ہے۔ ایپل کے آئی فونز کو بڑے پیمانے پر وہاں کے سب سے محفوظ آلات سمجھا جاتا ہے۔ واقع...

Jul
31
(144 Views / 0 Upvotes)
1 Replies

To register your device, go to this link and create your account as an individual user. Select your user type International traveler
On submission of Signup form, a confirmation link will be received in your provided email address. Cl...

    Recent Topics


| DMCA.com Protection Status