Date | Open(₹) | High(₹) | Low(₹) | Close(₹) | No. Of Trades(₹) | Total Turnover(₹) | Deliverable Quantity(₹) |
---|---|---|---|---|---|---|---|
01-Apr-2025 | 57.13 | 60.32 | 57.09 | 59.82 | 21,334 | 16,43,43,145.02 | 7,38,819 |
02-Apr-2025 | 59.3 | 59.48 | 57.83 | 59.11 | 17,827 | 7,96,74,701.91 | 3,61,670 |
03-Apr-2025 | 58.32 | 60.39 | 57.74 | 60.15 | 18,905 | 12,89,06,040.6 | 6,46,416 |
04-Apr-2025 | 60.15 | 60.39 | 56.21 | 56.57 | 19,566 | 15,98,67,444.49 | 10,34,417 |
07-Apr-2025 | 54.1 | 54.18 | 50.66 | 52.97 | 35,414 | 21,23,11,834.64 | 10,79,352 |
08-Apr-2025 | 55.48 | 55.48 | 52.84 | 53.56 | 15,854 | 8,98,44,247.39 | 4,71,276 |
09-Apr-2025 | 53.91 | 54.46 | 52.38 | 52.59 | 12,882 | 9,13,34,868.2 | 4,53,767 |
11-Apr-2025 | 54.27 | 57.76 | 53.64 | 57.39 | 24,621 | 19,41,63,461.72 | 8,64,551 |
15-Apr-2025 | 58.67 | 59.54 | 57.69 | 59 | 23,106 | 11,52,41,246.55 | 7,00,984 |
16-Apr-2025 | 59 | 60.35 | 57.6 | 57.99 | 23,123 | 19,38,40,142.34 | 10,31,954 |
17-Apr-2025 | 58.28 | 59.69 | 57.77 | 59.03 | 14,138 | 13,91,68,840.41 | 7,16,594 |
21-Apr-2025 | 59.66 | 62.16 | 59.17 | 61.31 | 20,955 | 17,56,95,542.89 | 8,97,485 |
22-Apr-2025 | 61.83 | 61.95 | 60.37 | 60.65 | 14,173 | 15,87,92,598.91 | 9,44,257 |
23-Apr-2025 | 61.83 | 61.83 | 59.19 | 61.11 | 20,315 | 22,75,78,406.63 | 14,11,692 |
While artificial intelligence models are at the forefront, the backend infrastructure—AI-led data centres—is based on optical fibre comm.
After leading Prysmian's optical fiber cable division in North America, Szymanski joined Sterlite in August 2020, a direct rival.
Invest wise with Expert advice
IIFL Customer Care Number
(Gold/NCD/NBFC/Insurance/NPS)
1860-267-3000 / 7039-050-000
IIFL Capital Services Support WhatsApp Number
+91 9892691696
IIFL Capital Services Limited - Stock Broker SEBI Regn. No: INZ000164132, PMS SEBI Regn. No: INP000002213,IA SEBI Regn. No: INA000000623, SEBI RA Regn. No: INH000000248
ARN NO : 47791 (AMFI Registered Mutual Fund Distributor)
This Certificate Demonstrates That IIFL As An Organization Has Defined And Put In Place Best-Practice Information Security Processes.