Skip to main content

关于ING的TRANSFER和利息的经验

发信人: ntchai (ntchai), 信区: Money
标 题: 关于ING的TRANSFER和利息的经验
发信站: The unknown SPACE (Sun Dec 15 22:27:21 2002), 转信

ING的利息(我指的是名义利息)确实比较高,但如果你频繁转钱的话,
可能实际得到的利息并不高,我的例子(实际经验)如下:
周一: 存钱到LOCAL银行的CHECKING(无利息)
周二: 看到LOCAL银行的FUND AVAILABLE后,才敢去ING转钱
周三: ING的TRANSFER REQUEST EFFECTIVE(钱已经到ING, 但不能用)
周四: nothing happens
周五: 第一天在ING挣利息(没错,ING的TERM说钱上账以后的第二个工作日才付利息)

由此看来,只有星期一开始动作,受损最小,否则白损失周末2天.
转钱出来,大概2天无利息.所以在精密计划的情况下,6天无利息,否则8天无利息.
一个月: effective rate: 23/30x2.25%=1.73%
二个月: 53/60x2.25%=1.99%

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...