Skip to main content

蓝筹股(Blue Chip)

出自 MBA智库百科(http://wiki.mbalib.com/)

蓝筹股(blue chip):在某一行业中处于重要支配地位,业绩优良,交投活跃,红利优厚的大公司的股票,又称为"绩优股"。但蓝筹股并不等于具有很高投资价值的股票。

“蓝筹”一词源于西方赌场。在西方赌场中,有三种颜色的筹码,其中蓝色筹码最为值钱,红色筹码次之,白色筹码最差。投资者把这些行话套用到股票上,引申为最大规模或市值的上市公司。一般人将蓝筹股等同股票成份股,但事实上成份股不一定是最大或最佳的上市公司。

在香港股市尚有“红筹”及“紫筹”之名,前者指由中国资金在香港注册登记的股票,后者指同时具有“蓝筹”及“红筹股”身份的股票,例如中银香港。香港的蓝筹股包括有长江实业、和记黄埔、香港电灯等。美国通用汽车公司、埃克森石油公司和杜邦化学公司等股票,也都属于“蓝筹股”。

蓝筹股并非一成不变。随着公司经营状况的改变及经济地位的升降,蓝筹股的排名也会变更。据美国著名的《福布斯杂志统计,1917年的100家最大公司中,目前只有43家公司的股票仍然在蓝筹股之列,而当初“最蓝”、行业最兴旺的铁路股票,如今完全丧失了入选蓝筹股的资格和实力。在香港股市中,最有名的蓝筹股当属全球最大商业银行之一的“汇丰控股”。在华资背景的“长江实业”和中资背景的“中信泰富”,也属于蓝筹股之列。中国大陆的股票市场虽然历史较短,但发展比较迅速,也逐渐出现了一些蓝筹股。 

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...