Skip to main content

市场流通性(Market liquidity)



市场流通性(Market liquidity)是指资产能够以一个合理的价格顺利变现的能力,它是一种所投资的时间尺度(变为现金的难易程度)和价格尺度(与公平市场价格相比的折扣)之间的关系。通常简称流通性。

一个流通市场的特点是市场上在任何时刻都有买家和卖家。另一个流通性的定义是,下一次贸易的价格与上一次贸易的价格相等的可能性。

假如一个市场上有许多买家和卖家的话,那么这个市场的流通性就非常高。这样的市场被称为深市场。在这样的市场中订货对货物价格的影响不大。

一个货物的买卖次数可以看作是该货物的流通性。往往交易者更愿意向流通的市场如股票贸易投资,而不太愿向比较不流通的市场如不动产投资。原因是在一个不流通的市场上的交易者有可能以不利的价格被迫买卖一个货物。投机商和市商庄家为一个市场带来流通性。反对托宾税的原因之一是托宾税妨碍货币投机,降低外汇市场的流通性,增高其波动。

部分常见资产的流动性大小一般有这样的关系:现金 > 活期存款 > 短期国债 > 蓝筹股 > 一般股票 > 城市中心小户型物业 > 城市外围大户型物业。特别的,增加交易成本可降低资产的流动性,如增加印花税,可降低股票流动性,T+0交易比T+1交易更具流动性。不仅个人投资者面临不流通的危险,大投资者同样面临这样的危险。中央银行可通过三大货币政策手段干涉投放的货币量,从而调控流通性。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...