Skip to main content

xin增加dividend的意义很大



我不想说的太直接,但如果相信xin的真实性,现在买仍然很很便宜。xin就好比掉在地
上的钱,你敢拣还是不敢拣,只有一个问题要回答,这钱是不是伪钞. so far我是没看
出来有什么迹象.

http://www.mitbbs.com/article_t0/Stock/34490249.html

对于xin来说,3刀买还是4刀买不重要,重要的是信心,能hold多久。我个朋友10多年
前买ntes,5刀开始买,一直买到2刀,ntes一直跌到0.68, 那个时候实在没钱加了,被
套也很痛苦,不过04-05年卖的时候,ntes大概50刀 (网易后来分股,如果不分股,大
概现在200多刀,我朋友其实还是卖早了)。1刀抄ntes的笑在开始,但如果很快就卖了
,最后就是欲哭无泪了。5刀抄的,郁闷在开始,却一样可以笑在最后。

当然xin不是当年的ntes了,也不可能翻10倍,但只要天朝政局房市稳定,公司这样分
红下去,再分个1年,股价必然涨的。

如果xin是假的或者有问题,自然血本无归,这个就是risk了.

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...