Skip to main content

标  题: 炒股就像下棋 - 给青蛙以及自己一点建议

发信人: sdao (四刀), 信区: Stock
标  题: 炒股就像下棋 - 给青蛙以及自己一点建议
发信站: BBS 未名空间站 (Fri Mar  3 17:19:46 2017, 美东)

1 炒股稳定赚钱很难 不是混混古板多少年就能学会的 要肯花时间和精力系统学习 这
不亚于一门学科
2 虽然稳定赚钱很难 大部分人都放弃了 但还是有很多人都可以 所以要有这个信心
3 就像每个棋手都有自己的风格一样 每个炒股成功的人都有自己的风格 ta fa pa xxa
不分贵贱 赚钱是衡量的唯一标准
4 严格止损 股市上没有不可能的事 只有可能性大小之分
5 会做空跟做多一样重要 不会做空只会做多 恐怕很难稳定盈利 比如只会做多 不会做
空 在牛市末就会焦虑 担心熊市马上要来 (因为不会做空)因此会做出草率的、侥幸
的、错误决定 反之亦然
6 古板其实很鸡肋 - 不会炒股的人在这里永远也学不会炒股 会炒股的人在这里也不需
要学了。。。
7 牛眼看牛 熊眼看熊 任何时候任何一个chart都有一百个看牛的理由 也有一百个看熊
的理由 但在某个时刻只有一个是对的 但没有人在那一刻能够100%确定自己是对的 而
且每一个bar的都会带来新的变化 不知道谁说过其实炒股就像下棋 每一步 每一个bar
都很重要 输一盘没关系 严格割肉止损 有时候运气也很重要 机会永远都有
8 运气虽然有时很重要 但却是炒股的头号敌人 依赖运气炒股就是个赌徒 注定要失败
9 懂得取舍 有所为有所不为
--

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...