Skip to main content

标  题: Re: 现在买房还是等两年买房

发信人: xiaonurse (trytry), 信区: Investment
标  题: Re: 现在买房还是等两年买房
发信站: BBS 未名空间站 (Fri May 12 18:38:57 2017, 美东)

买刚需,不要time the market, 不要time the market,不要time the market,重要的
事情说三遍。

只要担负得起,工作稳定,短期不会搬家,就买。但是不要买超出自己支付能力的房子
就可以了。

time the market 完全可能做反,最后买不到房子,后悔多年。

谁也不知道短期内房价怎么走,就跟股市一样。唯一知道的是,长期来看(15年以上)
,房价基本上是跟着通货膨胀走的,对于有人口流入的地区,上升较快,对于人口流出
的地区,上升较慢甚至下降。

你的自住房是长期持有的,否则不买也罢。倒腾一次10%左右不见了。

如果买来时倒腾的,那要看你的本事了。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...