Skip to main content

谈炒股的两大误区

发信人: wadaxiwa (洪福齐天), 信区: Military
标  题: 谈炒股的两大误区
发信站: BBS 未名空间站 (Tue Mar  6 01:37:42 2018, 美东)

用各种金融衍生品炒股,是大忌。

你不是专业交易员,搞期权这些东西是明摆着给机构送钱。他们能正确估价,你却不能。

他们把期权高价卖给你是稳赚不赔。从统计上说你是稳赔不赚。跟进赌场没什么区别。



做空股市,或者是幻想抄底。

理想很美好,但幻想股市崩盘有一个致命缺陷。

人类社会随着经济体量扩张,股市跟钱一样,是长期扩张的。你逆时而动,不成功便成
仁!

卖股票有一个致命缺陷。你手持美元,是不能产生股息,也不能享受股市上涨的好处。
你说股市要崩,是明天崩?明年?还是五年后?你就拿着钱傻等?这里面的收益,相当
巨大。贪心的人,就会错失这些收益。




为什么很多炒股票炒来炒去,发现钱没赚多少,就是这个原因,太贪心了!

天下没有快钱可以赚。想赚快钱就是赌博。不排除极个别发财,绝大多数都是亏的。

对普通人来说,就是买入股票做长线投资一条路可以走,这就是巴菲特的投资理念。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...