Skip to main content

大潮退去

 发信人: pharma (Panda), 信区: Stock
标  题: 大潮退去,看谁在裸泳
发信站: BBS 未名空间站 (Sat Apr 30 15:56:21 2022, 美东)

2020年3月先暴跌后来暴涨,所以从2020年1月开始算收益比较合理。下面是各大指数和个
股从2020年1月到2022年4月的return (total 28 months):

SPY: 27%
QQQ: 44%
DIA: 15%
IWM: 12%
XLE: 25%
XLF: 13%
XLV: 27%
ARKK: -9%
XBI: -21%
IJH: 21%
IJR: 24%

AAPL: 103%
MSFT: 72%
GOOG: 64%
AMZN: 32%
FB: -5%

过去2年多buy and hold仍然是QQQ胜出其它指数。标普还是非常稳,不愧为最稳的指数
,小散buy and hold不二选择。你同期的收益beat了标普和QQQ吗?

大科技里面苹果是最大收益者,不知道未来几年会不会均值回归。

Comments

Post a Comment

https://gengwg.blogspot.com/

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...