当前位置:网站首页>A few simple steps to teach you how to see the K-line diagram
A few simple steps to teach you how to see the K-line diagram
2022-07-07 18:16:00 【sino_ sound】
Novice investors learn to watch K It's easy to feel unable to start when you're on the line , The following steps can help you master more systematically K Basic knowledge of line .

First step 、 Yes K Line classification
According to the relationship between opening price and closing price ,K Line can be divided into male line and female line ; And whether there are shadow lines ,K The line can be divided into bareheaded and barefoot K Line ( chart 4)、 With only the shadow K Line ( chart 1)、 Only the lower hatched K Line ( chart 2) And on 、 There are all shadow lines K Line .
Bareheaded and barefoot K A line is just a solid part , Without upper and lower hatches K Line , It shows that multiple parties or short parties have the upper hand , Become the master of the market of the day . But only the ones with pictures K The line shows that the market selling pressure is heavy , The seller successfully sniped the buyer's attack at the highest point of the day , Make the market unable to close at the top . If K The line only brings the shadow line , It means that the highest price of the day is the opening price , The longer the shadow line under it , It shows that the stronger the bearing force below .
However, in the middle of the actual market trend , There are both upper and lower shadow lines K The line is occupied 70% above , The following rules can be followed when analyzing it :
The longer the male entity , The more conducive to the rise ; The longer the Yin line entity , The more favorable it is to fall . If the hatch is very small relative to the entity , It can be considered to be equivalent to the absence of . When the hatch pointing in one direction is longer , The more unfavorable it is for the market price to change in this direction in the future ; The upper and lower shadow lines are long at the same time , It means more 、 The two sides fought fiercely , Finally, it was flat , The market outlook is uncertain .
The second step 、 Look for classic combination forms and their variants
Some classics K The line combination has obvious bullish or bearish meaning , For example, in the morning ( dusk ) Star of the year , Good friends ( Light friend ) Counter offensive, etc , Investors can remember them in pairs , And we should understand the principle and key points of the market trend , In this way, even if you encounter their variants in the process of Kanpan , We can also understand their market meaning .
The third step 、 Combined with other technical analysis tools
For beginners , Just by K It is difficult to obtain a better analysis effect , Therefore, some index indicators are often needed , For example, when one day the gold price received a neutral line , and MACD Indicators are about to be put on again 0 axis , Then it constitutes a very strong bullish long signal .
边栏推荐
- 三仙归洞js小游戏源码
- AI defeated mankind and designed a better economic mechanism
- Introduction de l'API commune de programmation de socket et mise en œuvre de socket, select, Poll et epoll
- Personal best practice demo sharing of enum + validation
- Is it safe to open an online futures account now? How many regular futures companies are there in China?
- 万字保姆级长文——Linkedin元数据管理平台Datahub离线安装指南
- [tpm2.0 principle and Application guide] Chapter 1-3
- 2022年理财有哪些产品?哪些适合新手?
- Use onedns to perfectly solve the optimization problem of office network
- zdog. JS rocket turn animation JS special effects
猜你喜欢

Chapter 3 business function development (user login)

Learn to make dynamic line chart in 3 minutes!

讨论| 坦白局,工业 AR 应用为什么难落地?

Summary of debian10 system problems

4种常见的缓存模式,你都知道吗?

手撕Nacos源码(先撕客户端源码)

Pro2:修改div块的颜色

Introduction de l'API commune de programmation de socket et mise en œuvre de socket, select, Poll et epoll
![[trusted computing] Lesson 13: TPM extended authorization and key management](/img/96/3089e80441949d26e39ba43306edeb.png)
[trusted computing] Lesson 13: TPM extended authorization and key management

ICer知识点杂烩(后附大量题目,持续更新中)
随机推荐
【demo】循环队列及条件锁实现goroutine间的通信
golang 客户端服务端登录
The report of the state of world food security and nutrition was released: the number of hungry people in the world increased to 828million in 2021
[principles and technologies of network attack and Defense] Chapter 3: network reconnaissance technology
2021-06-28
Ansible learning summary (9) -- ansible loop, condition judgment, trigger, processing failure and other task control use summary
Test for 3 months, successful entry "byte", my interview experience summary
Sanxian Guidong JS game source code
Pro2: modify the color of div block
[deep learning] 3 minutes introduction
How to implement safety practice in software development stage
Understanding of 12 methods of enterprise management
Ten thousand words nanny level long article -- offline installation guide for datahub of LinkedIn metadata management platform
使用OneDNS完美解决办公网络优化问题
[trusted computing] Lesson 11: TPM password resource management (III) NV index and PCR
Chapter 3 business function development (safe exit)
Face recognition attendance system based on Baidu flying plasma platform (easydl)
Deep learning - make your own dataset
保证接口数据安全的10种方案
性能测试过程和计划