当前位置:网站首页>你是一流的输家,你因此成为一流的赢家
你是一流的输家,你因此成为一流的赢家
2022-07-30 16:11:00 【这个利弗莫尔不太冷】
最近两个月没有爆仓,盈亏比也正在逐渐提升,想要成为一个合格的交易员,必须要频繁止损
止损后,行情又发展到你原来想的方向,那继续上车即可,你损失不过是手续费而已
1.不要逆势加仓
2.不要在回调时买入,不要在反弹中做空
不得不说,利弗莫尔不仅是上个世纪的投机之王,也是这个世纪的榜样


边栏推荐
- 服务器装好系统的电脑怎么分区
- Is Redis really slow?
- How to connect redis in node.js?
- 【开发者必看】【push kit】推送服务典型问题合集2
- When the vite multi-page application refreshes the page, it will not be in the current route and will return to the root route
- [AGC] Quality Service 1 - Example of Crash Service
- rscsa笔记八
- The service already exists!解决办法
- php字符串如何去除第一个字符
- LeetCode-283-移动零
猜你喜欢

nodejs environment variable settings

【SOC FPGA】外设KEY点LED

FME realizes the method of converting CAD with attribute to SHP data

Horizontal Pod Autoscaler(HPA)

STM32F407定时器输入捕获

(1) Cloud computing technology learning - virtualized vSphere learning

【HMS core】【FAQ】A collection of typical questions about Account, IAP, Location Kit and HarmonyOS 1

Huawei ADS reports an error when obtaining conversion tracking parameters: getInstallReferrer IOException: getInstallReferrer not found installreferrer

rhce笔记2

武汉星起航:海外仓基础建设成为跨境电商企业的一大出海利器
随机推荐
Scheduling_Channel_Access_Based_on_Target_Wake_Time_Mechanism_in_802.11ax_WLANs
How to remove last character from string in php
23. Please talk about the difference between IO synchronization, asynchronous, blocking and non-blocking
arcpy tutorial
经典实例分割模型Mask RCNN原理与测试
新人学习小熊派网络应用开发
Load Base Split usage documentation
Overview of TiDB Tool Functions
数组元素逆置
L2-007 Family property (use of vector, set, map)
李沐d2l(七)kaggle房价预测+数值稳定性+模型初始化和激活函数
【HMS core】【FAQ】push kit、WisePlay DRM、Location Kit、Health Kit、3D Modeling Kit、SignPal Kit典型问题合集4
[Developers must see] [push kit] Collection of typical problems of push service 2
Leetcode 118. 杨辉三角
应用OPC解决方案实现控制系统数据的安全交换
The case of five little pigs (five little pigs compare the size of the body weight)
Placement Rules usage documentation
Horizontal Pod Autoscaler(HPA)
How to remove first character from php string
[NCTF2019] Fake XML cookbook-1|XXE vulnerability|XXE information introduction