Technical Analysis for HACK - ETFMG Prime Cyber Security ETF
ADX | Long Term | Intermediate Term | Short Term |
---|---|---|---|
Weak or Absent | Up | Up | Up |
Date | Alert Name | Type | % Chg |
---|---|---|---|
Slingshot Bullish | Bullish Swing Setup | 0.00% | |
Overbought Stochastic | Strength | 0.00% | |
Up 3 Days in a Row | Strength | 0.00% | |
Shooting Star Candlestick | Bearish | 0.14% | |
Gapped Up | Strength | 0.14% | |
Overbought Stochastic | Strength | 0.14% | |
Upper Bollinger Band Touch | Strength | 0.14% | |
Expansion Breakout | Bullish Swing Setup | 0.84% | |
Pocket Pivot | Bullish Swing Setup | 0.84% | |
Wide Range Bar | Range Expansion | 0.84% |
Alert | Time |
---|---|
Shooting Star Candlestick Entry | about 8 hours ago |
Fell Below Previous Day's Low | about 8 hours ago |
Rose Above Upper Bollinger Band | 3 days ago |
Up 1 ATR | 3 days ago |
2x Volume Pace | 3 days ago |
Get a Trading Assistant
Let us help you stay on top of your investments. We will alert you to important technical developments on your
portfolio & watchlist.
Configure default chart indicators
Basic chart:
The investment seeks investment results that, before fees and expenses, correspond generally to the price and yield performance of the Prime Cyber Defense Index. The fund invests at least 80% of its total assets in the component securities of the index and in ADRs and GDRs based on the component securities in the index. The index tracks the performance of the exchange-listed equity securities of companies across the globe that (i) engage in providing cybersecurity applications or services as a vital component of its overall business or (ii) provide hardware or software for cybersecurity activities as a vital component of its overall business.
Keywords: Computing Computer Security Cybersecurity Cryptography Cyberwarfare Computer Network Security Cybercrime Information Governance Security Applications Information Age
Classification
Keywords: Computing Computer Security Cybersecurity Cryptography Cyberwarfare Computer Network Security Cybercrime Information Governance Security Applications Information Age
Indicator | Bull Case | Neutral / Hold | Bear Case |
---|---|---|---|
50 DMA | |||
200 DMA | |||
ADX Trend | |||
Oversold / Overbought | |||
Relative Strength |
Indicator | Value |
---|---|
52 Week High | 67.4615 |
52 Week Low | 48.6701 |
Average Volume | 107,786 |
200-Day Moving Average | 59.63 |
50-Day Moving Average | 61.96 |
20-Day Moving Average | 62.31 |
10-Day Moving Average | 63.43 |
Average True Range | 0.82 |
RSI (14) | 69.42 |
ADX | 21.65 |
+DI | 37.08 |
-DI | 18.05 |
Chandelier Exit (Long, 3 ATRs) | 62.71 |
Chandelier Exit (Short, 3 ATRs) | 61.31 |
Upper Bollinger Bands | 65.35 |
Lower Bollinger Band | 59.27 |
Percent B (%b) | 0.91 |
BandWidth | 9.75 |
MACD Line | 0.68 |
MACD Signal Line | 0.39 |
MACD Histogram | 0.2832 |
Pivot Point Level | Traditional / Classic | Fibonacci | Demark | Woodie | Camarilla |
---|---|---|---|---|---|
Resistance 4 (R4) | 65.76 | ||||
Resistance 3 (R3) | 65.69 | 65.29 | 65.61 | ||
Resistance 2 (R2) | 65.29 | 65.05 | 65.33 | 65.55 | |
Resistance 1 (R1) | 65.06 | 64.90 | 64.86 | 65.13 | 65.50 |
Pivot Point | 64.66 | 64.66 | 64.57 | 64.70 | 64.66 |
Support 1 (S1) | 64.43 | 64.42 | 64.23 | 64.51 | 64.14 |
Support 2 (S2) | 64.03 | 64.27 | 64.07 | 64.09 | |
Support 3 (S3) | 63.80 | 64.03 | 64.03 | ||
Support 4 (S4) | 63.88 |