Technical Analysis for HACK - ETFMG Prime Cyber Security ETF
ADX | Long Term | Intermediate Term | Short Term |
---|---|---|---|
Strong | Up | Down | Down |
Historical HACK trend table... |
Date | Alert Name | Type | % Chg |
---|---|---|---|
Slingshot Bearish | Bearish Swing Setup | 0.00% | |
Lower Bollinger Band Walk | Weakness | 0.00% | |
Oversold Stochastic | Weakness | 0.00% | |
Lower Bollinger Band Walk | Weakness | 3.11% | |
Stochastic Reached Oversold | Weakness | 3.11% | |
Below Lower BB | Weakness | 3.11% | |
Lower Bollinger Band Touch | Weakness | 3.11% | |
Oversold Stochastic | Weakness | 3.11% | |
MACD Bearish Centerline Cross | Bearish | 2.53% | |
180 Bearish Setup | Bearish Swing Setup | 2.53% |
Recent Intraday Alerts -- Get these alerts pushed to you via our Mobile App
Alert | Time | |
---|---|---|
Up 3% | about 6 hours ago | |
Up 1 ATR | about 9 hours ago | |
60 Minute Opening Range Breakout | about 9 hours ago | |
Rose Above Previous Day's High | about 11 hours ago | |
Rose Above Lower Bollinger Band | about 11 hours ago |
Get this analysis on your stocks daily!
Let us help you stay on top of your investments. We will alert you to important technical developments on your
portfolio & watchlist.
Configure default chart indicators
Basic chart:
The investment seeks investment results that, before fees and expenses, correspond generally to the price and yield performance of the Prime Cyber Defense Index. The fund invests at least 80% of its total assets in the component securities of the index and in ADRs and GDRs based on the component securities in the index. The index tracks the performance of the exchange-listed equity securities of companies across the globe that (i) engage in providing cybersecurity applications or services as a vital component of its overall business or (ii) provide hardware or software for cybersecurity activities as a vital component of its overall business.
Keywords: Computing Computer Security Cybersecurity Cryptography Cyberwarfare Computer Network Security Cybercrime Security Applications Information Governance Information Age
Classification
Keywords: Computing Computer Security Cybersecurity Cryptography Cyberwarfare Computer Network Security Cybercrime Security Applications Information Governance Information Age
Top 10 Components
Indicator | Bull Case | Neutral / Hold | Bear Case |
---|---|---|---|
50 DMA | |||
200 DMA | |||
ADX Trend | |||
Oversold / Overbought | |||
Relative Strength |
Indicator | Value |
---|---|
52 Week High | 64.36 |
52 Week Low | 29.02 |
Average Volume | 319,003 |
200-Day Moving Average | 50.13 |
50-Day Moving Average | 59.35 |
20-Day Moving Average | 60.31 |
10-Day Moving Average | 59.00 |
Average True Range | 1.49 |
ADX | 30.33 |
+DI | 18.78 |
-DI | 32.59 |
Chandelier Exit (Long, 3 ATRs ) | 58.51 |
Chandelier Exit (Short, 3 ATRs ) | 59.99 |
Upper Bollinger Band | 64.04 |
Lower Bollinger Band | 56.58 |
Percent B (%b) | 0.18 |
BandWidth | 12.36 |
MACD Line | -0.56 |
MACD Signal Line | 0.10 |
MACD Histogram | -0.6594 |
Pivot Point Level | Traditional / Classic | Fibonacci | Demark | Woodie | Camarilla |
---|---|---|---|---|---|
Resistance 4 (R4) | 59.49 | ||||
Resistance 3 (R3) | 59.35 | 58.71 | 59.23 | ||
Resistance 2 (R2) | 58.71 | 58.31 | 58.77 | 59.14 | |
Resistance 1 (R1) | 58.32 | 58.07 | 58.52 | 58.46 | 59.06 |
Pivot Point | 57.68 | 57.68 | 57.77 | 57.74 | 57.68 |
Support 1 (S1) | 57.29 | 57.28 | 57.49 | 57.43 | 56.82 |
Support 2 (S2) | 56.65 | 57.04 | 56.71 | 56.74 | |
Support 3 (S3) | 56.26 | 56.65 | 56.65 | ||
Support 4 (S4) | 56.40 |