Technical Analysis for HACK - ETFMG Prime Cyber Security ETF
ADX | Long Term | Intermediate Term | Short Term |
---|---|---|---|
Weak or Absent | Up | Down | Up |
Date | Alert Name | Type | % Chg |
---|---|---|---|
Up 3 Days in a Row | Strength | 0.00% | |
Pocket Pivot | Bullish Swing Setup | 0.05% | |
Lower Bollinger Band Walk | Weakness | 0.05% | |
Oversold Stochastic | Weakness | 0.05% | |
Slingshot Bearish | Bearish Swing Setup | 2.17% | |
Stochastic Buy Signal | Bullish | 2.17% | |
Pocket Pivot | Bullish Swing Setup | 2.17% | |
Lower Bollinger Band Walk | Weakness | 2.17% | |
Multiple of Ten Bullish | Other | 2.17% | |
Gapped Up | Strength | 2.17% |
Alert | Time |
---|---|
60 Minute Opening Range Breakdown | about 22 hours ago |
Rose Above Previous Day's High | about 24 hours ago |
60 Minute Opening Range Breakout | 2 days ago |
Up 2% | 2 days ago |
Rose Above 10 DMA | 2 days ago |
Get this analysis on your stocks daily!
Let us help you stay on top of your investments. We will alert you to important technical developments on your
portfolio & watchlist.
Configure default chart indicators
Basic chart:
The investment seeks investment results that, before fees and expenses, correspond generally to the price and yield performance of the Prime Cyber Defense Index. The fund invests at least 80% of its total assets in the component securities of the index and in ADRs and GDRs based on the component securities in the index. The index tracks the performance of the exchange-listed equity securities of companies across the globe that (i) engage in providing cybersecurity applications or services as a vital component of its overall business or (ii) provide hardware or software for cybersecurity activities as a vital component of its overall business.
Keywords: Computing Computer Security Cybersecurity Cryptography Cyberwarfare Computer Network Security Cybercrime Information Governance Security Applications Information Age
Classification
Keywords: Computing Computer Security Cybersecurity Cryptography Cyberwarfare Computer Network Security Cybercrime Information Governance Security Applications Information Age
Indicator | Bull Case | Neutral / Hold | Bear Case |
---|---|---|---|
50 DMA | |||
200 DMA | |||
ADX Trend | |||
Oversold / Overbought | |||
Relative Strength |
Indicator | Value |
---|---|
52 Week High | 67.4893 |
52 Week Low | 43.3211 |
Average Volume | 141,733 |
200-Day Moving Average | 57.18 |
50-Day Moving Average | 63.64 |
20-Day Moving Average | 62.61 |
10-Day Moving Average | 61.54 |
Average True Range | 1.05 |
RSI (14) | 46.24 |
ADX | 19.38 |
+DI | 21.00 |
-DI | 26.19 |
Chandelier Exit (Long, 3 ATRs) | 61.43 |
Chandelier Exit (Short, 3 ATRs) | 63.01 |
Upper Bollinger Bands | 65.35 |
Lower Bollinger Band | 59.87 |
Percent B (%b) | 0.4 |
BandWidth | 8.76 |
MACD Line | -0.73 |
MACD Signal Line | -0.64 |
MACD Histogram | -0.0888 |
Pivot Point Level | Traditional / Classic | Fibonacci | Demark | Woodie | Camarilla |
---|---|---|---|---|---|
Resistance 4 (R4) | 63.53 | ||||
Resistance 3 (R3) | 63.53 | 63.03 | 63.28 | ||
Resistance 2 (R2) | 63.03 | 62.66 | 63.03 | 63.20 | |
Resistance 1 (R1) | 62.55 | 62.43 | 62.30 | 62.55 | 63.12 |
Pivot Point | 62.05 | 62.05 | 61.93 | 62.06 | 62.05 |
Support 1 (S1) | 61.57 | 61.68 | 61.32 | 61.57 | 61.00 |
Support 2 (S2) | 61.07 | 61.45 | 61.08 | 60.92 | |
Support 3 (S3) | 60.59 | 61.07 | 60.84 | ||
Support 4 (S4) | 60.59 |