Currency devaluation and fictitious economy
1. The essence of interpretation is different:
virtual currency: virtual currency refers to non real currency
currency: currency (CCY) is the medium of purchasing goods and preserving wealth. It is the contract between the owner of property and the market about the right of exchange. In essence, it is the agreement between the owners
2. Different types:
virtual currency: game currency, special currency, etc.
currency: coin, paper currency, deposit currency, etc.
extended data:
formation of virtual currency market:
Internet leads to the emergence of a new market, which is a virtual market based on cyberspace. The Internet provides a lot of communication places for consumers, and also provides business market for enterprises. Enterprises must change from proct centered to service centered to customer centered
with the development of computer artificial intelligence technology and database technology, enterprises can conveniently collect customers' information, understand customers' needs in time, change business strategies and grasp economic arteries in real time
virtual currency originally refers to non real currency.
in the case that virtual currency is connected with reality, virtual currency has its real value. Well known virtual currencies such as Tencent's q-coin, q-point, Shanda's roll, Sina's u-coin meter ticket (used in igome game), chivalrous Yuanbao (used in chivalrous road game), and so on, In the era of stand-alone games, the protagonists accumulate money by knocking down the enemy and winning money in gambling houses to buy Herbs and equipment, At that time, there was no "market" between players. Since the Internet established the portal and community and realized the game networking, there has been a "financial market" for virtual currency, and players can trade game currency.
the second type is the special currency issued by portal websites or instant messaging service providers, Tencent's q-coin is the most widely used to purchase services on this website. It can be used to purchase membership, QQ show and other value-added services.
Third, the difference between real currency and virtual currency
the first feature: different value formation mechanisms.
general currency and virtual currency have different value bases, the former represents utility, The latter represents value.
as a general equivalent, the "price" of currency is called value in language, but actually refers to utility. Virtual currency does not represent the "effect" of general "price", but the value itself.
virtual currency is not a general equivalent, but a manifestation of value relativity, or a symbol of expression; It can also be said that virtual currency is a personalized currency.
the second feature is that the monetary decision mechanism is different.
general currency is decided by the central bank, while virtual currency is decided by indivials.
reflected in the monetary decision mechanism, real currency is decided by the central bank; The virtual money market (such as stock market and game money market) is determined by forces outside the central bank, The economy formed by stock market and derivative financial market is called fictitious economy. The essence of fictitious economy is information economy with indivial as the center.
the third characteristic is that the value exchange mechanism is different.
the value conversion of general currency is completed in the money market; The value exchange between general currency and virtual currency is completed through the overall exchange of the two markets. Under special conditions, there is an immature exchange relationship between indivial markets. Therefore, it can be said that general currency and virtual currency are in different markets.
some people worry that game virtual currency may cause inflation, Just as the imbalance of supply and demand in the commodity market can not directly lead to the imbalance of supply and demand in the money market, it must be through the issuance of additional money in the overall market to lead to inflation; At present, the stock market is a unified market, but the game market is not.
for example, the ratio of a certain game virtual currency to RMB may initially be 800000 to 1, Then it may change to 8 million to 1. Maybe the virtual currency of a castle today will be enough to buy a Tomahawk tomorrow; If the virtual currency forms a unified market, it may indeed exert pressure on the money market. The problem is that there is no such unified market now. The issuers of game currency are independent of each other and do not have the status of financial subject, let alone the exchange with currency at the level of financial market. What's more, whether it is base currency or value-added currency, The currency volume (m) and the currency price level (V, i.e. the velocity of circulation) have not changed, so it can not be considered that there will be monetary inflation or deflation.
for the current game currency depreciation, it is better to explain that the service conditions of a game as a value-added service have changed, As the demand for virtual currency increases, the price of services involved and the price level of virtual currency decrease. Due to the change of supply and demand conditions of such services, the price of services decreases. This is a phenomenon that can be explained by a real commodity market
the second stage is the socialization of interest bearing capital, that is, from indivial lending to banks and securities. With the development of society, as an intermediary, banks have emerged. People deposit the idle money in the bank, and then the bank lends it to earn interest. People can also use the idle money to buy various securities to earn interest. At this time, the securities in people's hands are virtual capital
the third stage is the marketization of securities, that is, the formation of a virtual capital exchange financial market, and then the financial market graally develops from stocks and bonds to futures trading. The biggest problem of the early virtual capital was the lack of liquidity, which hindered the transformation of idle money into interest bearing capital. After the marketability of securities, they can be bought and sold freely according to their expected returns, thus creating a financial market for virtual capital transactions
the fourth stage is the internationalization of financial market, that is, virtual capital can conct cross-border transactions, which has gone through a tortuous process. In the middle of the 19th century, the United States and other debtor governments and railway companies issued bonds with fixed interest rates in the financial markets of Britain, France and Germany. However, it was not until the early 20th century that large-scale transnational securities investment appeared. Since the 1960s, futures trading has appeared in the trading of stocks, bonds, foreign exchange and other financial commodities, and options trading also appeared in 1973< The fifth stage is the integration of international finance. Since the 1980s, with the advancement of economic globalization, the degree of economic dependence among countries has greatly increased, and the degree of financial liberalization has graally increased; Second, with the formation of floating exchange rate system and the enhancement of financial innovation, the scale of virtual economy is increasing; Third, with the progress of information technology, the flow of virtual capital in the financial market is faster and faster, and the flow is also larger and larger. The above three factors promote the closer connection between the domestic financial markets and the international financial markets, and the mutual influence is also increasing. It can be said that the whole body is affected by one thing
the characteristics of virtual economy
there are several characteristics of virtual economy system. One is complexity. Virtual economy is a complex system, which is mainly composed of natural person and legal person. They carry out virtual economic activities in the financial market according to certain rules. Everyone has the freedom of independent decision-making, but can not be affected by other people's decision-making and the environment. Taking the stock market as an example, when an investor buys and sells stocks is his own decision-making, but this decision-making can not be influenced by other people, or by environmental factors such as policies. Although the system is easy to proce turbidity e to the nonlinear interaction between components, it can show a certain order and stability e to the self-organization of the system< The second is metastable. Virtual economic system is a kind of metastable system, which is far away from equilibrium, but can keep relatively stable. With dissipative structure, it is necessary to exchange funds with the outside world to maintain relative stability. For example, in the stock market, there must be buying and selling, and new capital must be continuously injected in order for the stock market to survive. The metastability of virtual economy comes from three aspects: first, the inherent instability of virtual capital. The second is the virtualization of money. After the decoupling of currency from gold standard and gold exchange standard, it no longer has a real value that can be measured by some kind of material object. The government can adjust the money supply by printing money, without the previous money withdrawal mechanism. At this time, the value of money can only be measured by its purchasing power, and it is affected by the circulation of money, interest rate, exchange rate, people's consumption behavior and other factors, so the virtualization of money will enhance the instability of the virtual economy. Third, it comes from positive feedback. Theoretically speaking, the rise of stock price will rece the demand for stocks. As fewer people buy stocks, the supply and demand of stock market will be automatically balanced; However, e to the positive feedback effect in the stock market, many investors are optimistic about the future of the stock market after the stock price rises, and more funds will enter the stock market to speculate. Due to the increasing demand, the stock price will rise further. This kind of positive feedback will cause amplification effect and make the price of virtual capital fluctuate greatly. Thus, the instability of the virtual economic system is aggravated< The third is high risk. It can be divided into objective risk and subjective risk. In recent years, e to the development of information technology, a lot of progress has been made in predicting the future from the past data, but it is still impossible to predict the future completely and accurately, so there are objective risks. Subjective risk comes from people's subjective estimation error of expected return. The development of stock market is supported by people's optimistic psychological expectation. If there is no speculation, bubble and risk in stock market, it is not the stock market. Speculators do not look at the discount of future earnings, but at the price difference between buying and selling. If there is speculation, there must be bubbles. If there are bubbles, there must be risks. This is the subjective risk. This kind of risk has a positive feedback effect and is easy to be amplified, causing panic. In addition, the existence of illegal activities, such as internal transactions, manipulation by dealers and untrue information disclosure, will also cause high risks of virtual economy< The fourth is parasitism. The virtual economic system is proced by the real economic system and attached to the real economic system. Its parasitic performance is that its operation cycle depends on the operation cycle of the real economy, but the short-term deviation may occur. Due to the close relationship between virtual and real economic systems, the risks in real economy, such as overstocking of procts, bankruptcy of enterprises, will be transferred to the virtual economic system, leading to its instability. The risks in the virtual economy system, such as the sharp fall of the stock index, the sharp fall of the real estate price, the sharp increase of bad bank loans, and the sharp depreciation of the currency, will also have a serious impact on the real economy. In the market economy, it is impossible for the real economy to run away from the virtual economic system< The fifth is periodicity. On the whole, the evolution of virtual economy is cyclical. In general, the real economy has accelerated growth, the economic bubble has begun to take shape, currency and credit have graally expanded, asset prices have generally risen, stock and real estate prices have been rising, external disturbances have caused the economic bubble to burst, all kinds of financial indicators have dropped sharply, people have been throwing real assets and financial assets, and the real economy has slowed down or negative growth. This periodicity is not a simple cycle, but a spiral forward. The virtual economy is always in a cycle of expansion, bubble formation, bubble burst, contraction or collapse.
the real economy is hardware and the virtual economy is software. Marx discusses the process of capital circulation, that is, first employing workers, purchasing raw materials, machines and building factories with monetary capital through exchange, and then turning procts into procts through proction, procts into commodities through circulation, and commodities into money through exchange. I think this process is the real economy. Virtual economy refers to the economic activities related to the circular movement of virtual capital mainly relying on the financial system. This is that monetary capital can make profits without going through the real economic cycle. In short, the virtual economy is the activity of directly making money from money< At present, the scale of virtual economy is much larger than that of real economy. Since the 1980s, the world's average annual economic growth rate has been about 3%, the annual growth rate of international trade is about 5%, the annual growth rate of international capital flow is about 25%, and the total price of global stocks has increased by 2.5 times. According to the data of the International Monetary Fund and the world bank, the world's total virtual economy was 140 trillion US dollars at the end of 1997 and 160 trillion US dollars at the end of 2000, which is roughly five times of the world's GDP. The daily flow of virtual capital in the world is about 2 trillion US dollars, which is about 50 times of the world's daily average trade volume. It can be predicted that with the development of e-commerce and e-money, the scale of virtual economy will continue to expand
the real economy is the hardware in the economy, and the virtual economy is the software in the economy. They are interdependent<
the significance of studying virtual economy
studying virtual economy has not only theoretical significance, but also important practical significance. On the one hand, it is because the scale of virtual economy is expanding rapidly, and there is still a big gap between China and foreign countries in the development of virtual economy. Compared with the real economy, the scale of China's virtual economy is still relatively small. When the market value of the stock market was the highest, it was only 55% of GDP, and only about one third of it was circulating shares. The bond market and money market were relatively small, and financial derivatives had not yet developed. China did not have such large-scale financial centers as Wall Street in New York and Lombard Street in Britain. On the other hand, e to our lack of experience in how to control the virtual economy, China is facing severe challenges in the virtual economy after China's accession to the WTO. For example, in the use of funds, we still have some experience on how to make use of interest rate difference and time difference, but we don't know much about how to make use of liquidity difference, portfolio difference and risk difference to achieve the optimal balance among profitability, security and liquidity. In addition, we also lack experience on how to recognize and deal with the risks in the virtual economy system. We should seriously study the movement and development law of the virtual economy, especially the interaction and influence between the virtual economy and the real economy, so as to give full play to the role of the virtual economy in promoting China's economic development, and try our best to prevent and eliminate its negative effects
when you open the package, you can see the GF portable aromatherapy machine. Here we sell a lawsuit. First, let's talk about the manufacturer's free aromatherapy tablets. It is safe and environmental friendly with plant extract and collocation of natural green flavors. Unlike liquid aromatherapy, this solid aromatherapy tablet has the most advantages of no spilling, no leakage and lasting fragrance. At present, there are lemon flavor and orange flavor, and we are looking forward to more flavors from manufacturers< br />
this is the main body of GF portable aromatherapy machine, isn't it cute? The surface is made of high quality heat insulation material, which will not deform even if it is used for a long time. With fine sanding treatment, it feels very comfortable
as for the size, just compare it with your girlfriend's red CC. It's only the size of your hand, so it's very convenient to carry it with you
you can put it in your make-up bag or hang it on your schoolbag like Uncle Feng. It's beautiful
different from ordinary aromatherapy machine, GF portable aromatherapy machine has built-in 650mah battery, which can last for 8 hours. I'm very satisfied with using it for 1.5 hours a day, which can last for nearly a week
there is a micro USB interface on the side, which can be charged with a power bank. However, in 2019, is it better to change to the popular type-C interface< br />
< br />
It's very simple to use. First put in the aromatherapy core, and then gently press the power button on the top. You can enjoy the fresh air immediately< br />
As for the noise, it can be ignored. It's very quiet when working. Anyway, uncle Feng didn't hear anything
it's intimate that GF portable aromatherapy machine will automatically stop working after working for two hours, which saves the trouble of shutting down. However, with the volatilization of the aromatherapy tablets, the taste will become lighter. It is recommended to replace them every two months.
the performance of this graphics card is similar to that of N card gtx660. General large stand-alone can play smoothly.
it may also be a new function of the new driver to force down the frequency (in other words, the frequency is not so bad in practice)
to log in broiler, you must know three parameters: IP, user name and password of remote computer
when it comes to broilers, we should talk about remote control. Remote control software such as grey pigeon, Shangxing, etc. There are also some remote control software need to be mounted on the broiler
broiler is not a kind of food. It's a machine that can be remotely controlled by Trojan horse or by leaving a back door. Now many people call a machine with webshell permission a broiler
no one wants their computer to be controlled by others, but many people's computers are almost undefended, and they are easy to be completely controlled by remote attackers. Therefore, your computer becomes the meat on other people's chopping board, and people can eat it as they want, which leads to the name of broiler (machine)
[edit this paragraph] how to detect whether you become a broiler
pay attention to the following basic situations:
1: QQ, MSN abnormal login reminder (the system prompts that the last login IP does not match)
2: online game login found that the equipment is missing or does not match the last offline location, or even can not log in with the correct password
3: sometimes you suddenly find that your mouse doesn't work. When you don't move the mouse, the mouse will move, and you will click the relevant button to operate
4: when you surf the Internet normally, you suddenly feel very slow, and the hard disk light is flashing, just like you usually files
5: when you are ready to use the camera, the system prompts that the device is in use
6: when you are not using network resources, you find that the network card light is flashing. If you set it to display after connecting, you will also find the network card icon in the lower right corner of the screen flashing
7: out of line service
8: users with broadband connection receive abnormal packets when they are not connected after the hardware is turned on There may be program background connection)
9: the firewall loses control of some ports
10: restart the computer ring the process of surfing the Internet
11: some programs, such as antivirus software firewall, will flash when they are unloaded (the unloading interface will flash by, and then the report is completed.)
12: after the program (QQ ` antivirus) that some users trust and often use is unloaded. The catalog file still exists and is automatically generated after deletion
13: the above phenomenon is basically subjective and not very accurate, but it needs your attention
next, we can use some software to observe the network activity to check whether the system is invaded
1. Pay attention to check the working status of firewall software
for example, Jinshan net dart. In the network status page, the currently active network connections will be displayed. Check the related connections carefully. If you find that you're not using software to connect to a remote computer, be careful
2. It is recommended to use tcpview to clearly view the current network activity
General Trojan connections can be viewed through this tool
here, the general Trojan connection is different from some carefully constructed rootkit Trojans, which adopts more advanced hiding technology and is not easy to be found
3. Use Jinshan cleaning experts to carry out online diagnosis, pay special attention to the process items of comprehensive diagnosis
cleaning experts will carry out safety assessment for each item, and need to be very careful when encountering unknown items
4. The process manager of cleaning up expert's treasure chest can find suspicious files and help you simply check where dangerous programs are.
the self-help method after becoming a broiler.
1. Users who are surfing the Internet should disconnect immediately if they find any abnormality.
if you find that IE often asks whether you are running some ActiveX controls, or generating some obscure files Ask debugging script what, must be vigilant, you may have been recruited. There are two typical cases of Internet intrusion:
one is that the browser's default home page or title is modified when browsing some web pages with malicious code, which is light; There is also the problem that you can format your hard disk or make your windows open continuously until you run out of resources and crash. This situation is much worse. The data you have not saved or put on your hard disk may be partially or completely lost
the second is the potential Trojan horse attack, or worm like virus attack, so that your machine can constantly send your privacy to the outside world, or use your name and email address to send garbage, further spread the virus; There is also the manual intrusion of hackers, prying into your privacy or deleting and destroying your files
self help measures: disconnect immediately, so as to rece the loss and prevent the virus from spreading to more online computers. Please do not restart the system or shut down immediately. Please refer to the following for further processing measures< Second, after poisoning, you should immediately back up and transfer documents and e-mail, etc.
it's natural to run anti-virus software after poisoning, but in order to prevent the anti-virus software from mistakenly killing or deleting documents and important e-mail that you haven't finished processing, you should first back them up to other storage media. Some files with long file names and unprocessed e-mails need to be backed up under windows, so I suggest you do not quit windows first, because once the virus breaks out, you may not be able to enter windows
no matter whether these files are poisonous or not, you should back them up and mark them as "to be checked" with label paper. Because some viruses are specially designed for an anti-virus software, once they run, they will destroy other files, so backup first is a preventive measure. After you clear the virus in the hard disk, it is better to analyze and process these extra backup files slowly< Third, you need to run the software to kill CIH under windows (even in the environment with virus)
if you find CIH virus, you should pay attention not to follow the usual measures recommended by newspapers and manuals, that is, first shut down, cold start, and then use the system disk to guide and then kill the virus, but also run the software to kill CIH in the environment with virus. In this way, anti-virus software may report that some files are read-write protected and cannot be cleaned up, but the actual purpose of running with virus is not to completely remove the virus, but to minimize the damage of CIH when it starts up next time, so as to prevent it from damaging the BIOS hardware of the motherboard when it starts up again, resulting in a black screen and making your next anti-virus work impossible< Fourth, you need clean DOS startup disk and anti-virus software under DOS.
up to now, you should follow the standard manual of many anti-virus software step by step. That is, cold start after shutdown and boot with a clean DOS boot disk; In addition, windows may have been damaged some key files after poisoning, and illegal operations will be reported frequently, so the antivirus software under windows may not run. So please prepare an anti-virus software under DOS just in case
even if you can run antivirus software under windows, please use more than two tools to cross clean. In most cases, windows may have to be reinstalled, because the virus will destroy some files, slow down the system or frequent illegal operations. For example, even if you kill CIH, Microsoft's outlook mail program is slow to respond. It is recommended not to be biased against certain anti-virus software. Due to the different emphasis in development and the different anti-virus engines used, all kinds of anti-virus software have their own advantages and disadvantages, and the effect of cross use is ideal
5. If you have a backup of ghost, partition table and boot area, it is the safest way to restore it once.
if you use ghost backup to do windows backup at ordinary times, and use it to mirror it once, the operating system you get is the safest. In this way, even the potential Trojan horse programs are also cleaned up by the way. Of course, this requires that your ghost backup is absolutely reliable. If the Trojan horse is "backed up" when it is used as a ghost, there will be endless trouble< 6. After the system is restored again, change your network related password
including the login network user name, password, email password and QQ password, to prevent hackers from using the password obtained in the last intrusion process to enter your system. In addition, because many worm attacks will send out your information randomly, so timely change is necessary.
distributed denial of service (DDoS) attack refers to the use of client / server technology to combine multiple computers as attack platforms to launch DDoS attacks on one or more targets, thus doubling the power of denial of service attacks. Usually, an attacker uses a stolen account to install the DDoS master program on a computer. At a set time, the master program will communicate with a large number of agents, which have been installed on many computers on the network. When an agent receives an instruction, it launches an attack. Using client / server technology, the main control program can activate hundreds of agents in a few seconds.