Skip to main content

夜曲

  英文名:nocturne
  中文名:夜曲 
  夜曲一般指由爱尔兰作曲家菲尔德(johnfield,1782-1837)首创的一种钢琴曲体裁。旋律优美,富于歌唱,常用慢速或中速,往往采用琶音式和弦的伴奏型。总的表现意境是夜的沉静与人的内心抒发。肖邦的二十一首夜曲是这一体裁最为出色的代表作品。
  18世纪的夜曲常以意大利语notturno为名,是一种器乐合奏的小夜曲。J.海顿、W.A.莫扎特均写有此类乐曲。19世纪的夜曲是旋律如歌、富于诗意的抒情特性曲,类似无词歌,但内容较为深沉,常含有忧郁的情绪,始作者为爱尔兰作曲家J.菲尔德。F.F.肖邦把它发展为一种形象丰富、情深意远的钢琴音乐体裁,他的21首夜曲是这一体裁的艺术珍品。C.德彪西的3首夜曲《云》、《节日》和《海妖》则是管弦乐套曲,不属于特性曲的范畴。
  夜曲(nocturne)是一种形式自由的三段体器乐短曲,一般中段比较激昂,常有沉思、忧郁的特点。格调高雅,充满浪漫色彩,旋律歌唱性很强,也有叫做交响诗的,是富於诗情的短交响乐。低音部的和弦伴奏配上高音部响出夜的寂静,奏出梦般优雅的旋律,所以叫做夜曲。萧邦写过21首优秀的夜曲,德彪西的交响诗也都是夜曲形式。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...