Skip to main content

北大校长周其凤作词《化学是你 化学是我》




民乐合奏:《化学是你 化学是我》作曲:方岽清 /作词:周其凤 /指挥:毕明辉 /演奏:北京大学中乐学社

化学究竟是什么
化学就是你
化学究竟是什么
化学就是我

化学究竟为什么
化学为了你
化学究竟为什么
化学为了我

化学究竟为什么
化学为了你
化学究竟为什么
化学为了我

父母生下 生下的你我
lalala是化学过程的结果
你我 你我的消化系统
lalala是化学过程的场所

记忆和思维活动
要借化学过程来描摹
要借化学过程来描摹 描摹描摹

即便你我的喜怒哀乐
也是化学物质的神出鬼没
也是化学物质的神出鬼没

哦 化学 你原来如此神奇
哦 化学 难怪你不能不火
哦 四海兄弟 我们携手努力
哦 为人类的航船 奋力扬波

你我你我 要温暖漂亮
lalala化学提供衣装婀娜
你我你我 要吃足喝好
lalala化学提供营养多多

你我要飞天探地
化学提供动力几何
化学提供动力几何 动力几何
即便你我的身心健康
也是化学为生命 密码解锁
也是化学为生命 密码解锁

哦 化学 你原来如此给力
哦 化学 难怪你不能不火
哦 四海兄弟 我们携手努力
哦 为人类的航船 奋力扬波
奋力扬波

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...