Skip to main content

感冒时少吃抗生素

相信很多人都有这样的习惯,每当感冒、咳嗽、嗓子痛时,就开始服用抗生素药物来治疗。笔者自己也不例外,曾经一度我很信赖抗生素类感冒药,因为它的效果确实是看得见的。
一般感冒不需使用抗生素,只需多喝水、多休息,在感冒流行时减少出入公共场所。若有咳嗽、有痰、流鼻涕、鼻塞则可依不同症状给予药物治疗以减轻不适。上呼吸道感染俗称感冒,百分之九十以上是由病毒引起,发烧持续起伏一至七天,其它症状如咳嗽、流鼻涕、鼻塞,大多在一至二周内逐渐痊愈。
治疗感冒的药物主要在减轻症状,并不能缩短病程。
英国还出台了相关的行医规定:英国医生不得向患有耳部感染、咽喉肿痛、扁桃腺炎、支气管炎、感冒、咳嗽等轻微病症患者开抗生素。因此,医生不得不打发他们回家休息,最多给他们服用一些止痛片。
更有甚者,英国国家部门曾耗资数亿英镑推出一系列广告和宣传活动,向人们宣讲抗生素无益于感冒和咳嗽的治疗。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...