Skip to main content

感冒期间别锻炼

刚感冒,趁着难受还不明显,去打球、跑步,痛痛快快出身大汗,让感冒的症状减轻一些,北京体育大学运动医学教研室主任王安利说,这可不是什么治疗感冒的“偏方”,运动的结果只能像“抱薪救火”一样,让小感冒变成大病。
运动时,会大量出汗,体内的毒素排出较快,表面上看,可以暂时缓解感冒的症状,但会埋下不小的“隐患”,因为,激烈的运动后大约24小时内,会出现免疫抑制的情况,在这段时间里,免疫细胞开始“罢工”,进行休息调养,而感冒病毒入侵体内,正需要免疫系统与之斗争,没有免疫细胞,感冒病菌自然分外猖狂,很可能让小感冒演变为病毒性心肌炎、肺炎、风湿病。同时,运动后机体代谢会相对旺盛些,这样大量消耗体内的糖、脂肪、蛋白质等,会削弱身体的抵抗力,“脆弱”的抵抗力在人多的运动场合,常常经不起任何细菌的攻击,加重感冒的程度。
增强机体自身抗病能力是预防急性上呼吸道感染最好的办法。如坚持有规律的合适的身体锻炼、坚持冷水浴,提高机体预防疾病能力及对寒冷的适应能力。做好防寒工作,避免发病诱因。生活有规律,避免过劳,特别是晚上工作过度。注意呼吸道病人的隔离,防止交叉感染等。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...