Skip to main content

不能天天见面的情侣要做到的事。

发信人: ruomu (ruomu), 信区: WaterWorld
标  题: 不能天天见面的情侣要做到的事。
发信站: BBS 未名空间站 (Tue Aug 30 20:15:34 2011, 美东)

1. 信任。(彼此要相互信任,不能相互猜疑。)


2.坦诚。(有一天你做了你认为他、她会生气的事的话诚实的告诉他、她)



3.宽容。(谁都可能犯错,当对方诚恳认错时就原谅对方,而不要死盯着不放)



4.理解。(他、她可能每天都会给你通次电话或发几个信息,但有一天或更长的时候却
没有联系你时,请不要生气,要理解,因为每个人不可能整天为爱奔走也会有别的事情




5.空间。(给对方留点空间,世界就两种人,男人和女人,所以一个人不可能只有一种
朋友的)



6.珍惜。(要知道相遇是缘相爱就更不容易了,珍惜这份来之不易的感情,两个见面的
时候不要只顾查看对方手机的通话纪录,要珍惜时间互相诉说思念,时间很快就会流失
的)



7.想念。(要想着对方,天冷的时候告诉他多穿点,如果你看到这日志了就给你亲爱的
他、她发个信息吧,告诉他、她你想他、她了)

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...