Skip to main content

专业不重要?


专业不重要?笑话。
一个人如果同样有天赋,让他选择计算机和生物两条路,以后的结果怎么样?如果自己
是个人才,学计算机可以选择去学术界,工业界大公司往高层走,自己创业;自己不是
人才,学了计算机,也可以一辈子在小公司窝着,或者大公司打杂,至少家糊口。学生
物呢?牛人可以去学术界,但是这似乎是唯一的选择。去工业界或者创业????不是
没有可能,如果只凭生物专业本身,这中间的难度大家都明白。要是不是牛人,学生物
是什么个状况,大家更是心知肚明。
讲开了,古人的至理名言不是没有道理: 男怕入错行,女怕嫁错郎。选择做什么可能在
某种意义上比怎么做更总要。再打个更通俗的比方,一个人运动有天赋,比如可以选择
踢足球或者去练习竞走,这里的选择重要吗?中国足球是烂,但是只要能踢到全国一流
水平,注意,是全国,总还是能风光那么几年。马子,车子,票子,一样都少不了。练
竞走呢?除非练到世界冠军,否者这辈子就毁了。这里面的难度和付出的艰辛一样吗?
而且竞走就算得了世界冠军,也就报道那么一下,奖励那么一下,和付出真的不成正比。
任何行业都有成功的人,但是不等于任何行业一样容易成功,或者说任何行业成功的人
数一样多。如果对还有机会选择的年轻人说,选什么无所谓,自己努力都能成功,这算
不算误人子弟呢?

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...