Skip to main content

女朋友生气了怎么办???

在表面上:除了说对不起,还是对不起,不停的说,采取礼物攻势,要发扬你作为中国人的那种坚韧的优良传统,她不原谅你死不罢休,――死缠!

从根本上:要保证以后不能发生类似的事情,喝酒是避免不了的,但是要千万不能喝的烂醉如泥!

要努力向她解释,让她明白你的好心和苦心。

如果她现在实在是太生气的话,那不妨先冷静一下,等她稍微平静之后,你再去和她解释,多说几次“我爱你”,说一些她爱听的话,再说一些笑话给她听,慢慢就会好的,因为她也明白,一份爱来之不易,她也会珍惜的,可能你的隐瞒真的是让她伤心了。她也要自己想想,再加上你的道歉和真诚,我想她会原谅你的。

总结:1,承认错误 2,听凭处置 3,骂不还口 4,打不还手 5,适当时机跟她说个玩笑

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...