Skip to main content

测试和规划

         你又如何确定心理咨询是你的最终方向呢?咨询或培训或许是你的一种选择,或许就不是你的选择。而你选择它的原因只是,你被测试和规划了一下,这似乎和你当 初“被确定”学习你不喜欢的化学化工专业是一样的。不同的是,这种测试和规划似乎更加“温柔”和“专业”一些罢了。

    你说你喜欢心理学,喜欢潜能开发,我非常相信,而且相信你随便问问周围的人,会有很多人都喜欢。但是,我想提醒的是,喜欢的不一定是自己的职业。只有你为之付出了,忍受各种你可能开始不愿接受的职业特点时,你离职业才近了。

    不用为自己的年龄而焦虑,我们会一直处于一种不断修炼的过程中,年龄不是优势,也不是劣势,只是一种过程。比你年龄小的人,比如你的孩子,也可以成为你的导师。

    我 很欣赏你的勇气,当你因为不喜欢自己的专业和工作时,你勇敢地选择了离开,这是一种追求挣脱生命束缚的勇气。兄弟,我还有一点担忧,担心你挣脱泥潭之后, 跳进一个黑乎乎的深洞,更担心,将来你会再跳出来。折腾本来也没有什么不好,我只是想问,兄弟,你在这个过程中得到了什么?

    所以,不妨站在原地,多向外看看,不仅是给自己的做个测评,重要的是,多了解一些你想去的彼岸,而不是靠着自己的想象和别人的描述,给自己画个图景。问问自己,那真的是你想要的吗?你准备好了吗?

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...