Skip to main content

出国13年

发信人: Dreamer (不要问我从哪里来), 信区: Dreamer
标  题: 出国13年
发信站: BBS 未名空间站 (Fri Oct 26 01:30:21 2012, 美东)

99年:跟远距离介绍的男友去日本,上研究生,准备考试,打工练语言。
00年:考上大学院,打工,做实验。发现男友是个啃老族,常吵架,然后分手。自己专
心考过日语一级。
01年:拿到奖学金,做实验,少量打工积累语言,直到拿到大企业的工作内定。
02年:硕士毕业,论文发表到不错的英文刊物。春开始到大企业工作,500万日元一年。
03-04年:工作,之外很封闭自己,单着。感觉日本不能长久呆,文化太郁闷。匆忙
考T。
05年:美国烂校的硕士奖学金,秋天辞职来美入学,冬天碰上后来成老公的男友。
06年:有点怀恋日本的安定工作。生活上常和男友磨合,观念不同。但他不交绿卡申请
H1就到期要离境,匆忙秋天结婚。
07年:我混学位,渐渐改变在日本养成的封闭性格。春天老公首付买房子,我年底毕业
找到工作。
08年:工作开始不顺,半年后进入正轨。跟着老公拿到绿卡。老公高校快速评到教授收
入9万,我6万。
09年:工作,我的收入负责存钱,老公收入用来开销还房贷。想要孩子,终于年底怀孕。
10年:留职停薪,在家安胎,秋儿子出生,和老公两人带。年底被公司召回上半职班。
11年:工作,之外带孩子。秋天恢复全职工作,7-8万。
12年:我付首付买两个投资房,工资收入8万,老公约10万。想要老二。。。

中部大农村,就这样过着日子。。。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...