Skip to main content

爱恋和婚姻幸福的几个关键点

发信人: xixihaha2008 (回国出差), 信区: Love
标  题: 爱恋和婚姻幸福的几个关键点
发信站: BBS 未名空间站 (Sat Nov 17 13:35:46 2012, 美东)

听朋友说,爱恋和婚姻幸福的几个关键点 和大家分享--
(1)真正的善良,正直,有正义感和同情心;
      这个是其人品的关键 (无论男女)
中国人婚恋找对象还停留在还什么只看皮相的奴隶社会阶段,真的很可怜, 
我有的时候,一见男生/女生用比美比帅来找对象,就觉得很可笑。。。
皮相\的吸引,只有三到六个月的热度,然后日子不过啦? 哈哈。。。
而且只看重皮相的人往往很虚荣,希望对方的外貌给其自身带来荣耀。。。

只有有重情意的人,才适合恋爱结婚,才能禁得起时间和风雨的考验。。。
---信息时代,各种认识的人越来越多,诱惑也逐渐增大, 
---各种变动增加--现在经济这么不好,如果一方工资变低或者短暂失业;
               --或者由Local 变为成为LD; 
               --或者有任何突发的疾病或变故;
是否另一半还是一如既往的感情好, 就看修养和人品问题

(2)有主见和辨别力;
       而不是人云亦云,听风就是雨, 
       用自己的眼睛和心灵去观察世界,才能减少生活不必要的矛盾,让生活更和谐
。。。
     
(3)有很好的沟通能力,可以站在对方的角度看问题;
       有任何矛盾和问题不要紧--关键看两个人是否能很好的沟通和交流, 
        能很好的彼此妥协,将事情平衡解决, 才是增加幸福感的源泉。。。

(4)有责任感。。。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...