Skip to main content

成功人士的一个最大的特点


回答这个问题之前,先来看看什么决定了成功?
大家都知道基因(情商智商),勤奋,运气,家庭条件,贵人相助等等对成功起到重要
作用。
可是,还有一个最重要的因素往往被忽略。
那个因素的权重我认为可以达到所有其他因素的总和。
那是什么呢?

先来看看以下几个问题:
1)为什么说“你认为你是什么人,你就会成为什么人”
2)为什么常出现这样的现象:一个家老大考上好大学,老二老三等都一般能上好大学
3)为什么说不能输在起跑线?为什么小孩在一年级时是优秀生,以后就有很大可能成
为优秀生?
4)为什么高处掉下来的人很容易东山再起?
。。。

答案只有一个,就是“信心”。因为他们成功过,或者他们身边的人成功过,所以他们
觉得成功是理所当然(就是信心很高)。

这里所说的信心,跟自信还有点区别。
比自信程度更深。这个信心更像基督教徒对上帝的“信”。


很多时候,我们不能成功,是因为我们信心不够。

所以:成功 = 50% (基因+运气+汗水+外助) + 50% 信心

成功人士的最大特点就是“信心”,就是特别相信自己能够成功。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...