Skip to main content

生物千老不要盲目转,不要瞎折腾, 人生不是打麻将


有个帖子讲,
一个生物前老,读了Computer master, 工作未果,读了bioinfomatics master,工作
未果;报考医生执照,几年没有match上,10年过去一事无成。三条路全部失败。钱花
了不少。
如果一开始靠Physician Assistant的证书班,做PA,也许好很多,不会浪费10年时间。


家中2个孩子靠老婆照顾,全家生活非用靠老婆一个人挣钱。老婆真不易。


See

不知道到底楼主lg要什么。先是读computer,再是
学bioinformatics,又学了统计,结果40多了来考版。我看不出他
的passion在哪里。就好比打麻将,开始想打清一色,又觉得一条龙快,结果最后说算
了,只要能糊就行。可是人生不是打麻将,可以推倒了重来。话可能不好听,没有给正
能量。可是真的希望楼主lg好好想想,自己到底要什么。这么多年老婆孩子的付出,到
底自己回报了多少。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...