Skip to main content

保护视力的4种锻炼方法

一、转眼法
选一安静场所,或坐或站,全身放松,清除杂念,二目睁开,头颈不动,独转眼球。先将眼睛凝视正下方,缓慢转至左方,再转至凝视正上方,至右方,最后回到 凝视正下方,这样,先顺时针转9圈。再让眼睛由凝视下方,转至右方,至上方,至左方,再回到下方,这样,再逆时针方向转6圈。总共做4次。每次转动,眼球 都应尽可能地达到极限。这种转眼法锻炼眼肌,改善营养,使眼灵活自如,炯炯有神。
二、眼呼吸凝神法
选空气清新处,或坐或立,全身放松,二目平视前方,徐徐将气吸足,眼睛随之睁大,稍停片刻,然后将气徐徐呼出,眼睛也随之慢慢微闭,连续做9次。
三、熨眼法
此法最好坐着做,全身放松,闭上双眼,然后快速相互摩擦两掌,使之生热,趁热用双手捂住双眼,热散后两手猛然拿开,两眼也同时用劲一睁,如此3~5次,能促进眼睛血液循环,增进新陈代谢。
四、洗眼法
先将脸盆消毒后,倒入温水,调节好水温,把脸放入水里,在水中睁开眼睛,使眼球上下各 移动9次,然后再顺时针、逆时针旋转9次。刚开始,水进入眼 里,眼睛难受无比,但随着眼球的转动,眼睛会慢慢觉得非常舒服。在做这一动作时,若感到呼吸困难,不妨从脸盆中抬起脸来,在外深呼吸一下。此法,能洗去眼 中的有害物质和灰尘,还对轻度白内障有效,并能改善散光、远视、近视的屈光不正程度。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...