Skip to main content

说说一些人对安全驾驶的误区


如果你留心,一定会在身边找出这样一些人,他们非常熟悉并严格遵守规则来开车。他
们从不酒后驾驶,从不超速,换道一定打指示灯,但是他们其中有些人还是遭遇了事故
,有些事故还扯不清是哪方的责任。车版里常见的事故贴,很多就是这种情况,都说自
己平时开车多小心多小心,但还是出事了。

我个人的看法,是这种人从来或者很少考虑到行车安全其实并不是你一个人就控制得了
的,它涉及潜在的事故另一方。所以,单单自己安全驾驶还不行,还要创造条件让别人
也安全驾驶,即所谓与人方便,与己方便。

举个例子,关于开车的速度。有些人开车从来都是严格按限速,甚至低于限速。理论上
,这是不错的,而事实上,这有时是给别人添堵的,尤其是遇到上下班高峰、节假日购
物高峰的时候。还有人开车的车速不匀,不是想心事,就是打电话,或者东张西望,车
子时快时慢,这也是很给别人添堵的驾车习惯。不超速以至于太慢、或时快时慢,这都
不违规,但是惹别人生气,别人就滴你,跟得很近来dui你,或者换道超车再回来别你
,事实上给自己也造成了更多的事故风险。但有些人就是意识不到,执拗地认为我又没
犯规,犯规都是别人的错,甚至联想到出了事故也是对方保险公司赔,对此我只能无语。

交通规则是为了规范驾车行为制订的,但毕竟是死的,不可能确保你不出事故,行车的
习惯和当时具体的环境和路况,很多时候比规则重要得多。这些体会一时半会讲不清楚
,也是因人而异的东西,胡乱写点就当抛砖引玉。最后祝大家平安。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...