Skip to main content

又一次体会美国的医疗的伟大

发信人: atong (atong), 信区: Military
标  题: 又一次体会美国的医疗的伟大
发信站: BBS 未名空间站 (Tue May  6 18:16:28 2014, 美东)

昨天晚上,不知啥原因,眼睛里感觉有个东西。早上起来,反正无事情,就溜出去看家
庭医生。我告诉医生,估计是掉了什么沙子什么的,能否帮忙看看(家里没有仪器,所
以找一下医生)。打完电话,预约,按时上门,由于是家庭医生,保险资料都有,就在
诊断室等了1个小时,医生来了,看了一下眼睛,说了句,找专科吧。
于是,前台打电话预约专科,还好,大概1个小时专科医生以后有空。就填补上。于是
,就去了那里,先花了30分钟填表查保险。然后,等了一个小时,进入诊断室,开始一
个医生助理来了,开始检查,哦,乖乖,他要检查我的视力,散光,斜视,色盲等等,
我告诉他,这些不是重点,我的问题是眼睛估计揉有异物,希望他看看再哪里,如何取
出。他人还算不错,直接就走进医生的房间,说了几句,就带我去真正的诊断室,又等
了30分钟,医生来了,用灯光看了看,翻了翻眼睛,说有个杂物,然后他用棉球把小脏
粒粘出来。

看看花费:
1)家庭医生,$30(copay) + $120 visit fee
2) 专科,$30(copay) + $445 fee
3)时间:3个小时以上
4)看了一下处方,需要一罐眼药水恢复一下眼睛,乖乖,问了一下CVS,$110,5ml装。

这个还是所有流程都紧凑,一切都顺利的情况下。
这种GDP,就算世界第一,又能怎么样?http://gengwg.blogspot.com/

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into /opt/course/1/context_default_no_kubectl.sh , but without the use of k

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checking a shared sec