Skip to main content

在我心中的计算机


最初,觉得计算机很神秘,很遥远,只和科学有关。
后来,看到了计算机,好大,小屏幕,然后闪动的字符,才知道,这是计算机。
再后来,才知道有所谓的BASIC语言,好枯燥,印象里,好像就是判断,然后循环,这
就是计算机语言。
再后来,计算机就是办公室的机器,输输文件,计算机好像就是个高级的排版的打印机。
再后来,觉得不光可以处理文字,还可以打打小游戏。
再后来,CD流行出现以后,发现,计算机,还真有用,办公,游戏,和影视播放,计算
机这时候就等于多媒体
再后来,网络流行,这时候,觉得离不开计算机了, 比如登录图书馆搜索,查文献,
更重要的是,BBS这玩意,从此计算机就开始热闹了,后来,还出现了所谓的聊天室。
再后来,就是视频聊天,MSN。。
再后来就是现在了,又飞跃了,网速几个M或者几十M,啥高清电影都可以在线看,看直
播,电脑好像无所不能。 想当年,拨号上网,打开个页面都好几分钟,恍如隔世啊。http://gengwg.blogspot.com/

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...