Skip to main content

标  题: 有个学物理的爸爸是多么重要啊

http://gengwg.blogspot.com/发信人: guaifei (大肥), 信区: Parenting
标  题: 有个学物理的爸爸是多么重要啊
发信站: BBS 未名空间站 (Wed Apr 22 16:55:49 2015, 美东)

儿子5岁了,昨天晚上看书时候,老师给他们带来的图书馆的书,叫什么名字来着,Ms
frizzle什么的.是一个electricity的故事趁机我给他讲电子的能级跃迁。

今天早晨起来拉着儿子一起吃早餐。儿子看着喝牛奶的杯子说,爸爸你看,没有下雨,
杯子上面也有彩虹,为啥会有彩虹呢?
我就给他解释什么是折射现象,因为光在不同介质之间传播,折射角度不同.所以会把白
光分成不同颜色的彩虹

然后开车送儿子去daycare,儿子看到路边的车,又喊,说爸爸,你看那个车在往后面
开。我又开始给他讲啥是相对运动。

那还是去年一起钓鱼的时候讲的,我们去一个大坝排水口钓鱼。我给儿子讲,水流太大
,也不好钓鱼,但怎么判断水流呢?伯努利方程告诉我们压强是流速的6次方成正比,
而开放液体压强又是跟深度成正比所以看出水口水深,就知道流速了。
其实考虑粘滞阻力之后,水深大概跟压强的4次方成正比。所以出水口水面高20%,差不
多流速就翻翻了,高50%,基本上就没法钓鱼了。
--

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into /opt/course/1/context_default_no_kubectl.sh , but without the use of k

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checking a shared sec