Skip to main content

标 题: 华裔受歧视是不是源于自身文化不自信

发信人: hangpiao (), 信区: Military
标  题: 华裔受歧视是不是源于自身文化不自信
发信站: BBS 未名空间站 (Tue Aug 28 03:40:16 2018, 美东)

想起了几天前在推特上的那个引起热议的华裔女孩,她说的话确实是实际情况,虽然心
酸,而且讽刺,但是你不得不承认,事实如此,不可辩驳。下面图我在国内群里找的,
大家翻译过来以后还讨论的很热烈,整体认为造成这种情况还是因为初期华裔在遭受不
平等对待的时候,没有捍卫自己的权利。对于这种言论我实在无话可说,他们拿老黑举
例子,这之间有什么可比性吗?







中国有几千年的文化,但是为什么还会自身文化不自信,这点可能还是和国家实力有关
系,文化底蕴是够的,但是实力不足,所以没有什么话语权,最早一批华裔,也就是现
在即将人到中年的这一波,在国外生活成长的一段时期内,对于华裔这一身份其实是自
己内心在抵触,中国人习惯性的受刺激就装无所谓,这两年国内发展的不错,一跃成为
排在前面的大国,国外的华裔开始有自信承认自己的身份,甚至开始学习中文。说来也
是可笑,这能不能算是趋利避害的一个表现。 

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...