Skip to main content

标 题: Re: 文化有高低, 人种有优劣?

发信人: biye (早点找到工作吧), 信区: History
标  题: Re: 文化有高低, 人种有优劣?
发信站: BBS 未名空间站 (Fri Apr  5 16:10:01 2019, 美东)

说说我的看法

如果泛泛的说,文化很难说哪个优哪个劣
但放在某个具体环境下,文化就有优劣了
或者如果不喜欢“优越”这样的表达,用“更适应”好了

现代化之前中国农业地带,中国传统文化更为优越
草原上,游牧文化更优越
青藏高原上,藏传佛教更优越
热带的非洲,食物丰富,不需要勤劳
快乐的多造人可能更利于族群的生存,所以非洲人的传统文化更优越

文化相对主义强调泛泛的说,文化没有优劣,这或许是对的
但套在现代就有问题,因为现代人仍然生活在一个具体环境下
这个环境就是以海洋贸易为核心的世界贸易体系
在这个环境下,西方文化确实更有优势

至于人种,不敢妄加评论
我只坚信,或许西方文化是白人发明的
但亚洲人一定能掌握它,至少不比别人差

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...