2011年12月30日 星期五

熱火連下四城 XXOOOO damn!

sdfsdf dfgfg fdggg fdgdf dfgfg 


熱火連下四城 XXOOOO damn!
今年NBA總冠軍是邁阿密熱火 (先輸兩場 再下四城)
雖然其實我是支持小牛的啦
但熱火我實在不得不講一下
這是他們的陣容 說真的! 一字排開來 先發 替補 連教練萊利(左邊數過來第二個西裝老頭)都是明星
但別忘了 明星超過三個的隊 一般都拿不到總冠軍
他們倒打破了這傳說
恭喜 莫寧 Payton 兩老第一次獲得冠軍  你們沒遺憾了吧!
手套Payton第三戰的關鍵致命一投
打敗了小牛
唉 這是他全場唯一的兩分 就那麼討厭
沒有莫寧的防守  尤其是帶動士氣的火鍋
熱火等於被水澆了
俠客胖歐強力單手扣
雖然你不如從前
但現今第一中鋒 還是你的啦
Because NO ONE wanna be a CENTER , ME TOO!!
還有就是不爭氣
好笑又猥褻的卡位
加油 卡你老母 卡給他死.......
這就是「閃電俠」 D.Wade
OH.... NO NO我們現在應該再多加個 「MVP」
給他
沒有他是絕對贏不了的 100%百分百
很特殊的球風 還有能在最後扛起投最後一球的強力心臟 (舉例: 喬丹 米勒 Kobe 詹姆斯)
最後時刻 根本沒人守的住  (請回憶 4 5 6 戰)
小牛輸球 我看就是隊上沒有天才中的天才吧!
不能否認 因為他給球隊拿到了總冠軍 他的確是現今的 NBA Number ONE !!!!!!
facebook yahoo msn google

如果有一件事是重要的PART 2: 這星期六我要去比籃球三對三鬥牛

dfg fdggg sdfsdf dfg dfgfg 


如果有一件事是重要的PART 2: 這星期六我要去比籃球三對三鬥牛
這星期六 8/14
我要去比三對三鬥牛
上次比賽打全場 輸到快脫褲
這次是比每天我都在打的 也比較擅長的 三對三鬥牛
殺啊! 我跟你們拼了!


.msgcontent .wsharing ul li { text-indent: 0; }



分享

Facebook
Plurk
YAHOO!


facebook yahoo msn google

2011年12月29日 星期四

new hair

fdggg fggg fdgdf sddsf dfgfg 


new hair
女王今天去看醫生 順便去剪頭髮 其實應該還要更短才對
真想剪個男生頭耶  因為每天整理頭髮超累ㄉ
醫生說女王壓力太大  要放輕鬆 不然會倒掉哎  應該很難
facebook yahoo msn google

2011年12月28日 星期三

去除Hinet的網頁空間廣告

fdggg fggg sddsf dfg dfgfg 


去除Hinet的網頁空間廣告
去除Hinet的網頁空間廣告一、 在</html>後面多加一個<noscript>醬就可以了二、 在</html>後面多加一個<xml>醬就可以了三、不然就再</html>後面加上<!--讓他把<!--後面的全當註解


.msgcontent .wsharing ul li { text-indent: 0; }



分享

Facebook
Plurk
YAHOO!


facebook yahoo msn google

server2003 資料夾存取設定

sdfsdf dfgfg dfg sdfsdf dfgfg 


server2003 資料夾存取設定
準備工作先把硬碟格式到NTFS系統建議分割成三個邏輯磁區
第一部分放系統,第二部分放紀錄檔,第三部分放使用者漫遊檔
SERVER端設定PART I:
安裝Windows server 2003授權模式選擇第二項:每一裝置或每個使用者網路安裝選自訂,進去後網路元件設定選取1.勾選 Client Microsoft Networks2.勾選 File and printer sharing for Microsoft Networks3.勾選網際網路通訊協定(TCP/IP) 點選 TCP/IP 通訊協定,設定固定IP位址 DNS 設定為自己的IP 第二項設定為140.115.65.13 然後於TCP/IP上選內容 -> 進階 -> DNS ->依序新增 140.115. 65. 25 140.115. 1. 31 140.115. 50. 1
140.115. 50. 2
其他選項不勾選其他選項都用預設當安裝完之後重開電腦,請先把網路線拔掉第一次執行Windows server 2003先做MSBlast防堵更新之後就可以插上網路線再上Windows update更新最新版的修正程式
安裝防毒軟體複製一份光碟的資料到硬碟做備份之後的安裝若需要光碟
只要讀取硬碟即可
第二步 : server的設定於管理您的伺服器 -> 新增/或移除角色 會進入[設定您的伺服器]精靈
選下一步,等系統處理完後選擇第2項:自訂設定選擇 網域控制站(Active Directory) 依序按下一步之後有選項,選擇新網域的網域控制站->網域(在新樹系中)->網域的完整名稱,使用ActDir.me.ncu.edu.tw->網域NetBIOS名稱,ActDirMe->資料庫與記錄檔資料夾,設定到D槽目錄之下->共用的系統磁碟區,設定到D:\SYSVOL->選擇第2項,在這台電腦上安裝及設定DNS伺服器->選擇使用權限 只和Windows 2000或Windows server 2003作業系統相容->設定還原模式密碼,建議使用和Administrator相同的密碼->設定完成,檢查報表無誤後,系統會進行安裝
->安裝完成,重新啟動//------------------------以下這動作可以省略----------------------------------//啟動後,會出現網域控制站(Active Directory)及DNS伺服器的選項//先至網域控制站(Active Directory)選擇右方的 管理Active Directory中的使用者及電腦//左邊的樹狀目錄可以看到剛剛建立的網域,在上面按右鍵,選擇提高網域功能等級//變更成Windows Server 2003
//----------------------------------------------------------------------------至DNS伺服器選擇右方,管理這台DNS伺服器進入後可以看到正向對應域及反向對應域的資料夾其中正向對應域在之前的設定已經被加入而反向對應域卻是空白的在反向對應域上按右鍵選擇新增區域->選擇主要區域,將區域存放在Active Directory上打勾->選擇 到Active Directory網域ActDir.me.ncu.edu.tw中所有的網域控制站->網路識別碼鍵入140.115.67->動態更新選擇第一項,只允許安全性動態更新
->檢查報表,之後完成設定在伺服器端開啟一個共用資料夾,
要用來存放客戶端的漫遊設定檔以及其他...在這裡我們建立一個名為 userdata 的資料夾並開啟網路共用(權限:everyone 唯讀、administrators 完全控制),若伺服器名稱為 308server 則其網路路徑即為 "\\308server\userdata
"設定方法:建立資料夾在資料夾上按右鍵 -> 內容 -> 共用選擇共用此資料夾 -> 使用權限設定Everyone -> 允許讀取設定Administrators -> 新增 -> 進階 -> 立即尋找 ->
選擇Administrators -> 設定完全控制
設定 Active Directory 公用使用者帳號管理Active Directory中的使用者與電腦 -> 展開網域 -> 選擇Users右鍵 -> 新增網域使用者使用者登入名稱 308user不設定密碼取消,使用者必須在下次登入時變更密碼勾選,使用者不能變更密碼﹔密碼永久有效設定完,出現一名稱為308user帳號的使用者在上面按右鍵 -> 內容 -> 設定檔填寫設定檔路徑,為剛剛所設定的共用資料夾再後面加上以這個帳號為名稱的資料夾路徑例如:\\308server\userdata\308user
還有一個管理者的帳號也不忘加入使用者名稱 NCUMENet密碼請設好而且牢記取消,使用者必須在下次登入時變更密碼勾選,使用者不能變更密碼﹔密碼永久有效出現一名稱為NCUMENet帳號的使用者在上面按右鍵 -> 內容 -> 設定檔填寫設定檔路徑:\\308server\userdata\NCUMENet
->成員隸屬 -> 新增 -> 進階 -> 立即搜尋 -> 選擇Domain Admins -> 確定
至此 server 設定告一段落
稍後在回頭設定群組原則
本機設定 PART I:
用戶端設定請先設定好本地端Administrator的密碼
並且於使用者帳戶 -> 變更使用者登出或登入的方式 -> 把使用歡迎畫面和快速使用者切換取消新增一使用者名稱為NCUMENet密碼請設好並牢記權限為系統管理員
再使用NCUMENet帳號登入,以產生帳號設定檔
加入網域&複製使用者設定檔至Server以administrator身份登入本機,於我的電腦 -> 內容修改原工作群組為網域:此處輸入ActDirMe(NETBIOS 網域名稱)。
出現認證時可以輸入server端administrator的帳號密碼來通過
複製使用者設定檔至 Server:設定好後,以administrator身份登入,修改NCUMENet帳號的使用者設定檔(路徑 C:\Documents and Settings\NCUMENet),將 NTUSER.DAT 更名為 NTUSER.man
(此項程序即為設置強制設定檔,往後使用者才不會擅自修改設定)。我的電腦 -> 內容 -> 進階 -> 使用者設定檔 -> 先選取本地端之NCUMENet的設定檔
,然後再按下右下角的「複製到」按鈕。將要「複製設定檔」的目的地選擇到伺服器所開的共用資料夾下,例如 : \\308server\userdata\NCUMENet並且將「允許使用」的權限設定為「網域的NCUMENet」。
(此處所有瀏覽時出現的帳號密碼輸入畫面,都要輸入server端 administrator的帳號密碼)Server端的Userdata的目錄存取權限
把everyone的權限提高到完全控制這時候若發生找不到網路路徑的錯誤請打開Explorer -> 網路芳鄰 -> 找到我們的server共用資料夾路徑為 \\308server\userdata\NCUMENet會出現認證視窗,輸入Server端的Administrator帳號密碼等成功打開目錄之後,在選擇複製使用者設定檔
即可成功上傳把Userdata的目錄存取權限把NCUMENet加入,權限提高到完全控制
把everyone的權限降唯讀取再新增一使用者名稱為308user權限為受限制的帳號不設密碼同樣登入後產生設定檔利用Administrator登入本機,修改C:\Documents and Settings\308user,將 NTUSER.DAT 更名為 NTUSER.man上傳至\\308server\Userdata\308user
目錄下這樣本機端設定也到一部分了
回頭設定Server端的使用者群組原則
Server端設定PART II:在管理Active Directory中的使用者與電腦 -> 網域上按右鍵 -> 內容 -> 切換至「群組原則」標籤頁選新物件 -> 命名308user -> 右鍵 -> 內容 -> [安全性]頁面 -> 移除清單上的 Authenticated User選擇新增 -> 進階 -> 立即尋找 -> 選擇308user -> 確定 -> 回安全性頁面選擇308user -> 把下方「讀取」與「套用群組原則」此兩項屬性設為允許。套用 -> 確定
回到群組原則物件連結 -> 點選308user -> 上移是最上層以同樣方法新增一個NCUMENet名稱的群組原則,使用者設定為NCUMENet
設定完後位置移到308user的下方開始設定群組原則了
在308user上右鍵 -> 編輯
使用者設定 -> 系統管理範本 -> Windows元件 -> Windows檔案總管啟用 : 從[工具]移除[資料夾選項] : 移除[對應網路磁碟機]及[中斷網路磁碟連線]
: 隱藏我的電腦中指定的磁碟機(隱藏c槽)
使用者設定 -> 系統管理範本 -> 開始功能表和工作列啟用 : 移除[Windows Update]的連結並存取
: 從[開始]功能表中移除[網路連線]
使用者設定 -> 系統管理範本 -> 桌面啟用 : 從[我的電腦]右鍵功能表上移除[內容]
: 結束時不儲存設定
使用者設定 -> 系統管理範本 -> 控制台 -> 新增移除程式
啟用 : 移除[新增移除程式]
使用者設定 -> 系統管理範本 -> 控制台隱藏控制台的選項 1.系統 2.新增移除程式 3.網路連線(連線後將圖示顯示在通知區域內不要勾選) 4.資料夾選項  5.系統管理工具
6.使用者帳戶
-> 使用者設定 -> 系統管理範本 -> 系統開啟 : 禁止存取命令提示字元 禁止存取登錄編輯工具 不要執行已指定的Windows應用程式 (加入mmc.exe ; regedit.exe)
停用 : Windows自動更新
設定完畢後結束離開Server端設定完成囉
再回到本機端把本機設定做好
本機設定 PART II:利用NCUMEnet或是Administrator登入"本機"
執行mmc
檔案 -> 新增/移除嵌入式管理單元 -> 新增 -> 群組原則 -> 新增 -> 完成 -> 確定
展開本機電腦原則 -> 電腦設定 -> Windows設定 -> 安全性設定 -> 本機原則 -> 使用者權限指派修改 本機登入 -> 新增使用者或群組 -> 位置 -> 使用Server端的Administrator帳號密碼認證 選擇整個目錄 -> 選擇網域e2308.me.ncu.edu.tw -> 確定 -> 回到選擇使用者或群組 -> 進階 -> 立即尋找 -> 選擇308user -> 物件名稱會顯示308user(308user@ActDir.me.ncu.edu.tw)
表示網域的使用者308user -> 確定 -> 移除掉本機端的308user(只留網域端的使用者) -> 確定修改 拒絕本機登入 -> 新增使用者或群組 -> 位置 -> 使用Server端的Administrator帳號密碼認證
選擇本機 -> 確定 -> 回到選擇使用者或群組 -> 進階 -> 立即尋找 -> 選擇308user(本機端) ->確定
本機電腦原則 -> 電腦設定 -> Windows設定 -> 安全性設定 -> 本機原則 -> 安全性選項修改 互動式登入:先前網域控制站無法使用時的登入快取次數
改成0 (不要快取登入)修改 互動式登入:給登入使用者的訊息本文
修改 互動式登入:給登入使用者的訊息標題
本機電腦原則 -> 電腦設定 -> 系統管理範本 -> 系統 -> 登入啟用 自動使用傳統式登入
在電腦啟動及登入時要等待網路啟動套用後儲存
本機設定完畢,重開機,GHOST吧
FAQQ : 您的電腦無法加入網域。因為您已經超過這個網域所允許建立的電腦帳戶上限。請連絡您的系統管理員, 重設或提高這個限制。
注意:當您將 10 部工作站加入至網域時,才會出現此錯誤訊息。
發生的原因根據預設值,Windows 2000 與 Windows XP 會將「加入工作站至網域中」的特權授予 Authenticated Users 群組。啟用此特權時,已驗證的使用者可以略過存取控制清單 (ACL) 的檢查,次數可多至預先定義的最大值。為了避免發生
濫用的情形,根據預設值,任何已驗證的使用者可以加入的電腦帳戶的最大數目是 10 個。

解決方案若要解決此問題,請使用適當的方法。
方法 1:預先建立使用者的電腦帳戶從「Active Directory 使用者和電腦」嵌入式管理單元開始,在包含帳戶的容器上按一下右鍵。按一下 [新增],然後按 [電腦]。
在 [電腦名稱] 方塊中,輸入您想要加入至網域的 Windows 2000 或 Windows XP 電腦的名稱。
確認此電腦名稱也輸入 [電腦名稱 (Windows 2000 前版)] 方塊中 (這應該會自動輸入)。按一下 [變更]。選取要將此部電腦加入網域的使用者或群組,然後按一下 [確定]。如果您要讓 Windows NT 4.0 與舊版的作業系統使用此電腦名稱物件,請按一下選取
[允許 Windows 2000 前版電腦使用這個帳戶] 核取方塊,然後按 [確定]。
方法 2:將「建立電腦物件」與「刪除電腦物件」存取控制資料項目 (ACE) 授予使用者從「Active Directory 使用者和電腦」嵌入式管理單元開始,按一下 [檢視] 功能表上的 [進階功能],這樣在您按一下 [內容] 時,[安全性] 索引標籤就會顯示。在 [電腦] 容器上按一下右鍵,然後按 [內容]。在 [安全性] 索引標籤上,按一下 [進階]。在 [使用權限] 索引標籤上,按一下 [Authenticated Users],然後按 [檢視/編輯]。 注意:如果 Authenticated Users 群組沒有列出來,請按一下 [新增],將此群組加入使用權限項目清單。確認 [套用在] 方塊中有顯示出 [這個物件及所有的子物件] 選項。從 [使用權限] 方塊,按一下選取 [建立 電腦 物件] 與 [刪除 電腦 物件] ACE 旁邊的
[允許] 核取方塊,然後按 [確定]。
方法 3:覆寫已驗證的使用者可以加入至網域的電腦數目之預設限制您可以使用下列其中一種方法覆寫此預設限制:使用 Microsoft Windows 2000 Resource Kit 隨附的 Ldp (Ldp.exe) 工具。使用 Active Directory Services Interface (ADSI) 指令碼增加或減少 Active Directory ms-DS-MachineAccountQuota 屬性的值。



.msgcontent .wsharing ul li { text-indent: 0; }



分享

Facebook
Plurk
YAHOO!


facebook yahoo msn google

2011年12月26日 星期一

〃☆表情符號

dfgfg dfg sdfsdf dfgfg fdgdf 


〃☆表情符號

:)微笑
:(難過
;)眨眼
:D高興
;;)眨眼
>:D<擁抱
:-/困擾
:x愛意
:">害羞
:P吐舌頭
:-*親親
=((心碎了
:-O驚訝
X(生氣
:>沾沾自喜
B-)酷喔
:-S擔心
#:-S呼~
>:)惡魔來了
:((嚎啕大哭
:))開懷大笑
:|忠厚老實貌
/:)臭屁
=))笑倒在地
O:)天使
:-B老古板
=;大家都一樣啦
:-c打給我吧 - 新!
:)]電話中 - 新!
~X(我受夠了! - 新!
:-h掰掰囉 - 新!
:-t停停停! - 新!
8->我也好想要喔 - 新!
I-|快睡著了
8-|呃...
L-)歹勢歹勢
:-&生病了
:-$這是秘密
[-(不跟你說
:O)小丑
8-}別笨了
<:-P歡欣鼓舞
(:|是喔
=P~流口水
:-?我想想看
#-o是這樣喔
=D>掌聲鼓勵
:-SS嚇死我了
@-)目瞪口呆
:^o騙人騙人
:-w不耐煩了
:-<唉
>:P哼
<):)帥喔


.msgcontent .wsharing ul li { text-indent: 0; }



分享

Facebook
Plurk
YAHOO!


123456789

〃☆辦公室偷情

fdggg dfgfg fdgdf fggg sddsf 


〃☆辦公室偷情
辦公室偷情
<趁老闆講電話的時候趕快跟辦公室的秘書親嘴(按住滑鼠左鍵不放)不要被老闆抓到哦!分數愈高有不同的結局,時間限定在早上九點到下午五點!>http://game.coden.ntt.com/contest/work/36/36.html



.msgcontent .wsharing ul li { text-indent: 0; }



分享

Facebook
Plurk
YAHOO!


123456789

〃☆成為癮君子國二是關鍵~國衛院:親友抽菸及憂鬱者居多

fggg dfg fdggg fdgdf dfgfg 


〃☆成為癮君子國二是關鍵~國衛院:親友抽菸及憂鬱者居多
台灣青少年抽菸問題不小,根據統計,國中及高中職生的抽菸率將近兩成,而一項最新的研究更發現,國中2年級是孩子開始養成抽菸習慣的最危險階段,尤其若家中父母親、好朋友抽菸,且自覺憂鬱者,是易抽菸的高危險族群。抽菸反而與功課好不好、單親、家庭經濟沒有顯著關係。
過去往往認為壞學生才抽菸,青少年抽菸應與功課好壞、父母離異或家庭經濟因素有關,但國家衛生研究院衛生政策研發中心今天(30)發表一項「學童吸菸發生率及其影響因子」研究指出,父母與好朋友是否抽菸,才是影響學童抽菸的最重要原因。
國衛院從2001年開始,長期追蹤2545名、當時還是國小4年級的學生,追蹤時間長達年,目前所有追蹤對象都已經升上國中3年級,未來將繼續追蹤下去。
台大衛生政策與管理研究所教授李蘭指出,研究發現,這些原本不抽菸的小學生,每年約有3%到4%的學生會開始抽菸,值得注意的是,升上了國中二年級後,比率大幅攀升至7%,人數成長近1倍,顯示國中2年級是最危險的年齡。
研究也推翻了過去總將抽菸與壞學生畫上等號的刻板印象,因為研究分析學生的課業表現、信心、家庭經濟、單親與否、父母的管教嚴厲與否等因素,都發現其中關係並不強烈。
李蘭強調,來自週遭親人及朋友的模仿,才是孩子會不會開始抽菸的主要原因,如果父母兩人都抽菸,或是學校同儕、好朋友會抽菸,那麼學童會跟著抽菸的比率也明顯較高,反之,若家中父母只有1人抽菸,或是都不抽菸,學童抽菸的機率就低。除了外在環境之外,分析個人特質發現,前1年顯得有些憂鬱的孩子,隔年開始抽菸的機會也增加。男學生也較女學生容易開始抽菸。
國內成人吸菸人口已逐漸下降,由2002年的489萬人,下降至今年6月的400萬人,不過,青少年的吸菸行為卻反而有增高趨勢。李蘭認為,不希望孩子學會抽菸的壞習慣,家長要從自己先做起。


.msgcontent .wsharing ul li { text-indent: 0; }



分享

Facebook
Plurk
YAHOO!


123456789

隨時 隨性 隨遇 隨緣 隨喜

fggg sddsf fdggg sdfsdf fdgdf 


隨時 隨性 隨遇 隨緣 隨喜
沖到哪兒,順其自然 ; 把握機會,就在哪兒發!
三伏天,禪院的草地枯黃了一大片。「快撒點草種子吧!好難看哪!」小和尚說。「等天涼了。」師父揮揮手:「隨時!」
中秋,師父買了一包草籽,叫小和尚去播種。秋風起,草籽邊撒、邊飄。「不好了!好多種子都被吹飛了。」小和尚喊。「沒關係,吹走的多半是空的,撒下去也發不了芽。」師父說:「隨性!」
撒完種子,跟著就飛來幾隻小鳥啄食。「要命了!種子都被鳥吃了!」小和尚急得跳腳。「沒關係!種子多,吃不完!」師父說:「隨遇!」
半夜一陣驟雨,小和尚早晨衝進禪房:「師父!這下真完了!好多草籽被雨沖走了!」「沖到哪兒,就在哪兒發!」師父說:「隨緣!」
一個星期過去。原本光禿的地面,居然長出許多青翠的草苗。 一些原來沒播種的角落,也泛出了綠意。小和尚高興得直拍手。 師父點頭:「隨喜!」隨不是跟隨,是順其自然,不怨懟、不躁進、不過度、不強求。
隨不是隨便,是把握機緣,不悲觀、不刻板、不慌亂、不忘形。

人們時常會有順其自然的想法,但是能夠把握機緣的並不多。
隨遇而安是坦然的態度,但是遇到好的機緣一定要能把握住。



.msgcontent .wsharing ul li { text-indent: 0; }



分享

Facebook
Plurk
YAHOO!


123456789

2011年12月25日 星期日

FW:喝牧草汁成了新興的生機飲食風,但醫師提醒腎功能不佳者宜節制少喝

sdfsdf fggg dfgfg fdgdf dfg 


FW:喝牧草汁成了新興的生機飲食風,但醫師提醒腎功能不佳者宜節制少喝
三餐喝牧草汁終身洗腎 2006/12/06 聯合晚報/記者李樹人

強調可以養身的生機飲食,卻可能讓腎臟功能較差的民眾終身洗腎,一名46歲男子在親友介紹下飲用牧草汁,三餐各喝一杯。不料,才喝了一周就出現尿毒症狀,必須洗腎,維持腎功能。

新光醫院腎臟科主治醫師江守山表示,除了牧草汁之外,最近也收治了一名在證券公司擔任經理的中年男子,在喝了幾天的小麥汁之後,體內的鉀離子含量竟然高達8.9,差點死掉。緊急洗腎之後,才挽回一命。

江守山強調,對於大部分的民眾來說,生機飲食的確是不錯的選擇,但腎臟功能不佳的人一定須忌口,不得隨便飲用,否則將嚴重影響腎功能,原本只需門診追蹤,最後落得終身洗腎下場。

一名男子原本腎功能就不好,長期以來,定期回診檢查,不料,最近病情突然惡化,腎臟幾乎喪失了功能,必須到洗腎的地步。

在醫師的追問之下,他才表示,熱心親戚朋友介紹他飲用牧草汁,據說透過生機飲食,可以排出體內毒素,減輕腎臟的負荷,達到治療效果。

原本以為牧草汁應該有助於身體健康,於是一天喝三杯,沒想到,連續喝了一個星期,就出現問題,居然喝出嚴重的尿毒症,必須一輩子洗腎。

經過進一步檢驗,在該名病患的腎臟中發現了罪魁禍首--過量的草酸。江守山指出,牧草含有豐富的草酸,平常人飲用之後,不會有副作用,對腎臟功能不好的民眾來說,草酸卻有如毒藥,嚴重傷害腎臟組織。

江守山提醒,腎功能不好的人盡量少吃楊桃、柑橘、蕃茄、柳丁、香蕉及奇異果等含豐富鉀離子食物,至於牧草汁、小麥汁則含有草酸,千萬不可隨意飲用。
喝牧草汁成了新興的生機飲食風,但醫師提醒腎功能不佳者宜節制少喝



.msgcontent .wsharing ul li { text-indent: 0; }



分享

Facebook
Plurk
YAHOO!


123456789

2011年12月24日 星期六

”名字” 專挑高難度情人

dfg fggg sdfsdf dfg dfgfg 


”名字” 專挑高難度情人
【愛上有夫之婦或有婦之夫】 姓氏劃數 15 例:鄭劉蔡潘蔣鄧歐黎衛…. 名字劃數16.17.18.20.24.25.27.28 解析:這種筆劃數的人喜歡對象比較有特別或是有力量的人,所以結交的對象通常已婚的機會比較大,常常容易成為第三者。
【喜歡跟有錢人或名門望族談戀愛】 姓氏劃數 13 例:楊葉詹萬賈楚葛路….. 名字劃數 9.12.17.20.25.28 解析:這種筆劃數的人嫁給名門望族以及有錢人的機會很大。
【專挑帥哥美女】 姓氏筆劃 12 例:黃曾彭程辜馮賀焦游傅….. 名字劃數 11.12.15.17.21.23.27 解析:這種筆劃數的人結交的對象一定外貌要長的優,也就是所謂的帥哥美女,這種筆劃數的女生會為對象付出,而男生如果金錢充裕就會桃花很多,比較花心。
【喜歡跟年紀差距大的人戀愛】 姓氏筆劃 19 例:羅關龐譚…. 名字劃數 12.18.20.26.28
解析:這種筆劃數的人通常有戀母情節或者戀父情節,為了愛情往往犧牲很多。
123456789

2011年12月22日 星期四

甜蜜果實

dfg sdfsdf fggg sdfsdf fdgdf 


甜蜜果實
5月17日
終於要放手了~這幾天都一直在調適自己的心情
雖然心裡很捨不得,但一直在鼓勵自己,放開是為了讓自己的心更寬
已經五年了,這裡擁有許許多多的回憶與成長~心裡也很感謝自己擁有過
無論甘與苦~都是自己的回憶裡的甜蜜果實~
下個禮拜一要簽合約了,這裡很快就不再屬於我了
不過沒關係~捨得是為了選擇更好的~
也或許心裡有著更甜蜜的負荷,所以一切也都隨之放寬了
以後的生活會有很大的改變,心裡多少會有點害怕,
但我能確信的是某人會陪伴在我身邊一起渡過的
所以相信的力量會是帶著我過幸福的日子
我~小橘子~會更懂得惜福與珍惜~身邊的一切人事物
加油~
123456789

2011年12月21日 星期三

[雜記] 遷移 ,,

sddsf fdgdf fggg dfg sddsf 


[雜記] 遷移 ,,
本部落格遷移至無名部落格
網址 http://www.wretch.cc/blog/candy12870
 


.msgcontent .wsharing ul li { text-indent: 0; }



分享

Facebook
Plurk
YAHOO!


123456789

2011年12月18日 星期日

? 摁 * 好煩噢ˇ

dfgfg sddsf fdgdf sdfsdf sddsf 


 ? 摁 * 好煩噢ˇ
最近一直在猶豫
該不該換回無名勒?
無名比較方便
(yahoo也不錯)
yahoo比較有人情味
可是可是...
我捨不得拉
無名有照片
yahoo的人氣很不真實...
來點建議芭
please



.msgcontent .wsharing ul li { text-indent: 0; }



分享

Facebook
Plurk
YAHOO!


123456789

? 今天你要嫁給我 :: Jolin * 陶吉吉

fggg fdggg fdgdf dfg sdfsdf 


 ? 今天你要嫁給我 :: Jolin * 陶吉吉
陶喆:春暖的花開帶走冬天的感傷 微風吹來浪漫的氣息每一首情歌忽然充滿意義 我就在此刻突然見到你Jolin:春暖的花香帶走冬天的淒寒 微風吹來意外的愛情鳥兒的高歌拉近我們距離 我就在此刻突然愛上你合唱:聽我說 手牽手跟我一起走 創造幸福的生活昨天你來不及 明天就會可惜 今天嫁給我好嗎RAP:Jolin in the houseD.T. in the houseJolin in the houseD.T. in the houseJolin in the houseD.T. in the houseOur love in the house陶喆:夏日的熱情打動春天的懶散 陽光照耀美滿的家庭每一首情歌都會勾起回憶 想當年我是怎麼認識你Jolin:冬天的憂傷接續秋天的孤單 微風吹來枯了的思念鳥兒的高歌唱著不要別離 此刻我多麼想要擁抱你合唱:聽我說手牽手 跟我一起走 過著安定的生活昨天你來不及 明天就會可惜 今天你要嫁給我聽我說手牽手 我們一起走 把你一生交給我昨天不要回頭 明天要到白首 今天你要嫁給我RAP:叮咚 聽著禮堂的鐘聲 我們在上帝和親友面前見證這對男女現在就要結為夫妻 不要忘了這一切是多麼的神聖你願意生死苦樂永遠和他在一起愛惜他 尊重他 安慰他 保護著他兩人同心建立起美滿的家庭 你願意這樣做嗎? Yes,I do合唱:聽我說手牽手 一路到盡頭 把你一生交給
我昨天已是過去 明天更多回憶 今天你要嫁給我今天你要嫁給我 今天你要嫁給我


.msgcontent .wsharing ul li { text-indent: 0; }



分享

Facebook
Plurk
YAHOO!


123456789

我對顛覆空間的規劃以及想法

fggg sddsf dfg dfgfg fdgdf 


我對顛覆空間的規劃以及想法
        又為什麼名為「顛覆空間」?         到底要帶來怎麼樣的驚奇和收穫?                 故事的緣起:         六七零年代,台灣的影藝文化,在全世界佔有一席之地,在亞洲更是首屈一指。曾幾何         時,台灣的傳播藝術在亞洲漸趨式微,殞落在你我不知不覺之中,剩下李安導演還在世         界舞台上,孤軍奮戰,用一己之力為台灣的影視藝術發聲!         難道,台灣的娛樂藝術,真的無法跟世界競爭了嗎?從李安的故事,我們得到答案,就         是「有為者亦若是」。         我們必須承認,台灣的影視娛樂相關行業,         決定一個國家是否偉大,絕對不是武力、領土強盛,真正讓一個國家變偉大,靠的是文 &nbs
p;       化。文化靠得正是人民意識的發揮。         近十年來,南韓勢力興起,要知道南韓是處在全世界最危險的區域之一,她們到底憑藉         什麼創造出眩人的光彩?         首先,她們在科技上有舉足影響力,你站在世界的任何地方,幾乎都可以看到代表韓國         品牌的科技商品。然而這不過是讓她們變得不容忽視;真正偉大,是她們政府與民間有         計畫輸出韓國精神文化。南韓電影、戲劇成為新一波輸出的元素。         你可以看到她們在影片中注入一股民族性元素,就是韓國人堅毅奮鬥、溫情敦厚、甚至         風趣的一面。         反觀我們,許多藝術人才,苦無表現的空間,無論是電影、戲劇被少數財團操弄、掌握,         只有使用她們的遊戲規則,否則就沒
有機會出頭。政府的漠視和默許,輕視藝術文化影         響力,缺乏大格局、大眼光,凡事「泛政治化」的結果,人才沒有出路,造成藝術文化         乏人問津。         然而,藝術文化原本就是民間最重要的資產,具有沛然莫之能禦的力量,尤其國人堅強         的生命力、逆境向上奮發的民族特性、溫和親切、相互關懷的特質,更是這個文化需要         被大大讚揚的地方。         我們只能說,這是一個小蝦米奮鬥的故事,民間的力量要撼動長期無能的政府力量,和         唯利是圖的鉅大財團。我們要發掘周邊的故事,更要鼓勵大家奮鬥、相互關懷與支持的         力量,要發揮堅韌的生命力。         顛覆空間首創顛覆電影院,這是鼓勵有企圖心的人,無論是製片攝影師導演員等……,     &nbs
p;   可以將所創作的作品呈現的地方,雖然,這不像大戲院大氣魄,卻是以小搏大的最好寫         照。藝術有創作有發表的空間,我們期待鼓勵更多有志於創作的人,勇敢的、有計畫的         走出自己成長的歷程。         星光大道,這些人目前都不是大紅大紫,卻是一群值得鼓勵的新生命,藉由網站的平台,         除了累積自己表演的作品,也學習著讓自己成長、         新秀舞台,每個人都有一座舞台,在舞台上扮演不一樣的角色,無論是為自己的小孩,         用影像寫下不一樣的童年回憶,也鼓勵幼年青少年,為自己負責,健康成長的學習環境         ,甚至是一些年輕人想要往藝術演一方面發展的年輕人,在沒有所謂的人脈背景,依然         可以循著正確的軌跡,         所以,網站為什麼叫做
顛覆?因為要為演藝文化提供一個不同以往的制度,要走平民的、         充滿希望又正確的一條路。空間,象徵著無限的寬廣,沒有界線,有如你的人生,永遠         具有冒險與變化,除了你自己,誰都無法限定它的發展。同時,這是每個人都可以自由         呼吸,相互鼓勵灌溉的園地。         你是怎麼來到這個網站的呢?         透過「顛覆」?那你是來對地方,因為你是不受傳統束縛,充滿熱情、勇敢奮鬥的人!         演員:演員是藝術表現最外在的元素,好的編劇寫出好的劇本,要有製作人、導演、攝         影等等幕後工作人員,最後要靠專業的演員,去全是劇中的角色,如此才能讓觀看影片         的人,受到感動。         廣告:是的,廣告是最小巧精緻的意念傳達,一部廣告影片,要靠所有人努力才能成事
。         網路票選:         影片:         想要成為明星:         無論採取的是怎麼樣的管道來到這個網站,         你一定要知道,你所要獲得的東西!         當你來到顛覆空間,你可以得到什麼?         顛覆空間,了解您的需求之後,如何提供一條正途?         如何提供您生涯規劃的建議?         當你來到顛覆空間,有哪些驚奇?有哪些收穫?


.msgcontent .wsharing ul li { text-indent: 0; }



分享

Facebook
Plurk
YAHOO!


123456789

FW:喝牧草汁成了新興的生機飲食風,但醫師提醒腎功能不佳者宜節制少喝

fggg dfg fdgdf dfgfg sdfsdf 


FW:喝牧草汁成了新興的生機飲食風,但醫師提醒腎功能不佳者宜節制少喝
三餐喝牧草汁終身洗腎 2006/12/06 聯合晚報/記者李樹人

強調可以養身的生機飲食,卻可能讓腎臟功能較差的民眾終身洗腎,一名46歲男子在親友介紹下飲用牧草汁,三餐各喝一杯。不料,才喝了一周就出現尿毒症狀,必須洗腎,維持腎功能。

新光醫院腎臟科主治醫師江守山表示,除了牧草汁之外,最近也收治了一名在證券公司擔任經理的中年男子,在喝了幾天的小麥汁之後,體內的鉀離子含量竟然高達8.9,差點死掉。緊急洗腎之後,才挽回一命。

江守山強調,對於大部分的民眾來說,生機飲食的確是不錯的選擇,但腎臟功能不佳的人一定須忌口,不得隨便飲用,否則將嚴重影響腎功能,原本只需門診追蹤,最後落得終身洗腎下場。

一名男子原本腎功能就不好,長期以來,定期回診檢查,不料,最近病情突然惡化,腎臟幾乎喪失了功能,必須到洗腎的地步。

在醫師的追問之下,他才表示,熱心親戚朋友介紹他飲用牧草汁,據說透過生機飲食,可以排出體內毒素,減輕腎臟的負荷,達到治療效果。

原本以為牧草汁應該有助於身體健康,於是一天喝三杯,沒想到,連續喝了一個星期,就出現問題,居然喝出嚴重的尿毒症,必須一輩子洗腎。

經過進一步檢驗,在該名病患的腎臟中發現了罪魁禍首--過量的草酸。江守山指出,牧草含有豐富的草酸,平常人飲用之後,不會有副作用,對腎臟功能不好的民眾來說,草酸卻有如毒藥,嚴重傷害腎臟組織。

江守山提醒,腎功能不好的人盡量少吃楊桃、柑橘、蕃茄、柳丁、香蕉及奇異果等含豐富鉀離子食物,至於牧草汁、小麥汁則含有草酸,千萬不可隨意飲用。
喝牧草汁成了新興的生機飲食風,但醫師提醒腎功能不佳者宜節制少喝



.msgcontent .wsharing ul li { text-indent: 0; }



分享

Facebook
Plurk
YAHOO!


123456789

2011年12月17日 星期六

AIR JORDAN 讓我瞧 -- AIR JORDAN XX3

dfg dfgfg fdgdf fdggg sdfsdf 


AIR JORDAN 讓我瞧 -- AIR JORDAN XX3
AIR JORDAN XX3
1985年,整個世界都注視著喬丹鞋的問世-- 白、紅、黑相間的時尚宣言,昭示著運動鞋產業的革新,就像喬丹加入NBA的第一年,原創的喬丹鞋 AIR JORDAN I 展開了它傳奇的歷程。從街頭籃球發源地紐約洛克公園到林蔭大道,從好萊塢到華爾街,喬丹鞋一直是最受歡迎且最昂貴的豪華籃球鞋,球鞋愛好者認為它催生了收藏市場,只要新一代或新顏色的喬丹鞋一上市,各地許多的狂熱者便會搶著排隊來採購。
2008年,經過23代的改良,喬丹品牌推出了實至名歸的 " 有史以來最偉大籃球鞋 " AIR JORDAN XX3,再次成爲全世界矚目的中心。
對於每款喬丹鞋而言,創意靈感是最重要的關鍵。例如,AJ22 源自F-22噴氣式戰鬥機、AJ13 源自黑豹、AJ14 源自法拉利M550跑車。AJ23 蘊含了喬丹與Nike創意設計與特殊專案副總裁Tinker Hatfield的信念: 一定要是有史以來最卓越的籃球鞋,為了達成這個目標,採用了最新最先進的技術--
Nike Considered:‧ AJ23 是Nike公司首款根據Nike Considered設計理念打造的籃球鞋。‧ AJ23 的設計盡可能地減少浪費,並採用了溶劑型接著劑。‧ 熱電塑料聚氨酯橡膠(TPU)鞋墊後部的自動推動的質量塗裝工藝是由高效機械臂完成的,保證了塗層與部件的質量、牢度與耐用性。‧ 大底採用的環保橡膠可以減少毒性,並採用了Nike Grind材料,這種材料是由鞋底製造期間産生的廢料製成而成。
‧ 球鞋的構造強調了環保材料的使用。
鞋面:‧ 由專利申請中的新型的線跡縫紉機縫制3維鞋面。‧ 雙密度鞋墊。‧ 鞋跟部位採用內層雙密度緩慢復原的泡綿,適應足形、更加合體。‧ 一次壓模成形的Phylon中底。‧ 全掌平滑內層鞋套可以增加舒適性,同時使鞋形更顯流暢。‧ 鞋領/鞋舌內襯採用Nu-foam材料,增加低筒球鞋的舒適性。‧ 新型填絮的圖案塑模內襯提供卓越的足弓支撐。‧ 加強的鞋腰面板準確構成並保持鞋楦形狀,使合體效果達到最佳。‧ 透氣鞋舌可以讓空氣逸出,使足部保持更加乾爽。
‧ 構造成型期間,鞋面經過兩次輪胎壓床於鞋楦上,使鞋面形狀與鞋楦形狀完全吻合。
中底/大底:‧ 全掌Zoom Air及全掌I.P.S.系统提供卓越的避震性。‧ 碳纖維材料的鞋骨承托板增加重要部位的結構與支撐。‧ 性能卓越的TPU鞋墊增加穩定性與支撐。‧ 重量輕 – 15盎司。‧ 中底厚度最小的籃球鞋之一(後跟19mm,前掌9mm),使球員的足底盡量接近並感受球場地面。‧ 鞋骨承托板直接墊入TPU鞋墊模,TPU直接壓模於整個承托板之上。‧ 最有效的製造工藝,可以增加耐用性、減少浪費、減少溶劑型接著劑的使用,這是功能性鞋品的創新。
‧ 高級避震系統包含低統 I.P.S. 系統,在後跟部位配有較大的軟墊,並與前掌的低筒改良 I.P.S. 結合。
特殊設計功能:‧ 大底上有喬丹的指模摩擦力壓印。‧ 精準的縫線展現後跟外部鹿皮縫線。‧ 鞋尖部位有喬丹的簽名。‧ 高性能TPU支撐。‧ 鞋舌內襯背後有喬丹的拇指紋。
‧ 手工製作的喬丹縫線圖案突顯精致細節與功能性。
此外,為了紀念23這個代表喬丹球衣背號的數字,從23代之後,每年推出的新款喬丹鞋就再也不以幾代來做名稱。
2008年4月29日,山貓聘請喬丹的紐約布魯克林老鄉兼北卡大老學長 Larry Brown
來當山貓的總教頭。( 又是靠關係!? )
Larry Brown這人當教練的事蹟太多了! 有早年的內線交易(他當大學教練的事)、帶過Miller和Iverson這樣的大牌(最後皆失和)、2004年總冠軍賽帶著活塞藍領兵打垮花美男四唬人組(他是很會練防守的教練,馬刺現在的總教練 Gregg Popovich 就曾經是他的高徒!)、背叛活塞奔向尼克(當年尼克給他教練史上的最高薪資)、還把尼克教到尼克史上最爛戰績(23勝59負)、每次離開一支球隊都一定會和一堆人撕破臉(球員或管理階層到大老闆,通通有鬧翻過!)。
奇怪了? 喬丹難道不清楚Larry Brown這老頭子的人品之不忠不義嗎?
順道聊一件事,2008年夏天,喬丹在一個小朋友籃球營做教學。
小朋友問了喬丹一個問題:
" 如果你跟Kobe PK的話,誰會贏呢? "
喬丹回答:" Kobe會贏,因為相較起來,我老了~ 可是如果在我的全盛時期,他還不具挑戰性! 我可以防住他,但他不能防住我。"
AIR JORDAN 不朽傳奇 in 西門町 2008
It's not about the shoes. 重要的 不是這雙鞋
It's about knowing where you're going. 而是知道要往何處前進
Not forgetting where you started. 卻沒忘記自己來自哪裡
It's about having the courage to fail. 而是擁有面對失敗的勇氣
Not breaking when you're broken. 遭受打擊卻依然堅定
Taking everything you've been given. 發揮所有潛力
And making something better. 成就更出色的自己
It's about work before glory. 重要的 是榮耀來臨之前的努力
And what's inside of you. 以及內心深處的信念
It's doing what they said you can't. 無關別人是否相信
It's not about the shoes. 重要的 真的不是這雙鞋
It's about what you do in them. 而是穿上它之後的你
It's about being who you were born to be. 勇敢作你自己
Michael Jordan -- 祂是偉大的籃球之神、舉世無雙的飛人,祂的傳奇故事與歷史地位永遠無人能取代,祂降臨給信徒們的美好回憶與驚奇神蹟也絕對無法磨滅!
123456789

患難見真情

sddsf dfgfg fggg dfgfg dfg 


患難見真情
利用婚假的剩餘幾天去北載河 、 秦皇島好好玩一玩 ,兩張火車票已經買好了,就放在床頭櫃上 。然而,就在這一天的晚上,他們所在的唐山市發生了舉世震驚的唐山大地震 。當妻子掙扎著睜開眼睛時 , 周圍漆黑一片 , 彷彿整個天空都坍塌下來一般 。 樓板落了下來 , 壓在年輕的丈夫身上 。 他們被困在了裡面,年輕妻子絕望了 。他們仰臉躺在床上,用兩個人的四肢手臂一起向上推那快水泥板 , 試圖把它推開。然而失敗了,水泥板像焊在那裡一樣,紋絲不動 。年輕丈夫鼓勵妻子別怕,過一陣子會有人來救他們的 。 妻子告訴年輕丈夫:"只要在你身邊,我什麼都不怕 。"妻子用手向另一側摸去,幻想能摸到一線生機的希望 , 但只有水泥板、磚塊 … …妻子幾近絕望,生命的支柱一瞬間像房屋一樣坍塌了 。 事情還沒有做完,今後的路應該很長,對,還有北載河 、秦皇島、還有那兩張車票,就放在床頭櫃上 。車票,使妻子產生了新動力和勇氣,於是繼續摸索 。床頭櫃──車票──妻子真的觸摸到 一張硬紙板,真的是車票!妻子非常高興,把車票攥在手裡,激動地搖著年輕丈夫的肩膀:"我找到了車票 !"年輕丈夫也很高興 :"是兩張車票 。 "妻子心頭一沉 , 只有一張 ,原來另一張車票被水
泥板牢牢地第壓住了 ,只露出極小的一角,妻子試圖把它拉出來,卻幾次都未如願 。 妻子無言答對,默 默地流淚 。年輕丈夫安慰到 :"不要緊,可以 . .再買一張 … "沈重的水泥版一端壓在年輕丈夫身上,一端壓在床頭櫃的車票上 ,兩個支點為妻子留下了一塊賴以生存的空間 , 也不知道外面的世界發生了什麼變化 ,除了一張車票和一個年輕丈夫,妻子什麼都沒有 , 就連一點點生的希望都在漸漸稀釋、融化。 飢餓、乾渴使得妻子幾乎都想放棄 。似乎年輕妻子丈夫已經意識到了妻子的信念正在一點一點地崩潰 , 並開始向妻使述說他們未來的旅程,講述外面的美景:美麗的北載河、迷人的西雙版納 … … 一種無形的力量在妻子體內湧動 ,一個生命的光環在眼前擴散,越來越大,越來越亮 。 年輕丈夫用生命的餘暉,為妻子點燃一支希望的蠟燭 , 這支蠟燭一直照亮著妻子走出地獄之門 , 重返光明的人間 。 一天清晨,壓在他們頭頂的水泥版被掀開了 ,妻子被救了出來 。 當妻子急急地爬到年輕丈夫身邊時 ,映入眼簾的一幕突然間讓妻子變傻了 : 丈夫的右半邊身體完全被砸成了肉泥 ,殷紅的血凝固在廢墟的石堆裡 。 年輕丈夫只看了妻子一眼,嘴角滲出了一絲淺淺的笑紋,就閉上了雙眼 。 年輕丈夫以最頑強的精神
、最堅韌的毅力和最深切的愛戀 , 陪伴和激勵妻子度過了最艱難、黑暗的三個晝夜,安心走了。 年輕的丈夫走了,他的一份身深的愛卻讓妻子享受一輩子 。愛情需要精心呵護,更需要堅強的意志來保證。當我們擁有愛情時 ,我們不懂得愛情,當我們懂得愛情時,我們已經沒有了愛的能力了....


.msgcontent .wsharing ul li { text-indent: 0; }



分享

Facebook
Plurk
YAHOO!


123456789

採柳丁囉

fggg fdgdf fdggg dfg dfgfg 


採柳丁囉
2005 12 18 我今天一早就被媽咪給吵醒了,因為我們今天要到山上去採柳丁,雖然不是第一次看到柳丁園,不過對於採柳丁的經驗,我小雨點算是第一次囉!  主要是今天,嬸婆家的小孩都沒有回來鄉下,我也就沒有其他的玩伴可以一起玩。  這座柳丁園,是二姑爺爺家的,二姑爺爺很會種柳丁,他還是縣農會的代表,聽說他前一天才接受過新聞台的訪問,大概兩三年前,那時候柳丁的價格還不錯,現在就差很多了,收成多了,但是收入卻沒有增加,但是你仍然可以看到大家仍然快樂的工作著,我想這就是鄉下人有趣可愛的地方吧!  山上你可以聽得到鳥的叫聲,有時候他就出現在你的旁邊,很好玩的,媽咪幫我扎上頭巾,看起來像名小村婦,一開始我只是幫忙提提柳丁桶,我大概可以提五六顆柳丁,我覺得不過癮,我看大家剪柳丁的樣子很好玩,所以姑婆給我一支剪刀,嗯!這種嘎喫的感覺,比起剪紙片更加有趣多了。  我還爬到樹上去喔,我坐在樹枝上,喊把拔!(把拔是負責將我們採收下來的柳丁,搬到農機車,然後載到馬路上,秤重量,然後再由爺爺將整車的柳丁載回家!) 「把拔!你知道我在哪裡嗎?」  「耶!小于荷在哪裡?」把拔循著聲音,蹲在樹下
找,他哪裡想到我是坐在樹上耶,「哈!哈!把拔,我在樹上啦!」  「喔,妳爬到樹上去囉,要小心點喔!」  「把拔就是緊張,我當然會注意的啊!」我心裡想。  這時候發生了一件事情,就是叔叔不小心把手指頭給剪了,流了好多血,大夥都給意見,結果叔叔說:「趁機休息一下也不錯喔!」  我們一直忙到大約黃昏,大概是四點半,山上天暗的比較快,把拔說,像塊黑幕整個往山頭上罩住,有時候妳爬過另一座山頭,妳又會看到美麗的夕陽喔!
 


.msgcontent .wsharing ul li { text-indent: 0; }



分享

Facebook
Plurk
YAHOO!


123456789

攝影者的自我影像

fdgdf sddsf fdggg dfg fggg 


攝影者的自我影像
攝影者的自我影像←廢話真多,自拍就自拍嘛!搞什麼文言文.......
本來想要蒐集個100張自拍再來發這篇文不過今天在澀卡布
兄盛情的邀請下起因是澀卡布
兄看到了色彩喵的瘋足球然後寫了一篇娛樂自己(←以上兩段話絕對是置入性行銷
然後希望大家共襄盛舉
把自己的『攝影者的自我影像』PO出來跟大家分享
這根本就是一種變相的『部落格接力』←大家看到這個名詞有沒有很害怕的感覺?什麼,星爺
,沒有是吧!?好吧!那下一棒就是你
了!
恭喜你又莫名其妙中招了!
咱們的規矩很簡單
請貼出自己最滿意的臉部自拍照
任何形式表現都可以
擋住不擋住臉
就看『誠意』啦!
當然
最重要的
請在完成後指定下一棒接力的人
←這是色彩喵最喜歡的部分!
先來一張在台北的淡水捷運站廁所內拍的.......(疑..色彩喵不是一直提醒別人捷運是不能拍照的嗎?忘了告訴大家,I am a rule breaker

這是在長春路的一間非常棒的餐廳裡面的廁所拍的.......

這位老喵的肚子有點大喔.......
一個人在廁所裡自拍實在太無聊
特別請咪咪夫人也來參一腳(疑...這是男廁ㄟ.....

自從開始用底片拍照就很少見的20D與我.................

呵呵呵呵........
大家知道這張照片裡面誰是誰嗎?

這到底是在拍自己還是在偷拍啊!
最後....來一張不是自拍的....(疑,不是說『攝影者的自我影像』=自拍嗎?..............傻孩子,色喵剛才已經說過了,I am a rule breaker
色彩喵很有『誠意』喔!接下來....星爺
123456789

色喵版部落格愛情故事接力 ~ 人海中的尋覓(9)

sdfsdf fdggg fdgdf fggg sddsf 


色喵版部落格愛情故事接力 ~ 人海中的尋覓(9)
本文接續色喵版部落格愛情故事接力 ~ 人海中的尋覓(1), (2), (3), (4), (5), (6), (7), (8)
其實兩人忙了一個晚上,小愛此時已經覺得很累,正在盤算著,接下來回家的路程,自己會有多麼地想睡覺,卻在此時聽到色彩喵
這樣問自己,不襟心裡先是一怔,直覺地看了色彩喵一眼。
「妳...不要誤會喔,我只是突然想到........現在時間真的已經很晚,如果妳住得很遠,不如........不如晚上先在我們工作室裡將就一下,如果妳不嫌棄的話,這裡面也有衛浴設備,也有可以睡覺的地方,至少妳不用這樣趕著回去。」
初時色彩喵確實是單純地這樣想著,但是現在回想起來,自己也沒有辦法相信,當時會將留小愛在工作室過夜的那段話,這樣地脫口而出。
只見小愛先是低頭看了看手上的錶,然後抬頭著色彩喵............「恩......好吧!那今晚『學妹姐姐』就在你這邊叨擾囉!」小愛微笑著說。
瞬間色彩喵心裡不知為何地湧上一股甜甜的感覺,正伸手進自己褲子的口袋要掏出工作室的鑰匙,卻尷尬地發現,自己的帳篷居然搭得如此明顯,深怕被小愛發現的他,迅速地拿出鑰匙,將工作室的門鎖打開。
小愛不忍受傷的色彩喵忍痛的樣子,移身幫他推開工作室大門,兩人的身體在此時竟然不襟地接觸,說時遲那時快,色彩喵的雙手已經輕輕地搭在小愛纖細的腰臀上,在小愛還來不及反應的瞬間,他的嘴已經輕輕地在小愛的頭上深深一吻,小愛的雙手本能反應地按在色彩喵的胸前,用一種柔而不實的力道想要推開色彩喵。
色彩喵的右手順勢穿過小愛那薄薄的制服上衣,他微微顫抖的指尖,就這樣輕輕地觸碰到,小愛細緻的背部肌膚,然後左手也跟著順勢而入,色彩喵的雙手繞過小愛的腰,十指緊扣在小愛的背後,他決定不讓小愛有反抗的餘地。
此時他的身上彷彿有一股熱火在燃燒,心臟跳動的聲音連自己都聽得見,他感受到小愛的背部肌膚是如此冷冰冰地,忍不注色彩喵的左手往上移動到了小愛的上背部,右手早已不能自己地從她制服窄裙的腰頭慢慢地向下伸入,他的唇來到了小愛的耳邊,在小愛的耳朵旁,給了她一個細細的吻。
初時小愛對色彩喵這樣大膽的舉動驚訝不已,在還來不及反應的同時,她的腰身已經被色彩喵的雙手給控制住了,幾乎就在色彩喵雙手隔著制服,觸碰到她腰頭的同時,一股莫名的心悸居然這樣湧上了小愛的心頭,讓她渾身起了肌皮疙瘩,一股麻麻的感覺,就這樣從膌椎的底部,一路酥麻到頭皮。
以她當時的人生歷練,什麼樣的男人她沒有遭遇過,她怎麼也不會相信,自己會被這樣一個,小自己五歲以上的毛頭小子給觸動了內心深處,那個禁忌的花園。
她訝異自己會有這樣的衝動,居然內心起了一種想被擁抱的渴望,小愛迫不及待地,想要馬上把身體和色彩喵靠得更緊。
一方理智的她,微微地伸出雙手,推在色彩喵的胸前,試著要用力去抵抗,可是如何卻施展不出力道,因為色彩喵那突如期來地,在她額頭深深的一吻,讓她已經不知道自己此時應該抗拒,或是就在今晚去放縱自己,做個真正的女人,完全溫柔的服從。
色彩喵緊緊地抱著小愛,當他微微地轉頭,那樣近距離、深情地看著小愛那靈動的雙眸,小愛竟也回報以柔情的眼神,兩個人的雙唇很自然的交合,那是很深的一個吻,色彩喵感覺到自己的腦汁幾乎要被小愛溫柔的吸乾。小愛的腦海沒有任何思考的細胞存在,只有原始地吸允著這個既陌生又真實的吻。
不久,色彩喵的雙唇順著小愛的下巴,溫柔地移動到她的頸子,他的雙手瘋狂地,茲意地在小愛的身上游走,此時的色彩喵巴不得能夠嚐遍小愛的每一吋肌膚。
當他的左手輕輕地扶住小愛的脖子時,他的唇已經滑了小愛的胸口,此時色彩喵雙腳已經不由自主地蹲跪下去,他的右手從小愛的腰臀輕輕地劃過她的腰際,他觸摸到了小愛的肋骨,慢慢地向上觸碰到了小愛的酥胸,那種柔軟的感覺,讓他不由自主地開始親吻起眼前的美物,小愛身上那股幽幽的體香,色彩喵每呼吸一口都是欲仙欲死。
小愛不由自主地想用手去撫摸色彩喵的臉,她身上那股酥麻的感覺漸漸地轉化成一股熊熊的烈火,她的臉部開始發熱脹紅,她任由色彩喵的雙手在自己身上無度地遊走,她享受著色彩喵的唇在在她的耳鬢廝磨,然後慢慢地吻到她的後頸部、肩膀,然後到了胸口,就在色彩喵的雙手接近她的胸口的同時,她的呼吸幾乎快要不能自己的崩潰,小愛本能的深深地吸了一口氣,身體忍不注地顫動,她用雙手抱住色彩喵的頭,讓他在自己的胸前毫無禁忌地撒野。
她開始將自己的耳朵貼在色彩喵的頭上,不由自主地磨蹭,她在享受著色彩喵在自己胸前所傳來的那份歡愉,全身酥麻的感覺和那種灼熱感,只讓她更不由自主地將色彩喵拉得更貼近自己的僮體。
就這樣,兩人一發不可收拾的烈火,在午夜時分的工作室裡,盡情地燃燒。那晚稍早,卡樂妙看著色彩喵離開工作室,口中說什麼晚上要來當『電燈泡』,但是一直等到快要九點半時,色彩喵都沒有出現,於是卡樂妙獨自搭上公車,到了學校那站,他一眼就看到在站牌等候的小貓,卻不見小愛與小琪
兩人,心裡正是納悶,後來小貓上了公車,卡樂妙經詢問後才知道,原來她們兩人都有事,不能一起搭車回台北。
一路上,小貓跟卡樂妙相談甚歡,從學校的課業、老師,一直聊到各自的家人,小貓有一個弟弟,年紀比她小很多,「要不是為了我弟弟,我真的早就離家出走了!」因為父親常年酗酒,又沒有正當工作,每天喝得醉醺醺,還會打小貓跟他弟弟,小貓的媽媽在她很小的時候,就因為受不了她父親的折磨,選擇了離家出走,留下她與弟弟相依為命,對抗惡魔一般的父親。
卡樂妙聽著小貓的故事,偶爾也講講自己的故事,原本就是家家有本難念的經,很快的公車已經開到台北車站,兩人像昨天一樣,在下車後告別對方,各自消失在台北車站的人群中。
隔天,小貓又在同樣的時間打電話給卡樂妙,相約一起坐車回家,就這樣連續幾天,卡樂妙與小貓兩人每天搭同一班公車回台北,一直到那個星期五,兩人像往常一樣,正要在台北車站告別時,「學長,可以給我你家的電話嗎?因為明天是星期六,你只有半天,我們應該見不到面了,我星期天可以打電話給你嗎?」卡樂妙點點頭,把自己家的電話留給小貓,兩人像往常一樣說了再見,卡樂妙搭上另一台回家的公車。其實每天的這個時候,卡樂妙都會有一種莫名的茫然,自己一整天上課,非常的忙碌,到了晚上,跟小貓一起搭公車回家,一路上有個伴陪他聊天,感覺上也是開開心心的,但是到了跟小貓分別後,獨自搭上回家的公車,這股茫然總是在這個時候開始湧上心頭,他知道每天的這時候,會有另外一個女生,不可救藥地來佔據他的整個人和整顆心,而那個女生不是別人,正是小彤
到這天為止,卡樂妙已經四天沒有跟小彤通過電話,她就像是在人間蒸發了一樣,消失無蹤,卡樂妙每天晚上都會找時間撥電話給她,可是彤畫室的電話總是沒有人接。
沒有了小彤的卡樂妙,根本是個遊魂,一隻漂盪在學校→工作室→公車→小貓身邊的遊魂,在公車上與小貓的歡樂時光,其實是卡樂妙孤獨的反射,所以每天當他跟小貓分別後,卡樂妙總是開始懊悔,因為他心裡想著,自己是不是某種程度上,欺騙了小貓的感情?因為他自始自終都沒有告訴小貓他心理面其實已經有個小彤,即使他清楚地知道小貓對他的心意。
其實許多次在和小貓講話的時候,卡樂妙都想要直接或是間接的告訴小貓,其實他心裡面已經沒有空間可以容下小彤老師以外的女生,但是看著小貓總是笑笑的跟自己說話的樣子,那些話卻怎麼樣也不能說出口了。
卡樂妙不想用任何文字或是語言去傷害到小貓,可是他隱隱約約也能聽得到,自己內心深處的聲音在告訴自己,再這樣下去,對小貓才會是最大的傷害。
於是,卡樂妙開始不接聽任何電話,不論是家裡或是工作室的電話都由別人來代接,他告訴自己絕對不要去傷害任何人,同時,也不要再被任何人傷害了!
他要自己忘記小彤老師和那個暑假所發生的一切,他知道這是比登天還難的事情,他發現他必須找一件事情讓自己完全地投入,才能夠真正的做到這一切。
從那時起,卡樂妙把功課當成了他的世界中最重要的一件事。他盡情地把自己的熱心熱情完全投注在工作之中,他知道沒有什麼比這個更能夠讓他脫離自己無法脫離的總總。
123456789

2011年12月15日 星期四

電話銷售的十字心法

fdggg fdgdf fggg sdfsdf sddsf 


電話銷售的十字心法
電話銷售的十字心法不同的行業有不同的專業術語,所以就產生不同的銷售話術。作為電話銷售,有其共性的東西,如心法。心法就電話銷售人員來說,是如何煉就一位元合格的電話銷售人員所應具備的心理素質,掌握電話銷售心法,無論是在什麼行業,有什麼樣的專業術語,都不會逃過這些心法:闖、克、恭、聽、培;靈、零、誠、真、情。下面我就每個心法解釋下: 1、闖:我開始想的是“沖”字,但是我感覺到沖字缺少點靈氣。闖就要義無反顧、勇往直前的開拓市場,沒有給自己留下半點後路,這是搜集客戶資訊最重要的一步。如果你不闖,那你就相信天下會掉餡餅的事情會發生在,總有一天你會等到死神的來臨; 2、克:有了闖勁是遠遠不夠的,人都有惰性與自滿的情緒,必須要克制自己一些不好的習慣,這才能保證闖的順利進行。如果你不能,那就等待洪水猛獸來侵佔你的心靈; 3、恭:有點恭維的意思,客戶一般都喜歡別人恭維他,這是打開客戶話夾子的最好方式,也是能夠讓客戶說出一些資訊的方法。如果你不恭,那你就要想好如何應對冷冰冰、硬邦邦的語言,或是“嘟、嘟”電話掛短的聲音; 4、聽:當你恭維了對方後,如果你不認真的聽客戶講,不能聽出客戶的性格和周圍的環境、做事的風格等關鍵的資訊,基本上電話銷售
就是個沒有拐杖的盲人,無處著手,與客戶溝通時不知道從什麼地方切入; 5、培:與客戶的關係不是一天兩天就能造就為非常深入的關係,所以與客戶的交往必須要有培養的心態,雖然有些客戶只要一溝通就會有交易,但是,往往大客戶都會考察你的公司和你的耐性等等東西,才作出決策,所以你必須要象栽樹一樣要經常施肥、澆水; 6、靈:這是應對“闖”字而來的,如同莽夫的闖是沒有任何意義的,要靈活地運用各種技巧來搜集客戶資訊。關鍵會用腦。 7、零:應對“克”字來講的,這是做銷售人員必備的一個心態,每天必須要保持零心態,不能有了點成績就沾沾自喜,更不能躺在成功的溫床上睡覺。否則你就會失去闖勁,失去了鬥志,如同豬圈裏等待宰割的肥豬; 8、誠:應對“恭”字來說的,恭維客戶,不能讓對方覺得你虛偽,要拿出你的誠心來與客戶溝通,否則你的恭維會讓客戶“噁心”; 9、真:應對“聽”來說的,聽話要聽音,所以必須要聽出客戶的真正意圖,如果你只聽到客戶表面的東西,那你只是個“傳話筒”,不會分析客戶的講話,就會非常容易失去交易的機會; 10、情:是應對“培”字來說,培養最終的目的是要培養出感情來,逢年過節,你若不記得客戶,客戶怎能記住你?馬戲團的老虎、獅子等都能培養出感情來
,更何況客戶是有七情六欲的人。 這十字心法,前面五個是動詞,就是說做銷售只有動起來才能有成功
的可能,後面五個是應對前面五個做補充的。這一動一靜、一外一內就是十字心法的真諦。


.msgcontent .wsharing ul li { text-indent: 0; }



分享

Facebook
Plurk
YAHOO!


123456789

**驚喜之日**

fggg fdggg fdgdf sddsf dfgfg 


**驚喜之日**
今天是我驚喜之日,因為,我把ㄊ找回來了..
我今天去買棒棒回來看zz,發現我有了,雖然ㄅ太清楚,鼓起勇氣去做檢查.
醫生說:恭喜我,有了..聽到這個消息,我高興ㄉㄅ之所措.
雖然ㄊ還很小,向伊莉米那們小,ㄊ卻是我ㄉ寶.



.msgcontent .wsharing ul li { text-indent: 0; }



分享

Facebook
Plurk
YAHOO!


123456789

2011年12月14日 星期三

CISCO

sddsf fdggg dfgfg fggg fdgdf 


CISCO
出處: http://www.beepworld.de/members55/chicksaver/cisco.htm
2nd Semester
Module 11 The console port can be used for which of the following? (Choose three.)*** debugging **** password recovery *routing data between networks*** troubleshooting *
connecting one router to another2 ABC Company just purchased three new routers to start their company network. Which items are needed to establish a terminal session between a PC and the router for the initial configuration? (Choose three.)straight-through cable*** terminal emulation software **** rollover cable **** RJ-45 to DB-9 connector *
V.35 cable3 Which ports on Cisco routers can be used for initial configuration? (Choose two.)Ethernet*** console **** auxiliary *serialAUI
BRI4 Which of the following descriptions are true regarding the management connections on a Cisco router? (Choose three.)*** They are non-network connections. *They are used to connect the router to the rest of the production network.They are synchronous serial ports.*** They are used for initial router configuration. **** They are asynchronous serial ports. *
They are accessed using their assigned IP address.5 Which of the following devices are used in the construction of a WAN? (Choose three.)hubs*** routers **** communication servers *transceivers*** modems *
multi-port repeaters6 Why is a console connection to a router or switch preferred when troubleshooting? (Choose two.)can be accessed remotely*** does not depend on network services **** displays startup and error messages by default *
does not require special components7 Which of the following layers of the OSI model are incorporated in WAN standards? (Choose two.)*** physical layer *application layertransport layer*** data link layer *
session layer8 What do routers use to select the best path for outgoing data packets?ARP tablesbridging tables*** routing tables *
switching tables9 A router is composed of many internal components. Which of the following components stores a copy of the router's configuration file?metal-oxide memoryread only memoryflash memory
*** non-volatile random access memory *10 Select the statements that correctly describe flash memory in a 2600 series router? (Choose two.)holds the startup configuration by default*** can be upgraded with single in-line memory modules**** stores Cisco IOS software images *stores routing table information by default
maintains the only copy of an IOS image after the router is booted11 During the initial configuration of a 2600 series Cisco router, which cable is required for connecting a PC to the console port?twistedcrossover*** rollover *
straight12 Which of the following are true regarding router interfaces? (Choose three.)provide temporary memory for the router configuration filesconnect the router to the network for packet entry and exit *can be on the motherboard or a separate module *hold the IOS image
*** connect the router to LANs and WANs *13 Which of the following are functions of RAM? (Choose three.)contains startup configuration filestores routing table **** holds fast switching cache *retains contents when power is removed
*** stores running configuration file *14 Which router component holds the configuration file when power is lost?volatile random access memoryread only memory*** non-volatile random access memory *
flash memory15 Several Ethernet hosts on a LAN need the gateway services of a Cisco 2500 series router. Which of the following would be needed to physically connect a router to all of the hosts on the LAN? (Choose two.)a crossover cable between the transceiver on a router and a switchcrossover cables between a switch and hosts on a LANa straight-through cable between the auxiliary port on a router and a switcha rollover cable between the console port on a router and a switch*** straight-through cables between a switch and hosts on a LAN *
*** a straight-through cable between the transceiver on a router and a switch *16 What contains the instructions that a router uses to control the flow of traffic through its interfaces?packet configuration*** configuration files *flash memory
internal components17 Which basic components do a router and a standard desktop PC have in common? (Choose three.)*** CPU *hard drive*** input/output interfaces *keyboardmonitor
*** system bus *18 Terminal emulation software, such as HyperTerminal, can be used to configure a router. Which of the following HyperTerminal options shown in the graphic are correctly set to allow configuration of a Cisco router? (Choose three.)bits per second*** data bits **** parity **** stop bits *
flow control19 Which of the following are functions of NVRAM? (Choose two.)stores the routing table*** retains contents when power is removed **** stores the startup configuration file *contains the running configuration file
stores the ARP table20 Which of the following tasks can be accomplished through a management connection on a router? (Choose three.)*** troubleshooting problems **** monitoring the system *capturing LAN data packets*** configuring the router *
routing data packets21 An internetwork must include which of the following? (Choose three.)*** switching *static addressingIETF standardization*** dynamic or static routing *
*** consistent end-to-end addressing *22 Which of the following describes the function of a WAN?connects peripherals in a single locationconnects multiple networks in a single buildingprovides connectivity on a LAN*** provides connectivity over a large geographic area *
Module 21 What information about the router and its startup process can be gathered from the output of the show version command? (Choose three.)*** the last restart method *the tftp software version installedthe amount of NVRAM and FLASH used*** the configuration register settings *
*** the location used for loading the IOS *2 What baud rate needs to be configured on terminal emulation software to allow a connection to the console port of a router?24004800*** 9600 *14200
384003 Which command takes precedence if the commands enable password and enable secret are both configured on a router?enable password*** enable secret *Neither. They are both enabled.
Neither. They cancel each other out.4 The active IOS of the router is initialized from FLASH. In this scenario, what commands would be used to display the name of the active IOS? (Choose two.)Router#show IOS*** Router#show flash *Router#show nvram*** Router#show version *Router#show startup-config
Router#show running-config5 Which keystroke is used to move to the beginning of a command line?*** Ctrl-A *Ctrl-BEsc-AEsc-BCtrl-C
Ctrl-Z6 What is the maximum number of commands allowed in the history buffer?1020128255
*** 256 *7 Which tasks can be performed in the ROM monitor mode? (Choose two.)*** recover from system failures *create startup configuration files*** recover from lost passwords *configure IP addresses on all router interfaces
perform high level diagnostics8 What is the default sequence for loading the IOS?NVRAM, TFTP, FLASHNVRAM, TFTP, CONSOLEFLASH, ROM, TFTP*** FLASH, TFTP, ROM *
TFTP, FLASH, ROM9Which of the following identifies the correct items needed to initially configure a router?1) DB-9-to-RJ-45 on the PC's serial port2) a straight through cable3) the router's console port1) PC's Ethernet port2) a crossover cable3) the router's Ethernet port1) DB-9-to-RJ-45 on the PC's serial port2) a rollover cable3) the router's Ethernet port1) PC's Ethernet port2) a rollover cable3) the router's console port*** 1) DB-9-to-RJ-45 on the PC's serial port * 2) a rollover cable 3) the router's console port1) PC's Ethernet port2) a rollover cable
3) the router's Ethernet port10 When the router output is being viewed through a terminal program, which statements are true regarding the --More-- prompt at the bottom of the router display? (Choose two.)Press the Spacebar to display the next line.*** Press the Spacebar to view the next screen. *Press the PgDn key to view the next screen.*** Press the Enter key to display the next line. *
Press the Enter key to view the next screen.11 Which connection method can be used to perform the initial configuration of a router?*** use a serial connection of a computer connected to the console port of a router *telnet to the router through a serial portuse a vty port through the Ethernet interface
use a modem connected to the AUX port of the router12 What information does the name of the IOS file provide to the network administrator? (Choose three.)the amount of NVRAM required to run the image*** the hardware platform the image runs on *the various software platforms the image can run on*** special features and capabilities of the image *the bandwidth supported by the IOS
where the image executes from and if it has been compressed *13 Under what conditions does the router enter setup mode? (Choose three.)immediately after issuing the command Router#erase start*** after issuing the command Router#setup **** during the initial configuration of a router **** after deleting the backup configuration and reloading the router *
after deleting the running configuration14 What does the command sh? return as output if issued at the Router# prompt?all show commands allowed in privileged mode*** all commands beginning with the letters sh *an incomplete command error message
an invalid command error message15 Cisco IOS software is separated into two levels as a security feature. What are those two levels? (Choose two.)global*** privileged *local*** user *
interface16 Which keystrokes can be used to return to the privileged mode from the interface configuration mode?Ctrl-PCtrl-Shift-6, then X*** Ctrl-Z *
Esc17 Which of the following is the correct flow of routines for a router startup?*** load bootstrap, load IOS, apply configuration *load bootstrap, apply configuration, load IOSload IOS, load bootstrap, apply configuration, check hardware
check hardware, apply configuration, load bootstrap, load IOS18 Which of the following statements concerning router interface modes are correct? (Choose three.)*** User EXEC mode provides commands to monitor router operation. *Privileged EXEC mode only provides commands to change or configure router operation.Password protected configuration modes can be accessed from either user EXEC or privileged EXEC modes.*** On a router with the name Core1, the prompt indicating privileged EXEC mode is Core1#. *The command to enter privileged EXEC mode is Router# enable.
*** A username and password may be required to enter privileged EXEC mode. *19 A network administrator needs to configure a router. Which of the following connection methods requires network functionality to be accessible?consoleAUX*** Telnet *
modem20 What is the default sequence for loading the configuration file?NVRAM, FLASH, ROMFLASH, TFTP,CONSOLE*** NVRAM, TFTP, CONSOLE *
FLASH, TFTP, ROM21 Which tasks can be accomplished by using the command history feature? (Choose two.)View a list of commands entered in a previous session.Recall up to 15 command lines by default.*** Set the command history buffer size. **** Recall previously entered commands. *
Save command lines in a log file for future reference.22 After the active IOS image has been loaded into RAM from flash memory, which commands could be used be used to display the file name of the active IOS? (Choose two.)Router# show IOSRouter# show flashRouter# show nvram*** Router# show version *Router# show startup-config??? Router# show running-config ?Module 31 Why is it important to create standards for network consistency? (Choose three.)*** reduces network complexity *increases unplanned downtime*** limits unplanned downtime *increases bandwidth by regulating networking performance
*** limits events that may impact network performance *2 A telnet session can be established when using the IP address of a router but not the name of the router. Which of the following is the most likely cause of the problem?*** an incorrect host table entry *an incorrect ARP table entryan incorrect routing table entryan incorrect protocol configured
an incorrect subnet mask3 The serial connection shown in the graphic needs to be configured. Which configuration commands must be made on the Sydney router to establish connectivity with the Melbourne site? (Choose three.)Sydney(config-if)# ip address 201.100.53.2 255.255.255.0Sydney(config-if)# no shutdown **** Sydney(config-if)# ip address 201.100.53.1 255.255.255.224 **** Sydney(config-if)# clock rate 56000 *
Sydney(config-if)# ip host Melbourne 201.100.53.24 Which commands display information about the IOS or configuration files stored in router memory? (Choose three.)Router# show ram*** Router# show flash *Router# show hostsRouter# show history*** Router# show version *
*** Router# show startup-config *5 Select the interface descriptions that provide the most appropriate information. (Choose two.)circuit number*** host IP address **** telnet password *number of hops between routers
purpose and location of the interface6 Select the commands necessary to remove any existing configuration on a router. (Choose two.)delete flash*** erase startup-config **** erase running-config *restartreload
delete NVRAM7 Router names are associated with IP addresses. What is the name of the table that is created by this association?IP tableSAP tableARP tableMAC table*** HOST table *
RARP table8 Select the commands that will store the current configuration file to a network TFTP server? (Choose two.)*** Router# copy run tftp *Router# copy tftp run*** Router# copy running-config tftp *Router# copy tftp running-configRouter(config)# copy running-config tftp
Router(config)# copy tftp running-config9 Which statements are true regarding the recommended use of login banners? (Choose two.)*** They should be used to display information regarding system changes or maintenance. **** They should be used to display warnings to unauthorized users. *They should be used to display welcome messages prior to login.They should be seen only by system administrators.
They should provide confirmation of incoming IP addresses.10 What is the effect of the command ip host HQ 192.1.1.1?*** permits a ping to 192.1.1.1 with the command ping HQ *assigns the description HQ to the interface with the ip address 192.1.1.1renames the router as HQdefines a static route to the host 192.1.1.1
configures the remote device HQ with the ip address of 192.1.1.111 What are the default settings for a serial interface? (Choose three.)*** DTE *DCE*** shutdown **** no IP address *clock rate 56000
encapsulation ARPA12 What will be the response from the router after the command, "router(config)# hostname portsmouth" is entered?portsmouth#*** portsmouth(config)# *invalid input detectedrouter(config-host)#hostname = portsmouthportsmouth#? command not recognized
router(config)#13 A network administrator wants to assure that any password that permits access to the privileged EXEC mode is not shown in plain text in the configuration files. Which commands will accomplish this task? (Choose two.)Router(config)#enable cisco secretRouter(config)#enable cisco*** Router(config)#service password-encryption **** Router(config)#enable secret cisco *Router(config)#encrypt-all cisco
Router(config)#service encryption-password
14 Which command sequence will permit access to all five router virtual terminal lines with a password of cisco?Router(config-line)#config telnetRouter(config-line)# line vty 0 5
Router(config-line)# password ciscoRouter(config)# line vty 0 4
Router(config)# password cisco*** Router(config)# line vty 0 4*Router(config-line)# password cisco
Router(config-line)# loginRouter(config-line)# config telnetRouter(config-line)# password cisco
Router(config-line)# sessions 0 415 An IP network is to be added to a router Ethernet interface. What steps must be performed to configure this interface to allow connectivity to the hosts on this LAN? (Choose two.)*** Enter the command no shutdown. *A password must be set on the interface.The interface DCE clock rate must be set.The interface must be configured for virtual terminal access.*** The interface must be configured with an IP address and subnet mask. *
The router must be put in setup mode in order for the interface to be configured.16 What is the default state of the interfaces on a router?up, line protocol down*** down, line protocol down *adminstratively down, line protocol down
up, line protocol up17 Which are valid router prompts? (Choose three.)Router(privileged)#*** Router(config)# *Router(command)#*** Router(config-router)# **** Router(config-if)# *
Router(exec)#18 Select the correct sequence of commands that will configure "Engineering LAN" as the interface description on the Ethernet0 interface.1)Router# configure terminalRouter(config)# interface e0 description Engineering LAN*** 2)Router# configure terminal*Router(config)# interface e0Router(config-if)# description Engineering LAN3)Router# configure terminalRouter(config)# interface e0Router(config-if)# interface description Engineering LAN4)Router# configure terminal
Router(config)# description Engineering LAN19 Select the recommended locations to save a running-config file. (Choose three.)all network hosts*** network server **** floppy disk **** TFTP server *
server that is not on the network20 Which command turns on a router interface?Router(config-if)# enableRouter(config-if)# no downRouter(config-if)# s0 activeRouter(config-if)# interface up
*** Router(config-if)# no shutdown *21 Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)*** VTY interface **** console interface *Ethernet interfacesecret EXEC mode*** privileged EXEC mode *
router configuration mode22 What must be configured to establish a serial link between two routers that are directly connected?a clock rate on the DTE interfacea no clock rate command on the DTE interfaceno configuration is required*** a clock rate on the DCE interface * Module 4 1 To obtain CDP information from a Cisco router that is not directly connected to the administrator's console, what must happen?The source router must send TLV blocks to the remote router.*** The administrator can Telnet to a Cisco device that is connected to the remote router. *The administrator needs to issue the Router# show cdp all to view the entire network CDP advertisements.
The administrator must transmit TTL packets to the remote device and wait for a response.2 Which of the following are displayed by the Router# show cdp neighbors command? (Choose three.)load*** platform *reliabilityholdtime*
*** local interface *3 What command enables CDP on the interface of a router?*** Router(config-if)# cdp enable *Router(config-if)# cdp runRouter(config-if)# cdp start
Router(config-if)# cdp config4 An administrator is attempting to enable CDP on the interface of a Cisco router. After issuing the command Router(config-if)# cdp enable, the router responds with an error stating that CDP is not active. What might be the problem?The cdp enable command must be issued from the global mode prompt.The administrator needed to issue the command Router(config-if)# cdp run.*** CDP has not been configured globally. *
The administrator did not manually enter the CDP neighbors into the CDP table.5 Which of the following is true regarding CDP and the graphic shown?CDP running on Router D will gather information about routers A, B, C, and E.*** By default, Router A will receive CDP advertisements from routers B and C.*If routers D and E are running different routing protocols, they will not exchange CDP information.
Router E can use CDP to identify the IOS running on Router B.6 The traceroute command was used to trace the path between routers A and D. What would an output display of three asterisks (***) indicate?The command was issued from the wrong prompt.Each datagram was successfully sent.*** One of the routers is unreachable.*
There are three hops between source and destination.7 For which of the following network layer protocols does CDP provide information? (Choose three.)*** IP *RIPSNMP*** AppleTalk **** IPX *
IGRP8 Which command will produce the output shown in the graphic?*** show cdp *show cdp neighborsshow cdp neighbors detailshow cdp detail
show cdp traffic9 What is the purpose of the cdp timer command?specifies the hold time to be sent in the CDP update packetresets the traffic counters back to zero*** specifies how often the Cisco IOS software sends CDP updates *
deletes and resets the CDP table of information about neighbors10 What is the main use of Telnet?transfer of data between end usersverification of simple connectivityrouting of data packets
*** remote connection to network devices *11 Transmitting type length values (TLVs) inside advertisements is a process used by CDP to provide information about neighboring devices. What information is displayed by these TLVs? (Choose three.)*** interface information of the connected device *all networks connected to the neighboring device*** name of the connected device *routing protocol used on the neighboring device
*** holdtime for advertisements *12 Why would an administrator use the Telnet application when troubleshooting a network? (Choose three.)*** It can be used to verify the operation of application layer software between the source and destination.*Telnet can use the ICMP protocol to verify a hardware connection and network layer address.*** It is the most complete testing mechanism available. **** Remote networks may be accessed via a Telnet session for troubleshooting. *
Time to Live values are used by Telnet to identify a failure of device between source and destination.13 An administrator logged into Workstation 2 initiates a Telnet session to GAD. The administrator then telnets from GAD to BHM. What will happen if the Enter key is pressed at the privileged mode prompt after the session with BHM is suspended?The GAD session will be resumed.*** The BHM session will be resumed. *The GAD session will be terminated.
The BHM session will be terminated.14 Pings between Atlanta and Dallas are successful. If a hostname table or DNS connection is not available, which command will successfully establish a remote connection from Atlanta to Dallas via Telnet?Atlanta> connect Dallas*** Atlanta> 197.72.3.2 *Atlanta# 206.157.85.1
Atlanta# telnet Dallas15 A network administrator was called away from the terminal while using Telnet to monitor a remote router. The Telnet session was left connected. If the default Telnet configuration is used, what will the administrator find upon returning 15 minutes later?The Telnet session entered a "sleep" state and will resume when the spacebar is pressed.The Telnet session remained connected and is on the same screen it was left on.The Telnet session suspended itself and will resume when the Enter key is pressed.*** The Telnet session terminated itself after 10 minutes of inactivity. *
The Telnet session remained active but now requires the password to be entered again16 What key sequence is used to suspend a Telnet session on a remote router?Ctrl-Shift-SCtrl-Shift-6*** Ctrl-Shift-6, then x *Ctrl-Alt-SCtrl-Alt-6
Ctrl-Alt-6, then x17 An administrator can successfully ping between the Lubbock and Memphis routers. The command Lubbock# telnet Memphis is entered but the Memphis router cannot be reached. What are possible reasons for this failure? (Choose two.)*** The Lubbock router does not have any entries in its host table.*Lubbock is not an entry in the host table of the Memphis router.*** Access to a DNS server is not available. *The hostname command was not configured correctly on the Memphis router.
The hostname command was not configured correctly on the Lubbock router.18 How many Telnet sessions can take place simultaneously on a router running a standard edition of the IOS?4*** 5 *8
1019 How can a network administrator logged in to RTA gather information about the Cisco devices that are directly connected to its neighbor, RTB?Use the show cdp neighbors detail command on RTA to view information about every device on the entire internetwork.Use ping to determine the status of RTB, then issue the show cdp neighbors detail command.*** Use Telnet to connect to RTB, then issue the show cdp neighbors command. *
Use traceroute to establish the pathway to RTB, then issue the show cdp neighbors command20 If the network administrator establishes a telnet session from Workstation 2 to GAD and then from GAD to BHM, what occurs if the session with BHM is suspended and the Enter key is pressed? The GAD session will be resumed. *** The BHM session will be resumed. *The GAD session will be terminated. The BHM session will be terminated. Module 5 1 The commands shown in the graphic were entered to alter the startup sequence of the router. On the next reload, which IOS will be loaded?The router will load c2500-js-l.112-26d.The router will load c2500-d-l.120-9.The router will load the IOS from ROM.*** The router will boot into ROM monitor mode.* 2 Where does a router look for boot system statements?ROMRAM*** NVRAM *Flash 3 Which of the following are steps in saving a router configuration file to a TFTP server? (Choose three.)Enter configuration mode.*** Enter the IP address to the TFTP server. **** Use the copy running-config
tftp command. *Use the copy tftp running-config command.*** Name the configuration file or accept the default name. * 4 Routers have different types of memory. Choose the answer that describes flash memory.provides working storage*** stores a fully functional IOS image *stores the startup configuration fileinitializes the code used to boot the router 5 Which command is used to change the order in which the router looks for system bootstrap information?config-imageconfig-system*** config-register *config-bootfieldconfig system bootstrap 6 Which of the following can be configured as a source for the IOS image by using the boot system command? (Choose two.)*** TFTP server *HTTP serverTelnet server*** Flash memory *NVRAM memory 7 Which two items below are required by routers in order for them to perform their basic operations? (Choose two.)a tftp server*** a configuration file *a configuration register file*** an operating system file *a DNS table 8 The router has been configured with a valid configuration file.
Which of the following could be a cause for a router not booting normally? (Choose two.)*** The flash image is corrupt. *A console cable is disconnected.The flash image is located in NVRAM.The startup configuration file is incomplete.*** The router encountered a hardware error. * 9 The Cisco IOS image naming convention allows identification of different versions and capabilities of the IOS. What information can be gained from the filename c2600-d-mz.121-4? (Choose two.)The "mz" in the filename represents the special capabilities and features ofthe IOS.The file is uncompressed and requires 2.6 MB of RAM to run.*** The software is version 12.1, 4th revision. *The file is downloadable and 121.4MB in size.*** The IOS is for the Cisco 2600 series hardware platform. * 10 Which part of the configuration register indicates the location of the IOS?the bootstrap*** the boot field *the IOS locatorthe system image loader 11 If a router cannot find a valid configuration file during the startup sequence, what will occur?Th
e startup sequence will reset.*** The router will prompt the user for a response to enter setup mode. *The startup sequence will halt until a valid configuration file is acquired.The router will generate a default configuration file based on the lastvalid configuration.The router will monitor local traffic to determine routing protocolconfiguration requirements. 12 What command can be used in ROM monitor mode to run the IOS image in flash?rommon1> config-register 0x2102*** rommon1> boot flash:filename *rommon1> xmodem:filenamerommon1> boot system flash:filenamerommon1> reload system flash: 13 What does a configuration register setting of 0x2102 indicate on a router?It tells the router to locate and load the IOS from NVRAM.It tells the router to locate and load the IOS from FLASH.*** It tells the router to bypass the configuration in NVRAM. *It tells the router to look in the startup configuration for boot systemcommands. 14 Routers have different types of memory. Choose the answer that describe
s NVRAM.provides working storagestores a fully functional IOS image*** stores the startup configuration file *initializes the code that is used to boot the router 15 Which command will move configuration files among RAM, NVRAM and a TFTP server?ping*** copy *movesetupbootpbackup16 Which command will copy an IOS image from a TFTP server to a router?*** Router# copy tftp flash *Router# copy flash tftpRouter(config)# copy tftp flashRouter(config)# copy flash tftp 17 If the configuration register instructs a router to look for configuration information in NVRAM and no boot system commands exist there, from where will the router next attempt to boot the IOS?RAMRROM*** FLASH *EPROMROMMON 18 An IOS image can be copied into flash from a TFTP server. Which of the following statements are true regarding this process? (Choose three.)*** A series of "!'s" are displayed as the image is downloaded successfully toflash. *The copy tftp flash:filename ip address command is used to copy the IOS fromthe server to flash.***
After the new flash image is downloaded, it is verified. **** A series of "e's" are displayed as the current IOS image is erased fromflash. *Flash must be cleared with the erase command prior to beginning the downloadprocess. 19 If boot system commands have been configured, which of the following could happen if a router fails to obtain an IOS image from the primary sources during bootup?*** The router will load a subset of a full IOS version from system ROM. *The router will attempt to reboot two times before failing.The router will load the last good IOS image from NVRAM.
The administrator will be prompted to load a valid IOS image.20 Which command will backup configuration files from RAM to NVRAM or a TFTP server?backup*** copy *telnetmove Module 6 1 How does a router learn about routes to a network? (Choose three.)*** Information is gathered from its own configuration regarding directly connected networks. *Switches forward destination address information to each router.Hosts communicate destination network information to each router.*** Other routers forward information about known networks. **** Routes are entered manually by a network administrator. *
Routes are learned from information gathered from ARP tables.2 What are some of the advantages of using a link-state routing protocol instead of a distance vector routing protocol? (Choose two.)The topology database eliminates the need for a routing table.Frequent periodic updates are sent to minimize the number of incorrect routes in the topological database.*** Routers have direct knowledge of all links in the network and how they are connected. **** After the inital LSA flooding, they generally require less bandwidth to communicate changes in a topology.*
Link-state protocols require less router processor power than distance vector protocols.3 What is the purpose of a routing protocol?It is used to build and maintain ARP tables.It provides a method for segmenting and reassembling data packets.It allows an administrator to devise an addressing scheme for the network.*** It allows a router to share information about known networks with other routers. *
It provides a procedure for encoding and decoding data into bits for packet forwarding.4 Which of the following statements are true regarding the command ip route 172.16.1.0 255.255.255.0 172.16.2.1? (Choose three.)*** This command is used to set up a static route. *This command is used to set up a default route.*** This command is entered from global configuration mode. **** All packets intended for network 172.16.1.0 will be sent to gateway 172.16.2.1. *
All packets intended for network 172.16.2.1 will be sent to gateway 172.16.1.0.5 Which of the following conditions must be met in order for a network to have converged?The routers in the network are operating with dynamic routing protocols.The routers in the network are operating with compatible versions of IOS.The routers in the network are operating with the same routing tables.
*** The routers in the network are operating with consistent routing knowledge. *6 Describe the switching function that occurs in a router.allows the router to make forwarding decisions based on Layer 2 addressinguses network addressing to select the best route and interface to forward data*** accepts a packet on one interface and forwards it to a second interface *
enables the router to select the most appropriate interface for forwarding a packet7 If dynamic routing is not configured on a router, how do routing table updates occur?Link state advertisements are sent from other routers.*** Updates are made to the routing table by the administrator. *Best path information is communicated by network hosts.
The routing table is updated by neighboring routers.8 Given the following commands:Router(config)# router ripRouter(config-router)# network 192.5.5.0
What can be concluded about the routing processes used on the router? (Choose three.)A link state routing protocol was used.*** A distance vector routing protocol was used. **** Routing updates will broadcast every 30 seconds. *Routing updates will broadcast every 90 seconds.*** Hop count is the only metric used for route selection. *
Bandwidth, load, delay, and reliability are used as metrics for route selection.9 Refer to the network topology shown. Which of the following commands will configure a route to the 172.31.3.0 network that the router will consider to be most reliable?Montana(config)# ip route 172.31.3.0 255.255.255.0 172.31.4.1*** Montana(config)# ip route 172.31.3.0 255.255.255.0 s1 *Utah(config)# ip route 172.31.3.0 255.255.255.0 172.31.2.1
Utah(config)# ip route 172.31.3.0 255.255.255.0 s110 Which type of address does a router use to make routing decisions?source IP addresssource MAC address*** destination IP address *
destination MAC address11 The routers shown in the graphic receive routing updates every 30 seconds by default. Select the commands that were configured on Router2 to achieve this update interval. (Choose two.)
*** 1)Router2(config)# router rip *
2)Router2(config)# router igrp 200
3)Router2(config-router)# network 192.5.5.0 201.100.11.0 210.93.105.04)Router2(config-router)# network 192.5.5.0 255.255.255.0Router2(config-router)# network 210.93.105.0 255.255.255.0
Router2(config-router)# network 201.100.11.0 255.255.255.0*** 5)Router2(config-router)# network 192.5.5.0 *Router2(config-router)# network 201.100.11.0
Router2(config-router)# network 210.93.105.012 All routers at a medium sized company have been upgraded. The administrator of the network has decided that a more advanced routing protocol using a combination of both distance vector and link state features will be implemented. Which protocol should the administrator select for the network?RIPIGRPBGPOSPF
*** EIGRP *13Assuming that the network shown in the graphic is converged and dynamic routing is enabled, which of the following conditions will cause a modification to the Orlando routing table? (Choose two.)*** The device connecting the S0 interface of the Tampa router to the serial link loses power. **** A network administrator shuts down the Orlando router E0 interface. *A DCHP server connected to the Tampa E1 network loses power.The IP address of a workstation on the Orlando E0 network is reassigned.A host on the Orlando E1 network transmits data to a server on the Tampa E1 network.
A Telnet connection to the Orlando router fails.14 Select the statements that describe link-state routing processes? (Choose three.)*** Each router develops its own map of the entire network. **** Routers send triggered updates when changes in the network occur. **** Link-state routing protocols place a higher load on router resources during the routing protocol initialization. *
Link-state protocols are more prone to routing loops than distance vector routing protocols.Networks using link-state routing protocols are slower to reach convergence after changes have occurred
than those using distance vector protocols.15 Which protocol provides enough information in its addressing scheme to allow a packet to be forwarded from one host to another? (Choose two.)*** IP *IGRPEIGRP*** IPX *OSPF
RIP16 Which category of routing algorithms discovers and maintains a topological map of the entire internetwork?staticBellman-Fordexterior gatewayInternetwork Packet Exchangedistance vector
*** link-state *17 Which are the primary functions used by a router when forwarding data?(Choose two.)data encryptionerror notification*** packet switching *address identification*** path determination *
packet validation18 Which protocol can be used to route traffic between two ISPs?RIP*** BGP *IGRPOSPF
EIGRP19 Why is it necessary to specify a list of networks when configuring an interior routing protocol?to tell the router how to reach those networks*** to tell the router which attached networks participate in routing updates *to tell the router which set of metrics to use for the attached networks
to tell the router which routing protocol to use20 Referring to the diagram, which commands will enable hosts on the Idaho E0 network to reach hosts on the E0 network of the Montana router? (Choose two.)Montana(config)# ip route 172.31.5.0 255.255.255.0 172.31.5.1*** Montana(config)# ip route 172.31.3.0 255.255.255.0 172.31.4.1 *Idaho(config)# ip route 172.31.5.0 255.255.255.0 172.31.4.1*** Idaho(config)# ip route 172.31.5.0 255.255.255.0 172.31.4.2 *
Idaho(config)# ip route 172.31.5.1 255.255.255.0 172.31.4.121 Given the following commands:Router(config)# router igrp 300Router(config-router)# network 192.5.5.0
What can be concluded about the routing process on this router? (Choose three.)*** A distance vector routing protocol was used. *A link state routing protocol was used.Routing updates will broadcast every 30 seconds.*** Routing updates will broadcast every 90 seconds. *Hop count is the metric used for route selection.
*** Bandwidth, load, delay and reliability are the metrics used for route selection. *22 Which two statements describe autonomous systems? (Choose two.)Interior gateway protocols are used between autonomous systems.*** Exterior gateway protocols are used between autonomous systems. *An autonomous system may be under the control of multiple organizations.*** An autonomous system is identified by a 16 bit number assigned by ARIN. *
The autonomous system is identified in the network portion of the IP address.23 Given the command, RouterC(config)# ip route 197.5.2.0 255.255.255.0 192.10.1.1, what does the address 192.10.1.1 represent?the source host*** the next hop router *the outbound interface
the destination network24 Why is fast convergence desirable in networks that use dynamic routing protocols?Routers will not allow packets to be forwarded until the network has converged.Hosts are unable to access their gateway until the network has converged.*** Routers may make incorrect forwarding decisions until the network has converged. *
Routers will not allow configuration changes to be made until the network has converged.25 Which of the following are valid static IP routes? (Choose three.)RouterB(config)# ip route 192.168.5.0 255.255.255.0 S1*** RouterC(config)# ip route 192.168.1.0 255.255.255.0 S1 **** RouterA(config)# ip route 192.168.3.0 255.255.255.0 192.168.2.2 *RouterB(config)# ip route 192.168.1.0 255.255.255.0 192.168.2.2*** RouterC(config)# ip route 192.168.2.0 255.255.255.0 192.168.4.1 *
RouterA(config)# ip route 192.168.4.0 255.255.255.0 192.168.2.126 Which protocols use an addressing scheme to direct user traffic? (Choose two.)? *** IP *IGRPEIGRP? *** IPX *OSPFRIP Module 7 1 If the passive interface command is enabled on the fa0/0 interface of Router E, which statements are true? (Choose two.)Router E will send all routing updates via interface fa0/0.Router E will ignore all routing updates learned via interface fa0/0.*** Router E will use routing updates learned via interface fa0/0. *
*** Router E will not send routing updates via interface fa0/0. *2 Which command set will stop the IGRP routing process?RouterB(config)# router igrp 101RouterB(config-router)#shutdownRouterB(config)# router igrp 101RouterB(config-router)#network no 192.168.2.0*** RouterB(config)# no router igrp 101 *
RouterB(config)# router no igrp 1013 According to the router output from the show ip route command shown above, which of the following statements are true? (Choose two.)The metric to network 192.168.8.0 is 24.*** The hop count to a device on network 192.168.8.0 is 2. *The total path cost to network 192.168.4.0 is the default value of 16.*** The logical address of the next router for network 192.168.1.0 is 192.168.3.1. *
The devices on network 192.168.5.0 cannot be reached as indicated by the 'C' label.4 Which of the following can exist in a distance vector network that has not converged? (Choose three.)*** routing loops **** inconsistent traffic forwarding *no traffic forwarding until system converges*** inconsistent routing table entries *
routing table updates sent to wrong destinations5 Which of the following routes within an autonomous system does not include subnet information?interior routes*** system routes *border routes
exterior routes6 The administrator of the network depicted in the graphic would like to decrease the network's convergence time. How can this be accomplished?disable split horizon on the routersincrease the update interval on the routers*** change the RIP holddown timer to 96 seconds *
change the RIP holddown timer to 226 seconds7 When does RIP send routing table updates? (Choose two.)*** periodically, every 30 seconds *periodically, every 60 secondsperiodically, every 90 seconds
if optionally configured, when topology changes occur (triggered-update) *8 The graphic shows a network that is configured to use RIP routing protocol. Router2 detects that the link to Router1 has gone down. It then advertises the network for this link with a hop count metric of 16. Which routing loop prevention mechanism is in effect?split horizonerror conditionhold-down timer*** route poisoning *
count to infinity9 The following line was displayed in the output of the show ip route command:192.168.3.0/24 [100/80135] via 192.168.2.2, 00:00:30, Serial0/0
Based on this information, which routing protocol is enabled?IPRIP*** IGRP *IGP
OSPF10 The following line was displayed in the output of the show ip route command:192.168.3.0/24 [100/80135] via 192.168.2.2, 00:00:30, Serial0/0What is the administrative distance of the routing protocol enabled?3080100 *135
8013511 What actions will occur after RouterA loses connectivity to network 114.125.16.0? (Choose two.)*** RouterB will include network 123.92.76.0 and 136.125.85.0 in its update to RouterA. *During the next update interval, RouterB will send a RIP update out both ports that includes the inaccessible network.During the next update interval, RouterC will send an update to RouterB stating that network 114.125.16.0 is accessible in 2 hops.*** Router C will learn of the loss of connectivity to network 114.125.16.0 from RouterB. *
RouterB will include network 123.92.76.0 and 136.125.85.0 in its update to RouterC.
12 Which of the following is a correct IGRP configuration for the routers shown in the network diagram?RouterA(config)# router igrp
RouterA(config-router)# network 192.168.0.0RouterB(config)# router igrp 101
RouterB(config-router)# network 192.168.0.0*** RouterA(config)# router igrp 45 *RouterA(config-router)# network 192.168.1.0
RouterA(config-router)# network 192.168.2.0RouterB(config)# router igrp 1RouterB(config-router)# network 192.168.1.0
RouterB(config-router)# network 192.168.2.0RouterA(config)# router igrp 1RouterA(config-router)# network 192.168.2.0
RouterA(config-router)# network 192.168.3.0RouterB(config)# router igrp 45RouterB(config-router)# network 192.168.1.0
RouterB(config-router)# network 192.168.2.013 What do distance vector algorithms require each router in the network to send?a partial routing table to each router in the LANa partial routing table to each router in the WAN*** the entire routing table to each neighboring router *
the entire routing table to each router in the autonomous system14 What happens to a static route entry in a routing table when the outgoing interface is not available?*** The route is removed from the table.*The router polls neighbors for a replacement route.The route remains in the table because it was defined as static.
The router redirects the static route to compensate for the loss of the next hop device.15 When a routing table update is received by a router in a distance vector network, which of the following occurs?*** The hop count metrics for the enclosed routes are incremented. *The update is forwarded to the gateway router for verification.Path entries are checked for routing loops.The hop count metrics for the enclosed routes are decremented.
Static routes are updated with the new information.16 Refer to the graphic. Assuming default settings are configured, which routing protocol has been configured on the router?OSPFRIP*** IGRP *BGP
Static17 Which statements describe RIP? (Choose three.)The maximum metric value is 255 hops.*** The maximum metric value is 15 hops. **** Routing updates occur every 30 seconds. *Routing updates occur every 90 seconds.*** It is a distance vector routing protocol. *
It is a link state routing protocol.18 When does a distance vector routing protocol set a hold-down timer on a route?when the metric value of the route decreases*** when the route is marked as inaccessible *when the metric value for the route improves
when a regular update is received from a neighboring router19 Which command will display RIP activity as it occurs on a router?*** debug ip rip *show ip routeshow ip interfaceshow ip protocolsdebug ip rip config
show ip rip database20 Which of the following methods does split horizon use to reduce incorrect routing information?Routing updates are split in half to reduce the update time.*** Information learned from one source is not distributed back to that source. *New route information must be learned from multiple sources to be accepted.The time between updates is split in half to speed convergence.
New route information is suppressed until the system has converged.21 The command show ip protocols was just issued and the following line was displayed in the output:Gateway 192.168.2.1 Distance 100 Last Update 00:00:54
When should the next routing table update be received assuming the configuration uses default values?6 seconds24 seconds30 seconds*** 36 seconds *
90 seconds22 A router has several classful networks in its routing table. If the router receives packets for a subnet that is not in its routing table and the ip classless command is disabled but a default route is defined, what will happen to the packets?The packets will be forwarded using the default route.The packets will be forwarded using a route for one of the major networks.A nonreachable message will be returned to the source.*** The packets will be discarded. *
A default route will be developed by the router.23 Which statements describe load balancing when RIP is configured as the routing protocol? (Choose two.)*** A router is allowed to take advantage of multiple best paths to a given destination. **** RIP uses the round robin approach in load balancing. *RIP load balancing selects a single path to forward all data to the destination even though equal parallel paths exist.RIP load balancing is based on bandwidth first and then the hop count.
Only one path to a destination can be statically assigned or dynamically calculated.24 Which of the following functions are performed by a router as routing information travels through the network? (Choose two.)advertise supported applications*** identify new destinations *calculate packet speedverify network scalability
*** identify invalid networks *25 Which of the following would be the correct command sequence to enable RIP on Router B for all connected networks?1)RouterB# router ripRouterB(router)# network 210.36.7.0RouterB(router)# network 220.17.29.0
RouterB(router)# network 211.168.74.02)RouterB(config)# router ripRouterB(config-router)# network 198.16.4.0RouterB(config-router)# network 211.168.74.0
RouterB(config-router)# network 199.84.32.03)RouterB(config)# configure router ripRouterB(config-router)# network 210.36.7.0RouterB(config-router)# network 199.84.32.0
RouterB(config-router)# network 211.168.74.04)RouterB(config)# router ripRouterB(config-router)# network 198.16.4.0RouterB(config-router)# network 210.36.7.0
RouterB(config-router)# network 211.168.74.0*** 5)RouterB(config)# router rip *RouterB(config-router)# network 198.16.4.0RouterB(config-router)# network 210.36.7.0
RouterB(config-router)# network 220.17.29.026 How would an administrator configure a static route for use if a primary route failed?configure the route with a metric greater than the default valueconfigure the route and the router will activate it as neededconfigure the route to activate by using the redistribute static command*** configure the route with an administrative distance greater than the default value * Module 8 1 Which layer protocols provide reliability for IP when needed?ICMP and pingRIP and TTL*** upper layer protocols *lower layer protocolsInternet layer protocols
network access layer protocols2 How does ICMP improve data transfer reliability in IP networks?Each router in the path reads ICMP packets and uses the information to update routing tables.ICMP can correct many network problems as they occur.*** ICMP error messages are returned to the sending device when a packet is dropped by a router.*
ICMP packets report the intermediary devices that a packet passed through before failure occurred.3 When a datagram is processed by a router on the path from source to destination, what happens to the value in the TTL field?"It is increased by one.*** It is decreased by one. *It stays the same.It is reset to 0.
Nothing.4 If workstation 4 sends a message to workstation 2 and it is not delivered, which protocol will report this failure?Internet ProtocolUser Datagram ProtocolTransmission Control Protocol
*** Internet Control Message Protocol *5 What does a router do if it is unable to deliver a packet to its destination? (Choose two.)The router sends the original packet back to the source.The router keeps the packet in its buffer until the next routing table update.*** The router sends an ICMP "Destination Unreachable" message back to the source. *The router sends out a broadcast message in search of the destination.
*** The router discards the original packet. *6 Which two statements are true regarding ICMP? (Choose two.)ICMP provides reliability for the TCP/IP protocol stack.*** ICMP is a component of the TCP/IP protocol stack. **** ICMP notifies the sender that data transmission errors have occurred. *ICMP is connection-oriented.
ICMP messages are propagated to all intermediate devices.7 Which confirms the availability of a destination? (Choose two.)The source issues an echo reply after receiving an echo request from the destination.*** The destination returns an exact copy of the data sent by the source. **** The source sends an echo request and receives an echo reply. *The source sends the data to the destination without receiving a reply.
The destination sends an echo request and receives an echo reply.8 Workstation 1 sent a data packet to Workstation 4. It never arrived because Fa0/0 interface went down on Router C. How will the devices handle this failure?Workstation 4 will send an error message to Router C and Workstation 1 that it did not receive the packet.*** Router C will use ICMP to send a message back to Workstation 1 indicating that the packet could not be delivered. *Router C discards the packet without providing notification to any device.Router C uses ICMP to correct the failure and transmits the data to Workstation 4.
Workstation 1 will use ICMP to correct the problem and then notify Router C to continue the transmission.9 Which three conditions must be met in order for host to host communication over an internetwork to occur on IP networks? (Choose three.)The routing protocols configured on the source and destination networks must be the same.*** A default gateway must be properly configured on the hosts and local networks. **** Intermediary devices, such as routers, must be present on the network and have knowledge of how to reach the destination network. *The source and destination host subnet masks must match.
*** The IP addresses of the hosts must be in the same network or subnet as their respective gateway devices.*10 Which devices along a data transmission path are notified by ICMP when delivery failures occur?*** source devices only *destination devices onlyintermediary devicessource and destination devices
source, intermediary, and destination devices11 Which condition could cause a fragmentation needed ICMP destination unreachable message to be sent?A low bandwidth WAN link has become congested with IP traffic.*** A packet is forwarded from a Token Ring network to an Ethernet network. *A network is not reachable because of faulty routing information.
The address specified by the sending host is nonexistent.12 Which type of message is generated by a host when the ping command is entered?*** ICMP echo request *ICMP echo replyUDP echo request
UDP error message13 Which of the following start the test of destination reachability?*** echo request issued by source *echo reply issued by sourceecho request issued by destination
echo reply issued by destination14 Which ICMP message is sent to a source host when the hop count to the destination is greater than the TTL value of a packet?echo replytimestamp replydestination unreachable*** time exceeded *source quench Module 9 1 Which ICMP message type notifies source hosts that a receiving host or network is not available?time exceededredirect*** destination unreachablesource quenchparameter problem
echo reply2 Which two are true regarding the debug commands? (Choose two.)Debug commands may be issued from the user EXEC prompt.*** The command undebug all will turn off all debug operations.By default, the router sends the debug output and messages to the telnet session.*** The high processor overhead incurred using debug may disrupt normal router operation.The debug all command provides a summary view of router activity and can be used frequently for troubleshooting.
The show debugging command will display current events such as traffic on an interface and error messages generated by nodes on the network.3 Which of the following commands can be used to statically configure default routes? (Choose two.)ip static-route*** ip routeip network-route*** ip default-network
ip default-static4 At which OSI layer does the routing of email packets from the source network to the destination network occur?applicationsessiontransport
*** network5 When issuing the show interfaces serial1 command, a network administrator receives the output shown in the graphic. What are the possible causes of an increase in the number of input errors? (Choose three.)There could be Layer 3 addressing problems.*** There could be a problem with faulty telephone equipment.*** The router hardware could be defective.There is an incorrectly configured encapsulation on the interface.
*** There could be a problem with the cabling.6 Which two are true regarding the output shown in the graphic? (Choose two.)Network 192.168.44.0 is 610 routers away from the source router.*** A packet destined for host 192.168.80.24 will be forwarded out the Serial0 interface.The subnet mask for the networks is 255.255.255.240.*** The router is receiving IGRP updates through its serial interface.
This router is using three different routing protocols.7 The show interfaces command provides line and protocol status information. Which of the following conditions would never occur in the output of this command?serial1 is up, line protocol is upserial1 is up, line protocol is downserial1 is down, line protocol is down*** serial1 is down, line protocol is up
serial1 is administratively down, line protocol is down8 After issuing the command traceroute 192.168.4.2 from Router A, the following information is returned.Tracing the route to Router_D (192.168.4.2)1 Router_B (192.168.2.2) 16 msec 16 msec 16 msec2 * * *3 * * *What can be concluded about the network shown in the graphic based on the output given?Network 192.168.5.0 is missing from the routing table on Router A.*** There is a problem with the connection between Router B and Router C.Router C is not running CDP.Some of the routers are non-Cisco devices.
Router B was not able to return ICMP TEMs to Router A.9 During the lookup process when forwarding a packet, a router checks its routing table for the best path to the destination. If a route has an administrative distance of 0, what does this indicate to the router?The packet should be discarded.The destination is unreachable.*** The destination is a directly connected network.
The source of the update for that route is unreliable.10 Which of the following would be the default administrative distance of a static IP route that references the IP address of the next hop?0*** 15
2011 Which items would be displayed when the show ip protocol command is executed? (Choose three.)*** sources of routing updates*** networks being advertisedrouting protocol up or downconfigured routed protocolsLayer 2 status of the interface
*** update timer values12 A network administrator suspects that a network is not being included in the routing updates. Which command will provide information on when the next update is due and which networks are advertised in the update?Router# show interfacesRouter# show controllers serial*** Router# show ip protocolsRouter# show ip route
Router# show running-config13 Which of the following lines from the show interfaces output would indicate a Layer 2 problem?Serial1 is up, line protocol is up.*** Serial1 is up, line protocol is down.Serial1 is down, line protocol is down.
Serial1 is administratively down, line protocol is down.14 After issuing the show interfaces command, a technician notices the line "Serial1 is down, line protocol is down" in the output. Which of the following are possible reasons for this message output? (Choose three.)There is a mismatch in the encapsulation type on both ends of the link.*** A Layer 1 issue exists.*** An interface problem exists.The clockrate was not set during configuration.*** There is no usable media for the protocol.
Keepalive messages are not being sent.
15 Refer to the network graphic. A packet needs to travel from Router F to Router A. Which path would be se


.msgcontent .wsharing ul li { text-indent: 0; }



分享

Facebook
Plurk
YAHOO!


123456789

~三八閔生日聚餐~

dfgfg sddsf fdggg sdfsdf dfg 


~三八閔生日聚餐~
三八閔又老ㄌ一歲辣.....生日快樂捏......
前晚才吃完烤肉...隔天大夥又聚在一起吃老二土雞城辣.....我看ㄚ....在這樣吃下去大家都會變胖男胖女嚕.....
...那天先是去ㄌ漢神去挑壽星ㄉ禮物.....哈哈....猜我們看到誰辣
...是女人我最大PK賽中ㄉ化妝師小偉...
於是更不能放過拍照ㄉ機會嚕......女人ㄉ錢真ㄉ很好賺ㄛ....女人可真辛苦ㄋ....那麼多東西要買....不過能讓自己美美ㄉ....也不賴辣
原本今年ㄉ中秋是要去ㄚ里山渡過滴...不過因為大夥ㄉ時間喬不定...就取消ㄌ....
阿勇仔...可能無法妳和三八閔出國去巴里島ㄌ....雖然真ㄉ粉想跟你們去...因為畢竟一起出國是大家共同ㄉ心願....我們問過北鼻ㄉ媽咪ㄌ...她要我們把摳摳存下來....等完婚後要去蜜月旅行再去就行ㄌ....因為妳也知道搬新家有好東東西要買.....
123456789

叫賣

dfg fdggg dfg fggg sdfsdf 


叫賣
11月11日
這個禮拜天又是特別一天啦~怎麼說...本姑娘去了食品展"叫賣"
記得上次叫賣的經驗是9/21大地震愛心捐款活動,真是好幾年了
本來到賣場真是手足無措,怕幫倒忙....被駡...找錢找錯
雖自己有店可以老神在在,但畢竟不是自己的,但還好...並不是錯太多...好佳在
也許是因為某人一直注意我,照顧我好讓我自在些(但真的很久沒在站那麼久了)
第一次介入某人的工作環境,心裡感覺有點不一樣...
現場人很多,一開始真的很不適應,有點缺氧的感覺,但後來喝了愛心的奶荼後
好很多了...從很小聲叫賣到很大聲叫賣...讓我也很快適應了那個環境
下次應該可以很自然表現吧...(應該還有下次吧)
今天雖然有點累,但也很充實...不同的環境也是不同的訓練呀
無論如何很開心今天也可以和某人一整天在一起,因為也很幸福呀
接下來活動會更多,我要去適應許多改變,也要去做調適...但我相信我可以的
因為某人也會給我力量和我一起打氣加油的~ 一起努力哦^_^

123456789

2011年12月13日 星期二

讓妳白皙動人的蔬果名單

dfg sdfsdf fggg dfgfg fdgdf 


讓妳白皙動人的蔬果名單  
讓妳白皙動人的蔬果名單  如何防曬美白是時下年輕人最熱門的話題,要如何運用最自然、真正能體內改造善以達到美白的方式呢?其實有許多新鮮的蔬果具有美白功效喔~大家可多吃下列蔬果來幫助美白:(水果類)*櫻桃:研究指出,每100克新鮮櫻桃中,含糖8克、蛋白質1.2克、胡蘿蔔素0.3毫克、鐵5.9毫克等。鐵元素可提高血紅蛋白質的含量,讓人面色紅潤,胡蘿蔔及維生素C可美白皮膚細膩、有彈性。 *荔枝:據研究,荔枝含有糖、檸檬、蛋白質、果膠、維生素C、磷、鐵等。維生素C及鐵都是讓皮膚健美、面色紅潤的重要物質。*番石榴:含有維生素C、果糖、葡萄糖、蔗糖等,可攝取到十分豐的維生素C。*蕃茄:有豐富的維生素、礦物質、碳水化合物、有機酸及少量的蛋白質,蕃茄帶有酸性,有保護維生素C的作用,還能吸收大量的維生素C,非常適合想美白的人服用。 另外蘋果、西瓜、葡萄、鳳梨、梨子、桃子等夏季水果,都含有豐富的維生素C,在新鮮時多吃,可達到美白的功效。 (蔬菜類)*豌豆(碗豆苗):含有蛋白質、維生素A、C、B2等,及微量元素鈣、鎂、鋅等。缺乏維生素A時,會使皮膚乾澀、粗糙。維生素C是一種抗氧化劑,有抑制黑色素形成的作用。*黃豆芽:黃豆芽含維生素C 、E、蛋白質等。維生素C可保持肌
膚有彈性。防止皺紋,維生素E可防止皮膚色素沈者,消除黑斑、黃褐斑,常吃黃豆芽就可收到美容的效果。 *冬瓜:冬瓜特別含有微量元素鋅、鎂等。鋅能使人精神煥發;鎂能讓人面色紅潤。


.msgcontent .wsharing ul li { text-indent: 0; }



分享

Facebook
Plurk
YAHOO!


123456789