Skip to main content

【進公司第一年就要知道】學會3件事,一生受用不盡

【進公司第一年就要知道】學會3件事,一生受用不盡

這3件事絕對不是什麼新概念,當然也沒有藏著驚人的祕密,但我卻是因此加快成長:

(1)一定要完成交辦的事務

頭腦好不好、優秀不優秀,對新人來說並不是最重要的。能不能把上級交代的任何工作做好?才是最重要的。

(2)及早交出,只完成五十分也無妨

我從來沒有顧忌那麼多,反而覺得上司嚴厲才能學得更多。完成自己能力所及的部分後,盡快給上司過目才是有益的。

(3)沒有無聊的工作

這世上絕對沒有什麼無聊的工作。即使是單調的工作,也有許多方法讓它變得有趣。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...