Skip to main content

要和烙印工作,首先要了解烙印的民族性


老看到有人说烙印如何欺负老中,如何能说会道,老中如何被边缘化。。。。。

其实和他们相处,很简单一点,了解一下他们的民族。

烙印是个等级制度森严的民族,在印度,如果你等级高,你对你等级低的人说话的态度
语气用词之类的,都是不一样的,只要一分出等级,大家就自然而然的有一个的位置,
高低立现,而对于外族,他们不知道你的高低,所以首先就是说话的语气,态度,如果
你客客气气,唯唯诺诺,自然烙印就会觉得你对他是第一级的,对你的态度就自然是那
样的,在相处,共事交谈中,都会反应出来,对于他们是自然而然的。如果要踩什么人
,不踩你踩谁?

所以跟烙印打交道,首先就是不能示弱,用中国人的话说,就是不能太客气,甚至不能
有好脸。

也有很多人说,我跟烙印打交道都一直很好啊,没觉得他们怎么样。。。。。那我们可
以观察一下,说这话的人,是不是比较强势的?

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...