Skip to main content

淘宝成交量这么大 可是商家赚钱吗


我来回答楼主的问题,我是tb小卖家,兼职的,目前做了3年
美国有自己的仓库,有个兼职的助手,每天来几小时帮我收发快递
国内雇了两个大学刚毕业的女生,帮我做客服以及发货,每天的工作时间不会超过10小
时,早班的早上8点到晚上6点,晚班的下午1点到晚上11点,晚班的那位晚上就在自己
家里挂客服。两个人工资待遇都不差,至少在当地,比白领的收入水平还要好一点,而
且都是零经验开始的。两个人每周轮休一天,从不加班,就算碰上双十一这样的消费高
峰,也是两个人抓紧时间上班时间就把能发的都发走。确实挺辛苦的,但还不至于像楼
上说得二十多岁就要过劳死
至于我自己的收入,只能说,做tb比自己朝九晚五上班拿的死工资强太多了,triple都
不止

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...