Skip to main content

最新中信代签流程

发信人: qqmmpp (爱琦琳爱生活), 信区: Reunion
标  题: Re: 最新中信代签流程
发信站: BBS 未名空间站 (Tue Nov 19 12:12:37 2013, 美东)

你这流程是正确的,昨天刚交完材料,也是多次抓狂崩溃,从周六到昨晚就没在12点前
睡过觉(因为要跟国内联系)...

就还有一点:
3,凭CGI号到中信银行缴费,交费后你的缴费收据号并入你的签证信息;.

这个中信需要有CGI号的打印件才能去柜台缴费。

如果没有打印页,只有一个号码(就像我,我这边打印了,但我没传给家里人打印页,
只告诉他们号码,因为刚开始说了只要号码),然后又想着马上缴费的话,可以叫家人
临时办个中信的卡,在外面柜员机上缴费,这样只要凭借CGI号就可以了。交完再去里
面柜台上要缴费单和收据单。

用卡在外面柜员机上缴费的还有一个好处就是,那个收据号会马上自动的进入你的签证
信息,不用自己输入(不知道在里面柜台上缴费是不是也是这样)。

【 在 gao1212 (老笨笨) 的大作中提到: 】
: 1,网填DS160表;
: 2,建立签证申请信息(包括家庭其他成员)并确定你收取护照签证的中信银行,提交
: DS160表的AA信息编号,获得CGI号码;
: 3,凭CGI号到中信银行缴费,交费后你的缴费收据号并入你的签证信息;
: 4,在你的签证申请信息页(需密码登录),回答问题后确定是面签和时间还是代签,
: 如是面签预约面签时间并打印生成的确认页;
: 5,携护照,照片,材料和(预约)确认页去使领馆面签或去中信银行代签。


http://gengwg.blogspot.com/

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...