Skip to main content

5大職場新手常犯的錯誤

http://gengwg.blogspot.com/從學校溫室到殘酷職場,新人不適應症總體檢 !

換腦袋,向「新手病」說再見

1.新手病→工作好無聊,每天做一樣的事

   處方箋→蹲低才能跳遠,莫小看瑣事

2.新手病→我進公司是來學習的

   處方箋→告訴公司我能貢獻什麼

3.新手病→公司或前輩有義務教我

   處方箋→自己要主動偷學與模仿

4.新手病→我只是出力,成敗和我無關

   處方箋→每個團隊成員都要扛責任

5.新手病→棘手麻煩任務閃避為妙

   處方箋→只要做過,能力就是我的

教你快速通過試用期,第一次工作就上手!

別懷疑!這就是職場真相

▓在學校60分就及格,在職場隨時淘汰最後5%

▓在學校不想上課就蹺課,在職場不想上班就滾蛋

▓在學校獨善其身,在職場要接受份外工作

▓在學校大家都是好兄弟,在職場尊卑倫理不可少

▓在學校不喜歡就說No,在職場沒有挑工作的權利

▓在學校遲交沒什麼大不了,在職場拖延進度要砍頭

▓在學校要有自信抱負,在職場最怕眼高手低

▓在學校鼓勵勇於表達,在職場多聽少說別批評

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...