Skip to main content

标 题: 给你们总结一下支票

发信人: steveosu (加拉帕戈斯), 信区: Military
标  题: 给你们总结一下支票
发信站: BBS 未名空间站 (Tue Jul 31 18:05:41 2018, 美东)

大部分人的回答都不完全

1. 很多银行开户都不送支票。
2. 有些银行开户送支票,但是也只有几张。并且这种支票用途极为有限,因为开户送
的支票只有账号和routing号码,没有名字地址,很多地方不收bank opening check。
3. 支票的防盗能力并不强。很多地方超市的收到的顾客支票都是直接拿去根据支票上
的账号做ACH,并不是真正的兑现支票。完了之后顾客支票还乱扔,去年我们这的一个
连锁grocery store就发生过过去6个月的顾客支票统统被盗,然后有人的checking上出
现了不认识的ACH debit
4. 支票这玩意儿从法律上来说就是一个统一付款的证明。从商业法来说,你在一张餐
巾纸上写下账号,银行名字,收款人,你的签名,金额,法律效用跟支票是一样的,银
行也有责任必须兑现。
5. 我有一本支票本 但是过去五年内一共用了6张。现在支票本中最上面一张支票的号
码是1107.
6. 支票的真正用处在于大额转账(15K以上),方便,手续费低(另一种方式是wire 
transfer/ACH)。但是每年有多少次会有这样的交易?
7. 更多的大额转账,比如交地税,补收入税,现在都是采用直接授权ACH的方式,网上
直接走ACH debit,方便,快捷,省去了邮寄支票,甚至中途可能会丢失的麻烦。
8. 如果现在还有什么交易只收支票,那么我相信这个交易很快就会消失在市场中了。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...