Skip to main content

毕业工作的大概时间表

发信人: mastermax (Doctor D.), 信区: Oversea
标  题: 毕业工作的大概时间表
发信站: 水木社区 (Sat Aug  8 11:44:02 2009), 站内

如果你09毕业工作
大概是08年秋天开始留意工作机会,年底开始准备材料
然后开开心心过年,三月份开始面试,电话,onsite
三月份,四月份是最累的,要准备很多对方的背景,然后可能要不停的出差,和人打交道
然后就是五月份
开始等offers,如果有多个offers,那恭喜你,好好挑挑
毕业在夏天之前毕业就行,提前三个月转换身份
记得工作之前争取答辩,不然工作了回来答辩会很痛苦

--
不要迷恋哥,哥只是个传说!哥早已不在江湖,江湖上却流传着哥

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...