CICS培训材料
- 格式:pptx
- 大小:1.00 MB
- 文档页数:27
《旋涂法制备CICS薄膜太阳能电池光吸收层》篇一一、引言随着科技的进步和人类对可再生能源的迫切需求,薄膜太阳能电池的研究与发展已成为科研领域的热点。
其中,CICS(一种高效的光电材料)薄膜太阳能电池以其高效的光电转换效率和低成本的生产工艺受到广泛关注。
本文将重点探讨旋涂法制备CICS 薄膜太阳能电池光吸收层的过程及其对提高电池性能的影响。
二、旋涂法制备CICS薄膜的原理旋涂法是一种常用的制备薄膜的方法,其原理是利用离心力将溶液均匀地涂布在基底上,形成均匀的薄膜。
在制备CICS薄膜太阳能电池光吸收层时,首先将CICS溶液滴在基底上,然后通过高速旋转基底,使溶液在离心力作用下均匀地分布在基底上,形成均匀的薄膜。
三、旋涂法制备CICS薄膜的步骤1. 准备基底:选择合适的基底,如玻璃、塑料等,并进行清洗和预处理。
2. 配置溶液:根据需要,将CICS材料溶解在适当的溶剂中,形成均匀的溶液。
3. 旋涂:将溶液滴在基底上,然后以一定的速度旋转基底,使溶液在离心力作用下均匀地分布在基底上。
4. 干燥:将涂有溶液的基底进行干燥处理,使溶剂挥发,形成均匀的CICS薄膜。
5. 后续处理:根据需要,对CICS薄膜进行热处理、掺杂等后续处理,以提高其性能。
四、旋涂法制备CICS薄膜太阳能电池光吸收层的优势1. 制备工艺简单:旋涂法操作简便,设备成本低,适合大规模生产。
2. 薄膜均匀性好:通过控制旋涂过程中的参数,可以制备出均匀性好的CICS薄膜。
3. 薄膜厚度可控:通过调整旋涂时间和转速等参数,可以控制CICS薄膜的厚度。
4. 适用于大面积制备:旋涂法可以制备大面积的CICS薄膜,满足太阳能电池的需求。
五、实验结果与讨论通过旋涂法制备的CICS薄膜太阳能电池光吸收层具有优异的光电性能。
实验结果表明,旋涂法制备的CICS薄膜具有较高的光吸收系数和较低的电阻率,有利于提高太阳能电池的光电转换效率。
此外,通过优化旋涂过程中的参数,可以进一步提高CICS薄膜的均匀性和致密性,从而提高太阳能电池的性能。
1. A task is the execution of an applicationprogram.• Multitasking: Two or more tasks canexecute at the same time.• Multithreading: Two or more users canaccess the same copy of a program atthe same time.2.Under CICS, a user cannot directly invokea program. Instead, the user invokes atransaction, which in turn specifies theapplication program to be run.• When a user invokes a transaction, CICSlocates the application programassociated with the transaction, loads itinto main storage (if it isn’t in storagealready), and starts a task (running thatprogram).3.The difference between a task and atransaction is that while several usersmay invoke the same transaction, eachis given a separate task.• Each transaction is identified by a uniquefour-character code called a transactionidentifier, or trans-id4.PCT(Program Control Table).• Basically, the PCT is a list of validtransaction identifiers. Each trans-id inthe PCT is paired with the name of theprogram CICS will load and executewhen the transaction is invoked.5.PPT (Processing Program Table)• Another CICS table called the ProcessingProgram Table, or PPT, contains a list of allvalid program names. This table keeps trackof which programs are located in storage. • CICS uses PPT to determine whether a new copy of a program needs to be loaded intostorage when a transaction is invoked.• CICS tables such as PCT, PPT are createdby system programmers and used byapplication programmers.6.PCT (Program Control Table)Trans-id Application ProgramODR1 -----------------→ ORDPGM1PAY1 -----------------→ PAYROLLTRN1 ----------------- TRNPGM17.PPTTRNPGM1 …. 1 ….. (one copy in storage)ORDPGM1 …. 1 .…. (one copy in storage)PAYROLL .... 0 ….. (n ot in storage):8.How a transaction works1. A user enters the trans-id TRN1 . Then,CICS searches the Program Control Table(PCT) to find the program to be executed.2. Then CICS searches the ProcessingProgram Table (PPT) to determine if theprogram is cu rrently in main storage. If it isn’t,then CICS locates the program on disk, loadsit into storage, updates the PPT, and initiatesa new task.9.Each terminal in the CICS system must bedefined in the Terminal Control Table(TCT). Each terminal in this table is assigned aunique one- to four-character terminal identifier,or term-id.10.Each file accessed by CICS must be defined in theF ile C ontrol T able, or FCT. The FCT specifies the filename, along with other information such as the file type(F,V) and the operations (read/write/update…) that canbe performed on the file.11.CICS services:a) 1. The data communication services allow usersto communicate with programs through theirterminals.i.How an application program communicates withterminal devices?• Terminal control lets you send text orreceive text from the terminal that initiated thetask.• B asic M apping S upport (BMS) lets youcreate maps that specify the position and thecharacteristics of the individual display elementson the terminal screen.b)The data management services let programsaccess data stored in files or databasesi.CICS provides three services to manage data: filecontrol, SQL, and DL/I. (3 ways to access data ondisk)1. File control passes data requests made by aprogram to VSAM. VSAM, in turn, manages the datastored in files on DASD.2. SQL for DB23. DL/I for IMS12.CICS creates a task to process atransaction that is initiated by the userentering a transaction ID into the system. ACICS task is the internal representation ofthe user’s tran saction.• In CICS, it is possible for multiple users toenter the same transaction ID at the sametime (concurrently). CICS creates aunique task (task-id) to represent eachtransaction. Therefore, several tasks maybe ready and waiting for execution at anygiven moment.13.There’re three major stages in a task’slife cycle:1. Ready to execute2. Executing3. Waiting (waiting for a service,usually an I/O, to complete)14.While one task is waiting, asecond task can execute. This is how CICSachieves concurrency.15.The steps in the transaction processingcycle are:• A transaction ID enters to the CICSsystem.• CICS creates a task that is ready toexecute. Several tasks can be at ‘ready toexecute’ stage at one time.• CICS dispatches the task that shouldexecute next.• The task executes. The task invokes a program and passes control to it.The program calls CICS to perform aservice on its behalf such as a terminalor file I/O operation.• The task waits for the services tocomplete. Another task is dispatchedwhile the first one is waiting.• The service is completed and the CICStask is re-dispatched for execution.• The program issues a RETURN commandand CICS terminates the task and releaseresources16.Multitasking – The CICS allows more thanone task to be executed at the same time.• Multithreading –Allows all the users in aCICS region to use the same copy of aprogram at the same time. For multithreadingto work, the program must be reentrant.•a truly reentrant program cannotmodify data in working storage.• CICS accomplishes multithreading byproviding a separate copy of workingstorage for each user running the program17.Traditional CICS BMS tasks issue receive map,process transaction logic, send map, and returncontrol to CICS. They can be further classifiedinto Pseudo-conversational andconversational.• A number of programs may participate in a CICStransaction. EXEC CICS LINK and EXEC CICSXCTL are the usual API.18.CICS programs do not use statements such asACCEPT, DISPLAY, READ, WRITE, OPEN, andCLOSE. Instead they issue CICS commands toperform terminal I/O, file I/O, Program loading and control, and other functions requiring an externalresource.• All CICS commands have the format:EXEC CICScommand options …END-EXEC.• CICS programs can be written in COBOL, C++,JAVA, Assembler and …. No matter which language is used, the basic format of CICS commands is thesame.19.The difference between a taskand a transaction is that while several usersmay invoke the same transaction, each isgiven a separate task20.CEDA• CICS creates these internal control tablesbased on resource definitions created bysystems programmers.• Systems programmers use ResourceDefinition Online (RDO) to defineresources such as transactions andprograms from a CICS terminal.• Trans-id for RDO is CEDA, RDO issometimes referred to as CEDA.21.CESF - Sign off• CESF – Sign off from the CICS system.Your terminal remains connected to CICS.• CESF LOGOFF – Sign off from the CICSand disconnect your terminal from CICS.22.CEMT - Mast Terminal functions• To invoke all the master terminal functions.• By using this function, an operator can inquireabout and change the values of CICS systemparameters, alter the status of the systemresources, terminate tasks, and shut downthe CICS system.• CEMT can also open/close a file,enable/disable a trans-id/program, bring in anew copy of program, etc23.CEOT - to inquire about the status of yourown termi CWTO - W rite messages T o the console O perator.24.CWTO ‘System slow!’‘System slow!’ wil l be sent to operator console.25.CMSG – Message Switching. To send messagesfrom your terminal to another terminal.CMSG ‘System is coming down at 22:00’,R=all,SCMSG ‘Hello from Denny’,R=term-id,Sterm-id: is the terminal that you send the message tonal 26.CEDF – the E xecution D iagnostic F acility used todebug a program. Used for testing applicationprograms that are associated with usertransactions initiated from a terminal.27.CEDA – Define resources to CICS system.Resources : program, mapset, file, transaction28.To run your application system, you need tosupply CICS with information about yoursystem resources, including softwareresources such as files, programs,mapsets, and transactions, and hardwareresources such as terminals, printers29.On the first line of this screen, you can see the nameof the map(inqmap1) that’s used to display thisscreen and the trans-id(INQ1 ) that’s used to start the program. In addition, you can see the name of theprogram, Customer Inquiry. This information helpsthe user identify the map and the program thatdisplays it.30.A conversational program is an online programthat sits idle(空闲) while it waits for user input. (like screen 1)• When a conversational program first starts, itsends its initial map to the terminal. Then, itenters into a loop while it waits for input,retrieves the input data from the terminal,processes the data, sends its output to theterminal, and waits again.• While a conversational program waits for userinput, the task associated with that program(resource) remains in storage. Because of that,conversational programs are inefficient in termsof virtual storage usage.a)Conversational programs are often thecause of a CICS condition known as Shorton Storage, or SOS.• When CICS goes short on storage(SOS), itsuspends all work and beginsterminating tasks in an effort to free upstorage31.How pseudo-conversationalprogramming works• The solution to the inefficiencies ofconversational programs is to remove the taskassociated with a program from storage whilethe program is waiting for terminal input.• For example, while the map for the customerinquiry program is displayed, the inquiry programitself has terminated and its task is no longer instorage. When the user enters another customernumber and presses the Enter key, the inquiryprogram is restarted. The result is that thetask is in storage only when it needs to be:when the program is processing dataa)Because pseudo-conversationalprograms use main storage and otherCICS resources far more efficientlythan conversational programs, almostall CICS installations require thatprograms be pseudo-conversational.• Unfortunately, pseudo-conversationalprogramming is more difficult to codeb)With pseudo-conversational programming,a program ends after it sends data to aterminal. This releases some of theresources that are used by the program.Then, CICS restarts the program when theuser completes an entry and presses one ofthe terminal’s attention identifier (AID) keys32.CICS commands for passing controlfrom one program to another• ABEND - Transfers control to an abendroutine or returns control to CICS.• LINK - Invokes a program at a lowerlevel.• XCTL - Transfers control to anotherprogram at same level.• RETURN - Returns control to CICS orthe invoking program (higher level)33.CICS commands for doing BMScontrolled screen interactions• SEND MAP - Sends information to theterminal for display.• RECEIVE MAP - Retrieves input datafrom the terminal.34.A CICS command that receives data fromthe terminalEXEC CICSRECEIVE MAP('INQMAP1')MAPSET('INQSET1')INTO(INQMAP1 I)END-EXECThis command tells CICS to receive datafrom a terminal using a mapset namedINQSET1 that defines a map namedINQMAP1 . The data in that mapset should bereturned to a group item in working storagenamed INQMAP1 I35.A CICS command that sends data to a terminalEXEC CICSSEND MAP('INQMAP1')MAPSET('INQSET1')FROM(INQMAP1 O)DATAONLYEND-EXECSend data from a group item in workingstorage named INQMAP1 O to a terminalusing a mapset named INQSET1 thatdefines a map named INQMAP1 .36.BMS mapset• Before you can code a CICS program,you need to create a BMS mapset todefine the screens that are going to beused by the program. This mapsetincludes all the fields that are going tobe displayed on the screens as well asthe fields that need to be entered bythe user. This is the screen layout.a) A BMS mapset is an assemblerlanguage program that definesthe format of the maps that areused by a program. After youcode a mapset, you need to codeJCL to assemble it to produce aphysical mapset and asymbolic mapset (copybook)i.The physical mapset is used byCICS to determine the location,appearance, and operation of datathat’s displayed on a screen whenthe program that uses the mapsetis run.ii.The symbolic mapset is a COBOLcopy member that allows you tomanipulate the screen data in yourCOBOL program. It can be copiedinto the COBOL program thatuses the mapsetb)To code a BMS mapset, you use twoassembler commands (PRINT NOGEN andEND) and three macros: DFHMSD to start themapset; DFHMDI to start each map; andDFHMDF to define each field within a map. Toend a mapset, you code another DFHMSDTYPE=FINAL.i.The first DFHMSD macro defines a mapsetnamed INQSET1 . Its parameters specify that thesymbolic map that BMS generates from thismapset should be in COBOL (LANG=COBOL),that the symbolic map should include fields forboth input and output (MODE=INOUT), andthat the mapset should work with a standard3270-type display station (TERM=3270-2).ii.Next, the DFHMDI macro defines amap named INQMAP1 that representsone screen (map) that this programrequires. This macro specifies that thesize of the screen display is 24 linesof 80 characters each and that the mapshould be displayed starting in column1 of line 1 .iii.The other macros in this mapset except thelast are the DFHMDF macros that definethe fields on the screen. For example, the6th DFHMDF macro defines a customernumber field named CUSTNO. It says thatthis field should be positioned at column 26in the 5th line. Actually, the POS parameterdetermines the location of the attribute bytefor each field. This byte, which precedeseach field, determines the characteristics ofthe field. As a result, the customer numberfield will actually start in column 27 of line 5.The other parameters for a field give thelength, attributes, color, and initial value forthe field.you need to include a label on theDFHMDF macro for any field you’llneed to refer to in the COBOL codeiv.The last macro in the mapset is a DFHMSDmacro. On this macro, you code a singleparameter to mark the end of the mapset:DFHMSD TYPE=FINAL1.DUMMY DFHMDF POS=(24,79), xLENGTH=1 , xATTRB=(DRK,PROT,FSET), xINITIAL=' 'DFHMSD TYPE=FINALEND37.ATTRB=(NORM,UNPROT,IC)38.ATTRB=(DRK,PROT,FSET)39.You can use DFHMAPS PROC inDFH410.CICS.SDFHPROC toassemble the mapset to producea physical mapset and a symbolicmapset (copybook).a)The symbolic map assembler produced:01 INQMAP1 I.02 FILLER PIC X(12).02 TRANIDL COMP PIC S9(4).02 TRANIDF PICTURE X.02 FILLER REDEFINES TRANIDF.03 TRANIDA PICTURE X.02 TRANIDI PIC X(4).02 CUSTNOL COMP PIC S9(4).02 CUSTNOF PICTURE X.02 FILLER REDEFINES CUSTNOF.03 CUSTNOA PICTURE X.02 CUSTNOI PIC X(6).b)01 INQMAP1O REDEFINES INQMAP1I.02 FILLER PIC X(12).02 FILLER PICTURE X(3).02 TRANIDO PIC X(4).02 FILLER PICTURE X(3).02 CUSTNOO PIC X(6).c)The group item named INQMAP1I is redefinedby a group item named INQMAP1O. The fieldsin the INQMAP1I group item are intended foruse with input operations, and the fields in theINQMAP1O group item are intended for usewith output operations. As a result, differentpictures can be used for input and output.d)So the name of the inputfield for the field labeled CUSTNO is CUSTNOI,the name of the length field is CUSTNOL, thename of the attribute field is CUSTNOA, andthe name of the flag field that indicates achange is CUSTNOFe)For each input field in the mapset1I, thesymbolic map contains a field that indicates thelength of the data in the field (L), and a fieldthat contains the display attributes (A), and afield for input (I), and a field that indicates if theuser made changes to the field (F).In the redefined area for the output fields, you’llnotice that only the data fields are named,like CUSTNOO and LNAMEO. The length,attribute, and change indicator fields arecoded as FILLER. To change the value ofany of these fields for an output operation, then,you have to refer to the fields in the input area.40.symbolic mapset is a copymember that you need to copy intoyour COBOL program.41.Top-down design• The basic idea of top-down design is to design aprogram by dividing it into its major functionalmodules, then dividing those modules into theirfunctional components, and so forth until eachmodule can be coded in a single COBOL paragraph.To develop and document this design, you can usea structure chart like the one on previous slide.• Each module is implemented as a single COBOLparagraph, and the paragraph name consists of themodule number followed by the module name.• ex. 1000-PROCESS-CUSTOMER-MAP.42.The Execute Interface Block (EIB)When you prepare (compile & link) a CICSprogram for execution, CICS inserts codethat’s needed for the program to operateproperly under CICS. One of these blocks ofcode is called the Execute Interface Block,or EIB. The EIB is inserted into the LinkageSection of a program when the program isprepared for execution.• The Execute Interface Block (EIB) is aCICS area and its fields containinformation related to the current task,such as the date and time the task wasstarted and the transaction-id that was usedto start it.a)Two of the fields in the ExecuteInterface Block (EIB) that you will useoften:01 DFHEIBLK..02 EIBCALEN PIC S9(4) COMP.02 EIBAID PIC X(1).b)The EIBCALEN field contains the length ofthe data passed to the program through itscommunication area (DFHCOMMAREA). Aprogram can use DFHCOMMAREA to storethe data that it will need the next time it’sexecuted. That’s necessary because thecontents of the working-storage fields are lostwhen a pseudo-conversational program ends.If the length of this area is zero, it means thatno data was passed to the program. In otherwords, the program is being executed forthe first time in a pseudo-conversationalsession.munication area can be usedto store the data that’s passed to and fromthe program. To use the communication area,you need to provide two definitions for it inyour program: one in the Working-StorageSection and one in the Linkage Section. Theworking-storage definition in this program isnamed COMMUNICATION-AREA, and theLinkage Section definition is namedDFHCOMMAREA. Although you can use anyname for the working-storage field, youmust use the name DFHCOMMAREA for theLinkage Section fieldc)The EIBAID field gives the value of the lastAID key that was pressed.• When the user presses an AID key, CICSpasses a one-byte value to the programthrough the EIBAID field in the ExecuteInterface Block. You can use the value ofthis field to determine the processing theuser has requested.• The DFHAID copy member contains literalvalues that correspond to the AID keys thatthe user can press to communicate with thesystem.i.To make it easy to write the code that tests thevalues in the EIBAID field, IBM supplies a copymember named DFHAID. It gives a name to eachof the values that represents an AID key. Forinstance, DFHENTER is the name for the valuethat represents the Enter key, and DFHPF3 is thename for the value that represents the PF3 key.43.When task ends, the program stays in storage(unless CICS purge it).• If you modified the program and translate, compile, link to create a new load module. When youexecute it again, you may execute the old modulewhich is still in storage.• You can use CEMT command to force CICS toload the new module into storage next timewhen you execute it.CEMT SET PROG(progname) NEWCOPY44.A data entry field requires two attributebytes, one to mark the beginning of thefield, and the other to mark the end.45.The last bit in the attribute byte is theModified Data Tag (MDT). This bit isused to indicate whether the data in thefield has been changed. It’s turned on(set to a value of 1) whenever a userkeys any data into the field. Then forefficiency, only fields with the MDTturned on are sent to your program.Unmodified fields are not transmitted.46.FSET: Causes the MDT bit in theattribute byte to be turned on. Thatway, the contents of the field will betransmitted back to the program,whether or not the user enters data init.• Usually , you don’t specify the FSEToption, since the MDT bit is setautomatically when a user keys datainto an unprotected field47.DUMMY DFHMDF POS=(24,79), xLENGTH=1 , xATTRB=(DRK,PROT,FSET), xINITIAL=‘ ‘• This field is one byte long, it’s dark andprotected so can’t be seen or modifiedby the user; and it’s always transmittedto the program because the FSEToption turns on the MDT bit, and theINITIAL parameter gives it a value ofspace.48.SEND MAP without MAPONLY orDATAONLY – Merge physical andsymbolic map, then send• SEND MAP DATAONLY – Only sendsymbolic map• SEND MAP MAPONLY – Only sendphysical map49.If the program is invoked with a LINKcommand, it operates at the logical levelbelow the invoking program.a)Each time a link command is issued, a fresh copyof the invoked program is loaded into memory andits working storage is initialized. This may causesystem degradation.The invoking and invoked programs are executingunder the same task.50.• If the program is invoked with an XCTLcommand, the invoked program operates atthe same logical level as the invokingprogram.a)When you use XCTL to invoke a program, the invokingprogram ends and its memory allocations arereleased since control will not return to it.The invoking and invoked programs are at the same logical level.Copy of COMMAREA (not the pointer) is passed toinvoked program.51.52.。
中越证券投资实战班培训内容方案一、【课程内容】随着越南证券市场的建立,企业与金融市场的联系发生了翻天覆地的变化,过去那种依托于传统融资方式的经营理念将面临着前所未有的挑战。
通过证券市场,选择成本更低的融资方式,实现企业的扩张与壮大,提高资金的利用效率,提高资金的安全性与收益性,这将成为企业在未来竞争中要立于不败之地的要求。
风险与收益并存,证券市场有着本身的发展规律和固有风险,企业如果意识不到这个问题将会面临极大的风险。
通过本次学习,了解中国证券市场发展的历史经验,熟悉证券各种证券投资方法,了解证券市场与企业发展的结合途径,才能获得经济发展给企业本身所带来的超常发展机遇和财富快速增加之路。
二、【课程特色】●课程特色突出极富指导意义专题的设置覆盖证券市场的方方面面,适合越南等经济转型国家工商企业人员、投资者掌握证券投资专业知识。
●集中脱产学习便于消化吸收学员置身风景优美、学风浓郁的莲湖,暂时脱离繁杂事务的纷扰,便于静下心来,梳理总结以往工作,及时消化吸收所学的知识。
●理论联系实际避免纸上谈兵理论讲授与案例分析相结合,既有专家教授,又有企业界人士,避免坐而论道,同时富于挑战性的模拟投资提供难得的实践机会。
●集聚校友资源再造职业生涯实行班主任带班制,学员选出班委会,真正为大家创造良好的学习、交流的环境。
学员成为广西财经学院校友,长期分享杂志、网站的信息和培训服务。
三、【师资力量】本方案的特聘教授主要是来自国内著名高校和专业研究机构的专家、学者,以及证券业内的资深人士,此外还有一些杰出的上市公司企业界成功人士。
四、【教学内容】全脱产学习两周,由资深教授和青年骨干教师共同授课,课程内容融合国内外证券投资理念,精选证券投资核心课程,系统全面又重点突出。
除此之外,还将组织证券投资研讨会及证券公司、上市公司参观,便于企业家和投资人士学习证券公司、上市公司管理知识和管理经验,形成良好的人力资源素质。
1.课堂学习本课程将以证券投资核心课程为知识体系,针对工商企业及投资者,设计了以下培训内容:第一部分证券投资实战技巧★基于经济发展趋势的价值投资方法★捕捉市场瞬间机会的技术分析方法★市场风险的认识与规避第二部分中国证券市场发展历程的借鉴★中国证券市场发展的经验与借鉴★中国证券市场发展现状★中国证券市场发展的未来之路第三部分WTO与中国证券业的发展★我国证券业的开放之路★企业境外上市的成功历程★QFII、QDII所带来的深远影响2.课堂外学习(1)学习期间安排到优秀上市公司实地调研及参观,吸取先进企业的成功经验。
待人接物1.应有的态度——如何在公司赢得好印象?除了在公司内打电话、接电话之类的技巧外,还包括将访客带到会客室、递出名片与接收名片的方法,以及替别人作介绍……等,各种在商业社会生存所不可缺少的礼仪。
如果你刚进入公司,影印资料、整理文件,以及端茶倒水之类的事,会显得特别的多。
或许你会觉得自己所从事的工作缺乏意义。
但事实上,你所从事的工作绝不是琐碎之事。
当你接听电话的那一瞬间,你就代表了公司。
假使你在电话里显出失礼的态度,对方会认为这是你所任职公司的失礼,有时还可能导致谈判破裂,最终失去顾客。
2.客人来访,应起身迎接——如君整理资料正在忙得不可开交,此时有位客人走进来。
如君腾不出空,只好继续做事,同时坐着向客人打招呼。
可是,这位来客见到她的上司便对如君坐着向他打招呼一事,表现出不满的情绪。
当然,如君也有她的苦衷,但在这种情况下,不论手上的工作多么繁重,对于访客,都应当站起身来行礼,这是最基本的礼节。
或许如君的心里怀着热情欢迎的想法,可是,在访客心里却不如此认为。
如果被客人看到你坐在媾做事,只是把头例行公事般地点一下,那么对方便很自然的有一种被忽略的感受。
记得当遇有客人来访之际,无论自己有多么忙,都应站起身来打招呼。
3.要跟访客问好——遇到访客,无论在何种情形下,都应抢先向对方问好,这才是正确的待客之道。
寒暄时的礼节为身份低的人先问候身份高的人。
而对于所有的公司来讲,访客都是居于上位者,因此必须由己方先致问候。
所以当见到不认识的访客时,要先行问好。
如果当时正与同事站着谈话而没打招呼,或者来访者是进进出出的业者,就不在此列。
4.鞠躬时眼睛要注视对方——鞠躬大致可以分为二类,即微微的点头致意和常见的敬礼。
无论采用哪一种鞠躬方式,都必须遵守基本原则。
在鞠躬的开始与结束时,都需看对方的眼睛。
无论行多少次敬礼,如果眼睛看着别的地方,这种行为也无异于是忽视对方。
此外,太快把头低下或抬起,都不能算是正确的鞠躬方式。