问题 问答题 简答题

简述夜床服务操作程序。

答案

参考答案:

夜床服务通常在18:00以后开始。

(1)在进入房间前,首先要根据住客情况简表和实际住房情况,确定开夜床路线,并做好相应准备工作,如检查工作车上的客用易耗品及工具是否齐全、准备好各类表格及VIP特殊用品等。

(2)然后按进房程序进房,填写进房时间。如挂有“请勿打扰”牌,“在门下放置、或在门把手上悬挂开床卡片”(《星级饭店访查规范》关于夜床服务标准的部分表述),并做好登记;如客人在房间,征得客人同意后方可进房;如客人不需要服务,要做好记录。

(3)开灯:亮着所有房灯,并将空调开到指定的刻度上。

(4)关好窗帘;

(5)清理所有餐车及餐具,放回工作间中;

(6)收集杯子及烟灰缸,置於洗手盘洗;

(7)清到垃圾桶,半垃圾倒进房品车的垃圾袋中;

(8)将放在床上的东西放在一旁;

(9)开床:

①将被子向外折成45º,以方便客人就寝。

②拍松枕头并将其摆正,如有睡衣应叠好放置于枕头上。

③按酒店规定在床头或枕头上放上鲜花、晚安卡、早餐牌或小礼品。将住客开床前床上东西放回。

④标准间按住客人数开床,住一位客人时开靠洗手间的床,住两位客人时两床对开。在棉被1/2处翻开折叠成90度

⑤将拖鞋拿出,打开后放在床边。

⑥将住客衣服挂进衣柜里,整理房内散布的杂志等物件

(10)清洁浴室

①清洁客人用过的浴缸、面盆、坐厕、淋浴间、镜面,清洁后关闭厕盖。

②将客人自带物品摆放整齐。

③更换客人使用过的“四巾”。补齐客用耗品。

④地巾铺在淋浴间门口地面上。将浴缸或浴棚专用防滑垫,平铺在浴缸前或浴棚内底部。

⑤清洁完后,将卫生间门呈30度角敞开

(11)检查及补充迷你酒吧;补充物品;

(12)最后视察房间是否整洁;

(12)出门口灯及开的那一边外,其余的灯全熄;

(14)如果有客人在房间时征询客人是否需要提供其他服务,并就打扰客人表示歉意。祝客人晚安,躬身面对客人,后退二步,转身离房。轻轻关上房门,填写出房时间及相关记录关闭房门,然后离去。

单项选择题
阅读理解

They may be just passing your office, computer bag slung (悬挂) over one shoulder. Or they may be sitting in a car outside it, causally tapping away at a laptop. They look like innocent passers-by. In fact, they are stealing your corporate secrets.

Drive-by hacking is the trendy term given to the practice of breaking into wireless computer networks from outside the buildings that house them. A recent study in the UK, sponsored by RSA Data Security, found that two-thirds of organizations with wireless networks were risking their data in this way. Security experts patrolled (巡逻) several streets in the City of London seeking evidence of wireless networks in operation.

Of 124 that they identified, 83 were sending data without encrypting(加密)them. Such data could readily be picked up by a passer-by armed only with a portable computer, a wireless modem and a few pieces of software that can be freely downloaded from the Internet.

The data could include sensitive company documents containing valuable information. Or they could be e-mail identities and passwords that could be used by hackers to log into corporate networks as if they were legal users.

Most companies using wireless networking technology do not take even the simplest of measures to protect their data. Nearly all wireless network technology comes with some basic security features that need only to be activated (激活) in order to give a minimum level of security, for example, by encrypting the data being passed over the network.

Raymon Kruck, business development manager at Check Point Software, a security technology specialist, believes this could be partly a psychological problem. People see the solid walls of their building as safeguards and forget that wireless networks can extend up to 200 meters beyond physical walls.

Companies without any security at all on their wireless networks make it ridiculously easy for hackers to break in. Switching on the security that comes with the network technology should be automatic. Then there are other basic steps a company can take, says Mr. Kruck, such as changing the passwords on the network from the default (默认) setting.

Companies can also install firewalls, which form a barrier between the internal network and the public Internet. They should also check their computer records regularly to spot any abnormal activity, which might betray the presence of a hacker.

小题1:According to the study sponsored by RSA Data Security, two thirds of the subjects _______.

A.had most of their company data stolen

B.depended on wireless computer networks

C.were exposed to drive-by hacking

D.were unaware of the risk of wireless hacking小题2:Which of the following is NOT considered in the study?

A.The number of computer hacking incidents.

B.The number of wireless computer networks identified.

C.The way in which data are sent and received.

D.The way in which data are hacked and stolen.小题3:Most wireless network technology has_________.

A.data encryption program

B.password security programs

C.illegal-user detection

D.firewall小题4:Raymond Kruck most probably agrees that wireless network security involves ________.

A.wireless signal administration

B.changes in user’s awareness

C.users’ psychological health

D.stronger physical walls小题5:The passage is most likely to be seen in a __________

A.book review

B.science fiction

C.textbook

D.computer magazine