1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ostrovityanka [42]
2 years ago
6

What would be the key steps to consider if you are thinking about renting your facility to a potential user for an event

Computers and Technology
1 answer:
vlabodo [156]2 years ago
8 0

The key steps to consider in renting facility to a user is that there should be  Rental agreement, see personnel needs, follow guidelines of government etc.

<h3>What is Facility Management?</h3>

Facility Management is known to be the primary purpose to making sure that a facility is handled or run well and smoothly. It should also be safe for its intended use.

Note that in renting a place out, one must look at the Rental agreement so as to know what to do and one should also follow the guidelines set by government standards and handle any form of legal issues.

Learn more about event from

brainly.com/question/25821071

You might be interested in
Civil engineering structures are also called _________.
spayn [35]

Answer:

Hey mate here is your answer

Civil engineering structures

Civil structural engineering includes all structural engineering related to the built environment. It includes: Bridges. Dams.

So, Civil Structural engineering

please mark me as a brainliest

4 0
2 years ago
Ken has discovered that a vice president of his company has been using his computer to send data about a new product to a compet
yaroslaw [1]
Report the person through proper channels
7 0
3 years ago
What is a risk or an effect of software piracy?
Butoxors [25]
Piracy is a term used to describe the practice of obtaining or using software in a manner that is illegal or not in keeping with the terms under which the software was distributed. This can range from purchasing or copying the software, to using the software without a license, to selling, renting, or otherwise distributing it without authorization.<span>The Business Software Alliance estimated the losses to software companies in 2005 as a result of piracy at over $30 billion.</span>
5 0
4 years ago
Read 2 more answers
ap csp The local, remote, and upstream _______ can each have multiple ___ _____. When a participant in a collaborative group on
ratelena [41]

Answer:

The Local, Remote and Upstream repository can each have multiple push /pull requests. When  a Participant in a collaborative group on Github is ready to have their work used by the group,  the participants makes a pull request.

Explanation:

These are simple blanks which are answer here

The Local, Remote and Upstream <u>repository</u> can each have multiple <u>push /pull</u> requests. When  a Participant in a collaborative group on Github is ready to have their work used by the group,  the participants makes a <u>pull request</u>.

8 0
4 years ago
Direction. List down 5 preventive maintenance tips in using tools and equipment.<br>1.​
PSYCHO15rus [73]

Answer:

Explanation:

preventive maintenance tips in using tools and equipment.

1. Inspect tools and equipment on a regular basis so as to avoid unexpected breakdown.

2. Clean tools and equipment immediately after use. It is important to wash or clean tools after using them in order to avoid clogging of dirts on them

3. Replace tools and equipment back to their respective storage place immediately after using them

4. Lubricate your tools and equipment to avoid rusting. Lubrication means to oil especially metal tools and equipments.

5. Always follow the instructions of use and maintenance of tools and equipments as stated by the manufacturer.

3 0
4 years ago
Other questions:
  • Achieving a degree in computer forensics, information technology, or even information systems can provide a strong foundation in
    11·1 answer
  • Establishing responsibilities, planning to best support the organization, acquiring validity, ensuring performance, conformity w
    12·1 answer
  • Which function will add a grade to a student's list of grades in Python? add() append() print() sort()
    5·2 answers
  • Write a C# program named InchesToCentimeters that declares a named constant that holds the number of centimeters in an inch: 2.5
    14·1 answer
  • A small group of travelers is meeting inside an ancient building, and the travelers need access to the Internet using their mobi
    13·1 answer
  • By recording where a hockey puck goes into a net, a goalie can...
    8·2 answers
  • An organization has hired a new remote workforce. Many new employees are reporting that they are unable to access the shared net
    11·1 answer
  • USE THIS CODE ON FETCH REWARDS FOR BRAINLIEST​
    10·1 answer
  • On tool hackers use to get sensitive information from victims is/are:
    15·2 answers
  • With social media presence growing why is cyberbullying at an all time high
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!