1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Evgesh-ka [11]
3 years ago
15

Which document does one need to get permission to use a specific location for a project?

Computers and Technology
1 answer:
musickatia [10]3 years ago
6 0

A document that allows an individual or an organization to use a designated location for a project or other activity is a Permit.

This type of document is also called Location Permit, Protest Permit, Filming Permit, e.t.c. The specific name that is given to such permits can be influenced by the type of project or activity being executed and the agency granting such a license.

In most countries, government agencies, or councils are responsible for accepting, screening and approving, or disapproving applications for such permits.

Application for Project location permits may be denied if the project or activity that has been planned to be executed is unlawful or might constitute a hazard to the human or non-human community in such location.

In some cases, the requirements to be fulfilled besides putting in an application or a location permit, one may be required to pay fees and take up certain insurances.

Learn more about permits at the following link:

brainly.com/question/20417242

You might be interested in
5 efectos del desarrollo tecnológico en el medio ambiente
sineoko [7]

Answer:

english plzzz

Explanation:

5 0
3 years ago
Create a security management policy that addresses the management and the separation of duties throughout the seven domains of a
klio [65]

Seven Domains of IT Infrastructure Seven domains can be found in a typical IT infrastructure. They are as follows: User Domain, Workstation Domain, LAN Domain, LAN-to-WAN Domain, Remote Access Domain, WAN Domain, and System/Application Domain.

Explanation:

User Domain : The User Domain covers all theusers (of any rank) that haveaccess to the other six domains.

RISKS:

  • User can destroy data in application(intentionally or not) and delete all
  • User can insert infected CD or USBflash drive into the work computer

Workstation Domain : A computer of an individual user where the production takes place

RISKS:

  • The workstation’s OS can have a known software vulnerability thatallows a hacker to connect remotelyand steal data.
  • A workstation’s hard drive can fail causing lost data

LAN Domain : Contains all of the workstations,hubs, switches, and routers. TheLAN is a trusted zone

RISKS:

  • A worm can spread through the LANand infect all computers in it.
  • LAN server OS can have a knownsoftware vulnerability.

WAN Domain : Stands for Wide Area Network and consists of the Internet and semi-private lines

RISKS:

  • Service provider can have a major network outage.
  • Server can receive a DOS or DDOS attack.
  • A FTP server can allow anonymously uploaded illegal software

LAN / WAN Domain : The boundary between the trusted and un-trusted zones.The zones are filtered with a firewall

RISKS:

  • Weak ingress/egress traffic filteringcan degrade performance.
  • A firewall with unnecessary portsopen can allow access from the Internet

System / Application Storage Domain : This domain is made up of user-accessed servers suchas email and database

RISKS:

  • A fire can destroy primary data
  • A DOS attack can cripple the organization’s email

Remote Access Domain  :The domain in which a mobileuser can access the local network remotely, usually through a VPN

RISKS:

  • Communication circuit outage candeny connection.
  • Remote communication from officecan be unsecured.
  • VPN tunneling between remotecomputer and ingress/egress routercan be hacked
6 0
3 years ago
These are the records and traces an individual leaves behind as they use the internet
Roman55 [17]

Answer:

Option D. Digital footprints

Explanation:

<u>Digital footprint is all the stuff you leave behind as you use the Internet.</u>

4 0
3 years ago
Read 2 more answers
Opposite word of reassembling​
Marysya12 [62]
<h3>OPPOSITE WORDS OF REASSEMBLING</h3>

  • disperse
  • disband
  • separate
8 0
3 years ago
Read 2 more answers
Write one for loop to print out each element of the list several things. then write another for loop
Kay [80]

Question:

Write one for loop to print out each element of the list several_things. Then, write another for loop to print out the TYPE of each element of the list several_things.

Answer:

The solution in python is as follows:

for element in several_things:

    print(element)

   

for element in several_things:

    print(type(element))

Explanation:

The solution assumes that the list several_things has already been initialized.

So, the rest of the code is explained as follows:

This line iterates through the list, several_things

for element in several_things:

This line prints each element

    print(element)

This line iterates through the list, several_things for the second time    

for element in several_things:

This line prints the type of each element

    print(type(element))

6 0
3 years ago
Other questions:
  • A curb of this color means you may stop only to pick up or drop offs passengers or male
    7·1 answer
  • Which of the following software is cloud-based? OpenOffice Writer Word 2013 Word Online Word Perfect\
    13·2 answers
  • When a user runs an application, what transfers from a storage device to memory?
    6·1 answer
  • Adding software to a digital device, or adding hardware components to a digital device is called _____ .
    13·1 answer
  • Which of the following controls will provide an area in the form for the user to enter a name? a. button b. label c. text box d.
    8·1 answer
  • Eric has asked you to help him build a new gaming computer so that he can play the newest games available. He also wants the com
    6·1 answer
  • Setting up network encryption involves
    5·1 answer
  • You want to save twenty of your vacation pictures on your computer. Which is the best place to save them?
    6·2 answers
  • Describe the steps to play a presentation the way your audience will see it.
    8·2 answers
  • 1. Write a program that uses String method regionMatches to compare two strings input by the user. The program should prompt the
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!