Skip to main content

H1B签证

H1B签证的定义是在美国短期工作的人士所发的临时工作签证。H1B要解决的是美国公司急需但在其国内又招不到的人才。因此,它对申请人的学历有一定要求,必须具备学士或以上学位。具有H1B签证的人通过在美国境内签证延期,最长可以在美国工作6年。如果在此身份到期前365天没有办理绿卡申请,则此签证申请人必须离开美国本土至少365天,然后才可以再次申请H1B签证。新的移民法规规定,具有H1B身份的外国劳工, 可以在H1B到期前更换雇主。新的雇主可以将你已持有的H1B身份从原雇主处直接转出来。因此,这有利于H1B持有人寻找更好的机会。但是,H1B身份持 有人可以呆在美国的唯一原因是其工作身份。一旦H1B身份持有人失去工作,按规定,其必须在第二天离开美国。不过美国移民法也给出了180天的灰色期, 即,任何持签证合法进入美国的外国人,其签证或身份失效后,如果其在失效后180天内自动离境,则移民局一般不予追究其非法滞留。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...