Skip to main content

绿卡和中国户口的一点基本常识


本人过去也迷惘过,也是到处问,但是好像都不准。下面是我家亲身经历而得出的一点
小基本常识。
一. 父母绿卡,小孩美国出生,小孩回国是签证还是旅行证?
---这分2种情况:
   1. 小孩如果是在父母拿到绿卡之前在美国出生的,回中国就只要到驻美中国大使馆
办旅行证,小孩拿着旅行证在中国可以办户口。旅行证2年内过期,可以到驻美中国大
使馆renew。
   2. 小孩如果是在父母拿到绿卡之后在美国出生的,回中国就要到驻美中国大使馆办
中国签证,回国小孩不能上中国户口。

二. 父母绿卡,由于出国太久,在国内户口已经注销,海归后是否能够重新上户口?
----Yes. 海归回去工作的,自己有绿卡,中国户口已经注销。当地的引进海外高层次
人才服务窗口的人员会给你提供服务,他们会告诉你需要什么材料办户口,你准备好后
,他们一切帮你代办,办户口不影响你的绿卡。这里所说的办户口----就是上户口,拿
新的身份证(过去的身份证因为户口注销做废了)。

以上是我家亲身经历的,没有任何关系,一切都是正当合法流程。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...