Skip to main content

F1过期 OPT期间回国 返签

我现在在用OPT,我的F1今年1月份到期,可是我2月份想回家过年。很多人都觉得这样做太冒险,其实不然。回国前我特地打电话给学校的ISSO和移民局,都说没有问题。所以关键是材料准备全,返签跟学生期间的返签是一样的。
下面我列一下需要的材料:
  • EAD
  • Valid Passport
  • I-20 (signed within 6 months; two)
  • Letter of employment
  • 护照
  • 签证申请表DS 156 157 158
  • 成绩单
  • 简历
  • 缴费单子
我还多给了一个三个月的工资条,表明我有足够的资金。最重要的东西我认为是单位出的证明。

由于OPT仍然是学生阶段,千万不能让签证官认为你有移民倾向,所以如果已经申请了H1B工作签证,就最好不要在拿到H1B之前回国,因为H1B是可以继续申请移民的一类签证。不过现在反正不面签,人家也看不到你。

信息提供完毕

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...