Skip to main content

EB1A绿卡拿到手后就可以换方向了,不会取消的.

http://gengwg.blogspot.com/发信人: windreiner (A new era), 信区: Immigration
标  题: Re: 求评估:准备EB1A或者H1B...
发信站: BBS 未名空间站 (Wed Jan  7 19:48:55 2015, 美东)

如果提交了绿卡申请,那你的F1签证就不可能过了,因为你已经表达了移民倾向.所以你
就不能离开美国重新签证.同理你的opt申请也过不了.

所以这么做有风险,你要保证你一定能够通过eb1拿到绿卡,不然就很被动.

EB1A绿卡拿到手后就可以换方向了,不会取消的.

【 在 biocss (c s) 的大作中提到: 】
: 谢谢回复!很想知道你花多时间才有的30个review.
: 我觉得我的情况review很不容易找,因为一般都是Dr. XXX,我还只能是Mr.XXX。所以,
: 我现在先准备review一些国内一般的杂志,长长经验。
: 是这样,之前quit一个phd,所以年龄不小了,而且发现现在越来越不喜欢,只是忍着再
: 发几篇文章而已,似乎据说找工作也不太容易。所以希望尽快拿到绿卡。
: 我不知道是否可以这样:假设2,3年后通过EB1A拿到绿卡。然后quit博士,直接去找
cs
: 工作(都是自学的,或者在周边其他大学上的课),这样情况涉及到工作领域不符合
: EB1A申请时的专业方向的问题,那么绿卡会被取消么?

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into /opt/course/1/context_default_no_kubectl.sh , but without the use of k

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checking a shared sec