You should ________ connections at a potential employer to learn more about the company, its culture, and its people, and to establish "inside" contacts within the company

A) bribe
B) manipulate
C) ignore
D) leverage


D

Computer Science & Information Technology

You might also like to view...

If someone has had their personal information stolen for the purposes of gaining access to their funds, he/she is said to be a victim of ________

A) identity theft B) electronic data interchange C) phishing D) fraud

Computer Science & Information Technology

If you drag from the top ruler, a ____ guide is created.

A. vertical B. horizontal C. both a. and b. D. neither a. nor b.

Computer Science & Information Technology

You cannot change a defined name

Indicate whether the statement is true or false

Computer Science & Information Technology

In a virus attack, the victim machine is the source

Indicate whether the statement is true or false.

Computer Science & Information Technology