The bidder in a takeover generally should take advantage of temporary anonymity to purchase shares of the target before its intentions are publicly known and the target firm's price rises. Such initial purchases establish a _

a. foothold
b. leghold
c. armhold
d. toehold

D

Business

You might also like to view...

The _______ module performs end-to-end encryption and obtains session keys on behalf of users

A. PKM B. RCM C. SSM D. CCM

Business

Which of the following statements about the Internet security is not true?

A) The use of P2P networks can expose a corporate computer to outsiders. B) A corporate network without access to the Internet is more secure than one that provides access. C) VoIP is more secure than the switched voice network. D) Instant messaging can provide hackers access to an otherwise secure network. E) Smartphones have the same security weaknesses as other Internet devices.

Business