iWriteGigs

Fresh Grad Lands Job as Real Estate Agent With Help from Professional Writers

People go to websites to get the information they desperately need.  They could be looking for an answer to a nagging question.  They might be looking for help in completing an important task.  For recent graduates, they might be looking for ways on how to prepare a comprehensive resume that can capture the attention of the hiring manager

Manush is a recent graduate from a prestigious university in California who is looking for a job opportunity as a real estate agent.  While he already has samples provided by his friends, he still feels something lacking in his resume.  Specifically, the he believes that his professional objective statement lacks focus and clarity. 

Thus, he sought our assistance in improving editing and proofreading his resume. 

In revising his resume, iwritegigs highlighted his soft skills such as his communication skills, ability to negotiate, patience and tactfulness.  In the professional experience part, our team added some skills that are aligned with the position he is applying for.

When he was chosen for the real estate agent position, he sent us this thank you note:

“Kudos to the team for a job well done.  I am sincerely appreciative of the time and effort you gave on my resume.  You did not only help me land the job I had always been dreaming of but you also made me realize how important adding those specific keywords to my resume!  Cheers!

Manush’s story shows the importance of using powerful keywords to his resume in landing the job he wanted.

Module 10 Quiz

Navigation   » List of Schools  »  Northern Virginia Community College  »  Information Technology  »  ITE 115 – Introduction to Computer Applications and Concepts  »  Spring 2022  »  Module 10 Quiz

Need help with your exam preparation?

Below are the questions for the exam with the choices of answers:

Question #1
A  They are interchangeable terms for the same hardware.
B  They can only connect to a single device.
C  They provide a central point for cables in a network.
D  They transfer data to all devices. 
Question #2
A  Customers are required to enter personal information as they complete an order form.
B  Customers cannot view the website on their device because the page will not load.
C  Customers cannot download the most recent newsletter.
D  Customers are receiving too many emails about special offers.
Question #3
A  The network most likely uses a firewall for protection.
B  The network connection is probably not secure.
C  He cannot connect to the Internet from the network.
D  He can use the network only for a limited time.
Question #4
A  She dialed into her home modem through the app and sent a command through the router.
B  She uses a hub at her home that she connects to through the app.
C  She has a home network with smart home devices.
D  She has installed switches that interact with the installed app on her phone.
Question #5
A  mobile hotspot
B  cell phone hotspot
C  Bluetooth connection
D  virtual private network
Question #6
A  Phoneline
B  Ethernet
C  Wi-Fi
D  LTE
Question #7
A  To rate Internet sites similar to movie ratings
B  To restrict Internet access by location and population
C  To regulate the bandwidth each website can have
D  To release rules surrounding Internet access
Question #8
A  Hackers cannot intercept data transmitted over public networks.
B  All public networks are free.
C  Your home network is a public network.
D  Many public networks are not secure.
Question #9
A  Wireless network
B  Virtual private network
C  Wired network
D  Intranet
Question #10
A  It is also called software firewall.
B  It is often built into a computer’s operating system.
C  It is a physical device that acts as a protective barrier.
D  It inspects data being transmitted to or from a network. 
Question #13
A  A wireless router
B  A network interface card
C  Cable TV connections
D  Copper telephone wiring
Question #15
A  Transfer the report to the cloud.
B  Send the email without attaching the report and ask the president to call you.
C  Encrypt the data in the report.
D  Store the report on a flash drive that you have password-protected with the president’s name.
Question #16
A  A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.
B  A type of malware that disguises itself as or hides itself in a legitimate file, and then causes damage to programs and data when opened.
C  A device infected with malware that an attacker uses to control the device remotely.
D  An identified risk that gains administrator-level access to a computer or network without the system or users detecting its presence.
Question #17
A  It only receives digital data over a digital line.
B  It only sends digital data over a digital line.
C  It sends and receives digital data over a digital line.
D  It uses copper wires to enable efficient digital data transfers.
Question #19
A  The wireless network needs the key to decode the data before sending.
B  The sending and receiving devices must know the wireless network key to communicate.
C  The wireless key is the encryption code needed by the receiver to decode the file.
D  The wireless network key is your password for logging onto an Internet email system to receive files.
Question #20
A  How long it will take to access a backup of files.
B  The amount of space that files will take up on your computer.
C  The files you will lose if your computer crashes.
D  The inability to access your files if you lose your Internet connection.
Question #21
A  The same level of service should be provided to all websites, regardless of purpose.
B  ISPs should charge more for high-bandwidth connections.
C  Access to websites should not be restricted based on content.
D  All Internet traffic should be treated equally.
Question #22
A  An IP address unique to Apple’s MAC computers
B  An alternate name Internet Protocol version 6
C  The connection needed to access to a cellular network
D  A unique hardware address for your device
Question #24
A  network
B  hub
C  modem
D  switch
Question #26
A  A network interface card
B  A hub
C  A switch
D  A router
Question #27
A  They overload the server with network traffic so webpages will not load.
B  They disguise the network as an evil twin.
C  They use adware to fill your screen with unwanted advertisements until you click one.
D  They encrypt your computer data and hold it hostage until you pay a fee, usually with bitcoins.
Question #29
A  Switch
B  Hub
C  Network interface card
D  Motherboard
Question #30
A  The signature was consistent with other emails from his bank.
B  It was written in an overly formal tone.
C  It contained typos and other grammatical errors.
D  It did not include a promotional offer.
Question #31
A  You can use the wireless router to verify the security certificate of the encrypted data being sent.
B  You can use the wireless router to set the encryption key and type of encryption.
C  You can use the wireless router to encrypt and then decode the encryption on information sent and received.
D  You can use the wireless router to intercept encrypted information and block it from entering the network.
Question #32
A  Spyware
B  An evil twin
C  Social engineering
D  A zombie attack
Question #33
A  Modem
B  External hard drive
C  Laptop
D  Printer
Question #34
A  computers connected within a city
B  phone and computer connected via Wi-Fi
C  smartwatch and phone connected via Bluetooth
D  computers connected within a home
Question #35
A  Abc123456789
B  Password123
C  Wbcm2!4!820!
D  CatCatCatCat
Question #36
A  personal 
B  wide
C  metropolitan
D  local
Question #37
A  Router
B  Ethernet cable
C  Printer
D  Monitor
Question #39
A  Broadband connections turn off after a specified amount of idle time.
B  Only a few of today’s Internet connections are broadband connections.
C  Broadband connections are “always-on” connections.
D  Broadband connections require a wireless router to increase their speed.
Question #40
A  Body area network
B  Fingerprint scanner
C  Encryption
D  Software firewall