iWriteGigs

Fresh Grad Lands Job as Real Estate Agent With Help from Professional Writers

People go to websites to get the information they desperately need.  They could be looking for an answer to a nagging question.  They might be looking for help in completing an important task.  For recent graduates, they might be looking for ways on how to prepare a comprehensive resume that can capture the attention of the hiring manager

Manush is a recent graduate from a prestigious university in California who is looking for a job opportunity as a real estate agent.  While he already has samples provided by his friends, he still feels something lacking in his resume.  Specifically, the he believes that his professional objective statement lacks focus and clarity. 

Thus, he sought our assistance in improving editing and proofreading his resume. 

In revising his resume, iwritegigs highlighted his soft skills such as his communication skills, ability to negotiate, patience and tactfulness.  In the professional experience part, our team added some skills that are aligned with the position he is applying for.

When he was chosen for the real estate agent position, he sent us this thank you note:

“Kudos to the team for a job well done.  I am sincerely appreciative of the time and effort you gave on my resume.  You did not only help me land the job I had always been dreaming of but you also made me realize how important adding those specific keywords to my resume!  Cheers!

Manush’s story shows the importance of using powerful keywords to his resume in landing the job he wanted.

Module 10 Quiz

Navigation   » List of Schools  »  Northern Virginia Community College  »  Information Technology  »  ITE 115 – Introduction to Computer Applications and Concepts  »  Spring 2022  »  Module 10 Quiz

Need help with your exam preparation?

Below are the questions for the exam with the choices of answers:

Question #1
A  They can only connect to a single device.
B  They are interchangeable terms for the same hardware.
C  They transfer data to all devices. 
D  They provide a central point for cables in a network.
Question #2
A  Customers cannot view the website on their device because the page will not load.
B  Customers cannot download the most recent newsletter.
C  Customers are receiving too many emails about special offers.
D  Customers are required to enter personal information as they complete an order form.
Question #3
A  The network most likely uses a firewall for protection.
B  He can use the network only for a limited time.
C  He cannot connect to the Internet from the network.
D  The network connection is probably not secure.
Question #4
A  She has installed switches that interact with the installed app on her phone.
B  She uses a hub at her home that she connects to through the app.
C  She dialed into her home modem through the app and sent a command through the router.
D  She has a home network with smart home devices.
Question #5
A  mobile hotspot
B  cell phone hotspot
C  virtual private network
D  Bluetooth connection
Question #6
A  Ethernet
B  Wi-Fi
C  Phoneline
D  LTE
Question #7
A  To release rules surrounding Internet access
B  To restrict Internet access by location and population
C  To regulate the bandwidth each website can have
D  To rate Internet sites similar to movie ratings
Question #8
A  All public networks are free.
B  Many public networks are not secure.
C  Hackers cannot intercept data transmitted over public networks.
D  Your home network is a public network.
Question #9
A  Intranet
B  Wired network
C  Virtual private network
D  Wireless network
Question #10
A  It is also called software firewall.
B  It is often built into a computer’s operating system.
C  It is a physical device that acts as a protective barrier.
D  It inspects data being transmitted to or from a network. 
Question #13
A  Cable TV connections
B  A network interface card
C  A wireless router
D  Copper telephone wiring
Question #15
A  Encrypt the data in the report.
B  Send the email without attaching the report and ask the president to call you.
C  Transfer the report to the cloud.
D  Store the report on a flash drive that you have password-protected with the president’s name.
Question #16
A  A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.
B  A device infected with malware that an attacker uses to control the device remotely.
C  A type of malware that disguises itself as or hides itself in a legitimate file, and then causes damage to programs and data when opened.
D  An identified risk that gains administrator-level access to a computer or network without the system or users detecting its presence.
Question #17
A  It uses copper wires to enable efficient digital data transfers.
B  It only sends digital data over a digital line.
C  It sends and receives digital data over a digital line.
D  It only receives digital data over a digital line.
Question #19
A  The wireless key is the encryption code needed by the receiver to decode the file.
B  The wireless network needs the key to decode the data before sending.
C  The wireless network key is your password for logging onto an Internet email system to receive files.
D  The sending and receiving devices must know the wireless network key to communicate.
Question #20
A  The inability to access your files if you lose your Internet connection.
B  The files you will lose if your computer crashes.
C  How long it will take to access a backup of files.
D  The amount of space that files will take up on your computer.
Question #21
A  All Internet traffic should be treated equally.
B  The same level of service should be provided to all websites, regardless of purpose.
C  ISPs should charge more for high-bandwidth connections.
D  Access to websites should not be restricted based on content.
Question #22
A  The connection needed to access to a cellular network
B  An alternate name Internet Protocol version 6
C  An IP address unique to Apple’s MAC computers
D  A unique hardware address for your device
Question #24
A  hub
B  switch
C  modem
D  network
Question #26
A  A switch
B  A router
C  A network interface card
D  A hub
Question #27
A  They disguise the network as an evil twin.
B  They encrypt your computer data and hold it hostage until you pay a fee, usually with bitcoins.
C  They overload the server with network traffic so webpages will not load.
D  They use adware to fill your screen with unwanted advertisements until you click one.
Question #29
A  Motherboard
B  Hub
C  Switch
D  Network interface card
Question #30
A  It was written in an overly formal tone.
B  The signature was consistent with other emails from his bank.
C  It contained typos and other grammatical errors.
D  It did not include a promotional offer.
Question #31
A  You can use the wireless router to encrypt and then decode the encryption on information sent and received.
B  You can use the wireless router to intercept encrypted information and block it from entering the network.
C  You can use the wireless router to set the encryption key and type of encryption.
D  You can use the wireless router to verify the security certificate of the encrypted data being sent.
Question #32
A  Spyware
B  A zombie attack
C  Social engineering
D  An evil twin
Question #33
A  Printer
B  External hard drive
C  Modem
D  Laptop
Question #34
A  phone and computer connected via Wi-Fi
B  computers connected within a home
C  computers connected within a city
D  smartwatch and phone connected via Bluetooth
Question #35
A  Wbcm2!4!820!
B  CatCatCatCat
C  Abc123456789
D  Password123
Question #36
A  personal 
B  wide
C  local
D  metropolitan
Question #37
A  Printer
B  Ethernet cable
C  Monitor
D  Router
Question #39
A  Broadband connections require a wireless router to increase their speed.
B  Broadband connections turn off after a specified amount of idle time.
C  Broadband connections are “always-on” connections.
D  Only a few of today’s Internet connections are broadband connections.
Question #40
A  Body area network
B  Fingerprint scanner
C  Software firewall
D  Encryption