iWriteGigs

Fresh Grad Lands Job as Real Estate Agent With Help from Professional Writers

People go to websites to get the information they desperately need.  They could be looking for an answer to a nagging question.  They might be looking for help in completing an important task.  For recent graduates, they might be looking for ways on how to prepare a comprehensive resume that can capture the attention of the hiring manager

Manush is a recent graduate from a prestigious university in California who is looking for a job opportunity as a real estate agent.  While he already has samples provided by his friends, he still feels something lacking in his resume.  Specifically, the he believes that his professional objective statement lacks focus and clarity. 

Thus, he sought our assistance in improving editing and proofreading his resume. 

In revising his resume, iwritegigs highlighted his soft skills such as his communication skills, ability to negotiate, patience and tactfulness.  In the professional experience part, our team added some skills that are aligned with the position he is applying for.

When he was chosen for the real estate agent position, he sent us this thank you note:

“Kudos to the team for a job well done.  I am sincerely appreciative of the time and effort you gave on my resume.  You did not only help me land the job I had always been dreaming of but you also made me realize how important adding those specific keywords to my resume!  Cheers!

Manush’s story shows the importance of using powerful keywords to his resume in landing the job he wanted.

Module 10 Quiz

Navigation   » List of Schools  »  Northern Virginia Community College  »  Information Technology  »  ITE 115 – Introduction to Computer Applications and Concepts  »  Spring 2022  »  Module 10 Quiz

Need help with your exam preparation?

Below are the questions for the exam with the choices of answers:

Question #1
A  They are interchangeable terms for the same hardware.
B  They transfer data to all devices. 
C  They can only connect to a single device.
D  They provide a central point for cables in a network.
Question #2
A  Customers are required to enter personal information as they complete an order form.
B  Customers cannot download the most recent newsletter.
C  Customers cannot view the website on their device because the page will not load.
D  Customers are receiving too many emails about special offers.
Question #3
A  He can use the network only for a limited time.
B  The network connection is probably not secure.
C  He cannot connect to the Internet from the network.
D  The network most likely uses a firewall for protection.
Question #4
A  She dialed into her home modem through the app and sent a command through the router.
B  She has a home network with smart home devices.
C  She uses a hub at her home that she connects to through the app.
D  She has installed switches that interact with the installed app on her phone.
Question #5
A  mobile hotspot
B  Bluetooth connection
C  cell phone hotspot
D  virtual private network
Question #6
A  Wi-Fi
B  Ethernet
C  Phoneline
D  LTE
Question #7
A  To regulate the bandwidth each website can have
B  To restrict Internet access by location and population
C  To rate Internet sites similar to movie ratings
D  To release rules surrounding Internet access
Question #8
A  All public networks are free.
B  Many public networks are not secure.
C  Your home network is a public network.
D  Hackers cannot intercept data transmitted over public networks.
Question #9
A  Intranet
B  Wired network
C  Wireless network
D  Virtual private network
Question #10
A  It is often built into a computer’s operating system.
B  It is also called software firewall.
C  It is a physical device that acts as a protective barrier.
D  It inspects data being transmitted to or from a network. 
Question #13
A  A network interface card
B  A wireless router
C  Copper telephone wiring
D  Cable TV connections
Question #15
A  Send the email without attaching the report and ask the president to call you.
B  Encrypt the data in the report.
C  Transfer the report to the cloud.
D  Store the report on a flash drive that you have password-protected with the president’s name.
Question #16
A  An identified risk that gains administrator-level access to a computer or network without the system or users detecting its presence.
B  A device infected with malware that an attacker uses to control the device remotely.
C  A type of malware that disguises itself as or hides itself in a legitimate file, and then causes damage to programs and data when opened.
D  A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.
Question #17
A  It sends and receives digital data over a digital line.
B  It only receives digital data over a digital line.
C  It only sends digital data over a digital line.
D  It uses copper wires to enable efficient digital data transfers.
Question #19
A  The sending and receiving devices must know the wireless network key to communicate.
B  The wireless network key is your password for logging onto an Internet email system to receive files.
C  The wireless network needs the key to decode the data before sending.
D  The wireless key is the encryption code needed by the receiver to decode the file.
Question #20
A  How long it will take to access a backup of files.
B  The inability to access your files if you lose your Internet connection.
C  The files you will lose if your computer crashes.
D  The amount of space that files will take up on your computer.
Question #21
A  The same level of service should be provided to all websites, regardless of purpose.
B  Access to websites should not be restricted based on content.
C  ISPs should charge more for high-bandwidth connections.
D  All Internet traffic should be treated equally.
Question #22
A  The connection needed to access to a cellular network
B  An alternate name Internet Protocol version 6
C  A unique hardware address for your device
D  An IP address unique to Apple’s MAC computers
Question #24
A  network
B  switch
C  hub
D  modem
Question #26
A  A network interface card
B  A hub
C  A router
D  A switch
Question #27
A  They disguise the network as an evil twin.
B  They use adware to fill your screen with unwanted advertisements until you click one.
C  They encrypt your computer data and hold it hostage until you pay a fee, usually with bitcoins.
D  They overload the server with network traffic so webpages will not load.
Question #29
A  Motherboard
B  Switch
C  Network interface card
D  Hub
Question #30
A  The signature was consistent with other emails from his bank.
B  It was written in an overly formal tone.
C  It did not include a promotional offer.
D  It contained typos and other grammatical errors.
Question #31
A  You can use the wireless router to set the encryption key and type of encryption.
B  You can use the wireless router to intercept encrypted information and block it from entering the network.
C  You can use the wireless router to encrypt and then decode the encryption on information sent and received.
D  You can use the wireless router to verify the security certificate of the encrypted data being sent.
Question #32
A  Spyware
B  An evil twin
C  A zombie attack
D  Social engineering
Question #33
A  Laptop
B  Printer
C  Modem
D  External hard drive
Question #34
A  phone and computer connected via Wi-Fi
B  smartwatch and phone connected via Bluetooth
C  computers connected within a home
D  computers connected within a city
Question #35
A  Password123
B  Abc123456789
C  CatCatCatCat
D  Wbcm2!4!820!
Question #36
A  personal 
B  wide
C  metropolitan
D  local
Question #37
A  Router
B  Monitor
C  Printer
D  Ethernet cable
Question #39
A  Broadband connections require a wireless router to increase their speed.
B  Broadband connections turn off after a specified amount of idle time.
C  Broadband connections are “always-on” connections.
D  Only a few of today’s Internet connections are broadband connections.
Question #40
A  Software firewall
B  Encryption
C  Fingerprint scanner
D  Body area network