If a potential employer enters your name in a search engine and finds your professional portfolio, the employer is likely to conclude that you have a _______ online presence.
Positive
Which of the following people is MOST likely to be helpful in your professional network?
a) your favorite instructor
b) your best friend
c) your best friend's parents
d) your favorite uncle
a) your favorite instructor
Which of the following characteristics in an online employment ad may indicate an employment scam?
a) a URL that is specific to the company
b) request to set up a direct-deposit account
c) lack of spelling and grammatical errors
d) pay rate that is in line with the work to be done
b) request to set up a direct-deposit account
Mobile-centric media-sharing site that allows users to share pictures and videos publicly or privately.
Person who knows an applicant's skills, talents, or personal traits and is willing to recommend him or her.
Professional Reference
What symbol is used as a prefix for Twitter usernames?
@
Which social media account is LEAST likely to be useful in professional online networking?
a) LinkedIn
b) Twitter
c) Instagram
d) Facebook
d) Facebook
In which situation is it reasonable to provide your Social Security number on a job application?
a) over the phone
b) on a printed job application
c) in an e-mail message
d) on a computer form
b) on a printed job application
Full name, phone number, and e-mail address of the owner of an e-mail account.
Signature Block
The are of using good manners in any situation.
Etiquette
What is the best way to evaluate your personal online presence?
Enter your own name into a search engine.
Which of the following statements is true regarding networking etiquette?
a) It is acceptable to make unsolicited connection requests.
b) It is considered rude to let people know you are seeking employement.
c) Conversations should be kept brief and polite.
d) Inviting strangers to be a part of your network is a good way to increase your exposure.
Which of the following devices does NOT need to be protected by an antivirus software?
a) tablet
b) copy machine
c) computer
d) smartphone
b) copy machine
Internal thoughts and feelings about one's self.
Self-talk
Behaving suitably when you meet face-to-face with someone.
In-person etiquette
Which of the following potential passwords is the MOST secure?
a) 777111777111
b) MyPassword
c) 1604DelPradoBlvd
d) 4Jaz1!0LvndCr
d) 4Jaz1!0LvndCr
Approximately how many professional references should you cultivate for use with your resume and job application?
a) one to two
b) two or three
c) three to five
d) eight to ten
c) three to five
Illegal act that involves stealing someone's personal information and using it to commit theft or fraud.
Identity Theft
Talking with people and establishing relationships that can lead to career growth.
Networking
Strategy used to ask for advice and direction from a professional.
Informational Interviewing
What is the character limit for a Tweet?
150 characters
When should you arrive at a scheduled meeting with someone who may become part of your network?
a) at least half an hour early
b) no more than 15 minutes early
c) 5 minutes late
d) 15 minutes late
b) no more than 15 minutes early
Program that monitors information coming into a computer and helps assure that only safe information gets through.
Firewall
Data record of all of an individual's online activities.
Digital Footprint
People who support an individual in his or her career and other business endeavors.
Professional Network