1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kamila [148]
3 years ago
14

15 POINTS! please help

Computers and Technology
2 answers:
Maksim231197 [3]3 years ago
8 0

Answer:

1. Understand your audience

2. Add a header

3. Put a face to the name

4. Write a professional headline

5. Be contactable

6. Summarize your story

7. Showcase your experience

8. Let your network speak for you

Hoped this helped

Troyanec [42]3 years ago
7 0

Answer:

this was the example answer

Explanation:

Register or sign up on the website using my full name, email address, and password.

The next step would be to create my professional profile.

The profile creation process would begin by mentioning whether I am currently employed. My status here would read as “Looking for work”. I also have the choice of introducing myself as a “Fresher” or “Student” in this section.

In the next two sections, I will mention my country (United States) and zip code (33101), which indicates my location in Miami, Florida.

In the next two steps, I need to mention my company’s name and my job title. Since I am not working at this time, I can simply choose the service industry (as my preference) and the option of “Fresher” or “Student” as my job title.

At the end of these steps, I need to click on the “Create my profile” button.

In the next step, I have the choice to “Connect” with my email contacts or continue to edit my profile. I would prefer to have a consolidated profile in place before connecting with others. Therefore, I would skip this page.

In the next step, I would verify my email account after the website sends a verification link to my email address.

I would again skip the step of connecting with contacts and continue editing my profile.

I would proceed by uploading my latest professional photo to the website.

I would then add a headline at the top of my profile (up to 120 characters), which would read as “Student, fresher, service in restaurants/cafés/food joints.”

I would then need to write a summary of my profile, which would include my name, education, the type of job I am looking for, and some of my skills.

In the Experience section, I can add my participation in sports, volunteer work, etc. I can also add my strengths and skills here, such as interpersonal skills, creativity, and so on.

Finally, I will start connecting with my primary email contacts to build my professional network.

You might be interested in
Developed the first compiler and conducted work that led to the development of COBOL ?
zimovet [89]

Answer:

Grace Hopper.

Explanation:

Grace Hopper was a US Naval Rear Admiral and an American computer scientist who was born on the 9th of December, 1906 in New York city, United States of America. She worked on the first commercial computer known as universal automatic computer (UNIVAC), after the second World War II.

In 1953 at the Remington Rand, Grace Hopper invented the first high-level programming language for UNIVAC 1 by using words and expressions.

Additionally, the high-level programming language known as FLOW-MATIC that she invented in 1953 paved the way for the development of common business-oriented language (COBOL).

Hence, Grace Hopper developed the first compiler and conducted work that led to the development of COBOL.

6 0
3 years ago
Ano ang word processor at electronic spreadsheet​
AveGali [126]

Answer:

excel

Explanation:

3 0
3 years ago
Read 2 more answers
Computer-generated color images of the brain that provide information about brain activity and glucose metabolism are produced b
frozen [14]

The answer to this question is the PET scan. Positron Emission Tomography or PET scan is an imaging test that checks and trace for diseases in the body. This also shows how the body organs is functioning / working. The doctor can evaluate the function of the patients body by the 3D color images produced by the PET Scan.  

4 0
3 years ago
Problem 1. MST - Prim's and Kruskal's algorithms
Juli2301 [7.4K]
Or maybe not Encryption converts the data in a database to a format that is indecipherable to unauthorized users who attempt to bypass the DBMS.

a. True
b. False
7 0
3 years ago
Why would we need to consider implementing our business blockchain application not on Bitcoin but Ethereum?
Cloud [144]
True or False
1. Phishing is the act of sending multiple emails to multiple users in hope of having
2. Spoofing is the act of obtaining unauthorized access to data from a computer
network.
3. Extortion is the act of using the internet to threaten or damage someone's
reputation to extort money or anything else of value.
4. In late 2014, LimeWire was raided for the second time due to years of pirating
movies, music, games, books and other software.
5. Electronic harassment is also referred to as cyberbullying.
6. Non-delivery of service is the act of devising a scheme wherein a culprit posts an
item or service for sale over the internet, and once the transactions have been done, does not
give the item or service.
7. Encryption is the process of converting raw to data code.
8. In piracy, trackers are used to identify IP addresses currently sharing a pirated
file.
9. Wager Gambling is the act of betting on any sports event over the internet.
10. Most email services today have spam or bulk folder that automatically puts
these suspicious emails to that folder.
3 0
2 years ago
Other questions:
  • The counter variable in the code below increments by 1 each time through the loop. What will the value of counter be after the f
    11·1 answer
  • Which element of a business document provides additional information but is not a part of the body of the text?
    13·2 answers
  • HTTP is made to facilitate which kind of communication?
    11·1 answer
  • Prove that for every nfa with an arbitrary number of final states there is an equivalent nfa with only one final state. Can we m
    8·1 answer
  • A small company has hired you to take over its IT needs. The company currently has seven on-site employees and 12 remote employe
    12·1 answer
  • Cyberterrorism is the use of terrorism to attack (Points : 1) public libraries. computer based networks. government spy networks
    15·1 answer
  • You need to delegate AD RMS responsibilities to a junior administrator. You don't want to give the administrator more permission
    14·1 answer
  • /*Implement a class Address . An address has a house number, a street, an optional
    5·1 answer
  • Which item is essential to know before sketching a navigation menu flowchart?
    7·2 answers
  • How do we Rewrite the following Python code to avoid error. mark=inpt("enter your mark ")
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!