- Online Account and Application Record . An Excel spreadsheet to record online account information and to write progress notes
- Cover letter sample . A PDF that shows what an ideal cover letter looks like
- Resume sample . A PDF that shows what an ideal resume looks like
- Resume template . A Word document that you can fill in to create a resume
- Resume key words . A PDF that provides key words to use on resumes and in cover letters for different jobs
- Resume worksheet . A Word document that can be printed and given to a customer before you start to create a resume
Earn your high school diploma. Prepare for post-secondary education. Train for a career.
Do what you need to succeed and live the life you want.
- Adult education classes
- High School Equivalency (HSE) exam preparation and testing
- Career and technical training
- English classes for speakers of other languages
- Job placement assistance
- And more!
30 Hart Street
Rochester, NY 14605
(585) IMPROVE (585-467-7683)
- Where possible, show up to 10 years of continuous employment. It is the customer’s preference whether to show more
- Include volunteer positions under Professional Experience when there are employment gaps
- Parsers (algorithms) use a hierarchy that is based on employer preferences. That’s why it’s imperative to use key words and list career highlights and qualifications/skillsat the top of the resume
- Write a resume around the job description
- Write different resumes for different jobs/industries
- Show on-going education and learning (this makes the resume stronger)
- Eliminate all spelling and factual errors
- Write different cover letters for different kinds of jobs
- Tell a story to show more than what the resume can tell alone
- Describe what you can offer a prospective employer
- Describe how the customer can help the employer to succeed
- Use the customer’s own words
Email is an old technology and it is inherently flawed. Consider following these guidelines to make yourself and your personal information more secure.
- Passwords: there are two ways to create an email password: 1) use a combination of lower and uppercase characters, special characters (&^%) and numbers; or 2) create a long passphrase (grandmawasbornin1901)
- Two email accounts: consider using one email account for family/friends, and another account for all business transactions. Why? Some companies will sell your data, and having a second account limits your exposure
- Security Do’s: 1) if you suspect that your account with a business has been compromised, change your email password immediately; 2) change your password from time to time; 3) apply all software updates to your device
- Security Don’ts: 1) don’t send sensitive information by email; 2) don’t store sensitive information in cloud services like Evernote and Dropbox; 3) don’t ever give out personal information in response to an email. Call the sender to verify the email.
- Consider: using gmail for your email account(s). It is less susceptible to spam and phishing than yahoo, hotmail, frontier and aol.
- Definition: spam is simply unsolicited email. For example, you book a hotel through hotels.com and suddenly you’re receiving email promotions from hotels.com
- Remedy: 1) unsubscribe to company emails (at the bottom of the email you’ll find the unsubscribe function in small print); 2) when you create accounts online, look for settings that allow you to regulate the emails you receive; 3) report the email as spam (you’re email provider will have an easy way to do this); 4) delete emails in your spam/junk folder. Remember first to review all emails in the folder, since some legitimate emails will end up there. When in doubt, report and delete.
- Definition: phishing emails will try to sell you something or gain access to your personal information. Sometimes, the phishing email appears to be from someone you know or from a company you’re doing business with.
- Remedy: 1) always check the email address of the sender. If it is unfamiliar, then it is likely spam or phishing; 2) never click on a link or attachment in a suspicious email; 3) use your email provider to report phishing; 4) text or call the individual or company listed as sender to verify the email is legitimate. Do not forward the email before verifying that it is legitimate