QUESTIONS 2024\2025 |
GUARANTEED PASS
You opened an e-mail attachment and it launches a virus. The virus takes
control of your system and you are unable to run your anti-virus
software. Which of the following is the best step for you to take next? -
ACCURATE ANSWERS✔✔ Turn off your computer and reboot from a
known, clean system disk.
You just received a joke that was e-mailed to you by a co-worker. You
find the joke funny and consider forwarding it to another co-worker that
you trust. Which human resources issue do you risk by forwarding the e-
mail message? - ACCURATE ANSWERS✔✔ Offending a recipient
who receives the joke as a result from further forwarding
Which of the following strategies is recommended when conducting
keyword searches? - ACCURATE ANSWERS✔✔ Use nouns instead of
verbs for keywords
Evonka is listening to music from an online music provider (such as
Pandora or Jango). She builds a list of music preferences, including
favorite songs. The music service then suggests additional songs she
might enjoy. The music provider is an example of a cloud-computing
application that uses a technology for collaborative filtering, which helps
define the list of songs available to listeners. Which term describes this
technology? - ACCURATE ANSWERS✔✔ Crowd sourcing
, You have just finished designing a Web site to support a charity
organization's fund-raising efforts. You need to meet with the board
members to get their feedback and address some questions before you
implement the final design. The board members are dispersed
throughout the country and want to avoid spending charity funds on
traveling to this meeting. Which of the following solutions would best
support the charity and provide you with an opportunity to discuss the
design as a group? - ACCURATE ANSWERS✔✔ Plan a Web
conference using a service such as WebEx or GoToMeeting that supports
screen sharing and phone conferencing.
Which of the following is used to help non-technical users collectively
classify and find information on a site? - ACCURATE ANSWERS✔✔
Tagging
You received a text and a threatening voicemail from an angry customer
who wants to immediately discuss the shortcomings of a recently
released product. You are about to walk into a mandatory meeting with
your top-level leadership team. Which of the following is your best
course of action? - ACCURATE ANSWERS✔✔ Request that the
customer send his complaints by e-mail, knowing that any inappropriate
communication will be well documented.
Raoul has received a file attachment from a known individual. H. has no
reason to expect files from this individual. Which of the following is an
effective security strategy for Raoul to take? - ACCURATE
ANSWERS✔✔ Before opening the attachment, call or send a text or
instant message to the individual to verify that he or she meant to send it.