You opened an e-mail attachment and it launches a virus. The virus takes control of your system and
you are unable to run your anti-virus software. Which of the following is the best step for you to take
next?
C
You just received a joke that was c-mailed to you by a co-worker. You find the joke funny and consider
forwarding it to another co-worker that you trust. Which human resources issue do you risk by
forwarding the e-mail message?
C
Which of the following strategies is recommended when conducting keyword searches?
A
Evonka is listening to music from an online music provider (such as Pandora or Jango). She builds a
list of music preferences, including favorite songs. The music service then suggests additional songs
she might enjoy. The music provider is an example of a cloud-computing application that uses a
technology for collaborative filtering, which helps define the list of songs available to listeners.
Which term describes this technology?
B
You have just finished designing a Web site to support a charity organization’s fund-raising efforts.
You need to meet with the board members to get their feedback and address some questions before
you implement the final design. The board members are dispersed throughout the country and want
to avoid spending charity funds on traveling to this meeting. Which of the following solutions would
best support the charity and provide you with an opportunity to discuss the design as a group?
A
Which of the following is used to help non-technical users collectively classify and find information
on a site?
A
You received a text and a threatening voicemail from an angry customer who wants to immediately
discuss the shortcomings of a recently released product. You are about to walk into a mandatory
meeting with your top-level leadership team. Which of the following is your best course of action?
B
Raoul has received a file attachment from a known individual. He has no reason to expect files from
this individual. Which of the following is an effective security strategy for Raoul to take?
D
You accidentally dropped your mobile phone, which was submerged in water and no longer works.
Upon replacing the phone with an upgraded unit you must reconfigure many of the services. The
instructions say that all you need to do is enter your e-mail address and the unit will configure the e-
mail client for you. Even though you have tried this several times, it does not work. The mobile
phone vendor says that because you are trying to sync your e-mail account with an enterprise mail
server, you will need to configure the e-mail client manually. Which choice lists the information you
will need to configure the e-mail client?
C
Which is the preferred approach to communicate important action items in an e-mail message to a
co-worker?
B
You have 20 remote employees flying in to attend a corporate meeting. The morning of travel day,
the administrator tells you that the hotel reservations have changed. What is the best way to send
each traveling employee a quick message with the new hotel information?
D
As a project manager, you have to balance three elements that compose the project triangle.
Suppose your customer requests that you add some new requirements to the project when you are
halfway through. If you agree to this request, how would it affect other aspects of the project?
B
You are expecting a very important file from a co-worker in a remote office to be sent to you through
e-mail. You finally call the co-worker and tell him that you have not received the file. He informs you
that he sent the file yesterday, but will send it again immediately. After some time, you still have not
received his e-mail message. You contact the Technical Support department and ask them for help.
After some investigation, Technical Support finds the e-mail from your coworker with an attachment
named salesnumbers.exe in the spam folder of your e-mail client. What is the most likely reason that
the e-mail message was filtered out?
C
The App-A-Day company offers software applications for various topics. When a customer purchases
a desired application from the App-A-Day online store, he is directed to a page where he can
download the application directly. When the customer is redirected and begins downloading the
application, which specific standard protocol is most likely transferring the application?
A
Digital signatures verify the integrity of the data, verify the identity of the sender, and:
B