You received an e-mail message on which several other individuals were copied. You want to respond to this message in a way that will include everyone who was copied on the original message. You can accomplish this by using which action?
Answer : B
To reduce the costs of maintaining servers with FTP access; your company is using P2P to facilitate sharing of information. Which strategy should your company use to protect the company's sensitive information while capitalizing on the benefits of P2P power?
Answer : C
Which of the following strategies will help protect your computer against virus attacks?
Answer : C
Your Web browser is currently open and displaying a popular sports site. You decide that you want to browse to the CIW site without closing the browser. What is the most efficient way to accomplish this?
Answer : D
Xue's company has provided her with a desktop computer to use at work. She has configured her e-mail client on this work computer to include her personal e-mail account so that she can conveniently download messages and check her personal e-mail. Xue should be aware that:
Answer : D
Melanie works in the sales department at XYZ Company. She decides that her company's marketing team has done a poor job representing the company's brand. Without direction or permission, she starts her own social networking account to help. This account's name is called XYZ Professional. To customize her page, she uses company logos and verbiage from the company Web site. She then begins communicating with customers and individuals interested in XYZ via this service. Which of the following would be the most appropriate response to Melanie's actions by the company?
Answer : D
You are a software developer who wants to start developing mobile apps for smartphones. You have the option to develop apps for an open-source operating system. Which of the following could persuade you to focus your development efforts on the open-source operating system?
Answer : D