Bob opened an email attachment and it launched a virus. The virus took control of his system, and now he is unable to run his anti-virus software. What should he do next?
Turn off his computer and reboot from a clean system disk.
Cheryl has several concepts for mobile apps for smartphones. A friend suggests that she develop her apps for an open-source operating system. Why might Cheryl want to focus her app development efforts on an open-source operating system?
Because the operating system and associated development tools are free if she complies with the copyleft license
Computer viruses can cause damage ranging from relatively minor to debilitating. You can protect your system against viruses by using commercial virus-detection software to find and defeat viruses. Because new viruses are created so rapidly, what must you do to ensure that your anti-virus software can protect you?
Install anti-virus software program updates to keep the signature profiles current.
Frankie works on the IT team at her company. She is looking for ways to reduce costs, so she suggests that the company uses P2P to facilitate sharing of information, instead of maintaining servers with FTP access. To protect its confidential data while benefiting from P2P, the company should:
implement technologies that will control access and password-protect files.
Harley works in the sales department at his company. He feels that the company's marketing team is not doing a good job, so without direction or permission, he starts his own social networking page to help. His page has a name similar to the company's. He posts company logos on it and uses text copied from the company Website. He posts news and sends tweets to customers and others interested in the company. When the company learns of this, what action is it most likely to take?
Human Resources will issue a cease-and-desist letter, take control of Harley's page, and terminate Harley's employment for copyright and trademark infringement.
James has just finished designing a Website to support a charity organization's fund-raising efforts. He needs to meet with the board members to get their feedback and address some questions before he implements the final design. The board members are dispersed throughout the country and want to avoid spending charity funds on traveling to this meeting. Which of the following solutions would best support the charity and provide James with an opportunity to discuss the design with the group?
Plan a Web conference using a service that supports screen-sharing and phone conferencing.
Josh is expecting a very important file from a co-worker in a remote office to be sent to him through email, but he has not received the file. He calls the co-worker, who informs him that she sent the file yesterday and will send it again immediately. Josh still does not receive the email message, so he contacts Technical Support. They find the email from the co-worker in the spam folder of Josh's email client. It has an attachment named salesnumbers.exe. What is the most likely reason that the email message was filtered out?
A file attachment with an .exe extension may contain malicious code.
Juan is preparing to give a presentation to his company's managers about the cloud computing services that his department is planning to implement. He considers the possible objections that his managers might have to use cloud services for the company. What disadvantage of cloud services should he be ready to discuss?
Speed
Kim is using the YouTube graphics-editing application that she accesses via the Internet through her browser. Kim does not own the application, nor can she download it. She is able to use the application any time she needs to edit graphics. Although she does not have to pay for the access, she does notice advertisements, which appear on the sidebar of the application's interface. The application Kim is using may be classified as which of the following?
Software as a Service (SaaS)
Kjell received an email message on which several other individuals were copied. He wants to respond to this message in a way that will include everyone who was copied on the original message. Which steps should he take with this email?
Click the Reply All button, enter his response, and click Send.
Marja works for a small but growing company. She has been assigned to make several international sales trips to visit prospective customers. The company does not have an enterprise mail server with Web mail access. Her IT department is looking for a solution so that Marja can check her email as she travels. Which of the following should the company choose for the most effective, economical and efficient solution?
Configure a free Web-based email account that Marja can access anywhere, and forward her email to that account while she travels.
Mark's co-worker sent him a joke via email. Mark thought the joke was quite funny, and he forwarded it to several other co-workers that he knows will be amused as well. Later that day, the Human Resources Manager calls Mark to her office to discuss a problem reported to her regarding the forwarded email. Which problem has Mark most likely encountered by forwarding the email message?
He offended a recipient who received the joke as a result of further forwarding.
Monty has been searching online for a rare wine vintage. He finally finds it on the Rare Vintage Website, which he has recently heard about from friends. The site is well designed and offers some good deals on hard-to-find wines. As Monty navigates through the checkout process, he reaches the checkout page with the following URL, which asks him to enter his credit card and mailing information:
http://www.RareVintage.com/vprod/checkout.html/ref=chk_out_TLS128_1b?ie=UTF8
Monty cancels his online transaction instead of proceeding. Why?
Because the URL does not use SSL/TLS encryption and therefore any information Monty enters would not be secure.
Nancy is using a Web browser on her desktop computer to place some bids on a popular online auction site. She decides that she wants to browse to the CIW site without closing her browser. What is the most efficient way to do this?
By typing the CIW site's URL (www.CIWcertified.com) in the address bar of her Web browser
Sadie receives a verbally abusive voicemail from an angry customer who want to complain about a product, followed by several text messages from the customer asking why no one has returned his call yet. Sadie is due at a mandatory meeting with the company's executive managers. Which of the following is her best course of action?
She should send a brief text message to the customer requesting that he send his complaints via email, so that further inappropriate communication will be well documented.
Samson needs to review several promotional product videos from his company's marketing department immediately, before a meeting to discuss revisions. Samson tries to view the videos on his computer using his Windows Media Player, but they will not play. The video files are in RealMedia format. What should Samson do in order to view these videos?
Convert the video files to the WMV format, because RealMedia files will not play in Windows Media Player.
Susan is taking an online college seminar series in Art History. All classes will be delivered over the Web. Although there is no opportunity to ask questions, the live lectures and artwork presentations are engaging. Which Web-based meeting format was used?
Webinar
The SETI (Search for Extraterrestrial Intelligence) project collected vast amounts of data that needed processing. SETI was one of the early adopters of a technology in which volunteers installed a small application on personal computers to receive, process and return information to SETI. Using multiple systems to process large amounts of data was considered to be less expensive than using a single supercomputer to conduct the same task. This technology is typically known as:
grid computing.
Tegan is project manager for a complex product that is having some quality problems during early testing. He meets with the customer to discuss the issues, and the customer tells him that product quality and cost are the priorities: The product must be high quality and must be developed within budget. Tegan asks if the customer can extend the deadline, but the customer refuses. Considering the elements of the project triangle, what can Tegan suggest to meet the customer's needs at this point?
That the customer limits the project scope to include only the most important features.
Tim is listening to music from an online music provider (such as Pandora). He creates a list of his music preferences, and the music service uses his list to suggest additional songs that Tim might like. This music service is an example of a cloud-computing application that uses collaborative filtering technology. What is the name of this type of technology?
Crowdsourcing
Tina is the technology coordinator for a small multi-national corporation with offices in San Francisco, New York, Tokyo and Paris. She needs to coordinate a live and interactive meeting that will allow executives from each of the offices to meet virtually and share presentations. Which of the following is the best way for Tina to accomplish this?
Web Conference
Todd replaced his mobile phone with an upgraded unit, and now must reconfigure many of the services. The instructions say that he can enter his email address and the unit will configure the email client for him. Todd has tried this several times, but it does not work. He calls the vendor's help desk. The technician says that because Todd is trying to sync his email account with an enterprise mail server, he will need to configure the email client manually. What information does Todd need to configure the email client?
Email address, SMTP, POP3, user name and password
Troy is project manager for a development team. After a short meeting to introduce a new project, he is preparing an email message for his team that will assign some initial tasks to be completed that day. He has a list of action items for the team members to review and confirm. Which is the preferred approach to communicate important action items in an email message?
List the action items in a numbered or bulleted list for clarity.
You and other parents are attending Back To School Night at your son's school. During his presentation about this year's curriculum and goals, your son's teacher talks about the dangers of the Internet. Which of the following should he include in his recommendations to the parents?
Urge the parents to warn their children to never provide personal information over the Internet.
You are a network administrator for a medium-sized organization. The receptionist has had several problems with malware recently. The receptionist does not need to access external Websites to perform his job, but he does use his computer for company documentation and internal communication with co-workers. Which of the following will help prevent additional malware from being installed on his computer?
Restrict this employee's access to the Internet.
You are hosting a lunch meeting at a local restaurant for 15 of your roving salespeople. An hour before meeting time, the restaurant calls to tell you that the party room will not be available for at least an hour later than scheduled. You call another restaurant in the area, which can make its party room available in one hour for your lunch meeting. You make a reservation with the new restaurant for the same time and cancel the other. What is the best way to alert each salesperson about the new restaurant location?
Send a text message with the new restaurant location to the mobile phones of all the salespeople.
You are leading a project that will collect vast amounts of data, which will need processing. In your research, you learn about a technology in which volunteers can install a small application on personal computers to receive, process and return information to your organization. Using multiple systems to process large amounts of data in this way will be less expensive than using a single supercomputer to conduct this same task. Which term describes this technology?
Grid computing
You are part of a development team that needs to adopt an integrated development environment tool to increase programmer productivity. The team narrowed the options down to two. One is open-source; the other will require an expensive site license. The tool you choose must be reliable, stable and well maintained. Which of the following could be a disadvantage for you to choose open-source, and thus a compelling enough reason to purchase the licensed software instead of using the open-source solution?
Maintenance of an open-source solution relies on developers who volunteer to work on the code.
You are part of a team that has been collaborating on a marketing document. The document is ready for final approval from the stakeholders. The team leader has sent the document to the stakeholders as an attachment to an email. You notice that an important stakeholder was omitted from the recipient list. What should you do to ensure that the omitted stakeholder receives the document and receives future replies to the email thread?
Use the Forward feature, add the omitted stakeholder's email address and include the other email addresses from the original message to alert the team to the oversight.
You have registered for an e-learning course and are ready to begin. However, when you access the e-learning course page as directed, you find that you cannot log in because the authentication window will not launch. The most likely cause of this problem is that:
you have enabled pop-up blocking software in your browser.
You need to send a message to your manager providing all the details of a business proposal as quickly as possible. The idea you have discussed with her is critical to the business. The project is considered urgent and confidential. What would be the most appropriate way you could use an SMS (text) message in relation to this proposal?
To alert your manager that you have sent the proposal via email so your manager can view the proposal as soon as possible.
You use a proprietary Windows-based program to create designs and layouts for your freelance greeting card business. You want to share samples of your work on your Website for potential new customers to review. You convert the file format of your designs so that customers can view accurate renderings of them, regardless of the local operating system, settings or browser each individual uses to view your site. Which file format should you use?
You work for your company's IT department diagnosing and servicing the employees' workstations. A user complains that since she has been conducting a lot of research online, performance is slowing. You increase the size of her browser cache. Why will performance slow if the browser cache is too small?
Because the user must wait for pages to be loaded from the server, instead of retrieving them from the cache
Your computer crashed, and you lost many personal and work-related files. You just got a new computer, but you are now much more concerned about viruses and other security threats. Which strategy can help you protect your computer against virus attacks?
Update the definitions on your anti-virus application frequently.