You opened an e-mail attachment and it launches a virus. The virus takes control of your system and you are unable to run your anti-virus software.
Which of the following is the best step for you to take next?
A. Let the virus run its course.
B. Call your local authorities to report an identity theft.
C. Turn off your computer and reboot from a known, clean system disk.
D. Plug in your backup drive to try to initiate an immediate backup of important files.
You just received a joke that was c-mailed to you by a co-worker. You find the joke funny and consider forwarding it to another co-worker that you trust.
Which human resources issue do you risk by forwarding the e-mail message?
A. Forgetting to include others who might find the joke funny
B. Copyright infringement by not providing credit to the originator of the joke
C. Offending a recipient who receives the joke as a result from further forwarding.
D. Reducing the effectiveness of spam filters
Evonka is listening to music from an online music provider (such as Pandora or Jango). She builds a list of music preferences, including favorite songs. The music service then suggests additional songs she might enjoy. The music provider is an example of a cloud-computing application that uses a technology for collaborative filtering, which helps define the list of songs available to listeners.
Which term describes this technology?
A. Bit-torrent
B. Crowdsourcing
C. Grid computing
D. Software as a Service
You accidentally dropped your mobile phone, which was submerged in water and no longer works. Upon replacing the phone with an upgraded unit you must reconfigure many of the services. The instructions say that all you need to do is enter your e-mail address and the unit will configure the e-mail client for you. Even though you have tried this several times, it does not work. The mobile phone vendor says that because you are trying to sync your e-mail account with an enterprise mail server, you will need to configure the e-mail client manually.
Which choice lists the information you will need to configure the e-mail client?
A. Company name, email address, SMTP, POP3, IMAP and DNS
B. E-mail address, SMTP, IMAP, DNS, user name and password
C. E-mail address, SMTP, POP3, user name and password
You use a proprietary Windows-based program to generate architectural drawings and plans for your freelance drafting business. You have a personal Web site and would like to share samples of your work for potential new customers to review.
To which file format should you convert your drawings so that they are viewable regardless of the local operating system used by the individual viewing your site?
A. PDF
B. MP3
C. DOC
D. XML
You are a software developer who wants to start developing mobile apps for smartphones. You have the option to develop apps for an open-source operating system.
Which of the following could persuade you to focus your development efforts on the open-source operating system?
A. An open-source license will never be in the public domain.
B. Source code for an open-source app is not viewable and cannot be modified.
C. Open-source operating systems and development tools are free from software bugs and viruses.
D. The operating system and associated development tools are free, provided you comply with the copy left license.
Which of the following strategies will help protect your computer against virus attacks?
A. Perform regular backups of your hard drive
B. Open e-mail attachments only from unknown senders
C. Update the definitions for your malware protection application frequently.
D. Configure security settings for your Web browser to the lowest to the lowest possible level.
A friend just sent you a link to a Facebook page with information that you find very useful. You want to be able to recall the site in the future from your desktop computer, or from your mobile device while away from your desk.
Which is the best approach?
A. Memorize the URL so you can pull up the site in any browser such as Chrome, Firefox or Internet Explorer
B. Add the link to a cloud-based bookmark service such as Delicious or Google Bookmarks.
C. Manually enter the Web address into any and all browsers on all of your devices.
D. Pull up the message with the link any time you want to view the site.
You are using an e-mail client that you are unfamiliar with. You need to send an e-mail with an attachment but you do not see a feature labeled "attachment" anywhere on the client.
What icon should you look for that is commonly used to invoke the e-mail attachment option?
A. Lock
B. Folder
C. Checkmark
D. Paperclip
One of your co-workers calls you to ask if you sent her an e-mail message with an attachment. You recall that you sent several c-mails with attachments earlier that day.
Which of the following is your best response to this question?
A. Ask your co-worker to open the attachment and describe the contents.
B. Ask your co-worker to read the email message including the full name of the attachment and its extension.
C. Ask your co-worker to forward the e-mail to you so you can open the attachment and check it.