Which of the following examples describes a server based network?
Server-based networks typically contain centralized network resources, which are usually
not available on peer-to-peer (P2P) networks. Which of the following examples describes a
server based network?
which document?
Marion has been hired by a small business to determine why its Web site does not attract
users. As Marion interviews different members of the company, she learns that when the
site was first created, the external Web developer did not produce any documents
specifying the basic requirements for the site. As a result, the site did not have a defined
purpose and was not designed for the company’s audience. Additionally, the site navigation
did not make sense from a user’s point of view. Marion considers this information, then she
recommends that the company create which document?
Which of the following is the primary reason for this practice?
Andrea works as an Administrative Assistant for a small business that uses an SaaS service
for accounting, sales orders and customer service information about the business’s
customers. This product is similar to Salesforce.com and its competitors. Andrea makes
sure she saves accurate records about current projects and performs regular backups of the
business data stored on the cloud-based service. Which of the following is the primary
reason for this practice?
Using the Internet and social networking in this manner is known as:
You just started a small business and need to create a logo. Although you are technically
savvy, your artistic creativity is limited. You decide to launch a contest to seek creative
ideas for your logo. Using the Internet and social networking in this manner is known as:
What security risk is associated with this implementation?
Sam is a professor at a small college. Due to a scheduling conflict, he was unable to obtain
access to the computer lab to give the final exam. As an alternative, he asked students to
bring their own devices (BYOD) and connect to the college’s Wi-Fi for network access.
What security risk is associated with this implementation?
Which term describes a compact personal computer that relies on a touch screen for in put, generally uses a so
Which term describes a compact personal computer that relies on a touch screen for in put,
generally uses a solid-state drive instead of a traditional hard disk, and relies on wireless or
mobile networks for connectivity?
Which Webbased meeting format was used?
You attend an online university that offers seminars on APA Style through its Writing
Center. You registered for the seminar and learn that the training will be provided over the
Web. Although there is no opportunity to ask questions, you find the live lecture to be
engaging. Which Webbased meeting format was used?
Which human resources issue do you risk by forwarding the e-mail message?
You just received a joke that was c-mailed to you by a co-worker. You find the joke funny
and consider forwarding it to another co-worker that you trust. Which human resources
issue do you risk by forwarding the e-mail message?
What is the most likely reason that the e-mail message was filtered out?
You are expecting a very important file from a co-worker in a remote office to be sent to you
through e-mail. You finally call the co-worker and tell him that you have not received the file.
He informs you that he sent the file yesterday, but will send it again immediately. After some
time, you still have not received his e-mail message. You contact the Technical Support
department and ask them for help. After some investigation, Technical Support finds the
e-mail from your coworker with an attachment named salesnumbers.exe in the spam folder
of your e-mail client. What is the most likely reason that the e-mail message was filtered
out?
Which Windows tool would you use to recover and set up the saved copies of your files onto your desktop comput
On your Windows laptop, you store all your vacation photos and your entire digital music
library. Concerned about data loss, you perform frequent backups. Your laptop has recently
been stolen and you need to restore your files to a desktop computer. Which Windows tool
would you use to recover and set up the saved copies of your files onto your desktop
computer?