CIW 120 |practice exam study guide Questions And Answers| Download To Pass
7 views 0 purchase
Course
CIW
Institution
CIW
Why do the executing and controlling phases of a project usually overlap? - ️️Because project work takes place during the executing phase: A project manager monitors the status of the project and takes corrective action as work is being performed.
What is the main benefit of using Rich Text ...
Why do the executing and controlling phases of a project usually overlap? - ✔ ✔ Because project
work takes place during the executing phase: A project manager monitors the status of the project and
takes corrective action as work is being performed.
What is the main benefit of using Rich Text Format (RTF)? - ✔ ✔ RTF is compatible with many
operating systems and applications, including most Macintosh and Windows word pr ocessors.
Which choice lists the basic elements of authorship, according to copyright law? - ✔ ✔ Expression
and originality
Your mom sent you a message with a link to a college information page that you find very useful. You
want to be able to find this same page in the future from your desktop computer, or from your mobile
device when you are not at your desk. Which is the best way to do this? - ✔ ✔ Add the link to a
cloud -based bookmark service such as Delicious or Google Bookmarks.
Which protocol is u sed to receive e -mail messages from an incoming mail server, and forces you to
download e -mail messages before reading, deleting or otherwise managing them? - ✔ ✔ Post Office
Protocol (POP)
Bob opened an e -mail attachment and it launched a virus. The viru s took control of his system, and now
he is unable to run his anti -virus software. What should he do next? - ✔ ✔ Turn off his computer and
reboot from a clean system disk.
To what does the term "netiquette" refer? - ✔ ✔ A set of guidelines that encourage common sense,
politeness and general rules for e -mail messages
What is a project constraint? - ✔ ✔ A factor, such as budget or time, that limits a project manager's
options
1 / 2
Which of the following is the most common method for spreading viruses? - ✔ ✔ Opening
attachments
You are a network administrator for a medium -sized organization. The receptionist has had several
problems with malware recently. The receptionist does not need to access external Web sites to
perform his job, but he does use his computer for company documentation and internal communication
with co -workers. Which of the following will help prevent additional malware from being installed on his
computer? - ✔ ✔ Restrict this employee's access to the Internet.
As an IT professional for a small company, you are responsible for changing network -access user names
and passwords as a security precaution. What should you do to prevent employee frustration or
confusio n when they try to log on to the network after you have changed user names and passwords? -
✔ ✔ Notify employees in advance of the new user names and passwords, and specify the date on
which the new user names and passwords will take effect.
Which of the following Internet communication practices is unethical but not illegal? - ✔ ✔ Asking
another user in a chatroom for personal information
You are a network administrator for your company. When establishing the company encryption policies,
you must determi ne the risk of sending unencrypted data based on the nature of the data and its risk to
the company if obtained by unauthorized users. Much of the data your company sends is proprietary
and sensitive in nature, so you determine that encrypting company tran smissions is critical. What is the
disadvantage of your decision to encrypt company transmissions? - ✔ ✔ Encrypting transmissions
slows communication because each data packet must be encrypted and decrypted.
Tim is listening to music from an online music provider (such as Pandora). He creates a list of his music
preferences, and the music service uses his list to suggest additional songs that Tim might like. This
music service is an example of a cloud -computing application that uses collaborative filtering
technology. What is the name of this type of technology? - ✔ ✔ Crowdsourcing
Which IT job role best describes an individual who installs, modifies and repairs personal computer
hardware components? - ✔ ✔ PC repair technician Powered by TCPDF (www.tcpdf.org)
2 / 2
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller jackline98. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $7.99. You're not tied to anything after your purchase.