CIW 120 |practice exam study guide Questions And Answers| Download To Pass
7 vues 0 fois vendu
Cours
CIW
Établissement
CIW
Why do the executing and controlling phases of a project usually overlap? - ️️Because project work takes place during the executing phase: A project manager monitors the status of the project and takes corrective action as work is being performed.
What is the main benefit of using Rich Text ...
Why do the executing and controlling phases of a project usually overlap? - ✔ ✔ Because project
work takes place during the executing phase: A project manager monitors the status of the project and
takes corrective action as work is being performed.
What is the main benefit of using Rich Text Format (RTF)? - ✔ ✔ RTF is compatible with many
operating systems and applications, including most Macintosh and Windows word pr ocessors.
Which choice lists the basic elements of authorship, according to copyright law? - ✔ ✔ Expression
and originality
Your mom sent you a message with a link to a college information page that you find very useful. You
want to be able to find this same page in the future from your desktop computer, or from your mobile
device when you are not at your desk. Which is the best way to do this? - ✔ ✔ Add the link to a
cloud -based bookmark service such as Delicious or Google Bookmarks.
Which protocol is u sed to receive e -mail messages from an incoming mail server, and forces you to
download e -mail messages before reading, deleting or otherwise managing them? - ✔ ✔ Post Office
Protocol (POP)
Bob opened an e -mail attachment and it launched a virus. The viru s took control of his system, and now
he is unable to run his anti -virus software. What should he do next? - ✔ ✔ Turn off his computer and
reboot from a clean system disk.
To what does the term "netiquette" refer? - ✔ ✔ A set of guidelines that encourage common sense,
politeness and general rules for e -mail messages
What is a project constraint? - ✔ ✔ A factor, such as budget or time, that limits a project manager's
options
1 / 2
Which of the following is the most common method for spreading viruses? - ✔ ✔ Opening
attachments
You are a network administrator for a medium -sized organization. The receptionist has had several
problems with malware recently. The receptionist does not need to access external Web sites to
perform his job, but he does use his computer for company documentation and internal communication
with co -workers. Which of the following will help prevent additional malware from being installed on his
computer? - ✔ ✔ Restrict this employee's access to the Internet.
As an IT professional for a small company, you are responsible for changing network -access user names
and passwords as a security precaution. What should you do to prevent employee frustration or
confusio n when they try to log on to the network after you have changed user names and passwords? -
✔ ✔ Notify employees in advance of the new user names and passwords, and specify the date on
which the new user names and passwords will take effect.
Which of the following Internet communication practices is unethical but not illegal? - ✔ ✔ Asking
another user in a chatroom for personal information
You are a network administrator for your company. When establishing the company encryption policies,
you must determi ne the risk of sending unencrypted data based on the nature of the data and its risk to
the company if obtained by unauthorized users. Much of the data your company sends is proprietary
and sensitive in nature, so you determine that encrypting company tran smissions is critical. What is the
disadvantage of your decision to encrypt company transmissions? - ✔ ✔ Encrypting transmissions
slows communication because each data packet must be encrypted and decrypted.
Tim is listening to music from an online music provider (such as Pandora). He creates a list of his music
preferences, and the music service uses his list to suggest additional songs that Tim might like. This
music service is an example of a cloud -computing application that uses collaborative filtering
technology. What is the name of this type of technology? - ✔ ✔ Crowdsourcing
Which IT job role best describes an individual who installs, modifies and repairs personal computer
hardware components? - ✔ ✔ PC repair technician Powered by TCPDF (www.tcpdf.org)
2 / 2
Les avantages d'acheter des résumés chez Stuvia:
Qualité garantie par les avis des clients
Les clients de Stuvia ont évalués plus de 700 000 résumés. C'est comme ça que vous savez que vous achetez les meilleurs documents.
L’achat facile et rapide
Vous pouvez payer rapidement avec iDeal, carte de crédit ou Stuvia-crédit pour les résumés. Il n'y a pas d'adhésion nécessaire.
Focus sur l’essentiel
Vos camarades écrivent eux-mêmes les notes d’étude, c’est pourquoi les documents sont toujours fiables et à jour. Cela garantit que vous arrivez rapidement au coeur du matériel.
Foire aux questions
Qu'est-ce que j'obtiens en achetant ce document ?
Vous obtenez un PDF, disponible immédiatement après votre achat. Le document acheté est accessible à tout moment, n'importe où et indéfiniment via votre profil.
Garantie de remboursement : comment ça marche ?
Notre garantie de satisfaction garantit que vous trouverez toujours un document d'étude qui vous convient. Vous remplissez un formulaire et notre équipe du service client s'occupe du reste.
Auprès de qui est-ce que j'achète ce résumé ?
Stuvia est une place de marché. Alors, vous n'achetez donc pas ce document chez nous, mais auprès du vendeur jackline98. Stuvia facilite les paiements au vendeur.
Est-ce que j'aurai un abonnement?
Non, vous n'achetez ce résumé que pour €7,68. Vous n'êtes lié à rien après votre achat.