Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Aisha is preparing to give a presentation to management about the development of cloud computing services that her company is planning to implement. Which of the following might her managers mention as a possible objection or drawback to using cloud services for the company?

A.

Speed

B.

Cost

C.

Flexibility

D.

Scalability

Irena is reviewing several promotional product videos from her company’s marketing department before they are published on the company’s Web site. The videos are in RealMedia format, but they do not open in Irena’s Windows Media Player. What should Irena do in order to view the videos?

A.

Contact her company’s Technical Support department and schedule service for her computer.

B.

Convert the video files to the WMV format, because RealMedia files will not play in Windows Media Player.

C.

Upload the videos to the Web server to be viewed through Windows Media Player because they will not play from a local computer.

D.

Decompress the files before attempting to play them in Windows Media Player, because RealMedia files are compressed for uploading/downloading.

A friend just sent you a link to a Facebook page with information that you find very useful. You want to be able to recall the site in the future from your desktop computer, or from your mobile device while away from your desk. Which is the best approach?

A.

Memorize the URL so you can pull up the site in any browser such as Chrome, Firefox or Internet Explorer.

B.

Add the link to a cloud-based bookmark service such as Delicious or Google Bookmarks.

C.

Manually enter the Web address into any and all browsers on all of your devices.

D.

Pull up the message with the link any time you want to view the site.

Digital signatures verify the integrity of the data, verify the identity of the sender, and:

A.

Provide data confidentiality.

B.

Enforce non-repudiation.

C.

Sign digitalcertificaterequests.

D.

Create certificate requests.

You have just checked the balance in your bank account by logging into your bank’s Web site. Which protocol was most likely used for the transmission of your information?

A.

IMAPS

B.

HTTPS

C.

POP

D.

FTPS

You are a software developer who wants to start developing mobile apps for smartphones. You have the option to develop apps for an open-source operating system. Which of the following could persuade you to focus your development efforts on the open-source operating system?

A.

An open-source license will never be in the public domain.

B.

Source code for an open-source app is not viewable and cannot be modified.

C.

Open-source operating systems and development tools are free from software bugs and viruses.

D.

The operating system and associated development tools are free, provided you comply with the copyleft license.

Emelia and Lola have created a new software application that allows messaging site subscribers to analyze the message statistics in order to more easily assess and interact with followers. They have decided to license this software according to the GNU GPL Version 3. What does this license allow them to do with their software?

A.

They can only sell this software through a not-for-profit company.

B.

They can sell this software, but only if they make the software code available on a public server.

C.

The software enters the public domain for free use and can be altered by other programmers, who must then make their changes freely available as well.

D.

The software enters the public domain for free use, but any changes made in the future can be kept secret, allowing them to profitably sell the modified software.

Your child’s high school has created a wiki for its social science classes to support blogs and collaborative projects. Your child also contributes photos of extracurricular events to the school’s Facebook site. Which term collectively describes these types of Web usage?

A.

Mashup

B.

Web 1.0

C.

Web 2.0

D.

Folksonomy

Selena needs to send a message to her manager providing all the details of a business proposal. The idea they have discussed is critical to the business. The project is considered urgent and confidential. Selena wants to get this outline to her manager as quickly as possible. What would be the most appropriate way Selena could use an SMS (text) message in relation to this proposal?

A.

To send a useful summary of the proposal to her manager so that the manager has it available during a presentation

B.

To alert her manager that she has sent the proposal via e-mail so her manager can view the proposal as soon as possible

C.

To provide a detailed outline of the proposal so that her manager can refer to it as he travels

D.

To send the proposal as an attachment to the text message

Andrea works as an Administrative Assistant for a small business that uses an SaaS service for accounting, sales orders and customer service information about the business’s customers. This product is similar to Salesforce.com and its competitors. Andrea makes sure she saves accurate records about current projects and performs regular backups of the business data stored on the cloud-based service. Which of the following is the primary reason for this practice?

A.

If there is an interruption in Internet access, the service and records would not be accessible.

B.

There is a limit on the number of users who are allowed to access the cloud-based service at any one time.

C.

Data stored online through the cloud-based service is more at risk to security breaches than if it were stored locally.

D.

Andrea is overly cautious because it is well known that cloud-based services are highly secure, highly reliable and always available.