Review Game Zone
Games
Test
Preview
Back
Match it!
Match it! Select the correct answer from the pull down...Good luck!
Which of the following is an electronic stamp that can verify the integrity of data and the identity of the message source?
to call, text or IM James before opening the attachment, to verify that he intended to send it.
A factor, such as budget or time, that limits a project manager's options
To graphically display the project tasks and task durations
Update the definitions on your anti-virus application frequently.
details recommended steps for producing products and services using a quality-management system that maximizes time, money an
Encryption
Webcast
Digital signature
One way that a project manager can ensure the delivery of a quality product is to adhere to ISO 9000 standards. ISO 9000:
to call, text or IM James before opening the attachment, to verify that he intended to send it.
A factor, such as budget or time, that limits a project manager's options
To graphically display the project tasks and task durations
Update the definitions on your anti-virus application frequently.
details recommended steps for producing products and services using a quality-management system that maximizes time, money an
Encryption
Webcast
Digital signature
Project management software often contains Gantt charts. What is the purpose of Gantt charts?
to call, text or IM James before opening the attachment, to verify that he intended to send it.
A factor, such as budget or time, that limits a project manager's options
To graphically display the project tasks and task durations
Update the definitions on your anti-virus application frequently.
details recommended steps for producing products and services using a quality-management system that maximizes time, money an
Encryption
Webcast
Digital signature
Which of the following is generally used in non-interactive Web events?
to call, text or IM James before opening the attachment, to verify that he intended to send it.
A factor, such as budget or time, that limits a project manager's options
To graphically display the project tasks and task durations
Update the definitions on your anti-virus application frequently.
details recommended steps for producing products and services using a quality-management system that maximizes time, money an
Encryption
Webcast
Digital signature
Your computer crashed, and you lost many personal and work-related files. You just got a new computer, but you are now much more concerned about viruses and other security threats. Which strategy can help you protect your computer against virus attac
to call, text or IM James before opening the attachment, to verify that he intended to send it.
A factor, such as budget or time, that limits a project manager's options
To graphically display the project tasks and task durations
Update the definitions on your anti-virus application frequently.
details recommended steps for producing products and services using a quality-management system that maximizes time, money an
Encryption
Webcast
Digital signature
What is a project constraint?
to call, text or IM James before opening the attachment, to verify that he intended to send it.
A factor, such as budget or time, that limits a project manager's options
To graphically display the project tasks and task durations
Update the definitions on your anti-virus application frequently.
details recommended steps for producing products and services using a quality-management system that maximizes time, money an
Encryption
Webcast
Digital signature
Which term is used to describe the process that converts data into an unreadable form of text?
to call, text or IM James before opening the attachment, to verify that he intended to send it.
A factor, such as budget or time, that limits a project manager's options
To graphically display the project tasks and task durations
Update the definitions on your anti-virus application frequently.
details recommended steps for producing products and services using a quality-management system that maximizes time, money an
Encryption
Webcast
Digital signature
Lisa has received a file attachment from a co-worker, James. She has no reason to expect a file from this person. The most effective security strategy for Lisa to follow would be:
to call, text or IM James before opening the attachment, to verify that he intended to send it.
A factor, such as budget or time, that limits a project manager's options
To graphically display the project tasks and task durations
Update the definitions on your anti-virus application frequently.
details recommended steps for producing products and services using a quality-management system that maximizes time, money an
Encryption
Webcast
Digital signature
Check it!