You should schedule meetings with project stakeholders and management during the executing and controlling phases of a project to:
When you sign in to your instant messaging (IM) service, your online status is advertised (or published) to the people on your contacts list. What does this scenario represent?
You have created a new software application and are ready to distribute it to other users. You have decided to license the software according to the GNU GPL version 3. What does this license allow you to do with your software?
Your company wants to simplify the customer support process for its distributors by enabling them to obtain company forms and reports online. Your Web team are in charge of implementing this capability. Which Web-based system should you implement?
Which of the following audio file formats is a free, open-source alternative to the MP3 format?
As an IT project manager, you must be able to determine which projects to preserve and which projects to eliminate in order to:
As an IT project manager, you are weighing the benefits of installing a new company firewall. Which of the following will convince upper management to approve the project?
You have been asked to defragment the hard drives of several corporate systems without leaving your desk. All of the systems are running Windows 10. To complete this task, you should:
Johann uses instant messaging to communicate with his team members, as well as with close friends. Johann was surprised he started receiving spam during IM sessions. Which statement would explain why Johann could receive spam during an IM session?
During which project management phase should you troubleshoot problems and take corrective measures to ensure that all objectives are being met?
Frankie works on the IT team at her company. She is looking for ways to reduce costs, so she suggests that the company uses P2P to facilitate sharing of information. To protect its confidential data while benefiting from P2P, the company should:
Much of the data your company sends is proprietary and sensitive in nature, so you determine that encrypting company transmissions is critical. What is the disadvantage of encrypting company transmiss
Why does an IT project manager need to consider a project's Return On Investment (ROI) before starting a new project?
Employers can monitor their employees' email messages sent to and from the company network because:
In a business environment, in which situation would email be more appropriate for communicating than texting?
Which of the following could be a disadvantage for you to choose open-source, and thus a compelling enough reason to purchase the licensed software instead of using the open-source solution?
Samson tries to view the videos on his computer using his Windows Media Player, but they will not play. The video files are in RealMedia format. What should Samson do in order to view these videos?
What must an email message include in order for you to send it?
You download a file with the unusual file name extension of .wow. When you attempt to open this file, Windows displays an error message. Which of the following determines a document type and the application required to open it?
Your computer crashed, and you lost many personal and work-related files. You just got a new computer, but you are now much more concerned about viruses and other security threats. Which strategy can help protect your computer against virus attacks?
Teachers: Create FREE classroom games with your questions Click for more info!
©2007-2024 Review Game Zone | About | Privacy | Contact | Terms | Site Map
©2007-2024 Review Game Zone | About | Privacy | Contact | Terms | Site Map