Edit Game
CIW Certification Review
 Delete

Use commas to add multiple tags

 Private  Unlisted  Public



 Save

Delimiter between question and answer:

Tips:

  • No column headers.
  • Each line maps to a question.
  • If the delimiter is used in a question, the question should be surrounded by double quotes: "My, question","My, answer"
  • The first answer in the multiple choice question must be the correct answer.






 Save   39  Close
---
Reply All
---
Offending a recipient who receives the joke as a result from further forwarding
---
Ask your co-worker to read the e-mail message including the full name of the attachment and its extension.
---
Suggest that the scope be limited to include only the most important features.
---
Terminate Melanie's employment for copyright and trademark violation, with a cease-and-desist letter asking for control of the account.
---
The email contained a .exe attachment which could be a virus.
---
Paperclip
---
Turn off your computer and reboot from a known, clean system disk.
---
The cost of the project will increase.
---
Utilize crowdsourcing
---
Before opening the attachment, call or send a text or instant message to the individual to verify that he or she meant to send it.
---
The company will have access to her personal e-mail messages.
---
File Transfer Protocol (FTP)
---
Request that the customer send his complaints by e-mail, knowing that any inappropriate communication will be well documented
---
Webinar
---
PDF
---
Domain Name System (DNS)
---
E-mail address, SMTP, POP3, user name and password
---
Plan a Web conference using a service such as WebEx or GoToMeeting that supports screen sharing and phone conferencing.
---
Deep URL
---
Crowdsourcing
---
If there is an interruption in Internet access, the service and records would not be accessible.
---
Schedule a Webinar with the sales managers so that the updates can be demonstrated and any questions answered with the entire group.
---
Because the link does not use SSL/TLS encryption and therefore the information Marcella enters would not be secure
---
Send a brief text message to update now, and then send the meeting details in an e-mail message later.
---
Monitor employees’ messages
---
The operating system and associated development tools are free, provided you comply with the copyleft license.
---
Web conference
---
Social tagging
---
Because your employer has the right to read your e-mail
---
Software as a Service
---
The software enters the public domain for free use and can be altered by other programmers, who must then make their changes freely available as well.
---
Speed
---
To alert her manager that she has sent the proposal via e-mail so her manager can view the proposal as soon as possible
---
Web 2.0
---
Convert the video files to the WMV format, because RealMedia files will not play in Windows Media Player
---
Add the link to a cloud-based bookmark service such as Delicious or Google Bookmarks.
---
Send a text message with the hotel information to the mobile phone of each traveler.
---
Use technologies that will control access and password-protect files.