Raoul has received a file attachment from a known individual. He has no reason to expect files from this
individual. Which of the following is an effective security strategy for Raoul to take?
You are using an e-mail client that you are unfamiliar with. You need to send an e-mail with an attachment but
you do not see a feature labeled “attachment” anywhere on the client. What icon should you look for that is
commonly used to invoke the e-mail attachment option?
Aisha is preparing to give a presentation to management about the development of cloud computing services
that her company is planning to implement. Which of the following might her managers mention as a possible
objection or drawback to using cloud services for the company?
You use a proprietary Windows-based program to generate architectural drawings and plans for your freelance
drafting business. You have a personal Web site and would like to share samples of your work for potential
new customers to review. To which file format should you convert your drawings so that they are viewable
regardless of the local operating system used by the individual viewing your site?
As a project manager, you have to balance three elements that compose the project triangle. Suppose your
customer requests that you add some new requirements to the project when you are halfway through. If you
agree to this request, how would it affect other aspects of the project?