You attend an online university that offers seminars on APA Style through its Writing Center. You registered for the seminar and learn that the training will be provided over the Web. Although there is no opportunity to ask questions, you find the live lecture to be engaging. Which Webbased meeting format was used?
A. Blog
B. Video conference
C. Web conference
D. Webinar
正解:D
質問 2:
You have volunteered to give a presentation to the parents at your child's school about the dangers of the Internet. Which of the following would you include in your recommendations to parents?
A. Remind the parents that the anonymity of chat rooms provides security.
B. To reduce fear, claim that the threat of predators has been reduced in recent times.
C. Warn children to never provide personal information over the Internet.
D. Direct parents to ask other users in the children's chat rooms to provide identification.
正解:C
質問 3:
Which of the following strategies will help protect your computer against virus attacks?
A. Configure security settings for your Web browser to the lowest possible level.
B. Open e-mail attachments only from unknown senders.
C. Update the definitions for your malware protection application frequently.
D. Perform regular backups of your hard drive.
正解:C
質問 4:
You accidentally dropped your mobile phone, which was submerged in water and no longer works. Upon replacing the phone with an upgraded unit you must reconfigure many of the services. The instructions say that all you need to do is enter your e-mail address and the unit will configure the e-mail client for you. Even though you have tried this several times, it does not work. The mobile phone vendor says that because you are trying to sync your e-mail account with an enterprise mail server, you will need to configure the e-mail client manually. Which choice lists the information you will need to configure the e-mail client?
A. Company name, e-mail address, SMTP, POP3, IMAP and DNS
B. E-mail address, SMTP, IMAP, DNS, user name and password
C. Company name, SMTP, POP3, user name and password
D. E-mail address, SMTP, POP3, user name and password
正解:D
質問 5:
You opened an e-mail attachment and it launches a virus. The virus takes control of your system and you are unable to run your anti-virus software. Which of the following is the best step for you to take next?
A. Let the virus run its course.
B. Turn off your computer and reboot from a known, clean system disk.
C. Plug in your backup drive to try to initiate an immediate backup of important files.
D. Call your local authorities to report an identity theft.
正解:B
質問 6:
You just received a joke that was c-mailed to you by a co-worker. You find the joke funny and consider forwarding it to another co-worker that you trust. Which human resources issue do you risk by forwarding the e-mail message?
A. Reducing the effectiveness of spam filters
B. Offending a recipient who receives the joke as a result from further forwarding
C. Copyright infringement by not providing credit to the originator of the joke
D. Forgetting to include others who might find the joke funny
正解:B
Moriguchi -
1D0-61A基本的なところから解説してくれるので、
とてもわかりやすいです。コレを見えると改めてわかることが多かったので社会人前に呼んでおくのもいいなと思いました。