You are using an e-mail client that you are unfamiliar with. You need to send an e-mail with an attachment but
you do not see a feature labeled “attachment” anywhere on the client. What icon should you look for that is
commonly used to invoke the e-mail attachment option?
Raoul has received a file attachment from a known individual. He has no reason to expect files from this
individual. Which of the following is an effective security strategy for Raoul to take?
Evonka is listening to music from an online music provider (such as Pandora or Jango). She builds a list of
music preferences, including favorite songs. The music service then suggests additional songs she might enjoy.
The music provider is an example of a cloud-computing application that uses a technology for collaborative
filtering, which helps define the list of songs available to listeners. Which term describes this technology?
You use a proprietary Windows-based program to generate architectural drawings and plans for your freelance
drafting business. You have a personal Web site and would like to share samples of your work for potential
new customers to review. To which file format should you convert your drawings so that they are viewable
regardless of the local operating system used by the individual viewing your site?
Aisha is preparing to give a presentation to management about the development of cloud computing services
that her company is planning to implement. Which of the following might her managers mention as a possible
objection or drawback to using cloud services for the company?