A technician has been taken to a users desk to resolve a problem. The users desk is covered with papers and it is obvious to the technician that these papers are of a confidential nature. Which of the following is the BEST course of action?

A. Put the confidential papers in a neat pile at the side of the desk.
B. Ask the user to clear the desk of the confidential papers.
C. Work around the papers to resolve the problem.
D. Refuse to work until the user has cleared the desk.


Answer: B. Ask the user to clear the desk of the confidential papers.

Computer Science & Information Technology

You might also like to view...

Bike shares in major cities in which you use a smart phone to rent a bike are examples of ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

The numbers that identify the rows and the letters that identify the columns in Excel are called ________

A) named ranges B) headings C) characters D) pixels

Computer Science & Information Technology

This query is typically used by business managers to create a new Access table using a subset of records from an existing database table:

A) Update query. B) Select query. C) Append query. D) Make Table query.

Computer Science & Information Technology

Startup options for a database may be bypassed when opening a database by pressing the ____ key while clicking on the database name.

A. Ctrl B. Shift C. Alt D. Tab

Computer Science & Information Technology