Which of the following is an example of an inappropriate use of the company network?

A) Checking competitors’ websites to see what products they offer
B) Using the web to search for a new job
C) Booking a business trip
D) Doing research for a business-related project


B) Using the web to search for a new job

Computer Science & Information Technology

You might also like to view...

To see the available themes, view the thumbnails located in the Themes ________

A) Album B) Folder C) File D) Gallery

Computer Science & Information Technology

To move a text box label, what action must you take?

A) Click the Tabular Layout in the Table group of the Arrange tab while both the label and text box controls are selected. B) Click the Tabular Layout in the Arrange group when the label is selected. C) Click the Tabular Layout in the Arrange group when the text box is selected. D) Click the Tabular Layout in the Arrange group of the Table group while the label and text box are selected.

Computer Science & Information Technology

____ is a set of tools designed to provide multitiered security capabilities for protecting data by classifying data for which access rights and privileges are then assigned and monitored.

A. Multilayer Security B. Privileges Monitor C. Class Monitor D. Label Security

Computer Science & Information Technology

DISM enables an administrator to mount an image file, similar to mounting a hard disk, and issue commands to update the image

Indicate whether the statement is true or false

Computer Science & Information Technology