For security reasons, you should be extremely wary of opening e-mail ________ such as Word files.

Fill in the blank(s) with the appropriate word(s).


attachments

Computer Science & Information Technology

You might also like to view...

On which tab is the insert background feature located?

A) Page Layout B) Home C) Formulas D) Data

Computer Science & Information Technology

You have a worksheet with a calculation to estimate production costs based on cost of raw materials, labor, fuel and delivery costs. You would like to see what would happen if the price of fuel and raw materials spiked. Which what-if analysis tool would be best?

A) Data Tables B) Solver C) Scenario Manager D) Goal Seek

Computer Science & Information Technology

Which section break begins a new section on the same page?

A. continuous B. even page C. odd page D. same page

Computer Science & Information Technology

What should you be armed with to adequately assess potential weaknesses in each information asset?

A. properly classified inventory B. audited accounting spreadsheet C. intellectual property assessment D. list of known threats

Computer Science & Information Technology