You successfully modified the Registry on a customer's PC. Now the customer's system gets onto the Internet normally. What should you do next?
A. Bill the customer
B. Move on to the next computer
C. Document your solution
D. Run Disk Defrag
Answer: C. Document your solution
You might also like to view...
What is meant by data marshaling? (There are two components to data marshalling; name and describe each.) Why is it necessary?
This is an exercise on data marshalling In the context of IPC:
Floating positioning relies heavily on the hover attribute to position the divs in a page.
Answer the following statement true (T) or false (F)
Used when designing forms in Visual Basic, the Toolbox is a palette that contains the standard controls
Indicate whether the statement is true or false
Which vulnerability follows the network in the vulnerability cycle?
A. client B. human/organization C. application D. service/server