You successfully modified the Registry on a customer's PC. Now the customer's system gets onto the Internet normally. What should you do next?

A. Bill the customer
B. Move on to the next computer
C. Document your solution
D. Run Disk Defrag


Answer: C. Document your solution

Computer Science & Information Technology

You might also like to view...

What is meant by data marshaling? (There are two components to data marshalling; name and describe each.) Why is it necessary?

This is an exercise on data marshalling In the context of IPC:

Computer Science & Information Technology

Floating positioning relies heavily on the hover attribute to position the divs in a page.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Used when designing forms in Visual Basic, the Toolbox is a palette that contains the standard controls

Indicate whether the statement is true or false

Computer Science & Information Technology

Which vulnerability follows the network in the vulnerability cycle?

A. client B. human/organization C. application D. service/server

Computer Science & Information Technology