You are distributing a large video game file using BitTorrent. First, you upload the initial file and make it available via a central server called a tracker. Other users can then connect to the tracker and download the file. Each user who downloads the file makes it available to other users to download. The use of BitTorrent significantly reduces the original provider’s hardware and bandwidth resource costs. BitTorrent is an example of what type of network?
Disaster recovery planning is considered a best practice for all organizations. It is even more important when cloud-computing services are used. Which of the following should be included as part of a disaster recovery plan for companies that use cloud-based services?
Gwen works for a small company where she has been asked to find a cost-effective option for providing comprehensive customer service. The finance, technical support, sales and customer service departments all need to share information about their customers. Gwen is considering adoption of a customer relationship management (CRM) application. Which of the following would be the most cost-effective solution?
You have recently purchased a new wireless router. You would like to configure a name for your wireless network so that you can easily identify it when scanning available wireless networks.
Which term describes this wireless network device name?
Which of the following is generally a component of a BYOD policy?
Selena has decided to change a 32-character unique wireless network name on her wireless router to improve network security after a break-in. She is following advice from CERT to make this change in order to avoid attacks from botnets. Which of the following settings would she modify?
Mobile computing has become a common necessity for both personal and business transactions. Which device has features similar to a smartphone but usually does not have telephone capabilities?
Patrick visits his teenage daughter’s social media page and discovers several offensive posts about one of her classmates. After speaking with his daughter, Patrick learns that several other girls in her class are upset with the classmate and have been posting, texting and e-mailing others about the girl. What is the best way for Patrick to help his daughter understand cyber bullying?