A. List of prohibited content B. Date C. Age D. Prohibited activity E. Name of receiving party
A. Third party proxy sites B. Malicious cookie C. Detected virus D. Unwanted pop-up
A. Allow the user to demonstrate expertise. B. Do not argue; empathize with the user, and offer to help. C. Ask the user to watch as the technician diagnoses and corrects the problem. D. Document each of the steps to replicate at a later time.