DIT CERTIFICATION TEST PRACTICE

¡Supera tus tareas y exámenes ahora con Quizwiz!

what are the three general types of queries?

-Menu query -Query by example. -Query language

How does a LAN differ from a WAN?

A LAN spans a confined geographic area, whereas a WAN consists of multiple LANs.

What does a closed-envelope icon next to an e-mail message header indicate?

A message that has not yet been read

What is MTA?

A messaging component that routes, delivers and receives e-mail.

What can you use to help you determine how closely a site matches the topic for which you are searching?

A relevancy score based on how frequently your specified keywords are found in the site

What is a cookie

A text file that contains information sent between a server and a client to help maintain state and track user activities. Cookies can reside in memory or on a hard drive.

What three characteristics can identify each Web site hosted on a Web server?

An IP address, a TCP port and a host header

Minimizing workflow interruptions during the course of an IT project can be considered which of the following?

An IT responsibility

Having appropriate access to hardware and software, and getting the security access required to perform tasks can be considered which of the following?

An IT right

Whats is a MDA (Mail Delivery Agent)?

An e-mail server program that receives sent messages and delivers them to their proper destination mailbox.

What is a thread

An instruction from a running application that executes a particular task

What is WebP

An open-source image file format that provides lossless and lossy compression for images on the Web.

What is a node?

Any entity or addressable device on a network that can be managed

What are applets

Applets are small programs that can be embedded within web pages to perform some specific functionality, such as computations, animations, and information processing. Applets are written using the Java language.

How do most current e-mail clients display an attachment in an e-mail message?

As a separate link, such as an icon

Because file attachments may contain malicious code that can be used to damage or infiltrate systems, your company routinely scans all file attachments in incoming e-mail. Where does attachment scanning take place?

At the server, usually just after the message has been received via SMTP

Which of the following search engines uses your social network (Facebook and Twitter) to find more relevant information for your query?

Bing

What will Internet search results contain when you use the AND Boolean operator in a two-keyword search string?

Both keywords

which object-oriented programming languge is based of of "C"

C++

Which of the following is the de facto standard used to process Web forms?

Common Gateway Interface (CGI)

what are database administrators responsibele for?

Database administrators are responsible for the maintenance and security of an organization's database resources and data. They are also responsible for researching and analyzing the latest database technologies and developments, and for providing recommendations to senior management about database use and information management procedures and standards.

what URL includes a path past the domain into the folder structure of a Web site.

Deep URL

Non-repudiation is the security principle of providing proof that a transaction occurred between identified parties. Which of the following can you use to enforce non-repudiation in an electronic data transfer?

Digital signiture

For which of the following are mid-level offline instant storefronts generally at a disadvantage when compared to online instant storefronts?

Ease of use

What is considered the de facto standard communication tool for business?

Electronic mail (e-mail)

in addition to allowing keyword searches, which of the following search engines also allows conceptual searches?

Excite

What is the term for an internal network designed to provide access to selected external users?

Extranet

Which of the following is an open-source implementation of Pretty Good Privacy (PGP) that does not use patented algorithms?

GNU Privacy Guard (GPG)

Which of the following enables users on different e-mail systems to exchange messages?

Gateways

What is google desinged to do?

Google's Web search engine is designed to rank the relevance of a particular site according to the keywords entered by the user

Which of the following retains all the formatting characteristics of a word-processing document, but may render inconsistently in different browsers?

HTML résumés

what do IMAP servers do?

IMAP server receives and holds your messages. When you log on with your user name and password, you can read a message on the server, or you can view just the heading and the sender of the message and decide whether to download it.

who are Business intelligence analysts

Individuals who are experts at mining databases for information, then creating functional specification documents based on this data to help a business create solutions for its customers. These individuals manage data miners.

The part of the browser responsible for reading and processing programming languages

Interpreter

What is the main difference between intranets/extranets and the Internet?

Intranets and extranets exclude the general Internet public

Intranets and extranets can both be considered subsets of the Internet. Which statement best describes the difference between intranets and extranets?

Intranets are used within corporations by employees, whereas extranets are used by corporations for non-public customer support.

Which object-oriented language developed by Sun Microsystems

Java

Which of the following data modeling steps involves encoding the concept into SQL programming?

Logical Design

what is a mail client also refered to as?

MAIL USER AGENT

What could be a disadvantage for you to choose open-source, and thus a compelling enough reason to purchase the licensed software instead of using the open-source solution?

Maintenance of an open-source solution relies on developers who volunteer to work on the code.

Which of the following is a protocol that can be used by applications to automatically process files downloaded from the Internet?

Multipurpose Internet Mail Extensions (MIME)

Which Boolean operator should you use if you want to specify Internet search results that exclude the keyword that follows the operator?

NOT

Which of the following would be considered a popular resource as opposed to a scholarly resource?

Newsweek

Which outsourcing site creation package should you consider if you want to conduct e-commerce with a package that is easy to implement and administer?

Online instant storefront

Which outsourcing site creation package would be most appropriate if the inventory you carry must be managed from diverse locations?

Online instant storefront

What does POP3 servers do?

POP3 servers receive and hold incoming e-mail messages in the appropriate mailbox on the server until users log on (authenticate themselves with a user name and password) and download their mail. Once messages are downloaded, they are removed from the server

Which technology can companies use to maximize processing power while protecting privacy and sensitive materials?

Peer-to-peer networks on the Internet (P2P)

What si it called If the text on an older screen is unreadable

Poor rendering

Which of the following is known as a "store-and-forward" e-mail service?

Post Office Protocol version 3 (POP3)

Which term can be defined as a person's willingness and ability to engage in communications?

Presence

When you sign in to your instant messaging (IM) service, your online status is advertised (or published) to the people on your contacts list. What does this scenario represent?

Presencing

Which of the following is an effective way for Web site owners to prevent typosquatting?

Purchase domain names that are similar to their actual domain names

Which operator would you use in a Web search to find a multi-word phrase with the words in a specified order?

Quotation marks " "

Which term describes profit earned as a result of a project relative to the value of the resources required to complete the project?

Return On Investment (ROI)

Which programming method isolates a particular application or process.

Sandbox

What is the term in ontology that refers to the hierarchical description and vocabulary concerning a particular domain?

Schema

Which of the following protocols support the encryption and decryption of e-mail messages?

Secure Multipurpose Internet Mail Extensions (S/MIME) and Pretty Good Privacy (PGP)

Sensitive data (such as credit card information) should be secured using authentication and encryption when transmitting it over the Internet. Which protocol do most servers use to exchange sensitive data over the Internet?

Secure Sockets Layer (SSL)

Cloud computing is software services that are provided over the Internet. Which of the following IT job roles should be most familiar with cloud computing software, infrastructure and platform services?

Server administrator

Which of the following is true regarding smartphones and PIM applications?

Smartphone PIM applications are designed to work in tandem with traditional desktop or laptop computers.

Kim is using the YouTube graphics-editing application that she accesses via the Internet through her browser. Kim does not own the application, nor can she download it. She is able to use the application any time she needs to edit graphics. Although she does not have to pay for the access, she does notice advertisements, which appear on the sidebar of the application's interface. The application Kim is using may be classified as which of the following?

Software as a Service (SaaS)

What term is used to describe a software application that is secretly placed on a user's system to gather information and relay it to outside parties, usually for advertising purposes?

Spyware

The commonplace use of e-mail has given rise to the term "snail mail," which is a slang term for what?

Standard postal service

What are cascading style sheets (CSS)

Style sheet language that provides the formatting and "look" of a Web page or document written in a markup language.

You want to receive e-mail messages, announcements and advertising on a regular basis about digital animation. Which action could you take to accomplish this?

Subscribe to a listserve group about digital animation.

During which project management phase should product testing and performance evaluations occur?

The closing phase

What is the common term for the default page that appears when a browser is initially opened?

The home page

A domain name consists of letters (and sometimes numbers) separated by periods. Which of the following is the host name component of a domain name?

The left-side component of the domain name, which categorizes domains into groups by server name

What is ontology?

The study of how a particular knowledge domain, or system, is organized. An ontology is the product of an ontological study.

What is the purpose of using Internet research tools such as Zotero?

They enable you to organize the information you find and store it on your local hard drive.

What is the function of a CAPTCHA?

To differentiate humans from automated senders during online transactions

what is the job of a network engineer?

To focus on the design, implementation, delivery and support of network components, policies and procedures used by an organization. Network engineers are responsible for configuring and testing network devices, and setting up and maintaining the network infrastructure.

To what does the term up-sell refer?

To sell a more expensive version of a product

How many mail servers does the use of e-mail involve?

Two -- incoming mail is handled by one server using Post Office Protocol (POP) or Internet Message Access Protocol (IMAP), and outgoing mail is handled by another server using Simple Mail Transfer Protocol (SMTP).

Which of the following general rules should you follow when entering keywords in search engines?

Use all uppercase letters when typing Boolean operators.

What do web application developers use to do their jobs, and what is their job?

Web application developers use Web programming languages or products to develop Web sites, generally for Web server applications. Web application developers design, build and test the Web pages and hyperlinks that form the site. Web application developers must be proficient in programming and scripting languages such as Java, JavaScript, C++, Perl and others.

Which of the following is a Web-based seminar or training session that is typically interactive, enabling participants to communicate with the presenter and with each other via online chat?

Web conference

what do web site designers do?

Web site designers create the "look and feel" that visitors will see when they access a site on the World Wide Web. Web site designers determine the most effective site layouts, color schemes, navigational links and fonts to maintain visitor interest in the site. Site designers primarily establish the organization, mood and tone of the site relative to its content, with input from various parties.

Which choice lists the systems for which the Windows Media Player is available?

Windows and Macintosh systems

Which of the following can be considered an advantage of Web-based e-mail?

You can log on and check your e-mail from any computer that has Internet access.

In project management, a resource is?

a person, department or device needed to accomplish a unit of work

What is restricted from downloading to the user's system when you configure browser security levels?

active content

In order to send an e-mail message, you must include

an address in the To field.

In contrast to meetings that take place in person, a Webcast offers the advantage of?

being available for retransmission any time after the original event has taken place.

Unexpected Web pages and advertisements most commonly occur when you

click a link for a site that was added to a search engine's database by its spider program.

what is relational database

databases that carry their data in the form of tables and that represent relationships using foreign keys

Pretty Good Privacy (PGP) and Gnu Privacy Guard (GPG) are both used to encrypt?

e-mail messages and their attachments

what are relative URLs

gives a path to a resource using the current page as an origin. In a relative URL, the system root is implied but not specified.

whoa are Database security engineer

individuals tasked with ensuring that databases are being accessed only by properly authenticated users. Also includes those who understand how to recover data in case of a man-made or natural disaster

You can improve the quality of a product by

providing independent verification that project tasks were completed correctly and adhering to ISO 9000 standards.

In order to manage scope creep, you can use scheduled meetings to

review and discuss proposed changes to the project scope.

Which of the following is a unit of work that must be accomplished during the course of a project?

task

Moore's Law postulates that

the number of transistors per square inch on integrated circuits will double every two years.

What are website architects responsible

the overview plan of a Web site's development. They consult with management and Web site users to design and implement the plan for developing and maintaining an organization's Web site. They often manage Web site designers and Web application developers to design, develop, document and maintain an organization's Web presence

What is cloud computing?

the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer.

What part of an e-mail address appears before the @ symbol?

the user name

What do <meta> tag identifie?

they identifies data in the following format

Using the plus sign (+) before each keyword ensure what?

to ensure that the keyword it is included in the results.

Cloud computing is a computing paradigm in which?

users are able to access software and services run by servers that reside on the Internet.

Which of the following search engines was originally intended to be an index providing several links relating to topics on the Internet that were of interest to the two founders?

yahoo!


Conjuntos de estudio relacionados

Chapter 8 - International Strategy

View Set

Real Estate Principles Edition 10, Chapter 4

View Set

Anatomical Positioning of the Human Body

View Set

Section 8, Unit 1: Seller Agency in Illinois

View Set

Business principles Module 1&2 test

View Set

Geometry Quizzes and Practice Test

View Set

Figurative Language (Click 'Learn' MC)

View Set

IEC Electrical Apprenticeship Year 1, Quiz 1, Semester 2, Chapter 119

View Set