IBA Certification Lesson 1-10
Which type of online resource accepts input only from scholars and recognized authorities?
Authoritative peer-reviewed
What will Internet search results contain when you use the OR Boolean operator in a two-keyword search string?
One keyword or the other or both
Which type of URL would you use when coding a Website in HTML?
Relative URL
What is encryption?
The process of converting data into an unreadable form of text
What is the name of the tool that can help create documents and databases, based on styles or templates?
Wizard
Question 11 : E-mail message headers consist of:
the To, Cc, Bcc, Subject and Attachment components.
What is a cookie?
A small text file that contains information sent between a server and a client to help track user activities
Which of the following devices can you use with personal information management (PIM) software to synchronize appointments and contact information that you keep on your desktop or laptop computer?
A smartphone
What is spyware?
A software application that is secretly placed on a user's system to gather information and relay it to outside parties
Which of the following services are you using when a third party is hosting your Web site but your company has its own Web address with its own domain name?
A virtual domain
What is the Internet?
A worldwide network of interconnected networks
In which of the following components should you store names and information for your frequently accessed e-mail contacts?
Address book
What is the name of the programming methodology for the Web that enables Web applications to interact with users in much the same way they do with desktop applications?
Ajax
What is lossless compression?
All the original data can be recovered when the file is decompressed
Having appropriate access to hardware and software, and getting the security access required to perform tasks can be considered which of the following?
An IT right
Receiving clear, detailed objectives and instructions so that you can provide the appropriate services and products can be considered which of the following?
An IT right
What is a viewer?
An application used to retrieve a file when the program needed to open the file type is not installed on your computer
Question 20 : In which encryption method are the public and private keys mathematically related so that only the public key can be used to encrypt messages, and only the corresponding private key can be used to decrypt them?
Asymmetric encryption
What symbol does an e-mail address use to separate the user name from the domain?
At ( @ )
If your organization scans e-mail attachments to ensure that they contain no malicious code, where does the scanning take place?
At the e-mail server
What is the term for a file that is sent with an e-mail message?
Attachment
What kind of file formats are .au, .mp3, .aiff and .wav?
Audio
Which browser element is an application that adds extra capabilities to your Web browser?
Extension
What are add-ons?
Extensions and plug-ins used to extend the functionality of the Firefox Web browser
What is a security risk that comes with downloading extensions?
Extensions can disguise themselves as legitimate programs while actually acting as malware.
What is the term for the complete domain name of an Internet computer?
Fully qualified domain name
Which of the following is an open-source implementation of Pretty Good Privacy (PGP) that does not use patented algorithms?
GNU Privacy Guard (GPG)
Which of the following enables users on different e-mail systems to exchange messages?
Gateways
What is the term for the integration of telephony and data technologies?
Convergence
What is the open-source software development term for the practice of removing restrictions from the distribution and use of software?
Copyleft
Which of the following is a common advantage of cloud computing?
Cost reduction
Which of the following statements is true about Digital Subscriber Line (DSL)?
DSL is similar to Integrated Services Digital Network (ISDN) lines, but DSL is much faster.
Which of the following should IT professionals use to store, access and manipulate corporate database information?
Database management system (DBMS)
Which of the following takes place when IT projects are managed properly?
Employee productivity is maximized
What is the term for an internal network designed to provide access to selected external users?
Extranet
Which of the following statements about File Transfer Protocol (FTP) is true?
FTP is a good alternative to sending an e-mail attachment.
Question 10 : Which of the following retains all the formatting characteristics of a word-processing document, but may render inconsistently in different browsers?
HTML résumés
Why is having local access to e-mail messages important for those who use IMAP servers?
If a network problem occurs, IMAP server users may not have access to their messages.
Which of the following protocols is used to transfer Web pages from a Web server to a Web client?
Hypertext Transfer Protocol (HTTP)
Question 16 : What is the term for an SMTP server that allows the third-party relay of e-mail messages that spammers use to send spam?
Open relay
What is the term for a copyleft license that removes restrictions on the use and distribution of the licensed product?
Open-source license
Which of the following is a mass-marketing Internet technology that allows you to specify whether you want to be added to an e-mail list server?
Opt-in e-mail marketing
Which of the following is a Short Message Service (SMS) that companies can use to send you promotional messages?
Opt-in mass texting
Which of the following graphics file formats is written in a page description language that is unreadable, and can be printed only on a specific type of printer?
PS
Question 6 : What is the term for the idea of a major change in a former way of thinking or organizing?
Paradigm shift
Which of the following protocols provides authentication and encryption, and is used by most servers for secure exchanges over the Internet?
Secure Sockets Layer (SSL) protocol
During which project management phase should product testing and performance evaluations occur?
The closing phase
During which project management phase should you determine the aspects of the project that worked well and the changes that should be implemented in the future?
The closing phase
Which of the following results from extracting a compressed file from an archive file created by the compression utility?
The compressed file and a folder containing the extracted files
During which project management phase should you troubleshoot problems and take corrective measures to ensure that all objectives are being met?
The controlling phase
What is an extension?
The evolution of plug-in technology designed to supplement and improve your Web experience.
What is a Website's home page?
The first Webpage that displays when you access a domain
What is the term for mathematical statements that describe a series of points to be connected to create an image?
Vector graphics
Which of the following produces graphics image files that are small, download quickly, and are easily resized without affecting image quality?
Vector graphics
What is the term for the concept referring to the changing trends in the use of WWW technology and Web design that have led to the development of information-sharing and collaboration capabilities?
Web 2.0
Which of the following accurately describes at least one difference between Web 1.0 and Web 2.0?
Web 2.0 largely relies on the use of crowdsourcing, whereas Web 1.0 does not.
Question 22 : What is the term for an individual who develops primarily server-side Web applications?
Web application developer
What is the term for a software application that enables users to access and view Web pages on the Internet?
Web browser
What is the term for an HTML document containing one or more elements, such as text, images and hyperlinks, that can be linked to or from other HTML pages
Web page
What is the term for an HTML document containing one or more elements, such as text, images and hyperlinks, that can be linked to or from other HTML pages?
Web page
What is the term for a collection of related HTML documents located on a host computer on the Internet?
Web site
Question 19 : What is the term for an individual who evaluates Web site statistics to determine the site's effectiveness?
Web site analyst
Question 1 : Which IT job role would most likely direct the activities of the Web development team in a large organization?
Web site manager
An information portal is a search engine that will only find:
Web sites that have been registered with search engines.
What is the term for an audio and/or video Web event that is distributed over the Internet?
Webcast
In which instance would using an advanced Web search technique be most appropriate?
When conducting an Internet search for a complex subject, or to narrow the results of a standard search
Which of the following would be considered a Web 2.0 technology?
Wiki
Which of the following open information sources are students sometimes told to avoid retrieving information from because it is considered non-authoritative or unverified?
Wikipedia
If your organization's server is running Microsoft Internet Information Services (IIS), which browser choices should your IT department consider implementing?
Windows Internet Explorer
Which of the following should you use to accept real-time assistance from a remote help desk technician?
Windows Remote Assistance
What occurs in Windows when you try to open a file with an unknown MIME type?
Windows prompts you to define a MIME type and associate it with an application.
Question 24 : Which of the following has published more than 110 Web standards, and encourages manufacturers to follow these standards, many of which define levels of conformance?
World Wide Web Consortium (W3C)
What is the term for an application programming interface (API) that is used to transfer XML and other text data between a Web server and browser?
XMLHttpRequest
Viruses that reside within the text of an HTML-formatted e-mail message are particularly virulent because:
the user need only receive the virus for it to cause damage.
Question 26 : You should obtain an IT technical or professional certification:
to demonstrate a level of competence or expertise in a specific IT field.
The connectivity that makes the Internet possible also makes systems vulnerable to:
unwanted activity
You have been asked to defragment the hard drives of several corporate systems without leaving your desk. All of the systems are running Windows 7. To complete this task, you should:
use Remote Desktop Connection.
What is an illicit server?
An application that installs hidden services on systems
Which term describes the appointment of a specific resource to a specific task?
Assignment
What part of an e-mail address appears after the @ symbol?
Domain name
For what purpose would you use a cable modem?
To connect to the Internet through your cable television system
Which audio file format is the native sound format for Windows?
Waveform (WAV)
Each segment of a dotted quad consists of a number between
0 and 255
What is the term for a device that converts digital data from a computer into analog signals and back again?
Modem
You should create a relational database in order to:
eliminate data duplication.
Malware is a generic term for software:
whose specific intent is to harm computer systems.
The 802.11 standard, which was developed by the Institute of Electrical and Electronics Engineers (IEEE), refers to a family of specifications for:
wireless network technology
What is the file type that Google Chrome extensions use?
.crx
Which video file format is the Macintosh native movie platform?
.mov
Which video file format is a royalty-free, open video and audio format that is supported by Google?
.webm
How many bits does the Internet Protocol version 6 (IPv6) address format use?
128
To comply with many Web site requirements for added security, nearly all browsers support a minimum of:
128-bit encryption
What is an end-user license agreement (EULA)?
A legal contract between the author of software and the end user that defines how the software can be used
Which device connects a wireless local area network to a wireless phone network at broadband speeds?
4G mobile hotspot
To which type of server are you usually transferred when you download software programs and documents from Web sites?
A File Transfer Protocol (FTP) server
What is http://www.ucorp.biz an example of?
A Uniform Resource Locator (URL)
Question 28 : What is an update?
A file or collection of software tools that resolves system liabilities and improves software performance
What is a local area network (LAN)?
A group of computers connected within a confined geographic area
In computer terminology, what is a network?
A group of two or more computers connected so they can communicate, share resources and exchange information with one another
What is a listserve group?
A group of users that subscribes to a mailing list
What is a project milestone?
A major event during the course of a project
What is a peer-to-peer network?
A network in which each computer has both server and client capabilities
What is a hash?
A number generated by an algorithm from a string of text
What is a wiki?
A page or collection of Web pages that can be viewed and modified by anybody with a Web browser and Internet access
What is P2P?
A peer-to-peer network on the Internet
What is folksonomy?
A programming methodology for the Web that enables Web applications to interact with users in much the same way they do with desktop applications
In databases, what is a one-to-many relationship?
A relationship in which a record in Table A can have multiple matching records in Table B, but a record in Table B has only one matching record in Table A
What is a firewall?
A security barrier that prevents unauthorized access to or from private networks
What is a worm?
A self-replicating program or algorithm that consumes system resources
What is a project?
A sequence of tasks that must be accomplished within a defined time frame to achieve a desired result
What is a software patent?
A set of exclusive rights granted to an inventor for a fixed period of time upon disclosure of the invention
What is the World Wide Web?
A set of software programs that enables users to access resources on the Internet via hypertext documents
Which of the following services allows multiple companies, organizations or people to share portions of the same domain name?
A shared domain
What is an anonymous FTP site?
A site that allows guests to download files without having an account on that site
Question 19 : What is symmetric encryption?
An encryption method in which the same key is used to encrypt and decrypt a message
What happens when you click a hypertext link?
Another location in the same Web page or another Web page appears
How do most current e-mail clients display an attachment in an e-mail message?
As a separate link, such as an icon
An IT professional can evaluate a browsing session to identify:
the processes, technology and potential risks.
Why would some corporate IT departments disable JavaScript and ActiveX on browsers used within the company?
Because JavaScript and ActiveX controls allow information to be downloaded and run on your system
Why should you avoid transmitting sensitive information in an instant messaging session?
Because instant messaging is not a secure method of communication
Why do companies that conduct business internationally need to be aware of the encryption laws in various countries?
Because some countries do not allow large encryption keys to be exported
Question 42 : Why are firewalls considered the first line of defense against LAN security breaches?
Because they provide data confidentiality
Which aspect of program management typically includes maximizing revenue, maximizing efficiency, minimizing cost and eliminating waste?
Benefits management
Which of the following do end users most commonly download from FTP sites?
Binary files
Which of the following search engines uses your social network (Facebook and Twitter) to find more relevant information for your query?
Bing
Which of the following are typically an example of secondary resources?
Biographies
Question 10 : Which of the following can administrators use to filter out the IP addresses of known spammers?
Blackhole list
What is one reason blogging has become so popular and prevalent?
Blogs have become a form of intellectual stimulation as well as entertainment.
To make Web browsing easier, you can save URLs and hyperlinks that access particular Websites to avoid the need to manually type URLs each time you want to access the sites. What is the term for these saved links in Google Chrome?
Bookmarks
What will Internet search results contain when you use the AND Boolean operator in a two-keyword search string?
Both keywords
How are wide area networks (WANs) created?
By connecting LANs to one another via public carriers
How can database information be provided to users via the Web?
By connecting a Web server to a database server
How is a many-to-many relationship between two database tables established?
By creating two one-to-many relationships with a junction table
How is a table relationship established?
By matching data in key fields between two database tables
How does the separation of duties help to ensure the quality of a product?
By providing independent verification that project tasks were completed correctly
What is the best way to find the exact information you need from the vast amount of data on the Internet?
By using Web search engines and search techniques
In the client/server model:
the server is responsible for storing and providing information
The project triangle consists of:
the time, money and scope that affect every project
Which language is considered the best language for creating large applications?
C++
Which of the following can be used to detect automated systems used by spammers for registering e-mail accounts?
CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)
Question 23 : In the business ontology model, the highest-ranking corporate officer in charge of the total management of an organization is the:
Chief Executive Officer (CEO)
Question 9 : What is the term for software services that are provided over the Internet, rather than at a company site?
Cloud computing
What is the term for an algorithm used by HTML5 to compress and decompress files?
Codec
What term describes the ability of a group to exhibit a greater degree of intelligence by solving problems collaboratively instead of relying on the intelligence of an individual member?
Collective intelligence
Which of the following is used to process data submitted by a user by passing data back and forth between a server and an application program?
Common Gateway Interface (CGI)
If your company network uses a proxy server, what must you do to be able to access the Internet?
Configure your browser to address the proxy server.
What is the name of the problem-solving model in which a task ordinarily performed by one person is outsourced to a large group or community in order to obtain and analyze large amounts of data?
Crowdsourcing
What are E carriers?
Dedicated digital telephone lines used in Europe
What are T carriers?
Dedicated digital telephone lines used in North America
Which server type provides text output that users can access at their convenience and also allows multi-person input?
News server
What is the term for a password-protected, encrypted data file that can be used to authenticate a program?
Digital certificate
Which of the following provides positive identification of the sending and receiving parties to ensure that programs downloaded from the Internet are original and safe?
Digital certificate
What are fractional T and E lines?
Digital phone lines consisting of one or more individual T or E carrier channels, rather than the entire T or E carrier line
Question 14 : What is the term for an electronic stamp that identifies a message's source and contents?
Digital signature
In which type of Web search does the search engine display a list of categories and subcategories that you can browse?
Directory search
Which of the following is an appropriate use of e-mail in a business environment?
Discussing the status of a project with co-workers
What kind of file formats are .txt, .pdf and .rtf?
Document
Which of the following is used solely to resolve human-readable domain names into their computer-readable IP addresses?
Domain name servers
Why might a Web page appear differently in different browsers?
Each browser interprets HTML somewhat differently
Which of the following is considered a disadvantage of an organization's practice of monitoring their employees' e-mail messages and restricting their access to certain Web sites?
Employees may be denied access to legitimate Internet resources that may help them do their jobs.
What is ciphertext?
Encrypted data
In addition to allowing keyword searches, which of the following search engines also allows conceptual searches?
Excite
To make Web browsing easier, you can save URLs and hyperlinks that access particular Websites to avoid the need to manually type URLs each time you want to access the sites. What is the term for these saved links in Microsoft Edge?
Favorites
Which of the following connection types provides the fastest direct connection speed?
Fiber-optic cable
Internet resources can be used for a variety of purposes beyond the World Wide Web and e-mail. Which of the following can you use transmit larger files?
File Transfer Protocol (FTP)
Which of the following protocols is used to transfer files between two computers on the Internet?
File Transfer Protocol (FTP)
What is the term for a field in a related database table that refers to the primary key in the primary table?
Foreign key
Which of the following e-mail response options should you use to send an e-mail message to users who did not receive the original
Forward
What kind of file formats are .gif, .jpg, .png and .tif?
Graphics
Question 3 : Which of the following should you use to encrypt and decrypt digital signatures, and to protect passwords from disclosure?
Hash encryption
Which of the following describes an appropriate use of Virtual Network Computing (VNC)?
Help desk personnel might use VNC to troubleshoot computer problems for remote employees.
Which of the following is an accurate description of cloud computing?
Hosted applications and services offered by a third party and run almost entirely from one or more servers that reside on the Internet
Question 8 : Which of the following activities would most likely be conducted by a server administrator?
Implement policies and procedures for ensuring the security and integrity of servers and the network
You are troubleshooting a common Internet client problem. You increase the size of the browser cache and change the frequency with which the browser compares cached pages to those on the Web. What are you trying to do?
Improve the performance of a computer with a slow connection
Which of the following is a weakness of Python?
It is traditionally slower than other languages.
How can scope creep undermine the success of a project?
Incremental changes in scope will affect the schedule, cost or performance required to complete the project
Which organization is responsible for codifying copyright law as it applies to digital information?
Information Infrastructure Task Force (IITF)
Question 15 : What is the term that refers to the management and processing of information using computers and computer networks?
Information Technology (IT)
Which of the following wireless mode types uses a centralized access point known as a wireless access point (AP)?
Infrastructure
Which of the following is true about client-side JavaScript?
It needs HTML to run.
What function does a proxy server perform?
It replaces the network IP address with another, contingent address to hide the actual IP address from the rest of the Internet, thereby protecting the entire network.
Question 13 : Which of the following activities would most likely be conducted by a PC repair technician?
Install, modify and repair personal computer hardware components and install software
What is the term for a computer-based method of communication in which users can type and view messages sent to one or more recipients, and view the responses immediately?
Instant messaging (IM)
Question 8 : Which term collectively refers to industrial property and copyrighted works?
Intellectual property
What function does the Domain Name System (DNS) perform?
It resolves IP addresses into easily recognizable text-based names.
Question 18 : What is the name of the international community of network designers, operators, vendors and researchers concerned with the evolution of the Internet architecture and the smooth operation of the Internet?
Internet Engineering Task Force (IETF)
Which of the following protocols enables you to browse and manage e-mail messages while they reside on the server?
Internet Message Access Protocol (IMAP)
What is the term for an organization that maintains a gateway to the Internet and rents access to customers on a per-use or subscription basis?
Internet Service Provider (ISP)
What is the term for a Web site and network used only by employees within a company?
Intranet
What function does a list server perform?
It automates the collection and distribution of messages from an authorized group of participants.
Which of the following can be considered an advantage of P2P in the business environment?
It eliminates the cost and maintenance associated with file sharing through a centralized server.
In the client/server environment, what is the main function of client software?
It enables users to communicate with and request information from the server
Which of the following languages is an object-oriented programming language developed by Sun Microsystems that is often used when data needs to be shared across a network?
JAVA
Which of the following graphics file formats is widely used for complex graphics because it uses lossy compression and supports 16 million colors?
JPEG
Which of the following is considered an event-driven scripting language?
JavaScript
What is the term for a numeric code that uses an algorithm to encrypt and decrypt data?
Key
Which of the following would a search engine use to reference a Web site?
Keyword
What can be considered a disadvantage of using a spyware-detection application to remove spyware from your computer?
Legitimate applications can be incorrectly identified as spyware.
Which of the following popular social networking sites is most often used as a business tool?
Question 21 : Which of the following data modeling steps involves encoding the concept into SQL programming?
Logical design
Which of the following is a text-only browser that runs on most operating systems?
Lynx
What is the term for an e-mail server program that receives sent messages and delivers them to their proper destination?
Mail Delivery Agent (MDA)
Question 5 : Which of the following activities would most likely be conducted by a database administrator?
Manage backup and recovery procedures to prevent the loss of data
Question 14 : What is the term for an individual who develops Web sites and/or applications for devices such as smartphones and tablets?
Mobile application developer
What is the term that refers to a person's ability to use technology while "on the go"?
Mobile computing
Which of the following is open-source software?
Mozilla Firefox
What is the term for individual computers and devices that are connected to a network?
Nodes
When specifying keywords to conduct an Internet search, which of the following parts of speech will be the most useful?
Nouns
What is the term for an element on a Webpage that contains data and procedures for how that item will react when activated?
Object
What is the term for the programming concept in which a program is handled as a collection of individual items that perform separate functions, rather than as a sequence of statements that performs a specific task?
Object-oriented programming
Which type of database table relationship is the most common?
One-to-many relationship
Which of the following enables an operating system to access databases from various vendors?
Open Database Connectivity (ODBC)
Which of the following statements is true of software patents?
Patents do not apply worldwide.
What is the term for a small browser window that appears behind the browser window you are viewing?
Pop-under window
Which of the following are typically an example of primary resources?
Physical objects and relics
Which of the following protocols can connect an entire network to the Internet?
Point-to-Point Protocol over Ethernet (PPPoE)
Which of the following is known as a "store-and-forward" e-mail service?
Post Office Protocol version 3 (POP3)
What is the term for a field containing a value that uniquely identifies each record in a database table?
Primary key
Which of the following enabled private (i.e., commercial) business to be conducted over networks connected to NSFnet?
Private telecommunications companies
Which of the following is a document that lists the planned dates for performing tasks and meeting goals defined in a project plan?
Project schedule
How do projects differ from ongoing work operations?
Projects are temporary and unique
Question 44 : To what does "The Right to Be Forgotten" argument relate?
Protecting your image and personal information in the world of social networking
Which of the following products can be used to expand a two-dimensional photograph into a three-dimensional environment?
QuickTime Virtual Reality (QTVR)
What is the legacy plug-in created by Apple Computer for running video files and audio files?
Quicktime
What is the term for pixel-based images that map bits to a display space?
Raster graphics
Which of the following protocols support the encryption and decryption of e-mail messages?
Secure Multipurpose Internet Mail Extensions (S/MIME) and Pretty Good Privacy (PGP)
What is the term for a collection of information consisting of one or more related fields about a specific entity, such as a person, product or event?
Record
What is the term for a database that contains multiple tables of information that can be joined through common fields?
Relational database
Which browser element is responsible for reading the Webpage and presenting it to an end user?
Rendering engine
Which of the following e-mail response options should you use to respond only to the original sender of an e-mail message?
Reply
Question 4 : What is the term for public documents of interest to the Internet community that include detailed information about standardized Internet protocols?
Requests for Comments (RFCs)
Question 37 : What is currently the most common way to authenticate users on private and public computer networks?
Requiring user names and passwords
What is the term for a server at the highest level of the Domain Name System (DNS)?
Root-level server
What is the term for a device that determines the best path for data to take across a network?
Router
Question 27 : What is the term for an individual who performs keyword research to determine the visibility of Web sites across multiple clients and search engines?
SEO analyst
The protocol required for text messaging is:
SMS.
Which of the following is a secure method of transferring files through Secure Shell (SSH) in which you can transfer several files in one session?
SSH File Transfer Protocol (S/FTP)
Which browser element is a programming method that isolates a particular application or process, and helps the browser keep information from being exposed or misused?
Sandbox
Question 2 : What is the term in ontology that refers to the hierarchical description and vocabulary concerning a particular domain?
Schema
What is the term for the goals and tasks of a project, and the work required to complete them?
Scope
Which of the following is a secure method of transferring files through Secure Shell (SSH) in which each file transfer is a discrete session?
Secure Copy (SCP)
Question 20 : What is the term for an individual who is responsible for examining an organization's security requirements and determining the necessary infrastructure?
Security analyst/consultant
Which of the following is the most effective way to spread viruses?
Sending e-mail attachments
Which of the following client-side actions can you take to reduce the amount of spam you receive?
Set up a spam filter in your e-mail client to filter out spam messages.
Question 17 : Which of the following activities would most likely be conducted by a network engineer?
Set up and maintain a network infrastructure
Which of the following plug-ins was developed by Microsoft and is a software development tool used to write and run Internet applications?
Silverlight
Which of the following server types is responsible solely for sending e-mail messages?
Simple Mail Transfer Protocol (SMTP) server
What methodology was originally developed to improve manufacturing processes in order to eliminate product defects?
Six Sigma
What is spim?
Spam that is delivered through instant messaging
: The commonplace use of e-mail has given rise to the term "snail mail," which is a slang term for what?
Standard postal service
What happens when your browser cache becomes full?
The browser automatically deletes old cached files as you continue to browse the Web.
Which language should you use to create and maintain large relational databases?
Structured Query Language (SQL)
Internet resources can be used for a variety of purposes beyond the World Wide Web and e-mail. Which of the following helps IT professionals troubleshoot and solve problems with Internet technologies?
TCP/IP diagnostic tools
Which of the following enables you to view previously accessed Webpages without having to request them from the server again?
The browser cache
As project manager, what should you do if conflicts of interest develop among various departments represented in your project to the point where the investment required to implement necessary project plan modifications is not justified?
Terminate the project
What does a URL that starts with https:// signify?
That you are visiting a secure Web site in which data transmissions are encrypted
In 1969, which U.S. Department of Defense agency funded what would become the first global computer network?
The Advanced Research Projects Agency (ARPA)
Which folder allows easy access to previously viewed Webpages by storing the URLs of sites you have accessed within a defined period of time?
The History folder
When you receive an e-mail transmission with an attachment, how does your browser know which application or plug-in to open to view or play the attachment?
The MIME definition for the application or plug-in that is located inside the HTTP header at the beginning of the transmission.
Which of the following Web sites performs market research and analyzes current trends in Internet business?
The Netcraft site
Question 11 : Which of the following will upper-level managers likely ask you to justify before making a hardware or software purchase, or creating a particular IT product or service?
The Return On Investment (ROI)
When you enter a URL such as www.ucorp.biz in your browser, what is implied because you are visiting the top level of the site?
The Website's home page
What is social networking?
The grouping of individuals with common interests or goals into specific groups or communities
During which project management phase should you conduct a needs analysis; determine project objectives, assumptions and constraints; and develop a Statement Of Work (SOW)?
The initiating phase
In a URL, what does the Internet resource component identify?
The name of the server on which the page resides
To what does the term "cloud" in "cloud computing" refer?
The network of servers and connections that make up the Internet
Question 3 : What is the main reason that IT managers believe the future IT career model will be diamond-shaped, with few entry-level IT jobs available?
The offshore outsourcing of many entry-level IT positions
Which of the following should you use when you want to test connectivity between your computer and a destination computer?
The ping command
What is program management?
The process of managing multiple interdependent projects to improve the performance of an organization
What is authentication?
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data
What is Internet Protocol (IP)?
The protocol by which data is sent from one computer to another on the Internet
Which of the following is affected by any changes you make to the three "project triangle" factors in an effort to optimize a project's schedule?
The quality of the project deliverable
What is a top-level domain in the Domain Name System (DNS)?
The right-side component of a domain name, which categorizes domains into groups by common type or geography
What must an e-mail message recipient possess in order to view a file attachment?
The software necessary to open or edit the attached file
What must you know before you can create an effective project schedule?
The tasks necessary to achieve project objectives, the approximate length of time each task will take, the order in which tasks should be performed and the employees who will perform them
Which of the following should you use when you need to locate failures along the path between your computer and a destination computer?
The tracert command
In a URL, what does the protocol component identify?
The type of server and Internet service being used
What is a podcast?
The use of audio or video digital-media files that are distributed through Web feeds to subscribers
Which of the following can be considered a drawback of SMTP authentication?
There is a greater chance that a hacker can use a packet sniffer to obtain a valid user name and password.
What is the purpose of using Internet research tools such as Zotero?
They enable you to organize the information you find and store it on your local hard drive.
Which of the following is usually true of popular social networking sites?
They generally provide privacy protection for users.
Question 27 : What can be considered a disadvantage to installing program patches and updates?
They may introduce incompatibility issues or new security issues.
What is the primary function of a network server?
To act as a central repository of programs and data to which all users connected to the network have access
For what purpose should you use automatic cookie handling in most browsers?
To control when and from whom cookies are accepted
Why should you use out-of-office messages when you will be out of the office for an extended period of time?
To explain why you may not respond to e-mail messages within a reasonably short period of time
What is the purpose of a needs analysis?
To identify the problems or requirements that the project must resolve or address
Why would you use quotation marks in a search string when conducting an Internet search?
To narrow your search to yield Web pages that contain only the keywords as they appear together in the specified order
What is the primary function of a Web browser?
To retrieve pages from a Web server and display them on your screen
For what would you use a personal information management (PIM) program?
To schedule appointments and meetings, store contact information, and manage tasks
Why are audio and video files compressed before they are transferred across the Internet?
To shorten the amount of time required to download them
What is the main purpose of a file server?
To store shared data
What is the primary goal of a extension?
To supplement multimedia content in Websites
What is the name for the method by which a blogger receives notification when other bloggers link to his or her blog entry?
Trackback
What is the term for a word, slogan, symbol, name, package design or device that distinguishes a product from other products?
Trademark
What enables dissimilar systems connected to the Internet to communicate with one another?
Transmission Control Protocol/Internet Protocol (TCP/IP)
Which of the following is responsible for ensuring that data packets are transferred quickly and reliably across a network?
Transmission Control Protocol/Internet Protocol (TCP/IP)
A LAN can be connected to the Internet by a router, provided that the LAN uses:
Transmission Control Protocol/Internet Protocol (TCP/IP).
What is a wide area network (WAN)?
Two or more local area networks (LANs) that span a wide geographic area
What is the standard Internet convention used to represent a hypertext link in words in a document?
Underlined text
What is the term for the business trend that seeks to simplify and integrate all forms of communication?
Unified communications (UC)
Question 7 : If you copy a file from a CD that is infected with a virus, what is the most effective way to prevent the virus from infecting your system?
Use anti-virus software to disinfect your hard drive and remove the virus from your system
When using multiple Boolean operators to conduct an Internet search, how can you indicate the order in which the Boolean phrases should be considered?
Use parentheses to combine Boolean phrases.
Which of the following can be considered an advantage of connecting LAN computers to the Internet through a firewall?
Users on the LAN can request information from the Internet, but outside users are denied access to the LAN.
What kind of file formats are .avi, .mp4, .ogg, .webm and .mov?
Video
Internet resources can be used for a variety of purposes beyond the World Wide Web and e-mail. Which of the following enables IT professionals to access and fix computers in remote locations?
Virtual Network Computing (VNC)
What is the term for voice information delivered in digital form as packets of data using Internet Protocol (IP) instead of the traditional circuit-switched lines of the public switched telephone network (PSTN)?
Voice over IP (VoIP)
Semantic Web implementations are Web applications that:
have the ability to contextualize data as they process it.
You can use screen savers to:
hide your work while you are away from your desk, providing a measure of security.
An absolute Uniform Resource Locator (URL) is a URL that:
includes the full path from the system root to a specific page or resource.
Presence information:
indicates a person's willingness and ability to participate in communication.
You should schedule meetings with project stakeholders and management during the executing and controlling phases of a project to:
inform them of progress and to handle issues they raise that may affect project scope
Companies use call centers to:
interact with their customers.
When you are troubleshooting a network problem and you need to determine the details of your computer's network connection, you should use the:
ipconfig command.
The FTP navigational structure:
is similar to the hierarchical directory structure of a hard drive.
If your browser cache size is too small:
it may take longer for pages to download from the server.
A greenfield is a software development project that:
lacks any constraints imposed by prior development.
One of a project manager's skills is teaching effectively, which can be considered primarily a type of:
leadership skill
A Web page that integrates content and scripts from multiple Web sites to create new applications is known as a:
mashup.
A drawback of Webinars is that they:
may require multiple presentations if participants are located in different time zones
When you use an e-mail client to send and receive mail:
messages stored in your Outbox are sent, a copy of each sent message is stored in the Sent Items folder, and incoming messages are routed to your Inbox.
Which of the following top-level domains would generally refer to an Internet Service Provider (ISP)?
net
By default, e-mail clients typically save a copy of every message you send in:
the Sent or Sent Items folder.
Typosquatting is the unethical practice of:
registering domain names very similar to those of high-volume sites in hopes of receiving traffic from users seeking the high-volume site who mistakenly enter an incorrect URL in their browsers.
A major update with significant software improvements is often marketed as a new:
release.
In order to manage scope creep, you can use scheduled meetings to:
review and discuss proposed changes to the project scope
The catalog that is queried when you conduct a Web search using a search engine is called a:
search index.
: Question 34 : Because spam is sent to you uninvited, it can be considered:
an invasion of privacy.
The ability to help project participants coordinate and prioritize their tasks to stay within the project scope can be considered:
an organizational skill
Google Chrome has an anonymous browsing feature. This feature allows users to use the browser:
and leave no cached information.
Question 12 : Portable Document Format (PDF) résumés:
are compatible with all computer platforms.
You can use project management software to:
automatically calculate the length of time required to complete project tasks, as well as the availability of resources, as you establish relationships among the tasks
Using all capital letters in an e-mail message connotes:
shouting or anger.
Error pages most commonly occur when you:
click a dead link.
Unexpected Web pages and advertisements most commonly occur when you:
click a link for a site that was added to a search engine's database by its spider program.
You would use a File Transfer Protocol (FTP) server to:
download popular shareware and open-source freeware.
When you use command-line FTP on Windows systems:
files are downloaded into the directory from which you enter the FTP commands.
A list server can be used to:
forward e-mails, announcements, newsletters or advertising to group members on a regular basis.
The term "netiquette" refers to:
general rules for Internet politeness.
Question 16 : Moore's Law postulates that:
the number of transistors per square inch on integrated circuits will double every two years.
In Microsoft Edge, Google Chrome and Firefox, how do you work in multiple browser windows simultaneously?
You can launch the browser once and open new tabs for multiple windows.
Which of the following can be considered an advantage of Web-based e-mail?
You can log on and check your e-mail from any computer that has Internet access.
Which of the following is a disadvantage of using Web-based e-mail?
Your user name and password reside on a third-party server.
An electronic journal or personal diary posted to a public Web site can be considered:
a blog.
Asking other users to divulge personal information during any Internet-based communication can be considered:
a breach of Internet ethics.
Typing an e-mail message or instant message using all capital letters can be considered:
a breach of netiquette.
The ability to gather information from customers at the beginning of a project, and keep project participants informed of the project's status can be considered:
a communication skill
A wireless access point (AP) is:
a device that enables wireless systems to communicate with each other, provided that they are on the same network.
Sending jokes via e-mail or sending instant messages to someone who does not want to be contacted can be considered:
a form of harassment.
Question 31 : Receiving written permission from a copyright owner to use copyright-protected material for your own purposes can be considered:
a licensing agreement.
The ability to identify the tasks that constitute a project, understand the ways in which tasks are dependent upon one another, and know the ways that project dependencies will affect the project as a whole can be considered:
a planning skill
The most common business firewall technique is to use a firewall server in conjunction with:
a proxy server.
In an IP address such as 72.44.192.233, the last number in the address (on the far right) identifies:
a specific computer
A SWOT analysis is:
a strategic planning method that can be used to evaluate the strengths, weaknesses, opportunities and threats in relation to an organization
Question 7 : In ontology, an attribute refers to:
a unique characteristic pertaining to a class.
Virtual Network Computing (VNC) is a program that:
allows you to control a computer at a remote location as if you were sitting in front of it.
Question 15 : In order to send an e-mail message, you must include:
an address in the To field.
Web feeds can be read using software called:
an aggregator.
Copyright laws protect:
original works of authorship online as well as in print.
Uploading files to an FTP site requires an FTP client program and:
permission, which is usually provided by the FTP server administrator.
Question 25 : In data modeling, determining exactly where data will be stored is the essential part of the:
physical design step.
Direct Internet connections
provide continuous access to the Internet through permanent network connections
Direct Internet connections:
provide continuous access to the Internet through permanent network connections
You can improve the quality of a product by:
providing independent verification that project tasks were completed correctly and adhering to ISO 9000 standards