TEST 1
http://www.CIWcertified.com/Certifications/Foundations/iba.htm
...
http://www.CIWcertified.com/Courses/Web_Foundations/iba.htm
...
What is the term for the part of a browser responsible for reading a Web page and presenting it to an end user?
Rendering engine
Consider the following address:
...
Monty has been searching online for a rare wine vintage. He finally finds it on the Rare Vintage Web site, which he has recently heard about from friends. The site is well designed and offers some good deals on hard-to-find wines. As Monty navigates through the checkout process, he reaches the checkout page with the following URL, which asks him to enter his credit card and mailing information:
...
http://www.CIWcertified.com/courses/iba.htm
...
http://www.RareVintage.com/vprod/checkout.html/ref=chk_out_TLS128_1b?ie=UTF8&docId=107931
...
Which part of this address represents the domain name?
.CIWcertifed.com
What is the main difference between a PostScript (PS) file and an Encapsulated PostScript (EPS) file?
A PS file contains instructions that determine the display of the graphic, whereas an EPS file includes the bitmap information for the image as well.
Which of the following is generally an advantage of using a Webcast instead of an in-person meeting?
A Webcast is more cost-effective than an in-person meeting.
You want to learn more about CIW certifications and access a PDF document at http://www.ciwcertified.com/_resources/CIW_Roadmap.pdf. Which type of URL does this represent?
A deep URL
Which of the following would be considered an effective Internet communication when posting messages to a newsgroup?
A message that is pertinent, appropriate and brief
In reference to the elements of a Web browser, what is a sandbox?
A programming method that isolates a particular application or process
Which statement correctly compares computer viruses and worms?
A virus requires user action to replicate, but a worm can replicate by itself.
What distinguishes a worm from a virus?
A worm is capable of replicating itself automatically while affecting data.
Which audio file format is inherently supported by most browsers?
AU
Your mom sent you a message with a link to a college information page that you find very useful. You want to be able to find this same page in the future from your desktop computer, or from your mobile device when you are not at your desk. Which is the best way to do this?
Add the link to a cloud-based bookmark service such as Delicious or Google Bookmarks.
Which of the following behaviors is considered to have the most personal risk associated with it when using social media?
Agreeing to meet someone in person after getting acquainted on Facebook
Which statement best describes hash encryption?
An encryption method in which numbers generated by an algorithm from a text string are used to verify the integrity of transmitted messages
Which statement best describes symmetric-key encryption?
An encryption method in which the same key is used to encrypt and decrypt a message
While you are exploring a Web page in the Firefox browser, a file fails to properly display. You decide to install the required plug-in to view the file and are forced to quit Firefox, install the plug-in, then restart Firefox. What kind of installation is this?
An offline installation
Which of the following plug-ins can be used to show MOV files, which can combine video, animation, text and audio into one file?
Apple QuickTime
Which is the standard video file format for Microsoft Windows?
Audio Video Interleave (AVI)
Why is it important to have an adequate amount of disk cache space when downloading multimedia objects?
Because plug-ins can store a portion of the multimedia object data in the cache and begin streaming delivery as the file downloads
Monty cancels his online transaction instead of proceeding. Why?
Because the URL does not use SSL/TLS encryption and therefore any information Monty enters would not be secure
Why should you avoid typing e-mail messages in all capital letters?
Because using all capital letters connotes shouting or anger
Hypertext Transfer Protocol (HTTP) can be run over Secure Sockets Layer (SSL) to create the HTTPS protocol. How does HTTPS make HTTP transmission more secure?
By encrypting and decrypting information transmitted to and from Web servers
Nancy is using a Web browser on her desktop computer to place some bids on a popular online auction site. She decides that she wants to browse to the CIW site without closing her browser. What is the most efficient way to do this?
By typing the CIW site's URL (www.CIWcertified.com) in the address bar of her Web browser
Which of the following is an example of ethical Internet behavior?
Citing information you find on the Internet that you use in your own work
Samson needs to review several promotional product videos from his company's marketing department immediately, before a meeting to discuss revisions. Samson tries to view the videos on his computer using his Windows Media Player, but they will not play. The video files are in RealMedia format. What should Samson do in order to view these videos?
Convert the video files to the WMV format, because RealMedia files will not play in Windows Media Player.
Which term best describes this address type?
Deep URL
Which term is used to describe a password-protected, encrypted data file that verifies the identity of the sender of a message?
Digital certificate
What can you use to electronically verify your identity without the need to provide data confidentiality?
Digital signature
A digital signature verifies the identity of the sender and provides data integrity. Which of the following does it also do?
Enforces non-repudiation
Your company wants to simplify the customer support process for its distributors by enabling them to obtain company forms and reports online. You and your Web team are in charge of implementing this capability. Which Web-based system should you implement?
Extranet
You are using Firefox as your default browser and you want to customize it to better suit your browsing habits. What plug-ins and extensions specific to Firefox can you use to accomplish this?
Firefox add-ons
Sarah just made a purchase on an online shopping site (such as amazon.com) and completed the checkout process by paying with her credit card. Which protocol was most likely used for the transmission of her information?
HTTPS
The graphics you are probably most familiar with, GIFs and JPEGs, are raster graphics. What are raster graphics?
Images that map bits directly to a display space
You have just installed the Microsoft Windows 7 operating system on your PC. Which Web browser is bundled with Windows 7 and is installed automatically when you load the operating system?
Internet Explorer
What is the term for the part of a browser responsible for reading and processing programming languages?
Interpreter
Intranets and extranets can both be considered subsets of the Internet. Which statement best describes the difference between intranets and extranets?
Intranets are used within corporations by employees, whereas extranets are used by corporations for non-public customer support.
You work with UNIX workstations and want to install a Web browser specific to your environment. Which browser should you install?
Konqueror
Which file format designates an Apple QuickTime Movie file, which supports video, animation, text and audio?
MOV
You want to give your Web site users the ability to view high-quality video. Connection speed is not an issue. Which file format could you use?
MPEG
The Flash Player allows browsers to play Flash movies, which are animations created using vector graphics. What are vector graphics?
Mathematical shapes saved as a sequence of vector statements, which describe a series of points to be connected
Which statement is true regarding a virus attack on your system?
Most viruses can be halted after they commence an attack and can be removed without permanent damage to your system.
What is the main advantage of the Ogg Vorbis (OGG) audio file format?
OGG files are smaller, download faster, and sound as good as other audio file formats.
You want to look at multiple Web sites simultaneously and follow different paths of hyperlinks in each site. What is the easiest way to accomplish this in current Web browsers?
Open multiple windows in one browser and use tabbed browsing.
Which term best describes a file of programming code that provides a temporary fix to a known bug?
Patch
James has just finished designing a Web site to support a charity organization's fund-raising efforts. He needs to meet with the board members to get their feedback and address some questions before he implements the final design. The board members are dispersed throughout the country and want to avoid spending charity funds on traveling to this meeting. Which of the following solutions would best support the charity and provide James with an opportunity to discuss the design with the group?
Plan a Web conference using a service that supports screen-sharing and phone conferencing.
You want to be able to access active content directly from your browser. Which type of application provides the efficient integration of multimedia formats with a browser or computer that will enable you to do this?
Plug-in
Web conferences are a cost-effective alternative to live, in-person meetings. Which of the following is a feature of Web conferences?
Polling
Which file format retains formatting information through all platforms and can be created and read on any computer, regardless of the local operating system?
Portable Document Format (PDF)
A firewall can perform which task?
Prevent unauthorized access to proprietary data on an intranet
Which of the following is an effective way for Web site owners to prevent typosquatting?
Purchase domain names that are similar to their actual domain names
What is the main benefit of using Rich Text Format (RTF)?
RTF is compatible with many operating systems and applications, including most Macintosh and Windows word processors.
Which type of URL gives an abbreviated path to a resource using the current page as a starting position?
Relative URL
How can you view a Web page, including all related images, fonts and scripts referenced by the HTML on the page, without connecting to the Internet?
Save the Web page content to your hard disk.
Your company is making changes to a certain product. You need to discuss these changes with the company's sales managers, who are located in various international locations. Which of the following methods is the most efficient and economical solution for you to discuss the required information with all the sales managers synchronously?
Schedule a Webinar with the sales managers so that you can demonstrate the changes and answer any questions with the entire group.
Sensitive data (such as credit card information) should be secured using authentication and encryption when transmitting it over the Internet. Which protocol do most servers use to exchange sensitive data over the Internet?
Secure Sockets Layer (SSL)
You receive an unexpected e-mail with an attachment from a co-worker. You call the co-worker to ask if she sent you an e-mail message with an attachment. She recalls that she sent several e-mails with attachments earlier that day. Which of the following is your co-worker's best response to your question?
She should ask you to read her the e-mail message including the full name of the attachment and its extension.
Which popular plug-in is Microsoft's response to Adobe Flash?
Silverlight
SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are two common protocols used to secure Internet communication exchanges. Which of the following is true about SSL and TLS?
TLS is the successor to SSL and has become more common.
Stephen is creating video tutorials to sell his company's products. The target audience will consist of company employees using primarily new computers with the Windows operating systems and Internet Explorer 9. Stephen is debating whether to publish the videos using the MP4 or the OGG video format. Both formats are compatible with the HTML5 video element, which he is using in his tutorials. Which of the following would be a reason for Stephen to choose one format over the over?
The MP4 video format is natively supported by Internet Explorer 9 and does not require a plug-in.
Ken has been asked to test a newly developed Web site. Part of the test plan requires him to verify that all links within the site work properly. In addition to verifying that clicking a link navigates to the appropriate Web page, what else will he observe?
The URL displayed in the browser's Address bar will update with each link that is clicked.
What is the main advantage of using vector graphics instead of raster graphics to create animations?
The file sizes are relatively small, resulting in shorter download times.
Which statement about compressing JPEG files is true?
The more compression, the smaller the file size, but the lower the image quality.
What is the function of a CAPTCHA?
To differentiate humans from automated senders during online transactions
Users can access and navigate an FTP server using an FTP client program. For which action does the FTP client program use the "get" command?
To download a file
Users can access and navigate an FTP server using an FTP client program. For which action does the FTP client program use the "put" command?
To upload a file
Which term is used to describe a program that appears to be harmless but actually produces malicious or harmful results?
Trojan
You suspect that an attacker has gained control of your computer system. What action should you take next?
Unplug the computer network cable and/or disable the computer's wireless NIC.
Which term best describes a collection of software tools that provide a permanent solution to known program bugs?
Update
You and other parents are attending Back To School Night at your son's school. During his presentation about this year's curriculum and goals, your son's teacher talks about the dangers of the Internet. Which of the following should he include in his recommendations to the parents?
Urge the parents to warn their children to never provide personal information over the Internet.
Which is the most common method used to authenticate users on private and public computer networks?
User names and passwords
When your company's private LAN is protected by a firewall, which of the following is true?
Users on the LAN can access information from the Internet, but outside users cannot access information stored on the LAN.
Which of the following behaviors would be considered unethical?
Using your personal Facebook page to make disparaging remarks about your boss
Viewers are scaled-down versions of applications and usually do not have the full application's functionality. Which choice describes tasks you can generally perform using a viewer?
View and print documents, but not edit them
Which is the native audio format for Microsoft Windows?
Waveform (WAV)
Tina is the technology coordinator for a small multi-national corporation with offices in San Francisco, New York, Tokyo and Paris. She needs to coordinate a live and interactive meeting that will allow executives from each of the offices to meet virtually and share presentations. Which of the following is the best way for Tina to accomplish this?
Web conference
Susan is taking an online college seminar series in Art History. All classes will be delivered over the Web. Although there is no opportunity to ask questions, the live lectures and artwork presentations are engaging. Which Web-based meeting format was used?
Webinar
Which term is used to describe a training session that is delivered over the Internet?
Webinar
You make it a point to send e-mail messages, text messages and instant messages that are considered "safe for work." This is a good way to ensure that your messages:
Will not be construed as sexual harassment
Which choice lists the systems for which the Windows Media Player is available?
Windows and Macintosh systems
You have activated pop-up blockers in your Web browser to prevent pop-up windows from continually interrupting your browsing experience. What could be an unintended consequence of this action?
You may not be able to enter logon information when needed to access a site.
Secure authentication requires:
a user name, a password, and encryption of this information.
A Uniform Resource Locator (URL) is an Internet address that performs which task?
dentifies the method by which an Internet resource is accessed
If you click a hyperlink, your browser will:
display a new Web page or another area on the same page.
A plug-in is useful for:
extending a browser's capabilities.
Which part of this address represents the protocol being used to send the page information from the server to the computer of the user who requested it?
http://
With which prefix does a Web page's Uniform Resource Locator (URL) begin?
http://
You use a proprietary Windows-based program to create designs and layouts for your freelance greeting card business. You want to share samples of your work on your Web site for potential new customers to review. You convert the file format of your designs so that customers can view accurate renderings of them, regardless of the local operating system, settings or browser each individual uses to view your site. Which file format should you use?
Anonymous browsing allows users to:
surf the Web privately, leaving no cached information.
Which file format is a popular, customizable graphics format commonly used for medical imaging and desktop publishing?
tiff
Lisa has received a file attachment from a co-worker, James. She has no reason to expect a file from this person. The most effective security strategy for Lisa to follow would be:
to call, text or IM James before opening the attachment, to verify that he intended to send it.
Which part of this address represents the server name on which this page resides?
www