ISYS 210 Final Exam
The text effect of a header tag can not be duplicated using a(an) other tag(s) True/False
False Text following <b><font size=4> appears equivalent to text following <h3> Text following <strong><font size=1> appears equivalent to text following <h6> To effect the line spacing following a header tag, each of the above 'equivalents' would need to be followed by two <br> tags
Linked documents and web pages are specified using the SRC property within the <a> tag True/False
False, HREF
Image files are specified using the HREF property within the <img> tag True/False
False, SRC
All tables must have at least ____ row(s) and ____ column(s) TABLE TAGS a. 1,1 b.1,2 c. 2,1 d. 2,2
A, in other words, they must have at least one table data element
Table header element text, by default, is _______ in each table cell a. centered horizontally b. left-justified c. right-justified
A, the TH tag can also have a align property specified
Table data element text, by default, is ________ in each table cell. a. centered vertically b. vertically at top c. vertically at bottom
A, the valign property of a table, tr, or td tag can have three values: top, middle, and bottom
___________ measures and provides financial information about an organization primarily for its decision makers, investors, and taxing authorities.
Accounting
The five business departments are:
Accounting Human Resource Marketing Research & Development Production
_______________ or advertising-supported software is typically more irritating to a user as it is not usually as malicious.
Adware
The default header alignment is centered True/False
False, aligned to left. Header tag has align property whose values may be left, center, or right.
________________ Reporting reports refer to reports that analyze information and are predictive in nature to make strategic and/ or tactical decisions.
Analysis and Predictive
_______________ are computer programs that attempt to identify, prevent and eliminate computer viruses and malware, and typically before they reach a computing system or network.
Antivirus Software
By default, the height of a horizontal rule is ____ pixels. This may be adjusted using the <hr> tag's _____ property. a. 1, size b. 2, size c. 1, height d. 2, height e. none of the choices correctly complete the two sentences.
B
By default, the width of a horizontal rule is ________ of screen width. This may be adjusted using the <hr> tag's _____ property. a. 100%, size b. 100%, width c. 50%, size d. 50%, width e. none of the choices correctly complete the two sentences.
B
If <basefont color=red> is utilized, the color of text following <font color = blue> is a. red b. blue c. green d. unknown
B
If <basefont size=4> is utilized, the effective size of text following <font size = 3> is a. 2 b. 3 c. 4 d. 5 e. 6
B
If <basefont size=4> is utilized, the effective size of type following <font size = -1> is a. 2 b. 3 c. 4 d. 5 e. 6
B
The default font size implemented in almost all browsers is ___. a. 2 b. 3 c. 4 d. 5
B
Unless the default font size has been modified, using the tag <FONT SIZE = +1> would result in text immediately following the tag to be of what size? a. 3 b. 4 c. 5 d. 6 e. 7
B
All files on a computer should be ______________.
Backed up
A ______________ is essentially an online diary, originally called a "web log" and shortened to blog.
Blog
___________ were originally called 'web logs' but the term was shortened as it came into the vernacular of the web.
Blogs
To make a blog 'website', you don't need any special software, just a ____________.
Browser
________________ can be defined as the necessary core activities required to operate a successful business.
Business Functional Behaviors
______________ or reporting for short is informational output from an information system to facilitate decision making.
Business System Reporting
By default, the alignment of a horizontal rule is ________________. a. left-justified b. right-justified c. centered
C
The <dd> tag is found within the opening and closing ______ tags. a. ordered list b. unordered list c. definition list d. menu list e. all of these lists
C
The <dt> tag is found within the opening and closing ______ tags. a. ordered list b. unordered list c. definition list d. menu list e. all of these lists
C
The <title> tag is used within the opening and closing ____________ tags. a. <body> b. <html> c. <head>
C
CellPADDING refers to the amount of space, in pixels, between individual cells in a table and, if not specified, has a default value of 2. True/False
False, cellpadding refers to the amount of space between the border of a cell and the contents of the cell, the default value is 1
CellSPACING refers to the amount of space, in pixels, between the border of a cell and the contents of the cell and, if not specified, has a default value of 1. True/False
False, cellspacing refers to the amount of space between individual cells, the default value is 2
Using the NOSHADE property of the <hr> tag provides a 3-D effect to the line True/False
False, eliminates the 3-D effect and results in a gray colored line UNLESS overridden by a recognized color property value
<b> results in the same text effect as <em> True/False
False, emphasis is same as italic
An image's border color can be selected by using the bordercolor property of the <img> tag True/False
False, not a property of the image tag
The table caption tag has four possible align attribute values that are interpreted exactly the same in both IE and Mozilla FireFox. True/False
False, only 2 (top and bottom) of the 4 align attribute values are similarly interpreted. The other 2 (left and right) are interpreted differently.
To place a blank line between two lines of text, only one <br> tag is required True/False
False, requires two, the first br tag merely takes you back to the left margin
You may not specify the color of a horizontal rule. True/False
False, the <hr> tag's color property may be set to a color name or RGB color value. Now supported by both IExplorer and Mozilla FireFox.
If specified, a default table caption is bold and centered within the borders of the table. True/False
False, the default caption tag (no attributes selected) places default text centered above the table. The equivalent to having centered, bolded text at the top of a table, but actually within the table, use a <th> tag with an appropriate colspan attribute value.
A table header can only be defined in the first row of the table. True/False
False, the th tag can be used anywhere within the table that a td tag could be used
Link, Vlink, and Alink properties are placed in the <title> tag to influence the color of text links and the border of image links within the document True/False
False, these are properties set with the opening BODY tag
Both IE and Mozilla FireFox implement over-riding the background of both a row and individual cell with a image. True/False
False, while IE supports the background property of the <table>, <th> and <td> tags, it does NOT recognize the background property of the <tr> tag
Colored images can be used as markers in an unordered list True/False
False. A true unordered list's markers are always black. However, you may create something that appears similar to an unordered list that does have colored markers.
When clicked, a web site URL link on a web page causes that URL to be opened in a different instance of the web browser . True/False
False. By default, the URL will replace the web page from which it was called in the current browser instance. To cause the URL to open in a different browser instance, within the A(nchor) tag, must specify TARGET property. TARGET="_blank" or TARGET="_new" will open the URL page in either a completely new instance of the browser (IExplorer) or in a new tab in the same browser instance (Mozilla FireFox). TARGET="_top" will open the URL page on top of the page from which it was called, similar behavior to what happens if the TARGET property is not used.
The foreground color of table text can be set by enclosing the entire table within <font> and </font> tags and specifying the color attribute of the <font> tag. True/False
False. Current versions of Mozilla FireFox and IExplorer do notsupport this. If the default text is to be changed within a table, a <font> tag has to be specified for each <td> and <th> tag.
An image tag's align property has the same three properties as the horizontal rule tag. True/False
False. The image tag's align property can have one of five values: top, middle, bottom, left, and right. Only aligns the image with the surrounding area of the web document, primarily text. NOTE: the align property is limited in its page formatting abilities and does not always work as advertised, use style sheets instead.
In terms of operating on a client/ server network, a distributed database application program written with Microsoft Access would be considered a ________________ which typically provides rich functionality on the client side independent of a central server.
Fat Client
___________ keep unauthorized Internet users out of private intranets.
Firewalls
How organizations account for their money is usually mandated by rules and regulations, and in the United States these rules are called _______________.
Generally Accepted Accounting Principles (GAAP)
Even to suggest that a web "page" is sent from a web server to a client is technically incorrect. What is really sent is pure _________ that is turned into a webpage by the client's web browser.
HTML
__________ websites are a collection of webpages that support a business enterprise for the purpose of e-commerce or as a brochure type website to incent a user to employ the business.
Commercial
A _______________ site is often called an eCommerce site whose sole purpose is to sell goods and services online.
Commerical
________________ is concerned with risk management, confidentiality, integrity and the availability of the electronic information that is processed and stored on a computing system.
Computer Security
________________ are computer files that reproduce by making copies of them self in a computer's memory, storage, or on a network, called metamorphic viruses, similar to what a biological virus does.
Computer Viruses
_______________ sites typically dispense original content and are often supported by advertising.
Content
_______________ sites distribute information about a business to provide background information about their goods and services for public consumption whereas corporate Intranets provide on information to its employees and use authentication and firewalls to keep its information private from the general public.
Corporate
_____________ advertising is when the website publisher only charges the advertiser when a specific action is completed by the viewer like completely filling out an online form or purchasing a product.
Cost Per Action
________________ is when an online advertiser only pays the website owner if a viewer clicks on their advertisement.
Cost Per Click
_____________ actually means "cost for every thousand impressions or hits".
Cost Per Thousand Impressions
Given the following code string, what is the size and color of 'text2' <basefont size = 4 color = red>text1 <font size = +1 color= blue>text 2 <font size = 2 color = yellow>text3</font> a. 4, red b. 5, red c. 4, blue d. 5, blue e. none of these are correct
D
The type property of the <ol> tag can have ____ different values. a. 2 b. 3 c. 4 d. 5 e. 6
D (Arabic, upper case alphabetic, lowercase alphabetic, uppercase roman, lowercase roman), default value is Arabic (numbers)
_______________ is when experts extract useful data and information from recorded data, like a cookie.
Data mining
_______________ is an attempt to make a computer or any of its resources unavailable to its intended users.
Denial-of-service Attack
_____________ is a lot of information that is simply thrown away around homes and offices, like copies of checks, bank statements, credit card statements which usually bear your name, address, and sometimes even your phone number.
Dumpster Diving
_____________ website styles actually generate a web page directly from the server depending on the context of the user.
Dynamic
The <li> tag is found within the opening and closing ______ tags. a. ordered list b. unordered list c. definition list d. menu list e. all of these lists except c
E
Type options for the <ul> are a. square b. disc c. circle d. ball e. all but d
E, default value is disc
A table data element can be a. text b. an image c. a text link d. an image link e. all of these
E, just about anything can be found as a table data element
Data and information exchange software and techniques can be categorized as _____________ whereas collaborative software and techniques can be categorized as _____________.
Electronic Computing Tools; Management Tools
_________________ sites are a popular way for multiple businesses to post their jobs online to the public.
Employment Websites
A table can not be embedded inside another table True/False
False
Ordered lists, unordered lists, menu lists and definition lists can not be True/False
False
Simply put, when someone is surfing the Web, the act of clicking on a link, or hyperlink, is an _______________ for a webpage to be sent from a web server where the desired content, typically the homepage of a website exists, to the user's computer.
HTTP Request (Hypertext Transfer Protocol = HTTP)
A ____________ is often someone who attempts to evade or disable a computer's security measures, and then steals computer resources at their leisure.
Hacker
______________ Elements typically define a web document's title, style, and additional information about the document's author, page description, and keywords to help search engines find the web page.
Hard
_______________ are like < style > head elements but are used in the body of a webpage and allow the HTML to create presentational effects like italics, bold, and emphasis.
Head Elements
_______________ is primarily involved with administration of a business' personnel.
Human Resource Management
________________ track enormous amounts of information about the people that work for a business, and even the people who are no longer employed by that business.
Human Resources departments
____________ refers to text on a computer that will lead the user to related information.
Hypertext
HTML is the acronym for __________.
Hypertext Markup Language
Berners-Lee invented a standard; platform neutral language that all computers could read called __________________.
Hypertext Markup Language (HTML)
_______________ is a crime concerning the unlawful practice of assuming another individual's identity, and it is one of the fastest growing crimes in the United States and Canada.
Identity Theft
__________ and __________ are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain.
Identity Theft and Identity Fraud
________________ Elements use special tags to help the browser window display pictures, photographs, and images typically using the GIF or JPEG file formats like the following: < img src =" meadow.gif" alt =" meadow"/ >.
Image
A blog is a website usually maintained by an ___________ with regular entries of commentary, descriptions of events, or other material such as graphics or video.
Individual
____________ and online chat is another way to collaborate by exchanging data and information.
Instant Messaging
_______________ is actually a very broad term that refers to any fraudulent activity regarding online activity.
Internet Fraud
___________ are websites within a company to support its employees and guarded by firewalls to authenticate its users.
Intranet
Another language that a browser can read is called ___________, which extends a web site's usability.
JavaScript
____________ are collaborative systems that organize, create and distribute a business' collective knowledge.
Knowledge Management Systems
______________ Elements create elements that can become hyperlinks which allow web page users to navigate to different parts of a web site, or different parts of the World Wide Web.
Link
________________ is programs specifically intended to penetrate or damage a computer system without the end user's knowledge.
Malware
_________________ refers to the level of detail or summarization appropriate for a certain levels of employee regardless of report type.
Management Level Reporting
____________ is the promotion of a business' products and is the third core business functional behavior.
Marketing
_________________ is a computer programming language using a set of annotations that give browsers the instructions to display text, images, and other web elements on a web page.
Markup Language
The "__________" description above provides a description of the web site when it is found by a search engine like Google so a user can read what the website is about before clicking on its URL.
Meta
__________ websites are just that; webpages created by an individual that contain content of a personal nature.
Personal
_______________ is a criminal activity using social engineering techniques and attempts to deceptively gain private information, like usernames, PIN numbers, passwords and credit card details, by masquerading as a legitimate business organization typically in a legitimate looking email.
Phishing
_______________ means that HTML can be read and rendered correctly by any browser that exists on any platform, like Windows 7, Mac, Linux, or UNIX.
Platform-neutral
___________ refers to what a product costs, or at least what a business is willing to exchange for their products.
Pricing
_______________ can be defined simply enough as the ability of an individual to keep their personal information out of public view.
Privacy
_______________ focus their efforts on which goods and services to produce, how to produce them, and what it's going to cost to produce them.
Production
____________ are the actual goods and services a business produces and how they relate to customer's needs including warranties, guarantees, and customer support.
Products
________________ provides a business a collaborative road map for organizing and managing resources to schedule a project from start to finish.
Project Management Software
___________ is the advertisement of a business' products and services, as well as promotion and publicity.
Promotion
_______________ involve a buyer typically in another country that approaches merchants via spam and asks if they can pay for shipping with a credit card.
Purchase Scams
______________ refers to the level of detail or level of summarization in a report.
Reporting Summarization Levels
________________ departments take a creative and systematic approach to evolve a business' original idea and devise new ones.
Research & Development
_______________ is a relatively newer form of malware, keylogging is when a perpetrator logs on to a computer workstation and installs a program that simply records every keystroke made at the workstation's keyboard.
Reverse Phishing/Keylogging
In a computing system, _________ is the recognition, consequences, and assessment of risk to a computer's assets, and developing strategies to manage and protect them.
Risk Management
For protection against identity theft, the United States Department of Justice urges people to remember the acronym "____________".
SCAM
To insure the accuracy and fair reporting of these financial statements, laws like the __________________ were enacted to counter fraudulent reporting.
Sarbanes-Oxley Act of 2002 (SOX)
A _____________ site offers general information and research and is intended as an entryway for other websites.
Search Engine Website
Although a quaint term, ____________ is exactly what it sounds like; a criminal in a public place will simply glance over their victims' shoulder and watch them dial a phone number, or type in a password on a laptop, or simply listen for a credit card number.
Shoulder Surfing
_______________ or junk email is the abuse of an email system to arbitrarily send typically millions of unsolicited bulk messages.
Spamming
_______________ is a computer program that is installed covertly on a computer to capture or take control of the computer, without a user's knowledge or consent.
Spyware
_____________ websites styles rarely, if ever, change their content and display their information the same way to all users.
Static
____________ decisions refer to long-term planning designed to achieve a specific goal, whereas ___________ decisions are specific actions that serve a larger purpose.
Strategic; Tactical Decisions
_______________ passwords are longer in length than ordinary passwords, typically eight to twelve characters.
Strong
______________________ are designed to tell a browser how to display and align elements like lists, headings and paragraphs.
Structural (Block) Elements
A ______________ is a client computer or client software like a web browser in client/ server network that depends on the server for computer processing which in turn serves up the information to the client.
Thin Client
The first post to a discussion board is typically a comment that starts a _____________.
Thread
_____________ and the data they provide are the groundwork for all other reports.
Transaction Processing Systems
A ______________ program often seems harmless and possibly interesting until it is executed.
Trojan Horse
<I> results in the same text effect as <cite> True/False
True
<big> results in the same text effect as <font size = +1> True/False
True
<kbd> and <tt> result in the same text effect True/False
True
<small> results in the same text effect as <font size = -1> True/False
True
<strong> and <b> result in the same text effect True/False
True
By default, the background of a table is transparent. True/False
True
Color, size, and face are properties of the <font> tag True/False
True
Unless explicitly specified in the <tr> tag, the height of a table row is automatically based on the height of the tallest element in that row. True/False
True
Unless explicitly specified, the width of a table column is automatically based on the width of the widest element in that column. True/False
True
Within document navigation is facilitated using the name property of the <a> tag True/False
True
A fragmented URL utilizes an anchor tag to go to a specified point within a web page True/False
True, and uses the special character # indicate that the destination is a location within the document
Unless specified by the link property of the page's <body> tag, a linked image's initial border color is, by default, set by the browser. True/False
True, and, by default, will be blue
Both IE and Mozilla FireFox implement over-riding the background color of both a row and a individual cell. True/False
True, both IE and Mozilla FireFox recognize the bgcolor property of the<table>, <tr>, <th>, and <td> tags
A pixel is approximately 1/72 inch True/False
True, but really variable based on screen resolution
The background of a table may be a solid color or an image. True/False
True, by using appropriate values for either the bgcolor or background property of the opening table tag
An image's size can be adjusted using properties of the <img> tag True/False
True, height and width
An image's spacing can be adjusted using properties of the <img> tag True/False
True, hspace and vspace
An unlinked image's border color can be manipulated by the color property of a preceding <font> tag True/False
True, the color of a visible border around an unlinked image tag will be governed by browser default text color (black), text property of body tag, or color property of controlling font tag
A single table element can span both multiple rows and columns True/False
True, the rowspan and colspan properties can be specified for both th and td tags
Table column widths can be specified as percentages of the overall table width True/False
True, the width property can also be set to a fixed number of pixels
<hr> widths can be specified in either percentage of screen width or pixels True/False
True. By default the width is 100% o f screen width and may be adjusted using the <ht> tag's width property
The number or character identifying the first element in an ordered list intermingled may be changed from 1, I, i, A, or a. True/False
True. No matter whether using a default ordered list, type=1, or any of the other type values, the value for the start property must be an integer. For example, if you want to start a uppercase Roman numeral list at X, the start value is 10. If you want to start a uppercase Alphabetic list with J, the start value is 10.
An ____________ computer is an extremely easy to breach, especially by a seasoned hacker.
Unsecured
Video sharing sites use _______________ protocols instead of Transmission Control Protocol / Internet Protocol (TCP/ IP).
User Datagram Packet (UDP)
______________ allow businesses to collaborate through a network by allowing two or more locations interact via video and exchange data during the conference often called a webinar.
Video and Data Conferencing
A ________________ is a dedicated computer connected to the Internet that accepts Hypertext Transfer Protocol (HTTP) requests from Internet users (clients) and fulfills the request by sending (serving) HTML documents, or web pages via HTTP.
Web Server
A _______________ is an assortment of Web pages that can include text, images, videos, and other elements that is hosted on a web server accessible via the Internet.
Website
With the dawn of HTML, the ____________ was born.
World Wide Web
A ______________ is like a virus in that it is self-replicating but many times far more insidious in that it does not need to attach itself to an existing program to spread.
Worm
Webpages really don't even exist until they are resolved and rendered by the client's ____________.
browser
A broad definition of a ___________ is that is an organized entity designed to sell goods and/ or services, usually in an endeavor to make a profit.
business
Without proper configuration, a firewall can often become ____________.
worthless
The word "copy" in terms of a web browser is actually referred to as ____________.
cache
Web browsers allow for client's to review their history based on the client's ___________.
cache
JavaScript is a programming language that is considered a _____________ language in reference to websites.
client-side
When a client clicks on a hyperlink to make an HTTP request for a webpage residing on a web server, the webpage is sent to the _____________.
clients computer
The fact is business departments need to do more than just share data and information to be successful; they need to _____________ with one another.
collaborate
Reports can also be ___________ reports, meaning that they can be produced whenever they are needed.
demand reports
HTML is represented in the form of tags called ____________.
elements
A _____________ is specialized hardware and software working together that insures that only authorized personnel and employees within a business can use their Intranet.
firewall
In simple terms, a ____________ is configured to deny or permit network users, (many times Internet users) or data into a computer network with different levels of trust.
firewall
Fat clients have ___________ functionality than thin clients.
greater
Computer hackers are not just after information, many times they attempt to ____________.
hijack heavily sought-after computer processing cycles and speed, as well as storage space.
If web pages that visited a client's computer are cached, which they typically are, that means all the content a client looked at on the WWW resides on the client's computer, typically called "______________".
history
Stealing credit card information constitutes _________________.
identity theft
An _____________ is a businesses' private version of the Internet that works the same way as the Internet, but is confined within the business.
intranet
It is important to identify that every computer ____________, and understand the enormous penalties for ignoring these problems.
is at risk
There are a lot of misnomers when it comes to website terminologies, for instance, you don't visit a website: _______________.
it vists you
Many times these computers are connected to the Internet, so they receive emails with malicious attachments, ___________________.
like viruses, worms, and malware
Another problem is that fat clients are typically _____________ relative to web browsers which are thin clients.
more expensive
Most reports are __________ in nature, meaning that they are produced at given intervals, sometimes daily, weekly, monthly, etc.
periodic
Categories of websites include __________, __________, __________, and __________ websites.
personal, commercial, governmental, intranet
The key aspect of an Intranet is _____________.
privacy
Website online software has to be a dynamic website that generates and processes web pages directly from the server, called ________________.
server-side processing
Since the five business departments are interrelated it is imperative that they ___________________.
share data and information
An HTML document typically has a filename extension of _____________.
".html" or ".html"
A fragmented URL is ____________ a normal URL a. an extension of b. a shortened version of c. no different from
A
The <head> tag is closed ___________ the ____________ tag. a. before, <body> b. after, <body>
A
The link, alink, and vlink properties are defined within the _____ tag of a web page. a. <body> b. <head> c. <title> d. <html> e. <table>
A
With HTML 4.0, there are ____ header lines defined with ___ being the largest a. 6,1 b. 6,6 c. 7,1 d. 7,7
A