*ALL OF CIW* [EVERYTHING*] v8

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Many Web design professionals refer to HTML as,

"markup"

LAN

(Local Area Network) A computer network that interconnects computers in a limited area such as home, school, or an office.

What is a project milestone?

A major event during the course of a project

What is a virus?

A malicious program that assumes control of system operations, and damages or destroys data

Which device connects a wireless local area network to a wireless phone network at broadband speeds?

4G mobile hotspot

Uniform Resource Locator (URL)

A text string that specfies an Internet address and the method by which the address can be accessed.

Personal information management (PIM)

A tool used to schedule appointments and meetings, store contact information, and manage tasks.

Task

A unit of work that must be accomplished during the course of a project.

Which statement correctly compares computer viruses and worms?

A virus requires user action to replicate, but a worm can replicate by itself.

Hypertext Links

A way to embed a URL into an object (such as text or an image) so that when the object is clicked, the browser retrieves the file specified.

Wireless access point (AP)

A wireless device allowing wireless devices to connect to a wired network using wi-fi.

A block-level element is a markup element that affects at least:

An entire paragraph

As you passed your mouse cursor over a hyperlink on a Web page, the text enlarged. Which of the following was used to accomplish this effect?

An event handler

thread

An instruction from a running application that executes a particular task.

While editing an HTML page, you see the following line of code: <img src="images/habitat.png" alt="PNG image"/> Where is the image named habitat.png located?

One folder below the location of the Web page being edited

Direct connections provide continuous access to the Internet. Many bandwidth options are associated with direct connections. Which technology can transmit data over a network connection at speeds up to 1.544 Mbps?

T1

Which HTML element can be used to create a primitive table on a Web page using tabbed data?

The <pre> tag

Which of the following does the HTML <head> tag contain?

The <title> Tag

Which of the following is an example of a trademark?

The apple icon on the covers of many Beatles albums

Assignment

The appointment of a specific resource to a specific task.

What is decryption?

The process of converting data that has been converted into an unreadable form of text back to its original form

Decryption

The process of converting encrypted data back to its original form.

What is program management?

The process of managing multiple interdependent projects to improve the performance of an organization

Program management

The process of managing multiple interdependent projects to improve the performance of an organization.

Simple Mail Transfer Protocol (SMTP)

Used to transfer email messages to others with an outgoing mail server.

What part of an e-mail address appears before the @ symbol?

User name

Which is the most common method used to authenticate users on private and public computer networks?

User names and passwords

What is authentication?

The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data

Authentication

The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data.

Change management

The process, tools, and techniques that help people implement changes to achieve a desired outcome.

What is the purpose of the <link> tag in an HTML document?

To create a link to a style sheet.

Instant messages can be sent only to contacts who are currently online.

What distinguishes instant messaging from e-mail?

What occurs in Windows when you try to open a file with an unknown MIME type?

Windows prompts you to define a MIME type and associate it with an application.

Ken needs a catchy name for his new online business. He decides to launch a public contest through his social networking accounts to seek lots of creative ideas for his business name. Which term describes the use of the Internet in this manner?

Crowdsourcing

What is the name of the problem-solving model in which a task ordinarily performed by one person is outsourced to a large group or community in order to obtain and analyze large amounts of data?

Crowdsourcing

MIME

multipurpose internet mail extension

Which of the following top-level domains would generally refer to an Internet Service Provider (ISP)?

net

a

aaaa

The ability to help project participants coordinate and prioritize their tasks to stay within the project scope can be considered:

an organizational skill.

You have created your own blog site and have posted and received numerous entries. You have noticed that blog entries:

consist of brief, informal thoughts focused on a specific topic

Which of the following is a command-line text-only Web browser?

Lynx

HOW TO USE:

1. Highlight the question in CIW 2. Hit Ctrl+C 3. Then go in this set in quizlet 4.Hit Ctrl+F 5. Then in the bar hit Ctrl+V 6. kewl

How many bits does the Internet Protocol version 6 (IPv6) address format use?

128

The opening <p> and closing </p> tags define:

A paragraph

A Web site that was once quite popular with younger visitors has lost some of its allure and traffic. How can you develop an audience for this Web site?

Add animations to the site.

When you create a select list, how can you specify to pass a value different from the text that appears in the list?

Add the value=""attribute into any or all of the <option> tags.

Which language is considered the best language for creating large applications

C++

Which of the following is an example of effective Web site file structure?

Creating a directory of HTML pages that contains subfolders with images and files used in each page

Which step can most directly help your team follow up on decisions made during Web development meetings?

Creating a list of action items and distributing minutes.

Web pages that use ActiveX

Can include animation, audio, and video

network programming

Code that controls how the browser accesses a network.

In a directory one level above the current page

Consider the following HTML code from a page that resides on a Web server: <a href="../ccyp.html"> CCYP Home </a> According to this code, where does the file named ccyp.html reside on the Web server?

What part of an e-mail address appears after the @ symbol?

Domain name

What is the purpose of the History folder?

EASY ACCESS TO PREVIOUSLY VEIWED WEB PAGES

Why might a Web page appear differently in different browsers?

Each browser interprets HTML somewhat differently.

What is considered the de facto standard communication tool for business?

Electronic mail (e-mail)

In addition to allowing keyword searches, which of the following search engines also allows conceptual searches?

Excite

Which of the following search engines uses cross-referencing fields for conceptual searches, in addition to allowing keywords searches?

Excite

What is the term for an internal network designed to provide access to selected external users?

Extranet

You used the following hexadecimal code to specify a background color: CC08FB Which characters in this code represent the blue value?

FB

In a relational database table, which term best describes the category of information represented as a column in a table

Field

What is the term for a category of information in a table?

Field

What is the term that describes the perspective in relation to IT?

Holistic

In addition to ranking the relevance of a particular site according to the keywords entered by the user, which of the following search engines also determines a site's relevance based upon the number of links that point to it?

Google

Scope creep

Gradual increases in project scope that can undermine the success of a project.

Ellen is creating a style sheet to format her Web pages. For the page background color, she enters the hexadecimal code 00FF00. What color will the page background be when she applies this style?

Green

Web Development "Trifecta"

HTML5, CSS and JavaScript.

Which of the following wireless mode types uses a centralized access point known as a wireless access point (AP)?

Infrastructure

What can you do to eliminate the need to define a MIME type for files that you download from Web sites?

Install the latest version of a browser, or install any available upgrades.

In the client/server environment, what is the main function of client software?

It enables users to communicate with and request information from the server.

Which scripting language is the Microsoft version of JavaScript?

Jscript

When developing a Web site, which of the following actions would be considered unethical, yet legal?

Linking your site to another site without permission

Which Boolean operator should you use if you want to specify Internet search results that exclude the keyword that follows the operator?

NOT

What is the term for individual computers and devices that are connected to a network?

Nodes

What will Internet search results contain when you use the OR Boolean operator in a two-keyword search string?

One keyword or the other or both

In an Ethernet network, all data travels across the network and between computers in which form or unit?

Packets

What it the term for the idea of a major change in a former way of thinking or organizing?

Paradigm shift

Which cookie type remains on your system after you end your browser session?

Persistent cookie

Rich Text Format (RTF)

Portable text file format created by Microsoft that allows image insertion and text formatting; an almost universal format.

Which operator would you use in a Web search to find a multi-word phrase with the words in a specified order?

Quotation marks " "

Stakeholders

Relevant organization employees or contributors who can help determine the purpose of the Web site, the site's look and feel, the services that the audience requires from the site, and so forth.

From which language did Tim Berners-Lee borrow to create HTML?

SGML

SMS Gateway

Service that allows you to send text messages to an instant messaging (IM) service, the World Wide Web and desktop computers

Which protocol is required for computers to communicate with each other over the Internet?

TCP/IP

Visual Basic

The Microsoft graphical user interface (GUI) programming language used for developing Windows applications. A modified version of the BASIC programming language.

Standard

The level of quality

Why is the acceptance of HTML5 in the Web community a benefit to users of mobile devices

The use of HTML5 can help conserve battery power.

Which of the following is the most appropriate reason to create multiple Web sites in various languages?

To accommodate an international audience.

What is the primary goal of a plug-in

To provide efficient integration of multimedia formats with the browser and computer

How many mail servers does the use of e-mail involve?

Two -- incoming mail is handled by one server using Post Office Protocol (POP) or Internet Message Access Protocol (IMAP), and outgoing mail is handled by another server using Simple Mail Transfer Protocol (SMTP).

Before you create a Web site, you must first create a,

Web Site Plan

What is the term for an individual who develop primarily sever-side Web applications?

Web application developer

Semantic Web

Web data that is contextualized with the addition of machine-readable metadata

An electronic journal or personal diary posted to a public Web site can be considered:

a blog

Asking other users to divulge personal information during any Internet-based communication can be considered:

a breach of Internet ethics

A database field can best be described as:

a category of information in a table.

Portable Document Format (PDF) resumes:

are compatible with all computer platforms and are not vulnerable to viruses

Which of the following popular social networking sites is most often used as a business tool?

linkedin

Gantt charts graphically display?

project tasks and task durations

A major update with significant software improvements is often marketed as a new:

release.

Proprietary software

software that is owned by an author or entity. The use of proprietary software is governed and protected by end-user license agreements

By default, e-mail clients typically save a copy of every message you send in

the Sent or Sent Items folder

E-mail message headers consist of:

the To, Cc, Bcc, Subject and Attachment components.

Each segment of a dotted quad consists of a number between:

0 and 255

In Cascading Style Sheets (CSS), what is a rule?

A format instruction that consists of a specified selector and the properties and values applied to it

Newsgroup

A forum on the usenet service used for discussion of a particular topic.

Ogg Vorbis (.ogg)

A free, open-source alternative to the MP3 compression format for audio files; creates smaller, faster downloading files.

Which statement best describes Extensible Markup Language (XML)?

A language that describes data elements on a Web page

Extensible Hypertext Markup Language (XHTML)

A language that organizes data in a document and formats the page's appearance in a Web browser. Uses HTML to format page's appearance. Uses XML to format page's data. It creates a medium between HTML to XML.

Hypertext Markup Language version 5 (HTML5)

A language that requires few plug-ins and standardizes how video and audio are presented on a Web page.

Message Transfer Agent (MTA)

A messaging component that routes, delivers and receives e-mail

Message Transfer Agent (MTA)

A messaging component that routes, delivers and receives e-mail.

Mail User Agent (MUA)

A messaging component used as a stand-alone application by the user

Mail User Agent (MUA)

A messaging component used as a stand-alone application by the user.

In databases, what is a one-to-one relationship?

A relationship in which each record in Table A can have only one matching record in Table B, and vice versa

A common field is a field that can be found in:

A relationship in which one record in Table A can relate to many matching records in table B, and vice versa

In databases, what is a many-to-many relationship?

A relationship in which one record in Table A can relate to many matching records in table B, and vice versa

What can you use to help you determine how closely a site matches the topic for which you are searching?

A relevancy score based on how frequently your specified keywords are found in the site

What is spyware?

A software application that is secretly placed on a user's system to gather information and relay it to outside parties

Software as a service (SaaS)

A software delivery model in which most soft ware and associated data are centrally hosted on the cloud server.

Metalanguage

A software that is used to create other languages.

Point to point protocol over ethernet

A specification for connecting users on an ethernet to the internet through a common broadband medium.

user name

A unique name or number that identifies you when logging on to a computer system or online service. In an e-mail address, the part before the @ symbol.

IP address

A unique numerical address assigned to a computer or device on a network

IP address

A unique numerical address assigned to a computer or device on a network.

Which of the following services are you using when a third party is hosting your Web site but your company has its own Web address with its own domain name?

A virtual domain

Which of the following was issued by the U.S. government to ensure accessibility to various resources, including Web pages?

Americans with Disabilities Act (ADA)

e-mail client

An e-mail program that is independent of any specific Web browser, and that you can use to send e-mail messages.

Mail Delivery Agent (MDA)

An e-mail server program that receives sent messages and delivers them to their proper destination mailbox

Mail Delivery Agent (MDA)

An e-mail server program that receives sent messages and delivers them to their proper destination mailbox.

Usenet (User Network)

An early non-centralized computer network for the discussion of particular topics and the sharing of files via newsgroups.

Graphical User Interface (GUI)

An editor program to create the code automatically (by pointing and clicking your mouse), or combine both methods. It provides visual navigation with menus and screen icons, and performs automated functions when users click command buttons. Doesn't need coding to operate.

Intranet

An internal network based on TCP/IP protocols, accessible only to users within a company.

Integrated Service Digital Network (ISDN)

An international communication standard for sending voice data, video, and data over digital telephone lines.

Which statement is true regarding international copyrights of digital information?

An international copyright does not exist.

If you were a project manager, which of the following documents would be the most helpful in evaluating project risks and determining whether you should escalate concerns to managers or executives outside the project team for resolution?

An issues log

HTML tags:

Are not case-sensitive but should always be typed in lowercase letters

HTML tags:

Are not case-sensitive but should always be typed in lowercase letters.

<ul> <li> Administrators </li> <li> Programmers </li> <li> Designers </li> <li> Writers </li> </ul> How will the words Administrators, Programmers, Designers and Writers appear on a Web page when displayed in a browser?

As a list of bulleted items <ul> = unordered list = bullets

What is the term for software that scans disks and programs for the purpose of eliminating software designed to harm computer systems?

Anti-virus software

Which elements of an image can be made transparent?

Any element of a specified color

Network News Transfer Protocol (NNTP)

Application used for transporting usenet new articles between new servers and for reading and posting articles by end user client applications.

Your Web team has created a series of Web pages and Flash presentations that equal 84 kilobytes (KB). How long will it take for this page to be downloaded by a user with a dedicated connection that consistently performs at 56 Kbps?

Approximately 12 seconds

What is the term for the feature in an e-mail client that automatically sends a specified response to anyone who sends e-mail to your address?

Autoresponder

Why would some corporate IT departments disable JavaScript and ActiveX on browsers used within the company?

Because JavaScript and ActiveX controls allow information to be downloaded and run on your system.

When you view a webpage, the images are downloaded to your computer. Where are the stored

Browser cache

Which IT job role best describes an individual who is responsible for managing the maintenance and security of an organization's data?

Database adminstrator

Which of the following should IT professionals use to store, access and manipulate corporate database information?

Database management system (DBMS)

What kind of software do vendors such as IBM, Computer Associates, Oracle, Microsoft, Sybase and MySQL provide mainly to IT professionals so they can store, access and manipulate corporate database information?

Database management systems (DBMSs)

Which of the following is an electronic stamp that can verify the integrity of data and the identity of the message source?

Digital signature

Which result reflects an IT project that is properly managed?

Employee productivity loss is minimized.

Browser email

E-mail programs such as Outlook Express and Opera Mail that come bundled with a Web browser and with which they may be integrated

browser e-mail

E-mail programs such as Outlook Express and Opera Mail that come bundled with a Web browser and with which they may be integrated.

Which of the following takes place when IT projects are mismanaged?

Employee productivity may be adversely affected due to excessive system downtime

Which of the following takes place when IT projects are mismanaged?

Employee productivity may be adversely affected due to excessive system downtime.

Which of the following statements about File Transfer Protocol (FTP) is true?

FTP is a good alternative to sending an e-mail attachment.

Your company offers software applications for various topics. When the customer begins downloading the app, the standard protocol that is most likely transferring the application is:

FTP.

Which of the following is used to help non-technical users collectively classify and find information on a site?

Tagging

Folksonomy

Tagging of online content so non-technical users can classify and find information

Which of the following is a unit of work that must be accomplished during the course of a project?

Task

Which U.S. government agency first funded the development of the Internet?

The Department of Defense

Which Internet resource is used to resolve IP addresses into easily recognizable text-based names?

The Domain Name System (DNS)

Which of the following is the most important consideration to ensure that your image's resolution will be as clear as possible when viewed on a computer monitor?

The image's dimensions in pixels

Which of the following is an open-source implementation of Pretty Good Privacy (PGP) that does not use patented algorithms?

GNU Privacy Guard (GPG)

What are four popular browsers used on the World Wide Web today?

GOOGLE CHROME, INTERNET EXPLORER, MOZILLA FIREFOX,LYNX AND OPERA

Which protocol is used to send Web pages from a Web server to a Web browser?

Hypertext Transfer Protocol (HTTP)

A Uniform Resource Locator (URL) is an Internet address that performs which task?

Identifies the method by which an Internet resource is accessed

Why is having local access to e-mail messages important for those who use IMAP servers?

If a network problem occurs, IMAP server users may not have access to their messages.

display a new Web page or another area on the same page.

If you click a hyperlink, your browser will:

To the Inbox folder

In e-mail applications, where are incoming messages automatically routed by default?

Protocol Component

Indicates both the type of server and Internet service being used.

Which of the following terms is used in ontology to refer to the basic item within a domain?

Individual/ object

Which browser element is an application that adds extra capabilities to your Web browser, such as the ability to view movies or Flash animations?

Plug-in

Which browser element is an application that adds extra capabilities to your web browser, such as the ability to view movies or Flash animations?

Plug-in

How do plug-ins eliminate transfer delays when files are played from a browser

Plug-ins retrieve a small portion of a file at a time and deliver enough information to build a continuous stream of data.

Storyboard

Purpose and intended audience for a Web site, and provides a rough outline of the pages needed.

Mathematical shapes saved as a sequence of vector statements, which describe a series of points to be connected

The Flash Player allows browsers to play Flash movies, which are animations created using vector graphics. What are vector graphics?

What is the term for a server at the highest level of the Domain Name System (DNS)?

Root-level server

What is the term for a device that determines the best path for data to take across a network?

Router

What is the term for an individual who performs keyword research to determine the visibility of Web sites across multiple clients and search engines?

SEO analyst

How are domain names structured?

SERVERNAME.COMPANY NAME.DOMAIN CATEGORY

Which folder allows easy access to previously viewed Web pages by storing the URLs of sites you have accessed within a defined period of time?

The History folder

What do encryption applications do to render text unreadable?

Scramble text using mathematical algorithms

Which term is used to describe a computer security program that is enabled when no keystrokes or mouse actions have occurred on the system for a specified duration?

Screen saver

Visual Basic Script (VBScript)

Scripting language from Microsoft derived from Visual Basic; used to manipulate ActiveX scripts.

JavaScript

Scripting language that provides dynamic, interactive capabilities to Web pages.

Which of the following should you use to find user-specified information in Internet databases?

Search engine

Which of the following is a specific activity of Internet marketing?

Search engine optimization (SEO)

Which of the following is true about using the Internet to perform job tasks?

Search engines are useful for finding any type of data you need from the Internet

Which of the following can be an important part of Web page accessibility because it allows visitors to view a summary of your Web site's structure?

Site map

How many heading styles are defined for HTML?

Six

What methodology was originally developed to improve manufacturing processes in order to eliminate product defects?

Six Sigma

Snail mail

Slang term for the standard postal service

Which of the following is true regarding smartphones and PIM applications?

Smartphone PIM applications are designed to work in tandem with traditional desktop or laptop computers.

When you enter a URL such as "www.CIWcertified.com" in your browser, what is implied because you are visiting the top level of the site?

The Web site's home page

HTML is standardized by,

The World Wide Web Consortium (W3C).

Collective Intelligence

The ability of a group to exhibit a greater degree of intelligence by solving problems collaboratively compared to the intelligence of an individual member

Which feature is commonly found in a Web site management editor?

The ability to assign tasks to team members

Which scale is critical and most IT job roles?

The ability to communicate effectively

Which of the following is a standard feature of a GUI HTML editor?

The ability to import HTML code, including tables

You have joined several Web sites to keep in touch with current friends, reconnect with old friends, and find and contact people with interests similar to your own through people that you already know. What kind of Web sites have you joined?

Social networking Web sites

Cloud services include,

Social networks and blogging sites.

Which of the following statements is true regarding copyleft licenses?

Software that is distributed with a copyleft license is in the public domain.

Anti-virus software

Software that scans disks and programs for known viruses and eliminates them.

Cloud Computing

Software, infrastructure and platform services that are hosted by a remote data center and provided to organizations or individuals over the Internet.

Your Web team is developing a new Web site for your company. The marketing team has requested that the new site use a particular font character set so that all the Web pages adhere to the company's strict branding and marketing standards. Which issue is likely to arise when you specify a character set in an HTML Web page?

Some browsers may render your Web pages improperly.

What is the term for unsolicited and unwanted e-mail messages?

Spam

Which language should you use to create and maintain large relational databases?

Structured Query Language (SQL)

Which of the following specifies the markup language and version used by your HTML file?

The <!DOCTYPE> tag

Text surrounded by the <b> and <strong> tags both result in bold text. How do the tags differ?

The <b> element applies the bold font style, whereas <strong> applies a heavier weight to the text relative to the surrounding text

Text surrounded by the <b> and <strong> tags both result in bold text. How do the tags differ?

The <b> element applies the bold font style, whereas <strong> applies a heavier weight to the text relative to the surrounding text.

Which HTML tag should you use if you want to center and indent a block of text?

The <blockquote> Tag

Which HTML tag should you use if you want to center and indent a block of text?

The <blockquote> tag

Internet resources can be used for a variety of purposes beyond the World Wide Web and e-mail. Which of the following helps IT professionals troubleshoot and solve problems with Internet technologies?

TCP/IP diagnostic tools

Why is continuing education important for people who want jobs in the IT industry?

TECHNOLOGY IS ALWAYS CHANGING

How are domain names resolved to IP addresses?

TEXT-BASED IS EASIER TO REMEMBER

Why are IPv4 addresses also called dotted quads?

THE NUMBERS ARE SEPERATED BY DOTS INTO 4 SECTIONS

What features are the same in various Web browsers? What features are different?

THEY ALL HAVE A RENDERING ENGINE, INTERPRETATER, SANDBOX, THREAD, WINDOWS, TABS, CACHE, PLUG-INS, BUT THEY DIFFER IN FONTS, COLORS, AND DISPLAYED INFORMATION

With which of the following should you specify the text that will appear when your Web page is bookmarked or added to a browser's Favorites folder?

The <title> tag

One way that a project manager can ensure the delivery of a quality product is to adhere to ISO 9000 standards. ISO 9000:

details recommended steps for producing products and services using a quality-management system that maximizes time, money and resources.

Copying an image from a Web site for your own purposes without getting permission from the image creator can be considered:

copyright infringement.

If you are conducting search engine optimization (SEO), you should:

create as simple a form as possible.

When evaluating the accuracy and value of information you have found on the Internet, you should:

discern between fact and opinion

When evaluating the accuracy and value of information you have found on the Internet, you should:

discern between fact and opinion.

What is the term for a field in a related database table that refers to the primary key in the primary table?

foreign key

A list server can be used to:

forward e-mails, announcements, newsletters or advertising to group members on a regular basis.

The appearance of right-pointing angle brackets ( > ) in the text of an e-mail message indicates that the message contains:

forwarded text.

In which type of keyword search can you enter any search string in a search engine to query an index?

full text search

The term "netiquette" refers to:

general rules for Internet politeness.

A relative Uniform Resource Locator (URL) is a URL that:

gives an abbreviated path to a resource using the current page as a starting position.

As an IT project manager, you must be able to determine which projects to preserve and which projects to eliminate in order to:

maintain a positive Return On Investment (ROI).

A drawback of Webinars is that they:

may require multiple presentations if participants are located in different time zones.

When you use an e-mail client to send and receive mail:

messages stored in your Outbox are sent, a copy of each sent message is stored in the Sent Items folder, and incoming messages are routed to your Inbox.

Uploading files to an FTP site requires an FTP client program and:

permission, which is usually provided by the FTP server administrator.

In data monitoring, determining exactly where data will be stored is the essential part of the:

physical design step

By adding the checked="checked" attribute and value into the <input> tag for a group of check boxes, you can:

preselect as many check boxes as you like.

What is the term for a field containing a value that uniquely identifies each record in a database table?

primary key

Gantt charts graphically display:

project tasks and task durations.

Intranets are popular because they:

provide a standard method for accessing resources, regardless of the operating systems used.

During which project management phase should you conduct a needs analysis; determine project objectives, assumptions and constraints; and develop a Statement Of Work (SOW)?

The initiating phase

Convergence

The integration of telephony and data networks and technologies

What statement is true regarding the use of Internet searches for job related research?

The internet provides fast convenient access to a vast amount of info and services

Which of the following is usually true of popular social networking sites?

They generally provide privacy protection for users.

What can be considered a disadvantage to installing program patches and updates?

They may introduce incompatibility issues or new security issues.

What is the primary function of a Web browser?

To retrieve pages from a Web server and display them on your screen

For what would you use a personal information management (PIM) program?

To schedule appointments and meetings, store contact information, and manage tasks

For which of the following tasks can you use a Mail User Agent (MUA)?

To send e-mail messages

Which of the following activities would most likely be conducted by a network engineer?

To set up and maintain a network infrastructure

Why are audio and video files compressed before they are transferred across the Internet

To shorten the amount of time required to download them

Which of the following is responsible for ensuring that data packets are transferred quickly and reliably across a network?

Transmission Control Protocol/Internet Protocol (TCP/IP)

A LAN can be connected to the Internet by a router, provided that the LAN uses:

Transmission Control Protocol/Internet Protocol (TCP/IP).

Which of the following protocols was developed by the Internet Engineering Task Force (IETF) and is considered the successor to the Secure Sockets Layer (SSL) protocol?

Transport Layer Security (TLS) protocol

Which term is used to describe a program that appears to be harmless but actually produces malicious or harmful results?

Trojan

Which term best describes a collection of software tools that provide a permanent solution to known program bugs?

Update

Which of the following can be considered a site management task after a Web site becomes active?

Update dead links and remove unused pages.

What is the term for an individual who is responsible for creating the overview plan of a Web site's development?

Web architect

What is the term for a software application that enables users to access and view Web pages on the Internet?

Web browser

Which of the following is a Web-based seminar or training session that is typically interactive, enabling participants to communicate with the presenter and with each other via online chat?

Web conference

OGG files are smaller, download faster, and sound as good as other audio file formats.

What is the main advantage of the Ogg Vorbis (OGG) audio file format?

The file sizes are relatively small, resulting in shorter download times.

What is the main advantage of using vector graphics instead of raster graphics to create animations?

RTF is compatible with many operating systems and applications, including most Macintosh and Windows word processors.

What is the main benefit of using Rich Text Format (RTF)?

Storyboard

Which of the following is an element of an initial Web site plan?

Citing information you find on the Internet that you use in your own work

Which of the following is an example of ethical Internet behavior?

VoIP is voice information delivered in digital form as packets of data using Internet Protocol (IP).

Which of the following statements is true about Voice over IP (VoIP)?

Peer-to-peer network

Which term is used to describe a network in which each computer has both server and client capabilities?

Relative URL

Which type of URL gives an abbreviated path to a resource using the current page as a starting position?

Forward the message.

You want to send an e-mail message you received to another user who did not receive the original message. Which is the best way to do this?

The ability to gather information from customers at the beginning of a project, and keep project participants informed of the project's status can be considered:

a communication skill.

A SWOT analysis is:

a strategic planning method that can be used to evaluate the strengths, weaknesses, opportunities and threats in relation to an organization.

What is the term for software services that are provided over the Internet, rather than a company site?

cloud computing

You want to specify horizontal alignment for the content in a table row using a CSS property. Specifically, you want to move content over to the right. Which property and value pair would you use?

text-align="right"

During the closing phase of every project, the project manager should perform a formal project review with the project team. The project review provides an opportunity to:

test the product, evaluate performances and document lessons learned.

The most common form field used in designing Web forms is the:

text box

The project triangle consists of:

the time, money and scope that affect every project.

The level of secrecy offered by encryption is dependent on:

the type of encryption used and the size of the key.

Viruses that reside within the text of an HTML-formatted e-mail message are particularly virulent because:

the user need only receive the virus for it to cause damage.

How would the differences between viewing a Web page on a PC vs. on a smartphone impact a Web designer?

-Change the Size of the Screen -Cloud Commputting

To comply with many Web site requirements for added security, nearly all browsers support a minimum of:

128-bit encryption.

How many colors are specified in the browser-safe color palette?

216

Jose is working on a Web page for his company's intranet. He wants to insert an HTML comment within the page to let other developers know that the page validates as HTML5 and that he is the page author. Which line of code will insert the comment that Jose requires? *is html document

<!--Jose Shmoe, 2/14/2013. This code validates to HTML5-->

You want to create a hyperlink to a secure resource that ensures information is properly encrypted. You also want this link's code to validate as HTML5. Which line of HTML code will accomplish this?

<a href="ftps://www.CIWcertified.com"> Visit Our Secure Site </a>

Which line of HTML code creates a valid hyperlink on a Web page?

<a href="mailto:[email protected]"> Contact us now </a>

Consider the following HTML code: <a href="#targetArea1"> Top of the FAQ </a> Which of the following properly establishes the internal link anchor for the given code?

<a id="targetArea1"> <h1> FAQ </h1></a>

Hans is modifying an existing Web page that needs to validate as HTML5 code. He wants to create a round hotspot in an image map that will link to www.abc.com. Which code would Hans nest inside the <map> </map> container tags?

<area shape="circle" coords="75, 90, 34" href="http://www.abc.com" alt="ABC" />

Which line of code will validate as HTML5?

<area shape="rect" coords="0,0,75,75" href="home.htm" alt="home"/>

When creating an image map on a Web page, in which HTML tag would you place the target URL for a hyperlink?

<area>

Roberto is creating a Web page using HTML5. He wants to indent a quote on the page. Which element should he use to accomplish this?

<blockquote>

Which example demonstrates the proper tag for inserting an image in HTML5?

<img src="image.gif" alt="This is an image."/>

Which line of code creates a text box in a Web form that will validate as HTML5?

<input type="text" name="UserName"/>

Which of the following is a valid HTML reference to a CSS file?

<link rel="stylesheet" type="text/css" href="syb/syb.css" title="stylesheet"/>

Which container tag specifies a name for an image map and encloses empty tags that define the regions of the image map?

<map>

Which code example demonstrates a valid container or non-empty tag in HTML?

<meta/>

You are developing a Web page using HTML5 and CSS. You want to align a paragraph of text to the right side of the page. Which code uses the correct syntax for this style?

<p style="text-align: right">This text will align to the right</p>

Which of the following is a block-level element in HTML?

<p>

You are developing a Web page using HTML5 and CSS. You want to align a paragraph of text to the right side of the page. Which code uses the correct syntax for this style?

<style text-align="right ">This text will align to the right</style>

Which line of HTML code creates a scrolling text box that can display three rows of text that are each 30 characters long?

<textarea name="comments" cols="30" rows="3">

On your Web page, you want to create a table in which the left column header spans three rows. Which tag would accomplish this goal?

<th rowspan="3">

You want to embed video into your HTML5 Web page. Which code is best for accomplishing this?

<video width="360" height="270" controls="cpmtrp;s" poster="image.png"> <source src="video.mp4" type="video/mp4" /> <source src="video.web" type="video/webm" /> <source src="video.ogg" type="video/ogg" /> Your browser does not support the HTML5 video element. </video>

Which PIM program feature can be used to stream office events and prevent scheduling conflicts

A centralized electronic calendar

Call Center

A centralized office used for the purpose of processing a large volume of requests by phone

Server

A computer or program that manages access to a certified resource or service in a network.

Domain Name Server

A computer server that hosts a network service for providing responses to queries against a directory service.

Consider the following line from an HTML document: <title> Site Development Associate </title> This code shows an example of:

A container tag

streaming media

A continuous flow of data, usually audio or video files, that assists with the uninterrupted delivery of those files into a browser.

Statement Of Work (SOW)

A contract to initiate a project; the contract contains project goals and specifies how those goals will be met.

xDSL

A family of technologies that provide internet access by transmitting digital data over wires.

cookie

A file contains user information and tracks user activity.

Portable Document Format (PDF)

A file format that can be transferred across platforms and retain its formatting; designated by the file name extension .pdf.

What is a patch?

A file of programming code that is inserted into an existing executable program to fix a known problem, or bug

What is an update?

A file or collection of software tools that resolves system liabilities and improves software performance

Update

A file or collection of tools that resolves system liabilities and improves software performance.

Attachment

A file that is sent with an e-mail message.

attachment

A file that is sent with an e-mail message.

What is a local area network (LAN)?

A group of computers connected within a confined geographic area

Consider the following HTML code: <form> <p>Which skills can you offer a potential employer?</p> <input type="checkbox"name="Skills"value="HTML"/> HTML coding <input type="checkbox"name="Skills"value="GUI"/> GUI authoring tools <input type="checkbox"name="Skills"value="Design"/> Fundamental Web design <input type="checkbox"name="Skills"value="PMgmt"/> Project management <input type="checkbox"name="Skills"value="EComm"/> E-commerce solutions </form> Which type of form field does this HTML code create?

A group of square buttons from which users can choose multiple responses

In computer terminology, what is a network?

A group of two or more computers connected so they can communicate, share resources and exchange information with one another

What is a listserve group?

A group of users that subscribes to a mailing list

Backbones

A high speed, high capacity digital connection which forms the axis of a local or wide area network.

Gantt chart

A horizontal bar chart that graphically displays project tasks and durations.

Shared Domain

A hosting service that allows a company to host its domain name on a third party ISP server.

Co-location

A hosting solution that is characterized by a service provider that allocates space for your equipment but does not provide the server hardware?

What is a dead link?

A hyperlink that, when clicked, sends a Web site visitor to a page or resource that does not exist on the server

Web Page

A hypertext document on the world wide web.

How do you know if an email message including attachments

A icon and file

The process of encoding data to protect it

A key

Hash

A number generated by an algorithm from a text string. Also known as a message digest.

What is a wiki?

A page or collection of Web pages that can be viewed and modified by anybody with a Web browser and Internet access

Consider the following HTML tag: <area shape="rect" coords="0,0,10,20" href="home.htm" alt="home"/> In this tag, what is specified by the value of the href attribute?

A page that will load when a user clicks this hot spot on an image map

Digital-certificate

A password-protected, encrypted data file containing message encryption, user identification and message text. Used to authenticate a program or a sender's public key, or to initiate SSL sessions. Must be signed by a certificate authority (CA) to be valid.

Stakeholder

A person or group with an interest in a project, and with the power to exert influence (either positive or negative) over the project and affect results.

Mobile Computing

A person's ability to use technology while "on the go"

Resource

A person, department, or device needed to accomplish a task.

Nodes

A piece of equipment such as a PC or peripheral, attached to a network.

QuickTime

A plug-in developed by Apple Computer for storing movie and audio files in digital format.

extending a browser's capabilities.

A plug-in is useful for:

In databases, what is a one-to-many relationship?

A relationship in which a record in Table A can have multiple matching records in Table B, but a record in Table B has only one matching record in Table A

"Cloud"

A remote data center that is accessed over the Internet.

viewer

A scaled-down version of an application; designed to view and print files.

If you want to hide your work while you are away from your desk, well could you configure to launch when your computer is Idle?

A screen saver

What is a worm?

A self-replicating program or algorithm that consumes system resources

Worm

A self-replicating program or algorithm that consumes system resources.

What is a worm?

A self-replicating program or algorithm that consumes system resourceseplicating program or algorithm that consumes system resources

Project

A sequence of tasks that must be accomplished within a certain time frame to achieve a desired result.

What is a project?

A sequence of tasks that must be accomplished within a defined time frame to achieve a desired result

Markup Language

A series of commands used to format, organize and describe information on a web page.

Enterprise resource planning (ERP)

A service that provides the ability to automate the planning and operations of an entire organization.

What is a software patent?

A set of exclusive rights granted to an inventor for a fixed period of time upon disclosure of the invention

What is the Project Management Body of Knowledge (PMBOK) ?

A set of principles and techniques to help you manage projects

Internet Protocol

A set of rules governing the format of data sent over the internet or other network.

What is the World Wide Web?

A set of software programs that enables users to access resources on the Internet via hypertext documents

Which of the following services allows multiple companies, organizations or people to share portions of the same domain name?

A shared domain

Your company has a registered domain name. You decide to sell portions of the domain name and make it available to others. What does this scenario describe?

A shared domain

What is an anonymous FTP site?

A site that allows guests to download files without having an account on that site

Pop-Under Window

A small browser window that appears behind the browser window you are viewing.

pop-under window

A small browser window that appears behind the browser window you are viewing.

Pop-Up Window

A small browser window that appears in front of the browser window you are.

pop-up window

A small browser window that appears in front of the window you are viewing. (Such as advertisement, warning etc..)

Root Level Server

A small number DNS servers on the internet that contain the IP addresses of the top level.

What is a cookie?

A small text file that contains information sent between a server and a client to help track user activities

Personal Digital Assistant (PDA)

A small, handheld computer used for personal information management. The predecessor to the smartphone.

Personal digital assistance (PDA)

A small, handheld computer used for personal information management. The predecessor to the smartphone.

Which of the following devices can you use with personal information management (PIM) software to synchronize appointments and contact information that you keep on your desktop or laptop computer?

A smartphone

Multimedia on the Web has expanded rapidly as broadband connections have allowed users to connect at faster speeds. Almost all Web sites, including corporate sites, feature multimedia content and interactive objects. To view interactive multimedia online, you need which of the following

A sound card, speakers and a video card

Consider the following line from an HTML document: &#60;title/&#62;Site Development Associate This code shows an example of:

A stand-alone non-empty tag

Consider the following line from an HTML document: &#60;title/&#62;Site Development Associate This code shows an example of:

A stand-alone non-empty tag.

Musical Instrument Digital Interface (MIDI)

A standard computer interface for creating and playing electronic music. It allows computers to re-create music in digital format for playback.

File Transfer Protocol

A standard network protocol used to transfer files from one host to another over a TCP based network.

Uniform Resource Identifier (URI)

A standarized method of referring to a resource using a text string.

Presence

A status indicator that conveys a person's willingness and ability to engage in communications in real time

A collection of data

A table

Completely Automated Public Turing Test to Tell Computers and Humans Apart (CAPTCHA)

A test that uses a word-verification graphic designed to differentiate humans from automated senders during online transactions.

personal information management (PIM) program

A tool used to schedule appointments and meetings, store contact information, and manage tasks.

User name

A unique name or number that identifies you when logging on to a computer system or online service. In an e-mail address, the part before the @ symbol

A program that resides in activity and replicates itself another system just called

A worm

Stephen is creating a style sheet to format the pages on his company's Web site. He wants to make a header style that will stand out at the top of each page. For these sections, he specifies a blue background with white text. In his style sheet, what is the hexadecimal value he can specify for the text color of these page header sections?

#FFFFFF

HIT SEE MORE ALL THE WAY AT THE BOTTOM

(TOO SEE ALL OF THEM :D)

WAN

(Wide Area Network) A computer network in which the computers connected may be far apart, generally having a radius of half a mile or more.

Client

(in a network) A desktop computer or workstation that is capable of obtaining information and applications from a server.

You are likely to need skills with Web-based technologies for various job-related tasks, including:

-Informing colleagues about progress on team projects. -Using or contributing to the company intranet. -Working with customers online. -Posting or retrieving résumés. -Gathering information from customers or community members about their interests. -Obtaining information from social networking activities.

What are the differences between viewing a Web page on a PC vs. on a smartphone?

-Screen Size -The Use of Cloud Commputting

Electronic Mail Protocol

...

Which address instructs the browser to look for a directory named mysite that exists one level higher than the page you are currently viewing?

../mysite/index.html

Consider the following address: http://www.CIWcertified.com/courses/iba.htm Which part of this address represents the domain name?

.CIWcertifed.com

Which video file format is for Windows platform

.avi

Virus

A malicious program that replicates itself on computer systems, usually through executable software, and causes irreparable system damage.

In which database table relationship type is a junction table a necessary component?

A many-to-many relationship

Which of these HTML elements is considered a text-level element?

<br>

Which HTML element will make Web page text appear in italic type when displayed in a browser?

<em>

Samantha is creating a Web page using HTML5. The page uses image-based navigation buttons. To help ensure accessibility, Samantha wants to add text-based navigation to the page. Which HTML5 element should she use to accomplish this?

<footer>

Approximately how many numeric IP addresses are possible with IPv4?

4 billion

Which of the following is an example of correct HTML tag nesting?

<h1><em> Site Development Associate </em></h1>

It is important to install updates to e-mail clients to minimize security breaches. You can install updates to support a higher level of encryption because some e-mail clients default to:

40-bit encryption levels.

How many heading styles are defined for HTML?

6

Which of the following refers to a family of specifications for wireless network technology?

802.11 standards

Which choice lists the two principal methods of connecting to the Internet through an Internet Service Provider (ISP)?

: Dial-up connection and direct connection

Which line of HTML creates a valid hyperlink to the target named "targetArea2"?

<a href="#targetArea2"> Top of the FAQ </a>

Marcel is inserting images into an HTML page. When he previews the page, the images render well. But when he tries to validate his page, the code will not validate. Which image-insertion tag and attribute are required in order for Marcel's HTML5 page to validate without error?

<img> tag, alt attribute

Which HTML code will produce a Web-user form field that offers the user round buttons with mutually exclusive choices? <select name="Certifications">

<input type="radio"name="Certifications"value="Associate"/> CIW Web Foundations Associate <input type="radio"name="Certifications"value="Professional"/> CIW Web Design Professional

Consider the following code for a text box in a Web form: <input type="text" name="UserName"/> Which modified tag should you use if you want the text box to appear with default text that reads "Enter Name Here"?

<input type="text" name="UserName" value="Enter Name Here"/>

Which of the following would you enter in a search engine to locate Web pages containing information about a topic?

A keyword

Consider the following HTML code: <input type="file"name="File"/> What does this code create on a Web form?

A Browse button so users can select and upload files to your site

Your company Web site uses a Web form to collect data from a user. The user has entered data into the form fields and will soon click the Submit button, then the data will be sent to a database. Which of the following passes information from the Web form to the database server?

A CGI script

Consider the following line from an HTML document: <title> Site Development Associate </title> This code shows an example of:

A Container Tag

What would you be conducting if you delivered training via a PowerPoint presentation over the Web?

A Webinar

Packets

A block of data transmitted across a network.

Header

A block of information attached to a piece of data. The first part of a network packet. Can contain network addressing information or additional information that helps computers and applications process data.

Trackback

A blogger receives notification when other bloggers link to his or her blog entry

You need someone to supply a Web server, bandwidth, and advanced Web and database connectivity. You have the necessary site designers, but you do not have a systems administrator available. Which of the following can best help you?

A cloud service provider

Blog

A collection of personal thoughts posted on a public website

Emoticon

A combination of characters that, when read sideways, helps convey emotion in an e-mail message.

Modem

A combined device for modulation and demodulation.

codec

A compression/ decompression algorithm used by modern video and audio player plug- ins.

Network Interface Card

A computer hardware connecting it to a computer network.

Internet

A computer network consisting of a WorldWide network of computer networks that use TCP/IP network protocols to facilitate data transmissions.

An end user has just entered his authentication information into a browser. The site has automatically stored this information on the end user's hard drive. The site has also stored this user's preferences, so that the next time he visits the site, his user name and preferences will be automatically retrieved. What is most often used to store this information on the hard drive?

A cookie

Point to point protocol

A data link protocol commonly used in establishing a direct connection between two networking nodes.

Router

A device that forwards data packets to the appropriate parts of a computer network.

Gateways

A device to connect two different networks, esp, a connection to the internet.

Which of the following does Secure Sockets Layer (SSL) use to authenticate a user or system before encrypting a session?

A digital certificate

A web search and which the search engine displays a list of categories and subcategories that you can browse by clicking the link is called

A directory search

Project schedule

A document that lists the planned dates for performing tasks and meeting goals defined in a project plan.

Which Internet resource is used to resolve domain names to IP addresses?

A domain name server

Assumption

A factor that is considered to be real or certain for planning purposes.

What is a project constraint?

A factor, such as budget or time, that limits a project manager's options

Constraint

A factor, such as budget or time, that limits a project manager's options.

Digital Subscriber Line (DSL)

A family of technologies that provide internet access by transmitting digital data over wires.

binary files

A file containing data or instructions written in zeros and ones

You have an account on Flickr (www.flickr.com) and have categorized your photos by adding tags to them. Users can now browse Flickr and gain access to your photos as long as the tags for which they search match the tags you have applied. What have you created?

A folksonomy

Screen saver

A graphic or moving image that appears on your screen when your computer is idle.

Joint Photographic Experts Group (JPEG)

A graphical image file format commonly used for photographs.

Graphics Interchange Format (GIF)

A graphical image file format commonly used in HTML documents.

Which definition best describes a network?

A group of computers connected so they can communicate, share resources and exchange data

What is an end-user license agreement (EULA)?

A legal contract between the author of software and the end user that defines how the software can be used

The <br/> tag defines:

A line break

Web Site

A location connected to the internet that maintains one or more web pages on the world wide web.

Which of the following is a common advantage of cloud computing?

Cost reduction

Extensible Markup Language (XML)

A metalanguage that describes the function and context of the information contained in a document (doesn't format pages). It is a simplified version of SGML. It allows data to be interchanged with all types of applications.

Standard Generalized Markup Language (SGML)

A metalanguage that is used to create other languages.

Pretty Good Privacy (PGP)

A method of encrypting and decrypting e-mail messages. It can also be used to encrypt a digital signature.

Which of the following accurately describes a difference between a mobile app and a mobile Web site?

A mobile app is faster because it does not necessarily use the browser.

What is a peer-to-peer network?

A network in which each computer has both server and client capabilities

peer-to-peer network

A network in which each computer has both server and client capabilities.

Extranet

A network that connects enterprise intranets to the global Internet. Designed to provide access to selected external users.

What is a hash?

A number generated by an algorithm from a string of text

Network

A number of interconnected computers, machines, or operations.

What is P2P?

A peer-to-peer network on the Internet

Napster was an example of what

A peer-to-peer network that uses a server

Trojan

A program disguised as a harmless application that actually produces harmful results.

What is a plug-in

A program installed in the browser to extend its basic functionality

plug-in

A program installed in the browser to extend its basic functionality. Allows different file formats to be viewed as part of a standard HTML document.

What is a trojan?

A program that appears to be harmless but actually produces harmful results

Firewall

A security barrier that controls the flow of information between the Internet and a private network. A firewall prevents outsiders from accessing an enterprise's internal network, which accesses the Internet indirectly through a proxy server.

What is a firewall?

A security barrier that prevents unauthorized access to or from private networks

Encryption

A security technique designed to prevent access to information by converting it into a scrambled (unreadable) form of text.

A program installed in the browser to extend its basic functionality

A self-contained program that can be run anywhere on a network, including within a browser from the Internet

Internet control messaging protocol (ICMP)

A subset of Internet Protocol that is most often used to determine whether a computer can communicate with the rest of the network.

What is a Boolean operator?

A symbol or word used in Internet searches to narrow search results by including or excluding words or phrases from the search criteria

Which of the following is used in many programming languages to help end an infinite loop?

An break statement

Crowdsourcing

A task ordinarily performed by one person is outsourced to a large group or community

Cascading Style Sheets (CSS)

A technology that allows greater style definition and formatting control of HTML elements. Formatting can be placed within the HTML or called remotely from an external style sheet.

What is a convergent network?

A telephone network that can transport network-based data

CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)

A test that uses a word-verification graphic designed to differentiate humans from automated senders during online transactions.

Cookie

A text file that contains information sent between a sever and a client to help maintain state and track user activites. It can reside in memory or on a hard drive.

When conducting a Web development project meeting, why might it be useful to have a third party deliver a summary of progress?

A third party may help ensure clarity in meetings that include technical and non-technical participants.

Wizard

A tool that assists users of an application in creating documents and/or databases based on styles and templates. Also a tool that guides users step-by-step through a software installation process.

lossless compression

A type of data file compression in which all original data can be recovered when the file is decompressed.

lossy compression

A type of data file compression in which some file information is permanently eliminated.

A person in which job role would be responsible for developing an implementing plans to take advantage of sales opportunities available through the Internet

A web marketing manager

What is the Internet?

A worldwide network of interconnected networks

What distinguishes a worm from a virus?

A worm is capable of replicating itself automatically while affecting data.

What specific information would you need to obtain from an ISP or cloud service provider whose hosting services you wanted to use?

Account information, IP addresses, DNS server names, and file and directory location instructions.

You have been assigned to develop a mobile version of your company's Web site. First, you eliminate all banners and advertisements from the site pages. What else can you do to optimize the site for mobile users?

Add white space to page designs.

Where is the slash ( / ) character placed in a stand-alone non-empty HTML tag?

After the element name (before the closing wicket)

Most browsers are able to save

All images, fonts, and scripts referenced by the HTML on a page

Community Blog

All participants express their perspectives without any attempt at coming to a consensus

During a meeting to plan a new Web site, whose input must one obtain?

All stakeholders, but no representatives.

Which statement accurately explains case sensitivity in HTML documents?

All tags except <!DOCTYPE> should be typed in lowercase letters.

You have added an image to your Web page using the following code: <img src="family.png" height="100" width="150"/> When you load the Web page in a browser, the image appears distorted. All the people's faces in the image appear elongated. What can you do to resolve this problem?

Alter the value for the height attribute.

dynamic

Always changing.

Internet Assigned Numbers Authority (IANA)

An American corporation who oversees global IP address allocation, Autonomous system number allocation, root zone management in domain name system, and other Internet protocol related things.

A numbered list is considered to be:

An Ordered List

Consider the following line from an HTML document: Site Development Associate<br> This code shows an example of:

An empty tag

Webinar

An interactive Web-based seminar or training session.

A numbered list is considered to be:

An ordered list

What is an Internet Service Provider (ISP)?

An organization that maintains a gateway to the Internet and rents access to it

A bulleted list is considered to be:

An unordered list

A member of your IT team has updated the firewall. The project included creating a duplicate firewall for testing. This testing process took four hours. A code review to verify that the update was safe was also necessary. Another two hours were spent installing and testing the update on the live firewall. Your project manager has been asked by upper management to justify the cost of creating a duplicate firewall. Which is the most appropriate explanation to provide to upper management?

An unsuccessful, untested installation would have caused significant network down time.

tab

Another instance of a browser window within a browser.

How do most current e-mail clients display an attachment in an e-mail message?

As a separate link, such as an icon

Which term describes the appointment of a specific resource to a specific task?

Assignment

If your organization scans e-mail attachments to ensure that they contain no malicious code, where does the scanning take place?

At the e-mail server

What is the term for a file that is sent with an e-mail message?

Attachment

You supervise the Web development team for your company. As your team is redesigning the company site, you need to make decisions about various issues, including acceptable color combinations, sales strategies and target markets. Other departments and individuals in your company will have important input that you need to include. Which step should you take?

Attend a branding standards meeting.

Successful Web sites are also aimed at a distinct,

Audience

AU

Audio file format used by UNIX servers, the majority of Web servers. Most Web browsers can read AU.

What is the relationship between encryption and authentication?

Authentication occurs before an encryption session can begin, but authentication does not ensure that the ensuing session will be encrypted.

Which two authentication types require a user name and password?

Basic authentication and secure authentication

Why is it preferable to use <strong> in lieu of <b> to apply the bold text style?

Because <strong> can be used both to denote bold text when printed and strongly spoken text when output through an audio device

Why is it preferable to use <strong> in lieu of <b> to apply the bold text style?

Because <strong> can be used both to denote bold text when printed and strongly spoken text when output through an audio device.

If you're logged on to Windows live messenger, why would you be unable to engage in an instant message session with your brother, who was logged on his AOL Instant Messenger account?

Because I will instant message her and Windows live messenger is use their own proprietary protocol

HIT SEE MORE AT THE BOTTOM*** (TO SEE ALL OF THEM)

BUT PREPARE FOR LAG IF YOU HAVE A BAD COMPUTER OR IF YOUR ON MOBILE**** [RIP]

High-speed dad aligns that handled a bowl of data transmission and form the main network connections on the Internet are known as:

Backbones

There are always trade-offs when trying to enforce secure browsing practices. What is usually the key to maintaining employee productivity and preventing frustration in the IT department?

Balance

You use the W3C Link Checker program to automatically check your site's hyperlinks. Why is it advisable to check hyperlinks manually at times?

Because even if a link is valid, content on either the target page or the page with the link might have changed

Why should you avoid placing paragraph breaks around heading styles in your HTML code?

Because heading styles are automatically preceded and followed by paragraph breaks.

Which aspect of program management typically includes maximizing revenue, maximizing efficiency, minimizing cost and eliminating waste?

Benefits management

If you want to specify default text for a text area box, where should you add the text that will appear as default text?

Between the <textarea> tags

Which of the following do end users most commonly download from FTP sites?

Binary files

Which of the following search engines uses your social network (Facebook and Twitter) to find more relevant information for your query?

Bing

You are an avid user of Facebook and Twitter. Which of the following search engines accommodates social networking to find more relevant information for your queries?

Bing

Which of the following are typically an example of secondary resources?

Biographies

Which term is used to describe a collection of personal thoughts posted on a public Web site?

Blog

What is one reason blogging has become so popular and prevalent?

Blogs have become a form of intellectual stimulation as well as entertainment.

To make Web browsing easier, you can save URLs and hyperlinks that access particular Web sites to avoid the need to manually type URLs each time you want to access the sites. What is the term for these saved links in Mozilla Firefox?

Bookmarks

To make web browsing easier, you can save URLs and hyperlinks that access particular web sites to avoid the need to manually type URLs each time you want to access the sites. What is the term for these saved links in Mozilla Firefox?

Bookmarks

What is the purpose of Bookmarks and Favorites?

Bookmarks and Favorites allow you to save frequently accessed URLs in your browser for quick reference.

What will Internet search results contain when you use the AND Boolean operator in a two-keyword search string?

Both keywords

Toshiba wants to sell products to customers from its main corporate Web site. As a result, a Web site you helped develop has been used to transfer information between your company and an office belonging to Toshiba, Inc. Which type of e-commerce model is the Web site you developed based upon?

Business to business (B2B)

Your company currently uses its corporate Web site to help manage contacts and guide customers to its stores. Your company's leaders want to begin selling products to customers from the corporate Web site. Which type of e-commerce model is the proposed corporate site based upon?

Business to consumer (B2C)

How do proxy servers increase the corporate network's Internet access speed?

By caching Web sites for the entire network

How do proxy servers increase the corporate networks internet access speed?

By caching web sites for the entire network.

How are wide area networks (WANs) created?

By connecting LANs to one another via public carriers

Tagged Image File Format (TIFF)

Commonly used graphic file format, developed by Aldus Corporation; uses the .tif or .tiff file name extension..

Web feed services

Content publicly available to users via Web feeds (ex RSS, Atom); syndication

Which of the following is a sensible method of reducing spam submissions to Web forms you create?

CAPTCHA

Which of the following skills is important to your job as an IT professional but is often under emphasized?

Communication skills

What is the term for the process, tools and techniques that help people implement changes to achieve a desired outcome?

Change management

How does scope creep undermine the success of a project?

Changes in project scope tend to occur in small increments, and these small increases in scope can add up and compromise the success of the project.

Which Web form field allows users to choose from among two or more non-exclusive options?

Check box

Paperclip

Cheryl just started using a new e-mail client on her laptop computer. She wants to send an e-mail message with an attachment, but she does not see a button labeled "Attachment" on the client interface. What icon is commonly used on e-mail clients to invoke the Attachment option?

In the business ontology model, the highest ranking corporate in charge of the total total management of an organization is the:

Chief Executive Officer (CEO)

To avoid plagiarizing

Cite information

Peer-to-peer networks on the Internet (P2P)

Companies increasingly want to allow employees to share files directly without having to maintain servers to provide FTP access. Which technology can companies use to maximize processing power while protecting privacy and sensitive materials?

What is lossless compression

Compression in which all the original data can be recovered when the file is decompressed

Web Accessibility Initiative (WAI)

Concerned about disabled people needing to be able to use development tools.

Which process helps you to obtain current info about available,relevant jobs in your area most quickly?

Conduct a search on a job seeker site

Which method will ensure that your team gets high-quality, reliable, private feedback from trusted sources?

Conducting In-Person Surveys

You are developing pages for your company's Web site. You want to ensure accessibility for all users, including those with disabilities. Which type of content is most likely to cause problems for those with neurological disorders?

Content that flashes, flickers or strobes

Which of the following best describes the role the education plays in IT industry careers?

Continual study is necessary to keep your skills current because IT technologies change so rapidly

You want to create an internal hyperlink in you Web page. Which choice describes the two steps you must perform?

Create an anchor, then create a link that points to the anchor.

Which of the following is a common use for JavaScript on the client side?

Creating cookies

When Web users enter the URL www.CIWcertified.com in their browser address bar, they can access the official CIW Web site at the IP address 72.44.192.233. Which technology enables users to do this, instead of having to remember and enter the IP address?

DNS

What is contained in the browser cache?

DOWNLOADED FILES

Which of the following statements is true about Digital Subscriber Line (DSL)?

DSL is similar to Integrated Services Digital Network (ISDN) lines, but DSL is much faster.

Which statement best describes DSL?

DSL stands for Digital Subscriber Line, a direct Internet connection method that uses digital phone lines and an xDSL modem.

What is the purpose of a search engine ranking system?

DETERMINE HOW CLOSELY A SITE MATCHES THE TOPIC YOU ARE SEARCHING

What is data modeling, and what are the two types of models within a data model?

DETERMINING REQUIREMENTS A DATABASE MUST HAVE TO FUNCTION PROPERLY; HAS CONCEPTUAL MODEL AND LOGICAL MODEL

What are E carriers?

Dedicated digital telephone lines used in Europe

What are T carriers?

Dedicated digital telephone lines used in North America

You receive a text message on your cell phone from an unknown number. The message includes an attachment. You try to call the number but you get no answer. What is the best action for you to take next?

Delete the message without opening the attachment

You receive a text message on your cell phone from an unknown number. The message includes an attachment. You try to call the number but you get no answer. What is the best action for you to take next?

Delete the message without opening the attachment.

You are developing open-source software based on existing source code developed by someone else. What is the term for the piece of software you develop?

Derivative work

Needs analysis

Determining a customer's needs by acquiring information, processing and evaluating the information, then creating a plan of action to address the needs.

Web Content Accessibility Guidelines (WCAG)

Developed by the Web Accessibility Initiative (WAI) to provide a universal set of standards promoting accessibility.

Which of the following activities would most likely be conducted by a help desk technician?

Diagnose and resolve users' technical hardware and software problems

What is the term for a password-protected, encrypted data file that can be used to authenticate a program?

Digital certificate

Which of the following most of browser have an order to begin a SSl session

Digital certificate

Which of the following is an appropriate use of e-mail in a business environment?

Discussing the status of a project with co-workers

What is the term for storage space on a computer hard disk used to temporarily store downloaded data

Disk cache

You can use the <pre> tag to:

Display preformatted tabular data if you have no time to format it

You can use the <pre> tag to:

Display preformatted tabular data if you have no time to format it.

Which statement best describes an E3 connection?

E3 is the European equivalent of a T3 Internet connection.

Consider the following portion of HTML code for creating a table: td, th { padding:6px; border-spacing:2px; }

Each cell will have 6 pixels more than the default of space between the content and the cell border.

Which would most likely be a factor of the properly managed IT project

Employee productivity loss is minimized

Your company has been getting complaints from its suppliers saying that its extranet site does not render correctly in all their employees' browsers. The suppliers want the extranet site to be fixed so that everyone can access it, regardless of browser type. When examining this problem, your Web Development manager finds that the many developers who worked on the site all used whatever HTML code version they knew best. What can the Web development team do to resolve this?

Edit the code so that it follows a single W3C HTML standard.

You need to pay an Internet Service Provider (ISP) for services rendered. Which payment technology would you use?

Electronic Funds Transfer (EFT) EFT is a generic term that describes the ability to transfer funds using computers, rather than using paper. Both Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are technologies used to encrypt information; they are used with payment technologies but they are not payment technologies themselves. A payment gateway is a system that mediates between a merchant and the merchant's bank.

What is the term for a combination of characters that you read sideways that helps convey emotion in an e-mail message?

Emoticon

Which of the following is considered a disadvantage of an organization's practice of monitoring their employees' e-mail messages and restricting their access to certain Web sites?

Employees may be denied access to legitimate Internet resources that may help them do their jobs.

Ajax

Enables web applications to interact with users in much the same way they do with desktop applications

What is ciphertext?

Encrypted data

You are a network administrator for your company. When establishing the company encryption policies, you must determine the risk of sending unencrypted data based on the nature of the data and its risk to the company if obtained by unauthorized users. Much of the data your company sends is proprietary and sensitive in nature, so you determine that encrypting company transmissions is critical. What is the disadvantage of your decision to encrypt company transmissions?

Encrypting transmissions slows communication because each data packet must be encrypted and decrypted.

Which of the following can protect your company's data, prevent data from being intercepted by malicious outsiders, and deter hackers?

Encryption

Which term is used to describe the process that converts data into an unreadable form of text?

Encryption

A digital signature verifies the identity of the sender and provides data integrity. Which of the following does it also do?

Enforces non-repudiation

Which of the following improves the quality of a product by providing independent verification that project tasks were completed correctly?

Engaging in the separation of duties

Ethics is the study of making proper choices to ensure that other people's rights are not violated. When creating markup code and designing Web pages, which of the following is an ethical point you should follow?

Ethics is the study of making proper choices to ensure that other people's rights are not violated. When creating markup code and designing Web pages, which of the following is an ethical point you should follow?

Your company's intranet Web server has crashed. You must help re-create the server. A server administrator has copied a CGI script from last night's backup tape. The server is an exact duplicate of the server that just crashed. However, this script will not process information on the new server. What is most likely the problem on the server?

Executable permissions have not been set correctly.

Which project management phases technically occur concurrently

Executing and controlling

Which activity is most likely to be necessary during a Web site planning meeting?

Explaining branding issues to members of the Web development team

Which activity is most likely to be necessary during a Web site planning meeting?

Explaining capabilities of the Web server and database to the marketing team & branding issues to members of the web development team.

To make Web browsing easier, you can save URLs and hyperlinks that access particular Web sites to avoid the need to manually type URLs each time you want to access the sites. What is the term for these saved links in Windows Internet Explorer?

Favorites

To make web browsing easier, you can save URLs and hyperlinks that access particular web sites to avoid the need to manually type URLs each time you want to access the sites. What is the term for these saved links in windows internet explorer?

Favorites

Once your site is live, your Web team will receive various kinds of ________ from customers and stakeholders.

Feedback

Which of the following connection types provides the fastest direct connection speed?

Fiber-optic cable

Internet resources can be used for a variety of purposes beyond the World Wide Web and e-mail. Which of the following can you use transmit larger files?

File Transfer Protocol (FTP)

As a novice Web developer, you have been asked by your partners to create a Web site for your new business venture to ensure that your potential customers are able to find your business over the Internet. Which of the following would prove most helpful to you in your endeavor?

Find Web development training, tips, tricks and advice from appropriate courses, online tutorials, user groups, professional trade journals, scholarly writings, and reference books.

Text messaging

For which of the following is the Short Message Service (SMS) communication protocol required?

IMAP server

For which type of server -- used by your e-mail client -- is it especially important that you archive e-mail messages to your local hard drive?

Which of the following e-mail response options should you use to send an e-mail message to users who did not receive the original?

Forward

You want to send an e-mail message you received to another user who did not receive the original message. Which is the best way to do this?

Forward the message.

implement technologies that will control access and password-protect files.

Frankie works on the IT team at her company. She is looking for ways to reduce costs, so she suggests that the company uses P2P to facilitate sharing of information, instead of maintaining servers with FTP access. To protect its confidential data while benefiting from P2P, the company should:

In which type of keyword search can you enter any search string in a search engine to query an index?

Full-text search

Which of the following enables users on different e-mail systems to exchange messages?

Gateways

Your manager has requested that you modify the company's Web site to display the location of site visitors. Which HTML5 API allows you to accomplish this?

Geolocation

Which of the following protocols is used to transfer Web pages from a Web server to a Web client?

Hypertext Transfer Protocol (HTTP)

Which of the following search engines was the first to determine a site's relevance based upon the number of links that point to it, in addition to ranking its relevance according to keywords you enter?

Google

You are leading a project that will collect vast amounts of data, which will need processing. In your research, you learn about a technology in which volunteers can install a small application on personal computers to receive, process and return information to your organization. Using multiple systems to process large amounts of data in this way will be less expensive than using a single supercomputer to conduct this same task. Which term describes this technology?

Grid computing

Briefly describe the client/server model

HOW COMPUTERS CONNECT TO EACHOTHER

HTML comes in several versions. Which HTML version includes the Transitional, Strict and Frameset "flavors?"

HTML 4.01

Which encryption method provides data integrity because, even though encrypted data is not decrypted, you can verify whether the data was altered after encryption?

Hash encryption

Which of the following should you use to encrypt and decrypt digital signatures, and to protect passwords from disclosure?

Hash encryption

Which term describes an encryption method in which a number generated by an algorithm from a string of text is used to verify the integrity of transmitted data

Hash encryption

Which HTML heading style renders text the same size as normal text?

Heading level 4

Moving Picture Experts Group (MPEG)

High-quality audio and video file compression format.

Audio Interchange File Format (AIFF)

High-quality audio format developed by Apple Computer.

Pixels, which are measured in bits, provide some amount of color information. Which statement is true regarding higher bit depths?

Higher bit depths result in more intense or realistic colors, and an increased file size.

The default or starting page of a Web site is called the:

Home Page

Which of the following is an accurate description of cloud computing?

Hosted applications and services offered by a third party and run almost entirely from one or more servers that reside on the Internet

By encrypting and decrypting information transmitted to and from Web servers

Hypertext Transfer Protocol (HTTP) can be run over Secure Sockets Layer (SSL) to create the HTTPS protocol. How does HTTPS make HTTP transmission more secure?

A programming method that isolates a particular application or process

In reference to the elements of a Web browser, what is a sandbox?

Consider the following HTML code from a page that resides on a Web server: <a href="/pages/index.html"> CCYP Home </a> According to this code, where does the file named index.html reside on the server?

In the "pages" directory, which resides off of the server's root directory

Which is the most appropriate question to ask a potential employer regarding your resume?

In what format do you want it in?

Which is the most appropriate question to ask a potential employer regarding your resume?

In what format do you want it?

You are creating a table on a Web page for your company's Web site. Your Web team leader has directed you to add more white space within the table cells so that content does not appear crowded. How can you accomplish this?

Increase cell padding

You should schedule meetings with project stakeholders and management during the executing and controlling phases of a project to:

Inform them of progress and to handle issues they raise that may affect project scope.

Which organization is responsible for codifying copyright law as it applies to digital information?

Information Infrastructure Task Force (IITF)

What is the term that refers to the management and processing of information using computers and computer networks?

Information Technology (IT)

Using a linked style sheet, you have modified the look and feel of an HTML page. You noticed that the rules you applied remain in force unless explicitly overruled using other styles. Which term describes this phenomenon?

Inheritance

When creating a Web site, you must consider ____________ _______ issues related to ideas, products and images that are widely available.

Intellectual Property

Which term collectively refers to industrial property and copyrighted works?

Intellectual property

What is the name of the international community of network designers, operators, venders and researchers concerned with the evolution of the Internet architecture and the smooth operation of the Internet?

Internet Engineering Task Force (IETF)

Which statement most accurately describes the CSS "text-align" property used with the <table> element?

It aligns text horizontally.

What is the purpose of the History folder?

It allows you easy access to previously viewed Web pages.

What function does a list server perform?

It automates the collection and distribution of messages from an authorized group of participants.

What does anti-virus software do?

It detects viruses by recognizing patterns called signature profiles, then immediately disinfects your hard drive.

You used the a:link link state in the anchor (<a>) element of a CSS file. What does this link state do?

It determines the color of unvisited hyperlink text.

Which CGI technology uses the Java programming language to process data received from a Web form?

JSP

Which of the following languages in an object-oriented programming language developed by sun microsystems that is often used when data needs to be shared across a network

Java

Event driven scripting language

JavaScript

A file attachment with an .exe extension may contain malicious code.

Josh is expecting a very important file from a co-worker in a remote office to be sent to him through e-mail, but he has not received the file. He calls the co-worker, who informs him that she sent the file yesterday and will send it again immediately. Josh still does not receive the e-mail message, so he contacts Technical Support. They find the e-mail from the co-worker in the spam folder of Josh's e-mail client. It has an attachment named salesnumbers.exe. What is the most likely reason that the e-mail message was filtered out?

The URL displayed in the browser's Address bar will update with each link that is clicked.

Ken has been asked to test a newly developed Web site. Part of the test plan requires him to verify that all links within the site work properly. In addition to verifying that clicking a link navigates to the appropriate Web page, what else will he observe?

Which of the following would a search engine use to reference a Web site?

Keyword

You access a search engine and enter the words "African" and "safari" in the search box. The search engine returns links to Web sites in its index that include these words. Which type of search index did you use?

Keyword index

A search engine database contains titles, URLS and short descriptions for registered Web pages. What else would the database most likely contain?

Keywords

A text string - identify relevant URLs called

Keywords

Your company's strength is marketing and sales. Your production team is assigned to rebrand the content obtained from an independent author so your sales team can sell it under your company's name. The author's original work is protected under her legal ownership. So your project manager obtains permission from the author to use her work, in exchange for a royalty fee and a contributor credit in the book. Which term describes this permission arrangement?

License

You download a file with the unusual file name extension of ".wow." When you attempt to open this file, Windows displays a message indicating that it does not know how to open this particular file type. Which of the following determines a document type and the application required to open it?

MIME

Briefly describe a relational database.

MULTIPLE TABS OF INFORMATION THAT ARE RELATED THROUGH COMMON FIELDS

What is the term for an e-mail server program that receives sent messages and delivers them to their proper destination?

Mail Delivery Agent (MDA)

Your Web team is developing a new site, and you have been assigned to create a test Web server. Your manager calls this a "staging server." Which of the following is a standard procedure for a test server?

Make sure that the CGI software is identical to the live production server.

You want to create a new Web site that contains content and scripts from other Web sites and blend them in an innovative fashion that you have yet to see in any other site on the Web. Which term describes your proposed Web site?

Mashup

What is the term for an individual who develops Web sites and/ or applications for devices such as smartphones and tablets?

Mobile application developer

What is the term that refers to a person's ability to use technology while "on the go"?

Mobile computing

Which of the following is open-source software?

Mozilla Firefox

Which server type provides text output that users can access at their convenience and also allows multi-person input?

News server

Which of the following would be considered a popular resource as opposed to a scholarly resource?

Newsweek

What document keeps partner companies from reveling trade secrets?

Non-Disclosure Agreement (NDA)

What is the term for the programming concept in which a program is handled as a collection of individual items that perform separate functions, rather than as a sequence of statements that performs a specific task

Object-oriented programming

Before making any changes to an active Web site, you should:

Obtain a consensus of opinion about changes from customers, upper management, sales, and marketing, then obtain appropriate stakeholder approval.

Your Web development team manager has directed you to make several changes to a Web page. Accordingly, you created a link from your page at www.habitat.org/ccyp.html to a story on a separate Web site not owned or run by your organization. Which step must occur before you make this change public?

Obtain permission from the site's owner to publish this link.

Which type of plug-in installation requires the user to download the plug-in file, quit the browser and start the installation file

Offline installation

What is the term for the system of how a particular knowledge domain, or system, is organized?

Ontology

Which of the following enables an operating system to access databases from various vendors?

Open Database Connectivity (ODBC)

You want to look at multiple Web sites simultaneously and follow different paths of hyperlinks in each site. What is the easiest way to accomplish this in current Web browsers?

Open multiple windows in one browser and use tabbed browsing.

Which type of online resource is one in which content is subject to review by anyone?

Open peer-reviewed

Internet Service Provider (ISP)

Organization that offers user access to internet and related services.

Which of the following e-mail features was designed for users with dial-up accounts who want to work offline and accumulate messages, then connect to the Internet and send all their queued messages at once?

Outbox folder

Along with goal, what should be done during wireframing.

Outline the development process and site navigation, and identify required technologies.

Which IT job role best describes an individual who installs, modifies and repairs personal computer hardware components?

PC repair technician

A user has just clicked the OK button on a Web form. Which technology is often used to process information sent from the form?

PHP PHP Hypertext Preprocessor (PHP) is a technology used to process information sent from a Web form to a Web server.

www.

Part of the URL that contains the Name of the server on which the page resides.

Which term is used to describe a network in which each computer has both server and client capabilities?

Peer-to-peer network

What are project stakeholders?

People or groups that can exert influence over the project and affect results

Brea opened an e-mail attachment and it launches a virus. Even after running anti-virus software, the damage is extensive and she will have to reformat her hard drive. Which step, if she had taken it prior to being attacked, would have reduced the impact to her productivity?

Performing regularly scheduled backups so that she can reload all files if lost or damaged

A firewall can perform which task?

Prevent unauthorized access to proprietary data on an intranet

Return On Investment (ROI)

Profit earned as a result of a project relative to the value of resources required to complete it.

Patch

Programming code that provides a temporary solution to a known problem, or bug.

object-oriented programming (OOP)

Programming concept based on objects and data and how they relate to one another, instead of logic and actions; C++ and Java are OOP languages.

Plan and schedule meetings with team members.

Project schedule

Which of the following is a document that lists the planned dates for performing tasks and meeting goals defined in a project plan?

Project schedule

Project managers must balance three elements that compose the project triangle. You are a project manager who is halfway through a project when your customer contacts you to say that he has been authorized to provide additional funds for the project. How will this most likely affect other elements of the project?

Project scope will increase.

How do projects differ from ongoing work operations?

Projects are temporary and unique.

Which of the following practices is considered good netiquette?

Proofreading and checking spelling before sending an email message

To what does "The Right to Be Forgotten" argument relate?

Protecting your image and personal information in the world of social networking

The <meta> tag can be used in Web pages for which purpose?

Providing search engines with a description of the Web site

You have been asked by your project manager to use stock photographs on your company's Web site. What must you do in order to use them?

Purchase a license from the agency with whom photographers have filed their photographs.

Which of the following is an effective way for Web site owners to prevent typosquatting?

Purchase domain names that are similar to their actual domain names

Which of the following has become the most common asymmetric encryption algorithm, and is included in Web browsers and many other products?

RSA algorithm

Which of the following can you use to view headlines and updates from your favorite Web sites without the need to open your Web browser or visit any Web sites?

RSS and Atom

What is the most efficient way to distribute this info to the appropriate audience?

Re-create your resume in HTML and post it on the web for easy keyword searching

event-driven

Reacting to particular user actions or the browser's completion of a specific task.

What is the term for a collection of information consisting of one or more related fields about a specific entity, such as a person, product or event?

Record

What is the term for a field in a related database table that refers to the primary key in the primary table?

Record

Hexadecimal

Relating to or using a system of numerical notation that has 16 rather than 10 as its base.

What is the term for a database that contains multiple tables of information that can be joined through common fields?

Relational database

What is the term for a database that contains multiple tables related through common fields?

Relational database

Which type of URL would you use when coding a Web site in HTML?

Relative URL

What webbrowser element is responsible for reading webpage content and presenting it to the reader?

Rendering engine

Which browser element is the part of the browser responsible for reading the Web page and presenting it to an end user?

Rendering engine

Which browser element is the part of the browser responsible for reading the web page and presenting it to an end user?

Rending engine

Which of the following e-mail response options should you use to respond only to the original sender of an e-mail message?

Reply

Which of the following e-mail response options should you use to respond to the original sender of an e-mail message and include everyone who was copied?

Reply All

vector graphics

Resizable images that are saved as a sequence of vector statements, which describes a series of points to be connected.

What is the term for a person, department or device needed to accomplish a task?

Resource

Which of the following practices can help you avoid a harassment when using Internet communications?

Respect others request not to send any jokes via email or IM

You are a network administrator for a medium-sized organization. The receptionist has had several problems with malware recently. The receptionist does not need to access external Web sites to perform his job, but he does use his computer for company documentation and internal communication with co-workers. Which of the following will help prevent additional malware from being installed on his computer?

Restrict this employee's access to the Internet.

You notice that a competitor has introduced a new marketing campaign using logos that are significantly similar to your company's. In fact, you suspect that this company has infringed on your copyright and trademark. Which step should your team leader take?

Retain a lawyer and obtain advice.

Which method allows you to save your web-based email messages to your hard drive

Retrieve your message with a separate account

Which term describes profit earned as a result of a project relative to the value of the resources required to complete the project?

Return On Investment (ROI)

You have just obtained feedback about your Web site from several trusted customers. Which step should you perform next?

Review and prioritize the feedback.

Which of the following should you use to create a resume that intend to send as an e-mail attachment that can be read by various programs on different platforms?

Rich Text Format (RTF)

The protocol required for text messaging is:

SMS

Which choice lists all the protocols necessary to send and receive email

SMTP, and PO P or IMAP

To what does the term "Web 2.0" refer?

SOCIAL NETWORKING, TEXT MESSAGING, ECT.

What is a search engine?

SOFTWARE PROGRAM USED TO FIND INFORMATION ON THE INTERNET USING KEYWORDS

A user has just visited your Web site and updated her contact information. This information was stored in a database. Which language was most likely used to update the database?

SQL

What is the standard language for accessing information from a relational database?

SQL

It is vital that you understand how to evaluate information you retrieve from resources on the Internet because the source of information can directly affect the quality and factuality of the information. Which of the following resource categories is the most common type of Internet resource you will use?

Secondary

You have contracted with a division of the United States Department of the Interior to create Web pages for a site that has visitors who may be visually impaired. Which act passed by the U.S. government must you consider as you design Web pages for maximum accessibility by this audience?

Section 508 of the Rehabilitation Act

Which of the following is a secure method of transferring files through Secure Shell (SSH) in which each file transfer is a discrete session?

Secure Copy (SCP)

Which term is used to describe a computer that is responsible for storing and providing information requested by a client application?

Server

Which term is used to describe a software application that is secretly placed on a user's system to gather information and relay it to outside parties, usually for advertising purposes?

Spyware

In 1969, which U.S. Department of Defense agency funded what would become the first global computer network?

The Advanced Research Projects Agency (ARPA)

Which of the following standards organizations offers a family business management system standards that details the steps recommended to produce high quality products and services using a quality management system that maximizes time,money, and resources?

The International Organization for Standardization (ISO)

What occurs when your browser cache becomes full?

The browser automatically deletes old cached files as you continue to browse the Web.

What occurs when your browser cache becomes full?

The browser automatically deletes old cached files as you continue to browse the web.

Which of the following enables you to view previously accessed Web pages without having to request them from the server again?

The browser cache

Which of the following enables you to view previously accessed web pages without having to request them from the server again?

The browser cache

Which of the following improves the speed of your browser because it allows you to view previously accessed Web pages without having to request them from the server again?

The browser cache

During which project management phase should product testing and performance evaluations occur?

The closing phase

The more term as you can bind using AND Boolean operator search

The fewer results you will retrieve

What is a Web site's home page?

The first Web page that displays when you access a domain

Home Page

The first Web page that displays when you access a domain.

home page

The first page that displays when you access a domain.

Scope

The goals and tasks of a project, and the work required to complete them.

Images that map bits directly to a display space

The graphics you are probably most familiar with, GIFs and JPEGs, are raster graphics. What are raster graphics?

Social Networking

The grouping of individuals with common interests or goals into specific groups or communities

What is social networking?

The grouping of individuals with common interests or goals into specific groups or communities

Where are downloaded files (such as Web pages, images, fonts, etc.) saved on a computer?

The hard drive

Consider the following HTML code: <h1>CIW Site Development Associate Skills </h1> <ul> <li>Project Management</li> <li>HTML Coding</li> <li>GUI Authoring</li> </ul> Which of the following statements about this code is true?

The line breaks between elements make the code easy to read, which is considered good coding practice.

Which attribute is shared by all Web form field elements?

The name attribute

In a URL, what does the Internet resource component identify?

The name of the server on which the page resides

To what does the term "cloud" in "cloud computing" refer?

The network of servers and connections that make up the Internet

Which TCP/IP troubleshooting command should you use to determine whether a client and server are communicating with each other?

The ping command

Which of the following should you use when you want to test connectivity between your computer and a destination computer?

The ping command

During which project management phase should you develop a project schedule and assemble the project team?

The planning phase

Project management

The practice of applying skills and processes to activities in order to meet deadlines and achieve desired results.

What is encryption?

The process of converting data into an unreadable form of text

What is Internet Protocol (IP)?

The protocol by which data is sent from one computer to another on the Internet

What is the effect of running various TCP/IP suite protocols over Secure Sockets Layer (SSL)?

The protocols are made more secure because data transmissions are encrypted.

Bandwith

The range of frequencies with a given band, in particular that is used for transmitting a signal.

If the time allotted for a project were decreased by 50% what would most likely result

The scope of the project would be decreased

If the budget allotted for a project were suddenly cut in half, which of the following would be the most likely result?

The scope of the project would be reduced.

window

The screen that contains the Web page you are viewing.

You are using a server provided by an ISP. Your CGI script fails to execute on the server. Which is a common reason why CGI scripts fail to execute on a server?

The script does not have executable permissions.

Which of the following is a vital part of any firewall strategy?

The security policies created by firewall administrators

Troll

The term for a Web user who publishes comments or submits feedback simply to annoy or anger

Successful Web sites have a strong, central,

Theme

Which choice best describes authentication?

There find identity over user who is logging onto computer system

Which of the following can be considered a drawback of SMTP authentication?

There is a greater chance that a hacker can use a packet sniffer to obtain a valid user name and password.

Why is it important for you to understand how to use markup languages,

They are becoming more common in the workplace.

How do cloud services work?

They do not require knowledge of HTML. Users simply "point and click". This allows them to customize the site.

Which of the following statements best describes open-source licenses?

They enable users to modify and redistribute software source code without restriction.

What is the purpose of using Internet research tools such as Zotero?

They enable you to organize the information you find and store it on your local hard drive.

Consider the following code: <h1>CIW Site Development Associate Skills </h1> <ul> <li>Project Management</li> <li>HTML Coding</li> <li>GUI Authoring</li> </ul> Which of the following statements about this code is true?

This code will create a bulleted list.

multi-threading

This feature enables a Web browser to create new processes and recover from problem threads, thereby avoiding crashes.

What are the three elements of the project triangle?

Time, money and scope

What are the three major constraints on any project?

Time, resources and scope

Web conference

Tina is the technology coordinator for a small multi-national corporation with offices in San Francisco, New York, Tokyo and Paris. She needs to coordinate a live and interactive meeting that will allow executives from each of the offices to meet virtually and share presentations. Which of the following is the best way for Tina to accomplish this?

Why should you use a Non-Disclosure Agreement (NDA) when you outsource Web development work to workers in remote locations?

To protect your organization's trade secrets or intellectual property from being revealed without your consent.

Which is the most important reason you should properly cite information that you obtain from an Internet search?

To avoid plagiarizing someone else's work

Why should you properly cite information that you obtain from an Internet search?

To avoid plagiarizing someone else's work

What is the main purpose of a file server?

To store shared data

<blockquote> The Summer Youth Build allows students to help others while having fun on the job. <img src="syb/syb.png" alt="Join a summer build!" style="float:right"/> </blockquote> Where on the page will the image appear?

To the right of the text

Most user-friendly FTP client initiate commands for the user when the user clicks in action button. For which of the following actions does the FTP client program user use the put command

To upload a file

Bob opened an e-mail attachment and it launched a virus. The virus took control of his system, and now he is unable to run his anti-virus software. What should he do next?

Turn off his computer and reboot from a clean system disk

What is a wide area network (WAN)?

Two or more local area networks (LANs) that span a wide geographic area

Permission to upload

Two requirements are necessary to upload files to an FTP site. One requirement is gaining access to an FTP client program. What is the other requirement?

What is convergence technology, and how does it help companies access more services and to utilize resources to their fullest potential?

USES VOICE, VIDEO, AND INTERNET TO EXCHANGE INFORMATION

What is the standard Internet convention used to represent a hypertext link when the link is text?

Underlined text

Providing a link from your Web site to another site without permission is considered:

Unethical

What is the term for the business trend that seeks to simplify and integrate all forms of communication?

Unified communications (UC)

What would closed-envelope (or similar) icons in an Inbox's Message list represent?

Unread messages

Spam

Unsolicited and unwanted e-mail messages; the online equivalent of junk mail

spam

Unsolicited and unwanted e-mail messages; the online equivalent of junk mail.

Your computer crashed, and you lost many personal and work-related files. You just got a new computer, but you are now much more concerned about viruses and other security threats. Which strategy can help you protect your computer against virus attacks?

Update the definitions on your anti-virus application frequently.

Why is it advisable to occasionally upgrade plug-ins from the appropriate vendor site

Upgrades usually include increased functionality and security

How do you grab your's & your attendees' attention in a presentation.

Use presentation software.

Which of the following can be considered an advantage of connecting LAN computers to the Internet through a firewall?

Users on the LAN can request information from the Internet, but outside users are denied access to the LAN.

Text Messaging

Users type short text messages from mobile phones

listserve group

Users who subscribe to an e-mailing list through a list server.

4G hotspot

Uses mobile broadband services from cellular devices.

Which of the following would be the most effective means of gathering information about different job roles and responsibilities, and creating a job search?

Using Internet Technology

You are using a standard black font for text. When choosing a background color, what should you consider?

Using a light background color to avoid distracting users

Enter the "open" command at the MS-DOS prompt.

Using command-line FTP on a Windows system, how do you gain access to an FTP server?

You are making efforts to prevent attackers from gaining access to network connections. Which strategy may cause problems when troubleshooting your computer's connectivity to the network?

Using your desktop firewall to block Internet Control Messaging Protocol (ICMP)

Which of the following scripting languages is vendor-specific to Microsoft and may not be supported by browsers other than Windows Internet Explorer?

VBScript

Because the design elements with which you display information on your site are important, you should ________ your site on a regular basis as it is being developed.

Validate

Which choice lists the two types of graphics currently used in Web pages?

Vector and bitmap

MOV

Which file format designates an Apple QuickTime Movie file, which supports video, animation, text and audio?

tiff

Which file format is a popular, customizable graphics format commonly used for medical imaging and desktop publishing?

Portable Document Format (PDF)

Which file format retains formatting information through all platforms and can be created and read on any computer, regardless of the local operating system?

Attach the document to the e-mail message as a file attachment.

Which is the best method for sending a word-processor document to another person via e-mail?

Waveform (WAV)

Which is the native audio format for Microsoft Windows?

A Webcast is more cost-effective than an in-person meeting.

Which of the following is generally an advantage of using a Webcast instead of an in-person meeting?

A message that is pertinent, appropriate and brief

Which of the following would be considered an effective Internet communication when posting messages to a newsgroup?

Silverlight

Which popular plug-in is Microsoft's response to Adobe Flash?

MIME

Which protocol do e-mail programs use to identify the file types of attached files?

An offline installation

While you are exploring a Web page in the Firefox browser, a file fails to properly display. You decide to install the required plug-in to view the file and are forced to quit Firefox, install the plug-in, then restart Firefox. What kind of installation is this?

Upon giving an oral presentation, brainstorm ideas on a,

Whiteboard

Your e-mail will be more easily transportable from one computer to another.

Why can it be advantageous to write e-mail folders to files on your computer's local disk?

What is the least expensive way to access the Internet?

With phone lines, an analog modem and an ISP

You may not be able to enter logon information when needed to access a site.

You have activated pop-up blockers in your Web browser to prevent pop-up windows from continually interrupting your browsing experience. What could be an unintended consequence of this action?

Konqueror

You work with UNIX workstations and want to install a Web browser specific to your environment. Which browser should you install?

If you use your Web browser's built-in FTP client, which FTP command would you need to use to download a file from your company's FTP site?

You would not need to use any FTP commands.

Schedule a Webinar with the sales managers so that you can demonstrate the changes and answer any questions with the entire group.

Your company is making changes to a certain product. You need to discuss these changes with the company's sales managers, who are located in various international locations. Which of the following methods is the most efficient and economical solution for you to discuss the required information with all the sales managers synchronously?

Infringement is a violation of a copyright or trademark. Copyright and trademark infringement are punishable crimes. Which of the following would constitute an act of copyright infringement?

Your company posts on its site sample questions from another company's industry-certification exam to help students study for the exam.

Typing an e-mail message or instant message using all capital letters can be considered:

a breach of netiquette.

A database can best be described as:

a collection of data that can be sorted and searched using search algorithms.

A relational database record can best be described as:

a collection of information consisting of one or more related fields about a specific entity.

In an IP address such as 72.44.192.233, the last number in the address (on the far right) identifies:

a specific computer.

Open source

a development methodology that makes an application's source code available to anyone

A wireless access point (AP) is:

a device that enables wireless systems to communicate with each other, provided that they are on the same network.

Sending jokes via e-mail or sending instant messages to someone who does not want to be contacted can be considered:

a form of harassment.

Safari (www.apple.com/safari)

a graphical browser developed by Apple for most operating systems.

Receiving written permission from a copyright owner to use copyright-protected material for your own purposes can be considered:

a licensing agreement.

The Project Management Institute (PMI) is:

a nonprofit membership organization that publishes standards and offers education in the project management profession.

The Project Management Institute (PMI) is?

a nonprofit membership organization that publishes standards and offers education in the project management profession.

In project management, a resource is:

a person, department or device needed to accomplish a unit of work.

The ability to identify the tasks that constitute a project, understand the ways in which tasks are dependent upon one another, and know the ways that project dependencies will affect the project as a whole can be considered:

a planning skill.

Virtual Network Computing (VNC)

a program that allows you to control a computer at a remote location as if you were sitting in front of it

The most common business firewall technique is to use a firewall server in conjunction with:

a proxy server.

What can users input to selectively view and analyze data from a database?

a query

A one-to-many database table relationship can best be described as a table relationship in which:

a record in Table A can have multiple matching records in Table B, but a record in Table B has only one matching record in Table A.

In project management, a project is:

a sequence of work units that must be accomplished within a defined time frame.

list server

a server that automates the collection and distribution of messages from an authorized group of participants, allowing collaboration among multiple users

Lynx (http://lynx.browser.org)

a text-only browser that runs on most operating systems. Lynx supports HTTP, Telnet, Gopher, FTP and NNTP.

In ontology, an attribute refers to?

a unique characteristic pertaining to a class

In project management, a task is:

a unit of work that must be accomplished.

Secure authentication requires:

a user name, a password, and encryption of this information.

What is your favorite hobby? <select name="Hobby"> You have been directed to change this form field so that users can select more than one option from this list. In addition to rewording the page text, which change must you make to the code?

add the multiple="multiple" attribute and value to the <select> element.

Employers can monitor their employees' e-mail messages sent to and from the company network because:

all information carried by the company's communication system is company property.

History folder

allows easy access to previously viewed Web pages.

File Transfer Protocol (FTP)

allows the transfer of files between two computers, or one server and one computer

Virtual Network Computing (VNC) is a program that:

allows you to control a computer at a remote location as if you were sitting in front of it.

privacy mode

also known as anonymous browsing, this feature provides the ability to surf the Web privately, leaving no cached information.

In order to send an e-mail message, you must include:

an address in the To field.

Web feeds can be read using software called:

an aggregator.

Desktop firewalls offer protection for:

an individual computer.

Because spam is sent to you uninvited, it can be considered:

an invasion of privacy.

Chrome (www.google.com/chrome)

an open-source Web browser developed by Google for most operating systems.

podcasts

audio/video digital-media files distributed through web feeds to subscribed users

You can use project management software to:

automatically calculate the length of time required to complete project tasks, as well as the availability of resources, as you establish relationships among the tasks.

You are embedding audio in your Web page and want to specify that the audio file should play immediately upon loading. Which attribute is needed to accomplish this?

autoplay="autoplay"

Which property should you use in the body selector in an external CSS file to specify an image for a page background?

background-image

In contrast to meetings that take place in person, a Webcast offers the advantage of:

being available for retransmission any time after the original event has taken place.

web pages that use active x

can include animation, audio, and video

During a Web search, entering erroneous search criteria, clicking dead links or accessing a busy server is likely to:

cause an error page to display.

Error pages most commonly occur when you:

click a dead link

Unexpected Web pages and advertisements most commonly occur when you:

click a link for a site that was added to a search engine's database by its spider program

Unexpected Web pages and advertisements most commonly occur when you:

click a link for a site that was added to a search engine's database by its spider program.

After you have found the information you need on the Web, you must still evaluate its accuracy and value. To determine whether information is reliable or factual, you should:

consult authoritative peer-reviewed resources.

You use Pandora (an automated Internet radio service) to build a collection of songs you like. When you select certain songs or artists, Pandora will play selections that are musically similar and you can approve or disapprove of the selections. The selections are determined by other Pandora users who have selected the same or similar songs/artists and categorized them together based on their own approval/disapproval decisions. This scenario is an example of:

crowdsourcing.

What is the term for a collection of data that can be sorted and searched using search algorithms?

database

The best way to help project team members improve their performances or resolve similar issues in future projects is to:

document the lessons learned during the current project.

You would use a File Transfer Protocol (FTP) server to:

download popular shareware and open-source freeware.

A one-to-one database table relationship can best be described as a table relationship in which:

each record in Table A can have only one matching record in Table B, and vice versa.

You should create a relational database in order to:

eliminate data duplication.

One of the major goals of HTML5 is to

eliminate the use of browser plug-ins.

proxy server

enhance the corporate network's security and increase its Internet access speed by providing caching server functions for frequently used documents.

Encryption is the primary means of:

ensuring data security and privacy on the Internet.

A SWOT analysis is an integral part of the planning phase because it allows you to:

evaluate your organization's or team's strengths to determine whether they will assist you in accomplishing the project objectives.

What is the term for a category of information in a table?

field

The SETI (Search for Extraterrestrial Intelligence) project collected vast amounts of data that needed processing. SETI was one of the early adopters of a technology in which volunteers installed a small application on personal computers to receive, process and return information to SETI. Using multiple systems to process large amounts of data was considered to be less expensive than using a single supercomputer to conduct the same task. This technology is typically known as:

grid computing.

Patrick wants to search for Fender guitars other than Stratocasters. He plans to use a keyword search engine. He does not want to see any results for Stratocaster guitars, only other Fender models. Which of the following search strings should he use?

guitar Fender !Stratocaster

Semantic Web implementations are Web applications that:

have the ability to contextualize data as they process it.

You can use screen savers to:

hide your work while you are away from your desk, providing a measure of security.

A critical first step in the initiating phase of a project is to conduct a needs analysis, which:

identifies the problems or desires that the project must resolve or address.

You should schedule meetings with project stakeholders and management during the executing and controlling phases of a project to:

inform them of progress and to handle issues they raise that may affect project scope.

Companies use call centers to:

interact with their customers.

When you are using remote control services and need to enter the IP address of the system you want to control, you should use the:

ipconfig command.

Google originally created the Chrome browser because it felt that existing browsers were too complex; they wanted a cleaner, simpler interface. Google has embraced the greenfield approach to software and Web development. A greenfield is a project that:

lacks any constraints imposed by prior development.

One of a project manager's skills is teaching effectively, which can be considered primarily a type of:

leadership skill.

Internet domain names sometimes use a country-level domain, or country code, to identify the geographical region in which the Internet organization or address is based. Which address demonstrates the proper syntax for a country-level domain?

londontimes.co.uk

You are embedding audio in your Web page and want to specify that the audio file should play over and over again without stopping. Which attribute is needed to accomplish this?

loop="loop"

You avoid adding yourself to unwanted mailing lists, you conduct online transactions through secure Web sites, and you are selective when posting information to newsgroups. These actions will help you:

minimize the amount of spam you receive.

what is the term for an element on a web page that contains data and procedures forhow that item will react when activated

object

You use trend analysis software to analyze server logs and tag Web pages to determine exactly how long a visitor used a page. These tasks are examples of:

on-site Web analytics.

A many-to-many database table relationship can best be described as a table relationship in which:

one record in Table A can relate to many matching records in Table B, and vice versa.

Which type of database table relationship is the most common?

one to many

You are writing code that you want to validate to the HTML5 standard. Which of the following code examples can be used to ensure that a line of content will appear in the browser as standard body text?

p> Habitat for Humanity builds homes and hope around the world. </p>

Direct Internet connections:

provide continuous access to the Internet through permanent network connections.

You can improve the quality of a product by:

providing independent verification that project tasks were completed correctly and adhering to ISO 9000 standards.

As part of a team that manages a completed Web site, you may be required to:

remove old sites or unused pages.

In order to manage scope creep, you can use scheduled meetings to:

review and discuss proposed changes to the project scope.

In order to manage scope creep, you can use scheduled meetings to?

review and discuss proposed changes to the project scope.

In order to help with your job tasks, your supervisor has given you a PIM application to install and use. PIM is an acronym for a type of program with which you can:

schedule appointments and meetings, store contact information, and manage tasks.

The catalog that is queried when you conduct a Web search using a search engine is called a:

search index

The catalog that is queried when you conduct a Web search using a search engine is called a:

search index.

Animated GIF programs allow the user to:

set the interval of appearance between multiple GIF 89a images.

Using all capital letters in an e-mail message connotes:

shouting or anger.

When you create a text box field, you should use the maxlength attribute to:

specify the maximum number of characters a user can enter into the text box.

When you create a text box field, you should use the size attribute to:

specify the visual width of the text box in characters.

By default, e-mail clients typically save a copy of every message you send in:

the Sent or Sent Items folder.

The project life cycle consists of:

the initiating, planning, executing, controlling and closing phases.

Moore's Law postulates that:

the number of transistors per square inch on integrated circuits will double every two years

An IT professional can evaluate a browsing session to identify:

the processes, technology and potential risks.

All IT professionals are faced with ethical and legal issues related to:

the security of network and individual computer use by employees.

In the client/server model:

the server is responsible for storing and providing information.

Milestones can add significant value to project scheduling because:

they can become the points at which the project team or project stakeholders evaluate the project's progress and make decisions that may affect the status of the project going forward.

Lisa has received a file attachment from a co-worker, James. She has no reason to expect a file from this person. The most effective security strategy for Lisa to follow would be:

to call, text or IM James before opening the attachment, to verify that he intended to send it.

You should obtain an IT technical or professional certification:

to demonstrate a level of competence or expertise in a specific IT field.

When creating an image map hot spot in HTML, a circle area is defined by:

two coordinates and the circle's radius.

A common field is a field that can be found in:

two or more related database tables.

The connectivity that makes the Internet possible also makes systems vulnerable to:

unwanted activity.

You have been asked to defragment the hard drives of several corporate systems without leaving your desk. All of the systems are running Windows 7. To complete this task, you should:

use Remote Desktop Connection.

Cloud computing is a computing paradigm in which:

users are able to access software and services run by servers that reside on the Internet.

You have been granted a software patent for your new software application. This means that:

users can use your application only if you grant them a license to do so.

A screen saver is a graphic or moving image that appears on your screen:

when your computer is idle.

You are ultimately responsible for your Internet use and the possible ramifications of posting personal information to the Web. The explosion in social networking via the Web has given rise to the "Right to Be Forgotten" argument, which asks:

whether people have the right to remove damaging information about themselves on the Internet.

Malware is a generic term for software:

whose specific intent is to harm computer systems.

You periodically access a Web site that encourages users to provide information in a collaborative effort to populate and grow the site. This site is an example of a:

wiki.

You make it a point to send e-mail messages, text messages and instant messages that are considered "safe for work." This is a good way to ensure that your messages:

will not be construed as sexual harassment.

The 802.11 standard, which was developed by the Institute of Electrical and Electronics Engineers (IEEE), refers to a family of specifications for:

wireless network technology.

Which of the following hypothetical Web site URLs is most likely an example of typosquatting?

www.goggle.com

You have registered for an e-learning course and are ready to begin. However, when you access the e-learning course page as directed, you find that you cannot log in because the authentication window will not launch. The most likely cause of this problem is that:

you have enabled pop-up blocking software in your browser.

Configure a free Web-based e-mail account that Marja can access anywhere, and forward her e-mail to that account while she travels.

Marja works for a small but growing company. She has been assigned to make several international sales trips to visit prospective customers. The company does not have an enterprise mail server with Web mail access. Her IT department is looking for a solution so that Marja can check her e-mail as she travels. Which of the following should the company choose for the most effective, economical and efficient solution?

He offended a recipient who received the joke as a result of further forwarding.

Mark's co-worker sent him a joke via e-mail. Mark thought the joke was quite funny, and he forwarded it to several other co-workers that he knows will be amused as well. Later that day, the Human Resources Manager calls Mark to her office to discuss a problem reported to her regarding the forwarded e-mail. Which problem has Mark most likely encountered by forwarding the e-mail message?

ISO 9000 details the steps recommended to produce high-quality products and services using a quality-management system that?

Maximizes time, money and resources.

A drawback of Webinars is that they?

May require multiple presentations if participants are located in different time zones.

Mario has been hired by a popular restaurant chain to develop a new section for its Web site that will promote its new express menu service. The project manager has made it clear that money is not an issue, but time is. The deadline is approaching, and there is a great deal of work needed to complete the site coding and a requested multimedia feature. Mario must also allow plenty of time for the testing phase. Based on these factors, what is Mario's best strategy for obtaining the graphical media he will need for the site?

Purchase stock photos from online resources.

Which Web form field allows users to choose from among two or more mutually exclusive options?

Radio button

Which of the following is designed to provide an immediate, temporary solution to fix a known problem in programming code?

Patch

Which term best describes a file of programming code that provides a temporary fix to a known bug?

Patch

Which of the following statements is true of software patents?

Patents do not apply worldwide.

Two requirements are necessary to upload files to an FTP site. One requirement is gaining access to an FTP client program. What is the other requirement?

Permission to upload

What is the term for a cookie that is stored as a file on your computer and remains there after you end your browser session?

Persistent cookie

Any tool used to schedule appointments and meetings, store contact information, and manage tasks is known as a:

Personal Information Management (PIM) program.

Microsoft Outlook, IBM Lotus Organizer, Sage ACT! and CorelCENTRAL are all examples of:

Personal Information Management (PIM) programs.

What type of software is common to all smartphones?

Personal Information Management (PIM) software.

Which of the following is the best choice you can use to organize and edit the photos in your portfolio?

Photo-management software

Which of the following are typically an example of primary resources?

Physical objects and relics

What can you do during the executing and controlling phases of a project to discuss progress, and to respond to project issues and unanticipated developments?

Plan and schedule meetings with team members.

You want to be able to access active content directly from your browser. Which type of application provides the efficient integration of multimedia formats with a browser or computer that will enable you to do this?

Plug-in

Which protocol allows a computer using an analog modem to make an initial connection to the Internet?

Point-to-Point Protocol (PPP)

Which of the following protocols can connect an entire network to the Internet?

Point-to-Point Protocol over Ethernet (PPPoE)

What is the term for the small windows that suddenly open in front of the webpage you are veiwing

Pop up window

What is the term for a small browser window that appears behind the browser window you are viewing?

Pop-under window

What is the term for a small browser window that appears in front of the browser window you are viewing?

Pop-up window

MPEG-1 Audio Layer-3 (MP3)

Popular compression standard for audio files; retains most of the sound quality of the source.

Which protocol is used to receive e-mail messages from an incoming mail server, and forces you to download e-mail messages before reading, deleting or otherwise managing them?

Post Office Protocol (POP)

Which of the following is known as a "store-and-forward" e-mail service?

Post Office Protocol version 3 (POP3)

As you communicate your Web site plan to relevant parties, consider using ____________ ____ to help illustrate your plan.

Presentation Aids

e-mail messages and their attachments.

Pretty Good Privacy (PGP) and Gnu Privacy Guard (GPG) are both used to encrypt:

Your IT department enforces the use of 128-bit encryption on all company transmissions. Your department also protects the company encryption keys to ensure secure transmissions. Which choice lists an important reason for encrypting the company's network transmissions?

Preventing data from being intercepted by malicious outsiders

What is the term for a field containing a value that uniquely identifies each record in a database table?

Primary key

Which choice lists security-related ethical and legal issues that IT professionals face?

Privacy concerns, copyright and trademark issues, and encryption policies

Firewalls for going to authorize access to or from

Private networks

Which of the following enabled private (i.e., commercial) business to be conducted over networks connected to NSFnet?

Private telecommunications companies

Microformats

Allow bloggers to incorporate information from Websites into their blog entries

You are developing a Web site that is going to be viewed extensively on smartphones and tablets. Which of the following should you implement when developing for mobile devices?

Always use the alt attribute in your <img> tags.

Which law passed in the United States is designed to ensure that disabled people are not improperly excluded from jobs? Web Accessibility Initiative

Americans with Disabilities Act

You have subscribed to and want to start receiving Web feeds from you favorite Web sites. What must you download in order to start receiving the Web feeds?

An Aggregator

Which of the following is required in an HTML tag?

An Element

Consider the following line from an HTML document: Site Development Associate<br> This code shows an example of:

An Empty Tag

A block-level element is a markup element that affects at least:

An Entire Paragraph

What is a <meta> tag?

An HTML element used in a Web page to embed information for use by search engines

geolocation

An HTML5 application programming interface that allows developers to retrieve the geographical location information for a client-side device.

What is the difference between an ISP and a cloud service provider?

An ISP provides bandwidth and possibly Web server space, whereas a cloud service provider provides more complex services such as software-as-a-service (SaaS), backup services and database connectivity.

Minimizing workflow interruptions during the course of an IT project can be considered which of the following?

An IT responsibility

Providing services and products in a timely, cost-effective, secure manner can be considered which of the following?

An IT responsibility

Having appropriate access to hardware and software, and getting the security access required to perform tasks can be considered which of the following?

An IT right

Receiving clear, detailed objectives and instructions so that you can provide the appropriate services and products can be considered which of the following?

An IT right

A bulleted list is considered to be:

An Unordered List

Post Office Protocol (POP)

An application layer over the internet standard protocol used by local email clients to retrieve email from a remote server over TCP/IP connection.

plug-in

An application that adds extra capabilities to your Web browser, such as the ability to view movies or Flash animations.

What is an illicit server?

An application that installs hidden services on systems

Illicit server

An application that installs hidden services on systems. Illicit servers consist of "client" code and "server" code that enable the attacker to monitor and control the operation of the computer infected with the server code.

greenfield

An approach in which a project lacks any constraints imposed by prior development.

Greenfield

An approach in which a project lacks any constraints imposed by proir development.

The right to be forgotten

An argument that asks do people have the right to remove damaging information about themselves on the Internet so the information can be forgotten?

When your point to specific resource to specific task you create in

An assignment

Webcast

An audio and/or video Web event that is distributed over the Internet.

spam filter

An e-mail client program that identifies and filters out spam messages before they reach the e-mail Inbox.

Spam filter

An e-mail client program that identifies and filters out spam messages before they reach the e-mail inbox

What is an e-mail thread?

An e-mail message that includes information from the original e-mail message in a response

Email client

An e-mail program that is independent of any specific Web browser, and that you can use to send e-mail messages

Digital-signature

An electronic stamp added to a message that uniquely identifies its source and verifies its contents at the time of the signature.

Which of the following is required in an HTML tag?

An element

object

An element on a Web page that contains data and procedures for how that item will react when activated. On a Web page, an object is typically a multimedia presentation.

HTML markup tags consist of:

An element, an attribute and a value

HTML markup tags consist of:

An element, an attribute and a value. No comment.

Hash encryption

An encryption method in which hashes are used to verify the integrity of transmitted messages. Also known as one-way encryption

What is hash encryption?

An encryption method in which numbers generated by an algorithm from a string of text are used to verify the integrity of transmitted messages

Which statement best describes hash encryption?

An encryption method in which numbers generated by an algorithm from a text string are used to verify the integrity of transmitted messages

What is symmetric encryption?

An encryption method in which the same key is used to encrypt and decrypt a message

Which statement best describes symmetric-key encryption?

An encryption method in which the same key is used to encrypt and decrypt a message

Symmetric encryption

An encryption method in which the same key is used to encrypt and decrypt a message. Also known as private-key encryption.

Asymmetric encryption

An encryption method in which two keys (a private key and a public key) are used to encrypt and decrypt a message. Also known as public-key encryption.

What is asymmetric encryption?

An encryption method in which two keys (one private, one public) are used to encrypt and decrypt a message

Which statement best describes asymmetric-key encryption?

An encryption method in which two separate keys -- a private key and a public key -- are used to encrypt and decrypt a message

National Science Foundation

An independent agency of the federal government responsible for the promotion of progress in science and engineering.

When you search for topics using a Web search engine, what are you searching?

An index or database of referenced Web sites

Which of the following best describes the job of a web architect

An individual who is responsible for the overall plan of the website development

What distinguishes an information portal from a search engine?

An information portal will only index Web sites based on manual submissions.

World Wide Web

An information system on the internet that allows documents to be connected to other documents by hypertext links, enabling the user to search information by moving one document to another.

Java

An object-oriented programming language developed by Sun Microsystems that is fully cross-platform functional.

ActiveX

An open set of technologies for integrating components on the Internet and within Microsoft applications.

Portable Network Graphics (PNG)

An open source graphical image file format created to replace GIFs.

WebP

An open-source image file format that provides lossless and lossy compression for images on the Web.

GNU Privacy Guard (GNU)

An open-source version of PGP, used for encrypting and decrypting e-mail messages, that does not use patented algorithms

GNU Privacy Guard (GPG)

An open-source version of PGP, used or encrypting and decrypting e-mail messages, that does not use patented algorithms.

What is an object

And almonds on a webpage that contains data and procedures on how that item will react when activated

How can you specify the keywords that must be found in an exact order

And close the keywords in quotation marks

Google Chrome has an anonymous browsing feature. This feature allows users to use the browser:

And leave no cached information.

What can a developer grants in order to place his or her software application in the public domain

And open source license

When you revisit a webpage on an older computer call my load slowly in your browser. How can you make the revisited pay just way more quickly?

Anonymous browsing

surf the Web privately, leaving no cached information.

Anonymous browsing allows users to:

What happens when you click a hypertext link?

Another location in the same Web page or another Web page appears.

What is a node?

Any entity or addressable device on a network that can be managed

Text Editor

Any program that allows you to type simple text and edit it, such as Microsoft Notepad and WordPad, Vi, or Pico. However, you must save your code files as plaintext. After you save the Web page code as a text file, you should save it with the .htm or .html file name extension.

In which encryption method are the public and private keys mathematically related so that only the public key can be used to encrypt messages, and only the corresponding private key can be used to decrypt them?

Asymmetric encryption

What symbol does an e-mail address use to separate the user name from the domain?

At ( @ )

It is vital that you understand how to evaluate information you retrieve from resources on the Internet because the source of information can directly affect the quality and factuality of the information. Which of the following types of resources only accept input from scholars and recognized authorities?

Authoritative peer-reviewed

Which type of online resource accepts input only from scholars and recognized authorities?

Authoritative peer-reviewed

To which of the following do raster graphics refer?

Bitmap graphics

Which of the following can administrators use to filter out the IP addresses of known spammers?

Blackhole list

Table element attributes are not supported in HTML5; CSS must be used. Which is the only table element attribute you can still use for HTML5-compliant tables?

Border

Your Web team is developing a new site for your company. As you are validating design issues, you review the pages' adherence to organizational design standards. What do these standards support?

Branding & Marketing

Your Web team is developing a new site for your company. As you are validating design issues, you review the pages' adherence to organizational design standards. What do these standards support?

Branding and marketing

Which choice lists two methods that you can use to reference an FTP or file-storage server (such as Dropbox) in order to download files?

By IP address or domain name

How can database information be provided to users via the Web?

By connecting a Web server to a database server

How is a many-to-many relationship between two database tables established?

By creating two one-to-many relationships with a junction table

How is a table relationship established?

By matching data in key fields between two database tables

How does the separation of duties help to ensure the quality of a product?

By providing independent verification that project tasks were completed correctly

How do robot or spider programs usually find keywords for a Web page?

By reading each site's source code embedded in the <meta> tags

How is IPv6 able to offer more Internet addresses than IPv4?

By using 128-bit IP addresses

What is the best way to find the exact information you need from the vast amount of data on the Internet?

By using Web search engines and search techniques

How can you reduce file size so that files can be sent more efficiently across the Internet?

By using a file compression utility to compress large files

Which of the following can be used to detect automated systems used by spammers for registering e-mail accounts?

CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)

Because her employer has the right to read her e-mail

Cleo's boyfriend sent her an e-mail message at work with details about a highly personal matter. The message was sent to Cleo's company e-mail address. Her boyfriend requested that she respond as soon as possible. Why should Cleo call her boyfriend to discuss the matter over the phone instead of responding in an e-mail message?

Which term is used to describe a computer that is connected to a central server with which it can communicate and from which it can request information?

Client

Of the six elements required to connect to the Internet, which can be supplied in the form of a Web browser, e-mail program or mobile app?

Client software

To support an Internet client, you must have six elements. The first three -- a computer, an operating system and TCP/IP -- are generally acquired when you buy a computer. Which choice lists the other three elements you need to support an Internet client?

Client software, Internet connection and Internet address

You have decided to look for a new job to advance your career opportunities. Which process helps you to obtain current information about available, relevant jobs in your area most quickly?

Conduct a search on a job seeker site.

Which strategy can help a Web team avoid copyright infringement?

Conducting regular content reviews.

If your company network uses a proxy server, what must you do to be able to access the Internet?

Configure your browser to address the proxy server.

If your company network uses a proxy server, what must you do to be able to access the internet?

Configure your browser to address the proxy server.

Maria is working on a Web site for a medical supplies company that has many retirement-aged customers who order its products online. How can Maria help to make the site as accessible as possible to older users?

Conform to WAI's Web Content Accessibility Guidelines.

Deep URL

Consider the following address: http://www.CIWcertified.com/Certifications/Foundations/iba.htm Which term best describes this address type?

http://

Consider the following address: http://www.CIWcertified.com/Courses/Web_Foundations/iba.htm Which part of this address represents the protocol being used to send the page information from the server to the computer of the user who requested it?

.CIWcertifed.com

Consider the following address: http://www.CIWcertified.com/courses/iba.htm Which part of this address represents the domain name?

www

Consider the following address: http://www.CIWcertified.com/courses/iba.htm Which part of this address represents the server name on which this page resides?

HTML tags that come in pairs are called:

Container Tags

Which HTML tag type consists of a pair of opening and closing tags?

Container Tags

HTML tags that come in pairs are called:

Container tags

Which HTML tag type consists of a pair of opening and closing tags?

Container tags

Which of the following is a necessary responsibility for you to maintain your IT career?

Continuing education

What is the term for the integration of telephony and data technologies?

Convergence

Voice over IP (VoIP)

Converts voice into data packets for transmission over a packet-switched IP network

In what ways can cookies be useful for website developers

Cookies inform the website manager about visitors preferences

What is the open-source software development term for the practice of removing restrictions from the distribution and use of software?

Copyleft

Which of the following protects original works of authorship that are fixed in a tangible medium of expression, and defines an original work by the basic elements of expression and originality?

Copyright

You use images from a site with no logo/trade secret, still what happened?

Copyright Infringement

Which of the following protocols is used to transfer files between two computers on the Internet?

File Transfer Protocol (FTP)

Which protocol is often used to publish Web pages to a Web server?

File Transfer Protocol (FTP)

Encapsulated PostScript (EPS)

File format used for importing and exporting graphics.

Louis you need to transfer a large executable file from his computer to another users computer on the Internet. He knows the other usual retrieve the file sometime the next day, but he does not know exactly when. Which protocol is Lucy is best choice for transferring the file?

File transfer protocol

What is the term for a collection of information consisting of one or more related fields about a specific entity, such as a person, product or event?

Foreign key

Web-based e-mail

Free e-mail service from a provider such as Google Gmail or Yahoo! Mail in which you request a user name. You can access your e-mail from any computer that has access to the Internet.

Web based e-mail

Free e-mail service from a provider such as Windows Live Hotmail or Yahoo! in which you can request a user name. You can access your e-mail from any computer that has access to the Internet

Consider the following HTML code: <a href="http://192.168.2.3/indexes/index.html"> CCYP Home </a> Which type of hyperlink reference is given in this code?

Fully qualified URL

What is the term for the complete domain name of an Internet computer?

Fully qualified domain name

Which choice lists the Web-ready image formats that support transparency?

GIF 89a and PNG

Why are standards important in the world of technology?

GOVERN THE EASE OF INFORMATION BEING EXCHANGED

Which HTML 4.01 flavor must you use to place Web pages inside each other to create separate panes in the browser window?

HTML 4.01 Frameset

Which of the following retains all the formatting characteristics of a word-processing document, but may render inconsistently in different browsers?

HTML resources

When you use a Web browser to access Web pages, which protocol does the browser assume is being used?

HTTP

Which protocol do many browsers assume when you enter a URL in the Address field?

HTTP

Mark's co-worker sent him a joke via e-mail. Mark thought the joke was quite funny, and he forwarded it to several other co-workers that he knows will be amused as well. Later that day, the Human Resources Manager calls Mark to her office to discuss a problem reported to her regarding the forwarded e-mail. Which problem has Mark most likely encountered by forwarding the e-mail message?

He offended a recipient who received the joke as a result of further forwarding.

Which HTML heading style renders text the same size as normal text?

Heading Level 4

Which of the following describes an appropriate use of Virtual Network Computing (VNC)?

Help desk personnel might use VNC to troubleshoot computer problems for remote employees.

In which of the following job roles is it most important that you be able to translate highly technical concepts into info that a non technical audience can readily understand?

Help desk technician

In which of the following job roles is it most important that you be able to translate highly technical concepts into information that a non-technical audience can readily understand?

Help desk technician

Which IT job role best describes an individual who is responsible for diagnosing and resolving users' technical hardware and software problems?

Help desk technician

In which job role does an individual usually diagnose and resolve users technical hardware and software problems over the phone or through remote access tools?

Helpdesk technician

What is the term for a collection of data that can be sorted and searched using search algorithms?

Database

Which of the following is a necessary step when calculating bandwidth?

Determining the speed of your network connection

Which of the following provides positive identification of the sending and receiving parties to ensure that programs downloaded from the Internet are original and safe?

Digital certificate

Which term is used to describe a password-protected, encrypted data file that verifies the identity of the sender of a message?

Digital certificate

What are fractional T and E lines?

Digital phone lines consisting of one or more individual T or E carrier channels, rather than the entire T or E carrier line

Non-repudiation is the security principle of providing proof that a transaction occurred between identified parties. Which of the following can you use to enforce non-repudiation in an electronic data transfer?

Digital signature

What can you use to electronically verify your identity without the need to provide data confidentiality?

Digital signature

What is the term for an electronic stamp that identifies a message's source and contents?

Digital signature

Which of the following is used to enforce non-repudiation?

Digital signature

In which type of Web search does the search engine display a list of categories and subcategories that you can browse?

Directory search

Which of the following is a Web Accessibility Initiative (WAI) concern?

Disabled people need to be able to use development tools.

What is a CAP TCH a designed to do

Discern humans from an automated sender

The client - server model

Divides computing task between the client and the server using a common set of protocols

You used JavaScript to write to a document's window. Which technology described the browser elements?

Document Object Model (DOM)

The best way to help project team members improve their performances or resolve similar issues in future projects is to?

Document the lessons learned during the current project

One of your Web team members has made several changes to pages on a Web server. Another Web team member has updated several programs running on the Web server. Why is it important to document these types of changes?

Documentation provides evidence that duties have been properly performed.

After several meetings, your team's Web site plan has been developed. Which step is now necessary?

Documenting the decisions for approval by all parties

After several meetings, your team's Web site plan has been developed. Which step is now necessary?

Documenting the decisions for approval by all parties.

Which of the following is used solely to resolve human-readable domain names into their computer-readable IP addresses?

Domain name servers

Fully Qualified Domain Name (FQDN)

Domain name that specifies its exact location in the tree hierarchy of the domain names system.

IPv4 addresses use a 32-bit address format that is divided into four sets of numbers. What is the term for this address?

Dotted quad

You have created several Flash presentations for your Web site's default page and some other pages. To enjoy all of the benefits of these pages, which of the following must your site visitors do?

Download a plug-in

What is the easiest way to upload the Codecs used by your multi media

Download and install an upgrade for your plug-in

Which of the following takes place when IT projects are managed properly?

Employee productivity loss is minimized.

What must you do to ensure that the stakeholders/ fundraisers understand the goals of the site?

Ensure that you clarify technical concepts for a non-technical audience.

Section 508 of the Rehabilitation Act

Ensures that disabled individuals have a comparable level of access to information. Requires that all electronics must be comparably accessible to users with disabilities.

Which of the following accommodates Web users with vision impairment?

Ensuring that all pages and page elements can be rendered by audio screen readers.

You are troubleshooting a common Internet client problem. You increase the size of the browser cache and change the frequency with which the browser compares cached pages to those on the Web. What are you are trying to do?

Improve the performance of a computer with a slow connection

You are troubleshooting a common internet client problem. You increase the size of the browser cache and change the frequency with which the browser compares cached pages to those on the web. What are you trying to do?

Improve the performance of a computer with a slow connection.

Sending a contract to your supervisor for her review and advice

In a business environment, in which situation would e-mail be more appropriate for communicating than texting?

In which browser(s) can you set the size of the fonts used within the browser window?

In both Windows Internet Explorer and Mozilla Firefox

In which browser(s) can you set the size of the fonts used within the browser window?

In both windows internet explorer and mozilla firefox

You are formatting a Web site using CSS. You are using several types of styles on various pages, including embedded styles, external styles and inline styles. Which choice describes a correct order of precedence for implementing CSS styles?

Inline styles override all other styles.

Computer viruses can cause damage ranging from relatively minor to debilitating. You can protect your system against viruses by using commercial virus-detection software to find and defeat viruses. Because new viruses are created so rapidly, what must you do to ensure that your anti-virus software can protect you?

Install anti-virus software program updates to keep the signature profiles current.

You have just downloaded Microsoft PowerPoint file, but you do not have the PowerPoint program and start a new computer. What is the quickest and easiest way to view the file

Install the PowerPoint viewer

Which of the following activities would mostly be conducted by a PC repair technician?

Install, modify and repair personal computer hardware components and install software

What is no longer necessary when you use HTML5 to develop Web pages?

Installing a third-party plug-in to include video.

You are preparing to begin developing your Web page code. Which step will help you test your code in various environments?

Installing multiple browsers

You are preparing to begin developing your Web page code. Which step will help you test your code in various environments?

Installing multiple browsers.

What is the term for a computer-based method of communication in which users can type and view messages sent to one or more recipients, and view the responses immediately?

Instant messaging (IM)

Which of the following dial-up connection types has been largely superseded by direct Internet connections?

Integrated Services Digital Network (ISDN)

Which of the following protocols enables you to browse and manage e-mail messages while they reside on the server?

Internet Message Access Protocol (IMAP)

Which protocol allows you to browse and manage e-mail messages while they reside on the mail server?

Internet Message Access Protocol (IMAP)

Which protocol is the data transmission standard for the Internet, responsible for sending information from one computer to another using uniquely identifying addresses?

Internet Protocol (IP)

What is the term for an organization that maintains a gateway to the Internet and rents access to customers on a per-use or subscription basis?

Internet Service Provider (ISP)

Of the six elements required to connect to the Internet, which is often supplied by an ISP?

Internet connection

What is the term for the part of a browser responsible for reading and processing programming languages?

Interpreter

What is the term for a Web site and network used only by employees within a company?

Intranet

Intranets are used within corporations by employees, whereas extranets are used by corporations for non-public customer support.

Intranets and extranets can both be considered subsets of the Internet. Which statement best describes the difference between intranets and extranets?

What is the main difference between intranets/extranets and the Internet?

Intranets and extranets exclude the general Internet public.

Which choice lists the basic elements of authorship, according to copyright law?

Expression and originality

Which of the following describe the data from which Web pages are created, but do not format Web pages?

Extensible Markup Language (XML) Standard Generalized Markup Language (SGML)

As an IT professional for a small company, you are responsible for changing network-access user names and passwords as a security precaution. What should you do to prevent employee frustration or confusion when they try to log on to the network after you have changed user names and passwords?

Notify employees in advance of the new user names and passwords, and specify the date on which the new user names and passwords will take effect.

When specifying keywords to conduct an Internet search, which of the following parts of speech will be the most useful?

Nouns

Briefly describe Java.

OBJECT-ORIENTED PROGRAMMING LANGUAGE

Which technology allows you to update and query a database of any vendor using that vendor's database driver?

ODBC

What is the term for an element on a web page that contains santa and procedures for how that item will react when activated

Object

You created a link from your page at www.habitat.org/ccyp.html to a story on a separate Web site not owned or run by your organization. Which step must occur before you make this change public?

Obtain permission from the site's owner to publish this link.

You are creating a Web document on a mobile device and will be out of your Internet Service Provider's coverage range for the remainder of the day. Which HTML5 API will allow you to continue working on the document?

Offline Web application

Plan a Web conference using a service that supports screen-sharing and phone conferencing.

James has just finished designing a Web site to support a charity organization's fund-raising efforts. He needs to meet with the board members to get their feedback and address some questions before he implements the final design. The board members are dispersed throughout the country and want to avoid spending charity funds on traveling to this meeting. Which of the following solutions would best support the charity and provide James with an opportunity to discuss the design with the group?

Which of the following languages is an object-oriented programming language developed by Sun Microsystems that is often used when data needs to be shared across a network

Java

Which of the following is a miniature Java program that is downloaded into a Web browser when a user requests a Web page

Java applet

Which security risk must you be aware of when using active content such as Java applets and ActiveX objects

Java applets and ActiveX allow information to be downloaded and run on your system.

Which of the following is an event driven script language used to create active content on the webpage

JavaScript

Which of the following is considered an event-driven scripting language

Javascript

Instant messaging bypasses anti-virus software and firewalls.

Johann uses instant messaging (IM) to frequently communicate with his team members, as well as with close friends. Recently, Johann was surprised that he started receiving spam during his IM sessions. Which statement would explain why Johann could receive spam during an IM session?

What is the term for a numeric code that uses an algorithm to encrypt and decrypt data?

Key

Click the Reply All button, enter his response, and click Send.

Kjell received an e-mail message on which several other individuals were copied. He wants to respond to this message in a way that will include everyone who was copied on the original message. Which steps should he take with this e-mail?

What is the name for the standard computer interface that allows computers to create and play electronic music

MIDI

You are part of a development team that needs to adopt an integrated development environment tool to increase programmer productivity. The team narrowed the options down to two. One is open-source; the other will require an expensive site license. The tool you choose must be reliable, stable and well maintained. Which of the following could be a disadvantage for you to choose open-source, and thus a compelling enough reason to purchase the licensed software instead of using the open-source solution?

Maintenance of an open-source solution relies on developers who volunteer to work on the code.

Which of the following activities would most likely be conducted by a database administrator?

Manage back up and recovery procedures to prevent the loss of data

Americans with Disabilities Act (ADA)

Mandates that electronic information be accessible to disabled people, all digital info must have text/audio alternatives, and was enacted to protect the civil rights of people with disabilities.

When you use the HTML5 Offline Web application API, you must create a list of the files needed for the Web application to work offline, such as the main .html file, the .css file, and any images or JavaScript files used. What is this list called?

Manifest

E-mail address, SMTP, POP3, user name and password

Todd replaced his mobile phone with an upgraded unit, and now must reconfigure many of the services. The instructions say that he can enter his e-mail address and the unit will configure the e-mail client for him. Todd has tried this several times, but it does not work. He calls the vendor's help desk. The technician says that because Todd is trying to sync his e-mail account with an enterprise mail server, he will need to configure the e-mail client manually. What information does Todd need to configure the e-mail client?

The three letter domain category at the right side of the domain name is also called

Top level domain

ARPA

Top level domain in the domain name system of the internet. It is used exclusively for technical infrastructure purposes.

What is the name for the method by which a blogger receives notification when other bloggers link to his or her blog entry?

Trackback

Which term is used to describe private intellectual property that is vital to a company's success?

Trade secret

What is the term for a word, slogan, symbol, name, package design or device that distinguishes a product from other products?

Trademark

What enables dissimilar systems connected to the Internet to communicate with one another?

Transmission Control Protocol/Internet Protocol (TCP/IP)

Which is long is always required to connect to the Internet

Transmission control protocol - Internet protocol TCP - IP

List the action items in a numbered or bulleted list for clarity.

Troy is project manager for a development team. After a short meeting to introduce a new project, he is preparing an e-mail message for his team that will assign some initial tasks to be completed that day. He has a list of action items for the team members to review and confirm. Which is the preferred approach to communicate important action items in an e-mail message?

simplify and integrate all forms of communication.

Unified communications (UC) is a business trend that seeks to

Voice over IP present saying mobile computing call - contact centers and voice to text convertions are examples of what

Unified communications technologies

Text string that specifies an Internet address and the method by which the aress can be access is known as

Uniform resource locator

You suspect that an attacker has gained control of your computer system. What action should you take next?

Unplug the computer network cable and/or disable the computer's wireless NIC.

Zack developed his corporation's intranet site using proprietary HTML language extensions based on the company's current browser at the time. The company has recently updated its systems to include the use of a new browser. Now the intranet site that Zack developed no longer renders its content consistently. What should Zack do to ensure that this site's content renders consistently going forward, regardless of the browser used?

Update the site using a single W3C language standard consistently, such as HTML5 or XHTML.

Which of the following general rules should you follow when entering keywords in search engines?

Use all uppercase letters when typing Boolean operators.

In the HTML5 standard, what is the recommended way to center a paragraph of text?

Use an inline CSS style attribute in the paragraph tag.

If you copy a file from a CD that is infected with a virus, what is the most effective way to prevent the virus from infecting your system?

Use anti-virus software to disinfect your hard drive and remove the virus from your system.

What can a Web site development team leader do to ensure that a Web site reflects the company's overall culture?

Use input from representatives of various company departments.

Your Web site is often visited by users who are visually impaired. Using your GUI HTML editor, what can you do to ensure that the pages are easier for your visitors to read?

Use larger fonts.

You are performing a keyword search with your browser. Which strategy should you use for the keywords you choose?

Use mostly nouns rather than verbs.

When using multiple Boolean operators to conduct an Internet search, how can you indicate the order in which the Boolean phrases should be considered?

Use parentheses to combine Boolean phrases.

You have been asked to present your team's Web site plan to upper management in a meeting. You are concerned that some managers may not read the preliminary report and therefore be distracted during the meeting by reading the report. You also need to ensure you keep the attention of those attending the presentation because they will eventually be required to give final approval for your project. What can you do to ensure continued attention to your proposal during this meeting?

Use presentation software.

Cloud computing is a computing paradigm in which:

Users are able to access software and services run by servers that reside on the Internet

To download a file

Users can access and navigate an FTP server using an FTP client program. For which action does the FTP client program use the "get" command?

To upload a file

Users can access and navigate an FTP server using an FTP client program. For which action does the FTP client program use the "put" command?

When your company's private LAN is protected by a firewall, which of the following is true?

Users on the LAN can access information from the Internet, but outside users cannot access information stored on the LAN.

Marvin is developing a Web site using a GUI HTML editor. He wants to check his code for errors and compliance with HTML standards occasionally and quickly as he works. How can he best accomplish this?

Validate the code using the GUI validator.

You want to verify that the Web pages you create are compliant with an accessibility standard supported by a particular government. Which approach will verify your compliance most quickly?

Validating the pages with an automated validation tool provided by the government

Which of the following activities is essential to maintaining a Web site so that end users do not feel that the Web site is neglected or lacks maintenance?

Verifying that all hyperlinks are valid

View and print documents, but not edit them

Viewers are scaled-down versions of applications and usually do not have the full application's functionality. Which choice describes tasks you can generally perform using a viewer?

Internet resources can be used for a variety of purposes beyond the World Wide Web and e-mail. Which of the following enables IT professionals to access and fix computers in remote locations?

Virtual Network Computing (VNC)

The server and the viewer

Virtual Network Computing (VNC) is a program that allows you to control a computer at a remote location. VNC consists of which two components?

Which entrance to ocean IT professionalused to troubleshoot computer problems for remote employees and install software is on remote systems

Virtual network computing - VNC

Emily has been asked to update Web page content for her company's site and is working with the marketing department to gather information that will help her revise site navigation and product content. Which audience-development technique would provide the information she seeks? Push technology

Visitor tracking

Nicolai wants to add demand-based content to his Web site so that customers can access the information at their behest. Which audience-development technique describes the process Nicolai wants to implement?

Visitor tracking

What is the term for voice information delivered in digital form as packets of data using Internet Protocol (IP) instead of the traditional circuit-switched lines of the public switched telephone network (PSTN)?

Voice over IP (VoIP)

Which of the following is an open standard containing seven points that help determine the suitability of a GUI editor for developers with disabilities?

W3C Authoring Tool Accessibility Guidelines

As a general rule, the closer you adhere to ___ _________, the more consistently your Web pages will render in various browsers.

W3C Standards

What is the difference between a local area network (LAN) and a wide area network (WAN)?

WAN IS CONNECTED OVER A LARGE AREA WHILE LAN IS A LOCAL AREA

What IT job role would most likely be responsible for managing and maintaining a network infrastructure?

WEB ARCHITECTS

S/MIME supports encryption and the use of digital certificates, whereas MIME controls the way that messages and attachments are organized and distinguished from one another.

What distinguishes S/MIME from MIME?

A message that has not yet been read

What does a closed-envelope icon next to an e-mail message header indicate?

You must provide the user name given by the ISP, and provide the names of the mail servers used by your ISP.

What does it mean to configure an e-mail client?

The messages are stored in your Inbox as usual.

What happens to the e-mail messages you receive while the autoresponder feature is enabled?

An FTP site that does not require authentication for access, and is available to the public

What is an anonymous FTP site?

Messages that are queued for sending

What is contained in your e-mail application's Outbox folder?

To differentiate humans from automated senders during online transactions

What is the function of a CAPTCHA?

A PS file contains instructions that determine the display of the graphic, whereas an EPS file includes the bitmap information for the image as well.

What is the main difference between a PostScript (PS) file and an Encapsulated PostScript (EPS) file?

What is the main difference between a PostScript (PS) file and an Encapsulated PostScript (EPS) file?

What is the main difference between a PostScript (PS) file and an Encapsulated PostScript (EPS) file?

To share files and to document and track the progress of projects

What is the most appropriate way e-mail can be used in the workplace?

To send an automated response to e-mail messages received while you are out of the office for a planned absence

What is the purpose of an e-mail autoresponder?

Rendering engine

What is the term for the part of a browser responsible for reading a Web page and presenting it to an end user?

Interpreter

What is the term for the part of a browser responsible for reading and processing programming languages?

At least one address in the To field

What must an e-mail message include in order for you to send it?

In which instance would using an advanced Web search technique be most appropriate?

When conducting an Internet search for a complex subject, or to narrow the results of a standard search

Large file attachments can take a long time to download.

Why should you make judicious use of file attachments in e-mail messages?

Which of the following would be considered a Web 2.0 technology?

Wiki

Which of the following is an example of a Web 2.0 community or service?

Wikipedia

Which of the following open information sources are students sometimes told to avoid retrieving information from because it is considered non-authoritative or unverified?

Wikipedia

If your organization's server is running Microsoft Internet Information Services (IIS), which browser choices should your IT department consider implementing?

Windows Internet Explorer

Which of the following should you use to accept real-time assistance from a remote help desk technician?

Windows Remote Assistance

Which service involves allowing a trusted person at a remote location to connect to your computer and view your screen?

Windows Remote Assistance

Waveform (WAV)

Windows standard format for audio files.

The process of working on an outline for a Web presence is known as,

Wireframing

Nancy works on a Web development team that creates and updates Web pages and sites for a variety of customers. Different customers have different requirements for their Web sites, but all want their sites to function consistently for end-users. So Nancy knows that when developing Web pages, it is always important to test the pages before publishing them. Which is the best way to test Web pages?

With current and older versions of multiple browsers

Which of the following best describes all my installations of a plug in

With the browser open and may occur without prompting user

http://

With which prefix does a Web page's Uniform Resource Locator (URL) begin?

What is the term for a tool that assists users of an application in creating documents and/or databases based on styles and templates?

Wizard

Which organization was created by the United Nations to help protect ownership of work and creations globally?

World Intellectual Property Organization (WIPO)

Which organization was formed by the United Nations to protect intellectual property worldwide?

World Intellectual Property Organization (WIPO)

Which of the following has published more than 110 Web standard, and encourages manufacturers to follow these standards, many of which define levels of conformance?

World Wide Web Consortium (W3C)

What is the term for an application programming interface (API) that is used to transfer XML and other text data between a Web server and browser?

XMLHttpRequest

Which of the following search engines was originally intended to be an index providing several links relating to topics on the Internet that were of interest to the two founders?

Yahoo!

Urge the parents to warn their children to never provide personal information over the Internet.

You and other parents are attending Back To School Night at your son's school. During his presentation about this year's curriculum and goals, your son's teacher talks about the dangers of the Internet. Which of the following should he include in his recommendations to the parents?

Send a text message with the new restaurant location to the mobile phones of all the salespeople.

You are hosting a lunch meeting at a local restaurant for 15 of your roving salespeople. An hour before meeting time, the restaurant calls to tell you that the party room will not be available for at least an hour later than scheduled. You call another restaurant in the area, which can make its party room available in one hour for your lunch meeting. You make a reservation with the new restaurant for the same time and cancel the other. What is the best way to alert each salesperson about the new restaurant location?

Use the Forward feature, add the omitted stakeholder's e-mail address and include the other e-mail addresses from the original message to alert the team to the oversight.

You are part of a team that has been collaborating on a marketing document. The document is ready for final approval from the stakeholders. The team leader has sent the document to the stakeholders as an attachment to an e-mail. You notice that an important stakeholder was omitted from the recipient list. What should you do to ensure that the omitted stakeholder receives the document and receives future replies to the e-mail thread?

avoid typing messages in all capital letters.

You are updating company guidelines regarding professional communication via e-mail. To dispel the impression of shouting or anger, users should:

Firefox add-ons

You are using Firefox as your default browser and you want to customize it to better suit your browsing habits. What plug-ins and extensions specific to Firefox can you use to accomplish this?

In browser versions after Internet Explorer 7.0 and Firefox 3.0, how do you work in multiple browser windows simultaneously?

You can launch the browser once and open new tabs for multiple windows.

In the browser version after the internet explorer 7.0 and Firefox 3.0, how do you work in multiple browser windows simultaneously?

You can launch the browser once and open new tabs for multiple windows.

Which of the following can be considered an advantage of Web-based e-mail?

You can log on and check your e-mail from any computer that has Internet access.

Which statement about sending instant messages true?

You can send an instant message only to a contact that is signed into the service

Which of the following statements is true of cookies?

You can view the file content of cookies sent to browsers, but they are partially encrypted.

E-mail

You have been contracted to write an article about social networks for a magazine. You have finished writing the article and are ready to send your draft to the magazine editor. Which is the most appropriate way to do this?

Send a brief text message update now, and then send the meeting details in an e-mail message later.

You have just finished a very important sales meeting with a potential customer, and you need to update your supervisor at the corporate office, which is located in another country. You are debating whether to text or e-mail your supervisor about the meeting details. Which of the following would be the best practice for communicating with your supervisor?

Internet Explorer

You have just installed the Microsoft Windows 7 operating system on your PC. Which Web browser is bundled with Windows 7 and is installed automatically when you load the operating system?

Which of the following is typically an advantage to configuring your own hosting server over using an ISP or a cloud service provider?

You have more choices in the configuration.

will not be construed as sexual harassment.

You make it a point to send e-mail messages, text messages and instant messages that are considered "safe for work." This is a good way to ensure that your messages:

You have activated pop-up blockers in your Web browser to prevent pop-up windows from continually interrupting your browsing experience. What could be an unintended consequence of this action?

You may not be able to enter logon information when needed to access a site.

Which of the following is an Americans with Disabilities Act (ADA) compliance factor?

You must provide text-based alternatives to all non-text content (e.g., Java applets).

To alert your manager that you have sent the proposal via e-mail so your manager can view the proposal as soon as possible

You need to send a message to your manager providing all the details of a business proposal as quickly as possible. The idea you have discussed with her is critical to the business. The project is considered urgent and confidential. What would be the most appropriate way you could use an SMS (text) message in relation to this proposal?

You were replying to e-mail when suddenly your computer started to display random messages, and stopped responding to keyboard and mouse input. You suspect that you have accidentally downloaded a virus. Which of the following actions most likely caused this?

You opened an e-mail attachment.

File size

You recently returned from a vacation and you want to share some photos with your co-workers. You would like to share these photos via e-mail. What should you consider when attaching several high-resolution photos to an e-mail message?

Your supervisor has the right to read e-mail you send using company equipment and Internet connections.

You send an e-mail message to a co-worker to help plan a surprise going-away party for a mutual friend before she embarks on a six-month around-the-world cruise. Which statement reflects your right to e-mail privacy?

When creating markup code and designing Web pages, which of the following is an ethical point you should follow?

You should not "borrow" images, text, logos, music, scripts, applications or code without permission.

software patent

a set of exclusive rights granted to an individual or company that claims to have invented a unique procedure or feature, and then seeks to protect that invention

pdf

You use a proprietary Windows-based program to create designs and layouts for your freelance greeting card business. You want to share samples of your work on your Web site for potential new customers to review. You convert the file format of your designs so that customers can view accurate renderings of them, regardless of the local operating system, settings or browser each individual uses to view your site. Which file format should you use?

An opt-in mass texting service

You visit the Web site of a business from which you make online purchases and set up an account on your smartphone. The site requests your mobile phone number in order to send you promotional text messages. What type of service does this scenario describe?

An opt-in e-mail marketing service

You visit the Web site of a company from which you make online purchases and consent to receive e-mails regarding special promotions and other types of updates. What type of service does this scenario describe?

Web conference

You want to attend a training session remotely. The presenter has recommended an application for you to download that uses VoIP audio technology so you can interact with the presenter and the other participants. Which Web-based system does this scenario describe?

Plug-in

You want to be able to access active content directly from your browser. Which type of application provides the efficient integration of multimedia formats with a browser or computer that will enable you to do this?

MPEG

You want to give your Web site users the ability to view high-quality video. Connection speed is not an issue. Which file format could you use?

A deep URL

You want to learn more about CIW certifications and access a PDF document at http://www.ciwcertified.com/_resources/CIW_Roadmap.pdf. Which type of URL does this represent?

Open multiple windows in one browser and use tabbed browsing.

You want to look at multiple Web sites simultaneously and follow different paths of hyperlinks in each site. What is the easiest way to accomplish this in current Web browsers?

Subscribe to a listserve group about digital animation.

You want to receive e-mail messages, announcements and advertising on a regular basis about digital animation. Which action could you take to accomplish this?

Which of the following would constitute an act of copyright infringement?

Your company posts on its site sample questions from another company's industry-certification exam to help students study for the exam.

Extranet

Your company wants to simplify the customer support process for its distributors by enabling them to obtain company forms and reports online. You and your Web team are in charge of implementing this capability. Which Web-based system should you implement?

What can be considered a drawback of networked computing and Internet use?

Your computer activities and personal information are no longer private.

You decide to increase the size of the browser cache and change the frequency with which your Web browser compares cached pages to those on the Web. What problem are you experiencing that would cause you to perform these actions?

Your computer has a slow connection.

Add the link to a cloud-based bookmark service such as Delicious or Google Bookmarks.

Your mom sent you a message with a link to a college information page that you find very useful. You want to be able to find this same page in the future from your desktop computer, or from your mobile device when you are not at your desk. Which is the best way to do this?

What can be considered a drawback of obtaining feedback about your Web site by conducting customer surveys via e-mail?

Your organization runs the risk of receiving a bad reputation as a spammer.

What will happen if you neglect to include a <!DOCTYPE> tag in your HTML document?

Your page will not validate with a markup validator.

You have created a new software application and are ready to distribute it to other users. You have decided to license the software according to the GNU GPL version 3. What does this license allow you to do with your software?

Your software is available for free use and alteration by other programmers, who must then make their modified versions freely available as well.

Which of the following is a disadvantage of using Web-based e-mail?

Your user name and password reside on a third-party server.

What is the term for public documents of interest to the Internet community that include detailed information about standardized Internet protocols?

Requests for Comments (RFCs)

What is currently the most common way to authenticate users on private and public computer networks?

Requiring user names and passwords

Convert the video files to the WMV format, because RealMedia files will not play in Windows Media Player.

Samson needs to review several promotional product videos from his company's marketing department immediately, before a meeting to discuss revisions. Samson tries to view the videos on his computer using his Windows Media Player, but they will not play. The video files are in RealMedia format. What should Samson do in order to view these videos?

Which browser element is a programming method that isolates a particular application or process, and helps the browser keep information from being exposed or misused?

Sandbox

HTTPS

Sarah just made a purchase on an online shopping site (such as amazon.com) and completed the checkout process by paying with her credit card. Which protocol was most likely used for the transmission of her information?

What is the term in ontology that refers to the hierarchical description and vocabulary concerning a particular domain?

Schema

It is vital that you understand how to evaluate information you retrieve from resources on the Internet because the source of information can directly affect the quality and factuality of the information. Which of the following resource types bases information on primary sources?

Scholarly

What is the term for the goals and tasks of a project, and the work required to complete them?

Scope

Which of the following is true about using the Internet to perform job tasks?

Search engines are useful for finding any type of data you need from the Internet.

Which of the following protocols support the encryption and decryption of e-mail messages?

Secure Multipurpose Internet Mail Extensions (S/MIME) and Pretty Good Privacy (PGP)

Which of the following protocols provides authentication and encryption, and is used by most servers for secure exchanges over the Internet?

Secure Sockets Layer (SSL) protocol

Secure MIME (S/MIME)

Secure version of MIME that adds encryption to MIME data

Secure MIME (S/MIME)

Secure version of MIME that adds encryption to MIME data.

What is the term for an individual who is responsible for examining an organization's security requirements and determining the necessary infrastructure?

Security analyst/ consultant

What is the term for an individual who is responsible for maintaining the software and procedures necessary to protect the confidentiality and integrity of electronic data?

Security manager

Which IT job role best describes an individual who is responsible for maintaining the software and procedures necessary to protect the confidentiality and integrity of info and legitimate access to it?

Security manager

Which term is used to describe Web 2.0 applications that have the ability to contextualize data (or give the data meaning) as they process it, by supplementing the content designed for humans with machine-readable information that enables computers to find, share and combine information on the Web without human intervention?

Semantic Web

What type of Web implementations have the ability to contextualize data so that computers can perform tasks associated with finding, sharing and combining information on the Web without human intervention?

Semantic Web implementations

Which of the following is the most effective way to spread viruses?

Sending e-mail attachments

Secure Sockets Layer (SSL)

Sensitive data (such as credit card information) should be secured using authentication and encryption when transmitting it over the Internet. Which protocol do most servers use to exchange sensitive data over the Internet?

An e-mail/ groupware administrator would be classified as a subcategory of which IT job role?

Server administrator

Cloud computing is software services that are provided over the Internet. Which of the following IT job roles should be most familiar with cloud computing software, infrastructure, and platform services?

Server administrator

You want to be able to quickly view news headlines without the need to open your Web browser and visit any news Web sites. How can you accomplish your goal?

Set up a Web feed.

Which of the following client-side actions can you take to reduce the amount of spam you receive?

Set up a spam filter in your e-mail client to filter out spam messages.

You receive an unexpected e-mail with an attachment from a co-worker. You call the co-worker to ask if she sent you an e-mail message with an attachment. She recalls that she sent several e-mails with attachments earlier that day. Which of the following is your co-worker's best response to your question?

She should ask you to read her the e-mail message including the full name of the attachment and its extension.

Which of the following plug ins was developed by Microsoft and is a software development tool used to write and run internet applications

Silverlight

Which protocol is the Internet standard protocol for transmitting e-mail messages over networks, and is responsible solely for sending -- but not receiving -- e-mail messages?

Simple Mail Transfer Protocol (SMTP)

Which of the following server types is responsible solely for sending e-mail messages?

Simple Mail Transfer Protocol (SMTP) server

Which protocol is you specifically to send an email to each other with an outgoing server?

Simple mail transfer protocol (SMTP)

What automatically separates individual list items when you create an ordered or numbered list?

Single Line Breaks

What automatically separates individual list items when you create an ordered or numbered list?

Single line breaks

snail mail

Slang term for the standard postal service.

applets

Small programs written in Java, which are downloaded as needed and executed within a Web page or browser.

You are developing pages for your company's Web site. You want to ensure that the pages are easily viewable on mobile devices. Which factor must you consider when developing the pages? Cloud services may not be available to mobile devices.

Smaller screens are used to view Web pages previously viewed only on much larger PC monitors.

Instead of purchasing software and hardware that must be maintained by internal resources, more and more small businesses today are choosing hosted solutions with a monthly subscription fee and outsourced system maintenance. Which term is commonly used for this business model?

Software as a Service

Kim is using the YouTube graphics-editing application that she accesses via the Internet through her browser. Kim does not own the application, nor can she download it. She is able to use the application any time she needs to edit graphics. Although she does not have to pay for the access, she does notice advertisements, which appear on the sidebar of the application's interface. The application Kim is using may be classified as which of the following?

Software as a Service (SaaS)

Which service is typically provided by a cloud service provider but not by an Internet Service Provider (ISP)?

Software-as-a-service (SaaS) >.<

Trying shareware for free and paying for it only after you decide to keep using it.

Some Internet practices are illegal (they violate laws and are punishable), whereas other practices may be legal but are still unethical and should be avoided. Which of the following practices is both legal and ethical?

What is spim?

Spam that is delivered through instant messaging

You are designing a Web page for your company's site that reaches an international audience. What should you do to solve the problem of different character sets used by different languages?

Specify Unicode for all of your site's Web pages.

Juan is preparing to give a presentation to his company's managers about the cloud-computing services that his department is planning to implement. He considers the possible objections that his managers might have to using cloud services for the company. What disadvantage of cloud services should he be ready to discuss?

Speed

Whenever you receive program patches or updates, you should

Test them on one computer to ensure that they solve your problem without any unforeseen consequences

The formal project review consists of?

Testing the product, evaluating performances and documenting lessons learned

Which of the following format should you use to create a resume that you can enter into keyboard-searchable resume databases and pastes into the body of e-mail messages?

Text Format

Which of the following is a typical problem that occurs when a hyperlink is not correctly coded?

Text and images disappear.

Which Web form field should you use to create a scrolling text field into which a user can enter multiple lines of text?

Text area

Which format would be the most appropriate for you to use if you want to send your resume to several large employers who are likely to enter the information you provide into keyword-searchable resume databases and applicant tracking systems?

Text format

Which of the following is a benefit of Scalable Vector Graphics (SVG)?

Text inside of images can be searched.

For which of the following is the Short Message Service (SMS) communication protocol required?

Text messaging

Which resume format contains little formatting and is not necessarily designed to be visually impressive, but can be entered in various keyword searchable resume databases on various computers platforms and is not vulnerable to viruses?

Text résumés

You are developing pages for your company's Web site. You want to ensure accessibility for all users, including those with disabilities. Which type of content could you include to make your site more accessible to users with hearing impairment?

Text support for audio content

What is an e-mail signature?

Text that appears at the bottom of each message you send that contains your contact information

Tags that format text as bold or italic are known as:

Text-Level Elements

Tags that format text as bold or italic are known as:

Text-level elements

Tegan is project manager for a complex product that is having some quality problems during early testing. He meets with the customer to discuss the issues, and the customer tells him that product quality and cost are the priorities: The product must be high quality and must be developed within budget. Tegan asks if the customer can extend the deadline, but the customer refuses. Considering the elements of the project triangle, what can Tegan suggest to meet the customer's needs at this point?

That the customer limits the project scope to include only the most important features.

As an IT project manager, you are weighing the benefits of installing a new company firewall. Of what must you convince upper management in order to gain their approval for the project?

That the new firewall installation will result in a positive Return On Investment (ROI)

What does a URL that starts with https:// signify?

That you are visiting a secure Web site in which data transmissions are encrypted

4th generation (4G)

The 4th generation of mobile phone mobile communication technology standards.

Which of the following specifies the markup language and version used by your HTML file?

The <!DOCTYPE> Tag

Consider the following HTML5 code: <!DOCTYPE html> <html lang="en"> <head> <title>My Favorite Quotes</title> <link rel="stylesheet" href="css/styles.css"/> </head> <body/> <p> This Web site is devoted to my favorite quotes. These iconic quotes have been used time and again but will never lose their appeal. </p> <p> Hamlet, from his soliloquy in William Shakespeare's play "Hamlet" </p> <blockquote> "To be or not to be, that is the question." </blockquote> </html> This code does not validate as HTML5. Why?

The <body> tag is not properly closed.

You want to create an HTML5-compliant page that has four sections: a left-side section, top and bottom sections, and a middle section that will contain the main message of the page. Which elements would you use to create these sections?

The <header>, <footer>, <nav> and <article> elements

A character set is the group of symbols used to render text on a page. In which of the following should you specify the character set for an HTML document?

The <meta> Tag

A character set is the group of symbols used to render text on a page. In which of the following should you specify the character set for an HTML document?

The <meta> tag

With which of the following should you specify the text that will appear when your Web page is bookmarked or added to a browser's Favorites folder?

The <title> Tag

Which of the following will upper-level managers likely ask you to justify before making a hardware or software purchase, or creating a particular IT product or service?

The Return on Investment (ROI)

Milestone

The end of a stage the marks the completion of a task or series of related tasks, resulting in a key deliverable.

Which project management phases typically occur simultaneously?

The executing and controlling phases

Which folder allows easy access to previously viewed web pages by storing the URLs of sites you have accessed within a defined period of time?

The history folder

What is the common term for the default page that appears when a browser is initially opened?

The home page

A domain name consists of letters (and sometimes numbers) separated by periods. Which of the following is the host name component of a domain name?

The left-side component of the domain name, which categorizes domains into groups by server name

Which of the following is protected by copyright?

The lessons explaining DNA concepts on the www.DNAftb.org Web site

In a relational database, what distinguishes a primary key from other database components?

The primary key uniquely identifies each record in a database table.

You have been hired by Acme Inc. to update its company Web site. You discover that the existing Web pages were structured using tables. You are explaining to Acme's managers why the Web site needs to be recoded in HTML5 with CSS controlling the structure of the document. What is the most important reason for using HTML5 and CSS?

The site can be viewed by HTML5-compliant browsers, including mobile devices.

In a URL, what does the domain name component identify?

The site owner's registered site name and organization type

What must an e-mail message recipient possess in order to view a file attachment?

The software necessary to open or edit the attached file

Domain Name System (DNS)

The system by which internet domain names and addresses are tracked and regulated.

What must you know before you can create an effective project schedule?

The tasks necessary to achieve project objectives, the approximate length of time each task will take, the order in which tasks should be performed and the employees who will perform them

Typosquatting

The unethical practice of registering domain names very similar to those of high-volume sites in hopes of receiving traffic from users seeking the high-volume site who mistakenly enter an incorrect URL in their browsers.

What is a podcast?

The use of audio or video digital-media files that are distributed through Web feeds to subscribers

Which of the following is considered a right of IT professionals working at the help desk?

To receive clear, detailed objectives and instructions so that they can provide the appropriate services and products to their customers

Which statement best describes the reason that you should compress files?

To reduce transfer time and conserve hard disk space

For what should you use the <link> tag in the <head> section of your HTML document?

To reference a style sheet for the page

For what should you use the <link> tag in the <head> section of your HTML document?

To reference a style sheet for the page.

To provide efficient integration of multimedia formats with the browser and computer

To retrieve certain files when the program needed to open a file type is not installed on your computer

Consider the following HTML code: <blockquote> The Summer Youth Build allows students to help others while having fun on the job. <img src="syb/syb.png" alt="Join a summer build!" style="float:right"/> </blockquote> Where on the page will the image appear?

To the right of the text

A set of guidelines that encourage common sense, politeness and general rules for e-mail messages

To what does the term "netiquette" refer?

aa

aaa

Google Chrome has an anonymous browsing feature. This feature allows users to use the browser:

and leave no cached information.

Hypertext Transfer Protocol (HTTP) is responsible for providing Web pages to users who request them. The required elements for HTTP to function are:

client, server and TCP/IP.

As an IT professional, you will often be requires to translate highly technical concepts into information that a non-technical audience can readily understand. This task will test your:

communication skills

When you scan an image from a print source, the scanner:

creates a digital image that you can save and then edit.

A cookie is a text file that is placed on a Web site visitor's computer. Cookies allow a Web site manager to:

customize the site to the site visitor's Web browsing preferences.

When you use command-line FTP on Windows systems:

files are downloaded into the directory from which you enter the FTP commands.

Frankie works on the IT team at her company. She is looking for ways to reduce costs, so she suggests that the company uses P2P to facilitate sharing of information, instead of maintaining servers with FTP access. To protect its confidential data while benefiting from P2P, the company should:

implement technologies that will control access and password-protect files.

A deep Uniform Resource Locator (URL) is a URL that:

includes a path that penetrates the folder structure of a Web site.

An absolute Uniform Resource Locator (URL) is a URL that:

includes the full path from the system root to a specific page or resource.

Presence information:

indicates a person's willingness and ability to participate in communication.

The FTP navigational structure:

is similar to the hierarchical directory structure of a hard drive.

Spam can be considered an invasion of privacy because:

it is sent to recipients uninvited.

If your browser cache size is too small:

it may take longer for pages to download from the server.

As an IT project manager, you must be able to determine which projects to preserve and which projects to eliminate in order to?

maintain a positive Return On Investment (ROI).

A Web page that integrates content and scripts from multiple Web sites to create new applications is known as a:

mashup

ISO 9000 details the steps recommended to produce high-quality products and services using a quality-management system that:

maximizes time, money and resources.

You can improve the quality of a product by?

providing independent verification that project tasks were completed correctly and adhering to ISO 9000 standards.

Typosquatting is the unethical practice of:

registering domain names very similar to those of high-volume sites in hopes of receiving traffic from users seeking the high-volume site who mistakenly enter an incorrect URL in their browsers.

Mrs. Brown is a teacher at the elementary school. As the school year begins, she sends a couple e-mail messages to her students' parents to provide links to various school resource sites. Many of the parents reply, thanking her for the resources and asking for more information on topics such as state testing, district requirements, and fun educational sites for kids. Mrs. Brown realizes that e-mail is an inefficient way to organize and share all her information. A more efficient way for her to provide resource links to her students' parents would be:

social tagging

The formal project review consists of:

testing the product, evaluating performances and documenting lessons learned.

To understand Web search engines, you must understand

basic database concepts.

To understand Web search engines, you must understand:

basic database concepts.

The availability of vendor-supplied services and support, and the availability of regular updates and patches from vendors are considered advantages of:

using proprietary software.

You are developing a Web site that is going to be viewed extensively on smartphones and tablets. As you develop your code in an HTML editor, it is very important that you:

validate your markup code to HTML5.

You want to specify vertical alignment for the content in a table row using a CSS property. Specifically, you want to move content down to the lowest point in the cell. Which property and value pair would you use?

vertical-align="bottom"

Opt-in e-mail marketing

you are asked if you would like to receive e-mails regarding special promotions or other types of updates

Name some of the functions of Java applets.

ALLOW INFORMATION TO BE DOWNLOADED AND RUN ON YOUR SYSTEM

In relation to IT, what purpose does ontology serve in a business?

ALLOWS FOR ENGINEERS TO MAP TECHNOLOGY SOLUTIONS

How do semantic Web applications make accessible to computer applications the web page data that was designed to be read by people?

APPLY DATA WITHOUT HUMAN INTERACTION

Malware

Abbreviation for malicious software. Malware is software designed to harm computer systems.

LiveScript

The Netscape- developed scripting language that was the predecessor to JavaScript.

List at least three standard Boolean operators.

"AND","OR","NOT"

Which video file format is the Macintosh native movie platform

.mov

Which video file format for movies on internet

.mp4

Which of the following is considered an original Internet top-level domain?

.net

You helped your team's database administrator install an Oracle 9i database. Which type of database have you installed?

A relational database

To which type of server are you usually transferred when you download software programs and documents from Web sites?

A File Transfer Protocol (FTP) server

How does a LAN differ from a WAN?

A LAN spans a confined geographic area, whereas a WAN consists of multiple LANs.

The <br/> tag defines:

A Line Break

The opening <p> and closing </p> tags define:

A Paragraph

Absolute URL

A URL that Includes the full path from the system root to a specific page or resource.

relative url

A URL that gives a path to a resource using the current page as a starting position.

Relative URL

A URL that gives an abbreviated path to a resource using the current page as a starting postion.

Absolute URL

A URL that gives the full path to a resource.

Deep URL

A URL that includes a path into the folder structure of a website. www.internet.com/classfolder/student

Deep URL

A URL that includes a path past the domain into the folder structure of a Web site.

What is "http://www.CIWcertified.com" an example of?

A Uniform Resource Locator (URL)

dentifies the method by which an Internet resource is accessed

A Uniform Resource Locator (URL) is an Internet address that performs which task?

header

A block of information attached to a piece of data. The first part of a network packet. Can contain network addressing information or additional information that helps computers and applications process data.

Unified Communications

A business trend that seeks to simplify and integrate all forms of communication

Contact Center

A call center that allows consumers to contact agents via avenues other than telephone

A plugin is

A program that is launched via browser to extend the browsers functionality

Web Browsers

A program used to view HTML documents.

Sandbox

A programming method that isolates a particular application or process.

Transport layer security

A protocol based on SSL 3.0 that provides authentication and encryption, used by most servers for secure exchanges over the Internet.

Internet Message Access Protocol (IMAP)

A protocol for email retreival

Multipurpose Internet Mail Extensions (MIME)

A protocol that enables operating systems to map file name extensions to corresponding applications. Also used by applications to automatically process files downloaded from the Internet.

Secure socket layer

A protocol that provides authentication and encryption, used by most servers for secure exchanges over the Internet. Superseded by Transport Layer Security (TLS).

How does a proxy server protect a corporate network from unwanted Internet activity?

A proxy server replaces the network IP address with another, contingent address.

blackhole list

A published list of IP addresses known to be sources of spam.

Blackhole list

A published list of IP addresses known to be sources of spam

What can users input to selectively view and analyze data from a database?

A query

As part of the IT department, you configure the employee workstations for your company. When configuring a user's system, you always set the browser security levels to the company standard settings. What is restricted from downloading to the user's system when you configure browser security levels?

Active content

In which of the following components should you store names and information for your frequently accessed e-mail contacts?

Address book

GUI HTML Editor Examples

Adobe Dreamweaver, Microsoft Expression Web, Mozilla SeaMonkey and Adobe GoLive.

As you develop Web documents, which of the following should you always keep in mind to ensure your pages will render properly in user agents?

Adopt a single W3C standard and apply it consistently throughout your document.

Which information can you expect to obtain from a marketing department representative during your Web development meeting?

Advice about the interests and preferences of the target audience.

Where is the slash ( / ) character placed in a stand-alone non-empty HTML tag?

After the element name (before the closing wicket).

What is the name of the programming methodology for the Web that enables Web applications to interact with users in much the same way they do with desktop applications?

Ajax

Which of the following is a web 2.0 program methodology you could use to create webpages that are dynamic and interactive without the need to refresh or reload the page

Ajax

The opening <body> and closing </body> tags encompass:

All content to be displayed on the page through the user agent

The opening <body> and closing </body> tags encompass:

All content to be displayed on the page through the user agent.

What occurs when a user clicks the Reset button on a Web form?

All form fields are cleared and set back to their default settings.

Why does an IT project manager need to consider a project's Return On Investment (ROI) before starting a new project?

Before starting a project, an IT project manager will be required to justify the project's benefits relative to its costs.

At the server, usually just after the message has been received via SMTP

Because file attachments may contain malicious code that can be used to damage or infiltrate systems, your company routinely scans all file attachments in incoming e-mail. Where does attachment scanning take place?

Why should you avoid placing paragraph breaks around heading styles in your HTML code?

Because heading styles are automatically preceded and followed by paragraph breaks

Why should you avoid transmitting sensitive information in an instant messaging session?

Because instant messaging is not a secure method of communication

Why is Lynx often used by those who are visually impaired?

Because it is a command-line text-only Web browser that can be used with software that renders text into voice.

Why might you receive different results using the same keywords on different search engines?

Because not every Web site is registered with every search engine

Why might you consider using presentation tools during your meeting?

Because presentation tools help convey information.

Why do the executing and controlling phases of a project usually overlap?

Because project work takes place during the executing phase: A project manager monitors the status of the project and takes corrective action as work is being performed.

Why do companies that conduct business internationally need to be aware of the encryption laws in various countries?

Because some countries do not allow large encryption keys to be exported

Consider the following HTML code: <!DOCTYPE html> <head> <meta name="keywords" content="HTML5, basics, elements, tags"/> <meta name="author" content="Sampson Avilla"/> <meta charset="utf-8"/> <link rel="stylesheet" type="text/css" href="stylesheet.css"/> <title>HTML5 Structural Elements</title> </head> <body> This code will validate as HTML5. </body> </html> This code failed validation. Why?

Because the opening <html> tag is missing

Cheryl has several concepts for mobile apps for smartphones. A friend suggests that she develop her apps for an open-source operating system. Why might Cheryl want to focus her app development efforts on an open-source operating system?

Because the operating system and associated development tools are free if she complies with the copyleft license

Ange works as an Administrative Assistant for a small business that uses an SaaS service for sales orders and customer accounting (similar to Salesforce.com). Ange makes sure to save accurate records about current projects, and she performs regular backups of the business data stored on this cloud-based service. Why?

Because the service and records would not be accessible if there is an interruption in Internet access

You work for your company's IT department diagnosing and servicing the employees' workstations. A user complains that since she has been conducting a lot of research online, performance is slowing. You increase the size of her browser cache. Why might performance slow if the browser cache is too small?

Because the user may spend a lot of time waiting while pages download from the server

Why are firewalls considered the first line of defense against LAN security breaches?

Because they provide data confidentiality

When you prepare your development environment to create Web page code, why should you set file preferences to view file name extensions?

Because you will be working with various file types that may have the same or similar names

When you prepare your development environment to create Web page code, why should you set file preferences to view file name extensions?

Because you will be working with various file types that may have the same or similar names.

As an IT professional, which is the most important reason for you to develop and use good communication skills?

Because you will need to represent technical issues to a non-technical audience

As an IT professional, which is the most important reason for you to develop and use good communication skills?

Because you will need to represent technical issues to non technical audience

Instant Messaging

Computer-based method of communication in which users can type and view messages sent to one or more recipients and view the responses immediately

Consider the following HTML code: <!DOCTYPE html> <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8"/> <link rel="stylesheet" type="text/css" href="stylesheet.css" title="stylesheet"/> <title> This is an HTML5 document </title> </head> <body bgcolor="teal"> <p>Hello, world</p> </body> What change would be necessary to make this code validate as HTML5?

Close the <html> tag.

You created a Web page using the HTML5 standard. What can you do to ensure that the page will render as expected in the largest number of browsers?

Closely adhere to W3C standards.

What is the term for an algorithm used by video and audio player plug-ins to compress and decompress files

Codec

Grid Computing

Collection of computer resources from multiple locations to reach a common goal.

What term describes the ability of a group to exhibit a greater degree of intelligence by solving problems collaboratively instead of relying on the intelligence of an individual member?

Collective intelligence

Which social networking term best describes ability of a group to realize a greater degree of success in solving problems by solving them collaboratively compared with solving them individually

Collective intelligence

Which of the following is used to process data submitted by a user by passing data back and forth between a server and an application program?

Common Gateway Interface (CGI)

Which term is used to describe the component that relates multiple tables of information in a relational database?

Common field

As a member of a busy IT department, you often work with end users and management personnel, many of whom have only a basic knowledge of computers and computer networks. Which of the following skills is important to your job as an IT professional but is often under-emphasized?

Communication skills

What is lossy compression

Compression in which some of the information is permanently eliminated

Which of the following enables you to reduce transfer time when you download files from the Internet or send files as attachments

Compression utilities

Six elements are required to connect to the Internet. Which one of the six required elements can be satisfied by any of several examples including PC, smartphone, smart TV or tablet?

Computer

Host

Computer that mediates multiple access to databases mounted on it or provides other services to a computer network.

Which of the following elements required to connect to the Internet are generally acquired when you buy a computer?

Computer, operating system and TCP/IP

Your company introduced a new product one month ago. Since then, the Web site has processed so many orders that the shipping and handling department has become overwhelmed. Also, sales representatives have been overwhelmed with questions about the product. The sales team needs a more efficient way to reduce questions about the new product so they can concentrate on generating more orders. What can your Web team do to help reduce the questions directed to the sales team?

Create a glossary or FAQ page.

You have a contract job to create Web pages in HTML for a company based in Canada. How can you ensure usability as defined by the Canadian government for this company's disabled Web site users?

Create pages according to acts passed by the Canadian government.

Which of the following is an example of effective Web site file structure?

Creating a directory of HTML pages that contains subfolders with images and files used in each page.

Tim is listening to music from an online music provider (such as Pandora). He creates a list of his music preferences, and the music service uses his list to suggest additional songs that Tim might like. This music service is an example of a cloud-computing application that uses collaborative filtering technology. What is the name of this type of technology?

Crowdsourcing

Which term defines the practice of generating and improving content based on collective intelligence, and the use of software to gather and organize this intelligence?

Crowdsourcing

Which term for a problem-solving model in which a task ordinarily performed One person is outsourced to a large group or community?

Crowdsourcing

The Web team you manage is designing a new Web site for a company that wants to reach a specific audience. After discussing the company's needs and preferences, you decide to provide all page content in two languages and to use a specific recommended color scheme. This approach in your site design addresses which element?

Cultural diversity

Who should attend the Web project planning meeting that helps determine the audience and message for a Web site?

Customer representatives, suppliers and shareholders.

What is a blog?

DATA FORMAT TO DELIVER CONTEXT THAT IS UPDATED FREQUENTLY

What must you do in order to run Ogg files in Windows Media Player?

DOWNLOAD DIRECTSHOW FILTERS TO DECODE OGG

Save the Web page content to your hard disk.

How can you view a Web page, including all related images, fonts and scripts referenced by the HTML on the page, without connecting to the Internet?

If your Web development team includes a marketing representative, which of the following would probably be of most concern to that person?

How well the Web site adheres to branding standards.

Harley works in the sales department at his company. He feels that the company's marketing team is not doing a good job, so without direction or permission, he starts his own social networking page to help. His page has a name similar to the company's. He posts company logos on it and uses text copied from the company Web site. He posts news and sends tweets to customers and others interested in the company. When the company learns of this, what action is it most likely to take?

Human Resources will issue a cease-and-desist letter, take control of Harley's page, and terminate Harley's employment for copyright and trademark infringement.

Although search engines have the ability to search for and index the contents of various file types, on which file type do search engines traditionally focus?

Hypertext Markup Language (HTML)

Every domain name is unique. Once registered, it cannot be used by an unauthorized organization or individual. What organization is responsible for managing domain names?

ICANN

Which of the following activities would most likely be conducted by a server administrator?

Implement policies and procedures for ensuring the security and integrity of servers and the network

What is the purpose of anonymous, or incognito, Web browsing? What does it do differently than standard Web browsing?

IN INCOGNITO MODE IT'S IN PRIVACY MODE WHICH ALLOWS YOU TO SEARCH PRIVATELY, WEB PAGES WONT APPEAR IN HISTORY FOLDER AND COOKIES ARE DELETED WHEN YOU CLOSE THE PAGE

What are the four ways in which a plug-in can appear within a browser?

INLINE VIDEO/ CHANGING TEXT/ ANIMATION, AUDIO, USER INTERACTION, REAL-TIME DATA FEEDS

What is the difference between the Internet and the World Wide Web?

INTERNET IS A WORLDWIDE NETWORK WITH ALL THE NETWORKS WHILE WWW IS A PROGRAM THAT ALLOWS ACCESS TO RESOURCES VIA INTERNET

There are many ways to conduct a search for a job in the IT industry. Which method is considered the most effective?

INTERNET TECHNOLOGY

What is an Encapsulated PostScript

IPhone 4s use for transporting graphics between platforms and applications

Which statement accurately describes the difference between a traditional modem and an ISDN line?

ISDN uses a digital line, whereas a traditional modem must translate digital signals to analog and back.

How can bloggers use trackbacks?

IT NOTIFIES THEM WHEN OTHER BLOGGERS LINK TO ONE OF THEIR ENTRIES

In what significant way do IT projects differ from other projects?

IT projects deal with a business's data and may involve several different systems.

log on and check your e-mail from any computer that has Internet access.

If you have set up Web-based e-mail, you can:

You would not need to use any FTP commands.

If you use your Web browser's built-in FTP client, which FTP command would you need to use to download a file from your company's FTP site?

Which term is used to describe an application that installs hidden services on a system that enables the attacker to monitor and control the operation of the system?

Illicit server

You have used an image-creation application to create an image with the ability to edit an image component independently of the entire image. Which of the following elements allows you to do this?

Image layers

Your Web team has recommended a development environment that will make the site appear more attractive. This development environment is also proven to reduce development costs. However, it requires all site users to first download a browser plug-in. Which choice lists the affecting factors your team should consider before implementing this development environment?

Inconvenience to the user, cost, and audience limitation

How can scope creep undermine the success of a project?

Incremental changes in scope will affect the schedule, cost or performance required to complete the project.

Which of the following can be considered an advantage of P2P in the business environment?

It eliminates the cost and maintenance associated with file sharing through a centralized server.

When creating a Web form in HTML, what is the purpose of the name attribute?

It identifies data received from a user and associates it with a value specified by the form's creator.

In an HTML form, what is the purpose of the name attribute in an <input> tag?

It identifies the form input received in a name=value pair by the site's administrator.

Which of the following describes a Server-Side Include (SSI) on a Web page?

It is an SGML statement processed by the server.

Which statement accurately describes the Scalable Vector Graphics (SVG) technology?

It is an open standard that you can use to create cross-platform animated movies.

Which of the following statements is true regarding the GNU General Public License (GPL)?

It is an open-source license that allows you to obtain source code and make all the changes to it that you want.

Consider the following HTML code: <th> Larry </th> <th> Moe </th> <th> Curly </th> Which statement about this code is accurate?

It is part of a table with three columns.

If your browser cache size is too small:

It may take longer for pages to download from the server.

Which of the following is true about JavaScript

It must reside within HTML documents to run.

What function does a proxy server perform?

It replaces the network IP address with another, contingent address to hide the actual IP address from the rest of the Internet, thereby protecting the entire network.

What function does a proxy server perform?

It replaces the network IP address with another, contingent address to hide the actual IP address from the rest of the internet, thereby protecting the entire network.

What is the purpose of the Boolean operator AND?

It requires the search results to include multiple keywords.

What is the purpose of the Boolean operator OR?

It requires the search results to include one keyword or the other or both.

What function does the Domain Name System (DNS) perform?

It resolves IP addresses into easily recognizable text-based names.

What is the function of an email clients automatic reply feature

It sends an automated response to email messages that you receive

Which statement accurately describes a bitmap graphic?

It uses small dots (usually thousands) to create images and specify colors.

What was the first scripting language developed exclusively for online content design?

JAVASCRIPT

Your company wants to partner with another company and share information.You have just signed a document that protects your company's trade secrets and intellectual property, and also stipulates penalties if information is improperly revealed. Which type of document is this?

Non-Disclosure Agreement (NDA)

What can be considered a disadvantage of using a spyware-detection application to remove spyware from your computer?

Legitimate applications can be incorrectly identified as spyware.

Which of the following actions would be considered unethical, yet legal?

Linking your site to another site without permission.

A POP3 address

Lisa is configuring an e-mail client to connect to her e-mail account. Which of the following is required to set up the e-mail account?

Which of the following data modeling steps involves coding the concept into SQL programming?

Logical design

Which of the following Windows Internet Explorer privacy level settings blocks cookies from third-party Web sites that do not have a compact policy, and deletes cookies from third-party Web sites that use your personal information without your consent?

Low

Which browser is a text-only browser that runs on most operating systems?

Lynx

What is the term for a software program that scans Web pages for information used to identify the Web page?

Meta search engine

Your company wants to establish a mobile Web presence. Which of the following offers mobile-friendly content to the widest possible audience?

Mobile Web sites

Which statement about mobile Web sites is true?

Mobile Web sites can be viewed from almost any mobile device.

Which IT job role best describes an individual who creates applications for devices such as smartphones and tablets?

Mobile application developer

What is the term for a device that converts digital data from a computer into analog signals and back again?

Modem

Your company is about to release a proprietary product. Suddenly a competitor releases a very similar product that uses design data exactly like that from your company's product. You later learn that the proprietary data was leaked to the competitor. What preventive measure would have ensured that your company's proprietary information was protected from this type of action?

Monitoring employees' messages

Because the URL does not use SSL/TLS encryption and therefore any information Monty enters would not be secure

Monty has been searching online for a rare wine vintage. He finally finds it on the Rare Vintage Web site, which he has recently heard about from friends. The site is well designed and offers some good deals on hard-to-find wines. As Monty navigates through the checkout process, he reaches the checkout page with the following URL, which asks him to enter his credit card and mailing information: http://www.RareVintage.com/vprod/checkout.html/ref=chk_out_TLS128_1b?ie=UTF8&docId=107931 Monty cancels his online transaction instead of proceeding. Why?

Which statement is true regarding a virus attack on your system?

Most viruses can be halted after they commence an attack and can be removed without permanent damage to your system.

Which of the following is a protocol that can be used by applications to automatically process files downloaded from the Internet?

Multipurpose Internet Mail Extensions (MIME)

What term describes a group of two or more computers connected so that they can communicate, share resources and exchange information?

NETWORK

By typing the CIW site's URL (www.CIWcertified.com) in the address bar of her Web browser

Nancy is using a Web browser on her desktop computer to place some bids on a popular online auction site. She decides that she wants to browse to the CIW site without closing her browser. What is the most efficient way to do this?

Which of the following do many GUI HTML editors offer that text editors do not?

Native code-validation features

What is the name of the process whereby the project manager acquires, processes and evaluate information from the customer to help identify the goals of the project

Needs analysis

Which protocol is used to host newsgroups and distribute mailing lists by providing text output that users can access at their convenience and by allowing multi-person input like a conference call?

Network News Transfer Protocol (NNTP)

Which IT job role best describes an individual who manages and maintains a network infrastructure?

Network engineer

The smallest unit that a text-level element can affect is:

One Character

The smallest unit that a text-level element can affect is:

One character

Which type of database table relationship is the most common?

One-to-many relationship

What is the term for an SMTP server that allows the third-party relay of e-mail messages that spammers use to send spam?

Open relay

What is the term for a copyleft license that removes restrictions on the use and distribution of the licensed product?

Open-source license

To which of the following does peer development and collaboration lend itself?

Open-source software development

Which of the following is the most common method for spreading viruses?

Opening attachments

Which of the following is a mass-marketing Internet technology that allows you to specify whether you want to be added to an e-mail list server?

Opt-in e-mail marketing

Which of the following is a Short Message Service (SMS) that companies can use to send you promotional messages?

Opt-in mass texting

What is the function of a <meta> tag?

PLACED IN A WEBPAGE TO EMBED INFORMATION USED IN SEARCH ENGINES SUCH AS KEY WORDS, DESCRIPTION, AND AUTHOR

You have included on your Web page a graphic image file that conforms to a relatively new standard. This graphic format is capable of supporting compression, animation and transparency. It is also an open standard. However, this image file format is not supported in older browsers. Which image file format are you using?

PNG

Which choice lists some file types that are often already compressed and thus may not be significantly reduced in file size by compression utilities?

PNG, GIF and JPG

Suki just signed up for the Internet service provider, and now she is setting up Windows live mail as your email client. As she can figures this email client, Soakie must specify the needs of two servers

PO P3 server and SMTP server

Consider the following HTML code: <a href="indexes/index.html"> CCYP Home </a> Which type of hyperlink reference is given in this code?

Partial URL

What is the best source from which you can obtain feedback about your Web site to evaluate the site's effectiveness and determine ways you can improve the site?

Sales representatives

Which result reflects an IT project that is poorly managed?

Project tasks take longer to complete, requiring more company resources and money.

Six elements are required to connect to the Internet. One of these elements is TCP/IP. Which of the following best describes this element?

Protocol software used to communicate with the Internet

Hypertext Transfer Protocol

Protocol using TCP to transfer hypertext requests and information between servers and browsers.

The rules I describe the ways that client and server is communicate across a network are called

Protocols

Intranets are popular because they?

Provide a standard method for accessing resources, regardless of the operating systems used.

Which of the following is a secure method of transferring files through Secure Shell (SSH) in which you can transfer several files in one session?

SSH File Transfer Protocol (S/FTP)

TLS is the successor to SSL and has become more common.

SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are two common protocols used to secure Internet communication exchanges. Which of the following is true about SSL and TLS?

List three types of search engine indexing methods.

STATIC INDEX/ SITE MAP, KEYWORD INDEX, FULL-TEXT INDEX

She should send a brief text message to the customer requesting that he send his complaints via e-mail, so that further inappropriate communication will be well documented.

Sadie receives a verbally abusive voicemail from an angry customer who want to complain about a product, followed by several text messages from the customer asking why no one has returned his call yet. Sadie is due at a mandatory meeting with the company's executive managers. Which of the following is her best course of action?

What is the best source from which you can obtain feedback about your Web site to evaluate the site's effectiveness and determine ways you can improve the site?

Sales Representatives

What is the comprehensive term for a person or group with the power to exert influence over a project and affect results?

Stakeholder

Which of the following are metalanguages?

Standard Generalized Markup Language (SGML) Extensible Markup Language (XML)

Audio Video Interleave (AVI)

Standard Windows file format for video files.

QuickTime Movie (MOV)

Standard file format for Apple QuickTime; uses the .mov, .moov or .qt file name extension.

The commonplace use of e-mail has given rise to the term "snail mail," which is a slang term for what?

Standard postal service

At the end of the initiating phase, which of the following should a project manager prepare to define the ways that project success will be measured?

Statement Of Work (SOW)

What document is prepared during the new sheeting phase and outlines the requirements for each project task to ensure that the project objectives are met?

Statement of work

You want to find information about Great Danes. You visit a popular search engine and manually search through a directory tree of topics until you find a directory titled "Dogs" and a subdirectory titled "Breeds." You select the topic "Great Dane" and look through a list of indexed pages on that topic, then choose one page with which to begin your research. Which type of search index did you use?

Static index/site map

The MP4 video format is natively supported by Internet Explorer 9 and does not require a plug-in.

Stephen is creating video tutorials to sell his company's products. The target audience will consist of company employees using primarily new computers with the Windows operating systems and Internet Explorer 9. Stephen is debating whether to publish the videos using the MP4 or the OGG video format. Both formats are compatible with the HTML5 video element, which he is using in his tutorials. Which of the following would be a reason for Stephen to choose one format over the over?

disk cache

Storage space on a computer hard disk used to temporarily store downloaded data.

As you develop Web pages, make sure that you ____ your Web pages using multiple Web browsers.

Test

Which step is most helpful for ensuring that your Web page code renders well for most users?

Test the page in multiple browsers.

cascading style sheets (CSS)

Style sheet language that provides the formatting and "look" of a Web page or document written in a markup language.

You have just created a resume detailing your experience as a Web designer. This resume also specifies training you have received and certifications you have earned. Which is the most efficient way to distribute this information to the appropriate audience?

Submit your resume to a job search Web site.

You want to receive e-mail messages, announcements and advertising on a regular basis about digital animation. Which action could you take to accomplish this?

Subscribe to a listserve group about digital animation.

Webinar

Susan is taking an online college seminar series in Art History. All classes will be delivered over the Web. Although there is no opportunity to ask questions, the live lectures and artwork presentations are engaging. Which Web-based meeting format was used?

For which encryption method is it critical that the secrecy of the key be maintained by the sending and receiving parties in order for the encryption to be effective?

Symmetric encryption

You want customers to use your credit card to make purchases on your website in order to ensure secure exchanges

TLS

What is the function of Hypertext Transfer Protocol (HTTP)?

TRANSFER WEBPAGES FROM WEBSERVER TO WEB CLIENT

As project manager, what should you do if conflicts of interest develop among various departments represented in your project to the point where the investment required to implement necessary project plan modifications is not justified?

Terminate the project.

ARPANET

The Advanced Research Projects Agency Network was one of the worlds first operational packet switching networks.

Document Type Definition (DTD)

The DTD contains a set of rules to which you want your HTML document to conform.

Which of the following statements about HTML5 is true?

The DTD file is no longer required in HTML5.

Which of the following standards organizations offers a family of business management system standards that details the steps recommended to produce high-quality products and services using a quality-management system that maximizes time, money and resources?

The International Organization for Standardization (ISO)

Which statement is true regarding the use of Internet searches for job-related research?

The Internet provides fast, convenient access to a vast amount of information and services.

When you receive an e-mail transmission with an attachment, how does your browser know which application or plug-in to open to view or play the attachment?

The MIME definition for the application or plug-in that is located inside the HTTP header at the beginning of the transmission.

Stephen is creating video tutorials to sell his company's products. The target audience will consist of company employees using primarily new computers with the Windows operating systems and Internet Explorer 9. Stephen is debating whether to publish the videos using the MP4 or the OGG video format. Both formats are compatible with the HTML5 video element, which he is using in his tutorials. Which of the following would be a reason for Stephen to choose one format over the over?

The MP4 video format is natively supported by Internet Explorer 9 and does not require a plug-in.

Which of the following Web sites performs market research and analyzes current trends in Internet business?

The Netcraft site

You are developing pages using HTML5 for a small business' new Web site. Which HTML validator is best for you to perform a final check before you publish the site?

The W3C validator at http://validator.w3.org

Nigel has decided that it is not necessary to test his Web site in multiple browsers. What would be a valid reason to support Nigel's decision?

The Web site is an intranet and the company has standardized to one browser.

When validating Web site design issues, which of the following might you need to change?

The approach used to convey the company message

Transmission Protocol/Internet Protocol (TCP/IP)

The basic communication language or protocol of the internet.

interactive

The characteristic of some hardware and software, such as computers, games and multimedia systems, that allows them to respond differently based on a user's actions.

Which choice correctly specifies the attribute and value needed in an <input> tag for a group of radio buttons to designate a preselected option?

The checked="checked" attribute and value

During which project management phase should you determine the aspects of the project that worked well and the changes that should be implemented in the future?

The closing phase

Which of the following should you use to specify the width in characters of a scrolling text box?

The cols attribute

Your company has provided you with a desktop computer to use at work. You have configured your e-mail client on this work computer to include your personal e-mail account so that you can conveniently download messages and check your personal e-mail. Which of the following is true?

The company can read your personal e-mail messages.

Which of the following results from extracting a compressed file from an archive file created by the compression utility?

The compressed file and a folder containing the extracted files

During which project management phase should you troubleshoot problems and take corrective measures to ensure that all objectives are being met?

The controlling phase

What occurs when a user clicks the Submit button on a Web form?

The data from all fields in the form is sent to be processed by the action specified in the <form> tag.

What is the most important consideration in data modeling?

The database's ability to process data

Which attribute of the <form> element is used to specify the way that user-entered Web form data will be sent to the Web server?

The method attribute

Search engines use a ranking system to help you determine how closely a site matches the topic for which you are searching. Generally, how does this ranking system work?

The more frequently your specified keywords are found in a particular document, the higher the relevancy score that document receives.

What happens if you omit the size attribute when you use the <select> tag to create a select list?

The number of items that will appear in the list by default will depend on the browser.

Consider the following HTML code: <select name="Countries"multiple="multiple"size="8"> What does the size attribute control?

The number of items that will appear in the scrolling list box

What is the main reason that IT managers believe the future IT career model will be diamond-shaped, with few entry-level IT jobs available?

The offshore outsourcing of many entry-level IT positions

When using commandline FTP, what command should you use to access the specific FTP website

The open command

Between which tags must all HTML code for a document reside?

The opening <html> and closing </html> tags

Between which tags must all HTML code for a document reside?

The opening <html> and closing </html> tags.

Domain Name

The part of a network address that identifies it as belonging to a particular domain.

Interpreter

The part of the browser responsible for reading and processing programming languages.

rendering engine

The part of the browser responsible for reading the web page and presenting it to an end user.

Consider the following Cascading Style Sheets (CSS) rule: body {color: teal;} Which is the "declaration" portion of this rule?

The portion inside the braces

What is project management?

The practice of applying knowledge, skills and processes to activities in order to meet deadlines and achieve desired results

What is folksonomy?

The practice of categorizing online content through tags

Which of the following is affected by any changes you make to the three "project triangle" factors in an effort to optimize a project's schedule?

The quality of the project deliverable

Radio buttons are reserved for two or more mutually exclusive options on a Web form. How do you ensure this exclusivity?

The radio buttons must share the same name attribute.

What is the project triangle?

The relationship among time, money and scope in completing a project

As a project manager, you complete a Statement Of Work (SOW) at the end of the initiating phase of a project. What does a SOW outline?

The requirements for each project task to ensure that the project objectives are met

What is a top-level domain in the Domain Name System (DNS)?

The right-side component of a domain name, which categorizes domains into groups by common type or geography

Non-repudiation

The security principle of providing proof that a transaction occurred between identified parties. Repudiation occurs when one party in a transaction denies that the transaction took place.

Which of the following entities possesses the digital certificate during an Internet transaction?

The server

Opt-in mass texting services

The service is technically a Short Message Service (SMS) used by phone carriers, not an Internet service, but it serves the same purpose as mass e-mail

Your Web development team has decided to co-locate your servers. Which choice accurately describes co-location?

The service provider allocates space for your equipment, and you provide the server hardware.

You have decided to use relative links for your Web site's local pages instead of specifying absolute URLs. Your supervisor has asked you to justify this decision. Which statement provides the best justification?

The site can be moved from one server to another with minimal disruption.

You are almost finished updating a Web site. As part of the update, you have converted all pages from HTML 4.0 to HTML5. The project is currently on schedule. However, your project manager has been asked by the marketing team manager to justify a day of time spent validating the site's HTML5 pages. The marketing team manager does not have technical knowledge of the Internet or the Web. Which is the most appropriate explanation to provide to the marketing team manager?

The team needs to verify that the site will appear as expected in as many browsers as possible.

Trademark

The term for a unique word, phrase or symbol that is claimed or officially registered by an organization with the government?

Copyright

The term used for the legal ownership of expression by an author?

Consider the following HTML code: <tr> <td>Bill Gates</td> Also consider the corresponding CSS document code: tr { vertical-align:top; } What does this code indicate about the text "Bill Gates?"

The text "Bill Gates" is vertically aligned to the top of the cell.

What happens when you place text between the <!-- and --> tags in your HTML source code?

The text will be "commented out"and will not appear on the Web page

What happens when you place text between the <!-- and --> tags in your HTML source code?

The text will be "commented out"and will not appear on the Web page.

Which of the following should you use when you need to locate failures along the path between your computer and a destination computer?

The tracert command

Hypertext Markup Language (HTML)

The traditional authoring language used to develop web pages for many applications.

In a URL, what does the protocol component identify?

The type of server and Internet service being used

Web addresses are called uniform resource locator a URL is a texturing that specifies and Internet address and the method by which the address can be accessed. the protocol component of a URL identifies

The type of server and Internet service being used

Because using all capital letters connotes shouting or anger

Why should you avoid typing e-mail messages in all capital letters?

What is the primary function of a network server?

To act as a central repository of programs and data to which all users connected to the network have access

Why was created using multiple connections among multiple hosts?

To avoid a central point of vulnerability and thus reduce the chance of total network failure

For what purpose would you use a cable modem?

To connect to the Internet through your cable television system

For what purpose should you use automatic cookie handling in most browsers?

To control when and from whom cookies are accepted

Extensible Markup Language (XML) can be used for which purpose?

To define the structure, syntax and vocabulary as it relates to tags and attributes for a corresponding document

As a project manager, why should you keep an issues log?

To document problems that need to be escalated to managers or executives outside the project team for resolution

What is the purpose of conducting an ontological study as it pertains to a particular organizations or business?

To enable software engineers and programmers to accurately map technology solutions to business needs

During the early phases of site creation, why is it important to write a statement concerning the site's purpose and intended audience?

To ensure that everyone understands the purpose of the site.

Why should you use out-of-office messages when you will be out of the office for an extended period of time?

To explain why you may not respond to e-mail messages within a reasonably short period of time

Project management software often contains Gantt charts. What is the purpose of Gantt charts?

To graphically display the project tasks and task durations

Why would you use emoticons in an e-mail message?

To help convey the intended tone of the message

In many cases, project teams are created and developed with people who have different perspectives and priorities. Why is it important for a project manager to have the ability to develop and manage teams?

To help team members complete the project schedule within the project constraints

What is the purpose of a needs analysis?

To identify the problems or requirements that the project must resolve or address

What is the purpose of a Boolean operator?

To narrow search results by including or excluding words or phrases

Why would you use quotation marks in a search string when conducting an Internet search?

To narrow your search to yield Web pages that contain only the keywords as they appear together in the specified order

For what should you use the value attribute when creating a text box field?

To place default text inside the text box

Which of the following is considered a responsibility of IT professionals?

To plan and conduct service and product installations and training in a manner that minimizes workflow and interruption and downtime

Which of the following is considered a responsibility of IT professionals?

To plan and conduct service and product installations and training in a manner that minimizes workflow interruption and downtime

What is the term for the concept referring to the changing trends in the use of WWW technology and Web design that have led to the development of information-sharing and collaboration capabilities?

Web 2.0

Which of the following accurately describes at least one difference between Web 1.0 and Web 2.0?

Web 2.0 largely relies on the use of crowdsourcing, whereas Web 1.0 does not.

Your company has created a wiki for its employees to support blogs and collaborative projects. Employees can also contribute photos of company events to the company's internal Facebook site. These types of Web usage can be collectively described as:

Web 2.0.

Which IT job role best describes an individual who develops primarily server-side Web applications?

Web application developer

You want to attend a training session remotely. The presenter has recommended an application for you to download that uses VoIP audio technology so you can interact with the presenter and the other participants. Which Web-based system does this scenario describe?

Web conference

Polling

Web conferences are a cost-effective alternative to live, in-person meetings. Which of the following is a feature of Web conferences?

You want to view your Web feeds in your e-mail Inbox rather than viewing them through an aggregator. Which type of application will allow you to do this?

Web feed management providers

What is the term for an individual who is responsible for developing and implementing plans to take advantage of the sales and marketing opportunities available through the internet?

Web marketing manager

What is the term for an HTML document containing one or more elements, such as text, images and hyperlinks, that can be linked to or from other HTML pages?

Web page

Cache

Web page cookies and related data stored locally on the hard drive, unless the browser's privacy mode has been invoked.

Wikis

Web pages that can be viewed and modified by anybody with a Web browser and access to the Internet

Mashups

Web pages that integrate content and scripts from multiple web sites to create new applications

What is the term for a collection of related HTML documents located on a host computer on the Internet?

Web site

What is the term for an individual who evaluates Web site statistics to determine the site's effectiveness?

Web site analyst

Which IT job best describes an individual who is responsible for evaluating Web site statistics to determine the site's effectiveness?

Web site analyst

Which IT job role best describes an individual who is responsible for evaluating Web site statistics to determine the site's effectiveness?

Web site analyst

Which IT job role would most likely develop and monitor Web site tracking methods to determine the number of visitors, or "hits" a site receives?

Web site analyst

What is the term for an individual who is responsible for the organization and appearance of a Web site?

Web site designer

Which IT job role best describes an individual who is responsible for the organization and appearance of a Web site?

Web site designer

Which IT job role best describes an individual who is responsible for the organization and appearance of a web site?

Web site designer

Which IT job role is most concerned with determining the information and format that a Web site will present online?

Web site designer

Which IT job role best describes an individual who provides organizational leadership for Web site content and all related initiatives?

Web site manager

Which IT job role would most likely direct the activities of the Web development team in a large organization?

Web site manager

An information portal is a search engine that will only find:

Web sites that have been registered with search engines

An information portal is a search engine that will only find:

Web sites that have been registered with search engines.

What is the term for an audio and/or video Web event that is distributed over the Internet?

Webcast

Which of the following is generally used in non-interactive Web events?

Webcast

Which of the following is an interactive Web-based seminar or training session that is typically conducted in a one-way format, from speaker to participants with limited audience participation?

Webinar

For which of the following should you prepare slide shows, polls, call-in capabilities and file-sharing capabilities to ensure a successful outcome?

Webinars

An e-mail signature is a reminder to your recipients of your identity and the identity of your company.

Why should you create and use an e-mail signature for work-related e-mail messages?

When new issues pertaining to a topic arise and a lengthy thread already exists

When would be the most appropriate time to discontinue an e-mail thread?

Virtual Domain

When you are supporting multiple domains on a single server, each domain being served is often referred to as a virtual domain.

Presencing

When you sign in to your instant messaging (IM) service, your online status is advertised (or published) to the people on your contacts list. What does this scenario represent?

Use a client-side filter to identify and filter spam messages.

Which action can you perform to filter spam at your client computer?

AU

Which audio file format is inherently supported by most browsers?

The Bcc field contains e-mail address(es) of additional message recipient(s) that do not appear in the message header and are not visible to other recipients.

Which choice best describes the purpose of the Bcc e-mail message component?

Almost any type of file can be attached to e-mail messages, such as documents, spreadsheets, presentations or images.

Which choice describes the file type(s) that can be attached to an e-mail message?

Windows and Macintosh systems

Which choice lists the systems for which the Windows Media Player is available?

Audio Video Interleave (AVI)

Which is the standard video file format for Microsoft Windows?

Asking another user in a chatroom for personal information

Which of the following Internet communication practices is unethical but not illegal?

Agreeing to meet someone in person after getting acquainted on Facebook

Which of the following behaviors is considered to have the most personal risk associated with it when using social media?

Using your personal Facebook page to make disparaging remarks about your boss

Which of the following behaviors would be considered unethical?

Disclosing confidential information

Which of the following can be considered an inappropriate use of e-mail communication in the workplace?

BitTorrent

Which of the following is a P2P application that you can use to download huge files because it dramatically reduces the demands on networking hardware and bandwidth?

Chances are increased that a hacker can use a packet sniffer to obtain a valid user name and password.

Which of the following is a drawback of requiring SMTP authentication?

Apple QuickTime

Which of the following plug-ins can be used to show MOV files, which can combine video, animation, text and audio into one file?

A method of person-to-person communication in which users type short text messages from mobile phones

Which of the following statements best describes text messaging?

Multipurpose Internet Mail Extensions (MIME)

Which protocol was developed as an extension of SMTP that allows users to exchange various types of data files over the Internet?

Windows Remote Assistance

Which service involves allowing a trusted person at a remote location to connect to your computer and view your screen?

The more compression, the smaller the file size, but the lower the image quality.

Which statement about compressing JPEG files is true?

Instant messaging (IM)

Which term is used to describe a computer-based method of communication in which users can type and view informal messages sent to one or more recipients, and view the responses immediately?

Webinar

Which term is used to describe a training session that is delivered over the Internet?

Tweets

Which term is used to describe the 140-character updates broadcasted by Twitter users to their followers?

As leader of your company's Web team, you have been asked to give an oral presentation of plans for your company's new Web site. You want to open the discussion for some brainstorming with those attending, and you want to write notes that encourage discussion and show everyone you are listening to all ideas. Which presentation tool is most effective for this purpose?

Whiteboard

Because plug-ins can store a portion of the multimedia object data in the cache and begin streaming delivery as the file downloads

Why is it important to have an adequate amount of disk cache space when downloading multimedia objects?

In project management, an assignment is:

the appointment of a person, department or device to a unit of work.

The technology adoption life cycle describes:

the degree to which members of a demographic will adopt or accept a new product or innovation.

Pretty Good Privacy (PGP) and GNU Privacy Guard (GPG) encrypt:

the e-mail message and its attachments.


संबंधित स्टडी सेट्स

CCNA Routing and Switching: Scaling Networks Chapter 2

View Set

MICRO Lab Practical #2 (will continue to update)

View Set

Ch. 4 State and Local Government Relations

View Set

Econ Baggarly Exam 2 (Cost-Effectiveness/Cost-Utility)

View Set

Geometry Theorems 12-4 through 12-10

View Set

schizophrenia and personality disorders

View Set

The Masters III: Michelangelo 100% Quiz

View Set