CIW: Internet Business Association
You are creating a select list for your Web form. You want to allow users to choose more than one response from your list. Which attribute and value should you add to the <select> tag to allow this?
multiple="multiple"
Before making any changes to an active Web site, you should:
obtain a consensus of opinion about changes from customers, upper management, sales, and marketing, then obtain appropriate stakeholder approval.
You should create external hyperlinks only after:
obtaining permission from the owner of the site to which you want to link.
LANs and WANs are able to communicate with each other because:
of standardized Internet guidelines and procedures,such as the use of Internet protocols and standard Internet addresses.
The smallest unit that a text-level element can affect is:
one character.
Which file format retains formatting information through all platforms and downloads quickly from the Web?
PDF. Audio Interchange File Format (AIFF) is a high-quality audio format. Rich Text Format (RTF) is a portable text file format that allows image insertion and text formatting. Tagged Image File Format (TIFF) is a popular customizable graphics format commonly used for medical imaging and desktop publishing.
Network News Transfer Protocol (NNTP)
The Internet protocol used by news servers that enables the exchange of newsgroup (Usenet) articles.
Which of the following has become the most common asymmetric encryption algorithm, and is included in Web browsers and many other products?
RSA algorithm Popular hash algorithms are MD5, MD6 and Secure Hash Algorithm (SHA).
Which of the following can you use to view headlines and updates from your favorite Web sites without the need to open your Web browser or visit any Web sites?
RSS and Atom
When you receive an e-mail transmission with an attachment, how does your browser know which application or plug-in to open to view or play the attachment?
The MIME definition for the application or plug-in that is located inside the HTTP header at the beginning of the transmission.
What is the purpose of a Document Type Definition (DTD)?
The DTD contains a set of rules to which you want your HTML document to conform.
as a project manager, why should you keep an issues log?
To document problems that need to be escalated to managers or executives outside the project team for resolution
What is the purpose of conducting an ontological study as it pertains to a particular organization or business?
To enable software engineers and programmers to accurately map technology solutions to business needs
Why should you test Web pages using multiple Web browsers during site development?
To ensure that the pages render properly in all browsers
What is the purpose of a needs analysis?
To identify the problems or requirements that the project must resolve or address
You should create a relational database in order to:
eliminate data duplication. The design of a relational database is usually determined by four factors: the purpose of the database; the number of tables needed to store information without duplicating data; the fields needed in each table; and the fields common to more than one table. Creating a relational database can eliminate data duplication and save time. A relational database contains multiple tables of information that are related through common fields.
What is the best way to ensure that your Web page code conforms to the W3C's standards?
Use the GUI editor's built-in code validator or visit a validation site.
What is the term for a field containing a value that uniquely identifies each record in a database table?
You answered: Primary key
The <br/> tag defines:
a line break.
Most client computers:
are connected to the Internet through gateways, which connect their LANs to the Internet backbone.
HTML tags:
are not case-sensitive but should always be typed in lowercase letters.
What is the term for an element on a Web page that contains data and procedures for how that item will react when activated?
You answered: Object
What is currently the most common way to authenticate users on private and public computer networks?
You answered: Providing public and private encryption keys Correct Response: Requiring user names and passwords
Which browser element is a programming method that isolates a particular application or process, and helps the browser keep information from being exposed or misused?
You answered: Sandbox
Which of the following is a secure method of transferring files through Secure Shell (SSH) in which each file transfer is a discrete session?
You answered: Secure Copy (SCP)
Which of the following enables you to view previously accessed Web pages without having to request them from the server again?
You answered: The browser cache
Which of the following should you use when you need to locate failures along the path between your computer and a destination computer?
You answered: The tracert command
hich of the following enables users on different e-mail systems to exchange messages?
You answered: Transmission Control Protocol/Internet Protocol (TCP/IP) Correct Response: Gateways The people sending you messages need not be in the same domain, nor does it matter which e-mail programs they use. Your unique Internet address ensures that the message will be delivered to you. Gateways between e-mail systems allow users on different e-mail systems to exchange messages. A gateway is a computer that connects two networks that have different protocols. The computers to which you connect on the Internet use Transmission Control Protocol/Internet Protocol (TCP/IP) to deliver your e-mail message at your specific address. A Mail User Agent (MUA) is an e-mail program that is independent of any specific Web browser, and that you can use to send e-mail messages. An Internet Service Provider (ISP) is an organization that maintains a gateway to the Internet and rents access to customers on a per-use or subscription basis.
What is the standard Internet convention used to represent a hypertext link when the link is text?
You answered: Underlined text
You are making efforts to prevent attackers from gaining access to network connections. Which strategy may cause problems when troubleshooting your computer's connectivity to the network?
You answered: Using your desktop firewall to block Internet Control Messaging Protocol (ICMP)
Which of the following should you use to accept real-time assistance from a remote help desk technician?
You answered: Virtual Network Computing (VNC) Correct Response: Windows Remote Assistance You should use Windows Remote Assistance to accept real-time assistance from a remote help desk technician. This service involves allowing a trusted person at the remote location to connect to your computer and view your screen. Remote Assistance is used in conjunction with Windows Live Messenger (or e-mail), enabling the remote person to offer real-time assistance via instant messaging. Instant messaging (IM) is a computer-based method of communication in which users can type and view messages sent to one or more recipients, and view the responses immediately. Virtual Network Computing (VNC) is a program that allows you to control a computer at a remote location. Voice over IP (VoIP) is a technology that converts voice into data packets for transmission over a packet-switched IP network.
In order to send an e-mail message, you must include:
You answered: an address in the To field and text in the Message field. Correct Response: an address in the To field.
Google Chrome has an anonymous browsing feature. This feature allows users to use the browser:
You answered: and leave no cached information.
An IT professional can evaluate a browsing session to identify:
You answered: the computer's configuration and upgrades. Correct Response: the processes, technology and potential risks.
You can use the <pre> tag to:
You can use the <pre> tag to:
Which choice correctly describes polygon hot spots on image maps?
You can use up to 100 pairs of x,y coordinates to define a polygon.
Which of the following is typically an advantage to configuring your own hosting server over using an ISP or a cloud service provider?
You have more choices in the configuration.
Which choice correctly describes the tasks required to define a hot spot on an image map?
You must determine the x and y coordinates that indicate the hot spot's position on the image and a URL reference.
Which of the following is an Americans with Disabilities Act (ADA) compliance factor?
You must provide text-based alternatives to all non-text content (e.g., Java applets).
You can include non-keyboard characters in Web pages, such as © and ®, by entering a special HTML code for each character, called the escape sequence. With what characters must you start and end the escape sequence?
You must start the escape sequence with an ampersand ( & ) and end with a semicolon ( ; ).
What can be considered a drawback of obtaining feedback about your Web site by conducting customer surveys via e-mail?
Your organization runs the risk of receiving a bad reputation as a spammer.
What will happen if you neglect to include a <!DOCTYPE> tag in your HTML document?
Your page will not validate with a markup validator.
Which of the following is a disadvantage of using Web-based e-mail?
Your user name and password reside on a third-party server.
Asking other users to divulge personal information during any Internet-based communication can be considered:
a breach of Internet ethics.
Consider the following line from an HTML document: <title> Site Development Associate </title> This code shows an example of:
a container tag.
A wireless access point (AP) is:
a device that enables wireless systems to communicate with each other, provided that they are on the same network. A wireless access point (AP) is a device that enables wireless systems to communicate with each other, provided that they are on the same network. Wireless access points are used in the type of wireless mode known as infrastructure mode. In the ad-hoc wireless mode, systems use only their network interface cards (NICs) to connect with each other. A network interface card (NIC) is a circuit board within a computer's central processing unit that serves as the interface enabling the computer to connect to a network.
What is a local area network (LAN)?
a group of computers connected within a confined geographic area.
Receiving written permission from a copyright owner to use copyright-protected material for your own purposes can be considered:
a licensing agreement.
The opening <p> and closing </p> tags define:
a paragraph.
The ability to identify the tasks that constitute a project, understand the ways in which tasks are dependent upon one another, and know the ways that project dependencies will affect the project as a whole can be considered:
a planning skill.
You use the <img> tag to:
display a graphical image on a Web page.
The best way to help project team members improve their performances or resolve similar issues in future projects is to:
document the lessons learned during the current project.
Pretty Good Privacy (PGP) and Gnu Privacy Guard (GPG) are both used to encrypt:
e-mail messages and their attachments.
Which of the following can be used to detect automated systems used by spammers for registering e-mail accounts?
CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)
Why might a Web page appear differently in different browsers?
Each browser interprets HTML somewhat differently.
IPv4
Each segment is a number between 0 and 255.
What is the term for a combination of characters that you read sideways that helps convey emotion in an e-mail message?
Emoticon
TCP
Enables two computers to establish a communication link and exchange packets of data.
What is ciphertext?
Encrypted data is referred to as ciphertext; unencrypted data is referred to as plaintext.
Which of the following accommodates Web users with vision impairment?
Ensuring that all pages and page elements can be rendered by audio screen readers
Which service provides the ability to automate the planning and operations of an entire organization?
Enterprise resource planning (ERP)
What does Extensible Hypertext Markup Language (XHTML) use to organize the data on a Web page?
Extensible Markup Language (XML)
Which of the following describe the data from which Web pages are created, but do not format Web pages?
Extensible Markup Language (XML) and Standard Generalized Markup Language (SGML)
What are add-ons?
Extensions and plug-ins used to extend the functionality of the Firefox Web browser A codec is an algorithm used by video and audio player plug-ins to compress and decompress files. A viewer is a scaled-down version of an application. Viewers are necessary to retrieve certain files when the program needed to open a file type is not installed on your computer. Media players are standards-based plug-ins that play streaming audio and video.
Having appropriate access to hardware and software, and getting the security access required to perform tasks can be considered which of the following?
IT professionals have certain rights, and they also have responsibilities to the organization. IT rights include having appropriate access to hardware and software, and getting the security access required to perform tasks.
in what significant way do IT projects differ from other projects?
IT projects deal with a business's data and may involve several different systems.
Why is having local access to e-mail messages important for those who use IMAP servers?
If a network problem occurs, IMAP server users may not have access to their messages.
You are troubleshooting a common Internet client problem. You increase the size of the browser cache and change the frequency with which the browser compares cached pages to those on the Web. What are you are trying to do?
Improve the performance of a computer with a slow connection Common Internet client problems include the following: Slow connection -- To improve the performance of computers with slow connections, you can increase the size of the browser cache and change the frequency with which the browser compares cached pages to those on the Web. Poor rendering -- If the text on an older screen is unreadable, you can adjust the font setting to help compensate for lower-resolution monitors. No connection -- If your computer is unable to connect to any Web site and your company uses a proxy server, verify that the browser is correctly configured to use the proxy server.
What function does a list server perform?
It automates the collection and distribution of messages from an authorized group of participants.
In the client/server environment, what is the main function of client software?What is the Internet?
It enables users to communicate with and request information from the server. In a client/server environment, client programs run on the computer nodes and interact with a server program running on the server. The client software is the interface that enables users to communicate with and request information from the server.
Consider the following HTML code: <a href="http://www.habitat.org/support/default.aspx#DonateOnline"> habitat.jpg </a> What does the internal hyperlink in this example do?
It links to an internal anchor in an external file.
Which of the following is true about client-side JavaScript?
It needs HTML to run. JavaScript is not a stand-alone, object-oriented programming language like Java. However, like Java, JavaScript can be used on the server side or on the client side. Server-side JavaScript supports many of the rich features and functions of any server-side scripting language. However, easier-to-learn scripting languages such as PHP are more popular, and JavaScript is typically used in client-side applications to add interactive features to Web pages. Server-side JavaScript does not need HTML to run, but client-side JavaScript must reside within or be called by HTML documents to run.
Which statement about mobile Web sites is true?
Mobile Web sites can be viewed from almost any mobile device.
What is the term for a stand-alone application that is downloaded from a vendor's software repository onto a mobile device?
Mobile app
Which IT job role best describes an individual who creates applications for devices such as smartphones and tablets?
Mobile application developer
Which statement about mobile apps is true?
Mobile apps are designed and built for specific mobile operating systems.
Why has the advent of mobile devices caused Web designers to modify their existing sites or create alternative sites?
Mobile devices have smaller screens that are used to view Web pages previously viewed only on much larger PC monitors.
You are developing a Web site using a GUI editor. You are curious as to whether your pages will look or function any differently after you publish them to the Web. Which of the following is true?
Most GUI editors allow you to easily preview and test your pages in the browser(s) of your choice.
Which of the following is true about validating code when using a GUI editor to develop a Web site?
Most GUI editors include their own native validation tools or offer easy access to validators.
You have developed a Web site using a GUI editor. The final step in Web site development is publishing your site to the World Wide Web. Which of the following is true?
Most GUI editors provide a publish feature to easily post your Web page files to the Web host.
Which of the following is a protocol that can be used by applications to automatically process files downloaded from the Internet?
Multipurpose Internet Mail Extensions (MIME) is a protocol that enables operating systems to map file name extensions to corresponding applications. It is also used by applications to automatically process files downloaded from the Internet. Pretty Good Privacy (PGP) is a method of encrypting and decrypting e-mail messages. GNU Privacy Guard (GPG) is an open-source version of PGP that does not use patented algorithms. Internet Protocol (IP) is a data transmission standard that enables a packet of data to be delivered to a specific computer.
Which protocol is used to host newsgroups and distribute mailing lists by providing text output that users can access at their convenience and by allowing multi-person input like a conference call?
Network News Transfer Protocol (NNTP)
Which IT job role best describes an individual who manages and maintains a network infrastructure?
Network engineer
Which server type provides text output that users can access at their convenience and also allows multi-person input?
News server
What is the term for individual computers and devices that are connected to a network?
Nodes
How do projects differ from ongoing work operations?
Projects are temporary and unique.
To what does "The Right to Be Forgotten" argument relate?
Protecting your image and personal information in the world of social networking
Six elements are required to connect to the Internet. One of these elements is TCP/IP. Which of the following best describes this element?
Protocol software used to communicate with the Internet
Hypertext Transfer Protocol (HTTP)
Protocol used to transfer Web pages from a Web server to a Web client, usually a Web browser.
Which of the following actions will redisplay Web form fields with their default values?
Resetting the form
What is the term for a server at the highest level of the Domain Name System (DNS)?
Root-level server
What is the term for a device that determines the best path for data to take across a network?
Router A network device called a router determines the best path for data to take across a network. A backbone is a high-speed data line to which networks typically connect. A gateway is a node on a network that serves as a portal to other networks.
DNS Domain Name System
Rresolves IP addresses into easily recognizable text-based names. For example, you can access the CIW Web server at IP address 72.44.192.233 by typing www.CIWcertified.com in your browser's Address box. In other words: 72.44.192.233 = www.CIWcertified.com
Which of the following actions will upload user data from a Web form to the receiving server?
Submitting the form
For which encryption method is it critical that the secrecy of the key be maintained by the sending and receiving parties in order for the encryption to be effective?
Symmetric encryption
Direct connections provide continuous access to the Internet. Many bandwidth options are associated with direct connections. Which technology can transmit data over a network connection at speeds up to 1.544 Mbps?
T1
Dedicated digital telephone lines that have much greater bandwidths than ISDN lines.
T1 and T3 lines
ISPs use:
T3 lines to connect to the Internet backbone, which is composed of T3 lines.
Which protocol is required for computers to communicate with each other over the Internet?
TCP/IP
Internet resources can be used for a variety of purposes beyond the World Wide Web and e-mail. Which of the following helps IT professionals troubleshoot and solve problems with Internet technologies?
TCP/IP diagnostic tools
3 of 6 elements required to connect to the Internet:
TCP/IP — protocol software used to communicate with the Internet
Which of the following table element tags are required when you use the <table> tag to create a table?
Table row <tr> and table data <td>
According to HTML5 standards, which choice correctly describes the relationship between tables and Web page structure?
Tables should be used where appropriate to format content, but not to structure Web pages.
Fully qualified domain names (FQDN)
The complete domain name of an Internet computer. The FQDN provides enough information to convert the domain name to an IP address. For instance, www.CIWcertified.com is an FQDN. The FQDN must include the server (host) name, the registered domain name and the top-level domain.
Which of the following results from extracting a compressed file from an archive file created by the compression utility?
The compressed file and a folder containing the extracted files
Which <img> tag attribute specifies alternative text to appear while a graphic is loading, or in place of the graphic in non-graphical browsers?
The alt attribute
Which attribute should you use with the <img> tag to specify the text to display if a user has configured his or her browser not to display images?
The alt attribute
Bandwidth
The amount of information, sometimes called traffic, that can be carried on a network at one time. The total capacity of a line. Also, the rate of data transfer over a network connection; measured in bits per second.
Which of the following is required to render Flash, Java or SVG data in a browser?
The appropriate browser plug-in
Which property can you add to the body selector in an external CSS file to specify the color of the page background?
The background-color property
Which CSS table property should you use if you want to combine the borders of adjacent cells into a single border instead of separating them?
The border-collapse property
Which of the following CSS table properties determines the amount of space between the borders of adjacent cells?
The border-spacing property
You are using an image map that is 180 pixels wide and 90 pixels high. You want to define a rectangular hot spot on the image using coordinates "0,45,90,90." What does the coordinate pair "90,90" represent?
The bottom-right corner of the hot spot
What occurs when your browser cache becomes full?
The browser automatically deletes old cached files as you continue to browse the Web.
When you create an internal hyperlink with the anchor element, what occurs if you omit the hash ( # ) from the href attribute?
The browser will look for an external file by the name specified in the id attribute.
You are using an image map that is 180 pixels wide and 90 pixels high. You want to define a circular hot spot on the image using coordinates "90,45,30." What does the coordinate pair "90,45" represent?
The center of the circle
Which choice correctly specifies the attribute and value needed in an <input> tag for a group of radio buttons to designate a preselected option?
The checked="checked" attribute and value
Cloud computing is software services that are provided over the Internet. Which of the following IT job roles should be most familiar with cloud computing software, infrastructure and platform services?
Server administrator
Domain name servers
Servers on the Internet whose sole function is to resolve human-readable domain names into their computer-readable IP addresses. For example, when you enter www.CIWcertified.com into your browser's Address box, the browser contacts a domain name server to obtain the IP address related to this domain name. When the browser receives the IP address 72.44.192.233 from the domain name server, the CIW Web site displays on your screen.
You want to be able to quickly view news headlines without the need to open your Web browser and visit any news Web sites. How can you accomplish your goal?
Set up a Web feed
Which of the following plug-ins was developed by Microsoft and is a software development tool used to write and run Internet applications?
Silverlight
Which protocol is the Internet standard protocol for transmitting e-mail messages over networks, and is responsible solely for sending -- but not receiving -- e-mail messages?
Simple Mail Transfer Protocol (SMTP)
What automatically separates individual list items when you create an ordered or numbered list?
Single line breaks
How many heading styles are defined for HTML?
Six
Instead of purchasing software and hardware that must be maintained by internal resources, more and more small businesses today are choosing hosted solutions with a monthly subscription fee and outsourced system maintenance. Which term is commonly used for this business model?
Software as a Service
Kim is using the YouTube graphics-editing application that she accesses via the Internet through her browser. Kim does not own the application, nor can she download it. She is able to use the application any time she needs to edit graphics. Although she does not have to pay for the access, she does notice advertisements, which appear on the sidebar of the application's interface. The application Kim is using may be classified as which of the following?
Software as a Service (SaaS)
You are developing a Web site using a GUI editor, and you want to validate your code. What information does a validation engine use to determine the W3C standard it should validate against?
The code standard specified in the !DOCTYPE declaration (e.g., HTML5)
Which of the following should you use to specify the width in characters of a scrolling text box?
The cols attribute
Companies increasingly want to allow employees to share files directly without having to maintain servers to provide FTP access. Which technology can companies use to maximize processing power while protecting privacy and sensitive materials?
P2P
Which IT job role best describes an individual who installs, modifies and repairs personal computer hardware components?
PC repair technician
Image layers are supported in which of the following file formats?
PNG
In an Ethernet network, all data travels across the network and between computers in which form or unit?
Packets
What is the term for the idea of a major change in a former way of thinking or organizing?
Paradigm shift
Which of the following assumes the current document's path so that all references are made from the document's current directory?
Partial URL
When you sign in to your instant messaging (IM) service, your online status is advertised (or published) to the people on your contacts list. What does this scenario represent?
Presencing
Which of the following enabled private (i.e., commercial) business to be conducted over networks connected to NSFnet?
Private telecommunications companies In the late 1980s, the Department of Defense decommissioned the ARPANET, and all sites switched over to the National Science Foundation (NSF) network, called NSFnet. NSF did not permit users to conduct private (i.e., commercial) business over the NSFnet. As a result, private telecommunications companies developed their own high-speed data lines, called backbones, which used the same protocols as NSFnet and connected to it through gateways. These private networks did not restrict network use, so the Internet became usable for commercial purposes.
What is project management?
Project management is the practice of applying knowledge, skills and processes to activities in order to meet deadlines and achieve desired results. A project is a sequence of tasks that must be accomplished within a certain time frame to achieve a desired result. Project scheduling is the practice of listing the planned dates for performing tasks and meeting goals defined in a project plan. The project triangle refers to the three factors -- time, money and scope -- that affect every project.
What will occur if your HTML code asks for a color that the browser or operating system cannot support?
The computer will compensate by dithering.
What occurs when a user clicks the Submit button on a Web form?
The data from all fields in the form is sent to be processed by the action specified in the <form> tag.
Internet Protocol (IP)
The data transmission standard for the Internet. Every computer connected to the Internet has its own IP address, which enables a packet of data to be delivered to a specific computer.
When you are ready to publish your Web site files to your Web host, which choice lists all the information you must specify in order to publish your files?
The destination server's name or IP address, authentication information, and the file location on the remote server
You are using an image map that is 180 pixels wide and 90 pixels high. You want to define a rectangular hot spot on the image using coordinates "0,45,90,90." What does the coordinate 45 represent?
The distance in pixels from the top of the image to the top of the hot spot
Which choice correctly describes the effect of clicking a hot spot on an image map?
The file designated by the hot spot's URL reference will load.
During which project management phase should you determine the aspects of the project that worked well and the changes that should be implemented in the future?
The final phase of a project is the closing phase. During the closing phase, your team should evaluate the project schedule, budget, scope, resources and assignments to determine the aspects of the project that worked well and the changes that should be implemented in the future. A project is deemed a success when it is completed within the budget and time frame specified, and the finished product meets quality standards. The planning phase involves identifying all the tasks required to achieve the project goals, the people who will perform those tasks, and the resources that will be required. During the executing and controlling phases of a project, project work is performed (executed), progress is monitored and corrective action is taken as needed (controlled).
In a URL, what does the domain name component identify?
The site owner's registered site name and organization type
A user with a slow Internet connection downloads an image in which 13 percent of the image is rendered during the first pass, 25 percent is rendered during the second pass, then the remainder is rendered in 25-percent increments until the image renders completely. This is an example of:
an interlaced image.
A numbered list is considered to be:
an ordered list.
A bulleted list is considered to be:
an unordered list.
Hypertext Transfer Protocol (HTTP) is responsible for providing Web pages to users who request them. The required elements for HTTP to function are:
client, server and TCP/IP.
HTML tags that come in pairs are called:
container tags.
An absolute URL:
contains a full path to a resource, including the protocol indicator.
Consider the following HTML code: <audio> <source src="audio.mp3"type="audio/mpeg"/> <source src="audio.wav"type="audio/wav"/> <source src="audio.ogg"type="audio/ogg"/> Your browser does not support the HTML5 audio element. </audio> Which attribute and value must you add to the <audio> element to incorporate default audio operations such as play, pause, volume, etc.?
controls="controls"
Which of the following coords attribute values defines a rectangle?
coords="x1,y1,x2,y2"
Which of the following coords attribute values defines a polygon?
coords="x1,y1,x2,y2,x3,y3,x4,y4"
The main goal of Extensible Hypertext Markup Language (XHTML) is to:
create a medium that would provide for the transition from HTML to XML.
If you are conducting search engine optimization (SEO), you should:
create as simple a form as possible.
When creating Web forms, you use the <input> tag to:
create text boxes, check boxes, radio buttons, and the Submit and Reset buttons.
Consider the following HTML code: <h1>CIW Site Development Associate Skills </h1> <ul> <li>Project Management</li> <li>HTML Coding</li> <li>GUI Authoring</li> </ul> Which of the following statements about this code is true?
The line breaks between elements make the code easy to read, which is considered good coding practice.
By default, what occurs when a user clicks a hyperlink in a browser?
The link's specified destination will appear.
Difference between a wireless network and a cabled network:
The medium itself; wireless systems use wireless signals (high-frequency radio waves) instead of a network cable.
Which <form> tag attribute specifies the process required to send form data to a Web server?
The method attribute
Which <form> tag attribute uses the "get" and "post" values to specify how the browser will send form data to a Web server?
The method attribute
Which statement about compressing JPEG files is true?
The more compression, the smaller the file size, but the lower the image quality
Which of the following is responsible for ensuring that data packets are transferred quickly and reliably across a network?
Transmission Control Protocol/Internet Protocol (TCP/IP)
802.11n
The most current wireless standard. Compared to the previous wireless standards, 802.11n enables you to build bigger, faster wireless networks that deliver better reliability and capacity with more built-in security.
Which <input> tag attribute organizes Web form information submitted by the user into the basic elements for a raw text string, which is then processed by the Web server?
The name attribute
Which attribute is shared by all Web form field elements?
The name attribute
In a URL, what does the Internet resource component identify?
The name of the server on which the page resides. In a URL, the Internet resource is the name of the server on which the page resides, such as "www" for a Web server. Web servers usually (but not always) have names beginning with "www." The domain name identifies the site owner's registered site name and organization type. The protocol component identifies the Internet protocol used to send information from the server to a user's computer, and thus indicates both the type of server and Internet service being used. The home page is the first page that displays when a user accesses a domain.
What is the term for the goals and tasks of a project, and the work required to complete them?
The project scope refers to the end product or ultimate goal of a project, along with the tasks required to achieve that goal. The project plan is a document that identifies all the tasks required to achieve the project goals. An assignment is made when a resource is given a specific task to perform. The project schedule is a document that lists the planned dates for performing tasks and meeting goals defined in a project plan.
What is Internet Protocol (IP)?
The protocol by which data is sent from one computer to another on the Internet
Which of the following is affected by any changes you make to the three "project triangle" factors in an effort to optimize a project's schedule?
The quality of the project deliverable
Radio buttons are reserved for two or more mutually exclusive options on a Web form. How do you ensure this exclusivity?
The radio buttons must share the same name attribute.
Consider the following code snippet: <tr> <th rowspan="5"> Site Development Associate </th> </tr> Which choice most accurately describes the result of the code?
The row heading is located in a cell that vertically spans five rows of the table.
What happens when you place a CSS rule between the /* and */ characters?
The rule will be ignored.
You have developed a Web site using a GUI editor. You are now ready to post the Web site files to a test server. Which of the following is an important configuration for your test server?
The same type and version of Web server software as the production server
When you use command-line FTP on Windows systems:
files are downloaded into the directory from which you enter the FTP commands. On Windows systems, you can use the MS-DOS prompt to access a command-line FTP client to upload files. When you access the MS-DOS prompt, the DOS window opens in the Windows directory. To download files into a specific folder other than the Windows directory, create or navigate to the directory, then start the FTP session. Files are downloaded into the directory from which you enter the FTP commands.
A relative Uniform Resource Locator (URL) is a URL that:
gives an abbreviated path to a resource using the current page as a starting position.
The SETI (Search for Extraterrestrial Intelligence) project collected vast amounts of data that needed processing. SETI was one of the early adopters of a technology in which volunteers installed a small application on personal computers to receive, process and return information to SETI. Using multiple systems to process large amounts of data was considered to be less expensive than using a single supercomputer to conduct the same task. This technology is typically known as:
grid computing.
Generally, successful Web sites:
have a strong, central theme aimed at a distinct audience.
ISO 9000 details the steps recommended to produce high-quality products and services using a quality-management system that:
maximizes time, money and resources.
A drawback of Webinars is that they:
may require multiple presentations if participants are located in different time zones.
Which of the following is considered an original Internet top-level domain?
net
The HTML code < and > are examples of:
non-keyboard characters.
Circle hot spots are defined by:
one pair of x,y coordinates and a radius value.
Which attribute and value should you use if you need to define a hot spot that is neither rectangular nor circular?
shape="poly"
When you create a text box field, you should use the maxlength attribute to:
specify the maximum number of characters a user can enter into the text box.
When you create a text box field, you should use the size attribute to:
specify the visual width of the text box in characters.
The formal project review consists of:
testing the product, evaluating performances and documenting lessons learned.
The most common form field used in designing Web forms is the:
text box.
Tags that format text as bold or italic are known as:
text-level elements.
What does a URL that starts with https:// signify?
that you are visiting a secure Web site in which data transmissions are encrypted
In order to create an external hyperlink, you must determine:
the absolute URL, including the protocol indicator, for the Web page to which you want to link.
As you develop a Web site designed for mobile devices, always use:
the alt attribute in your <img> tags.
The CSS padding property of the <table> element determines:
the amount of space between cell data and the cell border.
The technology adoption life cycle describes:
the degree to which members of a demographic will adopt or accept a new product or innovation.
In RGB code:
the higher the numeric value representing a color, the lighter that color will be.
Moore's Law postulates that:
the number of transistors per square inch on integrated circuits will double every two years.
The project triangle consists of:
the time, money and scope that affect every project.
When using the <input> tag, you designate the form field type by assigning the appropriate value to:
the type attribute.
Viruses that reside within the text of an HTML-formatted e-mail message are particularly virulent because:
the user need only receive the virus for it to cause damage.
Which file format is a popular, customizable graphics format commonly used for medical imaging and desktop publishing?
tiff
A non-interlaced image format is read from:
top to bottom.
Providing a link from your Web site to another site without permission is considered:
unethical.
The connectivity that makes the Internet possible also makes systems vulnerable to:
unwanted activity.
The term "pixel" is short for:
"picture element."
Cable modem
512 kilobits per second (Kbps) to 52 Mbps.
xDSL modem
512 Kbps to 32 Mbps.
Web browser
A software application that enables users to access and view Web pages on the Internet.
Most browsers are able to save:
All images, fonts and scripts referenced by the HTML on a page.
The protocol required for text messaging is:
SMS
Which of the following should you use to define a client-side image map?
The <map> tag
Develops standards for the computer and electronics industries.
.The IEEE
Which of the following top-level domains would generally refer to an Internet Service Provider (ISP)?
.net
T1 line
1.544 Mbps. Commonly used by North American corporate LANs to connect to ISPs.
HTML code provides the browser with information, such as:
1.The fonts and font sizes used in the Web page. 2.The location of the graphical, animated, audio or video content. 3. The format for displaying graphical, animated, audio or video content. 4. The location of hyperlinks. 5. Other formatting elements such as content alignment, page and text color, and so forth.
In hexadecimal code, the number 16 is represented as:
10.
In a style sheet, what must you use to separate multiple declarations for one selector within a rule?
A semicolon ( ; )
What is a software patent?
A set of exclusive rights granted to an inventor for a fixed period of time upon disclosure of the invention
E1 line
2.048 Mbps. European equivalent of T1.
Approximately how many numeric IP addresses are possible with IPv4?
4 billion
Which device connects a wireless local area network to a wireless phone network at broadband speeds?
4G mobile hotspot
When a user with a slow Internet connection downloads a non-interlaced image, the top of the image will appear when the browser has read:
50 percent of the image.
World Wide Web (WWW)
A set of software programs that enables users to access resources on the Internet via hypertext documents.
Which of the following refers to a family of specifications for wireless network technology?
802.11 standards
Family of specifications for wireless network technology
802.11 wireless standards
When conducting a Web development project meeting, why might it be useful to have a third party deliver a summary of progress?
A third party may help ensure clarity in meetings that include technical and non-technical participants.
Which of the following is considered to be the preferred method of designing Web pages?
Implementing a liquid design layout using CSS
Which of the following examples uses the correct syntax for the anchor element?
<a href="http://www.habitat.org"> Habitat </a>
Which of the following is an example of correct HTML tag nesting?
<h1><em> Site Development Associate </em></h1>
Which HTML code will produce a Web-user form field that offers the user round buttons with mutually exclusive choices?
<input type="radio"name="Certifications"value="Associate"/> CIW Web Foundations Associate <input type="radio"name="Certifications"value="Professional"/> CIW Web Design Professional
What is the term for an e-mail server program that receives sent messages and delivers them to their proper destination?
A Mail Delivery Agent (MDA) is an e-mail server program that receives sent messages and delivers them to their proper destination (or mailbox), where a user can pick them up. An outgoing mail server runs a Message Transfer Agent (MTA), also called a mail transport agent, which routes, delivers and receives messages, usually via Simple Mail Transfer Protocol (SMTP). SMTP is responsible solely for sending e-mail messages. Post Office Protocol version 3 (POP3) servers receive and hold incoming e-mail messages in the appropriate mailbox on the server until users log on (authenticate themselves with a user name and password) and download their mail.
What table element attribute do you need to specify to add a border to a table?
<table border="1">
Consider the following HTML code: <input type="file"name="File"/> What does this code create on a Web form?
A Browse button so users can select and upload files to your site
File Transfer Protocol (FTP)
A TCP/IP suite protocol that enables the transfer of files between two computers on the Internet. Allows file transfer without corruption or alteration.
What occurs when the Web server receives raw text strings from the client?
A CGI script parses and formats the raw text strings into a human-readable format.
To which type of server are you usually transferred when you download software programs and documents from Web sites?
A File Transfer Protocol (FTP) server
How does a LAN differ from a WAN?
A LAN spans a confined geographic area, whereas a WAN consists of multiple LANs.
What is Scalable Vector Graphics (SVG)?
A W3C-recommended language that uses XML to describe graphics and graphical applications
What is the term for an audio and/or video Web event that is distributed over the Internet?
A Webcast is an audio and/or video Web event that is distributed over the Internet. A Webcast uses streaming media technology to take a single Web event and distribute it to many participants simultaneously. Webcasting differs from Webinars and Web conferencing, which are designed to allow all participants to interact with one another. Webcasts generally refer to non-interactive Web events.
Web site
A World Wide Web server and its content; includes multiple Web pages.
Network interface card (NIC)
A circuit board within a computer's central processing unit that serves as the interface enabling the computer to connect to a network.
Usenet (User Network)
A collection of thousands of Internet computers, newsgroups and newsgroup members using Network News Transfer Protocol (NNTP) to exchange information.
Server model
A computer in a network that manages the network resources and provides, or serves, information to clients.
Host
A computer that other computers can use to gain information. In network architecture, a host is a client or workstation.
Standard
A definition or format that has been approved by a recognized standards organization.
Modem
A device that enables computers to transmit data over standard analog telephone lines. A modem converts digital data from a computer into an analog signal to be transmitted through the telephone line to another modem. The receiving modem converts the analog signal back into digital code and transmits it to the receiving computer.
Wireless access point (AP)
A device that enables wireless systems to communicate with each other, provided that they are on the same network.
Router
A device that routes packets between networks based on network-layer addresses; determines the best path across a network. Also used to connect separate LANs to form a WAN.
Client/Server Model
A distributed approach in which a client makes requests of a server and the server responds
Which Internet resource is used to resolve domain names to IP addresses?
A domain name server
Consider the following HTML code: <p>Are you CIW certified?</p> <select name="Certified"size="4"> <option>Not yet</option> <option>CIW Web Foundations Associate</option> <option>CIW Web Design Professional</option> <option>CIW Web Development Professional</option> </select> Which type of form field does this HTML code create?
A drop-down list from which users can choose one response
Which of the following can you use to create HTML pages without writing any code manually?
A graphical user interface (GUI) editor
Which definition best describes a network?
A group of computers connected so they can communicate, share resources and exchange data
Consider the following HTML code: <form> <p>Which skills can you offer a potential employer?</p> <input type="checkbox"name="Skills"value="HTML"/> HTML coding <input type="checkbox"name="Skills"value="GUI"/> GUI authoring tools <input type="checkbox"name="Skills"value="Design"/> Fundamental Web design <input type="checkbox"name="Skills"value="PMgmt"/> Project management <input type="checkbox"name="Skills"value="EComm"/> E-commerce solutions </form> Which type of form field does this HTML code create?
A group of square buttons from which users can choose multiple responses
What is a listserve group?
A group of users that subscribes to a mailing list
Digital Subscriber Line (DSL)
A high-speed direct Internet connection that uses all-digital networks.
Virtual domain
A hosting service that allows a company to host its domain name on a third-party ISP server.
Shared domain
A hosting service that allows multiple entities to share portions of the same domain name.
What is a metalanguage?
A language that is used to create other languages
What is an end-user license agreement (EULA)?
A legal contract between the author of software and the end user that defines how the software can be used
What is a peer-to-peer network?
A network in which each computer has both server and client capabilities
In computer terminology, what is a network?
A network is a group of two or more computers connected so they can communicate, share resources and exchange information with one another.
A number generated by an algorithm from a string of text
A number generated by an algorithm from a string of text
What kind of Web site contains photographs that are copyrighted to the photographer from whom you must obtain permission to use the images?
A photo-sharing Web site
Point-to-Point Protocol (PPP)
A protocol that allows a computer to connect to the Internet over a phone line.
Point-to-Point Protocol over Ethernet (PPPoE)
A protocol that implements PPP on top of the Ethernet architecture to connect an entire network to the Internet.
Internet MessageAccess Protocol (IMAP)
A protocol that resides on an incoming mail server Similar to POP, but is more powerful. Allows sharing of mailboxes and multiple mail server access. The current version is IMAP4.
Which language is considered the best language for creating large applications?
C++
What can users input to selectively view and analyze data from a database?
A query Users can input a query to selectively view and analyze data from a database. A query isolates and displays only the information you want to examine by specifying the fields and records you want to see. A common field is a field contained in two or more database tables that forms a connection between the tables. A primary key is a field containing a value that uniquely identifies each record in a database table. A junction table is a database table containing foreign-key fields that refer to the primary-key fields from the primary tables in a many-to-many database table relationship.
In databases, what is a one-to-one relationship?
A relationship in which each record in Table A can have only one matching record in Table B, and vice versa A one-to-one relationship is a database table relationship in which each record in Table A can have only one matching record in Table B, and vice versa. The relationship is established only if the common field is the primary key in both tables. A one-to-many relationship is a database table relationship in which a record in Table A can have multiple matching records in Table B, but a record in Table B has only one matching record in Table A. A many-to-many relationship is a database table relationship in which one record in Table A can relate to many matching records in table B, and vice versa. A table relationship cannot occur if no common field exists between two tables.
What can you use to help you determine how closely a site matches the topic for which you are searching?
A relevancy score based on how frequently your specified keywords are found in the site
What is the term for a person, department or device needed to accomplish a task?
A resource is a person, department or device needed to accomplish a project task. A project is a sequence of tasks that must be accomplished within a defined time frame in order to achieve a desired result. An assignment is made when a resource is given a specific task to perform. A stakeholder is a person or group with an interest in a project and the power to exert influence over the project and affect results.
Consider the following code from a CSS document: body {color: teal; font: white;} This code is an example of what?
A rule
What is the World Wide Web?
A set of software programs that enables users to access resources on the Internet via hypertext documents The World Wide Web (WWW), also called the Web for short, was created in 1989 at the European Particle Physics Laboratory in Geneva, Switzerland. The Web was designed to enable scientists studying high-energy physics to share information more efficiently by using hypertext documents. A hypertext document is created using Hypertext Markup Language (HTML), a system of code that enables the author to include hypertext links (also called hyperlinks or links) in documents. The World Wide Web is not a network; it is a set of software programs that enables users to access resources on the Internet via hypertext documents. The Internet is a worldwide network of interconnected networks. Protocols are the rules that enable clients and servers on the same network to communicate.
Which of the following services allows multiple companies, organizations or people to share portions of the same domain name?
A shared domain
Your company has a registered domain name. You decide to sell portions of the domain name and make it available to others. What does this scenario describe?
A shared domain
What is an anonymous FTP site?
A site that allows guests to download files without having an account on that site. (ex: school & cannot upload)
Which of the following devices can you use with personal information management (PIM) software to synchronize appointments and contact information that you keep on your desktop or laptop computer?
A smartphone
Multimedia on the Web has expanded rapidly as broadband connections have allowed users to connect at faster speeds. Almost all Web sites, including corporate sites, feature multimedia content and interactive objects. To view interactive multimedia online, you need which of the following?
A sound card, speakers and a video card Nearly all network-connected devices, such as PCs, tablets, smartphones and smart TVs, can view online interactive multimedia. Each device includes a sound card, speakers and a video card. In some cases, small applications called plug-ins are required for browsers to view content that is not supported. Browser plug-ins are commonly used to play streaming audio and video, and interact with multimedia objects over the Internet.
End point
A standard system that uses a wireless network interface card (NIC).
Which of the following is a sensible method of reducing spam submissions to Web forms you create?
CAPTCHA
Transmission Control Protocol/Internet Protocol (TCP/IP)
A suite of protocols that turns data into blocks of information called packets, which are then sent across the Internet. The standard protocol used by the Internet.
Domain Name System (DNS)
A system that maps uniquely hierarchical names to specific Internet addresses.
The colspan and rowspan attributes of the <td> and <th> tags specify the number of columns and rows, respectively, that a certain element occupies. What is that element?
A table cell
Which of the following is a unit of work that must be accomplished during the course of a project?
A task is a unit of work that must be accomplished during the course of a project. A resource is a person, department or device needed to accomplish a project task. An assignment is made when a resource is given a specific task to perform. Scope refers to the goals and tasks of a project, and the work required to complete them.
What is image interlacing?
A technique that allows an image to progressively display in a browser as it downloads
What is image animation?
A technique that combines several images in a sequence that is rendered in rapid succession to simulate motion
Which of the following can you use to create markup language code (e.g., HTML)?
A text editor
Which of the following services are you using when a third party is hosting your Web site but your company has its own Web address with its own domain name?
A virtual domain
What is the Internet?
A worldwide network of interconnected networks
What is a worm?
A worm is a self-replicating program or algorithm that consumes system resources. A worm resides in active memory and replicates itself until an entire disk is full. A virus is a malicious program that assumes control of system operations, and damages or destroys data. An illicit server is an application that installs hidden services on systems. A trojan is a program that appears to be harmless but actually produces harmful results.
Modem
Abbreviation for modulator/ demodulator. An analog device that enables computers to communicate over telephone lines by translating digital data into audio/ analog signals (on the sending computer) and then back into digital form (on the receiving computer).
What specific information would you need to obtain from an ISP or cloud service provider whose hosting services you wanted to use?
Account information, IP addresses, DNS server names, and file and directory location instructions
As part of the IT department, you configure the employee workstations for your company. When configuring a user's system, you always set the browser security levels to the company standard settings. What is restricted from downloading to the user's system when you configure browser security levels?
Active Content
Two types of wireless modes exist, what are they?
Ad-hoc — wireless mode in which systems use only their NICs to connect with each other. Infrastructure — wireless mode in which systems connect via a centralized access point, called a wireless access point (AP).
When you create a select list, how can you specify to pass a value different from the text that appears in the list?
Add the value=""attribute into any or all of the <option> tags.
Where is the slash ( / ) character placed in a stand-alone non-empty HTML tag?
After the element name (before the closing wicket)
What is the term for the Web 2.0 programming methodology that enables Web applications to interact with users in much the same way they do with desktop applications?
Ajax
What occurs when a user clicks the Reset button on a Web form?
All form fields are cleared and set back to their default settings.
What occurs when a referenced page is moved or deleted, or if page content is changed and all anchors are renamed or lost?
All hyperlinks that link to that page become invalid.
Anonymous FTP sites
Allow guests to transfer files without an account on the remote site. Available to the public. To obtain access to files through an anonymous FTP server, you use the general user ID "anonymous" and provide your e-mail address as the password.
A virtual domain
Allows your Web address to be shorter. It also gives your company the prestige of its own Web address for branding purposes, even though a third party is hosting your Web site.
Which of the following was enacted to protect the civil rights of people with disabilities, and includes mandates that electronic information be accessible to people with disabilities?
Americans with Disabilities Act (ADA)
In a raw text string, which of the following is used to delimit name=value pairs?
Ampersands ( & )
Web page
An HTML document containing one or more elements (text, images, hyperlinks) that can be linked to or from other HTML pages.
What is a viewer?
An application used to retrieve a file when the program needed to open the file type is not installed on your computer
What is the difference between an ISP and a cloud service provider?
An ISP provides bandwidth and possibly Web server space, whereas a cloud service provider provides more complex services such as software-as-a-service (SaaS), backup services and database connectivity.
Providing services and products in a timely, cost-effective, secure manner can be considered which of the following?
An IT responsibility
Minimizing workflow interruptions during the course of an IT project can be considered which of the following?
An IT responsibility IT professionals have certain rights, and they also have responsibilities to the organization. IT responsibilities include planning service and product installations and conducting training in a manner that minimizes workflow interruptions and hardware or network downtime. IT rights refer to what organizations should provide their IT staff in order for them to do their jobs properly. IT professionals are also bound by the rules and policies that govern an organization.
Receiving clear, detailed objectives and instructions so that you can provide the appropriate services and products can be considered which of the following?
An IT right
Which term describes the appointment of a specific resource to a specific task?
An assignment is made when a resource is given a specific task to perform. A task is a unit of work that must be accomplished during the course of a project. A resource is a person, department or device needed to accomplish a project task. The project plan is a document that identifies all the tasks required to achieve the project goals. The project schedule is a document that lists the planned dates for performing tasks and meeting goals defined in a project plan. The end product or ultimate goal of a project, along with the tasks required to achieve that goal, constitute the project scope.
Which of the following is required in an HTML tag?
An element
What is a hash?
An encryption method in which numbers generated by an algorithm from a string of text are used to verify the integrity of transmitted messages Hash encryption is an encryption method in which numbers generated by an algorithm from a string of text are used to verify the integrity of transmitted messages. Symmetric encryption is an encryption method in which the same key is used to encrypt and decrypt a message. Asymmetric encryption refers to an encryption method in which two keys are used to encrypt and decrypt a message: a private key and a public key.
Client model
An individual computer connected to a network. Also, a system or application (such as a Web browser or user agent) that requests a service from another computer (the server) and is used to access files or documents.
Internet Service Provider (ISP)
An organization that maintains a gateway to the Internet and rents access to customers on a per-use or subscription basis.
What is an Internet Service Provider (ISP)?
An organization that maintains a gateway to the Internet and rents access to it
What is a CSS selector?
Any element to which designated styles are applied
Node
Any entity on a network that can be managed, such as a system, repeater, router, gateway, switch or firewall. A computer or other addressable device attached to a network; a host
What is a node?
Any entity or addressable device on a network that can be managed
Typically T1/E1 and T3/E3 connections
Are typically used for wide area network (WAN) links and high-volume applications, such as high-volume Web sites. Many smaller companies can be supported through ISDN, xDSL or cable modem.
How do most current e-mail clients display an attachment in an e-mail message?
As a separate link, such as an icon
What is the relationship between encryption and authentication?
Authentication occurs before an encryption session can begin, but authentication does not ensure that the ensuing session will be encrypted
To understand Web search engines, you must understand:
Basic database concepts.
Why is it preferable to use <strong> in lieu of <b> to apply the bold text style?
Because <strong> can be used both to denote bold text when printed and strongly spoken text when output through an audio device
When you develop a mobile Web site, why is it important that you validate your markup code to HTML5?
Because HTML5 was created in part to provide support for mobile devices.
Why would some corporate IT departments disable JavaScript and ActiveX on browsers used within the company?
Because JavaScript and ActiveX controls allow information to be downloaded and run on your system.
Why should you avoid adding spaces or hard returns within an <img> tag?
Because XHTML will render the additional spaces or hard returns, which may affect the placement of the image on the page
Why should you avoid placing paragraph breaks around heading styles in your HTML code?
Because heading styles are automatically preceded and followed by paragraph breaks
Why is Lynx often used by those who are visually impaired?
Because it is a command-line text-only Web browser that can be used with software that renders text into voice
Why should you use succinct wording on Web pages, especially the home page, when designing your site?
Because most users simply scan pages quickly looking for specific information or links to it
Ange works as an Administrative Assistant for a small business that uses an SaaS service for sales orders and customer accounting (similar to Salesforce.com). Ange makes sure to save accurate records about current projects, and she performs regular backups of the business data stored on this cloud-based service. Why?
Because the service and records would not be accessible if there is an interruption in Internet access
Why are firewalls considered the first line of defense against LAN security breaches?
Because they provide data confidentiality
When you prepare your development environment to create Web page code, why should you set file preferences to view file name extensions?
Because you will be working with various file types that may have the same or similar names
Which aspect of program management typically includes maximizing revenue, maximizing efficiency, minimizing cost and eliminating waste?
Benefits management
If you want to specify default text for a text area box, where should you add the text that will appear as default text?
Between the <textarea> tags
Which of the following do end users most commonly download from FTP sites?
Binary files FTP servers contain documents of various sizes and types. Two common types of resources available on Internet FTP servers include large text files and binary files. End users will most commonly download binary files from FTP sites. Binary files are executable files, small software applications, images that require an association to open, or compressed files that require decompression.
Which of the following search engines uses your social network (Facebook and Twitter) to find more relevant information for your query?
Bing
which of the following are typically an example of secondary resources?
Biographies Secondary research is based on primary resources, preferably by a credible individual. Secondary resources include biographies, text books, magazines, newspapers, commentaries on speeches, and reference books. Secondary resources are the most common type of resource you will use. Resources such as autobiographies, debate transcripts and physical relics would be considered primary resources because the source material has not been edited or compiled in a significant way by a researcher.
What color does the hexadecimal value #000000 represent?
Black
What is the default appearance of hyperlinks in the browser?
Blue and underlined
Which choice lists two methods that you can use to reference an FTP or file-storage server (such as Dropbox) in order to download files?
By IP address or domain name
How do proxy servers increase the corporate network's Internet access speed?
By caching Web sites for the entire network
How are wide area networks (WANs) created?
By connecting LANs to one another via public carriers
Which choice correctly describes the relationship between tables and borders?
By default, borders do not appear around tables.
How is a table relationship established?
By matching data in key fields between two database tables
How does the separation of duties help to ensure the quality of a product?
By providing independent verification that project tasks were completed correctly
How is IPv6 able to offer more Internet addresses than IPv4?
By using 128-bit IP addresses
Uses your television as the monitor by connecting your TV to the Internet with an enhanced set-top cable box. The cable box accesses the Internet through the cable TV line.
Cable Internet
Uses coaxial cables, which can transmit data and streaming audio and video images at much faster speeds than are possible using standard telephone lines.
Cable modems
Web pages that use ActiveX:
Can include animation, audio and video.
Which technology enables you to place formatting instructions in an external text file to determine the look and feel for a Web page or site?
Cascading Style Sheets
What is the term for rules in an external text file that determine how to display HTML elements in your Web pages?
Cascading Style Sheets (CSS)
The main difference between form creation in HTML5 versus form creation in HTML 4.01 is:
Cascading Style Sheets (CSS) are used for all form styles.
What is the term for the process, tools and techniques that help people implement changes to achieve a desired outcome?
Change Management
You are developing a Web site using a GUI editor. You have written code in the pages to the HTML 4.01 Transitional standard, and it has validated. Then a team member, hearing that the site will be updated to HTML5 soon, changes the !DOCTYPE declaration on this page to refer to HTML5. Although your page once validated as HTML 4.01 Transitional, it no longer validates. What is the fastest way to get the page to validate?
Change the !DOCTYPE declaration back to HTML 4.01, to which the page code currently conforms.
Which Web form field allows users to choose from among two or more non-exclusive options?
Check box
Which term is used to describe a computer that is connected to a central server with which it can communicate and from which it can request information?
Client
Of the six elements required to connect to the Internet, which can be supplied in the form of a Web browser, e-mail program or mobile app?
Client software
4 of 6 elements required to connect to the Internet:
Client software — Web browser, e-mail or news client program
To support an Internet client, you must have six elements. The first three -- a computer, an operating system and TCP/IP -- are generally acquired when you buy a computer. Which choice lists the other three elements you need to support an Internet client?
Client software, Internet connection and Internet address
What is the term for code embedded into an HTML page and downloaded by a user to help process Web form input?
Client-side script
During which project management phase should product testing and performance evaluations occur?
Closing phrase
What term refers to hosted applications and services offered by a third party?
Cloud computing
Which hosting solution is characterized by a service provider that allocates space for your equipment but does not provide the server hardware?
Co-location
What is the term for an algorithm used by video and audio player plug-ins to compress and decompress files?
Codec
Which of the following is true about the color combinations you use for your Web site?
Color combinations can convey the personality of the site by imposing tone and mood.
Which of the following is the de facto standard used to process Web forms?
Common Gateway Interface (CGI)
Which of the following is used to process data submitted by a user by passing data back and forth between a server and an application program?
Common Gateway Interface (CGI) Anytime you conduct a database search, the database may be using Open Database Connectivity (ODBC), as well as a Common Gateway Interface (CGI) application to connect the front end (e.g., the Web server) to the back end (e.g., the database). When you click a hyperlink to access a Web page, the Web server retrieves the requested page. However, when you submit an online form, the Web server typically forwards the form information to an application program that processes the data. Common Gateway Interface (CGI) is the method by which data is passed back and forth between the server and the application program. The Open Database Connectivity (ODBC) standard was designed to enable an operating system to access databases from various vendors. A database management system (DBMS) is a program used to store, access and manipulate database information. Structured Query Language (SQL) has become the standard interactive and programming language for accessing information from and updating information in a database, particularly large relational databases.
Six elements are required to connect to the Internet. Which one of the six required elements can be satisfied by any of several examples including PC, smartphone, smart TV or tablet?
Computer
1 of 6 elements required to connect to the Internet:
Computer — PC, WebTV, mobile phone, Internet phone or handheld device
Which of the following elements required to connect to the Internet are generally acquired when you buy a computer?
Computer, operating system and TCP/IP Six elements are required to connect to the Internet: computer, operating system, TCP/IP, client software, Internet connection and Internet address. The first three items are generally acquired when you buy a computer.
In a networked environment
Computers are connected to a network server, which acts as the central repository of programs and data to which all users connected to the network have access.
If your company network uses a proxy server, what must you do to be able to access the Internet?
Configure your browser to address the proxy server.
Which statement best describes DSL?
DSL stands for Digital Subscriber Line, a direct Internet connection method that uses digital phone lines and an xDSL modem.
Which HTML tag type consists of a pair of opening and closing tags?
Container tags
What is the relationship between hot spot coordinates and the pixel size of an image?
Coordinates are dependent upon the pixel size of an image; if an image is resized, you must change the coordinates.
What is the open-source software development term for the practice of removing restrictions from the distribution and use of software?
Copyleft In open-source development, copyleft is the practice of removing restrictions from the distribution and use of software, and requiring all modified versions of the software to be free. The term copyleft is a play on the word copyright, which restricts the use of intellectual property. Dual licensing is the practice of distributing software under two different licensing agreements. Project fork is the point at which a developer copies source code as it exists, then begins independently developing the code further to produce a distinct piece of software.
What is the term for the legal ownership of expression by an author?
Copyright
Which of the following is an example of effective Web site file structure?
Creating a directory of HTML pages that contains subfolders with images and files used in each page
Tim is listening to music from an online music provider (such as Pandora). He creates a list of his music preferences, and the music service uses his list to suggest additional songs that Tim might like. This music service is an example of a cloud-computing application that uses collaborative filtering technology. What is the name of this type of technology?
Crowdsourcing
What is the name of the problem-solving model in which a task ordinarily performed by one person is outsourced to a large group or community in order to obtain and analyze large amounts of data?
Crowdsourcing Crowdsourcing is the name of the problem-solving model in which a task ordinarily performed by one person is outsourced to a large group or community in order to obtain and analyze large amounts of data. Some cloud-computing applications use crowdsourcing to help you define and refine choices you make in a cloud-computing application to personalize its content.
In a CSS document, within what must you enclose properties and values when you define a rule for a specified selector?
Curly braces ( { } )
When Web users enter the URL www.CIWcertified.com in their browser address bar, they can access the official CIW Web site at the IP address 72.44.192.233. Which technology enables users to do this, instead of having to remember and enter the IP address?
DNS0`
Packet
Data processed by protocols so it can be sent across a network.
Which IT job role best describes an individual who is responsible for managing the maintenance and security of an organization's data?
Database administrator
ISPs offer two principal options for connecting to the Internet:
Dial-up and Direct connection
Which choice lists the two principal methods of connecting to the Internet through an Internet Service Provider (ISP)?
Dial-up connection and direct connection
What is the term for a password-protected, encrypted data file that can be used to authenticate a program?
Digital certificate
Which of the following provides positive identification of the sending and receiving parties to ensure that programs downloaded from the Internet are original and safe?
Digital certificate
What is the term for a password-protected, encrypted data file that can be used to authenticate a program?
Digital certificate A digital certificate is a password-protected, encrypted data file that can be used to authenticate a program. Digital certificates provide positive identification of the sending and receiving parties to ensure that programs downloaded from the Internet are original and safe. A digital signature is an electronic stamp that identifies a message's source and its contents. An encryption key is a variable value, such as a numeric code, that uses an algorithm to encrypt and decrypt data. A hash is a number generated by an algorithm from a text string used to encrypt transmitted messages.
Which of the following provides positive identification of the sending and receiving parties to ensure that programs downloaded from the Internet are original and safe?
Digital certificate A digital certificate proves the identity of an individual or company over the Web. Software developers use certificates to digitally sign the programs they develop. Digital certificates provide positive identification of the sending and receiving parties to ensure that programs downloaded from the Internet are original and safe. The browser can check the information in a certificate to see whether the program is valid or whether it has been tampered with since the certificate was signed. Encryption is the process of converting data into an unreadable form of text; it does not prove the identity of an individual or company over the Web. Decryption is the process of converting encrypted data back to its original form. The use of user names and passwords is a form of authentication, which verifies the identity of a user who logs on to a system, or the integrity of transmitted data.
What are fractional T and E lines?
Digital phone lines consisting of one or more individual T or E carrier channels, rather than the entire T or E carrier line
What is the term for an electronic stamp that identifies a message's source and contents?
Digital signature A digital signature is an electronic stamp that identifies a message's source and its contents. A digital signature can be used with any kind of content, encrypted or not. A digital certificate is a password-protected, encrypted data file that proves the identity of an individual or company over the Web. An encryption key is a variable value, such as a numeric code, that uses an algorithm to encrypt and decrypt data. A hash is a number generated by an algorithm from a text string used to encrypt transmitted messages.
Which of the following is used to enforce non-repudiation?
Digital signature A digital signature is an electronic stamp that identifies a message's source and its contents. Digital signatures enforce non-repudiation, which is the ability to prove that a transaction occurred. Sending data with a digital signature proves that the message was both sent and received. Neither party can repudiate the transaction. A digital certificate is a password-protected, encrypted data file that proves the identity of an individual or company over the Web.
Which of the following is the most common type of bitmap seen on the Web?
Digitized photographs
In which type of Web search does the search engine display a list of categories and subcategories that you can browse?
Directory search
Which of the following is a Web Accessibility Initiative (WAI) concern?
Disabled people need to be able to use development tools.
The client/server model
Divides processing and storage tasks between the client and the server.
Which of the following is used solely to resolve human-readable domain names into their computer-readable IP addresses?
Domain name servers
Reverse DNS
Domain name servers can also be programmed to resolve IP addresses into domain names. This function is called reverse Domain Name System (reverse DNS).
Term commonly used to refer to the format in which IPv4 addresses are written.
Dotted decimal or "dotted quad"
IPv4 addresses use a 32-bit address format that is divided into four sets of numbers. What is the term for this address?
Dotted quad
Which statement best describes an E3 connection?
E3 is the European equivalent of a T3 Internet connection.
Which of the following would be the best method to use for floating images to the left and right of text in HTML5 if you are developing sites with multiple pages?
External CSS classes
Which term describes a hyperlink you create from a file on your system to a separate file on the Internet?
External hyperlink
Which of the following should you use on your Web pages when you want to reference pages on other Web sites?
External hyperlinks
Used to publish Web pages to a Web server.
FTP
Your company offers software applications for various topics. When a customer purchases a desired app from your online store, she is directed to a page where she can download the application directly. When the customer begins downloading the app, the standard protocol that is most likely transferring the application is:
FTP
Which of the following connection types provides the fastest direct connection speed?
Fiber-optic cable (faster than T1 or T3)
Which of the following is most often used to transfer files between a computer and a server for the purpose of publishing a Web site?
File Transfer Protocol (FTP)
Which protocol is often used to publish Web pages to a Web server?
File Transfer Protocol (FTP)
Which choice correctly describes the effect of removing pixels and compressing bitmap graphic files?
File size will decrease and image quality will diminish.
Which of the following is an open-source implementation of Pretty Good Privacy (PGP) that does not use patented algorithms?
GNU Privacy Guard (GPG), also known as GnuPG, is an open-source implementation of PGP that does not use patented algorithms. Multipurpose Internet Mail Extensions (MIME) is a protocol that allows users to exchange various types of data files over the Internet. A Mail User Agent (MUA) is an e-mail program that is independent of any specific Web browser that you can use to send e-mail messages. Mail Delivery Agent (MDA) is an e-mail server program that receives sent messages and delivers them to their proper destination mailbox.
What term is often used for the clickable region on an image map that acts as a hyperlink?
Hot spot
Which of the following is a proprietary technology that manipulates vector-based graphics to create animated sequences?
Flash technology
LANs and WANs
Generally, a LAN becomes a WAN when two or more LANs are connected via public carriers.
Domain name syntax
For example, reading right to left, the domain name www.CIWcertified.com can be interpreted as follows: com — a commercial site CIWcertified — the name registered by the company that manages the CIW program, chosen because it accurately represents the purpose of the Web site www — the name of the Web server at the company, also called the Web site host
In which type of keyword search can you enter any search string in a search engine to query an index?
Full-text search
What is the term for the complete domain name of an Internet computer?
Fully qualified domain name
The only Web-ready image file formats that support interlacing are:
GIF 87a, GIF 89a and PNG.
The only Web-ready image file formats that support animation are:
GIF 89a and PNG.
The only Web-ready image file formats that support transparency are:
GIF 89a and PNG.
If your Web development team includes a marketing representative, which of the following would probably be of most concern to that person?
How well the Web site adheres to branding standards
In addition to ranking the relevance of a particular site according to the keywords entered by the user, which of the following search engines also determines a site's relevance based upon the number of links that point to it?
Which Web image format is best suited for line art, custom drawings and navigational images?
Graphics Interchange Format (GIF)
You are leading a project that will collect vast amounts of data, which will need processing. In your research, you learn about a technology in which volunteers can install a small application on personal computers to receive, process and return information to your organization. Using multiple systems to process large amounts of data in this way will be less expensive than using a single supercomputer to conduct this same task. Which term describes this technology?
Grid computing
Uses hexadecimal numbers instead of decimals.
IPv6
Which statement accurately describes the difference between a traditional modem and an ISDN line?
ISDN uses a digital line, whereas a traditional modem must translate digital signals to analog and back
Which HTML 4.01 flavor must you use to place Web pages inside each other to create separate panes in the browser window?
HTML 4.01 Frameset
Which of the following statements is true regarding the creation of animated images?
HTML5 provides native support for animation, movies and other multimedia without the use of plug-ins.
The HTML Web development "trifecta" consists of:
HTML5, CSS and JavaScript.
Which protocol do many browsers assume when you enter a URL in the Address field?
HTTP
Which of the following should you use to encrypt and decrypt digital signatures, and to protect passwords from disclosure?
Hash encryption
Which HTML heading style renders text the same size as normal text?
Heading level 4
CSS allows you to change the size of text. Which of the following statements about the font-size property is true?
Headings (h1 through h6) should be used whenever possible instead of the font-size property.
Which IT job role best describes an individual who is responsible for diagnosing and resolving users' technical hardware and software problems?
Help desk technician
Tthe number 10 is represented as the letter A, 15 is represented as F, and 16 is represented as 10.
Hexadecimal,
Hypertext link
Highlighted or underlined text in a Web page that, when clicked, links the user to another location or Web page.
As a new IT professional, you need to understand the needs of the business, as well as the various technologies required to design and deliver specific products. What is the term that describes this perspective in relation to IT?
Holistic
What does Extensible Hypertext Markup Language (XHTML) use to format a page's appearance in the Web browser?
Hypertext Markup Language (HTML)
Which of the following is traditionally the standard markup language on the Web?
Hypertext Markup Language (HTML)
Which protocol is used to send Web pages from a Web server to a Web browser?
Hypertext Transfer Protocol (HTTP)
Every domain name is unique. Once registered, it cannot be used by an unauthorized organization or individual. What organization is responsible for managing domain names?
ICANN
Some number values are reserved, but roughly 256 x 256 x 256 x 256 different IP addresses are possible — approximately 4 billion.
IPv4
Supports approximately 340 undecillion (340 times 1036) IP addresses by using a 128-bit address format.
IPv6
CSS allows you to change the typeface of text. Which of the following statements about the font-family property is true?
If you list multiple fonts in the font-family property, the next font will attempt to render if the first font is not supported.
If your browser cache size is too small:
If your browser cache is too small, it may take longer for pages to download from the server. Increasing the size of your browser cache can improve performance while browsing, but if your cache is too large, it may slow performance because the browser must search though hundreds of cached files to locate a specific page. The smaller the size of the cache, the less time it takes to complete cache maintenance tasks. Emptying the cache before running a virus scan, disk defragmentation or other disk maintenance can speed those processes, but the size of the cache itself has no effect on the speed with which an application executes.
Which of the following techniques should you implement to make your pages more accessible to users with slower Internet connections?
Image interlacing
What is the term for a Web page graphic containing one or more clickable regions that, when clicked, link you to other pages or page sections?
Image map
In contrast to meetings that take place in person, a Webcast offers the advantage of:
In contrast to meetings that take place in person, a Webcast offers the advantage of:
Which of the following terms is used in ontology to refer to the basic item within a domain?
In ontology, the basic item within a domain is known as an individual/object. It is also called an instance or an element. For example, a kayak manufacturing company would consider a kayak to be an object. A class/set is a particular type of object. For example, a particular model of kayak would be an example of a particular class of individual object. An attribute is a unique characteristic pertaining to a class. A class can have multiple unique attributes. For example, a particular model of kayak will have various attributes, such as color, length, weight, displacement, and type of construction materials. A schema is a hierarchical description and vocabulary concerning a particular domain.
How can scope creep undermine the success of a project?
Incremental changes in scope will affect the schedule, cost or performance required to complete the project.
Client/Server Model
Individual computers and devices, called nodes, interact with one another through a central server to which they are all connected.
Which organization is responsible for codifying copyright law as it applies to digital information?
Information Infrastructure Task Force (IITF)
Which of the following wireless mode types uses a centralized access point known as a wireless access point (AP)?
Infrastructure Two types of wireless modes exist: ad-hoc and infrastructure. An infrastructure wireless mode is one in which systems connect via a centralized access point known as a wireless access point (AP). An ad-hoc wireless mode is one in which systems use only their NICs to connect with each other. Cable modems and LANs are not wireless network connections.
Which technique should you use to indent a paragraph or create additional spaces between words on an HTML page?
Insert non-breaking spaces.
Which of the following is no longer necessary when you use HTML5 to develop Web pages?
Installing a third-party plug-in to include video
You are preparing to begin developing your Web page code. Which step will help you test your code in various environments?
Installing multiple browsers
Which of the following dial-up connection types has been largely superseded by direct Internet connections?
Integrated Services Digital Network (ISDN) An Integrated Services Digital Network (ISDN) line is a digital telephone line installed by a local phone company. The advent of direct Internet connections such as cable modems, LAN routers and Digital Subscriber Line (DSL) services has largely superseded ISDN.
Client software
Interface that enables users to communicate with and request information from the server.
What is the term for a hyperlink you create to link one point to another in the same Web page?
Internal hyperlink
What is the name of the international community of network designers, operators, vendors and researchers concerned with the evolution of the Internet architecture and the smooth operation of the Internet?
Internet Engineering Task Force (IETF) The Internet Engineering Task Force (IETF) is an international community of network designers, operators, vendors and researchers concerned with the evolution of the Internet architecture and the smooth operation of the Internet. The IETF develops and promotes Internet standards for the TCP/IP and Internet protocol suites. It works closely with the World Wide Web Consortium (W3C) and other standards organizations. The World Wide Web Consortium (W3C) is a vendor-neutral forum whose mission is to create Web standards and guidelines. The Institute of Electrical and Electronics Engineers (IEEE) creates standards relating to various technologies, including those used on the Internet (such as Ethernet [802.3] and Wireless Ethernet [802.11]). The Telecommunications Industry Association (TIA) is responsible for creating various standards, including the TIA/EIA-568-B cabling standards and the TIA/EIA-598 fiber-optics standards.
Which of the following protocols enables you to browse and manage e-mail messages while they reside on the server?
Internet Message Access Protocol (IMAP)
Which protocol allows you to browse and manage e-mail messages while they reside on the mail server?
Internet Message Access Protocol (IMAP)
Which protocol is the data transmission standard for the Internet, responsible for sending information from one computer to another using uniquely identifying addresses?
Internet Protocol (IP)
6 of 6 elements required to connect to the Internet:
Internet address — Web address (e.g., www.CIWcertified.com), e-mail address (e.g., [email protected]) or server address (e.g., ss1.ciwcertified.com)
Of the six elements required to connect to the Internet, which is often supplied by an ISP?
Internet connection
5 of 6 elements required to connect to the Internet:
Internet connection — direct connection to an Internet Service Provider (ISP)
Print servers
Manage network printers.
Which security risk must you be aware of when using active content such as Java applets and ActiveX objects?
Java applets and ActiveX allow information to be downloaded and run on your system.
Which Web image format supports up to 24 bits of color information and works well for photographs, but uses lossy compression and thus reduces image quality?
Joint Photographic Experts Group (JPEG)
Which of the following graphics file formats is widely used for complex graphics because it uses lossy compression and supports 16 million colors?
Joint Photographic Experts Group (JPEG) is a format widely used for photographs and complex graphics. This format uses lossy compression and supports 16 million colors. JPEG files can be relatively small. However, the developer must decide how much compression to use. The more compression, the smaller the file size, but the lower the image quality. The JPEG format does not work well with line drawings because not much data can be discarded during the lossy compression process, and the images lose sharpness and clarity. Graphics Interchange Format (GIF) was previously one of the most common graphics file formats on the Internet. It has a patent, so anyone creating software programs that produce GIF files must pay a royalty. GIF is a bitmap format that uses lossless compression. It supports various resolutions, but is limited to 256 colors and is used most effectively for drawings and illustrations, rather than for photographs. Tagged Image File Format (TIFF) is a popular customizable graphics format commonly used for medical imaging and desktop publishing. TIFF supports grayscale, 8-bit and 24-bit color, and monochrome formats. Encapsulated PostScript (EPS) is a file format that you can use to import and export graphics files between operating systems and applications.
Network servers
Manage the flow of data between them and client nodes.
You can use automatic link-checking software to identify invalid hyperlinks. If you find invalid links, what should you do next?
Manually update the code to delete or modify invalid links.
What is the term for a series of commands used to format, organize and describe information on a Web page?
Markup language
Which of the following is important for optimizing your Web site for viewing on mobile devices?
Keep your Web pages simple and uncluttered.
What is the term for a numeric code that uses an algorithm to encrypt and decrypt data?
Key
You work with UNIX workstations and want to install a Web browser specific to your environment. Which browser should you install?
Konqueror
What can be considered a disadvantage of using a spyware-detection application to remove spyware from your computer?
Legitimate applications can be incorrectly identified as spyware.
Network News Transfer Protocol (NNTP)
Like an e-mail server, a news server provides text output that users can access at their convenience. However, like a conference call, it has multi-person input, allowing users to post information in an easily accessible location. Web browsers such as Mozilla Firefox, Microsoft Internet Explorer and Opera include an NNTP client. You may also use a separate client program called a news reader,such as Knews, to access a news server.
Which term describes a hyperlink that links one file on your hard drive to another file on your hard drive?
Local hyperlink
Which of the following should you use when you develop your own Web pages and want to link them to form a site?
Local hyperlinks
Which of the following data modeling steps involves encoding the concept into SQL programming?
Logical design Data modeling involves determining the requirements that a database must fulfill in order to function properly for an organization. The logical design step in data modeling involves encoding the concept into SQL programming. The conceptual design step in data modeling creates the model as a pure concept. The physical design step in data modeling determines exactly where data will be stored. The implementation step in data modeling applies the design to an actual database application, such as MySQL or Oracle.
On a corporate site, what is crucial for name recognition and branding?
Logos and trademarks
What is the term for a software program that scans Web pages for information used to identify the Web page?
Meta search engine
Which of the following is a command-line text-only Web browser?
Lynx
What is the name for the standard computer interface that allows computers to create and play electronic music?
MIDI Musical Instrument Digital Interface (MIDI) is a standard computer interface for creating and playing electronic music. It allows computers to re-create music in digital format for playback. C# (pronounced "C sharp") is Microsoft's object-oriented programming language; it is Microsoft's answer to Java. ActiveX technology enables authors to place interactive objects on their Web sites based on a common standard, and allows the objects to work together. ActiveX is used to create ActiveX controls, which are self-contained programs that can be run anywhere on a network, including within a browser from the Internet. ActiveX controls are similar to Java applets.
The <audio> element supports which three formats?
MP3, Ogg and Wav
The <video> element supports which three formats?
MP4, WebM and Ogg
Web servers
Manage access to the World Wide Web.
E-mail servers
Manage electronic mail.
When specifying keywords to conduct an Internet search, which of the following parts of speech will be the most useful?
Nouns
Which of the following enables an operating system to access databases from various vendors?
Open Database Connectivity (ODBC) A database management system (DBMS) is a program used to store, access and manipulate database information. A Common Gateway Interface (CGI) is a program that processes data submitted by a user by passing data back and forth between a server and an application program. Structured Query Language (SQL) has become the standard interactive and programming language for accessing information from and updating information in a database, particularly large relational databases.
What is the term for the programming concept in which a program is handled as a collection of individual items that perform separate functions, rather than as a sequence of statements that performs a specific task?
Object-oriented programming
Which of the following can be considered a disadvantage of the Portable Network Graphics (PNG) format?
Older browsers do not render the PNG format.
Which of the following can be considered a disadvantage of using FormMail?
Older versions of FormMail could be fooled into sending e-mail to anyone.
Newsgroup
On Usenet, a subject or other topical interest group whose members exchange ideas and opinions. Participants post and receive messages via a news server.
Which of the following can be considered a benefit of Cascading Style Sheets (CSS)?
One simple change to the style sheet will change all elements across the site.
What is the term for the study of how a particular knowledge domain, or system, is organized?
Ontology Ontology is the study of how a particular knowledge domain, or system, is organized. An ontology is the product of an ontological study. An ontology describes how individual elements of a domain relate to each other. This relation is usually represented in hierarchical terms. An ontology also describes how individual elements process information within the domain. Data modeling involves determining the requirements that a database must fulfill in order to function properly for an organization. Technology adoption refers to the degree to which members of a population will adopt or accept a new product or innovation. The "diffusion of innovation" theory describes how, why and at what rate new ideas and technologies spread through cultures.
What is the term for an SMTP server that allows the third-party relay of e-mail messages that spammers use to send spam?
Open relay Many spammers use automated tools to search the Internet for open relays, then use the open relays to send large amounts of spam. An open relay (also called a third-party relay or an insecure relay) is an SMTP server that allows third-party relay of e-mail messages. A blackhole list is a published list of IP addresses known to be sources of spam.
What is the term for a copyleft license that removes restrictions on the use and distribution of the licensed product?
Open-source license
what is the term for a copyleft license that removes restrictions on the use and distribution of the licensed product?
Open-source license
2 of 6 elements required to connect to the Internet:
Operating system — Windows, Linux/UNIX, Macintosh, etc.
When configuring a test server for your Web site, which three components should be as nearly identical to the production server as possible?
Operating system, Web server software, and CGI interpreter software
Server-side CGI scripts are commonly written in which language?
Perl
In a raw text string, which of the following is used to replace spaces entered by the user?
Plus signs ( + )
Which data format consists of audio or video digital-media files that are distributed to subscribed users?
Podcast
Which protocol allows a computer using an analog modem to make an initial connection to the Internet?
Point-to-Point Protocol (PPP)
Which of the following protocols can connect an entire network to the Internet?
Point-to-Point Protocol over Ethernet (PPPoE) When you use a phone line and modem to connect to the Internet, you are using a dial-up connection. Most dial-up connections use Point-to-Point Protocol (PPP). Many direct Internet connections, such as LAN, cable modem and DSL connections, as well as connections made through 4G mobile hotspot devices, are established using Point-to-Point Protocol over Ethernet (PPPoE). PPPoE uses the PPP that is commonly used for dial-up networks and implements it over Ethernet. Ethernet is a LAN standard that allows computers in a network to communicate. Therefore, Point-to-Point Protocol over Ethernet (PPPoE) can connect an entire network to the Internet.
Which protocol is used to receive e-mail messages from an incoming mail server, and forces you to download e-mail messages before reading, deleting or otherwise managing them?
Post Office Protocol (POP)
Which of the following is known as a "store-and-forward" e-mail service?
Post Office Protocol version 3 (POP3)
You have developed a Web site using a GUI editor. Your supervisor wants to allow members of the development team and other stakeholders to preview the site. What should you do prior to publishing your site to the World Wide Web?
Post the final Web site files to a test Web server before moving them to the production server.
Which of the following graphics file formats is written in a page description language that is unreadable, and can be printed only on a specific type of printer?
PostScript (PS) files are written in a page description language so they are unreadable, and are designed for printing on PostScript printers. Portable Network Graphics (PNG) has become an Internet standard for graphics. Tagged Image File Format (TIFF) is a popular customizable graphics format commonly used for medical imaging and desktop publishing. Encapsulated PostScript (EPS) is a file format that you can use to import and export graphics files between operating systems and applications.
Which of the following will upper-level managers likely ask you to justify before making a hardware or software purchase, or creating a particular IT product or service?
ROI
Any jobs in the IT field
Require a solid understanding of how machines, protocols and applications work together to make the Internet a reality.
Which Web form field allows users to choose from among two or more mutually exclusive options?
Radio button
What is the term for pixel-based images that map bits to a display space?
Raster graphics Raster graphics are images that map bits directly to a display space (think of a grid of x and y coordinates on a display space). Raster graphics are pixel-based. Vector graphics are mathematical statements that describe a series of points to be connected to create an image. A codec is an algorithm used by video and audio player plug-ins to compress and decompress files.
The graphics you are probably most familiar with, GIFs and JPEGs, are raster graphics. What are raster graphics?
Raster graphics are pixel-based, and as much larger files than vector graphics. And raster graphics are images that map bits directly to a display space.
What is the term for public documents of interest to the Internet community that include detailed information about standardized Internet protocols?
Requests for Comments (RFCs) are public documents of interest to the Internet community that include detailed information about standardized Internet protocols. ISO 9000 details the steps recommended to produce high-quality products and services using a quality-management system that maximizes time, money and resources. Moore's Law postulates that the number of transistors per square inch on integrated circuits will double every two years. The World Wide Web Consortium (W3C) is a vendor-neutral forum whose mission is to create Web standards and guidelines, known as Recommendations.
Which of the following is a secure method of transferring files through Secure Shell (SSH) in which you can transfer several files in one session?
SSH File Transfer Protocol (S/FTP) Secure Copy (SCP) is a program used to securely transfer files between systems. SCP uses an SSH-secured connection, and it is quickly becoming a replacement for FTP. SCP adds file transfer capability to SSH, and each file transfer constitutes a discrete session. SSH File Transfer Protocol (S/FTP) is a secure version of FTP, performing file transfer operations over a connection secured by SSH. S/FTP is very similar to SCP but you can perform several file transfers in one session. SSL/TLS-enabled FTP (FTPS) is FTP that runs on an SSL/TLS-secured connection. FTPS differs from SCP and S/FTP in that it relies on SSL/TLS for encryption, whereas SCP and S/FTP rely on SSH for encryption.
Which of the following is an open standard for Web images that provides compression, searchable text and zooming features, in addition to animation?
Scalable Vector Graphics (SVG)
What is the term for the goals and tasks of a project, and the work required to complete them?
Scope
Which of the following requires that all electronic and information technology developed, procured, maintained or used specifically by federal agencies be comparably accessible to users with disabilities?
Section 508 of the Rehabilitation Act
Which IT job role best describes an individual who is responsible for maintaining the software and procedures necessary to protect the confidentiality and integrity of information, and legitimate access to it?
Security manager
What is the term for an individual who is responsible for maintaining the software and procedures necessary to protect the confidentiality and integrity of electronic data?
Security manager Security managers are responsible for managing the security measures used to protect electronic data. They maintain the software and procedures necessary to protect the confidentiality and integrity of information, and legitimate access to it. Security analysts/consultants are responsible for examining an organization's security requirements and determining the hardware, communications and software capabilities needed to satisfy the requirements. Server administrators are responsible for designing, implementing, managing and maintaining network servers, and associated applications and peripheral devices. Database administrators are responsible for the maintenance and security of an organization's database resources and data.
Which of the following is the most effective way to spread viruses?
Sending e-mail attachments
Which term is used to describe a computer that is responsible for storing and providing information requested by a client application?
Server
HTTP
Specifically, HTTP is the set of rules required to exchange files, such as text, images, video and multimedia content, across the Web.
IP
Specifies the format and addressing scheme of the packets.
Juan is preparing to give a presentation to his company's managers about the cloud-computing services that his department is planning to implement. He considers the possible objections that his managers might have to using cloud services for the company. What disadvantage of cloud services should he be ready to discuss?
Speed
Fiber-optic cable
Speed up to 100 gigabits per second (Gbps).
Which of the following are metalanguages?
Standard Generalized Markup Language (SGML) and Extensible Markup Language (XML)
At the end of the initiating phase, which of the following should a project manager prepare to define the ways that project success will be measured?
Statement Of Work (SOW)-At the end of the initiating phase, you and all stakeholders should prepare a Statement Of Work (SOW) to define the ways that project success will be measured. You should complete the SOW before you proceed to the next phase. The SOW outlines the requirements for each project task to ensure that the project objectives are met. The SOW should contain clearly defined goals and an agreed-upon plan to achieve them. A Gantt chart is a horizontal bar chart that graphically displays project tasks and durations. A needs analysis identifies the problems or needs that the project must resolve or address. A project schedule lists the planned dates for performing tasks and meeting goals identified in the project plan.
You want to find information about Great Danes. You visit a popular search engine and manually search through a directory tree of topics until you find a directory titled "Dogs" and a subdirectory titled "Breeds." You select the topic "Great Dane" and look through a list of indexed pages on that topic, then choose one page with which to begin your research. Which type of search index did you use?
Static index/site map
What is the term for images for which you can purchase the rights to use in printed material or on a Web site?
Stock photographs
File servers
Store shared data.
High-speed data links
Telephone companies, cable TV services and other suppliers provide high speed data links, such as fiber-optic cables and wireless connections, that offer faster Internet connections than those provided by analog modems.
Which Web form field should you use to create a scrolling text field into which a user can enter multiple lines of text?
Text area
Which of the following specifies the markup language and version used by your HTML file?
The <!DOCTYPE> tag
Which of the following do you use to create a hyperlink in an HTML document?
The <a> element
Which HTML tag should you use to define a hot spot region on an image map?
The <area> tag
Text surrounded by the <b> and <strong> tags both result in bold text. How do the tags differ?
The <b> element applies the bold font style, whereas <strong> applies a heavier weight to the text relative to the surrounding text.
Which HTML tag should you use if you want to center and indent a block of text?
The <blockquote> tag
A character set is the group of symbols used to render text on a page. In which of the following should you specify the character set for an HTML document?
The <meta> tag
HTML5 with CSS has introduced specific elements to structure Web pages. In which structure element should you include hypertext menus to access various pages of the Web site?
The <nav> structure element
When creating a Web form, which tag should you use to create a list from which users can choose one or more options?
The <select> tag
Which of the following defines the content of table cells?
The <td> tag
When creating a Web form, which of the following should you use to create a scrolling text field into which users can enter multiple lines of text?
The <textarea> tag
With which of the following should you specify the text that will appear when your Web page is bookmarked or added to a browser's Favorites folder?
The <title> tag
Which of the following defines a single table row?
The <tr> tag
In 1969, which U.S. Department of Defense agency funded what would become the first global computer network?
The Advanced Research Projects Agency (ARPA) The Internet was formed in 1969 when the U.S. Department of Defense's Advanced Research Projects Agency (ARPA) funded what would become the first global computer network, the Advanced Research Projects Agency Network (ARPANET). The ARPANET allowed university and government engineers to research and work from any location on the network.
Which of the following statements about HTML5 is true?
The DTD file is no longer required in HTML5.
Which U.S. government agency first funded the development of the Internet?
The Department of Defense
Which Internet resource is used to resolve IP addresses into easily recognizable text-based names?
The Domain Name System (DNS)
Root-level servers
The Domain Name System is hierarchical. A server at the highest level of the Domain Name System.
You are developing a Web site using a GUI editor, and you want to validate your code for conformity to W3C standards. What does a validation engine use to determine the W3C standard it should validate against?
The HTML page's !DOCTYPE declaration
Which organization is responsible for codifying copyright law as it applies to digital information?
The Information Infrastructure Task Force (IITF) was formed in 1993 to codify copyright law as it applies to digital information. The Internet Corporation for Assigned Names and Numbers (ICANN) registers domain names. The World Intellectual Property Organization (WIPO) is a specialized U.N. agency formed to protect intellectual property worldwide. The World Wide Web Consortium (W3C) is a vendor-neutral forum whose mission is to create Web standards and guidelines.
Stephen is creating video tutorials to sell his company's products. The target audience will consist of company employees using primarily new computers with the Windows operating systems and Internet Explorer 9. Stephen is debating whether to publish the videos using the MP4 or the OGG video format. Both formats are compatible with the HTML5 video element, which he is using in his tutorials. Which of the following would be a reason for Stephen to choose one format over the over?
The MP4 video format is natively supported by Internet Explorer 9 and does not require a plug-in.
What methodology was originally developed to improve manufacturing processes in order to eliminate product defects?
The Six Sigma methodology was originally developed to improve manufacturing processes in order to eliminate product defects. The results of these processes are measured quantitatively to gauge how the processes are performing. Adherence to ISO 9000 standards and the separation of duties are additional quality assurance techniques you can use to ensure high-quality deliverables. However, neither technique is designed to improve manufacturing processes in order to eliminate product defects. The Project Management Body of Knowledge (PMBOK) identifies nine topic areas that define project management. Each topic area provides a set of principles and techniques to help you manage projects.
Which of the following protocols was developed by the Internet Engineering Task Force (IETF) and is considered the successor to the Secure Sockets Layer (SSL) protocol?
The Transport Layer Security (TLS) protocol was developed by the Internet Engineering Task Force (IETF) and is considered the successor to the Secure Sockets Layer (SSL) protocol. TLS is becoming more common. Hypertext Transfer Protocol (HTTP) is the protocol for transporting HTML documents across the Internet. Network News Transfer Protocol (NNTP) is the protocol used by news servers that enables the exchange of newsgroup (Usenet) articles. Simple Mail Transfer Protocol (SMTP) is the protocol used for sending e-mail messages.
What is the advantage of designing an image in layers?
The ability to manipulate components independently of the entire image
Which attribute is associated with the <form> element and is used to specify the name and location of the CGI script used to process the form?
The action attribute
What is a Web site's home page?
The first Web page that displays when you access a domain
What happens if you specify a font name in an external CSS file that a user's system does not support?
The font will display as a default font face.
What occurs on a Web form in the browser if you omit the closing </form> tag in your HTML5 code?
The form fields will render and users will be able submit information.
What occurs when you surround an image tag with opening and closing anchor tags?
The graphic image defined by the image tag will become a hyperlink.
Top-level domains
The group into which a domain is categorized, by common topic (company, educational institution) and/or geography (country, state). Com, edu, org, au,ca (Canada), dk, aero, biz, etc.
When you create an internal hyperlink with the anchor element, what symbol must you use in the href attribute to tell the browser to look for a target within the current document?
The hash ( # )
Consider the following code snippet: <tr> <th colspan="3"> Site Development Associate </th> </tr> Which choice most accurately describes the result of the code?
The heading is located in a cell that spans three columns of the table.
When you specify the height and width of table elements, what occurs when you set multiple values in multiple cells?
The highest value takes precedence.
When you create a hyperlink with the anchor element, which of the following should you use to specify the target of the link?
The href attribute
When you create an internal hyperlink, you create the link that points to the bookmark using the anchor tag with which attribute?
The href attribute
When you create an internal hyperlink with the anchor element, which attribute should you use to define the area of the Web page to which the hyperlink will link?
The id attribute
What occurs when a user with a slow Internet connection attempts to download a non-interlaced image?
The image will remain invisible or incomplete for some time.
During which project management phase should you conduct a needs analysis; determine project objectives, assumptions and constraints; and develop a Statement Of Work (SOW)?
The initiating phase
A domain name consists of letters (and sometimes numbers) separated by periods. Which of the following is the host name component of a domain name?
The left-side component of the domain name, which categorizes domains into groups by server name
What is authentication?
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data
To what does the term "cloud" in "cloud computing" refer?
The network of servers and connections that make up the Internet
What happens if you omit the size attribute when you use the <select> tag to create a select list?
The number of items that will appear in the list by default will depend on the browser.
Consider the following HTML code: <select name="Countries"multiple="multiple"size="8"> What does the size attribute control?
The number of items that will appear in the scrolling list box
Between which tags must all HTML code for a document reside?
The opening <html> and closing </html> tags
Consider the following anchor element: <a href="http://www.habitat.org"> Habitat </a> In this example, to what does "Habitat" refer?
The page text that will be affected by the anchor element
What happens when you place an image file in a subdirectory and neglect to reference the subdirectory in the <img> tag's src attribute?
The page will render without the image file, and a small box with an X will appear in its place.
During which project management phase should you develop a project schedule and assemble the project team?
The planning phase addresses project details. It is during the planning phase that you should develop a project schedule and assemble the project team. During the initiating phase, you should conduct a needs analysis; determine project objectives, assumptions and constraints; and develop a Statement Of Work (SOW). Project work is performed (executed) during the executing phase. The closing phase is the final phase of a project in which details of the project are evaluated and recommendations made to improve project performance in the future.
Consider the following HTML code: <video width="360"height="270"controls="controls"poster="image.png"> <source src="video.mp4"type="video/mp4"/> <source src="video.webm"type="video/webm"/> <source src="video.ogg"type="video/ogg"/> Your browser does not support the HTML5 video element. </video> What attribute prevents the first frame of the video from displaying while the video is downloading?
The poster attribute
What is project management?
The practice of applying knowledge, skills and processes to activities in order to meet deadlines and achieve desired results
What is program management?
The process of managing multiple interdependent projects to improve the performance of an organization
Which attributes are required for the <img> tag in HTML?
The src and alt attributes
Which video file format is the standard format for movies on the Internet?
The standard format for movies on the Internet are .mp4 (MPEG-4) files. The Moving Picture Experts Group (MPEG) is a standard for digital audio and video compression that provides extremely high quality and resolution. The standard video files for the Windows platform are .avi (Audio Video Interleave) files. The Macintosh native movie platform, and the standard format for QuickTime movies, is .mov files. The WebM format (.webm) is a royalty-free, open video and audio format designed for HTML5 video.
Which table element appears apart from the table itself, by default?
The table caption
Consider the following anchor element: <a href="http://www.habitat.org"> Habitat </a> In this example, to what does "http://www.habitat.org" refer?
The target of the hyperlink
What must you know before you can create an effective project schedule?
The tasks necessary to achieve project objectives, the approximate length of time each task will take, the order in which tasks should be performed and the employees who will perform them
What happens when you place text between the <!-- and --> tags in your HTML source code?
The text will be "commented out"and will not appear on the Web page.
With which CSS table property can you specify values of left, center, right and justify?
The text-align property
In a URL, what does the protocol component identify?
The type of server and Internet service being used In a URL, the protocol component identifies the Internet protocol used to send information from the server to a user's computer, and thus indicates both the type of server and Internet service being used. HTTP is used to transfer Web pages and other information over the World Wide Web. FTP is used to transfer files to and from FTP sites. NNTP is used by news servers and news readers. The Internet resource is the name of the server on which the page resides. The domain name identifies the site owner's registered site name and organization type. The home page is the first page that displays when a user accesses a domain.
Why is the acceptance of HTML5 in the Web community a benefit to users of mobile devices?
The use of HTML5 can help conserve battery power.
Which of the following must occur before a CGI script can process Web form data?
The user must enter the data into the Web form and submit it.
With which CSS table property can you specify values of top, bottom and middle?
The vertical-align property
What is the purpose of using Internet research tools such as Zotero?
They enable you to organize the information you find and store it on your local hard drive. Internet research tools such as Zotero enable you to organize the information you find and store it on your local hard drive. Zotero is a free, open-source Firefox add-on that you can use to collect, manage and cite reference material you find on the Internet. As you conduct research, Zotero can detect when you are viewing a book or article, and then save the full reference information to a local file. These tools do not flag questionable, non-authoritative or biased information, however.
Which of the following is usually true of popular social networking sites?
They generally provide privacy protection for users.
What can be considered a disadvantage to installing program patches and updates?
They may introduce incompatibility issues or new security issues.
Consider the following code: <h1>CIW Site Development Associate Skills </h1> <ul> <li>Project Management</li> <li>HTML Coding</li> <li>GUI Authoring</li> </ul> Which of the following statements about this code is true?
This code will create a bulleted list.
Which IT job role best describes an individual who develops primarily server-side Web applications?
Web application developer
Which of the following is the most appropriate reason to create multiple Web sites in various languages?
To accommodate an international audience
For what should you use the controls attribute of the <video> element?
To add video controls such as the play, pause, rewind and volume controls
Why should you maintain an image's relative measurements if you resize it?
To avoid distorting the image
For what purpose would you use a cable modem?
To connect to the Internet through your cable television system
For what purpose should you use automatic cookie handling in most browsers?
To control when and from whom cookies are accepted
For what should you use the value attribute when creating a text box field?
To place default text inside the text box
Why should you use a Non-Disclosure Agreement (NDA) when you outsource Web development work to workers in remote locations?
To protect your organization's trade secrets or intellectual property from being revealed without your consent
What is the primary goal of a plug-in?
To provide efficient integration of multimedia formats with the browser and computer
For what should you use the <link> tag in the <head> section of your HTML document?
To reference a style sheet for the page
When developing your own Web pages, when should you use an internal hyperlink?
To reference another area within the same Web page
What is the main purpose of a file server?
To store shared data
Users can access and navigate an FTP server using an FTP client program. For which action does the FTP client program use the "put" command?
To upload a file
What is the term for a unique word, phrase or symbol that is claimed or officially registered by an organization with the government?
Trademark
What enables dissimilar systems connected to the Internet to communicate with one another?
Transmission Control Protocol/Internet Protocol (TCP/IP) Every computer connected to the Internet uses a protocol called Transmission Control Protocol/Internet Protocol (TCP/IP), which enables dissimilar systems connected to the Internet to communicate with one another. TCP enables two computers to establish a communication link and exchange packets of data; IP specifies the format and addressing scheme of the packets. The World Wide Web is a set of software programs that enables users to access resources on the Internet via hypertext documents. An Internet Service Provider (ISP) is an organization that maintains a gateway to the Internet and rents access to customers on a per-use or subscription basis. The Advanced Research Projects Agency Network (ARPANET) is a computer network that served as the basis for early networking research and was the backbone during the development of the Internet.
Every computer connected to the Internet uses a protocol suite called:
Transmission Control Protocol/Internet Protocol (TCP/IP), which enables computers to communicate with one another.
A LAN can be connected to the Internet by a router, provided that the LAN uses:
Transmission Control Protocol/Internet Protocol (TCP/IP). A LAN can be connected to the Internet by a router, provided that the LAN uses Transmission Control Protocol/Internet Protocol (TCP/IP). The LAN router is connected to another router at the ISP by a high-speed data link. If a LAN does not use TCP/IP, it can be connected to the Internet by gateways, which convert the protocol used by a LAN to and from TCP/IP.
E3 lines
Transmit data at 34.368 Mbps.
E3 line
Transmit data at 34.368 Mbps. European equivalent of T3.
T3 line
Transmit data at 44.736 megabits per second (Mbps).Commonly used by North American ISPs to connect to the Internet backbone. Extremely fast and one of the most costly types of access.
Which term do Web developers commonly use for an image that allows the Web page background to show through specified areas, providing the visual effect of blending in to the background of your Web page?
Transparent GIF
What is the term for a Web user who publishes comments or submits feedback simply to annoy or anger?
Troll
How many mail servers does the use of e-mail involve?
Two -- incoming mail is handled by one server using Post Office Protocol (POP) or Internet Message Access Protocol (IMAP), and outgoing mail is handled by another server using Simple Mail Transfer Protocol (SMTP).
What is the term for the business trend that seeks to simplify and integrate all forms of communication?
Unified communications (UC) Unified communications (UC) is a business trend that seeks to simplify and integrate all forms of communications. UC enables a user to send a message on one medium and receive it on another. Convergence is the integration of telephony and data technologies. Convergence is a technology that implements UC principles. Blogging is the practice of updating a blog. Voice over IP (VoIP) is a technology that converts voice into data packets for transmission over a packet-switched IP network.
Which of the following can be considered a site management task after a Web site becomes active?
Update dead links and remove unused pages.
When using multiple Boolean operators to conduct an Internet search, how can you indicate the order in which the Boolean phrases should be considered?
Use parentheses to combine Boolean phrases. Quotation marks indicate that the keywords must appear in the order specified.
Asymmetric Digital Subscriber Line (ADSL)
Used primarily in homes and small businesses.
What is the term for a software application that enables users to access and view Web pages on the Internet?
Web browser
You are making efforts to prevent attackers from gaining access to network connections. Which strategy may cause problems when troubleshooting your computer's connectivity to the network?
Using your desktop firewall to block Internet Control Messaging Protocol (ICMP) You can use your desktop firewall to block various protocols, including Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Internet Control Messaging Protocol (ICMP) and Internet Protocol (IP). If blocking TCP and UDP, you can select any port to allow or disallow. ICMP is an especially common protocol to block, because attackers often use it to flood network connections. However, using your desktop firewall to block ICMP may cause problems when troubleshooting your computer's connectivity to the network, because ICMP is most often used to test whether a system is able to communicate on a network.
Newsgroups
Usually excellent informal sources of information. Because users participate by choice, newsgroups tend to be tightly focused and the data tends to be reliable.
Wireless connections
Usually implemented in a hybrid environment, in which wireless components communicate with a network that uses cables. For example, a laptop computer may use its wireless capabilities to connect with a corporate LAN that uses standard cabling.
Which of the following produces graphics image files that are small, download quickly, and are easily resized without affecting image quality?
Vector graphics
Which type of graphical image can be shrunk without losing image quality?
Vector graphics
Which of the following scripting languages is vendor-specific to Microsoft and may not be supported by browsers other than Windows Internet Explorer?
Visual Basic Script (VBScript) is an object-based scripting language that Microsoft derived from its more powerful Visual Basic programming language. Microsoft VBScript is a vendor-specific scripting language and may not be supported by browsers other than Windows Internet Explorer. JavaScript is an event-driven scripting language that was the first scripting language developed exclusively for online content design. All browsers support JavaScript. JavaScript has its origins in a scripting language called LiveScript. JScript is the Microsoft version of JavaScript.
Which choice lists the elements that are necessary for a CGI session?
Web browser, CGI script, Web form and Web server with a CGI interpreter
Which is the native audio format for Microsoft Windows?
Waveform (WAV)
Which audio file format is the native sound format for Windows?
Waveform (WAV) is the native sound format for Windows. Most browsers provide built-in support for WAV files. It is supported by HTML5 audio. Audio Interchange File Format (AIFF) was developed by Apple Computer and offers high-quality audio. MPEG-1 Audio Layer-3 (MP3) is a format for compressing audio files that uses the MPEG-1 standard. Ogg Vorbis is a free, open-source alternative to the MP3 format (which is proprietary and licensed).
What is the name of the concept for the changing trends in the use of WWW technology and Web design that have led to the development of information-sharing and collaboration capabilities?
Web 2.0
Which data format is most often used to allow users to view headlines and updates from news Web sites?
Web feed
What is the term for an individual who is responsible for developing and implementing plans to take advantage of the sales and marketing opportunities available through the Internet?
Web marketing manager
What is the term for an HTML document containing one or more elements, such as text, images and hyperlinks, that can be linked to or from other HTML pages?
Web page A Web page is an HTML document containing one or more elements, such as text, images and hyperlinks, that can be linked to or from other HTML pages.
What is the term for a collection of related HTML documents located on a host computer on the Internet?
Web site
Which IT job role best describes an individual who is responsible for evaluating Web site statistics to determine the site's effectiveness?
Web site analyst
Which IT job role best describes an individual who is responsible for the organization and appearance of a Web site?
Web site designer
Which IT job role best describes an individual who provides organizational leadership for Web site content and all related initiatives?
Web site manager
What does a validation engine (such as the W3C Markup Validation Service) determine about your Web page?
Whether it conforms to a specific W3C markup code standard
What color does the hexadecimal value #FFFFFF represent?
White
What color does the mixture of red, green and blue light on a monitor screen produce?
White
Which choice lists the systems for which the Windows Media Player is available?
Windows and Macintosh systems
What occurs in Windows when you try to open a file with an unknown MIME type?
Windows prompts you to define a MIME type and associate it with an application.
Integrated Services Digital Network (ISDN)
With an ISDN line you can connect a computer, telephone and fax machine into a single line and use them simultaneously.
What is the least expensive way to access the Internet?
With phone lines, an analog modem and an ISP
What is the term for a tool that assists users of an application in creating documents and/or databases based on styles and templates?
Wizard
Which organization was formed by the United Nations to protect intellectual property worldwide?
World Intellectual Property Organization (WIPO)
What is the term for an application programming interface (API) that is used to transfer XML and other text data between a Web server and browser?
XMLHttpRequest An XMLHttpRequest is an application programming interface (API) that is used to transfer XML and other text data between a Web server and browser. Ajax allows you to create interactive Web applications using XMLHttpRequest, HTML, CSS, the Document Object Model (DOM) and JavaScript. A mashup is a Web page that integrates content and scripts from multiple Web sites to create new applications. Folksonomy is the practice of categorizing online content through tags. Semantic Web implementations are Web applications that have the ability to contextualize data as they process it; the data can be augmented with metadata to give it meaning.
Consider the following line from an HTML document: Site Development Associate<br> This code shows an example of:
an empty tag.
What is a trojan?
You answered: A program that appears to be harmless but actually produces harmful results
What is a hash?
You answered: A text string generated by an algorithm from a numerical sequence Correct Response: A number generated by an algorithm from a string of text
For which encryption method is it critical that the secrecy of the key be maintained by the sending and receiving parties in order for the encryption to be effective?
You answered: Asymmetric encryption Correct Response: Symmetric encryption
What is the term for a password-protected, encrypted data file that can be used to authenticate a program?
You answered: Digital certificate
Which of the following provides positive identification of the sending and receiving parties to ensure that programs downloaded from the Internet are original and safe?
You answered: Digital certificate
In addition to allowing keyword searches, which of the following search engines also allows conceptual searches?
You answered: Excite
What is the term for an internal network designed to provide access to selected external users?
You answered: Extranet An extranet is an internal network designed to provide access to selected external users, and is not available to the Internet public. An intranet is an internal, or in-house, Web site and network used only by employees within a company. The Internet is a worldwide network of interconnected networks.
What is the term for a numeric code that uses an algorithm to encrypt and decrypt data?
You answered: Hash Correct Response: Key
What is the main difference between intranets/extranets and the Internet?
You answered: Intranets and extranets exclude the general Internet public.
Which of the following has become the most common asymmetric encryption algorithm, and is included in Web browsers and many other products?
You answered: MD6 algorithm (Hash) Correct Response: RSA algorithm
A block-level element is a markup element that affects at least:
an entire paragraph.
The ability to identify the tasks that constitute a project, understand the ways in which tasks are dependent upon one another, and know the ways that project dependencies will affect the project as a whole can be considered:
a planning skill. To effectively manage a project, you must have strong planning, organizational, communication, problem-solving and leadership skills. Planning skills involve identifying the tasks that constitute the project, understanding the ways in which tasks are dependent upon one another, and knowing the ways that project dependencies will affect the project as a whole. Organizational skills involve helping project participants coordinate and prioritize their tasks to stay within the project scope. Communication skills involve keeping project participants informed in order to keep the project running smoothly. Problem-solving skills involve the ability to quickly identify problems (real or potential) and propose solutions.
When you submit a Web form, the browser sends the information entered in this form to the Web server as:
a raw text string.
Consider the following line from an HTML document: <title/>Site Development Associate This code shows an example of:
a stand-alone non-empty tag.
In ontology, an attribute refers to:
a unique characteristic pertaining to a class. In ontology, an attribute refers to a unique characteristic pertaining to a class. A class, which is a particular type of object (e.g., a particular model of kayak), can have multiple unique attributes. For example, a particular model of kayak will have various attributes such as color, length, weight, displacement, and type of construction materials. A domain is an ontology term that represents an entire company or a division within a company. A schema is a hierarchical description and vocabulary concerning a particular domain.
Which attribute of the anchor (<a>) element determines the color of unvisited hyperlinks?
a:link
You use the <hr> tag to:
add a horizontal line to a Web page.
The CSS text-align property used for table elements:
aligns content horizontally in all table elements.
The CSS vertical-align property used for table elements:
aligns content vertically in all table elements.
The opening <body> and closing </body> tags encompass:
all content to be displayed on the page through the user agent.
Graphical user interface (GUI) HTML editor applications:
allow you to modify your HTML code manually.
HTML markup tags consist of:
an element, an attribute and a value.
You can use project management software to:
automatically calculate the length of time required to complete project tasks, as well as the availability of resources, as you establish relationships among the tasks. Project management software automatically calculates the length of time required to complete project tasks, as well as the availability of resources, as you establish relationships among the tasks. As you adjust the schedule, the software recalculates the finish dates and adjusts the project calendar. A project schedule lists the planned dates for performing tasks and meeting goals identified in the project plan. A Statement Of Work (SOW) outlines the requirements for each project task to ensure that the project objectives are met. A SWOT analysis enables you to determine how your company's (or project team's) strong and weak points can affect the outcome of a project.
By default, content in a table header cell is aligned:
both horizontally and vertically to the center of the cell.
What is the default value for aligning images relative to text using CSS?
bottom
How is a many-to-many relationship between two database tables established?
by creating two one-to-many relationships with a third table, called a junction table.
Unexpected Web pages and advertisements most commonly occur when you:
click a dead link
When you enter a URL such as "www.CIWcertified.com" in your browser, what is implied because you are visiting the top level of the site?
he Web site's home page When you enter a URL such as "www.CIWcertified.com" in your browser, your browser divides the URL into three parts: the protocol (http), the server and domain name (www.CIWcertified.com), and the name of the file you want to view. In this case, the Web site's default or home page (index.php) is implied because you are visiting the top level of the site.
The default or starting page of a Web site is called the:
home page.
By default, content in a table data cell is aligned:
horizontally to the left and vertically to the center of the cell.
Values for the CSS border-spacing and padding properties used for the <table> element can be specified:
in pixels.
Lossy compression is a compression technology:
in which the more an image is compressed, the more its quality is reduced.
A deep Uniform Resource Locator (URL) is a URL that:
includes a path that penetrates the folder structure of a Web site.
An absolute Uniform Resource Locator (URL) is a URL that:
includes the full path from the system root to a specific page or resource.
When you are using remote control services and need to enter the IP address of the system you want to control, you should use the
ipconfig command. The Windows ipconfig utility (Internet protocol configuration) is used to display your system's IP configuration. You can use the ipconfig command when you are using remote control services and need to enter the IP address of the system you want to control. The ping utility (Packet Internet Groper) tests connectivity between source and destination systems. The Windows tracert utility can determine the path between a source and destination system. You can use the command-line FTP get command to copy a file from an FTP server to your computer.
A hypertext document:
is created using Hypertext Markup Language (HTML), a system of code that enables the author to include hypertext links (also called hyperlinks or links) in documents.
Google originally created the Chrome browser because it felt that existing browsers were too complex; they wanted a cleaner, simpler interface. Google has embraced the greenfield approach to software and Web development. A greenfield is a project that:
lacks any constraints imposed by prior development.
One of a project manager's skills is teaching effectively, which can be considered primarily a type of:
leadership skill
An interlaced image format is read from:
left to right.
Internet domain names sometimes use a country-level domain, or country code, to identify the geographical region in which the Internet organization or address is based. Which address demonstrates the proper syntax for a country-level domain?
londontimes.co.uk
What attribute should you add to the <audio> element if you want your audio to play over and over again without stopping?
loop="loop"
Uploading files to an FTP site requires an FTP client program and:
permission, which is usually provided by the FTP server administrator.
By adding the checked="checked" attribute and value into the <input> tag for a group of check boxes, you can:
preselect as many check boxes as you like.
Intranets are popular because they:
provide a standard method for accessing resources, regardless of the operating systems used.
Direct Internet connections:
provide continuous access to the Internet through permanent network connections.
You can improve the quality of a product by:
providing independent verification that project tasks were completed correctly and adhering to ISO 9000 standards.
A storyboard is a document that describes the:
purpose and intended audience for a Web site, and provides a rough outline of the pages needed.
Which of the following are accepted values for the <area> tag's shape attribute?
rect, circle and poly
Client-side image maps are more common than server-side image maps because server-side image maps:
require CGI scripts.
In order to manage scope creep, you can use scheduled meetings to:
review and discuss proposed changes to the project scope.
What is the term in ontology that refers to the hierarchical description and vocabulary concerning a particular domain?
schema
The catalog that is queried when you conduct a Web search using a search engine is called a:
search index. Search engines consist of large databases that allow you to query indexes. A search index is an enormous catalog that a specific search engine site has compiled, consisting of millions of Web page references. When you conduct a Web search using a search engine, the search index is the catalog that is queried.
An internal hyperlink is a link you can use to jump to another:
section on the same Web page.
FormMail is a CGI script that is designed to receive information from a Web form. FormMail is popular because it:
sends form information to you via e-mail.
Vector graphics:
use mathematical coordinates to create images and specify colors.
Cloud computing is a computing paradigm in which:
users are able to access software and services run by servers that reside on the Internet.
Dial-up connections are:
very slow, outdated and rarely used anymore. Also the least expensive method of obtaining access to the Internet.
The browser-safe color palette is a standard of 216 colors that:
will render consistently in any browser or with any operating system.
By default, horizontal rules display:
with a 3-D shading effect.
Consider the following address: http://www.CIWcertified.com/courses/iba.htm Which part of this address represents the server name on which this page resides?
www
To connect your computer to the Internet:
you must install client software, implement a connection method and identify the addresses of servers you can use.
When you upload your Web site to a Web server, the file references can remain unchanged as long as:
your directory structure persists.