IBA Certification Lesson 1-10

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which type of online resource accepts input only from scholars and recognized authorities?

Authoritative peer-reviewed

What will Internet search results contain when you use the OR Boolean operator in a two-keyword search string?

One keyword or the other or both

Which type of URL would you use when coding a Website in HTML?

Relative URL

What is encryption?

The process of converting data into an unreadable form of text

What is the name of the tool that can help create documents and databases, based on styles or templates?

Wizard

Question 11 : E-mail message headers consist of:

the To, Cc, Bcc, Subject and Attachment components.

What is a cookie?

A small text file that contains information sent between a server and a client to help track user activities

Which of the following devices can you use with personal information management (PIM) software to synchronize appointments and contact information that you keep on your desktop or laptop computer?

A smartphone

What is spyware?

A software application that is secretly placed on a user's system to gather information and relay it to outside parties

Which of the following services are you using when a third party is hosting your Web site but your company has its own Web address with its own domain name?

A virtual domain

What is the Internet?

A worldwide network of interconnected networks

In which of the following components should you store names and information for your frequently accessed e-mail contacts?

Address book

What is the name of the programming methodology for the Web that enables Web applications to interact with users in much the same way they do with desktop applications?

Ajax

What is lossless compression?

All the original data can be recovered when the file is decompressed

Having appropriate access to hardware and software, and getting the security access required to perform tasks can be considered which of the following?

An IT right

Receiving clear, detailed objectives and instructions so that you can provide the appropriate services and products can be considered which of the following?

An IT right

What is a viewer?

An application used to retrieve a file when the program needed to open the file type is not installed on your computer

Question 20 : In which encryption method are the public and private keys mathematically related so that only the public key can be used to encrypt messages, and only the corresponding private key can be used to decrypt them?

Asymmetric encryption

What symbol does an e-mail address use to separate the user name from the domain?

At ( @ )

If your organization scans e-mail attachments to ensure that they contain no malicious code, where does the scanning take place?

At the e-mail server

What is the term for a file that is sent with an e-mail message?

Attachment

What kind of file formats are .au, .mp3, .aiff and .wav?

Audio

Which browser element is an application that adds extra capabilities to your Web browser?

Extension

What are add-ons?

Extensions and plug-ins used to extend the functionality of the Firefox Web browser

What is a security risk that comes with downloading extensions?

Extensions can disguise themselves as legitimate programs while actually acting as malware.

What is the term for the complete domain name of an Internet computer?

Fully qualified domain name

Which of the following is an open-source implementation of Pretty Good Privacy (PGP) that does not use patented algorithms?

GNU Privacy Guard (GPG)

Which of the following enables users on different e-mail systems to exchange messages?

Gateways

What is the term for the integration of telephony and data technologies?

Convergence

What is the open-source software development term for the practice of removing restrictions from the distribution and use of software?

Copyleft

Which of the following is a common advantage of cloud computing?

Cost reduction

Which of the following statements is true about Digital Subscriber Line (DSL)?

DSL is similar to Integrated Services Digital Network (ISDN) lines, but DSL is much faster.

Which of the following should IT professionals use to store, access and manipulate corporate database information?

Database management system (DBMS)

Which of the following takes place when IT projects are managed properly?

Employee productivity is maximized

What is the term for an internal network designed to provide access to selected external users?

Extranet

Which of the following statements about File Transfer Protocol (FTP) is true?

FTP is a good alternative to sending an e-mail attachment.

Question 10 : Which of the following retains all the formatting characteristics of a word-processing document, but may render inconsistently in different browsers?

HTML résumés

Why is having local access to e-mail messages important for those who use IMAP servers?

If a network problem occurs, IMAP server users may not have access to their messages.

Which of the following protocols is used to transfer Web pages from a Web server to a Web client?

Hypertext Transfer Protocol (HTTP)

Question 16 : What is the term for an SMTP server that allows the third-party relay of e-mail messages that spammers use to send spam?

Open relay

What is the term for a copyleft license that removes restrictions on the use and distribution of the licensed product?

Open-source license

Which of the following is a mass-marketing Internet technology that allows you to specify whether you want to be added to an e-mail list server?

Opt-in e-mail marketing

Which of the following is a Short Message Service (SMS) that companies can use to send you promotional messages?

Opt-in mass texting

Which of the following graphics file formats is written in a page description language that is unreadable, and can be printed only on a specific type of printer?

PS

Question 6 : What is the term for the idea of a major change in a former way of thinking or organizing?

Paradigm shift

Which of the following protocols provides authentication and encryption, and is used by most servers for secure exchanges over the Internet?

Secure Sockets Layer (SSL) protocol

During which project management phase should product testing and performance evaluations occur?

The closing phase

During which project management phase should you determine the aspects of the project that worked well and the changes that should be implemented in the future?

The closing phase

Which of the following results from extracting a compressed file from an archive file created by the compression utility?

The compressed file and a folder containing the extracted files

During which project management phase should you troubleshoot problems and take corrective measures to ensure that all objectives are being met?

The controlling phase

What is an extension?

The evolution of plug-in technology designed to supplement and improve your Web experience.

What is a Website's home page?

The first Webpage that displays when you access a domain

What is the term for mathematical statements that describe a series of points to be connected to create an image?

Vector graphics

Which of the following produces graphics image files that are small, download quickly, and are easily resized without affecting image quality?

Vector graphics

What is the term for the concept referring to the changing trends in the use of WWW technology and Web design that have led to the development of information-sharing and collaboration capabilities?

Web 2.0

Which of the following accurately describes at least one difference between Web 1.0 and Web 2.0?

Web 2.0 largely relies on the use of crowdsourcing, whereas Web 1.0 does not.

Question 22 : What is the term for an individual who develops primarily server-side Web applications?

Web application developer

What is the term for a software application that enables users to access and view Web pages on the Internet?

Web browser

What is the term for an HTML document containing one or more elements, such as text, images and hyperlinks, that can be linked to or from other HTML pages

Web page

What is the term for an HTML document containing one or more elements, such as text, images and hyperlinks, that can be linked to or from other HTML pages?

Web page

What is the term for a collection of related HTML documents located on a host computer on the Internet?

Web site

Question 19 : What is the term for an individual who evaluates Web site statistics to determine the site's effectiveness?

Web site analyst

Question 1 : Which IT job role would most likely direct the activities of the Web development team in a large organization?

Web site manager

An information portal is a search engine that will only find:

Web sites that have been registered with search engines.

What is the term for an audio and/or video Web event that is distributed over the Internet?

Webcast

In which instance would using an advanced Web search technique be most appropriate?

When conducting an Internet search for a complex subject, or to narrow the results of a standard search

Which of the following would be considered a Web 2.0 technology?

Wiki

Which of the following open information sources are students sometimes told to avoid retrieving information from because it is considered non-authoritative or unverified?

Wikipedia

If your organization's server is running Microsoft Internet Information Services (IIS), which browser choices should your IT department consider implementing?

Windows Internet Explorer

Which of the following should you use to accept real-time assistance from a remote help desk technician?

Windows Remote Assistance

What occurs in Windows when you try to open a file with an unknown MIME type?

Windows prompts you to define a MIME type and associate it with an application.

Question 24 : Which of the following has published more than 110 Web standards, and encourages manufacturers to follow these standards, many of which define levels of conformance?

World Wide Web Consortium (W3C)

What is the term for an application programming interface (API) that is used to transfer XML and other text data between a Web server and browser?

XMLHttpRequest

Viruses that reside within the text of an HTML-formatted e-mail message are particularly virulent because:

the user need only receive the virus for it to cause damage.

Question 26 : You should obtain an IT technical or professional certification:

to demonstrate a level of competence or expertise in a specific IT field.

The connectivity that makes the Internet possible also makes systems vulnerable to:

unwanted activity

You have been asked to defragment the hard drives of several corporate systems without leaving your desk. All of the systems are running Windows 7. To complete this task, you should:

use Remote Desktop Connection.

What is an illicit server?

An application that installs hidden services on systems

Which term describes the appointment of a specific resource to a specific task?

Assignment

What part of an e-mail address appears after the @ symbol?

Domain name

For what purpose would you use a cable modem?

To connect to the Internet through your cable television system

Which audio file format is the native sound format for Windows?

Waveform (WAV)

Each segment of a dotted quad consists of a number between

0 and 255

What is the term for a device that converts digital data from a computer into analog signals and back again?

Modem

You should create a relational database in order to:

eliminate data duplication.

Malware is a generic term for software:

whose specific intent is to harm computer systems.

The 802.11 standard, which was developed by the Institute of Electrical and Electronics Engineers (IEEE), refers to a family of specifications for:

wireless network technology

What is the file type that Google Chrome extensions use?

.crx

Which video file format is the Macintosh native movie platform?

.mov

Which video file format is a royalty-free, open video and audio format that is supported by Google?

.webm

How many bits does the Internet Protocol version 6 (IPv6) address format use?

128

To comply with many Web site requirements for added security, nearly all browsers support a minimum of:

128-bit encryption

What is an end-user license agreement (EULA)?

A legal contract between the author of software and the end user that defines how the software can be used

Which device connects a wireless local area network to a wireless phone network at broadband speeds?

4G mobile hotspot

To which type of server are you usually transferred when you download software programs and documents from Web sites?

A File Transfer Protocol (FTP) server

What is http://www.ucorp.biz an example of?

A Uniform Resource Locator (URL)

Question 28 : What is an update?

A file or collection of software tools that resolves system liabilities and improves software performance

What is a local area network (LAN)?

A group of computers connected within a confined geographic area

In computer terminology, what is a network?

A group of two or more computers connected so they can communicate, share resources and exchange information with one another

What is a listserve group?

A group of users that subscribes to a mailing list

What is a project milestone?

A major event during the course of a project

What is a peer-to-peer network?

A network in which each computer has both server and client capabilities

What is a hash?

A number generated by an algorithm from a string of text

What is a wiki?

A page or collection of Web pages that can be viewed and modified by anybody with a Web browser and Internet access

What is P2P?

A peer-to-peer network on the Internet

What is folksonomy?

A programming methodology for the Web that enables Web applications to interact with users in much the same way they do with desktop applications

In databases, what is a one-to-many relationship?

A relationship in which a record in Table A can have multiple matching records in Table B, but a record in Table B has only one matching record in Table A

What is a firewall?

A security barrier that prevents unauthorized access to or from private networks

What is a worm?

A self-replicating program or algorithm that consumes system resources

What is a project?

A sequence of tasks that must be accomplished within a defined time frame to achieve a desired result

What is a software patent?

A set of exclusive rights granted to an inventor for a fixed period of time upon disclosure of the invention

What is the World Wide Web?

A set of software programs that enables users to access resources on the Internet via hypertext documents

Which of the following services allows multiple companies, organizations or people to share portions of the same domain name?

A shared domain

What is an anonymous FTP site?

A site that allows guests to download files without having an account on that site

Question 19 : What is symmetric encryption?

An encryption method in which the same key is used to encrypt and decrypt a message

What happens when you click a hypertext link?

Another location in the same Web page or another Web page appears

How do most current e-mail clients display an attachment in an e-mail message?

As a separate link, such as an icon

An IT professional can evaluate a browsing session to identify:

the processes, technology and potential risks.

Why would some corporate IT departments disable JavaScript and ActiveX on browsers used within the company?

Because JavaScript and ActiveX controls allow information to be downloaded and run on your system

Why should you avoid transmitting sensitive information in an instant messaging session?

Because instant messaging is not a secure method of communication

Why do companies that conduct business internationally need to be aware of the encryption laws in various countries?

Because some countries do not allow large encryption keys to be exported

Question 42 : Why are firewalls considered the first line of defense against LAN security breaches?

Because they provide data confidentiality

Which aspect of program management typically includes maximizing revenue, maximizing efficiency, minimizing cost and eliminating waste?

Benefits management

Which of the following do end users most commonly download from FTP sites?

Binary files

Which of the following search engines uses your social network (Facebook and Twitter) to find more relevant information for your query?

Bing

Which of the following are typically an example of secondary resources?

Biographies

Question 10 : Which of the following can administrators use to filter out the IP addresses of known spammers?

Blackhole list

What is one reason blogging has become so popular and prevalent?

Blogs have become a form of intellectual stimulation as well as entertainment.

To make Web browsing easier, you can save URLs and hyperlinks that access particular Websites to avoid the need to manually type URLs each time you want to access the sites. What is the term for these saved links in Google Chrome?

Bookmarks

What will Internet search results contain when you use the AND Boolean operator in a two-keyword search string?

Both keywords

How are wide area networks (WANs) created?

By connecting LANs to one another via public carriers

How can database information be provided to users via the Web?

By connecting a Web server to a database server

How is a many-to-many relationship between two database tables established?

By creating two one-to-many relationships with a junction table

How is a table relationship established?

By matching data in key fields between two database tables

How does the separation of duties help to ensure the quality of a product?

By providing independent verification that project tasks were completed correctly

What is the best way to find the exact information you need from the vast amount of data on the Internet?

By using Web search engines and search techniques

In the client/server model:

the server is responsible for storing and providing information

The project triangle consists of:

the time, money and scope that affect every project

Which language is considered the best language for creating large applications?

C++

Which of the following can be used to detect automated systems used by spammers for registering e-mail accounts?

CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)

Question 23 : In the business ontology model, the highest-ranking corporate officer in charge of the total management of an organization is the:

Chief Executive Officer (CEO)

Question 9 : What is the term for software services that are provided over the Internet, rather than at a company site?

Cloud computing

What is the term for an algorithm used by HTML5 to compress and decompress files?

Codec

What term describes the ability of a group to exhibit a greater degree of intelligence by solving problems collaboratively instead of relying on the intelligence of an individual member?

Collective intelligence

Which of the following is used to process data submitted by a user by passing data back and forth between a server and an application program?

Common Gateway Interface (CGI)

If your company network uses a proxy server, what must you do to be able to access the Internet?

Configure your browser to address the proxy server.

What is the name of the problem-solving model in which a task ordinarily performed by one person is outsourced to a large group or community in order to obtain and analyze large amounts of data?

Crowdsourcing

What are E carriers?

Dedicated digital telephone lines used in Europe

What are T carriers?

Dedicated digital telephone lines used in North America

Which server type provides text output that users can access at their convenience and also allows multi-person input?

News server

What is the term for a password-protected, encrypted data file that can be used to authenticate a program?

Digital certificate

Which of the following provides positive identification of the sending and receiving parties to ensure that programs downloaded from the Internet are original and safe?

Digital certificate

What are fractional T and E lines?

Digital phone lines consisting of one or more individual T or E carrier channels, rather than the entire T or E carrier line

Question 14 : What is the term for an electronic stamp that identifies a message's source and contents?

Digital signature

In which type of Web search does the search engine display a list of categories and subcategories that you can browse?

Directory search

Which of the following is an appropriate use of e-mail in a business environment?

Discussing the status of a project with co-workers

What kind of file formats are .txt, .pdf and .rtf?

Document

Which of the following is used solely to resolve human-readable domain names into their computer-readable IP addresses?

Domain name servers

Why might a Web page appear differently in different browsers?

Each browser interprets HTML somewhat differently

Which of the following is considered a disadvantage of an organization's practice of monitoring their employees' e-mail messages and restricting their access to certain Web sites?

Employees may be denied access to legitimate Internet resources that may help them do their jobs.

What is ciphertext?

Encrypted data

In addition to allowing keyword searches, which of the following search engines also allows conceptual searches?

Excite

To make Web browsing easier, you can save URLs and hyperlinks that access particular Websites to avoid the need to manually type URLs each time you want to access the sites. What is the term for these saved links in Microsoft Edge?

Favorites

Which of the following connection types provides the fastest direct connection speed?

Fiber-optic cable

Internet resources can be used for a variety of purposes beyond the World Wide Web and e-mail. Which of the following can you use transmit larger files?

File Transfer Protocol (FTP)

Which of the following protocols is used to transfer files between two computers on the Internet?

File Transfer Protocol (FTP)

What is the term for a field in a related database table that refers to the primary key in the primary table?

Foreign key

Which of the following e-mail response options should you use to send an e-mail message to users who did not receive the original

Forward

What kind of file formats are .gif, .jpg, .png and .tif?

Graphics

Question 3 : Which of the following should you use to encrypt and decrypt digital signatures, and to protect passwords from disclosure?

Hash encryption

Which of the following describes an appropriate use of Virtual Network Computing (VNC)?

Help desk personnel might use VNC to troubleshoot computer problems for remote employees.

Which of the following is an accurate description of cloud computing?

Hosted applications and services offered by a third party and run almost entirely from one or more servers that reside on the Internet

Question 8 : Which of the following activities would most likely be conducted by a server administrator?

Implement policies and procedures for ensuring the security and integrity of servers and the network

You are troubleshooting a common Internet client problem. You increase the size of the browser cache and change the frequency with which the browser compares cached pages to those on the Web. What are you trying to do?

Improve the performance of a computer with a slow connection

Which of the following is a weakness of Python?

It is traditionally slower than other languages.

How can scope creep undermine the success of a project?

Incremental changes in scope will affect the schedule, cost or performance required to complete the project

Which organization is responsible for codifying copyright law as it applies to digital information?

Information Infrastructure Task Force (IITF)

Question 15 : What is the term that refers to the management and processing of information using computers and computer networks?

Information Technology (IT)

Which of the following wireless mode types uses a centralized access point known as a wireless access point (AP)?

Infrastructure

Which of the following is true about client-side JavaScript?

It needs HTML to run.

What function does a proxy server perform?

It replaces the network IP address with another, contingent address to hide the actual IP address from the rest of the Internet, thereby protecting the entire network.

Question 13 : Which of the following activities would most likely be conducted by a PC repair technician?

Install, modify and repair personal computer hardware components and install software

What is the term for a computer-based method of communication in which users can type and view messages sent to one or more recipients, and view the responses immediately?

Instant messaging (IM)

Question 8 : Which term collectively refers to industrial property and copyrighted works?

Intellectual property

What function does the Domain Name System (DNS) perform?

It resolves IP addresses into easily recognizable text-based names.

Question 18 : What is the name of the international community of network designers, operators, vendors and researchers concerned with the evolution of the Internet architecture and the smooth operation of the Internet?

Internet Engineering Task Force (IETF)

Which of the following protocols enables you to browse and manage e-mail messages while they reside on the server?

Internet Message Access Protocol (IMAP)

What is the term for an organization that maintains a gateway to the Internet and rents access to customers on a per-use or subscription basis?

Internet Service Provider (ISP)

What is the term for a Web site and network used only by employees within a company?

Intranet

What function does a list server perform?

It automates the collection and distribution of messages from an authorized group of participants.

Which of the following can be considered an advantage of P2P in the business environment?

It eliminates the cost and maintenance associated with file sharing through a centralized server.

In the client/server environment, what is the main function of client software?

It enables users to communicate with and request information from the server

Which of the following languages is an object-oriented programming language developed by Sun Microsystems that is often used when data needs to be shared across a network?

JAVA

Which of the following graphics file formats is widely used for complex graphics because it uses lossy compression and supports 16 million colors?

JPEG

Which of the following is considered an event-driven scripting language?

JavaScript

What is the term for a numeric code that uses an algorithm to encrypt and decrypt data?

Key

Which of the following would a search engine use to reference a Web site?

Keyword

What can be considered a disadvantage of using a spyware-detection application to remove spyware from your computer?

Legitimate applications can be incorrectly identified as spyware.

Which of the following popular social networking sites is most often used as a business tool?

LinkedIn

Question 21 : Which of the following data modeling steps involves encoding the concept into SQL programming?

Logical design

Which of the following is a text-only browser that runs on most operating systems?

Lynx

What is the term for an e-mail server program that receives sent messages and delivers them to their proper destination?

Mail Delivery Agent (MDA)

Question 5 : Which of the following activities would most likely be conducted by a database administrator?

Manage backup and recovery procedures to prevent the loss of data

Question 14 : What is the term for an individual who develops Web sites and/or applications for devices such as smartphones and tablets?

Mobile application developer

What is the term that refers to a person's ability to use technology while "on the go"?

Mobile computing

Which of the following is open-source software?

Mozilla Firefox

What is the term for individual computers and devices that are connected to a network?

Nodes

When specifying keywords to conduct an Internet search, which of the following parts of speech will be the most useful?

Nouns

What is the term for an element on a Webpage that contains data and procedures for how that item will react when activated?

Object

What is the term for the programming concept in which a program is handled as a collection of individual items that perform separate functions, rather than as a sequence of statements that performs a specific task?

Object-oriented programming

Which type of database table relationship is the most common?

One-to-many relationship

Which of the following enables an operating system to access databases from various vendors?

Open Database Connectivity (ODBC)

Which of the following statements is true of software patents?

Patents do not apply worldwide.

What is the term for a small browser window that appears behind the browser window you are viewing?

Pop-under window

Which of the following are typically an example of primary resources?

Physical objects and relics

Which of the following protocols can connect an entire network to the Internet?

Point-to-Point Protocol over Ethernet (PPPoE)

Which of the following is known as a "store-and-forward" e-mail service?

Post Office Protocol version 3 (POP3)

What is the term for a field containing a value that uniquely identifies each record in a database table?

Primary key

Which of the following enabled private (i.e., commercial) business to be conducted over networks connected to NSFnet?

Private telecommunications companies

Which of the following is a document that lists the planned dates for performing tasks and meeting goals defined in a project plan?

Project schedule

How do projects differ from ongoing work operations?

Projects are temporary and unique

Question 44 : To what does "The Right to Be Forgotten" argument relate?

Protecting your image and personal information in the world of social networking

Which of the following products can be used to expand a two-dimensional photograph into a three-dimensional environment?

QuickTime Virtual Reality (QTVR)

What is the legacy plug-in created by Apple Computer for running video files and audio files?

Quicktime

What is the term for pixel-based images that map bits to a display space?

Raster graphics

Which of the following protocols support the encryption and decryption of e-mail messages?

Secure Multipurpose Internet Mail Extensions (S/MIME) and Pretty Good Privacy (PGP)

What is the term for a collection of information consisting of one or more related fields about a specific entity, such as a person, product or event?

Record

What is the term for a database that contains multiple tables of information that can be joined through common fields?

Relational database

Which browser element is responsible for reading the Webpage and presenting it to an end user?

Rendering engine

Which of the following e-mail response options should you use to respond only to the original sender of an e-mail message?

Reply

Question 4 : What is the term for public documents of interest to the Internet community that include detailed information about standardized Internet protocols?

Requests for Comments (RFCs)

Question 37 : What is currently the most common way to authenticate users on private and public computer networks?

Requiring user names and passwords

What is the term for a server at the highest level of the Domain Name System (DNS)?

Root-level server

What is the term for a device that determines the best path for data to take across a network?

Router

Question 27 : What is the term for an individual who performs keyword research to determine the visibility of Web sites across multiple clients and search engines?

SEO analyst

The protocol required for text messaging is:

SMS.

Which of the following is a secure method of transferring files through Secure Shell (SSH) in which you can transfer several files in one session?

SSH File Transfer Protocol (S/FTP)

Which browser element is a programming method that isolates a particular application or process, and helps the browser keep information from being exposed or misused?

Sandbox

Question 2 : What is the term in ontology that refers to the hierarchical description and vocabulary concerning a particular domain?

Schema

What is the term for the goals and tasks of a project, and the work required to complete them?

Scope

Which of the following is a secure method of transferring files through Secure Shell (SSH) in which each file transfer is a discrete session?

Secure Copy (SCP)

Question 20 : What is the term for an individual who is responsible for examining an organization's security requirements and determining the necessary infrastructure?

Security analyst/consultant

Which of the following is the most effective way to spread viruses?

Sending e-mail attachments

Which of the following client-side actions can you take to reduce the amount of spam you receive?

Set up a spam filter in your e-mail client to filter out spam messages.

Question 17 : Which of the following activities would most likely be conducted by a network engineer?

Set up and maintain a network infrastructure

Which of the following plug-ins was developed by Microsoft and is a software development tool used to write and run Internet applications?

Silverlight

Which of the following server types is responsible solely for sending e-mail messages?

Simple Mail Transfer Protocol (SMTP) server

What methodology was originally developed to improve manufacturing processes in order to eliminate product defects?

Six Sigma

What is spim?

Spam that is delivered through instant messaging

: The commonplace use of e-mail has given rise to the term "snail mail," which is a slang term for what?

Standard postal service

What happens when your browser cache becomes full?

The browser automatically deletes old cached files as you continue to browse the Web.

Which language should you use to create and maintain large relational databases?

Structured Query Language (SQL)

Internet resources can be used for a variety of purposes beyond the World Wide Web and e-mail. Which of the following helps IT professionals troubleshoot and solve problems with Internet technologies?

TCP/IP diagnostic tools

Which of the following enables you to view previously accessed Webpages without having to request them from the server again?

The browser cache

As project manager, what should you do if conflicts of interest develop among various departments represented in your project to the point where the investment required to implement necessary project plan modifications is not justified?

Terminate the project

What does a URL that starts with https:// signify?

That you are visiting a secure Web site in which data transmissions are encrypted

In 1969, which U.S. Department of Defense agency funded what would become the first global computer network?

The Advanced Research Projects Agency (ARPA)

Which folder allows easy access to previously viewed Webpages by storing the URLs of sites you have accessed within a defined period of time?

The History folder

When you receive an e-mail transmission with an attachment, how does your browser know which application or plug-in to open to view or play the attachment?

The MIME definition for the application or plug-in that is located inside the HTTP header at the beginning of the transmission.

Which of the following Web sites performs market research and analyzes current trends in Internet business?

The Netcraft site

Question 11 : Which of the following will upper-level managers likely ask you to justify before making a hardware or software purchase, or creating a particular IT product or service?

The Return On Investment (ROI)

When you enter a URL such as www.ucorp.biz in your browser, what is implied because you are visiting the top level of the site?

The Website's home page

What is social networking?

The grouping of individuals with common interests or goals into specific groups or communities

During which project management phase should you conduct a needs analysis; determine project objectives, assumptions and constraints; and develop a Statement Of Work (SOW)?

The initiating phase

In a URL, what does the Internet resource component identify?

The name of the server on which the page resides

To what does the term "cloud" in "cloud computing" refer?

The network of servers and connections that make up the Internet

Question 3 : What is the main reason that IT managers believe the future IT career model will be diamond-shaped, with few entry-level IT jobs available?

The offshore outsourcing of many entry-level IT positions

Which of the following should you use when you want to test connectivity between your computer and a destination computer?

The ping command

What is program management?

The process of managing multiple interdependent projects to improve the performance of an organization

What is authentication?

The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data

What is Internet Protocol (IP)?

The protocol by which data is sent from one computer to another on the Internet

Which of the following is affected by any changes you make to the three "project triangle" factors in an effort to optimize a project's schedule?

The quality of the project deliverable

What is a top-level domain in the Domain Name System (DNS)?

The right-side component of a domain name, which categorizes domains into groups by common type or geography

What must an e-mail message recipient possess in order to view a file attachment?

The software necessary to open or edit the attached file

What must you know before you can create an effective project schedule?

The tasks necessary to achieve project objectives, the approximate length of time each task will take, the order in which tasks should be performed and the employees who will perform them

Which of the following should you use when you need to locate failures along the path between your computer and a destination computer?

The tracert command

In a URL, what does the protocol component identify?

The type of server and Internet service being used

What is a podcast?

The use of audio or video digital-media files that are distributed through Web feeds to subscribers

Which of the following can be considered a drawback of SMTP authentication?

There is a greater chance that a hacker can use a packet sniffer to obtain a valid user name and password.

What is the purpose of using Internet research tools such as Zotero?

They enable you to organize the information you find and store it on your local hard drive.

Which of the following is usually true of popular social networking sites?

They generally provide privacy protection for users.

Question 27 : What can be considered a disadvantage to installing program patches and updates?

They may introduce incompatibility issues or new security issues.

What is the primary function of a network server?

To act as a central repository of programs and data to which all users connected to the network have access

For what purpose should you use automatic cookie handling in most browsers?

To control when and from whom cookies are accepted

Why should you use out-of-office messages when you will be out of the office for an extended period of time?

To explain why you may not respond to e-mail messages within a reasonably short period of time

What is the purpose of a needs analysis?

To identify the problems or requirements that the project must resolve or address

Why would you use quotation marks in a search string when conducting an Internet search?

To narrow your search to yield Web pages that contain only the keywords as they appear together in the specified order

What is the primary function of a Web browser?

To retrieve pages from a Web server and display them on your screen

For what would you use a personal information management (PIM) program?

To schedule appointments and meetings, store contact information, and manage tasks

Why are audio and video files compressed before they are transferred across the Internet?

To shorten the amount of time required to download them

What is the main purpose of a file server?

To store shared data

What is the primary goal of a extension?

To supplement multimedia content in Websites

What is the name for the method by which a blogger receives notification when other bloggers link to his or her blog entry?

Trackback

What is the term for a word, slogan, symbol, name, package design or device that distinguishes a product from other products?

Trademark

What enables dissimilar systems connected to the Internet to communicate with one another?

Transmission Control Protocol/Internet Protocol (TCP/IP)

Which of the following is responsible for ensuring that data packets are transferred quickly and reliably across a network?

Transmission Control Protocol/Internet Protocol (TCP/IP)

A LAN can be connected to the Internet by a router, provided that the LAN uses:

Transmission Control Protocol/Internet Protocol (TCP/IP).

What is a wide area network (WAN)?

Two or more local area networks (LANs) that span a wide geographic area

What is the standard Internet convention used to represent a hypertext link in words in a document?

Underlined text

What is the term for the business trend that seeks to simplify and integrate all forms of communication?

Unified communications (UC)

Question 7 : If you copy a file from a CD that is infected with a virus, what is the most effective way to prevent the virus from infecting your system?

Use anti-virus software to disinfect your hard drive and remove the virus from your system

When using multiple Boolean operators to conduct an Internet search, how can you indicate the order in which the Boolean phrases should be considered?

Use parentheses to combine Boolean phrases.

Which of the following can be considered an advantage of connecting LAN computers to the Internet through a firewall?

Users on the LAN can request information from the Internet, but outside users are denied access to the LAN.

What kind of file formats are .avi, .mp4, .ogg, .webm and .mov?

Video

Internet resources can be used for a variety of purposes beyond the World Wide Web and e-mail. Which of the following enables IT professionals to access and fix computers in remote locations?

Virtual Network Computing (VNC)

What is the term for voice information delivered in digital form as packets of data using Internet Protocol (IP) instead of the traditional circuit-switched lines of the public switched telephone network (PSTN)?

Voice over IP (VoIP)

Semantic Web implementations are Web applications that:

have the ability to contextualize data as they process it.

You can use screen savers to:

hide your work while you are away from your desk, providing a measure of security.

An absolute Uniform Resource Locator (URL) is a URL that:

includes the full path from the system root to a specific page or resource.

Presence information:

indicates a person's willingness and ability to participate in communication.

You should schedule meetings with project stakeholders and management during the executing and controlling phases of a project to:

inform them of progress and to handle issues they raise that may affect project scope

Companies use call centers to:

interact with their customers.

When you are troubleshooting a network problem and you need to determine the details of your computer's network connection, you should use the:

ipconfig command.

The FTP navigational structure:

is similar to the hierarchical directory structure of a hard drive.

If your browser cache size is too small:

it may take longer for pages to download from the server.

A greenfield is a software development project that:

lacks any constraints imposed by prior development.

One of a project manager's skills is teaching effectively, which can be considered primarily a type of:

leadership skill

A Web page that integrates content and scripts from multiple Web sites to create new applications is known as a:

mashup.

A drawback of Webinars is that they:

may require multiple presentations if participants are located in different time zones

When you use an e-mail client to send and receive mail:

messages stored in your Outbox are sent, a copy of each sent message is stored in the Sent Items folder, and incoming messages are routed to your Inbox.

Which of the following top-level domains would generally refer to an Internet Service Provider (ISP)?

net

By default, e-mail clients typically save a copy of every message you send in:

the Sent or Sent Items folder.

Typosquatting is the unethical practice of:

registering domain names very similar to those of high-volume sites in hopes of receiving traffic from users seeking the high-volume site who mistakenly enter an incorrect URL in their browsers.

A major update with significant software improvements is often marketed as a new:

release.

In order to manage scope creep, you can use scheduled meetings to:

review and discuss proposed changes to the project scope

The catalog that is queried when you conduct a Web search using a search engine is called a:

search index.

: Question 34 : Because spam is sent to you uninvited, it can be considered:

an invasion of privacy.

The ability to help project participants coordinate and prioritize their tasks to stay within the project scope can be considered:

an organizational skill

Google Chrome has an anonymous browsing feature. This feature allows users to use the browser:

and leave no cached information.

Question 12 : Portable Document Format (PDF) résumés:

are compatible with all computer platforms.

You can use project management software to:

automatically calculate the length of time required to complete project tasks, as well as the availability of resources, as you establish relationships among the tasks

Using all capital letters in an e-mail message connotes:

shouting or anger.

Error pages most commonly occur when you:

click a dead link.

Unexpected Web pages and advertisements most commonly occur when you:

click a link for a site that was added to a search engine's database by its spider program.

You would use a File Transfer Protocol (FTP) server to:

download popular shareware and open-source freeware.

When you use command-line FTP on Windows systems:

files are downloaded into the directory from which you enter the FTP commands.

A list server can be used to:

forward e-mails, announcements, newsletters or advertising to group members on a regular basis.

The term "netiquette" refers to:

general rules for Internet politeness.

Question 16 : Moore's Law postulates that:

the number of transistors per square inch on integrated circuits will double every two years.

In Microsoft Edge, Google Chrome and Firefox, how do you work in multiple browser windows simultaneously?

You can launch the browser once and open new tabs for multiple windows.

Which of the following can be considered an advantage of Web-based e-mail?

You can log on and check your e-mail from any computer that has Internet access.

Which of the following is a disadvantage of using Web-based e-mail?

Your user name and password reside on a third-party server.

An electronic journal or personal diary posted to a public Web site can be considered:

a blog.

Asking other users to divulge personal information during any Internet-based communication can be considered:

a breach of Internet ethics.

Typing an e-mail message or instant message using all capital letters can be considered:

a breach of netiquette.

The ability to gather information from customers at the beginning of a project, and keep project participants informed of the project's status can be considered:

a communication skill

A wireless access point (AP) is:

a device that enables wireless systems to communicate with each other, provided that they are on the same network.

Sending jokes via e-mail or sending instant messages to someone who does not want to be contacted can be considered:

a form of harassment.

Question 31 : Receiving written permission from a copyright owner to use copyright-protected material for your own purposes can be considered:

a licensing agreement.

The ability to identify the tasks that constitute a project, understand the ways in which tasks are dependent upon one another, and know the ways that project dependencies will affect the project as a whole can be considered:

a planning skill

The most common business firewall technique is to use a firewall server in conjunction with:

a proxy server.

In an IP address such as 72.44.192.233, the last number in the address (on the far right) identifies:

a specific computer

A SWOT analysis is:

a strategic planning method that can be used to evaluate the strengths, weaknesses, opportunities and threats in relation to an organization

Question 7 : In ontology, an attribute refers to:

a unique characteristic pertaining to a class.

Virtual Network Computing (VNC) is a program that:

allows you to control a computer at a remote location as if you were sitting in front of it.

Question 15 : In order to send an e-mail message, you must include:

an address in the To field.

Web feeds can be read using software called:

an aggregator.

Copyright laws protect:

original works of authorship online as well as in print.

Uploading files to an FTP site requires an FTP client program and:

permission, which is usually provided by the FTP server administrator.

Question 25 : In data modeling, determining exactly where data will be stored is the essential part of the:

physical design step.

Direct Internet connections

provide continuous access to the Internet through permanent network connections

Direct Internet connections:

provide continuous access to the Internet through permanent network connections

You can improve the quality of a product by:

providing independent verification that project tasks were completed correctly and adhering to ISO 9000 standards


संबंधित स्टडी सेट्स

Physical Science: Ch 6-8 Multiple Choice

View Set

Thomas Paine - multiple choice questions

View Set

Ch. 6 Differential Analysis: The Key to Decision Making

View Set