CIW
Which device connects a wireless local area network to a wireless phone network at broadband speeds?
4G mobile hotspot
What is the term for an e-mail server program that receives sent messages and delivers them to their proper destination?
A Mail Delivery Agent (MDA) is an e-mail server program that receives sent messages and delivers them to their proper destination (or mailbox), where a user can pick them up. An outgoing mail server runs a Message Transfer Agent (MTA), also called a mail transport agent, which routes, delivers and receives messages, usually via Simple Mail Transfer Protocol (SMTP). SMTP is responsible solely for sending e-mail messages. Post Office Protocol version 3 (POP3) servers receive and hold incoming e-mail messages in the appropriate mailbox on the server until users log on (authenticate themselves with a user name and password) and download their mail.
What is the term for an audio and/or video Web event that is distributed over the Internet?
A Webcast is an audio and/or video Web event that is distributed over the Internet. A Webcast uses streaming media technology to take a single Web event and distribute it to many participants simultaneously. Webcasting differs from Webinars and Web conferencing, which are designed to allow all participants to interact with one another. Webcasts generally refer to non-interactive Web events.
Which Internet resource is used to resolve domain names to IP addresses?
A domain name server
What is a listserve group?
A group of users that subscribes to a mailing list
What is an end-user license agreement (EULA)?
A legal contract between the author of software and the end user that defines how the software can be used
What is a peer-to-peer network?
A network in which each computer has both server and client capabilities
In computer terminology, what is a network?
A network is a group of two or more computers connected so they can communicate, share resources and exchange information with one another.
A number generated by an algorithm from a string of text
A number generated by an algorithm from a string of text
What can users input to selectively view and analyze data from a database?
A query Users can input a query to selectively view and analyze data from a database. A query isolates and displays only the information you want to examine by specifying the fields and records you want to see. A common field is a field contained in two or more database tables that forms a connection between the tables. A primary key is a field containing a value that uniquely identifies each record in a database table. A junction table is a database table containing foreign-key fields that refer to the primary-key fields from the primary tables in a many-to-many database table relationship.
In databases, what is a one-to-one relationship?
A relationship in which each record in Table A can have only one matching record in Table B, and vice versa A one-to-one relationship is a database table relationship in which each record in Table A can have only one matching record in Table B, and vice versa. The relationship is established only if the common field is the primary key in both tables. A one-to-many relationship is a database table relationship in which a record in Table A can have multiple matching records in Table B, but a record in Table B has only one matching record in Table A. A many-to-many relationship is a database table relationship in which one record in Table A can relate to many matching records in table B, and vice versa. A table relationship cannot occur if no common field exists between two tables.
What can you use to help you determine how closely a site matches the topic for which you are searching?
A relevancy score based on how frequently your specified keywords are found in the site
What is the term for a person, department or device needed to accomplish a task?
A resource is a person, department or device needed to accomplish a project task. A project is a sequence of tasks that must be accomplished within a defined time frame in order to achieve a desired result. An assignment is made when a resource is given a specific task to perform. A stakeholder is a person or group with an interest in a project and the power to exert influence over the project and affect results.
What is a software patent?
A set of exclusive rights granted to an inventor for a fixed period of time upon disclosure of the invention
Which of the following services allows multiple companies, organizations or people to share portions of the same domain name?
A shared domain
Your company has a registered domain name. You decide to sell portions of the domain name and make it available to others. What does this scenario describe?
A shared domain
What is an anonymous FTP site?
A site that allows guests to download files without having an account on that site. (ex: school & cannot upload)
Which of the following devices can you use with personal information management (PIM) software to synchronize appointments and contact information that you keep on your desktop or laptop computer?
A smartphone
Multimedia on the Web has expanded rapidly as broadband connections have allowed users to connect at faster speeds. Almost all Web sites, including corporate sites, feature multimedia content and interactive objects. To view interactive multimedia online, you need which of the following?
A sound card, speakers and a video card Nearly all network-connected devices, such as PCs, tablets, smartphones and smart TVs, can view online interactive multimedia. Each device includes a sound card, speakers and a video card. In some cases, small applications called plug-ins are required for browsers to view content that is not supported. Browser plug-ins are commonly used to play streaming audio and video, and interact with multimedia objects over the Internet.
Which of the following is a unit of work that must be accomplished during the course of a project?
A task is a unit of work that must be accomplished during the course of a project. A resource is a person, department or device needed to accomplish a project task. An assignment is made when a resource is given a specific task to perform. Scope refers to the goals and tasks of a project, and the work required to complete them.
Which of the following services are you using when a third party is hosting your Web site but your company has its own Web address with its own domain name?
A virtual domain
What is a worm?
A worm is a self-replicating program or algorithm that consumes system resources. A worm resides in active memory and replicates itself until an entire disk is full. A virus is a malicious program that assumes control of system operations, and damages or destroys data. An illicit server is an application that installs hidden services on systems. A trojan is a program that appears to be harmless but actually produces harmful results.
As part of the IT department, you configure the employee workstations for your company. When configuring a user's system, you always set the browser security levels to the company standard settings. What is restricted from downloading to the user's system when you configure browser security levels?
Active Content
Most browsers are able to save:
All images, fonts and scripts referenced by the HTML on a page.
Providing services and products in a timely, cost-effective, secure manner can be considered which of the following?
An IT responsibility
Minimizing workflow interruptions during the course of an IT project can be considered which of the following?
An IT responsibility IT professionals have certain rights, and they also have responsibilities to the organization. IT responsibilities include planning service and product installations and conducting training in a manner that minimizes workflow interruptions and hardware or network downtime. IT rights refer to what organizations should provide their IT staff in order for them to do their jobs properly. IT professionals are also bound by the rules and policies that govern an organization.
Receiving clear, detailed objectives and instructions so that you can provide the appropriate services and products can be considered which of the following?
An IT right
What is a viewer?
An application used to retrieve a file when the program needed to open the file type is not installed on your computer
Which term describes the appointment of a specific resource to a specific task?
An assignment is made when a resource is given a specific task to perform. A task is a unit of work that must be accomplished during the course of a project. A resource is a person, department or device needed to accomplish a project task. The project plan is a document that identifies all the tasks required to achieve the project goals. The project schedule is a document that lists the planned dates for performing tasks and meeting goals defined in a project plan. The end product or ultimate goal of a project, along with the tasks required to achieve that goal, constitute the project scope.
What is a hash?
An encryption method in which numbers generated by an algorithm from a string of text are used to verify the integrity of transmitted messages Hash encryption is an encryption method in which numbers generated by an algorithm from a string of text are used to verify the integrity of transmitted messages. Symmetric encryption is an encryption method in which the same key is used to encrypt and decrypt a message. Asymmetric encryption refers to an encryption method in which two keys are used to encrypt and decrypt a message: a private key and a public key.
How do most current e-mail clients display an attachment in an e-mail message?
As a separate link, such as an icon
What is the relationship between encryption and authentication?
Authentication occurs before an encryption session can begin, but authentication does not ensure that the ensuing session will be encrypted
To understand Web search engines, you must understand:
Basic database concepts.
Why would some corporate IT departments disable JavaScript and ActiveX on browsers used within the company?
Because JavaScript and ActiveX controls allow information to be downloaded and run on your system.
Why are firewalls considered the first line of defense against LAN security breaches?
Because they provide data confidentiality
Which aspect of program management typically includes maximizing revenue, maximizing efficiency, minimizing cost and eliminating waste?
Benefits management
Which of the following do end users most commonly download from FTP sites?
Binary files FTP servers contain documents of various sizes and types. Two common types of resources available on Internet FTP servers include large text files and binary files. End users will most commonly download binary files from FTP sites. Binary files are executable files, small software applications, images that require an association to open, or compressed files that require decompression.
Which of the following search engines uses your social network (Facebook and Twitter) to find more relevant information for your query?
Bing
which of the following are typically an example of secondary resources?
Biographies Secondary research is based on primary resources, preferably by a credible individual. Secondary resources include biographies, text books, magazines, newspapers, commentaries on speeches, and reference books. Secondary resources are the most common type of resource you will use. Resources such as autobiographies, debate transcripts and physical relics would be considered primary resources because the source material has not been edited or compiled in a significant way by a researcher.
Which choice lists two methods that you can use to reference an FTP or file-storage server (such as Dropbox) in order to download files?
By IP address or domain name
How do proxy servers increase the corporate network's Internet access speed?
By caching Web sites for the entire network
How are wide area networks (WANs) created?
By connecting LANs to one another via public carriers
How is a table relationship established?
By matching data in key fields between two database tables
How does the separation of duties help to ensure the quality of a product?
By providing independent verification that project tasks were completed correctly
How is IPv6 able to offer more Internet addresses than IPv4?
By using 128-bit IP addresses
Which language is considered the best language for creating large applications?
C++
Which of the following can be used to detect automated systems used by spammers for registering e-mail accounts?
CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans Apart)
Web pages that use ActiveX:
Can include animation, audio and video.
What is the term for the process, tools and techniques that help people implement changes to achieve a desired outcome?
Change Management
During which project management phase should product testing and performance evaluations occur?
Closing phrase
What is the term for an algorithm used by video and audio player plug-ins to compress and decompress files?
Codec
Which of the following is used to process data submitted by a user by passing data back and forth between a server and an application program?
Common Gateway Interface (CGI) Anytime you conduct a database search, the database may be using Open Database Connectivity (ODBC), as well as a Common Gateway Interface (CGI) application to connect the front end (e.g., the Web server) to the back end (e.g., the database). When you click a hyperlink to access a Web page, the Web server retrieves the requested page. However, when you submit an online form, the Web server typically forwards the form information to an application program that processes the data. Common Gateway Interface (CGI) is the method by which data is passed back and forth between the server and the application program. The Open Database Connectivity (ODBC) standard was designed to enable an operating system to access databases from various vendors. A database management system (DBMS) is a program used to store, access and manipulate database information. Structured Query Language (SQL) has become the standard interactive and programming language for accessing information from and updating information in a database, particularly large relational databases.
If your company network uses a proxy server, what must you do to be able to access the Internet?
Configure your browser to address the proxy server.
What is the open-source software development term for the practice of removing restrictions from the distribution and use of software?
Copyleft In open-source development, copyleft is the practice of removing restrictions from the distribution and use of software, and requiring all modified versions of the software to be free. The term copyleft is a play on the word copyright, which restricts the use of intellectual property. Dual licensing is the practice of distributing software under two different licensing agreements. Project fork is the point at which a developer copies source code as it exists, then begins independently developing the code further to produce a distinct piece of software.
Which of the following is used solely to resolve human-readable domain names into their computer-readable IP addresses?
Domain name servers
What is the term for a password-protected, encrypted data file that can be used to authenticate a program?
Digital certificate
Which of the following provides positive identification of the sending and receiving parties to ensure that programs downloaded from the Internet are original and safe?
Digital certificate
What is the term for a password-protected, encrypted data file that can be used to authenticate a program?
Digital certificate A digital certificate is a password-protected, encrypted data file that can be used to authenticate a program. Digital certificates provide positive identification of the sending and receiving parties to ensure that programs downloaded from the Internet are original and safe. A digital signature is an electronic stamp that identifies a message's source and its contents. An encryption key is a variable value, such as a numeric code, that uses an algorithm to encrypt and decrypt data. A hash is a number generated by an algorithm from a text string used to encrypt transmitted messages.
Which of the following provides positive identification of the sending and receiving parties to ensure that programs downloaded from the Internet are original and safe?
Digital certificate A digital certificate proves the identity of an individual or company over the Web. Software developers use certificates to digitally sign the programs they develop. Digital certificates provide positive identification of the sending and receiving parties to ensure that programs downloaded from the Internet are original and safe. The browser can check the information in a certificate to see whether the program is valid or whether it has been tampered with since the certificate was signed. Encryption is the process of converting data into an unreadable form of text; it does not prove the identity of an individual or company over the Web. Decryption is the process of converting encrypted data back to its original form. The use of user names and passwords is a form of authentication, which verifies the identity of a user who logs on to a system, or the integrity of transmitted data.
What is the term for an electronic stamp that identifies a message's source and contents?
Digital signature A digital signature is an electronic stamp that identifies a message's source and its contents. A digital signature can be used with any kind of content, encrypted or not. A digital certificate is a password-protected, encrypted data file that proves the identity of an individual or company over the Web. An encryption key is a variable value, such as a numeric code, that uses an algorithm to encrypt and decrypt data. A hash is a number generated by an algorithm from a text string used to encrypt transmitted messages.
Which of the following is used to enforce non-repudiation?
Digital signature A digital signature is an electronic stamp that identifies a message's source and its contents. Digital signatures enforce non-repudiation, which is the ability to prove that a transaction occurred. Sending data with a digital signature proves that the message was both sent and received. Neither party can repudiate the transaction. A digital certificate is a password-protected, encrypted data file that proves the identity of an individual or company over the Web.
In which type of Web search does the search engine display a list of categories and subcategories that you can browse?
Directory search
IPv4 addresses use a 32-bit address format that is divided into four sets of numbers. What is the term for this address?
Dotted quad
Why might a Web page appear differently in different browsers?
Each browser interprets HTML somewhat differently.
What is the term for a combination of characters that you read sideways that helps convey emotion in an e-mail message?
Emoticon
What is ciphertext?
Encrypted data is referred to as ciphertext; unencrypted data is referred to as plaintext.
What are add-ons?
Extensions and plug-ins used to extend the functionality of the Firefox Web browser A codec is an algorithm used by video and audio player plug-ins to compress and decompress files. A viewer is a scaled-down version of an application. Viewers are necessary to retrieve certain files when the program needed to open a file type is not installed on your computer. Media players are standards-based plug-ins that play streaming audio and video.
In which type of keyword search can you enter any search string in a search engine to query an index?
Full-text search
What is the term for the complete domain name of an Internet computer?
Fully qualified domain name
Which of the following is an open-source implementation of Pretty Good Privacy (PGP) that does not use patented algorithms?
GNU Privacy Guard (GPG), also known as GnuPG, is an open-source implementation of PGP that does not use patented algorithms. Multipurpose Internet Mail Extensions (MIME) is a protocol that allows users to exchange various types of data files over the Internet. A Mail User Agent (MUA) is an e-mail program that is independent of any specific Web browser that you can use to send e-mail messages. Mail Delivery Agent (MDA) is an e-mail server program that receives sent messages and delivers them to their proper destination mailbox.
In addition to ranking the relevance of a particular site according to the keywords entered by the user, which of the following search engines also determines a site's relevance based upon the number of links that point to it?
Which protocol do many browsers assume when you enter a URL in the Address field?
HTTP
Which of the following should you use to encrypt and decrypt digital signatures, and to protect passwords from disclosure?
Hash encryption
Every domain name is unique. Once registered, it cannot be used by an unauthorized organization or individual. What organization is responsible for managing domain names?
ICANN
Having appropriate access to hardware and software, and getting the security access required to perform tasks can be considered which of the following?
IT professionals have certain rights, and they also have responsibilities to the organization. IT rights include having appropriate access to hardware and software, and getting the security access required to perform tasks.
in what significant way do IT projects differ from other projects?
IT projects deal with a business's data and may involve several different systems.
Why is having local access to e-mail messages important for those who use IMAP servers?
If a network problem occurs, IMAP server users may not have access to their messages.
If your browser cache size is too small:
If your browser cache is too small, it may take longer for pages to download from the server. Increasing the size of your browser cache can improve performance while browsing, but if your cache is too large, it may slow performance because the browser must search though hundreds of cached files to locate a specific page. The smaller the size of the cache, the less time it takes to complete cache maintenance tasks. Emptying the cache before running a virus scan, disk defragmentation or other disk maintenance can speed those processes, but the size of the cache itself has no effect on the speed with which an application executes.
You are troubleshooting a common Internet client problem. You increase the size of the browser cache and change the frequency with which the browser compares cached pages to those on the Web. What are you are trying to do?
Improve the performance of a computer with a slow connection Common Internet client problems include the following: Slow connection -- To improve the performance of computers with slow connections, you can increase the size of the browser cache and change the frequency with which the browser compares cached pages to those on the Web. Poor rendering -- If the text on an older screen is unreadable, you can adjust the font setting to help compensate for lower-resolution monitors. No connection -- If your computer is unable to connect to any Web site and your company uses a proxy server, verify that the browser is correctly configured to use the proxy server.
In contrast to meetings that take place in person, a Webcast offers the advantage of:
In contrast to meetings that take place in person, a Webcast offers the advantage of:
How can scope creep undermine the success of a project?
Incremental changes in scope will affect the schedule, cost or performance required to complete the project.
Which organization is responsible for codifying copyright law as it applies to digital information?
Information Infrastructure Task Force (IITF)
Which of the following dial-up connection types has been largely superseded by direct Internet connections?
Integrated Services Digital Network (ISDN) An Integrated Services Digital Network (ISDN) line is a digital telephone line installed by a local phone company. The advent of direct Internet connections such as cable modems, LAN routers and Digital Subscriber Line (DSL) services has largely superseded ISDN.
What function does a list server perform?
It automates the collection and distribution of messages from an authorized group of participants.
Which of the following is true about client-side JavaScript?
It needs HTML to run. JavaScript is not a stand-alone, object-oriented programming language like Java. However, like Java, JavaScript can be used on the server side or on the client side. Server-side JavaScript supports many of the rich features and functions of any server-side scripting language. However, easier-to-learn scripting languages such as PHP are more popular, and JavaScript is typically used in client-side applications to add interactive features to Web pages. Server-side JavaScript does not need HTML to run, but client-side JavaScript must reside within or be called by HTML documents to run.
Which security risk must you be aware of when using active content such as Java applets and ActiveX objects?
Java applets and ActiveX allow information to be downloaded and run on your system.
Which of the following graphics file formats is widely used for complex graphics because it uses lossy compression and supports 16 million colors?
Joint Photographic Experts Group (JPEG) is a format widely used for photographs and complex graphics. This format uses lossy compression and supports 16 million colors. JPEG files can be relatively small. However, the developer must decide how much compression to use. The more compression, the smaller the file size, but the lower the image quality. The JPEG format does not work well with line drawings because not much data can be discarded during the lossy compression process, and the images lose sharpness and clarity. Graphics Interchange Format (GIF) was previously one of the most common graphics file formats on the Internet. It has a patent, so anyone creating software programs that produce GIF files must pay a royalty. GIF is a bitmap format that uses lossless compression. It supports various resolutions, but is limited to 256 colors and is used most effectively for drawings and illustrations, rather than for photographs. Tagged Image File Format (TIFF) is a popular customizable graphics format commonly used for medical imaging and desktop publishing. TIFF supports grayscale, 8-bit and 24-bit color, and monochrome formats. Encapsulated PostScript (EPS) is a file format that you can use to import and export graphics files between operating systems and applications.
What is the term for a numeric code that uses an algorithm to encrypt and decrypt data?
Key
You work with UNIX workstations and want to install a Web browser specific to your environment. Which browser should you install?
Konqueror
What can be considered a disadvantage of using a spyware-detection application to remove spyware from your computer?
Legitimate applications can be incorrectly identified as spyware.
What is the name for the standard computer interface that allows computers to create and play electronic music?
MIDI Musical Instrument Digital Interface (MIDI) is a standard computer interface for creating and playing electronic music. It allows computers to re-create music in digital format for playback. C# (pronounced "C sharp") is Microsoft's object-oriented programming language; it is Microsoft's answer to Java. ActiveX technology enables authors to place interactive objects on their Web sites based on a common standard, and allows the objects to work together. ActiveX is used to create ActiveX controls, which are self-contained programs that can be run anywhere on a network, including within a browser from the Internet. ActiveX controls are similar to Java applets.
What is the term for a software program that scans Web pages for information used to identify the Web page?
Meta search engine
Which of the following is a protocol that can be used by applications to automatically process files downloaded from the Internet?
Multipurpose Internet Mail Extensions (MIME) is a protocol that enables operating systems to map file name extensions to corresponding applications. It is also used by applications to automatically process files downloaded from the Internet. Pretty Good Privacy (PGP) is a method of encrypting and decrypting e-mail messages. GNU Privacy Guard (GPG) is an open-source version of PGP that does not use patented algorithms. Internet Protocol (IP) is a data transmission standard that enables a packet of data to be delivered to a specific computer.
When specifying keywords to conduct an Internet search, which of the following parts of speech will be the most useful?
Nouns
What is the term for the programming concept in which a program is handled as a collection of individual items that perform separate functions, rather than as a sequence of statements that performs a specific task?
Object-oriented programming
Which of the following enables an operating system to access databases from various vendors?
Open Database Connectivity (ODBC) A database management system (DBMS) is a program used to store, access and manipulate database information. A Common Gateway Interface (CGI) is a program that processes data submitted by a user by passing data back and forth between a server and an application program. Structured Query Language (SQL) has become the standard interactive and programming language for accessing information from and updating information in a database, particularly large relational databases.
What is the term for an SMTP server that allows the third-party relay of e-mail messages that spammers use to send spam?
Open relay Many spammers use automated tools to search the Internet for open relays, then use the open relays to send large amounts of spam. An open relay (also called a third-party relay or an insecure relay) is an SMTP server that allows third-party relay of e-mail messages. A blackhole list is a published list of IP addresses known to be sources of spam.
What is the term for a copyleft license that removes restrictions on the use and distribution of the licensed product?
Open-source license
what is the term for a copyleft license that removes restrictions on the use and distribution of the licensed product?
Open-source license
Companies increasingly want to allow employees to share files directly without having to maintain servers to provide FTP access. Which technology can companies use to maximize processing power while protecting privacy and sensitive materials?
P2P
Which file format retains formatting information through all platforms and downloads quickly from the Web?
PDF. Audio Interchange File Format (AIFF) is a high-quality audio format. Rich Text Format (RTF) is a portable text file format that allows image insertion and text formatting. Tagged Image File Format (TIFF) is a popular customizable graphics format commonly used for medical imaging and desktop publishing.
Which of the following is known as a "store-and-forward" e-mail service?
Post Office Protocol version 3 (POP3)
What is the term for the idea of a major change in a former way of thinking or organizing?
Paradigm shift
Which protocol allows a computer using an analog modem to make an initial connection to the Internet?
Point-to-Point Protocol (PPP)
Which of the following graphics file formats is written in a page description language that is unreadable, and can be printed only on a specific type of printer?
PostScript (PS) files are written in a page description language so they are unreadable, and are designed for printing on PostScript printers. Portable Network Graphics (PNG) has become an Internet standard for graphics. Tagged Image File Format (TIFF) is a popular customizable graphics format commonly used for medical imaging and desktop publishing. Encapsulated PostScript (EPS) is a file format that you can use to import and export graphics files between operating systems and applications.
When you sign in to your instant messaging (IM) service, your online status is advertised (or published) to the people on your contacts list. What does this scenario represent?
Presencing
What is project management?
Project management is the practice of applying knowledge, skills and processes to activities in order to meet deadlines and achieve desired results. A project is a sequence of tasks that must be accomplished within a certain time frame to achieve a desired result. Project scheduling is the practice of listing the planned dates for performing tasks and meeting goals defined in a project plan. The project triangle refers to the three factors -- time, money and scope -- that affect every project.
How do projects differ from ongoing work operations?
Projects are temporary and unique.
To what does "The Right to Be Forgotten" argument relate?
Protecting your image and personal information in the world of social networking
Which of the following has become the most common asymmetric encryption algorithm, and is included in Web browsers and many other products?
RSA algorithm Popular hash algorithms are MD5, MD6 and Secure Hash Algorithm (SHA).
Which of the following can you use to view headlines and updates from your favorite Web sites without the need to open your Web browser or visit any Web sites?
RSS and Atom
What is the term for pixel-based images that map bits to a display space?
Raster graphics Raster graphics are images that map bits directly to a display space (think of a grid of x and y coordinates on a display space). Raster graphics are pixel-based. Vector graphics are mathematical statements that describe a series of points to be connected to create an image. A codec is an algorithm used by video and audio player plug-ins to compress and decompress files.
Which of the following is a secure method of transferring files through Secure Shell (SSH) in which you can transfer several files in one session?
SSH File Transfer Protocol (S/FTP) Secure Copy (SCP) is a program used to securely transfer files between systems. SCP uses an SSH-secured connection, and it is quickly becoming a replacement for FTP. SCP adds file transfer capability to SSH, and each file transfer constitutes a discrete session. SSH File Transfer Protocol (S/FTP) is a secure version of FTP, performing file transfer operations over a connection secured by SSH. S/FTP is very similar to SCP but you can perform several file transfers in one session. SSL/TLS-enabled FTP (FTPS) is FTP that runs on an SSL/TLS-secured connection. FTPS differs from SCP and S/FTP in that it relies on SSL/TLS for encryption, whereas SCP and S/FTP rely on SSH for encryption.
What is the term for the goals and tasks of a project, and the work required to complete them?
Scope
Which of the following is the most effective way to spread viruses?
Sending e-mail attachments
Which of the following plug-ins was developed by Microsoft and is a software development tool used to write and run Internet applications?
Silverlight
At the end of the initiating phase, which of the following should a project manager prepare to define the ways that project success will be measured?
Statement Of Work (SOW)-At the end of the initiating phase, you and all stakeholders should prepare a Statement Of Work (SOW) to define the ways that project success will be measured. You should complete the SOW before you proceed to the next phase. The SOW outlines the requirements for each project task to ensure that the project objectives are met. The SOW should contain clearly defined goals and an agreed-upon plan to achieve them. A Gantt chart is a horizontal bar chart that graphically displays project tasks and durations. A needs analysis identifies the problems or needs that the project must resolve or address. A project schedule lists the planned dates for performing tasks and meeting goals identified in the project plan.
You want to find information about Great Danes. You visit a popular search engine and manually search through a directory tree of topics until you find a directory titled "Dogs" and a subdirectory titled "Breeds." You select the topic "Great Dane" and look through a list of indexed pages on that topic, then choose one page with which to begin your research. Which type of search index did you use?
Static index/site map
For which encryption method is it critical that the secrecy of the key be maintained by the sending and receiving parties in order for the encryption to be effective?
Symmetric encryption
Internet resources can be used for a variety of purposes beyond the World Wide Web and e-mail. Which of the following helps IT professionals troubleshoot and solve problems with Internet technologies?
TCP/IP diagnostic tools
In 1969, which U.S. Department of Defense agency funded what would become the first global computer network?
The Advanced Research Projects Agency (ARPA) The Internet was formed in 1969 when the U.S. Department of Defense's Advanced Research Projects Agency (ARPA) funded what would become the first global computer network, the Advanced Research Projects Agency Network (ARPANET). The ARPANET allowed university and government engineers to research and work from any location on the network.
Which organization is responsible for codifying copyright law as it applies to digital information?
The Information Infrastructure Task Force (IITF) was formed in 1993 to codify copyright law as it applies to digital information. The Internet Corporation for Assigned Names and Numbers (ICANN) registers domain names. The World Intellectual Property Organization (WIPO) is a specialized U.N. agency formed to protect intellectual property worldwide. The World Wide Web Consortium (W3C) is a vendor-neutral forum whose mission is to create Web standards and guidelines.
When you receive an e-mail transmission with an attachment, how does your browser know which application or plug-in to open to view or play the attachment?
The MIME definition for the application or plug-in that is located inside the HTTP header at the beginning of the transmission.
What methodology was originally developed to improve manufacturing processes in order to eliminate product defects?
The Six Sigma methodology was originally developed to improve manufacturing processes in order to eliminate product defects. The results of these processes are measured quantitatively to gauge how the processes are performing. Adherence to ISO 9000 standards and the separation of duties are additional quality assurance techniques you can use to ensure high-quality deliverables. However, neither technique is designed to improve manufacturing processes in order to eliminate product defects. The Project Management Body of Knowledge (PMBOK) identifies nine topic areas that define project management. Each topic area provides a set of principles and techniques to help you manage projects.
Which of the following protocols was developed by the Internet Engineering Task Force (IETF) and is considered the successor to the Secure Sockets Layer (SSL) protocol?
The Transport Layer Security (TLS) protocol was developed by the Internet Engineering Task Force (IETF) and is considered the successor to the Secure Sockets Layer (SSL) protocol. TLS is becoming more common. Hypertext Transfer Protocol (HTTP) is the protocol for transporting HTML documents across the Internet. Network News Transfer Protocol (NNTP) is the protocol used by news servers that enables the exchange of newsgroup (Usenet) articles. Simple Mail Transfer Protocol (SMTP) is the protocol used for sending e-mail messages.
What occurs when your browser cache becomes full?
The browser automatically deletes old cached files as you continue to browse the Web.
Which of the following results from extracting a compressed file from an archive file created by the compression utility?
The compressed file and a folder containing the extracted files
During which project management phase should you determine the aspects of the project that worked well and the changes that should be implemented in the future?
The final phase of a project is the closing phase. During the closing phase, your team should evaluate the project schedule, budget, scope, resources and assignments to determine the aspects of the project that worked well and the changes that should be implemented in the future. A project is deemed a success when it is completed within the budget and time frame specified, and the finished product meets quality standards. The planning phase involves identifying all the tasks required to achieve the project goals, the people who will perform those tasks, and the resources that will be required. During the executing and controlling phases of a project, project work is performed (executed), progress is monitored and corrective action is taken as needed (controlled).
During which project management phase should you conduct a needs analysis; determine project objectives, assumptions and constraints; and develop a Statement Of Work (SOW)?
The initiating phase
To what does the term "cloud" in "cloud computing" refer?
The network of servers and connections that make up the Internet
During which project management phase should you develop a project schedule and assemble the project team?
The planning phase addresses project details. It is during the planning phase that you should develop a project schedule and assemble the project team. During the initiating phase, you should conduct a needs analysis; determine project objectives, assumptions and constraints; and develop a Statement Of Work (SOW). Project work is performed (executed) during the executing phase. The closing phase is the final phase of a project in which details of the project are evaluated and recommendations made to improve project performance in the future.
What is project management?
The practice of applying knowledge, skills and processes to activities in order to meet deadlines and achieve desired results
What is program management?
The process of managing multiple interdependent projects to improve the performance of an organization
What is authentication?
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data
What is the term for the goals and tasks of a project, and the work required to complete them?
The project scope refers to the end product or ultimate goal of a project, along with the tasks required to achieve that goal. The project plan is a document that identifies all the tasks required to achieve the project goals. An assignment is made when a resource is given a specific task to perform. The project schedule is a document that lists the planned dates for performing tasks and meeting goals defined in a project plan.
Which of the following is affected by any changes you make to the three "project triangle" factors in an effort to optimize a project's schedule?
The quality of the project deliverable
Which video file format is the standard format for movies on the Internet?
The standard format for movies on the Internet are .mp4 (MPEG-4) files. The Moving Picture Experts Group (MPEG) is a standard for digital audio and video compression that provides extremely high quality and resolution. The standard video files for the Windows platform are .avi (Audio Video Interleave) files. The Macintosh native movie platform, and the standard format for QuickTime movies, is .mov files. The WebM format (.webm) is a royalty-free, open video and audio format designed for HTML5 video.
What must you know before you can create an effective project schedule?
The tasks necessary to achieve project objectives, the approximate length of time each task will take, the order in which tasks should be performed and the employees who will perform them
Why is the acceptance of HTML5 in the Web community a benefit to users of mobile devices?
The use of HTML5 can help conserve battery power.
What is the purpose of using Internet research tools such as Zotero?
They enable you to organize the information you find and store it on your local hard drive. Internet research tools such as Zotero enable you to organize the information you find and store it on your local hard drive. Zotero is a free, open-source Firefox add-on that you can use to collect, manage and cite reference material you find on the Internet. As you conduct research, Zotero can detect when you are viewing a book or article, and then save the full reference information to a local file. These tools do not flag questionable, non-authoritative or biased information, however.
Which of the following is usually true of popular social networking sites?
They generally provide privacy protection for users.
What can be considered a disadvantage to installing program patches and updates?
They may introduce incompatibility issues or new security issues.
For what purpose would you use a cable modem?
To connect to the Internet through your cable television system
For what purpose should you use automatic cookie handling in most browsers?
To control when and from whom cookies are accepted
as a project manager, why should you keep an issues log?
To document problems that need to be escalated to managers or executives outside the project team for resolution
What is the purpose of a needs analysis?
To identify the problems or requirements that the project must resolve or address
What is the primary goal of a plug-in?
To provide efficient integration of multimedia formats with the browser and computer
What is the main purpose of a file server?
To store shared data
Users can access and navigate an FTP server using an FTP client program. For which action does the FTP client program use the "put" command?
To upload a file
When using multiple Boolean operators to conduct an Internet search, how can you indicate the order in which the Boolean phrases should be considered?
Use parentheses to combine Boolean phrases. Quotation marks indicate that the keywords must appear in the order specified.
You are making efforts to prevent attackers from gaining access to network connections. Which strategy may cause problems when troubleshooting your computer's connectivity to the network?
Using your desktop firewall to block Internet Control Messaging Protocol (ICMP) You can use your desktop firewall to block various protocols, including Transmission Control Protocol (TCP), User Datagram Protocol (UDP), Internet Control Messaging Protocol (ICMP) and Internet Protocol (IP). If blocking TCP and UDP, you can select any port to allow or disallow. ICMP is an especially common protocol to block, because attackers often use it to flood network connections. However, using your desktop firewall to block ICMP may cause problems when troubleshooting your computer's connectivity to the network, because ICMP is most often used to test whether a system is able to communicate on a network.
Which of the following produces graphics image files that are small, download quickly, and are easily resized without affecting image quality?
Vector graphics
Which of the following scripting languages is vendor-specific to Microsoft and may not be supported by browsers other than Windows Internet Explorer?
Visual Basic Script (VBScript) is an object-based scripting language that Microsoft derived from its more powerful Visual Basic programming language. Microsoft VBScript is a vendor-specific scripting language and may not be supported by browsers other than Windows Internet Explorer. JavaScript is an event-driven scripting language that was the first scripting language developed exclusively for online content design. All browsers support JavaScript. JavaScript has its origins in a scripting language called LiveScript. JScript is the Microsoft version of JavaScript.
Which is the native audio format for Microsoft Windows?
Waveform (WAV)
Which audio file format is the native sound format for Windows?
Waveform (WAV) is the native sound format for Windows. Most browsers provide built-in support for WAV files. It is supported by HTML5 audio. Audio Interchange File Format (AIFF) was developed by Apple Computer and offers high-quality audio. MPEG-1 Audio Layer-3 (MP3) is a format for compressing audio files that uses the MPEG-1 standard. Ogg Vorbis is a free, open-source alternative to the MP3 format (which is proprietary and licensed).
Which choice lists the systems for which the Windows Media Player is available?
Windows and Macintosh systems
What occurs in Windows when you try to open a file with an unknown MIME type?
Windows prompts you to define a MIME type and associate it with an application.
Which organization was formed by the United Nations to protect intellectual property worldwide?
World Intellectual Property Organization (WIPO)
What is a trojan?
You answered: A program that appears to be harmless but actually produces harmful results
What is a hash?
You answered: A text string generated by an algorithm from a numerical sequence Correct Response: A number generated by an algorithm from a string of text
For which encryption method is it critical that the secrecy of the key be maintained by the sending and receiving parties in order for the encryption to be effective?
You answered: Asymmetric encryption Correct Response: Symmetric encryption
What is the term for a password-protected, encrypted data file that can be used to authenticate a program?
You answered: Digital certificate
Which of the following provides positive identification of the sending and receiving parties to ensure that programs downloaded from the Internet are original and safe?
You answered: Digital certificate
In addition to allowing keyword searches, which of the following search engines also allows conceptual searches?
You answered: Excite
What is the term for an internal network designed to provide access to selected external users?
You answered: Extranet An extranet is an internal network designed to provide access to selected external users, and is not available to the Internet public. An intranet is an internal, or in-house, Web site and network used only by employees within a company. The Internet is a worldwide network of interconnected networks.
What is the term for a numeric code that uses an algorithm to encrypt and decrypt data?
You answered: Hash Correct Response: Key
What is the main difference between intranets/extranets and the Internet?
You answered: Intranets and extranets exclude the general Internet public.
Which of the following has become the most common asymmetric encryption algorithm, and is included in Web browsers and many other products?
You answered: MD6 algorithm (Hash) Correct Response: RSA algorithm
What is the term for an element on a Web page that contains data and procedures for how that item will react when activated?
You answered: Object
What is the term for a field containing a value that uniquely identifies each record in a database table?
You answered: Primary key
What is currently the most common way to authenticate users on private and public computer networks?
You answered: Providing public and private encryption keys Correct Response: Requiring user names and passwords
Which browser element is a programming method that isolates a particular application or process, and helps the browser keep information from being exposed or misused?
You answered: Sandbox
Which of the following is a secure method of transferring files through Secure Shell (SSH) in which each file transfer is a discrete session?
You answered: Secure Copy (SCP)
Which of the following enables you to view previously accessed Web pages without having to request them from the server again?
You answered: The browser cache
Which of the following should you use when you need to locate failures along the path between your computer and a destination computer?
You answered: The tracert command
hich of the following enables users on different e-mail systems to exchange messages?
You answered: Transmission Control Protocol/Internet Protocol (TCP/IP) Correct Response: Gateways The people sending you messages need not be in the same domain, nor does it matter which e-mail programs they use. Your unique Internet address ensures that the message will be delivered to you. Gateways between e-mail systems allow users on different e-mail systems to exchange messages. A gateway is a computer that connects two networks that have different protocols. The computers to which you connect on the Internet use Transmission Control Protocol/Internet Protocol (TCP/IP) to deliver your e-mail message at your specific address. A Mail User Agent (MUA) is an e-mail program that is independent of any specific Web browser, and that you can use to send e-mail messages. An Internet Service Provider (ISP) is an organization that maintains a gateway to the Internet and rents access to customers on a per-use or subscription basis.
What is the standard Internet convention used to represent a hypertext link when the link is text?
You answered: Underlined text
You are making efforts to prevent attackers from gaining access to network connections. Which strategy may cause problems when troubleshooting your computer's connectivity to the network?
You answered: Using your desktop firewall to block Internet Control Messaging Protocol (ICMP)
In order to send an e-mail message, you must include:
You answered: an address in the To field and text in the Message field. Correct Response: an address in the To field.
Google Chrome has an anonymous browsing feature. This feature allows users to use the browser:
You answered: and leave no cached information.
An IT professional can evaluate a browsing session to identify:
You answered: the computer's configuration and upgrades. Correct Response: the processes, technology and potential risks.
Which of the following is a disadvantage of using Web-based e-mail?
Your user name and password reside on a third-party server.
Asking other users to divulge personal information during any Internet-based communication can be considered:
a breach of Internet ethics.
What is a local area network (LAN)?
a group of computers connected within a confined geographic area.
Receiving written permission from a copyright owner to use copyright-protected material for your own purposes can be considered:
a licensing agreement.
The ability to identify the tasks that constitute a project, understand the ways in which tasks are dependent upon one another, and know the ways that project dependencies will affect the project as a whole can be considered:
a planning skill.
The ability to identify the tasks that constitute a project, understand the ways in which tasks are dependent upon one another, and know the ways that project dependencies will affect the project as a whole can be considered:
a planning skill. To effectively manage a project, you must have strong planning, organizational, communication, problem-solving and leadership skills. Planning skills involve identifying the tasks that constitute the project, understanding the ways in which tasks are dependent upon one another, and knowing the ways that project dependencies will affect the project as a whole. Organizational skills involve helping project participants coordinate and prioritize their tasks to stay within the project scope. Communication skills involve keeping project participants informed in order to keep the project running smoothly. Problem-solving skills involve the ability to quickly identify problems (real or potential) and propose solutions.
You can use project management software to:
automatically calculate the length of time required to complete project tasks, as well as the availability of resources, as you establish relationships among the tasks. Project management software automatically calculates the length of time required to complete project tasks, as well as the availability of resources, as you establish relationships among the tasks. As you adjust the schedule, the software recalculates the finish dates and adjusts the project calendar. A project schedule lists the planned dates for performing tasks and meeting goals identified in the project plan. A Statement Of Work (SOW) outlines the requirements for each project task to ensure that the project objectives are met. A SWOT analysis enables you to determine how your company's (or project team's) strong and weak points can affect the outcome of a project.
How is a many-to-many relationship between two database tables established?
by creating two one-to-many relationships with a third table, called a junction table.
Unexpected Web pages and advertisements most commonly occur when you:
click a dead link
Hypertext Transfer Protocol (HTTP) is responsible for providing Web pages to users who request them. The required elements for HTTP to function are:
client, server and TCP/IP.
The best way to help project team members improve their performances or resolve similar issues in future projects is to:
document the lessons learned during the current project.
Pretty Good Privacy (PGP) and Gnu Privacy Guard (GPG) are both used to encrypt:
e-mail messages and their attachments.
You should create a relational database in order to:
eliminate data duplication. The design of a relational database is usually determined by four factors: the purpose of the database; the number of tables needed to store information without duplicating data; the fields needed in each table; and the fields common to more than one table. Creating a relational database can eliminate data duplication and save time. A relational database contains multiple tables of information that are related through common fields.
When you use command-line FTP on Windows systems:
files are downloaded into the directory from which you enter the FTP commands. On Windows systems, you can use the MS-DOS prompt to access a command-line FTP client to upload files. When you access the MS-DOS prompt, the DOS window opens in the Windows directory. To download files into a specific folder other than the Windows directory, create or navigate to the directory, then start the FTP session. Files are downloaded into the directory from which you enter the FTP commands.
A relative Uniform Resource Locator (URL) is a URL that:
gives an abbreviated path to a resource using the current page as a starting position.
When you are using remote control services and need to enter the IP address of the system you want to control, you should use the
ipconfig command. The Windows ipconfig utility (Internet protocol configuration) is used to display your system's IP configuration. You can use the ipconfig command when you are using remote control services and need to enter the IP address of the system you want to control. The ping utility (Packet Internet Groper) tests connectivity between source and destination systems. The Windows tracert utility can determine the path between a source and destination system. You can use the command-line FTP get command to copy a file from an FTP server to your computer.
Google originally created the Chrome browser because it felt that existing browsers were too complex; they wanted a cleaner, simpler interface. Google has embraced the greenfield approach to software and Web development. A greenfield is a project that:
lacks any constraints imposed by prior development.
One of a project manager's skills is teaching effectively, which can be considered primarily a type of:
leadership skill
ISO 9000 details the steps recommended to produce high-quality products and services using a quality-management system that:
maximizes time, money and resources.
A drawback of Webinars is that they:
may require multiple presentations if participants are located in different time zones.
Which of the following is considered an original Internet top-level domain?
net
Uploading files to an FTP site requires an FTP client program and:
permission, which is usually provided by the FTP server administrator.
Intranets are popular because they:
provide a standard method for accessing resources, regardless of the operating systems used.
Direct Internet connections:
provide continuous access to the Internet through permanent network connections.
You can improve the quality of a product by:
providing independent verification that project tasks were completed correctly and adhering to ISO 9000 standards.
In order to manage scope creep, you can use scheduled meetings to:
review and discuss proposed changes to the project scope.
The catalog that is queried when you conduct a Web search using a search engine is called a:
search index. Search engines consist of large databases that allow you to query indexes. A search index is an enormous catalog that a specific search engine site has compiled, consisting of millions of Web page references. When you conduct a Web search using a search engine, the search index is the catalog that is queried.
The formal project review consists of:
testing the product, evaluating performances and documenting lessons learned.
What does a URL that starts with https:// signify?
that you are visiting a secure Web site in which data transmissions are encrypted
The project triangle consists of:
the time, money and scope that affect every project.
Viruses that reside within the text of an HTML-formatted e-mail message are particularly virulent because:
the user need only receive the virus for it to cause damage.
Which file format is a popular, customizable graphics format commonly used for medical imaging and desktop publishing?
tiff
The connectivity that makes the Internet possible also makes systems vulnerable to:
unwanted activity.
Which of the following top-level domains would generally refer to an Internet Service Provider (ISP)?
.net
To which type of server are you usually transferred when you download software programs and documents from Web sites?
A File Transfer Protocol (FTP) server
What is the World Wide Web?
A set of software programs that enables users to access resources on the Internet via hypertext documents The World Wide Web (WWW), also called the Web for short, was created in 1989 at the European Particle Physics Laboratory in Geneva, Switzerland. The Web was designed to enable scientists studying high-energy physics to share information more efficiently by using hypertext documents. A hypertext document is created using Hypertext Markup Language (HTML), a system of code that enables the author to include hypertext links (also called hyperlinks or links) in documents. The World Wide Web is not a network; it is a set of software programs that enables users to access resources on the Internet via hypertext documents. The Internet is a worldwide network of interconnected networks. Protocols are the rules that enable clients and servers on the same network to communicate.
What is the Internet?
A worldwide network of interconnected networks
Which of the following elements required to connect to the Internet are generally acquired when you buy a computer?
Computer, operating system and TCP/IP Six elements are required to connect to the Internet: computer, operating system, TCP/IP, client software, Internet connection and Internet address. The first three items are generally acquired when you buy a computer.
What is the name of the problem-solving model in which a task ordinarily performed by one person is outsourced to a large group or community in order to obtain and analyze large amounts of data?
Crowdsourcing Crowdsourcing is the name of the problem-solving model in which a task ordinarily performed by one person is outsourced to a large group or community in order to obtain and analyze large amounts of data. Some cloud-computing applications use crowdsourcing to help you define and refine choices you make in a cloud-computing application to personalize its content.
When Web users enter the URL www.CIWcertified.com in their browser address bar, they can access the official CIW Web site at the IP address 72.44.192.233. Which technology enables users to do this, instead of having to remember and enter the IP address?
DNS0`
What are fractional T and E lines?
Digital phone lines consisting of one or more individual T or E carrier channels, rather than the entire T or E carrier line
Your company offers software applications for various topics. When a customer purchases a desired app from your online store, she is directed to a page where she can download the application directly. When the customer begins downloading the app, the standard protocol that is most likely transferring the application is:
FTP
Which of the following connection types provides the fastest direct connection speed?
Fiber-optic cable (faster than T1 or T3)
Which protocol is often used to publish Web pages to a Web server?
File Transfer Protocol (FTP)
Which of the following terms is used in ontology to refer to the basic item within a domain?
In ontology, the basic item within a domain is known as an individual/object. It is also called an instance or an element. For example, a kayak manufacturing company would consider a kayak to be an object. A class/set is a particular type of object. For example, a particular model of kayak would be an example of a particular class of individual object. An attribute is a unique characteristic pertaining to a class. A class can have multiple unique attributes. For example, a particular model of kayak will have various attributes, such as color, length, weight, displacement, and type of construction materials. A schema is a hierarchical description and vocabulary concerning a particular domain.
Which of the following wireless mode types uses a centralized access point known as a wireless access point (AP)?
Infrastructure Two types of wireless modes exist: ad-hoc and infrastructure. An infrastructure wireless mode is one in which systems connect via a centralized access point known as a wireless access point (AP). An ad-hoc wireless mode is one in which systems use only their NICs to connect with each other. Cable modems and LANs are not wireless network connections.
What is the name of the international community of network designers, operators, vendors and researchers concerned with the evolution of the Internet architecture and the smooth operation of the Internet?
Internet Engineering Task Force (IETF) The Internet Engineering Task Force (IETF) is an international community of network designers, operators, vendors and researchers concerned with the evolution of the Internet architecture and the smooth operation of the Internet. The IETF develops and promotes Internet standards for the TCP/IP and Internet protocol suites. It works closely with the World Wide Web Consortium (W3C) and other standards organizations. The World Wide Web Consortium (W3C) is a vendor-neutral forum whose mission is to create Web standards and guidelines. The Institute of Electrical and Electronics Engineers (IEEE) creates standards relating to various technologies, including those used on the Internet (such as Ethernet [802.3] and Wireless Ethernet [802.11]). The Telecommunications Industry Association (TIA) is responsible for creating various standards, including the TIA/EIA-568-B cabling standards and the TIA/EIA-598 fiber-optics standards.
Which of the following protocols enables you to browse and manage e-mail messages while they reside on the server?
Internet Message Access Protocol (IMAP)
Which protocol is the data transmission standard for the Internet, responsible for sending information from one computer to another using uniquely identifying addresses?
Internet Protocol (IP)
In the client/server environment, what is the main function of client software?What is the Internet?
It enables users to communicate with and request information from the server. In a client/server environment, client programs run on the computer nodes and interact with a server program running on the server. The client software is the interface that enables users to communicate with and request information from the server.
Which of the following data modeling steps involves encoding the concept into SQL programming?
Logical design Data modeling involves determining the requirements that a database must fulfill in order to function properly for an organization. The logical design step in data modeling involves encoding the concept into SQL programming. The conceptual design step in data modeling creates the model as a pure concept. The physical design step in data modeling determines exactly where data will be stored. The implementation step in data modeling applies the design to an actual database application, such as MySQL or Oracle.
Which protocol is used to host newsgroups and distribute mailing lists by providing text output that users can access at their convenience and by allowing multi-person input like a conference call?
Network News Transfer Protocol (NNTP)
Which server type provides text output that users can access at their convenience and also allows multi-person input?
News server
What is the term for individual computers and devices that are connected to a network?
Nodes
What is the term for the study of how a particular knowledge domain, or system, is organized?
Ontology Ontology is the study of how a particular knowledge domain, or system, is organized. An ontology is the product of an ontological study. An ontology describes how individual elements of a domain relate to each other. This relation is usually represented in hierarchical terms. An ontology also describes how individual elements process information within the domain. Data modeling involves determining the requirements that a database must fulfill in order to function properly for an organization. Technology adoption refers to the degree to which members of a population will adopt or accept a new product or innovation. The "diffusion of innovation" theory describes how, why and at what rate new ideas and technologies spread through cultures.
Which of the following protocols can connect an entire network to the Internet?
Point-to-Point Protocol over Ethernet (PPPoE) When you use a phone line and modem to connect to the Internet, you are using a dial-up connection. Most dial-up connections use Point-to-Point Protocol (PPP). Many direct Internet connections, such as LAN, cable modem and DSL connections, as well as connections made through 4G mobile hotspot devices, are established using Point-to-Point Protocol over Ethernet (PPPoE). PPPoE uses the PPP that is commonly used for dial-up networks and implements it over Ethernet. Ethernet is a LAN standard that allows computers in a network to communicate. Therefore, Point-to-Point Protocol over Ethernet (PPPoE) can connect an entire network to the Internet.
Which protocol is used to receive e-mail messages from an incoming mail server, and forces you to download e-mail messages before reading, deleting or otherwise managing them?
Post Office Protocol (POP)
Which of the following enabled private (i.e., commercial) business to be conducted over networks connected to NSFnet?
Private telecommunications companies In the late 1980s, the Department of Defense decommissioned the ARPANET, and all sites switched over to the National Science Foundation (NSF) network, called NSFnet. NSF did not permit users to conduct private (i.e., commercial) business over the NSFnet. As a result, private telecommunications companies developed their own high-speed data lines, called backbones, which used the same protocols as NSFnet and connected to it through gateways. These private networks did not restrict network use, so the Internet became usable for commercial purposes.
Which of the following will upper-level managers likely ask you to justify before making a hardware or software purchase, or creating a particular IT product or service?
ROI
The graphics you are probably most familiar with, GIFs and JPEGs, are raster graphics. What are raster graphics?
Raster graphics are pixel-based, and as much larger files than vector graphics. And raster graphics are images that map bits directly to a display space.
What is the term for public documents of interest to the Internet community that include detailed information about standardized Internet protocols?
Requests for Comments (RFCs) are public documents of interest to the Internet community that include detailed information about standardized Internet protocols. ISO 9000 details the steps recommended to produce high-quality products and services using a quality-management system that maximizes time, money and resources. Moore's Law postulates that the number of transistors per square inch on integrated circuits will double every two years. The World Wide Web Consortium (W3C) is a vendor-neutral forum whose mission is to create Web standards and guidelines, known as Recommendations.
What is the term for a server at the highest level of the Domain Name System (DNS)?
Root-level server
What is the term for a device that determines the best path for data to take across a network?
Router A network device called a router determines the best path for data to take across a network. A backbone is a high-speed data line to which networks typically connect. A gateway is a node on a network that serves as a portal to other networks.
The protocol required for text messaging is:
SMS
What is the term for an individual who is responsible for maintaining the software and procedures necessary to protect the confidentiality and integrity of electronic data?
Security manager Security managers are responsible for managing the security measures used to protect electronic data. They maintain the software and procedures necessary to protect the confidentiality and integrity of information, and legitimate access to it. Security analysts/consultants are responsible for examining an organization's security requirements and determining the hardware, communications and software capabilities needed to satisfy the requirements. Server administrators are responsible for designing, implementing, managing and maintaining network servers, and associated applications and peripheral devices. Database administrators are responsible for the maintenance and security of an organization's database resources and data.
You want to be able to quickly view news headlines without the need to open your Web browser and visit any news Web sites. How can you accomplish your goal?
Set up a Web feed
Which protocol is the Internet standard protocol for transmitting e-mail messages over networks, and is responsible solely for sending -- but not receiving -- e-mail messages?
Simple Mail Transfer Protocol (SMTP)
Direct connections provide continuous access to the Internet. Many bandwidth options are associated with direct connections. Which technology can transmit data over a network connection at speeds up to 1.544 Mbps?
T1
Which Internet resource is used to resolve IP addresses into easily recognizable text-based names?
The Domain Name System (DNS)
Stephen is creating video tutorials to sell his company's products. The target audience will consist of company employees using primarily new computers with the Windows operating systems and Internet Explorer 9. Stephen is debating whether to publish the videos using the MP4 or the OGG video format. Both formats are compatible with the HTML5 video element, which he is using in his tutorials. Which of the following would be a reason for Stephen to choose one format over the over?
The MP4 video format is natively supported by Internet Explorer 9 and does not require a plug-in.
What is a Web site's home page?
The first Web page that displays when you access a domain
A domain name consists of letters (and sometimes numbers) separated by periods. Which of the following is the host name component of a domain name?
The left-side component of the domain name, which categorizes domains into groups by server name
Which statement about compressing JPEG files is true?
The more compression, the smaller the file size, but the lower the image quality
In a URL, what does the Internet resource component identify?
The name of the server on which the page resides. In a URL, the Internet resource is the name of the server on which the page resides, such as "www" for a Web server. Web servers usually (but not always) have names beginning with "www." The domain name identifies the site owner's registered site name and organization type. The protocol component identifies the Internet protocol used to send information from the server to a user's computer, and thus indicates both the type of server and Internet service being used. The home page is the first page that displays when a user accesses a domain.
What is Internet Protocol (IP)?
The protocol by which data is sent from one computer to another on the Internet
In a URL, what does the domain name component identify?
The site owner's registered site name and organization type
In a URL, what does the protocol component identify?
The type of server and Internet service being used In a URL, the protocol component identifies the Internet protocol used to send information from the server to a user's computer, and thus indicates both the type of server and Internet service being used. HTTP is used to transfer Web pages and other information over the World Wide Web. FTP is used to transfer files to and from FTP sites. NNTP is used by news servers and news readers. The Internet resource is the name of the server on which the page resides. The domain name identifies the site owner's registered site name and organization type. The home page is the first page that displays when a user accesses a domain.
Which of the following is responsible for ensuring that data packets are transferred quickly and reliably across a network?
Transmission Control Protocol/Internet Protocol (TCP/IP)
What enables dissimilar systems connected to the Internet to communicate with one another?
Transmission Control Protocol/Internet Protocol (TCP/IP) Every computer connected to the Internet uses a protocol called Transmission Control Protocol/Internet Protocol (TCP/IP), which enables dissimilar systems connected to the Internet to communicate with one another. TCP enables two computers to establish a communication link and exchange packets of data; IP specifies the format and addressing scheme of the packets. The World Wide Web is a set of software programs that enables users to access resources on the Internet via hypertext documents. An Internet Service Provider (ISP) is an organization that maintains a gateway to the Internet and rents access to customers on a per-use or subscription basis. The Advanced Research Projects Agency Network (ARPANET) is a computer network that served as the basis for early networking research and was the backbone during the development of the Internet.
A LAN can be connected to the Internet by a router, provided that the LAN uses:
Transmission Control Protocol/Internet Protocol (TCP/IP). A LAN can be connected to the Internet by a router, provided that the LAN uses Transmission Control Protocol/Internet Protocol (TCP/IP). The LAN router is connected to another router at the ISP by a high-speed data link. If a LAN does not use TCP/IP, it can be connected to the Internet by gateways, which convert the protocol used by a LAN to and from TCP/IP.
What is the term for the business trend that seeks to simplify and integrate all forms of communication?
Unified communications (UC) Unified communications (UC) is a business trend that seeks to simplify and integrate all forms of communications. UC enables a user to send a message on one medium and receive it on another. Convergence is the integration of telephony and data technologies. Convergence is a technology that implements UC principles. Blogging is the practice of updating a blog. Voice over IP (VoIP) is a technology that converts voice into data packets for transmission over a packet-switched IP network.
What is the term for a software application that enables users to access and view Web pages on the Internet?
Web browser
What is the term for an HTML document containing one or more elements, such as text, images and hyperlinks, that can be linked to or from other HTML pages?
Web page A Web page is an HTML document containing one or more elements, such as text, images and hyperlinks, that can be linked to or from other HTML pages.
What is the term for a collection of related HTML documents located on a host computer on the Internet?
Web site
What is the term for a tool that assists users of an application in creating documents and/or databases based on styles and templates?
Wizard
What is the term for an application programming interface (API) that is used to transfer XML and other text data between a Web server and browser?
XMLHttpRequest An XMLHttpRequest is an application programming interface (API) that is used to transfer XML and other text data between a Web server and browser. Ajax allows you to create interactive Web applications using XMLHttpRequest, HTML, CSS, the Document Object Model (DOM) and JavaScript. A mashup is a Web page that integrates content and scripts from multiple Web sites to create new applications. Folksonomy is the practice of categorizing online content through tags. Semantic Web implementations are Web applications that have the ability to contextualize data as they process it; the data can be augmented with metadata to give it meaning.
Which of the following should you use to accept real-time assistance from a remote help desk technician?
You answered: Virtual Network Computing (VNC) Correct Response: Windows Remote Assistance You should use Windows Remote Assistance to accept real-time assistance from a remote help desk technician. This service involves allowing a trusted person at the remote location to connect to your computer and view your screen. Remote Assistance is used in conjunction with Windows Live Messenger (or e-mail), enabling the remote person to offer real-time assistance via instant messaging. Instant messaging (IM) is a computer-based method of communication in which users can type and view messages sent to one or more recipients, and view the responses immediately. Virtual Network Computing (VNC) is a program that allows you to control a computer at a remote location. Voice over IP (VoIP) is a technology that converts voice into data packets for transmission over a packet-switched IP network.
A wireless access point (AP) is:
a device that enables wireless systems to communicate with each other, provided that they are on the same network. A wireless access point (AP) is a device that enables wireless systems to communicate with each other, provided that they are on the same network. Wireless access points are used in the type of wireless mode known as infrastructure mode. In the ad-hoc wireless mode, systems use only their network interface cards (NICs) to connect with each other. A network interface card (NIC) is a circuit board within a computer's central processing unit that serves as the interface enabling the computer to connect to a network.
In ontology, an attribute refers to:
a unique characteristic pertaining to a class. In ontology, an attribute refers to a unique characteristic pertaining to a class. A class, which is a particular type of object (e.g., a particular model of kayak), can have multiple unique attributes. For example, a particular model of kayak will have various attributes such as color, length, weight, displacement, and type of construction materials. A domain is an ontology term that represents an entire company or a division within a company. A schema is a hierarchical description and vocabulary concerning a particular domain.
When you enter a URL such as "www.CIWcertified.com" in your browser, what is implied because you are visiting the top level of the site?
he Web site's home page When you enter a URL such as "www.CIWcertified.com" in your browser, your browser divides the URL into three parts: the protocol (http), the server and domain name (www.CIWcertified.com), and the name of the file you want to view. In this case, the Web site's default or home page (index.php) is implied because you are visiting the top level of the site.
A deep Uniform Resource Locator (URL) is a URL that:
includes a path that penetrates the folder structure of a Web site.
An absolute Uniform Resource Locator (URL) is a URL that:
includes the full path from the system root to a specific page or resource.
Internet domain names sometimes use a country-level domain, or country code, to identify the geographical region in which the Internet organization or address is based. Which address demonstrates the proper syntax for a country-level domain?
londontimes.co.uk
What is the term in ontology that refers to the hierarchical description and vocabulary concerning a particular domain?
schema
Moore's Law postulates that:
the number of transistors per square inch on integrated circuits will double every two years.
Consider the following address: http://www.CIWcertified.com/courses/iba.htm Which part of this address represents the server name on which this page resides?
www