Study Material

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which statement best describes asymmetric-key encryption? A An encryption method in which both a private key and a public key are used to encrypt and decrypt a message B An encryption method in which a key is required to encrypt data for storage and verify its integrity C An encryption method in which the same key is used to encrypt and decrypt a message D An encryption method in which numbers generated by an algorithm from a text string are used to verify the integrity of transmitted messages

A An encryption method in which both a private key and a public key are used to encrypt and decrypt a message Asymmetric encryption (also called asymmetric-key encryption or public-key encryption) refers to an encryption method in which two keys are used to encrypt and decrypt a message: a private key and a public key. The public key is known to all sending and receiving parties involved in the communication, whether via Web browsers, email or instant messaging. The private key is used by the recipient to decrypt the message. Symmetric-key encryption uses the same key to encrypt and decrypt a message. In hash encryption, numbers generated by an algorithm from a text string are used to verify the integrity of transmitted messages.

You visit the Website of a company from which you make online purchases and consent to receive emails regarding special promotions and other types of updates. What type of service does this scenario describe? A An opt-in email marketing service B A listserve subscription service C A Virtual Network Computing (VNC) service D An opt-in mass texting service

A An opt-in email marketing service

Why do the executing and controlling phases of a project usually overlap? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Because project work takes place during the executing phase: A project manager monitors the status of the project and takes corrective action as work is being performed. B Because the executing phase defines the project scope and the project goals, and the controlling phase defines the tasks required to accomplish those goals. C Because project work takes place during the executing phase: A project manager evaluates the project schedule, budget, scope, resources and assignments to determine the aspects of the project that worked well as work is being performed. D Because the executing phase identifies all the tasks required to achieve project goals, and the controlling phase estimates the time each task will take to complete and determines tasks that are dependent upon one another.

A Because project work takes place during the executing phase: A project manager monitors the status of the project and takes corrective action as work is being performed. During the executing and controlling phases of a project, project work is performed (executed), and progress is monitored and corrective action is taken as needed (controlled). The executing phase continues as work progresses. Meanwhile, you begin the controlling phase. This phase includes coordinating project activities, detecting disruptions, taking corrective measures, troubleshooting problems, updating team members about project status and driving the project forward. Thus, during these concurrent phases, you ensure through regular monitoring that all objectives are being met.

Which of the following can protect your company's data, prevent data from being intercepted by malicious outsiders, and deter hackers? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Encryption B License C Trademark D Copyright

A Encryption It is imperative that companies protect their encryption keys to ensure secure transmissions. Many businesses encrypt network transmissions in order to protect data, prevent data from being intercepted by malicious outsiders, deter hackers, respond to customer or competitor pressure for increased security, and comply with government requirements regulating the security of Internet data transmissions. Even if data transmissions do not warrant encryption, network administrators may still need to protect the privacy of email messages, which often contain information of a proprietary or confidential nature.

Which audio file format is considered lossless? A FLAC B PDF C MP3 D AU

A FLAC Free Lossless Audio Codex (FLAC) is an open-source, lossless audio format that can compress a source file up to 60% without losing a single bit of data. It is supported by HTML5 audio.

Which statement accurately describes the difference between a traditional modem and an ISDN line? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A ISDN uses a digital line, whereas a traditional modem must translate digital signals to analog and back. B A modem connects a user to an all-digital network, whereas ISDN adapts a computer to a phone line or cable TV network. C A modem provides a dial-up Internet connection, whereas an ISDN line provides a direct Internet connection. D ISDN translates digital signals to analog and back, whereas a modem uses a digital line.

A ISDN uses a digital line, whereas a traditional modem must translate digital signals to analog and back. A modem is a device that enables computers to transmit data over standard analog telephone lines by converting digital data from a computer into an analog signal for transmission over the telephone line to another modem. The receiving modem converts the analog signal back into digital code and transmits it to the receiving computer. To gain faster dial-up connections, individuals would also go through a local phone company to install an Integrated Services Digital Network (ISDN) line, which is a digital telephone line.

started receiving spam during his IM sessions. Which statement would explain why Johann could receive spam during an IM session? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Instant messaging bypasses anti-virus software and firewalls. B Instant messaging bypasses users' presencing settings. C Instant messaging runs on mobile devices, which are less secure than standard PCs. D Instant messaging runs on standard PCs, which are less secure than mobile devices.

A Instant messaging bypasses anti-virus software and firewalls. Instant messaging has given rise to spim, which is spam delivered through IM rather than through email. Because instant messaging is immediate, users are more likely to click links, making IM an effective channel for spammers. Because instant messaging bypasses anti-virus software and firewalls, it is also an easy way to spread viruses. You can protect yourself against spim by blocking messages from anyone not on your contact list.

What does anti-virus software do? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A It detects viruses by recognizing patterns called signature profiles, then immediately disinfects your hard drive. B It prevents you from opening a program or file sent to you via email or instant messaging. C It monitors your operating system, and advises if system updates are needed. D It fortifies computer systems over time by repeated exposure to weak but similar viruses, building immunity to newer viruses so the system can resist damage.

A It detects viruses by recognizing patterns called signature profiles, then immediately disinfects your hard drive. Anti-virus software that is kept current knows the signature of the virus, and works by scanning the infected file or program for the identifying signatures. If the virus is found, your hard drive can often be disinfected immediately so that the virus cannot infect other files or cause more damage. In general, viruses can be detected when they modify parts of your system in order to pass themselves along.

You download a file with the unusual file name extension of ".wow." When you attempt to open this file, Windows displays a message indicating that it does not know how to open this particular file type. Which of the following determines a document type and the application required to open it? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A MIME B TCP/IP C HTTP D FTP

A MIME MIME types are used to identify a document type and the application required to open it.

Which protocol is used to receive email messages from an incoming mail server, and forces you to download email messages before reading, deleting or otherwise managing them? A Post Office Protocol (POP) B Network News Transfer Protocol (NNTP) C Internet Message Access Protocol (IMAP) D Simple Mail Transfer Protocol (SMTP)

A Post Office Protocol (POP) You receive mail from an incoming mail server using Post Office Protocol (POP) or Internet Message Access Protocol (IMAP). POP stores incoming email until users authenticate and download it. POP is the more accepted and widely used protocol for receiving and managing email. POP servers store and forward email messages to the host. For example, if you were to send an email message, the message would be stored in the appropriate mail server until the recipient downloaded it from the server. The POP server responds to a request, asks for a password, then forwards the messages immediately. IMAP handles messages in a more sophisticated manner than POP because it allows you to browse and manage email messages while they reside on the server. A POP server forces you to download email messages before reading, deleting or otherwise managing them. You send email to others with an outgoing server using Simple Mail Transfer Protocol (SMTP), which is responsible solely for sending—not receiving—email messages. A news server uses the Network News Transfer Protocol (NNTP) to host newsgroups.

Which term is used to describe a computer that is responsible for storing and providing information requested by a client application? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Server B Database C Client D Network

A Server A server is responsible for storing and providing information. Many networks are structured using the client/server model, in which individual computers and devices, called nodes, interact with one another through a central server to which they are all connected. The client/server model divides processing and storage tasks between the client and the server. The server is more powerful than the individual computers, or clients, connected to it. In a client/server environment, client programs run on the computer nodes and interact with a server program running on the server. The client software is the interface that enables users to communicate with and request information from the server.

Which IT job role best describes an individual who provides organizational leadership for Website content and all related initiatives? A Website manager B Web application developer C Web architect D Website analyst

A Website manager A Website manager in a large organization generally manages the Web development team. A Website manager in a small company could perform all Web development job roles, including designing, developing and analyzing Websites. In short, Website managers provide organizational leadership for Website content and all related initiatives.

In project management, a task is: This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A a unit of work that must be accomplished. B the appointment of a person, department or device to a unit of work. C a person, department or device needed to accomplish a unit of work. D a sequence of work units that must be accomplished within a defined time frame.

A a unit of work that must be accomplished.

Which statement is true regarding international copyrights of digital information? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A An international copyright does not exist but your material is protected as long as you use the copyright symbol ( © ). B An international copyright does not exist. C An international copyright is designed to protect digital information in all countries worldwide. D An international copyright is designed to protect digital information in countries that belong to the World Intellectual Property Organization (WIPO).

B An international copyright does not exist. Contrary to popular belief, an international copyright does not exist. To protect your copyrighted original material, you must contact the government agency that handles copyrights in the country in which you reside. If you or your company holds a copyright on your Website material, you should place the copyright symbol ( © ) and year at the bottom of each page that contains the copyrighted material. Copyright symbols are not required but are highly recommended because they are often the first line of defense against copyright infringement.

What is a node? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A A system or application on a network that requests a service from another computer B Any entity or addressable device on a network that can be managed C A network computer that manages network resources and provides data D An organized repository of data that can be queried and searched by users

B Any entity or addressable device on a network that can be managed A node is any entity on a network that can be managed, such as a system, repeater, router, gateway or firewall. It is a computer or other addressable device attached to a network, and also known as a host. Many networks are structured using the client/server model, in which individual computers and devices, called nodes, interact with one another through a central server to which they are all connected. The client/server model divides processing and storage tasks between the client and the server. A client is a system or application on a network that requests a service from another computer (the server), and is used to access files or documents (such as a Web browser or user agent). A server is a computer in a network that manages the network resources and provides, or serves, information to clients. A database is an organized repository of data that can be queried and searched by users.

Which IT job role best describes an individual who is responsible for managing the maintenance and security of an organization's data? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Website manager B Database administrator C Server administrator D Network engineer

B Database administrator Database administrators are responsible for the maintenance and security of an organization's database resources and data. Database administrators develop and implement database maintenance plans to check the integrity of the data, manage the physical resources necessary to store and manipulate the data, administer and enforce data usage standards, and audit database systems to maintain system performance

You access a search engine and enter the words "African" and "safari" in the search box. The search engine returns a list of Websites that include these words. Which type of search index did you use? A Static index/site map B Keyword index C Full-text index D Structured directory index

B Keyword index A keyword index enables users to enter keywords in a search engine to query an index. The entered keywords are then compared to the keywords in the index. If the keywords match, the search engine will provide the indexed information. Keywords can consist of one word, several words or a phrase enclosed in quotation marks (e.g., search string).

Why should you make judicious use of file attachments in email messages? A Users will not be able to delete email messages as long as files are attached to them. B Large file attachments can take a long time to download. C File attachments cause email threads to become longer than they already are. D Attaching files to email messages is not considered professional and should be avoided in the workplace.

B Large file attachments can take a long time to download.

What is the main benefit of using Rich Text Format (RTF)? A RTF provides an efficient compression algorithm to reduce file size. B RTF is compatible with many operating systems and applications, including most Macintosh and Windows word processors. C RTF has become an Internet standard for graphics. D RTF is a file format that you can use to import and export graphics files between operating systems and applications.

B RTF is compatible with many operating systems and applications, including most Macintosh and Windows word processors. Rich Text Format (RTF) was developed by Microsoft. Using RTF, you can insert images and format text. RTF is compatible with many operating systems and applications, including most Macintosh and Windows word processors. It is an almost universal format.

What distinguishes S/MIME from MIME? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A S/MIME is designed specifically for servers, whereas MIME is designed specifically for individual clients. B S/MIME supports encryption and the use of digital certificates, whereas MIME controls the way that messages and attachments are organized and distinguished from one another. C S/MIME controls the way that messages and attachments are organized and distinguished from one another, whereas MIME supports encryption and the use of digital certificates. D S/MIME controls the way attachments are organized and distinguished from one another, and it supports encryption; whereas MIME controls the way messages are organized and distinguished from one another, and it supports the use of digital certificates.

B S/MIME supports encryption and the use of digital certificates, whereas MIME controls the way that messages and attachments are organized and distinguished from one another. Multipurpose Internet Mail Extensions (MIME) controls the way that messages and attachments are organized and distinguished from one another, whereas Secure MIME (S/MIME) controls the way that encryption information and digital certificates can be included as part of an email message. S/MIME is a version of the MIME protocol that provides a secure method of sending email. S/MIME supports encryption and the use of digital certificates in email

What type of Web implementations have the ability to contextualize data so that computers can perform tasks associated with finding, sharing and combining information on the Web without human intervention? A Mashup applications B Semantic Web implementations C Ajax-driven Web applications D Web feed management providers

B Semantic Web implementations People use the Web to perform all kinds of tasks, from searching for information to purchasing items. However, a computer cannot perform the same tasks without human direction because Web pages are designed to be understood by people, not computers. Semantic Web implementations are Web applications that have the ability to contextualize data as they process it; the data can be augmented with metadata to give it meaning. The metadata supplements the content designed for people with machine-readable information. Once applications have the ability to apply context to data, computers can perform tasks associated with finding, sharing and combining information on the Web without human intervention.

Which protocol is the Internet standard protocol for transmitting email messages over networks, and is responsible only for sending—but not receiving—email messages? A Internet Message Access Protocol (IMAP) B Simple Mail Transfer Protocol (SMTP) C Post Office Protocol (POP) D Network News Transfer Protocol (NNTP)

B Simple Mail Transfer Protocol (SMTP) You send email to others with an outgoing server using Simple Mail Transfer Protocol (SMTP). SMTP is the Internet standard protocol for transferring email messages from one computer to another. It specifies how two email systems interact. SMTP is responsible solely for sending email messages. You receive mail from an incoming mail server using Post Office Protocol (POP) or Internet Message Access Protocol (IMAP). POP and IMAP are used to store and access email messages. A news server uses Network News Transfer Protocol (NNTP) to host newsgroups.

In computer science and Web technology, what is ontology? A The process of determining the requirements that a database must fulfill in order to function properly for an organization B The study of how a particular part of a company, called a domain, is organized C The return-on-investment (ROI) impact of IT decisions on an organization's bottom line D The tendency for organizational and market changes to occur in a revolutionary manner

B The study of how a particular part of a company, called a domain, is organized

Which of the following is not considered a tangible medium of original expression? A Song B Thought C Movie D Novel

B Thought

Which is the most common method used to authenticate users on private and public computer networks? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Digital signatures B User names and passwords C Biometric scanners D CAPTCHAs

B User names and passwords

What is an end-user license agreement (EULA)? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A A legal contract between the author of software and the end user that eliminates restrictions on the use and distribution of the product B A set of exclusive rights granted to an inventor for a fixed period of time upon disclosure of the invention C A legal contract between the author of software and the end user that defines how the software can be used D A legal contract between the author of software and the end user that makes the source code available to the user

C A legal contract between the author of software and the end user that defines how the software can be used Proprietary software is owned by an author or entity. The use of proprietary software is governed and protected by end-user license agreements (EULAs). A EULA is a legal contract between the software's author and the end user who uses the software. A EULA describes how the application can and cannot be used by the end user, and details any restrictions imposed by the author.

What is an Internet Service Provider (ISP) A The company that provides telephone lines to your home or office B A computer system with an Internet connection and the correct software for Internet communication C An organization that maintains a gateway to the Internet and rents access to it D A dial-up or high-speed direct connection to the Internet

C An organization that maintains a gateway to the Internet and rents access to it An Internet Service Provider (ISP) is an organization that maintains a gateway to the Internet and rents access to customers on a per-use or subscription basis. An ISP provides access to the Internet, such as cable providers (Time Warner, Comcast, Cox, etc.), major phone carriers (AT&T, Verizon, Sprint, etc.), America Online (AOL) and many others. Many ISPs offer other online services in addition to Internet access and email.

Which IT job role best describes an individual who is responsible for diagnosing and resolving users' technical hardware and software problems? A Security manager B Network engineer C Help desk technician D PC repair technician

C Help desk technician Help desk technicians diagnose and resolve users' technical hardware and software problems. Help desk technicians typically receive questions from users who are having problems using computer hardware or software, or who want to know how to use a specific software application. Technicians must use their knowledge of hardware, operating systems, applications and any relevant procedures to determine the sources of problems and provide solutions.

As a new IT professional, you need to understand the needs of the business, as well as the various technologies required to design and deliver specific products. What is the term that describes this perspective in relation to IT? A Cloud-based B Architectural C Holistic D Ontological

C Holistic Competent professionals working in any job role understand how their work affects others. Therefore, an IT professional must have a working knowledge of various IT concepts and practices relevant to the company. A holistic perspective—the ability to place a particular technology or practice in context with the entire company—is vital. A holistic perspective in relation to IT involves understanding the needs of the business, as well as the various technologies required to design and deliver specific products. These products may be software designed by the company, services provided by the company or marketing pieces such as HTML-based email and Websites.

What is the term for the part of a browser responsible for reading and processing programming languages? A Sandbox B Rendering engine C Interpreter D Window

C Interpreter

A domain name server performs which function? A It resolves domain names to machine names. B It resolves machine addresses to domain names. C It resolves domain names to IP addresses. D It resolves IP addresses to Web URLs.

C It resolves domain names to IP addresses.

Which type of URL is an abbreviated path to a resource using the current page as a starting position? A Deep URL B Absolute URL C Relative URL D Root URL

C Relative URL A relative URL gives a path to a resource using the current page as an origin. In a relative URL, the system root is implied but not specified. A relative URL is also known as an abbreviated URL, and it is always referenced from within the page currently loaded into the Web browser. The URL /certifications/index.php (without the preceding domain portion) is an example of a relative URL. The system root is implied by the slash ( / ) that begins the URL.

Which TCP/IP troubleshooting command should you use to determine whether a client and server are communicating with each other? A The ifconfig command B The ipconfig command C The ping command D The tracert command

C The ping command You can use the ping command to ensure connectivity between two systems. The ping utility (Packet Internet Groper) tests connectivity between source and destination systems. To use this utility, type "ping ip_address" (where "ip_address" is the IP address of the destination computer) at the command prompt and then press ENTER. If you receive a reply, then a connection exists between your computer and the computer at the IP address you specified.

Sensitive data (such as credit card information) should be secured using authentication and encryption when transmitting it over the Internet. Which protocol is the successor to SSL in accomplishing this? A File Transfer Protocol (FTP) B Hypertext Transfer Protocol (HTTP) C Transport Layer Security (TLS) D Secure Sockets Layer 3.0 (SSL 3.0)

C Transport Layer Security (TLS) Transport Layer Security (TLS) is the successor to SSL. The Internet Engineering Task Force (IETF), which defines standard Internet operating protocols, developed TLS. Because TLS was developed by the IETF, you can read Requests for Comments (RFCs) about it.

One way that a project manager can ensure the delivery of a quality product is to adhere to ISO 9000 standards. ISO 9000: This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A outlines the rights of IT professionals and their responsibilities to the organizations for which they work. B identifies nine topic areas, each of which provides a set of principles and techniques to help project managers manage projects. C details recommended steps for producing products and services using a quality-management system that maximizes time, money and resources. D details the segregation of duties that project team members should employ to independently verify that project tasks were completed correctly.

C details recommended steps for producing products and services using a quality-management system that maximizes time, money and resources.

To support an Internet client, you must have six elements. The first three—a computer, an operating system and TCP/IP—are generally acquired when you buy a computer. Which choice lists the other three elements you need to support an Internet client? A Network access, administrator permission and server software B Server system, Internet connection and network access C Internet connection, client software and server software D Client software, Internet connection and Internet address

D Client software, Internet connection and Internet address Six elements are required to connect to the Internet: computer, operating system, TCP/IP, client software, Internet connection and Internet address. The first three items are generally acquired when you buy a computer. When you arrange to connect your computer to the Internet, you must install client software, implement a connection method, and identify the addresses of servers you can use.

Ken needs a catchy name for his new online business. He decides to launch a public contest through his social networking accounts to seek lots of creative ideas for his business name. Which term describes the use of the Internet in this manner? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Tagging B Social engineering C Folksonomy D Crowdsourcing

D Crowdsourcing

The Flash Player allows browsers to play Flash movies, which are animations created using vector graphics. What are vector graphics? A Mathematical shapes saved as a sequence of vector statements, which map bits directly to a display space B Pixel-based images that describe a series of points to be connected C Images that map bits directly to a display space D Mathematical shapes saved as a sequence of vector statements, which describe a series of points to be connected

D Mathematical shapes saved as a sequence of vector statements, which describe a series of points to be connected Adobe Flash authoring software allows you to create animation using vector graphics, which are essentially mathematical shapes. A vector graphic is saved as a sequence of vector statements, which describe a series of points to be connected. Other graphics types such as GIFs and JPEGs are raster graphics, which are images that map bits directly to a display space (i.e., a grid of x and y coordinates on a display space). Raster graphics are pixel-based, and as such are much larger files than vector graphics.

Which of the following is an effective way for Website owners to prevent typosquatting? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Encrypt all network transmissions with algorithms that use a minimum of 128-bit keys B Automatically apply operating system updates and patches as they become available C Host their Websites on illicit servers D Purchase domain names that are similar to their actual domain names

D Purchase domain names that are similar to their actual domain names Answer D is correct.Typosquatting refers to an unethical practice in which the perpetrator (i.e., typosquatter) capitalizes on typing mistakes that users make when entering the URL of a Website into a browser. When a Web user accidentally enters an incorrect Website address, he or she may end up viewing an alternative Website owned by a typosquatter. Essentially, typosquatters are attempting to profit from a trademark belonging to another business by taking advantage of users' typographical errors. Website owners can try to avoid falling victim to a typosquatter by purchasing domain names that are similar to their actual domain name. For example, the URLs www.gooogle.com, www.goolge.com, www.gogle.com, or www.google.net will all direct you to the Google home page at www.google.com.

Question 28 :What is the term for a database that contains multiple tables related through common fields? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Non-relational database B Common database C Joined database D Relational database

D Relational database A relational database contains multiple tables of information that are related through common fields. By contrast, a non-relational database consists of multiple tables of information that are not related through common fields. When multiple tables have a field in common, they can be joined to form a relationship to access the table data as needed.

In which job role does an individual determine the visibility of Websites across multiple clients and search engines? A Server administrator B Website analyst C Network engineer D SEO analyst

D SEO analyst

For which type of email server is it especially important that you archive messages to your local hard drive? A SMTP server B IMAP server C MIME server D POP3 server

Having local access to email messages may be especially important for those who use IMAP servers. If a network problem occurs, IMAP server users may not have access to messages for a while unless messages are archived locally. IMAP servers do not download messages to your computer automatically. The messages are stored, read and managed on the server unless you choose to download them. People who use IMAP servers should download their messages so that they have backup copies of important information stored on their computers.

When you receive a file attachment from someone unexpectedly, what effective security strategy should you take? a. Before opening the attachment, call or send a text or instant message to the individual to verify that he or she meant to send it. b. Before opening the attachment, use anti‐virus software to scan the system's hard disk. c. Make back‐up copies of important files so that it is possible to recover them in case of an incident. d. Open the file attachment and use anti‐virus software to scan it.

a. Before opening the attachment, call or send a text or instant message to the individual to verify that he or she meant to send it..

To support an Internet client, you must have six elements. The first three - a computer, an operating system and TCP/IP - are generally acquired when you buy a computer. Which choice lists the other three elements you need to support an Internet client? a. Client software, Internet connection and Internet address b. Internet connection, client software and server software c. A browser, node and patch cable d. Service provider, browser, patch cable

a. Client software, Internet connection and Internet address

The project triangle is made up of cost, time and scope. If you add new requirements to the project halfway through, what will happen? a. Cost of the project will increase. b. Time to complete the project will be reduced. c. Project scope will decrease. d. Cost of the project will decrease

a. Cost of the project will increase.

What technology allows a user to enter a URL into a web browser instead of the assigned IP address? a. DNS (Domain Name System is a protocol within the set of standards for how computers exchange data on the Internet and on many private networks, known as the TCP/IP protocol suite. Its basic job is to turn a user‐friendly domain name like "howstuffworks.com" into an Internet Protocol (IP) address like 70.42.251.42 that computers use to identify each other on the network.) b. HTTP (Short for HyperText Transfer Protocol, HTTP is the underlying protocol used by the World Wide Web. HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands.) c. NNTP (The Network News Transfer Protocol (NNTP) is an application protocol used for transporting Usenet news articles (netnews) between news servers and for reading and posting articles by end user client applications.) d. SSL (Secure Sockets Layer is a protocol for transmitting private documents via the Internet.)

a. DNS (Domain Name System is a protocol within the set of standards for how computers exchange data on the Internet and on many private networks, known as the TCP/IP protocol suite. Its basic job is to turn a user‐friendly domain name like "howstuffworks.com" into an Internet Protocol (IP) address like 70.42.251.42 that computers use to identify each other on the network.)

Why would an e‐mail message with an attachment .exe be filtered out into the spam folder? a. File attachments with .exe are executable files and can not always be trusted because they can contain malicious code. b. The file size exceeds the size limits of the e‐mail filter policy. (If this was the case the mail would not have been sent. c. The file name of the file exceeds the file name length of the filter policy. d. Messages from remote offices are blocked on internal e‐mail.

a. File attachments with .exe are executable files and can not always be trusted because they can contain malicious code.

Which organization is responsible for managing domain names so that each one is unique and (once registered) cannot be used by an unauthorized individual or organization. a. ICANN ‐‐ Internet Corporation for Assigned Names and Numbers b. W3C ‐‐ World Wide Web Consortium c. RFC ‐‐ Request for Comments d. IEFT ‐‐ Internet Engineering Task Force

a. ICANN ‐‐ Internet Corporation for Assigned Names and Numbers

If your company uses a cloud service such as SaaS for all accounting, sales, and customer service information why would you still need to make regular backups of the business data. a. If there is an interruption in Internet access, the service and records would not be accessible. b. You are overly cautious because it is well known that cloud‐based services are highly secure, highly reliable and always available. c. Data stored online through the cloud‐based service is more at risk to security breaches than if it were store locally. d. There is a limit on the number of users who are allowed to access the cloud‐based service at any one time.

a. If there is an interruption in Internet access, the service and records would not be accessible.

If you are trying login to a site and the authentication window will not open, what could be causing the problem? Although blocking pop‐up and pop‐under windows may seem like a great idea, keep in mind that it may prevent vital features of some Web sites (such as logon windows) from displaying. a. Pop‐up blocking software has been enabled in the Web browser. b. The browser has recently had it cookie cache cleared. c. Pop‐up blocking software has been enabled in the operating system. d. The browser has recently had its browsing history cleared.

a. Pop‐up blocking software has been enabled in the Web browser.

What would be the best course of action if you receive a threatening text and voicemail from an angry customer at the same time that you are about to walk into a mandatory company meeting? a. Request that the customer send his complaints by e‐mail, knowing that any inappropriate communication will be well documented. b. Continue to send text messages to the customer hoping to smooth things over until you can call him after the meeting. c. Skip the meeting and call the customer. d. Do not respond to the customer.

a. Request that the customer send his complaints by e‐mail, knowing that any inappropriate communication will be well documented.

If you are halfway into a project and quality issues develop, what adjustments must be made to the project triangle when both the budget and quality are two of the top requirements? a. Scope should be limited to include the most important features b. Hire temporary contractors to finish the project within the designated time c. Use a Gantt chart to add time to the project d. Quality, budget or schedule of the project triangle must be compromised (The project triangle consists of time, money, scope. A fourth element — quality — is at the center of the project triangle. It is not a factor in the triangle, but changes you make to the other three factors will most likely affect quality.)

a. Scope should be limited to include the most important features

If you must communicate with a supervisor who is located in another country with details of a current important meeting, what would be the best practice to use? a. Send a brief text message update now, and then send the meeting details in an e‐mail message later. b. Send a brief text message to update the supervisor. c. Send several text messages to convey all of the details. d. Post the details of the communication on a social media platform

a. Send a brief text message update now, and then send the meeting details in an e‐mail message later.

How would you send a group of individuals in different locations a quick message regarding information that they need while traveling to attend a company meeting? a. Send a text message with the information to the mobile phone of each person. b. Call each person and leave a voice message. c. Update the meeting agenda. d. Post an announcement on the company's Web site.

a. Send a text message with the information to the mobile phone of each person.

When you configure your work computer to check your personal email and conveniently download messages, what should you be aware of? a. The company will have access to your personal e‐mail messages. b. The company must permit you to receive personal e‐mail. c. The company will ignore the e‐mail messages to respect your privacy. d. The company will block personal e‐mail accounts

a. The company will have access to your personal e‐mail messages.

If you receive a personal e‐mail of an extremely private matter on your company e‐mail account, why would you call the sender and discuss the matter over the phone instead of replying to the e‐mail. a. The employer can read e‐mail that is on the company e‐mail account. b. It is illegal to use company e‐mail for personal use. c. Personal e‐mail violates netiquette guidelines. d. Although e‐mail is private it is not a personal way to respond.

a. The employer can read e‐mail that is on the company e‐mail account.

Choose the practice listed below that would be considered legal and ethical. a. Trying shareware for free and paying for it only after you decide to keep using it. b. Copying someone else's written work found on the Internet and presenting it as your own. c. Downloading music and motion pictures from peer‐to‐peer networks. d. Downloading copyrighted artwork and using it as your background on your Website

a. Trying shareware for free and paying for it only after you decide to keep using it.

In order to configure an e‐mail client to connect to your e‐mail account, which of the following do you need? a. An HTTP address b. A POP3 address c. A DNS server address d. An FTP address

b. A POP3 address

Secure authentication requires: a. A user name only b. A user name, password and encryption of transmitted data c. No username or password d. A username and a password

b. A user name, password and encryption of transmitted data

HTTP requires which of the following elements to function? a. Browser, HTML and TCP/IP b. Client, server and TCP/IP c. Server, HTML and DNS d. Client, Web page and DNS

b. Client, server and TCP/IP

Windows Media Player will not open RealMedia format and you need to view videos for your company Web site. What do you need to do to view the videos? a. Decompress the files before attempting to play them. b. Convert the RealMedia files to WMV format c. Upload the videos to the Web server then view them from the Web site. d. Get Technical Support to service your computer to use the RealMedia.

b. Convert the RealMedia files to WMV format

What information will you need to configure the e‐mail client on your mobile phone? a. E‐mail address, SMTP, IMAP, DNS, user name and password. (DNS domain name system has nothing to do with email) b. E‐mail address, SMTP, POP3, user name and password. ( you need a Simple Mail Transfer to send and POP3 to receive plus your e‐mail address) c. Company name, SMTP, POP3, user name and password (Company name would not be necessary) d. Company name, e‐mail address, SMTP, POP3, IMAP and DNS. (Receiving mail uses POP3 or IMAP not both and DNS has nothing to do with email.

b. E‐mail address, SMTP, POP3, user name and password. ( you need a Simple Mail Transfer to send and POP3 to receive plus your e‐mail address)

What human resource issue is a risk when you forward an inappropriate e‐mail message such as a joke or video to co‐workers? a. Reducing the effectiveness of spam filters b. Offending a recipient who receives the joke as a result from further forwarding c. Copyright infringement by not providing credit to the originator of the joke. d. Forgetting to include others who might find the joke funny.

b. Offending a recipient who receives the joke as a result from further forwarding

Which method listed below would allow you to discuss and get feedback on the final design of a project with members of a group that are located across the country in different locations. a. Create a PowerPoint slideshow that contains pictures of the Web site design then create a survey to gather feedback from the members. b. Plan a Web conference using a service such as WebEx or GoToMeeting that supports screen sharing and phone conferencing. (GoToMeeting with HD video conferencing is a simple yet powerful way to collaborate in real time. WebEx Communications Inc. is a Cisco acquisition that provides on‐demand collaboration, online meeting, web conferencing and videoconferencing applications.) c. Create an audio Webcast and distribute it to the board members over the Internet (This would not allow them to see anything) d. Plan a Webinar that reviews the layout of the site and request that the board members submit their feedback by e‐mail after the Webinar. (A webinar is short for Web‐based seminar, it is a presentation, lecture, workshop or seminar that is transmitted over the Web using video conferencing software. )

b. Plan a Web conference using a service such as WebEx or GoToMeeting that supports screen sharing and phone conferencing. (GoToMeeting with HD video conferencing is a simple yet powerful way to collaborate in real time. WebEx Communications Inc. is a Cisco acquisition that provides on‐demand collaboration, online meeting, web conferencing and videoconferencing applications.)

When a business selects a hosted solution with a monthly subscription fee and outsourced maintenance, the business model is called: a. Crowdsourcing b. Software as a Service c. Scalability d. Grid computing

b. Software as a Service

The best method for non‐technical users to collectively classify and find information on a site would be? a. Ajax (Asynchronous JavaScript. AJAX is not a new programming language, but a new way to use existing standards. b. Tagging (Tagging has gained wide popularity due to the growth of social networking, photography sharing and bookmarking sites.) c. Web feed (a data format used for providing users with frequently updated content) d. A wiki (A wiki is a web application which allows people to add, modify, or delete content in collaboration with others)

b. Tagging (Tagging has gained wide popularity due to the growth of social networking, photography sharing and bookmarking sites.)

If are using an online site to purchase a product and you are at the checkout page, how can you tell if the page is secure? a. The URL begins with ‐ ftps:// b. The URL begins with - https:// c. The URL begins with - http:// d. The URL begins with - ftp://

b. The URL begins with - https://

If you open an e‐mail attachment and launch a virus that takes control of your system and you are unable to use the anti‐virus software, what should you do next? a. Plug in your backup drive to try to initiate an immediate backup of important files. b. Turn off your computer and reboot from a known, clean system disk. c. Let the virus run its course d. Call the local authorities and report it as identity theft.

b. Turn off your computer and reboot from a known, clean system disk.

Which of the following strategies will help protect your computer against virus attacks? a. Perform regular backups of your hard drive. b. Update the definitions for your malware protection application frequently. c. Open e‐mail attachments only from unknown senders d. Configure security settings for your Web browser to the lowest possible level

b. Update the definitions for your malware protection application frequently.

Digital signatures verify the integrity of the data, verify the identity of the sender, and: a. provide data confidentiality b. enforce non‐repudiation c. sign digital certificate requests d. create certificate requests

b. enforce non‐repudiation

What is the term for a database that contains multiple tables related through common fields? a. non‐relational database b. relational database c. table d. common fields

b. relational database

Which part of the URL represents the server name that the page resides on? http://www.ebrschools.org/humanresources/payscale.htm a. /human resources/ b. www c. ebrschools d. ebrschools.org

b. www

What is the difference between a computer virus and a worm? a. A worm can deposit an illicit server, a virus cannot b. A virus can deposit an illicit server, a worm cannot c. A worm can replicate itself but a virus requires user action to replicate. d. A virus can replicate itself but a worm requires user action to replicate.

c. A worm can replicate itself but a virus requires user action to replicate.

Which statement best describes symmetric‐key encryption: a. An encryption method in which numbers generated by an algorithm from a text string are used to verify the integrity of transmitted messages b. An encryption method in which a different key is used to encrypt and decrypt a message c. An encryption method in which the same key is used to encrypt and decrypt a message d. A private and public key are used to encrypt and decrypt a message

c. An encryption method in which the same key is used to encrypt and decrypt a message

What would be the best classification for the following url: http://www.lsu.edu/Education/High_School/nine.php a. Virtual domain name (When you combine a single server that supports more than one domain, it's called a virtual domain. This type of virtual hosting is often used by commercial enterprises that are seeking a low‐cost website hosting option.) b. Relative URL (Relative URLs are more convenient because they are shorter and often more portable. However, you can use them only to reference links on the same server as the page that contains them.) c. Deep URL (A deep url is when you go past the main URL to access a particular item on the website. You link to a page other than the main page of the website.) d. Fully qualified domain name (A fully qualified domain name (FQDN) is the complete domain name for a specific computer, or host, on the Internet.) Example: The FQDN www.yourcompany.com is composed of: ‐ www = hostname ‐ yourcompany = domain name ‐ com = top level domain

c. Deep URL (A deep url is when you go past the main URL to access a particular item on the website. You link to a page other than the main page of the website.)

When you download an application from an online site, which specific standard protocol is most likely transferring the application? a. HTTP (Hypertext Transfer Protocol) b. HTTPS (Hypertext Transfer Protocol Secure) c. FTP (File Transfer Protocol) d. SMTP (Simple Mail Transfer Protocol)

c. FTP (File Transfer Protocol)

What would be the best way to communicate important items to a co‐worker using e‐mail? a. Write the action items using all capital letters. (never considered good netiquette) b. Describe all action items at length in a detailed paragraph in the middle of the message. (E‐mail messages should be brief, clear and to‐the‐point.) c. List the action items in a numbered or bulleted list for clarity. d. Include emoticons to ensure the recipient understands your humor. (unprofessional)

c. List the action items in a numbered or bulleted list for clarity.

Which file format should you convert files to when sharing them with potential customers? a. XML (Extensible Markup Language) b. MP3 (Encodiing Format for digital music) c. PDF (Portable Document Format - no special software needed to view this type of file) d. DOC (Word Document)

c. PDF (Portable Document Format - no special software needed to view this type of file)

Synchronously ‐‐ happening, existing, or arising at precisely the same time. What would be the best method to discuss required information with sales managers in multiple international locations synchronously? a. Schedule an in‐person sales meeting with them at the company headquarters b. Send the updates via e‐mail c. Schedule a Webinar d. Post the updates on the company's Web site

c. Schedule a Webinar

Which popular plug‐in is Microsoft's response to Adobe Flash? a. Apple Quick Time b. Windows Media Player c. Silverlight d. RealPlayer

c. Silverlight

What is a possible drawback to using cloud services? Drawbacks are Connectivity, Speed and Lockout a. Cost b. Flexibility c. Speed d. Scalability

c. Speed

When a software program is open source, it means the program's source code is freely available to the public. Unlike commercial software, open source programs can be modified and distributed by anyone and are often developed as a community rather than by a single organization. Which of the following examples would persuade you to focus your efforts as a software developer on an open‐source operating system? a. Source code for an open‐source app is not viewable and cannot be modified (Not true it is open to the public) b. Open‐source operating systems and development tools are free from software bugs and viruses. (Not true it is a work in progress and is constantly be revised to fix any bugs and prevent viruses.) c. The operating system and associated development tools are free, provided you comply with the "copyleft" license. (Copyleft is a general method for making a program (or other work) free, and requiring all modified and extended versions of the program to be free as well.) d. An open‐source license will never be in the public domain. (Not true being in the public domain is what makes it open‐source)

c. The operating system and associated development tools are free, provided you comply with the "copyleft" license. (Copyleft is a general method for making a program (or other work) free, and requiring all modified and extended versions of the program to be free as well.)

What does the GNU GPL Version 3 License allow a individual to do with a new software application? a. The individual can sell the software only if they make the software code available on a public server b. The software will be on the public domain for free use but changes will be kept secret and the individual could profit for the modified software c. The software will be on the public domain for any users to edit or change but the changes are freely available to all who use the software. d. The software can be sold ONLY through a not‐for‐profit company.

c. The software will be on the public domain for any users to edit or change but the changes are freely available to all who use the software.

Users can access and navigate an FTP server using an FTP client program. For which action does the FTP client program use the "put" command? a. To move a file to a new location b. To post the file to a website c. To upload a file d. To download a file

c. To upload a file

If your are viewing a particular web site in your browser and you want to browse to a different website without closing the browser, what would be the most efficient way of accomplishing this task? a. Perform a search within the site currently displayed in the browser. (Would you need to perform a search?) b. Perform a search on your computer for the site. (What would this have to do with viewing any site?) c. Type the URL of the site in the address bar of your Web browser. d. Type the FTP address in the address bar of your Web browser. (Why would you need the FTP address?)

c. Type the URL of the site in the address bar of your Web browser.

What should you consider when doing a keyword search? a. Use as few keywords as possible b. Include at least one preposition such as "the" or "an" in your list of keywords. (never) c. Use nouns instead of verbs for keywords. d. Use verbs instead of nouns for keywords.

c. Use nouns instead of verbs for keywords.

To reduce the costs of maintaining servers with FTP access; your companing is using P2P to share information (peer‐to‐peer). In order to protect sensitive information while using P2P what strategy would work best? a. Limit P2P use to sharing music files. b. Restrict P2P use to sharing only with univeersities and research organizations. c. Use technologies that will control access and password‐protect files. d. Restrict employess from using their computers in P2P communictions.

c. Use technologies that will control access and password‐protect files.

Would be the best way to recall a site from your desktop computer or from your mobile device. a. Add it to your favorites on your desktop b. Type in the web address on all browsers of both devices c. Memorize the URL d. Add the link to a cloud‐based bookmark service

d. Add the link to a cloud‐based bookmark service

When a music provider uses a service which helps define the list of songs available to listeners the term used to describe this technology would be: a. Bit‐ torrent (A protocol supporting the practice of peer‐to‐peer file sharing that is used to distribute large amounts of data over the Internet.) b. Software as a Service (software distribution model in which applications are hosted by a vendor or service provider and made available to customers over a network, typically the Internet.) c. Grid Computing (applying the resources of many computers in a network to a single problem at the same time ‐ usually to a scientific or technical problem that requires a great number of computer processing cycles or access to large amounts of data.) d. Crowdsourcing (practice of obtaining needed services, ideas, or content by soliciting contributions from a large group of people.)

d. Crowdsourcing (practice of obtaining needed services, ideas, or content by soliciting contributions from a large group of people.)

What protocol is used to transmit information when checking the balance of your bank account? Keyword is "transmit." a. FTPS (This is used when a file is being transferred from one location to another. b. POP3 (This is email protocol for receiving mail) c. IMAPS (This is also an email protocol for receiving mail) d. HTTPS

d. HTTPS

Proprietary information is Information that is not public knowledge (such as certain financial data, test results or trade secrets) and that is viewed as the property of the holder. What measures should be taken to protect this information? a. Destroy any material considered to be proprietary b. Restrict Internet access c. Uninstall any e‐mail clients d. Monitor employees' messages

d. Monitor employees' messages

What icon is commonly used to indicate the use of an e‐mail attachment? a. Folder b. Lock c. Checkmark d. Paperclip

d. Paperclip

An end user cannot log in to a page for an e‐learning course. What would cause the authentication window not to launch? a. Pop‐up blocking software has been enabled in the operating system. b. The browser has recently had its cookie cache cleared. c. The browser has recently had its browsing history cleared. d. Pop‐up blocking software has been enabled in the Web browser. **

d. Pop‐up blocking software has been enabled in the Web browser.

When you want to reply to an e‐mail message you received that was directed to several individuals and you want everyone to receive the reply you would: a. Forward b. Reply c. Send d. Reply All

d. Reply All

Which method below would be the most efficient way to categorize and share information with a team of individuals. a. Collective intelligence ‐‐ The ability of a group to exhibit a greater degree of intelligence by solving problems collaboratively compared to the intelligence of an b. Ajax programming ‐Ajax (Asynchronous JavaScript and XML) is a programming methodology for the Web that enables Web applications to interact with users in much the same way they do with desktop applications. c. Grid computing ‐‐ Grid computing is similar to cloud computing in that a cluster of multiple, remote systems are used to create a single solution. Generally relates to the use of multiple systems dedicated to processing a vast amount of data or solving a particular mathematical or scientific problem d. Social tagging ‐‐ Tagging, which is a characteristic of Web 2.0, allows non‐technical users to collectively classify and find information.

d. Social tagging ‐‐ Tagging, which is a characteristic of Web 2.0, allows non‐technical users to collectively classify and find information.

If an employee starts their own social networking account and they customize it with the company logo and other material from the company Web site for which they are employed, which example below would be the most appropriate response from the company? a. The company would provide a link to the employee site from the official social networking account. b. Reference the employee page in the company internal newsletter. c. Human Resource would send the employee a request to stop using the company logo and other company information but allow her to keep the social networking account. d. Terminate the employee for copyright and trademark violations and issue a cease‐and‐desist letter to take control of the account.

d. Terminate the employee for copyright and trademark violations and issue a cease‐and‐desist letter to take control of the account.

What would you include in your recommendations about the dangers of the Internet to the parents? a. Direct parents to ask other users in the children's chat rooms to provide identification. b. To reduce fear, claim that the threat of predators has been reduced in recent times. c. Remind the parents that the anonymity of chat rooms provides security. d. Warn children to never provide personal information over the Internet.

d. Warn children to never provide personal information over the Internet.

You are signed up for a seminar that will provide on‐line training but you will have no opportunity to ask questions. Which Web‐based meeting format would be used for this type of training? a. Video conference b. Web conference c. Blog d. Webinar

d. Webinar

When you use the Internet and social networking to solicit ideas for a logo or banner it is called: a. outsourcing (the contracting out of a business process to a third‐party.) b. folksonomy ( a system of classification derived from the practice and method of collaboratively creating and translating tags to annotate and categorize content) c. social engineering (refers to psychological manipulation of people into performing actions or divulging confidential information.) d. crowdsourcing (practice of obtaining needed services, ideas, or content by soliciting contributions from a large group of people.)

d. crowdsourcing (practice of obtaining needed services, ideas, or content by soliciting contributions from a large group of people.)

Keyword Searches use the following Boolean Operators. If you want to do a search for toys but do not want to include toys made by Hasbrow which of the following would be correct: a. toys +Hasbrow b. toys <Hasbrow c. toys *Hasbrow d. toys !Hasbrow

d. toys !Hasbrow


Set pelajaran terkait

Level K Grade 9 Science AMS and HW Week 2 Questions 1-64 Physical Science Practice Sheet

View Set

Chapter 1 Introduction to Computers and Programming

View Set

AP Human Geography Ch. 4: Folk and Popular Culture

View Set

Catcher In the Rye Chapters 1-7, Catcher in the Rye Chapters 1-7

View Set