CIW

Ace your homework & exams now with Quizwiz!

What is a project constraint? A. A factor, such as budget or time, that limits a project manager's options B. A factor that is considered to be real or certain for planning purposes C. A document that displays the planned dates for performing tasks and meeting deadlines D. A document that contains the project goals and specifies how those goals will be met

A. A factor, such as budget or time, that limits a project manager's options

If you were a project manager, which of the following documents would be the most helpful in evaluating project risks and determining whether you should escalate concerns to managers or executives outside the project team for resolution? A. An issues log B. A SWOT analysis C. A project schedule D. A Gantt chart

A. An issues log

You visit the Web site of a company from which you make online purchases and consent to receive e-mails regarding special promotions and other types of updates. What type of service does this scenario describe? A. An opt-in e-mail marketing service B. A Virtual Network Computing (VNC) service C. A listserve subscription service D. An opt-in mass texting service

A. An opt-in e-mail marketing service

Why is it important to have an adequate amount of disk cache space when downloading multimedia objects? A. Because plug-ins can store a portion of the multimedia object data in the cache and begin streaming delivery as the file downloads B. Because plug-ins for viewing multimedia objects often require a large amount of disk cache space C. Because all multimedia objects must be completely downloaded to your hard drive before you can view them D. Because multimedia objects are stored in the disk cache on the hard drive until you decide to view them

A. Because plug-ins can store a portion of the multimedia object data in the cache and begin streaming delivery as the file downloads

How is IPv6 able to offer more Internet addresses than IPv4? A. By using 128-bit IP addresses B. By requiring less overhead C. By causing Internet usage to grow D. By using wireless network components

A. By using 128-bit IP addresses

Your company is about to release a proprietary product. Suddenly a competitor releases a very similar product that uses design data exactly like that from your company's product. You later learn that the proprietary data was leaked to the competitor. What preventive measure would have ensured that your company's proprietary information was protected from this type of action? A. Monitoring employees' messages B. Restricting employees' Internet access C. Destroying all proprietary information D. Uninstalling employees' e-mail clients

A. Monitoring employees' messages

What type of software is common to all smartphones? A. Personal Information Management (PIM) software. B. Spam-detection software. C. Virus-protection software. D. Encryption/decryption software.

A. Personal Information Management (PIM) software.

When you sign in to your instant messaging (IM) service, your online status is advertised (or published) to the people on your contacts list. What does this scenario represent? A. Presencing B. Unified communications (UC) C. Convergence D. Mobile computing

A. Presencing

Which result reflects an IT project that is poorly managed? A. Project tasks take longer to complete, requiring more company resources and money. B. Fewer alternatives are provided to employees to manage their workload during system downtime. C. The IT project's lack of success will cause other departments to work together more amicably to make up for the project's deficiencies. D. IT training and support is discontinued because non-IT personnel did not welcome or utilize the support.

A. Project tasks take longer to complete, requiring more company resources and money.

The <meta> tag can be used in Web pages for which purpose? A. Providing search engines with a description of the Web site B. Linking the Web site to other related Web pages C. Containing the content that appears on each Web page D. Preventing early-version browsers from viewing the Web site

A. Providing search engines with a description of the Web site

It is vital that you understand how to evaluate information you retrieve from resources on the Internet because the source of information can directly affect the quality and factuality of the information. Which of the following resource types bases information on primary sources? A. Scholarly B. Individual C. Open peer-reviewed D. Popular

A. Scholarly

Which popular plug-in is Microsoft's response to Adobe Flash? A. Silverlight B. Windows Media Player C. Zotero D. QuickTime

A. Silverlight

Instead of purchasing software and hardware that must be maintained by internal resources, more and more small businesses today are choosing hosted solutions with a monthly subscription fee and outsourced system maintenance. Which term is commonly used for this business model? A. Software as a Service B. Crowdsourcing C. Grid computing D. Scalability

A. Software as a Service

Which protocol is required for computers to communicate with each other over the Internet? A. TCP/IP B. POP C. HTTP D. FTP

A. TCP/IP

Which of the following improves the speed of your browser because it allows you to view previously accessed Web pages without having to request them from the server again? A. The browser cache B. The Favorites folder C. The History folder D. Pop-up windows

A. The browser cache

Which statement about compressing JPEG files is true? A. The more compression, the smaller the file size, but the lower the image quality. B. The more compression, the larger the file size, but the higher the image quality. C. The more compression, the larger the file size, but the lower the image quality. D. The more compression, the smaller the file size, but the higher the image quality.

A. The more compression, the smaller the file size, but the lower the image quality.

If the budget allotted for a project were suddenly cut in half, which of the following would be the most likely result? A. The scope of the project would be reduced. B. The scope of the project would be increased. C. No other part of the project would have to be adjusted. D. The time allotted for the project would be cut in half as well.

A. The scope of the project would be reduced.

You are almost finished updating a Web site. As part of the update, you have converted all pages from HTML 4.0 to HTML5. The project is currently on schedule. However, your project manager has been asked by the marketing team manager to justify a day of time spent validating the site's HTML5 pages. The marketing team manager does not have technical knowledge of the Internet or the Web. Which is the most appropriate explanation to provide to the marketing team manager? A. The team needs to verify that the site will appear as expected in as many browsers as possible. B. Customers may have problems downloading the page, and one of those problems might involve improperly closed tags. C. Improper declarations will cause problems, and they need to be verified via HTTP. D. We need to verify that the HTML5 in the pages conforms to W3C standards.

A. The team needs to verify that the site will appear as expected in as many browsers as possible.

What is the purpose of conducting an ontological study as it pertains to a particular organization or business? A. To enable software engineers and programmers to accurately map technology solutions to business needs B. To enable software engineers and programmers to accurately determine how an organization's data is used by particular applications C. To enable software engineers and programmers to accurately determine the requirements that a database must fulfill in order to function properly for an organization D. To enable software engineers and programmers to accurately predict the degree to which a demographic will adopt or accept a new product or innovation

A. To enable software engineers and programmers to accurately map technology solutions to business needs

What is the purpose of conducting an ontological study as it pertains to a particular organization or business? A. To enable software engineers and programmers to accurately map technology solutions to business needs B. To enable software engineers and programmers to accurately determine how an organization's data is used by particular applications C. To enable software engineers and programmers to accurately determine the requirements that a database must fulfill in order to function properly for an organization D. To enable software engineers and programmers to accurately predict the degree to which a demographic will adopt or accept a new product or innovation

A. To enable software engineers and programmers to accurately map technology solutions to business needs

Users can access and navigate an FTP server using an FTP client program. For which action does the FTP client program use the "put" command? A. To upload a file B. To move a file to a new location C. To search for a file D. To download a file

A. To upload a file

Viewers are scaled-down versions of applications and usually do not have the full application's functionality. Which choice describes tasks you can generally perform using a viewer? A. View and print documents, but not edit them B. Print documents, but not view or edit them C. View documents, but not print or edit them D. View and edit documents, but not print them

A. View and print documents, but not edit them

You use Pandora (an automated Internet radio service) to build a collection of songs you like. When you select certain songs or artists, Pandora will play selections that are musically similar and you can approve or disapprove of the selections. The selections are determined by other Pandora users who have selected the same or similar songs/artists and categorized them together based on their own approval/disapproval decisions. This scenario is an example of: A. crowdsourcing. B. Software as a Service (SaaS). C. cloud computing. D. grid computing.

A. crowdsourcing

Cloud computing is a computing paradigm in which: A. users are able to access software and services run by servers that reside on the Internet. B. one domain name server hosts multiple domain names. C. multiple companies, organizations or people share portions of the same domain name. D. users are able to outsource a task to an undefined group of people or community to obtain and analyze large amounts of data.

A. users are able to access software and services run by servers that reside on the Internet.

Which is the standard video file format for Microsoft Windows? A. Ogg Vorbis (OGG) B. Audio Video Interleave (AVI) C. Moving Picture Experts Group (MPEG) D. QuickTime Movie (MOV)

B. Audio Video Interleave (AVI)

As an IT professional, which is the most important reason for you to develop and use good communication skills? A. Because your social network is an important resource in a job search B. Because you will need to represent technical issues to a non-technical audience C. Because you must discuss your project tasks with other members of your IT team D. Because you must communicate literately in IT newsgroup discussions

B. Because you will need to represent technical issues to a non-technical audience

Which choice lists two methods that you can use to reference an FTP or file-storage server (such as Dropbox) in order to download files? A. By IP address or FTP address B. By IP address or domain name C. By FTP address or HTTP address D. By HTTP address or domain name

B. By IP address or domain name

Which of the following is a drawback of requiring SMTP authentication? A. The SMTP server will not send e-mail messages that are not digitally signed. B. Chances are increased that a hacker can use a packet sniffer to obtain a valid user name and password. C. The SMTP server may be used illicitly to send unsolicited junk mail. D. Chances are increased that a hacker can use a packet sniffer to obtain a valid digital certificate from the session.

B. Chances are increased that a hacker can use a packet sniffer to obtain a valid user name and password.

A digital signature verifies the identity of the sender and provides data integrity. Which of the following does it also do? A. Creates digital certificate requests B. Enforces non-repudiation C. Signs digital certificate requests D. Provides data confidentiality

B. Enforces non-repudiation

Which of the following search engines was the first to determine a site's relevance based upon the number of links that point to it, in addition to ranking its relevance according to keywords you enter? A. Excite B. Google C. WebCrawler D. Yahoo!

B. Google

Which encryption method provides data integrity because, even though encrypted data is not decrypted, you can verify whether the data was altered after encryption? A. Asymmetric-key encryption B. Hash encryption C. Symmetric-key encryption D. RSA encryption

B. Hash encryption

Which protocol allows you to browse and manage e-mail messages while they reside on the mail server? A. Post Office Protocol (POP) B. Internet Message Access Protocol (IMAP) C. Simple Mail Transfer Protocol (SMTP) D. Network News Transfer Protocol (NNTP)

B. Internet Message Access Protocol (IMAP)

In an Ethernet network, all data travels across the network and between computers in which form or unit? A. E-mails B. Protocols C. Packets D. Routers

B. Packets

Which term is used to describe a network in which each computer has both server and client capabilities? A. Wide area network B. Peer-to-peer network C. Ethernet network D. Local area network

B. Peer-to-peer network

Which choice lists security-related ethical and legal issues that IT professionals face? A. Copyrighting procedures for server documentation and contract employee issues B. Privacy concerns, copyright and trademark issues, and encryption policies C. Copyrighting procedures for employee manuals and company Web site design D. Licensing issues, marketing schemes and policies, and branding standards

B. Privacy concerns, copyright and trademark issues, and encryption policies

A domain name consists of letters (and sometimes numbers) separated by periods. Which of the following is the host name component of a domain name? A. The right-side component of a domain name, which categorizes domains into groups by common type or geography B. The left-side component of the domain name, which categorizes domains into groups by server name C. The left-side component of a domain name, which categorizes domains into groups by common type or geography D. The right-side component of a domain name, which categorizes domains into groups by server name

B. The left-side component of the domain name, which categorizes domains into groups by server name

You are part of a team that has been collaborating on a marketing document. The document is ready for final approval from the stakeholders. The team leader has sent the document to the stakeholders as an attachment to an e-mail. You notice that an important stakeholder was omitted from the recipient list. What should you do to ensure that the omitted stakeholder receives the document and receives future replies to the e-mail thread? A. Use the Reply All feature and include the omitted stakeholder's e-mail address. B. Use the Forward feature, add the omitted stakeholder's e-mail address and include the other e-mail addresses from the original message to alert the team to the oversight. C. Use the Forward feature to forward the message to the omitted stakeholder's e-mail address, then alert the team to the oversight in a separate message. D. Use the Forward All feature and include the omitted stakeholder's e-mail address.

B. Use the Forward feature, add the omitted stakeholder's e-mail address and include the other e-mail addresses from the original message to alert the team to the oversight.

Which is the most common method used to authenticate users on private and public computer networks? A. Digital certificates B. User names and passwords C. Encrypted keys D. Digital signatures

B. User names and passwords

Which of the following statements is true about Voice over IP (VoIP)? A. VoIP is the primary means by which users communicate with contact centers. B. VoIP is voice information delivered in digital form as packets of data using Internet Protocol (IP). C. VoIP is voice information delivered in digital form as packets of data using the public switched telephone network (PSTN). D. VoIP is the primary means by which users communicate with call centers.

B. VoIP is voice information delivered in digital form as packets of data using Internet Protocol (IP).

Which IT job role best describes an individual who develops primarily server-side Web applications? A. Database administrator B. Web application developer C. Server administrator D. Web architect

B. Web application developer

Why can it be advantageous to write e-mail folders to files on your computer's local disk? A. You will be able to more easily ensure that your e-mail messages are virus-free. B. Your e-mail will be more easily transportable from one computer to another. C. Your e-mail will be more easily integratable with a personal information management (PIM) program. D. You will be able to more easily filter out spam.

B. Your e-mail will be more easily transportable from one computer to another.

A one-to-one database table relationship can best be described as a table relationship in which: A. one record in Table A can relate to many matching records in Table B, and vice versa. B. each record in Table A can have only one matching record in Table B, and vice versa. C. a record in Table A can have multiple matching records in Table B, but a record in Table B has only one matching record in Table A. D. no record in Table A has any matching records in Table B.

B. each record in Table A can have only one matching record in Table B, and vice versa.

A SWOT analysis is an integral part of the planning phase because it allows you to: A. outline the requirements for each project task to ensure that the project objectives are met. B. evaluate your organization's or team's strengths to determine whether they will assist you in accomplishing the project objectives. C. outline the processes, tools and techniques you will need to implement changes to achieve a desired outcome. D. list the planned dates for performing tasks and meeting goals identified in the project plan.

B. evaluate your organization's or team's strengths to determine whether they will assist you in accomplishing the project objectives.

Lisa has received a file attachment from a co-worker, James. She has no reason to expect a file from this person. The most effective security strategy for Lisa to follow would be: A. to open the file attachment and use anti-virus software to scan it. B. to call, text or IM James before opening the attachment, to verify that he intended to send it. C. to make back-up copies of important files so that she can recover them in case of an incident. D. to use anti-virus software to scan the system's hard disk before opening the attachment.

B. to call, text or IM James before opening the attachment, to verify that he intended to send it.

What is a software patent? A. A legal contract between the author of software and the end user that makes the source code available to the user B. A legal contract between the author of software and the end user that eliminates restrictions on the use and distribution of the product C. A set of exclusive rights granted to an inventor for a fixed period of time upon disclosure of the invention D. A legal contract between the author of software and the end user that defines how the software can be used

C. A set of exclusive rights granted to an inventor for a fixed period of time upon disclosure of the invention

While you are exploring a Web page in the Firefox browser, a file fails to properly display. You decide to install the required plug-in to view the file and are forced to quit Firefox, install the plug-in, then restart Firefox. What kind of installation is this? A. An online installation B. A lossy installation C. An offline installation D. A lossless installation

C. An offline installation

You access a search engine and enter the words "African" and "safari" in the search box. The search engine returns links to Web sites in its index that include these words. Which type of search index did you use? A. Full-text index B. Structured directory index C. Keyword index D. Static index/site map

C. Keyword index

You want to give your Web site users the ability to view high-quality video. Connection speed is not an issue. Which file format could you use? A. WAV B. AVI C. MPEG D. PDF

C. MPEG

Your company is making changes to a certain product. You need to discuss these changes with the company's sales managers, who are located in various international locations. Which of the following methods is the most efficient and economical solution for you to discuss the required information with all the sales managers synchronously? A. Post the blueprints showing the changes on the company's Web site and call each sales manager personally to discuss their individual questions or concerns offline. B. Schedule an in-person sales meeting with the managers at the company headquarters so that you can demonstrate the changes and answer any questions with the entire group present. C. Schedule a Webinar with the sales managers so that you can demonstrate the changes and answer any questions with the entire group. D. Send the blueprints showing the changes via e-mail to each of the sales managers and ask them to contact you with any questions.

C. Schedule a Webinar with the sales managers so that you can demonstrate the changes and answer any questions with the entire group

You have just finished a very important sales meeting with a potential customer, and you need to update your supervisor at the corporate office, which is located in another country. You are debating whether to text or e-mail your supervisor about the meeting details. Which of the following would be the best practice for communicating with your supervisor? A. Post the details of the meeting on your favorite social media platform, where your supervisor is one of your followers. B. Send a brief text message to say the meeting has finished, because you know that your supervisor does not read e-mail. C. Send a brief text message update now, and then send the meeting details in an e-mail message later. D. Send several text messages in order to convey all the details of the meeting most quickly.

C. Send a brief text message update now, and then send the meeting details in an e-mail message later.

You receive an unexpected e-mail with an attachment from a co-worker. You call the co-worker to ask if she sent you an e-mail message with an attachment. She recalls that she sent several e-mails with attachments earlier that day. Which of the following is your co-worker's best response to your question? A. She should ask you to forward the e-mail to her so she can open the attachment and check it. B. She should ask you to open the attachment and describe its contents. C. She should ask you to read her the e-mail message including the full name of the attachment and its extension. D. She should ask you to forward the e-mail to your company's management.

C. She should ask you to read her the e-mail message including the full name of the attachment and its extension.

You have just created a resume detailing your experience as a Web designer. This resume also specifies training you have received and certifications you have earned. Which is the most efficient way to distribute this information to the appropriate audience? A. Send your resume to every contact in your e-mail address book. B. Find a list of HR representatives on the Internet, and send your resume as an e-mail attachment. C. Submit your resume to a job search Web site. D. Re-create your resume in HTML and post it on the Web for easy keyword searching.

C. Submit your resume to a job search Web site.

Which format would be the most appropriate for you to use if you want to send your resume to several large employers who are likely to enter the information you provide into keyword-searchable resume databases and applicant tracking systems? A. Portable Document Format (PDF) B. Rich Text Format (RTF) C. Text format D. HTML format

C. Text format

Users can access and navigate an FTP server using an FTP client program. For which action does the FTP client program use the "get" command? A. To upload a file B. To move a file to a new location C. To download a file D. To search for a file

C. To download a file

Which of the following is generally used in non-interactive Web events? A. Voice conference B. Web conference C. Webcast D. Webinar

C. Webcast

Hypertext Transfer Protocol (HTTP) is responsible for providing Web pages to users who request them. The required elements for HTTP to function are: A. server, HTML and DNS. B. client, Web page and DNS. C. client, server and TCP/IP. D. browser, HTML and TCP/IP. C. client, server and TCP/IP.

C. client, server and TCP/IP.

You avoid adding yourself to unwanted mailing lists, you conduct online transactions through secure Web sites, and you are selective when posting information to newsgroups. These actions will help you: A. protect original works of authorship under copyright law. B. perform the IT job of Web site analyst. C. minimize the amount of spam you receive. D. enforce the company's encryption policy for e-mail.

C. minimize the amount of spam you receive.

Which protocol is used to send Web pages from a Web server to a Web browser? A. File Transfer Protocol (FTP) B. Hypertext Markup Language (HTML) C. Hypertext Transfer Protocol (HTTP) D. Post Office Protocol (POP3)

C.Hypertext Transfer Protocol (HTTP)

Which of the following refers to a family of specifications for wireless network technology? A. Ad-hoc and infrastructure modes B. Dial-up and direct connections C. T and E carriers D. 802.11 standards

D. 802.11 standards

Lisa is configuring an e-mail client to connect to her e-mail account. Which of the following is required to set up the e-mail account? A. An FTP server address B. A DNS server address C. An HTTP address D. A POP3 address

D. A POP3 address

You have an account on Flickr (www.flickr.com) and have categorized your photos by adding tags to them. Users can now browse Flickr and gain access to your photos as long as the tags for which they search match the tags you have applied. What have you created? A. A wiki B. A blog C. A mashup D. A folksonomy

D. A folksonomy

You visit the Web site of a business from which you make online purchases and set up an account on your smartphone. The site requests your mobile phone number in order to send you promotional text messages. What type of service does this scenario describe? A. A listserve subscription service B. A Virtual Network Computing (VNC) service C. An opt-in mass texting service D. An opt-in e-mail marketing service

D. An opt-in mass texting service

Which of the following plug-ins can be used to show MOV files, which can combine video, animation, text and audio into one file? A. Adobe Reader B. Windows Media Player C. Adobe Flash Player D. Apple QuickTime

D. Apple QuickTime

Troy is project manager for a development team. After a short meeting to introduce a new project, he is preparing an e-mail message for his team that will assign some initial tasks to be completed that day. He has a list of action items for the team members to review and confirm. Which is the preferred approach to communicate important action items in an e-mail message? A. Include emoticons to ensure the recipients understand your humor. B. Write the action items using all capital letters. C. Describe all action items at length in a detailed paragraph in the middle of the message. D. List the action items in a numbered or bulleted list for clarity.

D. List the action items in a numbered or bulleted list for clarity.

You are part of a development team that needs to adopt an integrated development environment tool to increase programmer productivity. The team narrowed the options down to two. One is open-source; the other will require an expensive site license. The tool you choose must be reliable, stable and well maintained. Which of the following could be a disadvantage for you to choose open-source, and thus a compelling enough reason to purchase the licensed software instead of using the open-source solution? A. Your developers will have ready access to the source code. B. The open-source solution is in the public domain. C. The code for the open-source solution can be viewed by a community of open-source developers. D. Maintenance of an open-source solution relies on developers who volunteer to work on the code.

D. Maintenance of an open-source solution relies on developers who volunteer to work on the code.

What is the main advantage of the Ogg Vorbis (OGG) audio file format? A. OGG files are larger, download faster, and sound as good as other audio file formats. B. OGG files are smaller than and sound as good as other audio file formats, but do not download as quickly. C. OGG files are smaller and download faster than other audio file formats, but do not sound as good. D. OGG files are smaller, download faster, and sound as good as other audio file formats.

D. OGG files are smaller, download faster, and sound as good as other audio file formats.

James has just finished designing a Web site to support a charity organization's fund-raising efforts. He needs to meet with the board members to get their feedback and address some questions before he implements the final design. The board members are dispersed throughout the country and want to avoid spending charity funds on traveling to this meeting. Which of the following solutions would best support the charity and provide James with an opportunity to discuss the design with the group? A. Create a PowerPoint slideshow that contains pictures of the Web site design and create a survey to gather the board members' feedback. B. Create an audio Webcast and distribute it to the board members over the Internet. C. Plan a Webinar that reviews the layout of the site then request that board members submit their feedback by e-mail after the Webinar. D. Plan a Web conference using a service that supports screen-sharing and phone conferencing.

D. Plan a Web conference using a service that supports screen-sharing and phone conferencing.

Project managers must balance three elements that compose the project triangle. You are a project manager who is halfway through a project when your customer contacts you to say that he has been authorized to provide additional funds for the project. How will this most likely affect other elements of the project? A. Cost of the project will be reduced. B. Project scope will decrease. C. Time to complete the project will be reduced. D. Project scope will increase.

D. Project scope will increase.

Cloud computing is software services that are provided over the Internet. Which of the following IT job roles should be most familiar with cloud computing software, infrastructure and platform services? A. SEO analyst B. Web architect C. Help desk technician D. Server administrator

D. Server administrator

What is the function of a CAPTCHA? A. To identify and filter out spam messages before they reach the e-mail Inbox B. To publish a list of IP addresses known to be sources of spam C. To schedule appointments and meetings, store contact information, and manage tasks D. To differentiate humans from automated senders during online transaction

D. To differentiate humans from automated senders during online transactions

Which organization was created by the United Nations to help protect ownership of work and creations globally? A. International Organization for Standardization (ISO) B. World Wide Web Consortium (W3C) C. Internet Assigned Numbers Authority (IANA) D. World Intellectual Property Organization (WIPO)

D. World Intellectual Property Organization (WIPO)

A one-to-many database table relationship can best be described as a table relationship in which: A. one record in Table A can relate to many matching records in Table B, and vice versa. B. each record in Table A can have only one matching record in Table B, and vice versa. C. no record in Table A has any matching records in Table B. D. a record in Table A can have multiple matching records in Table B, but a record in Table B has only one matching record in Table A.

D. a record in Table A can have multiple matching records in Table B, but a record in Table B has only one matching record in Table

The SETI (Search for Extraterrestrial Intelligence) project collected vast amounts of data that needed processing. SETI was one of the early adopters of a technology in which volunteers installed a small application on personal computers to receive, process and return information to SETI. Using multiple systems to process large amounts of data was considered to be less expensive than using a single supercomputer to conduct the same task. This technology is typically known as: A. collective intelligence. B. Software as a Service. C. crowdsourcing. D. grid computing.

D. grid computing.

Which protocol is the Internet standard protocol for transmitting e-mail messages over networks, and is responsible solely for sending -- but not receiving -- e-mail messages?

Simple Mail Transfer Protocol (SMTP)

Which of the following is considered an original Internet top-level domain? a. .net b. .pro c. .info d. .biz

a. .net

Which of the following refers to a family of specifications for wireless network technology? a. 802.11 standards b. T and E carriers c. Dial-up and direct connections d. Ad-hoc and infrastructure modes

a. 802.11 standards

Which definition best describes a network? a. A group of computers connected so they can communicate, share resources and exchange data b. An architecture of computers that divides processing and storage tasks between clients and servers c. A system that requests services from other computers and is used to access files or documents d. A central repository of programs and data to which all member users have access

a. A group of computers connected so they can communicate, share resources and exchange data

You are using Firefox as your default browser and you want to customize it to better suit your browsing habits. What plug-ins and extensions specific to Firefox can you use to accomplish this? a. Firefox add-ons b. Firefox viewers c. Firefox codecs d. Firefox ActiveX controls

a. Firefox add-ons

Which IT job role best describes an individual who creates applications for devices such as smartphones and tablets? a. Mobile application developer b. Web site designer c. Web architect d. Web application developer

a. Mobile application developer

Project managers must balance three elements that compose the project triangle. You are a project manager who is halfway through a project when your customer contacts you to say that he has been authorized to provide additional funds for the project. How will this most likely affect other elements of the project? a. Project scope will increase. b. Time to complete the project will be reduced. c. Cost of the project will be reduced. d. Project scope will decrease.

a. Project scope will increase.

Which term is used to describe a computer that is responsible for storing and providing information requested by a client application? a. Server b. Network c.Database d. Client

a. Server

You and other parents are attending Back To School Night at your son's school. During his presentation about this year's curriculum and goals, your son's teacher talks about the dangers of the Internet. Which of the following should he include in his recommendations to the parents? a. Urge the parents to warn their children to never provide personal information over the Internet. b. Direct the parents to visit their children's chat rooms and ask the other users to provide identification. c. To minimize the parents' fear, tell the parents that the threat of predators has been reduced in recent times. d. Remind the parents that the anonymity of chat rooms provides security for their children.

a. Urge the parents to warn their children to never provide personal information over the Internet.

Employers can monitor their employees' e-mail messages sent to and from the company network because: a. all information carried by the company's communication system is company property. b. regular monitoring reduces the extent of infection by malware. c. this activity minimizes the amount of spam employees receive. d. it prevents employees from using network resources too frequently.

a. all information carried by the company's communication system is company property.

In contrast to meetings that take place in person, a Webcast offers the advantage of: a. being available for retransmission any time after the original event has taken place. b. enabling participants to communicate with the presenter and with each other via online chat. c. broadcasting events in their entirety without the interruptions that frequently occur during meetings. d. encouraging participant interactivity, especially for participants who may be reticent to do so in face-to-face meetings.

a. being available for retransmission any time after the original event has taken place.

You have created your own blog site and have posted and received numerous entries. You have noticed that blog entries: a. consist of brief, informal thoughts focused on a specific topic. b. can contain only text. c. display in chronological order and are written in reverse chronological order. d. cannot contain links to other authors or sites.

a. consist of brief, informal thoughts focused on a specific topic.

Which term is used to describe a computer-based method of communication in which users can type and view informal messages sent to one or more recipients, and view the responses immediately? a.Instant messaging (IM) b.Virtual Network Computing (VNC) c.E-mailing d.Blogging

a.Instant messaging (IM)

Consider the following address: http://www.CIWcertified.com/courses/iba.htm Which part of this address represents the domain name? a.www b. .CIWcertifed.com c. /courses/ d. iba.htm

b. .CIWcertifed.com

How does a proxy server protect a corporate network from unwanted Internet activity? a. A proxy server restricts users by requiring a user name and password for every transmission. b. A proxy server replaces the network IP address with another, contingent address. c. A proxy server runs only the corporate extranet. d. A proxy server runs only the corporate intranet.

b. A proxy server replaces the network IP address with another, contingent address.

What is a software patent? a. A legal contract between the author of software and the end user that defines how the software can be used b. A set of exclusive rights granted to an inventor for a fixed period of time upon disclosure of the invention c. A legal contract between the author of software and the end user that makes the source code available to the user d. A legal contract between the author of software and the end user that eliminates restrictions on the use and distribution of the product

b. A set of exclusive rights granted to an inventor for a fixed period of time upon disclosure of the invention

Because file attachments may contain malicious code that can be used to damage or infiltrate systems, your company routinely scans all file attachments in incoming e-mail. Where does attachment scanning take place? a. At the client, usually just after the message has been received via SMTP b. At the server, usually just after the message has been received via SMTP c. At the server, usually just after the message has been received via POP3 d. At the client, usually just after the message has been received via POP3

b. At the server, usually just after the message has been received via SMTP

Your company offers software applications for various topics. When a customer purchases a desired app from your online store, she is directed to a page where she can download the application directly. When the customer begins downloading the app, the standard protocol that is most likely transferring the application is: a. HTTPS. b. FTP. c. HTTP. d. SMTP.

b. FTP.

Which of the following search engines was the first to determine a site's relevance based upon the number of links that point to it, in addition to ranking its relevance according to keywords you enter? a. Yahoo! b. Google c. WebCrawler d. Excite

b. Google

A Uniform Resource Locator (URL) is an Internet address that performs which task? a. Locates an Internet resource using an e-mail server b. Identifies the method by which an Internet resource is accessed c.Identifies the search string used to locate an Internet resource d.Locates an Internet resource using a search engine

b. Identifies the method by which an Internet resource is accessed

You have just installed the Microsoft Windows 7 operating system on your PC. Which Web browser is bundled with Windows 7 and is installed automatically when you load the operating system? A. Mozilla B. Internet Explorer C. Opera D. Safari

b. Internet Explorer

Why should you make judicious use of file attachments in e-mail messages? a. File attachments cause e-mail threads to become longer than they already are. b. Large file attachments can take a long time to download. c.Attaching files to e-mail messages is not considered professional and should be avoided in the workplace. d. Users will not be able to delete e-mail messages as long as files are attached to them.

b. Large file attachments can take a long time to download.

You want to create a new Web site that contains content and scripts from other Web sites and blend them in an innovative fashion that you have yet to see in any other site on the Web. Which term describes your proposed Web site? a. Ajax b. Mashup c. Folksonomy d. Wiki

b. Mashup

Which of the following is the most common method for spreading viruses? a. Installing programs b. Opening attachments c. Swapping disks or drives d. Downloading files

b. Opening attachments

What can you do during the executing and controlling phases of a project to discuss progress, and to respond to project issues and unanticipated developments? a. Document project tasks to provide a paper trail. b. Plan and schedule meetings with team members. c. Adjust the project schedule accordingly. d. Keep an issues log to review at each project milestone.

b. Plan and schedule meetings with team members.

Which of the following statements is true regarding copyleft licenses? a. A copyleft license prevents users from modifying and redistributing source code without first obtaining permission from the patent holder. b. Software that is distributed with a copyleft license is in the public domain. c. Software that is distributed with a copyleft license is proprietary. d. A copyleft license contains a patent clause that prevents developers from contributing code that infringes on their patents.

b. Software that is distributed with a copyleft license is in the public domain.

Which of the following is protected by copyright? a. The concept of how DNA functions in human hereditary behavior b. The lessons explaining DNA concepts on the www.DNAftb.org Web site c. The graphical "double-helix" representation of DNA d. The permission you obtained to reprint another author's essay about DNA

b. The lessons explaining DNA concepts on the www.DNAftb.org Web site

Which term is used to describe the 140-character updates broadcasted by Twitter users to their followers? a. Posts b. Tweets c. Instant messages d. Mashups

b. Tweets

A many-to-many database table relationship can best be described as a table relationship in which: a. each record in Table A can have only one matching record in Table B, and vice versa. b. one record in Table A can relate to many matching records in Table B, and vice versa. c. no record in Table A has any matching records in Table B. d. a record in Table A can have multiple matching records in Table B, but a record in Table B has only one matching record in Table A.

b. one record in Table A can relate to many matching records in Table B, and vice versa.

Which of the following behaviors is considered to have the most personal risk associated with it when using social media? a. Expressing a strong opinion in a blog post b. Engaging in a chat room conversation with someone you have recently met online c. Agreeing to meet someone in person after getting acquainted on Facebook d. Agreeing to write status updates for a popular celebrity

c. Agreeing to meet someone in person after getting acquainted on Facebook

A member of your IT team has updated the firewall. The project included creating a duplicate firewall for testing. This testing process took four hours. A code review to verify that the update was safe was also necessary. Another two hours were spent installing and testing the update on the live firewall. Your project manager has been asked by upper management to justify the cost of creating a duplicate firewall. Which is the most appropriate explanation to provide to upper management? a.It was necessary to review the source code in the update to make sure that it was safe to install. b.The machine used for the test firewall was inexpensive and was not in use at the time. c.An unsuccessful, untested installation would have caused significant network down time. d.Packets traveling at Layer 3 of the OSI/RM can be dangerous, so it was necessary to do the upgrade correctly.

c. An unsuccessful, untested installation would have caused significant network down time.

Which IT job role best describes an individual who is responsible for managing the maintenance and security of an organization's data? a. Network engineer b. Server administrator c. Database administrator d. Web site manager

c. Database administrator

What are project stakeholders? a. Critical paths that describe tasks that must be completed on time so that the final project deadline will not be adversely affected b. Reporting tools used by project managers to record the progress of a project c.People or groups that can exert influence over the project and affect results d. Milestones that are used to measure the progress of a project

c. People or groups that can exert influence over the project and affect results

What is the main benefit of using Rich Text Format (RTF)? a. RTF has become an Internet standard for graphics. b. RTF is a file format that you can use to import and export graphics files between operating systems and applications. c. RTF is compatible with many operating systems and applications, including most Macintosh and Windows word processors. d. RTF provides an efficient compression algorithm to reduce file size.

c. RTF is compatible with many operating systems and applications, including most Macintosh and Windows word processors.

Sadie receives a verbally abusive voicemail from an angry customer who want to complain about a product, followed by several text messages from the customer asking why no one has returned his call yet. Sadie is due at a mandatory meeting with the company's executive managers. Which of the following is her best course of action? a. She should not respond to the customer because he has communicated inappropriately. b. She should send text messages to the customer during the meeting to placate him, and if he continues to be verbally abusive, it is acceptable for her to respond in the same abusive tone. c. She should send a brief text message to the customer requesting that he send his complaints via e-mail, so that further inappropriate communication will be well documented. d. She should skip the meeting and call the customer immediately to resolve the problem with him.

c. She should send a brief text message to the customer requesting that he send his complaints via e-mail, so that further inappropriate communication will be well documented.

What is the common term for the default page that appears when a browser is initially opened? a.The welcome page b.The bookmarks page c.The home page d.The favorites page

c. The home page

Search engines use a ranking system to help you determine how closely a site matches the topic for which you are searching. Generally, how does this ranking system work? a.The more keywords you specify in your search criteria, the higher the relevancy scores assigned to the retrieved documents. b.The more hyperlinks included in a Web document, the higher the relevancy score that document receives. c. The more frequently your specified keywords are found in a particular document, the higher the relevancy score that document receives. d.The more reference sources included in a Web document, the higher the relevancy score that document receives.

c. The more frequently your specified keywords are found in a particular document, the higher the relevancy score that document receives.

Which of the following is considered a responsibility of IT professionals? a. To have access to the hardware, software and security clearances required to perform tasks b. To provide services and products in a timely, cost-effective and secure manner, even if the service violates company policy c. To plan and conduct service and product installations and training in a manner that minimizes workflow interruption and downtime d. To receive clear, detailed objectives and instructions so they can provide the appropriate services and products to their customers

c. To plan and conduct service and product installations and training in a manner that minimizes workflow interruption and downtime

Which of the following is considered a right of IT professionals working at the help desk? a. To plan and conduct service and product installations and training in a manner that minimizes workflow interruption and downtime b. To provide services and products in a timely, cost-effective and secure manner, even if the service violates company policy c. To receive clear, detailed objectives and instructions so that they can provide the appropriate services and products to their customers d. To change the rules and policies that govern an organization because they affect the professional's ability to fulfill client requests

c. To receive clear, detailed objectives and instructions so that they can provide the appropriate services and products to their customers

Hypertext Transfer Protocol (HTTP) is responsible for providing Web pages to users who request them. The required elements for HTTP to function are: a. browser, HTML and TCP/IP. b. server, HTML and DNS. c. client, server and TCP/IP. d. client, Web page and DNS.

c. client, server and TCP/IP.

Spam can be considered an invasion of privacy because: a. it is placed on Web site visitors' computers so that Web site managers can customize their sites to their visitors' preferences. b. it is generally excluded from Web sites' privacy policies. c. it is sent to recipients uninvited. d. it is generally encrypted with weak encryption keys.

c. it is sent to recipients uninvited.

Ange works as an Administrative Assistant for a small business that uses an SaaS service for sales orders and customer accounting (similar to Salesforce.com). Ange makes sure to save accurate records about current projects, and she performs regular backups of the business data stored on this cloud-based service. Why? a. Because the number of users who are allowed to access the cloud-based service at any time is limited b. Because although it is well known that cloud-based services are highly secure, highly reliable and always available, Ange is paranoid and too cautious c. Because data stored online through this cloud-based service has more risk to security breaches than if it were stored locally d. Because the service and records would not be accessible if there is an interruption in Internet access

d. Because the service and records would not be accessible if there is an interruption in Internet access

Which statement best describes DSL? a. DSL stands for Digital Service Line, a dial-up Internet connection method that uses cable TV network lines and a cable modem. b. DSL stands for Digital Service Line, a direct Internet connection method that uses cable TV network lines and a cable modem. c. DSL stands for Digital Serial Line, a dial-up Internet connection method that uses digital phone lines and an xDSL modem. d. DSL stands for Digital Subscriber Line, a direct Internet connection method that uses digital phone lines and an xDSL modem.

d. DSL stands for Digital Subscriber Line, a direct Internet connection method that uses digital phone lines and an xDSL modem.

Which IT job role best describes an individual who is responsible for managing the maintenance and security of an organization's data? a. Network engineer b. Web site manager c. Server administrator d. Database administrator

d. Database administrator

What kind of software do vendors such as IBM, Computer Associates, Oracle, Microsoft, Sybase and MySQL provide mainly to IT professionals so they can store, access and manipulate corporate database information? a. Structured Query Language (SQL) programs b. Common Gateway Interface (CGI) applications c. Open Database Connectivity (ODBC) standards d. Database management systems (DBMSs)

d. Database management systems (DBMSs)

You use a proprietary Windows-based program to create designs and layouts for your freelance greeting card business. You want to share samples of your work on your Web site for potential new customers to review. You convert the file format of your designs so that customers can view accurate renderings of them, regardless of the local operating system, settings or browser each individual uses to view your site. Which file format should you use? a. OGG b. DOC c. MP3 d. PDF

d. PDF

What is the term for the part of a browser responsible for reading a Web page and presenting it to an end user? a. Window b. Sandbox c. Interpreter d. Rendering engine

d. Rendering engine

In a relational database, what distinguishes a primary key from other database components? a. The primary key is always the first field in a database table. b. The primary key can contain duplicate data in the field. c. The primary key can be found only in a junction table. d. The primary key uniquely identifies each record in a database table.

d. The primary key uniquely identifies each record in a database table.

Users can access and navigate an FTP server using an FTP client program. For which action does the FTP client program use the "get" command? a. To search for a file b. To upload a file c. To move a file to a new location d. To download a file

d. To download a file

Which is the most common method used to authenticate users on private and public computer networks? a.Encrypted keys b.Digital certificates c.Digital signatures d.User names and passwords

d. User names and passwords

Which of the following is a Web-based seminar or training session that is typically interactive, enabling participants to communicate with the presenter and with each other via online chat? a. Webinar b. Webcast c. Voice conference d. Web conference

d. Web conference

You decide to increase the size of the browser cache and change the frequency with which your Web browser compares cached pages to those on the Web. What problem are you experiencing that would cause you to perform these actions? a. Your computer has an inability to store authentication information. b. Your computer has a low-resolution monitor. c. Your computer is low on disk space. d. Your computer has a slow connection.

d. Your computer has a slow connection.

A cookie is a text file that is placed on a Web site visitor's computer. Cookies allow a Web site manager to: a. customize the security options on the site visitor's browser. b. customize the frequency with which the site visitor's browser cache checks for newer pages. c. customize the browser cache size on the site visitor's computer. d. customize the site to the site visitor's Web browsing preferences.

d. customize the site to the site visitor's Web browsing preferences.

One way that a project manager can ensure the delivery of a quality product is to adhere to ISO 9000 standards. ISO 9000: a. identifies nine topic areas, each of which provides a set of principles and techniques to help project managers manage projects. b. outlines the rights of IT professionals and their responsibilities to the organizations for which they work. c. details the segregation of duties that project team members should employ to independently verify that project tasks were completed correctly. d. details recommended steps for producing products and services using a quality-management system that maximizes time, money and resources.

d. details recommended steps for producing products and services using a quality-management system that maximizes time, money and resources.

A critical first step in the initiating phase of a project is to conduct a needs analysis, which: a. identifies the goals and tasks of a project, and the work required to complete them. b. identifies the requirements for each project task to ensure that the project objectives are met. c. identifies the planned dates for performing tasks and meeting goals defined in a project plan. d. identifies the problems or desires that the project must resolve or address.

d. identifies the problems or desires that the project must resolve or address.


Related study sets

World Geography: High Middle Ages

View Set

24. Identify the electrical events associated with a normal electrocardiogram (ECG) and identify an abnormal ECG.

View Set

The Client with Cardiac Problems

View Set

CompTIA CySA+ Practice Certification Exam

View Set

Chapter 15: Forecasting and Reading Homework

View Set

(English III) Act One Scene 2/3 Study Guide- Jaren Katz

View Set

Real Estate Unit 29-Title Issues

View Set

Español Módulo 3: El sistema político

View Set