Lesson 1 CIW

Ace your homework & exams now with Quizwiz!

Why should you make judicious use of file attachments in email messages?

Large file attachments can take a long time to download.

Integrated Services Digital Network (ISDN

A digital telephone line. A communication standard for sending voice, video, or data over digital telephone lines.

Request for Comments (RFC)

A document published by the IETF that details information about standardized Internet protocols and those in various development stages.

What is a project constraint?

A factor, such as budget or time, that limits a project manager's options

Spyware

A form of malicious software that tracks user actions on the Internet.

Which of the following would you enter in a search engine to locate Webpages containing information about a topic?

A keyword

SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are two common protocols used to secure Internet communication exchanges. Which of the following is true about SSL and TLS?

TLS is the successor to SSL and has become more common.

Which statement is true regarding the use of Internet searches for job-related research?

The Internet provides fast, convenient access to a vast amount of information and services.

SMTP

The Internet standard protocol for transferring email messages from one computer to another.

What is the main advantage of using vector graphics instead of raster graphics to create animations?

The file sizes are relatively small, resulting in shorter download times.

HTTPS

The secured encrypted transfer of Webpages.

Employers can monitor their employees' email messages sent to and from the company network because:

all information carried by the company's communication system is company property.

Windows Remote Assistance

A service that allows a user to seek assistance from another person in a remote location. This service involves allowing a trusted person at the remote location to connect to your computer and view your screen.

What is a software patent?

A set of exclusive rights granted to an inventor for a fixed period of time upon disclosure of the invention

What is netiquette?

A set of guidelines that encourage common sense, politeness and general rules for email messages

World Wide Web (WWW)

A set of software programs that enables users to access resources on the Internet via hypertext documents.

Your company has a registered domain name. You decide to sell portions of the domain name and make it available to others. What does this scenario describe?

A shared domain

Twitter

A social networking and blogging site that allows individuals to communicate via short messages.

Web browser

A software application that enables users to access and view Webpages on the Internet.

Domain Name System (DNS)

A system that maps uniquely hierarchical names to specific Internet addresses.

Lynx

A text-only browser that runs on most operating systems

Which statement correctly compares computer viruses and worms?

A virus requires user action to replicate, but a worm can replicate by itself

Aggregator

A website or Web application where headlines and other content are collected for easy viewing. A Web browser or client application that collects, or aggregates, syndicated Web content into a single location that users can use to easily view the content.

Internet

A worldwide network of interconnected networks.

What distinguishes a worm from a virus?

A worm is capable of replicating itself automatically while affecting data.

Which statement best describes hash encryption?

An encryption method in which numbers generated by an algorithm from a text string are used to verify the integrity of transmitted messages

Which statement best describes symmetric-key encryption?

An encryption method in which the same key is used to encrypt and decrypt a message

National Science Foundation (NSF)

An independent agency of the U.S. government that promotes the advancement of science and engineering.

When you search for topics using a Web search engine, what are you searching?

An index or database of referenced Websites

Website analyst

An individual who analyzes Website statistics to determine the site's effectiveness.

Web architect

An individual who creates the overview plan of a Website's development.

SEO analyst

An individual who determines the visibility of Web sites across multiple clients and search engines.

mobile application developer

An individual who develops Web sites and/or applications for mobile devices.

Web marketing manager

An individual who develops and implements plans to exploit the Internet for marketing and sales opportunities.

Web application developer

An individual who develops primarily server-side Web applications.

help desk technician

An individual who diagnoses and resolves users' technical hardware and software problems. Is most likely to need to translate technical concepts into information that a non-technical audience can readily understand.

security analyst/consultant

An individual who examines an organization's security requirements and determines the necessary infrastructure.

PC repair technician

An individual who installs, modifies and repairs personal computer (PC) hardware components.

database administrator

An individual who is responsible for the maintenance and security of an organization's database resources and data.

Website designer

An individual who is responsible for the organization and appearance of a Website.

Website manager

An individual who manages a Web development team. Provides organizational leadership for Website content and all related initiatives.

network engineer

An individual who manages and maintains a network infrastructure.

server administrator

An individual who manages and maintains network servers.

security manager

An individual who manages the security measures used to protect electronic data. They maintain the software and procedures necessary to protect the confidentiality and integrity of information, and legitimate access to it.

mobile device repair technician

An individual who troubleshoots and repairs mobile device hardware components.

What distinguishes an information portal from a search engine?

An information portal will only index Websites based on manual submissions.

Client

An interface that enables users to communicate with and request information from a server. A computer that communicates with a central server.

Which statement is true regarding international copyrights of digital information?

An international copyright does not exist.

If you were a project manager, which of the following documents would be the most helpful in evaluating project risks and determining whether you should escalate concerns to managers or executives outside the project team for resolution?

An issues log

Twitter

An online social networking service that allows users to send and receive other users' updates, known as tweets.

You visit the Website of a company from which you make online purchases and consent to receive emails regarding special promotions and other types of updates. What type of service does this scenario describe?

An opt-in email marketing service

You regularly purchase items from a popular Website. The site requests your mobile phone number, in order to send you promotional text messages. What type of service is this?

An opt-in mass texting service

Which of the following is an example of ethical Internet behavior?

Citing information you find on the Internet that you use in your own work.

You are developing open-source software based on existing source code developed by someone else. What is the term for the piece of software you develop?

Derivative work

Which choice lists the basic elements of authorship, according to copyright law?

Expression and originality

Plug-ins are useful for:

Extending a browser's capabilities.

What are small software programs that are built to interact with Web technologies through your browser?

Extensions

You want to be able to quickly view news headlines without the need to open your Web browser and visit any news Websites. How can you accomplish your goal?

Set up a Web feed.

You and other parents are attending Back To School Night at your son's school. During his presentation about this year's curriculum and goals, your son's teacher talks about the dangers of the Internet. Which of the following should he include in his recommendations to the parents?

Urge the parents to warn their children to never provide personal information over the Internet.

The "Right to Be Forgotten" argument considers:

whether people have the right to remove damaging information about themselves on the Internet.

In order to help with your job tasks, your supervisor has given you a PIM application to install and use. PIM is an acronym for a type of program that can:

schedule appointments and meetings, store contact information, and manage tasks.

ontology

the study of how a particular knowledge domain, or system, is organized. An ontology is the product of an ontological study.

The level of secrecy offered by encryption is dependent on:

the type of encryption used and the size of the key.

Milestones can add significant value to project scheduling because:

they can become the points at which the project team or project stakeholders evaluate the project's progress and make decisions that may affect the status of the project going forward.

Lisa has received a file attachment from a co-worker, James. She has no reason to expect a file from this person. The most effective security strategy for Lisa to follow would be:

to call, text or IM James before opening the attachment, to verify that he intended to send it.

You have been granted a software patent for your new software application. This means that:

users can use your application only if you grant them a license to do so.

The availability of vendor-supplied services and support, and the availability of regular updates and patches from vendors are considered advantages of:

using proprietary software.

IPv4 can provide how many numeric IP addresses, approximately?

4 billion

Domain name server

A server that resolves domain names into IP addresses.

What type of software is commonly found on all smartphones?

Personal Information Management (PIM) software

Which part of this address represents the domain name? http://www.CIWcertified.com/courses/iba.htm

.CIWcertifed.com

Which of the following is considered an original Internet top-level domain?

.net

Internet Message Access Protocol (IMAP)

A protocol that resides on an incoming mail server. Similar to POP, but is more powerful. Allows sharing of mailboxes and multiple mail server access. The current version is IMAP4.

How does a proxy server protect a corporate network from potential hackers?

A proxy server replaces the network IP address with another, contingent address.

Network Interface Card (NIC)

A circuit board within a computer's central processing unit that serves as the interface enabling the computer to connect to a network.

Lisa is configuring an email client to connect to her email account. Which of the following is required to set up the email account?

A POP3 address

What is the main difference between a PostScript (PS) file and an Encapsulated PostScript (EPS) file?

A PS file contains instructions that determine the display of the graphic, whereas an EPS file includes the bitmap information for the image as well.

Advanced Research Projects Agency (ARPA)

A U.S. Department of Defense agency that created the first global computer network.

Which of the following is generally an advantage of using a Webcast instead of an in-person meeting?

A Webcast is more cost-effective than an in-person meeting.

Website

A World Wide Web server and its content; includes multiple Webpages.

Hexadecimal

A base-16 number system that allows large numbers to be displayed by fewer characters than if the number were displayed in the regular base-10 system. In hexadecimal, the number 10 is represented as the letter A, 15 is represented as F, and 16 is represented as 10.

Opera

A browser developed by Opera software that supports most operating systems.

Konqueror

A browser found in the UNIX KDE desktop environment for UNIX workstations

Unified communications (UC)

A business trend that seeks to simplify and integrate all forms of communication. UC enables a user to send a message on one medium and receive it on another.

Blog

A collection of personal thoughts posted on a public Website. A blog is essentially an electronic journal or public diary. A common blog entry consists of brief, informal thoughts focused on a specific topic; reflects the personality of the author; can contain links to other authors or sites; and is written in chronological order and commonly displayed in reverse chronological order.

Usenet (User Network)

A collection of thousands of Internet computers, newsgroups and newsgroup members using Network News Transfer Protocol (NNTP) to exchange information.

root-level server

A server at the highest level of the Domain Name System.

Ajax

A programming methodology for the Web that enables Web applications to interact with users in much the same way they do with desktop applications. Use the Ajax web application model to create mashups.

Point-to-Protocol (PPP)

A protocol that allows a computer to connect to the Internet over a phone line.

Advanced Research Projects Agency Network (ARPANET)

A computer network, funded by ARPA, that served as the basis for early networking research and was the backbone during the development of the Internet.

Host

A computer that other computers can use to gain information. In network architecture, a host is a client or workstation.

Instant messaging (IM)

A computer-based method of communication in which users can type and view messages sent to one or more recipients, and view the responses immediately.

You want to learn more about CIW certifications and access a PDF document at http://www.ciwcertified.com/_resources/CIW_Roadmap.pdf. What kind of URL does this represent?

A deep URL

Standard

A definition or format that has been approved by a recognized standards organization.

4G mobile hotspot

A device that connects a wireless local area network to a wireless phone network at broadband speeds.

Wireless Access Point (AP)

A device that enables wireless systems to communicate with each other, provided that they are on the same network.

Router

A device that routes packets between networks based on network-layer addresses; determines the best path across a network. Also used to connect separate LANs to form a WAN.

Point-to-Point Protocol over Ethernet (PPPoE)

A protocol that implements PPP on top of the Ethernet architecture to connect an entire network to the Internet.

Josh is expecting a very important file from a co-worker in a remote office to be sent to him through email, but he has not received the file. He calls the co-worker, who informs him that she sent the file yesterday and will send it again immediately. Josh still does not receive the email message, so he contacts Technical Support. They find the email from the co-worker in the spam folder of Josh's email client. It has an attachment named salesnumbers.exe. What is the most likely reason that the email message was filtered out?

A file attachment with an .exe extension may contain malicious code.

Safari

A graphical browser developed by Apple for most operating systems.

Wide Area Network (WAN)

A group of computers connected over an expansive geographic area so their users can share files and services.

Network

A group of computers connected so they can communicate, share resources and exchange data.

Local Area Network (LAN)

A group of computers connected within a confined geographic area.

Digital Subscriber Line (DSL)

A high-speed direct Internet connection that uses all-digital networks.

Virtual Domain

A hosting service that allows a company to host its domain name on a third-party ISP server.

Shared Domain

A hosting service that allows multiple entities to share portions of the same domain name.

dead link

A hyperlink that, when clicked, sends a Website visitor to a page or resource that does not exist on the server.

What is an end-user license agreement (EULA)?

A legal contract between the author of software and the end user that defines how the software can be used

In which database table relationship type is a junction table a necessary component?

A many-to-many relationship

What does a closed-envelope icon next to an email message header indicate?

A message that has not yet been read

Which of the following would be considered an effective Internet communication when posting messages to a newsgroup?

A message that is pertinent, appropriate and brief.

Text messaging

A method of person-to-person communication in which users type short text messages from mobile phones.

smartphone

A mobile phone with advanced computing ability and Internet connectivity. Smartphones combine a mobile phone, camera, video recorder, global positioning system, touchscreen, Web browser, and wireless high-speed Internet connectivity into one device.

Gateway

A node on a network that serves as a portal to other networks.

Bit-torrent

A peer-to-peer file sharing protocol used for distributing large amounts of data over the Internet.

tablet

A powerful mobile computer similar to a smartphone, but with a larger touchscreen. Tablet computers typically do not have phone service, but are capable of high-speed Internet connections

In reference to the elements of a Web browser, what is a sandbox?

A programming method that isolates a particular application or process

Modem

Abbreviation for modulator/demodulator. An analog device that enables computers to communicate over telephone lines by translating digital data into audio/analog signals (on the sending computer) and then back into digital form (on the receiving computer).

Why should you create and use an email signature for work-related email messages?

An email signature is a reminder to your recipients of your identity and the identity of your company.

Wireless modes

Ad-hoc and infrastructure

Your mom sent you a message with a link to a college information page that you find very useful. You want to be able to find this same page in the future from your desktop computer, or from your mobile device when you are not at your desk. Which is the best way to do this?

Add the link to a cloud-based bookmark service such as Delicious or Google Bookmarks.

What is the alternate name for extensions in Mozilla Firefox?

Add-ons

What feature provided with many email programs can store information for commonly accessed email contacts?

Address book

Mashup

Aggregates information from multiple sites and presents it the user. A Web page that merges content and scripts (application programming interfaces [APIs]) from multiple Websites to create new, innovative applications that contain content the individual Website authors did not anticipate for their own sites.

Which of the following behaviors is considered to have the most personal risk associated with it when using social media?

Agreeing to meet someone in person after getting acquainted on Facebook.

Crowdsourcing

Allows groups to define and refine choices they make in a cloud-computing application to personalize its content. A resource and problem-solving model in which a task is outsourced to users who access the Internet, view media and use the Web. Users who access the Internet, view media and use the Web become active contributors, helping to customize the available technology and media for their purposes, as well as for those of their communities. Generating and improving content based on collective intelligence, and the use of software to gather and organize this intelligence.

Web feed management providers

Allows users to view their Web feeds in their e-mail inbox, rather than subscribing to a feed and viewing it through an aggregator.

Social tagging

Allows you to tag Web pages using relevant keywords, compile these tags into a public list, and share with others.

Which choice describes the file type(s) that can be attached to an email message?

Almost any type of file can be attached to email messages, such as documents, spreadsheets, presentations or images.

Which statement best describes asymmetric-key encryption?

An encryption method in which both a private key and a public key are used to encrypt and decrypt a message

What is an anonymous FTP site?

An FTP site that does not require authentication for access, and is available to the public.

Webpage

An HTML document containing one or more elements (text, images, hyperlinks) that can be linked to or from other HTML pages.

Domain name

An IP address represented in words.

File Transfer Protocol (FTP)

An Internet protocol used to transfer files between computers; allows file transfer without corruption or alteration.

Internet Service Provider (ISP)

An organization that maintains a gateway to the Internet and rents access to customers on a per-use or subscription basis. An ISP provides access to the Internet, such as cable providers (Time Warner, Comcast, Cox, etc.), major phone carriers (AT&T, Verizon, Sprint, etc.), America Online (AOL) and many others.

The IT team is updating the company firewall application. The project includes creating a duplicate firewall for testing. The testing process took one day. A code review to verify that the update was safe also took one day. Once the testing completed, the live firewall was updated and started functioning within two hours. The IT manager has been asked to justify the cost of creating a duplicate firewall and the time to test it. Which is the most appropriate explanation?

An unsuccessful, untested update could have caused significant network down time.

Node

Any entity or addressable device on a network that can be managed such as a system, repeater, router, gateway or firewall. It is a computer or other addressable device attached to a network, and also known as a host.

Which of the following legacy plug-ins could be used to show MOV files, which can combine video, animation, text and audio into one file?

Apple QuickTime

T carriers

Are T1 and T3 lines, which are dedicated digital telephone lines that have much greater bandwidths than ISDN lines. T1 lines can transmit data at 1.544 Mbps, and T3 lines can transmit data at 44.736 Mbps.

Routers

Are used to direct traveling data to the correct destination.

Which of the following Internet communication practices is unethical but not illegal?

Asking another user in a chat room for personal information.

What must an email message include in order for you to send it?

At least one address in the To field

Because file attachments may contain malicious code that can be used to damage or infiltrate systems, your company routinely scans all file attachments in incoming email. Where does attachment scanning take place?

At the server, usually just after the message has been received via SMTP

Which is the best method for sending a word-processor document to another person via email?

Attach the document to the email message as a file attachment.

Which is a standard video file format for Microsoft Windows?

Audio Video Interleave (AVI)

It is vital that you understand how to evaluate information you retrieve from resources on the Internet because the source of information can directly affect the quality and authenticity of the information. Which of the following types of resources only accept input from scholars and recognized authorities?

Authoritative peer-reviewed

Why might you receive different results using the same keywords on different search engines?

Because not every Website is registered with every search engine

Network News Transfer Protocol (NNTP)

The Internet protocol used by news servers that enables the exchange of newsgroup (Usenet) articles.

Simple Mail Transfer Protocol (SMTP)

The Internet standard protocol for transferring e-mail messages from one computer to another.

Which statement about vector graphics is true?

Vector graphics are saved as sequences of vector statements.

Why do the executing and controlling phases of a project usually overlap?

Because project work takes place during the executing phase: A project manager monitors the status of the project and takes corrective action as work is being performed.

What is the purpose of Bookmarks and Favorites?

Bookmarks and Favorites allow you to save frequently accessed URLs in your browser for quick reference.

Cleo's boyfriend sent her an email message at work with details about a highly personal matter. The message was sent to Cleo's company email address. Her boyfriend requested that she respond as soon as possible. Why should Cleo call her boyfriend to discuss the matter over the phone instead of responding in an email message?

Because her employer has the right to read her email

Monty has been searching online for a rare wine vintage. He finally finds it on the Rare Vintage Website, which he has recently heard about from friends. The site is well designed and offers some good deals on hard-to-find wines. As Monty navigates through the checkout process, he reaches the checkout page with the following URL, which asks him to enter his credit card and mailing information: http://www.RareVintage.com/vprod/checkout.html/ref=chk_out_TLS128_1b?ie=UTF8&docId=107931 Monty cancels his online transaction instead of proceeding. Why?

Because the URL does not use SSL/TLS encryption and therefore any information Monty enters would not be secure.

Cheryl has several concepts for mobile apps for smartphones. A friend suggests that she develop her apps for an open-source operating system. Why might Cheryl want to focus her app development efforts on an open-source operating system?

Because the operating system and associated development tools are free if she complies with the copyleft license

Ange works as an Administrative Assistant for a small business that uses the SaaS for sales orders and customer accounting (similar to Salesforce.com). Ange makes sure to save accurate records about current projects, and she performs regular backups of the business data stored on this cloud-based service. Why?

Because the service and records would not be accessible if there is an interruption in Internet access

You work for your company's IT department diagnosing and servicing the employees' workstations. A user complains that since she has been conducting a lot of research online, performance is slowing. You increase the size of her browser cache. Why will performance slow if the browser cache is too small?

Because the user must wait for pages to be loaded from the server, instead of retrieving them from the cache

Why should you avoid typing email messages in all capital letters?

Because using all capital letters connotes shouting or anger.

As an IT professional, which is the most important reason for you to develop and use good communication skills?

Because you will need to represent technical issues to a non-technical audience.

Why does an IT project manager need to consider a project's Return On Investment (ROI) before starting a new project?

Before starting a project, an IT project manager will be required to justify the project's benefits relative to its costs.

You are an avid user of Facebook and Twitter. Which of the following search engines accommodates social networking to find more relevant information for your queries?

Bing

Which of the following is a P2P application that you can use to download huge files because it dramatically reduces the demands on networking hardware and bandwidth?

BitTorrent

Which choice lists two methods that you can use to reference an FTP or file-storage server (such as Dropbox) in order to download files?

By IP address or domain name

Hypertext Transfer Protocol (HTTP) can be run over Transport Layer Security (TLS) to create the HTTPS protocol. How does HTTPS make HTTP transmission more secure?

By encrypting and decrypting information transmitted to and from Web servers

How do robot or spider programs usually find keywords for a Webpage?

By reading each site's source code embedded in the <meta> tags

Nancy is using a Web browser on her desktop computer to place some bids on a popular online auction site. She decides that she wants to browse to the CIW site without closing her browser. What is the most efficient way to do this?

By typing the CIW site's URL (www.CIWcertified.com) in the address bar of her Web browser

When would be the most appropriate time to discontinue an email thread?

When new issues pertaining to a topic arise and a lengthy thread already exists

How does scope creep undermine the success of a project?

Changes in project scope tend to occur in small increments, and these small increases in scope can add up and compromise the success of the project.

Kjell received an email message on which several other individuals were copied. He wants to respond to this message in a way that will include everyone who was copied on the original message. Which steps should he take with this email?

Click the Reply All button, enter his response, and click Send.

Of the six elements required to connect to the Internet, which can be supplied in the form of a Web browser, email program or mobile app?

Client software

xDSL

Collectively, the variations of Digital Subscriber Line (DSL), which include ADSL, RADSL and HDSL.

Which term is used to describe the component that relates multiple tables of information in a relational database?

Common field

Which process helps you to obtain current information about available, relevant jobs in your area most quickly?

Conduct a search on a job seeker site.

Marja works for a small but growing company. She has been assigned to make several international sales trips to visit prospective customers. The company does not have an enterprise mail server with Web mail access. Her IT department is looking for a solution so that Marja can check her email as she travels. Which of the following should the company choose for the most effective, economical and efficient solution?

Configure a free Web-based email account that Marja can access anywhere, and forward her email to that account while she travels.

Which of the following is a necessary responsibility for you to maintain your IT career?

Continuing education

Samson needs to review several promotional product videos from his company's marketing department immediately, before a meeting to discuss revisions. Samson tries to view the videos on his computer using his Windows Media Player, but they will not play. The video files are in RealMedia format. What should Samson do in order to view these videos?

Convert the video files to the WMV format, because RealMedia files will not play in Windows Media Player.

Tim is listening to music from an online music provider (such as Pandora). He creates a list of his music preferences, and the music service uses his list to suggest additional songs that Tim might like. This music service is an example of a cloud-computing application that uses collaborative filtering technology. What is the name of this type of technology?

Crowdsourcing

When Web users enter the URL www.CIWcertified.com in their browser address bar, they can access the official CIW Website at the IP address 72.44.192.233. Which technology enables users to do this, instead of having to remember and enter the IP address?

DNS; DNS resolves IP addresses into easily recognizable text-based names. HTTP is the protocol used to transfer Webpages from a Web server to a Web client, usually a Web browser. NNTP is used for Usenet newsgroup. SSL is used for authenticating and encrypting content using HTTP.

Which statement best describes DSL?

DSL stands for Digital Subscriber Line, a direct Internet connection method that uses digital phone lines and an xDSL modem.

What kind of software do vendors such as IBM, Computer Associates, Oracle, Microsoft, Sybase and MySQL provide mainly to IT professionals so they can store, access and manipulate corporate database information?

Database management systems (DBMSs)

Which term best describes this address type? http://www.CIWcertified.com/Certifications/Foundations/iba.htm

Deep URL

You receive a text message on your cell phone from an unknown number. The message includes an attachment. You try to call the number but you get no answer. What is the best action for you to take next?

Delete the message without opening the attachment.

802.11 standards

Developed by the Institute of Electrical and Electronics Engineers (IEEE), refers to a family of specifications for wireless network technology. T carriers refer to T1 and T3 lines, which are dedicated digital telephone lines that have much greater bandwidths than ISDN lines. E carriers refer to E1 and E3 lines, which are the European equivalents of T1 and T3 lines, respectively. E1 lines can transmit data at 2.048 Mbps, and E3 lines can transmit data at 34.368 Mbps.

The International Organization for Standardization (ISO)

Develops technical specifications for intellectual, scientific, technological, and economic activities worldwide

Which choice lists the two principal methods of connecting to the Internet through an Internet Service Provider (ISP)?

Dial-up connection and direct connection

Which term is used to describe a password-protected, encrypted data file that verifies the identity of the sender of a message?

Digital certificate

What can you use to electronically verify your identity without the need to provide data confidentiality?

Digital signature

Which of the following is an electronic stamp that can verify the integrity of data and the identity of the message source?

Digital signature

Which of the following can be considered an inappropriate use of email communication in the workplace?

Disclosing confidential information

IPv4 addresses use a 32-bit address format that is divided into four sets of numbers. What is the term for this address?

Dotted quad

Internet Corporation for Assigned Names and Numbers (ICANN )

Each domain name is unique and registered with this.

You have been contracted to write an article about social networks for a magazine. You have finished writing the article and are ready to send your draft to the magazine editor. Which is the most appropriate way to do this?

Email

Todd replaced his mobile phone with an upgraded unit, and now must reconfigure many of the services. The instructions say that he can enter his email address and the unit will configure the email client for him. Todd has tried this several times, but it does not work. He calls the vendor's help desk. The technician says that because Todd is trying to sync his email account with an enterprise mail server, he will need to configure the email client manually. What information does Todd need to configure the email client?

Email address, SMTP, POP3, user name and password

Which result reflects an IT project that is properly managed?

Employee productivity loss is minimized.

Secure authentication requires:

a user name, a password, and encryption of this information.

Transmission Control Protocol/Internet Protocol (TCP/IP)

Enables computers to communicate with one another. TCP enables two computers to establish a communication link and exchange packets of data; IP specifies the format and addressing scheme of the packets. A suite of protocols that turns data into blocks of information called packets, which are then sent across the Internet. The standard protocol used by the Internet.

Which of the following can protect your company's data, prevent data from being intercepted by malicious outsiders, and deter hackers?

Encryption

Which term is used to describe the process that converts data into an unreadable form of text?

Encryption

A digital signature verifies the identity of the sender and provides data integrity. Which of the following does it also do?

Enforces non-repudiation

Which of the following improves the quality of a product by providing independent verification that project tasks were completed correctly?

Engaging in the separation of duties

TCP/IP

Ensures that your information is transferred quickly and reliably.

Which of the following search engines uses cross-referencing fields for conceptual searches, in addition to allowing keywords searches?

Excite

Which audio file format is considered lossless?

FLAC

What is the name of the File Transfer Protocol that runs over SSL/TLS?

FTPS

Which protocol is often used to publish Webpages to a Web server?

File Transfer Protocol (FTP)

You recently returned from a vacation and you want to share some photos with your co-workers. You would like to share these photos via email. What should you consider when attaching several high-resolution photos to an email message?

File size

You are using Firefox as your default browser and you want to customize it to better suit your browsing habits. What extensions specific to Firefox can you use to accomplish this?

Firefox add-ons

You want to send an email message you received to another user who did not receive the original message. Which is the best way to do this?

Forward the message.

Question :Which of the following search engines was the first to determine a site's relevance based upon the number of links that point to it, in addition to ranking its relevance according to keywords you enter?

Google

The SETI (Search for Extraterrestrial Intelligence) project collected vast amounts of data that needed processing. SETI was one of the early adopters of a technology in which volunteers installed a small application on personal computers to receive, process and return information to SETI. Using multiple systems to process large amounts of data was considered to be less expensive than using a single supercomputer to conduct the same task. This technology is typically known as:

Grid computing

You are leading a project that will collect vast amounts of data, which will need processing. In your research, you learn about a technology in which volunteers can install a small application on personal computers to receive, process and return information to your organization. Using multiple systems to process large amounts of data in this way will be less expensive than using a single supercomputer to conduct this same task. Which term describes this technology?

Grid computing

What relatively new W3C standard has essentially eliminated the need for browser plug-ins?

HTML5

Which protocol do many browsers assume when you enter a URL in the Address field?

HTTP

Sarah just made a purchase on an online shopping site (such as amazon.com) and completed the checkout process by paying with her credit card. Which protocol was most likely used for the transmission of her information?

HTTPS

Which encryption method provides data integrity because, even though encrypted data is not decrypted, you can verify whether the data was altered after encryption?

Hash encryption

Mark's co-worker sent him a joke via email. Mark thought the joke was quite funny, and he forwarded it to several other co-workers that he knows will be amused as well. Later that day, the Human Resources Manager calls Mark to her office to discuss a problem reported to her regarding the forwarded email. Which problem has Mark most likely encountered by forwarding the email message?

He offended a recipient who received the joke as a result of further forwarding

Hypertext link

Highlighted or underlined text in a Web page that, when clicked, links the user to another location or Web page.

Which browser folder contains previously viewed Webpages?

History

As a new IT professional, you need to understand the needs of the business, as well as the various technologies required to design and deliver specific products. What is the term that describes this perspective in relation to IT?

Holistic

Harley works in the sales department at his company. He feels that the company's marketing team is not doing a good job, so without direction or permission, he starts his own social networking page to help. His page has a name similar to the company's. He posts company logos on it and uses text copied from the company Website. He posts news and sends tweets to customers and others interested in the company. When the company learns of this, what action is it most likely to take?

Human Resources will issue a cease-and-desist letter, take control of Harley's page, and terminate Harley's employment for copyright and trademark infringement.

Which protocol is used to send Webpages from a Web server to a Web browser?

Hypertext Transfer Protocol (HTTP)

HTTP, HTML, FTP, POP

Hypertext Transfer Protocol (HTTP) is the protocol used to transfer Webpages from a Web server to a Web client, usually a Web browser. Specifically, HTTP is the set of rules required to exchange files, such as text, images, video and multimedia content, across the Web. HTML is the language used to create Webpages. FTP is used to transport large files of various types. POP transports email messages.

Every domain name is unique. Once registered, it cannot be used by an unauthorized organization or individual. What organization is responsible for managing domain names?

ICANN

For which type of email server is it especially important that you archive messages to your local hard drive?

IMAP server

Which statement accurately describes the difference between a traditional modem and an ISDN line?

ISDN uses a digital line, whereas a traditional modem must translate digital signals to analog and back.

A Uniform Resource Locator (URL) is an Internet address that performs which task?

Identifies the method by which an Internet resource is accessed.

Which term is used to describe an application that installs hidden services on a system that enables the attacker to monitor and control the operation of the system?

Illicit server

What are raster graphics?

Images that map bits directly to a display space.

Client/server model

In which individual computers and devices, called nodes, interact with one another through a central server to which they are all connected. The client/server model divides processing and storage tasks between the client and the server. Client programs run on the computer nodes and interact with a server program running on the server.

Computer viruses can cause damage ranging from relatively minor to debilitating. You can protect your system against viruses by using commercial virus-detection software to find and defeat viruses. Because new viruses are created so rapidly, what must you do to ensure that your anti-virus software can protect you?

Install anti-virus software program updates to keep the signature profiles current.

What can you do to eliminate the need to define a MIME type for files that you download from Websites?

Install the latest version of a browser, or install any available upgrades.

Johann uses instant messaging (IM) to frequently communicate with his team members, as well as with close friends. Recently, Johann was surprised that he started receiving spam during his IM sessions. Which statement would explain why Johann could receive spam during an IM session?

Instant messaging bypasses anti-virus software and firewalls.

What distinguishes instant messaging from email?

Instant messaging can be used to talk to contacts if your computer has a microphone.

Which protocol allows you to browse and manage email messages while they reside on the mail server?

Internet Message Access Protocol (IMAP)

Which protocol is the data transmission standard for the Internet, responsible for sending information from one computer to another using uniquely identifying addresses?

Internet Protocol (IP)

Of the six elements required to connect to the Internet, which is often supplied by an ISP?

Internet connection

What is the term for the part of a browser responsible for reading and processing programming languages?

Interpreter; common browser interpreters include those for JavaScript and Java.

Voice over IP (VoIP)

Is voice information delivered in digital form as packets of data using Internet Protocol (IP) instead of the traditional circuit-switched lines of the public switched telephone network (PSTN).

What is the purpose of the History folder?

It allows you easy access to previously viewed Webpages.

What does anti-virus software do?

It detects viruses by recognizing patterns called signature profiles, then immediately disinfects your hard drive.

Which of the following statements is true regarding the GNU General Public License (GPL)?

It is an open-source license that allows you to obtain source code and make all the changes to it that you want.

What is the purpose of the Boolean operator AND?

It requires the search results to include multiple keywords.

What is the purpose of the Boolean operator OR?

It requires the search results to include one keyword or the other or both.

A domain name server performs which function?

It resolves domain names to IP addresses.

How is IPv6 able to offer more Internet addresses than IPv4?

It uses 128-bit IP addresses. IPv6 supports approximately 340 undecillion (340 times 10 to the 36th power) IP addresses by using a 128-bit address format. This format uses hexadecimal numbers instead of decimals.

You access a search engine and enter the words "African" and "safari" in the search box. The search engine returns a list of Websites that include these words. Which type of search index did you use?

Keyword index

A search engine database contains titles, URLs and short descriptions for registered Webpages. What else would the database most likely contain?

Keywords

You need to install a Web browser in the UNIX KDE desktop environment for UNIX workstations. Which browser should you install?

Konqueror

Web 2.0

Led to the development of Web-based communities and hosted services, such as social networking sites, wikis, blogs and so on. Ex: Wikipedia

Your company's strength is marketing and sales. Your production team is assigned to rebrand the content obtained from an independent author so your sales team can sell it under your company's name. The author's original work is protected under her legal ownership. So your project manager obtains permission from the author to use her work, in exchange for a royalty fee and a contributor credit in the book. Which term describes this permission arrangement?

License

What service provides companies the ability to subscribe customers to receive promotions and advertising via email?

List servers

Troy is project manager for a development team. After a short meeting to introduce a new project, he is preparing an email message for his team that will assign some initial tasks to be completed that day. He has a list of action items for the team members to review and confirm. Which is the preferred approach to communicate important action items in an email message?

List the action items in a numbered or bulleted list for clarity.

Which protocol do email programs use to identify the file types of attached files?

MIME

You download a file with the unusual file name extension of ".wow." When you attempt to open this file, Windows displays a message indicating that it does not know how to open this particular file type. Which of the following determines a document type and the application required to open it?

MIME

You want to give your Website users the ability to view high-quality video. Connection speed is not an issue. Which file format could you use?

MPEG

You are part of a development team that needs to adopt an integrated development environment tool to increase programmer productivity. The team narrowed the options down to two. One is open-source; the other will require an expensive site license. The tool you choose must be reliable, stable and well maintained. Which of the following could be a disadvantage for you to choose open-source, and thus a compelling enough reason to purchase the licensed software instead of using the open-source solution?

Maintenance of an open-source solution relies on developers who volunteer to work on the code.

The Flash Player allows browsers to play Flash movies, which are animations created using vector graphics. What are vector graphics?

Mathematical shapes saved as a sequence of vector statements, which describe a series of points to be connected

What is contained in your email application's Outbox folder?

Messages that are queued for sending

Your company is about to release a proprietary product. Suddenly a competitor releases a very similar product that uses design data exactly like that from your company's product. You later learn that the proprietary data was leaked to the competitor. What preventive measure would have ensured that your company's proprietary information was protected from this type of action?

Monitoring employees' messages

Any tool used to schedule appointments and meetings, store contact information, and manage tasks is known as a:

Personal Information Management (PIM) program.

Which statement is true regarding a virus attack on your system?

Most viruses can be halted after they commence an attack and can be removed without permanent damage to your system.

Which protocol was developed as an extension of SMTP that allows users to exchange various types of data files over the Internet?

Multipurpose Internet Mail Extensions (MIME)

Which protocol is used to host newsgroups and distribute mailing lists by providing text output that users can access and by allowing multi-person input?

Network News Transfer Protocol (NNTP)

The International Organization for Standardization (ISO)

Offers a family of business management system standards called ISO 9000 that details the steps recommended to produce high-quality products and services using a quality-management system that maximizes time, money and resources.

Microsoft Outlook, pimcore and Salsify are all examples of:

Personal Information Management (PIM) programs.

As an IT professional for a small company, you are responsible for changing network-access user names and passwords as a security precaution. What should you do to prevent employee frustration or confusion when they try to log on to the network after you have changed user names and passwords?

Notify employees in advance of the new user names and passwords, and specify the date on which the new user names and passwords will take effect.

newsgroup

On Usenet, a subject or other topical interest group whose members exchange ideas and opinions. Participants post and receive messages via a news server.

Email

One of many Internet services for transporting data from one computer to another.

You want to look at multiple Websites simultaneously and follow different path of hyperlinks in each site. What is the easiest way to accomplish this in current Web browsers?

Open multiple tabs in your browser, one for each Website.

What is the term when software source code is developed concurrently by many people working collaboratively?

Open-source software development

Which of the following is the most common method for spreading viruses?

Opening attachments

You use a proprietary Windows-based program to create designs and layouts for your freelance greeting card business. You want to share samples of your work on your Website for potential new customers to review. You convert the file format of your designs so that customers can view accurate renderings of them, regardless of the local operating system, settings or browser each individual uses to view your site. Which file format should you use?

PDF

Which choice lists some file types that are often already compressed and thus may not be significantly reduced in file size by compression utilities?

PNG, GIF and JPG

Which term describes the basic unit of data that travels across networks and between computers?

Packets

Cheryl just started using a new email client on her laptop computer. She wants to send an email message with an attachment, but she does not see a button labeled "Attachment" on the client interface. What icon is commonly used on email clients to invoke the Attachment option?

Paperclip

Which term best describes a file of programming code that provides a temporary fix to a known bug?

Patch

Which term is used to describe a network in which each computer has both server and client capabilities?

Peer-to-peer network

What are project stakeholders?

People or groups that can exert influence over the project and affect results

Brea opened an email attachment and it launches a virus. Even after running anti-virus software, the damage is extensive and she will have to reformat her hard drive. Which step, if she had taken it prior to being attacked, would have reduced the impact to her productivity?

Performing regularly scheduled backups so that she can reload all files if lost or damaged

Two requirements are necessary to upload files to an FTP site. One requirement is gaining access to an FTP client program. What is the other requirement?

Permission to upload

Which cookie type remains on your system after you end your browser session?

Persistent cookie

James has just finished designing a Website to support a charity organization's fund-raising efforts. He needs to meet with the board members to get their feedback and address some questions before he implements the final design. The board members are dispersed throughout the country and want to avoid spending charity funds on traveling to this meeting. Which of the following solutions would best support the charity and provide James with an opportunity to discuss the design with the group?

Plan a Web conference using a service that supports screen-sharing and phone conferencing.

What can you do during the executing and controlling phases of a project to discuss progress, and to respond to project issues and unanticipated developments?

Plan and schedule meetings with team members.

Which protocol allows a computer using an analog modem to make an initial connection to the Internet?

Point-to-Point Protocol (PPP)

Web conferences are a cost-effective alternative to live, in-person meetings. Which of the following is a feature of Web conferences?

Polling

Which file format retains document formatting information through all platforms and can view on any computer, regardless of the local operating system?

Portable Document Format (PDF)

Which protocol is used to receive email messages from an incoming mail server, and forces you to download email messages before reading, deleting or otherwise managing them?

Post Office Protocol (POP)

What is the best way to conduct job searches in the IT (or any) industry?

Post your resume in popular, reputable job search sites that include positions in the field you are interested in.

Which term can be defined as a person's willingness and ability to engage in communications?

Presence

A firewall can perform which task?

Prevent unauthorized access to proprietary data on an network

Your IT department enforces the use of 128-bit encryption on all company transmissions. Your department also protects the company encryption keys to ensure secure transmissions. Which choice lists an important reason for encrypting the company's network transmissions?

Preventing data from being intercepted by malicious outsiders

Which of the following are security-related ethical and legal issues that IT professionals commonly face?

Privacy concerns, copyright and trademark issues, and encryption policies

Which document lists the planned dates for performing tasks and meeting goals identified in the project plan?

Project schedule

Project managers must balance three elements that compose the project triangle. You are a project manager who is halfway through a project when your customer contacts you to say that he has been authorized to provide additional funds for the project. How will this most likely affect other elements of the project?

Project scope will increase.

Which result reflects an IT project that is poorly managed?

Project tasks take longer to complete, requiring more company resources and money.

What is TCP/IP?

Protocol software used to communicate with the Internet.

Wikis

Provide the user with both author and editor privileges and are often used to create collaborative Websites and to promote community Websites. A wiki is a page or collection of Web pages that can be viewed and modified by anybody with a Web browser and access to the Internet.

The <meta> tag can be used in Webpages for which purpose?

Providing search engines with a description of the Website

Which of the following is an effective way for Website owners to prevent typosquatting?

Purchase domain names that are similar to their actual domain names

Which operator would you use in a Web search to find a multi-word phrase with the words in a specified order?

Quotation marks " "

Which of the following can you use to view headlines and updates from your favorite Websites without the need to open your Web browser or visit any Websites?

RSS and Atom

What is the main benefit of using Rich Text Format (RTF)?

RTF is compatible with many operating systems and applications, including most Macintosh and Windows word processors.

Technology Adoption Life Cycle

Refers to a sociological model that defines the demographic and psychological characteristics inherent in a population that describes the degree to which members of that population will adopt or accept a new product or innovation.

Web 2.0

Refers to the progressive uses of the Web, including social networking and the use of the Web browser as a platform for sophisticated applications. Web use before the "bursting of the dot-com bubble" in 2001 is now referred to as Web 1.0.

Grid computing

Relates to the use of multiple systems dedicated to processing a vast amount of data or solving a particular mathematical or scientific problem.

What is the term for a database that contains multiple tables related through common fields?

Relational database

Which type of URL is an abbreviated path to a resource using the current page as a starting position?

Relative URL

Cloud computing

Reliant on a business' internet connection. When the connection is offline, the business is offline. Some services may have restrictions on number of users but this is typically worked out during negotiations. Online service providers will probably have more security solutions implemented than small business.

What do encryption applications do to render text unreadable?

Scramble text using mathematical algorithms

What kind of utility program activates when the computer detects no mouse actions or keystrokes for a specified period of time?

Screen saver

What is the term for the part of a browser responsible for reading a Webpage and presenting it to an end user?

Rendering engine

W3C or World Wide Web Consortium

Responsible for standards controlling web technologies

Server

Responsible for storing and providing information. A computer in a network that manages the network resources and provides, or serves, information to clients.

You are a network administrator for a medium-sized organization. The receptionist has had several problems with malware recently. The receptionist does not need to access external Websites to perform his job, but he does use his computer for company documentation and internal communication with co-workers. Which of the following will help prevent additional malware from being installed on his computer?

Restrict this employee's access to the Internet

What distinguishes S/MIME from MIME?

S/MIME supports encryption and the use of digital certificates, whereas MIME controls the way that messages and attachments are organized and distinguished from one another.

What is the standard language for accessing information from a relational database?

SQL

How can you view a Webpage, including all related images, fonts and scripts referenced by the HTML on the page, without connecting to the Internet?

Save the Webpage content to your hard disk.

It is vital that you understand how to evaluate information you retrieve from resources on the Internet because the source of information can directly affect the quality and authenticity of the information. Which of the following resource types bases information on primary sources?

Scholarly

It is vital that you understand how to evaluate information you retrieve from resources on the Internet because the source of information can directly affect the quality and authenticity of the information. Which of the following resource categories is the most common type of Internet resource you will use?

Secondary

You have just finished a very important sales meeting with a potential customer, and you need to update your supervisor at the corporate office, which is located in another country. You are debating whether to text or email your supervisor about the meeting details. Which of the following would be the best practice for communicating with your supervisor?

Send a brief text message update now, and then send the meeting details in an email message later.

You are hosting a lunch meeting at a local restaurant for 15 of your roving salespeople. An hour before meeting time, the restaurant calls to tell you that the party room will not be available for at least an hour later than scheduled. You call another restaurant in the area, which can make its party room available in one hour for your lunch meeting. You make a reservation with the new restaurant for the same time and cancel the other. What is the best way to alert each salesperson about the new restaurant location?

Send a text message with the new restaurant location to the mobile phones of all the salespeople.

You receive an unexpected email with an attachment from a co-worker. You call the co-worker to ask if she sent you an email message with an attachment. She recalls that she sent several emails with attachments earlier that day. Which of the following is your co-worker's best response to your question?

She should ask you to read her the email message including the full name of the attachment and its extension.

Sadie receives a verbally abusive voicemail from an angry customer who want to complain about a product, followed by several text messages from the customer asking why no one has returned his call yet. Sadie is due at a mandatory meeting with the company's executive managers. Which of the following is her best course of action?

She should send a brief text message to the customer requesting that he send his complaints via email, so that further inappropriate communication will be well documented.

Which protocol is the Internet standard protocol for transmitting email messages over networks, and is responsible only for sending—but not receiving—email messages?

Simple Mail Transfer Protocol (SMTP)

Instead of purchasing software and hardware that must be maintained by internal resources, more and more small businesses today are choosing hosted solutions with a monthly subscription fee and outsourced system maintenance. Which term is commonly used for this business model?

Software as a Service

Kim is using the YouTube graphics-editing application that she accesses via the Internet through her browser. Kim does not own the application, nor can she download it. She is able to use the application any time she needs to edit graphics. Although she does not have to pay for the access, she does notice advertisements, which appear on the sidebar of the application's interface. The application Kim is using may be classified as which of the following?

Software as a Service (SaaS)

Software as a Service (SaaS)

Software responsible for providing the service that cannot be downloaded and owned by the end user—It is available as a solution only on a remote basis.

Which of the following statements is true regarding copyleft licenses?

Software that is distributed with a copyleft license is in the public domain.

Freeware

Software that is typically downloaded to the user's computer, Web Apps are typically small applications downloaded to the mobile device.

cloud computing

Software, infrastructure, and platform services that are hosted by a remote data center and provided to organizations over the Internet.

Juan is preparing to give a presentation to his company's managers about the cloud computing services that his department is planning to implement. He considers the possible objections that his managers might have to use cloud services for the company. What disadvantage of cloud services should he be ready to discuss?

Speed could be considered an issue if Internet access slows down or somehow becomes impaired, and then users' ability to access or use information is slowed down or disabled until Internet access is restored. Cost, scalability, and flexibility are all advantages of cloud computing.

Stephen is creating video tutorials to sell his company's products. The target audience will consist of company employees using primarily new computers with the Windows operating systems and Internet Explorer 9. Stephen is debating whether to publish the videos using the MP4 or the OGG video format. Both formats are compatible with the HTML5 video element, which he is using in his tutorials. Which of the following would be a reason for Stephen to choose one format over the over?

The MP4 video format is natively supported by Internet Explorer 9 and does not require a plug-in.

You are interested in receiving more information about a special topic, including emails, announcements and advertising. What can you do?

Subscribe to a listserve group about the topic.

Which file format is a popular, customizable graphics format commonly used for medical imaging and desktop publishing?

TIFF (Tagged Image File Format)

Which format would be the most appropriate for you to use if you want to send your resume to several large employers who are likely to enter the information you provide into keyword-searchable resume databases and applicant tracking systems?

Text format

Short Message Service (SMS)

Text messaging uses the Short Message Service (SMS) communication protocol, which allows the sending and receiving of short text messages among mobile phones.

What is an email signature?

Text that appears at the bottom of each message you send that contains your contact information

Tegan is project manager for a complex product that is having some quality problems during early testing. He meets with the customer to discuss the issues, and the customer tells him that product quality and cost are the priorities: The product must be high quality and must be developed within budget. Tegan asks if the customer can extend the deadline, but the customer refuses. Considering the elements of the project triangle, what can Tegan suggest to meet the customer's needs at this point?

That the customer limits the project scope to include only the most important features.

Which choice best describes the purpose of the Bcc email message component?

The Bcc field contains email address(es) of additional message recipient(s) that do not appear in the message header and are not visible to other recipients.

Which U.S. government agency first funded the development of the Internet?

The Department of Defense

Which Internet resource is used to resolve IP addresses into easily recognizable text-based names?

The Domain Name System (DNS)

If the budget allotted for a project were suddenly cut in half, which of the following would be the most likely result?

The scope of the project would be reduced

Which of the following is a vital part of any firewall strategy?

The security policies created by firewall administrators

Virtual Network Computing (VNC) is a program that allows you to control a computer at a remote location. VNC consists of which two components?

The server and the viewer

Ken has been asked to test a newly developed Website. Part of the test plan requires him to verify that all links within the site work properly. In addition to verifying that clicking a link navigates to the appropriate Webpage, what else will he observe?

The URL displayed in the browser's Address bar will update with each link that is clicked.

What is the main advantage of the WebM video file format?

The WebM file format is open-source and effectively competes with proprietary file types.

scalable

The ability for a system to function well when its workload is increased or hardware is added to meet user need.

Bandwidth

The amount of information, sometimes called traffic, that can be carried on a network at one time. The total capacity of a line. Also, the rate of data transfer over a network connection; measured in bits per second.

Which of the following is an example of a trademark?

The apple icon on the covers of many Beatles albums

Packet

The basic unit of data that travels across networks and between computers. Is data processed by protocols so it can be sent across an Ethernet network

Which of the following improves the speed of your browser because it allows you to view previously accessed Webpages without having to request them from the server again?

The browser cache

Your company has provided you with a desktop computer to use at work. You have configured your email client on this work computer to include your personal email account so that you can conveniently download messages and check your personal email. Which of the following is true?

The company can read your personal email messages.

fully qualified domain name (FQDN)

The complete domain name of an Internet computer, such as www.CIWcertified.com.

Internet Protocol (IP)

The data transmission standard for the Internet. Every computer connected to the Internet has its own IP address, which enables a packet of data to be delivered to a specific computer.

What is the most important consideration in data modeling?

The database's ability to process data.

Google

The de facto standard for search engine sites

top-level domain

The group into which a domain is categorized, by common topic (company, educational institution) and/or geography (country, state).

Social networking

The grouping of individuals with common interests or goals into specific groups or communities. Social networking allows members to use networks of online friends and group memberships to keep in touch with current friends and reconnect with old friends.

Where are downloaded files (such as Webpages, images, fonts, etc.) saved on a computer?

The hard drive

Backbone

The highest level in the computer network hierarchy, to which smaller networks typically connect.

What is the common term for the default page that appears when a browser is initially opened?

The home page

Internet Assigned Numbers Authority (IANA)

The international organization responsible for allocation of IP addresses. Part of the Internet Corporation for Assigned Names and Numbers (ICANN).

A domain name consists of letters (and sometimes numbers) separated by periods. Which of the following is the host name component of a domain name?

The left-side component of the domain name, which categorizes domains into groups by server name.

Which of the following is protected by copyright?

The lessons explaining DNA concepts on the www.DNAftb.org Website

Information Technology (IT)

The management and processing of information using computers and computer networks.

What happens to the email messages you receive while the autoresponder feature is enabled?

The messages are stored in your Inbox as usual.

Which statement about compressing JPEG files is true?

The more compression, the smaller the file size, but the lower the image quality.

Search engines use a ranking system to help you determine how closely a site matches the topic for which you are searching. Generally, how does this ranking system work?

The more frequently your specified keywords are found in a particular document, the higher the relevancy score that document receives.

As an IT project manager, you are weighing the benefits of installing a new company firewall. Which of the following will convince upper management to approve the project?

The new firewall installation will result in a positive Return On Investment (ROI)

Which TCP/IP troubleshooting command should you use to determine whether a client and server are communicating with each other?

The ping command

During which project management phase should you develop a project schedule and assemble the project team?

The planning phase

Folksonomy

The practice of categorizing online content through tags.

replication

The practice of copying data from one source, such as a database, to another.

Facebook

The premier social networking site on the Web. It enables individuals to communicate individually and connect as groups using various communications tools.

In a relational database, what distinguishes a primary key from other database components?

The primary key uniquely identifies each record in a database table.

search engine optimization (SEO)

The process of improving the volume and quality of traffic to a Website by structuring content to improve search engine ranking. A specific activity of Internet marketing.

What is the project triangle?

The relationship among time, money and scope in completing a project

What is the project triangle?

The relationships among project scope, time and money.

As a project manager, you complete a Statement Of Work (SOW) at the end of the initiating phase of a project. What does a SOW outline?

The requirements for each project task to ensure that the project objectives are met

Top-level domain

The right-side component of a domain name categorizes domains into groups by common type (company, educational institution) or geography (country, state). These categories are called top-level domains. he original top-level domains categorize domains by common type and signify the type of site you are visiting. These original top-level domains are: .com, .edu, .org, .mil, .gov, .net, and .int.

Which of the following statements best describes open-source licenses?

They enable users to modify and redistribute software source code without restriction.

Which of the following is not considered a tangible medium of original expression?

Thought

What are the three elements of the project triangle?

Time, money and scope

You need to send a message to your manager providing all the details of a business proposal as quickly as possible. The idea you have discussed with her is critical to the business. The project is considered urgent and confidential. What would be the most appropriate way you could use an SMS (text) message in relation to this proposal?

To alert your manager that you have sent the proposal via email so your manager can view the proposal as soon as possible.

Which is the most important reason you should properly cite information that you obtain from an Internet search?

To avoid plagiarizing someone else's work

What is the purpose of conducting an ontological study as it pertains to a particular organization or business?

To enable software engineers and programmers to accurately map technology solutions to business needs

Project management software often contains Gantt charts. What is the purpose of Gantt charts?

To graphically display the project tasks and task durations

In many cases, project teams are created and developed with people who have different perspectives and priorities. Why is it important for a project manager to have the ability to develop and manage teams?

To help team members complete the project schedule within the project constraints

What is the purpose of the Signature field message component?

To include the sender's contact information.

What is the purpose of a Boolean operator?

To narrow search results by including or excluding words or phrases

Which of the following is considered a responsibility of IT professionals?

To plan and conduct service and product installations and training in a manner that minimizes workflow interruption and downtime

Which of the following is considered a right of IT professionals working at the help desk?

To receive clear, detailed objectives and instructions so that they can provide the appropriate services and products to their customers

Question :Which statement best describes the reason that you should compress files?

To reduce transfer time and conserve hard disk space

What is the purpose of an email autoresponder?

To send an automated response to email messages received while you are unavailable

What is the most appropriate way email can be used in the workplace?

To share files and to document and track the progress of projects

In email applications, where are incoming messages automatically routed by default?

To the Inbox folder

Your computer crashed, and you lost many personal and work-related files. You just got a new computer, but you are now much more concerned about viruses and other security threats. Which strategy can help you protect your computer against virus attacks?

Update the definitions on your anti-virus application frequently.

Sensitive data (such as credit card information) should be secured using authentication and encryption when transmitting it over the Internet. Which protocol is the successor to SSL in accomplishing this?

Transport Layer Security (TLS)

Which term is used to describe a program that appears to be harmless but actually produces malicious or harmful results?

Trojan

Some Internet practices are illegal (they violate laws and are punishable), whereas other practices may be legal but are still unethical and should be avoided. Which of the following practices is both legal and ethical?

Trying shareware for free and paying for it only after you decide to keep using it.

Bob opened an email attachment and it launched a virus. The virus took control of his system, and now he is unable to run his anti-virus software. What should he do next?

Turn off his computer and reboot from a clean system disk.

You suspect that an attacker has gained control of your computer system. What action should you take next?

Unplug the computer network cable and/or disable the computer's wireless NIC.

Which term best describes a collection of software tools that provide a permanent solution to known program bugs?

Update

Which action can you perform to filter spam at your client computer?

Use a client-side filter to identify and filter spam messages.

You are performing a keyword search with your browser. Which strategy should you use for the keywords you choose?

Use mostly nouns rather than verbs.

You are part of a team that has been collaborating on a marketing document. The document is ready for final approval from the stakeholders. The team leader has sent the document to the stakeholders as an attachment to an email. You notice that an important stakeholder was omitted from the recipient list. What should you do to ensure that the omitted stakeholder receives the document and receives future replies to the email thread?

Use the Forward feature, add the omitted stakeholder's email address and include the other email addresses from the original message to alert the team to the oversight.

Hypertext Transfer Protocol (HTTP)

Used to transfer Webpages. The protocol for transporting HTML documents across the internet.

Which is the most common method used to authenticate users on private and public computer networks?

User names and passwords

When your company's private LAN is protected by a firewall, which of the following is true?

Users on the LAN can access information from the Internet, but outside users cannot access information stored on the LAN.

What is the most secure method for sending information over the Internet?

Using encryption

Which of the following behaviors would be considered unethical?

Using your personal Facebook page to make disparaging remarks about your boss.

Viewers are scaled-down versions of applications and usually do not have the full application's functionality. Which choice describes tasks you can generally perform using a viewer?

View and print documents, but not edit them

Anonymous browsing allows users to

Visit Websites privately, without leaving personal information.

Which is the native audio format for Microsoft Windows?

Waveform (WAV)

Your company offers software applications for various topics. When a customer purchases a desired app from your online store, she is directed to a page where she can download the application directly. When the customer begins downloading the app, the standard protocol that is most likely transferring the application is:

When you download software programs and documents from Websites, you are usually transferred to FTP sites for the download. HTTP is used to transfer Webpages, HTTPS is the secured encrypted transfer of Webpages and SMTP is the Internet standard protocol for transferring email messages from one computer to another..

Semantic Web implementations

Web applications that have the ability to contextualize data as they process it. Applications that have the ability to apply context to data can make complex judgments about data, and as a result provide better solutions without human intervention.

Tina is the technology coordinator for a small multi-national corporation with offices in San Francisco, New York, Tokyo and Paris. She needs to coordinate a live and interactive meeting that will allow executives from each of the offices to meet virtually and share presentations. Which of the following is the best way for Tina to accomplish this?

Web conference

Which of the following is a Web-based seminar or training session that is typically interactive, enabling participants to communicate with the presenter and with each other via online chat?

Web conference

You want to attend a training session remotely. The presenter has recommended an application for you to download that uses VoIP audio technology so you can interact with the presenter and the other participants. Which Web-based system does this scenario describe?

Web conference

Which file format is a royalty-free, open video and audio format that is sponsored by Google?

WebM

Which of the following is generally used in non-interactive Web events?

Webcast

Susan is taking an online college seminar series in Art History. All classes will be delivered over the Web. Although there is no opportunity to ask questions, the live lectures and artwork presentations are engaging. Which Web-based meeting format was used?

Webinar

Which of the following is an interactive Web-based seminar or training session that is typically conducted in a one-way format, from speaker to participants with limited audience participation?

Webinar

For which of the following should you prepare slide shows, polls, call-in capabilities and file-sharing capabilities to ensure a successful outcome?

Webinars

Question :If you disable image loading in a browser, then:

Webpages load in text mode only.

In what circumstance would legacy plug-ins be useful in modern day web browsing?

When browsing websites that are not built with HTML5 technologies.

Tagging

Which is a characteristic of Web 2.0, allows non-technical users to collectively classify and find information.

Windows Media Player works on which systems?

Windows and Macintosh systems

4G (fourth generation)

Wireless phone network capable of delivering high-speed broadband Internet access to mobile devices

What is the least expensive way to access the Internet?

With phone lines, an analog modem and an ISP

Which organization was created by the United Nations to help protect ownership of work and creations globally?

World Intellectual Property Organization (WIPO)

You have registered for an e-learning course and are ready to begin. However, when you access the e-learning course page as directed, you find that you cannot log in because the authentication window will not launch. The most likely cause of this problem is that:

You have enabled pop-up blocking software in your browser.

You have activated pop-up blockers in your Web browser to prevent pop-up windows from continually interrupting your browsing experience. What could be an unintended consequence of this action?

You may not be able to access some pages or features of Websites.

What does it mean to configure an email client?

You must enter your email address and password.

You were replying to email when suddenly your computer started to display random messages, and stopped responding to keyboard and mouse input. You suspect that you have accidentally downloaded a virus. Which of the following actions most likely caused this?

You opened an email attachment

Question :If you use your Web browser's built-in FTP client, which FTP command would you need to use to download a file from your company's FTP site?

You would not need to use any FTP commands.

You decide to increase the size of the browser cache and change the frequency with which your Web browser compares cached pages to those on the Web. What problem are you experiencing that would cause you to perform these actions?

Your computer has a slow connection.

Why is it a good idea to save email messages to your local computer hard disk?

Your email will be more easily transportable from one computer to another.

You have created a new software application and are ready to distribute it to other users. You have decided to license the software according to the GNU GPL version 3. What does this license allow you to do with your software?

Your software is available for free use and alteration by other programmers, who must then make their modified versions freely available as well.

You send an email message to a co-worker to help plan a surprise going-away party for a mutual friend. Which statement reflects your right to email privacy?

Your supervisor has the right to read email you send using company equipment and Internet connections.

A database field can best be described as

a category of information in a table

A database can best be described as:

a collection of data that can be sorted and searched using search algorithms.

In project management, a resource is:

a person, department or device needed to accomplish a unit of work.

A one-to-many database table relationship can best be described as a table relationship in which:

a record in Table A can have multiple matching records in Table B, but a record in Table B has only one matching record in Table A.

In project management, a project is:

a sequence of work units that must be accomplished within a defined time frame.

In project management, a task is:

a unit of work that must be accomplished.

After you have found the information you need on the Web, you must still evaluate its accuracy and value. To determine whether information is reliable or factual, you should consult

authoritative peer-reviewed resources.

To avoid the appearance of shouting or anger in email messages, you should

avoid typing messages in all capital letters.

During a Web search, entering erroneous search criteria, clicking dead links or accessing a busy server is likely to:

cause an error page to display.

Hypertext Transfer Protocol (HTTP) is responsible for providing Webpages to users who request them. The required elements for HTTP to function are:

client, server and TCP/IP.

Six elements are required to connect to the Internet

computer (PC, smartphone, smart TV, tablet, etc.), operating system (Windows, Linux/UNIX, Macintosh, etc.), TCP/IP (protocol software used to communicate with the Internet), client software (Web browser, mobile app, email, etc.), Internet connection (direct connection to an Internet Service Provider [ISP]), and Internet address (Web address, email address, server address, etc.)

A cookie is a text file that is placed on a Website visitor's computer. Cookies allow a Website designer to:

customize the site to the visitor's Web browsing preferences.

One way that a project manager can ensure the delivery of a quality product is to adhere to ISO 9000 standards. ISO 9000:

details recommended steps for producing products and services using a quality-management system that maximizes time, money and resources.

Question :If you click a hyperlink, your browser will

display a new Webpage or another area on the same page.

A one-to-one database table relationship can best be described as a table relationship in which: This

each record in Table A can have only one matching record in Table B, and vice versa.

A SWOT analysis is an integral part of the planning phase because it allows you to:

evaluate your organization's or team's strengths to determine whether they will assist you in accomplishing the project objectives.

Patrick wants to search for Fender guitars other than Stratocasters. He plans to use a keyword search engine. He does not want to see any results for Stratocaster guitars, only other Fender models. Which of the following search strings should he use?

guitar Fender !Stratocaster

What is the starting component of a Web page's Uniform Resource Locator (URL)?

http://

Which part of this address represents the protocol being used to send the page information from the server to the computer of the user who requested it? http://www.CIWcertified.com/Courses/Web_Foundations/iba.htm

http://

A critical first step in the initiating phase of a project is to conduct a needs analysis, which:

identifies the problems or desires that the project must resolve or address.

Frankie works on the IT team at her company. She is looking for ways to reduce costs, so she suggests that the company uses P2P to facilitate sharing of information, instead of maintaining servers with FTP access. To protect its confidential data while benefiting from P2P, the company should:

implement technologies that will control access and password-protect files.

Spam can be considered an invasion of privacy because:

it is sent to recipients uninvited.

If you have set up Web-based email, you can:

log on and check your email from any computer that has Internet access.

Internet domain names sometimes use a country-level domain, or country code, to identify the geographical region in which the Internet organization or address is based. Which address demonstrates the proper syntax for a country-level domain?

londontimes.co.uk

You avoid adding yourself to unwanted mailing lists, you conduct online transactions through secure Websites, and you are selective when posting on social media. These actions will help you:

minimize the amount of spam you receive.

Using the Boolean OR operator with keywords in a search means that the search results:

must include at least one of the keywords.

A many-to-many database table relationship can best be described as a table relationship in which:

one record in Table A can relate to many matching records in Table B, and vice versa.

During the closing phase of every project, the project manager should perform a formal project review with the project team. The project review provides an opportunity to:

test the product, evaluate performances and document lessons learned.

In project management, an assignment is:

the appointment of a person, department or device to a unit of work.

All IT professionals are faced with ethical and legal issues related to:

the security of network and individual computer use by employees.

You make it a point to send email messages, text messages and instant messages that are considered "safe for work." This is a good way to ensure that your messages:

will not be construed as sexual harassment.

Which part of this address represents the server name on which this page resides? http://www.CIWcertified.com/courses/iba.htm

www


Related study sets

Chapter 21: America and the Great War, 1914-1920

View Set

Securities Markets and Investment Companies

View Set

REVIEW: Perimeter, Circumference, & ALL Area

View Set

2.2 Por and para: 1 - Para éste o por aquello

View Set