Study sets, textbooks, questions
Upgrade to remove ads
Terms in this set (57)
Which of the following is a legal and ethical practice?
Trying shareware for free and paying for it only after you decide to keep using it
Irena is reviewing several promotional product videos from her companys marketing
department before they are published on the companys Web site. The videos are in
RealMedia format, but they do not open in Irenas Windows Media Player. What should
Irena do in order to view the videos?
Convert the video files to the WMV format, because RealMedia files will not play in Windows Media Player.
You are leading a team of new hires and need to train them on innovative strategies and
technologies that will be used to develop an upcoming project. You send several e-mail
messages with links to helpful resources. But you soon realize this is an inefficient way to
organize and share this information. Which solution would provide a more efficient way to
categorize and share this information?
The official CIW Web site has an IP address of 22.214.171.124. Which technology allows
Web users to enter the URL www.CIWcertified.com in the browser address bar to access
the site, instead of having to remember and enter the IP address?
Your customer scheduled a meeting to discuss a project you are managing. Early testing
indicates that there are currently quality problems with some of the more complex features.
The customer stated that quality and budget are his two main concerns: The project must
be developed within budget and must be very high quality. When you asked the customer if
he would be willing to extend the deadline to meet his objectives, he stated this was not
What adjustment to the project triangle components can you suggest to meet your
Suggest that the scope be limited to include only the most important features.
Gabby suspects that an attacker has gained control of her system. Which of the following is
the most appropriate action for her to take?
Unplug the computer network cable and/or disable the computer's wireless NIC
Raoul has received a file attachment from a known individual. He has no reason to expect
files from this individual. Which of the following is an effective security strategy for Raoul to
Before opening the attachment, call or send a text or instant message to the individual to verify that he or she meant to send it.
You have just checked the balance in your bank account by logging into your banks Web
site. Which protocol was most likely used for the transmission of your information?
You just received a joke that was c-mailed to you by a co-worker. You find the joke funny
and consider forwarding it to another co-worker that you trust. Which human resources
issue do you risk by forwarding the e-mail message?
Offending a recipient who receives the joke as a result from further forwarding
You just started a small business and need to create a logo. Although you are technically
savvy, your artistic creativity is limited. You decide to launch a contest to seek creative
ideas for your logo. Using the Internet and social networking in this manner is known as:
You are the technology coordinator for a small multi-national corporation with offices in Los
Angeles,NewYork, Tokyo and London. You have been asked to coordinate a live and
interactive meeting that will allow executives from each of the offices to meet virtually and
share presentations. What is the best way to achieve this desired goal?
Digital signatures verify the integrity of the data, verify the identity of the sender, and:
One of your co-workers calls you to ask if you sent her an e-mail message with an
attachment. You recall that you sent several c-mails with attachments earlier that day.
Which of the following is your best response to this question?
Ask your co-worker to read the e-mail message including the full name of the attachment and its extension
You have just finished designing a Web site to support a charity organizations fund-raising
efforts. You need to meet with the board members to get their feedback and address some
questions before you implement the final design. The board members are dispersed
throughout the country and want to avoid spending charity funds on traveling to this
meeting. Which of the following solutions would best support the charity and provide you
with an opportunity to discuss the design as a group?
Plan a Web conference using a service such as WebEx or GoToMeeting that supportsscreen sharingand phone conferencing.
A friend just sent you a link to a Facebook page with information that you find very useful.
You want to be able to recall the site in the future from your desktop computer, or from your
mobile device while away from your desk. Which is the best approach?
Add the link to a cloud-based bookmark service such as Delicious or Google Bookmarks.
You are a software developer who wants to start developing mobile apps for smartphones.
You have the option to develop apps for an open-source operating system. Which of the
following could persuade you to focus your development efforts on the open-source
The operating system and associated development tools are free, provided you comply with the copyleft license.
Melanie works in the sales department at XYZ Company. She decides that her companys
marketing team has done a poor job representing the companys brand. Without direction
or permission, she starts her own social networking account to help. This accounts name
is called XYZProfessional. To customize her page, she uses company logos and verbiage
from the company Web site. She then begins communicating with customers and
individuals interested in XYZ via this service. Which of the following would be the most
appropriate response to Melanies actions by the company?
Terminating Melanies employment for copyright and trademark violation, with a cease- and-desist letter asking for control of the account
Which choice lists the required elements for HTTP to function?
Client, server and TCP/IP
Which is the preferred approach to communicate important action items in an e-mail
message to a co-worker?
List the action items in a numbered or bulleted list for clarity.
You are using an e-mail client that you are unfamiliar with. You need to send an e-mail with
an attachment but you do not see a feature labeledattachmentanywhere on the client.
What icon should you look for that is commonly used to invoke the e-mail attachment
Your childs high school has created a wiki for its social science classes to support blogs
and collaborative projects. Your child also contributes photos of extracurricular events to
the schools Facebook site. Which term collectively describes these types of Web usage?
Michelle wants to search for a scuba regulator. She plans to use a keyword search engine.
She does not want to see any results from the manufacturer named Scubapro. Which of
the following search strings should she use?
Andrea works as an Administrative Assistant for a small business that uses an SaaS
service for accounting, sales orders and customer service information about the businesss
customers. This product is similar to Salesforce.com and its competitors. Andrea makes
sure she saves accuraterecords about current projects and performs regular backups of
the business data stored on the cloud-based service. Which of the following is the primary
reason for this practice
If there is an interruption in Internet access, the service and records would not be accessible
As a project manager, you have to balance three elements that compose the project
triangle. Suppose your customer requests that you add some new requirements to the
project when you are halfway through. If you agree to this request, how would it affect other
aspects of the project?
Cost of the project will increase
You are expecting a very important file from a co-worker in a remote office to be sent to
you through e-mail. You finally call the co-worker and tell him that you have not received
the file. He informs you that he sent the file yesterday, but will send it again immediately.
After some time, you still have not received his e-mail message. You contact the Technical
Support department and ask them for help. After some investigation, Technical Support
finds the e-mail from your coworker with an attachment named salesnumbers.exe in the
spam folder of your e-mail client. What is the most likely reason that the e-mail message
was filtered out
File attachments with an .exe extension may contain malicious code.
Proprietary information for your companys online business was released to a competitor.
Which of the following preventative measures should your company take to ensure that its
proprietary information is protected in the future
The App-A-Day company offers software applications for various topics. When a customer
purchases a desired application from the App-A-Day online store, he is directed to a page
where he can download the application directly. When the customer is redirected and
begins downloading the application, which specific standard protocol is most likely
transferring the application?
What is the difference between a computer virus and a worm?
A worm can replicate by itself, whereas a virus requires user action to replicate
Paul has just finished a very important sales meeting with a potential customer and he
needs to update his supervisor at the corporate office, which is located in another country.
Paul is debating whether to text or e-mail his supervisor about the meeting details. Which
of the following would be the best practice for communicating with his supervisor?
Send a brief text message update now, and then send the meeting details in an e-mail message later.
When using secure authentication, which of the following are required?
A user name, a password and encryption of transmitted data
Which organization is responsible for managing domain names so that each one is unique,
and (once registered) cannot be used by an unauthorized individual or organization?
You attend an online university that offers seminars on APA Style through its Writing
Center. You registered for the seminar and learn that the training will be provided over the
Web. Although there is no opportunity to ask questions, you find the live lecture to be
engaging. Which Webbased meeting format was used
You have 20 remote employees flying in to attend a corporate meeting. The morning of
travel day, the administrator tells you that the hotel reservations have changed. What is the
best way to send each traveling employee a quick message with the new hotel
Send a text message with the hotel information to the mobile phone of each traveler.
Marcella is looking for a very unique product online. She has found one on the XYZ
Companys Web site, which is designed well and appears to be legitimate. As she
navigates through the checkout process, she reaches the checkout page with this URL,
which asks her to enter her credit card information:
Why should Marcella cancel her online transaction instead of proceeding?
Because the link does not use SSL/TLS encryption and therefore the information Marcella enters would not be secure
You accidentally dropped your mobile phone, which was submerged in water and no longer
works. Upon replacing the phone with an upgraded unit you must reconfigure many of the
services. The instructions say that all you need to do is enter your e-mail address and the
unit will configure the e-mail client for you. Even though you have tried this several times, it
does not work. The mobile phone vendor says that because you are trying to sync your e-
mail account with an enterprise mail server, you will need to configure the e-mail client
manually. Which choice lists the information you will need to configure the e-mail client?
E-mail address, SMTP, POP3, user name and password
Which of the following strategies will help protect your computer against virus attacks?
Update the definitions for your malware protection application frequently.
Robertos company is releasing updates to a specific product. He needs to educate the
companys sales managers, who are located in various international locations, about the
new product updates. Which of the following methods would be the most economical and
efficient solution for Roberto to discuss the required information with the sales managers
Schedule a Webinar with the sales managers so that the updates can be demonstrated and any questions answered with the entire group.
Which of the following strategies is recommended when conducting keyword searches
Use nouns instead of verbs for keywords
You are configuring an e-mail client to connect to your e-mail account. Which of following is
required to set up the e-mail account?
Selena needs to send a message to her manager providing all the details of a business
proposal. The idea they have discussed is critical to the business. The project is
considered urgent and confidential. Selena wants to get this outline to her manager as
quickly as possible. What would be the most appropriate way Selena could use an SMS
(text) message in relation to this proposal?
To alert her manager that she has sent the proposal via e-mail so her manager can view the proposal as soon as possible
Xues company has provided her with a desktop computer to use at work. She has
configured her e-mail client on this work computer to include her personal e-mail account
so that she can conveniently download messages and check her personal e-mail. Xue
should be aware that:
The company will have access to her personal e-mail messages.
You have volunteered to give a presentation to the parents at your childs school about the
dangers of the Internet. Which of the following would you include in your recommendations
Warn children to never provide personal information over the Internet.
Which of the following is used to help non-technical users collectively classify and find
information on a site?
You use a proprietary Windows-based program to generate architectural drawings and
plans for your freelance drafting business. You have a personal Web site and would like to
share samples of your work for potential new customers to review. To which file format
should you convert your drawings so that they are viewable regardless of the local
operating system used by the individual viewing your site?
Evonka is listening to music from an online music provider (such as Pandora or Jango).
She builds a list of music preferences, including favorite songs. The music service then
suggests additional songs she might enjoy. The music provider is an example of a cloud-
computing application that uses a technology for collaborative filtering, which helps define
the list of songs available to listeners. Which term describes this technology
Aisha is preparing to give a presentation to management about the development of
cloudcomputing services that her company is planning to implement. Which of the following
might her managers mention as a possible objection or drawback to using cloud services
for the company?
Emelia and Lola have created a new software application that allows messaging site
subscribers to analyze the message statistics in order to more easily assess and interact
with followers. They have decided to license this software according to the GNU GPL
Version 3. What does this license allow them to do with their software?
The software enters the public domain for free use and can be altered by other programmers, who must then make their changes freely available as well.
A paradigm shift has occurred in the way that small businesses use software applications.
Companies increasingly choose hosted solutions with a monthly subscription fee and
outsourced system maintenance, instead of purchasing software and hardware that must
be maintained by internal resources. This business model is commonly referred to as:
Software as a Service
Consider the following address:
Which part of the URL represents the server name on which this page resides?
You received an e-mail message on which several other individuals were copied. You want
to respond to this message in a way that will include everyone who was copied on the
original message. You can accomplish this by using which action?
A family member has just sent you an e-mail message that contains highly personal details
abouta family matter. The message was sent to your company e-mail address. The family
member hasrequested that you respond with your ideas about how to resolve the situation.
Which of thefollowing is a reason for you to call your family member and discuss the matter
over the phoneinstead?
Because your employer has the right to read your e-mail
To reduce the costs of maintaining servers with FTP access; your company is using P2P to
facilitate sharing of information. Which strategy should your company use to protect the
companys sensitive information while capitalizing on the benefits of P2P power?
Use technologies that will control access and password-protect files.
Consider the following address:
Which of the following is the best classification for the address?
An end user cannot log in to a page that provides an c-learning course. The authentication
window will not launch. Which of the following is most likely the cause of this problem?
Pop-up blocking software has been enabled in the Web browser.
You opened an e-mail attachment and it launches a virus. The virus takes control of your
system and you are unable to run your anti-virus software. Which of the following is the
best step for you to take next?
Turn off your computer and reboot from a known, clean system disk.
Your Web browser is currently open and displaying a popular sports site. You decide that
you want to browse to the CIW site without closing the browser. What is the most efficient
way to accomplish this?
By typing the CIW sites URL (www.CIWcertified.com) in the address bar of your Web browser
You received a text and a threatening voicemail from an angry customer who wants to
immediately discuss the shortcomings of a recently released product. You are about to
walk into a mandatory meeting with your top-level leadership team. Which of the following
is your best course of action?
Request that the customer send his complaints by e-mail, knowing that any inappropriate communication will be well documented.
Sets found in the same folder
IBA 1.06 Review
CIW IBA Study guide 41 - 60
CIW Web Foundation
Sets with similar terms
CIW Internet Business Associate Study Guide
IBA Certification Test Review
CIW Practice Exam
Other Quizlet sets
QUIZ 8 Neuro
Unit B: Cell Injury and Adaptation
Food animal clinical med
Dr. Wynveen said that the common entry into packs law enforcement is through the job of park ranger. T or F
Which wireless network penetration utility implements deauthentication DoS attacks against 802.11 protocol?
In the movie Minority Report Tom Cruise's character, John Anderton, gets an eye transplant, but keeps his original eyes in order to access his former workplace. This is an example of what technology?
by contrast, the project of this book is to home in one two forms of epistemic injustice that are epistemic in kind, theorizing as consisting, most fundamentally, in a