IT studying for certification
Terms in this set (45)
Which result reflects an IT project that is poorly managed?
Project tasks take longer to complete, requiring more company resources and money
You work with UNIX workstations and want to install a Web browser specific to your environment. Which browser should you install? lynx or konqueror
Intranets and extranets can both be considered subsets of the Internet. Which statement best describes the difference between intranets and extranets?
Intranets are used within corporations by employees, whereas extranets are used by corporations for non-public customer support.
If you use your Web browser's built-in FTP client, which FTP command would you need to use to download a file from your company's FTP site?
You would not need to use any FTP commands
Which protocol is the data transmission standard for the Internet, responsible for sending information from one computer to another using uniquely identifying addresses?
What is the most important consideration in data modeling?
The database's ability to process data
You want to create a new Web site that contains content and scripts from other Web sites and blend them in an innovative fashion that you have yet to see in any other site on the Web. Which term describes your proposed Web site?
A critical first step in the initiating phase of a project is to conduct a needs analysis, which:
identifies the problems or desires that the project must resolve or address.
Consider the following address:
Which term best describes this address type?
Which type of URL gives an abbreviated path to a resource using the current page as a starting position?
A domain name consists of letters (and sometimes numbers) separated by periods. Which of the following is the host name component of a domain name?
The left-side component of the domain name, which categorizes domains into groups by server name
Some Internet practices are illegal (they violate laws and are punishable), whereas other practices may be legal but are still unethical and should be avoided. Which of the following practices is both legal and ethical?
Trying shareware for free and paying for it only after you decide to keep using it.
are seminars that only go one way
seminars that usually can go both ways
audio or video conference
Nancy is using a Web browser on her desktop computer to place some bids on a popular online auction site. She decides that she wants to browse to the CIW site without closing her browser. What is the most efficient way to do this?
By typing the CIW site's URL (www.CIWcertified.com) in the address bar of her Web browser
Your IT department enforces the use of 128-bit encryption on all company transmissions. Your department also protects the company encryption keys to ensure secure transmissions. Which choice lists an important reason for encrypting the company's network transmissions?
Preventing data from being intercepted by malicious outsiders
Because file attachments may contain malicious code that can be used to damage or infiltrate systems, your company routinely scans all file attachments in incoming e-mail. Where does attachment scanning take place?
At the server, usually just after the message has been received via SMTP
Which file format is a popular, customizable graphics format commonly used for medical imaging and desktop publishing?
Which of the following search engines was the first to determine a site's relevance based upon the number of links that point to it, in addition to ranking its relevance according to keywords you enter?
Which term is used to describe a password-protected, encrypted data file that verifies the identity of the sender of a message?
The graphical "double-helix" representation of DNA
The lessons explaining DNA concepts on the www.DNAftb.org Web site
The level of secrecy offered by encryption is dependent on:
the type of encryption used and the size of the key.
Your company wants to simplify the customer support process for its distributors by enabling them to obtain company forms and reports online. You and your Web team are in charge of implementing this capability. Which Web-based system should you implement?
Stephen is creating video tutorials to sell his company's products. The target audience will consist of company employees using primarily new computers with the Windows operating systems and Internet Explorer 9. Stephen is debating whether to publish the videos using the MP4 or the OGG video format. Both formats are compatible with the HTML5 video element, which he is using in his tutorials. Which of the following would be a reason for Stephen to choose one format over the over?
The MP4 video format is natively supported by Internet Explorer 9 and does not require a plug-in.
Which of the following is a P2P application that you can use to download huge files because it dramatically reduces the demands on networking hardware and bandwidth?
Which statement is true regarding a virus attack on your system?
Most viruses can be halted after they commence an attack and can be removed without permanent damage to your system.
Instead of purchasing software and hardware that must be maintained by internal resources, more and more small businesses today are choosing hosted solutions with a monthly subscription fee and outsourced system maintenance. Which term is commonly used for this business model?
Software as a Service
What is the term for the part of a browser responsible for reading and processing programming languages?
Frankie works on the IT team at her company. She is looking for ways to reduce costs, so she suggests that the company uses P2P to facilitate sharing of information, instead of maintaining servers with FTP access. To protect its confidential data while benefiting from P2P, the company should:
implement technologies that will control access and password-protect files.
Which term is used to describe the component that relates multiple tables of information in a relational database?
Which IT job role best describes an individual who is responsible for the organization and appearance of a Web site?
Which protocol is often used to publish Web pages to a Web server?
File Transfer Protocol (FTP)
Using command-line FTP on a Windows system, how do you gain access to an FTP server?
Enter the "open" command at the MS-DOS prompt.
You have created a new software application and are ready to distribute it to other users. You have decided to license the software according to the GNU GPL version 3. What does this license allow you to do with your software?
Your software is available for free use and alteration by other programmers, who must then make their modified versions freely available as well
A relational database record can best be described as:
a collection of information consisting of one or more related fields about a specific entity.
A database can best be described as:
a collection of data that can be sorted and searched using search algorithms.
In a relational database, what distinguishes a primary key from other database components?
The primary key uniquely identifies each record in a database table.
Which of the following statements best describes open-source licenses?
They enable users to modify and redistribute software source code without restriction.
After you have found the information you need on the Web, you must still evaluate its accuracy and value. To determine whether information is reliable or factual, you should:
consult authoritative peer-reviewed resources.
The Flash Player allows browsers to play Flash movies, which are animations created using vector graphics. What are vector graphics?
Mathematical shapes saved as a sequence of vector statements, which describe a series of points to be connected
Juan is preparing to give a presentation to his company's managers about the cloud-computing services that his department is planning to implement. He considers the possible objections that his managers might have to using cloud services for the company. What disadvantage of cloud services should he be ready to discuss?
Marja works for a small but growing company. She has been assigned to make several international sales trips to visit prospective customers. The company does not have an enterprise mail server with Web mail access. Her IT department is looking for a solution so that Marja can check her e-mail as she travels. Which of the following should the company choose for the most effective, economical and efficient solution?
Configure a free Web-based e-mail account that Marja can access anywhere, and forward her e-mail to that account while she travels.
What is contained in your e-mail application's Outbox folder?
Messages that are queued for sending
A Uniform Resource Locator (URL) is an Internet address that performs which task?
Identifies the method by which an Internet resource is accessed
YOU MIGHT ALSO LIKE...
Test Preparation TOEIC, SAT, TOEFL
IBA Practice Exam Tech
IBA Practice Help
OTHER SETS BY THIS CREATOR
THIS SET IS OFTEN IN FOLDERS WITH...
IBA 1.07 Quiz
IBA 1.15 Quiz