Exam 5: CIW Web Foundations Associate
Exam 1: CIW v5 Site Designer83 Questions
Exam 2: CIW E-Commerce Designer86 Questions
Exam 3: CIW v5 Database Design Specialist75 Questions
Exam 4: CIW v5 Security Essentials48 Questions
Exam 5: CIW Web Foundations Associate138 Questions
Exam 6: CIW Internet Business Associate14 Questions
Exam 7: CIW Site Development Associate15 Questions
Exam 8: CIW Network Technology Associate8 Questions
Exam 9: CIW User Interface Designer49 Questions
Exam 10: CIW JavaScript Specialist30 Questions
Select questions type
You just received a joke that was c-mailed to you by a co-worker. You find the joke funny and consider forwarding it to another co-worker that you trust. Which human resources issue do you risk by forwarding the e-mail message?
Free
(Multiple Choice)
4.9/5
(28)
Correct Answer:
C
Prior to HTML5, structuring a Web site using style sheets with the <dlv> tag and its, attribute has been an acceptable practice to govern the document's structure. With the emergence of HTML5, what five new elements were introduced for more effectiveness?
Free
(Multiple Choice)
4.8/5
(29)
Correct Answer:
A
Marsha's boss directed her to create a mobile version of the company's Web site. To ensure her mobile site is optimized, Marsha eliminates banners and advertisements. What other recommendations should Marsha follow?
Free
(Multiple Choice)
4.8/5
(42)
Correct Answer:
B
You opened an e-mail attachment and it launches a virus. The virus takes control of your system and you are unable to run your anti-virus software. Which of the following is the best step for you to take next?
(Multiple Choice)
4.9/5
(31)
Acme Company has been receiving complaints from its suppliers saying that its extra net site does not render correctly in all their employees' browsers. The suppliers are asking that the extra net site be fixed so that everyone can access it, regardless of browser type. When examining this problem, the Acme Web Development team finds that many developers worked on the site and each used code that he or she was comfortable with. To resolve this problem, what can the Acme developers do?
(Multiple Choice)
4.9/5
(36)
Marcella is looking for a very unique product online. She has found one on the XYZ Company's Web site, which is designed well and appears to be legitimate. As she navigates through the checkout process, she reaches the checkout page with this URL, which asks her to enter her credit card information: http://XYZ.com/gp/checkout.html/ref=chk_out_TLS12B_lb?ie=IJTFB&docld=10007931 Why should Marcella cancel her online transaction instead of proceeding?
(Multiple Choice)
4.8/5
(34)
You have 20 remote employees flying in to attend a corporate meeting. The morning of travel day, the administrator tells you that the hotel reservations have changed. What is the best way to send each traveling employee a quick message with the new hotel information?
(Multiple Choice)
4.8/5
(39)
You are a computer technician supporting a small 15-computer Internet lab. The computers are regularly used to browse the Internet and download files. Users have recently complained that they receive error messages saying the hard disk is full or out of space. You suspect this is a result of a large amount of temporary Internet files. Which of the following is a way to easily delete all the temporary Internet files?
(Multiple Choice)
4.9/5
(29)
Henry is the network manager at XYY Corporation, a large manufacturing company that competes in the global market. The company's computing environment is extremely complex and includes several proprietary software systems, all of which require custom configuration of network devices to operate correctly. The company's executive management team believes that they can benefit by switching the company over to any cloud-based service. Henry disagrees. What is a disadvantage of cloud-based services that Henry can cite to support his position?
(Multiple Choice)
4.9/5
(35)
You want to enable wireless security on your Android device and your Linux system. Which of the following is a disadvantage of Wired Equivalent Privacy (WEP)?
(Multiple Choice)
4.9/5
(34)
To reduce the costs of maintaining servers with FTP access; your company is using P2P to facilitate sharing of information. Which strategy should your company use to protect the company's sensitive information while capitalizing on the benefits of P2P power?
(Multiple Choice)
4.8/5
(36)
You can use the HTML <input>, <select> and <text area> tags to create form fields in a Web page by placing them between the <form> /form> container tags. Which attribute is used with the <input> element to designate the fields that will appear in the form?
(Multiple Choice)
4.9/5
(37)
You are the technology coordinator for a small multi-national corporation with offices in Los Angeles, New York, Tokyo and London. You have been asked to coordinate a live and interactive meeting that will allow executives from each of the offices to meet virtually and share presentations. What is the best way to achieve this desired goal?
(Multiple Choice)
4.8/5
(41)
You need to center and indent a quote on your Web page. Which is the best way to accomplish this using HTML5?
(Multiple Choice)
4.8/5
(35)
Michelle wants to search for a scuba regulator. She plans to use a keyword search engine. She does not want to see any results from the manufacturer named Scubapro. Which of the following search strings should she use?
(Multiple Choice)
4.8/5
(30)
A friend has called you about a possible computer problem because her computer is acting strangely. Sounds play unexpectedly, the monitor turns off suddenly, the hard-drive light flashes constantly, the computer sometimes reboots itself without warning. When you inspect your friend's system, you notice that several ports are open. Which of the following is most likely the cause of these symptoms?
(Multiple Choice)
4.8/5
(48)
Which type of attack involves the installation of malicious code on personal computers or servers that redirects Internet traffic from a legitimate Web site to an identical-looking but malicious imposter Web site?
(Multiple Choice)
4.9/5
(35)
Marion has been hired by a popular national salon business to refresh its existing Web site and update it to valid HTML5 code. Money is not an issue, but time is. Marion is asked to complete the project within eight weeks. The site currently includes 10 pages and connects to a back-end database so that customers can sign in for a personalized experience. Marion suspects that most of the existing code will need to be replaced. Marion must ensure that she has plenty of time for the testing phase, so she needs to complete the planning phase, in which she selects the multimedia for the site, within the next couple days. Which strategy should Marion use in the planning phase?
(Multiple Choice)
4.9/5
(33)
Carlos is the Information Technology (iT) administrator for a small company. Over the past year, employees have been using their personal mobile devices and smart phones for business use. This has reduced costs of purchasing new devices for employees. Carlos is now considering whether he should stop supplying employees with company phones and instead require all employees to use their personal smart phones for work. How can Carlos address the most significant security vu inerrability?
(Multiple Choice)
4.9/5
(36)
You have recently purchased a new wireless router. You would like to configure a name for your wireless network so that you can easily identify it when scanning available wireless networks. Which term describes this wireless network device name?
(Multiple Choice)
4.9/5
(39)
Showing 1 - 20 of 138
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)