Exam 5: CIW Web Foundations Associate
Exam 1: CIW v5 Site Designer83 Questions
Exam 2: CIW E-Commerce Designer86 Questions
Exam 3: CIW v5 Database Design Specialist75 Questions
Exam 4: CIW v5 Security Essentials48 Questions
Exam 5: CIW Web Foundations Associate138 Questions
Exam 6: CIW Internet Business Associate14 Questions
Exam 7: CIW Site Development Associate15 Questions
Exam 8: CIW Network Technology Associate8 Questions
Exam 9: CIW User Interface Designer49 Questions
Exam 10: CIW JavaScript Specialist30 Questions
Select questions type
During the initial meeting to plan a new Web site, whose input must be obtained?
(Multiple Choice)
5.0/5
(39)
Which type of attack is a form of social engineering in which an attacker attempts to steal personal or confidential information by sending e-mail that lures unsuspecting victims to log in to an authentic-looking but imposter Web site?
(Multiple Choice)
4.9/5
(42)
Marsha has been hired by XYZ, Inc., to update the company Web site. Marsha discovers that the existing Web pages were structured using tables. Marsha needs to explain to XYZ why the Web site needs to be recoded in HTML5 with CSS controlling the structure of the document. What is the most important reason for using HTML5 and CSS?
(Multiple Choice)
4.8/5
(35)
SuperBank is considering a cloud service from Local Data Center, Inc., to support the bank's expanding needs. SuperBank's managers are concerned about security. What can SuperBank request to protect its data from security threats?
(Multiple Choice)
4.8/5
(43)
Which of the following strategies is recommended when conducting keyword searches?
(Multiple Choice)
4.9/5
(46)
You are a software developer who wants to start developing mobile apps for smartphones. You have the option to develop apps for an open-source operating system. Which of the following could persuade you to focus your development efforts on the open-source operating system?
(Multiple Choice)
4.9/5
(38)
When a developer wants to center a paragraph of text, which code should she use?
(Multiple Choice)
4.9/5
(44)
Selena has decided to change a 32-character unique wireless network name on her wireless router to improve network security after a break-in. She is following advice from CERT to make this change in order to avoid attacks from botnets. Which of the following settings would she modify?
(Multiple Choice)
4.8/5
(40)
What is the biggest security concern with wireless networks?
(Multiple Choice)
4.8/5
(35)
You have been asked to design and develop a Web site for a retirement community. What can you do to help make the site accessible to the elderly?
(Multiple Choice)
4.9/5
(39)
Philip creates a Web form in HTML5, but the data will not process. He has the method attribute included in the <form> element. What is missing?
(Multiple Choice)
4.8/5
(41)
Sam is a professor at a small college. Due to a scheduling conflict, he was unable to obtain access to the computer lab to give the final exam. As an alternative, he asked students to bring their own devices (BYOD) and connect to the college's Wi-Fi for network access. What security risk is associated with this implementation?
(Multiple Choice)
4.7/5
(29)
Sally is a network technician at Acme Corporation. She has been directed to configure the network adapter for a company laptop so that it can be used to connect to the company network and the Internet. What is one of the required TCP/IP settings that she will need to configure?
(Multiple Choice)
4.8/5
(37)
When the user clicks the Submit Query button on a form, the browser sends the information entered in the form to the Web server as a raw text string. The basic element of a raw text string is a name=value pair. A CGI script parses and formats the raw text string into a human-readable format. Which attribute of the form field elements organizes information input by the user into name=value pairs?
(Multiple Choice)
4.8/5
(33)
Which Web-based validation tool is used to validate Cascading Style Sheets (CSS)?
(Multiple Choice)
4.9/5
(41)
Your customer scheduled a meeting to discuss a project you are managing. Early testing indicates that there are currently quality problems with some of the more complex features. The customer stated that quality and budget are his two main concerns: The project must be developed within budget and must be very high quality. When you asked the customer if he would be willing to extend the deadline to meet his objectives, he stated this was not possible. What adjustment to the project triangle components can you suggest to meet your customer's needs?
(Multiple Choice)
4.7/5
(36)
Virtualization software transforms the hardware resources of a physical computer to create a fully functional virtual computer that can run its own operating systems and applications. In addition to the CPU and RAM, which hardware resources are used by virtualization software?
(Multiple Choice)
4.8/5
(22)
You use a proprietary Windows-based program to generate architectural drawings and plans for your freelance drafting business. You have a personal Web site and would like to share samples of your work for potential new customers to review. To which file format should you convert your drawings so that they are viewable regardless of the local operating system used by the individual viewing your site?
(Multiple Choice)
4.9/5
(35)
Andrea works as an Administrative Assistant for a small business that uses an SaaS service for accounting, sales orders and customer service information about the business's customers. This product is similar to Salesforce.com and its competitors. Andrea makes sure she saves accurate records about current projects and performs regular backups of the business data stored on the cloud-based service. Which of the following is the primary reason for this practice?
(Multiple Choice)
4.9/5
(37)
Showing 21 - 40 of 138
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)