Deck 5: CIW Web Foundations Associate

Full screen (f)
exit full mode
Question
You just received a joke that was c-mailed to you by a co-worker. You find the joke funny and consider forwarding it to another co-worker that you trust. Which human resources issue do you risk by forwarding the e-mail message?

A) Forgetting to include others who might find the joke funny
B) Copyright infringement by not providing credit to the originator of the joke
C) Offending a recipient who receives the joke as a result from further forwarding
D) Reducing the effectiveness of spam filters
Use Space or
up arrow
down arrow
to flip the card.
Question
You have volunteered to give a presentation to the parents at your child's school about the dangers of the Internet. Which of the following would you include in your recommendations to parents?

A) Warn children to never provide personal information over the Internet.
B) Direct parents to ask other users in the children's chat rooms to provide identification.
C) Remind the parents that the anonymity of chat rooms provides security.
D) To reduce fear, claim that the threat of predators has been reduced in recent times.
Question
Andrea works as an Administrative Assistant for a small business that uses an SaaS service for accounting, sales orders and customer service information about the business's customers. This product is similar to Salesforce.com and its competitors. Andrea makes sure she saves accurate records about current projects and performs regular backups of the business data stored on the cloud-based service. Which of the following is the primary reason for this practice?

A) If there is an interruption in Internet access, the service and records would not be accessible.
B) There is a limit on the number of users who are allowed to access the cloud-based service at any one time.
C) Data stored online through the cloud-based service is more at risk to security breaches than if it were stored locally.
D) Andrea is overly cautious because it is well known that cloud-based services are highly secure, highly reliable and always available.
Question
Marion is formatting a simple Web page. She has been asked to create headings before the first and third paragraphs. To accomplish this most efficiently, which type of HTML elements should Marion use?

A) Text-level elements
B) Block quote elements
C) Fixed-width font elements
D) Paragraph-level elements
Question
You attend an online university that offers seminars on APA Style through its Writing Center. You registered for the seminar and learn that the training will be provided over the Web. Although there is no opportunity to ask questions, you find the live lecture to be engaging. Which Webbased meeting format was used?

A) Web conference
B) Video conference
C) Webinar
D) Blog
Question
Selena has run out of memory on her phone's SD card. She has decided to store the files she has accumulated on a third-party cloud service provider's drives. Which of the following is a typical issue that she may encounter?

A) The files become corrupted due to an attack from a hacker botnet.
B) The files become unavailable whenever Internet connectivity is lost.
C) The files become unavailable because they are being shared with other users.
D) The files become corrupted because the provider uses a proprietary compression algorithm during transit.
Question
An end user cannot log in to a page that provides an c-learning course. The authentication window will not launch. Which of the following is most likely the cause of this problem?

A) Pop-up blocking software has been enabled in the operating system.
B) The browser has recently had its cookie cache cleared.
C) The browser has recently had its browsing history cleared.
D) Pop-up blocking software has been enabled in the Web browser.
Question
You just started a small business and need to create a logo. Although you are technically savvy, your artistic creativity is limited. You decide to launch a contest to seek creative ideas for your logo. Using the Internet and social networking in this manner is known as:

A) folksonomy
B) outsourcing
C) crowd sourcing
D) social engineering
Question
You are developing a Web site in HTML5. You want the new HTML5 structural elements (such as
or
) to be styled consistently in all browsers. You must add a CSS rule that will change them to which element type, to ensure the site will render successfully?

A) Inline
B) Script
C) Fixed
D) Block
Question
When a PC computer device wants to communicate with the processor, which system resource does it use?

A) I/O
B) DMA
C) PIO
D) IRQ
Question
A friend has called you about a possible computer problem because her computer is acting strangely. Sounds play unexpectedly, the monitor turns off suddenly, the hard-drive light flashes constantly, the computer sometimes reboots itself without warning. When you inspect your friend's system, you notice that several ports are open. Which of the following is most likely the cause of these symptoms?

A) The computer has been infected with a polymorphic virus.
B) The computer is experiencing a denial-of-service attack.
C) The computer has been infected with an illicit server.
D) The computer has been infected by a worm.
Question
On your Windows laptop, you store all your vacation photos and your entire digital music library. Concerned about data loss, you perform frequent backups. Your laptop has recently been stolen and you need to restore your files to a desktop computer. Which Windows tool would you use to recover and set up the saved copies of your files onto your desktop computer?

A) Backup and Restore
B) Backup Recovery
C) System Recovery
D) System Restore
Question
Jose is experiencing performance problems with his notebook computer that he purchased a year ago. Upon discussing this issue with him, you learn that he has never deleted any temporary files since owning the device. What can Jose do to fix this problem most efficiently?

A) Reformat his hard drive.
B) Use the Windows chkdsk utility.
C) Use the Windows Disk Cleanup utility.
D) Back up his computer and delete the active partition.
Question
Which term describes a compact personal computer that relies on a touch screen for in put, generally uses a solid-state drive instead of a traditional hard disk, and relies on wireless or mobile networks for connectivity?

A) Tablet
B) Laptop
C) Netbook
D) Portable media player
Question
Marion has been hired by a small business to determine why its Web site does not attract users. As Marion interviews different members of the company, she learns that when the site was first created, the external Web developer did not produce any documents specifying the basic requirements for the site. As a result, the site did not have a defined purpose and was not designed for the company's audience. Additionally, the site navigation did not make sense from a user's point of view. Marion considers this information, then she recommends that the company create which document?

A) Wireframe
B) Storyboard
C) Marketing slideshow
D) Non-disclosure agreement
Question
Sam is a professor at a small college. Due to a scheduling conflict, he was unable to obtain access to the computer lab to give the final exam. As an alternative, he asked students to bring their own devices (BYOD) and connect to the college's Wi-Fi for network access. What security risk is associated with this implementation?

A) Inability for students to share files
B) Inability for students to back up user files
C) Student devices sending unsecured data
D) Student devices being more susceptible to malware
Question
You have just been hired by a large company, and the IT manager is giving you an overview of the corporate network. He tells you that the corporation is spread out over several cities, and various departments are divided into sub networks that are connected using routers. What type of network are you being shown?

A) Local area network (LAN)
B) Wide area network (WAN)
C) Virtual private network (VPN)
D) Internet Exchange Point (IPX)
Question
During the initial meeting to plan a new Web site, whose input must be obtained?

A) Shareholders
B) Stakeholders
C) Web developers
D) Graphic designers
Question
Server-based networks typically contain centralized network resources, which are usually not available on peer-to-peer (P2P) networks. Which of the following examples describes a server based network?

A) Three network clients connecting to a file server
B) Downloading a file by using Bit Torrent technology
C) Sharing one or more files to another computer via the Internet
D) A client connecting to another computer over the Internet to share music
Question
You are expecting a very important file from a co-worker in a remote office to be sent to you through e-mail. You finally call the co-worker and tell him that you have not received the file. He informs you that he sent the file yesterday, but will send it again immediately. After some time, you still have not received his e-mail message. You contact the Technical Support department and ask them for help. After some investigation, Technical Support finds the e-mail from your coworker with an attachment named salesnumbers.exe in the spam folder of your e-mail client. What is the most likely reason that the e-mail message was filtered out?

A) Messages from remote offices are blocked on internal e-mail.
B) The attachment's file size exceeds the size limits of the e-mail filter policy.
C) File attachments with an .exe extension may contain malicious code.
D) The file name of the attached file exceeds the file name length of the filter policy.
Question
Evonka is listening to music from an online music provider (such as Pandora or Jango). She builds a list of music preferences, including favorite songs. The music service then suggests additional songs she might enjoy. The music provider is an example of a cloud-computing application that uses a technology for collaborative filtering, which helps define the list of songs available to listeners. Which term describes this technology?

A) Bit-torrent r
B) Crowdsourcing
C) Grid computing
D) Software as a Service
Question
Patrick visits his teenage daughter's social media page and discovers several offensive posts about one of her classmates. After speaking with his daughter, Patrick learns that several other girls in her class are upset with the classmate and have been posting, texting and e-mailing others about the girl. What is the best way for Patrick to help his daughter understand cyberbullying?

A) He should advise his daughter to ignore the posts, texts and c-mails.
B) He should explain to his daughter that she is participating in the bullying by accepting others' posts, texts and c-mails.
C) He should explain to his daughter that the Internet embraces freedom of speech, and anyone is allowed to write anything.
D) He should advise his daughter to delete all the posts, texts and c-mails she has received, as well as any new ones that appear.
Question
You use a proprietary Windows-based program to generate architectural drawings and plans for your freelance drafting business. You have a personal Web site and would like to share samples of your work for potential new customers to review. To which file format should you convert your drawings so that they are viewable regardless of the local operating system used by the individual viewing your site?

A) PDF
B) MP3
C) DOC
D) XML
Question
Marsha's boss directed her to create a mobile version of the company's Web site. To ensure her mobile site is optimized, Marsha eliminates banners and advertisements. What other recommendations should Marsha follow?

A) Use images instead of video on the Web site.
B) Use white space to give the site an uncluttered look.
C) Use Flash content to replace lengthy text descriptions.
D) Create several Web sites, each tailored to a specific mobile platform.
Question
What should be your first step when troubleshooting a network connection that uses a cable modem?

A) Ping the proxy server.
B) Ping the default gateway.
C) Ping local devices using their DNS names.
D) Ping local devices using their IP addresses.
Question
When you are using stock images in your Web site, a royalty-free license allows you to:

A) use the images without paying a fee for each use.
B) resell or transfer the images without paying a fee.
C) use the images without purchasing a license.
D) assume copyright of the images.
Question
You have just checked the balance in your bank account by logging into your bank's Web site. Which protocol was most likely used for the transmission of your information?

A) IMAPS
B) HTTPS
C) POP3
D) FTPS
Question
Which type of application allows you to edit and validate your source code and preview your Web pages in multiple browsers?

A) GUI HTML editor
B) HTML text editor
C) Word processor
D) Compiler
Question
Your Web browser is currently open and displaying a popular sports site. You decide that you want to browse to the CIW site without closing the browser. What is the most efficient way to accomplish this?

A) By performing a search on your computer for the term "CIW"
B) By performing a search within the site currently displayed in your Web browser
C) By typing in the FTP address (ftp.CIWcertified.com) in the address bar of your Web browser
D) By typing the CIW site's URL (www.CIWcertified.com) in the address bar of your Web browser
Question
The App-A-Day company offers software applications for various topics. When a customer purchases a desired application from the App-A-Day online store, he is directed to a page where he can download the application directly. When the customer is redirected and begins downloading the application, which specific standard protocol is most likely transferring the application?

A) FTP
B) HTTPS
C) HTTP
D) SMTP
Question
Clyde is working on a Web page for his company's intranet. He wants to insert an HTML comment within the page to let other developers know that the page validates as HTML5 and that he is the page author. Which line of code will insert the comment that Clyde requires?

A) // Clyde Davis. 9/17/2012. This code validates to HTML5
B) <7 Clyde Davis. 9/17/2012. This code validates to HTMLS 7>
C) /* Clyde Davis, 9/17/2012. This code validates to HTML5 */
D)
Question
You have just finished designing a Web site to support a charity organization's fund-raising efforts. You need to meet with the board members to get their feedback and address some questions before you implement the final design. The board members are dispersed throughout the country and want to avoid spending charity funds on traveling to this meeting. Which of the following solutions would best support the charity and provide you with an opportunity to discuss the design as a group?

A) Plan a Web conference using a service such as WebEx or GoToMeeting that supports screensharing and phone conferencing.
B) Plan a Webinar that reviews the layout of the site and request that board members submit their feedback by e-mail after the Webinar.
C) Create a PowerPoint slideshow that contains pictures of your Web site design and create a survey to gather the board members' feedback.
D) Create an audio Webcast and distribute it to the board members over the Internet.
Question
To ensure the maximum cross-browser compatibility and consistent functionality, Web developers should:

A) test their pages in the most used release of each major Web browser.
B) test their pages in the most common browsers, including the most used and latest releases.
C) test their pages in only standards-compliant browsers, including the most used and latest releases.
D) test their pages in the Web browser most commonly used by the site audience, including the most used and latest release.
Question
When using cloud-based services to host company data, a company's disaster recovery plan should include strategies for:

A) creating redundancy and ensuring there is an exclusive contract with the cloud service provider.
B) distributing data and software services across multiple cloud service providers.
C) creating redundancy and using multiple cloud service providers.
D) using a single well-established cloud service provider.
Question
You have 20 remote employees flying in to attend a corporate meeting. The morning of travel day, the administrator tells you that the hotel reservations have changed. What is the best way to send each traveling employee a quick message with the new hotel information?

A) Update the meeting agenda with the hotel information.
B) Post an announcement to the company's Web site with the new hotel information.
C) Call each stakeholder and leave a message with the address of the hotel.
D) Send a text message with the hotel information to the mobile phone of each traveler.
Question
Which set of standards developed by the W3C Web Accessibility Initiative (WAI) project provides a universal set of standards promoting accessibility for all Web users, including those with disabilities?

A) Web Content Accessibility Guidelines
B) User Agent Accessibility Guidelines
C) W3C Authoring Tool Accessibility Guidelines
D) Section 508 of the Rehabilitation Act
Question
Which of the following is a disadvantage of implementing a Bring Your Own Device (BYOD) policy in a company?

A) Increased cost for licensing mobile applications
B) Configuring the corporate e-mail server to work with mobile devices
C) Inability to control access to company data if the device is stolen or lost
D) Providing training for employees on how to use mobile devices with company applications
Question
You can use the HTML , element to designate the fields that will appear in the form?

A) The type attribute
B) The name attribute
C) The value attribute
D) The action attribute
Question
The Windows Device Manager is a tool that enables you to perform a variety of tasks, including:

A) Map to a printer.
B) Ping an IP address.
C) Defragment a hard drive.
D) Change a resource assignment.
Question
Which term describes the practice of actively collecting wireless networking data from companies and individuals?

A) War driving
B) Spear phishing
C) Dictionary attack
D) Social engineering
Question
To define a circle-shaped hot-spot for an image map, which of the following code fragments would you use? <strong>To define a circle-shaped hot-spot for an image map, which of the following code fragments would you use?  </strong> A) Option A B) Option B C) Option C D) Option D <div style=padding-top: 35px>

A) Option A
B) Option B
C) Option C
D) Option D
Question
Which of the following strategies will help protect your computer against virus attacks?

A) Perform regular backups of your hard drive.
B) Open e-mail attachments only from unknown senders.
C) Update the definitions for your malware protection application frequently.
D) Configure security settings for your Web browser to the lowest possible level.
Question
A paradigm shift has occurred in the way that small businesses use software applications. Companies increasingly choose hosted solutions with a monthly subscription fee and outsourced system maintenance, instead of purchasing software and hardware that must be maintained by internal resources. This business model is commonly referred to as:

A) Scalability.
B) Grid computing.
C) Crowd sourcing.
D) Software as a Service.
Question
What does the following represent? 2E22: 4F00: 000E: 00D0:A267:97FF:FE6E:FE34

A) A MAC address
B) AnlPv4address
C) An IPv6 address
D) An IP diagnostic loopback address
Question
SuperBank is considering a cloud service from Local Data Center, Inc., to support the bank's expanding needs. SuperBank's managers are concerned about security. What can SuperBank request to protect its data from security threats?

A) For Local Data Center to run multiple hypervisors
B) For Local Data Center to install a DDoS mitigation system
C) For SuperBank staff to manage the servers at Local Data Center, Inc.
D) For SuperBank to perform background checks on the staff at Local Data Center, Inc.
Question
You want to restrict host access to a wireless access point. What is the best way to do this?

A) Enable MAC address filtering at each host.
B) Log in to the access point and configure features, such as changing the SSID.
C) Change the Direct Sequence Spread Spectrum (DSSS) signal at both the access point and each hosts NIC.
D) Install software on the host you want to limit, then use a Web browser to log in to the host and configure it with the necessary settings to use the access point.
Question
The official CIW Web site has an IP address of 72.44.192.233. Which technology allows Web users to enter the URL www.ClWcert/u/ecl,com in the browser address bar to access the site, instead of having to remember and enter the IP address?

A) SSL
B) DNS
C) HTTP
D) NNTP
Question
Henry is the network manager at XYY Corporation, a large manufacturing company that competes in the global market. The company's computing environment is extremely complex and includes several proprietary software systems, all of which require custom configuration of network devices to operate correctly. The company's executive management team believes that they can benefit by switching the company over to any cloud-based service. Henry disagrees. What is a disadvantage of cloud-based services that Henry can cite to support his position?

A) Cloud-based services provide no maintenance or support.
B) Cloud-based services are typically more costly than in-house solutions.
C) The company must typically purchase additional servers to support connections to these types of cloud-based service providers.
D) Cloud-based services are typically more limited in offerings and configurations than the company currently supports in-house.
Question
What is the difference between a computer virus and a worm?

A) A virus can replicate by itself, whereas a worm requires user action to replicate.
B) A worm can replicate by itself, whereas a virus requires user action to replicate.
C) A worm can deposit an illicit server, whereas a virus cannot.
D) A virus can deposit an illicit server, whereas a worm cannot.
Question
When the user clicks the Submit Query button on a form, the browser sends the information entered in the form to the Web server as a raw text string. The basic element of a raw text string is a name=value pair. A CGI script parses and formats the raw text string into a human-readable format. Which attribute of the form field elements organizes information input by the user into name=value pairs?

A) Type
B) Name
C) Value
D) Input
Question
The capabilities of cellular networks have improved greatly since their original development for analog voice phone calls. Most recently, fourth-generation (4G) wireless supports a variety of data-intensive needs. A benefit of 4G networks is that they:

A) Use spread-spectrum technology to ensure high transmission rates.
B) Provide fast transmission rates equivalent to DSL or broadband-cable.
C) Provide fast transmission rates equivalent to high-speed dial-up connections.
D) Enable bandwidth throttling, allowing the user access to unrestricted download speeds.
Question
Selena has decided to change a 32-character unique wireless network name on her wireless router to improve network security after a break-in. She is following advice from CERT to make this change in order to avoid attacks from botnets. Which of the following settings would she modify?

A) Direct Sequence Spread Spectrum (DSSS) signal
B) Media Access Control (MAC) address
C) Wi-Fi Protected Access 2 (WPA2)
D) Service Set Identifier (SSID)
Question
Acme Company has been receiving complaints from its suppliers saying that its extra net site does not render correctly in all their employees' browsers. The suppliers are asking that the extra net site be fixed so that everyone can access it, regardless of browser type. When examining this problem, the Acme Web Development team finds that many developers worked on the site and each used code that he or she was comfortable with. To resolve this problem, what can the Acme developers do?

A) Edit the code so that it consistently uses uppercase letters.
B) Edit the code in several common browsers before publishing.
C) Edit the code so that it conforms to a single W3C HTML standard.
D) Edit the code so that it follows a single W3C scripting language standard.
Question
Which line of code uses the correct syntax to apply an external CSS style sheet to HTML documents?

A)
B)
Question
Aisha is coding a Web site using a GUI HTML editor. She wants to quickly check her code for errors and compliance with HTML standards as she works. How can she best accomplish this?

A) Render and validate the code using http://validator.w3.org.
B) Render the code with a browser to see if it looks correct.
C) Validate the code using http://validator.w3.org.
D) Validate the code using the GUI Validator.
Question
You need to center and indent a quote on your Web page. Which is the best way to accomplish this using HTML5?

A) Use the
 element.
B) Use the
element.
C) Use the style attribute 1%Iith the

tag.
D) Use the text-align attribute with the

tag.

Question
Raoul has received a file attachment from a known individual. He has no reason to expect files from this individual. Which of the following is an effective security strategy for Raoul to take?

A) Open the file attachment and use anti-virus software to scan it.
B) Before opening the attachment, use anti-virus software to scan the system's hard disk.
C) Make back-up copies of important files so that it is possible to recover them in case of an incident.
D) Before opening the attachment, call or send a text or instant message to the individual to verify that he or she meant to send it.
Question
You are a software developer who wants to start developing mobile apps for smartphones. You have the option to develop apps for an open-source operating system. Which of the following could persuade you to focus your development efforts on the open-source operating system?

A) An open-source license will never be in the public domain.
B) Source code for an open-source app is not viewable and cannot be modified.
C) Open-source operating systems and development tools are free from software bugs and viruses.
D) The operating system and associated development tools are free, provided you comply with the copy left license.
Question
Which of the following is generally a component of a BYOD policy?

A) Scope of control
B) Insurance on devices
C) Maintenance provision
D) Device replacement or upgrade
Question
Which organization is responsible for managing domain names so that each one is unique, and (once registered) cannot be used by an unauthorized individual or organization?

A) ICANN
B) W3C
C) IEFT
D) RFC
Question
Katie developed her corporation's intra net site using proprietary HTML language extensions based on the company's current browser. The company has recently updated its systems to include the use of a new browser. Now the intra net site that Katie developed no longer renders its content consistently. What should Katie do to ensure that this site's content renders consistently regardless of the browser used?

A) Revise the site to include workarounds and hacks for the new browser.
B) Revise the site's markup language in only those areas that are not rendering properly.
C) Update the site using a single language standard consistently, such as HTML5 or XHTML.
D) Update the site using the proprietary language extensions required by the new browser's rendering engine.
Question
When previewing a Web page using a GUI HTML editor, you will:

A) be limited to the default browser on your computer or device.
B) be limited to the browsers installed on your computer or device.
C) receive an error because GUI editors cannot preview pages in a browser.
D) be limited to two browser choices that are installed on your computer or device.
Question
You received an e-mail message on which several other individuals were copied. You want to respond to this message in a way that will include everyone who was copied on the original message. You can accomplish this by using which action?

A) Reply
B) Reply All
C) Forward
D) Send
Question
You are distributing a large video game file using BitTorrent. First, you upload the initial file and make it available via a central server called a tracker. Other users can then connect to the tracker and download the file. Each user who downloads the file makes it available to other users to download. The use of BitTorrent significantly reduces the original provider's hardware and bandwidth resource costs. BitTorrent is an example of what type of network?

A) Centralized network
B) Client-server network
C) Peer-to-peer (P2P) network
D) Virtual private network (VPN)
Question
Michelle wants to search for a scuba regulator. She plans to use a keyword search engine. She does not want to see any results from the manufacturer named Scubapro. Which of the following search strings should she use?

A) Regulators !Scubapro
B) Regulators Scubapro
C) Regulators D) Regulators >Scubapro
Question
Which type of attack is a form of social engineering in which an attacker attempts to steal personal or confidential information by sending e-mail that lures unsuspecting victims to log in to an authentic-looking but imposter Web site?

A) Replay
B) Phishing
C) Spoofing
D) Pharming
Question
Marcella is looking for a very unique product online. She has found one on the XYZ Company's Web site, which is designed well and appears to be legitimate. As she navigates through the checkout process, she reaches the checkout page with this URL, which asks her to enter her credit card information: http://XYZ.com/gp/checkout.html/ref=chk_out_TLS12B_lb?ie=IJTFB&docld=10007931 Why should Marcella cancel her online transaction instead of proceeding?

A) Because the site uses 128-bit encryption, which is illegal for companies that are located overseas
B) Because the link contains abbreviations and is not completely readable, so Marcella is unsure of the server name
C) Because the link does not use SSL/TLS encryption and therefore the information Marcella enters would not be secure
D) Because the link uses SSL/TLS encryption, which Marcella knows is not compatible with the browser she is using
Question
Roberto's company is releasing updates to a specific product. He needs to educate the company's sales managers, who are located in various international locations, about the new product updates. Which of the following methods would be the most economical and efficient solution for Roberto to discuss the required information with the sales managers synchronously?

A) Send the product update blueprints via e-mail to each of the sales managers and ask them to contact him with any questions.
B) Schedule an in-person sales meeting with them at the company headquarters so that the updates can be demonstrated and any questions answered with the entire group present.
C) Schedule a Webinar with the sales managers so that the updates can be demonstrated and any questions answered with the entire group.
D) Post the product update blueprints on the company's Web site and call each sales manager personally to discuss their individual questions or concerns offline.
Question
Sampson has used HTML5 to create a Web page that contains image-based navigation buttons. He would like to add text-based navigation to help ensure accessibility. Which of the following HTML5 elements should he use?

A)
Question
Jenny recently switched from broadband cable Internet to ADSL service with her local phone company. To economize, she chose the self-installation option. It appears that her ADSL modem is not allowing her to connect to the Internet. Which setting should she check first?

A) Loopback address
B) Software version
C) Default gateway
D) Device name
Question
A friend just sent you a link to a Facebook page with information that you find very useful. You want to be able to recall the site in the future from your desktop computer, or from your mobile device while away from your desk. Which is the best approach?

A) Memorize the URL so you can pull up the site in any browser such as Chrome, Firefox or Internet Explorer.
B) Add the link to a cloud-based bookmark service such as Delicious or Google Bookmarks.
C) Manually enter the Web address into any and all browsers on all of your devices.
D) Pull up the message with the link any time you want to view the site.
Question
Gabby suspects that an attacker has gained control of her system. Which of the following is the most appropriate action for her to take?

A) Shut down the computer.
B) Enable strong encryption on all files on the hard disk.
C) Run anti-virus software on all disks associated with this system.
D) Unplug the computer network cable and/or disable the computer's wireless NIC.
Question
You are leading a team of new hires and need to train them on innovative strategies and technologies that will be used to develop an upcoming project. You send several e-mail messages with links to helpful resources. But you soon realize this is an inefficient way to organize and share this information. Which solution would provide a more efficient way to categorize and share this information?

A) Social tagging
B) Grid computing
C) Ajax programming
D) Collective intelligence
Question
A family member has just sent you an e-mail message that contains highly personal details about a family matter. The message was sent to your company e-mail address. The family member has requested that you respond with your ideas about how to resolve the situation. Which of the following is a reason for you to call your family member and discuss the matter over the phone instead?

A) Because your employer has the right to read your e-mail
B) Because e-mail is completely private but not personal enough
C) Because it is illegal to use company e-mail for personal use
D) Because an e-mail message about a personal family matter will violate netiquette guidelines
Question
ABC Company develops its Own database applications. ABC is considering migrating to cloud services to accommodate the company's growth. What strategy should ABC use to ensure continuous data protection if it begins using cloud services?

A) Cloud-only solution
B) Regional systems solution
C) Location systems solution
D) Multiple cloud-service providers
Question
Skylar has been asked by the HR Department to create a Web page for the company's intra net site that compares the company's four different medical insurance plans. To accomplish this effectively in HTML5, Skylar should:

A) use document structure tags to lay out the page and use a table to organize the medical insurance plan information.
B) use JavaScript to lay out the page and use a table within the page to organize the medical insurance plan information.
C) use tables to lay out the page and use the tag inside the table to organize the medical insurance plan information.
D) use CSS to lay out the page and use the
 element to organize the medical insurance plan information.
Question
You are configuring an e-mail client to connect to your e-mail account. Which of following is required to set up the e-mail account?

A) An HTTP address
B) An FTP address
C) ADNS server address
D) A POP3 address
Question
You want to enable wireless security on your Android device and your Linux system. Which of the following is a disadvantage of Wired Equivalent Privacy (WEP)?

A) It enables MAC address filtering.
B) It is easily compromised by hackers.
C) It only supports 56-bit symmetric-key encryption.
D) It is based on the outdated 802.lla wireless standard.
Question
Consider the network configuration shown in the command prompt: <strong>Consider the network configuration shown in the command prompt:   What does the Default Gateway identify?</strong> A) The file server on the network B) The local host on the network C) The computer on the network D) The router on the network <div style=padding-top: 35px> What does the Default Gateway identify?

A) The file server on the network
B) The local host on the network
C) The computer on the network
D) The router on the network
Question
The Internet has enabled many new anti-social activities, such as online stalking, cyber bullying, and addiction to solitary online activities. Which choice is the most feasible way for schools and parents to reduce cyber bullying?

A) Monitor, track and record all online activity conducted by students.
B) Teach teens that the use of online communication is a freedom of expression.
C) Prevent students from accessing the Internet while at school so that they learn good habits.
D) Educate students about cyber-ethics and the consequences of questionable online behavior.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/138
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: CIW Web Foundations Associate
1
You just received a joke that was c-mailed to you by a co-worker. You find the joke funny and consider forwarding it to another co-worker that you trust. Which human resources issue do you risk by forwarding the e-mail message?

A) Forgetting to include others who might find the joke funny
B) Copyright infringement by not providing credit to the originator of the joke
C) Offending a recipient who receives the joke as a result from further forwarding
D) Reducing the effectiveness of spam filters
C
2
You have volunteered to give a presentation to the parents at your child's school about the dangers of the Internet. Which of the following would you include in your recommendations to parents?

A) Warn children to never provide personal information over the Internet.
B) Direct parents to ask other users in the children's chat rooms to provide identification.
C) Remind the parents that the anonymity of chat rooms provides security.
D) To reduce fear, claim that the threat of predators has been reduced in recent times.
A
3
Andrea works as an Administrative Assistant for a small business that uses an SaaS service for accounting, sales orders and customer service information about the business's customers. This product is similar to Salesforce.com and its competitors. Andrea makes sure she saves accurate records about current projects and performs regular backups of the business data stored on the cloud-based service. Which of the following is the primary reason for this practice?

A) If there is an interruption in Internet access, the service and records would not be accessible.
B) There is a limit on the number of users who are allowed to access the cloud-based service at any one time.
C) Data stored online through the cloud-based service is more at risk to security breaches than if it were stored locally.
D) Andrea is overly cautious because it is well known that cloud-based services are highly secure, highly reliable and always available.
A
4
Marion is formatting a simple Web page. She has been asked to create headings before the first and third paragraphs. To accomplish this most efficiently, which type of HTML elements should Marion use?

A) Text-level elements
B) Block quote elements
C) Fixed-width font elements
D) Paragraph-level elements
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
5
You attend an online university that offers seminars on APA Style through its Writing Center. You registered for the seminar and learn that the training will be provided over the Web. Although there is no opportunity to ask questions, you find the live lecture to be engaging. Which Webbased meeting format was used?

A) Web conference
B) Video conference
C) Webinar
D) Blog
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
6
Selena has run out of memory on her phone's SD card. She has decided to store the files she has accumulated on a third-party cloud service provider's drives. Which of the following is a typical issue that she may encounter?

A) The files become corrupted due to an attack from a hacker botnet.
B) The files become unavailable whenever Internet connectivity is lost.
C) The files become unavailable because they are being shared with other users.
D) The files become corrupted because the provider uses a proprietary compression algorithm during transit.
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
7
An end user cannot log in to a page that provides an c-learning course. The authentication window will not launch. Which of the following is most likely the cause of this problem?

A) Pop-up blocking software has been enabled in the operating system.
B) The browser has recently had its cookie cache cleared.
C) The browser has recently had its browsing history cleared.
D) Pop-up blocking software has been enabled in the Web browser.
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
8
You just started a small business and need to create a logo. Although you are technically savvy, your artistic creativity is limited. You decide to launch a contest to seek creative ideas for your logo. Using the Internet and social networking in this manner is known as:

A) folksonomy
B) outsourcing
C) crowd sourcing
D) social engineering
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
9
You are developing a Web site in HTML5. You want the new HTML5 structural elements (such as
or
) to be styled consistently in all browsers. You must add a CSS rule that will change them to which element type, to ensure the site will render successfully?

A) Inline
B) Script
C) Fixed
D) Block
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
10
When a PC computer device wants to communicate with the processor, which system resource does it use?

A) I/O
B) DMA
C) PIO
D) IRQ
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
11
A friend has called you about a possible computer problem because her computer is acting strangely. Sounds play unexpectedly, the monitor turns off suddenly, the hard-drive light flashes constantly, the computer sometimes reboots itself without warning. When you inspect your friend's system, you notice that several ports are open. Which of the following is most likely the cause of these symptoms?

A) The computer has been infected with a polymorphic virus.
B) The computer is experiencing a denial-of-service attack.
C) The computer has been infected with an illicit server.
D) The computer has been infected by a worm.
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
12
On your Windows laptop, you store all your vacation photos and your entire digital music library. Concerned about data loss, you perform frequent backups. Your laptop has recently been stolen and you need to restore your files to a desktop computer. Which Windows tool would you use to recover and set up the saved copies of your files onto your desktop computer?

A) Backup and Restore
B) Backup Recovery
C) System Recovery
D) System Restore
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
13
Jose is experiencing performance problems with his notebook computer that he purchased a year ago. Upon discussing this issue with him, you learn that he has never deleted any temporary files since owning the device. What can Jose do to fix this problem most efficiently?

A) Reformat his hard drive.
B) Use the Windows chkdsk utility.
C) Use the Windows Disk Cleanup utility.
D) Back up his computer and delete the active partition.
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
14
Which term describes a compact personal computer that relies on a touch screen for in put, generally uses a solid-state drive instead of a traditional hard disk, and relies on wireless or mobile networks for connectivity?

A) Tablet
B) Laptop
C) Netbook
D) Portable media player
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
15
Marion has been hired by a small business to determine why its Web site does not attract users. As Marion interviews different members of the company, she learns that when the site was first created, the external Web developer did not produce any documents specifying the basic requirements for the site. As a result, the site did not have a defined purpose and was not designed for the company's audience. Additionally, the site navigation did not make sense from a user's point of view. Marion considers this information, then she recommends that the company create which document?

A) Wireframe
B) Storyboard
C) Marketing slideshow
D) Non-disclosure agreement
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
16
Sam is a professor at a small college. Due to a scheduling conflict, he was unable to obtain access to the computer lab to give the final exam. As an alternative, he asked students to bring their own devices (BYOD) and connect to the college's Wi-Fi for network access. What security risk is associated with this implementation?

A) Inability for students to share files
B) Inability for students to back up user files
C) Student devices sending unsecured data
D) Student devices being more susceptible to malware
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
17
You have just been hired by a large company, and the IT manager is giving you an overview of the corporate network. He tells you that the corporation is spread out over several cities, and various departments are divided into sub networks that are connected using routers. What type of network are you being shown?

A) Local area network (LAN)
B) Wide area network (WAN)
C) Virtual private network (VPN)
D) Internet Exchange Point (IPX)
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
18
During the initial meeting to plan a new Web site, whose input must be obtained?

A) Shareholders
B) Stakeholders
C) Web developers
D) Graphic designers
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
19
Server-based networks typically contain centralized network resources, which are usually not available on peer-to-peer (P2P) networks. Which of the following examples describes a server based network?

A) Three network clients connecting to a file server
B) Downloading a file by using Bit Torrent technology
C) Sharing one or more files to another computer via the Internet
D) A client connecting to another computer over the Internet to share music
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
20
You are expecting a very important file from a co-worker in a remote office to be sent to you through e-mail. You finally call the co-worker and tell him that you have not received the file. He informs you that he sent the file yesterday, but will send it again immediately. After some time, you still have not received his e-mail message. You contact the Technical Support department and ask them for help. After some investigation, Technical Support finds the e-mail from your coworker with an attachment named salesnumbers.exe in the spam folder of your e-mail client. What is the most likely reason that the e-mail message was filtered out?

A) Messages from remote offices are blocked on internal e-mail.
B) The attachment's file size exceeds the size limits of the e-mail filter policy.
C) File attachments with an .exe extension may contain malicious code.
D) The file name of the attached file exceeds the file name length of the filter policy.
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
21
Evonka is listening to music from an online music provider (such as Pandora or Jango). She builds a list of music preferences, including favorite songs. The music service then suggests additional songs she might enjoy. The music provider is an example of a cloud-computing application that uses a technology for collaborative filtering, which helps define the list of songs available to listeners. Which term describes this technology?

A) Bit-torrent r
B) Crowdsourcing
C) Grid computing
D) Software as a Service
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
22
Patrick visits his teenage daughter's social media page and discovers several offensive posts about one of her classmates. After speaking with his daughter, Patrick learns that several other girls in her class are upset with the classmate and have been posting, texting and e-mailing others about the girl. What is the best way for Patrick to help his daughter understand cyberbullying?

A) He should advise his daughter to ignore the posts, texts and c-mails.
B) He should explain to his daughter that she is participating in the bullying by accepting others' posts, texts and c-mails.
C) He should explain to his daughter that the Internet embraces freedom of speech, and anyone is allowed to write anything.
D) He should advise his daughter to delete all the posts, texts and c-mails she has received, as well as any new ones that appear.
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
23
You use a proprietary Windows-based program to generate architectural drawings and plans for your freelance drafting business. You have a personal Web site and would like to share samples of your work for potential new customers to review. To which file format should you convert your drawings so that they are viewable regardless of the local operating system used by the individual viewing your site?

A) PDF
B) MP3
C) DOC
D) XML
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
24
Marsha's boss directed her to create a mobile version of the company's Web site. To ensure her mobile site is optimized, Marsha eliminates banners and advertisements. What other recommendations should Marsha follow?

A) Use images instead of video on the Web site.
B) Use white space to give the site an uncluttered look.
C) Use Flash content to replace lengthy text descriptions.
D) Create several Web sites, each tailored to a specific mobile platform.
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
25
What should be your first step when troubleshooting a network connection that uses a cable modem?

A) Ping the proxy server.
B) Ping the default gateway.
C) Ping local devices using their DNS names.
D) Ping local devices using their IP addresses.
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
26
When you are using stock images in your Web site, a royalty-free license allows you to:

A) use the images without paying a fee for each use.
B) resell or transfer the images without paying a fee.
C) use the images without purchasing a license.
D) assume copyright of the images.
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
27
You have just checked the balance in your bank account by logging into your bank's Web site. Which protocol was most likely used for the transmission of your information?

A) IMAPS
B) HTTPS
C) POP3
D) FTPS
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
28
Which type of application allows you to edit and validate your source code and preview your Web pages in multiple browsers?

A) GUI HTML editor
B) HTML text editor
C) Word processor
D) Compiler
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
29
Your Web browser is currently open and displaying a popular sports site. You decide that you want to browse to the CIW site without closing the browser. What is the most efficient way to accomplish this?

A) By performing a search on your computer for the term "CIW"
B) By performing a search within the site currently displayed in your Web browser
C) By typing in the FTP address (ftp.CIWcertified.com) in the address bar of your Web browser
D) By typing the CIW site's URL (www.CIWcertified.com) in the address bar of your Web browser
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
30
The App-A-Day company offers software applications for various topics. When a customer purchases a desired application from the App-A-Day online store, he is directed to a page where he can download the application directly. When the customer is redirected and begins downloading the application, which specific standard protocol is most likely transferring the application?

A) FTP
B) HTTPS
C) HTTP
D) SMTP
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
31
Clyde is working on a Web page for his company's intranet. He wants to insert an HTML comment within the page to let other developers know that the page validates as HTML5 and that he is the page author. Which line of code will insert the comment that Clyde requires?

A) // Clyde Davis. 9/17/2012. This code validates to HTML5
B) <7 Clyde Davis. 9/17/2012. This code validates to HTMLS 7>
C) /* Clyde Davis, 9/17/2012. This code validates to HTML5 */
D)
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
32
You have just finished designing a Web site to support a charity organization's fund-raising efforts. You need to meet with the board members to get their feedback and address some questions before you implement the final design. The board members are dispersed throughout the country and want to avoid spending charity funds on traveling to this meeting. Which of the following solutions would best support the charity and provide you with an opportunity to discuss the design as a group?

A) Plan a Web conference using a service such as WebEx or GoToMeeting that supports screensharing and phone conferencing.
B) Plan a Webinar that reviews the layout of the site and request that board members submit their feedback by e-mail after the Webinar.
C) Create a PowerPoint slideshow that contains pictures of your Web site design and create a survey to gather the board members' feedback.
D) Create an audio Webcast and distribute it to the board members over the Internet.
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
33
To ensure the maximum cross-browser compatibility and consistent functionality, Web developers should:

A) test their pages in the most used release of each major Web browser.
B) test their pages in the most common browsers, including the most used and latest releases.
C) test their pages in only standards-compliant browsers, including the most used and latest releases.
D) test their pages in the Web browser most commonly used by the site audience, including the most used and latest release.
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
34
When using cloud-based services to host company data, a company's disaster recovery plan should include strategies for:

A) creating redundancy and ensuring there is an exclusive contract with the cloud service provider.
B) distributing data and software services across multiple cloud service providers.
C) creating redundancy and using multiple cloud service providers.
D) using a single well-established cloud service provider.
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
35
You have 20 remote employees flying in to attend a corporate meeting. The morning of travel day, the administrator tells you that the hotel reservations have changed. What is the best way to send each traveling employee a quick message with the new hotel information?

A) Update the meeting agenda with the hotel information.
B) Post an announcement to the company's Web site with the new hotel information.
C) Call each stakeholder and leave a message with the address of the hotel.
D) Send a text message with the hotel information to the mobile phone of each traveler.
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
36
Which set of standards developed by the W3C Web Accessibility Initiative (WAI) project provides a universal set of standards promoting accessibility for all Web users, including those with disabilities?

A) Web Content Accessibility Guidelines
B) User Agent Accessibility Guidelines
C) W3C Authoring Tool Accessibility Guidelines
D) Section 508 of the Rehabilitation Act
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following is a disadvantage of implementing a Bring Your Own Device (BYOD) policy in a company?

A) Increased cost for licensing mobile applications
B) Configuring the corporate e-mail server to work with mobile devices
C) Inability to control access to company data if the device is stolen or lost
D) Providing training for employees on how to use mobile devices with company applications
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
38
You can use the HTML , element to designate the fields that will appear in the form?

A) The type attribute
B) The name attribute
C) The value attribute
D) The action attribute
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
39
The Windows Device Manager is a tool that enables you to perform a variety of tasks, including:

A) Map to a printer.
B) Ping an IP address.
C) Defragment a hard drive.
D) Change a resource assignment.
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
40
Which term describes the practice of actively collecting wireless networking data from companies and individuals?

A) War driving
B) Spear phishing
C) Dictionary attack
D) Social engineering
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
41
To define a circle-shaped hot-spot for an image map, which of the following code fragments would you use? <strong>To define a circle-shaped hot-spot for an image map, which of the following code fragments would you use?  </strong> A) Option A B) Option B C) Option C D) Option D

A) Option A
B) Option B
C) Option C
D) Option D
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
42
Which of the following strategies will help protect your computer against virus attacks?

A) Perform regular backups of your hard drive.
B) Open e-mail attachments only from unknown senders.
C) Update the definitions for your malware protection application frequently.
D) Configure security settings for your Web browser to the lowest possible level.
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
43
A paradigm shift has occurred in the way that small businesses use software applications. Companies increasingly choose hosted solutions with a monthly subscription fee and outsourced system maintenance, instead of purchasing software and hardware that must be maintained by internal resources. This business model is commonly referred to as:

A) Scalability.
B) Grid computing.
C) Crowd sourcing.
D) Software as a Service.
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
44
What does the following represent? 2E22: 4F00: 000E: 00D0:A267:97FF:FE6E:FE34

A) A MAC address
B) AnlPv4address
C) An IPv6 address
D) An IP diagnostic loopback address
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
45
SuperBank is considering a cloud service from Local Data Center, Inc., to support the bank's expanding needs. SuperBank's managers are concerned about security. What can SuperBank request to protect its data from security threats?

A) For Local Data Center to run multiple hypervisors
B) For Local Data Center to install a DDoS mitigation system
C) For SuperBank staff to manage the servers at Local Data Center, Inc.
D) For SuperBank to perform background checks on the staff at Local Data Center, Inc.
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
46
You want to restrict host access to a wireless access point. What is the best way to do this?

A) Enable MAC address filtering at each host.
B) Log in to the access point and configure features, such as changing the SSID.
C) Change the Direct Sequence Spread Spectrum (DSSS) signal at both the access point and each hosts NIC.
D) Install software on the host you want to limit, then use a Web browser to log in to the host and configure it with the necessary settings to use the access point.
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
47
The official CIW Web site has an IP address of 72.44.192.233. Which technology allows Web users to enter the URL www.ClWcert/u/ecl,com in the browser address bar to access the site, instead of having to remember and enter the IP address?

A) SSL
B) DNS
C) HTTP
D) NNTP
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
48
Henry is the network manager at XYY Corporation, a large manufacturing company that competes in the global market. The company's computing environment is extremely complex and includes several proprietary software systems, all of which require custom configuration of network devices to operate correctly. The company's executive management team believes that they can benefit by switching the company over to any cloud-based service. Henry disagrees. What is a disadvantage of cloud-based services that Henry can cite to support his position?

A) Cloud-based services provide no maintenance or support.
B) Cloud-based services are typically more costly than in-house solutions.
C) The company must typically purchase additional servers to support connections to these types of cloud-based service providers.
D) Cloud-based services are typically more limited in offerings and configurations than the company currently supports in-house.
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
49
What is the difference between a computer virus and a worm?

A) A virus can replicate by itself, whereas a worm requires user action to replicate.
B) A worm can replicate by itself, whereas a virus requires user action to replicate.
C) A worm can deposit an illicit server, whereas a virus cannot.
D) A virus can deposit an illicit server, whereas a worm cannot.
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
50
When the user clicks the Submit Query button on a form, the browser sends the information entered in the form to the Web server as a raw text string. The basic element of a raw text string is a name=value pair. A CGI script parses and formats the raw text string into a human-readable format. Which attribute of the form field elements organizes information input by the user into name=value pairs?

A) Type
B) Name
C) Value
D) Input
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
51
The capabilities of cellular networks have improved greatly since their original development for analog voice phone calls. Most recently, fourth-generation (4G) wireless supports a variety of data-intensive needs. A benefit of 4G networks is that they:

A) Use spread-spectrum technology to ensure high transmission rates.
B) Provide fast transmission rates equivalent to DSL or broadband-cable.
C) Provide fast transmission rates equivalent to high-speed dial-up connections.
D) Enable bandwidth throttling, allowing the user access to unrestricted download speeds.
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
52
Selena has decided to change a 32-character unique wireless network name on her wireless router to improve network security after a break-in. She is following advice from CERT to make this change in order to avoid attacks from botnets. Which of the following settings would she modify?

A) Direct Sequence Spread Spectrum (DSSS) signal
B) Media Access Control (MAC) address
C) Wi-Fi Protected Access 2 (WPA2)
D) Service Set Identifier (SSID)
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
53
Acme Company has been receiving complaints from its suppliers saying that its extra net site does not render correctly in all their employees' browsers. The suppliers are asking that the extra net site be fixed so that everyone can access it, regardless of browser type. When examining this problem, the Acme Web Development team finds that many developers worked on the site and each used code that he or she was comfortable with. To resolve this problem, what can the Acme developers do?

A) Edit the code so that it consistently uses uppercase letters.
B) Edit the code in several common browsers before publishing.
C) Edit the code so that it conforms to a single W3C HTML standard.
D) Edit the code so that it follows a single W3C scripting language standard.
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
54
Which line of code uses the correct syntax to apply an external CSS style sheet to HTML documents?

A)
B)
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
55
Aisha is coding a Web site using a GUI HTML editor. She wants to quickly check her code for errors and compliance with HTML standards as she works. How can she best accomplish this?

A) Render and validate the code using http://validator.w3.org.
B) Render the code with a browser to see if it looks correct.
C) Validate the code using http://validator.w3.org.
D) Validate the code using the GUI Validator.
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
56
You need to center and indent a quote on your Web page. Which is the best way to accomplish this using HTML5?

A) Use the
 element.
B) Use the
element.
C) Use the style attribute 1%Iith the

tag.
D) Use the text-align attribute with the

tag.

Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
57
Raoul has received a file attachment from a known individual. He has no reason to expect files from this individual. Which of the following is an effective security strategy for Raoul to take?

A) Open the file attachment and use anti-virus software to scan it.
B) Before opening the attachment, use anti-virus software to scan the system's hard disk.
C) Make back-up copies of important files so that it is possible to recover them in case of an incident.
D) Before opening the attachment, call or send a text or instant message to the individual to verify that he or she meant to send it.
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
58
You are a software developer who wants to start developing mobile apps for smartphones. You have the option to develop apps for an open-source operating system. Which of the following could persuade you to focus your development efforts on the open-source operating system?

A) An open-source license will never be in the public domain.
B) Source code for an open-source app is not viewable and cannot be modified.
C) Open-source operating systems and development tools are free from software bugs and viruses.
D) The operating system and associated development tools are free, provided you comply with the copy left license.
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
59
Which of the following is generally a component of a BYOD policy?

A) Scope of control
B) Insurance on devices
C) Maintenance provision
D) Device replacement or upgrade
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
60
Which organization is responsible for managing domain names so that each one is unique, and (once registered) cannot be used by an unauthorized individual or organization?

A) ICANN
B) W3C
C) IEFT
D) RFC
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
61
Katie developed her corporation's intra net site using proprietary HTML language extensions based on the company's current browser. The company has recently updated its systems to include the use of a new browser. Now the intra net site that Katie developed no longer renders its content consistently. What should Katie do to ensure that this site's content renders consistently regardless of the browser used?

A) Revise the site to include workarounds and hacks for the new browser.
B) Revise the site's markup language in only those areas that are not rendering properly.
C) Update the site using a single language standard consistently, such as HTML5 or XHTML.
D) Update the site using the proprietary language extensions required by the new browser's rendering engine.
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
62
When previewing a Web page using a GUI HTML editor, you will:

A) be limited to the default browser on your computer or device.
B) be limited to the browsers installed on your computer or device.
C) receive an error because GUI editors cannot preview pages in a browser.
D) be limited to two browser choices that are installed on your computer or device.
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
63
You received an e-mail message on which several other individuals were copied. You want to respond to this message in a way that will include everyone who was copied on the original message. You can accomplish this by using which action?

A) Reply
B) Reply All
C) Forward
D) Send
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
64
You are distributing a large video game file using BitTorrent. First, you upload the initial file and make it available via a central server called a tracker. Other users can then connect to the tracker and download the file. Each user who downloads the file makes it available to other users to download. The use of BitTorrent significantly reduces the original provider's hardware and bandwidth resource costs. BitTorrent is an example of what type of network?

A) Centralized network
B) Client-server network
C) Peer-to-peer (P2P) network
D) Virtual private network (VPN)
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
65
Michelle wants to search for a scuba regulator. She plans to use a keyword search engine. She does not want to see any results from the manufacturer named Scubapro. Which of the following search strings should she use?

A) Regulators !Scubapro
B) Regulators Scubapro
C) Regulators D) Regulators >Scubapro
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
66
Which type of attack is a form of social engineering in which an attacker attempts to steal personal or confidential information by sending e-mail that lures unsuspecting victims to log in to an authentic-looking but imposter Web site?

A) Replay
B) Phishing
C) Spoofing
D) Pharming
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
67
Marcella is looking for a very unique product online. She has found one on the XYZ Company's Web site, which is designed well and appears to be legitimate. As she navigates through the checkout process, she reaches the checkout page with this URL, which asks her to enter her credit card information: http://XYZ.com/gp/checkout.html/ref=chk_out_TLS12B_lb?ie=IJTFB&docld=10007931 Why should Marcella cancel her online transaction instead of proceeding?

A) Because the site uses 128-bit encryption, which is illegal for companies that are located overseas
B) Because the link contains abbreviations and is not completely readable, so Marcella is unsure of the server name
C) Because the link does not use SSL/TLS encryption and therefore the information Marcella enters would not be secure
D) Because the link uses SSL/TLS encryption, which Marcella knows is not compatible with the browser she is using
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
68
Roberto's company is releasing updates to a specific product. He needs to educate the company's sales managers, who are located in various international locations, about the new product updates. Which of the following methods would be the most economical and efficient solution for Roberto to discuss the required information with the sales managers synchronously?

A) Send the product update blueprints via e-mail to each of the sales managers and ask them to contact him with any questions.
B) Schedule an in-person sales meeting with them at the company headquarters so that the updates can be demonstrated and any questions answered with the entire group present.
C) Schedule a Webinar with the sales managers so that the updates can be demonstrated and any questions answered with the entire group.
D) Post the product update blueprints on the company's Web site and call each sales manager personally to discuss their individual questions or concerns offline.
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
69
Sampson has used HTML5 to create a Web page that contains image-based navigation buttons. He would like to add text-based navigation to help ensure accessibility. Which of the following HTML5 elements should he use?

A)
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
70
Jenny recently switched from broadband cable Internet to ADSL service with her local phone company. To economize, she chose the self-installation option. It appears that her ADSL modem is not allowing her to connect to the Internet. Which setting should she check first?

A) Loopback address
B) Software version
C) Default gateway
D) Device name
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
71
A friend just sent you a link to a Facebook page with information that you find very useful. You want to be able to recall the site in the future from your desktop computer, or from your mobile device while away from your desk. Which is the best approach?

A) Memorize the URL so you can pull up the site in any browser such as Chrome, Firefox or Internet Explorer.
B) Add the link to a cloud-based bookmark service such as Delicious or Google Bookmarks.
C) Manually enter the Web address into any and all browsers on all of your devices.
D) Pull up the message with the link any time you want to view the site.
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
72
Gabby suspects that an attacker has gained control of her system. Which of the following is the most appropriate action for her to take?

A) Shut down the computer.
B) Enable strong encryption on all files on the hard disk.
C) Run anti-virus software on all disks associated with this system.
D) Unplug the computer network cable and/or disable the computer's wireless NIC.
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
73
You are leading a team of new hires and need to train them on innovative strategies and technologies that will be used to develop an upcoming project. You send several e-mail messages with links to helpful resources. But you soon realize this is an inefficient way to organize and share this information. Which solution would provide a more efficient way to categorize and share this information?

A) Social tagging
B) Grid computing
C) Ajax programming
D) Collective intelligence
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
74
A family member has just sent you an e-mail message that contains highly personal details about a family matter. The message was sent to your company e-mail address. The family member has requested that you respond with your ideas about how to resolve the situation. Which of the following is a reason for you to call your family member and discuss the matter over the phone instead?

A) Because your employer has the right to read your e-mail
B) Because e-mail is completely private but not personal enough
C) Because it is illegal to use company e-mail for personal use
D) Because an e-mail message about a personal family matter will violate netiquette guidelines
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
75
ABC Company develops its Own database applications. ABC is considering migrating to cloud services to accommodate the company's growth. What strategy should ABC use to ensure continuous data protection if it begins using cloud services?

A) Cloud-only solution
B) Regional systems solution
C) Location systems solution
D) Multiple cloud-service providers
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
76
Skylar has been asked by the HR Department to create a Web page for the company's intra net site that compares the company's four different medical insurance plans. To accomplish this effectively in HTML5, Skylar should:

A) use document structure tags to lay out the page and use a table to organize the medical insurance plan information.
B) use JavaScript to lay out the page and use a table within the page to organize the medical insurance plan information.
C) use tables to lay out the page and use the tag inside the table to organize the medical insurance plan information.
D) use CSS to lay out the page and use the
 element to organize the medical insurance plan information.
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
77
You are configuring an e-mail client to connect to your e-mail account. Which of following is required to set up the e-mail account?

A) An HTTP address
B) An FTP address
C) ADNS server address
D) A POP3 address
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
78
You want to enable wireless security on your Android device and your Linux system. Which of the following is a disadvantage of Wired Equivalent Privacy (WEP)?

A) It enables MAC address filtering.
B) It is easily compromised by hackers.
C) It only supports 56-bit symmetric-key encryption.
D) It is based on the outdated 802.lla wireless standard.
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
79
Consider the network configuration shown in the command prompt: <strong>Consider the network configuration shown in the command prompt:   What does the Default Gateway identify?</strong> A) The file server on the network B) The local host on the network C) The computer on the network D) The router on the network What does the Default Gateway identify?

A) The file server on the network
B) The local host on the network
C) The computer on the network
D) The router on the network
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
80
The Internet has enabled many new anti-social activities, such as online stalking, cyber bullying, and addiction to solitary online activities. Which choice is the most feasible way for schools and parents to reduce cyber bullying?

A) Monitor, track and record all online activity conducted by students.
B) Teach teens that the use of online communication is a freedom of expression.
C) Prevent students from accessing the Internet while at school so that they learn good habits.
D) Educate students about cyber-ethics and the consequences of questionable online behavior.
Unlock Deck
Unlock for access to all 138 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 138 flashcards in this deck.