1.
Which IT Job role best describes an individual who is responsible for evaluating Web site statistics to determine the site's effectiveness?
Correct Answer
C. Web site analyst
Explanation
Web site analyst is an individual who is responsible for evaluating Web site statistics to determine the site's effectiveness.
2.
Which IT job role best describe an individual who develops primarily server-side Web Applications?
Correct Answer
A. Web application developer
Explanation
Web application developers use Web programming languages or products to develop Web Sites, generally for Web Server applications. Web application developers design, build and test the Web pages and hyperlinks that form the site. Web application developers must be proficient in programming and scripting languages such as Java, JavaScript, C++, Perl, and others.
3.
Which IT job role best describe an individual who provides organisational leadership for Web site content and all related initiatives?
Correct Answer
B. Web site manager
Explanation
A Web site manager in a large organisation generally manages the web development team. A Web site manager in a small company could perform all Web development job roles, including designing, developing, and analysing Web Sites. In short, Web site managers provide organisational leadership for Web site content and all related initiatives.
4.
Which IT job role best describe an individual who manages and maintains a network infrastructure?
Correct Answer
A. Network engineer
Explanation
Network engineers focus on the design, implementation, delivery and support of network components, policies and procedures used by an organisation. Network engineers are responsible for configuring and testing network devices, and setting up and maintaining the network infrastructure. Network engineers support and maintain network devices such as Web Servers, e-mail servers, routers, connecting cables and so forth. Network engineers must be able to implement LANs and WANs, and be proficient in a variety of networking skills, such as routing and switching, network traffic analysis, and device configuration and testing.
5.
What is the purpose of conducting an ontological study as it pertains to a particular organisation or business?
Correct Answer
D. To enable software engineers and programmers to accurately map technology solutions to business needs
Explanation
In computer science and Web technology, ontology is the study of how a particular part of a company, called a domain, is organised. The product of an ontological study, called an ontology, describes how individual elements of a domain relate to each other. An ontological study is a foundational step for programmers and designers of complex information technology systems. If properly conducted, an ontology allows software engineers and programmers to accurately map technology solutions to business needs.
6.
Cloud computing is software services that are provided over the Internet. Which of the following IT job roles should be most familiar with cloud computing software, infrastructure and platform services?
Correct Answer
B. Server administrator
Explanation
Server administrators are responsible for designing, implementing, managing, and maintaining network servers, and associated applications and peripheral devices. Server administrators must be familiar with cloud computing. Cloud computing is software services that are provided over the Internet rather than at a company site.
7.
Which IT job role best describe an individual who is responsible for maintaining the software and procedures necessary to protect the confidentiality and integrity of information, and legitimate access to it?
Correct Answer
B. Security manager
Explanation
Security managers are responsible for managing the security measures used to protect electronic data. They maintain the software and procedures necessary to protect the confidentiality and integrity of information, and legitimate access to it. Security managers perform security risk assessments, prepare disaster recovery, monitor security control systems to ensure that appropriate security clearances and information access levels are maintained, and work with other departments to maintain secure data and information flow.
8.
Which IT job role best describe an individual who is responsible for the organisation and appearance of a Web site?
Correct Answer
D. Web site designer
Explanation
Web site designers create the 'look and feel' that visitors will see when they access a site on the WWW. Web site designers determine the most effective site layouts, colour schemes, navigational links and fonts to maintain visitor interest in the site. Site designers primarily establish the organisation mood and tone of the site relative to its content. In short, Web site designers are responsible for developing the user interface and aesthetics of a Web site.
9.
Which IT job role best describe an individual who is responsible for developing and implementing plans to take advantage of the sales and marketing opportunities available through the internet?
Correct Answer
B. Web marketing manager
Explanation
Web marketing managers are responsible for developing and implementing plans to take advantage of the sales and marketing opportunities available through the internet. They help define their companies' objectives for using electronic commerce (e-commerce) and decide which computer application are needed to achieve them.
10.
As a new IT professional, you need to understand the needs of the business, as well as the various technologies required to design and deliver specific products. What is the term that describe this perspectives in relating to IT?
Correct Answer
C. Holistic
Explanation
Competent professionals working in any job role understand how their work affects others. Therefore, an IT professional must have a working knowledge of various IT concepts and practices relevant to the company. A holistic perspective -- the ability to place a particular technology or practice in context with the entire company-- is vital. A holistic perspective in relating to IT involves understanding the needs of the business, as well as the various technologies required to design and deliver specific products. These products maybe software designed by the company, services provided by the company or marketing pieces such as HTML-based e-mail and Web sites.
11.
The technology adoption life cycle describes:
Correct Answer
D. The degree to which members of demographic will adopt or accept new product or innovation.
Explanation
The technology adoption life cycle refers to a sociological model that defines the demographic and psychological characteristics inherent in a population that describes the degree to which members of that population will adopt or accept a new product or innovation.
12.
Which statement accurate describes the difference between a traditional modem and an ISDN line?
Correct Answer
C. ISDN uses a digital line, whereas a traditional modem must translate digital signals to analog and back.
Explanation
A modem is a device that enables computers to transmit data over standard analog telephone lines by converting digital data from a computer into an analog signal for transmission over the telephone line to another modem. The receiving modem converts the analog signal back into digital code and transmits it to the receiving computer. To gain faster dial-up connections, individuals who also go through a local phone company to install an Integrated Services Digital Network (ISDN) line, which is a digital telephone line.
13.
Of the six elements required to connect to the Internet, which can be supplied in the form of a Web Browser, e-mail program or mobile app?
Correct Answer
A. Client Software
Explanation
Six elements are required to connect to the Internet: computer (PC, smartphones, Tablets, smartTV), Operating systems (Windows, Linux, Mac OSX), TCP/IP (protocol software used to communicate with the Internet), client software (Web Browser, mobile App, email), Internet connection (direct connection to an ISP), and Internet address (Web address, e-mail address, server address). The first three items are generally acquired when you buy a computer. When you arrange to connect your computer to the internet, you must install client software, implement a connection method, and identify the address of servers you can use.
14.
What is the least expensive way to access the Internet?
Correct Answer
C. With phone lines, an analog modem and an ISP
Explanation
The least expensive method is to use existing standard phone lines and an analog modem.
15.
How does a LAN differ from a WAN?
Correct Answer
A. A LAN span a confined geographic area, whereas a WAN consists of multiple LANs.
Explanation
A LAN is a group of computers connected within a confined geographic area. A LAN can consists of as few as two computers, or any number up to hundreds of computers and various types of servers. LANs are commonly used for intraoffice communication and home networks. A WAN consist of two or more LANs that span a wide geographic area.
16.
Which statement best describes DSL?
Correct Answer
B. DSL stands for Digital Subscriber Line, a direct Internet connection method that uses digital phone lines and an xDSL modem.
Explanation
Digital Subscriber Line (DSL) is a high-speed direct connection that uses digital phone lines and an xDSL modem. Several variations of the DSL modem exist, hence the term xDSL.
17.
Which choice lists the two principal methods of connecting to the Internet rthrough an Internet Service Provider (ISP)?
Correct Answer
D. Dial-up connection and direct connection
Explanation
A Internet Service Provider (ISP) is an organisation that provides an access to the Internet. ISPs offer two principal options for connecting to the Internet: dial-up connection and direct.
18.
Which protocol is required for computers to communicate with each other over the Internet?
Correct Answer
C. TCP/IP
Explanation
Every computer connected to the Internet uses a protocol called Transmission Control Protocol/Internet Protocol (TCP/IP), which enables computers to communicate with one another. TCP enables two computers to establish a communication link and exchange packets of data; IP specifies the format and addressing scheme of the packets.
19.
Which of the following refers to a family of specifications for wireless network technology?
Correct Answer
B. 802.11 standards
Explanation
The 802.11 standard, developed by the IEEE, refers to a family of specifications for wireless network technology.
20.
Six elements are required to connect to the Internet. Which one of the six required elements can be satisfied by any of several examples including PC, smartphone, smart TV or tablet?
Correct Answer
B. Computer
Explanation
Six elements are required to connect to the Internet: computer (PC, smartphones, Tablets, smartTV), Operating systems (Windows, Linux, Mac OSX), TCP/IP (protocol software used to communicate with the Internet), client software (Web Browser, mobile App, email), Internet connection (direct connection to an ISP), and Internet address (Web address, e-mail address, server address). The first three items are generally acquired when you buy a computer. When you arrange to connect your computer to the internet, you must install client software, implement a connection method, and identify the address of servers you can use.
21.
What is a node?
Correct Answer
D. Any entity or addressable device on a network that can be managed
Explanation
A node is any entity on a network that can be managed such as a system repeater router gateway or firewall It is a computer or other addressable device attached to a network and also known as a host Many networks are structured using the client/server model in which individual computers and devices called nodes interact with one another through a central server to which they are all connected The client/server model divides processing and storage tasks between the client and the server. A client is a system or application on a network that requests a service from another computer (the server) and is used to access files or documents (such as a Web browser or user agent) A server is a computer in a network that manages the network resources and provides or serves information to clients. A database is an organized repository of data that can be queried and searched by users.
22.
Which term is used to describe a computer that is responsible for storing and providing information requested by a client application?
Correct Answer
A. Server
Explanation
A server is responsible for storing and providing information. Many networks are structured using the client/ server model in which individual computers and devices called nodes interact with one another through a central server to which they are all connected. The client/server model divides processing and storage tasks between the client and the server. The server is more powerful than the individual computers or clients connected to it. In a client/Server environment client programs run on the computer nodes and interact with a server program running on the Server. The client software is the interface that enables users to communicate with and request information from the Server.
23.
Six elements are required to connect to the Internet. One of these elements is TCP/IP. Which of the following best describes this element?
Correct Answer
D. Protocol software used to communicate with the internet
Explanation
Six elements are required to connect to the Internet: computer (PC, smartphones, Tablets, smartTV), Operating systems (Windows, Linux, Mac OSX), TCP/IP (protocol software used to communicate with the Internet), client software (Web Browser, mobile App, email), Internet connection (direct connection to an ISP), and Internet address (Web address, e-mail address, server address). The first three items are generally acquired when you buy a computer. When you arrange to connect your computer to the internet, you must install client software, implement a connection method, and identify the address of servers you can use.
24.
Which definition best describes a network?
Correct Answer
A. A group of computers connected so they can communicate share resources and exchange data
Explanation
A network is a group of two or more computers connected so they can communicate, share resources and exchange information with one another. In a networked environment computers are connected to a network server which acts as the central repository of programs and data to which all users connected to the network have access. Many networks are structured using the client/server model in which individual computers and devices called nodes interact with one another through a central server to which they are all connected.
25.
Approximately how many numeric IP addresses are possible with lPv4?
Correct Answer
B. 4 billion
Explanation
Approximately 4 billion numeric IP addresses are possible with lPv4. Each of the four segments in an IP address (such as 72.44.192.233) is a number between 0 and 255. Some number values are reserved but roughly 256 x 256 x 256 x 256 different IP addresses are possible - approximately 4 billion. Nevertheless the current supply of IP addresses is almost depleted because IP address demand continues to increase
26.
Of the six elements required to connect to the Internet, which is often supplied by an ISP?
Correct Answer
D. Internet connection
27.
Which protocol allows a computer using an analog modem to make an initial connection to the Internet?
Correct Answer
A. Point-toPoint Protocol (PPP)
Explanation
Point-toPoint Protocol (PPP) allows a computer using an analog modem to make an initial connection to the Internet. When you us e a phone line and modem to connect to the Internet you are using a dial up connection. Most dial up connections use PPP. Multi|ink Point toPoint Protocol (MLPPP) can be used to combine two PPP connections into one thereby enabling a higher transmission speed.
28.
Which protocol is used to receive e-mail messages from an incoming mail server and force you to download e-mail messages before reading, deleting, or otherwise managing them?
Correct Answer
A. Post Office Protocol (POP)
Explanation
You receive mail from an incoming mail server using Post Office Protocol (POP) or Internet Message Access Protocol (|MAP). POP stores incoming e-mail until users authenticate and download it POP is the more accepted and widely used protocol for receiving and managing e-mail. POP servers store and forward e-mail messages to the host. For example if you were to send an e-mail message the message would be stored in the appropriate mail server until the recipient downloaded it from the server. The POP server responds to a request asks for a password then forwards the messages immediately. IMAP handles messages in a more sophisticated manner than POP because it allows you to browse and manage e-mail messages while they reside on the server. A POP server forces you to download e-mail messages before reading deleting or otherwise managing them You send e-mail to others with an outgoing server using Simple Mail Transfer Protocol (SMTP) which is responsible solely for sending - not receiving - e-mail messages. A news server uses the Network News Transfer Protocol (NNTP) to host newsgroups.
29.
Which protocol do many browsers assume when you enter a URL in the Address field?
Correct Answer
A. HTTP
Explanation
Many browers assume that Hypertext Transfer Protocol (HTTP) is the protocol to use because you generally use a browser to access Web pages. You can include the http:// at the beginning when you enter the URL, or you may omit it.
30.
Which protocol is the Internet standard protocol for transmitting e-mail messages over networks and is responsible solely for sending - but not receiving - e-mail messages?
Correct Answer
D. Simple Mail Transfer Protocol (SMTP)
Explanation
You send email to others with an outgoing server using Simple Mail Transfer Protocol (SMTP). SMTP is the Internet standard protocol for transferring e-mail messages from one computer to another. It specifies how two e-mail systems interact. SMTP is responsible solely for sending e-mail messages You receive mail from an incoming mail server using Post Office Protocol (POP) or Internet Message Access Protocol (IMAP). POP and IMAP are used to store and access e-mail messages. A news server uses the Network News Transfer Protocol (NNTP) to host newsgroups.
31.
Which protocol is used to host newsgroups and distribute mailing lists by providing text output that users can access at their convenience and by allowing multi-person input like a conference call?
Correct Answer
D. Network News Transfer Protocol (NNTP)
Explanation
A news server uses the Network News Transfer Protocol (NNTP) to host newsgroups and distribute mailing lists. Like an email server a news server provides text output that users can access at their convenience. However like a conference call it has multi-person input allowing users to post information in an easily accessible location. You receive email from an incoming mail server using Post Office Protocol (POP) or Internet Message Access Protocol (IMAP). You send email to others with an outgoing server using Simple Mail Transfer Protocol (SMTP) which is responsible solely for sending - not receiving - e-mail messages
32.
Which protocol allows you to browse and manage e-mail messages while they reside on the mail server?
Correct Answer
C. Internet Message Access Protocol (IMAP)
Explanation
You send email to others with an outgoing server using Simple Mail Transfer Protocol (SMTP). SMTP is the Internet standard protocol for transferring e-mail messages from one computer to another. It specifies how two e-mail systems interact. SMTP is responsible solely for sending e-mail messages You receive mail from an incoming mail server using Post Office Protocol (POP) or Internet Message Access Protocol (IMAP). POP and IMAP are used to store and access e-mail messages. A news server uses the Network News Transfer Protocol (NNTP) to host newsgroups.
33.
You want to be able to quickly view news headlines without the need to open your Web browser and visit any news Web sites How can you accomplish your goal?
Correct Answer
B. Set up a Web feed
Explanation
A Web feed is a data format for delivering Web content that is updated frequently such as blog entries and news headlines. Web feed formats allow you to view headlines and updates from your favorite Web sites without the need to open your Web browser or visit any Web sites. The two popular feed formats are RSS and Atom.
34.
Which protocol is used to send Web pages from a Web server to a Web browser?
Correct Answer
A. Hypertext Transfer Protocol (HTTP)
Explanation
Hypertext Transfer Protocol (HTTP) is the protocol used to transfer Web pages from a Web server to a Web client usually a Web browser. Specifically HTTP is the set of rules required to exchange files such as text images video and multimedia content across the Web. HTML is the language used to create Web pages FTP is used to transport large files of various types POP transports e-mail messages.
35.
Which protocol is the data transmission standard for the Internet responsible for sending information from one computer to another using uniquely identifying addresses?
Correct Answer
A. Internet Protocol (IP)
Explanation
Internet Protocol (IP) is the data transmission standard for the Internet. It is the protocol by which data is sent from one computer to another on the Internet. Each computer on the Internet has at least one IP address that uniquely identifies it from all other computers on the Internet. When you send or receive data on the Internet (for example when you send or receive an e mail message or retrieve information from a Web site) the Internet gateways route the packets of information from your source address to the destination address.
36.
How many mail servers does the use of e-mail involve?
Correct Answer
A. Two - incoming mail is handled by one server using Post Office Protocol (POP) or Internet Message Access Protocol (IMAP) and outgoing mail is handled by another server using Simple Mail Transfer Protocol (SMTP)
Explanation
E mail involves two mail servers outgoing and incoming. The outgoing and incoming servers use various protocols to handle sending receiving and storing e-mail messages. You send e-mail to others with an outgoing server using Simple Mail Transfer Protocol (SMTP). SMTP is the Internet standard protocol for transferring e-mail messages from one computer to another. It specifies how two e-mail systems interact. SMTP is responsible solely for sending e-mail messages and is part of the TCP/IP suite You receive mail from an incoming mail server using Post office Protocol (POP) or Internet Message Access Protocol (IMAP).
37.
Direct connections provide continuous access to the Internet Many bandwidth options are associated with direct connections Which technology can transmit data over a network connection at speeds up to 1.544 Mbps?
Correct Answer
B. T1
Explanation
T carriers are T1 and T3 lines which are dedicated digital telephone lines that have much greater bandwidths than |SDN lines T1 lines can transmit data at 1.544 Mbps and T3 lines can transmit data at 44.736 Mbps. Many businesses lease T1 lines from phone companies to connect to Internet Service Providers (ISPs). ISPs use T3 lines to connect to the Internet backbone which is composed of T3 lines.
38.
Which protocol is often used to publish Web pages to a Web server?
Correct Answer
C. File Transfer Protocol (FTP)
Explanation
File Transfer Protocol (FTP) is a TCP/IP suite protocol that enables the transfer of large files between two computers on the Internet. Anonymous FTP sites are available to the public and allow guests to transfer files without an account on the remote site. FTP is also used to publish Web pages to a Web server. You simply upload your Web page files to an FTP server. After the upload is complete Web browsers using HTTP can access your Web pages.
39.
Which of the following considered an original Internet top-level domain?
Correct Answer
D. .net
Explanation
One of the original top-level domain is .net. The right-side component of a domain name categorises domains into groups by common type (company, education institution) or geography (country, state). These categories are called top-level domains.
40.
Which Internet resource is used to resolve IP addresses into easily recognisable text-based names?
Correct Answer
D. The Domain Name System (DNS)
Explanation
The Domain Name System (DNS) resolves IP addresses into easily recognisable text-based names. To access resource on the Internet (for example, a web server or FTP server), you must enter its address in the client (for example, Web Browser). One way to do this is to provide the IP address. However, IP addresses can be difficult to remember because they consist of series of numbers separated by periods.
41.
Your company has a registered domain name. You decide to sell portions of the domain and make it available to others. What does this scenario describe?
Correct Answer
B. A shared domain
Explanation
A shared domain occurs when multiple companies, organisations or people share portions of the same domain name. Multiple entities can use your registered domain name yourcompany.com as their domain name as long as you elect to share the domain name and make it available to others.
42.
A domain name consists of letters (and sometimes numbers) separated by periods. Which of the following is the host name component of a domain name?
Correct Answer
A. The left-side component of the domain name, which categorizes domains into groups by server name
Explanation
A domain name read right to left signifies general divisions, then specific companies then departments within the company and even individual computers (such as a Web server or an e mail server). For example, reading right to left the domain name www.ClWcertified.com can be interpreted as follows .com (domain category - a commercial site), ClWcertified (registered company domain name), and www (the Web server at the company also called the Web site host)
43.
Which old audio file format is inherently supported by most browsers
Correct Answer
B. AU
Explanation
http://en.wikipedia.org/wiki/Au_file_format
44.
What is the main benefit of using Rich Text Format (RTF)?
Correct Answer
C. RTF is compatible with many operating systems and applications including most Macintosh and Windows Word processors
Explanation
Rich Text Format (RTF) was developed by Microsoft. Using RTF you can insert images and format text. RTF is compatible with many operating systems and applications including most Macintosh and Windows word processors. It is an almost universal format
45.
Which type of URL gives an abbreviated path to a resource using the current page as a starting position?
Correct Answer
A. Relative URL
Explanation
A relative URL gives a path to a resource using the current page as an origin. In a relative URL the system root is implied but not specified, A relative URL is also known as an abbreviated URL and it is always referenced from within the page currently loaded into the Web browser. The URL /certifications/index.php (without the preceding domain portion) is an example of a relative URL. The system root is implied by the slash ( / ) that begins the URL.
46.
You want to give your Web site users the ability to view high-quality video Connection speed is not an issue Which file format could you use?
Correct Answer
B. MPEG
Explanation
Moving Picture Experts Group (MPEG) is a standard for digital audio and video compression that provides extremely high quality and resolution.
MPEG files are large and do not stream well on slower connections.
47.
What is the main difference between a Postscript (PS) file and an Encapsulated Postscript (EPS) file?
Correct Answer
A. A PS file contains instructions that determine the display of the graphic whereas an EPS file includes the bitmap information for the image as well
Explanation
Postscript (PS) files are written in a page description language so they are unreadable and are designed for printing on Postscript printers. Encapsulated Postscript (EPS) is a file format that you can use to import and export graphics files between operating systems and applications. Whereas a Postscript file only has the instructions that determine the display of the graphic an EPS file actually contains the bitmap information for the graphics file.
48.
Which is the native audio format for Microsoft Windows?
Correct Answer
A. Waveform (WAV)
Explanation
Waveform (WAV) is the native audio format for Microsoft Windows.
Most browsers provide built in support for WAV files
It is supported by HTML5 audio.
49.
What is the main advantage of the Ogg Vorbis (OGG) audio file format?
Correct Answer
D. OGG files are smaller, download faster, and sound as good as other audio file formats
Explanation
http://en.wikipedia.org/wiki/Ogg
50.
The Flash Player allows browsers to play Flash movies which are animations created using vector graphics. What are vector graphics?
Correct Answer
D. Mathematical shapes saved as a sequence of vector statements which describe a series of points to be connected
Explanation
Adobe Flash authoring software allows you to create animation using vector graphics which are essentially mathematical shapes. A vector graphic is saved as a sequence of vector statements which describe a series of points to be connected. Other graphics types such as GlFs and JPEGs are raster graphics which are images that map bits directly to a display space (i e a grid of x and y coordinates on a display space). Raster graphics are pixel-based and as such are much larger files than vector graphics