International Business Foundations Book Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Micahtredding
M
Micahtredding
Community Contributor
Quizzes Created: 2 | Total Attempts: 823
Questions: 24 | Attempts: 339

SettingsSettingsSettings
International Business Quizzes & Trivia

Over the Internet Business Foundations book.


Questions and Answers
  • 1. 

    A person in which job role would be responsible for developing and implementing plans to take advantage of the sales opportunities available through the internet?

    • A.

      SEO analyst

    • B.

      Security analyst

    • C.

      Web marketing manager

    • D.

      Web site analyst

    Correct Answer
    C. Web marketing manager
    Explanation
    A web marketing manager would be responsible for developing and implementing plans to take advantage of the sales opportunities available through the internet. This job role involves creating and executing online marketing strategies, optimizing websites for search engines, managing social media campaigns, and analyzing website traffic and user behavior to drive sales and increase online visibility. They work closely with the marketing team to identify target audiences, create engaging content, and monitor the effectiveness of online marketing campaigns.

    Rate this question:

  • 2. 

    Which of the following is always required to connect to the Internet?

    • A.

      A Web browser

    • B.

      Hypertext Markup Language (HTML)

    • C.

      A domain name server

    • D.

      Transmission Control Protocol/Internet Protocol (TCP/IP)

    Correct Answer
    D. Transmission Control Protocol/Internet Protocol (TCP/IP)
    Explanation
    TCP/IP is always required to connect to the Internet as it is the set of protocols that allows different devices to communicate and exchange data over the Internet. It provides the necessary rules and procedures for establishing and maintaining connections, as well as routing data packets between networks. Without TCP/IP, devices would not be able to connect to the Internet and communicate with each other effectively.

    Rate this question:

  • 3. 

    The rules that describe the ways that clients and servers communicate across a network are called:

    • A.

      Backbones.

    • B.

      Channels.

    • C.

      Packets.

    • D.

      Protocols.

    Correct Answer
    D. Protocols.
    Explanation
    The rules that describe the ways that clients and servers communicate across a network are called protocols. Protocols are a set of rules and guidelines that determine the format, timing, sequencing, and error control of data transmission between devices. They ensure that data is transmitted accurately and efficiently across the network, allowing different devices and systems to communicate effectively. Backbones, channels, and packets are all components or elements within the network, but protocols are specifically responsible for governing the communication process.

    Rate this question:

  • 4. 

    Web addresses are called Uniform Resource Locators (URLs). A URL is a text string that specifies an Internet address and the method by which the address can be accessed. The protocol component of a URL identifies:

    • A.

      The name of the server on which the page resides.

    • B.

      The site owner's registered site.

    • C.

      The type of server and Internet service being used.

    • D.

      The organization type.

    Correct Answer
    C. The type of server and Internet service being used.
    Explanation
    The protocol component of a URL identifies the type of server and Internet service being used. This is because the protocol specifies the rules and procedures for communication between different devices on the internet. It determines how data is transmitted, received, and displayed. By including the protocol in the URL, the browser knows which protocol to use to access the web page, such as HTTP, HTTPS, FTP, etc.

    Rate this question:

  • 5. 

    When you view a Web page, the images are downloaded to your computer. Where are they stored?

    • A.

      History folder

    • B.

      Cookie folder

    • C.

      Browser cache

    • D.

      Desktop

    Correct Answer
    C. Browser cache
    Explanation
    When you view a web page, the images are downloaded to your computer and stored in the browser cache. The browser cache is a temporary storage location on your computer where the browser keeps copies of web pages, images, and other files that you have accessed recently. Storing the images in the browser cache allows the browser to load the web page faster the next time you visit it, as it can retrieve the images from the cache instead of downloading them again from the internet.

    Rate this question:

  • 6. 

    In what ways can cookies be useful for Web site developers?

    • A.

      Cookies give developers access to Web site visitors' hard drive files.

    • B.

      Cookies inform the Web site manager about visitors' preferences.

    • C.

      Cookies are dangerous and should never be used in Web development.

    • D.

      Cookies enable developers to convey their preferences to Web site users.

    Correct Answer
    B. Cookies inform the Web site manager about visitors' preferences.
    Explanation
    Cookies are small text files that are stored on a user's computer when they visit a website. These files contain information about the user's preferences and browsing behavior. By using cookies, website developers can track and analyze visitors' preferences, such as their preferred language, shopping cart items, or personalized settings. This information can then be used to enhance the user experience by providing personalized content, targeted advertisements, or remembering user preferences for future visits. Therefore, the correct answer is that cookies inform the website manager about visitors' preferences.

    Rate this question:

  • 7. 

    You want customers to use their credit cards to make purchases on your Web site. In order to ensure secure exchanges, you should consider using:

    • A.

      VPN.

    • B.

      TLS.

    • C.

      SSH.

    • D.

      XML.

    Correct Answer
    B. TLS.
    Explanation
    To ensure secure exchanges on a website, TLS (Transport Layer Security) should be considered. TLS is a cryptographic protocol that provides secure communication over a network. It encrypts the data transmitted between the web server and the client, preventing unauthorized access and ensuring the confidentiality and integrity of the information. VPN (Virtual Private Network) is used to create a secure connection between a user and a private network, but it may not be necessary for secure credit card transactions on a website. SSH (Secure Shell) is a protocol used for secure remote access to a computer, which is not directly related to web transactions. XML (eXtensible Markup Language) is a data format and does not provide secure exchanges on its own.

    Rate this question:

  • 8. 

    Which of the following is an event-driven scripting language used to create active content on a Web page?

    • A.

      C++

    • B.

      Java

    • C.

      JavaScript

    • D.

      C#

    Correct Answer
    C. JavaScript
    Explanation
    JavaScript is an event-driven scripting language used to create active content on a web page. Unlike C++, Java, and C#, which are primarily used for general-purpose programming, JavaScript is specifically designed for web development. It allows developers to add interactivity and dynamic functionality to websites by responding to user actions, such as clicks and inputs. JavaScript can manipulate HTML elements, handle events, and communicate with servers, making it an essential tool for creating engaging and interactive web pages.

    Rate this question:

  • 9. 

    What is the easiest way to update the codecs used by your multimedia plug-in?

    • A.

      Codecs cannot be updated.

    • B.

      Download and install an upgrade for your plug-in.

    • C.

      Download the newest multimedia files and your codecs will be updated automatically.

    • D.

      Deinstall your old plug-in, then download and install the latest version of the plug-in.

    Correct Answer
    B. Download and install an upgrade for your plug-in.
    Explanation
    The easiest way to update the codecs used by your multimedia plug-in is to download and install an upgrade for your plug-in.

    Rate this question:

  • 10. 

    Why is it advisable to occasionally upgrade plug-ins from the appropriate vendor's site?

    • A.

      Upgrades usually include increased functionality and security.

    • B.

      Plug-ins expire after a set number of days.

    • C.

      Old plug-ins can contain computer viruses.

    • D.

      Only the newest plug-ins support frames sites.

    Correct Answer
    A. Upgrades usually include increased functionality and security.
    Explanation
    Upgrading plug-ins from the appropriate vendor's site is advisable because upgrades usually provide increased functionality and security. This means that by upgrading, users can benefit from new features and improvements in performance, as well as ensure that any potential vulnerabilities or bugs in the previous version are addressed. Upgrades help to keep the plug-ins up to date and compatible with the latest technologies and standards, enhancing the overall user experience and protecting against potential security risks.

    Rate this question:

  • 11. 

    In a relational database table, which term describes a category of information, represented as a column in the table?

    • A.

      Field

    • B.

      Record

    • C.

      Relationship

    • D.

      Primary key

    Correct Answer
    A. Field
    Explanation
    A field in a relational database table represents a category of information. It is a column in the table that holds a specific type of data, such as a person's name, age, or address. Each field corresponds to a specific attribute or characteristic of the data being stored in the table.

    Rate this question:

  • 12. 

    The more terms you combine using the AND Boolean operator in a search:

    • A.

      The fewer results you will retrieve.

    • B.

      The more results you will retrieve.

    • C.

      The more likely you will be to generate a 404 error.

    • D.

      The more you expand the search to include information portals and newsgroups.

    Correct Answer
    A. The fewer results you will retrieve.
    Explanation
    When using the AND Boolean operator in a search, it combines multiple terms to narrow down the search results. By doing so, it specifies that all the terms must be present in the results. Therefore, the more terms you combine using the AND operator, the more specific and restrictive the search becomes, leading to fewer results being retrieved.

    Rate this question:

  • 13. 

    Suki just signed up with an Internet Service Provider (ISP), and now she is setting up Windows Mail as her e-mail client. As she configures this e-mail client, Suki must specify the names of which two servers?

    • A.

      POP3 server and SMTP server

    • B.

      SMTP server and NNTP server

    • C.

      NNTP server and HTTP server

    • D.

      HTTP server and SMTP server

    Correct Answer
    A. POP3 server and SMTP server
    Explanation
    When setting up an e-mail client like Windows Mail, Suki needs to specify the names of two servers: the POP3 server and the SMTP server. The POP3 server is responsible for receiving incoming mail and storing it in the recipient's mailbox, while the SMTP server is used for sending outgoing mail. Therefore, Suki needs to provide the names of both servers to ensure that she can both receive and send e-mails successfully.

    Rate this question:

  • 14. 

    What is CAPTCHA designed to do?

    • A.

      Verify the identity of a user

    • B.

      Discern humans from automated senders

    • C.

      Ensure that only unique user names exist within a given domain

    • D.

      Prevent password theft

    Correct Answer
    B. Discern humans from automated senders
    Explanation
    CAPTCHA is designed to discern humans from automated senders. It does this by presenting users with tests or challenges that are easy for humans to solve but difficult for automated bots. By requiring users to complete these tests, CAPTCHA helps to prevent automated bots from accessing or interacting with certain online services or platforms. This helps to ensure that the actions taken on these platforms are performed by real human users, enhancing security and preventing spam or fraudulent activities.

    Rate this question:

  • 15. 

    What is the function of an e-mail client automatic reply feature?

    • A.

      It automatically forwards your e-mail to a different e-mail address.

    • B.

      It sends an automated response to e-mail messages you receive.

    • C.

      It filters out unwanted, unsolicited mail.

    • D.

      It redirects all incoming mail to a specified folder.

    Correct Answer
    B. It sends an automated response to e-mail messages you receive.
    Explanation
    The function of an e-mail client automatic reply feature is to send an automated response to e-mail messages you receive. This feature allows you to set up a pre-written message that will be sent automatically to anyone who sends you an email. It is commonly used to inform senders that you are currently unavailable or out of the office, or to acknowledge receipt of their email. This feature helps in managing communication by providing an immediate response to incoming emails without the need for manual intervention.

    Rate this question:

  • 16. 

    Which PIM program feature can be used to streamline office events and prevent scheduling conflicts?

    • A.

      An alarm

    • B.

      A global address book

    • C.

      A synchronization feature

    • D.

      A centralized electronic calendar

    Correct Answer
    D. A centralized electronic calendar
    Explanation
    A centralized electronic calendar can be used to streamline office events and prevent scheduling conflicts. By having a single electronic calendar that is accessible to all employees, everyone can easily view and schedule events, meetings, and appointments. This eliminates the need for multiple individual calendars and reduces the chances of double booking or conflicting schedules. Additionally, a centralized electronic calendar can also send reminders and notifications to ensure that everyone is aware of upcoming events and deadlines.

    Rate this question:

  • 17. 

    Lucio needs to transfer a large executable file from his computer to another user's computer on the internet. He knows the other user will retrieve the file sometime the next day, but he does not know exactly when. Which protocol is Lucio's best choice for transferring the file?

    • A.

      Hypertext Transfer Protocol

    • B.

      Simple Mail Transfer Protocol

    • C.

      File Transfer Protocol

    • D.

      Post Office Protocol

    Correct Answer
    C. File Transfer Protocol
    Explanation
    Lucio's best choice for transferring the file would be the File Transfer Protocol (FTP). FTP is specifically designed for transferring files over the internet and is widely used for large file transfers. It allows for efficient and reliable transfer of files between computers, regardless of the operating systems they are using. FTP also supports resuming interrupted transfers, making it suitable for Lucio's situation where he does not know exactly when the other user will retrieve the file.

    Rate this question:

  • 18. 

    Most user-friendly FTP clients initiate commands for the user when the user clicks an action button. For which of the following actions does the FTP client program use the put command?

    • A.

      To search for a file

    • B.

      To download a file

    • C.

      To upload a file

    • D.

      To move a file to a new location

    Correct Answer
    C. To upload a file
    Explanation
    FTP clients use the put command to upload a file. This command allows the user to transfer a file from their local machine to the remote server. By clicking on the action button to upload a file, the FTP client program will initiate the put command to transfer the selected file to the server.

    Rate this question:

  • 19. 

    Which social networking term describes the ability of a group to realize a greater degree of success in solving problems by solving them collaboratively compared with solving them individually?

    • A.

      Collective intelligence

    • B.

      Crowdsourcing

    • C.

      Folksonomy

    • D.

      Mashup

    Correct Answer
    A. Collective intelligence
    Explanation
    Collective intelligence refers to the ability of a group to achieve a higher level of success in problem-solving by working together compared to individuals solving problems on their own. This concept emphasizes the power of collaboration and the idea that a group's combined knowledge, skills, and perspectives can lead to more effective problem-solving and decision-making. This term is often used in the context of social networking platforms where users can share ideas, information, and resources to collectively solve problems.

    Rate this question:

  • 20. 

    Voice over IP (VoIP), presencing, mobile computing, call/contact centers and voice-to-text conversion are all examples of what?

    • A.

      Social networking technologies

    • B.

      Terminal services clients and servers

    • C.

      Unified communications technologies

    • D.

      Short Message Service (SMS) applications

    Correct Answer
    C. Unified communications technologies
    Explanation
    Unified communications technologies refer to the integration of various communication tools and platforms into a single system. Voice over IP (VoIP), presencing, mobile computing, call/contact centers, and voice-to-text conversion are all examples of communication technologies that can be integrated into a unified communications system. This allows for seamless communication and collaboration across different channels and devices.

    Rate this question:

  • 21. 

    Which term describes an encryption method in which a number generated by an algorithm from a string of text is used to verify the integrity of transmitted data?

    • A.

      Symmetric encryption

    • B.

      Asymmetric encryption

    • C.

      Hash encryption

    • D.

      Key encryption

    Correct Answer
    C. Hash encryption
    Explanation
    Hash encryption is the term that describes an encryption method in which a number generated by an algorithm from a string of text is used to verify the integrity of transmitted data. Hash encryption involves applying a mathematical function to the input data, producing a fixed-size output known as a hash value or checksum. This hash value can then be used to verify if the transmitted data has been modified or tampered with during transmission.

    Rate this question:

  • 22. 

    A program that resides in active memory and replicates itself onto other systems is called:

    • A.

      An illicit server.

    • B.

      A trojan.

    • C.

      A virus.

    • D.

      A worm.

    Correct Answer
    D. A worm.
    Explanation
    A program that resides in active memory and replicates itself onto other systems is called a worm. Unlike a trojan, which disguises itself as a legitimate program, a worm is self-replicating and does not need to attach itself to another program. It spreads independently, often through network vulnerabilities, and can cause harm by consuming system resources, spreading malware, or carrying out malicious actions. An illicit server refers to an unauthorized or illegal server, while a virus is a type of malware that attaches itself to other programs or files to spread and cause damage.

    Rate this question:

  • 23. 

    Whenever you receive program or patches or updates, you should:

    • A.

      Delete them so they do not interfere with your existing applications.

    • B.

      Apply them to all systems immediately.

    • C.

      Test them on one computer to ensure that they solve your problems without any unforeseen consequences.

    • D.

      Send them to all your colleagues and friends so they can apply them to their systems.

    Correct Answer
    C. Test them on one computer to ensure that they solve your problems without any unforeseen consequences.
    Explanation
    When receiving program or patches or updates, it is important to test them on one computer first to ensure that they solve your problems without any unforeseen consequences. This step is necessary to avoid any potential issues or conflicts with existing applications. Applying them to all systems immediately or sending them to colleagues and friends without testing can lead to compatibility issues and unforeseen problems. Deleting them is not the right approach as they are meant to improve or fix issues in the existing system.

    Rate this question:

  • 24. 

    What is the name of the process whereby the project manager acquires, processes and evaluates information from the customer to help identify the goals of the project?

    • A.

      Needs analysis

    • B.

      Project schedule

    • C.

      Scope creep

    • D.

      Statement Of Work

    Correct Answer
    A. Needs analysis
    Explanation
    Needs analysis is the correct answer because it refers to the process in which the project manager gathers and evaluates information from the customer to determine the project's goals and requirements. This involves understanding the customer's needs, expectations, and desired outcomes for the project. Through needs analysis, the project manager can identify the scope, deliverables, and constraints of the project, which are essential for successful project planning and execution.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 07, 2010
    Quiz Created by
    Micahtredding
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.