International Business Foundations Book Quiz

24 Questions | Total Attempts: 300

SettingsSettingsSettings
International Business Quizzes & Trivia

Over the Internet Business Foundations book.


Questions and Answers
  • 1. 
    A person in which job role would be responsible for developing and implementing plans to take advantage of the sales opportunities available through the internet?
    • A. 

      SEO analyst

    • B. 

      Security analyst

    • C. 

      Web marketing manager

    • D. 

      Web site analyst

  • 2. 
    Which of the following is always required to connect to the Internet?
    • A. 

      A Web browser

    • B. 

      Hypertext Markup Language (HTML)

    • C. 

      A domain name server

    • D. 

      Transmission Control Protocol/Internet Protocol (TCP/IP)

  • 3. 
    The rules that describe the ways that clients and servers communicate across a network are called:
    • A. 

      Backbones.

    • B. 

      Channels.

    • C. 

      Packets.

    • D. 

      Protocols.

  • 4. 
    Web addresses are called Uniform Resource Locators (URLs). A URL is a text string that specifies an Internet address and the method by which the address can be accessed. The protocol component of a URL identifies:
    • A. 

      The name of the server on which the page resides.

    • B. 

      The site owner's registered site.

    • C. 

      The type of server and Internet service being used.

    • D. 

      The organization type.

  • 5. 
    When you view a Web page, the images are downloaded to your computer. Where are they stored?
    • A. 

      History folder

    • B. 

      Cookie folder

    • C. 

      Browser cache

    • D. 

      Desktop

  • 6. 
    In what ways can cookies be useful for Web site developers?
    • A. 

      Cookies give developers access to Web site visitors' hard drive files.

    • B. 

      Cookies inform the Web site manager about visitors' preferences.

    • C. 

      Cookies are dangerous and should never be used in Web development.

    • D. 

      Cookies enable developers to convey their preferences to Web site users.

  • 7. 
    You want customers to use their credit cards to make purchases on your Web site. In order to ensure secure exchanges, you should consider using:
    • A. 

      VPN.

    • B. 

      TLS.

    • C. 

      SSH.

    • D. 

      XML.

  • 8. 
    Which of the following is an event-driven scripting language used to create active content on a Web page?
    • A. 

      C++

    • B. 

      Java

    • C. 

      JavaScript

    • D. 

      C#

  • 9. 
    What is the easiest way to update the codecs used by your multimedia plug-in?
    • A. 

      Codecs cannot be updated.

    • B. 

      Download and install an upgrade for your plug-in.

    • C. 

      Download the newest multimedia files and your codecs will be updated automatically.

    • D. 

      Deinstall your old plug-in, then download and install the latest version of the plug-in.

  • 10. 
    Why is it advisable to occasionally upgrade plug-ins from the appropriate vendor's site?
    • A. 

      Upgrades usually include increased functionality and security.

    • B. 

      Plug-ins expire after a set number of days.

    • C. 

      Old plug-ins can contain computer viruses.

    • D. 

      Only the newest plug-ins support frames sites.

  • 11. 
    In a relational database table, which term describes a category of information, represented as a column in the table?
    • A. 

      Field

    • B. 

      Record

    • C. 

      Relationship

    • D. 

      Primary key

  • 12. 
    The more terms you combine using the AND Boolean operator in a search:
    • A. 

      The fewer results you will retrieve.

    • B. 

      The more results you will retrieve.

    • C. 

      The more likely you will be to generate a 404 error.

    • D. 

      The more you expand the search to include information portals and newsgroups.

  • 13. 
    Suki just signed up with an Internet Service Provider (ISP), and now she is setting up Windows Mail as her e-mail client. As she configures this e-mail client, Suki must specify the names of which two servers?
    • A. 

      POP3 server and SMTP server

    • B. 

      SMTP server and NNTP server

    • C. 

      NNTP server and HTTP server

    • D. 

      HTTP server and SMTP server

  • 14. 
    What is CAPTCHA designed to do?
    • A. 

      Verify the identity of a user

    • B. 

      Discern humans from automated senders

    • C. 

      Ensure that only unique user names exist within a given domain

    • D. 

      Prevent password theft

  • 15. 
    What is the function of an e-mail client automatic reply feature?
    • A. 

      It automatically forwards your e-mail to a different e-mail address.

    • B. 

      It sends an automated response to e-mail messages you receive.

    • C. 

      It filters out unwanted, unsolicited mail.

    • D. 

      It redirects all incoming mail to a specified folder.

  • 16. 
    Which PIM program feature can be used to streamline office events and prevent scheduling conflicts?
    • A. 

      An alarm

    • B. 

      A global address book

    • C. 

      A synchronization feature

    • D. 

      A centralized electronic calendar

  • 17. 
    Lucio needs to transfer a large executable file from his computer to another user's computer on the internet. He knows the other user will retrieve the file sometime the next day, but he does not know exactly when. Which protocol is Lucio's best choice for transferring the file?
    • A. 

      Hypertext Transfer Protocol

    • B. 

      Simple Mail Transfer Protocol

    • C. 

      File Transfer Protocol

    • D. 

      Post Office Protocol

  • 18. 
    Most user-friendly FTP clients initiate commands for the user when the user clicks an action button. For which of the following actions does the FTP client program use the put command?
    • A. 

      To search for a file

    • B. 

      To download a file

    • C. 

      To upload a file

    • D. 

      To move a file to a new location

  • 19. 
    Which social networking term describes the ability of a group to realize a greater degree of success in solving problems by solving them collaboratively compared with solving them individually?
    • A. 

      Collective intelligence

    • B. 

      Crowdsourcing

    • C. 

      Folksonomy

    • D. 

      Mashup

  • 20. 
    Voice over IP (VoIP), presencing, mobile computing, call/contact centers and voice-to-text conversion are all examples of what?
    • A. 

      Social networking technologies

    • B. 

      Terminal services clients and servers

    • C. 

      Unified communications technologies

    • D. 

      Short Message Service (SMS) applications

  • 21. 
    Which term describes an encryption method in which a number generated by an algorithm from a string of text is used to verify the integrity of transmitted data?
    • A. 

      Symmetric encryption

    • B. 

      Asymmetric encryption

    • C. 

      Hash encryption

    • D. 

      Key encryption

  • 22. 
    A program that resides in active memory and replicates itself onto other systems is called:
    • A. 

      An illicit server.

    • B. 

      A trojan.

    • C. 

      A virus.

    • D. 

      A worm.

  • 23. 
    Whenever you receive program or patches or updates, you should:
    • A. 

      Delete them so they do not interfere with your existing applications.

    • B. 

      Apply them to all systems immediately.

    • C. 

      Test them on one computer to ensure that they solve your problems without any unforeseen consequences.

    • D. 

      Send them to all your colleagues and friends so they can apply them to their systems.

  • 24. 
    What is the name of the process whereby the project manager acquires, processes and evaluates information from the customer to help identify the goals of the project?
    • A. 

      Needs analysis

    • B. 

      Project schedule

    • C. 

      Scope creep

    • D. 

      Statement Of Work

Back to Top Back to top