Windows Media Player
Silverlight
Real Player
QuickTime
Rate this question:
FTP site
Intranet
Extranet
Webminar
Rate this question:
A lossless installation
An offline installation
A lossy installation
An online installation
Rate this question:
To upload a file
To move a file to a new location
To download a file
To search for a file
Rate this question:
Sandbox
Window
Rendering Engine
Interpreter
Rate this question:
Ftp://
Http://
Mailto://
Html://
Rate this question:
Streaming Video
Intranet
Webinar
Extranet Voice conference Voice conference
Rate this question:
The file size are relatively small, resulting in shorter download times.
Transfer delays are minimised because the animations download streaming media.
The file size are relatively large, allowing you to create highly elaborate animations
Transfer delays are minimised because portion of animations are stored in your local disk cache.
Rate this question:
Rich Text Format (RTF)
Microsoft Word (DOC)
Portable Document Format (PDF)
Encapsulated PostScript (EPS)
Rate this question:
Create new processes and recover from problem threads, thereby avoiding crashes.
Improve the performance of computers with slow connections.
Surf the Web privately, leaving no cached information.
Develop software that lacks any constraints imposed by prior development.
Rate this question:
To download a file
To search for a file
To move a file to a new location
To upload a file
Rate this question:
Viewer
Plug-in
Object
Applet
Rate this question:
You may not be able to access the company intranet.
You may not be able to set up Web feeds when needed to access news headlines.
You may not be able to clear your browser's cache.
You may not be able to enter logon information when needed to access a site.
Rate this question:
AVI
MPEG
AU
Rate this question:
Adobe Flash Player
Windows Media Player
Apple QuickTime
Adobe Reader
Rate this question:
Save the Web page content to your hard disk.
Save the Web page content to your computer's local disk cache.
Install the appropriate viewer for the browser you are using.
Install the appropriate plug-in for the browser you are using.
Rate this question:
A deep URL
A relative URL
An absolute URL
A default URL
Rate this question:
Image that map bits directly to a display space
Mathematical shapes saved as a sequence of vector statements, which map bits directly to a display space.
Mathematical shapes saved as a sequence of vector statements, which describe a series of points to be connected
Pixel-based images that describe a series of points to be connected.
Rate this question:
A set of guidelines that encourage common sense, politeness and general rules for e-mail messages
A set of typographical conventions that govern user practices in e-mail messages
A set of U.S. laws that specify content forbidden from transmission in e-mail messages
An international convention banning the user of profanity and controversial opinions from e-mail messages
Rate this question:
Any type of file can be attached to an e-mail message, but only if the file is first compressed using a file compression utility.
E-mail messages do not support attachments of any type unless you use a browser to transmit them.
Almost any type of file can be attached to e-mail messages, such as documents, spreadsheets, presentations or images.
Only image files can be attached to e-mail messages; any text must be palced in the body of the message.
Rate this question:
Messages that are queued for sending
Messages that have been sent to you by others
Messages that have been marked for deletion
Messages that you have sent to others
To send an automated respond to e-mail messages received while you are out of the office for a planned absence
TO automatically attach your signature information to the end of every e-mail message you send
To send an automated response to e-mail messages that your system is configured to discard as spam
To automatically attach your signature information to the end of every e-mail message you forward
S/MIME controls the way attachments are organised and distinguished from one another, and it supports encryption; whereas MIME controls the way messages are organised and distinguished from one another, and it supports the user of digital certificates.
S/MIME is designed specifically for servers, whereas MIME is designed specifically for individual clients.
S/MIME controls the way that messages and attachments are organised and distinguished from one another, whereas MIME supports encryption and the user of digital certificates.
S/MIME supports encryption and the user of digital certificates, whereas MIME controls the way that messages and attachements are organised and distinguished from one another.
Rate this question:
At the server, just after the message has been received via POP3
At the client, usually just after the message has been received via SMTP
At the server, usually just after the message has been received via SMTP
At the client, usually just after the message has been received via POP3
The SMTP server may be used illicitly to send unsolicited junk mail.
Chances are increased that a hacker can use a packet sniffer to obtain a valid user name and password.
Chances are increased that a hacker can use a packet sniffer to obtain a valid digital certificate from the session.
The SMTP server will not send e-mail messages that are not digitally signed
Rate this question:
SMTP
IMAP
POP3
MIME
Your e-mail will be more easily transportable from one computer to another.
You will be able to more easily ensure that your e-mail messages are virus-free.
Your e-mail will be more easily integrable with a personal information management (PIM) program.
You will be able to more easily filter out spam.
An opt-in e-mail marketing service
A listserve subscription service
A Virtual Network Computing (NVC) service
AN opt-in mass texting service
Rate this question:
The server and the viewer
The client and the viewer
The client and the server
The TCP/IP network and the P2P application
Rate this question:
SSL/TLS-enabled FTP (FTPS)
Secure Copy (SCP)
BitTorrent
SSH File Transfer Protocol (S/FTP)
Rate this question:
An FTP site that requires a user name and password for access, but is not available to the public
An FTP site that requires a user name and a password for access, but is hosted anonymously
An FTP site that does not require authentication for access, but is not available to the public
An FTP site that does not require authentication for access, and is available to the public
Join a newsgroup about digital animation.
Subscribe to a listserve group about digital animation.
Set your browser's home page to digital animation Web site.
Bookmark a digital animation Web site on your favourite browser.
Rate this question:
"get" command
You would not need to use any FTP command
"put" command
"open" command
Rate this question:
SSH File Transfer Protocol (S/FTP)
Secure Copy
Peer-to-peer networks on the Internet (P2P)
SSL/TLS-enabled (FTPS)
Rate this question:
An encrypted authentication session
Permission to upload
Access to an anonymous FTP site
A valid user name and password
Rate this question:
Web conference
Extranet
Webcast
Intranet
Double-click the icon that represents the FTP server.
Enter the "get" command at the MS-DOS prompt.
Enter the "open" command at the MS-DOS prompt
Enter the "put" command at the MS-DOS prompt
Rate this question:
You can send e-mail to anyone using company requirement and Internet connections without fear of reprisal as long as you include your immediate supervisor as a recipient.
Your supervisor has no right to read e-mail you send, even if you send it using company equipment and Internet connections.
Your supervisor has the right to read e-mail you send using company equipment and Internet connections.
You can send e-mail to anyone using company equipment and Internet connections without fear of reprisal as long as you include someone from the company as a recipient.
Rate this question:
VoIP is the primary means by which users communicate with contact centers.
VoIP is voice information delivered in digital form as packets of data using the public switched telephone network.
VoIP is voice information delivered in digital form as packets of data using Internet Protocol (IP).
VoIP is the primary means by which users communicate with call centers.
Rate this question:
Abide by the rules of netiquette.
Will not be constructed as sexual harassment.
Are compatible with unified communications technologies.
Will not be deleted by anti-virus software.
Rate this question:
Convergence
Presencing
Unified Communication
Mobile computing
Rate this question:
Downloading and using shareware, which is free
Requesting personal information about others during an Internet chat session
Citing information you find on the Internet that you use in your own work
Downloading any songs and movies from the Internet
Rate this question:
Active content
Pop-up windows
Cookies
Pop-under windows
Rate this question:
A proxy server restricts users by requiring a user name and password for every transmission.
A proxy server runs only the corporate extranet.
A proxy server runs only the corporate intranet.
A proxy server replaces the network IP address with another, contingent address.
Rate this question:
Because it will take longer to complete cache maintenance tasks when user quits the browser
Because a small catch size may slow other computer processes, such as disk defragmentation and virus
Because the browser must search through possibly tens of thousands of cached files to locate a specific page
Because the user may spend a lot of time waiting while pages download from the server
Rate this question:
Ipconfig command
Ping command
Ifconfig command
Tracert command
Rate this question:
Third-party cookie
First-party cookie
Persistent cookie
Session cookie
Rate this question:
Customise the browser cache size on the site visitor's computer
Customise the frequency with which the site visitor's browser cache checks for newer pages.
Customise the site to the site visitor's Web browsing preferences
Customise the security options on the site visitor's browser.
Rate this question:
An encryption method in which the same key is used to encrypt and decrypt a message
An encryption method in which a key is required to encrypt data for storage and verify its integrity
An encryption method in which numbers generated by an algorithm from a text string are used to verify the integrity of transmitted messages
An encryption method in which two separate keys -- a private key and a public key -- are used to encrypt and decrypt a message
Rate this question:
After you install the anti-virus software, scan your system everyday.
Install anti-virus program updates to keep the signature profiles current.
After you install the software, scan your system at least weekly.
Install at least two different anti-virus programs and alternate their use randomly.
Rate this question:
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.