Internet Foundations 2

50 Questions

Settings
Please wait...
Internet Quizzes & Trivia

Questions and Answers
  • 1. 
    Which popular plug-in is Microsoft's response to Adobe Flash?  
    • A. 

      Windows Media Player

    • B. 

      Silverlight

    • C. 

      Real Player

    • D. 

      QuickTime

  • 2. 
    Your company wants to simplify the customer support process for its distributors by enabling them to obtain company forms and reports online  You and your Web team are in charge of implementing this capability Which Web based system should you implement?
    • A. 

      FTP site

    • B. 

      Intranet

    • C. 

      Extranet

    • D. 

      Webminar

  • 3. 
    While you are exploring a Web page in the Firefox browser, a file fails to properly display. You decide to install the required plug-in to view the file and are force to quit Firefox, install the plug-in, then restart Firefox. Which kind of installation is this?  
    • A. 

      A lossless installation

    • B. 

      An offline installation

    • C. 

      A lossy installation

    • D. 

      An online installation

  • 4. 
    Users can access and navigate an FTP server using an FTP client program. For which action does the FTP client programe use the "put" command?  
    • A. 

      To upload a file

    • B. 

      To move a file to a new location

    • C. 

      To download a file

    • D. 

      To search for a file

  • 5. 
    What is the term for the part of a browser responsible for reading a Web page and presenting it to an end user?  
    • A. 

      Sandbox

    • B. 

      Window

    • C. 

      Rendering Engine

    • D. 

      Interpreter

  • 6. 
    With which prefix does a Web page's Uniform Resource Locator (URL) begin?  
    • A. 

      Ftp://

    • B. 

      Http://

    • C. 

      Mailto://

    • D. 

      Html://

  • 7. 
    Which term is usd to describe a training session that is delivered over the Internet?  
    • A. 

      Streaming Video

    • B. 

      Intranet

    • C. 

      Webinar

    • D. 

      Extranet Voice conference Voice conference

  • 8. 
    What is the main advantage of using vector graphics instead of raster graphics to create animations?  
    • A. 

      The file size are relatively small, resulting in shorter download times.

    • B. 

      Transfer delays are minimised because the animations download streaming media.

    • C. 

      The file size are relatively large, allowing you to create highly elaborate animations

    • D. 

      Transfer delays are minimised because portion of animations are stored in your local disk cache.

  • 9. 
    Which file format retains formatting information through all platforms and can be created and read on any computer, regardless of the local operating system?  
    • A. 

      Rich Text Format (RTF)

    • B. 

      Microsoft Word (DOC)

    • C. 

      Portable Document Format (PDF)

    • D. 

      Encapsulated PostScript (EPS)

  • 10. 
    Anonymous browsing allows users to:
    • A. 

      Create new processes and recover from problem threads, thereby avoiding crashes.

    • B. 

      Improve the performance of computers with slow connections.

    • C. 

      Surf the Web privately, leaving no cached information.

    • D. 

      Develop software that lacks any constraints imposed by prior development.

  • 11. 
    Users can access and navigate an FTP server using an FTP client programme. For which action does the FTP client programme user the "get" command?  
    • A. 

      To download a file

    • B. 

      To search for a file

    • C. 

      To move a file to a new location

    • D. 

      To upload a file

  • 12. 
    You want to be able to access active content directly from your browser. Which type of application provides the efficient integration of multimedia formats with a browser or computer that will enable you to do this?  
    • A. 

      Viewer

    • B. 

      Plug-in

    • C. 

      Object

    • D. 

      Applet

  • 13. 
    You have activated pop-up blockers in your Web browser to prevent pop-up windows from continually interrupting your browsing experience. What could be an unintended consequence of this action?  
    • A. 

      You may not be able to access the company intranet.

    • B. 

      You may not be able to set up Web feeds when needed to access news headlines.

    • C. 

      You may not be able to clear your browser's cache.

    • D. 

      You may not be able to enter logon information when needed to access a site.

  • 14. 
    Which audio file format is inherently supported by most browsers?  
    • A. 

      PDF

    • B. 

      AVI

    • C. 

      MPEG

    • D. 

      AU

  • 15. 
    Which of the following plug-ins can be used to show MOV files, which can combine video, animation, text and audio into one file?  
    • A. 

      Adobe Flash Player

    • B. 

      Windows Media Player

    • C. 

      Apple QuickTime

    • D. 

      Adobe Reader

  • 16. 
    How can you view a Web page, including all related images, fonts, and scripts referenced by the HTML on the page, without connecting to the Internet?  
    • A. 

      Save the Web page content to your hard disk.

    • B. 

      Save the Web page content to your computer's local disk cache.

    • C. 

      Install the appropriate viewer for the browser you are using.

    • D. 

      Install the appropriate plug-in for the browser you are using.

  • 17. 
    You want to learn more about CIW certifications and access a PDF document at http://www.ciwcertified.com/ _resources/CIW_Roadmap.pdf. Which type of URL does this represent?  
    • A. 

      A deep URL

    • B. 

      A relative URL

    • C. 

      An absolute URL

    • D. 

      A default URL

  • 18. 
    The graphics you are probably most familiar with, GIFs, and JPEGs, are raster graphics. What are raster graphics?  
    • A. 

      Image that map bits directly to a display space

    • B. 

      Mathematical shapes saved as a sequence of vector statements, which map bits directly to a display space.

    • C. 

      Mathematical shapes saved as a sequence of vector statements, which describe a series of points to be connected

    • D. 

      Pixel-based images that describe a series of points to be connected.

  • 19. 
    To what does the term "netiquette" refer?
    • A. 

      A set of guidelines that encourage common sense, politeness and general rules for e-mail messages

    • B. 

      A set of typographical conventions that govern user practices in e-mail messages

    • C. 

      A set of U.S. laws that specify content forbidden from transmission in e-mail messages

    • D. 

      An international convention banning the user of profanity and controversial opinions from e-mail messages

  • 20. 
    Which choice describes the file type(s) that can be attached to an e-mail message?  
    • A. 

      Any type of file can be attached to an e-mail message, but only if the file is first compressed using a file compression utility.

    • B. 

      E-mail messages do not support attachments of any type unless you use a browser to transmit them.

    • C. 

      Almost any type of file can be attached to e-mail messages, such as documents, spreadsheets, presentations or images.

    • D. 

      Only image files can be attached to e-mail messages; any text must be palced in the body of the message.

  • 21. 
    • A. 

      Messages that are queued for sending

    • B. 

      Messages that have been sent to you by others

    • C. 

      Messages that have been marked for deletion

    • D. 

      Messages that you have sent to others

  • 22. 
    • A. 

      To send an automated respond to e-mail messages received while you are out of the office for a planned absence

    • B. 

      TO automatically attach your signature information to the end of every e-mail message you send

    • C. 

      To send an automated response to e-mail messages that your system is configured to discard as spam

    • D. 

      To automatically attach your signature information to the end of every e-mail message you forward

  • 23. 
    • A. 

      S/MIME controls the way attachments are organised and distinguished from one another, and it supports encryption; whereas MIME controls the way messages are organised and distinguished from one another, and it supports the user of digital certificates.

    • B. 

      S/MIME is designed specifically for servers, whereas MIME is designed specifically for individual clients.

    • C. 

      S/MIME controls the way that messages and attachments are organised and distinguished from one another, whereas MIME supports encryption and the user of digital certificates.

    • D. 

      S/MIME supports encryption and the user of digital certificates, whereas MIME controls the way that messages and attachements are organised and distinguished from one another.

  • 24. 
    Because file attachments may contain malicious code that can be used to damage or infiltrate systems, your company routinely scans all file attachments in incoming e-mail. Where does attachment scanning take place?
    • A. 

      At the server, just after the message has been received via POP3

    • B. 

      At the client, usually just after the message has been received via SMTP

    • C. 

      At the server, usually just after the message has been received via SMTP

    • D. 

      At the client, usually just after the message has been received via POP3

  • 25. 
    • A. 

      The SMTP server may be used illicitly to send unsolicited junk mail.

    • B. 

      Chances are increased that a hacker can use a packet sniffer to obtain a valid user name and password.

    • C. 

      Chances are increased that a hacker can use a packet sniffer to obtain a valid digital certificate from the session.

    • D. 

      The SMTP server will not send e-mail messages that are not digitally signed

  • 26. 
    • A. 

      SMTP

    • B. 

      IMAP

    • C. 

      POP3

    • D. 

      MIME

  • 27. 
    • A. 

      Your e-mail will be more easily transportable from one computer to another.

    • B. 

      You will be able to more easily ensure that your e-mail messages are virus-free.

    • C. 

      Your e-mail will be more easily integrable with a personal information management (PIM) program.

    • D. 

      You will be able to more easily filter out spam.

  • 28. 
    You visit the Web site of a business from which you make online purchases and set up an account on your smartphone. The site requests your mobile phone in order to send you promotional text messages. What type of service does this scenario describe?
    • A. 

      An opt-in e-mail marketing service

    • B. 

      A listserve subscription service

    • C. 

      A Virtual Network Computing (NVC) service

    • D. 

      AN opt-in mass texting service

  • 29. 
    Virtual Network Computing (VNC) is a program that allows you to control a computer at a remote location. VNC consists of which two components?  
    • A. 

      The server and the viewer

    • B. 

      The client and the viewer

    • C. 

      The client and the server

    • D. 

      The TCP/IP network and the P2P application

  • 30. 
    • A. 

      SSL/TLS-enabled FTP (FTPS)

    • B. 

      Secure Copy (SCP)

    • C. 

      BitTorrent

    • D. 

      SSH File Transfer Protocol (S/FTP)

  • 31. 
    • A. 

      An FTP site that requires a user name and password for access, but is not available to the public

    • B. 

      An FTP site that requires a user name and a password for access, but is hosted anonymously

    • C. 

      An FTP site that does not require authentication for access, but is not available to the public

    • D. 

      An FTP site that does not require authentication for access, and is available to the public

  • 32. 
    You want to receive e-mail messages, announcements and advertising on a regular basis about digital animation. Which action could you take to accomplish this?
    • A. 

      Join a newsgroup about digital animation.

    • B. 

      Subscribe to a listserve group about digital animation.

    • C. 

      Set your browser's home page to digital animation Web site.

    • D. 

      Bookmark a digital animation Web site on your favourite browser.

  • 33. 
    If you use a Web browser's built-in FTP client, which FTP command would you need to use to download a file from your company's FTP site?
    • A. 

      "get" command

    • B. 

      You would not need to use any FTP command

    • C. 

      "put" command

    • D. 

      "open" command

  • 34. 
    Companies increasingly want to allow employees to share files directly without having to maintain servers to provide FTP access. Which technology can companies use to maximise processing power while protecting privacy and sensitive materials?
    • A. 

      SSH File Transfer Protocol (S/FTP)

    • B. 

      Secure Copy

    • C. 

      Peer-to-peer networks on the Internet (P2P)

    • D. 

      SSL/TLS-enabled (FTPS)

  • 35. 
    Two requirements are necessary to upload files to an FTP site. One requirement is gaining access to an FTP client program. What is the other requirement?
    • A. 

      An encrypted authentication session

    • B. 

      Permission to upload

    • C. 

      Access to an anonymous FTP site

    • D. 

      A valid user name and password

  • 36. 
    You want to attend a training session remotely. The presenter has recommended an application for you to download that uses VoIP audio technology so you can interact with the presenter and the other participants. Which Web-based system does this scenario describe?
    • A. 

      Web conference

    • B. 

      Extranet

    • C. 

      Webcast

    • D. 

      Intranet

  • 37. 
    Using command-line FTP on a Windows system, how do you gain access to an FTP server?
    • A. 

      Double-click the icon that represents the FTP server.

    • B. 

      Enter the "get" command at the MS-DOS prompt.

    • C. 

      Enter the "open" command at the MS-DOS prompt

    • D. 

      Enter the "put" command at the MS-DOS prompt

  • 38. 
    You send an e-mail message to a co-worker to help plan a surprise going-away party for a mutual friend before she embarks on a six-month around-the-world cruise. Which statement reflects your right to e-mail privacy?
    • A. 

      You can send e-mail to anyone using company requirement and Internet connections without fear of reprisal as long as you include your immediate supervisor as a recipient.

    • B. 

      Your supervisor has no right to read e-mail you send, even if you send it using company equipment and Internet connections.

    • C. 

      Your supervisor has the right to read e-mail you send using company equipment and Internet connections.

    • D. 

      You can send e-mail to anyone using company equipment and Internet connections without fear of reprisal as long as you include someone from the company as a recipient.

  • 39. 
    • A. 

      VoIP is the primary means by which users communicate with contact centers.

    • B. 

      VoIP is voice information delivered in digital form as packets of data using the public switched telephone network.

    • C. 

      VoIP is voice information delivered in digital form as packets of data using Internet Protocol (IP).

    • D. 

      VoIP is the primary means by which users communicate with call centers.

  • 40. 
    You make it a point to send e-mail messages, text messages and instant messages that are considered "safe for work." This is a good way to ensure that your messages:
    • A. 

      Abide by the rules of netiquette.

    • B. 

      Will not be constructed as sexual harassment.

    • C. 

      Are compatible with unified communications technologies.

    • D. 

      Will not be deleted by anti-virus software.

  • 41. 
    When you sign in to your instant messaging (IM) service, your online status is advertised (or published) to the people on your contacts list. What does this scenario represent?
    • A. 

      Convergence

    • B. 

      Presencing

    • C. 

      Unified Communication

    • D. 

      Mobile computing

  • 42. 
    • A. 

      Downloading and using shareware, which is free

    • B. 

      Requesting personal information about others during an Internet chat session

    • C. 

      Citing information you find on the Internet that you use in your own work

    • D. 

      Downloading any songs and movies from the Internet

  • 43. 
    As part of the IT department, you configure the employee workstations for your company. When configuring a user's system, you always set the browser security levels to the company standard settings. What is restricted from downloading to the user's system when you configure browser security levels?
    • A. 

      Active content

    • B. 

      Pop-up windows

    • C. 

      Cookies

    • D. 

      Pop-under windows

  • 44. 
    • A. 

      A proxy server restricts users by requiring a user name and password for every transmission.

    • B. 

      A proxy server runs only the corporate extranet.

    • C. 

      A proxy server runs only the corporate intranet.

    • D. 

      A proxy server replaces the network IP address with another, contingent address.

  • 45. 
    You work for your company's IT department diagnosing and servicing the employees's workstations. A user complains that since she has been conducting a lot of research online, performance is slowing. You increase the size of her browser cache. Why might performance slow if the browser cache is too small?
    • A. 

      Because it will take longer to complete cache maintenance tasks when user quits the browser

    • B. 

      Because a small catch size may slow other computer processes, such as disk defragmentation and virus

    • C. 

      Because the browser must search through possibly tens of thousands of cached files to locate a specific page

    • D. 

      Because the user may spend a lot of time waiting while pages download from the server

  • 46. 
    • A. 

      Ipconfig command

    • B. 

      Ping command

    • C. 

      Ifconfig command

    • D. 

      Tracert command

  • 47. 
    Which cookie type remains on your system after you end your browser session?
    • A. 

      Third-party cookie

    • B. 

      First-party cookie

    • C. 

      Persistent cookie

    • D. 

      Session cookie

  • 48. 
    A cookie is a text file that is placed on a Web site visitor's computer. Cookies allow a Web site manager to:
    • A. 

      Customise the browser cache size on the site visitor's computer

    • B. 

      Customise the frequency with which the site visitor's browser cache checks for newer pages.

    • C. 

      Customise the site to the site visitor's Web browsing preferences

    • D. 

      Customise the security options on the site visitor's browser.

  • 49. 
    • A. 

      An encryption method in which the same key is used to encrypt and decrypt a message

    • B. 

      An encryption method in which a key is required to encrypt data for storage and verify its integrity

    • C. 

      An encryption method in which numbers generated by an algorithm from a text string are used to verify the integrity of transmitted messages

    • D. 

      An encryption method in which two separate keys -- a private key and a public key -- are used to encrypt and decrypt a message

  • 50. 
    Computer viruses can cause damage ranging from relatively minor to debilitating. You can protect your system against viruses by using commercial virus-detection software to find and defeat viruses. Because new viruses are created so rapidly, what must you do to ensure that your anti-virus software can protect you?
    • A. 

      After you install the anti-virus software, scan your system everyday.

    • B. 

      Install anti-virus program updates to keep the signature profiles current.

    • C. 

      After you install the software, scan your system at least weekly.

    • D. 

      Install at least two different anti-virus programs and alternate their use randomly.