Ms. Long's CIW Practice Test assesses knowledge crucial for roles in web marketing and web development. It covers TCP\/IP, protocols, URL structures, browser cache management, and the utility of cookies in tracking user preferences.
Web browser
Hypertext Markup Language (HTML)
A domain name server
Transmission Control Protocol/Internet Protocol (TCP/IP)
Rate this question:
Backbones.
Channels.
Packets.
Protocols.
Rate this question:
The name of the server on which the page resides.
The site owner's registered site.
The type of server and Internet service being used.
The organization type
Rate this question:
History folder
Cookie folder
Browser cache
Desktop
Rate this question:
Cookies give developers access to Web site visitors' hard drive files.
Cookies inform the Web site manager about visitors' preferences.
Cookies are dangerous and should never be used in Web development.
Cookies enable developers to convey their preferences to Web site users.
Rate this question:
VPN.
TLS.
SSH.
XML.
Rate this question:
C++
Java
JavaScript
C#
Rate this question:
Codecs cannot be updated.
Download and install an upgrade for your plug-in.
Download the newest multimedia files and your codecs will be updated automatically
Deinstall your old plug-in, then download and install the latest version of the plug-in.
Rate this question:
Upgrades usually include increased functionality and security.
Plug-ins expire after a set number of days.
Old plug-ins can contain computer viruses.
Only the newest plug-ins support frames sites.
Rate this question:
Field
Record
Relationship
Primary key
Rate this question:
The fewer results you will retrieve.
The more results you will retrieve.
The more likely you will be to generate a 404 error.
The more you expand the search to include information portals and newsgroups.
Rate this question:
POP3 server and SMTP server
SMTP server and NNTP server
NNTP server and HTTP server
HTTP server and SMTP server
Rate this question:
Verify the identity of a user
Discern humans from automated senders
Ensure that only unique user names exist within a given domain
Prevent password theft
Rate this question:
It automatically forwards your e-mail to a different e-mail address.
It sends an automated response to e-mail messages you receive.
It filters out unwanted, unsolicited mail.
It redirects all incoming mail to a specified folder.
Rate this question:
An alarm
A global address book
A synchronization feature
A centralized electronic calendar
Rate this question:
Hypertext Transfer Protocol
Simple Mail Transfer Protocol
File Transfer Protocol
Post Office Protocol
Rate this question:
To search for a file
To download a file
To upload a file
To move a file to a new location
Rate this question:
Collective intelligence
Crowdsourcing
Folksonomy
Mashup
Rate this question:
Social networking technologies
Terminal services clients and servers
Unified communications technologies
Short Message Service (SMS) applications
Rate this question:
Symmetric encryption
Asymmetric encryption
Hash encryption
Key encryption
Rate this question:
An illicit server.
A trojan.
A virus.
A worm.
Rate this question:
Delete them so they do not interfere with your existing applications.
Apply them to all systems immediately.
Test them on one computer to ensure that they solve your problem without any unforeseen consequences.
Send them to all your colleagues and friends so they can apply them to their systems.
Rate this question:
Needs analysis
Project schedule
Scope creep
Statement Of Work
Rate this question:
To keep message content reasonably short
To indicate that one or more files is attached to the message
To help clarify the subject matter of the message
To help convey the intended tone of the message
Rate this question:
An e-mail message that includes messages text tyoed in all capital letters
An e-mail message that includes information from the original e-mail message
An e-mail message that connot be retrieved once it has been sent
An e-mail message that is devoid of emoticons.
Rate this question:
The welcome page
The bookmarks page
The home page
The favorites page
Rate this question:
A contract allowing you to use the beatles' digital graphics on your Website
Th apple icon on the cover of many Beatles albums
An MP3 file containing the Beatles' song "Hey Jude"
A chapter from John Lennon's book "In his Own Write"
Rate this question:
By using wireless network components
By requiring less overhead
By causing Internet usage to grow
By using 128-bit IP addresses
Rate this question:
The company that provides telephone lines to your home office
An organization that maintains a gateway to the Internet and rents access to it
A dial-up or high-speed direct connection to the Internet
A computer system with an Internet connection and the correct software for Internet communication
Rate this question:
Instant messages can be sent only to contacts who are currently online.
Instant message can display responses only when you click the Send/Receive button.
You do not access to a network in order to send and recive instant messages.
Instant messages can be sent to contacts wheather they are online or not
Rate this question:
A Gantt chart
An issues log
A SWOT analysis
A project schedule
Rate this question:
A message marked for follow-up
A message that has not yet been read
A message marked for deletion
A message that has already been ready
Rate this question:
Ogg Vorbis (OGG)
Audio Interchange Files Format (AIFF)
Waveform (WAV)
Moving picture Experts Group, Audio Layer-3 (MP3)
Rate this question:
A record in Table A can have matching records in Table B, but a record in Table B has only one matching record in Table A.
No record in Table A has any matching records in Table B.
One record in Table A has any matching records in Table B, and vice versa.
Each record in Table A has any matching records in Table B, and vice versa.
Rate this question:
The ipconfig command
The ping command
The tracert command
The config command
Rate this question:
Internet control Messaging Protocol (ICMP)
Point-to-Point Protocol (PPP)
Transmission control protocol (TCP)
Internet Protocol (IP)
Rate this question:
Aunit of work that must be accomplished
The appointment of a person, department or device to a unit of work
A person, department or device needed to accomplished a unit of work
A sequence of work units that must be accomplished within a defined time frame
Rate this question:
Locates an Internet resource using an e-mail server
Identifies the method by which an Internet resource is accessed
Locates an Internet resource using a search engine
Identifies the search string used to locate an Internet resource
Rate this question:
Use CAPTCHA to distinguish human senders from automated senders.
Use SMTP authentication, which requiers a valid name and password for each message.
Configure your system to filter IP addresses contained in the latest blackhole list.
Use a client-side filter to identify and filter spam messages.
Rate this question:
Client software, Internet connection and Internet address
Network access, administrator perission and server software
Internet connection, Client software and server software
Server system, Internet connection and network access
Rate this question:
MIME server
POP3 server
IMAP server
SMTP server
Rate this question:
E1
DSL
ISDN
T1
Rate this question:
To avoid crediting the creators of the sites you used
To avoid plagiarzing someone else's work
To avoid using someone else's work for your own site or publication
To avoide contacting the original author
Rate this question:
Encapsulated PostScript (EPS)
Rich Text Format (RTF)
Portable Document Format (PDF)
Microsoft Word (DOC)
Rate this question:
Chances are increased that a hacker can use a packet sniffer to obtain a valid digital certificate from the session.
The SMTP server may be used illicitly to send unsolicited junk mail.
The SMTP server will not send e-mail messages that are not digitally signed
Chances are increased that a hacker can use a packet sniffer to obtain a calid user name and password
Rate this question:
RSA encryption
Symmetric-key encryption
Hash encryption
Asymmetric-key encryption
Rate this question:
Firewall
Digital certifcate
Encrypted key
Digital signature
Rate this question:
Juntion table
Common field
Primary key
Foreign key
Rate this question:
Quiz Review Timeline (Updated): Mar 19, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.