MS. Long's CIW Practice Test

40 Questions

Settings
Please wait...
Software Quizzes & Trivia

Lets see what you know. . . . . .


Questions and Answers
  • 1. 
    A person in which job role would be responsible for developing and implementing plans to take advantage of the sales opportunities available through the Internet?
    • A. 

      SEO Analyst

    • B. 

      Security Analyst

    • C. 

      Web Marketing Manager

    • D. 

      Web Sit Analyst

  • 2. 
    Which of the following is always required to connect to the Internet?
    • A. 

      Web browser

    • B. 

      Hypertext Markup Language (HTML)

    • C. 

      A domain name server

    • D. 

      Transmission Control Protocol/Internet Protocol (TCP/IP)

  • 3. 
    The rules that describe the ways that clients and servers communicate across a network are called:
    • A. 

      Backbones.

    • B. 

      Channels.

    • C. 

      Packets.

    • D. 

      Protocols.

  • 4. 
    Web addresses are called Uniform Resource Locators (URLs). A URL is a text string that specifies an Internet address and the method by which the address can be accessed. The protocol component of a URL identifies:
    • A. 

      The name of the server on which the page resides.

    • B. 

      The site owner's registered site.

    • C. 

      The type of server and Internet service being used.

    • D. 

      The organization type

  • 5. 
    When you view a Web page, the images are downloaded to your computer. Where are they stored?
    • A. 

      History folder

    • B. 

      Cookie folder

    • C. 

      Browser cache

    • D. 

      Desktop

  • 6. 
    In what ways can cookies be useful for Web site developers?
    • A. 

      Cookies give developers access to Web site visitors' hard drive files.

    • B. 

      Cookies inform the Web site manager about visitors' preferences.

    • C. 

      Cookies are dangerous and should never be used in Web development.

    • D. 

      Cookies enable developers to convey their preferences to Web site users.

  • 7. 
    You want customers to use their credit cards to make purchases on your Web site. In order to ensure secure exchanges, you should consider using:
    • A. 

      VPN.

    • B. 

      TLS.

    • C. 

      SSH.

    • D. 

      XML.

  • 8. 
    Which of the following is an event-driven scripting language used to create active content on a Web page?
    • A. 

      C++

    • B. 

      Java

    • C. 

      JavaScript

    • D. 

      C#

  • 9. 
    What is the easiest way to update the codecs used by your multimedia plug-in?
    • A. 

      Codecs cannot be updated.

    • B. 

      Download and install an upgrade for your plug-in.

    • C. 

      Download the newest multimedia files and your codecs will be updated automatically

    • D. 

      Deinstall your old plug-in, then download and install the latest version of the plug-in.

  • 10. 
    Why is it advisable to occasionally upgrade plug-ins from the appropriate vendor's site?
    • A. 

      Upgrades usually include increased functionality and security.

    • B. 

      Plug-ins expire after a set number of days.

    • C. 

      Old plug-ins can contain computer viruses.

    • D. 

      Only the newest plug-ins support frames sites.

  • 11. 
    In a relational database table, which term describes a category of information, represented as a column in the table?
    • A. 

      Field

    • B. 

      Record

    • C. 

      Relationship

    • D. 

      Primary key

  • 12. 
    The more terms you combine using the AND Boolean operator in a search:
    • A. 

      The fewer results you will retrieve.

    • B. 

      The more results you will retrieve.

    • C. 

      The more likely you will be to generate a 404 error.

    • D. 

      The more you expand the search to include information portals and newsgroups.

  • 13. 
    Suki just signed up with an Internet Service Provider (ISP), and now she is setting up Windows Mail as her e-mail client. As she configures this e-mail client, Suki must specify the names of which two servers?
    • A. 

      POP3 server and SMTP server

    • B. 

      SMTP server and NNTP server

    • C. 

      NNTP server and HTTP server

    • D. 

      HTTP server and SMTP server

  • 14. 
    What is a CAPTCHA designed to do?
    • A. 

      Verify the identity of a user

    • B. 

      Discern humans from automated senders

    • C. 

      Ensure that only unique user names exist within a given domain

    • D. 

      Prevent password theft

  • 15. 
    What is the function of an e-mail client automatic reply feature?
    • A. 

      It automatically forwards your e-mail to a different e-mail address.

    • B. 

      It sends an automated response to e-mail messages you receive.

    • C. 

      It filters out unwanted, unsolicited mail.

    • D. 

      It redirects all incoming mail to a specified folder.

  • 16. 
    Which PIM program feature can be used to streamline office events and prevent scheduling conflicts?
    • A. 

      An alarm

    • B. 

      A global address book

    • C. 

      A synchronization feature

    • D. 

      A centralized electronic calendar

  • 17. 
    Lucio needs to transfer a large executable file from his computer to another user's computer on the Internet. He knows the other user will retrieve the file sometime the next day, but he does not know exactly when. Which protocol is Lucio's best choice for transferring the file?
    • A. 

      Hypertext Transfer Protocol

    • B. 

      Simple Mail Transfer Protocol

    • C. 

      File Transfer Protocol

    • D. 

      Post Office Protocol

  • 18. 
    Most user-friendly FTP clients initiate commands for the user when the user clicks an action button. For which of the following actions does the FTP client program use the  put command?
    • A. 

      To search for a file

    • B. 

      To download a file

    • C. 

      To upload a file

    • D. 

      To move a file to a new location

  • 19. 
    Which social networking term describes the ability of a group to realize a greater degree of success in solving problems by solving them collaboratively compared with solving them individually?
    • A. 

      Collective intelligence

    • B. 

      Crowdsourcing

    • C. 

      Folksonomy

    • D. 

      Mashup

  • 20. 
    Voice over IP (VoIP), presencing, mobile computing, call/contact centers and voice-to-text conversion are all examples of what?
    • A. 

      Social networking technologies

    • B. 

      Terminal services clients and servers

    • C. 

      Unified communications technologies

    • D. 

      Short Message Service (SMS) applications

  • 21. 
    Which term describes an encryption method in which a number generated by an algorithm from a string of text is used to verify the integrity of transmitted data?
    • A. 

      Symmetric encryption

    • B. 

      Asymmetric encryption

    • C. 

      Hash encryption

    • D. 

      Key encryption

  • 22. 
    A program that resides in active memory and replicates itself onto other systems is called:
    • A. 

      An illicit server.

    • B. 

      A trojan.

    • C. 

      A virus.

    • D. 

      A worm.

  • 23. 
    Whenever you receive program patches or updates, you should:
    • A. 

      Delete them so they do not interfere with your existing applications.

    • B. 

      Apply them to all systems immediately.

    • C. 

      Test them on one computer to ensure that they solve your problem without any unforeseen consequences.

    • D. 

      Send them to all your colleagues and friends so they can apply them to their systems.

  • 24. 
    What is the name of the process whereby the project manager acquires, processes and evaluates information from the customer to help identify the goals of the project?
    • A. 

      Needs analysis

    • B. 

      Project schedule

    • C. 

      Scope creep

    • D. 

      Statement Of Work

  • 25. 
    • A. 

      To keep message content reasonably short

    • B. 

      To indicate that one or more files is attached to the message

    • C. 

      To help clarify the subject matter of the message

    • D. 

      To help convey the intended tone of the message

  • 26. 
    • A. 

      An e-mail message that includes messages text tyoed in all capital letters

    • B. 

      An e-mail message that includes information from the original e-mail message

    • C. 

      An e-mail message that connot be retrieved once it has been sent

    • D. 

      An e-mail message that is devoid of emoticons.

  • 27. 
    • A. 

      The welcome page

    • B. 

      The bookmarks page

    • C. 

      The home page

    • D. 

      The favorites page

  • 28. 
    • A. 

      A contract allowing you to use the beatles' digital graphics on your Website

    • B. 

      Th apple icon on the cover of many Beatles albums

    • C. 

      An MP3 file containing the Beatles' song "Hey Jude"

    • D. 

      A chapter from John Lennon's book "In his Own Write"

  • 29. 
    • A. 

      By using wireless network components

    • B. 

      By requiring less overhead

    • C. 

      By causing Internet usage to grow

    • D. 

      By using 128-bit IP addresses

  • 30. 
    • A. 

      The company that provides telephone lines to your home office

    • B. 

      An organization that maintains a gateway to the Internet and rents access to it

    • C. 

      A dial-up or high-speed direct connection to the Internet

    • D. 

      A computer system with an Internet connection and the correct software for Internet communication

  • 31. 
    • A. 

      Instant messages can be sent only to contacts who are currently online.

    • B. 

      Instant message can display responses only when you click the Send/Receive button.

    • C. 

      You do not access to a network in order to send and recive instant messages.

    • D. 

      Instant messages can be sent to contacts wheather they are online or not

  • 32. 
    If you were a project manager, which of the following documents would be the most helpful in evalusting project risks and determining whether you should escalate concerns to managers or executives outside the projects team for resolution?
    • A. 

      A Gantt chart

    • B. 

      An issues log

    • C. 

      A SWOT analysis

    • D. 

      A project schedule

  • 33. 
    • A. 

      A message marked for follow-up

    • B. 

      A message that has not yet been read

    • C. 

      A message marked for deletion

    • D. 

      A message that has already been ready

  • 34. 
    • A. 

      Ogg Vorbis (OGG)

    • B. 

      Audio Interchange Files Format (AIFF)

    • C. 

      Waveform (WAV)

    • D. 

      Moving picture Experts Group, Audio Layer-3 (MP3)

  • 35. 
    • A. 

      A record in Table A can have matching records in Table B, but a record in Table B has only one matching record in Table A.

    • B. 

      No record in Table A has any matching records in Table B.

    • C. 

      One record in Table A has any matching records in Table B, and vice versa.

    • D. 

      Each record in Table A has any matching records in Table B, and vice versa.

  • 36. 
    • A. 

      The ipconfig command

    • B. 

      The ping command

    • C. 

      The tracert command

    • D. 

      The config command

  • 37. 
    • A. 

      Internet control Messaging Protocol (ICMP)

    • B. 

      Point-to-Point Protocol (PPP)

    • C. 

      Transmission control protocol (TCP)

    • D. 

      Internet Protocol (IP)

  • 38. 
    In project management, an assignment is:
    • A. 

      Aunit of work that must be accomplished

    • B. 

      The appointment of a person, department or device to a unit of work

    • C. 

      A person, department or device needed to accomplished a unit of work

    • D. 

      A sequence of work units that must be accomplished within a defined time frame

  • 39. 
    A Uniform Resource Locator (URL) ia an Internet address that performs which task?
    • A. 

      Locates an Internet resource using an e-mail server

    • B. 

      Identifies the method by which an Internet resource is accessed

    • C. 

      Locates an Internet resource using a search engine

    • D. 

      Identifies the search string used to locate an Internet resource

  • 40. 
    • A. 

      Use CAPTCHA to distinguish human senders from automated senders.

    • B. 

      Use SMTP authentication, which requiers a valid name and password for each message.

    • C. 

      Configure your system to filter IP addresses contained in the latest blackhole list.

    • D. 

      Use a client-side filter to identify and filter spam messages.