Log in
Sign up for FREE
arrow_back
Library

Lessons 1-5 Check Your Knowledge

star
star
star
star
star
Last updated over 6 years ago
40 questions
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Question 1
1.

Question 2
2.

Question 3
3.

Question 4
4.

Question 5
5.

Question 6
6.

Question 7
7.

Question 8
8.

Question 9
9.

Question 10
10.

Question 11
11.

Question 12
12.

Question 13
13.

Question 14
14.

Question 15
15.

Question 16
16.

Question 17
17.

Question 18
18.

Question 19
19.

Question 20
20.

Question 21
21.

Question 22
22.

Question 23
23.

Question 24
24.

Question 25
25.

Question 26
26.

Question 27
27.

Question 28
28.

Question 29
29.

Question 30
30.

Question 31
31.

Question 32
32.

Question 33
33.

Question 34
34.

Question 35
35.

Question 36
36.

Question 37
37.

Question 38
38.

Question 39
39.

Question 40
40.

What is the purpose of conducting an ontological study as it pertains to a particular organization or business?
To enable software engineers and programmers to accurately determine how an organization's data is used by particular applications
To enable software engineers and programmers to accurately predict the degree to which a demographic will adopt or accept a new product or innovation
To enable software engineers and programmers to accurately map technology solutions to business needs
To enable software engineers and programmers to accurately determine the requirements that a database must fulfill in order to function properly for an organization
In which of the following job roles is it most important that you be able to translate highly technical concepts into information that a non-technical audience can readily understand?
Java programmer
Help desk technician
Server administrator
Marketing manager
Which IT job role best describes an individual who is responsible for evaluating Website statistics to determine the site's effectiveness?
Web application developer
Website architect
Website designer
Website analyst
What is the main reason that some IT managers believe the future IT career model will be diamond-shaped, with few entry-level IT jobs available?
The rapid development of entry-level IT professionals to fill mid-level positions
The plethora of entry-level IT professionals possessing intercultural skills
The offshore outsourcing of many entry-level IT positions
The plethora of entry-level IT professionals possessing project management skills
Which file format should you use to create a résumé that you can enter into keyword-searchable résumé databases and paste into the body of e-mail messages?
Text format
HTML
PDF - Portable Document Format
RTF - Rich Text Format
Johann uses instant messaging (IM) to frequently communicate with his team members, as well as with close friends. Recently, Johann was surprised that he started receiving spam during his IM sessions. Which statement would explain why Johann could receive spam during an IM session?
Instant messaging runs on mobile devices, which are less secure than standard PCs.
Instant messaging bypasses anti-virus software and firewalls.
Instant messaging bypasses users' presencing settings.
Instant messaging runs on standard PCs, which are less secure than mobile devices.
Which term is used to describe Web 2.0 applications that have the ability to contextualize data (or give the data meaning) as they process it, by supplementing the content designed for humans with machine-readable information that enables computers to find, share and combine information on the Web without human intervention?
Tagging
Crowdsourcing
Semantic Web
Web Feed
Ken needs a catchy name for his new online business. He decides to launch a public contest through his social networking accounts to seek lots of creative ideas for his business name. Which term describes the use of the Internet in this manner?
Crowdsourcing
Social engineering
Folksonomy
Tagging
Ange works as an Administrative Assistant for a small business that uses the SaaS for sales orders and customer accounting (similar to Salesforce.com). Ange makes sure to save accurate records about current projects, and she performs regular backups of the business data stored on this cloud-based service. Why?
Because although it is well known that cloud-based services are highly secure, highly reliable and always available, Ange is paranoid and too cautious
Because data stored online through this cloud-based service has more risk to security breaches than if it were stored locally
Because the number of users who are allowed to access the cloud-based service at any time is limited
Because the service and records would not be accessible if there is an interruption in Internet access
Consider the following address:
http://www.CIWcertified.com/courses/iba.htm
Which part of this address represents the domain name?
/courses/
.CIWcertified.com
iba.htm
www
You work for your company's IT department diagnosing and servicing the employees' workstations. A user complains that since she has been conducting a lot of research online, performance is slowing. You increase the size of her browser cache. Why will performance slow if the browser cache is too small?
Because the browser must search through possibly tens of thousands of cached files to locate a specific page
Because a small cache size may slow other computer processes, such as disk defragmentation and virus scans
Because the user must wait for pages to be loaded from the server, instead of retrieving them from the cache
Because it will take longer to complete cache maintenance tasks when the user quits the browser
Nancy is using a Web browser on her desktop computer to place some bids on a popular online auction site. She decides that she wants to browse to the CIW site without closing her browser. What is the most efficient way to do this?
By typing the CIW site's URL (www.CIWcertified.com) in the address bar of her Web browser
By entering the CIW site's FTP address (ftp.CIWcertified.com) in the address bar of her Web browser
By opening the CIW app that she has downloaded and installed on her computer
By performing a search within the auction site currently displayed in her Web browser
Ken has been asked to test a newly developed Website. Part of the test plan requires him to verify that all links within the site work properly. In addition to verifying that clicking a link navigates to the appropriate Webpage, what else will he observe?
Clicking a hyperlink will update the Home button in the browser toolbar.
The URL displayed in the browser's Address bar will update with each link that is clicked.
The URL displayed in the browser's Address bar will display only the domain of the Web server, no matter which link is clicked.
Clicking a hyperlink that is deeper than three clicks from the home page will automatically send you back to the home page.
In reference to the elements of a Web browser, what is a sandbox?
Code that controls how the browser accesses a network
The part of the browser responsible for reading and processing programming languages
A programming method that isolates a particular application or process
An instruction from a running application that executes a particular task
You use a proprietary Windows-based program to create designs and layouts for your freelance greeting card business. You want to share samples of your work on your Website for potential new customers to review. You convert the file format of your designs so that customers can view accurate renderings of them, regardless of the local operating system, settings or browser each individual uses to view your site. Which file format should you use?
MP3
OGG
DOC
PDF
The Flash Player allows browsers to play Flash movies, which are animations created using vector graphics. What are vector graphics?
Mathematical shapes saved as a sequence of vector statements, which describe a series of points to be connected
Mathematical shapes saved as a sequence of vector statements, which map bits directly to a display space
Images that map bits directly to a display space
Pixel-based images that describe a series of points to be connected
What is the main advantage of using vector graphics instead of raster graphics to create animations?
Transfer delays are minimized because portions of animations are stored in your local disk cache.
The file sizes are relatively large, allowing you to create highly elaborate animations.
The file sizes are relatively small, resulting in shorter download times.
Transfer delays are minimized because the animations download as streaming media.
Samson needs to review several promotional product videos from his company's marketing department immediately, before a meeting to discuss revisions. Samson tries to view the videos on his computer using his Windows Media Player, but they will not play. The video files are in RealMedia format. What should Samson do in order to view these videos?
Contact his company's Technical Support department and request an upgrade for his computer.
Convert the video files to the WMV format, because RealMedia files will not play in Windows Media Player.
Decompress the files before attempting to play them in Windows Media Player, because RealMedia files are compressed for uploading/downloading.
Upload the videos to the Web server to view them on the company Website because they will not play from a local computer.
You have registered for an e-learning course and are ready to begin. However, when you access the e-learning course page as directed, you find that you cannot log in because the authentication window will not launch. The most likely cause of this problem is that:
you have enabled pop-up blocking software in your operating system.
you have recently cleared your browser's history file.
you have recently cleared your browser's cookie cache.
you have enabled pop-up blocking software in your browser.
You want to be able to quickly view news headlines without the need to open your Web browser and visit any news Websites. How can you accomplish your goal?
Set up a proxy server.
Set up a Web feed.
Set up a browser cache.
Set up a rendering engine.
What is the most important consideration in data modeling?
The database's ability to apply appropriate standards to the data
The database's ability to organize a domain
The database's ability to process data
The database's ability to apply appropriate standards to the data
As a member of a busy IT department, you often work with end users and management personnel, many of whom have only a basic knowledge of computers and computer networks. Which of the following skills is an important part of your job, but is often under-emphasized?
Programming expertise
Communication skills
Marketing skills
Management training
Which process helps you to obtain current information about available, relevant jobs in your area most quickly?
Conduct a search on a job seeker site.
Send instant messages to contacts at other companies.
Conduct a search on Google using appropriate keywords.
Join mailing list for job seekers.
You are almost finished updating a Website. As part of the update, you have converted all pages from HTML 4.0 to HTML5. The project is currently on schedule. However, your project manager has been asked by the accounting team manager to justify a day of time spent validating the site's HTML5 pages. The accounting team manager does not have technical knowledge of the Internet or the Web. Which is the most appropriate explanation to provide to the accounting team manager?
We need to verify that the HTML5 in the pages conforms to W3C standards.
Customers may have problems downloading the page, and one of those problems might involve improperly closed tags.
The team needs to verify that the site will appear as expected in as many browsers as possible.
Improper <!DOCTYPE> declarations will cause problems, and they need to be verified via HTTP.
The IT team is updating the company firewall application. The project includes creating a duplicate firewall for testing. The testing process took one day. A code review to verify that the update was safe also took one day. Once testing was complete the live firewall was updated and functioning within two hours. The IT manager has been asked to justify the cost of creating a duplicate firewall and the time to test it. Which is the most appropriate explanation?
Packets traveling at Layer 3 of the OSI/RM can be dangerous, so it was necessary to do the upgrade correctly.
The machine used for the test firewall was inexpensive and was not in use at the time.
An unsuccessful, untested update could have caused significant network down time.
It was necessary to review the source code in the update to make sure that it was safe to install.
You need to send a message to your manager providing all the details of a business proposal as quickly as possible. The idea you have discussed with her is critical to the business. The project is considered urgent and confidential. What would be the most appropriate way you could use an SMS (text) message in relation to this proposal?
To send the proposal as an attachment to the text message.
To alert your manager that you have sent the proposal via email so your manager can view the proposal as soon as possible.
To provide a detailed outline of the proposal so that your manager can refer to it as she travels.
To send a brief summary of the proposal to your manager so that she has it available during a presentation.
A Web page that integrates content and scripts from multiple Websites to create new applications is known as a:
podcast.
wiki.
folksonomy.
mashup.
You have an account on Flickr (www.flickr.com) and have categorized your photos by adding tags to them. Users can now browse Flickr and gain access to your photos as long as the tags for which they search match the tags you have applied. What have you created?
A mashup
A blog
A folksonomy
A wiki
Juan is preparing to give a presentation to his company's managers about the cloud computing services that his department is planning to implement. He considers the possible objections that his managers might have to use cloud services for the company. What disadvantage of cloud services should he be ready to discuss?
Flexibility
Speed
Scalability
Cost
Tim is listening to music from an online music provider (such as Pandora). He creates a list of his music preferences, and the music service uses his list to suggest additional songs that Tim might like. This music service is an example of a cloud-computing application that uses collaborative filtering technology. What is the name of this type of technology?
Grid computing
Software as a Service
Bit-torrent
Crowdsourcing
Kim is using the YouTube graphics-editing application that she accesses via the Internet through her browser. Kim does not own the application, nor can she download it. She is able to use the application any time she needs to edit graphics. Although she does not have to pay for the access, she does notice advertisements, which appear on the sidebar of the application's interface. The application Kim is using may be classified as which of the following?
Software as a Service (SaaS)
Freeware
Web App
Spyware
Your mom sent you a message with a link to a college information page that you find very useful. You want to be able to find this same page in the future from your desktop computer, or from your mobile device when you are not at your desk. Which is the best way to do this?
Memorize the URL so you can find the page using any browser, any time.
Manually enter the Web address into any and all browsers on all of your devices.
Add the link to a cloud-based bookmark service such as Delicious or Google Bookmarks.
Save the message from your mom so you can open the message and copy or click the link any time you want to view the page.
Consider the following address:
http://www.CIWcertified.com/Certifications/Foundations/iba.htm
Which term best describes this address type?
Fully qualified domain name
IP address
Deep URL
Relative URL
Which type of URL is an abbreviated path to a resource using the current page as a starting position?
Relative URL
Deep URL
Absolute URL
Root URL
What are raster graphics?
Pixel-based images that describe a series of points to be connected.
Mathematical shapes saved as a sequence of vector statements, which map bits directly to a display space.
Mathematical shapes saved as a sequence of vector statements, which describe a series of points to be connected.
Images that map bits directly to a display space.
Harley works in the sales department at his company. He feels that the company's marketing team is not doing a good job, so without direction or permission, he starts his own social networking page to help. His page has a name similar to the company's. He posts company logos on it and uses text copied from the company Website. He posts news and sends tweets to customers and others interested in the company. When the company learns of this, what action is it most likely to take?
Marketing will post a link to Harley's page from the company's official social networking site.
Marketing will add references to Harley's social networking page in the company's internal newsletter.
Human Resources will issue a cease-and-desist letter, take control of Harley's page, and terminate Harley's employment for copyright and trademark infringement.
Human Resources will send Harley an informal request to stop using company logos, but allow him to continue using his social networking page.
Stephen is creating video tutorials to sell his company's products. The target audience will consist of company employees using primarily new computers with the Windows operating systems and Internet Explorer 9. Stephen is debating whether to publish the videos using the MP4 or the OGG video format. Both formats are compatible with the HTML5 video element, which he is using in his tutorials. Which of the following would be a reason for Stephen to choose one format over the over?
The OGG video format is natively supported by Internet Explorer 9 and does not require a plug-in.
The OGG video format is a free open-source solution that is compatible with all browsers.
The MP4 video format is natively supported by Internet Explorer 9 and does not require a plug-in.
The MP4 video format is a free open-source solution that is compatible with all browsers.
You want to give your Website users the ability to view high-quality video. Connection speed is not an issue. Which file format could you use?
MPEG
PDF
WAV
AVI
Which statement about compressing JPEG files is true?
The more compression, the larger the file size, but the higher the image quality.
The more compression, the smaller the file size, but the lower the image quality.
The less compression, the smaller the file size, but the higher the image quality.
The less compression, the larger the file size, but the lower the image quality.
How does a proxy server protect a corporate network from potential hackers?
A proxy server restricts users by requiring a user name and password for every transmission.
A proxy server runs only the corporate intranet.
A proxy server replaces the network IP address with another, contingent address.
A proxy server runs only the corporate extranet.