CIW IBA Extreme Review - Part 6
Save
Edit
Host a game
Live GameLive
Homework
Solo Practice
Practice
51 QuestionsShow answers
  • Question 1
    30 seconds
    Q. You receive a text message on your cell phone from an unknown number. The message includes an attachment. You try to call the number but you get no answer. What is the best action for you to take next?
    answer choices
    Open the attachment.
    Delete the message without opening the attachment.
    Forward the message to your e-mail so you can open the attachment using your computer.
    Call the phone number of the sender again.
  • Question 2
    30 seconds
    Q. Which term is used to describe a computer security program that is enabled when no keystrokes or mouse actions have occurred on the system for a specified duration?
    answer choices
    Automated update
    Desktop firewall
    Automated patch
    Screen saver
  • Question 3
    30 seconds
    Q. What distinguishes a worm from a virus?
    answer choices
    A worm is capable of replicating itself automatically while affecting data.
    A worm does not replicate itself; it damages or destroys data.
    A worm and a virus are synonymous terms for a malicious program designed to damage computer systems.
    A worm does not replicate itself; it assumes control of system operations.
  • Question 4
    30 seconds
    Q. Brea opened an e-mail attachment and it launches a virus. Even after running anti-virus software, the damage is extensive and she will have to reformat her hard drive. Which step, if she had taken it prior to being attacked, would have reduced the impact to her productivity?
    answer choices
    Performing regularly scheduled backups so that she can reload all files if lost or damaged
    Printing and then deleting files, thus limiting the number of electronic files vulnerable to virus attacks
    Restoring data files from backup on a regular basis
    Following a policy of never opening attachments
  • Question 5
    30 seconds
    Q. It is vital that you understand how to evaluate information you retrieve from resources on the Internet because the source of information can directly affect the quality and factuality of the information. Which of the following resource types bases information on primary sources?
    answer choices
    Scholarly
    Individual
    Open peer-reviewed
    Popular
  • Question 6
    30 seconds
    Q. Patrick wants to search for Fender guitars other than Stratocasters. He plans to use a keyword search engine. He does not want to see any results for Stratocaster guitars, only other Fender models. Which of the following search strings should he use?
    answer choices
    guitar Fender |Stratocaster
    guitar Fender
    guitar Fender !Stratocaster
    guitar Fender *Stratocaster
  • Question 7
    30 seconds
    Q. Why might you receive different results using the same keywords on different search engines?
    answer choices
    Because not every Web site is registered with every search engine
    Because only search engines that use robot or spider programs can search registered Web sites
    Because not every search engine recognizes the same keywords
    Because different search engines interpret keywords differently
  • Question 8
    30 seconds
    Q. Which statement is true regarding the use of Internet searches for job-related research?
    answer choices
    The Internet provides fast, convenient access to social networking, but should not be used as a research tool.
    The Internet provides fast, convenient access to a vast amount of information and services.
    The Internet should be used as a secondary resource to information found in scholarly journals.
    The Internet is unreliable because too much false information is generated via popular search engines.
  • Question 9
    30 seconds
    Q. What is the purpose of the Boolean operator OR?
    answer choices
    It requires the search results to include one keyword or one URL.
    It requires the search results to include one keyword and exclude another.
    It requires the search results to include one keyword or the other or both.
    It requires the search results to include multiple keywords.
  • Question 10
    30 seconds
    Q. The tag can be used in Web pages for which purpose?
    answer choices
    Providing search engines with a description of the Web site
    Linking the Web site to other related Web pages
    Containing the content that appears on each Web page
    Preventing early-version browsers from viewing the Web site
  • Question 11
    30 seconds
    Q. What is the purpose of a Boolean operator?
    answer choices
    To assign a relevancy ranking to search engine findings
    To perform a static search or a keyword search
    To determine the alphabetical order of search engine findings
    To narrow search results by including or excluding words or phrases
  • Question 12
    30 seconds
    Q. Which of the following search engines uses cross-referencing fields for conceptual searches, in addition to allowing keywords searches?
    answer choices
    Yahoo!
    Google
    Excite
    WebCrawler
  • Question 13
    30 seconds
    Q. When you search for topics using a Web search engine, what are you searching?
    answer choices
    An index or database of all computers connected to the Internet
    All Web sites on the World Wide Web
    An index or database of referenced Web sites
    All computers connected to the Internet
  • Question 14
    30 seconds
    Q. Which of the following would you enter in a search engine to locate Web pages containing information about a topic?
    answer choices
    A dotted-quad Internet address
    A Uniform Resource Locator (URL)
    A keyword
    A file name
  • Question 15
    30 seconds
    Q. A search engine database contains titles, URLS and short descriptions for registered Web pages. What else would the database most likely contain?
    answer choices
    Robots
    Spiders
    Keywords
    Scripts
  • Question 16
    30 seconds
    Q. You are performing a keyword search with your browser. Which strategy should you use for the keywords you choose?
    answer choices
    Use mostly verbs rather than nouns.
    Use as few keywords as possible.
    Use mostly nouns rather than verbs.
    Include at least one preposition such as "the" or "an".
  • Question 17
    30 seconds
    Q. Which is the most important reason you should properly cite information that you obtain from an Internet search?
    answer choices
    To avoid contacting the original author
    To avoid crediting the creators of the sites you use
    To avoid plagiarizing someone else's work
    To avoid using someone else's work for your own site or publication
  • Question 18
    30 seconds
    Q. During a Web search, entering erroneous search criteria, clicking dead links or accessing a busy server is likely to:
    answer choices
    cause an error page to display.
    activate the robot or spider program.
    use all the space in your browser cache.
    return less relevant results for your keywords.
  • Question 19
    30 seconds
    Q. After you have found the information you need on the Web, you must still evaluate its accuracy and value. To determine whether information is reliable or factual, you should:
    answer choices
    consult popular resources.
    consult open peer-reviewed resources.
    consult authoritative peer-reviewed resources.
    consult secondary resources.
  • Question 20
    30 seconds
    Q. It is vital that you understand how to evaluate information you retrieve from resources on the Internet because the source of information can directly affect the quality and factuality of the information. Which of the following types of resources only accept input from scholars and recognized authorities?
    answer choices
    Primary
    Individual
    Authoritative peer-reviewed
    Open peer-reviewed
  • Question 21
    30 seconds
    Q. Which of the following search engines was the first to determine a site's relevance based upon the number of links that point to it, in addition to ranking its relevance according to keywords you enter?
    answer choices
    Excite
    Google
    WebCrawler
    Yahoo!
  • Question 22
    30 seconds
    Q. What is the purpose of the Boolean operator AND?
    answer choices
    It requires the search results to include one keyword and one URL.
    It requires the search results to exclude one keyword.
    It requires the search results to include one keyword and exclude another.
    It requires the search results to include multiple keywords.
  • Question 23
    30 seconds
    Q. What distinguishes an information portal from a search engine?
    answer choices
    An information portal uses a robot or spider program to browse the Web and index the content that it finds.
    An information portal will only index Web sites based on manual submissions.
    An information portal allows only keyword index searches.
    An information portal allows only static index/site map searches.
  • Question 24
    30 seconds
    Q. You access a search engine and enter the words "African" and "safari" in the search box. The search engine returns links to Web sites in its index that include these words. Which type of search index did you use?
    answer choices
    Full-text index
    Structured directory index
    Keyword index
    Static index/site map
  • Question 25
    30 seconds
    Q. Which operator would you use in a Web search to find a multi-word phrase with the words in a specified order?
    answer choices
    Ampersand &
    Quotation marks " "
    Parentheses ( )
    Brackets [ ]
  • Question 26
    30 seconds
    Q. You are an avid user of Facebook and Twitter. Which of the following search engines accommodates social networking to find more relevant information for your queries?
    answer choices
    Google
    Excite
    Bing
    Yahoo!
  • Question 27
    30 seconds
    Q. You want to find information about Great Danes. You visit a popular search engine and manually search through a directory tree of topics until you find a directory titled "Dogs" and a subdirectory titled "Breeds." You select the topic "Great Dane" and look through a list of indexed pages on that topic, then choose one page with which to begin your research. Which type of search index did you use?
    answer choices
    Static index/site map
    Keyword index
    Boolean index
    Full-text index
  • Question 28
    30 seconds
    Q. How do robot or spider programs usually find keywords for a Web page?
    answer choices
    By reading each site's source code embedded in the tags
    By reading every word contained on each Web site
    By reading the banner ads on each Web site
    By reading the title of each Web site
  • Question 29
    30 seconds
    Q. It is vital that you understand how to evaluate information you retrieve from resources on the Internet because the source of information can directly affect the quality and factuality of the information. Which of the following resource categories is the most common type of Internet resource you will use?
    answer choices
    Primary
    Open peer-reviewed
    Secondary
    Authoritative peer-reviewed
  • Question 30
    30 seconds
    Q. Search engines use a ranking system to help you determine how closely a site matches the topic for which you are searching. Generally, how does this ranking system work?
    answer choices
    The more keywords you specify in your search criteria, the higher the relevancy scores assigned to the retrieved documents.
    The more frequently your specified keywords are found in a particular document, the higher the relevancy score that document receives.
    The more hyperlinks included in a Web document, the higher the relevancy score that document receives.
    The more reference sources included in a Web document, the higher the relevancy score that document receives.
  • Question 31
    30 seconds
    Q. What type of software is common to all smartphones?
    answer choices
    Personal Information Management (PIM) software.
    Spam-detection software.
    Virus-protection software.
    Encryption/decryption software.
  • Question 32
    30 seconds
    Q. Microsoft Outlook, IBM Lotus Organizer, Sage ACT! and CorelCENTRAL are all examples of:
    answer choices
    Relational Database Management System (RDBMS) programs.
    Personal Information Management (PIM) programs.
    Web-based e-mail client applications.
    browser-based e-mail client applications.
  • Question 33
    30 seconds
    Q. In order to help with your job tasks, your supervisor has given you a PIM application to install and use. PIM is an acronym for a type of program with which you can:
    answer choices
    translate dotted-quad IP addresses into easily recognizable text-based names, and vice versa.
    filter spam at the client.
    schedule appointments and meetings, store contact information, and manage tasks.
    filter spam at the server.
  • Question 34
    30 seconds
    Q. Any tool used to schedule appointments and meetings, store contact information, and manage tasks is known as a:
    answer choices
    Personal Digital Assistant (PDA).
    Mail User Agent (MUA).
    Message Transfer Agent (MTA).
    Personal Information Management (PIM) program.
  • Question 35
    30 seconds
    Q. Which of the following is true regarding smartphones and PIM applications?
    answer choices
    Smartphones use infrared-based keyboards for inputting information into PIM applications.
    Smartphones rarely have enough memory to support full-featured PIM applications.
    Smartphone PIM applications are designed to work in tandem with traditional desktop or laptop computers.
    Smartphones save changes you make in PIM applications in random-access memory (RAM), the contents of which are erased when you turn the smartphone off.
  • Question 36
    30 seconds
    Q. How can you reduce file size so that files can be sent more efficiently across the Internet?
    answer choices
    By using a file compression utility to compress large files
    By increasing the mail server's attachment size limit
    By dividing the file in half and sending the two halves separately
    By using smaller fonts in the files
  • Question 37
    30 seconds
    Q. You download a file with the unusual file name extension of ".wow." When you attempt to open this file, Windows displays a message indicating that it does not know how to open this particular file type. Which of the following determines a document type and the application required to open it?
    answer choices
    HTTP
    MIME
    FTP
    TCP/IP
  • Question 38
    30 seconds
    Q. Which statement best describes the reason that you should compress files?
    answer choices
    To delete all unnecessary information from them and reduce transfer time
    To delete all unnecessary information from them
    To delete all unnecessary information from them and conserve hard disk space
    To reduce transfer time and conserve hard disk space
  • Question 39
    30 seconds
    Q. What can you do to eliminate the need to define a MIME type for files that you download from Web sites?
    answer choices
    Open the files in the Windows operating system only.
    Compress the files, then decompress them before you attempt to open them.
    Open the files in an operating system other than Windows.
    Install the latest version of a browser, or install any available upgrades.
  • Question 40
    30 seconds
    Q. Which choice lists some file types that are often already compressed and thus may not be significantly reduced in file size by compression utilities?
    answer choices
    BMP, JPG and TIFF
    DOC, TXT and PDF
    DOC, EXE and HTM
    PNG, GIF and JPG
  • Question 41
    30 seconds
    Q. Which of the following is an example of a trademark?
    answer choices
    The apple icon on the covers of many Beatles albums
    A chapter from John Lennon's book "In His Own Write"
    An MP3 file containing the Beatles' song "Hey Jude"
    A contract allowing you to use the Beatles' digital graphics on your Web site
  • Question 42
    30 seconds
    Q. Your company is about to release a proprietary product. Suddenly a competitor releases a very similar product that uses design data exactly like that from your company's product. You later learn that the proprietary data was leaked to the competitor. What preventive measure would have ensured that your company's proprietary information was protected from this type of action?
    answer choices
    Monitoring employees' messages
    Restricting employees' Internet access
    Destroying all proprietary information
    Uninstalling employees' e-mail clients
  • Question 43
    30 seconds
    Q. Your company's strength is marketing and sales. Your production team is assigned to rebrand the content obtained from an independent author so your sales team can sell it under your company's name. The author's original work is protected under her legal ownership. So your project manager obtains permission from the author to use her work, in exchange for a royalty fee and a contributor credit in the book. Which term describes this permission arrangement?
    answer choices
    Trademark
    Copyright
    Encryption
    License
  • Question 44
    30 seconds
    Q. Spam can be considered an invasion of privacy because:
    answer choices
    it is sent to recipients uninvited.
    it is generally excluded from Web sites' privacy policies.
    it is generally encrypted with weak encryption keys.
    it is placed on Web site visitors' computers so that Web site managers can customize their sites to their visitors' preferences.
  • Question 45
    30 seconds
    Q. Which choice lists the basic elements of authorship, according to copyright law?
    answer choices
    Expression and originality
    Usefulness and popularity
    Appearance and global interest
    Monetary value and public policy
  • Question 46
    30 seconds
    Q. Which of the following can protect your company's data, prevent data from being intercepted by malicious outsiders, and deter hackers?
    answer choices
    Trademark
    Copyright
    Encryption
    License
  • Question 47
    30 seconds
    Q. You are a network administrator for a medium-sized organization. The receptionist has had several problems with malware recently. The receptionist does not need to access external Web sites to perform his job, but he does use his computer for company documentation and internal communication with co-workers. Which of the following will help prevent additional malware from being installed on his computer?
    answer choices
    Restrict this employee's access to the Internet.
    Examine the cached files from the Internet on this employee's computer.
    Audit the contents of this employee's hard drive.
    Monitor the messages this employee sends and receives via e-mail.
  • Question 48
    30 seconds
    Q. Which of the following protects original works of authorship that are fixed in a tangible medium of expression, and defines an original work by the basic elements of expression and originality?
    answer choices
    Trademark
    Copyright
    License
    Encryption
  • Question 49
    30 seconds
    Q. Which organization was created by the United Nations to help protect ownership of work and creations globally?
    answer choices
    International Organization for Standardization (ISO)
    World Wide Web Consortium (W3C)
    Internet Assigned Numbers Authority (IANA)
    World Intellectual Property Organization (WIPO)
  • Question 50
    30 seconds
    Q. Your IT department enforces the use of 128-bit encryption on all company transmissions. Your department also protects the company encryption keys to ensure secure transmissions. Which choice lists an important reason for encrypting the company's network transmissions?
    answer choices
    Preventing data from being intercepted by malicious outsiders
    Avoiding licenses that allow you to use a copyrighted software program
    Providing employees privacy to use company e-mail for personal purposes
    Legally protecting your company's original product content
  • Question 51
    30 seconds
    Q. Harley works in the sales department at his company. He feels that the company's marketing team is not doing a good job, so without direction or permission, he starts his own social networking page to help. His page has a name similar to the company's. He posts company logos on it and uses text copied from the company Web site. He posts news and sends tweets to customers and others interested in the company. When the company learns of this, what action is it most likely to take?
    answer choices
    Human Resources will issue a cease-and-desist letter, take control of Harley's page, and terminate Harley's employment for copyright and trademark infringement.
    Human Resources will send Harley an informal request to stop using company logos, but allow him to continue using his social networking page.
    Marketing will post a link to Harley's page from the company's official social networking site.
    Marketing will add references to Harley's social networking page in the company's internal newsletter.
Report Quiz
Join a game