No student devices needed. Know more
29 questions
Companies increasingly want to allow employees to share files directly without having to maintain servers to provide FTP access. Which technology can companies use to maximize processing power while protecting privacy and sensitive materials?
Cloud-based file sharing sites
SSL/TLS-enabled FTP (FTPS)
Peer-to-peer networks on the Internet (P2P)
Secure Copy (SCP)
SSH File Transfer Protocol (S/FTP)
You recently returned from a vacation and you want to share some photos with your co-workers. You would like to share these photos via email. What should you consider when attaching several high-resolution photos to an email message?
Security
Privacy
Transmission speed
File size
Pretty Good Privacy (PGP) and Gnu Privacy Guard (GPG) are both used to encrypt:
email message Subject fields and email attachments.
email messages and their Subject fields.
email messages and their attachments.
usernames and passwords when you sign onto an email server.
As part of the IT department, you configure the employee workstations for your company. Your company's IT policies prioritize security over running active content. What should you disable in user's browsers to restrict active content?
Cookies
JavaScript
Pop-up windows
Pop-under windows
Which Internet resource is used to resolve domain names to IP addresses?
A root-level server
A virtual domain hosting service
A shared domain hosting service
A domain name server
Cloud computing is a computing paradigm in which:
users are able to outsource a task to an undefined group of people or community to obtain and analyze large amounts of data.
one domain name server hosts multiple domain names.
multiple companies, organizations or people share portions of the same domain name.
users are able to access software and services run by servers that reside on the Internet.
Which term is used to describe a software application that is secretly placed on a user's system to gather information and relay it to outside parties, usually for advertising purposes?
Ransomware
Trojan
Spyware
Malware
What are the three elements of the project triangle?
Time, staff and funding
Time, money and scope
Deadlines, time and tasks
Funding, quality and deadlines
You are part of a development team that needs to adopt an integrated development environment tool to increase programmer productivity. The team narrowed the options down to two. One is open-source; the other will require an expensive site license. The tool you choose must be reliable, stable and well maintained. Which of the following could be a disadvantage for you to choose open-source, and thus a compelling enough reason to purchase the licensed software instead of using the open-source solution?
The open-source solution is in the public domain.
Maintenance of an open-source solution relies on developers who volunteer to work on the code.
The code for the open-source solution can be viewed by a community of open-source developers.
Your developers will have ready access to the source code.
Which of the following Internet communication practices is unethical but not illegal?
Asking another user in a chatroom for personal information
Posting false and hurtful claims about another person on your Facebook page
Posting artwork you copied from the Internet on your Website and claiming it is your own
Copying the code for a specialized application from another site and using it on your site without permission
In a business environment, in which situation would email be more appropriate for communicating than texting?
Sending a contract to your supervisor for her review and advice
Sending a message to a friend about meeting at the ballgame later that evening
Sending a message to a co-worker about a special delivery at the front desk
Sending a message to your supervisor informing her that you are running late for a meeting
Stephen is creating video tutorials to sell his company's products. The target audience will consist of company employees using primarily new computers with the Windows operating systems and Internet Explorer 9. Stephen is debating whether to publish the videos using the MP4 or the OGG video format. Both formats are compatible with the HTML5 video element, which he is using in his tutorials. Which of the following would be a reason for Stephen to choose one format over the other?
The MP4 video format is a free open-source solution that is compatible with all bro
The OGG video format is natively supported by Internet Explorer 9 and does not require a plug-in.
The MP4 video format is natively supported by Internet Explorer 9 and does not require a plug-in.
The OGG video format is a free open-source solution that is compatible with all browsers.
In contrast to meetings that take place in person, a Webcast offers the advantage of:
encouraging participant interactivity, especially for participants who may be reticent to do so in face-to-face meetings.
being available for retransmission any time after the original event has taken place.
enabling participants to communicate with the presenter and with each other via online chat.
broadcasting events in their entirety without the interruptions that frequently occur during meetings.
Non-repudiation is the security principle of providing proof that a transaction occurred between identified parties. Which of the following can you use to enforce non-repudiation in an electronic data transfer?
Encrypted key
Digital signature
Firewall
Digital certificate
When you sign in to your instant messaging (IM) service, your online status is advertised (or published) to the people on your contacts list. What does this scenario represent?
Unified communications (UC)
Mobile computing
Convergence
Presencing
Which IT job role best describes an individual who installs, modifies and repairs personal computer hardware components?
Network engineer
SEO analyst
PC repair technician
Help desk technician
A relational database record can best be described as:
a collection of data about a limited topic, organized into rows and columns.
a collection of data that can be sorted and searched using search algorithms.
a category of information in a table.
a collection of information consisting of one or more related fields about a specific entity.
Which is the most appropriate question to ask a potential employer regarding your resume?
How much Web experience should I include?
What format would you prefer?
Do you want me to include certifications?
What job experience do you want me to include?
Cloud computing is software services that are provided over the Internet. Which of the following IT job roles should be most familiar with cloud computing software, infrastructure and platform services?
SEO analyst
Server administrator
Web architect
Help desk technician
You are a network administrator for your company. When establishing the company encryption policies, you must determine the risk of sending unencrypted data based on its risk to the company if obtained by unauthorized users. Much of the data your company sends is proprietary and sensitive in nature, so you determine that encrypting company transmissions is critical. What is the disadvantage of encrypting company transmissions?
Encrypting transmissions violates your employees' privacy rights.
Encrypting transmissions requires you to obtain a license from the copyright owner.
Encrypting transmissions slows communication because each data packet must be encrypted and decrypted.
Encrypting transmissions encourages hackers and places data at risk for interception by malicious outsiders.
How many mail servers does the use of email involve?
Two -- incoming mail is handled by one server using Post Office Protocol (POP) or Internet Message Access Protocol (IMAP), and outgoing mail is handled by another server using Simple Mail Transfer Protocol (SMTP).
One -- both incoming and outgoing mail are handled by one server using Post Office Protocol (POP) or Internet Message Access Protocol (IMAP).
One -- both incoming and outgoing mail are handled by one server using Simple Mail Transfer Protocol (SMTP).
Two -- incoming mail is handled by one server using Simple Mail Transfer Protocol (SMTP), and outgoing mail is handled by another server using Post Office Protocol (POP) or Internet Message Access Protocol (IMAP).
Which of the following is an example of a Web 2.0 community or service?
Wikipedia
Mashups
Ajax
Bing
How can you reduce file size so that files can be sent more efficiently across the Internet?
By increasing the mail server's attachment size limit
By using a file compression utility to reduce large files
By dividing the file in half and sending the two halves separately
By using smaller fonts in the files
Which of the following is true regarding smartphones and PIM applications?
Smartphone PIM applications save changes to information in RAM, but discard them when the phone is turned off.
Smartphone PIM applications save changes to information in RAM, but discard them when the phone is turned off.
Smartphones use infrared-based keyboards for inputting information into PIM applications.
Smartphone PIM applications are designed to work in tandem with traditional desktop or laptop computers.
How does a LAN differ from a WAN?
A LAN spans a confined geographic area, whereas a WAN consists of multiple LANs.
A LAN uses public networks and high-speed lines, whereas a WAN is private and may use slower lines.
A LAN consists of multiple WANs, whereas a WAN consists of multiple computers.
A LAN spans a wide geographic area, whereas a WAN spans a confined area such as an office or home.
You were replying to email when suddenly your computer started to display random messages, and stopped responding to keyboard and mouse input. You suspect that you have accidentally downloaded a virus. Which of the following actions most likely caused this?
You printed a file that was stored on your hard drive.
You sent an email message with an attachment to a co-worker.
You opened an email attachment.
You logged in to your company's portal.
What is the function of a CAPTCHA?
To schedule appointments and meetings, store contact information, and manage tasks
To identify and filter out spam messages before they reach the email Inbox
To publish a list of IP addresses known to be sources of spam
To differentiate humans from automated senders during online transactions
You want to find information about Great Danes. You visit a popular search engine and manually search through a directory tree of topics until you find a directory titled "Dogs" and a subdirectory titled "Breeds." You select the topic "Great Dane" and look through a list of indexed pages on that topic, then choose one page with which to begin your research. Which type of search index did you use?
Static index/site map
Keyword index
Full-text index
Boolean index
You are almost finished updating a Website. As part of the update, you have converted all pages from HTML 4.0 to HTML5. The project is currently on schedule. However, your project manager has been asked by the accounting team manager to justify a day of time spent validating the site's HTML5 pages. The accounting team manager does not have technical knowledge of the Internet or the Web. Which is the most appropriate explanation to provide to the accounting team manager?
We need to verify that the HTML5 in the pages conforms to W3C standards.
Customers may have problems downloading the page, and one of those problems might involve improperly closed tags.
Improper <!DOCTYPE> declarations will cause problems, and they need to be verified via HTTP.
The team needs to verify that the site will appear as expected in as many browsers as possible.
Explore all questions with a free account