• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/214

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

214 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)
which of the following is responsible for examining an organization's security requirtements and determining the hardware
communications and software capabilities needed? security manager security analyst/consultant database administrator server administrator
security analyst consultant
what is the function of an email client autoresponder feature it automatically forward your email to a different email address it filters out unwanted
unsolicited mail it redirects all incoming mail to a secified folder *it sends an automated response to email messages you receive
when you view a web page
the images are downloaded to your computer. where are they stored. history folder cookie folder desktop *bowser cache
what is the name of the process wherebyt he project manager acquires
processes and evaluates information from the customer to help identify t he goals of the project *needs analysis project schedule scope creep statement of work
testing the product
evaluating performances and documenting lessons learned are part of: quality management ad assurance project documentation *formal project review the project triangel
a database table relationship in which a record in table A can have multiple matching records in table B
but a record in table B has only one matching record in table A is a: one-to one relationship many-to-many relation ship *one-to-many relationship many-to-one relationship
a collection of information consisting of one or more ralted fields about a specific entity such as a person
product or event
the anchor tag <a>
is used to create a hyperlink in an html document. to create an anchor within a page (an internal bookmark)
klaus must create a form that includes a text box
a radio button
which of the following is the best method to verify that the web pages you create are usable
viewable and accessible to the audience of web users? use the newest technologies available incorporate input from all stakeholders in your design compare your finished site map to your development storyboard *test your pages using multiple bowsers and versions of browsers
of the four methods for applying CSS styles
which choice list the methods you can use to apply an external style sheet to your Web pages? imported and inline *imported and linked embedded and linked embedded and imported
you created a web page for your compnay department. your project manager directed you to validate the code to the XHTML standard
so you uploaded your page to the W3C markup validator. your code failed validation. which of the following changes could you make to help your code validate? change the root <html></html> to <xhtml></xhtml> verify that all tags
you have created a web page with 10 files that total 105 kilobytes(KB). theoretically
how long will it take to download this page using a 56-kilobits-per-second (Kbps) modem? 6 seconds *15 seconds 1.5 seconds .06 seconds
after several meetings
your team's website plan has been developed. which step is now necessary. executing the plan precisely and without changes obtaining oral approval of the plan from all parties *documeting the desisions for approval by all parties presenting the plan to senior management in a meeting
which term is used to describe a unique word
phrase or symbol that is claimed or officailly registerd by an organizaion license copyright *trademark trade secret
as leader of your company'web team
you have been asked to give an oral presentation of plans for your company's new web site. you want to open the discussions for some brainstroming with those attending
which choice lists the three elements generally involved in an n-tier solution? the database
the permissions
you need to provide web services quickly. you have a buget and a small web development team. the IT department cannot provide the additional services you need. services you require include SMTP and POP3
a database
to host your company's web site
you are using a service provider that allocates space for your equipment. you provide the server hardware
an end user has just entered his authentication information into a browser. the site has automatically stored this information on the end user's hard drive. the site has also stored this user's preferences so that the next time he visits the site
his user name and preferences will be automatically retrieved. what is the most often used to store this information on the hard drive? *a cookie a user agent a browser detector a server-side script
which IP address class uses the first byte of an IP address for the network portion of the address
and the last three bytes for the host portion *Class A Class B Class C Class D
which TCP/IP service will automatically specify your IP address
subnet mask and default gateway when you initialize your workstation on a TCP/IP network? domain name system (DNS) service windows internet naming service (wins) automatic private IP addressing (APIPA) service *dynamic host configuration protocol (DHCP) service
what is the function of a service set identifier (SSID) to differentiate one wireless cell from another to enable wireless systems to communicate with one another
as long as they are on the same network to enable wireless systems to communicate with one another
which file format should you sue for your resume if you want to ensure that it will be compatible with all computer platforms and be invulnerable to viruses
while retaining its fromatted appearance? text ASCII rich text format RTF *portable document format HTML
which
of
which
of
name
6
which
of
which
type
point-to-point
protocol
which
protocol(s)
what
is
internet
protocol
describe
the
which
of
what
is
MIME
PGP
what
is
what
is
most
user
which
of
which
of
in
what
when
you
which
term
a
program
the
more
if
you
which
personal
which
of
which
of
what
is
compressing
some
compressing
some
which
of
the
amount
what
is
testing
the
a
database
a
collection
which
markup
the
anchor
which
attribute
siobhan
is
a
computers
your
team
klaus
must
the
<form>
what
container
you
are
which
of
which
of
which
of
which
of
the
W3C
of
the
which
flavor
which
example
which
of
which
of
which
statement
what
is
you
created
you
have
after
several
your
web
which
task
which
term
as
leader
which
step
microsoft
wants
which
of
which
of
which
choice
what
three
you
need
to
host
the
web
an
end
the
OSI
what
is
liam
is
which
of
which
IP
how
many
what
type
how
would
which
encryption
which
firewall
jim
must
which
TCP/IP
which
of
which
of
which
of
the
appearance
what
is
which
of
which
file
which
of
which of the following is responsible for creating the ""look and feel"" of a web site
web site designer web application developer web architect web site analyst web site designer
which of the following is responsible for examining an organization's security requirtements and determining the hardware, communications and software capabilities needed?
security manager security analyst/consultant database administrator server administrator security analyst consultant
name 6 elements required to connect to the internet
computer operating system tcp/ip client software internet connection internet address
which of the following is always required to connect to the internet
an analog or digital telephone line hypertext markup language (html) a domain name server *transmission control protocol/internet protocol(tcp/ip)
which type of direct internet connection includes fiber-optic cables and wireless connections and offers faster internet connections than those provided by analog modems?
*High-speed data link Cable modem Wireless connection Digital subscriber line
point-to-point protocol and point-to-point protocol over ethernet are types of:
e-mail protocol *remote access protocol secure protocol web page transfre rprotocol
which protocol(s) is used to send e-mail messages?
post office protocol(POP) Internet messaging application protocol(IMAP) *Simple mail transfer protocol (SMTP) post office protocol(POP) and internet messaging application protocol(IMAP)
what is the purpose of the domain name system or DNS
it categorizes domains into groups by common type. it provides enough information to convert a domain name to an IP address. it provides every device on the internet with an IP address. *it resolves numerical IP addresses into text-based names.
internet protocol version 6 (IPv6) uses which address format
*hexadecimal 32-bit dotted quad hierarchical
describe the difference between intranet extranet
intranet is a mini-internet within a company an internal network designed to provide access to selceted external users
which of the following includes a path past the domain into the folder structure of a web site?
relative URL Absolute URL *deep URL URL
what is authentication
the process of converting data into an unreadable form of text the precess of converting encrypted data back to its orginal form *the process of verifying the identity of a user who logs on to a system the precess of providing positive identification of the sending and recieving parties in a transaction
MIME PGP GnuPG
is a system that identifies attached files by type and allows users to exchange various types of data files. or pretty good privacy is a method of developed for encrypting and decrypting email messages the open version of PGP
what is a CAPTCHA designed to do
Complety automated public turing test to tell computers and humands apart
what is the function of an email client autoresponder feature
it automatically forward your email to a different email address it filters out unwanted, unsolicited mail it redirects all incoming mail to a secified folder *it sends an automated response to email messages you receive
most user friendly FTP clients initiate commands for the user when the user clicks an action button. for which of the following actions does the FTP client program use the -get- command?
to search for a file *to download a file to upload a file to move a file to a new location
which of the following statements is true about newsgroup articles
*they are all loosly part of a distribted bulletin board system called usenet they are generally offical formal sources of inormatino they are usually about cureent evens users must register with a newsgroup service in order to access and post articles
which of the following statements is true regarding netiquette
typing email messages in all capital letters is acceptable if the message is of high importance *using emoticons in email messages is not considered a professional practice instant messaging should be uesed in the workplace you should use the internet acronyms and abbreviations to keep email messages brief
in what ways can cookies be useful for web site developers
cookies give developers access to web site visitors hard drive files cookies gather personal informaion about users without their knowledge *cookies inform the web site manager about visitors preferences cookies ensure that users have installed the latest browser updates
when you view a web page, the images are downloaded to your computer. where are they stored.
history folder cookie folder desktop *bowser cache
which term describes an encryption method in which a number generated by an algorrithm from a string of text is used to verify the ntegrity of transmitted data
symmetric-key encryption asymmetric-key encryption secret-key encryption *hash encryption
a program that resides in active memory and replicates itself until a disk is full is called
*a worm a virus a trojan hourse spyware
the more terms you combine using the AND boolean operator in a search:
the fewer results you will recieve *the more results youw ill recive the closer the words will be to tone another on a page the more likely the words will appear in the oder specified
if you do not manually submit your iste to the information portal
*the information portal will never know about or index your site and never list your site in search results robot or spider will eventually find your page search site will send you an email requesting additional information your site will appear near the bottom of search results
which personal information management (PIM) program feature can be used to streamline office events and prevent scheduling conflicts?
an alarm a global address book a synchronization feature *a centeralized electronic calendar
which of the following statements is true about personal digital assistants (PDAs)?
pdas can store contact info and keep track of appointments but do not have web or email capabilites when you enter or change data in a pda you must download the data to your computer before you turn off the pda unit in order to save your changes *all pdas include some kind of PIM software for performing PIM tasks all pdas use wireless technology to transfer files
which of the following statements is true about personal digital assistants (PDAs)?
pdas can store contact info and keep track of appointments but do not have web or email capabilites when you enter or change data in a pda you must download the data to your computer before you turn off the pda unit in order to save your changes *all pdas include some kind of PIM software for performing PIM tasks all pdas use wireless technology to transfer files
what is the function of a MIME file type
mime types provide a secure method of sending email mime types identify a document type and the application required to open it mime types control how digital certificates can be included as part of an eamil message mime types identify the utility needed to decompresses zipped files
compressing some fiels types not significantly reduce file size because they are already compressed which of the following file formats is already compressed
*JPG TIFF PDF RTF
compressing some fiels types not significantly reduce file size because they are already compressed which of the following file formats is already compressed
*JPG TIFF PDF RTF
which of the following actions should you take to minimize the spam you receive?
do not purchase aniything over the internet even on secure sites delete unwanted email messages as soon as you recieve them *do not assume that only the intended recipient will read your email messages reply to the senders of unwanted email messages and ask them to remove your from their mailing list
the amount of protection encryption offers is based on what factor(s)?
only the type of data being sent the type of data being sent and the encryption type only the encryption type *the encryption type and the size of the key
what is the name of the process wherebyt he project manager acquires, processes and evaluates information from the customer to help identify t he goals of the project
*needs analysis project schedule scope creep statement of work
testing the product, evaluating performances and documenting lessons learned are part of:
quality management ad assurance project documentation *formal project review the project triangel
a database table relationship in which a record in table A can have multiple matching records in table B, but a record in table B has only one matching record in table A is a:
one-to one relationship many-to-many relation ship *one-to-many relationship many-to-one relationship
a collection of information consisting of one or more ralted fields about a specific entity such as a person, product or event, is a:
row *record category column
which markup tag determines the type of XHTML that a browser expects?
the <meta> tag the <head> tag the <XHTML> tag *the <!DOCTYPE> tag
the anchor tag <a>, is used to create a hyperlink in an html document. to create an anchor within a page (an internal bookmark), what must you add to the href attribute in the <a> tag?
the alt attribute the name attribute *the hash symbol (#) the value ""bookmark""
which attribute must be included in the <img> tag in order for the code to validate as XHTML 1.0 and meet miniumum requirements
the src attribute *the alt attribute the code attribute the style attribute
siobhan is creating a client-side image map for her web page. which tag uses the coords attribute to specify x and y coordinates that define a hot spot on the image map?
<img> <map> *<area> <imagemap>
a computers ability to approximate a color by combining RGB values is called:
*dithering redering interlacing transparency
your team needs to evaluate a web site primarily designed for consumption in a particular country which of the following isthe most relevant question to ask during this process.
how many colors are availible to the standard web browser can end-users download the flash plug-in from this country what language will be used to creat the CGI for the web forms *is the color combination effective for the cultures in the country
klaus must create a form that includes a text box, a radio button, a drop-down list and a comments box. which comination of tags (excluding attributes) will provide the form elements he requires?
<form> and <input> <form> and <input> and <size> *<form> <input> <select> and <textarea> <form><text><radio><list> and <comment>
the <form> tag is used to create user-feedback forms on web sites. the <form> tag uses the method attribute to specify the method that the browser will use to send form data to a web server. which two values are associated with the <form> tag's method attribute?
*""get"" and ""post"" ""input"" and ""get"" ""post"" and ""action"" ""input"" and ""select""
what container element allows you to defin regions in your browser window and assign separate files to each?
<cols> <table> <frame> *<frameset>
you are creating a fram-emabled site. you want to specify a base target. where would you place the <base> tag?
between the <title></title> tags between the <body></body> tags *between the <head></head> tags between the <frame></frame> tags
which of the following best describes extensible markup language (XML)
a markup language that specifies web page formatting *a metalanguage that describes data elements on a web page an object-oriented programming language that created applications an object-based scripting language that adds interactvity to web pages
which of the following is responsible for executing Perl code?
the web page *the web server the programmer the web browser
which of the following is a U.S government act created to ensure that disabled individuals employed by federal agencies have a comparable level of access to web based and computer based information
web accessibility initiative WAI *section 508 of the rehabilitation act americans with disabilities act ADA web content accessibility guidelines WCAG
which of the following is the best method to verify that the web pages you create are usable, viewable and accessible to the audience of web users?
use the newest technologies available incorporate input from all stakeholders in your design compare your finished site map to your development storyboard *test your pages using multiple bowsers and versions of browsers
the W3C now recommends that you use CSS for structureing web documents. you can structure a web page by using CSS with
an html table imported javascript *the <div> tag's id attribute the <span> tag or the style attribute.
of the four methods for applying CSS styles, which choice list the methods you can use to apply an external style sheet to your Web pages?
imported and inline *imported and linked embedded and linked embedded and imported
which flavor of XHTML does not allow deprecected tags
XHTML 1.0 *XHTML strict XHTML Frameset XHTML transitional
which example shows correct syntax for an XHTML document
<hr align=""center""> <HR size= 50 color=noshade/> <HR ""ALIGN=center; SIZE=88%""> *<hr width=""88%"" align=""center""/>
which of the following is an audience development technique?
validating XHTML *tracking user visits documenting change verifying web page accessibility
which of the following issues must be considered when using proprietary technologies on your web site?
*proprietary technologies can limit accessibility proprietary technologies are unpopular with web users proprietary technologies provide less interesting content for visitors proprietary technologies can only be used by the web suers with advanced skills
which statement accurately describes the difference between GUI HTML editors ( such as microsoft front page or macromedia dreamweaver) and text editors (such as wordpad or notepad)?
text editors enable you to develop web pages by pointing and clicking GUI HTML editors require you to know html code in order to develop web pages. text editors are often called WYSIWYG *GUI HTML editors enable you to create html pages without any knowledge of HTML
what is the purpose of the W3C authoring tool accessibility guidelines recommendation
to determine the accessibility of a web page for users with disabilities to determine the accessibility of a web page created with a GUI HTML editor to determine the accessibility of a web page developed by a person with disibilites *to determine the accessibility of a GUI HTML editor for web page developers with disabilites
you created a web page for your compnay department. your project manager directed you to validate the code to the XHTML standard, so you uploaded your page to the W3C markup validator. your code failed validation. which of the following changes could you make to help your code validate?
change the root <html></html> to <xhtml></xhtml> verify that all tags, including <!doctype> , use lowercase letters use an automated accessibility validator such as bobby instead of the W3C markup validator *change the DTD specified in your doctype declaration from XHTML strict to XHTML transitional
you have created a web page with 10 files that total 105 kilobytes(KB). theoretically, how long will it take to download this page using a 56-kilobits-per-second (Kbps) modem?
6 seconds *15 seconds 1.5 seconds .06 seconds
after several meetings, your team's website plan has been developed. which step is now necessary.
executing the plan precisely and without changes obtaining oral approval of the plan from all parties *documeting the desisions for approval by all parties presenting the plan to senior management in a meeting
your web team wants to obtain feedback about your company site. which method is most beneficail?
conduct lengthy and detailed in-person surveys with your top customers. provide a web form asking for customer input that every site visitor can submit. send surveys via e-mail to as many existing and potential cstomers as possible. *provide brief surveys via e-mail to established customers and members of the organization.
which task is associated with web iste maintenance?
creating a site plan *removing dead links testing pages in multile browsers obtaining an IP address for the server
which term is used to describe a unique word, phrase or symbol that is claimed or officailly registerd by an organizaion
license copyright *trademark trade secret
as leader of your company'web team, you have been asked to give an oral presentation of plans for your company's new web site. you want to open the discussions for some brainstroming with those attending, and you want to write notes that encourage discussion and show everyone you are listening to all ideas. which presentaion tool is most effective for this purpose?
pie chart handouts *whiteboard slideshow software
which step can most directly help your team follow up on decisions made during web development meetings
ensure proper discussion focus provideing introductions at the beginning of the beetings creating a lest of action items and distrubuting minutes *monitoring time spent on topics to ensure that all topics are properly addressed
microsoft wants to sell products to customers from its main corporate web site. as a result a web site you helped develop has been used to transfer OTP-based infrmation between your compnay and an office belonging to microsof. which type of e-commerce model is the web site you developed based upon?
consumer to consumer *business to business business to consumer electric data interchange
which of the following is an open-source alternative to secure electronic transactions (SET)
secure sockets layer (SSL) *open trading protocol (OTP) transport layer security (TLS) open buying on the internet (OBI)
which of the following allows you to create a join
*SQL JAVA .NET Visual Basic
which choice lists the three elements generally involved in an n-tier solution?
the database, the permissions, and the data *the data the buisness logic and the presentaion of the data the web browser, the web server, and the database server the application layer, the session layer, and the physical layer.
what three elements are generally involved with databases?
data business logic or the SQL coding necessary to create relationships with the data stored in the datanbase and presentation or the way the data and business logic are presented on the user screen which includes web forms created with XHTML or HTML and application-specific interfaces such as microsoft access or a web browser.
you need to provide web services quickly. you have a buget and a small web development team. the IT department cannot provide the additional services you need. services you require include SMTP and POP3, a database, and project management services. which of the following could you elist to fufull your needs?
an ISP *an ASP a project manager a Java programmer
to host your company's web site, you are using a service provider that allocates space for your equipment. you provide the server hardware, and the provider supplies space and necessary bandwidth for your server. which web server option are you using?
Co-hosting *Co-location Virtual server Dedicated hosting
the web team you manage is designing a new web site for a company that wants to reach a specific audience. after discussing the company's needs and preferences you decide to provide all page content in two languages and use a specific recommended color scheme. this approach in your site design addresses which element?
*Cultural diversity branding standard web user experience enhancement non-technical members of the web development team
an end user has just entered his authentication information into a browser. the site has automatically stored this information on the end user's hard drive. the site has also stored this user's preferences so that the next time he visits the site, his user name and preferences will be automatically retrieved. what is the most often used to store this information on the hard drive?
*a cookie a user agent a browser detector a server-side script
the OSI reference model includes which of the following layers? select all that apply
*physical *network network access *presentation section
what is a local area network (LAN)
a network that uses on or more routers to connect workstations to one another a network that uses TCP/IP to connect workstations to one another *a network that uses a switch to connect workstations to one another a network that uses IPX/SPX to connect workstations to one another
liam is responsible for maintaining a star-configured network. he needs to replace the device that provides a concentration point and connects the computers on this network. what is this device called?
*hub network interface card bridge router
which of the following is used on the internet to translate host computer names into IP addresses?
NNTP FTP *DNS DHCP
which IP address class uses the first byte of an IP address for the network portion of the address, and the last three bytes for the host portion
*Class A Class B Class C Class D
how many bits is an IPv4 address
16 *32 64 128
what type of server should you use to hide the actual IP addresses of your internal network
Certificate server Mail server News server *Proxy server
how would you restrict access to an extranet so that anonymous users would be unable to access it?
change the default HTTP port number *create an access control list (ACL) create permissions for certain files and folders on the extranet enable anonymous access to the server
which encryption method creates ciphertext that cannot be decrypted?
Hash encryption PGP encryption asymmetric-key encryption symmetric-key encryption
which firewall configuration from the following list is the most secure
packet filter topology dual-homed bastion host triple-homed bastion host *screened subnet
jim must determin the physical address of another computer on his local network. which command is used to display the IP address and physical (MAC) addresses of recently contacted computers
netsat *arp ping tracert
which TCP/IP service will automatically specify your IP address, subnet mask and default gateway when you initialize your workstation on a TCP/IP network?
domain name system (DNS) service windows internet naming service (wins) automatic private IP addressing (APIPA) service *dynamic host configuration protocol (DHCP) service
which of the following best describes a motherboard
it stores all information processed by the computer it provides a backup for all data it converts analog signals into digital signals *it is the main ciruit board in the computer
which of the following port types can support the largest number of peripherals?
parallel port (IEEE 1284) *USB port game port Firewire (IEEE 1394)
which of the following windows XP utilities would you use to fix physical errors on your hard disk
*chkdsk convert disk cleanup disk defragmentor
the appearance of the ""blue screen of death"" (BSOD) indicates what kind of failure?
a keyboard that is not attached a full hard disk drive *an operating system failure during startup a computer without power
what is the function of a service set identifier (SSID)
to differentiate one wireless cell from another to enable wireless systems to communicate with one another, as long as they are on the same network to enable wireless systems to communicate with one another, whether or not they are on the same network *to control access to a particular wireless cell
which of the following provides wireless clients the most convenient way to access the internet?
a firewall *a wireless access point (WAP) a router a network access point
which file format should you sue for your resume if you want to ensure that it will be compatible with all computer platforms and be invulnerable to viruses, while retaining its fromatted appearance?
text ASCII rich text format RTF *portable document format HTML
which of the following is a necessary responsibility for you to maintain your IT career
programming Java learning XHTML customizing applications *continuing education