Which type of intellectual property includes business plans, proprietary code and sales contracts?
A. Copy left
B. Copyright
C. Trademark
D. Trade secret
Which of the following is a drawback to using Wired Equivalent Privacy (WEP)?
A. Wireless network overhead is excessive.
B. Symmetric-key encryption is susceptible to cracking.
C. The number of devices that can communicate using WEP is limited.
D. Encryption and decryption speeds are slower compared to other protocols.
On your Windows laptop, you store all your vacation photos and your entire digital music library. Concerned about data loss, you perform frequent backups. Your laptop has recently been stolen and you need to restore your files to a desktop computer. Which Windows tool would you use to recover and set up the saved copies of your files onto your desktop computer?
A. Backup and Restore
B. Backup Recovery
C. System Recovery
D. System Restore
The App-A-Day company offers software applications for various topics. When a customer purchases a desired application from the App-A-Day online store, he is directed to a page where he can download the application directly. When the customer is redirected and begins downloading the application, which specific standard protocol is most likely transferring the application?
A. FTP
B. HTTPS
C. HTTP
D. SMTP
Which term describes the practice of actively collecting wireless networking data from companies and individuals?
A. War driving
B. Spear phishing
C. Dictionary attack
D. Social engineering
Your Web browser is currently open and displaying a popular sports site. You decide that you want to browse to the CIW site without closing the browser. What is the most efficient way to accomplish this?
A. By performing a search on your computer for the term "CIW"
B. By performing a search within the site currently displayed in your Web browser
C. By typing in the FTP address (ftp.CIWcertified.com) in the address bar of your Web browser
D. By typing the CIW site's URL (www.CIWcertified.com) in the address bar of your Web browser
You use a proprietary Windows-based program to generate architectural drawings and plans for your freelance drafting business. You have a personal Web site and would like to share samples of your work for potential new customers to review. To which file format should you convert your drawings so that they are viewable regardless of the local operating system used by the individual viewing your site?
A. PDF
B. MP3
C. DOC
D. XML
You need to center and indent a quote on your Web page. Which is the best way to accomplish this using HTML5?
A. Use the
element.B. Use the
element.C. Use the style attribute 1%Iith the
tag.
D. Use the text-align attribute with the
tag.
Xue's company has provided her with a desktop computer to use at work. She has configured her e- mail client on this work computer to include her personal e-mail account so that she can conveniently download messages and check her personal e-mail. Xue should be aware that:
A. the company will block personal e-mail accounts.
B. the company must permit her to receive personal e-mail messages.
C. the company will ignore the e-mail messages to respect her privacy.
D. the company will have access to her personal e-mail messages.
Marsha has been hired by XYZ, Inc., to update the company Web site. Marsha discovers that the existing Web pages were structured using tables. Marsha needs to explain to XYZ why the Web site needs to be recoded in HTML5 with CSS controlling the structure of the document. What is the most important reason for using HTML5 and CSS?
A. The updates will increase user traffic to the site.
B. The updates will improve the overall look and feel of the Web site.
C. The Web site can be interpreted by any HTML5-compliant browser, including mobile devices.
D. The Web site will rank higher in many search engines results, as long as the search engine bot recognizes the code.
Which choice lists the CSS standard(s) that HTNL5 supports?
A. CSS3 standard only
B. CSS2andCSS3standardsonly
C. CSSlandCSS2standardsonly
D. All CSS standards (CSS1, CSS2 and CSS3)
Which organization is responsible for managing domain names so that each one is unique, and (once registered) cannot be used by an unauthorized individual or organization?
A. ICANN
B. W3C
C. IEFT
D. RFC
Aisha is preparing to give a presentation to management about the development of cloud computing services that her company is planning to implement. Which of the following might her managers mention as a possible objection or drawback to using cloud services for the company?
A. Speed
B. Cost
C. Flexibility
D. Scalability
Three hardware devices need to communicate with the CPU simultaneously. Which of the following will each device need to issue?
A. DMA request
B. CON request
C. Interrupt request (IRQ)
D. Input/output request (I/O)
You are the technology coordinator for a small multi-national corporation with offices in Los Angeles, New York, Tokyo and London. You have been asked to coordinate a live and interactive meeting that will allow executives from each of the offices to meet virtually and share presentations. What is the best way to achieve this desired goal?
A. Podcast
B. Webcast
C. Conference call
D. Web conference