Ciw 1 Flashcards

1
Q

Which of the following is used to help non-technical users collectively classify and find information on a site?

A

Tagging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You just received a joke that was e-mailed to you by a co-worker. You find the joke funny and consider forwarding it to another co-worker that you trust. Which human resources issue do you risk by forwarding the e-mail message?

A

Offending a recipient who receives the joke as a result from further forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Melanie works in the sales department at XYZ Company. She decides that her company’s marketing team has done a poor job representing the company’s brand. Without direction or permission, she starts her own social networking account to help. This account’s name is called XYZ Professional. To customize her page, she uses company logos and verbiage from the company Web site. She then begins communicating with customers and individuals interested in XYZ via this service. Which of the following would be the most appropriate response to Melanie’s actions by the company?

A

Terminating Melanie’s employment for copyright and trademark violation, with a cease-and- desist letter asking for control of the account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You are using an e-mail client that you are unfamiliar with. You need to send an e-mail with an attachment but you do not see a feature labeled “attachment” anywhere on the client. What icon should you look for that is commonly used to invoke the e-mail attachment option?

A

Paperclip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You attend an online university that offers seminars on APA Style through its Writing Center. You registered for the seminar and learn that the training will be provided over the Web. Although there is no opportunity to ask questions, you find the live lecture to be engaging. Which Web based meeting format was used?

A

Webinar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

To reduce the costs of maintaining servers with FTP access; your company is using P2P to facilitate sharing of information. Which strategy should your company use to protect the company’s sensitive information while capitalizing on the benefits of P2P power?

A

Use technologies that will control access and password-protect files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Your customer scheduled a meeting to discuss a project you are managing. Early testing indicates that there are currently quality problems with some of the more complex features. The customer stated that quality and budget are his two main concerns: The project must be developed within budget and must be very high quality. When you asked the customer if he would be willing to extend the deadline to meet his objectives, he stated this was not possible. What adjustment to the project triangle components can you suggest to meet your customer’s needs?

A

Suggest that the scope be limited to include only the most important features.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Evonka is listening to music from an online music provider (such as Pandora or Jango). She builds a list of music preferences, including favorite songs. The music service then suggests additional songs she might enjoy. The music provider is an example of a cloud-computing application that uses a technology for collaborative filtering, which helps define the list of songs available to listeners. Which term describes this technology?

A

Crowdsourcing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Your Web browser is currently open and displaying a popular sports site. You decide that you want to browse to the CIW site without closing the browser. What is the most efficient way to accomplish this?

A

By typing the CIW site’s URL (www.CIWcertified.com) in the address bar of your Web browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

You have just finished designing a Web site to support a charity organization’s fund-raising efforts. You need to meet with the board members to get their feedback and address some questions before you implement the final design. The board members are dispersed throughout the country and want to avoid spending charity funds on traveling to this meeting. Which of the following solutions would best support the charity and provide you with an opportunity to discuss the design as a group?

A

Plan a Web conference using a service such as WebEx or GoToMeeting that supports screen sharing and phone conferencing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following strategies is recommended when conducting keyword searches?

A

Use nouns instead of verbs for keywords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The App-A-Day company offers software applications for various topics. When a customer purchases a desired application from the App-A-Day online store, he is directed to a page where he can download the application directly. When the customer is redirected and begins downloading the application, which specific standard protocol is most likely transferring the application?

A

FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

You use a proprietary Windows-based program to generate architectural drawings and plans for your freelance drafting business. You have a personal Web site and would like to share samples of your work for potential new customers to review. To which file format should you convert your drawings so that they are viewable regardless of the local operating system used by the individual viewing your site?

A

PDF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You opened an e-mail attachment and it launches a virus. The virus takes control of your system and you are unable to run your anti-virus software. Which of the following is the best step for you to take next?

A

Turn off your computer and reboot from a known, clean system disk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Raoul has received a file attachment from a known individual. H. has no reason to expect files from this individual. Which of the following is an effective security strategy for Raoul to take?

A

Before opening the attachment, call or send a text or instant message to the individual to verify that he or she meant to send it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An end user cannot log in to a page that provides an e-learning course. The authentication window will not launch. Which of the following is most likely the cause of this problem?

A

Pop-up blocking software has been enabled in the Web browser.

17
Q

You received a text and a threatening voicemail from an angry customer who wants to immediately discuss the shortcomings of a recently released product. You are about to walk into a mandatory meeting with your top-level leadership team. Which of the following is your best course of action?

A

Request that the customer send his complaints by e-mail, knowing that any inappropriate communication will be well documented.

18
Q

You have just finished designing a Web site to support a charity organization’s fund-raising efforts. You need to meet with the board members to get their feedback and address some questions before you implement the final design. The board members are dispersed throughout the country and want to avoid spending charity funds on traveling to this meeting. Which of the following solutions would best support the charity and provide you with an opportunity to discuss the design as a group?

A

Plan a Web conference using a service such as WebEx or GoToMeeting that supports screen sharing and phone conferencing.

19
Q

Andrea works as an Administrative Assistant for a small business that uses an SaaS service for accounting, sales orders and customer service information about the business’s customers. This product is similar to Salesforce.com and its competitors. Andrea makes sure she saves accurate records about current projects and performs regular backups of the business data stored on the cloud-based service. Which of the following is the primary reason for this practice?

A

If there is an interruption in Internet access, the service and records would not be accessible

20
Q

You accidentally dropped your mobile phone, which was submerged in water and no longer works. Upon replacing the phone with an upgraded unit you must reconfigure many of the services. The instructions say that all you need to do is enter your e-mail address and the unit will configure the e-mail client for you. Even though you have tried this several times, it does not work. The mobile phone vendor says that because you are trying to sync your e-mail account with an enterprise mail server, you will need to configure the e-mail client manually. Which choice lists the information you will need to configure the e-mail client?

A

E-mail address, SMTP, POP3, user name and password

21
Q

The official CIW Web site has an IP address of 72.44.192.233. Which technology allows Web users to enter the URL www.CIWcertified.com in the browser address bar to access the site, instead of having to remember and enter the IP address?

A

DNS

22
Q

You are expecting a very important file from a co-worker in a remote office to be sent to you through e-mail. You finally call the co-worker and tell him that you have not received the file. H. informs you that he sent the file yesterday, but will send it again immediately. After some time, you still have not received his e-mail message. You contact the Technical Support department and ask them for help. After some investigation, Technical Support finds the e-mail from your coworker with an attachment named salesnumbers.exe in the spam folder of your e-mail client. What is the most likely reason that the e-mail message was filtered out?

A

File attachments with an .exe extension may contain malicious code.

23
Q

You received an e-mail message on which several other individuals were copied. You want to respond to this message in a way that will include everyone who was copied on the original message. You can accomplish this by using which action?

A

Reply All

24
Q

You just started a small business and need to create a logo. Although you are technically savvy, your artistic creativity is limited. You decide to launch a contest to seek creative ideas for your logo. Using the Internet and social networking in this manner is known as:

A

crowdsourcing

25
Q

Which of the following strategies will help protect your computer against virus attacks?

A

Update the definitions for your malware protection application frequently.

26
Q

As a project manager, you have to balance three elements that compose the project triangle. Suppose your customer requests that you add some new requirements to the project when you are halfway through. If you agree to this request, how would it affect other aspects of the project?

A

Cost of the project will increase.

27
Q

Digital signatures verify the integrity of the data, verify the identity of the sender, and:

A

Enforce non-repudiation

28
Q

One of your co-workers calls you to ask if you sent her an e-mail message with an attachment. You recall that you sent several e-mails with attachments earlier that day. Which of the following is your best response to this question?

A

Ask your co-worker to read the e-mail message including the full name of the attachment and its extension.

29
Q

Xue’s company has provided her with a desktop computer to use at work. She has configured her e-mail client on this work computer to include her personal e-mail account so that she can conveniently download messages and check her personal e-mail. Xue should be aware that

A

The company will have access to her personal e-mail messages.

30
Q

Which organization is responsible for managing domain names so that each one is unique, and (once registered) cannot be used by an unauthorized individual or organization

A

ICANN