Ciw 1 Flashcards
Which of the following is used to help non-technical users collectively classify and find information on a site?
Tagging
You just received a joke that was e-mailed to you by a co-worker. You find the joke funny and consider forwarding it to another co-worker that you trust. Which human resources issue do you risk by forwarding the e-mail message?
Offending a recipient who receives the joke as a result from further forwarding
Melanie works in the sales department at XYZ Company. She decides that her company’s marketing team has done a poor job representing the company’s brand. Without direction or permission, she starts her own social networking account to help. This account’s name is called XYZ Professional. To customize her page, she uses company logos and verbiage from the company Web site. She then begins communicating with customers and individuals interested in XYZ via this service. Which of the following would be the most appropriate response to Melanie’s actions by the company?
Terminating Melanie’s employment for copyright and trademark violation, with a cease-and- desist letter asking for control of the account
You are using an e-mail client that you are unfamiliar with. You need to send an e-mail with an attachment but you do not see a feature labeled “attachment” anywhere on the client. What icon should you look for that is commonly used to invoke the e-mail attachment option?
Paperclip
You attend an online university that offers seminars on APA Style through its Writing Center. You registered for the seminar and learn that the training will be provided over the Web. Although there is no opportunity to ask questions, you find the live lecture to be engaging. Which Web based meeting format was used?
Webinar
To reduce the costs of maintaining servers with FTP access; your company is using P2P to facilitate sharing of information. Which strategy should your company use to protect the company’s sensitive information while capitalizing on the benefits of P2P power?
Use technologies that will control access and password-protect files.
Your customer scheduled a meeting to discuss a project you are managing. Early testing indicates that there are currently quality problems with some of the more complex features. The customer stated that quality and budget are his two main concerns: The project must be developed within budget and must be very high quality. When you asked the customer if he would be willing to extend the deadline to meet his objectives, he stated this was not possible. What adjustment to the project triangle components can you suggest to meet your customer’s needs?
Suggest that the scope be limited to include only the most important features.
Evonka is listening to music from an online music provider (such as Pandora or Jango). She builds a list of music preferences, including favorite songs. The music service then suggests additional songs she might enjoy. The music provider is an example of a cloud-computing application that uses a technology for collaborative filtering, which helps define the list of songs available to listeners. Which term describes this technology?
Crowdsourcing
Your Web browser is currently open and displaying a popular sports site. You decide that you want to browse to the CIW site without closing the browser. What is the most efficient way to accomplish this?
By typing the CIW site’s URL (www.CIWcertified.com) in the address bar of your Web browser
You have just finished designing a Web site to support a charity organization’s fund-raising efforts. You need to meet with the board members to get their feedback and address some questions before you implement the final design. The board members are dispersed throughout the country and want to avoid spending charity funds on traveling to this meeting. Which of the following solutions would best support the charity and provide you with an opportunity to discuss the design as a group?
Plan a Web conference using a service such as WebEx or GoToMeeting that supports screen sharing and phone conferencing.
Which of the following strategies is recommended when conducting keyword searches?
Use nouns instead of verbs for keywords
The App-A-Day company offers software applications for various topics. When a customer purchases a desired application from the App-A-Day online store, he is directed to a page where he can download the application directly. When the customer is redirected and begins downloading the application, which specific standard protocol is most likely transferring the application?
FTP
You use a proprietary Windows-based program to generate architectural drawings and plans for your freelance drafting business. You have a personal Web site and would like to share samples of your work for potential new customers to review. To which file format should you convert your drawings so that they are viewable regardless of the local operating system used by the individual viewing your site?
You opened an e-mail attachment and it launches a virus. The virus takes control of your system and you are unable to run your anti-virus software. Which of the following is the best step for you to take next?
Turn off your computer and reboot from a known, clean system disk.
Raoul has received a file attachment from a known individual. H. has no reason to expect files from this individual. Which of the following is an effective security strategy for Raoul to take?
Before opening the attachment, call or send a text or instant message to the individual to verify that he or she meant to send it.