• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/27

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

27 Cards in this Set

  • Front
  • Back

Of the six elements required to connect to the Internet, which can be supplied in the form of a Web browser, email program or mobile app?

Client Software

Which statement correctly compares computer viruses and worms?

A virus requires user action to replicate, but a worm can replicate by itself.

Which IT job role best describes an individual who install, modifies, and repairs personal computer hardware components?

PC repair technician

Secure authentication requires:

a username, a password, and encryption of this information

Lisa is configuring an e-mail client to connect to her e-mail account. Which of the following is required to set up the email account?

A POP3 address

Cleo's boyfriend sent her an e-mail message at work with details about a highly personal matter. The message was sent to Cleo's company e-mail address. Her boyfriend requested that she respond as soon as possible. Why should Cleo call her boyfriend to discuss the matter over the phone instead of responding in an e-mail message?

Because her employer has the right to read her e-mail.

How does scope creep undermine the success of a project?

Incremental changes in scope will affect the schedule, cost or performance required to complete the project.

Johann uses instant messaging (IM) to frequently communicate with his team members, as well as with close friends. Recently, Johann was surprised that he started receiving spam during his IM sessions. Which statement would explain why Johann could receive spam during an IM session?

Instant messaging bypasses anti-virus software and firewalls.

What are project stakeholders?

People or groups that can exert influence over the project and affect results.

Frankie works on the IT team at her company. She is looking for ways to reduce costs, so she suggests that the company uses P2P to facilitate sharing of information, instead of maintaining servers with FTP access. To protect its confidential data while benefiting from P2P, the company should:

Implement technologies that will control access and password-protect files.

You have created a new software application and are ready to distribute it to other users. You have decided to license the software according to the GNU GPL version 3. What does this license allow you to do with your software?

Your software is available for free use and alteration by other programmers, who must then make their modified versions freely available as well

You and other parents are attending Back to School Night at your son's school. During his presentation about this year's curriculum and goals, your son's teacher talks about the dangers of the Internet. Which of the following should he include in his recommendations to the parents?

Urge the parents to warn their children to never provide personal information over the Internet.

Which term best describes a file of programming code that provides a temporary fix to a known bug?

Patch

Nancy is using a Web browser on her desktop computer to place some bids on a popular online auction site. She decides that she wants to browse to the CIW site without closing her browser. What is the most efficient way to do this?

By typing the CIW site's URL (www.CIWcertified.com) in the address bar of her Web browser

What is a project constraint?

A factor, such as budget or time, that limits a project manager's options.

Mark's co-worker sent him a joke via e-mail. Mark thought the joke was quite funny, and he forwarded it to several other co-workers that he knows will be amused as well. Later that day, the Human Resources Manager calls Mark to her office to discuss a problem reported to her regarding the forwarded e-mail. Which problem has Mark most likely encountered by forwarding the e-mail message?

He offended a recipient who received the joke as a result of further forwarding.

Kjell received an e-mail message on which several other individuals were copied. He wants to respond to this message in a way that will include everyone who was copied on the original message. Which steps should he take with this e-mail?

Click the Reply All button, enter his response, and click Send.

James has just finished designing a Web site to support a charity organizations' fund-raising efforts. He needs to meet with the board members to get their feedback and address some questions before he implements the final design. The board members are dispersed throughout the country and want to avoid spending charity funds on traveling to this meeting. Which of the following solutions would best support the charity and provide James with an opportunity to discuss the design with the group?

Plan a Web conference using a service that supports screen-sharing and phone conferencing.

It is vital that you understand how to evaluate information you retrieve from resources on the Internet because the source of information can directly affect the quality and factuality of the information. Which of the following resource types bases information on primary sources?

Open peer-reviewed

Tina is the technology coordinator for a small multi-national corporation with offices in San Francisco, New York, Tokyo and Paris. She needs to coordinate a live and interactive meeting that will allow executives from each of the offices to meet virtually and share presentations. Which of the following is the best way for Tina to accomplish this?

Web Conference

Ange works as an Administrative Assistant for a small business that uses an SaaS service for sales orders and customer accounting (similar to Salesforce.com). Ange makes sure to save accurate records about current projects, and she performs regular backups of the business data stored on this cloud-based service. Why?

Because the service and records would not be accessible if there is an interruption in Internet access

You receive an unexpected e-mail with an attachment from a co-worker. You call the co-worker to ask if she sent you an e-mail message with an attachment. She recalls that she sent several e-mails with attachments earlier that day. Which of the following is your co-worker's best response to your question?

She should ask you to read her the e-mail message including the full name of the attachment and its extension.

Cheryl just started using a new e-mail client on her laptop computer. She wants to send an e-mail message with an attachment, but she does not see a button labeled "Attachment" on the client interface. What icon is commonly used on e-mail clients to invoke the Attachment option?

Paperclip

You have just finished a very important sales meeting with a potential customer, and you need to update your supervisor at the corporate office, which is located in another country. You are debating whether to text or e-mail your supervisor about the meeting details. Which of the following would be the best practice for communicating with your supervisor?

Send a brief text message update now, and then send the meeting details in an e-mail message later.

Which choice lists the systems for which the Windows Media Player is available?

Windows and Macintosh systems

Patrick wants to search for Fender guitars other than Stratocasters. he plans to use a keyword search engine. He does not want to see any results for Stratocaster guitars, only other Fender models. Which of the following search strings should he use?

guitar Fender !Stratocaster

You use a proprietary Windows-based program to create designs and layouts for your freelance greeting card business. You want to share samples of your work on your Web site for potential new customers to review. You convert the file format of your designs so that customers can view accurate renderings of them, regardless of the local operating system, settings or browser each individual uses to view your site. Which file format should you use?

PDF