Sponsored Links

Interview Questions
Recommended Books


Question: Mike wants to download the Macromedia Flash MX 2004 viewer software
to his desktop. Which Internet protocol will he use?

Answer: A. FTP

Category CIW Certification Exams Interview Questions & Answers - Exam Mode / Learning Mode
Rating (3.6) By 11 users
Added on 7/30/2015
Views 55
Rate it!

Question: Mike wants to download the Macromedia Flash MX 2004 viewer software
to his desktop. Which Internet protocol will he use?


A. FTP Source: CoolInterview.com

If you have the better answer, then send it to us. We will display your answer after the approval.
Rules to Post Answers in CoolInterview.com:-
  • There should not be any Spelling Mistakes.
  • There should not be any Gramatical Errors.
  • Answers must not contain any bad words.
  • Answers should not be the repeat of same answer, already approved.
  • Answer should be complete in itself.
Name :*
Email Id :*
Answer :*
Verification Code Code Image - Please contact webmaster if you have problems seeing this image code Not readable? Load New Code
Process Verification Enter the above shown code: *
Inform me about updated answers to this question

Related Questions
View Answer
Which of the following is the most efficient method for documenting and
communicating a Web site plan?
A. Photocopying and faxing sketches
B. Sending a presentation slideshow via e-mail
C. Describing the plan orally on stakeholders' voicemail
D. Posting a large diagram on the wall in a busy office hallway
View Answer
Which term describes a server at the highest level of the Domain Name
System (DNS)?
A. Master
B. Primary
C. Top level
D. Root level
View Answer
Q: 19 As an IT professional, you must always consider the Return on Investment
(ROI) impact that IT projects have on your organization. You may be required to justify a project's
benefits relative to its cost. What must you do to relate such information about IT projects to upper
A. Explain decisions in purely technical terms to ensure that the issues are properly understood.
B. Make decisions without input from management so as not to confuse the managers or stakeholders.
C. Consult only managers who have technical experience so that the project benefits will be fully understood.
D. Put the information in terms that your managers can understand so that they can make informed decisions.

View Answer
Your company is outsourcing some content development tasks. The
contractors who work on these projects will see some of your company's proprietary content before it is
available to customers. Your company needs to ensure that this trade-secret content is kept confidential
by the contractors who see it. Which of the following protects your intellectual property in this situation?
A. Copyright
B. Trademark
C. License agreement
D. Non-disclosure agreement
View Answer
Which protocol is most likely to be used when sending e-mail using the
Microsoft Outlook Express client?
View Answer
You need to register a domain name for the Web sites that will promote
your company's new product in international markets. You decide to register several top-level domains,
such as .ca, .au and .ae, in addition to the commonly used .com domain. Why would you do this?
A. To appeal to the national identities of your customers
B. To make it easier for search engines to find your Web site
C. To ensure that you can sell your product legally in various countries
D. To ensure that customers remember the spelling of your product name
View Answer
When creating its Web presence, a business should choose its domain name
carefully so that users will be able to recall it easily. Every domain name is unique. With which of the
following must each domain name be registered?
B. W3C
View Answer
Lars has difficulty when he tries to access some Web pages. He suspects that
his browser has a problem or a bug. Which of the following should he consider downloading?
A. A patch
B. A firewall
C. A pop-up blocker
D. An anti-virus program
View Answer
Which of the following IP addresses is invalid?
View Answer
Which of the following is the most popular protocol that provides
authentication and encryption for secure exchanges over the Internet?
A. Secure Sockets Layer (SSL)
B. Public Key Infrastructure (PKI)
C. Electronic Data Interchange (EDI)
D. Secure Electronic Transactions (SET)
View Answer
Which choice lists the three image file formats that are universally
supported by modern Web browsers?
View Answer
Which of the following is required for a wireless network to run in
infrastructure mode?
A. A bridge
B. A switch
C. A wireless access point (WAP)
D. Wireless Equivalency Privacy (WEP)
View Answer
In the client/server model, a client can access information from any server if:
A. both the client and server understand the protocol.
B. both the client and the LAN understand the protocol.
C. both the LAN and the WAN understand the protocol.
D. both the server and the LAN understand the protocol.
View Answer
Which of the following accurately describes a difference between GIF images
and JPEG images?
A. GIF images support the transparency technique, whereas JPEG images do not.
B. GIF images support millions of colors, whereas JPEG images support only 256 colors.
C. JPEG images use vector graphics, whereas GIF images use bitmap or raster graphics.
D. JPEG images support interlacing and animation techniques, whereas GIF images do not.
View Answer
Which type of encryption uses a pair of keys, in which one key is used to
encrypt information and the other key is used to decrypt that information?
A. Hash encryption
B. One-way encryption
C. Symmetric encryption
D. Asymmetric encryption
View Answer
Lisa has programmed her company's router to recognize several internal
networks. Which job title best describes her responsibilities?
A. Network engineer
B. Security manager
C. Server administrator
D. Help desk technician
View Answer
Rolf's Web site does not meet the W3C's Web Content Accessibility
Guidelines (WCAG). To make his site more accessible according to WCAG, which change could he
A. Remove all tables from site pages
B. Add a disclaimer to the home page
C. Create a text-only version of the site
D. Add more images and decrease text
View Answer
What is spyware?
A. Software that reports security holes to hackers
B. Software that gathers information and relays it to outside parties
C. Software that determines and reports improper software licensing
D. Software that opens an undocumented port on your server and allows attackers to control your system
View Answer
Which choice lists computer peripheral port standards that require only one
IRQ and are used to connect multiple high-speed devices?
A. USB and PS/2
C. IEEE 1394 and USB
D. IEEE 1394 and IEEE 1284
View Answer
1 What is an intranet?
A. A searchable internal repository that stores an organization's proprietary documents
B. A worldwide network available to anyone who has a TCP/IP connection on a computer
C. A TCP/IP-based network accessible only by an organization's members and employees
D. A TCP/IP-based network accessible only by an organization's internal employees and select external clients
View Answer

Please Note: We keep on updating better answers to this site. In case you are looking for Jobs, Pls Click Here Vyoms.com - Best Freshers & Experienced Jobs Website.

View All CIW Certification Exams Interview Questions & Answers - Exam Mode / Learning Mode

User Options
India News Network

Latest 20 Questions
What are the Hadoop related Projects at Apache?
What are the modules included in Apache Hadoop Project?
What is Apache Hadoop?
What is a Private Cloud? Do we need one to handle Big Data?
How Can We Cope with the Impact of Big Data?
What skills do Big Data analysts need to have?
What does a Big Data analyst do?
What are some real-world examples of Big Data and how it is used?
What is Big Data Analytics?
Why Big Data is becoming so important?
What is the impact of Big Data on Sports Industry?
What is the impact of Big Data on Real estate Industry?
What is the impact of Big Data on Retail Banking Industry?
What is the impact of Big Data on Retail Industry?
What is the impact of Big Data on Technology Industry?
What is the impact of Big Data on Information Technology Industry?
What is the impact of Big Data on Internet of Things (IoT) Industry?
What is the impact of Big Data on Media Industry?
What is the impact of Big Data on Education Industry?
What is the impact of Big Data on Healthcare Industry?

Fresher Jobs | Experienced Jobs | Government Jobs | Walkin Jobs | Company Profiles | Interview Questions | Placement Papers | Companies In India | Consultants In India | Colleges In India | Exams In India | Latest Results | Notifications In India | Call Centers In India | Training Institutes In India | Job Communities In India | Courses In India | Jobs by Keyskills | Jobs by Functional Areas

Testing Articles | Testing Books | Testing Certifications | Testing FAQs | Testing Downloads | Testing Interview Questions | Testing Jobs | Testing Training Institutes

Gate Articles | Gate Books | Gate Colleges | Gate Downloads | Gate Faqs | Gate Jobs | Gate News | Gate Sample Papers | Gate Training Institutes

MBA Articles | MBA Books | MBA Case Studies | MBA Business Schools | MBA Current Affairs | MBA Downloads | MBA Events | MBA Notifications | MBA FAQs | MBA Jobs
MBA Job Consultants | MBA News | MBA Results | MBA Courses | MBA Sample Papers | MBA Interview Questions | MBA Training Institutes

GRE Articles | GRE Books | GRE Colleges | GRE Downloads | GRE Events | GRE FAQs | GRE News | GRE Training Institutes | GRE Sample Papers

IAS Articles | IAS Books | IAS Current Affairs | IAS Downloads | IAS Events | IAS FAQs | IAS News | IAS Notifications | IAS UPSC Jobs | IAS Previous Question Papers
IAS Results | IAS Sample Papers | IAS Interview Questions | IAS Training Institutes | IAS Toppers Interview

SAP Articles | SAP Books | SAP Certifications | SAP Companies | SAP Study Materials | SAP Events | SAP FAQs | SAP Jobs | SAP Job Consultants
SAP Links | SAP News | SAP Sample Papers | SAP Interview Questions | SAP Training Institutes |

Copyright ©2003-2016 CoolInterview.com, All Rights Reserved.
Privacy Policy | Terms and Conditions

Cache = 0 Seconds