CoolInterview.com - World's Largest Collection of Interview Questions & Answers, FAQs, queries, sample papers, exam papers, dumps, what, why, how, where, when questions
Our Services
Get 9,000 Interview Questions & Answers in an eBook.




Get it now !!
Send your Resume to 6000 Companies

Search Interview Questions

Question: Which protocol is used to transmit files across the Web to be rendered by a
Web browser?
A. Internet Protocol (IP)
B. Hypertext Transfer Protocol (HTTP)
C. Transmission Control Protocol (TCP)
D. Point-to-Point Tunneling Protocol (PPTP)

Answer: B. Hypertext Transfer Protocol (HTTP)



Category CIW Certification Exams Interview Questions & Answers - Exam Mode / Learning Mode
Rating (3.2) By 5 users
Added on 7/30/2015
Views 62
Rate it!
Question: Which protocol is used to transmit files across the Web to be rendered by a
Web browser?
A. Internet Protocol (IP)
B. Hypertext Transfer Protocol (HTTP)
C. Transmission Control Protocol (TCP)
D. Point-to-Point Tunneling Protocol (PPTP)

Answer:

B. Hypertext Transfer Protocol (HTTP) Source: CoolInterview.com



If you have the better answer, then send it to us. We will display your answer after the approval

Rules to Post Answers in CoolInterview.com:-

  • There should not be any Spelling Mistakes.
  • There should not be any Gramatical Errors.
  • Answers must not contain any bad words.
  • Answers should not be the repeat of same answer, already approved.
  • Answer should be complete in itself.

Post your answer here

Inform me about updated answers to this question.
Related Questions
View Answer
Mike is able to check his Web-based e-mail using his cell phone. Which
protocol allows his cell phone to connect to the Internet?
A. Post Office Protocol (POP3)
B. Wireless Access Point (WAP)
C. Wireless Application Protocol (WAP)
D. Multipurpose Internet Mail Extensions (MIME)
View Answer
What is a cookie?
A. An image file that expands to fill a browser's cache.
B. A virus placed on a computer by spyware to delete directories.
C. A file created by the browser each time its user accesses a Web site.
D. A text file placed on a client by a Web server to track user preferences.
View Answer
Your supervisor directs you to make static IP address assignments on the
workstations in your office. Your workstations are part of a company WAN that also connects directly to
the Internet. What information must you have in order to complete this assignment?
A. An IP address for each workstation and the subnet mask
B. An IP address to be shared by all workstations and the subnet mask
C. An IP address for each workstation, the default gateway address and the subnet mask
D. An IP address to be shared by all workstations, the default gateway address and the subnet mask
View Answer
Which of the following is a contract used in project management that
outlines the requirements for each project task to ensure that the project objectives are met?
A. Project triangle
B. Organizational chart
C. Statement of work (SOW)
D. Return on Investment (ROI)
View Answer
Mike wants to download the Macromedia Flash MX 2004 viewer software
to his desktop. Which Internet protocol will he use?
A. FTP
B. SSH
C. TCP
D. SMTP
View Answer
Which of the following is the most efficient method for documenting and
communicating a Web site plan?
A. Photocopying and faxing sketches
B. Sending a presentation slideshow via e-mail
C. Describing the plan orally on stakeholders' voicemail
D. Posting a large diagram on the wall in a busy office hallway
View Answer
Which term describes a server at the highest level of the Domain Name
System (DNS)?
A. Master
B. Primary
C. Top level
D. Root level
View Answer
Q: 19 As an IT professional, you must always consider the Return on Investment
(ROI) impact that IT projects have on your organization. You may be required to justify a project's
benefits relative to its cost. What must you do to relate such information about IT projects to upper
managers?
A. Explain decisions in purely technical terms to ensure that the issues are properly understood.
B. Make decisions without input from management so as not to confuse the managers or stakeholders.
C. Consult only managers who have technical experience so that the project benefits will be fully understood.
D. Put the information in terms that your managers can understand so that they can make informed decisions.

View Answer
Your company is outsourcing some content development tasks. The
contractors who work on these projects will see some of your company's proprietary content before it is
available to customers. Your company needs to ensure that this trade-secret content is kept confidential
by the contractors who see it. Which of the following protects your intellectual property in this situation?
A. Copyright
B. Trademark
C. License agreement
D. Non-disclosure agreement
View Answer
Which protocol is most likely to be used when sending e-mail using the
Microsoft Outlook Express client?
A. IMAP
B. HTTP
C. SMTP
D. POP3
View Answer
You need to register a domain name for the Web sites that will promote
your company's new product in international markets. You decide to register several top-level domains,
such as .ca, .au and .ae, in addition to the commonly used .com domain. Why would you do this?
A. To appeal to the national identities of your customers
B. To make it easier for search engines to find your Web site
C. To ensure that you can sell your product legally in various countries
D. To ensure that customers remember the spelling of your product name
View Answer
When creating its Web presence, a business should choose its domain name
carefully so that users will be able to recall it easily. Every domain name is unique. With which of the
following must each domain name be registered?
A. DNS
B. W3C
C. FQDN
D. ICANN
View Answer
Lars has difficulty when he tries to access some Web pages. He suspects that
his browser has a problem or a bug. Which of the following should he consider downloading?
A. A patch
B. A firewall
C. A pop-up blocker
D. An anti-virus program
View Answer
Which of the following IP addresses is invalid?
A. 224.199.23.3
B. 24.256.54.255
C. 177.138.23.89
D. 182.255.254.115
View Answer
Which of the following is the most popular protocol that provides
authentication and encryption for secure exchanges over the Internet?
A. Secure Sockets Layer (SSL)
B. Public Key Infrastructure (PKI)
C. Electronic Data Interchange (EDI)
D. Secure Electronic Transactions (SET)
View Answer
Which choice lists the three image file formats that are universally
supported by modern Web browsers?
A. BMP, TIFF and GIF
B. PNG, GIF and BMP
C. GIF, JPEG and BMP
D. GIF, JPEG and PNG
View Answer
Which of the following is required for a wireless network to run in
infrastructure mode?
A. A bridge
B. A switch
C. A wireless access point (WAP)
D. Wireless Equivalency Privacy (WEP)
View Answer
In the client/server model, a client can access information from any server if:
A. both the client and server understand the protocol.
B. both the client and the LAN understand the protocol.
C. both the LAN and the WAN understand the protocol.
D. both the server and the LAN understand the protocol.
View Answer
Which of the following accurately describes a difference between GIF images
and JPEG images?
A. GIF images support the transparency technique, whereas JPEG images do not.
B. GIF images support millions of colors, whereas JPEG images support only 256 colors.
C. JPEG images use vector graphics, whereas GIF images use bitmap or raster graphics.
D. JPEG images support interlacing and animation techniques, whereas GIF images do not.
View Answer
Which type of encryption uses a pair of keys, in which one key is used to
encrypt information and the other key is used to decrypt that information?
A. Hash encryption
B. One-way encryption
C. Symmetric encryption
D. Asymmetric encryption
View Answer

Please Note: We keep on updating better answers to this site. In case you are looking for Jobs, Pls Click Here Vyoms.com - Best Freshers & Experienced Jobs Website.

View All CIW Certification Exams Interview Questions & Answers - Exam Mode / Learning Mode




India News Network
Latest 20 Questions
An offer which is open for acceptance over a period of time is: (a) Cross Offer (b) Counter Offer (c) Standing Offer (d) Implied Offer
Specific offer can be communicated to__________ (a) All the parties of contract (b) General public in universe (c) Specific person (d) None of the above
_________ amounts to rejection of the original offer. (a) Cross offer (b) Special offer (c) Standing offer (d) Counter offer
A advertises to sell his old car by advertising in a newspaper. This offer is caleed: (a) General Offer (b) Special Offer (c) Continuing Offer (d) None of the above
In case a counter offer is made, the original offer stands: (a) Rejected (b) Accepted automatically (c) Accepted subject to certain modifications and variations (d) None of the above
In case of unenforceable contract having some technical defect, parties (a) Can sue upon it (b) Cannot sue upon it (c) Should consider it to be illegal (d) None of the above
If entire specified goods is perished before entering into contract of sale, the contract is (a) Valid (b) Void (c) Voidable (d) Cancelled
______________ contracts are also caled contracts with executed consideration. (a) Unilateral (b) Completed (c) Bilateral (d) Executory
A offers B to supply books @ Rs 100 each but B accepts the same with condition of 10% discount. This is a case of (a) Counter Offer (b) Cross Offer (c) Specific Offer (d) General Offer
_____________ is a game of chance. (a) Conditional Contract (b) Contingent Contract (c) Wagering Contract (d) Quasi Contract
There is no binding contract in case of _______ as one's offer cannot be constructed as acceptance (a) Cross Offer (b) Standing Offer (c) Counter Offer (d) Special Offer
An offer is made with an intention to have negotiation from other party. This type of offer is: (a) Invitation to offer (b) Valid offer (c) Voidable (d) None of the above
When an offer is made to the world at large, it is ____________ offer. (a) Counter (b) Special (c) General (d) None of the above
Implied contract even if not in writing or express words is perfectly _______________ if all the conditions are satisfied:- (a) Void (b) Voidable (c) Valid (d) Illegal
A specific offer can be accepted by ___________. (a) Any person (b) Any friend to offeror (c) The person to whom it is made (d) Any friend of offeree
An agreement toput a fire on a person's car is a ______: (a) Legal (b) Voidable (c) Valid (d) Illegal
"Holiday Packages" announced as an advertisement are an example of _________: (a) Offer (b) Counter Offer (c) Invitation to Offer (d) None of the above
A match fixing contract between a player and a broker is a: (a) Valid Contract (b) Unenforceable Contract (c) Void Contract (d) Illegal Contract
When a bookseller sells a book on cash payment then it is called as ___________: (a) Unilateral Contract (b) Bilateral Contract (c) Executed Contract (d) Executory Contract
____________ agreements are created by situation: (a) Written (b) Oral (c) Void (d) Implied
Cache = 0.015625 Seconds