|
Question |
Rating |
View Answer |
 |
Which of the following accurately describes a difference between GIF images and JPEG images? A. GIF images support the transparency technique, whereas JPEG images do not. B. GIF images support millions of colors, whereas JPEG images support only 256 colors. C. JPEG images use vector graphics, whereas GIF images use bitmap or raster graphics. D. JPEG images support interlacing and animation techniques, whereas GIF images do not.
|
|
View Answer |
 |
You have purchased some products from an online business. This business collected information from you regarding your purchase, such as your name, e-mail address and product preferences. This online business then sold some information about you to a third party. This routine practice is an example of: A. a copyright issue. B. a privacy concern. C. a trademark issue. D. a licensing concern.
|
|
View Answer |
 |
Which protocol is used to transmit files across the Web to be rendered by a Web browser? A. Internet Protocol (IP) B. Hypertext Transfer Protocol (HTTP) C. Transmission Control Protocol (TCP) D. Point-to-Point Tunneling Protocol (PPTP)
|
|
View Answer |
 |
Rolf's Web site does not meet the W3C's Web Content Accessibility Guidelines (WCAG). To make his site more accessible according to WCAG, which change could he make? A. Remove all tables from site pages B. Add a disclaimer to the home page C. Create a text-only version of the site D. Add more images and decrease text
|
|
View Answer |
 |
Which choice lists the three image file formats that are universally supported by modern Web browsers? A. BMP, TIFF and GIF B. PNG, GIF and BMP C. GIF, JPEG and BMP D. GIF, JPEG and PNG
|
|
View Answer |
 |
Angel is using a GUI HTML editor to create a Web page that will be posted on the company site during an advertising promotion. Which of the following is a disadvantage of using GUI HTML editors? A. They require you to choose a DTD. B. They require you to know HTML well. C. They may generate non-standard code. D. They take a long time to create page code.
|
|
View Answer |
 |
Which protocol is most likely to be used when sending e-mail using the Microsoft Outlook Express client? A. IMAP B. HTTP C. SMTP D. POP3
|
|
View Answer |
 |
Mike is able to check his Web-based e-mail using his cell phone. Which protocol allows his cell phone to connect to the Internet? A. Post Office Protocol (POP3) B. Wireless Access Point (WAP) C. Wireless Application Protocol (WAP) D. Multipurpose Internet Mail Extensions (MIME)
|
|
View Answer |
 |
Which of the following is required for a wireless network to run in infrastructure mode? A. A bridge B. A switch C. A wireless access point (WAP) D. Wireless Equivalency Privacy (WEP)
|
|
View Answer |
 |
Which of the following is a contract used in project management that outlines the requirements for each project task to ensure that the project objectives are met? A. Project triangle B. Organizational chart C. Statement of work (SOW) D. Return on Investment (ROI)
|
|
View Answer |
 |
Which of the following XHTML elements is always placed within the <head> section? A. <html> B. <body> C. <meta> D. <!DOCTYPE>
|
|
View Answer |
 |
Which choice lists computer peripheral port standards that require only one IRQ and are used to connect multiple high-speed devices? A. USB and PS/2 B. USB and UART C. IEEE 1394 and USB D. IEEE 1394 and IEEE 1284
|
|
View Answer |
 |
Lars has difficulty when he tries to access some Web pages. He suspects that his browser has a problem or a bug. Which of the following should he consider downloading? A. A patch B. A firewall C. A pop-up blocker D. An anti-virus program
|
|
View Answer |
 |
Lisa has programmed her company's router to recognize several internal networks. Which job title best describes her responsibilities? A. Network engineer B. Security manager C. Server administrator D. Help desk technician
|
|
View Answer |
 |
You have purchased some products from an online business. This business collected information from you regarding your purchase, such as your name, e-mail address and product preferences. This online business then sold some information about you to a third party. This routine practice is an example of: A. a copyright issue. B. a privacy concern. C. a trademark issue. D. a licensing concern.
|
|
View Answer |
 |
In general, which choice lists the protocols that must be configured in order to send and receive e-mail? A. NNTP and IMAP B. POP3 and IMAP C. HTTP and SMTP D. SMTP and POP3
|
|
View Answer |
 |
Which of the following allows multiple systems to communicate on a wireless network in infrastructure mode? A. A switch B. A wireless NIC C. A network access point (NAP) D. A wireless access point (WAP)
|
|
View Answer |
 |
You need to register a domain name for the Web sites that will promote your company's new product in international markets. You decide to register several top-level domains, such as .ca, .au and .ae, in addition to the commonly used .com domain. Why would you do this? A. To appeal to the national identities of your customers B. To make it easier for search engines to find your Web site C. To ensure that you can sell your product legally in various countries D. To ensure that customers remember the spelling of your product name
|
|
View Answer |
 |
Which diagnostic tool would you use to determine the physical (MAC) address to systems that you have recently connected with? A. arp B. netstat C. nbtstat D. tracert
|
|
View Answer |
 |
Which of the following is the most efficient method for documenting and communicating a Web site plan? A. Photocopying and faxing sketches B. Sending a presentation slideshow via e-mail C. Describing the plan orally on stakeholders' voicemail D. Posting a large diagram on the wall in a busy office hallway
|
|
View Answer |