1D0-610 - CIW Web Foundations Associate
Go back to CIW
A user is submitting data from a form on your Web page to a database using a CCI script. Which attribute of the form field elements organizes the user's information into name=value pairs?
You opened an e-mail attachment and it launches a virus. The virus takes control of your system and you are unable to run your anti-virus software. Which of the following is the best step for you to take next?
Turn off your computer and reboot from a known, clean system disk.
Which HTML validator is best for a final check before a new Web site is published?
W3C validator at http://validator.w3.org
Sampson has used HTML5 to create a Web page that contains image-based navigation buttons. He would like to add text-based navigation to help ensure accessibility. Which of the following HTML5 elements should he use?
ABC Company develops its Own database applications. ABC is considering migrating to cloud services to accommodate the company's growth. What strategy should ABC use to ensure continuous data protection if it begins using cloud services?
Location systems solution
Three hardware devices need to communicate with the CPU simultaneously. Which of the following will each device need to issue?
Interrupt request (IRQ)
The process of wire framing typically includes determining Web site goals plus:
outlining the development process and site navigation, and identifying required technologies.
Your company is investigating the possibility of moving its customer service management system to a cloud service provider. The sales rep for the cloud service provider has presented many advantages that would benefit your company. What would be a potential drawback of moving the CRM from your current in-house solution?
If your company's Internet service is interrupted for any reason at any time, you will not have access to the CRM.
You received a text and a threatening voicemail from an angry customer who wants to immediately discuss the shortcomings of a recently released product. You are about to walk into a mandatory meeting with your top-level leadership team. Which of the following is your best course of action?
Request that the customer send his complaints by e-mail, knowing that any inappropriate communication will be well documented.
Aisha is preparing to give a presentation to management about the development of cloud computing services that her company is planning to implement. Which of the following might her managers mention as a possible objection or drawback to using cloud services for the company?
You are a small-business owner and would like to encourage employees to bring their own devices (BYOD) to work. Which of the following can help reduce the security risks associated with a BYOD implementation?
Acceptable use policy
Acme Company has been receiving complaints from its suppliers saying that its extra net site does not render correctly in all their employees' browsers. The suppliers are asking that the extra net site be fixed so that everyone can access it, regardless of browser type. When examining this problem, the Acme Web Development team finds that many developers worked on the site and each used code that he or she was comfortable with. To resolve this problem, what can the Acme developers do?
Edit the code so that it conforms to a single W3C HTML standard.
Selena has run out of memory on her phone's SD card. She has decided to store the files she has accumulated on a third-party cloud service provider's drives. Which of the following is a typical issue that she may encounter?
The files become unavailable whenever Internet connectivity is lost.
Configuring a wireless network involves several steps. Which of the following is a task that should be performed to configure and connect to a wireless network?
Configure the wireless AP's SSID, encryption level and shared key.
Mobile computing has become a common necessity for both personal and business transactions. Which device has features similar to a smartphone but usually does not have telephone capabilities?
Matthew has embedded a video in his Web page using the HTML5 video format. The video is not rendering properly. He asks Arlene to help determine the problem, so she reviews his code, which appears as follows: <video height=" 210" class= "center" controls= "controls"> <video src="video.ogg" type="video/ogg" /> Your browser does not support the HTML5 video element. </vi deo> What is wrong with this code?
The second instance of the <video> element should be replaced with the <source> element.
You have just checked the balance in your bank account by logging into your bank's Web site. Which protocol was most likely used for the transmission of your information?
You attend an online university that offers seminars on APA Style through its Writing Center. You registered for the seminar and learn that the training will be provided over the Web. Although there is no opportunity to ask questions, you find the live lecture to be engaging. Which Webbased meeting format was used?
Which of the following strategies is recommended when conducting keyword searches?
Use nouns instead of verbs for keywords.
When the user clicks the Submit Query button on a form, the browser sends the information entered in the form to the Web server as a raw text string. The basic element of a raw text string is a name=value pair. A CGI script parses and formats the raw text string into a human-readable format. Which attribute of the form field elements organizes information input by the user into name=value pairs?
Sally is a network technician at Acme Corporation. She has been directed to configure the network adapter for a company laptop so that it can be used to connect to the company network and the Internet. What is one of the required TCP/IP settings that she will need to configure?
Which choice lists the required elements for HTTP to function?
Client, server and TCP/IP
To ensure the maximum cross-browser compatibility and consistent functionality, Web developers should:
test their pages in the most common browsers, including the most used and latest releases.
One of your co-workers calls you to ask if you sent her an e-mail message with an attachment. You recall that you sent several c-mails with attachments earlier that day. Which of the following is your best response to this question?
Ask your co-worker to read the e-mail message including the full name of the attachment and its extension.
Which type of attack is a form of social engineering in which an attacker attempts to steal personal or confidential information by sending e-mail that lures unsuspecting victims to log in to an authentic-looking but imposter Web site?
You are creating a style sheet to format the pages on your company's Web site. One section will have a black background with white text. What is the hexadecimal reference you would use to specify the text color for this portion of the Web page?
A family member has just sent you an e-mail message that contains highly personal details about a family matter. The message was sent to your company e-mail address. The family member has requested that you respond with your ideas about how to resolve the situation. Which of the following is a reason for you to call your family member and discuss the matter over the phone instead?
Because your employer has the right to read your e-mail
Sam is a professor at a small college. Due to a scheduling conflict, he was unable to obtain access to the computer lab to give the final exam. As an alternative, he asked students to bring their own devices (BYOD) and connect to the college's Wi-Fi for network access. What security risk is associated with this implementation?
Student devices sending unsecured data
Prior to HTML5, structuring a Web site using style sheets with the <dlv> tag and its, attribute has been an acceptable practice to govern the document's structure. With the emergence of HTML5, what five new elements were introduced for more effectiveness?
<nav>, <article>, <aside>, <header>, <footer>
You have been asked to design and develop a Web site for a retirement community. What can you do to help make the site accessible to the elderly?
Comply with WAI's Web Content Accessibility Guidelines.
To insert a graphic in a Web page and successfully validate the page as HTNL5, the <img> element must include:
The alt attribute
You have 20 remote employees flying in to attend a corporate meeting. The morning of travel day, the administrator tells you that the hotel reservations have changed. What is the best way to send each traveling employee a quick message with the new hotel information?
Send a text message with the hotel information to the mobile phone of each traveler.
What is the distinguishing difference between a LAN and WAN?
A LAN is a group of networked computers within a confined geographic area.
The Windows Device Manager is a tool that enables you to perform a variety of tasks, including:
Change a resource assignment.
Marsha has been hired by XYZ, Inc., to update the company Web site. Marsha discovers that the existing Web pages were structured using tables. Marsha needs to explain to XYZ why the Web site needs to be recoded in HTML5 with CSS controlling the structure of the document. What is the most important reason for using HTML5 and CSS?
The Web site can be interpreted by any HTML5-compliant browser, including mobile devices.
You have just been hired by a large company, and the IT manager is giving you an overview of the corporate network. He tells you that the corporation is spread out over several cities, and various departments are divided into sub networks that are connected using routers. What type of network are you being shown?
Wide area network (WAN)
Marion has been hired by a popular national salon business to refresh its existing Web site and update it to valid HTML5 code. Money is not an issue, but time is. Marion is asked to complete the project within eight weeks. The site currently includes 10 pages and connects to a back-end database so that customers can sign in for a personalized experience. Marion suspects that most of the existing code will need to be replaced. Marion must ensure that she has plenty of time for the testing phase, so she needs to complete the planning phase, in which she selects the multimedia for the site, within the next couple days. Which strategy should Marion use in the planning phase?
Purchase stock photos from online resources.
To restore a backup file on a Windows-based computer, you:
Use the Backup And Restore utility in the Control Panel.
Wireless networks are subject to more security issues than standard wired networks. Which wireless security protocol can prevent unauthorized devices from connecting to the wireless network?
You are a computer technician supporting a small 15-computer Internet lab. The computers are regularly used to browse the Internet and download files. Users have recently complained that they receive error messages saying the hard disk is full or out of space. You suspect this is a result of a large amount of temporary Internet files. Which of the following is a way to easily delete all the temporary Internet files?
Which type of application allows you to edit and validate your source code and preview your Web pages in multiple browsers?
GUI HTML editor
Virtualization software transforms the hardware resources of a physical computer to create a fully functional virtual computer that can run its own operating systems and applications. In addition to the CPU and RAM, which hardware resources are used by virtualization software?
Hard disk and network devices
Which choice describes a correct order of precedence for implementing CSS?
Inline styles override all other styles.
A paradigm shift has occurred in the way that small businesses use software applications. Companies increasingly choose hosted solutions with a monthly subscription fee and outsourced system maintenance, instead of purchasing software and hardware that must be maintained by internal resources. This business model is commonly referred to as:
Software as a Service.
To reduce the costs of maintaining servers with FTP access; your company is using P2P to facilitate sharing of information. Which strategy should your company use to protect the company's sensitive information while capitalizing on the benefits of P2P power?
Use technologies that will control access and password-protect files
You have recently purchased a new wireless router. You would like to configure a name for your wireless network so that you can easily identify it when scanning available wireless networks. Which term describes this wireless network device name?
Service Set Identifier (SSID)
Which of the following is a legal and ethical practice?
Trying shareware for free and paying for it only after you decide to keep using it.
Marcella is looking for a very unique product online. She has found one on the XYZ Company's Web site, which is designed well and appears to be legitimate. As she navigates through the checkout process, she reaches the checkout page with this URL, which asks her to enter her credit card information: http://XYZ.com/gp/checkout.html/ref=chk_out_TLS12B_lb?ie=IJTFB&docld=10007931 Why should Marcella cancel her online transaction instead of proceeding?
Because the link does not use SSL/TLS encryption and therefore the information Marcella enters would not be secure
You are distributing a large video game file using BitTorrent. First, you upload the initial file and make it available via a central server called a tracker. Other users can then connect to the tracker and download the file. Each user who downloads the file makes it available to other users to download. The use of BitTorrent significantly reduces the original provider's hardware and bandwidth resource costs. BitTorrent is an example of what type of network?
Peer-to-peer (P2P) network
You are developing a Web site in HTML5. You want the new HTML5 structural elements (such as <header> or <article>) to be styled consistently in all browsers. You must add a CSS rule that will change them to which element type, to ensure the site will render successfully?