IBA/CIW REVIEW TEST-B

IBA/CIW REVIEW TEST-B

9th - 12th Grade

15 Qs

quiz-placeholder

Similar activities

1. Web Browising Concepts

1. Web Browising Concepts

10th Grade - Professional Development

10 Qs

Class X

Class X

10th Grade

20 Qs

Information Technology 1 unit 9

Information Technology 1 unit 9

1st - 12th Grade

10 Qs

Ucertify/CIW Mashup Lessons 1-4

Ucertify/CIW Mashup Lessons 1-4

10th Grade

20 Qs

WWW

WWW

10th Grade

15 Qs

1.3.1 - The Internet

1.3.1 - The Internet

8th - 9th Grade

17 Qs

security best practices

security best practices

10th Grade - University

20 Qs

HTML Hyperlinks

HTML Hyperlinks

8th - 12th Grade

20 Qs

IBA/CIW REVIEW TEST-B

IBA/CIW REVIEW TEST-B

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Herman Scriven

Used 448+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Digital signatures verify the integrity of the data, verify the identity of the sender, and

Provide data confidentiality

Enforce non-repudiation

Sign digital certificate requests

Create certificate requests

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

You use a proprietary Windows-based program to generate architectural drawings and plans for your freelance drafting business. You have a personal Web site and would like to share samples of your work for potential new customers to review. To which file format should you convert your drawings so that they are viewable regardless of the local operating system used by the individual viewing your site?

PDF

MP3

DOC

XML

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Jessi works as an Administrative Assistant for a small business that uses an SaaS service for accounting, sales orders and customers service information about the business's customers. This product is similar to Salesforce.com and its competitors. Jessi makes sure she saves accurate records about current projects and performs regular backups of the business data stored on the cloud-based service. Which of the following is the primary reason for this practice?

If there is an interruption in Internet access, the service and records would not be accessible

There is a limit on the number of users who are allowed to access the cloud-based service at any one time.

Data stored online through the cloud-based service is more at risk to security breaches than if it was stored locally

Jessi is overly cautious because it is well known that cloud-based services are highly secure, highly reliable and always available.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Consider the following address............http://www.CIWcertified.com/Certifications/Web_Foundations/iba.php......................Which of the following is the best classification for the address?

Fully qualified domain name

Virtual domain name

Relative URL

Deep URL

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are a software developer who wants to start developing mobile apps for smartphones. You have the option to develop apps for an open-source operating system. Which of the following could persuade you to focus your development efforts on the open-source system?

An open-source license will never be in the public domain.

Source code for an open-source app is not viewable and cannot be modified

Open-source operating systems and development tools are free from software bugs and viruses.

The operating system and associated development tools are free, provided you comply with the copyleft license.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Ava works in the sales department at XYZ Company. She decides that her company's marketing team has done a poor job representing the company's brand. Without direction or permission, she starts her own social networking account to help. This account's name is called XYZ Professional. To customize her page, she uses company logos and verbage from the company Web site. She then begins communicating with customers and individuals interested in XYZ via this service. Which of the following would be the most appropriate response to Ava's actions by the company?

Provide a link to Ava's page from the company's official social networking account.

Sending Ava a request from the company's Human Resources department to stop using company logos, yet allowing her to continue using this social networking account.

Adding references to Ava's social networking page in the company's internal newletter.

Terminating Ava's employment for copyright and trademark violation, with a cease-and-desist letter asking for control of the account.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Rachel's company has provided her with a desktop computer to use at work. She has configured her e-mail client on this computer to include her personal e-mail account so that she can conveniently download messages and check her personal e-mail. Rachel should be aware that

The company will block personal e-mail accounts

The company must permit her to receive personal e-mail messages

The company will ignore the e-mail messages to respect her privacy.

The company will have access to her personal e-mail messages.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?