CIW Practice Test

CIW Practice Test

Assessment

Flashcard

Computers

9th Grade

Hard

Created by

Quizizz Content

FREE Resource

Student preview

quiz-placeholder

36 questions

Show all answers

1.

FLASHCARD QUESTION

Front

You opened an e-mail attachment and it launches a virus. The virus takes control of your system and you are unable to run your anti-virus software. What is the best step for you to take next?

Back

Turn off your computer and reboot from a known, clean system disk.

2.

FLASHCARD QUESTION

Front

You just received a joke that was e-mailed to you by a co-worker. You find the joke funny and consider forwarding it to another co-worker that you trust. Which human resources issue do you risk by forwarding the e-mail message?

Back

Offending a recipient who receives the joke as a result from further forwarding

3.

FLASHCARD QUESTION

Front

Which term describes the technology used by online music providers for collaborative filtering to suggest songs based on user preferences?

Back

Crowd sourcing

4.

FLASHCARD QUESTION

Front

You have just finished designing a Web site to support a charity organization's fund-raising efforts. You need to meet with the board members to get their feedback and address some questions before you implement the final design. The board members are dispersed throughout the country and want to avoid spending charity funds on traveling to this meeting. Which of the following solutions would best support the charity and provide you with an opportunity to discuss the design as a group? Options: Plan a Web conference using a service such as WebEx or GoToMeeting that supports screen sharing and phone conferencing., Send emails to all board members., Use a group chat application., Conduct a phone call with each member individually.

Back

Plan a Web conference using a service such as WebEx or GoToMeeting that supports screen sharing and phone conferencing.

5.

FLASHCARD QUESTION

Front

Which of the following is used to help non-technical users collectively classify and find information on a site? Metadata, Tagging, Indexing, Bookmarking

Back

Tagging

6.

FLASHCARD QUESTION

Front

Raoul has received a file attachment from a known individual. H. has no reason to expect files from this individual. What is an effective security strategy for Raoul to take?

Back

Call or send a text or instant message to the individual to verify the attachment.

7.

FLASHCARD QUESTION

Front

Digital signatures verify the integrity of the data, verify the identity of the sender, and:

Back

Enforce non-repudiation

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?