Search Header Logo

CIW IBA Exam Preparation

Authored by Eric Metzner

Business

9th - 12th Grade

Used 915+ times

CIW IBA Exam Preparation
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

60 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which of the following is a legal and ethical practice?

Copying someone elses written work found on the Internet and presenting it as your own, as long as it is for schoolwork.

Trying shareware for free and paying for it only after you decide to keep using it.

Downloading copyrighted artwork and using it as a background on your Web site.

Downloading music and motion pictures as long as they are from a peer-to-peer network.

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Irena is reviewing several promotional product videos from her company's marketing department before they are published on the computer website. The videos are in RealMedia format, but they do not open in Irena's Windows Media Player. What should Irena do in order to view the videos?

Contact her companys Technical Support department and schedule service for her computer.

Convert the video files to the WMV format, because RealMedia files will not play in Windows Media Player.

Upload the videos to the web server to be viewed through Windows Media Player because they will not play from a local computer.

Decompress the files before attempting to play them in Windows Media Player, because RealMedia files are compressed for uploading/downloading.

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

You are leading a team of new hires and need to train them on innovative strategies and technologies that will be used to develop an upcoming project. You send several e­mail messages with links to helpful resources. But you soon realize this is an inefficient way to organize and share this information. Which solution would provide a more efficient way to categorize and share this information?

Social tagging

Grid computing

Ajax programming

Collective intelligence

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

The official CIW Web site has an IP address of 72.44.192.233. Which technology allows Web users to enter the URL www.CIWcertified.com in the browser address bar to access the site, instead of having to remember and enter the IP address?

SSL

DNS

HTTP

NNTP

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Your customer scheduled a meeting to discuss a project you are managing. Early testing indicates that there are currently quality problems with some of the more complex features. The customer stated that quality and budget are his two main concerns: The project must be developed within budget and must be very high quality. When you asked the customer if he would be willing to extend the deadline to meet his objectives, he stated this was not possible.

What adjustment to the project triangle components can you suggest to meet your customers needs?

Suggest that the scope be limited to include only the most important features.

Inform the customer that he must compromise one of the three elements of a project triangle:quality, budget or schedule.

Suggest that the customer hire temporary contractors.

Suggest that the customer use a Gantt chart to add time to the project.

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Gabby suspects that an attacker has gained control of her system. Which of the following is the most appropriate action for her to take?

Shut down the computer.

Enable strong encryption on all files on the hard disk.

Run anti­virus software on all disks associated with this system.

Unplug the computer network cable and/or disable the computer’s wireless NIC.

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Raoul has received a file attachment from a known individual. He has no reason to expect files from this individual. Which of the following is an effective security strategy for Raoul to take?

Open the file attachment and use anti­virus software to scan it.

Before opening the attachment, use anti­virus software to scan the system’s hard disk.

Make back­up copies of important files so that it is possible to recover them in case of an incident.

Before opening the attachment, call or send a text or instant message to the individual to verify that he or she meant to send it.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?