
CIW IBA Exam Preparation
Authored by Eric Metzner
Business
9th - 12th Grade
Used 915+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
60 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Which of the following is a legal and ethical practice?
Copying someone elses written work found on the Internet and presenting it as your own, as long as it is for schoolwork.
Trying shareware for free and paying for it only after you decide to keep using it.
Downloading copyrighted artwork and using it as a background on your Web site.
Downloading music and motion pictures as long as they are from a peer-to-peer network.
2.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Irena is reviewing several promotional product videos from her company's marketing department before they are published on the computer website. The videos are in RealMedia format, but they do not open in Irena's Windows Media Player. What should Irena do in order to view the videos?
Contact her companys Technical Support department and schedule service for her computer.
Convert the video files to the WMV format, because RealMedia files will not play in Windows Media Player.
Upload the videos to the web server to be viewed through Windows Media Player because they will not play from a local computer.
Decompress the files before attempting to play them in Windows Media Player, because RealMedia files are compressed for uploading/downloading.
3.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
You are leading a team of new hires and need to train them on innovative strategies and technologies that will be used to develop an upcoming project. You send several email messages with links to helpful resources. But you soon realize this is an inefficient way to organize and share this information. Which solution would provide a more efficient way to categorize and share this information?
Social tagging
Grid computing
Ajax programming
Collective intelligence
4.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
The official CIW Web site has an IP address of 72.44.192.233. Which technology allows Web users to enter the URL www.CIWcertified.com in the browser address bar to access the site, instead of having to remember and enter the IP address?
SSL
DNS
HTTP
NNTP
5.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Your customer scheduled a meeting to discuss a project you are managing. Early testing indicates that there are currently quality problems with some of the more complex features. The customer stated that quality and budget are his two main concerns: The project must be developed within budget and must be very high quality. When you asked the customer if he would be willing to extend the deadline to meet his objectives, he stated this was not possible.
What adjustment to the project triangle components can you suggest to meet your customers needs?
Suggest that the scope be limited to include only the most important features.
Inform the customer that he must compromise one of the three elements of a project triangle:quality, budget or schedule.
Suggest that the customer hire temporary contractors.
Suggest that the customer use a Gantt chart to add time to the project.
6.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Gabby suspects that an attacker has gained control of her system. Which of the following is the most appropriate action for her to take?
Shut down the computer.
Enable strong encryption on all files on the hard disk.
Run antivirus software on all disks associated with this system.
Unplug the computer network cable and/or disable the computer’s wireless NIC.
7.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Raoul has received a file attachment from a known individual. He has no reason to expect files from this individual. Which of the following is an effective security strategy for Raoul to take?
Open the file attachment and use antivirus software to scan it.
Before opening the attachment, use antivirus software to scan the system’s hard disk.
Make backup copies of important files so that it is possible to recover them in case of an incident.
Before opening the attachment, call or send a text or instant message to the individual to verify that he or she meant to send it.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?