CIW IBA Assessment

CIW IBA Assessment

9th - 12th Grade

30 Qs

quiz-placeholder

Similar activities

SDA uCertify Lesson 6

SDA uCertify Lesson 6

8th - 12th Grade

25 Qs

Year 7 Computer Science Baseline

Year 7 Computer Science Baseline

KG - Professional Development

31 Qs

IT Fundamentals:  6.0 Security

IT Fundamentals: 6.0 Security

11th - 12th Grade

29 Qs

SEMI - Grier Unit 3.-4-3.06

SEMI - Grier Unit 3.-4-3.06

9th - 12th Grade

28 Qs

SOAL UH (Materi Surat Elektronik)

SOAL UH (Materi Surat Elektronik)

9th Grade

25 Qs

BTEC Online World

BTEC Online World

10th Grade

29 Qs

Exercise Nettiquette

Exercise Nettiquette

12th Grade

25 Qs

CE L2 - Internet Searches & Using Email

CE L2 - Internet Searches & Using Email

5th - 9th Grade

30 Qs

CIW IBA Assessment

CIW IBA Assessment

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Chuck Noalis

Used 137+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You opened an e-mail attachment and it launches a virus. The virus takes control of your system and you are unable to run your anti-virus software. Which of the following is the best step for you to take next?

Turn off your computer and reboot from a known, clean system disk.

Use nouns instead of verbs for keywords

Tagging

E-mail address, SMTP, POP3, user name and password

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You just received a joke that was e-mailed to you by a co-worker. You find the joke funny and consider forwarding it to another co-worker that you trust. Which human resources issue do you risk by forwarding the e-mail message?

Before opening the attachment, call or send a text or instant message to the individual to verify that he or she meant to send it.

Send a text message with the hotel information to the mobile phone of each traveler.

Cost of the project will increase.

Offending a recipient who receives the joke as a result from further forwarding

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following strategies is recommended when conducting keyword searches?

Tagging

Use nouns instead of verbs for keywords

File attachments with an .exe extension may contain malicious code.

Enforce non-repudiation

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Evonka is listening to music from an online music provider (such as Pandora or Jango). She builds a list of music preferences, including favorite songs. The music service then suggests additional songs she might enjoy. The music provider is an example of a cloud-computing application that uses a technology for collaborative filtering, which helps define the list of songs available to listeners. Which term describes this technology?

Tagging

FTP

Crowd sourcing

PDF

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You have just finished designing a Web site to support a charity organization's fund-raising efforts. You need to meet with the board members to get their feedback and address some questions before you implement the final design. The board members are dispersed throughout the country and want to avoid spending charity funds on traveling to this meeting. Which of the following solutions would best support the charity and provide you with an opportunity to discuss the design as a group?

Plan a Web conference using a service such as WebEx or GoToMeeting that supports screen sharing and phone conferencing

List the action items in a numbered or bulleted list or clarity.

Cost of the project will increase.

If there is an interruption in Internet access, the service and records would not be accessible

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is used to help non-technical users collectively classify and find information on a site?

FTP

Tagging

PDF

Deep URL

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You received a text and a threatening voicemail from an angry customer who wants to immediately discuss the shortcomings of a recently released product. You are about to walk into a mandatory meeting with your top-level leadership team. Which of the following is your best course of action?

The operating system and associated development tools are free, provided you comply with the copy left license.

Request that the customer send his complaints by e-mail, knowing that any inappropriate communication will be well documented.

E-mail address, SMTP, POP3, user name and password

List the action items in a numbered or bulleted list or clarity.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?