You received an e-mail message on which several other individuals were copied. You want to respond to this message in a way that will include everyone who was copied on the original message. You can accomplish this by using which action?
-Reply
-Send
-Forward
-Reply All
Reply All
Paul has just finished a very important sales meeting with a potential customer, and he needs to update his supervisor at the corporate office, which is in another country. Paul is debating whether to text or e-mail his supervisor about the meeting details. Which of the following would be the best practice for communicating with his supervisor?
-Post the details of the meeting on his favorite social media platform, where his supervisor is one of his followers.
-Send a brief text message update now, and then send the meeting details in an email message later.
-Send several text messages to convey all the details of the meeting most quickly.
-Send a brief text message to say the meeting has finished, because Paul knows his supervisor does not read e-mail.
Send a brief text message to say the meeting has finished, because Paul knows his supervisor does not read e-mail.
Which of the following strategies is recommended when conducting keyword searches?
-Use nouns instead of verbs for keywords.
-Use verbs instead of nouns for keywords.
-Use as few keywords as possible.
-Include at least one preposition such as “the”or“an”in your list of keywords
Use nouns instead of verbs for keywords.
Gabby suspects that an attacker has gained control of her system. Which of the following is the most appropriate action for her to take?
Unplug the computer network cable and/or disable the computer’s wireless NIC.
You are leading a team of new hires and need to train them on innovative strategies and technologies that will be used to develop an upcoming project. You send several e-mail messages with links to helpful resources. But you soon realize this is an inefficient way to organize and share this information. Which solution would provide a more efficient way to categorize and share this information?
-Collective intelligence
-Grid computing
-Ajax programming
-Social tagging
Social tagging
Irena is reviewing several promotional product videos from her company’s marketing department before they are published on the company’s Web site. The videos are in Real Media format, but they do not open in Irena’s Windows Media Player. What should Irena do to view the videos?
-Upload the videos to the Web server to be viewed through Windows Media Player because they will not play from a local computer.
-Convert the video files to the WMV format because Real Media files will not play in Windows Media Player.
- her company’s Technical Support department and schedule service for her computer.
-Decompress the files before attempting to play them in Windows Media Player, because Real Media files are compressed for uploading/downloading.
Convert the video files to the WMV format because Real Media files will not play in Windows Media Player.
Michelle wants to search for a scuba regulator. She plans to use a keyword search engine. She does not want to see any results from the manufacturer named Scuba pro. Which of the following search strings should she use?
-Regulators <Scubapro
-Regulators >Scubapro
-Regulators !Scubapro
-Regulators Scubapro
Regulators !Scubapro
A friend just sent you a link to a Facebook page with information that you find very useful. You want to be able to recall the site in the future from your desktop computer, or from your mobile device while away from your desk. Which is the best approach?
-Memorize the URL so you can pull up the site in any browser such as Chrome, Firefox or Internet Explorer.
-Add the link to a cloud-based bookmark service such as Delicious or Google Bookmarks.
-Manually enter the Web address into any and all browsers on all of your devices.
-Pull up the message with the link any time you want to view the site.
Add the link to a cloud-based bookmark service such as Delicious or Google Bookmarks.
Which of the following is a legal and ethical practice?
-Downloading copyrighted artwork and using it as a background on your Website.
-Trying shareware for free and paying for it only after you decide to keep using it.
-Copying someone else’s written work found on the Internet and presenting it as your own, as long as it is for schoolwork.
-Downloading music and motion pictures as long as they are from a peer-to-peernetwork.
Trying shareware for free and paying for it only after you decide to keep using it.
You just received a joke that was c-mailed to you by a co-worker. You find the joke funny and consider forwarding it to another co-worker that you trust. Which human resources issue do you risk by forwarding the e-mail message?
Offending a recipient who receives the joke as a result from further forwarding
You received a text and a threatening voicemail from an angry customer who wants to immediately discuss the shortcomings of a recently released product. You are about to walk into a mandatory meeting with your top-level leadership team. Which of the following is your best course of action?
-Do not respond to the customer.
-Skip the meeting and call the customer.
-Request that the customer send his complaints by e-mail, knowing that any inappropriate communication will be well documented.
-Continue to send text messages to the customer hoping to smooth things over until you can call him on the phone after your meeting.
Request that the customer send his complaints by e-mail, knowing that any inappropriate communication will be well documented.
An end user cannot log in to a page that provides an c-learning course. The authentication window will not launch. Which of the following is most likely the cause of this problem?
-Pop-up blocking software has been enabled in the operating system.
-Pop-up blocking software has been enabled in the Web browser.
-The browser has recently had its browsing history cleared.
-The browser has recently had its cookie cache cleared.
Pop-up blocking software has been enabled in the Web browser.
One of your co-workers calls you to ask if you sent her an e-mail message with an attachment. You recall that you sent several c-mails with attachments earlier that day. Which of the following is your best response to this question?
-Ask your co-worker to open the attachment and describe the contents.
-Ask your co-worker to forward the e-mail to you so you can open the attachment and check it.
-Ask your co-worker to forward the e-mail to your company’s management.
-Ask your co-worker to read the e-mail message including the full name of the attachment and its extension.
Ask your co-worker to read the e-mail message including the full name of the attachment and its extension.
You use a proprietary Windows-based program to generate architectural drawings and plans for your freelance drafting business. You have a personal Web site and would like to share samples of your work for potential new customers to review. To which file format should you convert your drawings so that they are viewable regardless of the local operating system used by the individual viewing your site?
You just started a small business and need to create a logo. Although you are technically savvy, your artistic creativity is limited. You decide to launch a contest to seek creative ideas for your logo. Using the Internet and social networking in this manner is known as:
crowd sourcing
Consider the following address:
http://www.CIWcertified.com/certifications/web_foundations/iba.php Which part of the URL represents the server name on which this page resides?
-WWW
-/certifications/
-CIWcertified
WWW
As a project manager, you have to balance three elements that compose the project triangle. Suppose your customer requests that you add some new requirements to the project when you are halfway through. If you agree to this request, how would it affect other aspects of the project?
-Cost of the project will decrease.
-Cost of the project will increase.
-Project scope will decrease.
-Time to complete project will be reduced.
Cost of the project will increase.
Evonka is listening to music from an online music provider (such as Pandora or Jango). She builds a list of music preferences, including favorite songs. The music service then suggests additional songs she might enjoy. The music provider is an example of a cloud-computing application that uses a technology for collaborative filtering, which helps define the list of songs available to listeners. Which term describes this technology?
-Crowdsourcing
-Software as a Service
-Bit-torrent
-Grid computing
Crowed Sourcing
You accidentally dropped your mobile phone, which was submerged in water and no longer works. Upon replacing the phone with an upgraded unit, you must reconfigure many of the services. The instructions say that all you need to do is enter your e- mail address and the unit will configure the e- mail client for you. Even though you have tried this several times, it does not work. The mobile phone vendor says that because you are trying to sync your e-mail account with an enterprise mail server, you will need to configure the e-mail client manually. Which choice lists the information you will need to configure the e-mail client?
-E-mail address, SMTP, IMAP, DNS, username and password
-E-mail address, SMTP, POP3, username and password
-Company name, e-mail address, SMTP, POP3, IMAP and DNS
-Company name, SMTP, POP3, username and password
E-mail address, SMTP, POP3, username and password
Proprietary information for your company’s online business was released to a competitor. Which of the following preventative measures should your company take to ensure that its proprietary information is protected in the future?
Monitor employees’ messages
Which organization is responsible for managing domain names so that each one is unique, and (once registered) cannot be used by an unauthorized individual or organization?
-W3C
-RFC
-IEFT
-ICANN
ICANN
Your Web browser is currently open and displaying a popular sports site. You decide that you want to browse to the CIW site without closing the browser. What is the most efficient way to accomplish this?
-By typing in the FTP address (ftp.CIWcertified.com) in the address bar of your Web browser
-By performing a search within the site currently displayed in your Web browser
-By typing the CIW site’s URL (www.CIWcertified.com) in the address bar of your Web browser
-By performing a search on your computer for the term “CIW”
By typing the CIW site’s URL (www.CIWcertified.com) in the address bar of your Web browser
You have just checked the balance in your bank account by logging into your bank’s Web site. Which protocol was most likely used for the transmission of your information?
HTTPS
Which of the following is used to help non-technical users collectively classify and find information on a site?
Tagging
Which choice lists the required elements for HTTP to function?
-Client, Web page and DNS
-Browser, HTML and TCP/IP
-Server, HTML and DNS
-Client, server and TCP/IP
Client, server and TCP/IP