unit 1
unit 2
unit 3
unit 4
unit 5
100

What is the term for public documents of interest to the Internet community that include detailed information about standardized Internet protocols?

Requests for Comments (RFCs)

100

Presence information

indicates a person's willingness and ability to participate in communication.

100

What is the primary function of a network server?

To act as a central repository of programs and data to which all users connected to the network have access

100

If your browser cache size is too small

it may take longer for pages to download from the server.

100

What kind of file formats are .gif, .jpg, .png and .tif?

Graphics

200

What is the main reason that some IT managers believe the future IT career model will be diamond-shaped, with few entry-level IT jobs available?

The offshore outsourcing of many entry-level IT positions

200

Typing an email message or instant message using all capital letters can be considered:

a breach of netiquette

200

Which of the following enabled private (i.e., commercial) business to be conducted over networks connected to NSFnet?

Private telecommunications companies

200

What is the name of the tool that can help create documents and databases, based on styles or templates?

Wizard

200

What is the primary goal of an extension?

To supplement multimedia content in Websites

300

Which of the following retains all the formatting characteristics of a word-processing document, but may render inconsistently in different browsers?

HTML résumés

300

What is the term for an application programming interface (API) that is used to transfer XML and other text data between a Web server and browser?

XMLHttpRequest

300

What is the main purpose of a file server?

To store shared data

300

What happens when your browser cache becomes full?

The browser automatically deletes old cached files as you continue to browse the Web.

300

What is the file type that Google Chrome extensions use?

.crx

400

What is the term for an individual who is responsible for examining an organization's security requirements and determining the necessary infrastructure?

Security analyst/consultant

400

What is the term for voice information delivered in digital form as packets of data using Internet Protocol (IP) instead of the traditional circuit-switched lines of the public switched telephone network (PSTN)?

Voice over IP (VoIP)

400

In an IP address such as 192.241.187.8, the last number in the address (on the far right) identifies:

a specific computer.

400

To make Web browsing easier, you can save URLs and hyperlinks that access particular Websites to avoid the need to manually type URLs each time you want to access the sites. What is the term for these saved links in Microsoft Edge?

Favorites

400

What is a security risk that comes with downloading extensions?

Extensions can disguise themselves as legitimate programs while actually acting as malware.

500

Which of the following will upper-level managers likely ask you to justify before making a hardware or software purchase, or adopting a particular IT product or service?

The Return On Investment (ROI)

500

What is the name of the programming methodology for the Web that enables Web applications to interact with users in much the same way they do with desktop applications?


Ajax

500

What is the name of the problem-solving model in which a task that cannot be performed by one person is outsourced to a large group or community in order to obtain and analyze large amounts of data?

Crowdsourcing

500

An IT professional can evaluate a browsing session to identify:

the processes, technology and potential risks.

500

What is the term for the programming concept in which a program is handled as a collection of individual items that perform separate functions, rather than as a sequence of statements that performs a specific task? 

Object-oriented programming

M
e
n
u