Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

CIW 1D0-61A - Internet Business Associate

Page: 1 / 2
Total 57 questions

Michelle wants to search for a scuba regulator. She plans to use a keyword search engine. She does not want to see any results from the manufacturer named Scubapro. Which of the following search strings should she use?

A.

Regulators !Scubapro

B.

Regulators Scubapro

C.

Regulators

D.

Regulators >Scubapro

Xue’s company has provided her with a desktop computer to use at work. She has configured her e-mail client on this work computer to include her personal e-mail account so that she can conveniently download messages and check her personal e-mail. Xue should be aware that:

A.

The company will block personal e-mail accounts.

B.

The company must permit her to receive personal e-mail messages.

C.

The company will ignore the e-mail messages to respect her privacy.

D.

The company will have access to her personal e-mail messages.

You received an e-mail message on which several other individuals were copied. You want to respond to this message in a way that will include everyone who was copied on the original message. You can accomplish this by using which action?

A.

Reply

B.

Reply All

C.

Forward

D.

Send

Evonka is listening to music from an online music provider (such as Pandora or Jango). She builds a list of music preferences, including favorite songs. The music service then suggests additional songs she might enjoy. The music provider is an example of a cloud-computing application that uses a technology for collaborative filtering, which helps define the list of songs available to listeners. Which term describes this technology?

A.

Bit-torrent

B.

Crowdsourcing

C.

Grid computing

D.

Software as a Service

Which choice lists the required elements for HTTP to function?

A.

Server, HTML and DNS

B.

Client, server and TCP/IP

C.

Browser, HTML and TCP/IP

D.

Client, Web page and DNS

What is the difference between a computer virus and a worm?

A.

A virus can replicate by itself, whereas a worm requires user action to replicate.

B.

A worm can replicate by itself, whereas a virus requires user action to replicate.

C.

A worm can deposit an illicit server, whereas a virus cannot.

D.

A virus can deposit an illicit server, whereas a worm cannot.

As a project manager, you have to balance three elements that compose the project triangle. Suppose your customer requests that you add some new requirements to the project when you are halfway through. If you agree to this request, how would it affect other aspects of the project?

A.

Project scope will decrease.

B.

Cost of the project will increase.

C.

Cost of the project will decrease.

D.

Time to complete project will be reduced.

You use a proprietary Windows-based program to generate architectural drawings and plans for your freelance drafting business. You have a personal Web site and would like to share samples of your work for potential new customers to review. To which file format should you convert your drawings so that they are viewable regardless of the local operating system used by the individual viewing your site?

A.

PDF

B.

MP3

C.

DOC

D.

XML

You have volunteered to give a presentation to the parents at your child’s school about the dangers of the Internet. Which of the following would you include in your recommendations to parents?

A.

Warn children to never provide personal information over the Internet.

B.

Direct parents to ask other users in the children’s chat rooms to provide identification.

C.

Remind the parents that the anonymity of chat rooms provides security.

D.

To reduce fear, claim that the threat of predators has been reduced in recent times.

You are the technology coordinator for a small multi-national corporation with offices in Los Angeles, New York, Tokyo and London. You have been asked to coordinate a live and interactive meeting that will allow executives from each of the offices to meet virtually and share presentations. What is the best way to achieve this desired goal?

A.

Podcast

B.

Webcast

C.

Conference call

D.

Web conference