ComputerScienceExpert

(11)

$18/per page/

About ComputerScienceExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Applied Sciences,Calculus See all
Applied Sciences,Calculus,Chemistry,Computer Science,Environmental science,Information Systems,Science Hide all
Teaching Since: Apr 2017
Last Sign in: 103 Weeks Ago, 4 Days Ago
Questions Answered: 4870
Tutorials Posted: 4863

Education

  • MBA IT, Mater in Science and Technology
    Devry
    Jul-1996 - Jul-2000

Experience

  • Professor
    Devry University
    Mar-2010 - Oct-2016

Category > Programming Posted 26 May 2017 My Price 11.00

describes the role that education plays in IT-industrycareers

1. Which of the following best describes the role that education plays in IT-industry careers?

a. Completing a basic IT skills training course will qualify an individual for most IT job roles.

b. Most IT jobs do not require any college degree but do require the professional certifications relevant to the position.

c. Most IT jobs require a bachelor's degree at a minimum.

d. Continual study is necessary to keep your skills current because IT technologies change so rapidly.

3Which of the following practices can help you avoid harassment (or the appearance of harassment) when using Internet communications?

a. Send potentially offensive jokes via e-mail only to people you know well.

b. Respect other users' requests not to send any jokes via e-mail or IM.

c. Use emoticons to indicate that threats you make via e-mail or IM are not serious.

d. Reduce inappropriate or unprofessional communications while at work.

4. If you are logged on to Windows Live Messenger, why would you be unable to engage in an instant messaging session with your brother, who is logged on to his AOL Instant Messenger account?

a. Because you use Windows and your brother uses Apple OS X

b. Because Windows Live Messenger has built-in security and AOL Instant Messenger does not

c. Because AOL Instant Messenger and Windows Live Messenger use their own proprietary protocols

d. Because AOL Instant Messenger encrypts instant messages and Windows Live Messenger cannot decrypt them

5. Which protocol is used specifically to send e-mail to others with an outgoing server?

a. Internet Message Access Protocol (IMAP)

b. Hypertext Transfer Protocol (HTTP)

c. Post Office Protocol (POP)

d. Simple Mail Transfer Protocol (SMTP)

6. The three-letter domain category at the right side of a domain name is also called:

a. a dotted quad.

b. a server name.

c. a top-level domain.

d. a Web site host.

7. What Web browser element is responsible for reading Web page content and presenting it to the reader?

a. Sandbox

b. Download control

c. Frame

d. Rendering engine

 

8. A text string that specifies an Internet address and the method by which the address can be accessed is known as a:?

a. Web browser

b. Uniform Resource Locator

c. Domain name

d. Thread

 

9. You have just downloaded a Microsoft PowerPoint file, but you do not have the PowerPoint program installed on your computer. What is the quickest and easiest way to view the file?

a. Install the PowerPoint program

b. View the file in your browser

c. Install the PowerPoint Viewer

d. View the file in Adobe Reader

 

10. What is Encapsulated PostScript (EPS)?

a. A file-compression application used to compress video

b. An animation type that allows image and text formatting, and requires a plug-in

c. A file-compression application used to compress audio files

d. A file format used for transporting graphics between platforms and applications

11. How can you specify that keywords must be found in an exact order?

a. Enclose the keywords in quotation marks.

b. Enclose the keywords in parentheses.

c. Use the Boolean AND operator.

d. Use the Boolean OR operator

 

12. To avoid plagiarizing information that you reference for Internet research, you should:

a. cite information from the sites you use.

b. contact the creators of the sites you use.

c. determine the types of institutions that host the sites you use.

d. evaluate the ranking systems of the sites you use.

 

13. Which method allows you to save your Web-based e-mail messages to your hard drive?

a. Right-click each message, then click Save Target As.

b. Retrieve your messages with a separate account that writes your mailbox folders to your hard drive.

c. Use the Export To Local Drive command that is offered in all Web-based e-mail clients.

d. Save each message as an HTML file.

 

14. How do you know if an e-mail message includes an attachment?

a. You cannot tell; you must ask the person who sent the message.

b. The sender must include the words "Files Attached" in the Subject field.

c. An icon and file name will display in the Attachment field in the message header.

d. The file name will display in the Bcc field in the e-mail message header.

 

15. Which of the following must a browser have in order to begin an SSL session? Choose the best answer.

a. Digital certificate

b. User name

c. 128-bit encryption

d. A hash value of the browser's user name

 

16. Firewalls prevent unauthorized access to or from:

a. the Internet.

b. the World Wide Web.

c. private networks.

d. public networks.

 

17for remote employees and install software on remote systems?

a. Peer-to-Peer (P2P) network

b. Lightweight Directory Access Protocol (LDAP)

c. Virtual Network Computing (VNC)

d. Concurrent Versions System (CVS)

18. What can a developer grant in order to place his or her software application in the public domain?

a. A software patent

b. An end-user license agreement (EULA)

c. A proprietary software license

d. An open-source license

 

19. If the time allotted for a project were decreased by 50 percent, what would be the most likely result?

a. The project budget would be decreased by 50 percent.

b. No other aspect of the project would be affected.

c. The scope of the project would be decreased.

d. The scope of the project would be increased.

 

20. Which would most likely be a factor of a properly managed IT project?

a. Employee morale is adversely affected because of an inordinate amount of system downtime.

b. Employee productivity loss is minimized.

c. Employees become frustrated and angry because their ability to work is unnecessarily impaired.

d. Project tasks take longer to complete than planned.

 

21. What is the primary function of HTML?

a. To describe content in a Web page

b. To broadcast audio

c. To enhance animation

d. To position content on a Web page

 

22. Which of the following characteristics is an important element of an accessible Web page?

a. The page should have at least one image per three square inches of space.

b. The page should use only primary colors to ensure that it will display well on all browsers.

c. The page's text should read like a book, with an introduction, a body and a conclusion.

d. The page should have alternative text for images.

 

23. Which tag could you use to add a brief summary of your markup page's contents for display in browser search results?

a. <head>

b. <body>

c. <meta>

d. <html>

 

24. What type of HTML element will affect at least an entire paragraph of page content?

a. A block-level element

b. A text-level element

c. A paragraph-level element

d. A content-level element

 

25. Which statement accurately describes the difference between GUI HTML editors (such as Adobe Dreamweaver) and text editors (such as WordPad or Notepad)?

a. GUI HTML editors enable you to create HTML pages without any knowledge of HTML.

b. Text editors allow you to create HTML pages without any knowledge of HTML.

c. Text editors are often called WYSIWYG (What You See Is What You Get) editors.

d. GUI HTML editors keep pace with evolving HTML standards.

 

26. Which standards organization controls the evolution of HTML by publishing industry-accepted recommendations?

a. W3C

b. ISO

c. RFC

d. ICANN

 

27. Which of the following statements about HTML5 is true?

a. HTML5 allows the use of all deprecated elements.

b. HTML5 renders properly in all browsers.

c. HTML5 uses CSS to format a page's appearance, and uses HTML to organize the data on a page.

d. HTML5 uses HTML to format a page's appearance, and uses CSS to organize the data on a page.

 

28. You can use Cascading Style Sheets (CSS) to:

a. create "cascading" graphic animations on your Web pages.

b. override default formatting properties presented by HTML elements.

c. provide information about your Web page to a browser or spider program.

d. make your Web page accessible and easy to download.

 

.29.  You need to provide Web services quickly. You have a budget and a small Web development team. The IT department cannot provide the additional services you need. Services you require include SMTP and POP3, a database, and project management services. Which of the following could you enlist to fulfill your need?

a. An ISP

b. Cloud services

c. Upper management

d. Co-located servers

 

30.Which line of code uses the proper HTML5 tag to center text on a Web page?

a. <div align="center"><h2>Welcome to Habitat for Humanity</h2></div>

b. <h2 >Welcome to Habitat for Humanity</h2>

c. <h2><center>Welcome to Habitat for Humanity</center></h2>

d. <h2>Welcome to Habitat for Humanity</h2>

 

31. Which markup tag determines the type of HTML that a browser expects?

a. The <!DOCTYPE> declaration

b. The <head> tag

c. The <body> tag

d. The <link> and <meta> tags

 

.32. In HTML5, what is the purpose of the <nav> element?

a. It divides one Web page into five sections.

b. It creates a Web page section for a major block of links.

c. It creates a section at the top of the Web page.

d. It creates navigational links within the article section of a Web page.

 

33. Which attribute must be included in the <img> tag in order for the code to validate as HTML5 and meet minimum accessibility requirements?

a. The style attribute

b. The code attribute

c. The alt attribute

d. The src attribute

 

34. A computer's ability to approximate a color by combining RGB values is called:

a. dithering.

b. interlacing.

c. transparency.

d. rendering.

 

35. The anchor tag, <a>, is used to create a hyperlink in an HTML document. To create an anchor within a page (an internal bookmark), what must you add to the href attribute in the <a> tag?

a. The name attribute

b. The alt attribute

c. The hash symbol (#)

d. The value "bookmark"

 

36. Julio is working on a file named products.html. He wants to insert a hyperlink in a file named update.html. This file resides in a directory that is one level higher than products.html. Which code will allow him to link to update.html and also validate as HTML5?

a. <a href="/update.html"/>

b. <a .html> </a>

c. <A HREF="update.html">

d. <a href="/../update.html"> </a>

 

37. Which résumé format contains little formatting and is not necessarily designed to be visually impressive, but can be entered into various keyword-searchable résumé databases on various computer platforms and is not vulnerable to viruses?

a. Text résumés

b. RTF résumés

c. PDF résumés

d. HTML résumés

38. Which statement about sending an instant message is true?

a. You can send an instant message only to a contact that is signed in to the service.

b. You can send an instant message whether the recipient is online or not.

c. You can send an instant message only from a mobile phone that has wireless

telecommunications capability.

d. Your instant message must be no larger than 140 bytes.

39. High-speed data lines that handle the bulk of data transmission and form the main network connections of the Internet are known as:

a. backbones.

b. gateways.

c. packets.

d. routers.

40. Which of the following features was introduced by Google Chrome and has become popular in other browsers?

a. Tab-based browsing

b. Anonymous browsing

c. Caching of browser pages

d. Encryption support

41. Which of the following best describes online installation of a plug-in?

a. The user downloads the plug-in file, quits the browser and installs the file, but does not restart the computer.

b. The user downloads the plug-in file, quits the browser and installs the file, then must restart the computer.

c. Installation of the plug-in is performed with the browser open and may occur without prompting the user.

d. The plug-in is already installed by default in the browser when the user installs the browser initially.

42. A Web search in which the search engine displays a list of categories and subcategories that you can browse by clicking links is called:

a. a Boolean search.

b. a database search.

c. a keyword search.

d. a directory search.

43. Which of the following practices is considered good netiquette?

a. Proofreading and checking spelling before sending an e-mail message

b. Typing an e-mail message using all capital letters

c. Using humor to diffuse sensitive subject matter discussed in an e-mail message

d. Using explicit language only in messages you send to co-workers you know well

44. Which choice best describes authentication?

a. Designating a third person or organization to verify the identity of a party sending information

b. Designating a third person or organization to verify the identity of a party receiving information

c. Verifying the identity of the company that is hosting a Web site

d. Verifying the identity of a user who is logging on to a computer system

45. When using command-line FTP, what command should you use to access a specific FTP site?

a. The open command, followed by the specific FTP site address

b. The put command, followed by the specific FTP site address

c. The get command, followed by the specific FTP site address

d. The anonymous command, followed by pressing the enter key

46. Which project management phases typically occur concurrently?

a. The initiating and planning phases

b. The planning and executing phases

c. The executing and controlling phases

d. The controlling and closing phases

47. What is the benefit of using the W3C's HTML code validation service to validate your code?

a. Your code will automatically update older browsers.

b. Your code will conform to government accessibility standards.

c. Your code will automatically be updated with proper tags.

d. Your code will render properly to a larger audience

48. In an HTML document, text that will appear in the browser as Web page content is encompassed by which set of tags?

a. The <title> </title> tags

b. The <body> </body> tags

c. The <head> </head> tags

d. The <html> </html> tags

49. Transparency, interlacing and animation are all techniques supported by which image file format?

a. JPEG

b. BMP

c. GIF 87a

d. PNG

50. To use an image as the link to another file, you would:

a. place the anchor attribute inside an image tag.

b. place the image attribute inside an anchor tag.

c. add an anchor tag around an image tag.

d. add an image tag around an anchor tag.

 

 

 

Write the leTer of correct answer in the right hand columns below under ‘Answers’.Each ques±on is 3 points for a total of 150QuestionsAnswers1. Which of the following best describes the role that education plays in IT-industrycareers?a. Completing a basic IT skills training course will qualify an individual for most IT job roles.b. Most IT jobs do not require any college degree but do require the professionalcertiFcations relevant to the position.c. Most IT jobs require a bachelor's degree at a minimum.d. Continual study is necessary to keep your skills current because IT technologies changeso rapidly.2. Which skill is critical in most IT job roles?a. The ability to conFgure and maintain server hardwareb. The ability to design and layout e±ective and aesthetically pleasing Web pagesc. The ability to diagnose and resolve technical hardware and software problemsd. The ability to communicate e±ectively with non-technical end users and management3Which of the following practices can help you avoid harassment (or the appearance ofharassment) when using Internet communications?a. Send potentially o±ensive jokes via e-mail only to people you know well.b. Respect other users' requests not to send any jokes via e-mail or IM.c. Use emoticons to indicate that threats you make via e-mail or IM are not serious.d. Reduce inappropriate or unprofessional communications while at work.4. If you are logged on to Windows Live Messenger, why would you be unable to engage inan instant messaging session with your brother, who is logged on to his AOL InstantMessenger account?a. Because you use Windows and your brother uses Apple OS Xb. Because Windows Live Messenger has built-in security and AOL Instant Messenger doesnotc. Because AOL Instant Messenger and Windows Live Messenger use their own proprietaryprotocolsd. Because AOL Instant Messenger encrypts instant messages and Windows LiveMessenger cannot decrypt them5. Which protocol is used speciFcally to send e-mail to others with an outgoing server?a. Internet Message Access Protocol (IMAP)b. Hypertext Transfer Protocol (HTTP)c. Post O²ce Protocol (POP)d. Simple Mail Transfer Protocol (SMTP)6. The three-letter domain category at the right side of a domain name is also called:a. a dotted quad.b. a server name.c. a top-level domain.d. a Web site host.7. What Web browser element is responsible for reading Web page content and presentingit to the reader?a. Sandboxb. Download controlc. ³ramed. Rendering engine8. A text string that speciFes an Internet address and the method by which the addresscan be accessed is known as a:?a. Web browserb. Uniform Resource Locatorc. Domain named. Thread9. You have just downloaded a Microsoft PowerPoint Fle, but you do not have thePowerPoint program installed on your computer. What is the quickest and easiest way to

Attachments:

Answers

(11)
Status NEW Posted 26 May 2017 08:05 AM My Price 11.00

-----------

Not Rated(0)