Consider the following HTML5 code:
The code does not validate as HTML5. Why?
A. The
B. The tag and its attributes are missing.
C. The
tag should be used outside thetags.
D. The !DQCTYPE declaration is missing a reference to the Document Type Definition (DTD).
Which of the following strategies is recommended when conducting keyword searches?
A. Use nouns instead of verbs for keywords.
B. Use verbs instead of nouns for keywords.
C. Use as few keywords as possible.
D. Include at least one preposition such as "the" or "an" in your list of keywords.
Clyde is working on a Web page for his company's intranet. He wants to insert an HTML comment within the page to let other developers know that the page validates as HTML5 and that he is the page author. Which line of code will insert the comment that Clyde requires?
A. // Clyde Davis. 9/17/2012. This code validates to HTML5
B. <7 Clyde Davis. 9/17/2012. This code validates to HTMLS 7>
C. /* Clyde Davis, 9/17/2012. This code validates to HTML5 */
D.
Evonka is listening to music from an online music provider (such as Pandora or Jango). She builds a list of music preferences, including favorite songs. The music service then suggests additional songs she might enjoy. The music provider is an example of a cloud-computing application that uses a technology for collaborative filtering, which helps define the list of songs available to listeners. Which term describes this technology?
A. Bit-torrent r
B. Crowdsourcing
C. Grid computing
D. Software as a Service
Which of the following strategies will help protect your computer against virus attacks?
A. Perform regular backups of your hard drive.
B. Open e-mail attachments only from unknown senders.
C. Update the definitions for your malware protection application frequently.
D. Configure security settings for your Web browser to the lowest possible level.
The official CIW Web site has an IP address of 72.44.192.233. Which technology allows Web users to enter the URL www.ClWcert/u/ecl,com in the browser address bar to access the site, instead of having to remember and enter the IP address?
A. SSL
B. DNS
C. HTTP
D. NNTP
You accidentally dropped your mobile phone, which was submerged in water and no longer works. Upon replacing the phone with an upgraded unit you must reconfigure many of the services. The instructions say that all you need to do is enter your e-mail address and the unit will configure the e- mail client for you. Even though you have tried this several times, it does not work. The mobile phone vendor says that because you are trying to sync your e-mail account with an enterprise mail server, you will need to configure the e-mail client manually. Which choice lists the information you will need to configure the e-mail client?
A. Company name, e-mail address, SMTP, POP3, IMAP and DNS
B. E-mail address, SMTP, IMAP, DNS, user name and password
C. E-mail address, SMTP, POP3, user name and password
D. Company name, SMTP, POP3, user name and password
Roberto's company is releasing updates to a specific product. He needs to educate the company's sales managers, who are located in various international locations, about the new product updates. Which of the following methods would be the most economical and efficient solution for Roberto to discuss the required information with the sales managers synchronously?
A. Send the product update blueprints via e-mail to each of the sales managers and ask them to contact him with any questions.
B. Schedule an in-person sales meeting with them at the company headquarters so that the updates can be demonstrated and any questions answered with the entire group present.
C. Schedule a Webinar with the sales managers so that the updates can be demonstrated and any questions answered with the entire group.
D. Post the product update blueprints on the company's Web site and call each sales manager personally to discuss their individual questions or concerns offline.
Which type of attack is a form of social engineering in which an attacker attempts to steal personal or confidential information by sending e-mail that lures unsuspecting victims to log in to an authentic- looking but imposter Web site?
A. Replay
B. Phishing
C. Spoofing
D. Pharming
You want to enable wireless security on your Android device and your Linux system. Which of the following is a disadvantage of Wired Equivalent Privacy (WEP)?
A. It enables MAC address filtering.
B. It is easily compromised by hackers.
C. It only supports 56-bit symmetric-key encryption.
D. It is based on the outdated 802.lla wireless standard.