Lars has difficulty when he tries to access some Web pages. He suspects that his browser has a problem or a bug. Which of the following should he consider downloading?
Mike wants to transfer an update file from one system to another. Currently, these two systems cannot communicate with each other via the standard network. Which type of cable can he use to quickly transfer a file from one computer to the other without a hub or switch?
Which of the following is a junction between one high-speed network and another?
In which process do two routers communicate to automatically calculate routes and to exchange information about routes of known networks?
Which protocol is most likely to be used when sending e-mail using the Microsoft Outlook Express client?
Which IP address is called the loopback address, and can be used for testing and troubleshooting?
Each system in a TCP/IP network must be configured with an IP address and a subnet mask. The subnet mask identifies what parts of an IP address?
The Web-safe palette contains how many colors available for use in HTML documents?
Which of the following accurately describes a difference between GIF images and JPEG images?
Lars has difficulty when he tries to access some Web pages. He suspects that his browser has a problem or a bug. Which of the following should he consider downloading?
You have been asked to determine the download time for pages on your site. One page consists of the XHTML document, several image files, and a Flash presentation. These elements equal 84 kilobytes (KB) total. How long will it take for this page to be downloaded by a user with an Internet connection speed of 33.6 kilobits per second (Kbps)?
You are creating a user-input form for a Web page on your company's site. You want this Web form to send information from the user's browser to your server as securely as possible. Which <form> tag attribute and value should you use?
In Cascading Style Sheets (CSS), which type of style sheet uses the @ ("at") symbol?
Maria wants to use Cascading Style Sheets (CSS) to apply formatting styles to her Web pages. In her style sheet, she sets the page's background color to blue and the font to Arial. Which style rule is correct in an external style sheet?
Your manager has asked you about the essential difference between worms and viruses. Which of the following is true?
When creating its Web presence, a business should choose its domain name carefully so that users will be able to recall it easily. Every domain name is unique. With which of the following must each domain name be registered?
Rolf's Web site does not meet the W3C's Web Content Accessibility Guidelines (WCAG). To make his site more accessible according to WCAG, which change could he make?
Brian is a systems administrator for his company. He performs many maintenance and troubleshooting tasks in a room that has multiple, redundant connections. This room is used to control the company's network resources. What is the term for this location?
Mike wants to download the Macromedia Flash MX 2004 viewer software to his desktop. Which Internet protocol will he use?
You have two computers, each with a different operating system. One is a Linux system, which uses the Gnu Public License (GPL). You can use this Linux software free of charge, and you can make changes to code that created the operating system. The other system is a Windows system. Which of the following describes a typical commercial software license?
Which of the following is the most efficient method for documenting and communicating a Web site plan?
James is traveling to several countries that use various electrical voltage and phone connections. He needs to use his computer to connect to the telephone network. Which choice lists the minimum components he requires?
Your supervisor directs you to make static IP address assignments on the workstations in your office. Your workstations are part of a company WAN that also connects directly to the Internet. What information must you have in order to complete this assignment?
Which of the following is required for a wireless network to run in infrastructure mode?
Your company is outsourcing some content development tasks. The contractors who work on these projects will see some of your company's proprietary content before it is available to customers. Your company needs to ensure that this trade-secret content is kept confidential by the contractors who see it. Which of the following protects your intellectual property in this situation?
In the client/server model, a client can access information from any server if:
Which of the following XHTML elements is always placed within the <head> section?
Consider the following XHTML code:
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" ">"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8"/>
<title> This is an HTML document </title>
</head>
<body>
This is a test page for the departmental Web page.
</body>
</html>
This code failed validation. Why?
You have two computers, each with a different operating system. One is a Linux system, which uses the Gnu Public License (GPL). You can use this Linux software free of charge, and you can make changes to code that created the operating system. The other system is a Windows system. Which of the following describes a typical commercial software license?
Which protocol is most likely to be used when sending e-mail using the Microsoft Outlook Express client?
Winston's computer has the IP address 192.168.23.115. Winston uses a direct connection to the Internet, but he cannot access any resources on the Internet. What is the most probable cause?
Which is the best way to ensure that the Web pages you create will display properly in standard Web browsers?
Which protocol is used to receive e-mail on an incoming server, and allows you to browse and manage e-mail messages while they reside on the server, rather than downloading messages before reading them?
Which hardware device operates at the network layer of the OSI reference model?
Lo-An creates a Web site that discusses Internet technologies. Her Web site pages use her own XHTML code and design template, and her original text, digital artwork and music. As you review Lo-An's site, you should assume that her copyright protection covers:
Which of the following accurately describes a difference between GIF images and JPEG images?
Your wireless client cannot properly communicate with a wireless access point (WAP). Which of the following might need to be changed?
Which term is used to describe the amount of information, sometimes called traffic, that can be carried on a network at one time?
You received the following file attachments in e-mail messages from unknown sources. Which is the most likely to contain a computer virus?
Which of the following would you expect to occur during a Web site planning meeting?