ANSWERS Pre-Assessment

Internet Business Associate
Pre-Assessment Answers-1
Lesson 1 Pre-Assessment Questions
1.
In which job role does an individual determine the visibility of Web sites across
multiple clients and search engines?
a.
b.
c.
d.
2.
In computer science and Web technology, what is ontology?
a.
b.
c.
d.
3.
Web site analyst
Network engineer
SEO analyst
Server administrator
The return-on-investment (ROI) impact of IT decisions on an organization's
bottom line
The tendency for organizational and market changes to occur in a revolutionary
manner
The process of determining the requirements that a database must fulfill in order
to function properly for an organization
The study of how a particular part of a company, called a domain, is organized
Why is it important for people who want jobs in the IT industry to have good
communication skills?
As an IT professional, you will often be required to translate highly technical concepts
into information that a non-technical audience can readily understand. This task will
test your communication skills, which are very important. Your ability to enable a nontechnical audience to understand complex concepts will apply particularly if you find
yourself working with end users or management personnel, many of whom have only a
basic knowledge of computers and computer networks.
© 2012 Certification Partners, LLC. — All Rights Reserved.
Version 2.0
Internet Business Associate
Pre-Assessment Answers-2
Lesson 2 Pre-Assessment Questions
1.
Which of the following Web 2.0 tools or technologies provides the user with both
author and editor privileges, so that he or she can create or update collaborative Web
sites "on the fly"?
a.
b.
c.
d.
2.
Which term can be defined as a person's willingness and ability to engage in
communications?
a.
b.
c.
d.
3.
Ajax
Blogs
RSS
Wikis
Convergence
Presence
Voice over IP
Mobile computing
Describe the differences between instant messaging and text messaging.
Instant messaging (IM) is a computer-based method of communication in which users
can type and view messages sent to one or more recipients, and view the responses
immediately. Instant messages can be sent only to contacts who are currently online
(that is, signed in to an instant messaging service). Text messaging is a method of
person-to-person communication in which users type short text messages from mobile
devices, such as smartphones.
© 2012 Certification Partners, LLC. — All Rights Reserved.
Version 2.0
Internet Business Associate
Pre-Assessment Answers-3
Lesson 3 Pre-Assessment Questions
1.
What is the purpose of Transmission Control Protocol/Internet Protocol (TCP/IP)?
a.
b.
c.
d.
2.
A domain name server performs which function?
a.
b.
c.
d.
3.
It maps hosts on the Internet.
It directs a packet along a prescribed route.
It passes information from one computer to another.
It downloads incoming messages.
It resolves machine addresses to domain names.
It resolves domain names to machine names.
It resolves IP addresses to Web URLs.
It resolves domain names to IP addresses.
What is the main difference between Internet Protocol version 4 (IPv4) and Internet
Protocol version 6 (IPv6)?
Internet Protocol version 4 (IPv4) supports the "dotted quad" IP address format, which
uses 32-bit addresses consisting of a series of numbers divided into four segments,
separated by periods (dots). IPv4 supports approximately 4.3 billion IP addresses.
IPv6 provides a practically unlimited number of IP addresses because it uses a 128-bit
address. As a result, it provides 340 undecillion addresses. Whereas 4 billion
addresses would be 4 multiplied by 109, 340 undecillion addresses would be 340
multiplied by 1036, which allows for a significantly larger address pool.
© 2012 Certification Partners, LLC. — All Rights Reserved.
Version 2.0
Internet Business Associate
Pre-Assessment Answers-4
Lesson 4 Pre-Assessment Questions
1.
If you disable image loading in a browser, then:
a.
b.
c.
d.
2.
Which browser folder contains previously viewed Web pages?
a.
b.
c.
d.
3.
Web pages load in text mode only.
Web pages download more slowly.
you can view Web pages without storing them in a disk cache.
it is impossible to accept cookies from a Web site.
Source code
Cookies
Favorites
History
How can you ensure that you are viewing the latest information on a Web page?
Click the Refresh or Reload button when you visit or revisit a Web site.
© 2012 Certification Partners, LLC. — All Rights Reserved.
Version 2.0
Internet Business Associate
Pre-Assessment Answers-5
Lesson 5 Pre-Assessment Questions
1.
Briefly describe C++.
C++ is a superset of the C language that uses object-oriented programming.
2.
Which statement about vector graphics is true?
a.
b.
c.
d.
3.
Vector graphics are saved as sequences of vector statements.
Vector graphics have much larger file sizes than raster graphics.
Vector graphics are pixel-based.
GIFs and JPGs are vector graphics.
Name at least two examples of browser plug-ins.
Adobe Flash, Microsoft Silverlight, Windows Media Player and Apple QuickTime are
examples of browser plug-ins.
© 2012 Certification Partners, LLC. — All Rights Reserved.
Version 2.0
Internet Business Associate
Pre-Assessment Answers-6
Lesson 6 Pre-Assessment Questions
1.
How is a many-to-many database table relationship established?
In a many-to-many database table relationship, one record in Table A can relate to
many matching records in Table B, and vice versa. A many-to-many relationship
between two database tables is established by creating two one-to-many relationships
with a third table, called a junction table.
2.
What distinguishes an information portal from a search engine?
Unlike a search engine, an information portal will only find Web sites that have been
manually submitted for indexing. Thus, if you do not manually submit your site to an
information portal, it will never find or index your site, and will never list your site in
search results.
3.
Using the Boolean OR operator with keywords in a search means that the search
results:
a.
b.
c.
d.
may include a particular keyword.
must include a particular keyword.
may include at least one of the keywords.
must include at least one of the keywords.
© 2012 Certification Partners, LLC. — All Rights Reserved.
Version 2.0
Internet Business Associate
Pre-Assessment Answers-7
Lesson 7 Pre-Assessment Questions
1.
What feature provided with many e-mail programs can store information for
commonly accessed e-mail contacts?
a.
b.
c.
d.
2.
What is an e-mail signature?
a.
b.
c.
d.
3.
Import tool
Address book
Autoresponder
Attachment
A digital display of one's handwritten signature
Proof of one's identity for security purposes
A closing remark that is manually attached to an e-mail message
Text that appears automatically at the bottom of an e-mail message
Name the protocol used to send e-mail over the Internet, and name one of two
protocols that can be used to receive e-mail over the Internet.
Simple Mail Transfer Protocol (SMTP) is used to send e-mail, and either Post Office
Protocol 3 (POP3) or Internet Message Access Protocol (IMAP) is required to receive
e-mail.
© 2012 Certification Partners, LLC. — All Rights Reserved.
Version 2.0
Internet Business Associate
Pre-Assessment Answers-8
Lesson 8 Pre-Assessment Questions
1.
What is the most secure method for sending information over the Internet?
a.
b.
c.
d.
2.
Using encryption
Using passwords
Using patches
Using spyware
What is malware?
Malware, or malicious software, refers to programs or files whose intent is to harm
computer systems. Malware consists of spyware, viruses, worms, trojans and illicit
servers.
3.
What is a cookie?
a.
b.
c.
d.
A
A
A
A
harmful piece of code
helper application
published privacy policy
small text file
© 2012 Certification Partners, LLC. — All Rights Reserved.
Version 2.0
Internet Business Associate
Pre-Assessment Answers-9
Lesson 9 Pre-Assessment Questions
1.
Some FTP sites allow guests who do not have user-specific accounts to access the
site. What are these sites called?
Anonymous FTP sites.
2.
What TCP/IP diagnostic tool should you use to determine whether a connection
exists between your computer and the computer at an IP address to which you want
to connect?
The ping command.
3.
What service provides companies the ability to subscribe customers to receive
promotions and advertising via e-mail?
a.
b.
c.
d.
Spam servers
List servers
Exchange servers
Mass mailings
© 2012 Certification Partners, LLC. — All Rights Reserved.
Version 2.0
Internet Business Associate
Pre-Assessment Answers-10
Lesson 10 Pre-Assessment Questions
1.
What is scope creep?
Scope creep refers to gradual increases in project scope that add up over time. Scope
creep can undermine the success of a project if left unchecked.
2.
Why do the executing phase and the controlling phase of a project usually overlap?
During the executing phase of a project, project work is performed (executed). During
the controlling phase, progress of the work is monitored and corrective actions are
taken as needed (controlled). At the start of the executing phase, you coordinate people
and other resources to carry out the project plan. As work progresses, you enter the
controlling phase as you delegate or reassign tasks and resolve conflicts as necessary.
3.
What is the project triangle?
a.
b.
c.
d.
The relationships among project scope, time and money.
The relationships among the planning, executing and controlling phases of
project management.
The relationships among project tasks, resources and assignments.
The relationships among the planning skills, organizational skills and
communication skills needed by good project managers.
© 2012 Certification Partners, LLC. — All Rights Reserved.
Version 2.0