Internet Business Associate Pre-Assessment Answers-1 Lesson 1 Pre-Assessment Questions 1. In which job role does an individual determine the visibility of Web sites across multiple clients and search engines? a. b. c. d. 2. In computer science and Web technology, what is ontology? a. b. c. d. 3. Web site analyst Network engineer SEO analyst Server administrator The return-on-investment (ROI) impact of IT decisions on an organization's bottom line The tendency for organizational and market changes to occur in a revolutionary manner The process of determining the requirements that a database must fulfill in order to function properly for an organization The study of how a particular part of a company, called a domain, is organized Why is it important for people who want jobs in the IT industry to have good communication skills? As an IT professional, you will often be required to translate highly technical concepts into information that a non-technical audience can readily understand. This task will test your communication skills, which are very important. Your ability to enable a nontechnical audience to understand complex concepts will apply particularly if you find yourself working with end users or management personnel, many of whom have only a basic knowledge of computers and computer networks. © 2012 Certification Partners, LLC. — All Rights Reserved. Version 2.0 Internet Business Associate Pre-Assessment Answers-2 Lesson 2 Pre-Assessment Questions 1. Which of the following Web 2.0 tools or technologies provides the user with both author and editor privileges, so that he or she can create or update collaborative Web sites "on the fly"? a. b. c. d. 2. Which term can be defined as a person's willingness and ability to engage in communications? a. b. c. d. 3. Ajax Blogs RSS Wikis Convergence Presence Voice over IP Mobile computing Describe the differences between instant messaging and text messaging. Instant messaging (IM) is a computer-based method of communication in which users can type and view messages sent to one or more recipients, and view the responses immediately. Instant messages can be sent only to contacts who are currently online (that is, signed in to an instant messaging service). Text messaging is a method of person-to-person communication in which users type short text messages from mobile devices, such as smartphones. © 2012 Certification Partners, LLC. — All Rights Reserved. Version 2.0 Internet Business Associate Pre-Assessment Answers-3 Lesson 3 Pre-Assessment Questions 1. What is the purpose of Transmission Control Protocol/Internet Protocol (TCP/IP)? a. b. c. d. 2. A domain name server performs which function? a. b. c. d. 3. It maps hosts on the Internet. It directs a packet along a prescribed route. It passes information from one computer to another. It downloads incoming messages. It resolves machine addresses to domain names. It resolves domain names to machine names. It resolves IP addresses to Web URLs. It resolves domain names to IP addresses. What is the main difference between Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6)? Internet Protocol version 4 (IPv4) supports the "dotted quad" IP address format, which uses 32-bit addresses consisting of a series of numbers divided into four segments, separated by periods (dots). IPv4 supports approximately 4.3 billion IP addresses. IPv6 provides a practically unlimited number of IP addresses because it uses a 128-bit address. As a result, it provides 340 undecillion addresses. Whereas 4 billion addresses would be 4 multiplied by 109, 340 undecillion addresses would be 340 multiplied by 1036, which allows for a significantly larger address pool. © 2012 Certification Partners, LLC. — All Rights Reserved. Version 2.0 Internet Business Associate Pre-Assessment Answers-4 Lesson 4 Pre-Assessment Questions 1. If you disable image loading in a browser, then: a. b. c. d. 2. Which browser folder contains previously viewed Web pages? a. b. c. d. 3. Web pages load in text mode only. Web pages download more slowly. you can view Web pages without storing them in a disk cache. it is impossible to accept cookies from a Web site. Source code Cookies Favorites History How can you ensure that you are viewing the latest information on a Web page? Click the Refresh or Reload button when you visit or revisit a Web site. © 2012 Certification Partners, LLC. — All Rights Reserved. Version 2.0 Internet Business Associate Pre-Assessment Answers-5 Lesson 5 Pre-Assessment Questions 1. Briefly describe C++. C++ is a superset of the C language that uses object-oriented programming. 2. Which statement about vector graphics is true? a. b. c. d. 3. Vector graphics are saved as sequences of vector statements. Vector graphics have much larger file sizes than raster graphics. Vector graphics are pixel-based. GIFs and JPGs are vector graphics. Name at least two examples of browser plug-ins. Adobe Flash, Microsoft Silverlight, Windows Media Player and Apple QuickTime are examples of browser plug-ins. © 2012 Certification Partners, LLC. — All Rights Reserved. Version 2.0 Internet Business Associate Pre-Assessment Answers-6 Lesson 6 Pre-Assessment Questions 1. How is a many-to-many database table relationship established? In a many-to-many database table relationship, one record in Table A can relate to many matching records in Table B, and vice versa. A many-to-many relationship between two database tables is established by creating two one-to-many relationships with a third table, called a junction table. 2. What distinguishes an information portal from a search engine? Unlike a search engine, an information portal will only find Web sites that have been manually submitted for indexing. Thus, if you do not manually submit your site to an information portal, it will never find or index your site, and will never list your site in search results. 3. Using the Boolean OR operator with keywords in a search means that the search results: a. b. c. d. may include a particular keyword. must include a particular keyword. may include at least one of the keywords. must include at least one of the keywords. © 2012 Certification Partners, LLC. — All Rights Reserved. Version 2.0 Internet Business Associate Pre-Assessment Answers-7 Lesson 7 Pre-Assessment Questions 1. What feature provided with many e-mail programs can store information for commonly accessed e-mail contacts? a. b. c. d. 2. What is an e-mail signature? a. b. c. d. 3. Import tool Address book Autoresponder Attachment A digital display of one's handwritten signature Proof of one's identity for security purposes A closing remark that is manually attached to an e-mail message Text that appears automatically at the bottom of an e-mail message Name the protocol used to send e-mail over the Internet, and name one of two protocols that can be used to receive e-mail over the Internet. Simple Mail Transfer Protocol (SMTP) is used to send e-mail, and either Post Office Protocol 3 (POP3) or Internet Message Access Protocol (IMAP) is required to receive e-mail. © 2012 Certification Partners, LLC. — All Rights Reserved. Version 2.0 Internet Business Associate Pre-Assessment Answers-8 Lesson 8 Pre-Assessment Questions 1. What is the most secure method for sending information over the Internet? a. b. c. d. 2. Using encryption Using passwords Using patches Using spyware What is malware? Malware, or malicious software, refers to programs or files whose intent is to harm computer systems. Malware consists of spyware, viruses, worms, trojans and illicit servers. 3. What is a cookie? a. b. c. d. A A A A harmful piece of code helper application published privacy policy small text file © 2012 Certification Partners, LLC. — All Rights Reserved. Version 2.0 Internet Business Associate Pre-Assessment Answers-9 Lesson 9 Pre-Assessment Questions 1. Some FTP sites allow guests who do not have user-specific accounts to access the site. What are these sites called? Anonymous FTP sites. 2. What TCP/IP diagnostic tool should you use to determine whether a connection exists between your computer and the computer at an IP address to which you want to connect? The ping command. 3. What service provides companies the ability to subscribe customers to receive promotions and advertising via e-mail? a. b. c. d. Spam servers List servers Exchange servers Mass mailings © 2012 Certification Partners, LLC. — All Rights Reserved. Version 2.0 Internet Business Associate Pre-Assessment Answers-10 Lesson 10 Pre-Assessment Questions 1. What is scope creep? Scope creep refers to gradual increases in project scope that add up over time. Scope creep can undermine the success of a project if left unchecked. 2. Why do the executing phase and the controlling phase of a project usually overlap? During the executing phase of a project, project work is performed (executed). During the controlling phase, progress of the work is monitored and corrective actions are taken as needed (controlled). At the start of the executing phase, you coordinate people and other resources to carry out the project plan. As work progresses, you enter the controlling phase as you delegate or reassign tasks and resolve conflicts as necessary. 3. What is the project triangle? a. b. c. d. The relationships among project scope, time and money. The relationships among the planning, executing and controlling phases of project management. The relationships among project tasks, resources and assignments. The relationships among the planning skills, organizational skills and communication skills needed by good project managers. © 2012 Certification Partners, LLC. — All Rights Reserved. Version 2.0
© Copyright 2024 ExpyDoc