Angel is using a GUI HTML editor to create a Web page that will be posted on the company site during an advertising promotion. Which of the following is a disadvantage of using GUI HTML editors?
You received an e-mail attachment with a .tgz file name extension. Which application has most likely created this file?
Which IP address is called the loopback address, and can be used for testing and troubleshooting?
Your company is outsourcing some content development tasks. The contractors who work on these projects will see some of your company's proprietary content before it is available to customers. Your company needs to ensure that this trade-secret content is kept confidential by the contractors who see it. Which of the following protects your intellectual property in this situation?
Which diagnostic tool would you use to determine the physical (MAC) address to systems that you have recently connected with?
Which type of encryption uses a pair of keys, in which one key is used to encrypt information and the other key is used to decrypt that information?
Which of the following is the most efficient method for documenting and communicating a Web site plan?
You have been asked to determine the download time for pages on your site. One page consists of the XHTML document, several image files, and a Flash presentation. These elements equal 84 kilobytes (KB) total. How long will it take for this page to be downloaded by a user with an Internet connection speed of 33.6 kilobits per second (Kbps)?
Which term describes a server at the highest level of the Domain Name System (DNS)?
You have purchased some products from an online business. This business collected information from you regarding your purchase, such as your name, e-mail address and product preferences. This online business then sold some information about you to a third party. This routine practice is an example of:
Brian is a systems administrator for his company. He performs many maintenance and troubleshooting tasks in a room that has multiple, redundant connections. This room is used to control the company's network resources. What is the term for this location?
Your manager has asked you about the essential difference between worms and viruses. Which of the following is true?
Because the Internet has experienced tremendous growth, a new protocol has been developed to accommodate Internet address shortages. What is the name of this improved protocol?
Which of the following is designed to help Personal Digital Assistant (PDA) devices communicate with each other, and also provides its own dedicated markup language?
Maria has filled all the memory space on her hard drive. She plans to obtain a larger hard drive in a month, but she needs some hard drive space now to finish a project. What can she do to free up some hard drive space?
Which of the following must you specify to uniquely identify each record in a database?
A member of your Web team is gone on vacation. She made some changes to a Web page before leaving. You need information about the changes she made, but you cannot determine the changes without asking her. How can you resolve this problem in the future?
The TCP/IP suite of protocols is the current universal standard for both local area networks and wide area networks. Which choice lists protocols that are included in the TCP/IP suite?
You are creating a user-input form for a Web page on your company's site. You want this Web form to send information from the user's browser to your server as securely as possible. Which
According to "netiquette" guidelines for effective and appropriate business communications, which practice should you avoid in your e-mail messages?
Which of the following best describes the functionality of Extensible Markup Language (XML)?