Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 1. Which term refers to how a product or service is delivered to a customer?
- a. Promotion
- b. Placement<---
- c. Shipping
- d. Transport
- 2. In which type of advertising does the advertiser pay the website owner for every 1000 viewers?
- a. CPA
- b. CPT
- c. CPM<---
- d. CPC
- 3. What style of website rarely, if ever, changes its content, and displays information the same way to all users?
- a. Corporate website
- b. Static Website<----
- c. Dynamic Website
- d. Personal Website
- 4. By default, the height of a horizontal rule is ____ pixels. This may be adjusted using the <hr> tag’s _____ property.
- a. 1, height
- b. 2, size
- c. 2, height
- d. 1, size<---
- 5. Which term describes a program which seems harmless until it is executed?
- a. Worm
- b. Virus
- c. Spyware
- d. Trojan Horse<--- neigh nigga
- 6. Collaborative software and techniques can be categorized as ______.
- a. Management tools<------
- b. Video and data conferencing
- c. Electronic computing tools
- d. Online application software
- 7. To ensure the accuracy and fair reporting of financial statements, laws like ______ were enacted to counter fraudulent reporting.<--- Sarbanes-Oxley 2002?
- 8. A/an ______ is a listing of hits, or hyperlinks, returned by a search engine in response to a query.
- a. Hit list
- b. Query return
- c. Index
- d. SERP<--
- 9. What is a very broad term that refers to any fraudulent activity in an online setting?
- a. Identity fraud
- b. Identity theft
- c. Internet fraud<----
- d. Both A and B
- 10. What is a platform-neutral language?
- a. Can be used by any browser on any platform.
- b. A standard language
- c. HTML
- d. All of the above<----
- 11. The ________ defined the acronym "SCAM."
- a. Federal Communications Commission
- b. United States Department of Justice<---
- c. National Security Agency
- d. White House
- 12. What is the name for a dedicated computer connected to the internet which accepts HTTP requests from clients and serves them HTML documents?
- a. Intranet
- b. Web host
- c. Web server<---
- d. Website
- 13. In what year did Tim Berners-Lee invent HTML?
- a. 1990<---
- b. 1992
- c. 1985
- d. 1988
- 14. ______ is simply two or more people working towards a common goal.collaboration
- 15. How frequently is the average Android user's location, within 50 meters, collected by apps?
- a. Every 3-4 minutes<---
- b. Twice a day
- c. Every 3-4 seconds
- d. Once a day
- 16. A fragmented URL is ____________ a normal URL.
- a. A shortened version of
- b. An extension of<---- learned this today nigga
- c. A portion of
- d. No different from
- 17. All tables must have at least ____ row(s) and ____ column(s)
- a. 1, 1<--- boom
- b. 1, 2
- c. 2, 1
- d. 2, 2
- 18. Which firewall rule set only permits connections which have been specifically allowed?
- a. Default-reject
- b. Default-deny<----
- c. Default-accept
- d. Default-allow
- 19. Javascript is a is a/an ______ programming language which extends a website's usability.
- a. Server side
- b. Online
- c. Client Side<---
- d. All of the above
- 20. HTML is represented by what?
- a. Caches
- b. Hypertexts
- c. Data
- d. Elements<---
- 21. What type of client is independent of a central server and provides rich functionality client side?
- a. Thin Clients
- b. Dynamic Clients
- c. Fat Clients<-----
- d. Virtual Clients
- 22. _____ refers to what a product costs, or at least what a business is willing to exchange for their products.Pricing
- 23. Any communications in or out of an Intranet pass through what as a precaution against external threats?
- a. Firewall
- b. Proxy Server<----
- c. Filter
- d. Web browsers
- 24. The default font size implemented in almost all browsers is ___.
- a. 2
- b. 3<---
- c. 4
- d. 5
- 25. Which type of websites dispense original content, often supported by advertising?
- a. Content<---
- b. Blog
- c. News
- d. Video sharing
- 26. What is the key aspect of an Intranet?
- a. Privacy<----
- b. Availability
- c. Security
- d. Speed
- 27. The foreground color of table text can be set by enclosing the entire table within <font> and </font> tags and specifying the color attribute of the <font> tag.
- a. True
- b. False<---- idk
- 28. Linked documents and web pages are specified using the _____ property within the <a> tag.
- a. HREF<----
- b. SRC
- c. URL
- d. LINK
- 29. Glancing over a victim's shoulder to acquire their personal information is an example of what?
- a. Identity fraud
- b. Proximity theft
- c. Spam
- d. Shoulder surfing<----
- 30. _____ allows businesses to collaborate through a network by allowing two or more locations interact via video and exchange data during the conference.
- a. Skype
- b. Instant Messaging
- c. Discussion boards
- d. Video and data conferencing<------
- 31. What is the third core business functional behavior?
- a. Accounting
- b. Human Resources
- c. Marketing<----... havent learned the order yet >:
- d. Advertising
- 32. When experts extract useful information and data from recorded data, it is called?
- a. Hacking
- b. Data mining<---
- c. Phishing
- d. Identity theft
- 33. Webpages really don't even exist until they are resolved and rendered by the client's _____.
- a. Web browser<---
- b. Operating system
- c. Cache
- d. HTTP
- 34. The type property of the <ol> tag can have _____ different values.
- a. 5<----- go over this with me plz might be 4
- b. 6
- c. 4
- d. Unlimited
- 35. Video sharing sites use _____________ protocols.
- a. TCP/IP
- b. FTP<---...... idk
- c. HTTP
- d. UDP
- 36. ____________ departments take a creative a systematic approach to evolve a business' original idea and devise new ones. fuck. i forgot... should know..... IUGHHHHH MY BRAINN cant find answerrr FUCKKK
- 37. Which term refers to specific actions that serve a larger purpose?
- a. Tactical
- b. Periodic
- c. Strategic<----
- d. Wise
- 38. __________ refers to the level of detail or level of summarization in a report.<--- idk
- 39. Ordered lists, unordered lists, menu lists and definition lists can not be intermingled.
- a. True
- b. False<--- they can...
- 40. All files on a computer should be ________.
- a. Encrypted
- b. Behind a firewall
- c. Scanned for viruses
- d. Backed up<---- bitchez
- 41. The default header alignment is centered.
- a. True<--- fo sho
- b. False
- 42. What is an organized entity designed to sell goods and/or services, usually in an endeavor to make a profit?
- a. Production Department
- b. Website
- c. Business<----
- d. Firm
- 43. A image's border color can be selected by using the bordercolor property of the <img> tag.
- a. True
- b. False<---
- 44. The <dd> tag is found within the opening and closing ______ tags.
- a. Definition list<---- not toooo sure
- b. Ordered list
- c. Unordered list
- d. Horizontal list
- 45. A _______ is data that was duplicated from another computer.
- a. History
- b. Cache<----
- c. Web pages
- d. Protocol
- 46. A businesses' private version of the internet is called a/an?
- a. Proxy
- b. Corporate Website
- c. Intranet<----
- d. Firewall
- 47. HTML is a ________.
- a. Markup language
- b. Programming language
- c. Platform-neutral language
- d. All of the above<----
- 48. _______ plays a critical role in all four P's of marketing.i dont know good question ...
- 49. What term refers to reports that are produced at given intervals?
- a. Incremental
- b. Periodic<--.
- c. Random
- d. Demand
- 50. The link, alink, and vlink, properties are defined within the _______ tags of a web page.
- a. <head><---...or body
- b. <p>
- c. <body>
- d. <font>
- 51. Table header element text, by default, is __________ in each table cell.
- a. Left aligned<---
- b. Centered horizontally
- c. Centered vertically
- d. Both b and c
- 52. Text following <strong><font size=1> appears the same as text following what?
- a. <h6>
- b. <h5>
- c. <h4><------
- d. <h3>
- 53. There are _____ font sizes in HTML 4.0?
- a. 5
- b. 6
- c. 7<-----
- d. Unlimited
- 54. An attempt to make a computer or any of its resources unavailable to its intended users is called?
- a. Denial-of-service<----
- b. Spamming
- c. Hacking
- d. Flooding
- 55. What tells a browser how to display and align elements like lists, headings, and paragraphs?
- a. Presentational Elements
- b. Image elements
- c. Structural elements<-----
- d. Head elements
- 56. Many businesses implement a _____ ruleset, in which all traffic is allowed unless it has been specifically blocked. I FORGOT AGH....
- 57. __________ keep copies of users' personal information so that it doesn't have to be reentered.
- a. Caches<------ or is it cookies fucking A.
- b. Histories
- c. Tracking cookies
- d. Web browsers
- 58. A computer program that is installed covertly on a computer to capture or take control of the computer, without a user's knowledge or consent is called?
- a. Trojan horse
- b. Worm
- c. Adware
- d. Spyware<-
- 59. What type of software is required to make a blog website?
- a. WYSIWYG editor
- b. Fat client
- c. Adobe Dreamweaver
- d. A web browser<---
- 60. What is similar to email, except in real-time computer communication?
- a. Video conferencing
- b. Instant messaging<---
- c. Project management software
- d. Discussion boards
- 61. Which of the following is not a type of list in HTML?
- a. Recipe list<--- olololz
- b. Unordered list
- c. Ordered list
- d. Definition list
- 62. What percentage of free health apps sold users’ personal data in 2013?
- a. 22%
- b. 43%<--- read this one today
- c. 60%
- d. 100%
- 63. What percentage of Americans have moved to mask their online footprints by clearing cookies, encrypting emails or using anonymous messaging apps?
- a. 51%
- b. 70%
- c. 33%
- d. 86%<----- read this today
- 64. Using the NOSHADE property of the <hr> tag provides a 3-D effect to the line.
- a. True
- b. False<---
- 65. If <basefont color=red> is utilized, the color of the text following <font color=blue> is?
- a. Blue<-------
- b. Red
- 66. Given the following code string, what is the size and color of 'text3'? 2, yellow
- <basefont size=4 color=red>text1
- <font size=+1 color=blue>text2
- <font size=2 color=yellow>text3</font>
- 67. The background of a table may be a solid color or an image.
- a. True<--- :< idk
- b. False
- 68. If specified, a default table caption is bold and centered above the table.
- a. True<--- i guess uGHHHH html is the death of me (studied it today blagh)
- b. False
- 69. ________ measures and provides financial information about an organization primarily for its decision makers, investors, and taxing authorities. i forgot
- 70. Describe how a VPN works. virtual private network... if im in canada.. i can go into companes VPN and still use their shit ;/
- 71. _______ sites are a popular way for multiple businesses to post their jobs online to the public.
- a. Commerace
- b. Job
- c. Employment<-----
- d. Corporate
- 72. _________ includes the recognition, consequences, and assessment of risk to a compter's assets, and developing strategies to manage and protect them.
- a. Computer security
- b. Risk Management<-----
- c. Intranet
- d. Personal security
- 73. Which type of malware doesn't need to attach itself to an existing program to spread?
- a. Virus
- b. Trojan Horse
- c. Experimental malware
- d. Worm<---- BLURG
- 74. Firewalls control the flow of data and information between computer networks by opening and closing ________.
- a. Connections
- b. Proxy servers
- c. Ports<----
- d. Sockets
- 75. What refers to reports that analyze information and are predictive in nature to make strategic and/or tactical decisions?
- a. Reporting summarization levels
- b. Management level reporting
- c. Analysis and predictive reporting
- d. Transaction procession systems
- EXTRA CREDIT: Give an example of a strong password, according to the book.h0r$eSrCute (8-12 characters i cant count)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement