Advertisement
Guest User

Untitled

a guest
May 6th, 2015
377
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 11.69 KB | None | 0 0
  1. 1. Which term refers to how a product or service is delivered to a customer?
  2. a. Promotion
  3. b. Placement<---
  4. c. Shipping
  5. d. Transport
  6.  
  7. 2. In which type of advertising does the advertiser pay the website owner for every 1000 viewers?
  8. a. CPA
  9. b. CPT
  10. c. CPM<---
  11. d. CPC
  12.  
  13. 3. What style of website rarely, if ever, changes its content, and displays information the same way to all users?
  14. a. Corporate website
  15. b. Static Website<----
  16. c. Dynamic Website
  17. d. Personal Website
  18.  
  19. 4. By default, the height of a horizontal rule is ____ pixels. This may be adjusted using the <hr> tag’s _____ property.
  20. a. 1, height
  21. b. 2, size
  22. c. 2, height
  23. d. 1, size<---
  24.  
  25. 5. Which term describes a program which seems harmless until it is executed?
  26. a. Worm
  27. b. Virus
  28. c. Spyware
  29. d. Trojan Horse<--- neigh nigga
  30.  
  31. 6. Collaborative software and techniques can be categorized as ______.
  32. a. Management tools<------
  33. b. Video and data conferencing
  34. c. Electronic computing tools
  35. d. Online application software
  36.  
  37. 7. To ensure the accuracy and fair reporting of financial statements, laws like ______ were enacted to counter fraudulent reporting.<--- Sarbanes-Oxley 2002?
  38.  
  39. 8. A/an ______ is a listing of hits, or hyperlinks, returned by a search engine in response to a query.
  40. a. Hit list
  41. b. Query return
  42. c. Index
  43. d. SERP<--
  44.  
  45. 9. What is a very broad term that refers to any fraudulent activity in an online setting?
  46. a. Identity fraud
  47. b. Identity theft
  48. c. Internet fraud<----
  49. d. Both A and B
  50.  
  51. 10. What is a platform-neutral language?
  52. a. Can be used by any browser on any platform.
  53. b. A standard language
  54. c. HTML
  55. d. All of the above<----
  56.  
  57. 11. The ________ defined the acronym "SCAM."
  58. a. Federal Communications Commission
  59. b. United States Department of Justice<---
  60. c. National Security Agency
  61. d. White House
  62.  
  63. 12. What is the name for a dedicated computer connected to the internet which accepts HTTP requests from clients and serves them HTML documents?
  64. a. Intranet
  65. b. Web host
  66. c. Web server<---
  67. d. Website
  68.  
  69. 13. In what year did Tim Berners-Lee invent HTML?
  70. a. 1990<---
  71. b. 1992
  72. c. 1985
  73. d. 1988
  74.  
  75. 14. ______ is simply two or more people working towards a common goal.collaboration
  76.  
  77. 15. How frequently is the average Android user's location, within 50 meters, collected by apps?
  78. a. Every 3-4 minutes<---
  79. b. Twice a day
  80. c. Every 3-4 seconds
  81. d. Once a day
  82.  
  83. 16. A fragmented URL is ____________ a normal URL.
  84. a. A shortened version of
  85. b. An extension of<---- learned this today nigga
  86. c. A portion of
  87. d. No different from
  88.  
  89. 17. All tables must have at least ____ row(s) and ____ column(s)
  90. a. 1, 1<--- boom
  91. b. 1, 2
  92. c. 2, 1
  93. d. 2, 2
  94.  
  95. 18. Which firewall rule set only permits connections which have been specifically allowed?
  96. a. Default-reject
  97. b. Default-deny<----
  98. c. Default-accept
  99. d. Default-allow
  100.  
  101. 19. Javascript is a is a/an ______ programming language which extends a website's usability.
  102. a. Server side
  103. b. Online
  104. c. Client Side<---
  105. d. All of the above
  106.  
  107. 20. HTML is represented by what?
  108. a. Caches
  109. b. Hypertexts
  110. c. Data
  111. d. Elements<---
  112.  
  113. 21. What type of client is independent of a central server and provides rich functionality client side?
  114. a. Thin Clients
  115. b. Dynamic Clients
  116. c. Fat Clients<-----
  117. d. Virtual Clients
  118.  
  119. 22. _____ refers to what a product costs, or at least what a business is willing to exchange for their products.Pricing
  120.  
  121. 23. Any communications in or out of an Intranet pass through what as a precaution against external threats?
  122. a. Firewall
  123. b. Proxy Server<----
  124. c. Filter
  125. d. Web browsers
  126.  
  127. 24. The default font size implemented in almost all browsers is ___.
  128. a. 2
  129. b. 3<---
  130. c. 4
  131. d. 5
  132.  
  133. 25. Which type of websites dispense original content, often supported by advertising?
  134. a. Content<---
  135. b. Blog
  136. c. News
  137. d. Video sharing
  138.  
  139. 26. What is the key aspect of an Intranet?
  140. a. Privacy<----
  141. b. Availability
  142. c. Security
  143. d. Speed
  144.  
  145. 27. The foreground color of table text can be set by enclosing the entire table within <font> and </font> tags and specifying the color attribute of the <font> tag.
  146. a. True
  147. b. False<---- idk
  148.  
  149. 28. Linked documents and web pages are specified using the _____ property within the <a> tag.
  150. a. HREF<----
  151. b. SRC
  152. c. URL
  153. d. LINK
  154.  
  155. 29. Glancing over a victim's shoulder to acquire their personal information is an example of what?
  156. a. Identity fraud
  157. b. Proximity theft
  158. c. Spam
  159. d. Shoulder surfing<----
  160.  
  161. 30. _____ allows businesses to collaborate through a network by allowing two or more locations interact via video and exchange data during the conference.
  162. a. Skype
  163. b. Instant Messaging
  164. c. Discussion boards
  165. d. Video and data conferencing<------
  166.  
  167. 31. What is the third core business functional behavior?
  168. a. Accounting
  169. b. Human Resources
  170. c. Marketing<----... havent learned the order yet >:
  171. d. Advertising
  172.  
  173. 32. When experts extract useful information and data from recorded data, it is called?
  174. a. Hacking
  175. b. Data mining<---
  176. c. Phishing
  177. d. Identity theft
  178.  
  179. 33. Webpages really don't even exist until they are resolved and rendered by the client's _____.
  180. a. Web browser<---
  181. b. Operating system
  182. c. Cache
  183. d. HTTP
  184.  
  185. 34. The type property of the <ol> tag can have _____ different values.
  186. a. 5<----- go over this with me plz might be 4
  187. b. 6
  188. c. 4
  189. d. Unlimited
  190.  
  191. 35. Video sharing sites use _____________ protocols.
  192. a. TCP/IP
  193. b. FTP<---...... idk
  194. c. HTTP
  195. d. UDP
  196.  
  197. 36. ____________ departments take a creative a systematic approach to evolve a business' original idea and devise new ones. fuck. i forgot... should know..... IUGHHHHH MY BRAINN cant find answerrr FUCKKK
  198.  
  199. 37. Which term refers to specific actions that serve a larger purpose?
  200. a. Tactical
  201. b. Periodic
  202. c. Strategic<----
  203. d. Wise
  204.  
  205. 38. __________ refers to the level of detail or level of summarization in a report.<--- idk
  206.  
  207. 39. Ordered lists, unordered lists, menu lists and definition lists can not be intermingled.
  208. a. True
  209. b. False<--- they can...
  210.  
  211. 40. All files on a computer should be ________.
  212. a. Encrypted
  213. b. Behind a firewall
  214. c. Scanned for viruses
  215. d. Backed up<---- bitchez
  216.  
  217. 41. The default header alignment is centered.
  218. a. True<--- fo sho
  219. b. False
  220.  
  221. 42. What is an organized entity designed to sell goods and/or services, usually in an endeavor to make a profit?
  222. a. Production Department
  223. b. Website
  224. c. Business<----
  225. d. Firm
  226.  
  227. 43. A image's border color can be selected by using the bordercolor property of the <img> tag.
  228. a. True
  229. b. False<---
  230.  
  231. 44. The <dd> tag is found within the opening and closing ______ tags.
  232. a. Definition list<---- not toooo sure
  233. b. Ordered list
  234. c. Unordered list
  235. d. Horizontal list
  236.  
  237. 45. A _______ is data that was duplicated from another computer.
  238. a. History
  239. b. Cache<----
  240. c. Web pages
  241. d. Protocol
  242.  
  243. 46. A businesses' private version of the internet is called a/an?
  244. a. Proxy
  245. b. Corporate Website
  246. c. Intranet<----
  247. d. Firewall
  248.  
  249. 47. HTML is a ________.
  250. a. Markup language
  251. b. Programming language
  252. c. Platform-neutral language
  253. d. All of the above<----
  254.  
  255. 48. _______ plays a critical role in all four P's of marketing.i dont know good question ...
  256.  
  257. 49. What term refers to reports that are produced at given intervals?
  258. a. Incremental
  259. b. Periodic<--.
  260. c. Random
  261. d. Demand
  262.  
  263. 50. The link, alink, and vlink, properties are defined within the _______ tags of a web page.
  264. a. <head><---...or body
  265. b. <p>
  266. c. <body>
  267. d. <font>
  268.  
  269. 51. Table header element text, by default, is __________ in each table cell.
  270. a. Left aligned<---
  271. b. Centered horizontally
  272. c. Centered vertically
  273. d. Both b and c
  274.  
  275. 52. Text following <strong><font size=1> appears the same as text following what?
  276. a. <h6>
  277. b. <h5>
  278. c. <h4><------
  279. d. <h3>
  280.  
  281. 53. There are _____ font sizes in HTML 4.0?
  282. a. 5
  283. b. 6
  284. c. 7<-----
  285. d. Unlimited
  286.  
  287. 54. An attempt to make a computer or any of its resources unavailable to its intended users is called?
  288. a. Denial-of-service<----
  289. b. Spamming
  290. c. Hacking
  291. d. Flooding
  292.  
  293. 55. What tells a browser how to display and align elements like lists, headings, and paragraphs?
  294. a. Presentational Elements
  295. b. Image elements
  296. c. Structural elements<-----
  297. d. Head elements
  298.  
  299. 56. Many businesses implement a _____ ruleset, in which all traffic is allowed unless it has been specifically blocked. I FORGOT AGH....
  300.  
  301. 57. __________ keep copies of users' personal information so that it doesn't have to be reentered.
  302. a. Caches<------ or is it cookies fucking A.
  303. b. Histories
  304. c. Tracking cookies
  305. d. Web browsers
  306.  
  307. 58. A computer program that is installed covertly on a computer to capture or take control of the computer, without a user's knowledge or consent is called?
  308. a. Trojan horse
  309. b. Worm
  310. c. Adware
  311. d. Spyware<-
  312.  
  313. 59. What type of software is required to make a blog website?
  314. a. WYSIWYG editor
  315. b. Fat client
  316. c. Adobe Dreamweaver
  317. d. A web browser<---
  318.  
  319. 60. What is similar to email, except in real-time computer communication?
  320. a. Video conferencing
  321. b. Instant messaging<---
  322. c. Project management software
  323. d. Discussion boards
  324.  
  325. 61. Which of the following is not a type of list in HTML?
  326. a. Recipe list<--- olololz
  327. b. Unordered list
  328. c. Ordered list
  329. d. Definition list
  330.  
  331. 62. What percentage of free health apps sold users’ personal data in 2013?
  332. a. 22%
  333. b. 43%<--- read this one today
  334. c. 60%
  335. d. 100%
  336.  
  337. 63. What percentage of Americans have moved to mask their online footprints by clearing cookies, encrypting emails or using anonymous messaging apps?
  338. a. 51%
  339. b. 70%
  340. c. 33%
  341. d. 86%<----- read this today
  342.  
  343. 64. Using the NOSHADE property of the <hr> tag provides a 3-D effect to the line.
  344. a. True
  345. b. False<---
  346.  
  347. 65. If <basefont color=red> is utilized, the color of the text following <font color=blue> is?
  348. a. Blue<-------
  349. b. Red
  350.  
  351. 66. Given the following code string, what is the size and color of 'text3'? 2, yellow
  352.  
  353. <basefont size=4 color=red>text1
  354. <font size=+1 color=blue>text2
  355. <font size=2 color=yellow>text3</font>
  356.  
  357. 67. The background of a table may be a solid color or an image.
  358. a. True<--- :< idk
  359. b. False
  360.  
  361. 68. If specified, a default table caption is bold and centered above the table.
  362. a. True<--- i guess uGHHHH html is the death of me (studied it today blagh)
  363. b. False
  364.  
  365. 69. ________ measures and provides financial information about an organization primarily for its decision makers, investors, and taxing authorities. i forgot
  366.  
  367. 70. Describe how a VPN works. virtual private network... if im in canada.. i can go into companes VPN and still use their shit ;/
  368.  
  369. 71. _______ sites are a popular way for multiple businesses to post their jobs online to the public.
  370. a. Commerace
  371. b. Job
  372. c. Employment<-----
  373. d. Corporate
  374.  
  375. 72. _________ includes the recognition, consequences, and assessment of risk to a compter's assets, and developing strategies to manage and protect them.
  376. a. Computer security
  377. b. Risk Management<-----
  378. c. Intranet
  379. d. Personal security
  380.  
  381. 73. Which type of malware doesn't need to attach itself to an existing program to spread?
  382. a. Virus
  383. b. Trojan Horse
  384. c. Experimental malware
  385. d. Worm<---- BLURG
  386.  
  387. 74. Firewalls control the flow of data and information between computer networks by opening and closing ________.
  388. a. Connections
  389. b. Proxy servers
  390. c. Ports<----
  391. d. Sockets
  392.  
  393. 75. What refers to reports that analyze information and are predictive in nature to make strategic and/or tactical decisions?
  394. a. Reporting summarization levels
  395. b. Management level reporting
  396. c. Analysis and predictive reporting
  397. d. Transaction procession systems
  398.  
  399. EXTRA CREDIT: Give an example of a strong password, according to the book.h0r$eSrCute (8-12 characters i cant count)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement