Internet Business Foundations Practice Exam Flashcards
(23 cards)
Why you use the Internet and social networking to solicit ideas for a logo or banner it is called?
a. outsourcing
b. folksonomy
c. social engineering
d. crowdsourcing
d. crowdsourcing
The best method for non-technical users to collectively classigy and find information on a site would be?
a. Ajax
b. Tagging
c. Web feed
d. A wiki
b. Tagging
Which method below would be the most efficient way to categorize and share information with a team of individuals?
a. Collective intelligence
b. Ajax programming
c. Grid computing
d. Social tagging
d. Social tagging
How would you send a group of individuals in different locatiosn a quick messge regarding information that they need while traveling to attend a company meeting?
a. Send a text message with the information to the mobile phone of each person
b. Call each person and leave a voice message
c. update the meeting agenda
d. Post an announcement on the company’s Web site
a. Send a text message with the information to the mobile phone of each person
What would you include in your recommendations about the dangers of the Internet to the parents?
a. Direct parents to ask other users in the children’s chat rooms to provide identification
b. To reduce fear, claim that the threat of predators has been reduced in recent times
c. Remind the parents that the anonymity of char rooms provides security
d. Warn children to never provide personal information over the Internet
d. Warn children to never provide personal information over the Internet
Choose the practice listed below that would be considered legal and ethical.
a. Trying shareware for free and paying for it only after you decide to keep using it
b. Copying someone else’s written work found on the Internet and presenting it as your own
c. Downloading music and motion pictures from peer-to-peer networks
d. Downloading copyrighted artwork and using it as your background on your Website
a. Trying shareware for free and paying for it only after you decide to keep using it
To support an Internet client, you must have six elements. The first three – a computer, an operating system and TCP/IP – are generally acquired when you buy a computer. Which choice lists the other three elements you need to support an INternet client?
a. Client software, Internet connection and Internet address
b. Internet connectiong, client software and server software
c. A browser, node and patch cable
d. Service provider, browser and patch cable
a. Client software, Internet connectoin, and Internet address
When you download an application from an online site, which specific standard protocol is most likely transferring the applicaiton?
a. HTTP
b. HTTPS
c. FTP
d. SMTP
c. FTP (file transfer protocol)
HTTP required which of the following elements to function?
a. Browser, HTML and TCP/IP
b. Client, server and TCP/IP
c. Server, HTML and DNS
d. Client, Web page and DNS
b. Client, server and TCP/IP
Which organization is responsible for managing domain names so that each on e is unique and (once registered) cannot be used by an unaithorized inficidual or organization?
a. ICANN
b. W3C
c. FRC
d. IEFT
a. ICANN (Internet Corporation for Assigned Names & Numbers)
What technology allows a user to enter a URL into a web browser instead of the assigned IP address?
a. DNS
b. HTTP
c. NNTP
d. SSL
a. DNS (Domain Name System)
When a business selects a hosted solution with a monthly subscription fee and outsourced maintenance, the business model is called:
a. Crowdsourcing
b. Software as a Service
c. Scalability
d. Grib Computing
b. Software as a Service
When a music provider uses a service which helps define the list of songs available to listeners the term used to describe this technology would be:
a. Bit-torrent
b. Software as a Service
c. Grib Computing
d. Crowdsourcing
d. Crowdsourcing
If your company uses a cloud service such as SaaS for all accounting, sales, and customer service information why would you still need to make regular backups of the business data?
a. If there is an interruption in Internet access, the service and records would not be accessible
b. You are overly cautious because it is well known that cloud-based services are highly secure, highly reliable and always available
c. Data stored online through the cloud-based service is more at risk to security breaches that if it were store locally
d. there is a limit on the number of users who are allowed to access the cloud-based service at any time
a. If there is an interruption in Inter access, the service and records would not be accessible
What is a possible rawback to using cloud services? Drawbacks are Connectivity, Speed and Lockout
a. Cost
b. Flexibility
c. Speed
d. Scalability
c. Speed
What would be the best classification for the following url?
http: //www.lsu.edu/Education/High_School/nine.php
a. Virtual domain name
b. Relative URL
c. Deep URL
d. Fully qualified domain name
c. Deep URL
If you are viewing a particular web site in your browser and you want to browse to a different wesite without closing the browser, what would be the most efficient way of accomplishing this task?
a. Perform a search within the site currently displayed in the browser
b. Perform a search on yout computer for the site
c. Type the URL of the site in the address bar of your Web browser
d. Type the FTP address in the address bar of your Web browser
c. Type the URL of the site in the address bar of your Web browser
Which part of the URL represents the server name that the page resider on?
a. /human resources/
b. www
c. ebrschools
d. ebrschools.org
b. www
Would be the best way to recall a site from your desktop computer or from your mobile device.
a. Add it to your favorites on your desktop
b. Type in the web address on all browsers of both devices
c. Memorize the URL
d. Add the link to a cloud-based bookmark service
d. Add the link to a cloud-based bookmark service
If you are trying to login to a site and the authentication window will not open, what could be causing the problem?
a. Pop-up blocking software has been enabled in the Web browser
b. The browser has recently had it cookie cache cleared
c. Pop-up blocking software has been enabled in the operating system
d. The browser has recently had its browsing history cleared
a. Pop-up blocking software has been enabled in the Web browser
An end user cannot log in to a page for an e-learning course. What would cause the authentication window not to launch?
a. Pop-up blocking software has been enabled in the operating system
b. The browser has recently had its cookie cache cleared
c. The browser has recently had its browsing history cleared
d. Pop-up blocking software has been enabled in the Web browsers
d. Pop-up blocking software has been enabled in the Web browsers
Which file format should you convert files to when sharing them with potential customers?
a. XML
b. MP3
c. PDF
d. DOC
c. PDF (Portable Document Format)
Windows Media Player will not open ReaMedia format and you need to view videos for your company Web site. What do you need to do to view the videos?
a. Decompress the files before attemtping to play them.
b. Convert the RealMedia files to WMV format
c. Upload the videos to the Web server then view them from the Web site
d. Get Technical Support to service your computer to use the RealMedia
b. Convert the RealMedia files to WMV format