Menti Review Questions Flashcards

1
Q

Is HTML more of a WWW or Internet technology?
A. WWW
B. Internet

A

A. WWW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Is email more of a WWW or Internet technology?
A. WWW
B. Internet

A

B. Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Is multiplayer Halo more of a WWW or Internet technology?
A. WWW
B. Internet

A

B. Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Is blogging more of a WWW or Internet technology?
A. WWW
B. Internet

A

A. WWW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Is chat more of a WWW or Internet technology?
A. WWW
B. Internet

A

B. Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Are podcasts more of a WWW or Internet technology?
A. WWW
B. Internet

A

WWW and Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the biggest problem with IPv4?
A. Slow
B. Old
C. Not enough addresses
D. Not everyone has it

A

C. Not enough addresses
Only 32 bits of address space vs 128 bits supported by IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the biggest problem with IPv6?
A. Slow
B. Old
C. Not enough addresses
D. Not everyone has it

A

D. Not everyone has it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Internet is the global ___________________.
A. Network of computers
B. Network of networks
C. Network of pages

A

B. Network of networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ethernet is used to connect ____________________.
A. Computers on network
B. Networks on internet
C. Web pages with hyperlinks

A

A. Computers on network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IPv4/IPv6 is used to connect ____________________.
A. Computers on network
B. Networks on internet
C. Web pages with hyperlinks

A

B. Networks on internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which one goes inside of the other?
A. IPv4/IPv6 packet inside of Ethernet packet
B. Ethernet packet inside of IPv4/IPv6 packet

A

A. IPv4/IPv6 packet inside of Ethernet packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DNS usually goes over (inside)?
A. UDP
B. TCP

A

A. UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

HTTP 1 usually goes over (inside)
A. UDP
B. TCP

A

B. TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TCP usually goes over (inside)?
A. UDP
B. IP
C. HTTP
D. DNS

A

B. IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DNS can be slow because…
A. UDP is slow
B. IP is slow
C. Might need to contact multiple servers
D. It doesn’t use TCP

A

C. Might need to contact multiple servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The primary purpose of DNS is…
A. Sending websites
B. Uploading files
C. Interconnecting networks
D. Names to numbers

A

D. Names to numbers
DNS turns the name of a site into either an IPv4 or IPv6 address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The primary purpose of HTTP is…
A. Sending websites
B. Uploading files
C. Interconnecting networks
D. Names to numbers

A

A. Sending websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

First part of a URL (URI)?
A. fragment/argument
B. query
C. host
D. scheme/protocol
E. path
F. login

A

D. scheme/protocol
e.g. http, https

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Second part of a URL (URI)?
A. fragment/argument
B. query
C. host
D. scheme/protocol
E. path
F. port

A

C. host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Third part of a URL (URI)?
A. fragment/argument
B. query
C. host
D. scheme/protocol
E. path
F. port

A

F. port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Fourth part of a URL (URI)?
A. fragment/argument
B. query
C. host
D. scheme/protocol
E. path
F. port

A

E. path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Fifth part of a URL (URI)?
A. fragment/argument
B. query
C. host
D. scheme/protocol
E. path
F. port

A

B. query

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Last part of a URL (URI)?
A. fragment/argument
B. query
C. host
D. scheme/protocol
E. path
F. port

A

A. fragment/argument

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What separates the scheme from the host in a URL (URI)?
A. ?
B. @
C. /
D. #
E. :
F. ://

A

F. ://

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What separates the scheme and something else, for schemes that don’t have a host?
A. ?
B. @
C. /
D. #
E. :
F. ://

A

E. :
The “something else” is referring to the port number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What separates the host from the port in a URL (URI)?
A. ?
B. @
C. /
D. #
E. :
F. ://

A

E. :

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What separates host/port and path of a URL (URI)?
A. ?
B. @
C. /
D. #
E. :
F. ://

A

C. /

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What separates the path and query of a URL (URI)?
A. ?
B. @
C. /
D. #
E. :
F. ://

A

A. ?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What separates the path/query and fragment of a URL (URI)?
A. ?
B. @
C. /
D. #
E. :
F. ://

A

D. #

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Fix this URL: http://::1:8000/index.html

A

http://[::1]:8000/index.html

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What (out of the options) is the scheme used for?
A. specifying arguments such as what to search for
B. changing to an alternate server on the same computer
C. identifies the file, program, or database entry
D. determines protocol
E. jumping to a particular part of a page
F. picks a computer to connect to

A

D. determines protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What (out of the options) is the host used for?
A. specifying arguments such as what to search for
B. changing to an alternate server on the same computer
C. identifies the file, program, or database entry
D. determines protocol
E. jumping to a particular part of a page
F. picks a computer to connect to

A

F. picks a computer to connect to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What (out of the options) is the port used for?
A. specifying arguments such as what to search for
B. changing to an alternate server on the same computer
C. identifies the file, program, or database entry
D. determines protocol
E. jumping to a particular part of a page
F. picks a computer to connect to

A

B. changing to an alternate server on the same computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What (out of the options) is the path used for?
A. specifying arguments such as what to search for
B. changing to an alternate server on the same computer
C. identifies the file, program, or database entry
D. determines protocol
E. jumping to a particular part of a page
F. picks a computer to connect to

A

C. identifies the file, program, or database entry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What (out of the options) is the query used for?
A. specifying arguments such as what to search for
B. changing to an alternate server on the same computer
C. identifies the file, program, or database entry
D. determines protocol
E. jumping to a particular part of a page
F. picks a computer to connect to

A

A. specifying arguments such as what to search for

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What (out of the options) is the fragment used for?
A. specifying arguments such as what to search for
B. changing to an alternate server on the same computer
C. identifies the file, program, or database entry
D. determines protocol
E. jumping to a particular part of a page
F. picks a computer to connect to

A

E. jumping to a particular part of a page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What usually separates query keys from query values?
A. %
B. ?
C. #
D. =
E. :
F. &

A

D. =

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What usually separates query key-value pairs from each other?
A. %
B. ?
C. #
D. =
E. :
F. &

A

F. &

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is used to encode hex character values in URLs?
A. %
B. ?
C. #
D. =
E. :
F. &

A

A. %

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What HTTP method can be used to avoid URL length limits?
A. GET
B. PUT
C. POST
D. DELETE
E. HEAD
F. OPTIONS

A

C. POST
(by utilizing the request body which has a more generous limit than a URL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What HTTP method is usually used to request webpage content?
A. GET
B. PUT
C. POST
D. DELETE
E. HEAD
F. OPTIONS

A

A. GET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What HTTP method is usually used to submit searches?
A. GET
B. PUT
C. POST
D. DELETE
E. HEAD
F. OPTIONS

A

A. GET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What HTTP method is usually used to submit username and password?
A. GET
B. PUT
C. POST
D. DELETE
E. HEAD
F. OPTIONS

A

C. POST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is an advantage of HTTP 1? Choose all that apply:
A. Easier to debug
B. Faster
C. Fewer Connections
D. Universally implemented
E. Easier to implement

A

A. Easier to debug
D. Universally implemented
E. Easier to implement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is an advantage of HTTP 2/3?
A. Easier to debug
B. Faster
C. Fewer Connections
D. Universally implemented
E. Easier to implement

A

B. Faster
C. Fewer Connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is the most common HTTP method?
A. GET
B. DELETE
C. POST
D. PUT
E. MKCOL
F. OPTIONS

A

A. GET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Scenario: posting a video of your pet to Instagram. Which HTTP method is used here?
A. GET
B. DELETE
C. POST
D. PUT
E. MKCOL
F. OPTIONS

A

C. POST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Scenario: replacing a record in a database. Which HTTP method is used here?
A. GET
B. DELETE
C. POST
D. PUT
E. MKCOL
F. OPTIONS

A

D. PUT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Which HTTP method is used with application/x-www-form-urlencoded?
A. GET
B. DELETE
C. POST
D. PUT
E. MKCOL
F. OPTIONS

A

C. POST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Which HTTP method is used with multipart/form-data?
A. GET
B. DELETE
C. POST
D. PUT
E. MKCOL
F. OPTIONS

A

C. POST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

application/x-www-form-urlencoded is better for?
A. File uploads
B. Short forms like login
C. Getting around URL length limits
D. Large amounts of data in a single value
E. Web search (google, ddg) query

A

B. Short forms like login
C. Getting around URL length limits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

multipart/form-data is better for?
A. File uploads
B. Short forms like login
C. Getting around URL length limits
D. Large amounts of data in a single value
E. Web search (google, ddg) query

A

A. File uploads
D. Large amounts of data in a single value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What was the first web browser?
A. Firefox
B. Internet Explorer
C. Edge
D. Chrome/Chromium
E. Safari
F. Mosaic

A

F. Mosaic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Which web browser killed Mosaic?
A. Firefox
B. Internet Explorer
C. Edge
D. Chrome/Chromium
E. Safari
F. Netscape Navigator

A

F. Netscape Navigator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What web browser is based on Netscape?
A. Firefox
B. Internet Explorer
C. Edge
D. Chrome/Chromium
E. Safari
F. Netscape Navigator

A

A. Firefox

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What web browsers want to say they’re compatible with Netscape 5?
A. Firefox
B. Internet Explorer
C. Edge
D. Chrome/Chromium
E. Safari

A

All choices given: Firefox, Internet Explorer, Edge, Chrome/Chromium, Safari

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What web browser was based on KHTML (from KDE for Linux)?
A. Firefox
B. Internet Explorer
C. Edge
D. Chrome/Chromium
E. Safari

A

E. Safari

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What web browser was based on Safari?
A. Firefox
B. Internet Explorer
C. Edge
D. Chrome/Chromium
E. Safari

A

D. Chrome/Chromium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What browser is this: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36 Edge/119.0.0.0
A. Firefox
B. Internet Explorer
C. Edge
D. Chrome/Chromium
E. Safari

A

C. Edge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What response code is used for sending the content of the index page?
A. 200
B. 301
C. 303
D. 401
E. 404
F. 500

A

A. 200

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What response code is used for asking the browser to use https instead of http?
A. 200
B. 301
C. 303
D. 401
E. 404
F. 500

A

B. 301

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What response code is returned by a script that handles login crashes?
A. 200
B. 301
C. 303
D. 401
E. 404
F. 500

A

F. 500

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What response code asks the browser to ask for login?
A. 200
B. 301
C. 303
D. 401
E. 404
F. 500

A

D. 401

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What response code prevents the following message: “In order to refresh we need to resend prompt”?
A. 200
B. 301
C. 303
D. 401
E. 404
F. 500

A

C. 303

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What response code is returned when no database record for a requested URI exists?
A. 200
B. 301
C. 303
D. 401
E. 404
F. 500

A

E. 404

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What response code is returned when a user needs to login using a HTML login page first?
A. 200
B. 301
C. 303
D. 401
E. 404
F. 500

A

C. 303

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

What is the Authorization header used for?
A. Speed
B. Authentication
C. Anti-Exploit
D. Describing Content/Typing

A

B. Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What is the Accept header used for?
A. Speed
B. Authentication
C. Anti-Exploit
D. Describing Content/Typing

A

D. Describing Content/Typing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

What is the Access-Control-x-x header used for?
A. Speed
B. Authentication
C. Anti-Exploit
D. Describing Content/Typing

A

C. Anti-Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What is the Cache-x header used for?
A. Speed
B. Authentication
C. Anti-Exploit
D. Describing Content/Typing

A

A. Speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

What is the Content-Disposition header used for?
A. Speed
B. Authentication
C. Anti-Exploit
D. Describing Content/Typing

A

D. Describing Content/Typing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

What is the Cookie header used for?
A. Speed
B. Authentication
C. Anti-Exploit
D. Describing Content/Typing
E. Tracking

A

B. Authentication
E. Tracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

What is the If-x-x header used for?
A. Speed
B. Authentication
C. Anti-Exploit
D. Describing Content/Typing
E. Tracking

A

A. Speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

What is the Origin header used for?
A. Speed
B. Authentication
C. Anti-Exploit
D. Describing Content/Typing
E. Tracking

A

C. Anti-Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What is the Range header used for?
A. Speed
B. Authentication
C. Anti-Exploit
D. Describing Content/Typing
E. Tracking

A

A. Speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

What is the Referer header used for?
A. Speed
B. Authentication
C. Anti-Exploit
D. Describing Content/Typing
E. Tracking

A

E. Tracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

What is the Sec-x header used for?
A. Speed
B. Authentication
C. Anti-Exploit
D. Describing Content/Typing
E. Tracking

A

C. Anti-Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

What is the User-Agent header used for?
A. Speed
B. Authentication
C. Anti-Exploit
D. Describing Content/Typing
E. Tracking

A

D. Describing Content/Typing
E. Tracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

What is the Content-Security-Policy header used for?
A. Speed
B. Authentication
C. Anti-Exploit
D. Describing Content/Typing
E. Tracking

A

C. Anti-Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Which of these is required?
A. Vary
B. Date
C. Allow
D. Host
E. X-Forwarded-For

A

D. Host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

What is the correct way to start a modern HTML document?
A. <!DOCTYPE HTML PUBLIC”-//W3C//DTD HTML 4.01//EN
B. <?xml version=”1.0” encoding=”UTF-8”?>
C. <!DOCTYPE html>

A

C. <!DOCTYPE html>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

There is a void element “link” which specifies another URL that the current page needs. How should it be written?
A. <link></link></link>
B. <link></link>
C. <link></link>

A

B. <link></link>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

You made an element called “apple” that puts an apple on the page. How should its tag be written?
A. <apple></apple>
B. <apple>
C. <apple></apple>
D. You can't create "apple"</apple>

A

A. <apple></apple>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

You made a void tag called “banana” which specifies an “apple” HTML element you created. If it can have content inside, how should it be written?
A. <banana></banana>
B. <banana>
C. <banana></banana>
D. You can't create "banana"</banana>

A

D. You can’t create “banana”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Which tag style is wrong but browsers will accept it anyway?
A. <banana></banana>
B. <banana>
C. <banana></banana>
D. All of these are correct HTML</banana>

A

C. <banana></banana>
Note: React components are formatted this way, but this is invalid HTML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

What is the outermost tag?
A. <body></body>
B. <head></head>
C. <p></p>
D. <b></b>
E. <html></html>
F. <a></a>

A

E. <html></html>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

What goes first inside<html></html>?
A. <body></body>
B. <head></head>
C. <p></p>
D. <b></b>
E. <html></html>
F. <a></a>

A

B. <head></head>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

What goes second inside<html></html>?
A. <body></body>
B. <head></head>
C. <p></p>
D. <b></b>
E. <html></html>
F. <a></a>

A

A. <body></body>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Where does stuff that goes on the page go?
A. <body></body>
B. <head></head>
C. <p></p>
D. <b></b>
E. <html></html>
F. <a></a>

A

A. <body></body>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Where does metadata about the page go?
A. <body></body>
B. <head></head>
C. <p></p>
D. <b></b>
E. <html></html>
F. <a></a>

A

B. <head></head>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

HTML or CSS? Indicating a chapter title

A

HTML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

HTML or CSS? Making something bold

A

CSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

HTML or CSS? Making a hyperlink clickable

A

HTML

95
Q

HTML or CSS? Marking some links as navigation

A

HTML

96
Q

HTML or CSS? Making title nice and big

A

CSS

97
Q

In <a>Slashdot.org: News for Nerds Stuff that Matters</a> what’s the href?
A. tag
B. element
C. item
D. attribute

A

D. attribute

98
Q

Which is selected by the CSS selector .banana
A. <tag>
B. <banana>
C. <tag>
D. <tag.banana></tag.banana></tag></banana></tag>

A

A. <tag></tag>

99
Q

Which is selected by CSS selector banana
A. <tag>
B. <banana>
C. <tag>
D. <tag.banana></tag.banana></tag></banana></tag>

A

B. <banana></banana>

100
Q

Which is selected by CSS selector #banana
A. <tag>
B. <banana>
C. <tag>
D. <tag.banana></tag.banana></tag></banana></tag>

A

C. <tag></tag>

101
Q

Which CSS selector selects the li of <section><ul><li>x</li></ul></section> (there may be multiple answers)
A. section.ul.li
B. ul #li
C. section>ul>li
D. section, ul, li
E. section ul li
F. section:ul:li

A

C. section>ul>li
D. section, ul, li
E. section ul li

102
Q

Which CSS selector selects the li of <section><ul><li>x</li></ul></section> (choose the most specific selector that selects li)
A. section.ul.li
B. ul #li
C. section>ul>li
D. section, ul, li
E. section ul li
F. section:ul:li

A

C. section>ul>li

103
Q

Which attribute of <input></input> becomes the key?
A. type
B. value
C. name
D. form
E. class
F. id

A

C. name

104
Q

Which attribute of <input></input> becomes the value?
A. type
B. value
C. name
D. form
E. class
F. id

A

B. value

105
Q

What is the key of a <input></input> element if there is no name attribute?
A. browser error popup
B. browser error console
C. form will not work
D. runs javascript
E. key value not sent
F. sent anonymously

A

E. key value not sent

106
Q

<input></input> should be inside of?
A. <form>
B. <inputs>
C. <label>
D. <head>
E. <datalist>
F. <optgroup></datalist></label></inputs>

A

A. <form>

107
Q

In the HTML <p><b>x</b></p> the b is what relative to the p?
A. parent
B. child
C. container
D. subclass
E. descendant

A

B. child
E. descendant

108
Q

In the HTML <p><ul><li>x</li></ul></p> the li is what relative to the p?
A. parent
B. child
C. container
D. subclass
E. descendant

A

E. descendant

109
Q

What CSS property makes bold?
A. font-style
B. font-face
C. font-size
D. font-weight
E. font-variant

A

D. font-weight

110
Q

What CSS property makes italics?
A. font-style
B. font-face
C. font-size
D. font-weight
E. font-variant

A

A. font-style

111
Q

A CSS px is equal to…
A. one pixel
B. 1/72 of an inch
C. 1/96 of an inch
D. the font size
E. width of a 0
F. height of an x

A

C. 1/96 of an inch

112
Q

A CSS ex is equal to…
A. one pixel
B. 1/72 of an inch
C. 1/96 of an inch
D. the font size
E. width of a 0
F. height of an x

A

F. height of an x

113
Q

A CSS ch is equal to…
A. one pixel
B. 1/72 of an inch
C. 1/96 of an inch
D. the font size
E. width of a 0
F. height of an x

A

E. width of a 0

114
Q

A CSS pt is equal to…
A. one pixel
B. 1/72 of an inch
C. 1/96 of an inch
D. the font size
E. width of a 0
F. height of an x

A

B. 1/72 of an inch

115
Q

A CSS em is equal to…
A. one pixel
B. 1/72 of an inch
C. 1/96 of an inch
D. the font size
E. width of a 0
F. height of an x

A

D. the font size
(e.g. 2em means 2 times the size of the current font)

116
Q

In CSS, nothing is equal to…
A. one pixel
B. 1/72 of an inch
C. 1/96 of an inch
D. the font size
E. width of a 0
F. height of an x

A

A. one pixel

117
Q

Which is NOT a way to add JS to HTML?
A. element event
B. inline script element
C. link element in head
D. script element

A

C. link element in head

118
Q

What is a closure?
A. same as scope
B. an anonymous function
C. functions can see vars from when they were defined
D. special kind of class method

A

C. functions can see vars from when they were defined

119
Q

What should you put at the top of every JS file?
A. let, const & var
B. imports
C. doctype
D. use strict

A

D. use strict

120
Q

Which one scopes variables to the enclosing block?
A. let
B. const
C. var
D. nothing before the variable declaration

A

A. let
B. const

121
Q

Which one scopes variables to the enclosing function?
A. let
B. const
C. var
D. nothing before the variable declaration

A

C. var

122
Q

Which one scopes variables to global?
A. let
B. const
C. var
D. nothing before the variable declaration

A

D. nothing before the variable declaration

123
Q

What is the following JS code used for: ‘’ + someVar
A. Nothing
B. Cast to Boolean
C. Cast to Number
D. Cast to String
E. Rounding to Integer
F. Serialize

A

D. Cast to String

124
Q

Identifiers in JS cannot…
A. be words
B. have underscores
C. be keywords
D. be properties
E. have digits
F. be unicode

A

C. be keywords

125
Q

Methods in JS are…
A. early binding
B. late binding
C. not bound unless .call() is used
D. not bound unless .bind() is used

A

B. late binding
(i.e. a function is not bound to anything unless it is explicitly called or the function is binded to a variable)

126
Q

Methods in Python are…
A. early binding
B. late binding
C. not bound unless .call() is used
D. not bound unless .bind() is used

A

A. early binding

127
Q

General numbers in JS are always…
A. integers
B. singles
C. doubles
D. integers or doubles depending on the operation

A

C. doubles

128
Q

JS really likes to turn things into ______ when you least expect it?
A. integers
B. objects
C. arrays
D. strings
E. errors
F. null

A

D. strings

129
Q

Which comparison should you use in JS?
A. ==
B. ===
C. :=
D. .equals()
E. <=>
F. =

A

B. ===

130
Q

What does !!someVar in JS used for?
A. Doesn’t do anything
B. Cast to Boolean
C. Cast to Number
D. Cast to String
E. Rounding to Integer
F. Serialize

A

B. Cast to Boolean

131
Q

Given !!someVar, it will be true if someVar is…
A. 0
B. “”
C. null
D. undefined
E. NaN
F. []

A

F. []

132
Q

In JS, what value is returned when going past the end of an array?
A. Error!
B. null
C. false
D. undefined
E. NaN
F. []

A

D. undefined

133
Q

To loop over the values in an array in JS, we use:
A. for (thing in array)
B. for (thing of array)
C. for (thing:array)

A

B. for (thing of array)

134
Q

To loop over the properties of an object in JS, we use:
A. for (thing in array)
B. for (thing of array)
C. for (thing:array)

A

A. for (thing in array)

135
Q

Arrow functions are different from regular functions (i.e. function fn()) because they…
A. are anonymous
B. They aren’t! They are the same!
C. are pass-by-reference
D. can access identifiers from closure
E. get this from closure
F. are faster

A

E. get this from closure

136
Q

The DOM is what kind of data structure?
A. Stack
B. Queue
C. Hash
D. Tree

A

D. Tree

137
Q

Everything in the DOM tree is a ________?
A. Element
B. Text
C. Tag
D. Point
E. Vertex
F. Node

A

F. Node

138
Q

<input></input> is represented in the DOM tree by __________?
A. Element
B. Text
C. Tag
D. Point
E. Vertex
F. JSON

A

A. Element

139
Q

Actual words on the page are represented in the DOM tree by _____________?
A. Element
B. Text
C. Tag
D. Point
E. Vertex
F. JSON

A

B. Text

140
Q

In JS, private fields are indicated by:
A. Name begins with _
B. Name begins with #
C. private keyword
D. static keyword
E. @private
F. this

A

B. Name begins with #

141
Q

In JS, static fields are indicated by:
A. Name begins with _
B. Name begins with #
C. private keyword
D. static keyword
E. @private
F. this

A

D. static keyword

142
Q

In JS, how can one get element that match a CSS selector?
A. document.querySelector()
B. document.getElementsBySelector()
C. document.getElements()

A

A. document.querySelector()

143
Q

In JS, how can one instantiate a new element in the DOM?
A. document.createElement()
B. document.insertAt(parent, element)
C. parent.appendChild(element)
D. document.addElementById(parent)
E. element.someAttribute

A

A. document.createElement()

144
Q

In JS, how can one attach an element inside another element?
A. document.createElement()
B. document.insertAt(parent, element)
C. parent.appendChild(element)
D. document.addElementById(parent)
E. element.someAttribute

A

C. parent.appendChild(element)

145
Q

In JS, how can one modify the style of an element?
A. element.setStyle()
B. document.setStyleById()
C. parent.appendStyle()
D. element.style

A

D. element.style

146
Q

fetch() argument is a…
A. Function
B. Request
C. Response
D. Promise
E. Headers
F. Body

A

B. Request

147
Q

fetch() returns…
A. Function
B. Request
C. Response
D. Promise
E. Headers
F. Body

A

D. Promise

148
Q

promise.then() takes an argument…
A. Function
B. Request
C. Response
D. Promise
E. Headers
F. Body

A

A. Function

149
Q

promise.then() returns…
A. Function
B. Request
C. Response
D. Promise
E. Headers
F. Body

A

D. Promise

150
Q

fetch.then() takes…
A. Function
B. Request
C. Response
D. Promise
E. Headers
F. Body

A

A. Function

151
Q

fetch.then() returns…
A. Function
B. Request
C. Response
D. Promise
E. Headers
F. Body

A

D. Promise

152
Q

fetch.then() takes a function that takes…
A. Function
B. Request
C. Response
D. Promise
E. Headers
F. Body

A

C. Response
E. Headers

153
Q

fetch.then() takes a function that returns…
A. Function
B. Request
C. Response
D. Promise
E. Headers
F. Body

A

D. Promise
F. Body

154
Q

fetch.then().then() takes a function that takes…
A. Function
B. Request
C. Response
D. Promise
E. Headers
F. Body

A

F. Body

155
Q

fetch.then().then() returns…
A. Function
B. Request
C. Response
D. Promise
E. Headers
F. Body

A

D. Promise

156
Q

await can only be used in what kind of function?
A. anonymous
B. arrow
C. promise
D. async
E. without loops

A

D. async

157
Q

await(x) where x is an expression that returns a ____________
A. anonymous function
B. arrow function
C. promise
D. async function

A

C. promise

158
Q

await should be avoided inside a…
A. anonymous function
B. arrow function
C. promise
D. async function
E. loop

A

E. loop

159
Q

async functions return a…
A. anonymous function
B. arrow function
C. promise
D. async function
E. iterator

A

C. promise

160
Q

async function with return 1 resolves when…
A. after return statement
B. when its called
C. after all functions
D. after returned value resolves

A

A. after return statement

161
Q

async function with “return somePromise” resolves when…
A. after return statement
B. when its called
C. after all functions
D. after returned value resolves

A

D. after returned value resolves

162
Q

When is a request repeatable?
A. doing it twice in a row doesn’t change the effect
B. the URL is valid for a long period of time (doesn’t expire)
C. when the results are split into multiple pages that must be requested

A

A. doing it twice in a row doesn’t change the effect

163
Q

When is a request stateless?
A. able to be processed without knowing previous requests
B. when the request doesn’t contain any information about state
C. similar to repeatable

A

A. able to be processed without knowing previous requests

164
Q

When is a request cacheable?
A. when there is a caching proxy layer
B. when it includes the Cache-Control header
C. when the response is known to not change for some period of time

A

C. when the response is known to not change for some period of time

165
Q

In a stateless system, which end keeps track of whether someone is logged in (or not)?
A. Server
B. Client
C. Proxy

A

B. Client

166
Q

What is a potential disadvantage of REST?
A. Reliability
B. Scalability
C. Caching
D. Bandwidth
E. Distribution

A

D. Bandwidth

167
Q

In session-cookie auth, when does the session cookie get generated?
A. Login: Correct username & password
B. When database entry is set to not authenticated
C. When database entry is set to authenticated
D. Logout
E. On any request

A

E. On any request

168
Q

In session-cookie auth, what is a good response to attempting to access a private page by an unauthenticated user?
A. 200 OK
B. 301 Moved Permanently
C. 302 Found
D. 401 Unauthorized
E. 403 Forbidden
F. 503 Service Unavailable

A

C. 302 Found

169
Q

In session-cookie auth, what is a good response to a successful login?
A. 200 OK
B. 301 Moved Permanently
C. 303 See Other
D. 401 Unauthorized
E. 403 Forbidden
F. 503 Service Unavailable

A

C. 303 See Other

170
Q

How does JWT prevent tokens from being forged by the user?
A. Database entry that user can’t manipulate
B. Cryptographic signature
C. Keeping the state in special browser-protected storage
D. Encrypted HTTPS connections

A

B. Cryptographic signature

171
Q

True/False: REST with caching always decreases latency?

A

False

172
Q

It’s usually fastest to perform operations on the…
A. Client
B. Reverse Proxy Webserver
C. Middleware Server
D. Storage Server

A

A. Client

173
Q

How does HTTP Basic prevent your password from being stolen?
A. Cryptographic Signature
B. Encryption
C. Cryptographic Hash
D. It doesn’t

A

D. It doesn’t

174
Q

How does HTTP Digest prevent your password from being stolen?
A. Cryptographic Signature
B. Encryption
C. Cryptographic Hash
D. It doesn’t

A

C. Cryptographic Hash

175
Q

Why does HTTP Basic encode the username and password?
A. Prevent “sessionjacking”
B. Make sure the username and password was not corrupted during transfer
C. HTTP 1 is a text based protocol, password can have any character
D. It doesn’t

A

C. HTTP 1 is a text based protocol, password can have any character

176
Q

Scenario: Attackers modified server data so that when users clicked checkout they were taken to a fake website that stole their credit card. Which vulnerability is present in the scenario given?
A. XSS (Cross-Site Scripting)
B. RCE (Remote Code Execution)
C. CSRF (Cross-Site Request Forgery)
D. SSRF (Server-Side Request Forgery)
E. DoS (Denial of Service)

A

A. XSS (Cross-Site Scripting)

177
Q

Scenario: Attackers stole authorization info and submitted requests to TikTok that appeared to be coming from users, but wasn’t really. Which vulnerability is present in the scenario given?
A. XSS (Cross-Site Scripting)
B. RCE (Remote Code Execution)
C. CSRF (Cross-Site Request Forgery)
D. SSRF (Server-Side Request Forgery)
E. DoS (Denial of Service)

A

C. CSRF (Cross-Site Request Forgery)

178
Q

Scenario: Server A only responds to server B. Attacker tricks B into making a request to A and returning the result over the web. B should only respond to A if both servers are rented by the same company. Which vulnerability is present in the scenario given?
A. XSS (Cross-Site Scripting)
B. RCE (Remote Code Execution)
C. CSRF (Cross-Site Request Forgery)
D. SSRF (Server-Side Request Forgery)
E. DoS (Denial of Service)

A

D. SSRF (Server-Side Request Forgery)

179
Q

Scenario: Attacker customized a social media profile with JS that would cause anyone visiting the profile to automatically add them as a friend. Which vulnerability is present in the scenario given?
A. XSS (Cross-Site Scripting)
B. RCE (Remote Code Execution)
C. CSRF (Cross-Site Request Forgery)
D. SSRF (Server-Side Request Forgery)
E. DoS (Denial of Service)

A

A. XSS (Cross-Site Scripting)

180
Q

Scenario: Attacker makes a request with a special path, server uses log4j to log request paths, special string in log4j can run any code. Which vulnerability is present in the scenario given?
A. XSS (Cross-Site Scripting)
B. RCE (Remote Code Execution)
C. CSRF (Cross-Site Request Forgery)
D. SSRF (Server-Side Request Forgery)
E. DoS (Denial of Service)

A

B. RCE (Remote Code Execution)

181
Q

Scenario: Attackers used a flaw in Perl’s implementation of hashes (dicts) to make access to data O(2^n) and webservers use up all CPU. Which vulnerability is present in the scenario given?
A. XSS (Cross-Site Scripting)
B. RCE (Remote Code Execution)
C. CSRF (Cross-Site Request Forgery)
D. SSRF (Server-Side Request Forgery)
E. DoS (Denial of Service)

A

E. DoS (Denial of Service)

182
Q

Scenario: Attacker modifies a legitimate cookie to indicate authorized access to paid content they haven’t paid for. Which vulnerability is present in the scenario given?
A. XSS (Cross-Site Scripting)
B. RCE (Remote Code Execution)
C. CSRF (Cross-Site Request Forgery)
D. SSRF (Server-Side Request Forgery)
E. DoS (Denial of Service)

A

C. CSRF (Cross-Site Request Forgery)

183
Q

Changing program arguments (exec, system, subprocess, …) with variables can lead to…
A. Server-side CSRF
B. Client-side CSRF
C. Path traversal
D. SQL Injection
E. RCE by Shell Injection
F. DoS (Denial of Service)

A

E. RCE by Shell Injection

184
Q

Allowing very large uploads can lead to…
A. Server-side CSRF
B. Client-side CSRF
C. Path traversal
D. SQL Injection
E. RCE by Shell Injection
F. DoS (Denial of Service)

A

F. DoS (Denial of Service)

185
Q

Poorly written in-browser JS code can lead to…
A. Server-side CSRF
B. Client-side CSRF
C. Path traversal
D. SQL Injection
E. RCE by Shell Injection
F. DoS (Denial of Service)

A

B. Client-side CSRF

186
Q

Not filtering and validating the path component of a URL can lead to…
A. Server-side CSRF
B. Client-side CSRF
C. Path traversal
D. SQL Injection
E. RCE by Shell Injection
F. DoS (Denial of Service)

A

C. Path traversal

187
Q

Using templates to form database queries can lead to…
A. Server-side CSRF
B. Client-side CSRF
C. Path traversal
D. SQL Injection
E. RCE by Shell Injection
F. DoS (Denial of Service)

A

D. SQL Injection

188
Q

Stolen cookies may lead to…
A. Server-side CSRF
B. Client-side CSRF
C. Path traversal
D. SQL Injection
E. RCE by Shell Injection
F. DoS (Denial of Service)

A

A. Server-side CSRF

189
Q

When dealing with a human that needs to log in we should respond with a…
A. 100 Continue
B. 200 OK
C. 303 See Other
D. 401 Unauthorized
E. 514 Login Required

A

C. 303 See Other

190
Q

When dealing with a machine that needs to log in, we should respond with a…
A. 100 Continue
B. 200 OK
C. 303 See Other
D. 401 Unauthorized
E. 514 Login Required

A

D. 401 Unauthorized

191
Q

When responding to a POST request from a browser (not AJAX), we should respond with a…
A. 100 Continue
B. 200 OK
C. 303 See Other
D. 401 Unauthorized
E. 514 Login Required

A

C. 303 See Other

192
Q

When responding to a POST request from a script (not AJAX), we should respond with a…
A. 100 Continue
B. 200 OK
C. 303 See Other
D. 401 Unauthorized
E. 514 Login Required

A

B. 200 OK

193
Q

What protocol does TLS work inside of (on top of)?
A. Ethernet
B. IP
C. TCP/UDP
D. HTTP(S)
E. HTML

A

C. TCP/UDP

194
Q

What protocol goes inside of (on top of) TLS?
A. Ethernet
B. IP
C. TCP/UDP
D. HTTP(S)
E. HTML

A

D. HTTP(S)

195
Q

What is the current version of TLS?
A. SSL
B. TLS 1.0
C. TLS 1.1
D. TLS 1.2
E. TLS 1.3
F. TLS 1.4

A

E. TLS 1.3

196
Q

When someone says “encryption”, they are usually referring to providing…
A. Identity
B. Privacy
C. Authenticity

A

B. Privacy

197
Q

Which core principle of TLS does ensuring messages aren’t repeated correspond with?
A. Identity
B. Privacy
C. Authenticity

A

C. Authenticity

198
Q

Which core principle of TLS does ensuring you’re actually talking to who you think you’re taking to correspond with?
A. Identity
B. Privacy
C. Authenticity

A

A. Identity

199
Q

A certificate is checked by the…
A. Government
B. Certificate Authority
C. User Agent
D. HTTP Server
E. DNS Server
F. Router

A

C. User Agent

200
Q

A certificate is signed by the…
A. Government
B. Certificate Authority
C. User Agent
D. HTTP Server
E. DNS Server
F. Router

A

B. Certificate Authority

201
Q

A signature is verified by combining it with the ___________ and _____________? (select two answers)
A. Private Key
B. Public Key
C. Contents of the thing that was signed
D. TLS protocol
E. IP Address
F. Certificate Authority

A

B. Public Key
C. Contents of the thing that was signed

202
Q

What is the most crucial part of the text of a signed certificate, apart from the signature?
A. IP Address
B. Ethernet Address
C. Server version
D. HTTP vs HTTPS
E. Domain Name

A

E. Domain Name

203
Q

How do you get the Certificate Authority’s public key?
A. DNS
B. Browser/OS
C. TCP/UDP
D. HTTP
E. Ethernet
F. IP

A

B. Browser/OS

204
Q

When should you optimize?
A. never
B. continuously
C. early development
D. late development
E. between iterations
F. when you have a performance problem

A

F. when you have a performance problem

205
Q

When does ETag change?
A. when content changes
B. when there is a new request to the original server
C. when there is a new request to a reverse proxy
D. never

A

A. when content changes

206
Q

When does Expires change?
A. when content changes
B. when there is a new request to the original server
C. when there is a new request to a reverse proxy
D. never

A

B. when there is a new request to the original server

207
Q

When does Last-Modified change?
A. when content changes
B. when there is a new request to the original server
C. when there is a new request to a reverse proxy
D. never

A

A. when content changes

208
Q

When does Age change?
A. when content changes
B. when there is a new request to the original server
C. when there is a new request to a reverse proxy
D. never

A

C. when there is a new request to a reverse proxy

209
Q

ETag works with which request header for caching?
A. If-None-Match
B. If-Match
C. If-Modified-Since

A

A. If-None-Match

210
Q

Caching increases…
A. Locality
B. Round trips
C. Latency
D. Download size

A

A. Locality

211
Q

Static content (content that never changes) should use what header?
A. Expires: 60
B. Authorization: Basic …
C. Cache-Control: max-age=60
D. Cache-Control: public

A

D. Cache-Control: public

212
Q

What is cache-busting?
A. using ETag headers
B. using http HEAD method
C. putting a version # in the file name
D. using Authorization header

A

C. putting a version # in the file name

213
Q

DNS CNAME is similar to…
A. HTTP 1xx
B. HTTP 2xx
C. HTTP 3xx
D. HTTP 4xx
E. HTTP 5xx

A

C. HTTP 3xx

214
Q

Asynchronous loading helps reduce…
A. Download size
B. Bandwidth
C. # of Requests
D. Concurrency
E. Round Trips
F. Locality

A

E. Round Trips

215
Q

Asynchronous loading loads things…
A. one after the other
B. slowly
C. in parallel

A

C. in parallel

216
Q

Which one has the best compression?
A. GIF
B. WebP
C. AVIF
D. JPEG

A

C. AVIF

217
Q

What does the <picture> element do?
A. same thing as <img></img>
B. groups multiple sources for the same image
C. allows the user to draw a picture
D. allows JS to draw a picture
E. enables AVIF</picture>

A

B. groups multiple sources for the same image

218
Q

What is the worst HTTP method for performance?
A. GET
B. HEAD
C. POST
D. PUT
E. DELETE
F. PATCH

A

C. POST

219
Q

What is the best HTTP method for performance?
A. GET
B. HEAD
C. POST
D. PUT
E. DELETE
F. PATCH

A

B. HEAD

220
Q

Which came first?
A. Multiple script tags
B. CommonJS
C. ES Modules

A

A. Multiple script tags

221
Q

Which came second?
A. Multiple script tags
B. CommonJS
C. ES Modules

A

B. CommonJS

222
Q

Which of the following is used in the browser?
A. Multiple script tags
B. CommonJS
C. ES Modules

A

A. Multiple script tags
C. ES Modules

223
Q

Which is used mostly for Node servers?
A. Multiple script tags
B. CommonJS
C. ES Modules

A

B. CommonJS

224
Q

Which has the best async support?
A. Multiple script tags
B. CommonJS
C. ES Modules

A

C. ES Modules

225
Q

Websockets communications come in big units called…
A. messages
B. packets
C. frames

A

A. messages

226
Q

Messages are broken into smaller units called…
A. messages
B. packets
C. frames

A

C. frames

227
Q

Websocket frames can send…
A. binary
B. text
C. binary or text

A

C. binary or text

228
Q

Text frames are encoded with…
A. UTF-8
B. ISO 8859-1
C. CP 457

A

A. UTF-8

229
Q

Why do websockets scramble the data sent over?
A. to slow down the connection
B. to make sure the data stays correct
C. authentication
D. avoid confusing old proxies and servers

A

D. avoid confusing old proxies and servers

230
Q

True/False: Multiple websocket messages can be transferred at once

A

True

231
Q

Which side must initially connect the websocket?
A. Client
B. Server
C. Proxy

A

A. Client

232
Q

Full duplex means…
A. there’s two ends in a communication
B. each connection is split into priority and normal traffic
C. both sides can talk at the same time

A

C. both sides can talk at the same time

233
Q

Which of these is NOT full duplex?
A. TCP
B. UDP
C. QUIC
D. HTTP 1
E. HTTP 2 & 3
F. Websockets

A

D. HTTP 1