HTML Test Extra Credit 5 points each
 
 

 

1. What is the correct definition of a block level tag?
A. a HTML element that affects one or more paragraphs
B. it affects an individual character or word.
C. it doesn’t require a paragraph break before the tag is used.
D. it creates a table border.

2. Which URL is the best example of a fully qualified URL?
A. FTP: //FPP.brebru.com/examine.exe
B. /private/brebru.com/examine.exe
C. HTTP://www.brebru.com
D. brebru.html

 

3. Which of the following choices is an example of country level domain?
A. EDU
B. CA
C. INT
D. MIL

4. You receive an e-mail message from a friend that contains a zip file. You open the file and later notices that your e-mail application has sent a copy
of that zip to each person in your address book. What event has most likely occurred?
A. You have accidentally sent a mass e-mail to every one in his address book.
B. A virus has infected your computer.
C. A hacker has taken over your computer.
D. Your e-mail application has malfunctioned and must be replaced.

5. Which of the following is an example of a browser plug in?
A. RealAudio
B. Netscape Navigator
C. Microsoft Windows
D. Microsoft PowerPoint

6. Which is the criterion to select an Internet service provider?
A. Proximity to your home.
B. Good technical support.
C. Support for your desired connection type
D. Good online content.

7. You're interested in installing a full text search engine on your
corporate intranet. The IT manager advises against this. For which reason
should you choose not to install a full text search engine?
A. Full text search engines are highly complicated to use.
B. Full text search engines are less time consuming than keyword searches.
C. Full text search engines consume a large number of resources.
D. Full text search enginse are not yet technologically possible.

8. You work in an information technology department for a large company.
A manager in another department tells you that he needs an online forum to discuss issues. Which solution should you implement for the manager?
A. Create a newsgroup that each member of the department can access
B. Write an easy ASP application that allows file sharing.
C. Create an opt-in mailing list for the department.
D. Install an FTP server that can house a shared spreadsheet.

9. You want to buy stock in a company and you need some unbiased
information. Which is the best way to obtain objective information?
A. Visit the company's website.
B. Research the company in a newsgroup.
C. Create a mailing list that sends messages to several employees in the
company asking them for the information.
D. Review the company's stock at Yahoo.com.

10. Which term best describes an older application in which a company organization has already invested time and money?
A. Archived application.
B. Legacy application.
C. Internal application.
D. IT infrastructure.

11. Which of the following best explains how encryption works on the World Wide Web?
A. allows specified user access to web sites that offer online shopping.
B. validates a username and password before sending information across the Internet.
D. encodes information using specific logarithms using a string of numbers
known as a key.
D. works only in transactions processed by UNIX servers.

12. Which IP class allots 8 bits for the network portion of the address and
24 bits for the host portion?
A. Class A.
B. Class B.

13. You're the system administrator for a small company. One morning you notice that one of the accounts on the network is locked out because of multiple login failures.
A. The account was a target of a brute force attack.
B. The account was a target of a spoofing attack.
C. The account was a target of a Trojan horse attack.
D. Your ENTER key is stuck.

14. Your're troubleshooting an ASP script. The system runs as expected
until it tries to access a database server. Which of the following is a
possible reason for this problem?
A. The database server is not configured properly.
B. The script needs to be debugged.
C. you don’t have the permission to execute query on the database server
E. You should switch scripting languages. ASP is not designed to execute
queries on databases.

15. Which hardware device operates at network layer of OSI model?
A. Repeater.
B. Hub.
C. Bridge.
D. Router.

16. You're creating a web page that contains images that uses a proprietary graphic format. How can the client system identify this image type?
A. Create a special extension for the images that is easy to understand.
B. Define a mime type to accommodate the proprietary formats.
C. Convert the graphic to gif before posting it on the web.
D. Ensure that web browsers have correct permission to down load her
graphic type.

17. You're the IT manager for a large company. You receive increasing
numbers of complaints from employees saying that web sites they visit
frequently are not updated in their browser.
A. investigate the company's web server to see if the server interfere
s with the employee's browser.
B. examine the cache settings on the proxy server.
C. examine the certificate server to verify that the company's certificate
is not expired.
D. examine the media server to verify that it’s functioning properly.

18. You frequently use e-mail at work and notice that the delivery time is increasing for messages you sent to people outside of work. What is the
possible cause of the slow delivery time?
A. firewall is the bottleneck for delivery to outside addresses
B. network traffic within the company's LAN is slowing delivery.
C. Other employees are using a different email application
D. Your company's mail server need to be upgraded

19. Which security protocol is a virtual private network liked to use?
A. PPTP.
B. SSL.
C. Frame relay.

20. You must choose a transmission media for a network that is composed of two buildings on the opposite ends of a medium-sized town?
A. Cat4 cable.
B. Cat5 cable.
C. Thinnet coaxial cable.
D. Fiber optic cable.

21. Which of the following is a junction between one high-speed network
and another?
A. Segment.
B. Network access point.
C. Wide area network.
D. Local area network.

22. What is the purpose of channel services unit/data services unit(CSU/DSU)?
A. it enables a computer to communicate with other computers over telephone lines by translating audio signals into digital format.
B. it converts one protocol stack to other.
C. it directs the flow of information from one node to another.
D. it terminates physical data connections.

23. You want to implement frame relay between your company and a business partner. What should you do?
A. Make plans to lay a fiber optic and digital cabling
B. Make plans to lease a T1 line for data transmissions.
C. Make plans to lease a fractional T1 line for data transmission.
D. Contact phone company to connect your office to a frame relay point

24. Which type of DB management system uses structured query language(SQL)?
A. Flat file
B. Hierarchical
C. Network
D. Relational

25. Which is a characteristic of a secure, demilitarized zone?
A. All traffic passes through the bastion that filters packets then
forwards them to the company
B. One company that poses as a firewall component and network interface.
B. All publicly accessible devices including modem pool and other
resources are placed in secure isolated network
D. Hackers can never defeat this type of firewall

26. What is the purpose of a switch?
A. it enables computers to communicate with other computers over phone
lines by translating digital and analog information.
B. it converts one protocol stack to another.
C. it directs flow of information from one node to another.
D. it terminates physical services.

27. To create a hyperlink with a tag, what must be included?
A. The REF attribute.
B. A Uniform Resource Locator (URL).
C. The name attribute.
D. The SRC attribute.

 

28. Which option does a browser software package typically let you customize after you install the browser software?
A. Operating system.
B. Font size.
C. Advertising banners.
D. Sound volume.

29. The staff of your company has grown from 200 to 400 employees. You notice that the download time of web pages has increased significantly. Which is the best solution?
A. Install a gateway.
B. Establish a policy encouraging employees to limit Internet usage.
C. Install a proxy server
D. Install more effective virus protection.

30. Which of the following is a top-level domain in the United States?
A. net
B. mx
C. mart
D. CA

31. Which e-commerce protocol is defined as a standard protocol used to secure online credit card payments on the internet?
A. Electronic Data Interchange (EDI)
B. Secure Electronic Transactions (SET)
C. Open Buying on the Internet (OBI)
D. Hypertext Transfer Protocol (HTTP)

32. What is the best way to test which portions of your web site are popular?
A. Install a hit counter for each page on your site
B. Conduct an online survey asking visitors which portions of the site they prefer.
C. Send e-mail messages to site visitors asking them which portions of the site are most useful.

33. You're troubleshooting the network and need to determine the path between a source and destination computer. Which is the best network diagnostic tool?
A. Ping.
B. Tracert
C. Netstat.
D. Ipconfig.

34. You want to write a script that will perform a series of operations.
Your coworker recommends that you use a Java servlet instead of a CGI
script. What is the advantage of using a servlet in this situation?
A. CGI scripts are used mainly for database access, they do not perform
other actions as effectively.
B. Java servlet allows servlet chaining which allows the output from one
servelt to go to another.
C. CGI scripts are proprietary and may not execute correctly in certain
web browsers.
D. Java servelts are not compiled so they run faster.

35. The ICANN assigns your company the network address 205.34.20.0. Which address can you use for a default subnet mask?
A. 255.255.0.0
B. 255.255.255.255
C. 255.0.0.0
D. 255.255.255.0

36. You notice that you're the only person who can't create files on
shared folder but you can view the files that others have created.
A. ask network administrator to allow execute access
B. ask network administrator to allow full access
C. ask network administrator to allow write access
D. ask network administrator to allow read access

37. According to the HTML 4 recommendation, an HTML tag can consist of several items, all of which are contained within angle brackets <-arrow->.
The main instruction of an HTML tag is usually contained in which item?
A. Element.
B. Attribute.
C. Value.
D. Code.

38. Which statement about the GIF and JPEG file formats is true?
A. Both support image compression.
B. Both support a maximum of 255 colors in one image file.
C. Both are supported in current web browsers.
D. Both formats support transparency.

39. Which of the following best describes an intranet?
A. TCP/IP based network that belongs to an organization, usually a corporation, accessible only by the organization members and employees
B. A worldwide network available to anyone who has a TCP/IP connection on a computer.
C. An external communication mechanism intended to share information with suppliers and external wanders.
D. An internal repository to hold company documents.

40. Which connection medium operates at a maximum speed of 128KBPS?
A. ISDN
B. Ethernet.
C. T1.
D. T3.

41. What method do you use to connect to a text-based application which run
on the server?
A. Gopher
B. Telnet

42. Emploees in your company complaint that it take a long time to update
their e-mail list. Your wants a server that can synchronize all e-mail lists
in your company. Which type of server should you recommend?
A. A proxy server.
B. Directory server?
C. Catalog server.
D. News server.

43. What is a digital certificate?
A. an ID that identify you in the internet
B. a way to secure your computer from hacker
C. a license to run software

44. What is the economic way to upgrade you network system currently using Category 5 cable.
A. install co-axial cable
B. install fibre optic cable
C. install Category 6 cable
D. install wireless network

45.You’re responsible for the Software standard of the new E-Businnes system. An individual keeps implementing software not according to the Company’s standard. How you describe this situation?
A. He’s a Company’s scope creep
B. He helps company to develop new standard
C. He helps to develop the new E-Business system

46.How do you describe a polymorphos virus?
A. A virus can’t been seen in file directory
B. It’s hard to detect because it hides in the text file
C. It works like a macro in Word and anti virus scan only check .exe
D. It performs as different process every tiime when it’s run

47. What is the benefit of smart card?
A. it is a card widely used today
B. it uses a magnetic strip to store information
C. it store more information than any other cards

48. In a HTML table, how do you increase the space between the cell content and the table border?
A. SPACEPADDING
B. Align
C. Center

49. You use Cascade Style Sheet to format Headers on different documents.
What style do you use?
A. inline
B. embedded
C. import
D. external

50. How you describe TCP/IP protocol suite?
A. Transmission travel from computers to computers until it reaches destination
B. It uses a single transmission
C. It uses a single path. It can’t reach destination if one path fails

51. What firewall can block all traffic of entire company?
A. Traffic filtering firewall
B. Proxy server firewall
C. Application firewall

52. How do you describe asymmetric encryption?
A. It use single key for both encryption and decryption
B. The public key is distributed and private key is kept by user

 

53.What technology help developing multi media application?
A. push technology
B. pull technology
C. media access technology

54. How you define an image size of 300X300 pixels image in HTML?
A. height=300 size=300
B. height=”300” width=”300”
C. size=300 height=”300

55. In Javascript, how do you input data into the text area?
A. prompt
B. input
C. read

56. You can’t find the host in your LAN. However, you can ping the printers and the files. Which configuration you should check?
A. TCP/IP
B. Default gateway
C. DHCP server address

 

BreBru.Com Extra Information Techonology HTML