CIW IBA FINAL REVIEW Question Preview (ID: 50132)


Final Review For The CIW IBA TEST. TEACHERS: click here for quick copy question ID numbers.

When you sign in to your instant messaging (IM) service, your online status is advertised (or published) to the people on your contacts list. What does this scenario represent?
a) Presencing
b) Convergence
c) Mobile computing
d) Unified communications (UC)

You recently returned from a vacation and you want to share some photos with your co-workers. You would like to share these photos via email. What should you consider when attaching several high-resolution photos to an email message?
a) Security
b) Privacy
c) File size
d) Transmission speed

You want to give your Website users the ability to view high-quality video. Connection speed is not an issue. Which file format could you use?
a) WAV
b) PDF
c) AVI
d) MPEG

A critical first step in the initiating phase of a project is to conduct a needs analysis, which:
a) identifies the goals and tasks of a project, and the work required to complete them.
b) identifies the requirements for each project task to ensure that the project objectives are met.
c) identifies the problems or desires that the project must resolve or address.
d) identifies the planned dates for performing tasks and meeting goals defined in a project plan.

Bob opened an email attachment and it launched a virus. The virus took control of his system, and now he is unable to run his anti-virus software. What should he do next?
a) Call his local authorities to report computer fraud.
b) Turn off his computer and reboot from a clean system disk.
c) Let the virus run and hope that the damage is minimal.
d) Attach his backup drive and try to back up important files as quickly as possible.

Ken needs a catchy name for his new online business. He decides to launch a public contest through his social networking accounts to seek lots of creative ideas for his business name. Which term describes the use of the Internet in this manner?
a) Social engineering
b) Folksonomy
c) Crowdsourcing
d) Tagging

In a relational database, what distinguishes a primary key from other database components?
a) The primary key can contain duplicate data in the field.
b) The primary key can be found only in a junction table.
c) The primary key is always the first field in a database table.
d) The primary key uniquely identifies each record in a database table.

Why does an IT project manager need to consider a project's Return On Investment (ROI) before starting a new project?
a) Before starting a project, an IT project manager must make sure that sufficient funds exist to complete the project.
b) Before starting a project, an IT project manager will be required to justify the project's benefits relative to its costs.
c) Before starting a project, an IT project manager must convince management that the product or service will result in a negati
d) Before starting a project, an IT project manager must convince management that a product or service will lead to productivity

Lisa is configuring an email client to connect to her email account. Which of the following is required to set up the email account?
a) An FTP server address
b) A DNS server address
c) A POP3 address
d) An HTTP address

You were replying to email when suddenly your computer started to display random messages, and stopped responding to keyboard and mouse input. You suspect that you accidentally downloaded a virus. Which of the following actions most likely cause this
a) You sent an email message with an attachment to a co-worker.
b) You opened an email attachment.
c) You logged in to your company's portal.
d) You printed a file that was stored on your hard drive.

You work for your company's IT department diagnosing and servicing the A user complains that since she has been conducting a lot of research online, performance is slowing. You increase the size of her browser cache. Why will
a) Because the browser must search through possibly tens of thousands of cached files to locate a specific page
b) Because a small cache size may slow other computer processes, such as disk defragmentation and virus scans
c) Because it will take longer to complete cache maintenance tasks when the user quits the browser
d) Because the user must wait for pages to be loaded from the server, instead of retrieving them from the cache

You are performing a keyword search with your browser. Which strategy should you use for the keywords you choose?
a) Use mostly verbs rather than nouns.
b) Use as few keywords as possible.
c) Use mostly nouns rather than verbs.
d) Include at least one preposition such as the or an.

As an IT professional, which is the most important reason for you to develop and use good communication skills?
a) Because you must communicate literately in IT newsgroup discussions
b) Because you will need to represent technical issues to a non-technical audience
c) Because your social network is an important resource in a job search
d) Because you must discuss your project tasks with other members of your IT team

If your organization's server is running Microsoft Internet Information Services (IIS), which browser choices should your IT department consider implementing?
a) Windows Internet Explorer
b) Opera
c) Apple Safari
d) Mozilla Firefox

The receptionist has had several problems with malware recently. The receptionist does not need to access external Websites to perform his job, but he does use his computer for company documentation and internal communication with co-workers. Which o
a) Examine the cached files from the Internet on this employee's computer.
b) Restrict this employee's access to the Internet.
c) Audit the contents of this employee's hard drive.
d) Monitor the messages this employee sends and receives via email.

You have been granted a software patent for your new software application. This means that:
a) users can use your application only if you grant them a license to do so.
b) the software is protected by an exclusive trademark.
c) the cost of the software will be less than if you had not received a patent for it.
d) users do not need to pay you a royalty in order to use the software.

SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are two common protocols used to secure Internet communication exchanges. Which of the following is true about SSL and TLS?
a) SSL is the successor to TLS and has become more common.
b) TLS and SSL are deprecated protocols that have been replaced by HTTPS.
c) TLS and SSL are newer protocols that have replaced HTTPS.
d) TLS is the successor to SSL and has become more common.

In many cases, project teams are created and developed with people who have different perspectives and priorities. Why is it important for a project manager to have the ability to develop and manage teams?
a) To help team members clearly define the project objectives
b) To help team members complete the project schedule within the project constraints
c) To help team members determine the tasks, time and cost required to complete a project
d) To help team members evaluate the condition of a project and communicate project data effectively

Computer viruses ca You can protect your system against viruses by using commercial virus-detection software to find and defeat viruses. Because new viruses are created so rapidly, what must you do to ensure that your anti-virus software will protect
a) Install at least two different anti-virus programs and alternate their use randomly.
b) Install anti-virus software program updates to keep the signature profiles current.
c) After you install the anti-virus software, scan your system at least weekly.
d) After you install the anti-virus software, scan your system every day.

You want to share samples of your work on your Website for potential new customers to review. You convert the file format of your designs so that customers can view accurate renderings of them, regardless of the local operating system.
a) OGG
b) DOC
c) MP3
d) PDF

Play Games with the Questions above at ReviewGameZone.com
To play games using the questions from above, visit ReviewGameZone.com and enter game ID number: 50132 in the upper right hand corner or click here.

TEACHERS / EDUCATORS
Log In
| Sign Up / Register