Pre-Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

1D0-510 Exam Dumps - CIW v5 Founfations Exam

Question # 4

Luis uses JavaScript code in his Web site's home page. The script notifies Microsoft Internet Explorer 5.0 users of a possible usability problem. What does this script do?

A.

Creates a cookie and redirects users to another page

B.

Creates a variable and redirects users to another page

C.

Performs server-side browser detection and creates a pop-up window alert

D.

Performs client-side browser detection and creates a pop-up window alert

Full Access
Question # 5

The XHTML 1.0 Recommendation describes three variations or "flavors." Which of the following best describes the XHTML 1.0 Transitional flavor and its requirements?

A.

Developers must use Cascading Style Sheets (CSS) for all formatting.

B.

Developers can use any markup tags that were supported in HTML Recommendations 1.0 or later.

C.

Developers can use either Cascading Style Sheets (CSS) or HTML 4.0-compliant markup tags for all formatting.

D.

Developers must use Cascading Style Sheets (CSS) for all formatting and use frames with XHTML 1.0-compliant markup tags.

Full Access
Question # 6

Which IP address class uses 8 bits for the network portion of the address and 24 bits for the host portion of the address?

A.

Class A

B.

Class B

C.

Class C

D.

Class D

Full Access
Question # 7

Which common peripheral connection port can support up to 127 peripherals, and support speeds of up to 480 Kbps?

A.

USB 1.0

B.

USB 2.0

C.

FireWire

D.

Game Port

Full Access
Question # 8

Lo-An creates a Web site that discusses Internet technologies. Her Web site pages use her own XHTML code and design template, and her original text, digital artwork and music. As you review Lo-An's site, you should assume that her copyright protection covers:

A.

the XHTML tags used in her page code.

B.

all of the content presented on her Web site.

C.

the color combinations used in her site design.

D.

the technology concepts that her site discusses.

Full Access
Question # 9

Which term describes the permission agreement that determines the way a vendor's software may be used?

A.

License

B.

Protocol

C.

Copyright

D.

Trademark

Full Access
Question # 10

Because the Internet has experienced tremendous growth, a new protocol has been developed to accommodate Internet address shortages. What is the name of this improved protocol?

A.

IPv6

B.

IPv2

C.

HTTPS

D.

TCP/IPv2

Full Access
Question # 11

James created an XHTML table to show his schedule for each week of the month. He organized the table in a standard calendar format, so that each day from Sunday to Saturday is the header for a vertical column, and each week of days is displayed horizontally as a row. Each scheduled activity appears in the table cell appropriate for the day it occurs. James wants to merge two table cells into one cell to show the IT Business Conference that he will attend from Tuesday to Wednesday in the third week. Which tag should James use for this merged cell?

A.

B.

C.

D.

Full Access
Question # 12

You are a help desk technician. An end user is experiencing a technical problem and does not know enough about the problem to describe it clearly. What should you do?

A.

Review the user's product manual with him to help him understand the technical issues.

B.

Inform the user that he needs to bring the system to you so you can assess the technical situation yourself.

C.

Explain to the user that until he can accurately describe the problem, you are unable to troubleshoot the system.

D.

Request additional specific information from the user so you can troubleshoot the problem and provide an appropriate solution.

Full Access
Question # 13

In XHTML, what is one of the functions of the tag?

A.

To create a data cell in a table

B.

To create a check box in a form

C.

To create a record in a database

D.

To create a scrolling select list in a form

Full Access
Question # 14

Your supervisor directs you to make static IP address assignments on the workstations in your office. Your workstations are part of a company WAN that also connects directly to the Internet. What information must you have in order to complete this assignment?

A.

An IP address for each workstation and the subnet mask

B.

An IP address to be shared by all workstations and the subnet mask

C.

An IP address for each workstation, the default gateway address and the subnet mask

D.

An IP address to be shared by all workstations, the default gateway address and the subnet mask

Full Access
Question # 15

Each system in a TCP/IP network must be configured with an IP address and a subnet mask. The subnet mask identifies what parts of an IP address?

A.

Source and destination

B.

Loopback and broadcast

C.

The number of bytes per field

D.

Network portion and host portion

Full Access
Question # 16

Which of the following is the most popular protocol that provides authentication and encryption for secure exchanges over the Internet?

A.

Secure Sockets Layer (SSL)

B.

Public Key Infrastructure (PKI)

C.

Electronic Data Interchange (EDI)

D.

Secure Electronic Transactions (SET)

Full Access
Question # 17

Which diagnostic tool would you use to determine the physical (MAC) address to systems that you have recently connected with?

A.

arp

B.

netstat

C.

nbtstat

D.

tracert

Full Access
Question # 18

Which choice lists the entities most often used to spread viruses?

A.

End users and database servers

B.

Computer files and DHCP servers

C.

Removable disks and e-mail servers

D.

Weak passwords and directory servers

Full Access
Question # 19

Which choice lists connection types in the correct sequence by speed of transmission, from the slowest connection type to the fastest?

A.

Dial-up, DSL, E1, T1

B.

Dial-up, ISDN, T1, E1

C.

Dial-up, ISDN, T1, DSL

D.

ISDN, dial-up, T1, fiber-optic

Full Access
Question # 20

Which type of encryption uses a pair of keys, in which one key is used to encrypt information and the other key is used to decrypt that information?

A.

Hash encryption

B.

One-way encryption

C.

Symmetric encryption

D.

Asymmetric encryption

Full Access
Question # 21

What is an intranet?

A.

A searchable internal repository that stores an organization's proprietary documents

B.

A worldwide network available to anyone who has a TCP/IP connection on a computer

C.

A TCP/IP-based network accessible only by an organization's members and employees

D.

A TCP/IP-based network accessible only by an organization's internal employees and select external clients

Full Access
Question # 22

Which of the following IP addresses is invalid?

A.

224.199.23.3

B.

24.256.54.255

C.

177.138.23.89

D.

182.255.254.115

Full Access
Question # 23

Which protocol is used to transmit files across the Web to be rendered by a Web browser?

A.

Internet Protocol (IP)

B.

Hypertext Transfer Protocol (HTTP)

C.

Transmission Control Protocol (TCP)

D.

Point-to-Point Tunneling Protocol (PPTP)

Full Access
Question # 24

Which term describes a server at the highest level of the Domain Name System (DNS)?

A.

Master

B.

Primary

C.

Top level

D.

Root level

Full Access
Question # 25

Changes in project scope tend to occur:

A.

only in large corporate projects.

B.

in small rather than large increments.

C.

in large rather than small increments.

D.

only in software development projects.

Full Access