You are managing an IT project, and you need information about customer preferences. Which of the following stakeholders is best to provide this information?
Your supervisor directs you to make static IP address assignments on the workstations in your office. Your workstations are part of a company WAN that also connects directly to the Internet. What information must you have in order to complete this assignment?
Which of the following is required for a wireless network to run in infrastructure mode?
Luis uses JavaScript code in his Web site's home page. The script notifies Microsoft Internet Explorer 5.0 users of a possible usability problem. What does this script do?
As an IT professional, you must always consider the Return on Investment (ROI) impact that IT projects have on your organization. You may be required to justify a project's benefits relative to its cost. What must you do to relate such information about IT projects to upper managers?
Web pages with content that flashes, flickers or strobes can cause accessibility problems for which type of users?
You received an e-mail message from a co-worker. It includes a .zip file as an attachment. The e-mail message explains that the attachment updates a critical flaw in the operating system and provides detailed instructions for installing the program. Which step should you perform first?
Which of the following is the most popular protocol that provides authentication and encryption for secure exchanges over the Internet?
Which of the following accurately describes a difference between GIF images and JPEG images?
Mike has implemented an IP telephony system for his company. Employees now use this system for their telephone calls. Which of the following is true regarding Voice-over-IP (VoIP) telephone conversations?
In Cascading Style Sheets (CSS), which type of style sheet uses the @ ("at") symbol?
You are a help desk technician. An end user is experiencing a technical problem and does not know enough about the problem to describe it clearly. What should you do?
Which term describes the activity of a hacker who travels through a neighborhood or business district trying to discover unsecured wireless networks?
You want to find information about Java. You visit a popular search engine and manually search through a directory tree of topics until you find a directory titled "Computers" and a subdirectory titled "Programming Languages." You select the topic "Java" and look through a list of indexed pages on that topic, then choose one page with which to begin your research. Which type of search index did you use?
You received the following file attachments in e-mail messages from unknown sources. Which is the most likely to contain a computer virus?
Which port does a Domain Name System (DNS) server use to listen for client queries?
As the marketing director for Hot Chocolates Inc., you want to distribute timely information to customers about your company's products. You want to send product announcements via e-mail to customers who are interested in receiving this information. Which is the best way to distribute this information?
When creating its Web presence, a business should choose its domain name carefully so that users will be able to recall it easily. Every domain name is unique. With which of the following must each domain name be registered?
Luis uses JavaScript code in his Web site's home page. The script notifies Microsoft Internet Explorer 5.0 users of a possible usability problem. What does this script do?
Which device contains a transceiver, is responsible for transmitting and receiving only digital network signals, and can be attached to a workstation via various methods, including Universal Serial Bus (USB) and Peripheral Component Interconnect (PCI)?