100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

DIT CERTIFICATION TEST PRACTICE, Questions and answers, 100% Accurate, Graded A+

Rating
-
Sold
-
Pages
15
Grade
A+
Uploaded on
12-02-2023
Written in
2022/2023

DIT CERTIFICATION TEST PRACTICE, Questions and answers, 100% Accurate, Graded A+ What is cloud computing? - -the practice of using a network of remote servers hosted on the Internet to store, manage, and process data, rather than a local server or a personal computer. What is ontology? - -The study of how a particular knowledge domain, or system, is organized. An ontology is the product of an ontological study. what is the job of a network engineer? - -To focus on the design, implementation, delivery and support of network components, policies and procedures used by an organization. Network engineers are responsible for configuring and testing network devices, and setting up and maintaining the network infrastructure. What is MTA? - -A messaging component that routes, delivers and receives e-mail. Whats is a MDA (Mail Delivery Agent)? - -An e-mail server program that receives sent messages and delivers them to their proper destination mailbox. What does POP3 servers do? - -POP3 servers receive and hold incoming e-mail messages in the appropriate mailbox on the server until users log on (authenticate themselves with a user name and password) and download their mail. Once messages are downloaded, they are removed from the server what do IMAP servers do? - -IMAP server receives and holds your messages. When you log on with your user name and password, you can read a message on the server, or you can view just the heading and the sender of the message and decide whether to download it. what is a mail client also refered to as? - -MAIL USER AGENT Because file attachments may contain malicious code that can be used to damage or infiltrate systems, your company routinely scans all file attachments in incoming e-mail. Where does attachment scanning take place? - -At the server, usually just after the message has been received via SMTP A domain name consists of letters (and sometimes numbers) separated by periods. Which of the following is the host name component of a domain name? - -The left-side component of the domain name, which categorizes domains into groups by server name Which of the following is a Web-based seminar or training session that is typically interactive, enabling participants to communicate with the presenter and with each other via online chat? - -Web conference Kim is using the YouTube graphics-editing application that she accesses via the Internet through her browser. Kim does not own the application, nor can she download it. She is able to use the application any time she needs to edit graphics. Although she does not have to pay for the access, she does notice advertisements, which appear on the sidebar of the application's interface. The application Kim is using may be classified as which of the following? - -Software as a Service (SaaS) Cloud computing is a computing paradigm in which? - -users are able to access software and services run by servers that reside on the Internet. Cloud computing is software services that are provided over the Internet. Which of the following IT job roles should be most familiar with cloud computing software, infrastructure and platform services? - -Server administrator What is restricted from downloading to the user's system when you configure browser security levels? - -active content Which of the following is true regarding smartphones and PIM applications? - -Smartphone PIM applications are designed to work in tandem with traditional desktop or laptop computers. What could be a disadvantage for you to choose open-source, and thus a compelling enough reason to purchase the licensed software instead of using the open-source solution? - -Maintenance of an open-source solution relies on developers who volunteer to work on the code. What term is used to describe a software application that is secretly placed on a user's system to gather information and relay it to outside parties, usually for advertising purposes? - -Spyware How many mail servers does the use of e-mail involve? - -Two -- incoming mail is handled by one server using Post Office Protocol (POP) or Internet Message Access Protocol (IMAP), and outgoing mail is handled by another server using Simple Mail Transfer Protocol (SMTP). How does a LAN differ from a WAN? - -A LAN spans a confined geographic area, whereas a WAN consists of multiple LANs. When you sign in to your instant messaging (IM) service, your online status is advertised (or published) to the people on your contacts list. What does this scenario represent? - -Presencing Non-repudiation is the security principle of providing proof that a transaction occurred between identified parties. Which of the following can you use to enforce non-repudiation in an electronic data transfer? - -Digital signiture Which technology can companies use to maximize processing power while protecting privacy and sensitive materials? - -Peer-to-peer networks on the Internet (P2P) Intranets and extranets can both be considered subsets of the Internet. Which statement best describes the difference between intranets and extranets? - -Intranets are used within corporations by employees, whereas extranets are used by corporations for non-public customer support. Pretty Good Privacy (PGP) and Gnu Privacy Guard (GPG) are both used to encrypt? - -e-mail messages and their attachments In contrast to meetings that take place in person, a Webcast offers the advantage of? - -being available for retransmission any time after the original event has taken place. What is the function of a CAPTCHA? - -To differentiate humans from automated senders during online transactions What are applets - -Applets are small programs that can be embedded within web pages to perform some specific functionality, such as computations, animations, and information processing. Applets are written using the Java language. what is relational database - -databases that carry their data in the form of tables and that represent relationships using foreign keys what are the three general types of queries? - --Menu query -Query by example. -Query language What do <meta> tag identifie? - -they identifies data in the following format What is google desinged to do? - -Google's Web search engine is designed to rank the relevance of a particular site according to the keywords entered by the user Using the plus sign (+) before each keyword ensure what? - -to ensure that the keyword it is included in the results. what do web site designers do? - -Web site designers create the "look and feel" that visitors will see when they access a site on the World Wide Web. Web site designers determine the most effective site layouts, color schemes, navigational links and fonts to maintain visitor interest in the site. Site designers primarily establish the organization, mood and tone of the site relative to its content, with input from various parties. What do web application developers use to do their jobs, and what is their job? - -Web application developers use Web programming languages or products to develop Web sites, generally for Web server applications. Web application developers design, build and test the Web pages and hyperlinks that form the site. Web application developers must be proficient in programming and scripting languages such as Java, JavaScript, C++, Perl and others. What are website architects responsible - -the overview plan of a Web site's development. They consult with management and Web site users to design and implement the plan for developing and maintaining an organization's Web site. They often manage Web site designers and Web application developers to design, develop, document and maintain an organization's Web presence what are database administrators responsibele for? - -Database administrators are responsible for the maintenance and security of an organization's database resources and data. They are also responsible for researching and analyzing the latest database technologies and developments, and for providing recommendations to senior management about database use and information management procedures and standards. who are Business intelligence analysts - -Individuals who are experts at mining databases for information, then creating functional specification documents based on this data to help a business create solutions for its customers. These individuals manage data miners. whoa are Database security engineer - -individuals tasked with ensuring that databases are being accessed only by properly authenticated users. Also includes those who understand how to recover data in case of a man-made or natural disaster what are relative URLs - -gives a path to a resource using the current page as an origin. In a relative URL, the system root is implied but not specified. The part of the browser responsible for reading and processing programming languages - -Interpreter Which programming method isolates a particular application or process. - -Sandbox What is a thread - -An instruction from a running application that executes a particular task What si it called If the text on an older screen is unreadable - -Poor rendering What is a cookie - -A text file that contains information sent between a server and a client to help maintain state and track user activities. Cookies can reside in memory or on a hard drive. what URL includes a path past the domain into the folder structure of a Web site. - -Deep URL which object-oriented programming languge is based of of "C" - -C++ Which object-oriented language developed by Sun Microsystems - -Java Which of the following can be considered an advantage of Web-based e-mail? - -You can log on and check your e-mail from any computer that has Internet access. The commonplace use of e-mail has given rise to the term "snail mail," which is a slang term for what? - -Standard postal service What is considered the de facto standard communication tool for business? - -Electronic mail (e-mail) Which of the following is a protocol that can be used by applications to automatically process files downloaded from the Internet? - -Multipurpose Internet Mail Extensions (MIME) What is the term for an internal network designed to provide access to selected external users? - -Extranet You can improve the quality of a product by - -providing independent verification that project tasks were completed correctly and adhering to ISO 9000 standards. What is the main difference between intranets/extranets and the Internet? - -Intranets and extranets exclude the general Internet public Which term describes profit earned as a result of a project relative to the value of the resources required to complete the project? - -Return On Investment (ROI)

Show more Read less
Institution
DIT CERTIFICATION
Course
DIT CERTIFICATION









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
DIT CERTIFICATION
Course
DIT CERTIFICATION

Document information

Uploaded on
February 12, 2023
Number of pages
15
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • questions and answers
  • manage

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
QuickPass Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
410
Member since
3 year
Number of followers
304
Documents
6372
Last sold
1 week ago
Get all Documents you need at discount.

All nursing docs available: question banks, summaries, study guide and test banks

3.8

97 reviews

5
52
4
11
3
10
2
10
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions