Solutions 100% Solved
Which term is used to describe a program that appears to be harmless but actually produces
malicious or harmful results? Trojan
You are performing a keyword search with your browser. Which strategy should you use for the
keywords you choose? Use mostly nouns rather than verbs.
Which cookie type remains on your system after you end your browser session? Persistent
cookie
What distinguishes a worm from a virus? A worm is capable of replicating itself
automatically while affecting data.
When Web users enter the URL www.CIWcertified.com in their browser address bar, they can
access the official CIW Web site at the IP address 72.44.192.233. Which technology enables
users to do this, instead of having to remember and enter the IP address? DNS
Which TCP/IP troubleshooting command should you use to determine whether a client and
server are communicating with each other? The ping command
, Ciw Practice Exam 50 Questions With
Solutions 100% Solved
The graphics you are probably most familiar with, GIFs and JPEGs, are raster graphics. What are
raster graphics? Images that map bits directly to a display space
How is IPv6 able to offer more Internet addresses than IPv4? By using 128-bit IP
addresses
Which statement about compressing JPEG files is true? The more compression, the
smaller the file size, but the lower the image quality.
Which IT job role best describes an individual who installs, modifies and repairs personal
computer hardware components? PC repair technician
You have been contracted to write an article about social networks for a magazine. You have
finished writing the article and are ready to send your draft to the magazine editor. Which is the
most appropriate way to do this? E-mail
Which result reflects an IT project that is poorly managed? Project tasks take longer to
complete, requiring more company resources and money.