Question 21
By default, most wireless networks are ____.
a. |
secured by WEP |
|
b. |
password-locked |
|
c. |
secured by WPA or WPA2 |
|
d. |
left unsecured |
1 points
Question 22
Choosing Image Editing and Illustration Programs
a. |
non-lossy |
|
b. |
linear |
|
c. |
bitmap |
|
d. |
vector |
1 points
Question 23
Computer-generated graphics come in two varieties: ____ and vector.
a. |
linear |
|
b. |
raster |
|
c. |
angular |
|
d. |
digital |
1 points
Question 24
Currently, WWANs provide wireless connections to the Internet using ____ networks created by cellular phone carriers.
a. |
1G, 2G, and 3G |
|
b. |
3G only |
|
c. |
3G and 4G |
|
d. |
none of the above; WWAN doesn’t work with cellular technology |
1 points
Question 25
Disabling the SSID broadcast of a network makes that network ____ to roaming devices.
a. |
invisible |
|
b. |
not able to connect |
|
c. |
WPA-enabled |
|
d. |
attractive |
1 points
Question 26
Each manufacturer of network interface cards adds a(n) ____ to identify the device.
a. |
Ethernet port |
|
b. |
Media Access Control address |
|
c. |
WiMAX account |
|
d. |
wireless mesh |
1 points
Question 27
Encryption keys are generally ____ or ____ bits long.
a. |
16, 64 |
|
b. |
64, 256 |
|
c. |
128, 256 |
|
d. |
64, 128 |
1 points
Question 28
HTML quickly evolved through specifications that are the result of the collective work of the organization known as the ____.
a. |
T3C |
|
b. |
W3C |
|
c. |
Net Referral Union |
|
d. |
web Roots |
1 points
Question 29
HTML specifications that are not included when newer specifications are released or are not included in the XHTML specification are referred to as ____.
a. |
obsolete |
|
b. |
web-safe |
|
c. |
deprecated |
|
d. |
variant |
1 points
Question 30
If you are using Notepad as your text editor and the text does not wrap to the next line in the program window, click ____ on the menu bar, and then click Word Wrap to place a check mark next to it.
a. |
View |
|
b. |
Options |
|
c. |
File |
|
d. |
Format |
1 points
Question 31
If you change the default name of the wireless router or access point, you also prevent unknown users from detecting your network by attempting to randomly connect to a wireless network using a manufacturer name or the word “____” as an SSID.
a. |
home |
|
b. |
secured |
|
c. |
default |
|
d. |
unsecured |
1 points
Question 32
If you have both WPA and WEP available to you, your system will be most secure if you use ____.
a. |
both a and b |
|
b. |
WPA only |
|
c. |
WEP only |
|
d. |
neither a nor b |
1 points
Question 33
If you need to add more items to a bulleted list, you add them using the ____ tag(s).
a. |
<bull> and </bull> |
|
b. |
<l> and </l> |
|
c. |
<li> and </li> |
|
d. |
<ul> and </ul> |
1 points
Question 34
In a(n) ____ attack, a hacker sets up a computer to act as a legitimate access point, and then steals personal information from users trying to connect to it.
a. |
evil twin |
|
b. |
over-the-shoulder |
|
c. |
Bluebugging |
|
d. |
denial-of-service |
1 points
Question 35
JavaScript is a(n)____ language that is executed by a web browser.
a. |
add-on |
|
b. |
HTML |
|
c. |
self-contained |
|
d. |
scripting |
1 points
Question 36
Most browsers underline hyperlinks and display them in a(n) ____ font.
a. |
large |
|
b. |
blue |
|
c. |
flashing |
|
d. |
italicized |
1 points
Question 37
Most scripts are enclosed in HTML ____ tags so browsers that cannot execute the script will ignore the script.
a. |
paragraph |
|
b. |
body |
|
c. |
comment |
|
d. |
JS |
1 points
Question 38
One of the most serious mistakes that home users make when installing a wireless network is ____.
a. |
failing to change the default login for the device |
|
b. |
failing to register the device with the manufacturer |
|
c. |
using both letters and numbers in their SSID name |
|
d. |
sharing their SSID name with friends and family |
1 points
Question 39
Search engine ____ is the process of submitting your site’s URL to one or more search engines so they will list your site in their indexes.
a. |
optimization |
|
b. |
submission |
|
c. |
spamming |
|
d. |
none of the above |
1 points
Question 40
Security experts warn against ____ in public places.
a. |
online banking |
|
b. |
checking e-mail |
|
c. |
online shopping |
|
d. |
all of the above |
Q21
Most networks are left unsecured.
Q23
Computer graphics are raster and vector
Q25
It makes the device invisible to roaming devices
Q27
Encryption keys are generally 64,128 bits long
Q30
Under format option in menu bar there is word-wrap which can be used
Q33
We add items to list using li tag
Q35
Javascript is a scripting language
Q37
Most scripts are included as HTML comments
Q38
Most users fail to change the default login
Q39
None of the above is correct
Q40
Online banking should be avoided in public places
Do give a thumbs up and in case there are doubts leave a comments.
Get Answers For Free
Most questions answered within 1 hours.