1.
_________________ are networks that connect people within a company to each other and to the company network.
Correct Answer
B. Intranets
Explanation
Intranets are networks that connect people within a company to each other and to the company network. They are private networks that are accessible only to authorized individuals within the organization. Intranets are used for internal communication, collaboration, and sharing of resources within a company. They provide a secure and controlled environment for employees to access company information, documents, and applications. Intranets are an essential tool for improving communication and efficiency within an organization.
2.
When preparing a website, designers should ensure that the site enables user-to-user communication. This design feature is known as __________________.
Correct Answer
A. Community
Explanation
When preparing a website, designers should ensure that the site enables user-to-user communication. This design feature is known as "community". By allowing users to interact with each other, share information, and engage in discussions, the website fosters a sense of community among its users. This can lead to increased user engagement, loyalty, and a more vibrant online environment.
3.
When preparing a website, designers should ensure that the site makes effective use of the text, pictures and video. This design feature is known as _________.
Correct Answer
D. Content
Explanation
The design feature that ensures effective use of text, pictures, and video on a website is known as "content." Content refers to the information and media elements that are presented on a website, including text, images, videos, and other multimedia. It is important for designers to create engaging and informative content that effectively communicates the message of the website to the users.
4.
The internet relies on ______________ technology to deliver data and information across networks.
Correct Answer
C. Packet switching
Explanation
Packet switching is the correct answer because it is the technology used by the internet to deliver data and information across networks. In packet switching, data is divided into small packets and each packet is sent separately across the network. These packets can take different paths to reach their destination and are reassembled at the receiving end. This method allows for efficient and reliable transmission of data over the internet.
5.
Routers are used:
Correct Answer
C. To interconnect independent networks
Explanation
Routers are used to interconnect independent networks. They act as a gateway between different networks, allowing data packets to be transmitted between them. Routers analyze the destination address of each packet and determine the most efficient path for it to reach its destination. This enables communication and data exchange between networks that may have different protocols or architectures. Unlike computers or web servers, routers do not display or host web pages themselves. Their primary function is to facilitate network connectivity.
6.
A ______________ is a term that helps people recognize the company or person that domain name represents.
Correct Answer
A. Domain name
Explanation
A domain name is a unique identifier that helps individuals identify and remember the company or individual associated with a particular website. It is the address used to access a specific website on the internet and is crucial for establishing an online presence. A domain name is easier for people to remember and recognize compared to an IP address, making it an essential component of a website's branding and identity.
7.
The ______________ provides central maintenance of the DNS root database.
Correct Answer
B. Internet registry
Explanation
The Internet registry is responsible for the central maintenance of the DNS root database. This means that it manages and updates the information in the root database, which is essential for the functioning of the Domain Name System (DNS). The DNS is responsible for translating domain names into IP addresses, allowing users to access websites and other online resources. The Internet registry plays a crucial role in ensuring the accuracy and availability of this vital infrastructure.
8.
The internet follows a ______________ structure.
Correct Answer
C. Hierarchical
Explanation
The internet follows a hierarchical structure because it is organized in a layered and structured manner. At the top, there are a few main servers that control the entire network, and these servers are connected to smaller servers, which in turn are connected to individual devices. This hierarchical structure allows for efficient routing of data and ensures that information can be accessed and shared across the network in a systematic way.
9.
______________ is the region with the largest number of Internet users.
Correct Answer
B. Asia
Explanation
Asia is the region with the largest number of Internet users. This is because Asia has the highest population in the world, with countries like China and India having large populations. As a result, the number of Internet users in Asia is significantly higher compared to other regions. Additionally, Asia has seen rapid economic growth and technological advancements, leading to increased access to the Internet and a higher number of users.
10.
Which of the following is NOT a popular e-mail application?
Correct Answer
B. Mozilla Firefox
Explanation
Mozilla Firefox is a web browser, not an email application. It is known for its browsing capabilities, not for sending or receiving emails. Outlook Express, Mozilla Thunderbird, and Apple Mail, on the other hand, are all popular email applications that allow users to manage their emails.
11.
Links to other documents on the web are called:
Correct Answer
A. Hyperlinks
Explanation
Hyperlinks are the correct answer because they are the elements in a web page that allow users to navigate to other documents or web pages by clicking on them. They are typically displayed as underlined or differently colored text or images, and they are an essential component of the World Wide Web. Hyperlinks are used to connect different web pages together, providing a way for users to access related information or resources easily.
12.
DotNetNuke is a:
Correct Answer
A. Web content management system
Explanation
DotNetNuke is a web content management system (CMS) that allows users to easily create and manage websites. It provides a user-friendly interface and a wide range of features for content creation, editing, and publishing. With DotNetNuke, users can easily add and organize web pages, create and manage content, and customize the appearance and functionality of their websites. It is specifically designed for non-technical users, making it a popular choice for businesses and organizations that want to maintain their websites without relying on IT support.
13.
Sharepoint is a product by:
Correct Answer
C. Microsoft
Explanation
Sharepoint is a product developed by Microsoft. It is a web-based collaboration and document management platform that allows organizations to store, organize, share, and access information from any device. With its features like document libraries, workflows, and team sites, Sharepoint enables teams to collaborate effectively and improve productivity. Microsoft has been the sole provider of Sharepoint since its inception, making it the correct answer to the given question.
14.
What are the differences between XML and HTML?
Correct Answer(s)
A. XML was designed to transport and store data, with focus on what data is while HTML was designed to display data, with focus on how data looks
B. XML tags are not predefined. You must define your own tags while HTML tags are predefined
C. XML is an Open data formats while HTML is not
Explanation
XML and HTML have several differences. XML was specifically created for transporting and storing data, with an emphasis on the nature of the data. On the other hand, HTML was designed for displaying data, with a focus on the visual appearance of the data. Additionally, XML allows users to define their own tags, while HTML has predefined tags. Lastly, XML is an open data format, while HTML is not.
15.
Please read the following line of code:
int x=10;
for (i=0; i<5; i++)
{x=x+10*1}
The value of x after exiting the loop will be:
Correct Answer
B. 110
Explanation
The code initializes the variable x with a value of 10. Then, it enters a for loop that iterates 5 times. In each iteration, the value of x is updated by adding 10 multiplied by 1. Therefore, x will be incremented by 10 in each iteration. After the loop completes, x will have a final value of 10 + 10 + 10 + 10 + 10 = 50. However, since the loop condition is "i < 5", the loop will execute one more time before exiting and x will be incremented by 10 again. Therefore, the final value of x after exiting the loop will be 50 + 10 = 60.
16.
Your hard drive is getting a bit full. Which folder is most likely to contain files which can be deleted to make room?
Correct Answer
B. C: \WINDOWS\TEMP
Explanation
The folder most likely to contain files that can be deleted to make room is C: \WINDOWS\TEMP. The TEMP folder is typically used to store temporary files that are no longer needed after a certain task or program is completed. These files can be safely deleted to free up space on the hard drive.
17.
Can you identify what is wrong with the following XML statement:
Correct Answer(s)
A. The tags are NOT properly nested
C. Opening and closing tags must be written with the same case
Explanation
The correct answer is that the tags are NOT properly nested and the opening and closing tags must be written with the same case. This means that the XML statement has tags that are not properly organized within each other, and the opening and closing tags do not match in terms of capitalization. This can cause parsing errors and make the XML statement invalid.
18.
The effect of the following HTML statement is:
Correct Answer
A. The sentence “This is New York” will be in Bold and Italic
Explanation
The HTML statement that will make the sentence "This is New York" bold and italic is using the and tags together. The tag is used to make the text bold, and the tag is used to make the text italic. Therefore, when both tags are used around the sentence, it will appear in both bold and italic format.
19.
The most effective way to verify back-ups is:
Correct Answer
C. Testing through restoring on a different system
Explanation
Testing through restoring on a different system is the most effective way to verify back-ups. By restoring the back-up on a different system, we can ensure that the back-up is complete and can be successfully restored. This method also helps to identify any potential issues or errors in the back-up process. Reviewing the back-up logs, checking the size of the back-up file, and using the back-up tool integrity checker can provide some level of verification, but they may not guarantee the reliability and completeness of the back-up.
20.
A software requirements specification is:
Correct Answer(s)
A. A contract between developers and clients specifying what the developers will produce for the clients
C. A specification of the features that the target software deliverable must have
Explanation
The correct answer is a contract between developers and clients specifying what the developers will produce for the clients. This is because a software requirements specification outlines the specific functionality and features that the software should have, as agreed upon by both the developers and the clients. It serves as a formal agreement between the two parties, ensuring that the developers understand the clients' needs and expectations, and that the clients receive the desired software product.
21.
A primary key in a table:
Correct Answer(s)
A. Uniquely identifies each row in the table
C. Cannot contain NULL values
D. Can be created from one or more columns
Explanation
A primary key in a table uniquely identifies each row in the table. This means that each value in the primary key column(s) is unique and no two rows can have the same value in the primary key column(s). Additionally, a primary key cannot contain NULL values, meaning that every row must have a value in the primary key column(s). Furthermore, a primary key can be created from one or more columns, allowing for more complex primary keys that consist of multiple columns.
22.
The SQL statement...
SELECT column_name(s)
FROM tableA
LEFT JOIN tableB
ON tableA.column_name=tableB.column_name
...will return:
Correct Answer
A. Returns all rows from the left table (tableB), even if there are no matches in the right table (tableA)
Explanation
The given SQL statement will return all rows from the left table (tableB), even if there are no matches in the right table (tableA). This is because the LEFT JOIN keyword is used, which ensures that all rows from the left table are included in the result set, regardless of whether there is a match in the right table. If there is no match, NULL values will be returned for the columns of the right table.
23.
One of the users has been requested to change their computer password. Which password has a combination of characters as required by UN OICT?
Correct Answer(s)
C. P@ssWord2
D. PassWord2
Explanation
The correct answer is "p@ssWord2" and "PassWord2" because they both have a combination of characters as required by UN OICT. The password should contain a combination of uppercase and lowercase letters, as well as special characters. Both "p@ssWord2" and "PassWord2" meet this requirement by having a mix of lowercase and uppercase letters, as well as the special character "@" in "p@ssWord2".