New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

You want to find information about Java. You visit a popular search engine and manually search through a directory tree of topics until you find a directory titled "Computers" and a subdirectory titled "Programming Languages." You select the topic "Java" and look through a list of indexed pages on that topic, then choose one page with which to begin your research. Which type of search index did you use?

A.

Static index

B.

Full-text index

C.

Boolean index

D.

Keyword index

When does a copyright become effective?

A.

When the original content is created

B.

When the original content is the focus of legal contention

C.

When the original content is registered in a UNESCO country

D.

When the original content is registered with the U.N. Copyright Office

While troubleshooting her system's network access, Lisa can ping local and remote systems only by IP address. She has verified the IP configuration information on her system. She has determined that she has valid IP address, subnet mask, default gateway and DNS information. Which of the following is the source of this problem?

A.

DNS server

B.

LDAP server

C.

DHCP server

D.

Default gateway

You have two computers, each with a different operating system. One is a Linux system, which uses the Gnu Public License (GPL). You can use this Linux software free of charge, and you can make changes to code that created the operating system. The other system is a Windows system. Which of the following describes a typical commercial software license?

A.

It describes the right to use the software on a single computer.

B.

It describes the steps you must first perform to install the system.

C.

It allows you to use the software, but does not imply any penalties if you violate the license.

D.

It allows you to make changes to the operating system code, but only if you agree not to redistribute the code.

Which IP address is called the loopback address, and can be used for testing and troubleshooting?

A.

127.0.0.1

B.

10.1.12.251

C.

132.65.18.91

D.

192.23.111.8

Your supervisor directs you to make static IP address assignments on the workstations in your office. Your workstations are part of a company WAN that also connects directly to the Internet. What information must you have in order to complete this assignment?

A.

An IP address for each workstation and the subnet mask

B.

An IP address to be shared by all workstations and the subnet mask

C.

An IP address for each workstation, the default gateway address and the subnet mask

D.

An IP address to be shared by all workstations, the default gateway address and the subnet mask

Which markup language describes document content instead of adding structure or formatting to document content?

A.

XML

B.

WML

C.

HTML

D.

XHTML

Which type of cable supports data transmission speeds of 10 gigabits per second (Gbps)?

A.

Category 3

B.

Category 5

C.

Category 5e

D.

Category 6

Your co-worker is not familiar with technical concepts. He asks you to explain Secure Shell (SSH) and the way it works. Which of the following is an appropriate and accurate explanation you can give to this non-technical person?

A.

SSH uses RSA and public keys to authenticate and encrypt before you can defragment the hard drive.

B.

SSH uses a Telnet-like interface, public keys or standard authentication methods, and then symmetric keys.

C.

SSH allows you to gain secure access to a remote computer and then execute commands to control the system.

D.

SSH uses DSA and RSA to protect authentication information, and asymmetric-key encryption to provide data confidentiality.

Which of the following is the most efficient method for documenting and communicating a Web site plan?

A.

Photocopying and faxing sketches

B.

Sending a presentation slideshow via e-mail

C.

Describing the plan orally on stakeholders' voicemail

D.

Posting a large diagram on the wall in a busy office hallway