100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CIW Web Foundation questions with complete solutions $17.99
Add to cart

Exam (elaborations)

CIW Web Foundation questions with complete solutions

 1 view  0 purchase
  • Course
  • CIW
  • Institution
  • CIW

CIW Web Foundation questions with complete solutions

Preview 3 out of 21  pages

  • December 13, 2024
  • 21
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CIW
  • CIW
avatar-seller
BravelRadon
CIW Web Foundation questions with
complete solutions
You are creating a style sheet to format the pages on your company's web site. One section will have a
black background with white text. What is the hexadecimal reference you would use to specify the text
color for

this portion of the web page? - correct answer ✔✔#FFFFFF



What is virtualization? - correct answer ✔✔Virtualization enables you to run multiple operating systems
and applications on a single computer.



The line of code that instructs the browser to look for a directory named my site that begins one level
higher than the page you are currently viewing? - correct answer ✔✔../mysite/index.html



A user is submitting data from a form on your web page to a database using a Confidential Commercial
Information (CCI) script. Which attribute of the form field elements organizes the user's information into
name=value pairs? - correct answer ✔✔Name



HTML Attribute - correct answer ✔✔The attributes are special words used inside the opening tag to
control the element's behavior. HTML attribute is a modifier of an HTML element type. An attribute
either modifies the default functionality of an element type or provides functionality to certain element
types unable to function correctly without them.



What is the preferred approach to communicate important action items in an e-mail message to a co-
worker? - correct answer ✔✔List the action items in a numbered or bulleted list for clarity.



Digital signatures verify the integrity of the data, verify the identity of the sender, and ..... - correct
answer ✔✔Enforce non-repudiation



Non-repudiation - correct answer ✔✔The security principle of providing proof that a transaction
occurred between identified parties. Repudiation occurs when one party in a transaction denies that the
transaction took place.

,Customer Relationship Management - correct answer ✔✔CRM



Gewn works for a small company where she has been asked to find a cost-effective option for providing
comprehensive customer service. The finance, technical support, sales and customer service
departments all need to share information about their customers. Gwen is considering adoption of a
CRM application, what is the best option? - correct answer ✔✔She can contract with a cloud service
provider to host the CRM that her company's employees can access.



What helps non-technical users collectively classify and find information on a site? - correct answer
✔✔Tagging



Sally is a network technician at Acme Corporation, she has been directed to configure the network
adapter for a company laptop so that it can b used to connect to the company network and the internet,
what is one requirement for the TCP/IP settings that she will need to configure? - correct answer
✔✔Default gateway



Web pages structured with which tag will fail W3C validation tests, no matter what standard used? -
correct answer ✔✔<table>



http://www.ClWcertified.com/Certifications/Web_Foundations/iba.php : Which of the following is the
best classification for the address? - correct answer ✔✔Deep URL



Can <blockquote> be inside <p> tags? - correct answer ✔✔No, it should be used outside the <p> tags



You received a text and a threatening voicemail from an angry customer who wants to immediately
discuss the shortcomings of a recently released product. What is your best course of action? - correct
answer ✔✔Request that the customer send his complaints by e-mail, knowing that any inappropriate
communication will be well documented.



What is a security threat commonly associated with cloud-based services? - correct answer
✔✔Hypervisor vulnerabilities

, Configuring a wireless network involves several steps. Which task should be performed to configure and
connect to a wireless network? - correct answer ✔✔Configure the wireless AP's SSID, encryption level
and share key.



You are modifying an existing web page that needs to validate as HTML5 code, to create a rectangular
hotspot in an image map that links to www.xyz.com, which code would you nest inside the <map>
container? - correct answer ✔✔<area shape="rect" coords="78,0,156.75" href="http://www.xyz.com"
alt="xyz"/>



What is recommended when conducting keyword searches? - correct answer ✔✔Use nouns instead of
verbs for keywords



Which computer system maintenance tasks can help improve file access performance? - correct answer
✔✔Defragment the drive using the following command defrag c: -w



Acme Corp is a small manufacturing company and to reduce IT infrastructure costs it uses cloud-based
services extensively and strives to have the least amount of IT equipment onsite. Last year, Acme
suffered a failure that resulted in significant downtime and data loss. Management has decided to
implement a continuous data protection (CDP) solution, what is it? - correct answer ✔✔Cloud-only
solution



Continuous data protection - correct answer ✔✔CDP



To reduce the costs of maintaining servers with FTP access; your company is using P2P to facilitate
sharing of information. Which strategy should your company use to protect the company's sensitive
information while capitalizing on the benefits of P2P power? - correct answer ✔✔Use technologies that
will control access and password-protect files.



What attack involves the installation of malicious code on personal computers or servers that redirects
internet traffic from a legitimate website to an identical-looking but malicious impostor website - correct
answer ✔✔Pharming



Melanie works in the sales department at XYZ Company. She decides that her companys

marketing team has done a poor job representing the companys brand. Without direction

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller BravelRadon. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $17.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

56326 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$17.99
  • (0)
Add to cart
Added