Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

1D0-510 Exam Dumps - CIW v5 Founfations Exam

Go to page:
Question # 9

Which term describes the permission agreement that determines the way a vendor's software may be used?

A.

License

B.

Protocol

C.

Copyright

D.

Trademark

Full Access
Question # 10

Because the Internet has experienced tremendous growth, a new protocol has been developed to accommodate Internet address shortages. What is the name of this improved protocol?

A.

IPv6

B.

IPv2

C.

HTTPS

D.

TCP/IPv2

Full Access
Question # 11

James created an XHTML table to show his schedule for each week of the month. He organized the table in a standard calendar format, so that each day from Sunday to Saturday is the header for a vertical column, and each week of days is displayed horizontally as a row. Each scheduled activity appears in the table cell appropriate for the day it occurs. James wants to merge two table cells into one cell to show the IT Business Conference that he will attend from Tuesday to Wednesday in the third week. Which tag should James use for this merged cell?

A.

B.

C.

D.

Full Access
Question # 12

You are a help desk technician. An end user is experiencing a technical problem and does not know enough about the problem to describe it clearly. What should you do?

A.

Review the user's product manual with him to help him understand the technical issues.

B.

Inform the user that he needs to bring the system to you so you can assess the technical situation yourself.

C.

Explain to the user that until he can accurately describe the problem, you are unable to troubleshoot the system.

D.

Request additional specific information from the user so you can troubleshoot the problem and provide an appropriate solution.

Full Access
Question # 13

In XHTML, what is one of the functions of the tag?

A.

To create a data cell in a table

B.

To create a check box in a form

C.

To create a record in a database

D.

To create a scrolling select list in a form

Full Access
Question # 14

Your supervisor directs you to make static IP address assignments on the workstations in your office. Your workstations are part of a company WAN that also connects directly to the Internet. What information must you have in order to complete this assignment?

A.

An IP address for each workstation and the subnet mask

B.

An IP address to be shared by all workstations and the subnet mask

C.

An IP address for each workstation, the default gateway address and the subnet mask

D.

An IP address to be shared by all workstations, the default gateway address and the subnet mask

Full Access
Question # 15

Each system in a TCP/IP network must be configured with an IP address and a subnet mask. The subnet mask identifies what parts of an IP address?

A.

Source and destination

B.

Loopback and broadcast

C.

The number of bytes per field

D.

Network portion and host portion

Full Access
Question # 16

Which of the following is the most popular protocol that provides authentication and encryption for secure exchanges over the Internet?

A.

Secure Sockets Layer (SSL)

B.

Public Key Infrastructure (PKI)

C.

Electronic Data Interchange (EDI)

D.

Secure Electronic Transactions (SET)

Full Access
Go to page: