分享
 
 
 

1d0-410考试回忆2002.1.03

王朝other·作者佚名  2008-05-19
窄屏简体版  字體: |||超大  

1. Which choice best describes the , and tags?

A. examples of block-level tags in HTML 4.

B. tags are used to build HTML 4 forms.

C. tags have been DEPRECATED from HTML 4 and should not be used.

D. tags can make text appear in a fixed font in an HTML 4 compliant

browser window. ***

2. What is the correct definition of a block level tag?

A. a HTML element that affects one or more paragraphs***

B. it affects an individual character or word.

C. it doesn? require a paragraph break before the tag is used.

D. it creates a table border.

3. Which URL is the best example of a fully qualified URL?

A. FTP: //FPP.ciw.com/examine.exe

B. /private/ciw.com/examine.exe

C. HTTP://www.ciwcertified.com ***

D. ciwcertified.html

4. Which statement is true regarding the

and

tags in HTML 4?

A. Both tags require start and end tags.

B. Both tags never require tags.

C. The

tag never requires an empty tag.

D. The

tag never requires an empty tag.

5. You uses the following code in an HTML file.

div align= 'center'

Building a house

\div

Buying wood

The browser window is maximized on a VGA 640x480 screen.How this section

of texts will appear in the web browser?

A. "Building a house" will be centered at the top of the browser window.

"Buying wood" will appear below the sentence.

B. "Building a house" will appear centered in the browser window.

"Buying wood" will appear at the bottom left of the browser window ***

C. "Building a house" and "buying wood" will each appear centered at the top

of the browser window.

D. "Building a house" will appear at the top center of the browser window.

"buying wood" will appear at the bottom center of the browser window.

6. Which of the following choices is an example of country level domain?

A. EDU

B. CA ***

C. INT

D. MIL

7. You receive an e-mail message from a friend that contains a zip file. You open the file and later notices that your e-mail application has sent a copy

of that zip to each person in your address book. What event has most likely occurred?

A. You have accidentally sent a mass e-mail to every one in his address book.

B. A virus has infected your computer. ***

C. A hacker has taken over your computer.

D. Your e-mail application has malfunctioned and must be replaced.

8. Which of the following is an example of a browser plug in?

A. RealAudio ***

B. Netscape Navigator

C. Microsoft Windows

D. Microsoft PowerPoint

9. Which is the criterion to selecte an Internet service provider?

A. Proximity to your home.

B. Good technical support.

C. Support for your desired connection type ***

D. Good online content.

10. You're interested in installing a full text search engine on your

corporate intranet. The IT manager advises against this. For which reason

should you choose not to install a full text search engine?

A. Full text search engines are highly complicated to use.

B. Full text search engines are less time consuming than keyword searches.

C. Full text search engines consume a large number of resources. ***

D. Full text search enginse are not yet technologically possible.

11. You work in an information technology department for a large company.

A manager in another department tells you that he needs an online forum to discuss issues. Which solution should you implement for the manager?

A. Create a newsgroup that each member of the department can access ***

B. Write an easy ASP application that allows file sharing.

C. Create an opt-in mailing list for the department.

D. Install an FTP server that can house a shared spreadsheet.

12. You want to buy stock in a company and you need some unbiased

information. Which is the best way to obtain objective information?

A. Visit the company's website.

B. Research the company in a newsgroup. ***

C. Create a mailing list that sends messages to several employees in the

company asking them for the information.

D. Review the company's stock at Yahoo.com.

13. Which term best describes an older application in which a company organization has already invested time and money?

A. Archived application.

B. Legacy application. ****

C. Internal application.

D. IT infrastructure.

14. Which of the following best explains how encryption works on the World

Wide Web?

A. allows specified user access to web sites that offer online shopping.

B. validates a username and password before sending information across the Internet.

D. encodes information using specific logarithms using a string of numbers

known as a key. ***

D. works only in transactions processed by UNIX servers.

15. Which IP class allots 8 bits for the network portion of the address and

24 bits for the host portion?

A. Class A. ***

B. Class B.

16. You're the system administrator for a small company. One morning you

notice that one of the accounts on the network is locked out because of

multiple login failures.

A. The account was a target of a brute force attack. ***

B. The account was a target of a spoofing attack.

C. The account was a target of a Trojan horse attack.

D. Your ENTER key is stuck.

17. Your're troubleshooting an ASP script. The system runs as expected

until it tries to access a database server. Which of the following is a

possible reason for this problem?

A. The database server is not configured properly.

B. The script needs to be debugged.

C. you don? have the permission to execute query on the database server***

E. You should switch scripting languages. ASP is not designed to execute

queries on databases.

18. Which hardware device operates at network layer of OSI model?

A. Repeater.

B. Hub.

C. Bridge.

D. Router. ****

19. You're creating a web page that contains images that uses a proprietary graphic format. How can the client system identify this image type?

A. Create a special extension for the images that is easy to understand.

B. Define a mime type to accommodate the proprietary formats. ***

C. Convert the graphic to gif before posting it on the web.

D. Ensure that web browsers have correct permission to down load her

graphic type.

20. You're the IT manager for a large company. You receive increasing

numbers of complaints from employees saying that web sites they visit

frequently are not updated in their browser.

A. investigate the company's web server to see if the server interfere

s with the employee's browser.

B. examine the cache settings on the proxy server.***

C. examine the certificate server to verify that the company's certificate

is not expired.

D. examine the media server to verify that it? functioning properly.

21. You frequently use e-mail at work and notice that the delivery time is increasing for messages you sent to people outside of work. What is the

possible cause of the slow delivery time?

A. firewall is the bottleneck for delivery to outside addresses***

B. network

 
 
 
免责声明:本文为网络用户发布,其观点仅代表作者个人观点,与本站无关,本站仅提供信息存储服务。文中陈述内容未经本站证实,其真实性、完整性、及时性本站不作任何保证或承诺,请读者仅作参考,并请自行核实相关内容。
2023年上半年GDP全球前十五强
 百态   2023-10-24
美众议院议长启动对拜登的弹劾调查
 百态   2023-09-13
上海、济南、武汉等多地出现不明坠落物
 探索   2023-09-06
印度或要将国名改为“巴拉特”
 百态   2023-09-06
男子为女友送行,买票不登机被捕
 百态   2023-08-20
手机地震预警功能怎么开?
 干货   2023-08-06
女子4年卖2套房花700多万做美容:不但没变美脸,面部还出现变形
 百态   2023-08-04
住户一楼被水淹 还冲来8头猪
 百态   2023-07-31
女子体内爬出大量瓜子状活虫
 百态   2023-07-25
地球连续35年收到神秘规律性信号,网友:不要回答!
 探索   2023-07-21
全球镓价格本周大涨27%
 探索   2023-07-09
钱都流向了那些不缺钱的人,苦都留给了能吃苦的人
 探索   2023-07-02
倩女手游刀客魅者强控制(强混乱强眩晕强睡眠)和对应控制抗性的关系
 百态   2020-08-20
美国5月9日最新疫情:美国确诊人数突破131万
 百态   2020-05-09
荷兰政府宣布将集体辞职
 干货   2020-04-30
倩女幽魂手游师徒任务情义春秋猜成语答案逍遥观:鹏程万里
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案神机营:射石饮羽
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案昆仑山:拔刀相助
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案天工阁:鬼斧神工
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案丝路古道:单枪匹马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:与虎谋皮
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:李代桃僵
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案镇郊荒野:指鹿为马
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:小鸟依人
 干货   2019-11-12
倩女幽魂手游师徒任务情义春秋猜成语答案金陵:千金买邻
 干货   2019-11-12
 
推荐阅读
 
 
 
>>返回首頁<<
 
靜靜地坐在廢墟上,四周的荒凉一望無際,忽然覺得,淒涼也很美
© 2005- 王朝網路 版權所有