⟩ Explain Wireless Local Area Networks are implemented as an extension to a) WAN b) LAN c) (a) & (b) d) None of the above
B.LAN
B.LAN
Which type of encryption uses a pair of keys, in which one key is used to encrypt information and the other key is used to decrypt that information? A. Hash encryption B. One-way encryption C. Symmetric encryption D. Asymmetric encryption
Which protocol is most likely to be used when sending e-mail using the Microsoft Outlook Express client? A. IMAP B. HTTP C. SMTP D. POP3
Explain In general, which choice lists the protocols that must be configured in order to send and receive e-mail? A. NNTP and IMAP B. POP3 and IMAP C. HTTP and SMTP D. SMTP and POP3
Explain Which of the following XHTML elements is always placed within the <head> section? A. <html> B. <body> C. <meta> D. <!DOCTYPE>
Explain When does a copyright become effective? A. When the original content is created B. When the original content is the focus of legal contention C. When the original content is registered in a UNESCO country D. When the original content is registered with the U.N. Copyright Office
Which choice lists computer peripheral port standards that require only one IRQ and are used to connect multiple high-speed devices? A. USB and PS/2 B. USB and UART C. IEEE 1394 and USB D. IEEE 1394 and IEEE 1284
Which technology is used to create a table in a relational database? A. CGI B. SQL C. PHP D. ODBC
Lars has difficulty when he tries to access some Web pages. He suspects that his browser has a problem or a bug. Which of the following should he consider downloading? A. A patch B. A firewall C. A pop-up blocker D. An anti-virus program
Explain Which IP address is called the loopback address, and can be used for testing and troubleshooting? A. 127.0.0.1 B. 10.1.12.251 C. 132.65.18.91 D. 192.23.111.8
Suppose changes in project scope tend to occur A. only in large corporate projects. B. in small rather than large increments. C. in large rather than small increments. D. only in software development projects.