- World's Largest Collection of Interview Questions
Start Your Own website Now
Sponsored Links

Interview Questions
Our Services

Get 9,000 Interview Questions & Answers in an eBook.

  • 9500+ Pages
  • 9000 Question & Answers
  • All Tech. Categories
  • 14 MB Content

    Get it now !!

    Send your Resume to 6000 Companies

    Question :
    Which protocol is used to transmit files across the Web to be rendered by a
    Web browser?
    A. Internet Protocol (IP)
    B. Hypertext Transfer Protocol (HTTP)
    C. Transmission Control Protocol (TCP)
    D. Point-to-Point Tunneling Protocol (PPTP)

    Category CIW Certification Exams Interview Questions
    Rating (1.1) By 202 users
    Added on 7/30/2010
    Views 1405
    Rate it!

    B. Hypertext Transfer Protocol (HTTP)

    If you have the better answer, then send it to us. We will display your answer after the approval.
    Rules to Post Answers in

  • There should not be any Spelling Mistakes.
  • There should not be any Gramatical Errors.
  • Answers must not contain any bad words.
  • Answers should not be the repeat of same answer, already approved.
  • Answer should be complete in itself.
  • Name :*
    Email Id :*
    Answer :*
    Verification Code Code Image - Please contact webmaster if you have problems seeing this image code Not readable? Load New Code
    Process Verification  Enter the above shown code:*
    Inform me about updated answers to this question

    Related Questions
    View Answer
    Mike is able to check his Web-based e-mail using his cell phone. Which
    protocol allows his cell phone to connect to the Internet?
    A. Post Office Protocol (POP3)
    B. Wireless Access Point (WAP)
    C. Wireless Application Protocol (WAP)
    D. Multipurpose Internet Mail Extensions (MIME)
    View Answer
    What is a cookie?
    A. An image file that expands to fill a browser's cache.
    B. A virus placed on a computer by spyware to delete directories.
    C. A file created by the browser each time its user accesses a Web site.
    D. A text file placed on a client by a Web server to track user preferences.
    View Answer
    Your supervisor directs you to make static IP address assignments on the
    workstations in your office. Your workstations are part of a company WAN that also connects directly to
    the Internet. What information must you have in order to complete this assignment?
    A. An IP address for each workstation and the subnet mask
    B. An IP address to be shared by all workstations and the subnet mask
    C. An IP address for each workstation, the default gateway address and the subnet mask
    D. An IP address to be shared by all workstations, the default gateway address and the subnet mask
    View Answer
    Which of the following is a contract used in project management that
    outlines the requirements for each project task to ensure that the project objectives are met?
    A. Project triangle
    B. Organizational chart
    C. Statement of work (SOW)
    D. Return on Investment (ROI)
    View Answer
    Mike wants to download the Macromedia Flash MX 2004 viewer software
    to his desktop. Which Internet protocol will he use?
    A. FTP
    B. SSH
    C. TCP
    D. SMTP
    View Answer
    Which of the following is the most efficient method for documenting and
    communicating a Web site plan?
    A. Photocopying and faxing sketches
    B. Sending a presentation slideshow via e-mail
    C. Describing the plan orally on stakeholders' voicemail
    D. Posting a large diagram on the wall in a busy office hallway
    View Answer
    Which term describes a server at the highest level of the Domain Name
    System (DNS)?
    A. Master
    B. Primary
    C. Top level
    D. Root level
    View Answer
    Q: 19 As an IT professional, you must always consider the Return on Investment
    (ROI) impact that IT projects have on your organization. You may be required to justify a project's
    benefits relative to its cost. What must you do to relate such information about IT projects to upper
    A. Explain decisions in purely technical terms to ensure that the issues are properly understood.
    B. Make decisions without input from management so as not to confuse the managers or stakeholders.
    C. Consult only managers who have technical experience so that the project benefits will be fully understood.
    D. Put the information in terms that your managers can understand so that they can make informed decisions.

    View Answer
    Your company is outsourcing some content development tasks. The
    contractors who work on these projects will see some of your company's proprietary content before it is
    available to customers. Your company needs to ensure that this trade-secret content is kept confidential
    by the contractors who see it. Which of the following protects your intellectual property in this situation?
    A. Copyright
    B. Trademark
    C. License agreement
    D. Non-disclosure agreement
    View Answer
    Which protocol is most likely to be used when sending e-mail using the
    Microsoft Outlook Express client?
    A. IMAP
    B. HTTP
    C. SMTP
    D. POP3
    View Answer
    You need to register a domain name for the Web sites that will promote
    your company's new product in international markets. You decide to register several top-level domains,
    such as .ca, .au and .ae, in addition to the commonly used .com domain. Why would you do this?
    A. To appeal to the national identities of your customers
    B. To make it easier for search engines to find your Web site
    C. To ensure that you can sell your product legally in various countries
    D. To ensure that customers remember the spelling of your product name
    View Answer
    When creating its Web presence, a business should choose its domain name
    carefully so that users will be able to recall it easily. Every domain name is unique. With which of the
    following must each domain name be registered?
    A. DNS
    B. W3C
    C. FQDN
    D. ICANN
    View Answer
    Lars has difficulty when he tries to access some Web pages. He suspects that
    his browser has a problem or a bug. Which of the following should he consider downloading?
    A. A patch
    B. A firewall
    C. A pop-up blocker
    D. An anti-virus program
    View Answer
    Which of the following IP addresses is invalid?
    View Answer
    Which of the following is the most popular protocol that provides
    authentication and encryption for secure exchanges over the Internet?
    A. Secure Sockets Layer (SSL)
    B. Public Key Infrastructure (PKI)
    C. Electronic Data Interchange (EDI)
    D. Secure Electronic Transactions (SET)
    View Answer
    Which choice lists the three image file formats that are universally
    supported by modern Web browsers?
    A. BMP, TIFF and GIF
    B. PNG, GIF and BMP
    C. GIF, JPEG and BMP
    D. GIF, JPEG and PNG
    View Answer
    Which of the following is required for a wireless network to run in
    infrastructure mode?
    A. A bridge
    B. A switch
    C. A wireless access point (WAP)
    D. Wireless Equivalency Privacy (WEP)
    View Answer
    In the client/server model, a client can access information from any server if:
    A. both the client and server understand the protocol.
    B. both the client and the LAN understand the protocol.
    C. both the LAN and the WAN understand the protocol.
    D. both the server and the LAN understand the protocol.
    View Answer
    Which of the following accurately describes a difference between GIF images
    and JPEG images?
    A. GIF images support the transparency technique, whereas JPEG images do not.
    B. GIF images support millions of colors, whereas JPEG images support only 256 colors.
    C. JPEG images use vector graphics, whereas GIF images use bitmap or raster graphics.
    D. JPEG images support interlacing and animation techniques, whereas GIF images do not.
    View Answer
    Which type of encryption uses a pair of keys, in which one key is used to
    encrypt information and the other key is used to decrypt that information?
    A. Hash encryption
    B. One-way encryption
    C. Symmetric encryption
    D. Asymmetric encryption
    View Answer

    Please Note: We keep on updating better answers to this site. In case you are looking for Jobs, Pls Click Here - Best Freshers & Experienced Jobs Website.

    View ALL CIW Certification Exams Interview Questions

    User Options
    Sponsored Links

    Copyright ©2003-2015, All Rights Reserved.
    Privacy Policy | Terms and Conditions

    Download Yahoo Messenger | Placement Papers| FREE SMS | ASP .Net Tutorial | Web Hosting | Dedicated Servers | C Interview Questions & Answers

    Testing Articles | Testing Books | Testing Certifications | Testing FAQs | Testing Downloads | Testing Interview Questions | Testing Jobs | Testing Training Institutes

    Cache = 0.078125 Seconds