|
must visit itcertkeys.com great collection site thanks
|
Question 1. Which of the following is true with regard to creating an XML application? A. XML must always be embedded with XHTML, not HTML. B. The tags can use uppercase and lowercase characters. C. The application must always be run from a Web server. D. The application must be able to determine page structure if it is used on a Web page. Answer: B Question 2. Consider the following XML code:January 28, 2006 236 Washington Boulevard, Suite 480 Grover, CA 90000 The preceding code will not work properly. Which of the following describes the reason for this? A. The Date field is not specified correctly. B. XML tags cannot use uppercase letters. C. The code was created by a proprietary application. D. A tag has been inconsistently formatted. Answer: D Question 3. Denny is designing a Web site for his school's sporting events. This Web site will list event results for the school. When site visitors click a hyperlink for a specific event, a new page containing information about the sporting event will appear, including the teams involved, the location of the event, scores, key plays and specific accomplishments by contestants. Which of the following should Denny do to build this site? A. Create static pages for each event. B. Use one page and modify it after each event. C. Copy and paste Web pages from other schools' sites. D. Use database integration. Answer: D Question 4. In which of the following formats do graphic files support 24 bits of color information and work well with photographs? A. GIF B. JPEG C. SVG D. BMP Answer: B Question 5. You are responsible for administering a Web site for a college program designed to get students to express their perspectives on topical issues. Your supervisor has been asked to ensure that all Web sites for the college are Conformance Level "Triple-A," according to Web Accessibility Initiative (WAI) standards. Which of the following will have to be eliminated from your site? A. All XHTML tables within the site B. All HTML content written to 4.01 specifications C. All audio content without a text-based alternative D. All visual content without an accessible audio alternative Answer: C Question 6. Applying masks in Flash allows for the creation of depth on the Web page. Which of the following is true when creating vector masks? A. A mask layer contains a filled shape that blocks off objects on at least one other layer. B. You create masks on motion guide layers and normal layers in Flash. C. You can link no more than one layer to a single mask layer. D. Creating a mask requires an understanding of action scripting. Answer: A Question 7. Which of the following is directly exploited by a brute-force attack? A. The log file mechanisms that exist on the Web server B. The Web server's available bandwidth C. The TCP/IP software installed on the Web server D. The Web server's authentication mechanisms Answer: D Question 8. Which of the following is an acceptable way to insert a background image using a style sheet? A. B. background-image: url(background.tiff); C. background-image: url(background.jpg); D. background-position: background.jpg bottom right; Answer: C Question 9. Certain Web sites are known to be successful. What do these successful Web sites have in common? A. They focus on fulfilling unmet needs of Web site consumers. B. They have published a well-documented mind map of their Web site. C. They have created a unique metaphor. D. They all sell books and clothing. Answer: A Question 10. Server and operating system vendors regularly update their software by offering security patches when new vulnerabilities are discovered. To keep your Web site and server safe, you should apply security patches: A. after they have been standardized by the ISO. B. after your system has been compromised. C. as soon as they are released and proven stable. D. during your next scheduled monthly maintenance session. Answer: C Mr. Harold Gray President Gray Industries
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.