Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

CIW 1D0-520 Exam - Cheat-Test.com

Free 1D0-520 Sample Questions:

Q: 1. You have decided that using a pop-up window is appropriate in a particular situation. Which of the following can you use to ensure that the window is displayed in the proper location?

A. CSS and XHTML
B. XHTML and pseudo-code
C. JavaScript and pseudo-code
D. JavaScript and the Document Object Model (DOM)

Answer: D

Q: 2. What is the name for colors that create black when mixed together?

A. Radial
B. Additive
C. Subtractive
D. Transitional

Answer: C

Q: 3. Jacob runs a Web site specializing in selling music from independent artists. Most of the site’s customers want to know about unknown or new artists in the music industry whose work is available on Jacob’s site. Site visitors have requested an easier way to learn about updates to the New Artists page. Which of the following will best meet visitors’ needs?

A. Update the New Artists page more often.
B. Install an RSS feed for the New Artists page.
C. Install a search feature on the New Artists page.
D. Use a different font for each new entry on the New Artists page.

Answer: B

Q: 4. Both versions of GIF files support small file size, lossless compression and transparency. Which of the two GIF versions also supports animation and interlacing?

A. 87a
B. 87b
C. 89a
D. 89b

Answer: C

Q: 5. You have been asked to create a page that retrieves information from a database. Which of the following is the first step in obtaining information from a database from a Web page?

A. Conduct a database query.
B. Create a connection to the database.
C. Create a recordset to hold the query results.
D. Put the results in a recordset to ensure that the database returns data properly.

Answer: B

Q: 6. You have been asked to transfer print copy to a Web page. Which of the following is a commonly accepted rule concerning white space in this situation?

A. A Web page should contain less than 10 percent white space at any time.
B. A Web page should contain more than 10 percent white space, but no more than 20 percent.
C. A Web page should contain approximately 50 percent less text than a printed page containing the same information.
D. A Web page should contain approximately 20 percent less text than a printed page containing the same information.

Answer: C

Q: 7. Suandi is documenting the technology choices of his Web development team. In the document, he explains his reasons for using JavaScript as a development language on the client side because:

A. it is best suited for open-source browsers.
B. it is compatible with the widest variety of Web browsers.
C. it is the scripting version of the popular Java programming language.
D. it was specifically developed for use with the internet Explorer Web browser.

Answer: B

Q: 8. You have been asked to insert an image named kayak.jpg in a Web page. Which of the following code examples will validate as XHTML 1.0 Transitional?

A. <img src=kayak.jpg alt=kayak />
B. <img src=kayak.jpg desc=kayak />
C. <img src=kayak.jpg alt=kayak></img>
D. <img src=kayak.jpg desc =kayak></img>

Answer: A

Q: 9. Which of the following is directly exploited by a brute-force attack?

A. The Web server’s available bandwidth
B. The Web server’s authentication mechanisms
C. The TCP/IP software installed on the Web server
D. The log file mechanisms that exist on the Web server

Answer: B

Q: 10. Jay is about to integrate animation into his Web site. He has decided that using shape tweening is the most dynamic technique with which to begin. In using this technique, what must he remember to do?

A. Be careful to use no symbols for objects.
B. Use interesting symbols for all of the objects.
C. Include more than one tween on the top layer.
D. Use a circular pattern, moving objects between locations.

Answer: A

Q: 11. Which of the following would be an effective way to attract customers to your site without violating end-user trust and privacy?

A. Use metadata effectively and appropriately.
B. Use pop-up advertisements for weekly specials.
C. Send e-mail to all current and potential customers.
D. Design trademarks and logos to resemble those of competitors.

Answer: A

Q: 12. While designing a Web site for a customer, you are asked to add several photographic images to one of the pages. Which format would be best suited for this type of image?

A. GIF
B. TIFF
C. BMP
D. JPEG

Answer: D

Q: 13. George is developing an intranet site for his company. How can he establish consistency for the structure and layout of all the pages, but leave decisions about the content of each page to the individual departments?

A. Use style guides.
B. Use inline frames.
C. Create a site map.
D. Create a site template.

Answer: D

Q: 14. What is the primary purpose of navigational elements within a Web site?

A. To organize a list of hyperlinks
B. To make it easy for users to visit other sites
C. To enable user movement throughout the site
D. To make it easy for users to reach the home page

Answer: C

Q: 15. Which Web development team member is responsible for developing a site’s navigation?

A. Web programmer
B. Graphics designer
C. Information architect
D. Information Technology (IT) professional

Answer: C

Q: 16. Tom is making changes to his company’s Web site. Because he likes the way the markup is styled, he copies the following into another section of the page:
<div id=”subsection”> This section is under construction</div>
Why does the home page not validate properly?

A. The <div> tab was not closed properly.
B. Element attributes must be declared in the style sheet.
C. A <div> tag can be used only once in each document’s markup.
D. An ID attribute can be applied to only one element in a document.

Answer: D

Q: 17. Alma has been asked to upgrade the pages on her Web site to XHTML 1.0 Transitional. Which of the following tags must she alter on each page?

A. The <head> tag
B. The <span> tag
C. The <meta> tag
D. The <!DOCTYPE> tag

Answer: D

Q: 18. David has designed a home page for an e-commerce Web site. At the left side of the page is a large block of text with product names and prices. The right side features a detailed 100-pixel-by-200-pixel photo of a sample product. David decides that his page appears to be balanced. How did the two elements balance each other?

A. By size
B. By color
C. By value
D. By shape

Answer: D

Q: 19. A college is considering allowing podcasting on its student Web site. What should be done to ensure that the site meets the college’s strict accessibility policy?

A. Create an alternative page that does not list the audio files.
B. Require a text-only version of each audio transmission from the site.
C. Create a disclaimer on the page for the audio file format and site visitors who are hard-of-hearing.
D. Convert all transmissions into the Ogg Vorbis format, which is easily accessible using additional audio plug-ins.

Answer: B

Q: 20. You are creating a Web site that uses a large graphics image containing more than 256 colors on its main page. You do not want to reduce the image size or the resolution. One method to reduce the perceived load time of the graphic is to :

A. divide the image into slices.
B. reduce the color depth of the image.
C. convert the file into a GIF 89a format.
D. convert the image into a BMP2 format.

Answer: A

Q: 21. Which of the following best describes the type of information that Web server log files can collect?

A. Browser version, reviewed products, IP address
B. Browser information, pages viewed, referrer sites
C. Browser information, return visits, past purchases
D. Credit card number used, favorite products, page viewed

Answer: B

Q: 22. Curtis is creating a new Web site for his company. Which of the following should drive all other development concerns for the company’s site?

A. The site should support the vision of the company.
B. The site should replicate the company’s product brochure.
C. The site should support one aspect of the company’s goals.
D. The site should expand the vision of the company into new areas.

Answer: A

Q: 23. Your site development team has created a Web site, and you want to test its accessibility. Which of the following do you need to conduct the test?

A. A test pool of very unskilled users
B. A test pool of at least five or six typical users
C. A test pool of at least six members of the Web team
D. A test pool of fewer than five moderately skilled users

Answer: B

Q: 24. Rosa wants to position a paragraph 100 pixels below the top of the HTML document, and 100 pixels from its left margin. Which styles should she use?

A. top: 100px; left: 100px
B. position: relative; top: 100px; left: 100px
C. position: absolute; top: 100px; left: 100px
D. position: absolute; margin-top: 100px; margin-left: 100px

Answer: C

Q: 25. Consider the following XML code:

<?xml version=”1.0” ?>
<Letter>
<date>January 28, 2006</date>
<Address>
<to>
<name>Mr. Harold Gray</name>
<title>President</title>
<company>Gray Industries</company>
</To>
236 Washington Bouldvard, Suite 480
Grover, CA 90000
</Address>
The preceding code will not work properly. Which of the following describes the reason for this?

A. The Date field is not specified correctly.
B. XML tags cannot use uppercase letters.
C. A tab has been inconsistently formatted.
D. The code was created by a proprietary application.

Answer: C

Q: 26. Jason is attempting to gain unauthorized access to a corporate server by running a program that enters passwords from a long list of possible passwords. This type of attack is known as a:

A. brute-force attack.
B. forced-entry attack.
C. buffer overflow attack.
D. denial-of-service attack.

Answer: A

Q: 27. Consider the following code:
<film>
<year>1942</year>
<title>Casablanca</title>
<director>Michael Curtiz</director>
</film>
What kind of code is shown in the preceding example?

A. XML
B. HTML
C. VBScript
D. activescript

Answer: A

Q: 28. Consider the following code:
$dbcon=mysql_connect(“james.stangernet.com”, “emample”);
Mysql_select_db(“databaseone”);
Which of the following describes the function of this code?

A. It is selecting a table from the database.
B. It is conducting a join for a new database.
C. It is creating a connection to the database.
D. It is selecting a database record and creating a new record.

Answer: C

Q: 29. Server and operating system vendors regularly update their software by offering security patches when new vulnerabilities are discovered. To keep your Web site and server safe, you should apply security patches:

A. after your system has been compromised.
B. after they have been standardized by the ISO.
C. as soon as they are released and proven stable.
D. during your next scheduled monthly monthly maintenance session.

Answer: C

Q: 30. You are creating a Web site for a customer, which will have many pages. You want to implement a single style sheet to control all the pages on the site. Which of the following would be the preferred method for doing so?

A. Use an internal style sheet.
B. Use an external style sheet.
C. Use an exported style sheet.
D. Use an embedded style sheet.

Answer: B


© 2014 Cheat-Test.com, All Rights Reserved