CIW Foundations (1D0-510)
CI W F ound unda ati tio ons (1 (1D0 D0--510) Copyright © 2007 by PrepLogic, Inc. Product ID: 010656 Production Date: February 1, 2006 Number of Questions: 25
All rights reserved. No part of this document shall be stored in a retrieval system or transmitted by any means, electronic, mechanical, photocopying, recording, or otherwise, without written permission from the publisher. No patent liability is assumed with respect to the use of the information contained herein.
Warning and Disclaimer Every effort been made makeisthis document complete as accurate as possible, but has no warranty or to fitness implied. The as publisher andand authors assume no responsibility for errors or omissions. The information provided is on an "as is" basis. The authors and the publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this document.
V olum olume e, Cor C orpo porr ate, and Educ E ducationa ationall Sal Sales PrepLogic offers favorable discounts on all products when ordered in quantity. For more information, please contact PrepLogic directly:
1-800-418-6789
[email protected]
CIW Foundations (1D0-510)
Abstract This Mega Guide is intended to help a candidate prepare for, and pass, the CIW Foundations exam (number 1D0-510). Passing this multiple-choice exam is all that is required to become certified at the CIW Associate level, and is a requirement for all upper-level certifications from CIW (CIW Professional, Master CIW Designer, Master CIW Administrator, Master CIW Web Site Manager, or Master CIW Enterprise Developer).
What to Know The CIW Foundations exam (1D0-510) is intended to demonstrate the test-takers ability to function as an entry-level information technology professional. The exam covers much more more information that simply the creation of Web pages. It is important for someone preparing for the exam to be aware of the objectives of the exam and be prepared to answer questions about network hardware, project management, TCP/IP protocols, design concepts, government regulations, and a wide variety of topics specific to the creation of Web sites. The CIW Foundations exam is also the prerequisite to take other CIW exams that cover a broad spectrum of information technology fields such server administration, programming, security, as well as Web design and as such the topics covered by the CIW Foundations exam are quite varied.
Tips The exam is a collection of topics from three different categories: Internet Business Foundations, Site Development Foundations, and Network Technology Foundations. There is some overlap between the topics within these three categories which can serve to reinforce your understanding of a topic from several points of view. Your preparation for the Site Development Foundations portion of the exam will be aided by additional time spent practicing the objectives for that portion of the exam. All that is needed is notepad (or your favorite text editor) and a Web browser to practice the topics in the Site Development Foundations.
CIW Foundations (1D0-510)
Table of Contents Abstractt....................................................................................................... Abstrac ................................................... ........................................................................................................ .................................................... 2 What to Know...................................................................................................... ................................................ ................................................................................................. ........................................... 2 Tips .................................................................................................... ............................................... ............................................................................................................ ............................................................. ...... 2
– Domain Dom ain 1: I nte nterrne nett B Busine usiness ss Foundations 35% .............................................. ....................................................................................... ......................................... 10 10 1.1. Identify job roles in the Information Technology (IT) industry, including the responsibilities, tasks and skills they require.......................................................................................... ................................................ ......................................... 10
IT industry job roles................................................................................................................................................ 10
1.2. Identify the infrastructure required to access the Internet, including hardware and software components. components. ...................................................................................... ............................... ............................................................................. ...................... 12 12 Client and Server .................................................................................................................................................... 13 Hist Hi story ory of the the Int Inte ernet.................................. ................................................... ................................... ................................... ................................... .................................... ................................... ................... .. 13 I nt nte ernet in infrastruc frastructu ture re ............................................. .............................................................. .................................. ................................... .................................... ................................... ......................... ........ 14 Conne Con necti ction devices .................................................. ................................................................... ................................... ................................... ................................... ................................... ......................... ........ 14
1.3. Define important Internet communications protocols and their roles in delivering basic Internet services. ................................................................................................... ................................................. .................................................. 16 Rem Re mote ote ac acce cessprotoco protocols ls.................................... ..................................................... ................................... ................................... ................................... .................................... ............................... ............. 16 I nt nte ernet service p proto rotoco colls ............................................. ............................................................... ................................... ................................... .................................... ................................... ................... .. 16
1.4. Identify the basic principles of the Domain Name System (DNS). ................................................ ...................................................... ...... 17 Domain Name Syste stem(DNS)............................. .............................................. ................................... ................................... ................................... .................................... ............................... ............. 17 I nt nte ernet do dom main na nam ming.................................. ................................................... ................................... ................................... ................................... .................................... .................................. ................ 17 Hie Hi erarchical DNS naming stru struct ctu ure................................... ..................................................... ................................... ................................... ................................... ............................... .............. 17 Domain na nam me server ....................................... ........................................................ ................................... ................................... ................................... .................................... .................................. ................ 18 Shared ared dom domains .................................. .................................................... ................................... ................................... ................................... ................................... ................................... ............................ ........... 18
1.5. Identify the functions of Web browsers, and use them to access the World Wide Web and other computer resources.................................................................................... ................................................... ................................ 18 Uniform Reso sou urce Ide Identifie tifiers (URL (URLs) s)................ ................................. ................................... ................................... ................................... ................................... ............................... .............. 18 Securi curin ng I nternet com communication nications s .................................. .................................................... ................................... ................................... ................................... .................................. ................. 19 Use a Web browse browser to dow download nload fil files ................................... ..................................................... ................................... ................................... ................................... ............................ ........... 19 I nt ntran rane et, extrane tranet, I nternet................................. .................................................. ................................... ................................... ................................... .................................... ............................... ............. 19 Browse Brow ser plug-i plug-ins ns................................. ................................................... ................................... ................................... ................................... ................................... ................................... ............................ ........... 20
1.6. Use e-mail clients to send simple messages and files to other Internet Internet users. ...................................... ......................... ............. 20 Types of Email ... ...... ...... ..... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... .... 20
CIW Foundations (1D0-510) Sending and and Rece Receiving Email ................. .................................. .................................. .................................. ................................... .................................... .................................... ......................... ....... 20 EE-m mail signat signature ures................................... ..................................................... ................................... ................................... ................................... ................................... ................................... ......................... ........ 21 EE-m mail at atta tach chm ments nts................................... .................................................... ................................... .................................... ................................... ................................... ................................... ...................... ..... 21 EE-m mail for Business................................... .................................................... ................................... .................................... ................................... ................................... ................................... ...................... ..... 21 EE-m mail I ssues................................. ................................................... ................................... ................................... ................................... ................................... ................................... .................................. ................. 22
1.7. Define and use additional networking networking and Internet Internet services. ................................................... ................................................................ ............. 22 22 1.8. Demonstrate Demonstrate ways to communicate communicate effectively using Internet technology. technology. .......................................... 25 1.9. Identify and configure user customization features in Web browsers, including:: preferences, including preferences, caching, cookies. ..................................................................................................... ................................................... .................................................. 26 Security ................................................................................................................................................................... 27 Tro Tr ouble les shootin ing g connection ion pro rob blem lems.... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... .... 28
1.10. Identify security issues related to Internet clients (e.g., Web browsers, e-mail, instant messaging) in the workplace, including: certificates, malware, illicit servers and viruses. ............................................................................................................................. .................................................................................... ......................................... 29 Auth Au the enticati tication................. .................................. ................................... ................................... ................................... ................................... ................................... ................................... ............................... .............. 29 Encryption .............................................................................................................................................................. 29 Firewall .................................................................................................................................................................. 30 Malw Mal ware................................... .................................................... .................................. ................................... ................................... ................................... .................................... ................................... ...................... ..... 30 Protection ............................................................................................................................................................... 31
1.11. Use different types t ypes of Web search engines effectively. effectively. ...................................................................... ................................................ ...................... 31 31 Pop opular ular Searche arches................................... ..................................................... ................................... ................................... ................................... ................................... ................................... ......................... ........ 32 Boolean operators .................................................................................................................................................. 33 Search Strat Strate egies gies ................................... ..................................................... ................................... ................................... ................................... ................................... ................................... ......................... ........ 33
1.12. Identify and use principles of Personal Information Management (PIM), including:: common applications............................................................................................................ including ....................................................... .......................................................... ...... 34 Wireless reless App Appli lica cation tion Prot Protoc ocol ol (W (WAP) AP) ............................................... ................................................................ ................................... ................................... .................................. ................. 34
1.13. Efficiently transmit text and binary files using popular Internet services. .......................................... 34 1.14. Identify security-related security-related ethical and legal issues faced by IT professionals. professionals. ...................................... ................................ ...... 35 Privacy Issues ......................................................................................................................................................... 35 Copyright Issues ..................................................................................................................................................... 35 Other Issues ............................................................................................................................................................ 35
1.15. Relate project management concepts and terms to the IT profession. ................................................ 36 Proje roject Manage Management Ski Skills ll s................................... .................................................... ................................... ................................... ................................... .................................... ............................ .......... 36
CIW Foundations (1D0-510) Proje roject Man M anag age ement Pha has ses .......................... ........................................... ................................... ................................... ................................... .................................... .................................. ................ 37
1.16. Recognize Recognize essential database concepts. ............................................................................................... ...................................................... ......................................... 38 Datab Data bas ase e Termino nollog ogy y................................. .................................................. ................................... ................................... ................................... .................................... ................................... ................... .. 38 Rellat Re atiion onal al Datab Databas ase es................................... .................................................... ................................... ................................... ................................... .................................... ................................... ................... .. 39 Relationships .......................................................................................................................................................... 40 Connecting Databases to Internet Servers ............................................................................................................. 40 Domain 2: Site Development Foundations – 35% .............................................. ....................................................................................... ......................................... 41 41
2.1. Demonstrate knowledge knowledge required to create a Web page. ................................................................ ...................................................................... ...... 41 Hist Hi story ory of markup arkup langua languag ges................................... .................................................... .................................. ................................... .................................... .................................... ......................... ....... 41 Versions of HTML .................................................................................................................................................. 41 HTML......................................................................................................................................................................
42
Docum Docu ment Structu tructure re Tags Tags .................................. ................................................... ................................... ................................... ................................... .................................... ............................... ............. 42 Docum Docu ment T Ty ype Declaration Declaration (DTD) ................................... ..................................................... ................................... ................................... ................................... ............................... .............. 43 Text and para rag gra rap ph formattin ing g tags.... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ....... ..... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... .... 43 List sts s.................................... ...................................................... ................................... .................................. ................................... ................................... ................................... .................................... ............................ .......... 44 Hyperlink Tags ....................................................................................................................................................... 44 I nt nte ernal Hype Hyperl rliinks (Bookm (Bookmarks) arks) ...................... ....................................... ................................... ................................... ................................... ................................... ............................... .............. 45 HTML HTM L tab tablles................................. ................................................... ................................... ................................... ................................... ................................... ................................... .................................. ................. 46 Comment Tags Tags................................. ................................................... ................................... ................................... ................................... ................................... ................................... ............................... .............. 47 Docum Docu ment Obj Object Model ...................... ....................................... .................................. ................................... ................................... ................................... .................................... ............................ .......... 47
2.2. Add images and graphical formatting to HTML files. .................................................................... .......................................................................... ...... 47 Adding Ad dingim i mag age es to Web pa pag ges................................................. ................................................................... ................................... ................................... .................................... ............................ .......... 47 I mag age e map aps s................................... ..................................................... ................................... ................................... ................................... ................................... ................................... .................................. ................. 48 I mag age e map tags tags.................. ................................... ................................... ................................... ................................... ................................... ................................... ................................... ............................ ........... 48 <bod ody y> ba back ckg ground rounds an and d col color ................................... ..................................................... ................................... ................................... ................................... ................................... .................... .. 49 I mag age e file file form format ats s.................................. .................................................... ................................... ................................... ................................... ................................... ................................... ......................... ........ 49
2.3. Identify and use design and color principles for Web pages. ................................................... ................................................................ ............. 50 Design De sign Con Considerations rations................................. .................................................. ................................... ................................... ................................... .................................... ................................... ................... .. 50
2.4. Create a basic HTML form that accepts user input. .............................................................................. 50 F ormEl ormEle ements................................. ................................................... ................................... ................................... ................................... ................................... ................................... ............................... .............. 51 51 F ormP ormProcessing................................. ................................................... ................................... ................................... ................................... ................................... ................................... ............................ ........... 52
2.5. Create HTML frames. ..................................................................................................................... ................................................................ ........................................................... ...... 52
CIW Foundations (1D0-510) Wha hatt are HTML frames.................................. ................................................... ................................... ................................... ................................... .................................... .................................. ................ 52
2.6. Define Extensible Markup Language (XML), and identify its features and appropriate use. .............. 53 Extensible Markup Markup Lan Langu guag age e (XML) (XML ) ...................... ....................................... ................................... ................................... ................................... ................................... ......................... ........ 53 Serverr-s sideL Lan angu guag age es................................. .................................................. ................................... ................................... ................................... .................................... ................................... ................... .. 54
2.7. Identify essential Web site navigation issues, and ensure page/site accessibility. accessibility. ............................... 54 54 Web page page acce accessibility sibility................................. .................................................. ................................... ................................... ................................... .................................... ................................... ................... .. 54 Addre Ad dres ssing acce accessibili lity ty................. .................................. .................................. ................................... ................................... ................................... .................................... .................................. ................ 54
2.8. Define and apply essential aspects aspects of the Cascading Style Sheets (CSS) standard. standard. ............................ 55 2.9. Use Extensible Hypertext Hypertext Markup Language (XHTML) to create Web pages. ................................... 56 Extensible HTML (XHTML) ................................................................................................................................... 56
2.10. Identify technologies for enhancing the user's Web experience, including:: programming including programming languages, languages, multimedia multimedia technologies. technologies. .................................................................... ....................................................... ............. 57 Active Act ive Conte Content an and d Form F ormat ats s ............................................... ................................................................. ................................... ................................... .................................... ............................... ............. 58
2.11. Use GUI-based GUI-based HTML editing software to create Web pages. ..................................................... ........................................................... ...... 58 Web site pub publi lish shing................................... .................................................... ................................... .................................... ................................... ................................... ................................... ...................... ..... 58
2.12. Test and analyze Web site performance performance issues. .................................................................................. ................................ .................................................. 59 Veri Ve rify fy ac acce cessibility sibility................................. ................................................... ................................... ................................... ................................... ................................... ................................... ......................... ........ 59 Calculatedow down nloa oad d times.................................. ................................................... ................................... ................................... ................................... .................................... ............................... ............. 59
2.13. Identify steps in the Web site planning and development process. ..................................................... ............................................... ...... 59 The Th e Web sit ite e develo lop pment cycle.... ...... ...... ...... ...... ...... ...... ....... ..... ...... .... ...... ...... ...... ...... ...... ....... ..... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... 60
2.14. Identify essential issues in developing and maintaining a Web site, including:: project management, including management, testing, legal issues. ............................................................................ ........................ .......................................................... ...... 61 2.15. Plan and deliver oral presentations of your Web site, during and after site development. development...................................................... ............................................................................................................ ............................................................................. ...................... 62 Obtain fe Obtain fee edbac ack k onyour your sitedesign................................... ..................................................... ................................... ................................... ................................... ............................... .............. 62 Commun unication ication forms.................................. ................................................... ................................... ................................... ................................... .................................... ................................... ................... .. 62
2.16. Define electronic commerce (e-commerce) and related technologies and concepts necessary to develop a secure, useful interface (i.e., storefront). ........................................... 63 63 Tra Tr aditio ition nal vs. Electro ron nic Com Commerc rce e.. ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... .... 63 Metho Met hod ds of e-commerce................................................ .................................................................. ................................... ................................... .................................... ................................... ................... .. 63 EE-co com mmerce techn chnologi ologies............................... ................................................ ................................... ................................... ................................... .................................... .................................. ................ 64 Secure cure transa transact ctiion ons s................................... .................................................... ................................... .................................... ................................... ................................... ................................... ...................... ..... 65 Global Environment................................................................................................................................................ 66
CIW Foundations (1D0-510) 2.17. Demonstrate knowledge of languages commonly used to provide database connectivity connect ivity to Web sites. ................................................ ..................................................................................................... ............................................................................. ........................ 66 Serverr-s side lan angu guag age es.................................. ................................................... ................................... ................................... ................................... .................................... ................................... ................... .. 66 Cl Cliient-sidelan angu guag age es .................................. ................................................... ................................... ................................... ................................... .................................... ................................... ................... .. 67 The Th e ro role le of Stru ruc ctured Query Lan Language in Web site ites.... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... ....... ... 68
Databas Datab ase e conn connecti ctivity techno chnollog ogiies ................................... ..................................................... ................................... ................................... ................................... ............................... .............. 68 Multiple tier applications ....................................................................................................................................... 68 2.18. Identify the benefits and drawbacks of running your own Web server versus using a service provider...................................................................................................... ................................................. ................................................................... ............... 69 Confi Con fig guring you your own own host hosting ing soluti solution................................. ................................................... ................................... ................................... ................................... ............................ ........... 69 Using an I SP ................................. ................................................... ................................... ................................... ................................... ................................... ................................... .................................. ................. 69 69 Using an ASP ASP ................................... ..................................................... ................................... ................................... ................................... ................................... ................................... ............................... .............. 70 70
2.19. Identify common strategies for managing an end user's experience and improving site creativity. creativity. ....................................................................................................................... ....................................................................................... ................................ 70 Branding ................................................................................................................................................................. 70
2.20. Consider copyright and ethical issues when creating Web pages. ...................................................... 70 Domain Dom ain 3: N Ne etwork T echnolog chnology yF Foundations oundations – 30% ................................................. ................................................................................. ................................ 71 71 3.1. Demonstrate knowledge of basic data communications components, and demonstrate technical knowledge of the Internet. .................................................................. ................................................................................. ............... 71 71 Basiic netw Bas twork ork topolog topologiies................................... .................................................... ................................... ................................... ................................... .................................... ............................... ............. 71 OSI Refe feren rence ceModel ............................................ ............................................................. ................................... ................................... ................................... ................................... ............................ ........... 73 Memorize th this tab table........................... le............................................ .................................. ................................... ................................... ................................... ................................... ............................... .............. 73 Networking Protocols ............................................................................................................................................. 74 Protoco rotocoll terms ................................. ................................................... ................................... ................................... ................................... ................................... ................................... ............................... .............. 74 74 Protoco rotocols ls.................................. ................................................... .................................. ................................... ................................... ................................... .................................... ................................... ...................... ..... 75 TCP/IP TC P/IP essentia ials ls .... ..... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... .... 76 Memorize th this tab table........................... le............................................ .................................. ................................... ................................... ................................... ................................... ............................... .............. 76 TCP/UD TC P/UDP P Port Ports s.... ...... ..... ...... ...... ...... ....... ..... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ........ ........ ...... ...... ...... ...... ...... ...... ....... ..... ...... .... ...... ...... ...... ...... ...... ...... .... 76 Protoco rotocoll State tates................................. ................................................... ................................... ................................... ................................... ................................... ................................... ............................... .............. 77 Networks ................................................................................................................................................................. 77
3.2. Identify the role of networking hardware, and configure common hardware for operation. operation. ..................................................................... ................ ............................................................................................................ ........................................................... .... 78 Netw Ne twork ork Compon one ents................................... .................................................... ................................... ................................... ................................... .................................... ................................... ................... .. 78 Tra Tr ansmis iss sio ion n Media ia.... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ....... ..... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... .... 79
CIW Foundations (1D0-510) LAN Sta Stand ndards................................. ................................................... ................................... ................................... ................................... ................................... ................................... ............................... .............. 79 WAN Stan Stand dards................................... ..................................................... ................................... ................................... ................................... ................................... ................................... ............................ ........... 80 T and E-Ca E-Carrie rrier System... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ....... ..... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... .... 80 Routing Rou ting.................................. .................................................... ................................... .................................. .................................. ................................... .................................... .................................... ......................... ....... 80 80 Routing Rou ting Protoco rotocolls.................................. .................................................... ................................... ................................... ................................... ................................... ................................... ......................... ........ 81 81
3.3. Identify the relationship between IP addresses and domain names, including:: assignment of IP addresses within a subnet. ............................................................................... 81 including IP Addressing ......................................................................................................................................................... 81 Address Form......................................................................................................................................................... 82 Public blic an and d Privat Pr ivate e Netw twork orks s................................... .................................................... .................................. ................................... .................................... .................................... ......................... ....... 82 Subnetting ............................................................................................................................................................... 82 Subn bne et Masks (net mas ask) k) ................................... .................................................... ................................... ................................... ................................... .................................... ............................... ............. 83 I nt nte ernet Address ressing................................... .................................................... ................................... .................................... ................................... ................................... ................................... ...................... ..... 83 I Pv4 vs. I Pv6................................. ................................................... ................................... ................................... ................................... ................................... ................................... .................................. ................. 83 83
3.4. Identify the functions and components components of servers commonly used on the Internet. ............................ 84 I nt nte ernetw tworking orkingServe Server Ty Typ pes................................................ .................................................................. ................................... ................................... .................................... ............................ .......... 84
3.5. Identify common Internet security and availability issues, including: user-levell and enterprise-level user-leve enterprise-level concerns. ..................................................................................................... ................................................... .................................................. 85 Netw Ne twork ork Attack Attack Type Types .............................................. ............................................................... .................................. ................................... .................................... ................................... ......................... ........ 85 OSI/RM OSI/ RM securi curity ty se services rvices................................... .................................................... ................................... ................................... ................................... .................................... ............................... ............. 87
3.6. Identify common performance issues affecting Internet clients, including:: analysis, diagnosis. ................................................... including ....................................................................................................... ................................................................... ............... 89 TCP/IP TC P/IP works rkstatio ion n configu igura rattion ion ... ...... ...... ...... ...... ...... ...... ....... ..... .... ...... ...... ...... ...... ...... ...... ....... ..... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... .... 89 Diag Diagn nos ostic tic too toolls.................................. .................................................... ................................... ................................... ................................... ................................... ................................... ............................ ........... 89
3.7. Perform basic hardware hardware and system maintenance maintenance for network-aware network-aware systems. .................................. 90 Computer system maintenance ............................................................................................................................... 90 Compute puter sys syste temcompone ponent nts s.......... .............. ......... .......... ......... ......... ......... ......... .......... ......... ......... ......... ......... ......... ......... .......... ......... ......... ......... ......... ......... ......... ......... ......... ......... ......... .......... ..... 90 90
3.8. Manage fundamental fundamental elements of modern network-based client operating system systems. s. .......................... 92 Software Licensing.................................................................................................................................................. 92 Partitions and logical drives .................................................................................................................................. 92 F ile il e systemman anag age ement tools tools........................ ......................................... ................................... ................................... ................................... ................................... .................................. ................. 93 Rem Re moteman anag age ement and and troubl troubleshoot shootiing......... .............. ......... ......... .......... ......... ......... ......... ......... ......... ......... .......... ......... ......... ......... ......... ......... ......... ......... ......... .......... ......... ......... ..... 94
3.9. Configure and troubleshoot wireless networks. .................................................................................... .............................................................. ...................... 94 94
CIW Foundations (1D0-510) Wireless relessNetw Network Te Tech chno nologie logies s................................. ................................................... ................................... ................................... ................................... ................................... ....................... ..... 94 Tra Tr ansmis iss sio ion n Types ... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ....... ..... .... ...... ...... ...... ...... ...... ...... ....... ..... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... .... 95
3.10. Manage career opportunities opportunities in the IT industry. ........................................................................... ....................... .......................................................... ...... 95 Prepare repare fo forr you ourr caree career .................................. ................................................... ................................... ................................... ................................... .................................... .................................. ................ 95
Pr Prac acti tice ce Que Ques stions tions.......................................................................................................... .......................................................................................................................................... ................................ 9 96 6
CIW Foundations (1D0-510)
Domain 1: Internet Business Foundations – 35% 35% 1.1. Identify job roles in the Information Technology (IT) industry, including the responsibilities,, tasks and skills they require. responsibilities ►
IT industry job roles
►
Web site designer
►
Web architect
►
Web application developer
►
Web site analyst
►
Web site manager
►
Database administrator
►
Server administrator
►
Network engineer
►
Security manager
►
PC technician
►
Help desk technician
IT industry job roles The responsibilities, tasks and common duties of the variety of job roles that exist in the Information Technology industry should be recognized by those who w will ill take the CIW Foundations exam. Often these job roles will will be mentioned, mentioned, by name, name, in employment employment postings; postings; just just as often you you may have have to read the details of a job listing to place the position within one of these roles.
Web si site te designe signerr The user interface and the overall visual appearance of the site are created by the Web site designer.
Web architect The Web architect creates the plan for development and support of the Web site and often acts as the project manager in charge of site development, who will pull together the talents of many other individuals to create a finished product.
CIW Foundations (1D0-510)
Web application developer The Web application developer uses programming languages to create the server-side programming that makes a Web site dynamic. Some of the languages used by the Web application developer include C#, Java, PHP, Perl and Visual Basic Script.
Web si site te anal analyst yst During the creation of a Web site or after a site has been in use for some time, it is desirable to learn whether or not the site is performing as expected. The role of a Web site analyst is to report on, and make recommendations about, a site’s performance through Web analysis anal ysis tools, surveys and usability evaluations. evaluations.
Web si site te manager The Web site manager is commonly responsible for keeping the Web site running smoothly. By leading a team of Web professionals (sometimes performing all of the roles described above) the Web site manager is able to keep the site up to date, correct style or content errors and generally keep the site functioning as an extension of the business or organization.
Database adm administr nistrator ator Most dynamic Web sites retrieve or store information in a database. Almost any popular Web site that you could name is actually a user interface for a complex database. The database administrator is responsible for the design, maintenance and security of the information kept in the database.
Server admini nistrator strator The server administrator is responsible for the Web site infrastructure. If the server computer which runs, stores and manages the Web site crashes or becomes otherwise unavailable, the Web site itself also becomes unavailable. The server administrator is is responsible for keeping such ―downtime‖ to a minimum, a minimum, and ideally to none at all. The server administrator is responsible for configuring the Web server in the most reliable, secure, easily restored way possibly including uninterruptible power, redundant or mirrored servers and tape backup of the Web site and database servers.
Networ Netw ork k engi ngine nee er Even a well designed Web site running on properly maintained servers is useless unless it is placed on a network with access to the Internet (or a local network in the case of an intranet). The network engineer must design and support the devices and transmission media that allow communication between the Web site and visitors who use it.
CIW Foundations (1D0-510)
Security manager Often, the information being displayed or gathered by a Web site should be suitably secured from just anyone accessing the site. For example, when a purchase is made from an e-commerce Web site using a credit card, special precautions must be taken to safeguard the credit card number and associated personal information. This and other security requirements are the job of a security manager.
PC technician Building, configuring, installing and repairing computer hardware is the job performed by a PC technician. The PC technician is often also responsible for installing and maintaining the operating system and other software used on a computer. A PC technician should be knowledgeable about computer components, troubleshooting procedures and software configuration.
Help desk technician The help desk technician is often the first line of support for a computer user. When a user experiences difficulty in accessing a Web site, they will often communicate with a help desk technician to determine the problem and how it can be corrected.
1.2. Identify the infrastructure required to access the Internet, including hardware and software components components.. An IT professional certified as a CIW Associate will need to understand the software and hardware components required to access the Internet. ►
Client
►
Server
►
History of the Internet
►
Internet infrastructure
►
Connection devices
►
Consumer Internet connections
CIW Foundations (1D0-510)
Client and Server Most information systems make use of the client/server model which describes a process where the server offers a file, application or service which is requested by a workstation (the client). Modern networks commonly include several servers and hundreds or thousands of clients. Common examples of the client/server model include print servers, file servers, authentication servers, Web servers and e-mail servers to which multiple clients connect in order to make use of the offered services.
History of the Internet The Internet, of course, is not a single network, but a vast collection of separate networks that share resources by using common protocols. The origin of the Internet was in 1969 when the Advanced Research Projects Agency Network (ARPANET) was funded by the U.S. Department of Defense. After the U.S. Department of Defense ended ARPANET the National Science Foundation took over the equipment and sites involved and formed NSFnet. Eventually NSFnet was expanded to include sites belonging to businesses, government and military installations, and universities. This large connection of separate networks became our modern Intranet. All of these separate networks are able to communicate because they use common protocols. Protocols can be best described as rules for communication. The protocol used to communicate on the Internet Internet is the Transmission Control Protocol/Internet Protocol (TCP/IP) which includes the ability to provide an identifier or address for every server or client on the Internet. The current version of TCP/IP is known as version 4 (IPv4) and uses a 32 bit address format of 4 numbers separated by a period such as 63.146.189.101. A common name for this version of TCP/IP addressing is the ―dotted quad‖. quad‖. A newer version of TCP/IP is planned which uses a 128 bit address format allowing for a far greater number of addresses, as well as more sophisticated address management and routing methods. IPv6 will use hexadecimal numbers (using digits of 0 through F rather than 0 through 9) for addressing, like this: FEBC:A574:382B:23C1:AA49:4592:4E66:9982
CIW Foundations (1D0-510)
Internet infrastructure The Internet client infrastructure requires 6 elements in order to connect to (or make typical use of) the Internet: ►
An access device such as a computer, Internet-enabled mobile phone, or PDA.
►
An operating system
►
TCP/IP for communication on the Internet
►
Client software such as a Web browser, chat client, or e-mail application
►
A physical Internet connection
►
A valid Internet address.
The TCP/IP address is typically associated with a name such as as www.preplogic.com www.preplogic.com so that we can use the Internet without memorizing thousands of numeric addresses.
Connection devices One of the 6 elements needed for an Internet connection is the physical device that provides the connection. Many people access to the Internet using a dialup connection. A dialup connection is created by a modem which is used to translate the digital signals used by the computer to the analog sounds that are carried by regular telephone lines. The need to carry analog sounds – sounds – such such as speech – speech – on on a regular phone line restricts the speed at which digital information can be carried on that kind of connection. Faster Internet connections are supported by other connection co nnection devices that are considered to be b e ―direct‖ connections. They can communicate using digital techniques that do not require the translation of signals to sound, and are therefore much faster.
CIW Foundations (1D0-510) Examples of direct connection types include: Connection Type
Description
Speed
ISDN
A telephone service that provides digital data transmission over existing copper telephone wiring.
264 Kbps (thousands of bits per second) channels 512 Kbps to 32 Mbps (million bits per second)
DSL
The Digital Subscriber Loop is a technology for delivering high-bandwidth digital information using ordinary copper telephone lines. There are several variations of DSL. DSL. This is a common consumer Internet connection.
Cable modem
A high-speed digital connection using the coaxial cable and infrastructure provided by cable television providers. This is also a common consumer Internet connection.
512 Kbps to 52 Mbps
T1
Dedicated high-speed telephone connection
1.544 Mbps
which can be configured to carry voice or data. E1
A digital transmission link used in Europe.
2.048 Mbps
E3
A digital transmission link used in Europe.
34.368 Mbps
T3
Recently renamed to DS-3. This is the equivalent of 28 T1 lines.
44.736 Mbps
Wireless
A network connection using radio waves rather than a network cable. Wireless connections are becoming increasingly popular as a method of consumer Internet connection.
Various, from 2 Mbps to
LAN
Local Area Network using the or optic to fiber connections employed bycopper an organization connect servers, clients and other network devices. Commonly the LAN is not the connection to the Internet, but makes use of a router to connect to the Internet.
10 Mbps, Mbps to 100 1000Mbps
Fiber-optic
This network connection uses light rather than electrons to transmit data. Fiber-optic connections are becoming increasingly popular as a method of consumer Internet connection.
Up to 100 Gbps (Gigabit or 1,000 megabits)
CIW Foundations (1D0-510)
1.3. Define important Internet communications protocols and their roles in delivering basic Internet services. ►
Remote access protocols
►
Internet service protocols
Remote access protocols You may recall our definition of a protocol as a set of rules for communication. A connection to the Internet is, in part, accomplished by the use of a variety of protocols, for a variety of purposes. Specifically, these protocols are for the establishment and maintenance of a connection to the internet. These remote access protocols include the Point-to-Point Protocol (PPP), commonly used to connect via a telephone modem to an Internet Service Provider (ISP); and a similar protocol to establish a connection using an existing Ethernet connection, called Point-to-Point Protocol over Ethernet (PPPoE). The PPPoE is often used when you connect to your Internet access device using a network cable instead of a serial or modem cable.
Internet service protocols The concept of the protocol extends beyond just the connection to the IInternet. nternet. The activities that you take part in on the Internet have their rules for communication also. For example the way in which which a Web server responds to a request for a Web page is called the Hypertext Transfer Protocol or HTTP. You might recognize this as part of the information that is displayed in your browser address bar, such as: http://www.testprep.com. There are a variety of other such protocols with which you should be familiar – familiar – FTP FTP for file transfer, SMTP for simple mail transfer, POP for the post office protocol, IMAP for Internet Message Access and HTTPS for secure Web page requests.
CIW Foundations (1D0-510)
1.4. Identify the basic principles of the Domain Name System (DNS). Every Web site must have a unique name and address. The Domain Name System (DNS) w works orks to match domain names with Web site addresses.
Domain Name System (DNS) ► Resolves IP addresses into recognizable names ►
Inter-changeable information o 192.112.12.2 = = www.chromezebra.com
Internet domain naming Domain Dom ain
T ype
.com
commercial or company sites
.edu
educational institutions, institutions , typically universities
.org
organizations; originally clubs, associations and nonprofit groups; currently, various types of organizations
.mil
U.S. military
.gov
U.S. civilian government
.net
network sites, including ISPs
.int
international organizations (rarely used)
Hierarchical DNS naming structure ►
Domain names o Read from right to left o General to specific
CIW Foundations (1D0-510)
Domain name server This is a server that resolves domain names into IP addresses.
Shared domains A shared domain occurs when a company domain name is shared with another company. Example: If chromezebra shared its domain name with other companies, you might see othercompany.chromezebra.com
1.5. Identify the functions of Web browsers, and use them to access the World Wide Web and other computer resources.
Uniform Resource Identifiers (URLs) ►
Includes: o Protocol o Internet resource (server or host name) o Domain name
►
Absolute URL o Example: http://www.chromezebra.com/images/top.gif
►
Relative URL o Example: images/top.gif
CIW Foundations (1D0-510)
Securing Internet communications ►
Configure the browser’s security settings settings o Accept, reject or prompt before accepting: o ActiveX controls o Java applets
►
Restrict o Set safety levels accordingly
Use a Web browser to download dow nload files ►
You can use a browser to: o Save an entire Web page o Save elements of a Web page o Download executable files or other types of files from the Internet to a specific location on
your hard drive o Copy selections to the Clipboard
Intranet, extranet, Internet ►
Intranet o An internal or in-house Web site used only by employees within a company
►
Extranet o An internal network designed to provide access to selected external users; these are not
available to the Internet public
CIW Foundations (1D0-510)
Browser plug-ins ►
Programs designed to extend basic browser functionality o Helper mini-programs that allow browsers to run various types of files o Associated with a specific platform (Windows or Macintosh) and sometimes with a specific
browser o Provide efficient integration of multimedia formats with the browser and computer
1.6. Use e-mail clients to send simple messages and files to other Internet users. In order to send and receive e-mail, the following must be in place: a unique IP address, an account name, a password, and a service provider or hosting company.
Types of Email ►
Types of Email o Browser-based o Outlook Express, Netscape Mail
►
Online Service o AOL, CompuServe
►
Web-based (IMAP) o Yahoo, Hotmail, etc.
Sending and Receiving Email ►
Requirements o Email program
CIW Foundations (1D0-510) o Incoming mail server and protocol (POP)
POP3 account name (user name)
POP3 account password
o Need outgoing mail server and protocol
SMTP
E-mail signatures ►
Display at the bottom of an email message
►
Identifies the sender and provides contact information
►
Can be added automatically to outgoing messages
►
Some companies require signatures to follow specific guidelines for content and structure
►
Default Signature o Only one can be the default signature at any given time
E-mail attachments ►
Attaching Files o Any kind of file can be attached to an email message o Use attachments for sharing files and documents
►
Receiving an attachment o The email clients uses MIME to identify attached files by their file type o Some attachments are blocked or removed by the browser security or antivirus program
►
Company servers scan email attachments o Company servers may block certain types of attachments, or all attachments, depending on the
company security policy
E-mail for Business ►
Choose the response to email o Reply o Reply All o Forward
►
Communicate professionally
CIW Foundations (1D0-510) o Use proper grammar o Check spelling o Keep messages clear and concise ►
Remember e-mail is permanent
►
Include e-mail threads o Add information about what you are addressing from the original email.
►
Out-of-office messages o Automatic feature to tell senders that you are gone.
E-mail Issues ►
Sexual harassment
►
Offensive language
►
Disclosure of confidential information
►
Combating spam o Use spam filters o Block mail from IP addresses o Use a blackhole list o Require SMTP authentication o Set up rules
►
Storing email messages o Make local copies o Remove messages from the server
1.7. Define and use additional networking and Internet services. The Internet allows you to collect information in many ways. The following tools allow you to do a myriad of things online: ►
Newsgroups o Also called UseNet o Allow posting of questions and information
CIW Foundations (1D0-510) o Broken into many categories and subcategories o Postings are for those who have used a product, not for manufacturer sales pitch o Tree Structure
Uses dot notation to separate categories
Read left (broad category) to right (more specific category)
Example: comp.lang.java
Computer language java
►
FTP o Used to transfer files between two computers o Upload or download files through the internet o Public FTP servers allow anonymous logon and downloading of files only o Corporate FTP servers usually require a user name and password o Types
Command-line FTP
Built-in FTP browser client
Specialized FTP client
o Downloading Files
Taking a file from a server and putting and putting it on the user’s computer
Use the get command
o Uploading Files
Transferring a file from the user’s computer to another computer
Use the put command
o Secure versions of FTP
Secure Copy (SCP)
SSH File Transfer Protocol (S/FTP)
SSL/TLS-enabled FTP (FTPS)
►
Telnet – Telnet – before before the Internet o Remote host connection
Logs on to a server and access information as if you were sitting in front of the server
o Provides a login shell (an environment that allows you to issue commands) o Similar to a dial-up shell account
CIW Foundations (1D0-510) o Establishes a text-based connection with another computer o Requires a username and password
Uses a generic user name and password to access public servers
o SSH (Secure Shell)
Secure form of Telnet
►
Virtual Network Connection (VNC) o Allows you to control a computer at a remote location as if you were sitting in front of it o Consists of two components: the server and the viewer o Provides a full GUI display and allows authenticated users to log on and see the same display
they would see if they were sitting in front of the computer o The viewer and server do not need to be running the same operating system
►
Instant Messaging o Computer-based method of communication in which users can type and view messages sent to
one or more recipients and view the responses immediately o Contacts must be online to receive messages o Can send files, view photos, send Web links and talk to contacts o Becoming very popular in the workplace o Requires an instant messaging client and an account for instant messaging service o IM Programs
AOL, ICQ, Trillian, MSN
CIW Foundations (1D0-510) ►
Peer-to-Peer o Each computer has both client and server capabilities o On the Internet, a P2P network allows a group of users to connect with each other and directly
share files among their hard drives o P2P networks are inexpensive and allow users to share
bandwidth
o Examples:
Kazaa
ITunes
►
Lightweight Directory Access Protocol (LDAP) o Directories contain contact information o Used by corporations to organize names, addresses, etc. o Simplified version of X.500 standard o Supports TCP/IP o Makes global directory service available to everyone o Modern e-mail clients are capable of searching an
LDAP directory ►
Concurrent Versioning System (CVS) o Development tools for programmers o Used on Linux or other UNIX-based systems o Controls different versions of the pieces of a
program, as those pieces are developed o Allows programmers to use the latest (debugged)
versions of their co-workers’ co-workers’ code while developing their own portions portions ►
o Allows a large program to be developed in a much shorter time frame
Blog o Collection of personal thoughts on a Web site
1.8. Demonstrate ways to communicate effectively using Internet technology. ►
Netiquette o Don’t type in all caps caps o Check spelling
CIW Foundations (1D0-510) o Be careful about using acronyms ►
Ethical issues o These issues are the same as if you were communicating face-to-face. o Remember that IM and chats are not secure o Do not ask for personal info o Do not send credit card or password info o Do not represent yourself as someone else o Adhere to copyright laws o Pay for shareware if you keep it o Do not plagiarize o Do not libel others
►
Avoid harassment o Sending instant messages to those who do not want them o Jokes in bad taste o Forwarding everything
1.9. Identify and configure user customization features in Web browsers, including: preferences, caching, cookies. ►
Configuring browser preferences o Fonts o Home page URL o History folder cache time o Controlling pop-up and pop-under windows o Image loading
Disabled: text only, reduces page load time
o Cookies and Privacy
Text file that collects visitor information
Helps to customize return visits
Privacy levels are modified to block or allow cookies
o What is and is not allowed to be executed
CIW Foundations (1D0-510) o Cookie warnings
Security Security from unauthorized breaches can be provided through a variety of methods. The following addresses some of those methods: ►
Browser security o Accept, reject or prompt before accepting:
ActiveX controls
Java applets
o Restrict
Set safety levels accordingly
►
Proxy servers – servers – provide provide added security o Placed between corporate networks and the Internet o Provide:
Web document caching: speeds up access
Corporate firewall access
o Configure Browsers for use with Proxy
Netscape Navigator: manually configure to work with a proxy server, or can use a
proxy server’s URL to automatically configure itself
Internet Explorer: automatically scans the network for a proxy server; or uses a
configuration script; or can be configured manually
CIW Foundations (1D0-510)
Troubleshooting connection problems ►
Client problems o Poor rendering o Slow connection o No connection o Inability to render images o Slow browser and other system functions
►
TCP/IP troubleshooting tools o I pcon pconfi fig g
o Ping
Displays system IP configurations
Tests connectivity between a source system and a destination system
o Tr Tra acert
Determines the path between a source system and a destination system
CIW Foundations (1D0-510)
1.10. Identify security issues related to Internet clients (e.g., Web browsers, email, instant messaging) in the workplace, including: certificates, malware, illicit servers and viruses.
Authentication Authentication verifies the identity of the person logging into a computer, web site, etc. The most common forms of authentication are usernames, passwords and digital certificates. ►
User names and passwords o Use to log on to private and public networks, including the Internet
►
Digital certificates o Attachments to electronic transmissions that supply a verifiable signature o Digital signatures – signatures – electronic electronic signatures that verify the identity of the message sender
Non-repudiation Non-repudiation – – digital digital signatures prove that a transaction or transmission took
place; such that neither the sender nor the receiver can later deny the action
Encryption Encryption is the scrambling of data using a mathematical algorithm (when you see algorithm, think calculation). There are three types of encryption: symmetric-key, symmetric-ke y, asymmetric-key and hash function. Note: the standard is 128-bit symmetric-key encryption. ►
Symmetric-key (secret-key) encryption o The same key is used to encrypt and decrypt messages
►
Asymmetric-key (public-key) encryption o Two keys are used to encrypt and decrypt messages: a public key and a private key o Uses an RSA algorithm
►
Hash (one-way) encryption o Uses hashes to verify the integrity of transmitted messages o Also called a message digest o Uses the MD5 or SHA (160-bit – (160-bit – more more secure than MD5) algorithm
CIW Foundations (1D0-510)
Firewall Firewalls are collections of hardware, software and corporate policies that prevent unauthorized access to, or from, private networks. ►
Prevent unauthorized Internet users from accessing private networks
►
Retain control of proprietary information
►
Prevent unauthorized export of proprietary information
►
Prevent access to external e-mail providers or external servers
Malware ►
Virus o Damages computers and networks, often alters files to damage or destroy data
►
Worm o Resides in active memory and replicates itself until an entire disk is full
►
►
Trojan horse o Appears to be harmless (such as a computer game) but produces harmful results
Illicit server
o Installs hidden services on systems
Client code: allows remote access to a computer by an attacker
Server code: infects destination computers and enables the attacker to control it
►
Spyware (adware) o An application secretly placed on a user’s system to covertly gather information and relay it to
outside parties, usually for advertising purposes o Cookies are not spyware because:
CIW Foundations (1D0-510)
The user is aware of their presence
The user has the option to disable outside access to cookie information
o Use spyware detection applications to detect and eliminate spyware
Protection ►
Do not open e-mail or attachments from unknown senders
►
Configure browser and e-mail security to highest levels
►
Use antivirus software
►
Keep antivirus software current
►
Install system patches and updates
►
Stay informed about the latest virus threats
►
Make backup copies of important files
►
Use a password-protected screen saver to eliminate prying eyes
1.11. Use different types of Web search engines effectively. ►
Search Engine o A powerful software program that makes it easy to find information on the Internet o Large database that allows you to query indices
►
Index o An enormous catalog that is compiled by the search engine o Many engines use ―robots‖ or ―spiders‖ to automatically a utomatically search the Web and inde index x Web sites
►
Types of searches o Directory search
Search engine displays a list of categories and subcategories that you can browse to
find information or websites o Keyword search
Enter keywords in a search engine to find information about any subject you want to
investigate ►
Register with search engines o May be manual or automatic submission o Once submitted:
CIW Foundations (1D0-510)
Robots search your site for relevant keywords found in the <meta> tag
Search engines that scan Web pages for <meta> tags are called meta search engines
o Information portal
Only finds Web sites based on manual submissions
Information portals are more likely to contain high-quality content matches to any
given query o Search engines
Uses a robot or spider program to browse the Web, following hyperlinks, and indexes
the content that the robot finds
Popular Searches ►
Yahoo o One of the oldest and most basic information portals o Yahoo was not intended to be a search engine; it was intended to provide multiple links
►
relating to each topic AltaVista o Originally designed to index the entire Internet o Two search options are offered: general and advanced o Ranks relevance to a site based on keywords entered by the user
►
Google o Ranks relevance to a site based on keywords entered by the user o Also determines relevance based upon how many hyperlinks are made to a particular site
►
Lycos o One of the largest and most complete databases on the Internet o Offers both directory and keyword searches
►
Webcrawler o A much smaller database than Lycos o It is fast, simple and reliable o Good for general searches
►
Excite o Allows keyword searches o Also contains cross-referencing fields for conceptual searches
CIW Foundations (1D0-510)
Boolean operators Symbols or words used to narrow Internet search results by including or excluding certain words or phrases from the results ►
Common operators: o AND, OR, NOT, NEAR, FAR, BEFORE, ADJ (adjacent) o Plus sign ( + ) o Minus sign ( - ) o Brackets ( [ ] ) o Quotation mark s ( ― ‖ ) ) o Asterisk ( * ) o Period ( . )
►
Boolean Operators Results: o keyword1 AND keyword2
results must include both keywords
o keyword1 OR keyword2
results must include at least one of the keywords
o keyword1 NOT keyword2
results must exclude keyword2
o keyword1 + keyword2
results must include both keywords
o keyword1 - keyword2
results must exclude keyword2
Search Strategies ►
Check the default settings for each search engine
►
Use keywords that are specific, and try to use nouns rather than verbs
►
Combine keywords into phrases by using quotation marks to indicate exact wording
►
Use all uppercase letters when typing Boolean operators
►
Use all lowercase letters when typing keywords
CIW Foundations (1D0-510)
1.12. Identify and use principles of Personal Information Management (PIM), including: common applications. PIM software is used for a variety of organizational tasks: ► ►
Keeping track of appointments
►
Storing contact information Providing email capabilities (some programs)
►
Providing a centralized electronic calendar (some programs)
►
Setting reminders and alarms
►
Use with PDAs - Synchronize data between PDA and desktop computer
Wireless Application Protocol (WAP) ►
Protocol used for wireless communication of hand-held devices
►
Views Wireless Markup Language (WML)
►
Advantages: Allows access to the Internet from anywhere
►
Disadvantages: Device screens difficult to read, no e-mail attachment support
1.13. Efficiently transmit text and binary files using popular Internet services. ►
Compression o Downloaded files are usually compressed o You must decompress to use the file
►
File Types
o MIME types may need to be defined o Some files may be blocked ►
Common compression utilities include: o Zip/unzip o Bzip2/bunzip2 o Bzip/bunzip o Gzip/gunzip o Compress/uncompress o RAR/WinRAR
CIW Foundations (1D0-510)
1.14. Identify security-related ethical and legal issues faced by IT professionals.
Privacy Issues ►
Your computer activities are no longer private
►
You may receive malware and spam
Organizations may monitor employee e-mail and restrict access to Internet sites ► Network administrators may audit the contents of employee hard drives
►
►
Protect Yourself o Do not click banner ads o Do not sign up for unwanted mailing lists (sweepstakes, etc.) o Conduct secure transactions o Send only emails that anyone can read o Be selective before posting to a message board/Usenet o Use home computer for personal communications and Internet searches
Copyright Issues Copyright is defined by expression and originality. You need to know the laws governing copyright. ►
Copyright laws extend to works of authorship on the Internet
►
There is no international copyright
►
You must obtain copyrights from the appropriate agency in your home country
►
Court cases have set precedents that copyright-protected material cannot be used or distributed on the Internet without permission
Other Issues ►
Licensing: o To license copyright-protected material, you must obtain permission from the author
►
Trademarks: o To register a trademark, you must contact the appropriate agency in your home country
►
Encryption policies: o Determine the risk of transmitting or emailing unencrypted proprietary or sensitive data
CIW Foundations (1D0-510)
1.15. Relate project management concepts and terms to the IT profession. Term Te rm
Defin finit itio ion n
Project Management
Applying knowledge, skills and processes to specific activities in order to meet deadlines and achieve a desired result
Project
A sequence of tasks that must be accomplished within a certain time frame to achieve a desired result
Task
A unit of work during a project
Resource
A person, department or device needed to accomplish a task
Assignment
The appointment of a specific resource to a specific task
Scope
The goals and tasks of a project and the work required to complete them
Scope creep
Gradual increases in project scope that occur in small increments over time
Project Management Skills The following are skills that are essential for all project managers: ►
Planning skills o Identify project stakeholders o Acquire the right staff for the project o Develop and manage project teams
►
Organizational skills o Control how and when tasks are completed o Prioritize tasks
►
Communication skills o Gather information o Evaluate and communicate project condition
►
Problem-solving skills o Identify problems o Propose solutions
CIW Foundations (1D0-510) o Make decisions in a timely manner
Project Management Phases ►
Initiating phase o
Conduct needs analysis
o Determine objectives, assumptions and constraints o Create Statement Of Work (SOW) ►
Planning phase o Develop project schedule o Assemble project team
►
Executing phase o Perform project tasks
►
►
Controlling phase (concurrent with executing phase) o Monitor progress and take corrective action as needed
During the executing and controlling phases:
o Schedule meetings with team members to monitor progress o Schedule meetings with stakeholders and management around milestones to review project
status o Avoid scope creep by managing requests and changes at regular intervals ►
Closing phase o Evaluate schedule, budget, scope, resources and assignments o Formal acceptance of project deliverable
►
During the closing phase: o Test the product
Client evaluates and accepts/rejects project deliverable
o Evaluate performances
Review performances of team members
o Document lessons learned
Review what went well, what did not and what could be done differently to improve
team performance
CIW Foundations (1D0-510)
1.16. Recognize essential database concepts. Search engines use large databases that contain information that can be searched. Before continuing it is important that you understand basic database concepts.
Database Terminology Term Te rm
Defin finit itio ion n
Database
An organized collection of information that pertains to a particular subject or purpose
Table
A collection of data about a specific topic, organized into columns and rows
Field
A category of information in a table (column)
Record
A collection of information consisting of one or more related fields about a specific entity (row)
Relational Database
A database that contains multiple tables related through common fields
Common field
A field, contained in two or more tables, that forms a relationship between the tables
Relationship
A connection between two or more tables based on a common field
Primary key
A field containing a value that uniquely identifies each record in a table
Foreign key
A field in a related table that refers to the primary key in another table
Query
Ask a question of the database
SQL
Standard interactive and programming language for accessing information from, and updating information in, relational databases
CIW Foundations (1D0-510)
Relational Databases ►
Relating tables eliminates the duplication of data
►
Tables are related through their common fields
►
The common field is the primary key in one table and the foreign key in another table
CIW Foundations (1D0-510)
Relationships ►
One-to-one relationship o Each record in Table A can have only one matching record in Table B
►
One-to-many relationship
o A record in Table Arecord can have manyAmatching in Table B, but a record in Table B has only one matching in Table (the mostrecords common table relationship) ►
Many-to-many relationship o One record in either Table A or B can relate to many matching records in the other table o Established by creating multiple one-to-many relationships with a third table (junction table)
Connecting Databases to Internet Servers ►
Database Management System (DBMS) o Program used to store, access and manipulate information
IBM Oracle
SQL Server
Microsoft Access
Sybase
►
Open Database Connectivity (ODBC) o Standard that allows an operating system to access databases.
►
Alternative standards o Java Database Connectivity (JDBC) o Common Interface Gateway (CGI)
o Connects the server to the database
CIW Foundations (1D0-510)
Domain 2: Site Development Foundations – 35% 35% 2.1. Demonstrate knowledge required to create a Web page.
History of markup languages SGML, or Standard Generalized Markup Language, was created by IBM and became a standard recognized by the International Organization for Standardization in 1986. SGML is a very capable yet very complex language used to describe the information within a document. HTML was designed by Tim Berners-Lee as a method of distributing documents across a computer network. HTML is similar to SGML in many ways, but it uses a much simpler set of elements than SGML, and as a result has become the standard for transferring information in Web documents. It is important to note that markup languages are quite different from programming languages. Markup languages define what information is for, and and how information should be presented. Markup languages are not used to perform calculations or any of the other duties of a programming language. Over time, HTML has been extended and modified so that it is now commonly used to provide formatting information for a web page and not just content or data. The way in which HTML changes the information in a document is by embedding special codes or elements called tags within a document.
Versions of HTML The type of Web design that is tested by the CIW v5 Foundations Exam 1D0-510 is very different from the type of Web pages that were created when HTML was first created. The first Web pages were scientific documents following a standardized layout with little need for colors, animations, sound or support of accessibility accessibilit y requirements. The primary purpose of these early Web documents was was to provide built-in links to other documents of a similar nature. This use of HTML was not satisfying to the Internet using public, who demanded a much more colorful, dynamic and entertaining kind of Web document. Many enhancements were made to HTML by individual interpreters – interpreters – the the programs that display Web pages – pages – in in an effort to appeal to a wider audience. audience. Web browsers and e-mail client software are the most common interpreters, and these programs are written by several companies with competing ideas of what HTML should do.
CIW Foundations (1D0-510)
HTML ►
Hypertext Markup Language (HTML) o Allows hyperlinks and describes visual layout o HTML versions include HTML 3.2 and HTML 4.01
►
HTML 4.0 ―Flavors‖ ―Flavors‖ o 4.01 Transitional -- allows deprecated tags and html formatting o 4.01 Strict -- requires all tags be container tags, does not allow deprecated tags, and requires
CSS for formatting o 4.01 Frameset -- for use with frames
Document Structure Tags Every XHTML document must have the following document structure components so that the appropriate interpreter can render the document as expected and validate its contents:
<!D !DOCT OCT Y PE PE> >- determines how the markup will be rendered. <html></html>- identifies that the document is written in HTML. This tag sets boundaries by marking the beginning and end of pages.
<head></head>- contains the document title, and sets the global settings which effect the entire document. Used by search engines to determine whether it meets the required criteria.
<link> - references a style sheet <title></title>- created within the <head>, and is displayed at the top of the browser window. <body></body>- contains the bulk of the document, text, headings, links, graphics, etc. What you see on the screen resides here.
CIW Foundations (1D0-510)
Document Type Declaration (DTD) Every XHTML page must contain this declaration. ►
<!DOCTYPE> o An SGML statement that describes the nature of your code
►
o Placed at the top of the document
No DOCTYPE
o Two problems may arise:
Unable control how the code renders in the future
Unable to use a markup validator
►
Each version and flavor of XHTML has its own DOCTYPE
Error!
Text and paragraph formatting tags ►
Block-level markup elements o <p/> creates a blank line below text o <br/> moves to next line
►
Text-level markup elements o <bold> or <strong>
►
o <i> or <em>
Heading tags
o Automatically places formatting on text o Levels 1 (large) through 6 (small)
<h1> </h1>, <h2> </h2>, <h3> </h3>, <h4> </h4>, <h5> </h5>, <h6> </h6>
o Used in Transitional HTML/XHTML ►
Indenting and centering text o <div align=―center‖ /> <div align=―right‖ /> /> o <p align=―center‖ />
<p align=―right‖ />
CIW Foundations (1D0-510) o <blockquote />
Lists ►
Ordered o A numbered list o Uses the <ol> element and requires a closing tag </ol>
►
Unordered o A bulleted list o Uses the <ul> element and requires a closing tag </ul>
Hyperlink Tags Hyperlinks connect pages to other pages and files on the Internet. Internet. Clicking on a text or image link will take you to a new Web page. ►
Create a hyperlink o The <a> anchor tag creates hyperlinks o A container tag that encompasses the text or image (or both) to be used as a link
CIW Foundations (1D0-510) o ►
<a href="URL"> linked text or image (or both) </a>
Image links o <a href=―http://www.chromezebra.com‖> <img src=―elephant.jpg‖ /></a> /></a>
►
Uniform Resource Locator (URL)
URL UR L
De Des scri cription ption
E xa xam mple ples s
Fully Qualified (Absolute)
http://www.someserver.com/somepage.html A URL that contains a full path to a resource, including http://someserver.com/pub/~james/somefile.ext the protocol. Also known as a c:\intetpub\wwwroot\ccyp\syb\syb.html hard link.
Partial
A URL that assumes the syb.html current document’s path. All Specifies a file in the current directory references are made from the document’s current directory. directory. ../css/stylesheet.css Specifies a file one directory up from the current page
pub/images/mybullet.gif Specifies a file in a subdirectory
Internal Hyperlinks (Bookmarks) ►
Target links within the page
►
Attribute o name
►
Form o <a name=―top‖> name=―top‖> o Defines the internal bookmark (place it where you want it to go) o <a href = ―#top‖> ―#top‖>
Defines the link
Note the # sign
CIW Foundations (1D0-510)
HTML tables ►
Control content placement
►
Aligns images and text
►
Organizes information
► ►
Presents data that lends itself to tabular format Offers many formatting options
►
In XHTML, do not use to structure entire pages
►
Column and Row Spanning o Allows rows or columns to span the table
CIW Foundations (1D0-510)
Comment Tags Add hidden comments by using the comment tag: <! — comments comments here -->
Document Object Model ►
Vendor-neutral, cross-platform application programming interface (API)
►
Specifies objects in a document that can be referred to and manipulated through scripting languages
►
Describes the elements or objects, within a document
►
A W3C standard
►
Accessing a browser's DOM o Must use a scripting language o JavaScript or VBScript
►
Factors when choosing a DOM Compliant browser o Stability and security o Authentication features o Availability
2.2. Add images and graphical formatting to HTML files.
Adding images to Web pages ►
Image tag o <img src=―mypic.jpg‖ /> />
►
Aligning images relative to text o <img src=―image.jpg‖ align=―top‖></img> align=―top‖></img>
o Values = top, middle, bottom ►
Text description of image (ALT) o <img src=―image.jpg‖ alt=―pigs‖> alt=―pigs‖> o Include the alt attribute with a corresponding value o Required to validate as XHTML o Allows browsers and screen-readers to read the image description to the viewer
CIW Foundations (1D0-510)
Image maps These images contain clickable regions that are defined d efined as ―hot spot‖ that hyperlink to other pages or page sections. Two types: client or server side
Image map tags ►
<map> </map>
o <map name=―mymap‖ id=―mymap‖> id=―mymap‖> o Names the image map o Id is required to validate as XHTML ►
<area> o Defines regions in the image o Attributes
Shape -- defines the shape of the regions
Rect, circle, polygon Coords --specifies the coordinates of the map
Href -- specifies the hyperlink
►
<usemap> o Can be placed before or after MAP coding o Indicates that the image placed in the Web page will use a map
►
#mapname o Indicates that the map resides within the same page
CIW Foundations (1D0-510)
<body> backgrounds and color ►
Background color o <body <body bgcolor=―#FF0000‖ > >
►
Background image
►
o <body background=―pigs.jpg‖ > >
Text color
o <body text="colorNameOrCode"> ►
Unvisited link color o <body alink="colorNameOrCode">
►
Visited link color o <body vlink="colorNameOrCode">
Image file formats ►
GIF (Graphics Interchange Format) o GIF 87a and GIF 89a o Supports transparency, interlacing and animation o Line art, images with 256 colors or less
►
JPEG (Joint Experts Group) o Supports 16+ million colors o Photographs
►
PNG (Portable Network Graphics) o New format o Quick loading, supports all colors o Supports transparency (not supported in IE)
CIW Foundations (1D0-510)
2.3. Identify and use design and color principles for Web pages.
Design Considerations ►
Popular color combinations o Consider existing sites o Cultural and audience concerns
►
Culture and Audience o Colors o Professionalism
►
Page layout o Layout guidelines o Document structure, the <div> tag and style sheets o Relative path names o White space, the <img> tag and XHTML
2.4. Create a basic HTML form that accepts user input. Web forms are used to obtain information from users. Input can include the user’s name, address or credit credit card number.
CIW Foundations (1D0-510)
Form Elements Text box – box – single single line of text area – specify specify columns and rows of input area ► Text area – ►
►
Check box – box – allows allows users to choose more than one item
►
Radio button – button – forces forces users to choose only one item
►
Select list – list – drop drop down menu of items
►
Submit button – button – submits submits the form to the server for processing
►
Reset button – button – clears clears the form
CIW Foundations (1D0-510)
Form Processing ►
Scripts o Sends, receives and processes data from a browser
►
Common Gateway Interface (CGI)
o Server-side script o Resides on the server o Receives and processes the data ►
Other types of scripting o Client-side script o Resides on the client o Sends and formats the data
2.5. Create HTML frames.
What are HTML frames Frames are often used to contain items that visitors should always see (copyright notices navigation information, and so on). By placing this information in a static frame, it can always be there as the user scrolls through other information in another (dynamic) frame. The <FRAMESET> tag is used to define frames in the browser. Using it, you can define the number of columns and rows the frames will occupy. Beneath this, you add the <FRAME> tag to define the content in each frame. ►
Frames are separate panes o Each has its own URL
►
Frameset Document o Contains: <frameset>, <frame>, <noframes>
►
Combines Static and Dynamic Information o Static Frames
Frames content remains the same
o Dynamic Frames
Changes in response to choices made in the static frame
Non-printable frame
Provides security
CIW Foundations (1D0-510) ►
Noframes tag o Used to display text or images in browsers that do not support frames o Place right before the ending frameset tag
►
Base Targets o Automatically sets a default target for all links o <base href=―url‖ target=―one‖> target=―one‖> o Placed into the <head> section
►
Inline Frame (floating frame) o Inserts an HTML or XHTML document inside another o <iframe> o Browser reads the <iframe> tag o Then requests the embedded file from the server
2.6. Define Extensible Markup Language (XML), and identify its features and appropriate use.
Extensible Markup Language (XML)
►
XML documents have a tree structure
►
Describes the function and context of the information
►
Contains a Document Type Definition (DTD) o Defines the syntax, structure and vocabulary
►
Must be well-formed o Contains a DTD and a root element
►
Must be valid o Must declare a DTD
CIW Foundations (1D0-510)
Server-side Languages ►
Code is executed by the Web server, not the Web browser
►
Code executes because an interpreter has been installed and activated on the Web server
►
Server-side Scripts
o Browser detection o Database connectivity o Cookie creation and identification o Logon scripts o Hit counters o File uploading and downloading
2.7. Identify essential Web site navigation issues, and ensure page/site accessibility.
Web page accessibility An accessible Web page has user-friendly, and accessible, front-end and back-end server resources that process and store user input. The World Wide Web Consortium (WC3) estimates that up to 10 percent of people have disabilities, and as such companies with a web presence should give some consideration to accessibility issues.
Addressing accessibility ►
Visual challenges o Ensure text readability o Text support for images o Screen reader support
►
Audio challenges o Provide alternative audio support o Provide alternative speech input o Text support for audio elements
►
Cognitive and technical challenges o No flashing images or strobes o Provide alternative navigation
CIW Foundations (1D0-510) o Provide audio support o Provide low resolution alternatives ►
Site maps o Text map of the site o Improves accessibility
2.8. Define and apply essential aspects of the Cascading C ascading Style Sheets (CSS) standard.
►
CSS o Adds formatting and structure to your pages o Simple text file that contains instructions o Benefits
The site pages are linked to the same style sheet
Changes to the sheet affect all pages across the site
o Strict flavors of HTML and XHTML require that you use style sheets ►
CSS Versions o CSS1: Addresses format o CSS2: Addresses multimedia objects
►
Style Types o Linked style
The <style> and <font> tags in the HTML/XHTML file will override style sheets
<link rel=―stylesheet‖ type=―text/css‖ href=―mysheet.css‖/>
o Inline style
The <span> tag
Can span multiple elements:
CIW Foundations (1D0-510)
<span style="background: red">CIW Associate </span>
o Embedded style
Uses the <style> tag within the <head> section
The style will remain in force until overridden
<style> h1 {color: magenta; font-size: 20pt} </style>
o Imported style
Like a linked style sheet, refers to a separate file
Created using the @import
type="text/ css"> @import url(import.css); </style> <style type="text/css">
2.9. Use Extensible Hypertext Markup Language (XHTML) to create Web pages.
Extensible HTML (XHTML)
►
Latest formulation of HTML
►
Allows HTML to become XML compliant
►
Extends HTML by allowing HTML to converge with XML
►
Used to organize data on the page
►
More flexible than HTML
►
XHTML flavors o Transitional -- allows formatting to be specified within the document and deprecated tags o Strict -- requires CSS for formatting, and does not allow deprecated tags o Frameset -- for use with frames
►
XHTML Rules o Requires the use of container or non-empty tags o Empty tags will not validate o Uses an alternative non-empty tag
CIW Foundations (1D0-510)
Alternative notation for stand-alone non-empty tags
Place the slash ( / ) after the element name (before the closing wicket), rather than
before the element name, as in a standard closing tag o All tags are in lowercase o Requires a DTD at the top of every page
2.10. Identify technologies for enhancing the user's Web experience, including: programming languages, multimedia technologies. Enhance the user’s Web experience by b y building the following into the We Web b site: ►
Audience development techniques o Flash, Java o Company logos o Strategies developed by sales and marketing
o Push and pull technologies o Visitor tracking ►
Portal o A Web site that acts as a centralized access point for other Web sites o Portal types:
Vertical: dedicated to a specific interest
Horizontal: links to various sites
o Portal benefits:
Direct users to the best sites
Attract users to products Improve brand name
►
Wiki site o Allows all visitors to collaborate in its construction o Wiki software is installed on a Web server o You can lock down certain pages and leave others open to editing
CIW Foundations (1D0-510)
Active Content and Formats ►
Common file formats and MIME types o HTML: text/html o JPEG: image/jpeg o Cascading Style Sheets (CSS): text/css o MPEG: audio/mpeg o MP3: audio/mp3
►
Evaluating proprietary formats o Difficulty/inconvenience
Difficult for end users to obtain or use
o Cost
Some require purchasing software
o Audience limitation
access Limits disabled person’s access
2.11. Use GUI-based HTML editing software to create Web pages.
Web site publishing ►
GUI HTML editors have built-in publishing tools
►
FTP is the standard protocol for Web page publishing o Stand-alone FTP clients o FTP client provided by GUI HTML editor o Post to test server (staging server)
Verify that pages work and render as expected
Verify that CGI script works as expected
Locate and repair dead links
Allow stakeholders to preview the site
►
Test server configuration o Identical to production server o Use the identical Web server software and CGI scripts
CIW Foundations (1D0-510)
2.12. Test and analyze Web site performance issues.
Verify accessibility ►
Use the following tools: o Bobby (www.cast.org/bobby) o STEP508 (www.secti on508..gov) www.section508
o RetroAccess (www.retroaccess.com)
►
Improve accessibility o Adhere to the XHTML 1.0 standard o Use cascading style sheets
Calculate download times ►
Check the size of the HTML file and all associated images, files or programs
►
Determine the speed of your network connection
►
Convert the connection speed and file size to common units of measure (e.g., bytes or bits)
►
Divide file size by connection speed
►
Calculate download time o (File Size in bytes x 8) / by connection speed o 65KB file = 65x1000 = 65000bytes x 8 = 520000 bits o Modem speed = 56Kbps = 56000bps o Time = 520000/56000=9.3seconds
2.13. Identify steps in the Web site planning and development process. ►
The Web site development cycle
►
Development team members
►
Web site requirements
►
Determining the audience for the Web site
►
Web site plan documentation
►
Presenting the Web site plan
►
Improving the Web site
CIW Foundations (1D0-510)
The Web site development cycle ►
Create and document an initial Web site plan o Create a site plan (rough outline of planned development) o Determine audience and message
►
o Validate design issues
Obtain relevant input from stakeholders o Relevant organization, employees or contributors o The purpose of the Web site o The services that the audience requires from the site o Development timelines
►
Communicate the Web site plan o Documenting
Create a storyboard
Document decisions in meetings and follow up
o Communicating
Calling relevant parties to ensure that everyone is satisfied
Present the plan
Lead discussions
Address technical and non-technical issues
►
Develop the site o Create Markup code o Test code with browsers o Approve the site
Ensure that everyone is in agreement
Obtain written approval
►
Publish the site o Requirements
The IP address and/or DNS name of the site
User name and authentication information
The destination directory (i.e., folder) on the Web server
o Space requirements
CIW Foundations (1D0-510)
The protocol for uploading the site
►
Manage the site o Create new content o Update dead links o Remove old sites o Remove unused pages o Ensure connectivity o Report access troubles o Process feedback from customers and stakeholders
2.14. Identify essential issues in developing and maintaining a Web site, including: project management, testing, legal issues. ►
Intellectual Property o A unique product or idea created by an individual or organization o Your responsibilities
Never ―borrow‖ content without express, written consent consent
Review copyright and trademark issues (e.g., trade secrets, licensing, infringement,
plagiarism)
Understand copyright scope, reach and time limits
Consider ethical issues of copyright, trademark and plagiarism
o Avoid copyright infringement, trademark infringement and plagiarism by:
Reviewing content
Obtaining express, written consent Creating reasonable deadlines
►
Manage Hyperlinks o Periodically check internal and external links o Use automated link-checking software
CIW Foundations (1D0-510)
2.15. Plan and deliver oral presentations of your Web site, during and after site development.
Obtain feedback on your site design ►
Comes from various sources
►
Ways to obtain quality feedback o Providing Web forms on the site that ask for customer input o Conducting surveys in person o Conducting surveys via e-mail
Communication forms ►
Presentations o Use oral presentations and presentation aids
Presentation software
Overhead projection
Whiteboards
Easel and poster paper
Charts
Published handouts
►
Leading Discussions o Make introductions o Recall past business o Create a list of action items, including timelines o Monitor time o Ensure proper discussion focus o Handle heated discussions o Distribute minutes
►
Addressing technical and non-technical issues o Regularly asking if anyone has questions o Asking team members to summarize their understanding of decisions o Asking a third party to deliver a summary of progress
CIW Foundations (1D0-510) o Writing regular updates about the project
2.16. Define electronic commerce (e-commerce) and related technologies and concepts necessary necessary to develop a secure, useful interface (i.e., storefront).
Traditional vs. Electronic Commerce ►
Similarities o Both aim to deliver a valued product or service o Both want to serve a large audience o Both strive to quickly deliver products and services
►
Differences o E-commerce customers expect shorter fulfillment time o E-commerce customers must understand Web-based technologies o E-commerce provides a global audience o E-commerce orders are processed without human interaction or travel to a store location o E-commerce relies upon encryption for security
Methods of e-commerce ►
Business to consumer (B2C) o Targets consumers or end users, and sells products and/or services
Amazon.com, small business sites
►
Business to business (B2B) o Helps organizations to manage relationships and transactions with other businesses
B2BExchange
►
Consumer to consumer o Not a traditional B2C model
eBay
CIW Foundations (1D0-510)
E-commerce technologies ►
EFT (wire transfer) o Ability to transfer funds using computers rather than paper o Ensures:
Confidentiality of payment information Integrity of payment information
Merchant authentication
Interoperability
►
Automated Clearing House (ACH) o Governed in the United States by the National Automated Clearing House Association o Used in EFT
►
Secure Electronic Transactions (SET) o Uses digital certificates to secure financial transactions o Public and private keys ensure encryption, data confidentiality and non-repudiation o Designed to allow both simple and complex transactions
►
Open Trading Protocol (OTP) o Alternative to SET
An open standard
Used for B2C and B2B
Often used with XML
o Features
Provides trading protocol options to control the way that the trade occurs
Provides a record of a particular trade Supports real and virtual delivery of goods and services (payment tracking)
CIW Foundations (1D0-510)
Secure transactions ►
SSL/TSL o Not a transaction method o Used to secure transactions o Services
Authentication
Data confidentiality
Data integrity
►
Digital certificates o Enable host authentication before an SSL session begins
►
Public Key Infrastructure (PKI) o A collection of individuals, networks and machines o Authoritatively confirm the identity of a person, host or organization
►
The SSL/TLS handshake o Negotiation between the client and server
Negotiates the encryption key
Server authenticates client
Symmetric key is shared between the client and server
►
Beginning an SSL/TLS session o Encryption begins after authentication o Issues:
Different host name
Certificate expired Certificate date not yet valid
Invalid certificate format
Certificate presented by the server not signed by a recognized CA
Incompatible encryption settings
CIW Foundations (1D0-510)
Global Environment The Internet opens up avenues to potential international customers. As the global market continues to expand, the following issues must be addressed: ►
Currency and Trade o Countries and Economic Blocks (European Union)
Uses its own currency
o Businesses and Organizations
Automatically calculate exchange rates for the day of the transaction
Calculate taxes and tariffs on goods
►
International Shipping o Issues
Customs searches
Costs incurred by customs
Delays caused by customs
o All tariffs
o Legal and regulatory issues ►
Language Concerns o Considerations
The language(s) used by the target audience
The characters necessary (e.g., alphanumeric, mathematical or currency symbols)
o Character sets and languages
Computers can use different character sets
Unicode
2.17. Demonstrate knowledge of languages commonly used to provide database connectivity to Web sites.
Server-side languages PHP
An interpreted server-side scripting language for creating dynamic Web pages, embedded in HTML pages but usually executed on a Web server
CIW Foundations (1D0-510) Perl
Server-interpreted language
ASP
-side scripting solution Microsoft’s original server -side
C
A procedural language usually used to create stand-alone applications and operating systems (e.g., UNIX/Linux). Can also be used for CGI
C++
Object-oriented language, not procedural, links data to the processes that manipulate it, creates reusable objects that can then be manipulated throughout the program, platform dependent: Must be compiled to a specific architecture
Java
Object-oriented, platform-independent platform-indep endent Can run on any operating system that has the Java interpreter installed
VB
A compiled programming language developed by Microsoft Corporation Used for stand-alone applications and server-side Web applications Easier to use than C++ and Java
C#
Object-oriented, compiled, platform-dependent Used for Microsoft .NET program
SSI
An instruction inside of an XHTML/HTML page, directs the Web server to perform an action. An alternative to CGI
Client-side languages ►
JavaScript o Object-based
o Adds interactivity to Web pages o Can also be used on the server side (Server-Side JavaScript, SSJS) ►
Function o Detect browsers o Create cookies o Create mouse rollovers
►
VBScript o Microsoft Microsoft’s ’s answer to JavaScript JavaScript o Can be used on the client side or the server side
CIW Foundations (1D0-510) o If used on the client side, only Internet Explorer can render the script
Common Gateway Interface (CGI) ►
Helps Web pages pass information to and from databases
►
Provides active content (e.g., hit counters)
►
Provides dynamic content
The role of Structured Query Language in Web sites SQL is used to create and maintain databases. SQL retrieves the data in the form requested by the web page. ►
Structured Query Language (SQL) o Advanced powerful language for accessing databases
►
Commands o SELECT -- requests data from a particular table or table row o FROM -- delimits the beginning search point in a table or table row
o WHERE -- delimits the ending search point in a table or table row o JOIN -- creates a new table from selected data o SUM -- adds numerical information within records
Database connectivity technologies ►
Connecting to a Database o Requires that web server and database recognize each other
Microsoft systems can use ODBC
Other methods include PHP scripts
o Provide read and/or write permissions to the database o Provide scripts that have the correct permissions and execute privileges
Multiple tier applications ►
Database Elements o Data
The database file, or multiple database files
CIW Foundations (1D0-510) o Business logic
The SQL coding necessary to create relationships with the data stored in the database
o Presentation
►
The way that data and business logic are presented on the user screen
In n-tier, all three database elements are separated o Tier 1 -- the Web browser is responsible for presenting information o Tier 2 -- the Web server is responsible for the programming logic o Tier 3 -- the database server is responsible for housing data and transferring it to the
Web server
2.18. Identify the benefits and drawbacks of running your own Web server versus using a service provider.
Configuring your own hosting solution ►
Benefits o Control over services o More choices
►
Drawbacks o Purchase and house all hardware/software o Configure and manage all
Using an ISP ►
Benefits
CIW Foundations (1D0-510) o No hardware or software purchase o ISP configures server ►
Drawbacks o Fewer configuration choices o
Only given basic services
Using an ASP ►
Benefits o No hardware or software purchase o Provides complete services o Creates custom solutions
►
Drawbacks o More costly than ISP o Dependent on ASP’s management management and security
2.19. Identify common strategies for managing an end user's experience and improving site creativity.
Branding A Web page is often part of a larger marketing and sales strategy. It aids in creating and ensuring brand recognition (name recognition) and presenting a strong company message. A Web site allows a company to create a market, a mind share and a brand.
2.20. Consider copyright and ethical issues when creating Web pages. Ethical issues occur when outsourcing work. Ensure that when you provide Web development work to workers in remote locations that you require Non-Disclosure Agreements (NDAs) from each worker and get legal advice.
CIW Foundations (1D0-510)
Domain 3: Network Technology Foundations – 30% 30% 3.1. Demonstrate knowledge of basic data communications components, and demonstrate technical knowledge of the Internet. ►
Basic network topologies
►
OSI Reference Model
►
TCP/IP essentials
►
LAN and WAN definitions
►
Internet infrastructure components
►
Network Operations Center
Basic network topologies ►
Bus Networks o All components use the same cable o Data is sent to everyone on the cable o Advantages: relatively simple and inexpensive o Disadvantages: a broken cable effects the entire network, when
one node fails, all fail, and isolating problems can be difficult ►
Star Network o Network nodes are connected through a central device o When one node fails, the rest still function o Advantages: network expansion and reconfiguration is simple, and
management and monitoring are centralized o Disadvantage: if the central device (hub) fails, the network fails ►
Ring Network o No central connection point
CIW Foundations (1D0-510) o Nodes connected to each other through ring o Connect through a Multistation Access Unit (MAU) on the ring o Advantages: All computers have access to data and perform well
with heavy traffic o Disadvantages: Network expansion affects network operation ►
Mesh Network o The Internet is an example of mesh topology o Devices are connected with multiple paths o The best path can be chosen o Advantages: if one connection fails, another connection sends the data o Disadvantage: hardware requirements increase costs
CIW Foundations (1D0-510)
OSI Reference Model The ISO (International Standards Organization) created the OSI (Open Systems Interconnection) model to outline networking. They defined the functions that must take place between machines in order to have a network, and broke them into seven distinct parts, or layers.
. ►
Purpose o Reduces complexity o Standardizes interfaces o Facilitates modular engineering o Ensures interoperability o Accelerates evolution o Simplifies teaching and learning
Memorize this table L ay aye er
Nam Name e
F unc uncti tion on
Proto Pr otoco cols ls
7
Application
File transfer, network management. Provides services to application processes that are outside of the OSI model.
SMTP, POP3, IMAP, HTTP, FTP, Telnet, NTP, SNMP
6
Presentation
Provides transformations on data so that it is presentable. Example: Converts ASCII text into binary code
CIW Foundations (1D0-510) 5
Session
Establishes, manages and terminates sessions (connections) between applications. Adds traffic flow information.
4
Transport
Provides reliable transport of data between end points. Uses error detection-and-recovery and information flow control. Organizes data into datagrams (packets), provides reliable addressing and determines the proper path – path – routing.
3
Network
2
Data Link
Provides reliable transit of data across a physical link. Prepares data to be placed on the transmission media (cable).
1
Physical
Transmits and receives bits. Defines electrical and procedural specifications for activating and maintaining the physical link between end systems.
TCP, SPX
IP, IPX
Ethernet, Token Ring
Networking Protocols The following protocols address the OSI/RM architecture protocols. Note: TCP/IP uses more protocols than the OSI/RM.
Protocol terms ►
Connection-Oriented (stateful) o Requires a connection at both ends before sending a packet across the network
►
Connectionless (stateless) o Packet is sent without establishing a connection first
►
Routable o TCP/IP and IPX/SPX o Travels through a router
►
Non-routable o NetBEUI, NetBIOS, SNA, LAT, DLC o Uses predefined routes (static)
CIW Foundations (1D0-510)
Protocols ►
Transmission Control Protocol/Internet Protocol (TCP/IP) -- routable o Default collection of protocols for the Internet o TCP
Connection-oriented (stateful)
Ensures reliable communication
o IP
Connectionless (stateless)
Provides addresses
o User Datagram Protocol (UDP)
Connectionless (stateless)
►
IPX/SPX -- routable o Created by Novell o IPX
Connectionless protocol
Responsible for addressing and forwarding packets
Operates at the network layer
o SPX
Connection-oriented protocol
Provides reliability
Operates at the transport layer
►
NetBEUI – NetBEUI non-routable protocol – non-routable
►
NetBIOS
o Used for Microsoft peer-to-peer networks o Mainly used as a programming interface
►
AppleTalk o Macintosh protocol divides networks into zones
CIW Foundations (1D0-510)
TCP/IP essentials TCP/IP (Internet Protocol Suite) came before an OSI model. All of the functions of networking are performed, but in a 4-layer model and not the 7 layers of OSI. To a great degree, the layers match up as shown below:
Memorize this table OSI
T CP/I P
Application Presentation
Application
Pro Proto toc cols HTTP, FTP, TFTP, TELNET, NNTP, SMTP, SNMP, DNS, BOOTP, DHCP
Session Transport
Transport
TCP, UDP
Network
Internet
IP, ICMP, IGMP, ARP, RARP
Data Link
Network Access
Ethernet, WAN, LAN
Physical
TCP/UDP Ports Some applications require a connection to be established between two computers before they can communicate, while others do not. For example, to retrieve a file from a server, a connection must be established. To send email that arrives several minutes later, a connection need not be established. Applications requiring a connection use TCP (Transport Control Protocol), while those that do no use its counterpart, UDP (User Datagram Protocol). Port numbers are used by TCP/UDP to listen for and respond to requests for communications. Common port assignments are as follows: ► Ports o Contained in packet information o Used to direct the information to the correct destination o FTP = 21 o HTTP = 80 o DNS = 53 o SMTP = 25 o Well-known ports
CIW Foundations (1D0-510)
0 – 1023 1023
o Registered Ports
1024 1024 – – 49151 49151
o Dynamic
49152 - 65535
Protocol States Before a protocol becomes a standard, it must go through four states. ►
Experimental – Experimental not intended for operation except in experiment – not
►
Proposed – Proposed testing and research stage – testing
►
Draft – Draft test results are analyzed, feedback is requested – test
►
Standard – Standard – becomes becomes a standard
►
Other states o Historic Historic – – protocols protocols replaced by more recent ones o Informational Informational – – protocols protocols developed outside of the IETF (usually by vendors)
Networks Collections of computers designed for communication. ►
Local Area Network (LAN) o A group of computers connected within a confined geographic area o Commonly used for intraoffice communication
►
►
Wide Area Network (WAN) o A group of computers connected over an expansive geographic area Network Access Points (NAP) o Junction between high speed networks o Joins LANs and WANs together o Uses routers or switches o Internet backbones
CIW Foundations (1D0-510)
3.2. Identify the role of networking hardware, and configure common hardware for operation.
Network Components These are the hardware components required to connect the network. ►
Network Interface Card (NIC) o Interface between the computer and the network
►
Repeaters o Low level devices that amplify a signal, allowing it to travel farther o Operate at the physical layer
►
Hub o Central component in a star network o Operates at the physical layer
►
Bridge o Device that filters frames based on physical addresses (MAC) o Reduces network traffic by dividing the LAN into segments o Operates at the data link layer
►
Routers o Forwards messages based on logical addresses(IP) o Used to connect LAN segments to WANs o Uses routing tables to track routes to other networks
►
o Operates at the network layer
Switches
o Direct the flow of information from one node to another o Operates at layer 2, data link layer o Benefits:
Simple installation
Higher speeds
Bandwidth control
Creates logical computer groupings (VLAN)
CIW Foundations (1D0-510)
More default security
►
Gateways (protocol converters) o Operates at any layer o Connects networks running different protocols
►
Channel Service/Data Service Unit (CSU/DSU) o Terminates physical connections o Used with T1 lines
►
Modems o Device that translates analog (phone) signals into
digital (computer) signals ►
Patch Panels o Centralized connection point between cables from other locations can be connected to each
other ►
Firewall o Secure computer placed between a trusted and untrusted network o Acts as a barrier against malicious activity
Transmission Media
LAN Standards IEEE 802.2
Divides the OSI Data Link layer into two sublayers: LLC
CIW Foundations (1D0-510)
and MAC Ethernet/IEEE 802.3
All Ethernet LANs
IEEE 802.3u
Fast Ethernet
IEEE 802.3z and 802.3ab
Gigabit Ethernet
IEEE 802.5
Token Ring
IEEE 802.12
100VG-AnyLAN, Supports access method called demand priority
WAN Standards X.25
Original packet-switching packet-switchi ng from ARPANET. Uses fast packet switching on the Internet.
Frame relay
Uses fiber-optic and digital cabling, variable length packets, Permanent Virtual Circuits (PVC) and logical end-to-end connections. Operates at 64Kbps – 64Kbps – 1.544 1.544 Mbps
ATM
Use both LAN and WAN, fixed-length packets, and operates at 155 – 155 – 622 622 Mbps
T and E-Carrier System The T-carrier system is the digital transmission format for North America and the E-carrier system is the European equivalent.
Routing IP requires routing. This is when a path is chosen by a router to move packets between networks. There are two types of routing and several protocols.
CIW Foundations (1D0-510) ►
Direct Routing o Sends information to hosts within the same physical network
►
Indirect Routing o Packets move between outside networks, requiring a router
Routing Protocols ►
Interior Protocols o Used within a company network
RIP
o Protocol that maintains the best closest route to a destination
OSPF
o Protocol that uses bandwidth, connections and security to determine the best route to a
destination ►
Exterior Protocols o Used outside a company network o EGP, BGP
3.3. Identify the relationship between IP addresses and domain names, including: assignment of IP addresses within a subnet. ►
IP addressing
►
Valid IP addresses
►
Public and private IP addresses
►
Subnet masking
►
Classless Interdomain Routing (CIDR)
►
Ipv6
IP Addressing IPv4 addresses are 32-bit binary numbers. Because numbers of such magnitude are difficult to work with, they are divided into four octets (eight bits) and converted co nverted to digital. Thus, the binary string ―01010101‖ ―01010 101‖ becomes 85. This is important because the limits on the size of the digital number are placed there by the
CIW Foundations (1D0-510) reality that it is just a representation of a binary number. The range must be from 0 (00000000) to 255 (11111111) per octet, making the lowest possible IP address:
Address Form ►
Contains the network portion (N) and host portion (h)
►
Consists of four 8-bit fields (octets) – (octets) – total total 32 bits
►
Uses dot notation o 125.25.2.0 o First value (octet) determines the address class
Class ass
For orm m/P /Pur urpos pose e
Rang ange e
A
N.h.h.h
1 – 126 126
B
N.N.h.h
128 – 191 191
C
N.N.N.h
192 – 223 223
D
multicasting
224 – 224 – 239 239
E
future use
240 – 240 – 247 247
Loopback
troubleshooting
127
Broadcast
broadcasts to all
255
Reserved
private networks
10, 172, and 192
Public and Private Networks Public networks use public IP addresses assigned to them. You are required to have a public address to communicate on the Internet. Private addresses are used within a network.
Subnetting Subnetting your network is the process of taking the total number of hosts available to you, and dividing it into smaller networks. When you configure TCP/IP on a host, you must use the following: ►
A unique IP address
CIW Foundations (1D0-510) ►
A default gateway (router) address
►
A subnet mask
Subnet Masks (net mask) ►
32 bit address similar to IP
►
Distinguishes network and host portion of IP address
►
255 placed into the network portion of the address
►
Class A 255.0.0.0
►
Class B 255.255.0.0
►
Class C 255.255.255.0
Internet Addressing ►
Decimal Form: 125.25.2.0 o Contains the network portion (N) and host portion (h) o Composed of 4 decimal values divided by dot notation
►
Binary Form: 01111101.00011001.00000010.00000000 o Consists of four 8-bit fields (octets) = total 32 bits o Each field represents a value
►
ANDing o Adding the subnet mask to the IP address in binary form
IPv4 vs. IPv6 Internet growth has produced a shortage of IPv4 addresses which has prompted a change in the addressing schema. This change, called Internet Internet Protocol v6, is contrasted with IPv4 below:
CIW Foundations (1D0-510) ►
Shortcomings of IPv4 o Limited address space o Lack of security o Speed problems o Configuration problems ►
Strengths of IPv6
o More efficient and requires less administrative overhead than IPv4 o Provides a practically unlimited number of IP addresses o Less dependent on routers
3.4. Identify the functions and components of servers commonly used on the Internet.
Internetworking Server Types Server
Description
File and Print
File: stores data files and programs that can be shared by network users
DNS
A distributed database used on the Internet to translate host computer names into IP addresses and matches the IP address to the Internet URL.
Proxy
An intermediary between a network host and other hosts outside the network. Provides enhanced security, manages TCP/IP addresses, speeds Internet access by caching Web documents and replaces network IP address with another, contingent address.
FTP
Uploads and downloads files. It is faster than email and HTTP. Files of 2 MB or greater should be transferred by FTP
HTTP
Acts as delivery system by requesting documents from web servers.
Print: allows multiple users to send print jobs to the same physical printer
Uses the MIME (Multipurpose Internet Mail Extensions) protocol to identify files types, and encodes and decodes the files. Database
Presents relational databases and makes it possible for remote individuals to access the data. Uses SQL to create, maintain and query databases.
CIW Foundations (1D0-510) News
Uses Network News Transfer Protocol (NNTP) to post information online in a hierarchical form. Creates secure newsgroups by enabling user-specific password protection or by using an SSL session.
Certificate
Validates or certifies keys (calculated text strings used for security)
Directory
Identifies all resources on a network, and then makes them available to authenticated users. Enables a company to reuse information in its directory. Protocols: X.500: used to manage user and resource directories. Provides scalability, synchronization and replication. LDAP: TCP/IP protocol that allows communication on both intranets and the Internet.
Media
Provides streaming audio and video over a network. Uses UDP (connectionless protocol) ports and buffers to achieve the effect of a realtime connection.
Transaction
Guarantees that all required databases are updated when a transaction takes place.
Mail
Stores/forwards e-mail messages using protocols: SMTP – SMTP – sends sends email; POP – POP receives email; IMAP – IMAP – stores stores and forwards email. – receives
Mailing list
Forwards an e-mail message to every member on a distribution list
Catalog
Indexes databases, files and information and allow keyword, Boolean and other searches.
3.5. Identify common Internet security and availability issues, including: useruser level and enterprise-level concerns.
Network Attack Types ►
Spoofing (masquerade) o Host or program assumes an identity of a network device o Victims assume they are communicating with legitimate source
►
Man-in-the-middle (hijacking) o Packet sniffing – sniffing – intercepts intercepts data o Connection hijacking – hijacking – completes completes a connection
CIW Foundations (1D0-510) o Replay Replay – – modifies modifies a message to resend it to someone else ►
Denial-of-service (DOS) o A system is flooded with packets o Result: system shuts down
►
Distributed Denial-of-service (DDOS) o Use multiple applications to flood the system o Result: system server data connection down
►
Brute force o Attempts to break the authentication code to access the system (logon and passwords) o Uses random values
►
Dictionary o Repeated attempts to guess a password o Uses a file of words
►
Back door o Commands allow access to system
►
Buffer overflow o Occurs when a legitimate application exceeds the memory buffer allocated to the OS
►
Trojan horse o Hides a command within a common function to cause a breach in security
►
Social engineering o Convinces people to reveal sensitive information
►
Virus o Malicious program designed to damage computers, networks
o Types
Macros/script Macros/script – – in in Microsoft Word or Excel
File infecting – infecting – attaches attaches to executable files
Boot sector – sector – copies copies to boot sector, resides in memory
Stealth Stealth – – redirects redirects hard drive requests from anti-virus software
Polymorphic Polymorphic – – executes executes differently every time it runs
Retro Retro – – specifically specifically attacks anti-virus software
►
Worm
CIW Foundations (1D0-510) o Similar to virus o Replicates in order to use up system resources
OSI/RM security services ►
Authentication o Methods o What you know – know – using using passwords
Strong passwords: upper, lower case letters, numbers, non-alphanumeric characters,
etc.
No nicknames or personal info, no repeated letters or digits
o What you have – have – using using a physical key o What you are – are – using using fingerprints, signatures, etc. ►
Encryption (see Domain 1) o Symmetric
o Asymmetric o Hash function
►
Virtual Private Network (VPN) o Allows secure communication across long distances, usually for a company extranet o Transmits data using encapsulation (tunneling)
encryption occurs at the source and decryption occurs at the destination
►
Remote Access Server (RAS) o Uses dial-up modems to dial up, connect and log on to RAS o Offers security through a callback feature
►
Digital Certificates o Provide authoritative identification o Verify the sender's identity o Generated and authenticated by a certificate server o A third party verifies the legitimacy of the certificate
►
PKI Certificate Authority servers o Are repositories for managing digital certificates o Enable the secure creation and management of digital certificates
CIW Foundations (1D0-510) o Provide the ability to revoke an invalid key ►
Firewalls – Firewalls – acts acts as a choke point o Secure computer system placed between a trusted and untrusted network (Internet) o Filters packets, detects intrusions, provides enhanced password authentication
o Types
Packet filtering – filtering – inspects inspects each packet for predefined content
firewall – resides resides inside inside your company’s internal network Internal firewall –
Proxy – replaces the network IP address with a single IP address Proxy – replaces
gateway – Acts Acts as a proxy between the Internet and your internal systems Circuit-level gateway –
gateway – Same Same as a circuit-level gateway but at the Application-level gateway –
application level ►
Network Access Translation o The practice of hiding internal IP addresses from the external network
►
Security Zones o DMZ
A mini-network that resides between a company's internal network and the external
network o Intranet
A security zone available only to authorized organization employees
o Extranet
A private network that allows selected access to outsiders only after they provide
authentication information o VLAN
A logical grouping of hosts, generally not implemented by a firewall
►
Firewall topologies o Packet filter o Dual-homed bastion host
Computer with two NICs with IP forwarding disabled
o Triple-homed bastion host
Separates the Internet, intranet with the demilitarized zone
CIW Foundations (1D0-510)
o Screened subnet (back-to-back firewalls)
Uses external and internal routers
3.6. Identify common performance issues affecting Internet clients, including: analysis, diagnosis. TCP/IP workstation configuration ►
Requirements o IP address, subnet mask, default gateway, the router’s address address
►
TCP/IP Services o Domain Name System (DNS)
Resolves names to IP addresses
o Windows Internet Naming Service (WINS)
Legacy name resolution
Provides a NETBIOS name and receives an IP address
►
Dynamic Host Configuration Protocol (DHCP) o Automated IP address assignment from a server
►
Automatic Private IP Addressing (APIPA) o Creates a private address when an address from a DHCP server is unavailable
Diagnostic tools ►
Ping: determines connectivity between source and destination
►
Tracert or Traceroute: determines the path between source and destination
CIW Foundations (1D0-510) ►
Netstat: displays the contents of network data structures
►
Ipconfig (WinNT, 2K or XP) winipcfg (Win 95, 98, Me) o Displays the physical address, the IP address, subnet mask and default gateway
►
Network Analyzers: Captures data as it moves through the network
3.7. Perform basic hardware and system maintenance for network-aware systems.
Computer system maintenance ►
Fix hardware problems o Components are plugged in o Components are turned on o Components are connected properly in order to operate (such as connecting the keyboard to
the computer) ►
Periodically clean hardware components o CD-ROMs
Keep the drives closed when they are not in use
Check all media for foreign matter before inserting into the drive
Handle disks only by the edges
Avoid scratching the disc surface
Never directly touch or try to manually clean the laser
Brush away and vacuum accumulated dust
Manually eject a stuck disc by inserting a wire into the small hole on the face of the
drive, then pressing hard until the disc is ejected ► Establish a preventive maintenance plan
Computer system components ►
Mainboard o Main circuit board in a computer o Must be securely fastened to system chassis o Should never touch anything metal, except through proper connections
►
Interrupt Requests (IRQs)
CIW Foundations (1D0-510) o Hardware lines used to identify when a device wants to communicate with the processor ►
I/O address o Memory location that allows the system processor and system devices to communicate
►
►
Direct Memory Access (DMA) o Allows a device to access system memory directly, bypassing the processor
Common Interfaces – Interfaces – used used to communicate between storage devices and mainboard o IDE/EIDE
IDE is also known as Advanced Technology Attachment (ATA)
IDE/EIDE interface cables are long, thin and gray in appearance
EIDE (ATA-2) is an enhanced version of IDE that provides higher drive capacities
o SATA
Provides faster speeds than standard ATA
o SCSI
Multiple devices can be connected to a single controller in a daisy chain configuration SCSI daisy chain must be terminated at both ends, and only at the ends
►
NIC (transceiver) o Network devices must have a network interface card (or
network adapter card) o Makes the physical connection between the device and the
network cabling o Converts the data from the computer into a format
appropriate for transmission over the network ►
Peripheral Ports o PS/2-style ports
Mouse and keyboard
o Serial ports:
Communicate using serial asynchronous communication
Used for serial communication devices
o Parallel ports:
Communicate using parallel communication
Used for parallel communication devices
o USB ports:
CIW Foundations (1D0-510)
Communicate using serial communication
Support as many as 127 peripheral devices in a daisy chain configuration
o FireWire (IEEE 1394):
A high-speed serial interface to which you can daisy chain as many as 63 peripheral
devices
Good for devices that need to transfer large amounts of data
►
CD-ROM o An optical storage device from which data can be read only
►
Writable CD-ROM o Creates, or "burns," data and audio CDs
►
DVD o Optical storage device from which data can be read only o Similar to CD-ROMs but have higher storage capacity
3.8. Manage fundamental elements of modern network-based client operating systems.
Software Licensing Purchasing software provides the rights to use the software, not the ownership. Read the license carefully to ensure that you are not infringing on copyright. In addition, if the software is unlicensed you will not have documentation, warranties, product support and may open system to viruses.
Partitions and logical drives Recovering from a disk failure or installing new operating system software, you will have to partition your disk and identify logical drives. ►
Disk Partition o Divide the disk storage space o Primary partition
The system’s boot drive, used for system startup startup
o Extended partition
The remaining drive space after you create the primary partition
►
Logical Drives
CIW Foundations (1D0-510) o Each partition must be assigned a logical drive identifier o A primary partition is treated as a single logical drive o An extended partition can be divided into multiple logical drives (drives D and E in figure)
►
File system Types o FAT, FAT32
Not a secure format
o NTFS (Windows)
Allows permission bits to be set on system resources
Protects files so that only certain users or groups of users can read them
o Ext3 and ReiserFS (Linux)
File system management tools These tools will help maintain the hard drives. Maintaining your hard drive will result in more efficient performance. ►
Disk Defragmenter o Recombines the files in a contiguous cluster
As files are created and deleted, a partition can become severely fragmented
Fragmented files are no longer located in contiguous clusters
►
Chkdsk Utility o Create and display a status report for a disk based on its file system o List and correct errors on the disk
►
o Display the status of the disk in the current drive
Disk Cleanup Utility
o Recovers disk space by removing temporary files, unused applications, files in the Recycle
Bin, files downloaded as part of Web pages or files created when Chkdsk attempted to recover lost file fragments. o Compresses files ►
Backup and Restore o Stores copies of folders and files to a source other than the computer's hard o Ensure that data can be recovered if a hard drive fails
CIW Foundations (1D0-510)
Remote management and troubleshooting ►
Telnet o TCP/IP command that establishes a remote connection with a server
►
►
Secure Shell (SSH) o Protocol and command interface that can gain secure access to a remote computer
Virtual Network Computing (VNC) o Program that controls a remote computer o Two components o A server that listens to a specific port o The viewer, which shows shows the remote system’s logon environment
►
Remote Desktop o Windows XP service used to gain access to a Windows session that is running on another
computer
Allows multiple users to have active sessions on a single computer Allows you to switch from one user to another on the same computer
►
Remote Assistance o Windows XP service used to seek help from a remote user
3.9. Configure and troubleshoo t roubleshoott wireless networks.
Wireless Network Technologies Note: the difference between cabled and wireless networks is the medium. ►
Wireless Access Point (WAP) o Central access point o Acts like a hub or switch
►
WAP security features o Wired Equivalency Privacy (WEP) o Encryption in 64 – 64 – 256bit 256bit keys o MAC address filtering o Allows only certain MAC addresses to access the network
CIW Foundations (1D0-510)
Transmission Types ►
Synchronous Transmission o Devices share a transmission clock and rate
►
Asynchronous Transmission o No clock, not synchronized with another device
►
Data transmission flow o Simplex Simplex – data travels in one direction only – data o Half duplex (modems, walkie-talkies, Ethernet) – Ethernet) – travels travels in 2 directions, one direction at a
time o Full Duplex (Fast Ethernet) – Ethernet) – travels travels in 2 directions at the same time ►
Baseband Transmission o Uses the entire bandwidth for a single channel (digital)
►
Broadband Transmission o Divides the media into multiple channels (analog)
►
Logical Topologies o Signal’s actual path over a network (think signal) signal)
►
Physical Topologies o The layout of the network’s device connections (think media media
3.10. Manage career opportunities in the IT industry.
Prepare for your career ►
Conduct job searches
►
Use usenets
►
Create an electronic resume
►
Research career types
CIW Foundations (1D0-510)
Practice Questions
Table of Contents Chapter 1 Internet Business Foundations........................................................... Foundations........................................................... 2 Answer Key Explanations
14 18
Chapter 2 Site Development Foundations....... Foundations.............. .............. .............. .............. ............... ............... .............. ......... 6 Answer Key Explanations
15 22
Chapter 3 Networking Technology Foundations........ Foundations............... .............. .............. .............. .............. ......... .. 10 Answer Key Explanations
16 26
Internet Inte rnet Busines Businesss Foun Foundati dations ons
Chapter 1
Internet Business Foundations 1. Martin is charged wit with h getting the hospital' hospital'ss new IImaging maging Cente Centerr online. He needs to decide the type of Internet connection will work best. He must have connection speeds of at least 512Kbps and not require new wiring. What is the best choice for this environment? Select the best answer.
A.
Cable modem
B.
Wireless
C.
DSL
D.
T1
Find the Answer Answer p. p. 14 14
2. Diane iiss tryin trying g to conn connect ect to a sit sitee on the In Interne ternett by using using the add address: ress: http://www.mysite.com. When she types it into the address bar, a page comes up telling her that the Web site can not be found. What could be wrong? Select the best answer.
A.
The domain domain nam namee ser server ver can cannot not res resolv olvee the addres addresss
B.
Th Thee addr addres esss is a rela relati tive ve UR URL. L.
C.
Th Thee defa defaul ultt ho home me pa page ge is mi missi ssing ng..
D.
The top lev level el dom domain ain is una unavai vailab lable. le.
Find the Answer p. 14 Answer p. 14
2
Internet Inte rnet Busines Businesss Foun Foundati dations ons
3. When would a web designer crea create te a site that operates in an iintranet? ntranet? Select the best answer.
A.
Whe When n tthe he emp employ loyees ees nee need d tto o acce access ss a Web Web sit sitee d desi esigne gned d only only for employees that resides within the company.
B.
Whe When n eemp mploy loyees ees nee need d tto o acce access ss the compan company y webs website ite fr from om hom home. e.
C.
Whe When n emp employ loyees ees nee need d to print print doc docume uments nts..
D.
Whe When n emp employ loyees ees nee need d to do res resear earch ch onl online ine..
Find the Answer Answer p. p. 14 14
4. Genna needs to troubl troubleshoot eshoot a software issue on a cl client's ient's computer computer that is located in another state. What is the best way to do this? Select the best answer.
A. B.
Us Usee an FT FTP P serv server er.. Use a VN VNC C ser serve verr.
C.
Us Usee an LD LDAP AP serv server er..
D.
Use an Ins Instan tantt Mes Messag saging ing cli client ent..
Find the Answer p. 14 Answer p. 14
5. Mary is setting up a phone directory of all the comp company any employees. What should she use to launch the directory? Select the best answer. LDAP A.
B.
CVS
C.
P2P
D.
VNC
Answer p. 14 Find the Answer p. 14
3
Internet Inte rnet Busines Businesss Foun Foundati dations ons
6. What could be done to speed up intern internet et access ffor or company employees? Select the best answer.
A.
In Inst stal alll a fi fire rewa wall ll..
B.
Con Config figure ure the bro browse wserr to accept accept Act Active iveX X con contro trols. ls.
C. D.
In Inst stal alll a pr prox oxy y serv server er.. Di Disa sabl blee hi hist stor ory y cach cachin ing. g.
Find the Answer Answer p. p. 14 14
7. What encryption method uses a 1 160-bit 60-bit key? Select the best answer.
A.
As Asym ymme metr tric ic ke key y
B.
Messa essage ge dig digest est
C.
Di Digi gita tall ce cert rtif ific icat atee
D.
Sym ymm met etrric ke key y
Answer p. p. 14 14 Find the Answer
8. XYZ's networ network k administr administrator ator has noticed a marked dec decrease rease in memory and and hard drive space. What could be happening? Select the best answer.
A.
The system system is und under er attack attack by a vir virus. us.
B.
The system system is inu inunda ndated ted by spy spywar ware. e.
C.
The system system's 's coo cookie kie fil files es are corrup corrupted ted..
D.
Th Thee syst system em co cont ntai ains ns a wo worm rm..
Find the Answer Answer p. p. 14 14
4
Internet Inte rnet Busines Businesss Foun Foundati dations ons
9. Mary is search searching ing for purple purple shoes. Sh Shee types purpl purplee And shoes in the search box. The results are not what she expected. What should she do to get the correct results? Select the best answer.
A.
Ca Capi pita tali lize ze "and "and." ."
B.
Ca Capi pita tali lize ze purp purple le..
C.
Us Usee NOT NOT as the the Bo Bool olea ean n Op Oper erat ator or..
D.
Us Usee OR as the the Bo Bool olea ean n Op Oper erat ator or..
Answer p. 14 Find the Answer p. 14
5
Site Develop Development ment Foundati Foundations ons
Chapter 2
Site Development Foundations 1. Why is it ne necessa cessary ry to pla place ce the <!D <!DOCTYP OCTYPE> E> tag at th thee top of an XH XHTML TML document? Select the best answer.
A.
Bec Becaus ausee it is the cur curren rentt web req requir uireme ement. nt.
B.
Bec Becaus ausee it sup suppor ports ts the non non-HT -HTML ML in the page. page.
C.
Bec Becaus ausee it all allows ows the use of a mar markup kup val valida idator tor..
D.
Bec Becaus ausee it mak makes es the pag pagee acc access essibl iblee to all. all.
Answer p. 15 Find the Answer p. 15
2. Which of tthe he following is the corr correct ect code for specifying a triangle hot spot? Select the best answer.
A.
< area shape shape="rec ="rect" t" coor coords ds ="12,52,45 ="12,52,45,60" ,60" href="min href="mine.htm e.htm"> ">
B.
< are areaa sha shape pe ="r ="rect ect"" coo coords rds="1 ="12,5 2,52,4 2,45,6 5,60,1 0,15,7 5,75" 5" hre href f ="mine.htm">
C.
< are areaa sha shape pe ="p ="poly oly"" coo coord rdss ="1 ="12,5 2,52,4 2,45,6 5,60,1 0,15,7 5,75" 5" hr href ef ="mine.htm">
D.
< area shape ="pol ="poly" y" coor coords ds ="12,52,45, ="12,52,45,60" 60" href ="mine.htm ="mine.htm"> ">
Find the Answer Answer p. p. 15 15
6
Site Develop Development ment Foundati Foundations ons
3. Marty creat created ed an in informational formational web page that is 12 pages long. He wants his readers to be able to read different sections without scrolling up and down the page. How can he best accomplish this? Select the best answer.
A.
Mak Makee eac each h sec sectio tion n hea headin ding g a lin link. k.
B.
Make each secti section on headi heading ng a bookm bookmark ark and create create navigatio navigation n link linkss at the top of the page.
C.
Mak Makee eac each h sec sectio tion n hea headin ding g a boo bookma kmark. rk.
D.
Make each secti section on headi heading ng a link and create create navigatio navigation n links links at the top of the page.
Find the Answer Answer p. p. 15 15
4. Which table attribute w was as used in creating th thee image in the exhibit? Select the best answer.
A.
colspan
B.
rowspan
C.
alt
D.
frameset
Answer p. p. 15 15 Find the Answer
Exhibit(s):
7
Site Develop Development ment Foundati Foundations ons
5. Zana wants to create a on one-question e-question exit survey. She needs to fin find d out if her Web site has been helpful. She also wants to insure that the survey-taker has only four choices and can only choose one. What form element will offer the most control over the responses? Select the best answer.
A. B.
Checkbox Radio button
C. C.
Text box
D.
Te Tex xt area rea bo box x
Answer p. 15 Find the Answer p. 15
6. The base target frame is placed... Select the best answer.
A.
Bet Betwee ween n the beg beginn inning ing and end ending ing hea head d tag tags. s.
B.
Bet Betwee ween n the beg beginn inning ing and end ending ing bod body y tag tags. s.
C.
Bet Betwee ween n the beg beginn inning ing and end ending ing fra frame me source source tag tags. s.
D.
Bet Betwee ween n the beg beginn inning ing and end ending ing fra frames meset et tag tags. s.
Answer p. 15 Find the Answer p. 15
8
Site Develop Development ment Foundati Foundations ons
7. What is rrequired equired to be XML compliant? Select the best answer.
A.
The docume document nt must must be val valid, id, tra transi nsitio tional nal and con contai tain n a DTD statement.
B.
The docume document nt must must be val valid, id, tra transi nsitio tional nal and con contai tain n a root root statement.
C.
The docume document nt must must be val valid, id, wel well-f l-for ormed med and con contai tain naD DTD TD statement.
D.
The document document must be valid valid,, wellwell-form formed ed and cont contain ain a function function statement.
Find the Answer Answer p. p. 15 15
8. Which tags will override linked style sheets? Select the best answer.
A.
st styl ylee an and d do doct ctyp ypee
B.
Sty tyle le and font font..
C.
st styl ylee an and d forma ormatt
D.
st styl ylee an and d li list st
Answer p. 15 Find the Answer p. 15
9. Bob is a network administrator who wants to determ determine ine the network's co connection nnection speed. How can he determine this? Select the best answer.
A.
Div Divide ide the dow downlo nload ad tim timee by the net networ work k speed. speed.
B.
Div Divide ide the fil filee siz sizee by the dow downlo nload ad tim time. e.
C.
Div Divide ide the fil filee siz sizee by the mo modem dem spe speed. ed.
D.
Div Divide ide the dow downlo nload ad tim timee by the mod modem em spe speed. ed.
Answer p. p. 15 15 Find the Answer
9
Network Netw orking ing Technol Technology ogy Foun Foundati dations ons
Chapter 3
Networking Technology Foundations 1. Jerry is set setting ting up a netw network ork at hom home. e. He has five co comput mputers ers and wan wants ts to share a printer. Which type of network design will work best? Select the best answer.
A.
Star
B.
Bus
C.
Mesh
D.
Hybrid
Answer p. 16 Find the Answer p. 16
2. Which layer of the OS OSI/RM I/RM ensures th that at data is er error-free ror-free w when hen it reache reachess its destination? Select the best answer.
A. A.
Layer 7
B. B.
Layer 6
C. C.
Layer 5
D. D.
Layer 4
Answer p. 16 Find the Answer p. 16
10
Network Netw orking ing Technol Technology ogy Foun Foundati dations ons
3. A route routerr operat operates es at the _____ _______________ __________ layer o off the OSI/RM. Select the best answer.
A.
Network
B. B.
Data link
C. D.
Transp spo ort Physical
Find the Answer Answer p. p. 16 16
4. What is a pack packet? et? Select the best answer.
A.
A prot protocol ocol that enabl enables es infor informati mation on to be sent acro across ss a netw network. ork.
B.
Ano Anothe therr nam namee for an e-m e-mail ail messag message. e.
C.
A fix fixed ed pie piece ce of inf inform ormati ation on sen sentt acr across oss a networ network. k.
D.
A pro protoc tocol ol that that sen sends ds e-m e-mail ail messag messages. es.
Find the Answer Answer p. p. 16 16
5. What is a subn subnet et mask? Select the best answer.
A.
A 2828-bit bit add addres resss tha thatt tra transl nslate atess IP addres addresses ses..
B. C.
An IP addres addresss con contai tainin ning g 255 in the hos hostt por portio tion. n. A 3232-bit bit add addres resss tha thatt tra transl nslate atess MAC add addres resses ses..
D.
A 3232-bit bit add addres resss tha thatt tra transl nslate atess IP addres addresses ses..
Find the Answer p. 16 Answer p. 16
11
Network Netw orking ing Technol Technology ogy Foun Foundati dations ons
6. Which of tthe he following following is a Class B address? Select the best answer.
A.
NNNN NNNNNNNN NNNN.NNN .NNNNNNN NNNNN.NN N.NNNNNN NNNNNN.N NN.NNNNN NNNNNNNN NNNN
B.
NNNN NNNNNNNN NNNN.NNN .NNNNNNN NNNNN.hh N.hhhhhhh hhhhhh.hhh h.hhhhhhhh hhhhh
C. D.
NNNN NNNNNNNN NNNN.hhh .hhhhhhh hhhhh.hhh h.hhhhhhh hhhhh..hh h..hhhhhhh hhhhhh h NNNN NNNNNNNN NNNN.NNN .NNNNNNN NNNNN.NN N.NNNNNN NNNNNN.h NN.hhhhhh hhhhhhh hh
Find the Answer Answer p. p. 16 16
7. Jerome is setti setting ng up a ffirewall irewall for the company. The computer that connects to the firewall contains two NICs. Which type of firewall will work best with the existing equipment? Select the best answer.
A. B.
Du Dual al-h -hom omed ed ba bast stio ion n Pac ack ket fil ilte terr
C.
Tr Trip iple le-h -hom omed ed ba bast stio ion n
D.
Se Secu cure red d subn subnet et
Find the Answer Answer p. p. 16 16
12
Site Developm Development ent Foundati Foundations ons
Answers: Chapter 1 1. C
Review Question Question p. p. 2 2
Detailed Explanat Explanation ion p. p. 18 18
2. A
Review Question Question p. p. 2 2
Detailed Explanat Explanation ion p. p. 18 18
A
Review Question Question p. p. 3 3
Detailed Explanat Explanation ion p. p. 18 18
3. 4. B
Review Question Question p. p. 3 3
Detailed Explanat Explanation ion p. p. 19 19
5. A
Review Question Question p. p. 3 3
Detailed Explanat Explanation ion p. p. 19 19
6. C
Review Question Question p. p. 4 4
Detailed Explanat Explanation ion p. p. 19 19
7. B
Review Question Question p. p. 4 4
Detailed Explanat Explanation ion p. p. 20 20
8. D
Review Question Question p. p. 4 4
Detailed Explanat Explanation ion p. p. 20 20
9. A
Review Question Question p. p. 5 5
Detailed Explanat Explanation ion p. p. 20 20
14
Network Netw orking ing Technol Technology ogy Foun Foundati dations ons
Answers: Chapter 2 1. C
Review Question Question p. p. 6 6
Detailed Explanat Explanation ion p. p. 22 22
2. C
Review Question Question p. p. 6 6
Detailed Explanat Explanation ion p. p. 22 22
Review Question Question p. p. 7 7
Detailed Explanat Explanation ion p. p. 22 22
3. B 4. A
Review Question Question p. p. 7 7
Detailed Explanat Explanation ion p. p. 23 23
5. B
Review Question Question p. p. 8 8
Detailed Explanat Explanation ion p. p. 23 23
6. A
Review Question Question p. p. 8 8
Detailed Explanat Explanation ion p. p. 23 23
7. C
Review Question Question p. p. 9 9
Detailed Explanat Explanation ion p. p. 24 24
8. B
Review Question Question p. p. 9 9
Detailed Explanat Explanation ion p. p. 24 24
9. C
Review Question Question p. p. 9 9
Detailed Explanat Explanation ion p. p. 25 25
15
Network Netw orking ing Technol Technology ogy Foun Foundati dations ons
Answers: Chapter 3 1. B
Review Question Question p. p. 10 10
Detailed Explanat Explanation ion p. p. 26 26
2. D
Review Question Question p. p. 10 10
Detailed Explanat Explanation ion p. p. 26 26
Review Question Question p. p. 11 11
Detailed Explanat Explanation ion p. p. 26 26
3. A 4. C
Review Question Question p. p. 11 11
Detailed Explanat Explanation ion p. p. 27 27
5. D
Review Question Question p. p. 11 11
Detailed Explanat Explanation ion p. p. 27 27
6. B
Review Question Question p. p. 12 12
Detailed Explanat Explanation ion p. p. 27 27
7. A
Review Question Question p. p. 12 12
Detailed Explanat Explanation ion p. p. 28 28
16
Internet Inte rnet Business Business Foundati Foundations ons
18
Explanations: Chapter 1 Question p. p. 2 2 1. Review Question Answers: C
Explanation A. Incorrect. Although this reaches the correct speed, cable would have to
be put in to accommodate everyone. Explanation B. Incorrect. Wireless connections interfere with hospital equipment. Explanation C. Correct. This provides the bandwidth and can be run through existing phone lines. Explanation D. Incorrect. Although this would work with existing telephone lines, it is more than is required. 126-100 PrepLogic Question: Question: 126-100
Question p. p. 2 2 2. Review Question Answers: A
Explanation A. Correct. A domain server must resolve the written name into an IP address in order to connect. Explanation B. Incorrect. The address is an absolute URL containing the entire address. Explanation C. Incorrect. The error that would be occur would be a 404 error code, saying the page is not available. Explanation D. Incorrect. Top level domains are always available. More Information: DNS
PrepLogic Question: 126-101 Question: 126-101 Question p. p. 3 3 3. Review Question Answers: A
Explanation A. Correct. Intranets serve up web pages behind the company firewall. Explanation B. Incorrect. An extranet would accomplish this. Explanation C. Incorrect. This is handled by the company network.
Internet Inte rnet Business Business Foundati Foundations ons
Explanation D. Incorrect. An Internet connection is all that is needed. PrepLogic Question: Question: 126-102 126-102 Question p. p. 3 3 4. Review Question Answers: B
Explanation A. Incorrect. That is only useful for transferring files. Explanation B. Correct. This allows Genna to control and work with the other computer regardless of the distance. Explanation C. Incorrect. This serves up contact information. Explanation D. Incorrect. This allows her to converse but not fix. More Information: Network Services PrepLogic Question: 126-103 Question: 126-103 Question p. p. 3 3 5. Review Question Answers: A
Explanation A. Correct. This is the Lightweight Directory Access Protocol that companies use to organize employee contact information. Explanation B. Incorrect. This controls versions in software development. Explanation C. Incorrect. This is a shared network type. Explanation D. Incorrect. That allows connection to another computer. More Information: Internet Services PrepLogic Question: 126-104 Question: 126-104 Question p. p. 4 4 6. Review Question Answers: C
Explanation A. Incorrect. Firewalls must evaluate each packet and results in slowing. Explanation B. Incorrect. This is not a good idea from the standpoint of security.
19
Internet Inte rnet Business Business Foundati Foundations ons
Explanation C. Correct. A proxy server will cache documents allowing quicker access to Web pages. Explanation D. Incorrect. This will not effect performance, only limit the amount of history information available. PrepLogic Question: Question: 126-105 126-105 Question p. p. 4 4 7. Review Question Answers: B
Explanation A. Incorrect. This one uses an RSA algorithm that does not support 160-bit keys. Explanation B. Correct. Yes this is the hash function and when using the SHA algorithm, it encrypts with 160-bits. Explanation C. Incorrect. This authenticates, not encrypts. Explanation D. Incorrect. This one uses the same key to encrypt and decrypt. More Information: Encryptio Encryption n Methods PrepLogic Question: 126-106 Question: 126-106 Question p. p. 4 4 8. Review Question Answers: D
Explanation A. Incorrect. A virus infection would not impact memory allocation. Explanation B. Incorrect. Spyware would not fill up a hard disk. Explanation C. Incorrect. Cookie files are text files that collect information. Explanation D. Correct. Worms use up system resources. PrepLogic Question: Question: 126-107 126-107 Question p. p. 5 5 9. Review Question Answers: A
Explanation A. Correct. Boolean operators should always be capitalized.
20
Site Developm Development ent Foundati Foundations ons
Explanation B. Incorrect. That will produce poorer results. Search terms should be in lowercase only. Explanation C. Incorrect. This will exclude one criteria of the search. Explanation D. Incorrect. This will exclude one criteria of the search. More Information: Boolean Operators PrepLogic Question: 126-108 Question: 126-108
21
Site Developm Development ent Foundati Foundations ons
Explanations: Chapter 2 Question p. p. 6 6 1. Review Question Answers: C
Explanation A. Incorrect. This is not the case at this time. Explanation B. Incorrect. That is not the purpose of the doctype tag. Explanation C. Correct. Explanation D. Incorrect. Accessibility requires more than this tag. More Information: Validating Web pages. PrepLogic Question: 126-109 Question: 126-109 Question p. p. 6 6 2. Review Question Answers: C
Explanation A. Incorrect: This code contains a code for a rectangle. Explanation B. Incorrect. This code contains the code for a rectangle and too many coordinates. Explanation C. Correct. Shape is poly with 3 sets of coordinates. Explanation D. Incorrect. The correct shape is specified but the number of coordinates is wrong. More Information: XHTML tags PrepLogic Question: 126-110 Question: 126-110 Question p. p. 7 7 3. Review Question Answers: B
Explanation A. Incorrect: That only creates the link. Explanation B. Correct. This will allow the navigation to link to the bookmark. Explanation C. Incorrect. There needs to be a link to the bookmark.
22
Site Developm Development ent Foundati Foundations ons
Explanation D. Incorrect. Links are not used to reference other links within a page More Information: XHTML tags PrepLogic Question: 126-111 Question: 126-111 Question p. p. 7 7 4. Review Question Answers: A
Explanation A. Correct. This table contains a row that spans 3 columns. Explanation B. Incorrect. This attribute spans rows, not columns. Explanation C. Incorrect. This tag gives images names for screen readers. Explanation D. Incorrect: This tag is used to create a frame. More Information: XHTML Tags PrepLogic Question: 126-112 Question: 126-112 Question p. p. 8 8 5. Review Question Answers: B
Explanation A. Incorrect. This allows multiple choices. Explanation B. Correct. This forces the reader into only one choice. Explanation C. Incorrect. She cannot control what is placed into the text box. Explanation D. Incorrect. This does not afford sufficient control over the information. More Information: XHTML Tags PrepLogic Question: 126-113 Question: 126-113 Question p. p. 8 8 6. Review Question Answers: A
Explanation A. Correct. This tag resides in the head region of the document. Explanation B. Incorrect. The base target frame is placed in the head region of the
23
Site Developm Development ent Foundati Foundations ons
document. Explanation C. Incorrect. The base target frame is placed in the head region of the document. Explanation D. Incorrect. The base target frame is placed in the head region of the document. More Information: XHTML Tags PrepLogic Question: 126-114 Question: 126-114 Question p. p. 9 9 7. Review Question Answers: C
Explanation A. Incorrect. Transitional is a flavor of XHTML. Explanation B. Incorrect. Form is imparted through the root statement, transitional is a flavor. Explanation C. Correct. All these must be in place to be compliant. Explanation D. Incorrect. The tree structure is not necessary. More Information: Extensiblee Markup Language Extensibl PrepLogic Question: 126-115 Question: 126-115 Question p. p. 9 9 8. Review Question Answers: B
Explanation A. Incorrect. Explanation B. Correct. Yes, placed in the body, they will override style sheet specifications. Explanation C. Incorrect. Format is not a tag. Explanation D. Incorrect. More Information: Style Sheets
24
Network Netw orking ing Technol Technology ogy Foun Foundati dations ons
PrepLogic Question: Question: 126-116 126-116 Question p. p. 9 9 9. Review Question Answers: C
Explanation A. Incorrect. This is a wrong calculation. Explanation B. Incorrect. This is a wrong calculation. Explanation C. Correct. This calculation will provide the speed of the network. Explanation D. Incorrect. This is a wrong calculation. 126-117 PrepLogic Question: Question: 126-117
25
Network Netw orking ing Technol Technology ogy Foun Foundati dations ons
Explanations: Chapter 3 Question p. p. 10 10 1. Review Question Answers: B
Explanation A. Incorrect. This type of network requires a central hub. Explanation B. Correct. A bus network is limited to 10 devices and is easy to set up. Explanation C. Incorrect. This is designed for redundancy. It is not needed on a small network. Explanation D. Incorrect. Hybrids exist when adding to an existing network. More Information: Network Topology PrepLogic Question: 126-118 Question: 126-118 Question p. p. 10 10 2. Review Question Answers: D
Explanation A. Incorrect. This is the application layer which provides services to applications outside the OSI model. Explanation B. Incorrect. This is the presentation layer that provides transformations on data so that it is presentable. Explanation C. Incorrect. This is the session layer that establishes, manages, and terminates sessions. Explanation D.
Correct. The data link layer is responsible for error checking. More Information: OSI/RM PrepLogic Question: 126-119 Question: 126-119 Question p. p. 11 11 3. Review Question Answers: A
Explanation A. Correct. Routers operate at layer 3 in OSI/RM. Explanation B. Incorrect. This works with Layer 2 switches.
26
Network Netw orking ing Technol Technology ogy Foun Foundati dations ons
27
Explanation C. Incorrect. The transport layer does not support devices. Explanation D. Incorrect. Hubs operate at this layer. More Information: OSI/RM PrepLogic Question: 126-120 Question: 126-120 Question p. p. 11 11 4. Review Question Answers: C
Explanation A. Incorrect. A packet is not a protocol. Explanation B. Incorrect. Explanation C. Correct. Packets are moved across the network and transferred between devices. Explanation D. Incorrect. A packet is not a protocol. More Information: Network Packets PrepLogic Question: 126-121 Question: 126-121 Question p. p. 11 11 5. Review Question Answers: D
Explanation A. Incorrect. IP addresses are 32-bit. Explanation B. Incorrect. The 255 is placed in the network portion. Explanation C. Incorrect. Translates IP addresses not MAC. Explanation D. Correct. More Information: Subnet Masking PrepLogic Question: 126-122 Question: 126-122 Question p. p. 12 12 6. Review Question Answers: B
Network Netw orking ing Technol Technology ogy Foun Foundati dations ons
Explanation A. Incorrect. This class does not exist. Explanation B. Correct. A class B has the form N.N.h.h Each value represents 8 bits. Explanation C. Incorrect. This is class A. Explanation D. Incorrect. This is class C. More Information: IP Addressi Addressing ng PrepLogic Question: 126-123 Question: 126-123 Question p. p. 12 12 7. Review Question Answers: A
Explanation A. Correct. With IP forwarding disabled this makes the firewall setup of choice. Explanation B. Incorrect. This is a basic firewall configuration. Explanation C. Incorrect. This type requires three NICs on separate devices. Explanation D. Incorrect. Would require external and internal routers. 126-124 PrepLogic Question: Question: 126-124
28