Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the CIW-Associate 1D0-510 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam 1D0-510 Premium Access

View all detail and faqs for the 1D0-510 exam


855 Students Passed

91% Average Score

93% Same Questions
Viewing page 2 out of 6 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which of the following is a junction between one high-speed network and another?

Options:

A.

Router

B.

Switch

C.

Wide area network (WAN)

D.

Network Access Point (NAP)

Questions # 12:

Which technology is used to create a table in a relational database?

Options:

A.

CGI

B.

SQL

C.

PHP

D.

ODBC

Questions # 13:

What is Dynamic Host Configuration Protocol (DHCP)?

Options:

A.

The LAN access protocol used by Ethernet

B.

A protocol for assigning IP addresses to devices on a network

C.

A protocol that allows numerous subnetworks to exist within a network

D.

A protocol that allows a client and a server on the same host to communicate with each other

Questions # 14:

Your supervisor directs you to make static IP address assignments on the workstations in your office. Your workstations are part of a company WAN that also connects directly to the Internet. What information must you have in order to complete this assignment?

Options:

A.

An IP address for each workstation and the subnet mask

B.

An IP address to be shared by all workstations and the subnet mask

C.

An IP address for each workstation, the default gateway address and the subnet mask

D.

An IP address to be shared by all workstations, the default gateway address and the subnet mask

Questions # 15:

Which choice lists the entities most often used to spread viruses?

Options:

A.

End users and database servers

B.

Computer files and DHCP servers

C.

Removable disks and e-mail servers

D.

Weak passwords and directory servers

Questions # 16:

In the client/server model, a client can access information from any server if:

Options:

A.

both the client and server understand the protocol.

B.

both the client and the LAN understand the protocol.

C.

both the LAN and the WAN understand the protocol.

D.

both the server and the LAN understand the protocol.

Questions # 17:

Which of the following is the most efficient method for documenting and communicating a Web site plan?

Options:

A.

Photocopying and faxing sketches

B.

Sending a presentation slideshow via e-mail

C.

Describing the plan orally on stakeholders' voicemail

D.

Posting a large diagram on the wall in a busy office hallway

Questions # 18:

Which type of encryption uses a pair of keys, in which one key is used to encrypt information and the other key is used to decrypt that information?

Options:

A.

Hash encryption

B.

One-way encryption

C.

Symmetric encryption

D.

Asymmetric encryption

Questions # 19:

Which IP address class uses 8 bits for the network portion of the address and 24 bits for the host portion of the address?

Options:

A.

Class A

B.

Class B

C.

Class C

D.

Class D

Questions # 20:

James created an XHTML table to show his schedule for each week of the month. He organized the table in a standard calendar format, so that each day from Sunday to Saturday is the header for a vertical column, and each week of days is displayed horizontally as a row. Each scheduled activity appears in the table cell appropriate for the day it occurs. James wants to merge two table cells into one cell to show the IT Business Conference that he will attend from Tuesday to Wednesday in the third week. Which tag should James use for this merged cell?

Options:

A.

B.

C.

D.

<title colspan=?? IT Business Conference </title>

Viewing page 2 out of 6 pages
Viewing questions 11-20 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.