Want to pass your CIW V5 Site Designer 1D0-520 exam in the very first attempt? Try Pass2lead! It is equally effective for both starters and IT professionals.
VCE
Gordon has been asked to create a focus group to aid in finishing the production of a Web site for the company World Stocks, Bonds and Currency Inc. What should this process definitely include?
A. Asking the corporate customers for their favorite colors, and then incorporating those colors into a style guide
B. Choosing at least five individuals who represent the target audience demographic, and then using testers with varying degrees of computer experience toreview the site
C. Creating a set of real-world activities that the company wants to provide to its customers, and then assigning those activities as tasks to accomplish, withstep-by-step directions for completing them
D. Using the bottom-up approach to site development by asking the corporate customers for the type of functionality they expect from the site, and thendesigning the look and feel of the site around those functions
Manuel has been hired by XYZ Corporation to develop a Web site that will display information about the company's products and in-stock quantities to potential customers. The company currently has more than 1,000 products in its catalog. Which approach is best for providing Web site customers with the necessary information?
A. Develop static XHTML pages that display the product information to the customers.
B. Provide a link to a PDF catalog of the company's products that customers can download.
C. Create an XML file of product information and display it using XSLT on one of the site pages.
D. Create a server-side application that queries product data from the company's database and displays it on a Web page.
Jason is attempting to gain unauthorized access to a corporate server by running a program that enters passwords from a long list of possible passwords. This type of attack is known as a:
A. brute-force attack.
B. forced-entry attack.
C. buffer overflow attack.
D. denial-of-service attack.