EXAM 2 CSE1301 4/11/14 Name: ____________________________ Student ID: 1000-___________________ 1. ____ may be sold or distributed free of charge in compiled form but must always include the source code. a. License free software b. Shareware c. Sourceware d. Open source software Your answer ________ 2. In the accompanying figure, the item marked E is a ____. a. Printer port b. USB port c. Mouse port d. Ethernet network port Your answer ________ 3. In the accompanying figure, the item marked A is a ____. a. Printer port b. USB port c. Mouse port d. LAN port Your answer ________ 4. Which of these is NOT a correct description of bit? a. 8 bits are 1 byte. b. 1 Gigabit is about 1 Billion (109) bits. c. Bits, rather than bytes, are used to talk about network speed. d. Bits, rather than bytes, are used to talk about storage space. Your answer ________ 5. Which of these is a correct ordering from LOWEST to HIGHEST? a. Byte, Kilobyte, Megabyte, Gigabyte, Terabyte b. Byte, Kilobyte, Gigabyte, Terabyte, Megabyte c. Byte, Kilobyte, Megabyte, Terabyte, Gigabyte d. Byte, Kilobyte, Gigabyte, Megabyte, Terabyte Your answer ________ 6. Which of these is a correct description of different OSs? a. Strength of Windows is the reliability. b. Weakness of Windows is the limited number of available hardware. c. Weakness of Linux is the limited number of supporting software. d. Weakness of Mac OS is the security. Your answer ________ 7. What happens on the disk when a file is deleted? a. The OS overwrites the file’s sectors with random 1s and 0s. b. The file name is removed from the index file and the file’s clusters are marked as empty. c. The bits of the file are all set to 0s. d. Each fragment of the file is moved to the empty clusters for reuse by new files. Your answer ________ 8. ____ is a type of memory circuitry that holds the computer's startup routine. a. ROM (Read only memory) b. RIM (Read initial memory) c. RAM (Random access memory) d. REM (Ready ever memory) Your answer ________ 9. Regarding RAM (random access memory), which of these is accurate? a. If the computer is off, RAM still holds data. b. RAM has greater storage capacity than a hard disk drive. c. A computer with 1 GB of RAM can hold at most 1 GB of data in memory. d. RAM is like the waiting room for the CPU. Your answer ________ 10. An operating system’s ________ capability supports a division of labor among all the processing units. a. Multiprocessing b. Multitasking c. Multicomputing d. Multithreading Your answer ________ 11. In the accompanying figure above, .mp3 is an example of a(n) ____. a. file extension b. drive c. file name d. folder Your answer ________ 12. Wireless ___________ scrambles the data transmitted between wireless devices and then unscrambles the data only on devices that have a valid key. a. Encryption b. Polymorphism c. Protected access d. Concatenation Your answer ________ 13. _______________________ eliminates the key-distribution problem by using one key to encrypt a message but another key to decrypt the message. a. Symmetric Key System (SKS) b. Public Key Encryption (PKE) c. Brute force System (BFS) d. Private Key System (PKS) Your answer ________ 14. Computers may break a code by using a(n) _________, which consists of trying all possible keys. a. symmetric attack b. encapsulated effort c. brute force attack d. signal-based effort Your answer ________ 15. __________ divides a message into several packets that can be routed independently to their destination. a. Circuit switching b. Packet switching c. Circuit routing d. Packet shaking Your answer ________ 16. What is the difference between a network client and a server? a. Servers require powerful processing and lots of memory, while clients don’t. b. Servers provide services to other computers, while clients receive those services. c. Servers are large computers, while clients can be on laptops or even smartphones. d. Servers enable peer-to-peer computing, while clients only operate in client/server mode. Your answer ________ 17. Most wireless networks transport data as ____ signals. a. infrared b. microwave c. RF (radio frequency) d. satellite Your answer ________ 18. The most popular wireless LAN technology is ____. a. WUSB (Wireless USB) b. Bluetooth c. WiMAX d. Wi-Fi Your answer ________ 19. Which of these is the component for the computer network in the picture above? a. NIC (Network Interface Card) b. Router c. Switch d. RJ45 Connector Your answer ________ 20. Which one can be the criteria to classify networks into PAN, NAN, LAN, MAN, and WAN? a. The size of area they can cover b. The speed of data they can transmit c. The amount of data they can transfer d. The size of computers they can support Your answer ________ 21. Most Internet servers have an easy to remember name that is known as a(n) ___________? a. ISP b. Domain address c. Ethernet address d. NAP address Your answer _______ 22. Which of these is the name of a wireless network to identify your wireless network from detected multiple networks? a. WNI(wireless network Identification) b. NDN (network domain name) c. SSID (service set identifier) d. WEP (Wired Equivalent Privacy) Your answer ________ 23. ____________ is a unique number assigned to a network interface card when it is manufactured. a. communication protocol b. MAC address c. Public IP d. Local IP Your answer ________ 24. Which of these is the protocol to automatically distribute IP address? a. TCP/IP b. Ethernet Protocol c. DHCP d. CSMA/CD Your answer ________ 25. Which of these is NOT an advantage of wired network compared to wireless? a. fast b. mobility c. secure d. simple to configure Your answer ________ 26. In the accompanying figure, the type of signal represented by A is a(n) __________. a. digital signal b. sine signal c. cosine signal d. analog signal Your answer ________ 27. DSL uses __________ to transmit data. a. T1 lines b. cable connections c. phone lines d. none of the above Your answer ________ 28. The accompanying figure represents the connection of your computer to the Internet; the router marked A should belong to a(n) ____. a. end user b. NSP c. Backbone d. ISP Your answer ________ 29. The accompanying figure represents the connection of your computer to the Internet; the router marked B should belong to a(n) ____. a. end user b. NSP c. Backbone d. ISP Your answer ________ 30. You are heavy downloader and use at 6~12pm (Your neighbors are using mostly at this time) and your telephone company’s local switching station is close to your apartment. Which of these is the BEST technology for you? a. Dial-up connection b. DSL c. Cable Internet service d. Satellite Internet service Your answer ________ 31. You are CEO of Arlington Times (newspaper). Hundreds journalists who work in different cities and states have to be able to share and edit the documents. Which of these is the BEST Internet service for your company? a. Grid computing b. Internet forum c. Cloud computing d. FTP Your answer ________ 32. You are a supervisor of CIA. There are two branches in Dallas and Arlington. Your agents in two branches want to share top secret documents. Which of these is the BEST technology for your agents? a. Anonymous FTP b. Firewall c. Traceroute d. VPN (Virtual private networks) Your answer ________ 33. On the Internet, application protocols provide consumers with many useful services. Which one of the following correctly describes an Internet-based application protocol? a. Chat and Instant Messaging use Internet VoIP protocol. b. Cloud protocols such as SETI control distributed processing grids. c. P2P is the secure protocol for e-commerce d. Files can be transferred over the Internet using FTP. Your answer ________ 34. Which Internet access technology does NOT use traditional telephone line? a. ISDN b. Cable c. Dial-up connection d. DSL Your answer ________ 35. _________ Internet access offers a continuous Internet connection as you are on the go, such as using a cell phone to collect your e-mail while you are traveling by train or car. a. Portable b. Fixed c. Stable d. Mobile Your nswer ________ 36. Securing your computer from Internet-based intrusions is an important aspect of computer security. Which one of the following is NOT a useful security technique? a. Setting up NAT on a router b. Activating firewall software c. Activating your computer’s file sharing options d. Checking the status of software ports Your answer ________ 37. In the URL above, http:// is the ____. a. folder name b. Web protocol standard c. Web server name d. file extension Your answer ________ 38. A ________ enables a Web server to keep track of your activity and compile a list of your purchases. a. Cache b. Cookie c. plug-in d. style sheet Your answer ________ 39. When your browser fetches pages and graphics to form a Web page, it stores them in temporary files on your hard drive called a Web ________. a. converter b. plug-in c. Cookie d. Cache Your answer ________ 40. Which of these leaves messages on the server until you specifically delete them? a. SMTP (Simple Mail Transfer Protocol) b. IMAP (Internet Messaging Access Protocol) c. POP3 (Post Office Protocol version 3) d. MIME (Multi-Purpose Internet Mail Extensions) Your answer ________ 41. Some search engines use a program called a Web _______ that combs the Web to gather data that is representative of the contents of Web pages. a. Converter b. archive c. crawler d. glossary Your answer ________ 42. An e-mail scam designed to persuade you into revealing confidential information by replying to an e-mail is called ________. a. Phishing b. Spoofing c. Pharming d. Anonymizing Your answer ________ 43. Junk e-mail messages may use __________ to monitor the number of people who view the e-mail. That data is collected and sometimes used to determine the direction of marketing campaigns. a. Web bugs b. Flash cookies c. Spam filters d. anonymous proxy services Your answer ________ 44. A Web server’s response to a browser’s request includes an HTTP __________ that indicates whether the browser’s request could be fulfilled. a. socket code b. status code c. protocol code d. completion code Your answer ________ 45. A tradeoff to the anonymity offered by anonymous __________ is that they tend not to operate at the same speed as your regular browser. a. FTP sites b. URLs c. Indices d. Proxies Your answer ________ 46. In the email address [email protected], uta.edu is the ______. a. User ID b. Server name c. E-mail address d. E-mail client Your answer ________ 47. __________ is an exploit that redirects users to fake sites by poisoning a domain name server with a false IP address. a. Pharming b. Phishing c. Spoofing d. Anonymizing Your answer ________ 48. The Web requires many technologies. Which one of the following statements is INCORRECT about these technologies? a. We can simply create HTML documents by using Notepad b. Persistent HTML connection is the solution for problems caused by HTTP’s stateless Web protocols. c. Explorer, Safari, Firefox, and Chrome are examples of Web browsers. d. Web Cache can increase your Web surfing speed Your answer ________ 49. There are two main types of e-mail, each with advantages and disadvantages. If you are using MS Outlook, Mozilla Thunderbird, or a similar e-mail client software, which type of mail does that software handle? a. HTTP mail b. Local mail c. POP mail d. Webmail Your answer ________ 50. Which of these in the motherboard above is a good place to put a CPU? a. A b. B c. C d. D Your answer ________ 51. Which of these in the motherboard above is a good place to put a RAM? a. A b. B c. C d. D Your answer ________ 52. Which of these in the motherboard above is a good place to put a video card? a. A b. B c. C d. D Your answer ________ 53. Which of these in the motherboard above are used for plugging in an Ethernet network cable? a. A b. B c. C d. D Your answer ________
© Copyright 2025 Paperzz