EXAM 2 - BioMeCIS

EXAM 2
CSE1301
4/11/14
Name: ____________________________
Student ID: 1000-___________________
1. ____ may be sold or distributed free of charge in compiled form but must always include the source code.
a. License free software
b. Shareware
c. Sourceware
d. Open source software
Your answer ________
2. In the accompanying figure, the item marked E is a ____.
a. Printer port
b. USB port
c. Mouse port
d. Ethernet network port
Your answer ________
3. In the accompanying figure, the item marked A is a ____.
a. Printer port
b. USB port
c. Mouse port
d. LAN port
Your answer ________
4. Which of these is NOT a correct description of bit?
a. 8 bits are 1 byte.
b. 1 Gigabit is about 1 Billion (109) bits.
c. Bits, rather than bytes, are used to talk about network speed.
d. Bits, rather than bytes, are used to talk about storage space.
Your answer ________
5. Which of these is a correct ordering from LOWEST to HIGHEST?
a. Byte, Kilobyte, Megabyte, Gigabyte, Terabyte
b. Byte, Kilobyte, Gigabyte, Terabyte, Megabyte
c. Byte, Kilobyte, Megabyte, Terabyte, Gigabyte
d. Byte, Kilobyte, Gigabyte, Megabyte, Terabyte
Your answer ________
6. Which of these is a correct description of different OSs?
a. Strength of Windows is the reliability.
b. Weakness of Windows is the limited number of available hardware.
c. Weakness of Linux is the limited number of supporting software.
d. Weakness of Mac OS is the security.
Your answer ________
7. What happens on the disk when a file is deleted?
a. The OS overwrites the file’s sectors with random 1s and 0s.
b. The file name is removed from the index file and the file’s clusters are marked as empty.
c. The bits of the file are all set to 0s.
d. Each fragment of the file is moved to the empty clusters for reuse by new files.
Your answer ________
8. ____ is a type of memory circuitry that holds the computer's startup routine.
a. ROM (Read only memory)
b. RIM (Read initial memory)
c. RAM (Random access memory)
d. REM (Ready ever memory)
Your answer ________
9. Regarding RAM (random access memory), which of these is accurate?
a. If the computer is off, RAM still holds data.
b. RAM has greater storage capacity than a hard disk drive.
c. A computer with 1 GB of RAM can hold at most 1 GB of data in memory.
d. RAM is like the waiting room for the CPU.
Your answer ________
10. An operating system’s ________ capability supports a division of labor among all the processing units.
a. Multiprocessing
b. Multitasking
c. Multicomputing
d. Multithreading
Your answer ________
11. In the accompanying figure above, .mp3 is an example of a(n) ____.
a. file extension
b. drive
c. file name
d. folder
Your answer ________
12. Wireless ___________ scrambles the data transmitted between wireless devices and then unscrambles the data only
on devices that have a valid key.
a. Encryption
b. Polymorphism
c. Protected access
d. Concatenation
Your answer ________
13. _______________________ eliminates the key-distribution problem by using one key to encrypt a message but
another key to decrypt the message.
a. Symmetric Key System (SKS)
b. Public Key Encryption (PKE)
c. Brute force System (BFS)
d. Private Key System (PKS)
Your answer ________
14. Computers may break a code by using a(n) _________, which consists of trying all possible keys.
a. symmetric attack
b. encapsulated effort
c. brute force attack
d. signal-based effort
Your answer ________
15. __________ divides a message into several packets that can be routed independently to their destination.
a. Circuit switching
b. Packet switching
c. Circuit routing
d. Packet shaking
Your answer ________
16. What is the difference between a network client and a server?
a. Servers require powerful processing and lots of memory, while clients don’t.
b. Servers provide services to other computers, while clients receive those services.
c. Servers are large computers, while clients can be on laptops or even smartphones.
d. Servers enable peer-to-peer computing, while clients only operate in client/server mode.
Your answer ________
17. Most wireless networks transport data as ____ signals.
a. infrared
b. microwave
c. RF (radio frequency)
d. satellite
Your answer ________
18. The most popular wireless LAN technology is ____.
a. WUSB (Wireless USB)
b. Bluetooth
c. WiMAX
d. Wi-Fi
Your answer ________
19. Which of these is the component for the computer network in the picture above?
a. NIC (Network Interface Card)
b. Router
c. Switch
d. RJ45 Connector
Your answer ________
20. Which one can be the criteria to classify networks into PAN, NAN, LAN, MAN, and WAN?
a. The size of area they can cover
b. The speed of data they can transmit
c. The amount of data they can transfer
d. The size of computers they can support
Your answer ________
21. Most Internet servers have an easy to remember name that is known as a(n) ___________?
a. ISP
b. Domain address
c. Ethernet address
d. NAP address
Your answer _______
22. Which of these is the name of a wireless network to identify your wireless network from detected multiple networks?
a. WNI(wireless network Identification)
b. NDN (network domain name)
c. SSID (service set identifier)
d. WEP (Wired Equivalent Privacy)
Your answer ________
23. ____________ is a unique number assigned to a network interface card when it is manufactured.
a. communication protocol
b. MAC address
c. Public IP
d. Local IP
Your answer ________
24. Which of these is the protocol to automatically distribute IP address?
a. TCP/IP
b. Ethernet Protocol
c. DHCP
d. CSMA/CD
Your answer ________
25. Which of these is NOT an advantage of wired network compared to wireless?
a. fast
b. mobility
c. secure
d. simple to configure
Your answer ________
26. In the accompanying figure, the type of signal represented by A is a(n) __________.
a. digital signal
b. sine signal
c. cosine signal
d. analog signal
Your answer ________
27. DSL uses __________ to transmit data.
a. T1 lines
b. cable connections
c. phone lines
d. none of the above
Your answer ________
28. The accompanying figure represents the connection of your computer to the Internet; the router marked A should
belong to a(n) ____.
a. end user
b. NSP
c. Backbone
d. ISP
Your answer ________
29. The accompanying figure represents the connection of your computer to the Internet; the router marked B should
belong to a(n) ____.
a. end user
b. NSP
c. Backbone
d. ISP
Your answer ________
30. You are heavy downloader and use at 6~12pm (Your neighbors are using mostly at this time) and your telephone
company’s local switching station is close to your apartment. Which of these is the BEST technology for you?
a. Dial-up connection
b. DSL
c. Cable Internet service
d. Satellite Internet service
Your answer ________
31. You are CEO of Arlington Times (newspaper). Hundreds journalists who work in different cities and states have to be
able to share and edit the documents. Which of these is the BEST Internet service for your company?
a. Grid computing
b. Internet forum
c. Cloud computing
d. FTP
Your answer ________
32. You are a supervisor of CIA. There are two branches in Dallas and Arlington. Your agents in two branches want to
share top secret documents. Which of these is the BEST technology for your agents?
a. Anonymous FTP
b. Firewall
c. Traceroute
d. VPN (Virtual private networks)
Your answer ________
33. On the Internet, application protocols provide consumers with many useful services. Which one of the following
correctly describes an Internet-based application protocol?
a. Chat and Instant Messaging use Internet VoIP protocol.
b. Cloud protocols such as SETI control distributed processing grids.
c. P2P is the secure protocol for e-commerce
d. Files can be transferred over the Internet using FTP.
Your answer ________
34. Which Internet access technology does NOT use traditional telephone line?
a. ISDN
b. Cable
c. Dial-up connection
d. DSL
Your answer ________
35. _________ Internet access offers a continuous Internet connection as you are on the go, such as using a cell phone
to collect your e-mail while you are traveling by train or car.
a. Portable
b. Fixed
c. Stable
d. Mobile
Your nswer ________
36. Securing your computer from Internet-based intrusions is an important aspect of computer security. Which one of
the following is NOT a useful security technique?
a. Setting up NAT on a router
b. Activating firewall software
c. Activating your computer’s file sharing options
d. Checking the status of software ports
Your answer ________
37. In the URL above, http:// is the ____.
a. folder name
b. Web protocol standard
c. Web server name
d. file extension
Your answer ________
38. A ________ enables a Web server to keep track of your activity and compile a list of your purchases.
a. Cache
b. Cookie
c. plug-in
d. style sheet
Your answer ________
39. When your browser fetches pages and graphics to form a Web page, it stores them in temporary files on your hard
drive called a Web ________.
a. converter
b. plug-in
c. Cookie
d. Cache
Your answer ________
40. Which of these leaves messages on the server until you specifically delete them?
a. SMTP (Simple Mail Transfer Protocol)
b. IMAP (Internet Messaging Access Protocol)
c. POP3 (Post Office Protocol version 3)
d. MIME (Multi-Purpose Internet Mail Extensions)
Your answer ________
41. Some search engines use a program called a Web _______ that combs the Web to gather data that is representative
of the contents of Web pages.
a. Converter
b. archive
c. crawler
d. glossary
Your answer ________
42. An e-mail scam designed to persuade you into revealing confidential information by replying to an e-mail is called
________.
a. Phishing
b. Spoofing
c. Pharming
d. Anonymizing
Your answer ________
43. Junk e-mail messages may use __________ to monitor the number of people who view the e-mail. That data is
collected and sometimes used to determine the direction of marketing campaigns.
a. Web bugs
b. Flash cookies
c. Spam filters
d. anonymous proxy services
Your answer ________
44. A Web server’s response to a browser’s request includes an HTTP __________ that indicates whether the browser’s
request could be fulfilled.
a. socket code
b. status code
c. protocol code
d. completion code
Your answer ________
45. A tradeoff to the anonymity offered by anonymous __________ is that they tend not to operate at the same speed
as your regular browser.
a. FTP sites
b. URLs
c. Indices
d. Proxies
Your answer ________
46. In the email address [email protected], uta.edu is the ______.
a. User ID
b. Server name
c. E-mail address
d. E-mail client
Your answer ________
47. __________ is an exploit that redirects users to fake sites by poisoning a domain name server with a false IP address.
a. Pharming
b. Phishing
c. Spoofing
d. Anonymizing
Your answer ________
48. The Web requires many technologies. Which one of the following statements is INCORRECT about these
technologies?
a. We can simply create HTML documents by using Notepad
b. Persistent HTML connection is the solution for problems caused by HTTP’s stateless Web protocols.
c. Explorer, Safari, Firefox, and Chrome are examples of Web browsers.
d. Web Cache can increase your Web surfing speed
Your answer ________
49. There are two main types of e-mail, each with advantages and disadvantages. If you are using MS Outlook, Mozilla
Thunderbird, or a similar e-mail client software, which type of mail does that software handle?
a. HTTP mail
b. Local mail
c. POP mail
d. Webmail
Your answer ________
50. Which of these in the motherboard above is a good place to put a CPU?
a. A
b. B
c. C
d. D
Your answer ________
51. Which of these in the motherboard above is a good place to put a RAM?
a. A
b. B
c. C
d. D
Your answer ________
52. Which of these in the motherboard above is a good place to put a video card?
a. A
b. B
c. C
d. D
Your answer ________
53. Which of these in the motherboard above are used for plugging in an Ethernet network cable?
a. A
b. B
c. C
d. D
Your answer ________