prepared by students in dr. sidbury’s classes, fall semester 2008
TRANSCRIPT
Prepared by Students in Dr. Sidbury’s classes, Fall Semester
2008
All of the questions pertain to material from the course. All of the answers are correct, more or less. Several of the questions are ambiguous enough or picky enough that I would not put them on my final exam.
Note that on the exam itself the topics will not be given with the questions. They are included here so that you will know where to look to find more on this topic
When you finish this slide show you will probably know what Pfishing is
The Answer is c. 297. To answer this question you do not need to calculate the value. Since the last
digit is 1 the value is odd which eliminates d. Since the first digit is in the place for 256 the answer must
be more than 256.
100101001 is a binary number. What is it in decimal
form?
a. 57 c. 297b. 45 d. 136
a. 254b. 255c. 256d. 257
Answer: c. 256
a. Pattern Recognitionb. Face Recognitionc. Picture Recognitiond. Color Recognition
Answer: a. Pattern Recognition
Which of the following is not part of the CPU? Control Unit ALU RAM Microprocessor
The microprocessor is a single chip, integrated circuit, that contains all of the circuiting necessary for doing
processing. The control unit figures out what to do, while the ALU does the actual computations. RAM (random
access memory) is part of storage.
What is Pfishing (Phishing)? Technology that stores information in a
small, inexpensive tag that can be retrieved via radio.
E-mail fraud scams that attempt to steal a person’s identity.
Manufacture, use, and dispose of computers in an environmentally friendly way.
Process of automatically identifying objects in videos/images using a computer.
These e-mails appear to be legitimate, and the message attempts to gather personal and financial information from the intended victim.
A) It is only available on certain operating systems
B) It uses twice the amount of storage space for numbers
C) It is outdated and not used by many
Answer: B) It uses twice the amount of storage space for numbers
A) Using the computer for shorter amounts of time to reduce usage of electricity
B) Using time online to research ways to better the environment
C) Manufacturing, using, and disposing of computers in an environmentally friendly way
Answer: C) Manufacturing, using, and disposing of computers in an environmentally friendly way
a) fixed point number b) binary numbersc) floating point numbers
Answer: c
What are the two types of multi-tasking?
A. Preemptive multi-tasking, Resource managementB. Multiple processors, process switchingC. Memory, Virtual memory
What three things does an email message consist of?
A.Address, the Subject, and the MessageB.The Message, the Header, and AttachmentsC.Packets, the Message, and the Subject
Answer: B
What is academic freedom?
A. Stuff that is created by an individual or group that is intellectual in nature such as a book or poem or drawing.
B. The concept that students and teachers can use others' intellectual property for studying within certain guidelines.
C. The concept that if you use other people's work you should give them credit and not claim the work as your own.
Answer: B
What are the three parts of an e-mail message?
A. Text file, Pictures, Header
B. Header, Footer, IP Address
C. Destination, Message itself, Attachments
D. Message itself (text file), Attachments, Header information
E. IP Address of sender, Footer, Header
D. Message itself (text file), Attachments, Header information
A.E-mail
B.Downloading from websites
C.Cookies
D.Software already installed on your computer
A. E-mail
There are two technologies for RAM chips: dynamic RAM and static RAM. Dynamic RAM is __________and has larger capacities. Static RAM operates ___________.
a. cheaper; slower
b. more costly; faster
c. cheaper; faster
d. free; as fast as dynamic RAM
A. Open source softwareB. Proprietary softwareC. Network softwareD. Copyrighted software
B. Proprietary software Dr Sidbury’s comment: Both Network software and copyrighted software could satisfy this definition but Proprietary always does.
a. What the computer uses to identify the different parts of the CPU.
b. Named access point for wireless internet connections.
c. Identifies the ports that extorter device are connected to. Ex. USB ports in use
Correct answer: B. Named access point for wireless internet connections.
a. A computer that was built with the sole purpose of working with economic exchanges . Usually used to help run the stock trading on Wall Street.
b. A computer that is the color green.c. Is the manufacture, use, and disposal of
computers in an environmentally friendly way
Correct Answer : C. Is the manufacture, use, and disposal of computers in an environmentally friendly way
A.) Microsoft Windows VistaB.) Apple MAC OS XC.) LinuxD.) Microsoft Internet Explorer
Answer: D. Microsoft Internet Explorer
IP Addresses are 32 bit binary numbers whose octets are each made up from how many possible numbers?
A- 3 C- Approximately 4.9 Billion B- 512 D- 256
Answer: D- each octet can use any number from 0 to 255
ANSWER: B. 180 MILLIONDR. SIDBURY’S COMMENT: THE AMOUNT OF SPACE REQUIRED TO STORE THIS ANIMATION WOULD DEPEND ON HOW MANY BYTES WERE NEEDED TO STORE EACH DOT.
Animation and Video
If you were to take a picture on a 6 megapixel camera and animate it at a rate of 30 frames per second, there would be how many dots per second?
a. 8 billionb. 180 millionc. 1 billiond. 60 million
ANSWER: C. AN EMAIL FRAUD SCAM THAT USES AN EMAIL THAT APPEARS TO BE LEGITIMATE.
Pfishing Pfishing is…
a. a way of searching the internet.
b. how a website gets information from your computer.
c. an email fraud scam that uses an email that appears to be legitimate.
A. PrinterB. Barcode readerC. MouseD. Monitor
Answer: Mouse (DR. SIDBURY’S COMMENT: BARCODE READER IS ALSO AN INPUT DEVICE BUT THE AUTHOR OF THIS QUESTION PROBABLY ELIMINATED IT ON THE GROUNDS THAT IT WAS NOT “STANDARD”)
A. FraudB. PhishingC. EncryptionD. E-mail scam
Answer: Phishing
ACADEMIC HONESTY IS THE CONCEPT THAT A. If you use other’s
work you must credit them and not use it as your own
B. Students cannot use another’s intellectual property for studying
C. You will not use another persons work, even if it is properly cited
D. All of the above
A. If you use other’s work you must credit them and not use it as your own
A.) printer
B.) monitor
C.) webcam
D.) audio system
C.) webcam (is an input device not output)
A.) popular computer game
B.) e-mail fraud scam to gain personal info
C.) search engine
D.) security software
B.) e-mail fraud scam to gain personal info
TO PLAY SOUND ON A COMPUTER IT MUST BE IN WHAT FORM? ANALOG DIGITAL WAVE ANY OF THE ABOVE
A. ANALOG Dr. Sidbury’s
comment: to be stored on a computer it must be digital. But when it’s actually played it’s a wave. The sound card that is manipulating the sound is actually converting it to analog. For me the question is waaay too picky.
____________ is the process of automatically identifying objects in video/images using a computer
A) Video RecordingB) Pattern RecognitionC) Face RecordingD) Person Identification
•a Blacklist System•a Whitelist System
•The Censorware project•The Golden Shield project
Answer: a whitelist system
•Parallel port•Serial port•Firewire port•Ps/2 portAnswer: Serial port
This type of connection, which is used for connecting a device to a computer, communicates one bit at a time.
A) Your IP AddressB) Your Operating SystemC) Both A and BD) Your MAC Address
Answer: C
A) HTTPB) HTMLC) HMLSD) HTTPS
Answer: D
MEMORYDynamic and Static are two technologies for ______ chips.
a.CPUb.Motherboardc.ROMd.RAM
Answer d. RAM
DATA MINING/LOYALTY CARDS BACKGROUND
What is the term for when a computer analyzes large amounts of seemingly random data in order to automatically determine interesting patterns?
a.Loyalty cardsb.Cookiesc.Data miningd.Controversy
Answer c. Data mining
What is the most common use of hex that you are likely to encounter?
A. To update the utilities on your hard driveB. Memory StorageC. As a code for colors in Web pagesD. Binary Conversions
Answer: C. As a code for colors in Web pages
25 is a HEX number. What is it in the decimal system?
a. 16 c. 25
b. 37 d. 52
Answer: b. 37
What is a text file stored on your computer by a web site that you visit called?
A) Byte B) Cookie C) Domain D) Service set identifier
Correct Answer: B) Cookie
Each computer that is connected to the Internet has a unique 32 bit binary number address called a(n):
A) Domain Name B) MAC (Media Access Control) Address C) IP Address D) Top Level Domain
Correct Answer: C) IP Address
A) Optical Storage B) Magnetic Storage C) Integrated Circuit Storage D)Multiple Platter Storage
Answer: C) Integrated Circuit Storage
A) Use B) Condition C) Manufacture D) Disposal
Answer: B) Condition
A. programs B. pictures C. sound D. all of the above
Answer: d. All of the above
Q: To determine if an integer with n digits is odd you only have to examine the __?__ digit so the number of steps is always the same. a.) first b.) second c.) third d.) last
ANSWER: D.) Last
What is the concept that students and teachers can use others' intellectual property for studying within certain guidelines?
a.)Intellectual Property b.)Academic Freedom c.)Academic Honesty d.)Copyright
ANSWER: B.) Academic Freedom