prepared by students in dr. sidbury’s classes, fall semester 2008

45
Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

Upload: shon-holt

Post on 26-Dec-2015

217 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

Prepared by Students in Dr. Sidbury’s classes, Fall Semester

2008

Page 2: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

All of the questions pertain to material from the course. All of the answers are correct, more or less. Several of the questions are ambiguous enough or picky enough that I would not put them on my final exam.

Note that on the exam itself the topics will not be given with the questions. They are included here so that you will know where to look to find more on this topic

When you finish this slide show you will probably know what Pfishing is

Page 3: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

The Answer is c. 297. To answer this question you do not need to calculate the value. Since the last

digit is 1 the value is odd which eliminates d. Since the first digit is in the place for 256 the answer must

be more than 256.

100101001 is a binary number. What is it in decimal

form?

a. 57 c. 297b. 45 d. 136

Page 4: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

a. 254b. 255c. 256d. 257

Answer: c. 256

Page 5: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

a. Pattern Recognitionb. Face Recognitionc. Picture Recognitiond. Color Recognition

Answer: a. Pattern Recognition

Page 6: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

Which of the following is not part of the CPU? Control Unit ALU RAM Microprocessor

The microprocessor is a single chip, integrated circuit, that contains all of the circuiting necessary for doing

processing. The control unit figures out what to do, while the ALU does the actual computations. RAM (random

access memory) is part of storage.

Page 7: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

What is Pfishing (Phishing)? Technology that stores information in a

small, inexpensive tag that can be retrieved via radio.

E-mail fraud scams that attempt to steal a person’s identity.

Manufacture, use, and dispose of computers in an environmentally friendly way.

Process of automatically identifying objects in videos/images using a computer.

These e-mails appear to be legitimate, and the message attempts to gather personal and financial information from the intended victim.

Page 8: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

A) It is only available on certain operating systems

B) It uses twice the amount of storage space for numbers

C) It is outdated and not used by many

Answer: B) It uses twice the amount of storage space for numbers

Page 9: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

A) Using the computer for shorter amounts of time to reduce usage of electricity

B) Using time online to research ways to better the environment

C) Manufacturing, using, and disposing of computers in an environmentally friendly way

Answer: C) Manufacturing, using, and disposing of computers in an environmentally friendly way

Page 10: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

a) fixed point number b) binary numbersc) floating point numbers

Answer: c

Page 11: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

What are the two types of multi-tasking?

A. Preemptive multi-tasking, Resource managementB. Multiple processors, process switchingC. Memory, Virtual memory

Page 12: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

What three things does an email message consist of?

A.Address, the Subject, and the MessageB.The Message, the Header, and AttachmentsC.Packets, the Message, and the Subject

Answer: B

Page 13: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

What is academic freedom?

A. Stuff that is created by an individual or group that is intellectual in nature such as a book or poem or drawing.

B. The concept that students and teachers can use others' intellectual property for studying within certain guidelines.

C. The concept that if you use other people's work you should give them credit and not claim the work as your own.

Answer: B

Page 14: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

What are the three parts of an e-mail message?

A. Text file, Pictures, Header

B. Header, Footer, IP Address

C. Destination, Message itself, Attachments

D. Message itself (text file), Attachments, Header information

E. IP Address of sender, Footer, Header

D. Message itself (text file), Attachments, Header information

Page 15: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

A.E-mail

B.Downloading from websites

C.Cookies

D.Software already installed on your computer

A. E-mail

Page 16: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

There are two technologies for RAM chips: dynamic RAM and static RAM. Dynamic RAM is __________and has larger capacities. Static RAM operates ___________.

a. cheaper; slower

b. more costly; faster

c. cheaper; faster

d. free; as fast as dynamic RAM

Page 17: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

A. Open source softwareB. Proprietary softwareC. Network softwareD. Copyrighted software

B. Proprietary software Dr Sidbury’s comment: Both Network software and copyrighted software could satisfy this definition but Proprietary always does.

Page 18: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

a. What the computer uses to identify the different parts of the CPU.

b. Named access point for wireless internet connections.

c. Identifies the ports that extorter device are connected to. Ex. USB ports in use

Correct answer: B. Named access point for wireless internet connections.

Page 19: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

a. A computer that was built with the sole purpose of working with economic exchanges . Usually used to help run the stock trading on Wall Street.

b. A computer that is the color green.c. Is the manufacture, use, and disposal of

computers in an environmentally friendly way

Correct Answer : C. Is the manufacture, use, and disposal of computers in an environmentally friendly way

Page 20: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

A.) Microsoft Windows VistaB.) Apple MAC OS XC.) LinuxD.) Microsoft Internet Explorer

Answer: D. Microsoft Internet Explorer

Page 21: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

IP Addresses are 32 bit binary numbers whose octets are each made up from how many possible numbers?

A- 3 C- Approximately 4.9 Billion B- 512 D- 256

Answer: D- each octet can use any number from 0 to 255

Page 22: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

ANSWER: B. 180 MILLIONDR. SIDBURY’S COMMENT: THE AMOUNT OF SPACE REQUIRED TO STORE THIS ANIMATION WOULD DEPEND ON HOW MANY BYTES WERE NEEDED TO STORE EACH DOT.

Animation and Video

If you were to take a picture on a 6 megapixel camera and animate it at a rate of 30 frames per second, there would be how many dots per second?

a. 8 billionb. 180 millionc. 1 billiond. 60 million

Page 23: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

ANSWER: C. AN EMAIL FRAUD SCAM THAT USES AN EMAIL THAT APPEARS TO BE LEGITIMATE.

Pfishing Pfishing is…

a. a way of searching the internet.

b. how a website gets information from your computer.

c. an email fraud scam that uses an email that appears to be legitimate.

Page 24: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

A. PrinterB. Barcode readerC. MouseD. Monitor

Answer: Mouse (DR. SIDBURY’S COMMENT: BARCODE READER IS ALSO AN INPUT DEVICE BUT THE AUTHOR OF THIS QUESTION PROBABLY ELIMINATED IT ON THE GROUNDS THAT IT WAS NOT “STANDARD”)

Page 25: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

A. FraudB. PhishingC. EncryptionD. E-mail scam

Answer: Phishing

Page 26: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

ACADEMIC HONESTY IS THE CONCEPT THAT A. If you use other’s

work you must credit them and not use it as your own

B. Students cannot use another’s intellectual property for studying

C. You will not use another persons work, even if it is properly cited

D. All of the above

A. If you use other’s work you must credit them and not use it as your own

Page 27: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

A.) printer

B.) monitor

C.) webcam

D.) audio system

C.) webcam (is an input device not output)

Page 28: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

A.) popular computer game

B.) e-mail fraud scam to gain personal info

C.) search engine

D.) security software

B.) e-mail fraud scam to gain personal info

Page 29: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

TO PLAY SOUND ON A COMPUTER IT MUST BE IN WHAT FORM? ANALOG DIGITAL WAVE ANY OF THE ABOVE

A. ANALOG Dr. Sidbury’s

comment: to be stored on a computer it must be digital. But when it’s actually played it’s a wave. The sound card that is manipulating the sound is actually converting it to analog. For me the question is waaay too picky.

Page 30: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

____________ is the process of automatically identifying objects in video/images using a computer

A) Video RecordingB) Pattern RecognitionC) Face RecordingD) Person Identification

Page 31: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

•a Blacklist System•a Whitelist System

•The Censorware project•The Golden Shield project

Answer: a whitelist system

Page 32: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

•Parallel port•Serial port•Firewire port•Ps/2 portAnswer: Serial port

This type of connection, which is used for connecting a device to a computer, communicates one bit at a time.

Page 33: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

A) Your IP AddressB) Your Operating SystemC) Both A and BD) Your MAC Address

Answer: C

Page 34: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

A) HTTPB) HTMLC) HMLSD) HTTPS

Answer: D

Page 35: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

MEMORYDynamic and Static are two technologies for ______ chips.

a.CPUb.Motherboardc.ROMd.RAM

Answer d. RAM

Page 36: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

DATA MINING/LOYALTY CARDS BACKGROUND

What is the term for when a computer analyzes large amounts of seemingly random data in order to automatically determine interesting patterns?

a.Loyalty cardsb.Cookiesc.Data miningd.Controversy

Answer c. Data mining

Page 37: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

What is the most common use of hex that you are likely to encounter?

A. To update the utilities on your hard driveB. Memory StorageC. As a code for colors in Web pagesD. Binary Conversions

Answer: C. As a code for colors in Web pages

Page 38: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

25 is a HEX number. What is it in the decimal system?

a. 16 c. 25

b. 37 d. 52

Answer: b. 37

Page 39: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

What is a text file stored on your computer by a web site that you visit called?

A) Byte B) Cookie C) Domain D) Service set identifier

Correct Answer: B) Cookie

Page 40: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

Each computer that is connected to the Internet has a unique 32 bit binary number address called a(n):

A) Domain Name B) MAC (Media Access Control) Address C) IP Address D) Top Level Domain

Correct Answer: C) IP Address

Page 41: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

A) Optical Storage B) Magnetic Storage C) Integrated Circuit Storage D)Multiple Platter Storage

Answer: C) Integrated Circuit Storage

Page 42: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

A) Use B) Condition C) Manufacture D) Disposal

Answer: B) Condition

Page 43: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

A. programs B. pictures C. sound D. all of the above

Answer: d. All of the above

Page 44: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

Q: To determine if an integer with n digits is odd you only have to examine the __?__ digit so the number of steps is always the same. a.) first b.) second c.) third d.) last

ANSWER: D.) Last

Page 45: Prepared by Students in Dr. Sidbury’s classes, Fall Semester 2008

What is the concept that students and teachers can use others' intellectual property for studying within certain guidelines?

a.)Intellectual Property b.)Academic Freedom c.)Academic Honesty d.)Copyright

ANSWER: B.) Academic Freedom