AGRI 85 Spring 2003
Lecture 9 March 27
By now you should have
1. Read Chapters 2 (Internet), 3 (Applications), 4 (System Hardware),
12 (Security & Ethics), Appendix.1.
How Hackers Break In Sci. Am. October 1998
. Use your zoo login and password to read online with Adobe Acrobat
2. Read How
Faxes
and
Digital Cameras
work, and
How LCD Screens work
(Use zoo login/password)
Assignments & Announcements:
1. Second Exam Next Week! Be on time or lose points.
Bring Pencil & Eraser.
2. Five More Lecture meetings for the semester!
3. Read Chapter 9 (Networks) in textbook
Attendance
Questions?
Lab Preview: Examples of Final Lab projects
Protocols, Error Checking,
Physical Media
: Cables, Wires,
Broad Band access
.
Exam Preparation. Visit
Practice Exams
:
1. What does the acronym URL stand for?
2. What does the acronym HTTP stand for?
3. What does the acronym HTML stand for?
4. Imagine a friend from AGRI 85 comes to you for help with his
web page. He created his web page using netscape composer version
6.2 that he downloaded and installed from the university’s software archive.
Your friend created his web page and everything was working on his machine.
He was able to view the image on his page in his room on his own PC
with either Netscape Navigator, or Internet Explorer. But, when he
went to the computer lab, or the library, or any of his friend’s computers,
the image would not come up on the page. Here’s some source code
from the file created with netscape composer:
<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
</head>
<body>
<div align="Center">Final Exam Test Question<br>
<img src="file:///C:/My%20Work/Beginnings/Fall%202002/test1.jpg"
alt="alt" width="700" height="473">
<br>
</div>
</body>
</html>
Refer to the picture below:
5. According to the HTML code above, where will the browser look
for the image file?
A) A
B) B
C) C
D) D
E) E
6. Following along from the previous question, where on the picture
above SHOULD the image file be stored?
A) A
B) B
C) C
D) A or B
E) B or D
7. In the required reading entitled "Spammers hiding behind
students", which of the following was the clue that tipped the Tufts
University IT people, that students' personal computer were being used
as broadcast stations for spammers?
A) A student was caught bragging on a UseNet News group about
the $20/mon. he was being paid to let his PC be used for spammers.
B) The IT services folks noticed a huge increase in the use of
University network bandwidth.
C) A student tried to recruit another student who told University
network personnel.
D) The school received a flood of complaints that its domain
was the source of the spam.
E) Network packet sniffers picked up the spam traffic, and using
the packet source IP number, it was traced to the student machines.
8. Which of the following is an example of a top-level domain
name?
A) zoo.uvm
B) http://www.
C) WindowsXP
D) jleonard
E) .edu
9. Which one of the following graph types best describes
the graph above?
A) Bar Chart
B) Line Graph
C) X-Y Scatter plot
D) Radar graph
E) Curve graph
10. Which of the following would be the best interpretation of
the above graph?
A) Countries that have a high birth rate tend to have a high
GNP.
B) The graph proves that increasing the GNP will raise the birthrate
in a country.
C) Of the countries listed there is a weak inverse relationship
between birth rate and GNP.
D) Countries that have a low birth rate have a low GNP.
E) There is no relationship between birth rate and GNP.
11. Which of the following tags would be the
correct tag to take the image of Ira Allen Chapel (ira.jpg) and make
it into a link on a web page so that when you click on the chapel, the UVM
page comes up?
A) <IMG SRC=ira.jp/http://www.uvm.edu>
B) <A HREF=http://www.uvm.edu><IMG SRC=ira.jpg></A>
C) <Link=www.uvm.edu><IMG SCR=ira.jpg></LINK>
D) <A HREF=www.uvm.edu><ira.jpg></A HREF>
E) <IMG SRC=ira.jpg>http://www.uvm.edu</IMG>
12. Imagine you were hired by NASA to design
an imaging system for a new space probe to Mars. The imaging system
NASA officials have in mind must be able to distinguish 512 different
shades of brightness for each pixel in the images the sensor captures.
What is the minimum number of bits that can be used to code for each pixel?
A) 7
B) 9
C) 13
D) 64
E) 512
13. Which of the following binary numbers is equivalent
to decimal 37?
A) 101011
B) 100101
C) 001101
D) 110101
E) 101110
14. Imagine you are creating a web page and you find this really
sweet image of a sunrise that you want to use in your page. You
decide to include the tag <IMG SRC=http://www.photos.org/sunrise.jpg>
in your web page. Which of the following is the main advantage
of using this tag instead of using a tag like <IMG SRC=sunrise.jpg>?
A) The first tag method will always load the image faster than
the second method.
B) The first tag method is safer because the image is stored
on its own server.
C) The first tag method is less likely to break any copyright
laws on images.
D) The first tag method is more precise because it locates the
image in cyberspace.
E) The first tag method will save disk space in your web directory
or folder.
15. What does ASCII stand for and why is it important?
16. If you were to make an image file out of a photograph of
a sunset over lake champlain, which of the following file extension
types would create the smallest file (number of bytes) while not losing
much information from the original photograph?
A) JPG
B) GIF
C) BMP
D) EXE
E) TXT
17. What does San Serif mean?
18. What are the two most important principles or things to know
when you give an oral presentation?
19. In general, how many words and lines should there be on a
PowerPoint slide?
20. Which of the following errors would be caught by the check-sum
error checking algorithm?
A) The order of the bits in the packet re-arranged, but the same
number of ones and zeros in the packet.
B) Spelling mistake in a text packet
C) If a one-bit in a packet was dropped
D) An error in the addressing layer of the packet
E) All of the above