AGRI 85 Spring 2003
Lecture 9 March 27

By now you should have
1. Read Chapters 2 (Internet), 3 (Applications), 4 (System Hardware), 12 (Security & Ethics), Appendix.1.  How Hackers Break In  Sci. Am. October 1998 . Use your zoo login and password to read online with Adobe Acrobat
2. Read How Faxes and Digital Cameras work, and How LCD Screens work (Use zoo login/password)

Assignments & Announcements:
1. Second Exam Next Week!  Be on time or lose points.  Bring Pencil & Eraser.
2. Five More Lecture meetings for the semester!
3. Read Chapter 9 (Networks) in textbook

Attendance

Questions?

Lab Preview:  Examples of Final Lab projects

Protocols, Error Checking, Physical Media : Cables, Wires, Broad Band access .

Exam Preparation.  Visit Practice Exams :

1. What does the acronym URL stand for?
2. What does the acronym HTTP stand for?
3. What does the acronym HTML stand for?
4. Imagine a friend from AGRI 85 comes to you for help with his web page.  He created his web page using netscape composer version 6.2 that he downloaded and installed from the university’s software archive.  Your friend created his web page and everything was working on his machine.  He was able to view the image on his page in his room on his own PC with either Netscape Navigator, or Internet Explorer.  But, when he went to the computer lab, or the library, or any of his friend’s computers, the image would not come up on the page.  Here’s some source code from the file created with netscape composer:

<html>
<head>
<meta http-equiv="content-type" content="text/html; charset=ISO-8859-1">
</head>
<body>
<div align="Center">Final Exam Test Question<br>
<img src="file:///C:/My%20Work/Beginnings/Fall%202002/test1.jpg" alt="alt" width="700" height="473">
<br>
</div>
</body>
</html>

Refer to the picture below:
 
5. According to the HTML code above, where will the browser look for the image file?
A)    A
B)    B
C)    C
D)    D
E)    E

6. Following along from the previous question, where on the picture above SHOULD the image file be stored?
A)    A
B)    B
C)    C
D)    A or B
E)    B or D

7.  In the required reading entitled "Spammers hiding behind students", which of the following was the clue that tipped the Tufts University IT people, that students' personal computer were being used as broadcast stations for spammers?
A) A student was caught bragging on a UseNet News group about the $20/mon. he was being paid to let his PC be used for spammers.
B) The IT services folks noticed a huge increase in the use of University network bandwidth.
C) A student tried to recruit another student who told University network personnel.
D) The school received a flood of complaints that its domain was the source of the spam.
E) Network packet sniffers picked up the spam traffic, and using the packet source IP number, it was traced to the student machines.

8. Which of the following is an example of a top-level domain name?
A) zoo.uvm
B) http://www.
C) WindowsXP
D) jleonard
E) .edu



9.  Which one of the following graph types best describes the graph above?
A) Bar Chart
B) Line Graph
C) X-Y Scatter plot
D) Radar graph
E) Curve graph

10. Which of the following would be the best interpretation of the above graph?
A) Countries that have a high birth rate tend to have a high GNP.
B) The graph proves that increasing the GNP will raise the birthrate in a country.
C) Of the countries listed there is a weak inverse relationship between birth rate and GNP.
D) Countries that have a low birth rate have a low GNP.
E) There is no relationship between birth rate and GNP.

11.    Which of the following tags would be the correct tag to take the image of Ira Allen Chapel (ira.jpg) and make it into a link on a web page so that when you click on the chapel, the UVM page comes up?
A) <IMG SRC=ira.jp/http://www.uvm.edu>
B) <A HREF=http://www.uvm.edu><IMG SRC=ira.jpg></A>
C) <Link=www.uvm.edu><IMG SCR=ira.jpg></LINK>
D) <A HREF=www.uvm.edu><ira.jpg></A HREF>
E) <IMG SRC=ira.jpg>http://www.uvm.edu</IMG>

12.   Imagine you were hired by NASA to design an imaging system for a new space probe to Mars.  The imaging system NASA officials have in mind must be able to distinguish 512 different shades of brightness for each pixel in the images the sensor captures.  What is the minimum number of bits that can be used to code for each pixel?
A) 7
B) 9
C) 13
D) 64
E) 512

13.  Which of the following binary numbers is equivalent to decimal 37?
A) 101011
B) 100101
C) 001101
D) 110101
E) 101110

14. Imagine you are creating a web page and you find this really sweet image of a sunrise that you want to use in your page.  You decide to include the tag <IMG SRC=http://www.photos.org/sunrise.jpg> in your web page.  Which of the following is the main advantage of using this tag instead of using a tag like <IMG SRC=sunrise.jpg>?
A) The first tag method will always load the image faster than the second method.
B) The first tag method is safer because the image is stored on its own server.
C) The first tag method is less likely to break any copyright laws on images.
D) The first tag method is more precise because it locates the image in cyberspace.
E) The first tag method will save disk space in your web directory or folder.

15. What does ASCII stand for and why is it important?

16. If you were to make an image file out of a photograph of a sunset over lake champlain, which of the following file extension types would create the smallest file (number of bytes) while not losing much information from the original photograph?
A) JPG
B) GIF
C) BMP
D) EXE
E) TXT

17. What does San Serif mean?

18. What are the two most important principles or things to know when you give an oral presentation?

19. In general, how many words and lines should there be on a PowerPoint slide?

20. Which of the following errors would be caught by the check-sum error checking algorithm?
A) The order of the bits in the packet re-arranged, but the same number of ones and zeros in the packet.
B) Spelling mistake in a text packet
C) If a one-bit in a packet was dropped
D) An error in the addressing layer of the packet
E) All of the above