Exam Two, AGRI 85, Spring 2003
3 April 2003
1. Which of the following is the binary sum of the binary numbers 10101
and 11011?
A) 101010
B) 110111
C) 110000
D) 101110
E) 111001
2. Which one of the following graph types best describes the graph
above?
A) Bar Chart
B) Line Graph
C) X-Y Scatter plot
D) Radar graph
E) Curve graph
3. Which of the following would be the best interpretation of the
above graph?
A) Countries that have a high birth rate tend to have a high GNP.
B) The graph proves that increasing the GNP will raise the birthrate in
a country.
C) Of the countries listed there is a weak inverse relationship between
birth rate and GNP.
D) Countries that have a low birth rate have a low GNP.
E) There is no relationship between birth rate and GNP.
4. Which of the following tags would be the correct tag
to take the image of Ira Allen Chapel (ira.jpg) and make it into a link on
a web page so that when you click on the chapel, the UVM page comes up?
A) <IMG SRC=ira.jp/http://www.uvm.edu>
B) <A HREF=http://www.uvm.edu><IMG SRC=ira.jpg></A>
C) <Link=www.uvm.edu><IMG SCR=ira.jpg></LINK>
D) <A HREF=www.uvm.edu><ira.jpg></A HREF>
E) <IMG SRC=ira.jpg>http://www.uvm.edu</IMG>
5. According to the article "How Hackers Break In", which of the following
was the way that Abednego slipped through the firewall and gained access to
the victim company computer systems?
A) Abednego used a port scanner and found a guest account with no
password.
B) Abednego discovered a modem connected to a computer at the company.
By dialing into the modem and then using a password guesser, he gained root
access on a Silicon Graphics machine running the Irix operating system.
C) Abednego sneaked past the night watch security guards at the company
and opened one of the PCs and took the hard disk home. He was then
able to install the stolen drive into his machine and discovered the passwords
to the company's other computer systems.
D) Abednego used "Strobe", a war-dialer, to log in to all available ports
on the company's internal network. One port was not protected and he
was able to slip behind the firewall.
E) Abednego caused one of the company's web pages to crash and he was able
to core-dump the machine and steal the password shadow file.
6. Imagine you were analyzing the color of a .bmp file pixel.
The raw red-green-blue color data for this pixel was as follows: 11111111
00000000 11111111. Which of the following colors would this pixel
be?
A) Yellow
B) Blue
C) Green
D) Chartreuse
E) Magenta
7. When you are using pico as the editor of your web page, which of
the following letters from the picture above best matches where the edited
html file will be saved?
A) A
B) B
C) C or D
D) B or C
E) A or B
8. Imagine you are hired by a used CD store to help create a new data
base of the store’s CD inventory. Because of you expertise, you are
asked to come up with a binary coding system so each CD will have a unique
binary number. There is space for 15,000 CDs. Which of the following
is the minimum number of bits you would need to code for each CD, so each
CD has its own unique binary number?
A) 3
B) 14
C) 64
D) 1875
E) 15,000
9. Imagine you are creating a web page and you find this really sweet
image of a sunrise that you want to use in your page. You decide to include
the tag:
<IMG SRC=http://www.photos.org/sunrise.jpg> in your web page.
Which of the following is the main advantage of using this tag instead of
using a tag like <IMG SRC=sunrise.jpg>?
A) The first tag method will always load the image faster than the second
method.
B) The first tag method is safer because the image is stored on its own
server.
C) The first tag method is easier to code than the second method.
D) The first tag method is more precise because it locates the image in
cyberspace.
E) The first tag method will save disk space in your web directory or folder.
10. Which of the following are the two most important things to know
when giving an oral presentation?
A) Your subject and your audience
B) Your objective and your capabilities
C) The room and audiovisual equipment
D) Your timing and pacing
E) Depends on the type of speech
11. Imagine you had scanned an image of the American flag. Which
of the following graphic file formats would be most efficient in compressing
the file to the smallest size?
A) .gif
B) .jpg
C) .bmp
D) .html
E) .gfo
12. According to the reading in the textbook, which of the following
is NOT an example of a telephone network connection?
A) ISDN
B) T-carrier Lines
C) 802.11 Wi Fi
D) DSL
E) Dialup modem connection
13. Most people find which of the following easiest to read and least
distracting in a PowerPoint presentation?
A) ALL UPPER CASE FONT
B) Serif fonts like Times New Roman
C) Lots of different colored fonts, especially reds and greens on a blue
background
D) Sans Serif fonts like Comic Sans
E) Different transition types between each slide
14. Which of the following file extension types is most likely used
with a standard ASCII format file?
A) .mpg
B) .com
C) .doc
D) .xls
E) .txt
15. Imagine your friend comes to you for help with a zoo
web page problem. An image of the pet cat on their page is not coming
up on the screen. Which of the possible problems below can you eliminate
right away as NOT being a possible explanation of why the image is not working?
A) The image file was accidentally uploaded to your friend’s
home directory, instead if into their public_html directory.
B) The image file was named pookie.jpg in the html code,
but the file in the public_html directory is pookie.JPG.
C) The image is not in the /IMAGE sub-directory under
the public_html directory
D) The image tag is <IMG SCR=pookie.jpg> where it
should be <IMG SRC=pookie.jpg>.
E) The image file was uploaded with an older version of
FTP and the file permission on pookie.jpg need to be changed so the file is
“public” and visible.
16. HTTP stands for which of the following?
A) High Tension Transport Priority
B) Hyper Texture Transmission Protocol
C) Hairy Trailing Toe Projection
D) High Text Transition Proxy
E) Hyper Text Transfer Protocol
17. Which of the following are the light sensors that
take light and turn it into a voltage current in Fax machines and Digital
Cameras?
A) Digital to Analytical Converters (DACs)
B) Charge Coupled Devices (CCDs)
C) Analog to Digitized Converters (ADCs)
D) Electro Static Devices (ESDs)
E) Radio Frequency Identification (RFIDs)
18. Imagine your PowerPoint presentation was saved as
the file presentation.ppt. Which of the following tags would work to
use in your home page on zoo where someone could click on the image of the
audience (audience.jpg) and download your PowerPoint presentation to a machine
in the Morrill computer lab?
A) <IMG SCR=audience.jpg link=presentation.ppt>
B) <LINK=http://www.uvm.edu/~yourNetID/presentation.ppt>
<IMG SCR=audience.jpg></LINK>
C) <A HREF=audience.jpg><IMG SRC=presentation.ppt>
</A>
D) <presentation.ppt IMG SRC=audience.jpg>
E) <A HREF=presentation.ppt><IMG SRC=audience.jpg></A>
19. Which of the following most accurately describes how to update, edit,
or change your signature file for emails sent by pine on zoo?
A) Log into zoo, use pico to edit your .signature file. Make
the changes you want, then Ctrl X to save, Y for yes, and Enter.
B) Download your signature.txt file from your mail sub-directory or
folder from zoo. Edit with notepad, save locally, and upload using FTP
to your mail folder.
C) Edit your signature.mail file stored on your local PC in the System32
folder in Windows using Notepad. When finished editing, re-save the
file to the System32 folder.
D) Log into zoo, cd into the public_html folder, use pico to edit the mail.signature
file. When finished re-save the file with Ctrl-S.
E) You need special permission from the zoo system administrator to edit
or alter your signature file on zoo. You can not do it without this
permission.
20. Imagine you are constructing a web page as we did in the first web page
lab (Lab 6). Which of the following is the correct tag for putting a
yellow background color on your page?
A) <BODY BGCOLOR=YELLOW>
B) <BACKGROUND=YELLOW.GIF>
C) <BODY BACKGROUND=YELLOW>
D) <BGCOLOR=YELLOW>
E) <COLOR=YELLOW>
Answer key:
1. c
2. c
3. c
4. b
5. b
6. e
7. c
8. b
9. e
10. a
11. a
12. c
13. d
14. e
15. c
16. e
17. b
18. e
19. a
20. a