1. According to the history of the Internet video we have been
watching, which of the following was the very first message that was sent
over the Internet?
A) What hath God Wrought?
B) Hello!
C) Mr. Watson, come here. I want to see you.
D) LOG [the first letters of “login”]
E) Do we have connectivity?
2. According to the calculations we did in class, which of the
following is the approximate percentage of people who regularly use the
Internet in the World today?
A) 65%
B) 37%
C) 23%
D) 12%
E) 7%
3. According to the discussion we had in lecture, which of the
following best describes worldwide paper use (total consumption) during
the last 50 years since computers and information technology have been
used?
A) Paper use has gone up, and then gone down
B) Paper use has gone down, and then gone up
C) Paper use has remained about the same
D) Paper use has gone down
E) Paper use had gone up
4. Which of the following best explains why software developers
or programmers use compiled languages (rather than interpreted languages)
when creating software to sell?
A) Compiled languages are cheaper to buy than interpreted languages.
B) Compiled languages are more common. It is easier to get a
compiled language for a PC than an interpreted language.
C) Compiled languages require both the source code and the interpreter
to be in memory.
D) Compiled languages keep the source code hidden. The software
developer can sell the binary and keep the source code.
E) All of the above.
5. Which of the following is the binary sum of the binary numbers
1101 and 10111?
A) 101100
B) 110010
C) 101001
D) 100100
E) 100010
6. Imagine you are creating a web page like we did in the first
lab of web page construction. Which of the following was the Windows
text editor that we used to create our HTML file?
A) Wordpad
B) Excel
C) Notepad
D) Word
E) Composer
7. Which of the following is the correct full spelling of the acronym
HTTP?
A) Hyper Text Transmission Packet
B) Hotlink Transfer Teletype Program
C) Host Transmission Text Protocol
D) Hyper Text Transfer Protocol
E) Hypercard Translator Text Program
8. Which of the following is the correct full spelling of the
acronym URL?
A) Universal Registered Lexicon
B) Unethical Remote Legislation
C) Unix Redirectional Location
D) Usenet Radio Layout
E) Uniform Resource Locator
9. In the above Spreadsheet, which of the following would be the
correct formula to enter into the active cell?
A) +ADD(A1:B1)-D4
B) =C4-D6
C) =SUM(A4:B5)-SUM(A6:D5)
D) PLUS(C4)(D5)
E) =D6-C4
10. OK, back to creating web pages. Which of the following
is the correct spelling of the acronym HTML?
A) Hyper Text Markup Language
B) Host Transfer Multipurpose Language
C) Hotlink Token Multimedia Locator
D) Header Transmission MPEG Locator
E) Host Text Modem Link
11. Imagine you are constructing a web page as we did in the first web
page lab (Lab 6). Which of the following is the correct tag to make
CLOUDS.GIF the background of your page?
A) <BODY BGCOLOR=CLOUDS.GIF>
B) <BACKGROUND=CLOUDS.GIF>
C) <BODY BACKROUND=CLOUDS.GIF>
D) <BGFILE=CLOUDS.GIF>
E) <BODY BACKGROUND=CLOUDS.GIF>
12. Which of the following is the NOT a programming language?
A) Visual Basic
B) Unix
C) C
D) Pascal
E) Cobol
13. Imagine you are on the web in lab and you find an image of
a snowboarder that you really want to use in your own web page. Which
of the following would work to save the image so you can later use it in
your own page?
A) Right mouse click on the image, choose SaveAs.
B) View the source HTML of the page to find the name of the file.
Then change the URL in the browser so it points to that image. Copy
the URL so you can later paste it into the image tag.
C) Get a digital camera, and capture an image of the screen that has
the image. Save your digital camera image as a .jpg file so you can
later use it in your page.
D) Print out the web page. Then, scan the page with a flatbed
scanner and save the image as a .gif file to be used later in your page
E) All of the above will work.
14. Following along from the previous question, imagine you have
the file you want saved on your diskette as SNOWB.GIF. Your HTML
file that you are working on is also saved on your diskette. Which
of the following is the correct tag to use for the image to appear in your
page?
A) <IMAGE=SNOWB.GIF>
B) <IMG SCR=SNOWB.GIF>
C) <SNOWB.GIF>
D) <PIC=SNOWB.GIF>
E) <IMG SRC=SNOWB.GIF>
15. Following along from the previous question, which of the following
tags is the correct tag for a link to the UVM homepage?
A) <A HREF=http://www.uvm.edu/> Visit UVM </A>
B) <http://www.uvm.edu>
C) <LINK=http://www.uvm.edu>Click here for UVM
D) <Check out UVM Here=http://www.uvm.edu>
E) <A LINK=Visit UVM here>http://www.uvm.edu</A>
16. Following along from the previous question, which of the following
would be the very LAST tag you would enter at the bottom of your HTML?
A) </BODY>
B) <END>
C) <EOF>
D) </HTML>
E) </TAG>
17. According to the reading in the textbook, which of the following
persons created the World Wide Web?
A) John Bramley
B) Karen Plaut
C) Ralph Stanley
D) Tim Berners-Lee
E) Len Kleinrock
18. According to the reading assignment “How Hackers Break In
and How They are Caught” which of following is the method that the villain
Abednego used to break through the firewall of his victim’s company?
A) He used the port scanner “Strobe” to see if there are any unguarded
or open ports.
B) Abednego used a stealth port scanner that sends a premature FIN
packet
C) He uses a war-dialer program that calls all the phone extensions
at the company and finds an unauthorized modem. With his password-guesser
he is able to break into that computer.
D) Abednego uses “nslookup” to search the Internet for IP addresses.
Using the information from there, he is able to spoof the IP address of
the victim’s company allowing access to the root host.
E) He uses a core-dump to find the encrypted password in RAM and match
it with the shadow file to allow access behind the firewall.
19. Imagine you create a web page the way we did in the Second web page
lab (Lab 7). You save your HTML file and point the browser to your
file using the URL: http://www.uvm.edu/~yourID/file.html. The “Forbidden”
message is then displayed on the screen. Which of the following best
describes why you got the “Forbidden” message?
A) Unix (AIX) is case sensitive. You need to type file name in
with exactly the same upper and lower case letters.
B) The file is too large to display on the monitor. There is
not enough VRAM in your PC.
C) Zoo is temporarily down.
D) The file permissions need to be changed on your HTML file so the
file is visible to the public.
E) None of the above.
20. Following along from the previous questions, imagine you try
to solve the problem in the previous question by typing chmod 644 *.*
at your zoo prompt. Which of the following best explains what the
6 stands for in the command?
A) Owner has read and write permissions
B) Group has read only permission
C) World has read only permission
D) Group and world have read and write permissions
E) Owner has execute permission
Answers:
1. D
2. E
3. E
4. D
5. D
6. C
7. D
8. E
9. B
10. A
11. E
12. B
13. E
14. E
15. A
16. D
17. D
18. C
19. D
20. A