Exam 2 Thursday March 14, 2002

1.  According to the history of the Internet video we have been watching, which of the following was the very first message that was sent over the Internet?
A) What hath God Wrought?
B) Hello!
C) Mr. Watson, come here. I want to see you.
D) LOG [the first letters of “login”]
E) Do we have connectivity?

2.  According to the calculations we did in class, which of the following is the approximate percentage of people who regularly use the Internet in the World today?
A) 65%
B) 37%
C) 23%
D) 12%
E) 7%

3.  According to the discussion we had in lecture, which of the following best describes worldwide paper use (total consumption) during the last 50 years since computers and information technology have been used?
A) Paper use has gone up, and then gone down
B) Paper use has gone down, and then gone up
C) Paper use has remained about the same
D) Paper use has gone down
E) Paper use had gone up

4.  Which of the following best explains why software developers or programmers use compiled languages (rather than interpreted languages) when creating software to sell?
A) Compiled languages are cheaper to buy than interpreted languages.
B) Compiled languages are more common.  It is easier to get a compiled language for a PC than an interpreted language.
C) Compiled languages require both the source code and the interpreter to be in memory.
D) Compiled languages keep the source code hidden.  The software developer can sell the binary and keep the source code.
E) All of the above.

5.  Which of the following is the binary sum of the binary numbers 1101 and 10111?
A) 101100
B) 110010
C) 101001
D) 100100
E) 100010

6.  Imagine you are creating a web page like we did in the first lab of web page construction.  Which of the following was the Windows text editor that we used to create our HTML file?
A) Wordpad
B) Excel
C) Notepad
D) Word
E) Composer

7. Which of the following is the correct full spelling of the acronym HTTP?
A) Hyper Text Transmission Packet
B) Hotlink Transfer Teletype Program
C) Host Transmission Text Protocol
D) Hyper Text Transfer Protocol
E) Hypercard Translator Text Program

8.  Which of the following is the correct full spelling of the acronym URL?
A) Universal Registered Lexicon
B) Unethical Remote Legislation
C) Unix Redirectional Location
D) Usenet Radio Layout
E) Uniform Resource Locator
 

9.  In the above Spreadsheet, which of the following would be the correct formula to enter into the active cell?
A) +ADD(A1:B1)-D4
B) =C4-D6
C) =SUM(A4:B5)-SUM(A6:D5)
D) PLUS(C4)(D5)
E) =D6-C4

10.  OK, back to creating web pages.  Which of the following is the correct spelling of the acronym HTML?
A) Hyper Text Markup Language
B) Host Transfer Multipurpose Language
C) Hotlink Token Multimedia Locator
D) Header Transmission MPEG Locator
E) Host Text Modem Link

11. Imagine you are constructing a web page as we did in the first web page lab (Lab 6).  Which of the following is the correct tag to make CLOUDS.GIF the background of your page?
A) <BODY BGCOLOR=CLOUDS.GIF>
B) <BACKGROUND=CLOUDS.GIF>
C) <BODY BACKROUND=CLOUDS.GIF>
D) <BGFILE=CLOUDS.GIF>
E) <BODY BACKGROUND=CLOUDS.GIF>

12.  Which of the following is the NOT a programming language?
A) Visual Basic
B) Unix
C) C
D) Pascal
E) Cobol

13.  Imagine you are on the web in lab and you find an image of a snowboarder that you really want to use in your own web page.  Which of the following would work to save the image so you can later use it in your own page?
A) Right mouse click on the image, choose SaveAs.
B) View the source HTML of the page to find the name of the file.  Then change the URL in the browser so it points to that image.  Copy the URL so you can later paste it into the image tag.
C) Get a digital camera, and capture an image of the screen that has the image.  Save your digital camera image as a .jpg file so you can later use it in your page.
D) Print out the web page.  Then, scan the page with a flatbed scanner and save the image as a .gif file to be used later in your page
E) All of the above will work.

14.  Following along from the previous question, imagine you have the file you want saved on your diskette as SNOWB.GIF.  Your HTML file that you are working on is also saved on your diskette.  Which of the following is the correct tag to use for the image to appear in your page?
A) <IMAGE=SNOWB.GIF>
B) <IMG SCR=SNOWB.GIF>
C) <SNOWB.GIF>
D) <PIC=SNOWB.GIF>
E) <IMG SRC=SNOWB.GIF>

15. Following along from the previous question, which of the following tags is the correct tag for a link to the UVM homepage?
A) <A HREF=http://www.uvm.edu/> Visit UVM </A>
B) <http://www.uvm.edu>
C) <LINK=http://www.uvm.edu>Click here for UVM
D) <Check out UVM Here=http://www.uvm.edu>
E) <A LINK=Visit UVM here>http://www.uvm.edu</A>

16.  Following along from the previous question, which of the following would be the very LAST tag you would enter at the bottom of your HTML?
A) </BODY>
B) <END>
C) <EOF>
D) </HTML>
E) </TAG>

17.  According to the reading in the textbook, which of the following persons created the World Wide Web?
A) John Bramley
B) Karen Plaut
C) Ralph Stanley
D) Tim Berners-Lee
E) Len Kleinrock

18.  According to the reading assignment “How Hackers Break In and How They are Caught” which of following is the method that the villain Abednego used to break through the firewall of his victim’s company?
A) He used the port scanner “Strobe” to see if there are any unguarded or open ports.
B) Abednego used a stealth port scanner that sends a premature FIN packet
C) He uses a war-dialer program that calls all the phone extensions at the company and finds an unauthorized modem.  With his password-guesser he is able to break into that computer.
D) Abednego uses “nslookup” to search the Internet for IP addresses.  Using the information from there, he is able to spoof the IP address of the victim’s company allowing access to the root host.
E) He uses a core-dump to find the encrypted password in RAM and match it with the shadow file to allow access behind the firewall.

19. Imagine you create a web page the way we did in the Second web page lab (Lab 7).  You save your HTML file and point the browser to your file using the URL: http://www.uvm.edu/~yourID/file.html.  The “Forbidden” message is then displayed on the screen.  Which of the following best describes why you got the “Forbidden” message?
A) Unix (AIX) is case sensitive.  You need to type file name in with exactly the same upper and lower case letters.
B) The file is too large to display on the monitor.  There is not enough VRAM in your PC.
C) Zoo is temporarily down.
D) The file permissions need to be changed on your HTML file so the file is visible to the public.
E) None of the above.

20.  Following along from the previous questions, imagine you try to solve the problem in the previous question by typing chmod 644 *.*  at your zoo prompt.  Which of the following best explains what the 6 stands for in the command?
A) Owner has read and write permissions
B) Group has read only permission
C) World has read only permission
D) Group and world have read and write permissions
E) Owner has execute permission

Answers:
1. D
2. E
3. E
4. D
5. D
6. C
7. D
8. E
9. B
10. A
11. E
12. B
13. E
14. E
15. A
16. D
17. D
18. C
19. D
20. A