AGRI 85 FINAL EXAM, Fall 2000



50 Multiple Choice Questions, 2 points each.
Choose the best answer to each question and fill in the letter on the answer sheet.

1. According to the last video we saw, the computer was different that any machine in history because of which of the following?
A) The computer took the place of human memory.
B) The computer could calculate arithmetic faster than any known device up to that time.
C) The computer was a multi-purpose or universal machine.  Machines up until the invention of the computer were designed to do only one thing.
D) The computer was the first machine to combine electricity, calculating power, and an output device.
E) The computer had more metal per weight than any other machine in history up until that time.

2. Which of the following does TCP/IP stand for?
A) Telnet Communication Protocol / Internet Protocol
B) Transfer Control Protocol / Information Protocol
C) Traffic Cipher Program / Internal Program
D) Transmission Control Protocol / Internet Protocol
E) Terminal Communications Protocol / Internet Protocol

3. According to the exercise we did in class, which TCP/IP layer contains the Error Checking information?
A) Data link layer
B) Network layer
C) Applications layer
D) Chocolate layer
E) Physical layer

4. Which of the following will write-protect a 3.5-inch diskette?
A) Slide the little tab on the corner of the diskette so the hole is open.
B) Slide the little tab on the corner of the diskette so the hole is shut.
C) Format the diskette.
D) In Windows Explorer or My Computer choose all files on diskette and click read-only
E) It is impossible to write-protect a diskette

5.  According to the article "How Hackers Break In", which of the following was the way that Abednego slipped through the firewall and gained access to the victim company computer systems?
A)  Abednego used a port scanner and found a guest account with no password.
B) Abednego discovered a modem connected to a computer at the company.  By dialing into the modem and then using a password guesser, he gained root access on a Silicon Graphics machine running Irix.
C) Abednego sneaked past the night watch security guards at the company and
opened on the PCs and took the hard disk home.  He was then able to install the stolen drive into his machine and discovered the passwords to the company's other computer systems.
D) Abednego used "Strobe", a war-dialer, to log in to all available ports on the company's internal network.  One port was not protected and he was able to slip behind the firewall.
E) Abednego caused one of the company's web pages to crash and he was able to core-dump the machine and steal the password shadow file.

6. During which of the following years did the World Wide Web become widely accessible here at UVM?
A) 1970
B) 1985
C) 1993
D) 1997
E) 1999

7. According to the last video, which of the following were sources of arithmetic errors before electronic computers?
A) Printed tables such as logarithm tables already had errors, using them led to more errors.
B) Copy errors due to mistakenly writing the wrong number down on paper.
C) Rounding errors due to close approximations using a slide rule.
D) Human arithmetic errors.
E) All of the above.

8. Which of the following takes data from the register in the CPU and transports it to a SIMM on the system board of a PC?
A) Address Bus
B) Digital System Link Cable (DSLC)
C) Data Bus
D) C Metal Oxide Semiconductor Link
E) School Bus

9. Charles Babbage got the idea of using punched cards to control his programmable computers, from which of the following?
A) Swiss watch makers
B) A psychedelic drug experience
C) A dream while he was asleep
D) The Jaquard loom
E) The local railway conductors punching train tickets

10. According to the video we saw in class, which of the following persons is considered by computer historians to be the first computer programmer?
A) Grace Hopper
B) Alison Kraus
C) Dr. John Von Neuman
D) Kaye Mauchley
E) Ada Byron, countess of Lovelace

11. Imagine your lab instructor sends you an e-mail with a .gif file as an attachment.  You save the .gif file in your home directory in zoo.  Which of the following sequences of commands and programs could you use to view it?
A) Use Pine, Ctrl-R, Ctrl-T
B) Use Netscape Navigator, type in the URL to your mail directory
C) Use pico, convert file to HTML, then view it with telnet.
D) FTP to upload the file, then use Paint to view the file.
E) Copy the file to public_html, change file permissions, use Netscape to view it.

12. According to the history of the Internet Video we’ve been watching in class, there were three major Information Technology companies that began in Margaret Jacks Hall at Stanford University.  One was Silicon Graphics, another Cisco Systems; which was the third company?
A) Digital Equipment Corporation
B) International Business Machines
C) SUN Microsystems
D) Netscape
E) AOL

13. Imagine you want to create a web page using Netscape Composer.  You open Netscape Communicator.  Which of the following menu pull-downs do you use to get into Composer?
A) File-->Open-->Composer.
B) Edit-->New-->Webpage.
C) Communicator-->Composer.
D) Go-->Application-->Composer.
E) Insert-->Webpage.

14. In World Wide Web jargon, URL stands for which of the following?
A) Unterlochen Reichspieler Lockengestossen
B) University Regional Location
C) Useless Rectify Logistics
D) Uniform Resource Locator
E) Useful Regional Locator

15.  Here’s another WWW jargon word: http.  Which of the following does http stand for?
A) Hyper Text Transfer Protocol
B) Hetrz Terminal Transmission Protocol
C) Hyper Terminal Transmission Process
D) Hedonistic Tendency Timing Protection
E) Home Terminal Transfer Protocol

16.  And lastly, which of the following does HTML stand for?
 A) Home Terminal Markup Language
 B) Hyper Terminal Multi-media Layout
 C) Hyper Text Markup Language
 D) Home Text Multi-media Language
E) High-end Text-based Multi-media Layout-language

17.  Which of the following was the primary fuel source that powered the Voyager on its historic imaging survey of the outer planets?
A) Solar energy from silicon-based solar panels
B) Chemical acid/base batteries
C) Plutonium
D) Dilithium Crystals
E) Silver nitrate-based reactor core.

18.  Imagine you find this really nice image of a button with a mailbox on it called MAILBUTTON.JPG.  You decide to use this button as hot link in your home page for visitors to click on to send you e-mail.  Which of the following would be the correct HTML code to have the button become a hot link for e-mail?
A) <a href=mailto:yourid@zoo.uvm.edu><img src=MAILBUTTON.JPG> </a>Click on the button to send me mail <P>
B) <img src=MAILBUTTON.JPG> <a href=mailto:yourid@zoo.uvm.edu> Click on the button to send me mail </a><BR>
C) <a href=mailto:yourid@zoo.uvm.edu>Click on the button to send me mail</a> <img src=MAILBUTTON.JPG>
D) <img src=mailto:yourid@zoo.uvm.edu></a>  href= MAILBUTTON.JPG>Click on the button to send me mail</a><P>
E) <mailto: your id @ zoo.uvm.edu><img src=MAILBUTTON.JPG><a href=Click on the button to send me mail></a><br>

19.  Imagine you want to connect to zoo to create a new web page using zoo's editor.  You go to the computer lab and turn on a machine.  Which of the following applications do you use to connect to zoo?
A) Telnet
B) Pine
C) Pico
D) Lynx
E) Netscape

20.  OK, following along from the previous question.  Imagine you are now logged in to zoo and have either your zoo> or yourid@zoo.uvm.edu> prompt.  Which of the following software are you using at this point when you see your prompt?
A) Pine
B) FTP
C) Unix (AIX)
D) Pico
E) Netscape

21.   Following along from the previous question.  Image you now want to see a list of files in your zoo account.  Which of the following commands do you enter at this point?
A) dir
B) ls
C) files
D) double click on “My Computer”
E) use the Windows Explorer

22. Following along from the previous question.  You now have to get into your sub-directory where all your web files are stored.  Which of the following commands do you use?
A) cp ~/username/public_html/
B) cd public_html
C) mv public_html *.*
D) chmod 644 *.*
E) public_html

23. Imagine you are now in your zoo sub-directory where all your web files are stored.  You decide to use the editor on zoo to create a new webpage called newfile.html.  Which of the following AIX commands would you use?
A) pico newfile.html
B) pine newfile.html
C) telnet newfile.html
D) rm newfile.html
E) newfile.html

24. Ok, now imagine you have completed your newfile.html and you have saved it.  You then open Netscape and type in your URL for that page and you see the “FORBIDDEN” error message.  Which of the following best explains what happened.
A) There is an error in the HTML code.
B) Zoo has gone down temporarily, if you wait a few minutes it will be up again and the error message will disappear.
C) You forgot change the file permissons to make newfile.html public with the chmod command.
D) The URL does not have a DNS entry.
E) You have run out of disk space and the Zoo systems administrator has temporarily disabled your account.

25.  Which of the following was the method of IMAGE COMPRESSION used on the Voyager on its historic imaging survey of the outer planets?
A)  Triplet coding
B)  Sum-check.
C)  First pixel in a row sent as a reference, then the difference in brightness of adjacent pixels sent.
D)  Parity-check of each pixel
D) Film was squeezed into a tiny capsule and parachuted back to Earth.

 26.  Which of the following is the decimal equivalent to the binary number 1010101?
A)    14
B)    85
C)   170
D)   256
E)   512

27.  Imagine you are logged in to zoo, and you are in your sub-directory where all your web files are stored.  Which of the following UNIX commands will move you back to your home directory?
 A) cd
 B) ls -al
 C) cp
 D) cd public_html
 E) pop up

28.  Which of the following reasons best explains why the Sum-check algorithm was NOT used for error checking in sending data back from the Voyager Space probe, as described in the assigned article reading from Scientific American?
A) The sum-check algorithm is not as efficient at detecting errors as the method that was used.
B) The amount of source code to program the sum-check algorithm was longer that what could be stored in the Voyager's memory.
C) The sum-check algorithm had not been invented in the early 1970s when the Voyager was assembled.
D) The sum-check algorithm only works on analog computers.
E) The handshake-acknowledgment time would take too long.

29.  Here's an example of a URL: http://www.banjo.org/strings/soldiers_joy.html.  In this URL, which of the following components refers to the name of the folder or directory on the www server that contains the Web file that gives the fingering and music to the tune "Soldier's Joy"?
     A) http:
     B) banjo
     C) org
     D) strings
     E)  soldiers_joy.html

30.  Below are five examples of cipher text as described in the last lecture.  Which of them spells out a comprehensible message using the decipher method shown in class?
A) JEUIY  GDGEMSAY
B) WLFKA  KDJGHSLE
C) OUIWK  APUUOMRB
D) IBQQZ  IPMJEBZT
E) WONMS  WOBMSAAM

31.  Which of the following physical media has the broadest or widest bandwidth?
     A) 10base2 thin ethernet cable
     B)  thick ethernet coaxial cable
C) fiber optic cable
D) 10 Base T ethernet cable
E) String between two paper cups

32.  Here are two binary numbers: 0101 and 1000.  Which of the following would be the decimal sum of those two binary numbers?
A) 10
B) 13
C) 17
D) 22
E) 256

33.  Imagine you are trying to print out the HTML source code to one of your web pages on zoo.  Which of the following would be ways would work to print the HTML code?
A) Log on to zoo and get the HTML code on the screen with pico.  Then print the screen.
B) Log on to zoo, get the HTML code on the screen with the pico command.  Then click and drag the mouse (blocking the code) until all the HTML is blocked.  Then, pull down edit and choose COPY.  Next open up Notepad, EditàPaste, then print from within Notepad.
C) Use FTP to download the HTML file from your zoo account to a diskette.  Then open the HTML file in a word processor such as Word.  Print the HTML from there.
D) Use Netscape Communicator, get the web page on the screen, pull down ViewàPage Source, block out the HTML code, Ctrl-C to copy, Paste into Notepad, and print.
E)   All of the above.

34.  Let’s say you were interested in changes in the date when spring arrives each year.  Since you live in the country, you are aware of the first date the small spring peeper frogs start singing.  You have been keeping records of the date of the first spring peeper calling for the last 12 years.  Which of the following graph types would be most appropriate for displaying how the date changes over the last 12 years?
A) Pie graph
B) Line graph
C) Horizontal Bar chart
D) Radar chart
E) Stacked 3-D Bar chart

35.  Which of the following HTML tags would you use to create an e-mail link inside your web page?
A) <MAIL   TO:yourid@zoo.uvm.edu>Click here to send me mail </A.>
B) <MAILTO:http://www.uvm.edu/~yourid/ >Click here to send me mail </MAIL>
C) <MAIL>yourid@zoo.uvm.edu</MAIL>Click here to send me mail</A>
D) <A HREF=mailto:yourid@zoo.uvm.edu>Click here to send me mail </A>
E) <TCP/IP:SEND” yourid@zoo.uvm.edu> Click here to send me mail </SEND>

36.  Imagine a friend of yours was working on her web page and could not get the background to come up.  You took a look at her code and saw the following:
 <HTML> <HEAD> <TITLE> Web Page One </TITLE> </HEAD> <BODY BACKROUND=back.gif>
Which of the following best explains why the background file is not displayed when viewed from a browser?
A) The back.gif file is not in the public_html directory.
B) Your friend forgot to chmod 644 *.*
C) Part of the HTML tag is not spelled correctly
D) The back.gif file is corrupted in some way
E) All of the above are equally likely

37.  Which of the following best describes how the mouse tells the computer how far it has been moved on the mouse pad according to material presented in lecture?
A) The mouse pad has electrical sensors that detect changes in resistance
B) Inside the mouse the rollers spin a wheel with holes.  Light shines through the holes and a light sensor detects flashes of light for any movement.
C) A radio frequency is emitted by the mouse.  Inside the computer is a detector that extrapolates how far away the mouse is and its changes of position
D) The mouse track ball is magnetized and magnetic sensors inside the mouse detect changes in the ball's position.
E) The wire leaving the mouse sends electrical signals when bent or moved.

38.  Which of the following areas is closest to that of one hectare?
A) surface area of a pin head
B) area of a Soccer Field
C) area of the State of Vermont
D) the area inside the earth’s orbit around the sun
E) the area of a plane inside the visible universe.

39.  Which of the following refers to how close together pixels are in a CRT monitor?
A) refresh space
B) dot pitch
C) TFT resonation distance
D) pixel block diameter
E) active matrix space

40.  Which of the following HTML tags would you use to change the color of following text to red?
A) <COLOR TYPE=RED>
B) <RED>
C) <FONT COLOR=RED>
D) <PALETTE/RED>
E) <BODY=RED>

41.  Which of the following HTML tags did we use in lab to display the resume text as it is found in text-file format?
A) <PRE>
B) <TEXT>
C) <ASCII>
D) <DISPLAY FORM TYPE ASCII>
E) <TXT>

42.  Which of the following is NOT an operating system?
A) DOS
B) UNIX
C) Windows95
D) System 8
E) QBASIC

43.  Which of the following (that were demonstrated in lecture) are used in LCD Flat Pannel Displays and only allow light to pass in a single geometric plane?
A) Polarizers
B) TFTs
C) Nematic Liquid Crystals
D) Dilithium Crystals
E) Metal Hydroxioxides

44.  Considering the typical file names and three letter file extensions, which of the following files is most likely NOT an example of an ASCII text file?
A) README.TXT
B) MYDATA.DAT
C) QBASIC.EXE
D) EMAIL.FIL
E) MYPAGE.HTM

45.  Imagine you are investigating the relationship between global temperature and tropical storm intensity.  You access the United States Meteorological Weather Center Data Base and get the records of number of class 5 hurricanes per year and the average global temperature per year.  The records go back to 1950.  You are looking for a pattern to see if years with higher global temperature had more hurricanes.  Which of the following graph types would you use to best display the relationship between temperature and number of hurricanes per year?
     A) Pie Chart
     B) Bar Graph
     C) Line Graph
     D) X-Y Scatterplot
     E) Radar Graph

46.  Which of the following best describe the types of signals found traveling inside the computer?
      A) serial and parallel
      B) digital and serial
     C) analog and parallel
     D) digital and parallel
     E) analog and digital

47.  Here's some html code:
     <html> <head> <title> Quiz Question </title>
     </head> <body background="back.jpg"> <h1> HTML Source Code Example </h1> <br>
     Here's a question for you<br>
     </body>
     </html>
Imagine you are using Netscape in lab to view the web page above.  Which of the following appears in the blue or red bar at the very top of the Netscape window on a computer in lab?
     A) title
     B) Quiz Question
     C) back.jpg
     D) HTML Source Code Example
     E) Here's a question for you

48.  Following along from the previous question.  You upload the above html file from your diskette to the directory on zoo that has your web files. You then go to Netscape to view it and discover the background does not work.  Which of the following is NOT a possible explanation of the problem.
     A) forgot to upload back.jpg
     B) the background file must be inside an /Image/ subdirectory in order to work.
     C) forgot to change file permissions for back.jpg
     D) the tag that controls the background is spelled wrong.
     E) you uploaded back.jpg to your root directory on zoo.

49.   Which of the following is closest to the clock speed of typical processors found in the top of the line desktop personal computers for sale today?
A) 1.1 Mega Hertz
B) 550 Mega Hertz
C) 1.1 Giga Hertz
D) 550 Giga Hertz
E) 1.1 Tera Hertz

50.  Imagine you move to a new living space for next semester.  Your address and phone number have changed.  You wish to update your e-mail signature file for pine on zoo.  Which of the following methods did we use in lab to edit your signature file on zoo?
A) Open your signature file with Notepad, make the change, and upload it to your public_html account on zoo.
B) Use pico to edit your .signature file.  Make the change, then save with Ctrl-X.
C) Download your signature file from your root directory on zoo to your public_html directory on the PC’s hard disk.  Use Word to edit and save the file.
D) Log on to zoo, change directories into public_html, use pico to edit SIGNATURE.E-MAIL, save with Ctrl-X.
E) Log on to zoo, use ftp to upload a new .signature file from your diskette to your public_html folder.  Use chmod 644 *.* to make it public.

Answer key:
1) C
2) D
3) A
4) A
5) B
6) C
7) E
8) A
9) D
10) E
11) E
12) C
13) C
14) D
15) A
16) C
17) C
18) A
19) A
20) C
21) B
22) B
23) A
24) C
25) C
26) B
27) A
28) E
29) D
30) D
31) C
32) B
33) E
34) B
35) D
36) C
37) B
38) B
39) B
40) C
41) A
42) E
43) A
44) C
45) D
46) D
47) B
48) B
49) C
50) B

 Return to Course Bookmarks