50 Multiple Choice Questions, 2 points each.
Choose the best answer to each question and fill in the letter on the
answer sheet.
1. According to the last video we saw, the computer was different that
any machine in history because of which of the following?
A) The computer took the place of human memory.
B) The computer could calculate arithmetic faster than any known device
up to that time.
C) The computer was a multi-purpose or universal machine. Machines
up until the invention of the computer were designed to do only one thing.
D) The computer was the first machine to combine electricity, calculating
power, and an output device.
E) The computer had more metal per weight than any other machine in
history up until that time.
2. Which of the following does TCP/IP stand for?
A) Telnet Communication Protocol / Internet Protocol
B) Transfer Control Protocol / Information Protocol
C) Traffic Cipher Program / Internal Program
D) Transmission Control Protocol / Internet Protocol
E) Terminal Communications Protocol / Internet Protocol
3. According to the exercise we did in class, which TCP/IP layer contains
the Error Checking information?
A) Data link layer
B) Network layer
C) Applications layer
D) Chocolate layer
E) Physical layer
4. Which of the following will write-protect a 3.5-inch diskette?
A) Slide the little tab on the corner of the diskette so the hole is
open.
B) Slide the little tab on the corner of the diskette so the hole is
shut.
C) Format the diskette.
D) In Windows Explorer or My Computer choose all files on diskette
and click read-only
E) It is impossible to write-protect a diskette
5. According to the article "How Hackers Break In", which of the
following was the way that Abednego slipped through the firewall and gained
access to the victim company computer systems?
A) Abednego used a port scanner and found a guest account with
no password.
B) Abednego discovered a modem connected to a computer at the company.
By dialing into the modem and then using a password guesser, he gained
root access on a Silicon Graphics machine running Irix.
C) Abednego sneaked past the night watch security guards at the company
and
opened on the PCs and took the hard disk home. He was then able
to install the stolen drive into his machine and discovered the passwords
to the company's other computer systems.
D) Abednego used "Strobe", a war-dialer, to log in to all available
ports on the company's internal network. One port was not protected
and he was able to slip behind the firewall.
E) Abednego caused one of the company's web pages to crash and he was
able to core-dump the machine and steal the password shadow file.
6. During which of the following years did the World Wide Web become
widely accessible here at UVM?
A) 1970
B) 1985
C) 1993
D) 1997
E) 1999
7. According to the last video, which of the following were sources
of arithmetic errors before electronic computers?
A) Printed tables such as logarithm tables already had errors, using
them led to more errors.
B) Copy errors due to mistakenly writing the wrong number down on paper.
C) Rounding errors due to close approximations using a slide rule.
D) Human arithmetic errors.
E) All of the above.
8. Which of the following takes data from the register in the CPU and
transports it to a SIMM on the system board of a PC?
A) Address Bus
B) Digital System Link Cable (DSLC)
C) Data Bus
D) C Metal Oxide Semiconductor Link
E) School Bus
9. Charles Babbage got the idea of using punched cards to control his
programmable computers, from which of the following?
A) Swiss watch makers
B) A psychedelic drug experience
C) A dream while he was asleep
D) The Jaquard loom
E) The local railway conductors punching train tickets
10. According to the video we saw in class, which of the following persons
is considered by computer historians to be the first computer programmer?
A) Grace Hopper
B) Alison Kraus
C) Dr. John Von Neuman
D) Kaye Mauchley
E) Ada Byron, countess of Lovelace
11. Imagine your lab instructor sends you an e-mail with a .gif file
as an attachment. You save the .gif file in your home directory in
zoo. Which of the following sequences of commands and programs could
you use to view it?
A) Use Pine, Ctrl-R, Ctrl-T
B) Use Netscape Navigator, type in the URL to your mail directory
C) Use pico, convert file to HTML, then view it with telnet.
D) FTP to upload the file, then use Paint to view the file.
E) Copy the file to public_html, change file permissions, use Netscape
to view it.
12. According to the history of the Internet Video we’ve been watching
in class, there were three major Information Technology companies that
began in Margaret Jacks Hall at Stanford University. One was Silicon
Graphics, another Cisco Systems; which was the third company?
A) Digital Equipment Corporation
B) International Business Machines
C) SUN Microsystems
D) Netscape
E) AOL
13. Imagine you want to create a web page using Netscape Composer.
You open Netscape Communicator. Which of the following menu pull-downs
do you use to get into Composer?
A) File-->Open-->Composer.
B) Edit-->New-->Webpage.
C) Communicator-->Composer.
D) Go-->Application-->Composer.
E) Insert-->Webpage.
14. In World Wide Web jargon, URL stands for which of the following?
A) Unterlochen Reichspieler Lockengestossen
B) University Regional Location
C) Useless Rectify Logistics
D) Uniform Resource Locator
E) Useful Regional Locator
15. Here’s another WWW jargon word: http. Which of the following
does http stand for?
A) Hyper Text Transfer Protocol
B) Hetrz Terminal Transmission Protocol
C) Hyper Terminal Transmission Process
D) Hedonistic Tendency Timing Protection
E) Home Terminal Transfer Protocol
16. And lastly, which of the following does HTML stand for?
A) Home Terminal Markup Language
B) Hyper Terminal Multi-media Layout
C) Hyper Text Markup Language
D) Home Text Multi-media Language
E) High-end Text-based Multi-media Layout-language
17. Which of the following was the primary fuel source that powered
the Voyager on its historic imaging survey of the outer planets?
A) Solar energy from silicon-based solar panels
B) Chemical acid/base batteries
C) Plutonium
D) Dilithium Crystals
E) Silver nitrate-based reactor core.
18. Imagine you find this really nice image of a button with a
mailbox on it called MAILBUTTON.JPG. You decide to use this button
as hot link in your home page for visitors to click on to send you e-mail.
Which of the following would be the correct HTML code to have the button
become a hot link for e-mail?
A) <a href=mailto:yourid@zoo.uvm.edu><img src=MAILBUTTON.JPG>
</a>Click on the button to send me mail <P>
B) <img src=MAILBUTTON.JPG> <a href=mailto:yourid@zoo.uvm.edu>
Click on the button to send me mail </a><BR>
C) <a href=mailto:yourid@zoo.uvm.edu>Click on the button to send
me mail</a> <img src=MAILBUTTON.JPG>
D) <img src=mailto:yourid@zoo.uvm.edu></a> href= MAILBUTTON.JPG>Click
on the button to send me mail</a><P>
E) <mailto: your id @ zoo.uvm.edu><img src=MAILBUTTON.JPG><a
href=Click on the button to send me mail></a><br>
19. Imagine you want to connect to zoo to create a new web page
using zoo's editor. You go to the computer lab and turn on a machine.
Which of the following applications do you use to connect to zoo?
A) Telnet
B) Pine
C) Pico
D) Lynx
E) Netscape
20. OK, following along from the previous question. Imagine
you are now logged in to zoo and have either your zoo> or yourid@zoo.uvm.edu>
prompt. Which of the following software are you using at this point
when you see your prompt?
A) Pine
B) FTP
C) Unix (AIX)
D) Pico
E) Netscape
21. Following along from the previous question. Image
you now want to see a list of files in your zoo account. Which of
the following commands do you enter at this point?
A) dir
B) ls
C) files
D) double click on “My Computer”
E) use the Windows Explorer
22. Following along from the previous question. You now have to
get into your sub-directory where all your web files are stored.
Which of the following commands do you use?
A) cp ~/username/public_html/
B) cd public_html
C) mv public_html *.*
D) chmod 644 *.*
E) public_html
23. Imagine you are now in your zoo sub-directory where all your web
files are stored. You decide to use the editor on zoo to create a
new webpage called newfile.html. Which of the following AIX commands
would you use?
A) pico newfile.html
B) pine newfile.html
C) telnet newfile.html
D) rm newfile.html
E) newfile.html
24. Ok, now imagine you have completed your newfile.html and you have
saved it. You then open Netscape and type in your URL for that page
and you see the “FORBIDDEN” error message. Which of the following
best explains what happened.
A) There is an error in the HTML code.
B) Zoo has gone down temporarily, if you wait a few minutes it will
be up again and the error message will disappear.
C) You forgot change the file permissons to make newfile.html public
with the chmod command.
D) The URL does not have a DNS entry.
E) You have run out of disk space and the Zoo systems administrator
has temporarily disabled your account.
25. Which of the following was the method of IMAGE COMPRESSION
used on the Voyager on its historic imaging survey of the outer planets?
A) Triplet coding
B) Sum-check.
C) First pixel in a row sent as a reference, then the difference
in brightness of adjacent pixels sent.
D) Parity-check of each pixel
D) Film was squeezed into a tiny capsule and parachuted back to Earth.
26. Which of the following is the decimal equivalent to
the binary number 1010101?
A) 14
B) 85
C) 170
D) 256
E) 512
27. Imagine you are logged in to zoo, and you are in your sub-directory
where all your web files are stored. Which of the following UNIX
commands will move you back to your home directory?
A) cd
B) ls -al
C) cp
D) cd public_html
E) pop up
28. Which of the following reasons best explains why the Sum-check
algorithm was NOT used for error checking in sending data back from the
Voyager Space probe, as described in the assigned article reading from
Scientific American?
A) The sum-check algorithm is not as efficient at detecting errors
as the method that was used.
B) The amount of source code to program the sum-check algorithm was
longer that what could be stored in the Voyager's memory.
C) The sum-check algorithm had not been invented in the early 1970s
when the Voyager was assembled.
D) The sum-check algorithm only works on analog computers.
E) The handshake-acknowledgment time would take too long.
29. Here's an example of a URL: http://www.banjo.org/strings/soldiers_joy.html.
In this URL, which of the following components refers to the name of the
folder or directory on the www server that contains the Web file that gives
the fingering and music to the tune "Soldier's Joy"?
A) http:
B) banjo
C) org
D) strings
E) soldiers_joy.html
30. Below are five examples of cipher text as described in the
last lecture. Which of them spells out a comprehensible message using
the decipher method shown in class?
A) JEUIY GDGEMSAY
B) WLFKA KDJGHSLE
C) OUIWK APUUOMRB
D) IBQQZ IPMJEBZT
E) WONMS WOBMSAAM
31. Which of the following physical media has the broadest or
widest bandwidth?
A) 10base2 thin ethernet cable
B) thick ethernet coaxial cable
C) fiber optic cable
D) 10 Base T ethernet cable
E) String between two paper cups
32. Here are two binary numbers: 0101 and 1000. Which of
the following would be the decimal sum of those two binary numbers?
A) 10
B) 13
C) 17
D) 22
E) 256
33. Imagine you are trying to print out the HTML source code to
one of your web pages on zoo. Which of the following would be ways
would work to print the HTML code?
A) Log on to zoo and get the HTML code on the screen with pico.
Then print the screen.
B) Log on to zoo, get the HTML code on the screen with the pico command.
Then click and drag the mouse (blocking the code) until all the HTML is
blocked. Then, pull down edit and choose COPY. Next open up
Notepad, EditàPaste, then print from within Notepad.
C) Use FTP to download the HTML file from your zoo account to a diskette.
Then open the HTML file in a word processor such as Word. Print the
HTML from there.
D) Use Netscape Communicator, get the web page on the screen, pull
down ViewàPage Source, block out the HTML code, Ctrl-C to copy,
Paste into Notepad, and print.
E) All of the above.
34. Let’s say you were interested in changes in the date when
spring arrives each year. Since you live in the country, you are
aware of the first date the small spring peeper frogs start singing.
You have been keeping records of the date of the first spring peeper calling
for the last 12 years. Which of the following graph types would be
most appropriate for displaying how the date changes over the last 12 years?
A) Pie graph
B) Line graph
C) Horizontal Bar chart
D) Radar chart
E) Stacked 3-D Bar chart
35. Which of the following HTML tags would you use to create an
e-mail link inside your web page?
A) <MAIL TO:yourid@zoo.uvm.edu>Click here to send me
mail </A.>
B) <MAILTO:http://www.uvm.edu/~yourid/ >Click here to send me mail
</MAIL>
C) <MAIL>yourid@zoo.uvm.edu</MAIL>Click here to send me mail</A>
D) <A HREF=mailto:yourid@zoo.uvm.edu>Click here to send me mail
</A>
E) <TCP/IP:SEND” yourid@zoo.uvm.edu> Click here to send me mail
</SEND>
36. Imagine a friend of yours was working on her web page and
could not get the background to come up. You took a look at her code
and saw the following:
<HTML> <HEAD> <TITLE> Web Page One </TITLE> </HEAD>
<BODY BACKROUND=back.gif>
Which of the following best explains why the background file is not
displayed when viewed from a browser?
A) The back.gif file is not in the public_html directory.
B) Your friend forgot to chmod 644 *.*
C) Part of the HTML tag is not spelled correctly
D) The back.gif file is corrupted in some way
E) All of the above are equally likely
37. Which of the following best describes how the mouse tells
the computer how far it has been moved on the mouse pad according to material
presented in lecture?
A) The mouse pad has electrical sensors that detect changes in resistance
B) Inside the mouse the rollers spin a wheel with holes. Light
shines through the holes and a light sensor detects flashes of light for
any movement.
C) A radio frequency is emitted by the mouse. Inside the computer
is a detector that extrapolates how far away the mouse is and its changes
of position
D) The mouse track ball is magnetized and magnetic sensors inside the
mouse detect changes in the ball's position.
E) The wire leaving the mouse sends electrical signals when bent or
moved.
38. Which of the following areas is closest to that of one hectare?
A) surface area of a pin head
B) area of a Soccer Field
C) area of the State of Vermont
D) the area inside the earth’s orbit around the sun
E) the area of a plane inside the visible universe.
39. Which of the following refers to how close together pixels
are in a CRT monitor?
A) refresh space
B) dot pitch
C) TFT resonation distance
D) pixel block diameter
E) active matrix space
40. Which of the following HTML tags would you use to change the
color of following text to red?
A) <COLOR TYPE=RED>
B) <RED>
C) <FONT COLOR=RED>
D) <PALETTE/RED>
E) <BODY=RED>
41. Which of the following HTML tags did we use in lab to display
the resume text as it is found in text-file format?
A) <PRE>
B) <TEXT>
C) <ASCII>
D) <DISPLAY FORM TYPE ASCII>
E) <TXT>
42. Which of the following is NOT an operating system?
A) DOS
B) UNIX
C) Windows95
D) System 8
E) QBASIC
43. Which of the following (that were demonstrated in lecture)
are used in LCD Flat Pannel Displays and only allow light to pass in a
single geometric plane?
A) Polarizers
B) TFTs
C) Nematic Liquid Crystals
D) Dilithium Crystals
E) Metal Hydroxioxides
44. Considering the typical file names and three letter file extensions,
which of the following files is most likely NOT an example of an ASCII
text file?
A) README.TXT
B) MYDATA.DAT
C) QBASIC.EXE
D) EMAIL.FIL
E) MYPAGE.HTM
45. Imagine you are investigating the relationship between global
temperature and tropical storm intensity. You access the United States
Meteorological Weather Center Data Base and get the records of number of
class 5 hurricanes per year and the average global temperature per year.
The records go back to 1950. You are looking for a pattern to see
if years with higher global temperature had more hurricanes. Which
of the following graph types would you use to best display the relationship
between temperature and number of hurricanes per year?
A) Pie Chart
B) Bar Graph
C) Line Graph
D) X-Y Scatterplot
E) Radar Graph
46. Which of the following best describe the types of signals
found traveling inside the computer?
A) serial and parallel
B) digital and serial
C) analog and parallel
D) digital and parallel
E) analog and digital
47. Here's some html code:
<html> <head> <title> Quiz Question
</title>
</head> <body background="back.jpg">
<h1> HTML Source Code Example </h1> <br>
Here's a question for you<br>
</body>
</html>
Imagine you are using Netscape in lab to view the web page above.
Which of the following appears in the blue or red bar at the very top of
the Netscape window on a computer in lab?
A) title
B) Quiz Question
C) back.jpg
D) HTML Source Code Example
E) Here's a question for you
48. Following along from the previous question. You upload
the above html file from your diskette to the directory on zoo that has
your web files. You then go to Netscape to view it and discover the background
does not work. Which of the following is NOT a possible explanation
of the problem.
A) forgot to upload back.jpg
B) the background file must be inside an /Image/
subdirectory in order to work.
C) forgot to change file permissions for back.jpg
D) the tag that controls the background is
spelled wrong.
E) you uploaded back.jpg to your root directory
on zoo.
49. Which of the following is closest to the clock speed
of typical processors found in the top of the line desktop personal computers
for sale today?
A) 1.1 Mega Hertz
B) 550 Mega Hertz
C) 1.1 Giga Hertz
D) 550 Giga Hertz
E) 1.1 Tera Hertz
50. Imagine you move to a new living space for next semester.
Your address and phone number have changed. You wish to update your
e-mail signature file for pine on zoo. Which of the following methods
did we use in lab to edit your signature file on zoo?
A) Open your signature file with Notepad, make the change, and upload
it to your public_html account on zoo.
B) Use pico to edit your .signature file. Make the change, then
save with Ctrl-X.
C) Download your signature file from your root directory on zoo to
your public_html directory on the PC’s hard disk. Use Word to edit
and save the file.
D) Log on to zoo, change directories into public_html, use pico to
edit SIGNATURE.E-MAIL, save with Ctrl-X.
E) Log on to zoo, use ftp to upload a new .signature file from your
diskette to your public_html folder. Use chmod 644 *.* to make it
public.
Answer key:
1) C
2) D
3) A
4) A
5) B
6) C
7) E
8) A
9) D
10) E
11) E
12) C
13) C
14) D
15) A
16) C
17) C
18) A
19) A
20) C
21) B
22) B
23) A
24) C
25) C
26) B
27) A
28) E
29) D
30) D
31) C
32) B
33) E
34) B
35) D
36) C
37) B
38) B
39) B
40) C
41) A
42) E
43) A
44) C
45) D
46) D
47) B
48) B
49) C
50) B