1. According to the news stories on the web we looked at last week in
class, which of the following was the way crackers reportedly broke into
Microsoft’s network?
A) They dialed in to an unauthorized modem set up inside the company.
B) They stole a hard drive from one of the company machines and read
the password file saved on the drive.
C) They used a port scanner to gain access to the network through an
unused port and then spoofed the IP source address on their incoming packets.
D) They e-mailed a QAZ Trojan Horse virus to someone in the company.
E) They used a war-dialer and brute-force password guesser to try every
word in the English dictionary until a password was found.
2. Which of the following Media has the broadest bandwidth (can send
the most data in a unit time)?
A) 10BaseT Ethernet cable
B) Fiber optic cable
C) Infrared channel on a laptop PC
D) Thick Ethernet cable
E) One microwave channel
3. Which of the following is the binary equivalent of the number 21?
A) 11011
B) 10110
C) 01110
D) 11001
E) 10101
4. Imagine you are sending a text file from one computer to another.
It is an old text file that uses 7-bits per character instead of the modern
ASCII 8-bits per character. There are 1200 characters in the file.
The computers are separated by only a few yards and you are sending the
text with a protocol that uses the Parity Check algorithm for error checking.
The computers are sending data to each other at a speed of 2400 bits per
second. Assuming the handshake acknowledgement time is negligible
(0 seconds), how long would it take to transfer the file?
A) 1 second
B) 5 seconds
C) 10 seconds
D) 15 seconds
E) 20 seconds
5. According to the history of the Internet video that we have been
watching, which of the following is the name of the very first router on
the Internet?
A) Message Sending Switch (MSS)
B) Packet Switch Node (PSN)
C) Interface Message Processor (IMP)
D) Packet Action Device (PAD)
E) Transfer Packet Processor (TPP)
6. Which of the following was the very first message on the Internet,
according to the video?
A) What hath God wrought?
B) log
C) Hello?
D) Come to the lab please
E) Hi
7. Which of the following is the layer of the TCP/IP stack that
controls error checking (Check Sum)?
A) Application layer
B) Transport layer
C) Network layer
D) Datalink layer
E) Physical layer
8. Here’s a spreadsheet from Excel:
A | B | C | D | E | F | G | H | |
1 | Job | Job | Total | Expenses | Total | |||
2 | Income 1 | Income 2 | Income | Rent | Food | Utilties | Expenses | Balance |
3 | $150.00 | $320.00 | $100 | $75.00 | $25.00 |
Imagine your active cell is in G3. Which of the following would
be the correct formula to insert for Total Income?
A) =SUM(D1:F1)
B) =ADD(D3:F3)
C) =SUM(D3:F3)
D) =ADD(D1:F3)
E) None of the above
9. Which of the following is the decimal equivalent of this binary number:
100010
A) 6
B) 18
C) 34
D) 42
E) 60
10. Here is an example of one way to use an image tag in HTML: <IMG
SRC=http://www.uvm.edu/icon/misc/
Paint.gif>. Which of the following best describes the disadvantage
of using this tag instead of <IMG SRC=Paint.gif>?
A) It takes up more disk space on in your public_html.
B) Many browsers (such as IE) will not be able to read the tag.
C) If the owner of /icon/misc changes or removes the Paint.gif, it
will not work on your page.
D) The chmod 644 *.* command will not work on the html file with that
tag.
E) HTML files with that tag can only be viewed from Microsoft Internet
Explorer, not Netscape.
11. Imagine you are logged into zoo. You are not sure what directory
level you are currently at. One way to tell is to list files with
ls to see what files are in the default directory. Which of the following
AIX commands is another way to show you the path address of what level
you are currently in, in the directory structure?
A) pine
B) who
C) cls
D) pwd
E) showlevel
12. Imagine you are setting up a web page on zoo like we did in the
second web page lab. To start you log in to zoo with telnet, enter
the terminal type, and you get to the zoo prompt. Which of the following
AIX commands will move you to the directory where all your web files are
stored?
A) cd public_html
B) cp web\
C) pico public_html/
D) web ..
E) mv web_html
13. Following along from the previous question, imagine you are now
in the directory with all your web files. Which of the following
commands do you use to open a file called NEWFILE.html using the editor
on zoo?
A) NEWFILE.html
B) Open Notepad, FileàOpen: NEWFILE.html
C) Pine NEWFILE.html
D) edit NEWFILE.html
E) pico NEWFILE.html
14. Following along from the previous question, you begin typing in
the HTML tags. According to what we have learned in lab, which of
the following is the very LAST tag you enter?
A) </TITLE>
B) </HEAD>
C) </BODY>
D) </HTML>
E) </PRE>
15. Following along from the previous question, which of the following
tags will create a list where the list items are numbered?
A) <UL>
B) <OL>
C) <NL>
D) <DL>
E) <XL>
16. Which of the following tags is the correct link for UVM’s home page?
A) <HREF=http://www.uvm.edu>UVM</HREF>
B) <LINK=http://www.uvm.edu>Click for UVM</LINK>
C) <A LINK=http://www.uvm.edu/>UVM</A>
D) <A HREF=http://www.uvm.edu>UVM</A>
E) <http:www.uvm.edu>Click for UVM</http>
17. According to the reading in the article: “How Hackers Break In And
How They Are Caught article”, which of the following best describes the
type of organization or company the villan, Abednego, broke into?
A) A software company
B) A book publishing company
C) An electronics company (similar to Radio Shack)
D) A refrigerator company
E) A University
18. Which of the following software is licensed under the relatively
new “GPL” or “copy lefted” open source license agreement that requires
all useful alterations of the source code be made public?
A) Lotus Smart Suite
B) Windows2000
C) Unix(AIX)
D) Linux
E) MS-Excel
19. According to the reading in the text book, a figure that contains
interconnected ovals, diamonds, and boxes that help programmers plan the
development of their programs, is best described by which of the following?
A) Source Code
B) Natural Language
C) Program Flowchart
D) Pseudocode
E) Object-Oriented Program
20. Imagine you are hired by NASA to help design a high-quality imaging
probe to Mars. This probe is designed to locate potential landing
sites for a manned mission in a few decades. The NASA team at JPL
wants you to design an imaging system that can detect 2048 levels of brightness
for each pixel of a 1-million pixel array for each image (1000 X 1000 pixels
per image). Which of the following is the minimum number of bits
you can use to code for each pixel, so that each pixel can have one of
2048 levels of brightness?
A) 11
B) 16
C) 256
D) 512
E) 4096