AGRI 85 FIRST EXAM
19 September 2002

1.    According to the 30,000-year time line shown in class, which of the following is the approximate distance length on the time line that represents the time since personal computers have been available to American citizens?
A)    10 meters
B)    5 meters
C)    1 meter
D)    2 centimeters
E)    2 millimeters



2.    Which of the following commands would you type at the Zoo prompt to copy a file named AGRI85.txt from Jonathan Leonard’s home directory to your home directory?
A)    mv jleonard/AGRI85.txt AGRI85.txt
B)    cp ~/jleonard/cdae85/labook/AGRI85.txt
C)    mv ~/jleonard/cdae85/labook/AGRI85.txt
D)    cp ~jleonard/AGRI85.txt AGRI85.txt
E)    copy AGRI85.txt ~jleonard/




3.    According to the video about IBM, Microsoft, and Bill Gates that we have been watching in class, which of the following best describes how Microsoft made its money, and how Bill became the richest person in the world for now?
A)    Microsoft made the microprocessors for all of the IBM PCs that were sold.
B)    Microsoft’s operating system DOS was sold with every IBM PC.  Microsoft got royalties from IBM for every PC sold.
C)    Both A and B above are true.
D)    Microsoft owned the rights to all the software sold with every IBM PC.
E)    Microsoft sold DOS to all clone makers like Compaq and Dell.



4. Which of the following methods would you use to change your signature file for all e-mail messages sent out from pine on zoo?
A)    From the zoo prompt enter pico .signature.  Make the changes you want, then Ctrl-X to save and exit.
B)    Download the mail/signature.txt file from zoo.  Edit it with notepad.  Then upload back to your mail folder on zoo.
C)    Login to zoo, cd into the mail folder, use edit to open the SIGNATURE.TXT file.  Make the changes, then Ctrl-E to save and exit.
D)    Login to zoo, get into pine, choose S for signature file, M for modify.  Make the changes, then E for exit and save.
E)    None of the above.




5.    Pico is to AIX (Zoo’s Unix) as which of the following is to WindowsXP?
A)    SSH FTP
B)    Notepad
C)    SSH telnet
D)    Norton Anti-virus software
E)    Excel



6.    According to the AGRI 85 syllabus, which of the following is NOT a specific objective of this course?
A)    Demonstrate simple computer repair such as replacing memory or hard drives.
B)    Be able to download and install software from the web.
C)    Understand, detect, and eliminate Computer Viruses.
D)    Create World Wide Web Pages.
E)    Improve writing skills.

Zoo cluster

7.    Refer to the picture above.  When you got the lab2.txt file from Jonathan Leonard’s directory in last week’s lab assignment, which of the following letter pairs represent FROM where and TO where the lab2.txt file was sent and stored?
A) A to C
B) B to C
C) C to D
D) D to B
E) D to A

8.    Referring again to the picture.  When you save your work to your PCBackup directory, which of the following letter pairs represent FROM where and TO where your work was going?
A)    A to C
B)    B to C
C)    C to D
D)    D to B
E)    D to A

9.    Which of the following jobs is paired with the type of computer system that is most appropriate for that job?
A)    Locating your position on a map when you are in woods : Digital Camera.
B)     Modeling potential climate changes with increasing carbon dioxide emissions in the Earth’s atmosphere : Supercomputer.
C)      Creating digital animations such as in movies by Dreamworks and Pixar : Microcomputer.
D)    Maintaining Automatic Teller Machine (ATM) network of terminals for BankNorth : Unix Workstation.
E)     Serving web pages on request at a rate of 100 hits per second : Network computer.



10.    Which of the following prefixes refers to a quintillion bytes of information, or 1,000,000,000,000,000,000 bytes, or ten to the 18th power?
A)    Exa
B)    Yotta
C)    Peta
D)    Zetta
E)    Zappa

CPU
11.    Refer to the picture above.  Which of the following letters points to the CPU?
A)    A
B)    B
C)    C
D)    D
E)    E

12.    Refer to the picture above.  Which of the following letters points to where a SIMM or DIMM would be installed?
A)    A
B)    B
C)    C
D)    D
E)    E

13.    Refer to the picture above.  Which of the following letters points to the parallel port?
A)    A
B)    B
C)    C
D)    D
E)    E


14.    According to the reading in the textbook, ROM, Flash ROM, PROM, and CMOS, all have which of the following in common?
A)    They are forms of memory that can not be altered, changed, or re-programmed.
B)    They all are forms of permanent storage that is external to the motherboard or system board.
C)    They all are a form of volatile memory because when the machine is turned off, the information in them is erased.
D)    They are all dedicated to driving the video output signals that are sent to the computer system’s monitor
E)    They all are a form of non-volatile memory because when the machine is turned off, the information in them is saved.



15.    According to the Scientific American article, The First Data Networks that was displayed in class, which of the following pairs of countries had developed an optical telegraph in the late 1790s?
A)    Germany and France
B)    Spain and Russia
C)    England and the USA
D)    France and Sweden
E)    China and Korea



16.    According to the Second Timeline shown in class, approximately which of the following decades did the exponential growth of the Internet occur, starting with the development of the Web?
A)    1992-2002
B)    1982-1992
C)    1972-1982
D)    1962-1972
E)    1952-1962



17.    Imagine you are going on a trip to Russia.  You are taking along a diskette with some important data that you want to share with your Russian colleagues.  However, you are nervous about getting your diskette infected with computer viruses because you have heard reports of new variants of known computer viruses being released from Russia.  Which of the following can you do to prevent your diskette from being infected?
A) Slide the write-protect tab Open
B) Dip the diskette in antiseptic fluid
C) Slide the write-protect tab Shut
D) Turn off any PC before removing your diskette from the diskette drive.
E) There is nothing you can do to prevent your diskette from becoming infected if you put the diskette into an infected machine.




18.  According to the textbook, which of the following is NOT an operating system?
    A) Telnet
    B) CP/M
    C) WindowsXP
    D) MS-DOS
    E) Unix (AIX)




19.  Which of the following is a trend in motherboard and chip design over the past 20 years?
    A) boards are getting smaller
    B) boards have fewer chips on them
    C) microprocessor chip is getting larger
    D) chips are being built into the microprocessor
    E) all of the above




20.    Which of the following is an advantage of using pine on zoo for reading your e-mail rather than UVM webmail, or an e-mail client on your own PC like outlook or Eudora?
A)    Once you learn the keys, pine is faster than other e-mail clients that use a mouse.
B)    It is easier to attach files, and open attached files in pine than in other e-mail clients.
C)    You will not get an e-mail virus by just reading your e-mail text on pine.  However, with some clients like outlook, where you can easily open attachments, you are more likely to get an unwanted e-mail virus.
D)    Both A and C above are true.
E)    None of the above are true.