COSC 100

¡Supera tus tareas y exámenes ahora con Quizwiz!

T/F If you like a song really well you may use the whole song for background to a slide show you create if you don't distribute the slide show publically.

F

T/F In the Arithmetic Logic Unit (ALU), the accumulator holds data to be processed and the registers hold results of arithmetic or logical operation.

F

T/F It is allowed to send group emails soliciting votes for your favorite candidate on UT networks.

F

T/F It is impossible for computers to work with more memory than is physically installed.

F

T/F On the internet, packets are sent directly from their starting point to destination point.

F

T/F One can use up to 10 percent or 15 images, whichever is more, from a collection.

F

T/F RAM helps to boot your computer.

F

T/F ROM, cache and registers are all volatile.

F

T/F Renaming a file extension makes the data inaccessible to computer forensic specialists.åÊ

F

T/F Sasha, the girl who kept Ivanna's phone, got arrested and imprisoned.

F

T/F Scientists in the video on A.I. believe that artificial intelligence can never surpass human brain.

F

T/F Second Life is a virtual game environment only.

F

T/F The Fetch/Execute cycle had 20 steps.åÊ

F

T/F The Internet and the World Wide Web are the same thing.

F

T/F The United States is the only country among 34 industrialized democracies that has failed to implement baseline privacy protections to consumer data.

F

T/F The University of Tennessee allows students to download all music and videos for their own personal use.

F

T/F The first step in forensically copying a hard drive is to boot the computer to see how big the hard drive is and how much data is on it.

F

T/F The internet becomes less effective with each additional computer added.

F

T/F The internet is a collection of private LANs.

F

T/F The non memory resident part of the operating system is called the kernel

F

T/F The tags for numbered and bulleted lists are and respectively.

F

T/F The time it takes to position the heads on a hard drive to the correct data is called the RPM.

F

T/F Unless information on the web explicitly says it is copyrighted it is free to use.

F

T/F When an email is sent across the Internet it is broken into small pieces.åÊ These pieces MUST be sent in the correct order or an error will occur.

F

T/F When buying a computer, it is always better to get a CPU that is a lot faster than your hard disk.

F

T/F White is no color and corresponds to #000000, Black has full intensity for each RGB color and is #FFFFFF.

F

T/F You can see your unique identifier when you visit a site.

F

T/F You may use up to 5 minutes of a copyrighted video on your own web site.

F

T/F It is unethical to hack passwords unless it is done against illegal use of computers.

T

T/F Kevin Warwick embedded a computer chip and became a cyborg

T

T/F L1 Cache is high speed memory that may be found on the CPU

T

T/F Nao the robot has tatical sensors to "feel" touch.

T

T/F One goal of artificial intelligence is not to program computers but to create a neural network that that computer can fill and learn on its own.

T

T/F Outbound hypertext links can increase the credibility of a web page.

T

T/F Swap files are stored in the hard disk.

T

T/F The Client/Server relationship is very brief and ends when a single request and response are accomplished.

T

T/F The Internet grew out of the arpernet.

T

T/F The Internet is a collection of Wide Area Networks.

T

T/F The University of Tennessee reserves the right to lock down computers and accounts in case of criminal investigations.

T

T/F The communication etiquette that we follow in the real world applies to communication over computers as well. For example, we should be courteous and considerate with a novice computer user.

T

T/F The fines for downloading and sharing music can go as high as $22,500åÊ for each song.

T

T/F The operating system communicates with the I/O devices via the device driver.

T

T/F The video card you put in the computer can impact the size of the power supply that you purchase for the computer.

T

T/F USB port is the most common port.

T

T/F USB, firewire, SATA, eSATA and SCSI are all different connection types for hard disk.

T

T/F Using a DVI port to a digital monitor prevents the conversion of the video signal to analog.

T

T/F When converting sound to digital representation, measurements are taken at regular intervals called samples.

T

T/F Whenever a domain name is used, your computer asks the DNS server to look up the corresponding IP address.

T

T/F While dealing with privacy issues CDT also promotes the free expression and democratic use of the web.

T

T/F Your laptops, desktops and smartphones connect to the router by radio frequency signals.

T

T/F a typical computer screen has under 100 pixels per inch

T

"A copyright lasts for a lifetime plus ______ years. a. 60 b. 70 c. 80 d. 90"

B

"A form of communication where the sender and receiver may be online at different timesåÊ (e.g. email) a. Synchronous b. Asynchronous c. Server d. dns"

B

"At least how many bits do we have to use in order to represent all of the symbols on an American Keyboard? a. 6 b. 7 c. 8 d. 16"

B

"Data about data are called a. Databases b. Metadata c. Data images d. Data paths"

B

"HTML is made up of ____________ a. RAM b. Tags c. RGB d. hexadecimal codes"

B

"How does most of your information become public on the Internet? a. bad programs such as viruses collect information about you without your knowledge b. The information is freely given by filling in forms etc on the web c. most information is gathered by secret programs that companies put on your computer d.none of the other answers"

B

"How many bytes are in an IP address? a. 3 b. 4 c. 5 d. 6"

B

"How many photographs may be used from one photographer under Fair Use Laws? a. 4 b. 5 c. 6 d. 7"

B

"In a search engine, what visits sites on the Internet to build an index of the web's content based on key words? a. search engine b. crawler c. query processor d. DNS"

B

"In the HTML what is the attribute? a. body b. bgcolor c. = d. ""red"""

B

"In the URL http://www.utk.edu/myfiles/index.html, what is the path? a. http:// b. www.utk.edu c. my files d. index.html"

B

"In the html åÊ what is the value? a. body b. blue c. bgcolor d. equal"

B

"Running more than one task simultaneously in a single program is called ____. a. Mutlitasking b. Multithreading c. Multiprocessing d. Multiprogramming"

B

"The Internet is primarily _____________åÊ communication a. Synchronous b. Asynchronous c. RAM d. ABC"

B

T/F Computers can only perform about 100 different instructions, such as ADD, MULT and DIV, etc.

T

"To search for an exact set of words, use a. colon : b. quotes "" "" c. asterisk * d. two periods without space .."

B

T/F Cookies and GUID are techniques for gathering information on computers.åÊ

T

T/F Digital information is represented as strings of bits.

T

"What does 2133 indicate in""16GB[4GBx4]DDR3-2133"" for a memory? a. size of memory b. bus speed (or data transfer speed) c. clock speed d. number of memory modules"

B

T/F Disabling cookies on your computer may help protect your privacy.

T

"What translates the hierarchal, human-readable names into IP addresses? a. Web servers b. DNS c. TCP/IP d. Internet Protocol addresses"

B

"When a computer connects to the Internet it is assigned an ____________. a. Modem b. IP Address c. unique 3 character name d. a file extension"

B

T/F E-Discovery is used in civil cases as well as criminal ones.

T

T/F Eight bits make 1 byte.

T

T/F Buying a fast CPU and an older hard drive is a good way to save money.

F

"When is the program counter incremented in the fetch execute cycle? a. after numbers are added together b. Right after the address of the next instruction is gotten from it c. when data is stored in RAM d. at the end of the entire program"

B

T/F Files contain software programs or data

T

"Which means run more than one program at a time? a. Singletasking b. Multitasking c. Multithreading d. Multiprocessing"

B

"Which of the following includes both digital video connectors? a. VGA and HDMI b. HDMI and DVI c. DVI and composite d. composite and s-video"

B

"Which of the following is NOT one of the possibilities that Prof. Kevin Warwick has shown us in the video? a. RFID (radio frequency identification) b. Eugenics c. Telepathic communication d. Sensing ultra-sonics"

B

"Which of the following is false? a. Magnetic storage uses magnetizable particles. b. A read/write head touches the drive to get or change data. c. When we write to the hard disk, we magnetize particles on it and change their orientation. d. A fingerprint can keep a hard disk from working."

B

"Which of the following is not a method to hide data? a. Move a file into system folders b. Create a hash for the file c. Delete a file d. Change the file extension"

B

T/F Computers can directly translate high-level programming languages into binary machine language.

F

T/F DOS is a GUI operating system.

F

"How many bits are used to represent sound in audio CDs? a. 3 b. 8 c. 16 d. 24"

C

"How many times does artificial intelligence evolve faster than human brain? a. 10 thousands b. 1 million c. 10 millions d. 10 billions"

C

"In order to temporarily solve the problem of IP addresses running out, which of the following has been implemented? a. IPv4 b. IPv5 c. IPv6 d. IPv7"

C

"In the URL http://www.utk.edu/myfiles/index.html, what is the file name? a. http:// b. www.utk.edu c. my files d. index.html"

C

T/F Device drivers are a type of hardware that the OS uses to communicate with the I/O devices.

F

"A ____________ is a related group of networked computers (e.g. edu) a. domain b. abc c. IP d. TCP"

A

"Computers programmed to send files to browsers of other computers. a. web server b. dns c. URL d. RAM"

A

"How many peripheral devices can be daisy-chained to one single USB port? a. 127 b. 128 c. 255 d. 256"

A

T/F Flaming is sending rude or offensive materials either via email or other form of messaging.

T

"If a color was represented by #112233 which of the following colors would have more red in it.åÊ a. #222233 b. #113344 c. #002233 d. #115533"

A

"In a search engine, what looks up the keywords in the index and reports the pages back? a. query processor b. crawler c. search engine d. DNS"

A

"In communication both the sender and receiver are active at the same time. a. Synchronous b. server c. dns d. Asynchronous"

A

"In the URL http://www.utk.edu/myfiles/index.html, what is the protocol? a. http:// b. www.utk.edu c. my files d. index.html"

A

"More than one program running is called ____. a. Multitasking b. Multithreading c. Multiprocessing d. Multiprogramming"

A

"Most HTML commands appear in pairs.åÊ Of the following which command does not have a closing command? a. b. c. d."

A

"Starting the computer and OS is called a. booting b. RAM c. USB d. Kernel"

A

"The _______ translates human readable names into IP addresses a. DNS b. ABC c. TCP d. IP"

A

"The _______ translates human readable names into IP addresses a. DNS b. ABC c. TCP d. IP"

A

"The logical operator represented in the following truth table isåÊ 0åÊ åÊ 0 åÊ 0 0 åÊ 1åÊ åÊ 1 1 åÊ åÊ 0 åÊ 1 1 åÊ åÊ 1 åÊ 1åÊ a. OR b. AND c. NOT d. XOR"

A

"To get pages that have just one of several words, include _____ between the words. a. OR b. AND c. nothing d. ""or"""

A

T/F For large websites, it is fairly common that a web page is written in more than one language.

T

"Using TCP, information is sent in multiple __________ across internet connections. a. IP packets b. letters c. USB ports d. modems"

A

T/F Hyperlinks are used to connect web pages on the world wide web.

T

"When searching the web for words DOG and CAT, åÊ the AND requires a. BOTH words be on the page b. either word should be on the page c. the words are not on the page d. none of the above"

A

"Which means run one program at a time? a. Singletasing b. Multitasking c. Multithreading d. Multiprocessing"

A

"Which of the following are functions a computer can do?åÊ a. Input, Loop b. Input, recycle c. output, recycle d. recycle. stop"

A

"Which of the following is not part of a CPU? a. ROM b. Control unit c. ALU d. on chip cache"

A

"Which of the following procedures is not correct when creating a forensic image? a. Take the computer to be copied and turn it on b. Put on a write-blocker to avoid writing to the hard disk c. Use a certain device to write to the target hard drive d. Use Md5 hash to make sure that we get every bit of the data off the source hard drive"

A

T/F Hyperlinks can be used to connect text, images and videos.

T

"Which type of user interface does UNIX use? a. Command-Line b. Menu-driven c. GUI d. BIOS"

A

T/F IP packets are independent.

T

T/F In most cases, the more RAM and cache in a computer the faster the computer can process data.

T

".fr, .uk, .ca are examples of a. IP addresses b. country indicators c. TCP numbers d. ABC"

B

"Which of the following is not correct? a. Plaintext information can be encrypted in a digital image or sound file. b. ""Securing the image"" in computer forensics means copying the images stored in the original hard drive to a target hard drive. c. Steganography can be used as a means of covert communication for terrorists. d. Bit-stream Evidentiary Images are forensically-sound copies of data stored on hard disks."

B

"Which of the following types of caching is used especially when users from another continent try to make a request to the web server? a. File b. Edge c. Browser d. Memory"

B

"Which program might be best used to EDIT the file myfile.jpg? a. Notepad (text editor) b. Photoshop (image editing) c. Microsoft Access (database processing) d. Excel (spreadsheet software)"

B

T/F It is a rule of thumb to assume that you are monitored at work.

T

".edu, .com, .org, are examples of _____________ a. IP Addresses b. TCP Addresses c. Top level domains d. ABC"

C

"EPIC is an organization that a. handles the spread of online virus epidemics b. none of the other answers c. promotes online (electronic) privacy and civil liberties d. covers the magnitude of epic earthquakes and storms on the web"

C

"In the URL: http://www.utk.edu/home/index.html, which of the following description is wrong? a. http:// åÊ åÊ åÊ åÊ åÊ åÊ åÊ åÊ åÊ protocol b. www.utk.edu åÊ åÊ server computer's name c. home åÊ åÊ åÊ åÊ åÊ åÊ åÊ åÊ åÊ domain d. index.html åÊ åÊ åÊ åÊ åÊ file name"

C

"Of the following, which does not make a text scannable? a. highlighted keywords b. sub-headings c. marketese d. Inverted Pyramid"

C

"This type of malware pretends to be a helpful program but actually steals information or harms the computers. a. Worm b. Virus c. Trojan Horse d. Spyware"

C

"Web servers all connected together make up the ______________. a. URL b. DNS c. WWW d. ABC"

C

"Web servers and their files comprise the a. DNS b. TCP/IP c. World Wide Web d. Internet"

C

"What can be used to create a LAN? a. RAM b. CPU c. Ethernet d. monitor"

C

"What unit contains a clock that acts like an electronic drummer? a. RAM b. Hard disk c. Control d. Register"

C

"Which means d o more than one thing in a single program at a time? a. Singletasking b. Multitasking c. Multithreading d. Multiprocessing"

C

"Which of the following are volatile? a. ROM b. Flash Drive c. RAM d. Hard Drive"

C

"Which of the following capabilities was NOT shown in the video about NAO Robot? a. Telling lies b. Standing up after being knocked over c. File transfer d. Bending over to pick up an object"

C

"Which of the following is NOT on the motherboard of the computer? a.RAM b. Expansion Slots c. Flash drive d. ROM"

C

"Which of the following is not a way to protect your privacy? a. Read the privacy policy statements b. Think before you give out personal information c. Use your UTK email address for public spaces d. Not use your real name as a username in public sites"

C

"Which of the following is not an optical drive? a. DVD-RW burner b. CD-RW drive c. USB Flash Media card reader/writer d. Blue-Ray re-writer"

C

"Which of the following is not one of the most widely used Operating Systems? a. Windows b. Mac OS X c. DOS d. Linux/Unix"

C

"Which of the following would search for the word ""news"" ONLY on the cnn.com website? a. cnn.comåÊ news b. cnn.com AND news c. site:cnn.comåÊ news d. site:cnn.com"

C

"Which type of bus moves things between the CPU and main memory? a. Internal bus b. Serial bus c. System bus d. Extension bus"

C

"You connect to an ISP from your house using a ___________. a. Gigabyte b. Ethernet c. modem d. mouse"

C

"Which of the following control the computer hardware? a. Microsoft Excel b. MacBook Pro c. Text Editor d. Operating System"

D

"Which of the following is different from the other options? a. MD5 b. Hash c. Digital DNA d. Metadata"

D

"Both connection by ISP and connection on campus use ___________to connect to the internet. a. LAN b. DSL c. modem d. server"

D

"Given a color is represented by #C8C8C8, how many bits are used to represent a pixel? a. 6 b. 8 c. 16 d. 24"

D

"If hexadecimal is used to represent colors on the screen the color represented by #C9C9C9 is a. Green b. Red c. Blue d. Gray"

D

"In the URL http://www.utk.edu/myfiles/index.html, what is the domain? a. http:// b. www.utk.edu c. my files d. index.html"

D

"In the computer, mathematical functions are done in the ___________________? a. Control Unit b. RAM c. Hard Drive d. Arithmetic/Logic Unit (ALU)"

D

"This type of malware collects information about the computer secretly a. worm b. virus c. trojan horse d. spyware"

D

"What can we learn from EPIC's request to FTC regarding Google Drive? a. It is good habit to read Terms of Service. b. Google may disclose documents you created and saved on Google Docs to users who lack the permission to view the file. c. Google may permit unauthorized individuals to access the files you created and saved on Google Docs. d. All of the above."

D

"What of the following is not a type of ESI? a. Chat room logs b. Deleted voice mail c. Blogs d. None of the above"

D

"When a person masquerades as another person to falsify data is? a. USB B. Data Diddling C. Copyright D. Spoofing"

D

"Which means has more than one CPU and runs more than one instruction at a time? a. Singletasking b. Multitasking c. Multithreading d. Multiprocessing"

D

"Which of the following about cookies is not correct? a. Cookies are saved on your computer to keep track of your browsing habit. b. Cookies help with the speed when you open a page that you visit frequently. c. It is recommended to disable cookies for your privacy. d. None of the above."

D

"Which of the following can be most likely the difference between a gamer and a non-gamer's hard drives? a. size of cache b. data transfer speed c. spinning rate d.RAID0"

D

"Which of the following can make your computer more susceptible to Trojans? a. Download from an unknown source b. Play online games c. Use internet-driven applications d. All of the above"

D

"Which of the following is not a computer professional's obligation? a. Notify authorities of certain illegal activities on the internet b. Protect data from prying eyes c. Protect data with backup procedures d. None of the above"

D

"Which of the following is not a factor to consider for a video card? a. speed b. memory c. power supply d. none of the above"

D

"Which of the following is not optical? a. CD-ROM b. DVD c. CD-RW d. hard disk"

D

"Which of the following is not part of the codes of conduct for computer professionals? a. Safety first b. Professional competence c. Professional responsibility d. Professional attire"

D

"Which of the following is not true? a. Disk cache is a type of RAM. The more disk cache a hard drive has, the faster it goes and the more expensive it gets. b. RAID 0 writes data in a striped mode on different platters, so it increases the speed. RAID duplicates data in different places, so it's relatively fail-proof. c, Defragmenting the hard drive means putting scattered data together in the same location. It speeds up the system by saving the time of head positioning. d. All types of optical storage are read only, because it uses optical heads to detect pits that reflect light."

D

"Which of the following statements about spyware is not correct? a. Spyware can be used by the owner of a public computer to monitor users. b. Spyware can change computer settings, browser settings or software settings c. Spyware can result in slow internet connections. d. None of the above."

D

"Which of the following types of server is not mentioned by Mr. Shewmake in the video? a. Application server b. Database server c. Video server d. Content server"

D

"Which would not be used to create a LAN? a. cable b. optical fiber c. Ethernet d. monitor"

D

T/F It is thought that the 9/11 attacks used steganography to transmit data/messages.åÊ

T

T/F A 1GHz computer clock means execution of 1 billions instructions per second.

F

T/F A browser is a data file.

F

T/F A copyright lasts for 70 years.

F

T/F A frame rate and a sample rate are exactly the same.

F

T/F A good web page should use subjective, rather than neutral language.

F

T/F A good web page would have a lot of text that scrolls horizontally across a page.

F

T/F A good web page would have both horizontal and vertical scrolls.

F

T/F A multitasking OS can run 2 programs simultaneously.

F

T/F A person may use up to 15 photos from one photographer under Fair Use Laws.

F

T/F A software is called a Malware if it has legitimate purpose but contains harmful bugs that were not corrected before release.

F

T/F A swap file is located in main memory

F

T/F A typical computer screen has over 600 pixels per inch.

F

T/F A word processor can be used to create a web page.

F

T/F According to EPIC, when you use Google drive, the files you upload are private and Google will keep them that way at all times.åÊ

F

T/F According to the video, we can transmit our gestures and facial expressions in Virtual Reality.

F

T/F An instruction takes up 4 words of space.

F

T/F An operating system is a data file.

F

T/F Antivirus software removes all viruses, worms, trojans, spyware, an adware

F

T/F Because of privacy laws, companies cannot monitor employees computer usage at work.åÊ

F

T/F Computer forensics experts can pull data (that people try to hide) off computers, CD's, DVD's, iPods, phones, etc.

T

T/F Computer forensics is trying to find data that people are trying to hide.

T

"T/F This is how a machine cycle looks like: Fetch -- gets the instruction from RAM to Control Unit Decode -- figures out what to do in Control Unit Execute -- carries out instruction in ALU Write-back -- returns the result from ALU to RAM"

T

T/F A 1-byte memory location can store a 3-digit number, such as 250.

T

T/F A 404 error occurs when the web page cannot be found

T

T/F A browser is a software application

T

T/F A browser is used to view web pages.

T

T/F A bus moves data on the motherboard from ram to the CPU.

T

T/F A computer program that cannot replicate itself should not be called 'virus'.

T

T/F A computer worm does not need to attach itself to an existing program to spread.

T

T/F A digital video is a series of still images. The quality of video depends on the frame rate and the number of pixels

T

T/F A file extension indicates how the computer shouldåÊ open the file.

T

T/F A file might remain in the same location years after it has been deleted.

T

T/F A good web page will have fewer words than the came content in a written paper.

T

T/F A good web page would not have underlined nonlinks or not underlined links.

T

T/F A hard drive can also contain cache memory to help speed up data retrieval

T

T/F A hash code (ex md5) is use to make sure all bits of a hard drive are copied correctly

T

T/F A packet can be lost before arriving at the destination. In this case, the recipient will request a resend.

T

T/F A virus is a computer program that can replicate itself and spread from one computer to another.

T

T/F According to Commandment 4 of the Ten Commandments of Computer Ethics, stealing sensitive information or leaking confidential information is as good as robbery.

T

T/F According to the CDT, the US does not have a set of basic privacy laws for online.åÊ

T

T/F According to the video on Artificial Intelligence, robots can gain the ability to learn and think.

T

T/F After compression, it is possible that the original representation can be reproduced perfectly.

T

T/F All computer software has bugs.

T

T/F As long as you follow the API (Application Programming Interfaces) rules set by Facebook, you can put 'like' buttons on your own site.

T

T/F Bit is short for binary digit.

T


Conjuntos de estudio relacionados

NUR202 Evolve: Introductory Quiz - Diabetes

View Set

Massachusetts Driver's Permit Test (Spring 2019)

View Set

Biology: body parts, their function, and what system they are in

View Set

Puerto Rico - Nayelis y Isalaura

View Set

Chapter 51: Care of Patients with Musculoskeletal Trauma

View Set

Network+ Chapter 7 | 02 IP Addressing IPv6

View Set

government chapter 17 study guide

View Set