COSC 100 FinalWhen violating UT policies, it may result in:
20 in base 10 is ________ in binary
0001 0100
33 in base 10 is ________ in binary
0010 0001
How many peripheral devices can be daisy-chained to one single USB port?
127
0000 1111 in binary is ________ in base 10
15
What is the minimum number of points you must receive on the final to get an A in this course?
160
Assume each audio sample is stored as two bytes and the sampling rate is 44,100 samples/second. What is the size of a 3 minute audio recording?
180 x 44100 x 2
The graphical user interface was invented for the Macintosh in what year?
1984
In Python, what would be the output of the following code assuming each year printed was on the same line? leapYear = 2016 for i in range(1, 4): print(leapYear) leapYear = leapYear + 4
2016 2020 2024
The binary number 1101 0001 is ________
209
If you posted something that was not true about a friend on Facebook, which of the computer ethical 10 commandments might you break ?
5
At least how many bits do we have to use in order to represent all of the common symbols on an American Keyboard with ASCII?
7
In HTML5 the ______________declaration instructs the web browser about what type of document follows.
<!DOCTYPEhtml>
If the opening is <body> what would the closing look like?
</body>
If the closing tag is </font> what would the opening look like?
<font>
What formula would you type in cell C2 ( instead of ?? ) if you wanted to add cells A2 and B2 and have the value of C2 change if A2 or B2 changes? A B C D 1 10 15 25 30 2 20 25 ?? 60 3 5 10 15 20
= A2 + B2
Who created one of the first compilers which lead to the development of the COBOL programming lanuage?
Admiral Grace Hopper
What can we learn from EPIC's request to FTC regarding Google Drive?
All of the above
In the computer, mathematical functions are done in the ________?
Arithmetic Logic Unit (ALU)
When searching the web for words DOG and CAT, the AND requires
BOTH words be on the page
Who helped sequence the first human genome?
Bonnie Berger
An early computing machine was an abacus - where was it invented?
China
In this description of a processor: "Intel® Core™ i5-4440 Processor (4x 3.10GHz/6MB L3 cache), what does "3.10GHz" indicate?
Clock Speed
What unit contains a clock that acts like an electronic drummer?
Control
Which of the following is not a method to hide data?
Create a hash for the file
A new way of storing massive amounts of data is to store it using the 4 building blocks of
DNA
What can be used to create a LAN?
Ethernet Cables
Which of the following did NOT happen in Shirky's HERE COMES EVERYBODY story?
Facebook was used to recover the phone
A software is called a Malware if it has legitimate purpose but contains harmful bugs that were not corrected before release.
False
All robotic movements are done via hydraulic systems.
False
Antivirus software removes all viruses, worms, trojans, spyware, an adware?
False
Because of privacy laws, companies cannot monitor employees computer usage at work.
False
Ethics are laws protecting people. If it is unethical it is illegal.
False
IT IS APPROPRIATE TO TYPE ALL IN CAPITAL LETTERS FOR EMPHASIS.
False
In the Arithmetic Logic Unit (ALU), the accumulator holds data to be processed and the registers hold results of arithmetic or logical operation.
False
In the TED talk "Data is the new soil" means that data is dirty and is corrupting us.
False
It is illegal for employers to follow things you do on a company computer.
False
Narrow AI should exist within the next 50 years.
False
ROM, cache and registers are all volatile.
False
Renaming a file extension makes the data inaccessible to computer forensic specialists.
False
Sasha, the girl who kept Ivanna's phone, got arrested and imprisoned.
False
The first step in forensically copying a hard drive is to boot the computer to see how big the hard drive is and how much data is on it.
False
The time it takes to position the heads on a hard drive to the correct data is called the RPM.
False
Viruses, worms, Trojans, spyware and adware can be detected and removed by anti-virus software.
False
We are able to analyze the majority of data gathered today.
False
When building a computer, buying a fast CPU and an older hard drive is a good way to save money without sacrificing speed.
False
When buying a computer, it is always better to get a CPU that is a lot faster than your hard disk.
False
Which of the following is NOT on the motherboard of the computer?
Flash Drive
Of the following compression methods for video, which is the newest?
H264
Which of the following includes both digital video connectors?
HDMI and DVI
Tags are keywords to make a webpage in ____________
HTML
The "language" that allows your computer to ask for a web page (ex: an HTML document) from another computer. __________ actually is a protocol.
HTTP
Who developed a machine to use punch cards in a census? The company founded eventually became part of of IBM?
Herman Hollerith
This project created a "parts list" for humans
Human Genome Project
When a computer connects to the Internet it is assigned a(n) ____________ that is typically 32 bits, divided into four 8-bit groups, each group often written as a decimal number (ex. 198.51.100.7).
IP address
Rules that specifies how to communicate over the Internet and specifies what is included in a packet. Ex: The destination address must be provided first, followed by the size of the message, followed by the message.
Internet Protocol (IP)
Ubiquitous computing means
Many computers for one person
Data about data are called
Metadata
Which of the following is not a factor to consider for a video card?
None of the above
Which of the following statements about spyware is not correct?
None of the above
To get pages that have just one of several words, include _____ between the words.
OR
Which of the following are volatile?
RAM
Which of the following is not part of a CPU?
ROM
The usual configuration to create wifi at home is to connect a ___________ to the ISP's modem.
Router
HTML is made up of ____________
Tags
What is bandwidth on the internet?
Transmission capacity measured in bitrate
1 GHz would be faster than 1 MHz.
True
A CPU can access an item from cache faster than from RAM memory.
True
A barrier to DNA storage is the time it takes to synthesize and sequence the DNA
True
A bus moves data on the motherboard from RAM to the CPU.
True
A computer program that cannot replicate itself should not be called 'virus'.
True
A file might remain in the same location years after it has been deleted.
True
A hard drive can also contain cache memory to help speed up data retrieval
True
A packet can be lost before arriving at the destination. In this case, the recipient will request a resend.
True
AEI is includes human emotions.
True
According to Commandment 4 of the Ten Commandments of Computer Ethics, stealing sensitive information or leaking confidential information is as good as robbery.
True
According to the CDT, the US does not have a set of basic privacy laws for online.
True
All computer software has bugs.
True
Big Data may affect your privacy.
True
CSS is used to control how the HTML looks.
True
Computer forensics experts can pull data (that people try to hide) off computers, CD's, DVD's, iPods, phones, etc.
True
Computer forensics is trying to find data that people are trying to hide.
True
DNA data storage will last longer than magnetic disk storage.
True
Data visualization can help change someone's mind by helping them engage with the information.
True
E-Discovery is used in civil cases as well as criminal ones.
True
Flaming is sending rude or offensive materials either via email or other form of messaging.
True
Genome data is expanding faster than computer power.
True
In a balloon race visualization the higher up the balloon the more data there is to support the idea being represented.
True
In most cases, the more RAM and cache in a computer, the faster the computer can process data.
True
It is a rule of thumb to assume that you are monitored at work.
True
L1 Cache is high speed memory that may be found on the CPU.
True
Strong AI is where computers can think as well as humans and may be estimated to be about 30 years away
True
The video card you put in the computer can impact the size of the power supply that you purchase for the computer.
True
There is a huge database of all known organisms.
True
USB, firewire, SATA, eSATA and SCSI are all different connection types for hard disk.
True
Using a DVI port to a digital monitor prevents the conversion of the video signal to analog.
True
Visualization of data can help put data into context and uses patterns to help understand data.
True
Web analytics can be used to track ecommerce activities such as sales and performance.
True
Web analytics can track the time a person stays on a page.
True
A test for intelligence in a computer, requiring that a human being should be unable to distinguish the machine from another human being by using the replies to questions put to both.
Turing test
Which of the following is not an optical drive?
USB 3.0 Multi-Media Card Reader/Writer
What are the 3 V's of Big Data?
Volume, Velocity, Variety
A __________is a program that pre-visits web pages to build an index. It goes to known web pages, and then follows those pages' links to other pages, following those pages' links, etc., like a spider moves around a spider web, updating the index information
Web Crawler
What is an exabyte?
a billion gigabytes
What is a cell in a cellular network?
a smaller land area within a cellular network that contains a cell tower or base station
Flame wars can happen in:
all of the above
When violating UT policies, it may result in:
all of the above
Which of the following can make your computer more susceptible to Trojans?
all of the above
What would be printed by the following Python code? answer = 20 print('answer')
answer
Which language is NOT a high level programming language?
assembler
DNA storage does not use binary math. What number system does it use?
base 4
What is pervasive internet?
be able to log into the internet anywhere you go
Starting the computer and OS is called
booting
Which of the following types of server is not mentioned by Mr. Shewmake in the video?
content server
Where should all email relating to this course be sent?
The operating system communicates with the hardware via ______.
device drivers
In web analytics, device type, browser, or geographic location of a visitor may be called a ______________________
dimension?
A ____________ is an easy-to-remember name for an IP address, like utk.edu
domain name
A _________________is a company authorized to reserve domain names.
domain name registrar
Each time you connect to the Internet at UTK with your laptop, you most likely are given a ____________________.
dynamic IP address
Which of the following types of caching is used especially when users from another continent try to make a request to the web server?
edge
A 1 byte memory location can store the number 999.
false
A browser is a hardware device on your computer used to view web pages.
false
A copyright lasts for 70 years.
false
A degree in computer science makes a person eligible to perform forensics and testify in court.
false
A frame rate and a sample rate are exactly the same.
false
A good web page has lots of animation, such as horses continually galloping across a screen.
false
A good web page should use subjective and powerful language, rather than neutral language.
false
A swap file is located in main memory.
false
A typical computer screen has over 600 pixels per inch
false
According to EPIC, when you use Google drive, the files you upload are private and Google will keep them that way at all times.
false
An assembler translates a high-level language program into low-level machine instructions.
false
CSS can be used to animate objects on a web page.
false
If p is True and q is False, then ~p AND q is ____________
false
If p is True, then ~~~p is ________________?
false
If you like a song really well you may use the whole song for background to a slide show you create and put on your website for this class.
false
In the large commercial website discussed in lesson 9 it is acceptable to have up to a 3 second delay in a web page loading.
false
It is allowed to send group emails soliciting votes for your favorite candidate on UT networks.
false
It would be legal to copy a short book to distribute to other students in the class for educational use. This helps make education affordable.
false
Just using Wifi (no other cabling/wires) you can connect from your house in the United States to Europe.
false
Once data is deleted on a computer or other device it can no longer be read by forensics
false
One large team of no more than 10 people are able to create and maintain the Scripps websites
false
Ten bits make 1 byte.
false
The University of Tennessee allows students to download all music and videos for their own personal use.
false
The university can guarantee the privacy of files, emails, or confidential information stored or transmitted on UT IT resources.
false
Unless information on the web explicitly says it is copyrighted, it is free to use.
false
Web Analytics can collect what browser a person is using - but cannot collect the page the person came from to get there.
false
You may always use up to 5 minutes of a copyrighted video on your own web site.
false
Your email at the University of Tennessee is private.
false
This type of cable is used to send internet transmissions across the oceans so the signal doesnt degrade
fiber optic
Which of the following are functions a computer can do?
input, loop
Is the following HTML code valid or invalid? You must read <em><cite>A Tale of Two Cities</em></cite>, one of the best selling books of all time.
invalid
A type of image file that is commonly used on the web that uses lossy compression is:
jpg
What does 2133 indicate in "16GB[4GBx4]DDR3-2133" for RAM?
memory speed
When restoring power to network devices, which ordering is recommended?
modem, router, PC
The maintenance team that maintains the large websites at Scripps consists of how many people?
more than 10
A compressed audio file is better to use on the internet since it is smaller. ________ is a type of a compressed audio file.
mp3
The Internet is controlled by ________.
no one or everyone
Which of the following is not a computer professional's obligation?
none of the able
A piece of information routed through a computer network that contain information such as the data, data size, and destination address.
packet
Which program might be best used to EDIT the file myfile.jpg?
photoshop (image)
In the Data Visualization "Every single __________________ should testify directly to the content" Edward Tufte
pixel
In a database, a unique identifier for a record is call the ________.
primary key
The most common criticism of ubiquitous computing is
privacy and lack of human interaction
Which of the following is not part of the codes of conduct for computer professionals?
professional attire
EPIC is an organization that
promotes online (electronic) privacy and civil liberties
To search for an exact set of words, use
quotes " "
The outline that is traced when printing a 3D object is called a ________.
shell
The point where artificial intelligence passes human intelligence is the
singularity
Which of the following would search for the word "news" ONLY on the cnn.com website?
site: cnn.com news
This type of malware collects information about the computer secretly
spyware
Playing video directly from the Internet (such as from YouTube, Netflix, etc.) using a web browser or other app, without ever storing the video as a file on a device, is called
streaming
A 3D model that has an overhang of more than 45 degrees needs ________.
supports
Which type of bus moves things between the CPU and main memory?
system bus
The Turing Machine uses an infinitely long __________ consisting of cells
tape
How long did it take for Evan to find Ivanna's phone back after he first posted a webpage about it online?
ten days
How does most of your information become public on the Internet?
the information is freely given by fill-in in forms etc on the web
In Shirky's book HERE COMES EVERYBODY the best choice for the main point of the story is that
the internet can be a powerful tool and aid in justice
A 1-byte memory location can store the decimal number 250.
true
A computer worm does not need to attach itself to an existing program to spread.
true
A good web page should be scannable.
true
A good web page will have fewer words than the same content in a written paper.
true
A hash code (ex md5) is use to make sure all bits of a hard drive are copied correctly?
true
A text editor can be used to create a web page.
true
A virus is a computer program that can replicate itself and spread from one computer to another.
true
According to the "Netiquette Guidelines", it is seen as rude not to put your name at the bottom of an email.
true
After Lossless compression, it is possible that the original representation can be reproduced perfectly.
true
An integer number such as 40 would be stored differently in a computer than a decimal number such a 40.25.
true
Bit is short for binary digit.
true
CSS is made up of rules. Rules are made up of selectors which are used to target HTML elements and declarations, which contain properties and values that the browser then uses to style the element
true
Cookies and GUID are techniques for gathering information on computers.
true
Digital information is represented as strings of bits.
true
Disabling cookies on your computer may help protect your privacy.
true
Edge servers and caching help people browsing websites to receive the information (web page) faster.
true
Food can be printed using a 3D printer
true
For large websites, it is fairly common that a web page is written in more than one language.
true
Hyperlinks are used to connect web pages on the world wide web.
true
If p is True, then (p AND q) is only true if q is ___________
true
It is thought that the 9/11 attacks used steganography to transmit data/messages.
true
It is unethical to hack passwords unless it is done against illegal use of computers.
true
Raw digital video (before any type of compression) is a series of still images. The quality of video depends on the frame rate and the number of pixels.
true
The browser for the Dark Web is The Onion Router.
true
The communication etiquette that we follow in the real world applies to communication over computers as well. For example, we should be courteous and considerate with a novice computer user.
true
The internet was developed from the ARPANET, from a Department of Defense Project in the 1960's and 1970's.
true
The location of the person requesting the webpage can be monitored on a large website.
true
The part of the 3D printer where a thin stream of melted material comes out is an extrusion head.
true
UT - Knoxville reserves the right to monitor everything you do on its computers and networks. You should have no expectation of privacy - even in your email.
true
UT Policy requires you to report any illegal use of computer / network services that goes against their policies.
true
When converting sound to digital representation, measurements are taken at regular intervals called samples.
true
While 800 homework points is used to calculate the grade - there are more homework points (extra credit) built into the course schedule.
true
Values stored by a program for later use are called ________.
variables
Which of the following tools on the internet is not used by Evan in the story "It takes a village".
www.myblog.com
Would the following Python code create an error? print('My Answer")
yes