COSC 100 Final Questions
A copyright lasts for 70 years. TRUE or FALSE
FALSE
A degree in computer science makes a person eligible to perform forensics and testify in court. TRUE or FALSE
FALSE
A frame rate and a sample rate are exactly the same. TRUE or FALSE
FALSE
A good web page has lots of animation, such as horses continually galloping across a screen TRUE or FALSE
FALSE
A good web page should use subjective and powerful language, rather than neutral language TRUE or FALSE
FALSE
A good web page would have a lot of text that scrolls horizontally across a page TRUE or FALSE
FALSE
A software is called a Malware if it has legitimate purpose but contains harmful bugs that were not corrected before release TRUE or FALSE
FALSE
A swap file is located in main memory TRUE or FALSE
FALSE
A typical computer screen has over 600 pixels per inch. TRUE or FALSE
FALSE
All robotic movements are done via hydraulic systems TRUE or FALSE
FALSE
Antivirus software removes all viruses, worms, trojans, spyware, an adware? TRUE or FALSE
FALSE
Because of privacy laws, companies cannot monitor employees usage at work. TRUE or FALSE
FALSE
Buying a fast CPU and an older hard drive is a good way to save money TRUE or FALSE
FALSE
CSS can be used to animate objects on a web page. TRUE or FALSE
FALSE
Computers can directly translate high-level programming languages into binary machine language. TRUE or FALSE
FALSE
Dark Navy text on a Black background would make a site easy to read. TRUE or FALSE
FALSE
Ethics are laws protecting people. If its unethical, it is illegal. TRUE or FALSE
FALSE
Google Analytics can collect what browser a person is using -- but cannot collect the page the person came from to get there. TRUE or FALSE
FALSE
IT IS APPROPRIATE TO TYPE ALL IN CAPITAL LETTERS FOR EMPHASIS TRUE or FALSE
FALSE
If you like a song really well you may use the whole song for background to a slide show you create if you don't distribute the slide show publicly TRUE or FALSE
FALSE
In the Arithmetic Logic Unit (ALU), the accumulator holds data to be processes and the registers hold results of arithmetic or logical operation TRUE or FALSE
FALSE
In the TED talk "Data is the new soil" means that data is dirty and is corrupting us TRUE or FALSE
FALSE
It is a rule of thumb to assume that you are monitored at work TRUE or FALSE
FALSE
It is allowed to send group emails soliciting votes for your favorite candidate on UT networks. TRUE or FALSE
FALSE
Narrow AI should exist within the next 50 years. TRUE or FALSE
FALSE
Once data is deleted on a computer or other device it can no longer be read by forensics TRUE or FALSE
FALSE
Person may use up to 15 photos from 1 photographer under Fair Use Laws TRUE or FALSE
FALSE
ROm, cache, and registers are all volatile. TRUE or FALSE
FALSE
Renaming a file extension makes the data inaccessible to computer forensic specialists. TRUE or FALSE
FALSE
Sasha, the girl who kept ivanna's phone, got arrested and imprisoned. TRUE or FALSE
FALSE
Second Life is a virtual game environment only TRUE or FALSE
FALSE
Ten bits make 1 byte TRUE or FALSE
FALSE
The first step in forensically copying a hard drive is to boot the computer to see how big the hard drive is and how much data is on it TRUE or FALSE
FALSE
The time it takes to position the heads on a hard drive to the correct data is called RPM. TRUE or FALSE
FALSE
UT allows students to download all music and videos for their own personal use TRUE or FALSE
FALSE
UT can guarantee privacy of files, emails, or confidential information stored or transmitted on UT IT sources TRUE or FALSE
FALSE
Unless information on the web explicitly says it is copyrighted it is free to use TRUE or FALSE
FALSE
Viruses, worms, Trojans, spyware and adware can be detected and removed by anti-virus software. TRUE or FALSE
FALSE
When buying a computer, its always better to get a cpu that is a lot faster than your hard disk. TRUE or FALSE
FALSE
You may use up to 5 mins of copyrighted video on your own web site TRUE or FALSE
FALSE
Your email at UT is private TRUE or FALSE
FALSE
in the large commercial website discussed in lesson 9 it is acceptable to have up to a 3 second delay in a web page load TRUE or FALSE
FALSE
According to EPIC, when you use google drive, the files you upload are private and google will keep that way at all times. TRUE or FALSE
False
DOS is a GUI operating system TRUE or FALSE
False
It is illegal for employers to follow things you do on a company computer TRUE or FALSE
False
A 1-byte memory location can store a 3-digit number, such as 250. TRUE or FALSE
TRUE
A barrier to DNA storage is the time it takes to synthesize and sequence the DNA True or FALSE
TRUE
A browser is used to view web pages TRUE or FALSE
TRUE
A computer program that cannot replicate iteself should not be called a virus. TRUE or FALSE
TRUE
A file might remain in the same location years after it has been deleted TRUE or FALSE
TRUE
A good web page should be scanable TRUE or FALSE
TRUE
A good web page will have fewer words than the same content in a written paper TRUE or FALSE
TRUE
A good web page would not underline words that not links - and would have words that are links underlined. TRUE or FALSE
TRUE
A hash code (ex md5) is used to make sure all bits of a hard drive are copied correctly? TRUE or FALSE
TRUE
A packet can be lost before arriving at the destination. In this case, the recipient will request a resend. TRUE or FALSE
TRUE
A poorly made web page may have both horizontal and vertical scroll bars TRUE or FALSE
TRUE
AEI includes human emotions. TRUE or FALSE
TRUE
According to Commandment 4 of the Ten Commandments of Computer Ethics, stealing sensitive information, or leaking confidential information is as good as robbery. TRUE or FALSE
TRUE
According to the CDT, the US does not have a set of basic privacy laws for online. TRUE or FALSE
TRUE
According to the Netiquette Guidelines, it is seen as rude to not put your name on the bottom of an email TRUE or FALSE
TRUE
After compression, it is possible that the original representation can be reproduced perfectly. TRUE or FALSE
TRUE
All computer software has bugs TRUE or FALSE
TRUE
Big Data may affect your privacy TRUE or FALSE
TRUE
Bit is short for binary digit TRUE or FALSE
TRUE
CSS is made up of rules. Rules are made up of selectors which are used to target elements and declarations, which contain properties and values that the browser uses to style the element. TRUE or FALSE
TRUE
CSS is used to control how HTML looks TRUE or FALSE
TRUE
Computer forensics experts can pull data (that people try to hide) off computers, CD's, DVD's, iPods, phones, etc. TRUE or FALSE
TRUE
Computer forensics is trying to find data that people are trying to hide TRUE or FALSE
TRUE
Computers can only perform about 100 different instructions, such as ADD, MULT, and DIV, etc TRUE or FALSE
TRUE
Cookies and GUID are techniques for gathering information on computers TRUE or FALSE
TRUE
Data visualization can help change someone's mind by helping them engage with the information TRUE or FALSE
TRUE
Digital information is represented as strings of bits TRUE or FALSE
TRUE
Digital information is represented as strings of bits TRUE or FALSE
TRUE
Disabling cookies on your computer may help protect your privacy TRUE or FALSE
TRUE
E-Discovery is used in civil cases as well as criminal ones. TRUE or FALSE
TRUE
Edge servers and caching help people browsing websites to receive the information (web page) faster TRUE or FALSE
TRUE
Flaming is sending rude or offensive materials either via email or other form of messaging. TRUE or FALSE
TRUE
Food can be printed using a 3D printer TRUE or FALSE
TRUE
For large websites, it is fairly common that a web page is written in more than one language. TRUE or FALSE
TRUE
Genome data is expanding faster than computer power. TRUE or FALSE
TRUE
Google analytics can be used to track ecommerce activities such as sales and performance. TRUE or FALSE
TRUE
Google analytics can track the time a person stays on a page. TRUE or FALSE
TRUE
Hyperlinks are used to connect web pages on the world wide web TRUE or FALSE
TRUE
In most cases the more RAM and cache in a computer the faster the computer can process data TRUE or FALSE
TRUE
It is thought that the 9/11 attacks used steganography to transmit data/mesages. TRUE or FALSE
TRUE
It is unethical to hack passwords unless its done against illegal use of computers TRUE or FALSE
TRUE
JavaScript is a programming language that runs in the browser rather than on a server TRUE or FALSE
TRUE
Kevin Warwick embedded a computer chip and became a cyborg. TRUE or FALSE
TRUE
L1 Cache is high speed memory that may be found on the CPU TRUE of FALSE
TRUE
Mobile first (promoted by Luke Wroblewski) means that when you design a website you create the mobile design first then move to large screen sizes. TRUE or FALSE
TRUE
Strong AI is where computers can think as well as humans and may be estimated to be about 30 TRUE or FALSE
TRUE
Swap files are stored in the hard disk TRUE or FALSE
TRUE
The communication etiquette that we follow in the real world applies to communication over computers as well. For example, we should be courteous and considerate with a novice computer user TRUE or FALSE
TRUE
The fines for downloading and sharing music can go as high as $22,500 for each song. TRUE or FALSE
TRUE
The location of the person requesting the webpage can be monitored on a large website TRUE or FALSE
TRUE
The operating system communicates with the I/O devices via the device driver TRUE or FALSE
TRUE
The part of the 3D printer where a thin stream of melted material comes out is an extrusion head. TRUE or FALSE
TRUE
The video card you put in the computer can impact the size of the power supply that you purchase computer. TRUE or FALSE
TRUE
There is a huge database of all known organisms. TRUE or FALSE
TRUE
USB port is the most common port. TRUE or FALSE
TRUE
USB, firewire, SATA, eSATA, and SCSI are all different connection typers for hard disk TRUE or FALSE
TRUE
Using a DVI port to a digital monitor prevents the conversion of the video signal to analog TRUE or FALSE
TRUE
Visualization of data can help put data into context and uses patterns to help understand data. TRUE or FALSE
TRUE
When converting sound to digital representation, measurements are taken at regular intervals called samples TRUE or FALSE
TRUE
While 800 homework points are used to calculate the grade -- there are more points (extra credit) built into the course schedule TRUE or FALSE
TRUE
You can create a web page by typing HTML commands into a text editor such as Notepad++ or any other text editor TRUE or FALSE
TRUE
a bus moves data on the motherboard from ram to the CPU TRUE or FALSE
TRUE
a computer worm does not need to attach itself to an existing program to spread TRUE or FALSE
TRUE
a digital video is a series of still images. the quality of video depends on the frame rate and the number of pixels TRUE or FALSE
TRUE
a hard drive can also contain cache mempry to help speed up data retrieval TRUE or FALSE
TRUE
in a balloon race visualtization the higher up the balloon the more data there is to support the idea being represented TRUE or FALSE
TRUE
in google analytics, javascript is used to track webpages TRUE or FALSE
TRUE
virus is a computer program that can replicate itself and spread from one computer to another TRUE or FALSE
TRUE
An early computing machine was an abacus -- where was it invented? A. India B. U.S C. France D. China
D. China
Data will be how much larger in 2020 than in 2012? A. twice as large B. 10 times as large C. 50 times as large D. Data is shrinking - not an issue
A. twice as large
How long did it take for Evan to find Ivanna's phone back after he first posted a webpage about it online? A. more than a month B. a week C. Ten days D. Two weeks
C. Ten days
if p is True and q is false, then ~p AND q is A. undefined B. true C. false
C. false
The point where AI passes human intelligence is the A. super blast B. big bang C. singularity D. big data
C. singualarity
Which of the following is NOT on the motherboard of the computer? A. Expansion slots B. ROM C. RAM D. Flash Drive
D. Flash Drive
The father of ubiquitous computing is A. Bill Gates B. Steve Jobs C. Herman Hollerith D. Mark Weiser
D. Mark Weiser
Which of the following would search for the word "news" ONLY on the cnn.com website? A. cnn.com news B. cnn.com AND news C. site:cnn.com news D. site:cnn.com
C. site:cnn.com news
Which of the following is not a method to hide data? A. move a file into system folders B. create a hash for the file C. delete a file D. change the file extension
B. create a hash for the file
In the Data Visualization "Every single _____ should testify directly to the content" Edward Tufte. A. number B. pixel C. square D. point
B. pixel
The max length of a video that may be used is A. 10% or 30 secs - whichever is less B. 2 minutes C. 5 minutes D. None
A. 10% or 30 seconds - whichever is less
How many peripheral devices can be daisy-chained to one single USB port? A. 127 B. 128 C. 255 D. 256
A. 127
If you posted something that was not true about a friend on Facebook, which of the computer ethical 10 commandments might you break? A. 5 B. 6 C. 7 D. 8
A. 5
When searching the web for words DOG and CAT, the AND requires A. Both words be on the page B. either word should be on the page C. the words are not on the page D. none of the above
A. BOTH words on the page
Who helped sequence the first human genome? A. Bonnie Berger B. Bill Gates C. Mark Weiser D. Alan Turing
A. Bonnie Berger
Starting the computer and OS is called A. Booting B. RAM C. USB D. Kernel
A. Booting
if p is True, then ~~~p is ________? A. False B. True C. undefined
A. FALSE
The most common criticism of ubiquitous computing is A. electric power used B. privacy C. not paying attention driving D. over use
B. privacy
Which type of bus moves things between the CPU and main memory? A. internal bus B. serial bus C. system bus D. extension bus
C. system bus
Which of the following did NOT happen in Shirky's HERE COMES EVERYBODY story? A. FAcebook was used to recover the phone B. Ivana got her phone back eventually C. the police got involved to help get the phone back D. Ivana lost her phone in a cab
A. Facebook was used to recover the phone
Which of the following is not part of a CPU? A. ROM B. Control Unit C. ALU D. on-chip cache
A. ROM
This project created to wifi home is to connect a _____ to the ISP's modem. A. Router B. Mouse C. Monitor D. Keyboard
A. Router
In the computer, mathematical functions are done in the ____. A. Hard Drive B. Control Unit C. Arithmetic/Logic Unit (ALU) D. RAM
C. ALU
If p is True then (p And q) is only true if q is ____ A. True B. Anything C. False
A. True
A new way of storing massive amounts of data is to store it using the 4 building blocks of A. Excel B. Hard drives C. DNA D. RAM
C. DNA
What can be used to create a LAN? A. RAM B. CPU C. Ethernet D. monitor
C. Ethernet
A test for intelligence in a computer, requiring that a human being should be unable to distinguish machine from another human being by using the replies to questions put to both. A. Turing Test B. Super AI Test C. Humanistic Test D. Big Bang Test
A. Turing Test
Which of the following are functions a computer can do? A. Input, Loop B. output, recycle C. Input, recycle D. Recycle, stop
A. input, loop
Using TCP, information is sent in multiple ____ across internet connections. A. packets B. letters C. USB ports D. modems
A. packets
Which below is not a goal of HCI A. privacy B. Simple C. Accessible D. Useful
A. privacy
A 3D model that has an overhang of more than 45 degrees needs. A. supports B. layers C. rafts D. density
A. supports
A 3D model that has an overhang of more than 45 degrees needs. A. supports B. layers C. rafts D. density
A. supports
The Turing Machine uses an infinitely long ___ consisting of cells. A. tape B. flash drive C. hard drive D. punch card
A. tape
Who created the first compiler? Alan Turning Admiral Grace Hopper Teddy Roosevelt Herman Hollerith
Admiral Grace Hopper
ubiquitous computing means A. one computer for many people B. one computer for one person C. many computers for one person
C. Many computers for one person
According to the video, how much of the data is analyzed? A. 0.1% B. 0.5% C. 2% D. 5%
B. 0.5%
The graphical user interface was invented for the Macintosh in what year? A. 1975 B. 1984 C. 1992 D. 2001
B. 1984
At least how many bit do we have to use in order to represent all of the symbols on an American Keyboard? A. 6 B. 7 C. 8 D. 18
B. 7
Which of the following types of caching is used especially when users from another continent try to make a request to the server? A. File B. Edge C. Browser D. Memory
B. Edge
which of the following includes both digital video connectors? A. VGA & HDMI B. HDMI & DVI C. DVI & composite D. composite and S-video
B. HDMI and DVI
Tags are keywords to make webpage in _____. A. RAM B. HTML C. RGB D. hexidecimal codes
B. HTML
Who used punched cards and founded IBM? A. Charles Babbage B. Herman Hollerith C. Steve Jobs D. Bill Gates
B. Herman Hollerith
When a computer connects to the Internet it is assigned an ________. A. Modem B. IP Address C. unique 3 character name D. a file extension
B. IP Address
Data about data are called A. Databases B. Metadata C. Data images D. Data paths
B. Metadata
Which program might be best used to EDIT the file myfile.jpg? A. Notepad (text editor) B. Photoshop (image editing) C. Microsoft Access (database processing) D. Excel (spreadsheet software)
B. Photoshop
HTML is made up of _____. A. RAM B. Tags C. RGB D. hexidecimal codes
B. Tags
This project created a "parts list" for humans A. The Vandergriff project B. The human genome project C. Project X D. Project G
B. The human genome project
What does 2133 indicate in "16GB[4GBx4]DDR3-2133" for a memory? A. size of memory B. bus speed (or data transfer speed) C. clock speed D. number of memory modules
B. bus speed (data transfer speed)
What unit contains a clock that acts like an electronic drummer? A. hard disk B. control C. Register D. RAM
B. control
EPIC is an organization that A. covers the magnitude of epic earthquakes and storms on the web B. promotes online (electronic) privacy and civil liberties C. handles the spread of online virus epidemics D. none of the other answers
B. promotes online (electronic) privacy and civil liberties
To search for an exact set of words, use A. colon : B. quotes "" C. asterisk * D. two periods without space ..
B. quotes
The number of times the outline is traced when printing a 3D object is called a A. density B. shell C. infill D. layer
B. shell
How does most of your information become public on the internet? A. most information is gathered by secret programs that companies put on your computer. B. The information is freely given by filling in forms etc on the web C. bad programs such as viruses collect information without your knowledge. D. none of these other
B. the information is freely given out
Which of the following tools on the internet is not used by Evan in the story "it takes a village" A. Bulletin Board Service/System B. www.myblog.com C. personal website D. Digg-- a collaborative news website.
B. www.myblog.com
15 in base 10 is ____ in binary A. 0000 B. 10000 C. 1111 D. 101010
C. 1111
What is the minimum number of points you must receive on the final to get an A in this course? A. 200 B. 180 C. 160 D. 0
C. 160
10011 in binary is ___ in base 10 A. 11 B.21 C. 19 D. 15
C. 19
65 in base 10 is ____ in binary. A. 1100000 B. 11000001 C. 0111111 D. 1000001
D. 1000001
If the opening is <body>, what would the closing look like? A. <end body> B. <exit body> C. <quit body> D. </body>
D. </body>
If the closing tag is </font>, what would the opening look like? A. <begin font> B. <open font> C. <text font = "body"> D. <font>
D. <font>
What can we learn from EPIC's request to FTC regarding Google Drive? A. It's a good habit to read Terms of Service B. Google may disclose documents you created and saved on Google Docs to user who lack permission to view the file. C. Google may permit unauthorized individuals to access the files you crated and saved on Google Docs. D. All of the above
D. All of the above
When violating Ut policies, it may result in: A. Expulsion B. Disciplinary review C. Legal action D. All of the above
D. All of the above
Which of the following is not a computer professional's obligation? A. Notify authorities of certain illegal activities on the internet B. project data from prying eyes C. project data with backup procedures D. None of the above
D. None of the Above
Which of the following can be most likely the difference between a gamer and non-gamer's hard drives? A. size of cache B. data transfer speed C. spinning rate D. RAID0
D. RAID0
Which of the following are volatile? A. Flashdrive B. ROM C. Hard Drive D. RAM
D. RAM
When a person masquerades as another person to falsify data is? A. USB B. Data Diddling C. Copyright D. Spoofing
D. Spoofing
In Shirky's book HERE COMES EVERYBODY the best choice for the main point of the story is A. technology is advancing and cell phones are the wave of the future B. cell phones should always be password protected for security's sake C. Cab drivers should clean out their cabs after each customer D. the internet can be a powerful tool and aid in justice.
D. The internet can be a powerful tool and aid in justice
Flame wars can happen in: A. e-mails B. social media C. personal blogs D. all of the above
D. all of the above
which of the following can make your computer more susceptible to trojans? A. download from unknown source B. play online games C. use internet-driven applications D. All of the above
D. all of the above
In this description of a processor "Intel® Core™ i5-4440 Processor (4x 3.10GHz/6MB L3 ache), what does "3.10GHz" indicate? A. number of cores B. cache size C. graphics speed D. clock speed
D. clock speed
Which of the following types of server is not mentioned by Mr. Shewmake in the video? A. application server B. database server C. video server D. content server
D. content server
The maintenance team that maintains the large websites at Scripps consists of A. 1 B. 3 C. 5 D. more than 10
D. more than 10
Which of the following is not a factor to consider for a video card? A. speed B. memory C. power supply D. none of the above
D. none of the above
Which of the following statements about spyware is NOT correct? A. it can be used by the owner of a public computer to monitor users B. it can change computer settings, browser settings, or software settings C. it can result in slow internet connections D. None of the above
D. none of the above
Which of the following is not part of the codes of conduct for computer professionals? A. Safety first B. professional competence C. professional responsibility D. professional attire
D. professional attire
This type of malware collects information about the computer secretly A. worm B. virus C. trojan horse D. spyware
D.spyware
You connect to an ISP from our house using a Gigabye Ethernet Modem Mouse
Modem
More than one program running is called Multitasking Multithreading Multiprocessing Multiprogramming
Multitasking
To get pages that have just one several words, include ___ between the words. OR AND nothing "or"
OR
A text editor can be used to create a web page. TRUE or FALSE
True
Which of the following is not an optical drive? DVD-RW Burner CD-RW drive USB Flash Media Card Reader Blu-Ray Re-Writer
USB flash media card reader
Which of the following is NOT one of the possibilities that Prof. Kevin Warwick has shown us in the video? RFID (radio frequency identification) Eugenics Telepathic communication Sensing ultra-sonics
eugenics
One large team of no more than 10 people are able to create and maintain the Scripps websites TRUE or FALSE
false
Which would not be used to create a LAN? cable optical fiber ethernet printer
printer