COSC100 Final 2019 (Holt, UTK)

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

20 in base 10 is ________ in binary a. 0001 0000 b. 0000 0000 c. 0001 0100 d. 0010 1010

0001 0100

33 in base 10 is ________ in binary a. 0010 0001 b. 0011 1111 c. 1100 0001 d. 0110 0000

0010 0001

How long did it take for Evan to find Ivanna's phone back after he first posted a webpage about it online? a. a week b. ten days c. more than a month d. two weeks

10 days

How many peripheral devices can be daisy-chained to one single USB port? a. 255 b. 127 c. 128 d. 256

127

0000 1111 in binary is ________ in base 10 a. 15 b. 11 c. 19 d. 21

15

What is the minimum number of points you must receive on the final to get an A in this course?

160

Assume each audio sample is stored as two bytes and the sampling rate is 44,100 samples/second. What is the size of a 3 minute audio recording? a. 120 x 44100 x 3 b. 180 x 44100 x 2 c. 3 x 44100 x 2 d. 3 x 22000 x 2

180 x 44100 x 2

The graphical user interface was invented for the Macintosh in what year? a. 1984 b. 2001 c. 1975 d. 1992

1984

In Python, what would be the output of the following code assuming each year printed was on the same line? leapYear = 2016 for i in range(1, 4): print(leapYear) leapYear = leapYear + 4 a. 2016 2020 2024 2028 b. 2016 2020 2024 c. 2020 2024 2028 d. 2020 2024 2028 2032

2016 2020 2024

The binary number 1101 0001 is ________ a. 64 b. 209 c. 310 d. 311

209

If you posted something that was not true about a friend on Facebook, which of the computer ethical 10 commandments might you break? a. 6 b. 5 c. 7 d. 8

5

At least how many bits do we have to use in order to represent all of the common symbols on an American Keyboard with ASCII? a. 6 b. 10 c. 16 d. 7

7

In HTML5 the ______________declaration instructs the web browser about what type of document follows. a. <title> b. <body> c. <!DOCTYPE html> d. <html>

<!DOCTYPE html>

If the opening is <body> what would the closing look like? a. </body> b. <quit body> c. <exit body> d. <end body>

</body>

If the closing tag is </font> what would the opening look like? a. <text font="body"> b. <open font> c. <font> d. <begin font>

<font>

What formula would you type in cell C2 ( instead of ?? ) if you wanted to add cells A2 and B2 and have the value of C2 change if A2 or B2 changes? A B C D 1 10 15 25 30 2 20 25 ?? 60 3 5 10 15 20 a. 45 b. A2 + B2 c. =A2 + B2 d. =A2:B2

=A2 + B2

What is a cell in a cellular network? a. A smaller land area within a cellular network that contains a cell tower or base station b. a fiber optic network c. a radio wave d. a part of the body that receives radio waves

A smaller land area within a cellular network that contains a cell tower or base station

Who created one of the first compilers which lead to the development of the COBOL programming language? a. Herman Hollerith b. Teddy Roosevelt c. Admiral Grace Hopper d. Alan Turning

Admiral Grace Hopper

Flame wars can happen in a. e-mails b. social media c. personal blogs d. all of the above

All of the above

What can we learn from EPIC's request to FTC regarding Google Drive? a. All of the above. b. Google may disclose documents you created and saved on Google Docs to users who lack the permission to view the file. c. It is good habit to read Terms of Service. d. Google may permit unauthorized individuals to access the files you created and saved on Google Docs.

All of the above

When violating UT policies, it may result in: a. All of the above b. Legal action c. Disciplinary review d. Expulsion

All of the above

Which of the following can make your computer more susceptible to Trojans? a. All of the above b. Play online games c. Download from an unknown source d. Use internet-driven applications

All of the above

In the computer, mathematical functions are done in the ________? a. Control Unit b. RAM c. Hard Drive d. Arithmetic Logic Unit (ALU)

Arithmetic Logic Unit (ALU)

Which language is NOT a high level programming language? a. Assembler b. Python c. C++ d. Fortran

Assembler

When searching the web for words DOG and CAT, the AND requires a. none of the above b. BOTH words be on the page c. the words are not on the page d. either word should be on the page

BOTH words be on the page

Who helped sequence the first human genome? a. Bonnie Berger b. Alan Turing c. Bill Gates d. Mark Weiser

Bonnie Berger

Starting the computer and OS is called a. Booting b. RAM c. Kernel d. USB

Booting

An early computing machine was an abacus - where was it invented? a. China b. France c. India d. United States

China

Which of the following types of server is not mentioned by Mr. Shewmake in the video? a. Database server b. Application server c. Video server d. Content server

Content server

Which of the following is not a method to hide data? a. Change the file extension b. Move a file into system folders c. Delete a file d. Create a hash for the file

Create a hash for the file

A new way of storing massive amounts of data is to store it using the 4 building blocks of... a. RAM b. DNA c. Excel d. Hard drives

DNA

What can be used to create a LAN? a. CPU b. monitor c. RAM d. Ethernet cables

Ethernet cables

Which of the following did NOT happen in Shirky's HERE COMES EVERYBODY story? a. Ivana got her phone back eventually b. the police got involved to help get the phone back c. Ivana lost her phone in a cab d. Facebook was used to recover the phone

Facebook was used to recover the phone

A 1 byte memory location can store the number 999. (T/F)

False

A browser is a hardware device on your computer used to view web pages. (T/F)

False

A copyright lasts for 70 years. (T/F)

False

A degree in computer science makes a person eligible to perform forensics and testify in court. (T/F)

False

A frame rate and a sample rate are exactly the same. (T/F)

False

A good web page has lots of animation, such as horses continually galloping across a screen. (T/F)

False

A good web page should use subjective and powerful language, rather than neutral language. (T/F)

False

A software is called a Malware if it has legitimate purpose but contains harmful bugs that were not corrected before release. (T/F)

False

A swap file is located in main memory. (T/F)

False

A typical computer screen has over 600 pixels per inch. (T/F)

False

According to EPIC, when you use Google drive, the files you upload are private and Google will keep them that way at all times. (T/F)

False

All robotic movements are done via hydraulic systems. (T/F)

False

An assembler translates a high-level language program into low-level machine instructions. (T/F)

False

Antivirus software removes all viruses, worms, trojans, spyware, an adware? (T/F)

False

Because of privacy laws, companies cannot monitor employees computer usage at work. (T/F)

False

CSS can be used to animate objects on a web page. (T/F)

False

Ethics are laws protecting people. If it is unethical it is illegal. (T/F)

False

IT IS APPROPRIATE TO TYPE ALL IN CAPITAL LETTERS FOR EMPHASIS. (T/F)

False

If p is True and q is False, then ~p AND q is ____________ (T/F)

False

If p is True, then ~~~p is ________________? (T/F)

False

If you like a song really well you may use the whole song for background to a slide show you create and put on your website for this class. (T/F)

False

In the Arithmetic Logic Unit (ALU), the accumulator holds data to be processed and the registers hold results of arithmetic or logical operation. (T/F)

False

In the TED talk "Data is the new soil" means that data is dirty and is corrupting us. (T/F)

False

In the large commercial website discussed in lesson 9 it is acceptable to have up to a 3 second delay in a web page loading. (T/F)

False

It is illegal for employers to follow things you do on a company computer.

False

It would be legal to copy a short book to distribute to other students in the class for educational use. This helps make education affordable. (T/F)

False

Just using Wifi (no other cabling/wires) you can connect from your house in the United States to Europe (T/F)

False

Narrow AI should exist within the next 50 years. (T/F)

False

Once data is deleted on a computer or other device it can no longer be read by forensics. (T/F)

False

One large team of no more than 10 people are able to create and maintain the Scripps websites. (T/F)

False

ROM, cache and registers are all volatile. T/F

False

Renaming a file extension makes the data inaccessible to computer forensic specialists. (T/F)

False

Sasha, the girl who kept Ivanna's phone, got arrested and imprisoned. (T/F)

False

Ten bits make 1 byte. (T/F)

False

The University of Tennessee allows students to download all music and videos for their own personal use. (T/F)

False

The first step in forensically copying a hard drive is to boot the computer to see how big the hard drive is and how much data is on it. (T/F)

False

The time it takes to position the heads on a hard drive to the correct data is called the RPM. (T/F)

False

The university can guarantee the privacy of files, emails, or confidential information stored or transmitted on UT IT resources. (T/F)

False

Unless information on the web explicitly says it is copyrighted, it is free to use. (T/F)

False

Viruses, worms, Trojans, spyware and adware can be detected and removed by anti-virus software. (T/F)

False

We are able to analyze the majority of data gathered today. (T/F)

False

Web Analytics can collect what browser a person is using - but cannot collect the page the person came from to get there. (T/F)

False

When building a computer, buying a fast CPU and an older hard drive is a good way to save money without sacrificing speed. (T/F)

False

When buying a computer, it is always better to get a CPU that is a lot faster than your hard disk. (T/F)

False

You may always use up to 5 minutes of a copyrighted video on your own web site. (T/F)

False

Your email at the University of Tennessee is private. (T/F)

False

Which of the following is NOT on the motherboard of the computer? a. Flash Drive b. RAM c. ROM d. Expansion slots

Flash drive

Of the following compression methods for video, which is the newest? a. mpeg b. mp4 c. mp3 d. H264

H264

Which of the following includes both digital video connectors? a. composite and S-video b. DVI and composite c. HDMI and DVI d. VGA and HDMI

HDMI and DVI

Tags are keywords to make a webpage in ____________ a. HTML b. hexidecimal codes c. RGB d. RAM

HTML

The "language" that allows your computer to ask for a web page (ex: an HTML document) from another computer. __________ actually is a protocol. a. MAC protocol b. HTTP c. USB d. port protocol (PP)

HTTP

Who developed a machine to use punch cards in a census? The company founded eventually became part of of IBM? a. Steve Jobs b. Herman Hollerith c. Bill Gates d. Charles Babbage

Herman Hollerith

Rules that specifies how to communicate over the Internet and specifies what is included in a packet. Ex: The destination address must be provided first, followed by the size of the message, followed by the message. a. memory b. MAC c. Transmission Address d. Internet Protocol (IP)

IP (Internet Protocol)

When a computer connects to the Internet it is assigned a(n) ____________ that is typically 32 bits, divided into four 8-bit groups, each group often written as a decimal number (ex. 198.51.100.7). a. its file number (FP). b. IP Address c. House number address d. Modem

IP address

Which of the following are functions a computer can do? a. input, recycle b. input, loop c. output, recycle d. recycle. stop

Input/loop

Is the following HTML code valid or invalid? You must read <em><cite>A Tale of Two Cities</em></cite>, one of the best selling books of all time.

Invalid

Ubiquitous computing means a. One computer for many people b. Many computers for one person c. One computer for one person

Many computers for one person

Data about data are called a. Data paths b. Metadata c. Data images d Databases

Metadata

It is allowed to send group emails soliciting votes for your favorite candidate on UT networks. (T/F)

No, False

Which of the following is not a computer professional's obligation? a. Protect data with backup procedures b. Protect data from prying eyes c. Notify authorities of certain illegal activities on the internet d. None of the above

None of the above

Which of the following is not a factor to consider for a video card? a. None of the above b. memory c. power usage d. speed

None of the above

Which of the following statements about spyware is not correct? a. Spyware can result in slow internet connections. b. None of the above. c. Spyware can be used by the owner of a public computer to monitor users. d. Spyware can change computer settings, browser settings or software settings

None of the above

To get pages that have just one of several words, include _____ between the words. a. OR b. "or" c. AND d. nothing

OR

A piece of information routed through a computer network that contain information such as the data, data size, and destination address. a. Router b. Packet c. Modem d. Envelope

Packet

Which program might be best used to EDIT the file myfile.jpg? a. Photoshop (image) b. Excel (spreadsheet) c. Notepad (text) d. Microsoft Access (database processing)

Photoshop

Which of the following is not part of the codes of conduct for computer professionals? a. Safety first b. Professional attire c. Professional responsibility d. Professional competence

Professional attire

Which of the following are volatile? a. Flash Drive b. ROM c. RAM d. Hard Drive

RAM

Which of the following is not part of a CPU? a. Control Unit b. on-chip cache c. ALU d. ROM

ROM

This type of malware collects information about the computer secretly a. spyware b. trojan horse c. virus d. worm

Spyware

Playing video directly from the Internet (such as from YouTube, Netflix, etc.) using a web browser or other app, without ever storing the video as a file on a device, is called a. playback b. buffering c. streaming d. downloading

Streaming

Which type of bus moves things between the CPU and main memory? a. Internal bus b. Serial bus c. System bus d. Extension bus

System bus

HTML is made up of ____________ a. Tags b. RAM c. hexidecimal codes d. RGB

Tags

In Shirky's book HERE COMES EVERYBODY the best choice for the main point of the story is that a. cell phones should always be password protected for security's sake b. the Internet can be a powerful tool and aid in justice c. technology is advancing and cell phones are the wave of the future d. Cab drivers should clean out their cabs after each customer

The Internet can be a powerful took and aid in justice

How does most of your information become public on the Internet? a. most information is gathered by secret programs that companies put on your computer b. bad programs such as viruses collect information about you without your knowledge c. The information is freely given by filling in forms etc on the web d. none of the other answers

The information is freely given by filling in forms etc on the web

What is bandwidth on the internet? a. how wide the transmission band is b. Transmission capacity measured in bitrate c. the number of electrons moving over a wire measured in ohms d. transmission capacity measured in volts

Transmission capacity measured in bitrate

1 GHz would be faster than 1 MHz. (T/F)

True

A 1-byte memory location can store the decimal number 250. (T/F)

True

A CPU can access an item from cache faster than from RAM memory. (T/F)

True

A barrier to DNA storage is the time it takes to synthesize and sequence the DNA. (T/F)

True

A bus moves data on the motherboard from RAM to the CPU. (T/F)

True

A computer program that cannot replicate itself should not be called 'virus'. (T/F)

True

A computer worm does not need to attach itself to an existing program to spread. (T/F)

True

A file might remain in the same location years after it has been deleted. (T/F)

True

A good web page should be scannable. (T/F)

True

A good web page will have fewer words than the same content in a written paper. (T/F)

True

A hard drive can also contain cache memory to help speed up data retrieval. (T/F)

True

A hash code (ex md5) is use to make sure all bits of a hard drive are copied correctly? (T/F)

True

A packet can be lost before arriving at the destination. In this case, the recipient will request a resend. (T/F)

True

A text editor can be used to create a web page. (T/F)

True

A virus is a computer program that can replicate itself and spread from one computer to another. (T/F)

True

AEI is includes human emotions. (T/F)

True

According to Commandment 4 of the Ten Commandments of Computer Ethics, stealing sensitive information or leaking confidential information is as good as robbery. (T/F)

True

According to the "Netiquette Guidelines", it is seen as rude not to put your name at the bottom of an email. (T/F)

True

According to the CDT, the US does not have a set of basic privacy laws for online. (T/F)

True

After Lossless compression, it is possible that the original representation can be reproduced perfectly. (T/F)

True

All computer software has bugs. (T/F)

True

An integer number such as 40 would be stored differently in a computer than a decimal number such a 40.25. (T/F)

True

Big Data may affect your privacy. (T/F)

True

Bit is short for binary digit. (T/F)

True

CSS is made up of rules. Rules are made up of selectors which are used to target HTML elements and declarations, which contain properties and values that the browser then uses to style the element. (T/F)

True

CSS is used to control how the HTML looks. (T/F)

True

Computer forensics experts can pull data (that people try to hide) off computers, CD's, DVD's, iPods, phones, etc. (T/F)

True

Computer forensics is trying to find data that people are trying to hide. (T/F)

True

Cookies and GUID are techniques for gathering information on computers. (T/F)

True

DNA data storage will last longer than magnetic disk storage. (T/F)

True

Data visualization can help change someone's mind by helping them engage with the information. (T/F)

True

Digital information is represented as strings of bits. (T/F)

True

Disabling cookies on your computer may help protect your privacy. (T/F)

True

E-Discovery is used in civil cases as well as criminal ones. (T/F)

True

Edge servers and caching help people browsing websites to receive the information (web page) faster. (T/F)

True

Flaming is sending rude or offensive materials either via email or other form of messaging. (T/F)

True

Food can be printed using a 3D printer. (T/F)

True

For large websites, it is fairly common that a web page is written in more than one language. (T/F)

True

Genome data is expanding faster than computer power. (T/F)

True

Hyperlinks are used to connect web pages on the world wide web. (T/F)

True

If p is True, then (p AND q) is only true if q is ___________ (T/F)

True

In a balloon race visualization the higher up the balloon the more data there is to support the idea being represented. (T/F)

True

In most cases, the more RAM and cache in a computer, the faster the computer can process data. (T/F)

True

It is a rule of thumb to assume that you are monitored at work. (T/F)

True

It is thought that the 9/11 attacks used steganography to transmit data/messages. (T/F)

True

It is unethical to hack passwords unless it is done against illegal use of computers. (T/F)

True

L1 Cache is high speed memory that may be found on the CPU. (T/F)

True

Raw digital video (before any type of compression) is a series of still images. The quality of video depends on the frame rate and the number of pixels. (T/F)

True

Strong AI is where computers can think as well as humans and may be estimated to be about 30 years away. (T/F)

True

The browser for the Dark Web is The Onion Router. (T/F)

True

The communication etiquette that we follow in the real world applies to communication over computers as well. For example, we should be courteous and considerate with a novice computer user. (T/F)

True

The internet was developed from the ARPANET, from a Department of Defense Project in the 1960's and 1970's. (T/F)

True

The location of the person requesting the webpage can be monitored on a large website. (T/F)

True

The part of the 3D printer where a thin stream of melted material comes out is an extrusion head. (T/F)

True

The video card you put in the computer can impact the size of the power supply that you purchase for the computer. (T/F)

True

There is a huge database of all known organisms. (T/F)

True

USB, firewire, SATA, eSATA and SCSI are all different connection types for hard disk. (T/F)

True

UT - Knoxville reserves the right to monitor everything you do on its computers and networks. You should have no expectation of privacy - even in your email. (T/F)

True

UT Policy requires you to report any illegal use of computer / network services that goes against their policies. (T/F)

True

Using a DVI port to a digital monitor prevents the conversion of the video signal to analog. (T/F)

True

Visualization of data can help put data into context and uses patterns to help understand data. (T/F)

True

Web analytics can be used to track ecommerce activities such as sales and performance. (T/F)

True

Web analytics can track the time a person stays on a page. (T/F)

True

When converting sound to digital representation, measurements are taken at regular intervals called samples. (T/F)

True

While 800 homework points is used to calculate the grade - there are more homework points (extra credit) built into the course schedule. (T/F)

True

A test for intelligence in a computer, requiring that a human being should be unable to distinguish the machine from another human being by using the replies to questions put to both. a. Super AI Test b. Turing Test c. Humanistic Test d. Big Bang Test

Turing Test

Which of the following is not an optical drive? a. Blue-Ray Re-Writer b. CD-RW drive c. USB 3.0 Multi-Media Card Reader/Writer d. DVD-RW Burner

USB Flash Media Card Reader/Writer

Would the following Python code create an error? print('My Answer") (Y/N)

Yes

What is an Exabyte? a. a million gigabytes b. a million megabytes c. two gigabytes d. a billion gigabytes

a billion gigabytes

What would be printed by the following Python code? answer = 20 print('answer')

answer

Where should all email relating to this course be sent? a. TA's b. [email protected] c. the instructor d. none of these answers

b. [email protected]

DNA storage does not use binary math. What number system does it use? a. hexadecimal b. decimal c. base 4 d. octal

base 4

What is pervasive internet? a. internet that sings a song b. be able to log into the internet anywhere you go c. internet that is totally private d. internet that costs

be able to log into the internet anywhere you go

In this description of a processor: "Intel® Core™ i5-4440 Processor (4x 3.10GHz/6MB L3 cache), what does "3.10GHz" indicate? a. clock speed b. graphics speed c. number of cores d. cache size

clock speed

What unit contains a clock that acts like an electronic drummer? a. Hard disk b. RAM c. Control d. Register

control

The operating system communicates with the hardware via ______. a. device drivers b. pdf files c. modem d. document files

device drivers

In web analytics, device type, browser, or geographic location of a visitor may be called a ______________________ a. URL b. dimension c. locator item d. dimetric

dimension

A ____________ is an easy-to-remember name for an IP address, like utk.edu a. domain name b. browser name c. packet name d. USB name

domain name

A _________________is a company authorized to reserve domain names. a. domain name registrar b. the US government reservation system c. domain name server d. a url registration company

domain name registrar

Each time you connect to the Internet at UTK with your laptop, you most likely are given a ____________________. a. static IP address b. a new MAC address c. a wifi address d. dynamic IP address

dynamic IP adress

Which of the following types of caching is used especially when users from another continent try to make. a. Memory b. File c. Browser d. Edge

edge

This type of cable is used to send internet transmissions across the oceans so the signal doesn't degrade. a. plastic tubing b. phone wire c. fiber optic d. copper wire

fiber optic

A type of image file that is commonly used on the web that uses lossy compression is: a. gif b. png c. bmp d. jpeg

jpeg

What does 2133 indicate in"16GB[4GBx4]DDR3-2133" for RAM? a. memory speed b. size of memory c. CPU clock speed d. number of memory modules

memory speed

When restoring power to network devices, which ordering is recommended? a. router, modem, PC b. modem,PC, router c. modem, router, PC d. PC, modem, router

modem, router, PC

The maintenance team that maintains the large websites at Scripps consists of how many people? a. 1 b. 5 c. more than 10 d. 3

more than 10

A compressed audio file is better to use on the internet since it is smaller. ________ is a type of a compressed audio file. a. zip b. png c. mp3 d. wav

mp3

The internet is controlled by: a. The government b. No one or everyone c. Bill Gates d. Al Gore

no one or everyone

In the Data Visualization "Every single __________________ should testify directly to the content" Edward Tufte. a. square b. number c. pixel d. point

pixel

In a database, a unique identifier for a record is call the ________. a. access value b. the name c. primary key d. index value

primary key

The most common criticism of ubiquitous computing is a. cheating in school b. driving hazard c. privacy and lack of human interaction d. electric power used

privacy and lack of human interaction

EPIC is an organization that a. promotes online (electronic) privacy and civil liberties b. covers the magnitude of epic earthquakes and storms on the web c. none of the other answers d. handles the spread of online virus epidemics

promotes online (electronic) privacy and civil liberties

To search for an exact set of words, use... a. colon : b. quotes " " c. two periods without space .. d. asterisk *

quotes " "

The usual configuration to create wifi at home is to connect a ___________ to the ISP's modem. a. keyboard b. mouse c. monitor d. router

router

The outline that is traced when printing a 3D object is called a ________. a. layer b. shell c. infill d. density

shell

The point where artificial intelligence passes human intelligence is the... a. big data b. super blast c. singularity d. big bang

singularity

Which of the following would search for the word "news" ONLY on the cnn.com website? a. site:cnn.com news b. site:cnn.com c. cnn.com AND news d. cnn.com news

site:cnn.com news

A 3D model that has an overhang of more than 45 degrees needs ________. a. supports b. layers c. rafts d. density

supports

The Turing Machine uses an infinitely long __________ consisting of cells a. flash drive b. hard drive c. tape d. punch card

tape

This project created a "parts list" for humans a. Project X b. The human genome project c. The Vandergriff project d. Project G

the human genome project

Values stored by a program for later use are called ________. a. answers b. kernels c. variables d. memories

variables

What are the 3 V's of Big Data? a. Volume, Velocity, Variance b. Variety, Variables, Volume c. Variance, Variety, Volume d. Volume, Velocity, Variety

volume, velocity, variety

A __________ is a program that pre-visits web pages to build an index. It goes to known web pages, and then follows those pages' links to other pages, following those pages' links, etc., like a spider moves around a spider web, updating the index information a. Spyder me b. spider app c. Web accessor d. Web Crawler

web crawler

Which of the following tools on the internet is not used by Evan in the story "It takes a village". a. www.myblog.com b. personal website c. Bulletin Board Service/System d. Digg -- a collaborative news website

www.myblog.com


संबंधित स्टडी सेट्स

Business English Quiz Questions - Review

View Set

IDS 301: Intro to Interdisciplinary Studies

View Set

Individual and group decision making

View Set

CH 11 Attitudes and Influencing Attitudes

View Set

Biol 251 Lecture 24 Food Microbiology

View Set

CP 11, Blended Skills and Critical Thinking throughout the Nursing Process

View Set

Exam 01.06 Cardiorespiratory Fitness

View Set