Final exam review quiz answers
what is the correct HTML syntax for inserting an image?
<img src="image.gif" alt="logo" />
which tag allows you to make a list that lists the items bullet points?
<ul>
1-800-FREE-MSN is an example of:
A substitution cipher
which operating system is safe from attacks?
All operating systems are vulnerable to attack
which of the following lists the networking devices in order of intelligence from "dumb" to "smart"?
Hub, switch, router
what looks for people on the network who shouldn't be there or who are acting suspiciously?
Intrusion-detection software
how would you classify the computer lab network in the room you have recitation?
LAN
Wired media is also called _______ media and wireless media is also called _______ media.
bounded and unbounded
who would like to be hackers, but don't have much technical experience?
script kiddies
a place or places where files or file remnants could be found include
slack space, unallocated disk space, and unused disk space
which of the following is a relative link?
<a href="../docs/page1.html">Page 1</a>
what is the correct HTML syntax for making a hyperlink?
<a href="http://www.buffalo.edu">UB</a>
what is the correct HTML syntax for making an email link?
<a href="mailto:[email protected]">
what is the correct html tag for inserting a line break?
<br />
what is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents?
Copyright
what technological advancement in fiber optic cabling allows for multiple colors of light to be sent on the same strand of fiber?
Dense wavelength division multiplexing (DWDM)
which of the following floods a Website with so many requests for service from multiple computers that the Website slows down or crashes?
Distributed denial-of-service attacks (DDoS)
What says that you may use copyrighted material in certain situations — for example, in the creation of new work or, within certain limits, for teaching purposes?
Fair use doctrine
True or false: all HTML tags should be coded using lowercase letters
False
what would the webpage output look like if I added this line of code to an existing HTML document?
H^2
what are the two sections that should be included in every HTML document?
Head and body
a bus network:
Links a number of computers on a single circuit
what is a mathematically generated number that is unique for each individual storage medium at a specific point in time, because it's based on the contents of that medium?
MD5 hash value
The following message, "UIGETBSRA" is encrypted with which cipher?
Rail fence cipher
what is hiding information inside other information called?
Steganography
True or False. Line breaks included in the HTML code (caused by the programmer pressing the Enter key) are ignored when the HTML page is rendered.
True
True or false: HTML ignores spaces you have entered in the code
True
what is the set of clusters that have been set aside to store information, but have not yet received a file, or still contain some or all of a file marked as deleted?
Unallocated space
the volume or capacity of data that a channel can carry is referred to as:
bandwidth
decryption is the process of transforming _____ message back to _____ message
ciphertext, plain text
which of the following solves the line-of-sight problem?
communication satellites
what is the collection, authentication, preservation, and examination of electronic information for presentation in court?
computer forensics
why do computers need telecommunications protocols?
computers are "dumb" and don't know how to communicate, and computers need to communicate using a common "language"
what is a small record deposited on your hard disk by a Web site containing information about you and your web activities?
cookie
which might store electronic evidence?
digital cameras, backup tapes, answering machines, and photocopiers
which of the following has 8 wires bundled in twisted pairs? (optical fiber, coaxial, ethernet cable, phone line cable, BNC cable)
ethernet cable
what is hardware and/or software that protects computers from intruders?
firewall
microwave signals
follow a straight line and have been used for telecommunications between north and south campuses here at UB
which transmission direction is used in a toy walkie talkie?
half duplex
which networking device connects multiple computers in a network and broadcasts all messages to all computers on the network?
hub
which of the following is a random, secret value placed with the encryption algorithm to encrypt or decrypt messages?
key
what is not considered a biometric? (password, voice, fingerprint, retina)
password
what is the weakest link in computer security
people
what is the unauthorized use, duplication, distribution or sale of copyrighted software?
pirated software
what is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient?
public key encryption
which network typology generally requires the most network cable?
star
A modem:
translates digital signals to analog signals and vice versa
in the traffic highway analogy I used in class to explain telecommunications concepts, the speed limit represents ____ and the number of highway lanes represents _________
transmission rate, bandwidth
true or false: the ub web environment (where your personal webpages are stored) is case-sensitive
true
Who finds vulnerabilities in systems and often fixes the problems?
white-hat hackers
what is a type of virus that spreads itself, not just from file to file, but from computer to computer via e-mail and other internet traffic?
worm
If my username at UB is djmurray, what URL would take me to my homepage?
www.buffalo.edu/-djmurray