Final exam review quiz answers

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

what is the correct HTML syntax for inserting an image?

<img src="image.gif" alt="logo" />

which tag allows you to make a list that lists the items bullet points?

<ul>

1-800-FREE-MSN is an example of:

A substitution cipher

which operating system is safe from attacks?

All operating systems are vulnerable to attack

which of the following lists the networking devices in order of intelligence from "dumb" to "smart"?

Hub, switch, router

what looks for people on the network who shouldn't be there or who are acting suspiciously?

Intrusion-detection software

how would you classify the computer lab network in the room you have recitation?

LAN

Wired media is also called _______ media and wireless media is also called _______ media.

bounded and unbounded

who would like to be hackers, but don't have much technical experience?

script kiddies

a place or places where files or file remnants could be found include

slack space, unallocated disk space, and unused disk space

which of the following is a relative link?

<a href="../docs/page1.html">Page 1</a>

what is the correct HTML syntax for making a hyperlink?

<a href="http://www.buffalo.edu">UB</a>

what is the correct HTML syntax for making an email link?

<a href="mailto:[email protected]">

what is the correct html tag for inserting a line break?

<br />

what is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents?

Copyright

what technological advancement in fiber optic cabling allows for multiple colors of light to be sent on the same strand of fiber?

Dense wavelength division multiplexing (DWDM)

which of the following floods a Website with so many requests for service from multiple computers that the Website slows down or crashes?

Distributed denial-of-service attacks (DDoS)

What says that you may use copyrighted material in certain situations — for example, in the creation of new work or, within certain limits, for teaching purposes?

Fair use doctrine

True or false: all HTML tags should be coded using lowercase letters

False

what would the webpage output look like if I added this line of code to an existing HTML document?

H^2

what are the two sections that should be included in every HTML document?

Head and body

a bus network:

Links a number of computers on a single circuit

what is a mathematically generated number that is unique for each individual storage medium at a specific point in time, because it's based on the contents of that medium?

MD5 hash value

The following message, "UIGETBSRA" is encrypted with which cipher?

Rail fence cipher

what is hiding information inside other information called?

Steganography

True or False. Line breaks included in the HTML code (caused by the programmer pressing the Enter key) are ignored when the HTML page is rendered.

True

True or false: HTML ignores spaces you have entered in the code

True

what is the set of clusters that have been set aside to store information, but have not yet received a file, or still contain some or all of a file marked as deleted?

Unallocated space

the volume or capacity of data that a channel can carry is referred to as:

bandwidth

decryption is the process of transforming _____ message back to _____ message

ciphertext, plain text

which of the following solves the line-of-sight problem?

communication satellites

what is the collection, authentication, preservation, and examination of electronic information for presentation in court?

computer forensics

why do computers need telecommunications protocols?

computers are "dumb" and don't know how to communicate, and computers need to communicate using a common "language"

what is a small record deposited on your hard disk by a Web site containing information about you and your web activities?

cookie

which might store electronic evidence?

digital cameras, backup tapes, answering machines, and photocopiers

which of the following has 8 wires bundled in twisted pairs? (optical fiber, coaxial, ethernet cable, phone line cable, BNC cable)

ethernet cable

what is hardware and/or software that protects computers from intruders?

firewall

microwave signals

follow a straight line and have been used for telecommunications between north and south campuses here at UB

which transmission direction is used in a toy walkie talkie?

half duplex

which networking device connects multiple computers in a network and broadcasts all messages to all computers on the network?

hub

which of the following is a random, secret value placed with the encryption algorithm to encrypt or decrypt messages?

key

what is not considered a biometric? (password, voice, fingerprint, retina)

password

what is the weakest link in computer security

people

what is the unauthorized use, duplication, distribution or sale of copyrighted software?

pirated software

what is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient?

public key encryption

which network typology generally requires the most network cable?

star

A modem:

translates digital signals to analog signals and vice versa

in the traffic highway analogy I used in class to explain telecommunications concepts, the speed limit represents ____ and the number of highway lanes represents _________

transmission rate, bandwidth

true or false: the ub web environment (where your personal webpages are stored) is case-sensitive

true

Who finds vulnerabilities in systems and often fixes the problems?

white-hat hackers

what is a type of virus that spreads itself, not just from file to file, but from computer to computer via e-mail and other internet traffic?

worm

If my username at UB is djmurray, what URL would take me to my homepage?

www.buffalo.edu/-djmurray


Set pelajaran terkait

Methods of Strength and Conditioning Final Review

View Set

Strategic Mgt. Final Study Gudie Q1-80

View Set

Dose Constraints, Treatment Schemes, Treatment Machine/Procedures Designs and QA

View Set

Deweys reflective thinking process

View Set

Chapter 6: The Integumentary System

View Set

Govt: Chapter 8 Political Parties

View Set