COSC 100 Final Review

Ace your homework & exams now with Quizwiz!

20 in base 10 is ________ in binary

0001 0100

33 in base 10 is ________ in binary

0010 0001

How many peripheral devices can be daisy-chained to one single USB port?

127

0000 1111 in binary is ________ in base 10

15

What is the minimum number of points you must receive on the final to get an A in this course?

160

Assume each audio sample is stored as two bytes and the sampling rate is 44,100 samples/second. What is the size of a 3 minute audio recording?

180 x 44100 x 2

The graphical user interface was invented for the Macintosh in what year?

1984

The binary number 1101 0001 is ________

209

If you posted something that was not true about a friend on Facebook, which of the computer ethical 10 commandments might you break ?

5

At least how many bits do we have to use in order to represent all of the common symbols on an American Keyboard with ASCII?

7

In HTML5 the ______________declaration instructs the web browser about what type of document follows.

<!DOCTYPE html>

If the opening is <body> what would the closing look like?

</body>

If the closing tag is </font> what would the opening look like?

<font>

What formula would you type in cell C2 ( instead of ?? ) if you wanted to add cells A2 and B2 and have the value of C2 change if A2 or B2 changes?

=A2 + B2

Who created one of the first compilers which lead to the development of the COBOL programming lanuage?

Admiral Grace Hopper

When searching the web for words DOG and CAT, the AND requires

BOTH words be on the page

Who helped sequence the first human genome?

Bonnie Berger

An early computing machine was an abacus - where was it invented?

China

A new way of storing massive amounts of data is to store it using the 4 building blocks of

DNA

Which of the following did NOT happen in Shirky's HERE COMES EVERYBODY story?

Facebook was used to recover the phone

Of the following compression methods for video, which is the newest?

H264

Which of the following includes both digital video connectors?

HDMI and DVI

Tags are keywords to make a webpage in ____________

HTML

The "language" that allows your computer to ask for a web page (ex: an HTML document) from another computer. __________ actually is a protocol.

HTTP

Who developed a machine to use punch cards in a census? The company founded eventually became part of of IBM?

Herman Hollerith

When a computer connects to the Internet it is assigned a(n) ____________ that is typically 32 bits, divided into four 8-bit groups, each group often written as a decimal number (ex. 198.51.100.7).

IP address

A compressed audio file is better to use on the internet since it is smaller. ________ is a type of a compressed audio file.

MP3

To get pages that have just one of several words, include _____ between the words.

OR

Which of the following are volatile?

RAM

Which of the following is not part of a CPU?

ROM

Which of the following is not an optical drive?

USB 3.0 multi-media card reader/writer

What is an Exabyte?

a billion gigabytes

What is a cell in a cellular network?

a smaller land area within a cellular network that contains a cell tower or base station

Flame wars can happen in:

all of the above

What can we learn from EPIC's request to FTC regarding Google Drive?

all of the above

Which of the following can make your computer more susceptible to Trojans?

all of the above

When violating UT policies, it may result in:

all of these answers

What would be printed by the following Python code? answer = 20 print('answer')

answer

In the computer, mathematical functions are done in the ________?

arithmetic logic unit (ALU)

Which language is NOT a high level programming language?

assembler

DNA storage does not use binary math. What number system does it use?

base 4

What is pervasive internet?

being able to log into the internet anywhere you go

Starting the computer and OS is called

booting

In this description of a processor: "Intel® Core™ i5-4440 Processor (4x 3.10GHz/6MB L3 cache), what does "3.10GHz" indicate?

clock speed

Which of the following types of server is not mentioned by Mr. Shewmake in the video?

content server

What unit contains a clock that acts like an electronic drummer?

control

Where should all email relating to this course be sent?

[email protected]

Which of the following is not a method to hide data?

create a hash for the file

The operating system communicates with the hardware via ______.

device drivers

A ____________ is an easy-to-remember name for an IP address, like utk.edu

domain name

A _________________is a company authorized to reserve domain names.

domain name server

Each time you connect to the Internet at UTK with your laptop, you most likely are given a ____________________.

dynamic IP address

Which of the following types of caching is used especially when users from another continent try to make a request to the web server?

edge

What can be used to create a LAN?

ethernet cables

A 1 byte memory location can store the number 999.

false

A browser is a hardware device on your computer used to view web pages.

false

A copyright lasts for 70 years.

false

A degree in computer science makes a person eligible to perform forensics and testify in court.

false

A frame rate and a sample rate are exactly the same.

false

A good web page has lots of animation, such as horses continually galloping across a screen.

false

A good web page should use subjective and powerful language, rather than neutral language.

false

A software is called a Malware if it has legitimate purpose but contains harmful bugs that were not corrected before release.

false

A swap file is located in main memory.

false

A typical computer screen has over 600 pixels per inch.

false

According to EPIC, when you use Google drive, the files you upload are private and Google will keep them that way at all times.

false

All robotic movements are done via hydraulic systems.

false

An assembler translates a high-level language program into low-level machine instructions.

false

Antivirus software removes all viruses, worms, trojans, spyware, an adware?

false

Because of privacy laws, companies cannot monitor employees computer usage at work.

false

CSS can be used to animate objects on a web page.

false

Ethics are laws protecting people. If it is unethical it is illegal.

false

IT IS APPROPRIATE TO TYPE ALL IN CAPITAL LETTERS FOR EMPHASIS.

false

If p is True and q is False, then ~p AND q is ____________

false

If p is True, then ~~~p is ________________?

false

If you like a song really well you may use the whole song for background to a slide show you create and put on your website for this class.

false

In the Arithmetic Logic Unit (ALU), the accumulator holds data to be processed and the registers hold results of arithmetic or logical operation.

false

In the TED talk "Data is the new soil" means that data is dirty and is corrupting us.

false

In the large commercial website discussed in lesson 9 it is acceptable to have up to a 3 second delay in a web page loading.

false

It is allowed to send group emails soliciting votes for your favorite candidate on UT networks.

false

It is illegal for employers to follow things you do on a company computer.

false

It would be legal to copy a short book to distribute to other students in the class for educational use. This helps make education affordable.

false

Just using Wifi (no other cabling/wires) you can connect from your house in the United States to Europe.

false

Narrow AI should exist within the next 50 years.

false

Once data is deleted on a computer or other device it can no longer be read by forensics

false

One large team of no more than 10 people are able to create and maintain the Scripps websites

false

ROM, cache, and registers are all volatile.

false

Renaming a file extension makes the data inaccessible to computer forensic specialists.

false

Sasha, the girl who kept Ivanna's phone, got arrested and imprisoned.

false

Ten bits make 1 byte.

false

The University of Tennessee allows students to download all music and videos for their own personal use.

false

The browser for the Dark Web is The Onion Router.

false

The first step in forensically copying a hard drive is to boot the computer to see how big the hard drive is and how much data is on it.

false

The time it takes to position the heads on a hard drive to the correct data is called the RPM.

false

The university can guarantee the privacy of files, emails, or confidential information stored or transmitted on UT IT resources.

false

Unless information on the web explicitly says it is copyrighted, it is free to use.

false

Viruses, worms, Trojans, spyware and adware can be detected and removed by anti-virus software.

false

We are able to analyze the majority of data gathered today.

false

Web Analytics can collect what browser a person is using - but cannot collect the page the person came from to get there.

false

When building a computer, buying a fast CPU and an older hard drive is a good way to save money without sacrificing speed.

false

When buying a computer, it is always better to get a CPU that is a lot faster than your hard disk.

false

You may always use up to 5 minutes of a copyrighted video on your own web site.

false

Your email at the University of Tennessee is private.

false

This type of cable is used to send internet transmissions across the oceans so the signal doesnt degrade

fiber optic

Which of the following is NOT on the motherboard of the computer?

flash drive

Which of the following are functions a computer can do?

input, loop

Rules that specifies how to communicate over the Internet and specifies what is included in a packet. Ex: The destination address must be provided first, followed by the size of the message, followed by the message.

internet protocol (IP)

Is the following HTML code valid or invalid? You must read <em><cite>A Tale of Two Cities</em></cite>, one of the best selling books of all time.

invalid

A type of image file that is commonly used on the web that uses lossy compression is:

jpg

Ubiquitous computing means

many computers for one person

What does 2133 indicate in"16GB[4GBx4]DDR3-2133" for RAM?

memory speed

Data about data are called

metadata

When restoring power to network devices, which ordering is recommended?

modem, router, PC

The maintenance team that maintains the large websites at Scripps consists of how many people?

more than 10

The internet is controlled by:

no one or everyone

Which of the following is not a computer professional's obligation?

none of the above

Which of the following is not a factor to consider for a video card?

none of the above

Which of the following statements about spyware is not correct?

none of the above

A piece of information routed through a computer network that contain information such as the data, data size, and destination address.

packet

Which program might be best used to EDIT the file myfile.jpg?

photoshop (image)

In the Data Visualization "Every single __________________ should testify directly to the content" Edward Tufte.

pixel

In a database, a unique identifier for a record is call the ________.

primary key

The most common criticism of ubiquitous computing is

privacy and lack of human interaction

Which of the following is not part of the codes of conduct for computer professionals?

professional attire

EPIC is an organization that

promotes online privacy and civil liberties

To search for an exact set of words, use

quotes " "

The usual configuration to create wifi at home is to connect a ___________ to the ISP's modem.

router

The outline that is traced when printing a 3D object is called a ________.

shell

The point where artificial intelligence passes human intelligence is the

singularity

Which of the following would search for the word "news" ONLY on the cnn.com website?

site:cnn.com news

This type of malware collects information about the computer secretly

spyware

Playing video directly from the Internet (such as from YouTube, Netflix, etc.) using a web browser or other app, without ever storing the video as a file on a device, is called

streaming

A 3D model that has an overhang of more than 45 degrees needs ________.

supports

Which type of bus moves things between the CPU and main memory?

system bus

HTML is made up of ____________

tags

The Turing Machine uses an infinitely long __________ consisting of cells

tape

How long did it take for Evan to find Ivanna's phone back after he first posted a webpage about it online?

ten days

This project created a "parts list" for humans

the human genome project

How does most of your information become public on the Internet?

the information is freely given by filling in forms etc on the web

In Shirky's book HERE COMES EVERYBODY the best choice for the main point of the story is that

the internet can be a powerful tool and aid in justice

What is bandwidth on the internet?

transmission capacity measured in bitrate

1 GHz would be faster than 1 MHz.

true

A 1-byte memory location can store the decimal number 250.

true

A CPU can access an item from cache faster than from RAM memory.

true

A barrier to DNA storage is the time it takes to synthesize and sequence the DNA.

true

A bus moves data on the motherboard from RAM to the CPU.

true

A computer program that cannot replicate itself should not be called 'virus'.

true

A computer worm does not need to attach itself to an existing program to spread.

true

A file might remain in the same location years after it has been deleted.

true

A good web page should be scannable.

true

A good web page will have fewer words than the same content in a written paper.

true

A hard drive can also contain cache memory to help speed up data retrieval

true

A hash code (ex md5) is use to make sure all bits of a hard drive are copied correctly?

true

A packet can be lost before arriving at the destination. In this case, the recipient will request a resend.

true

A text editor can be used to create a web page.

true

A virus is a computer program that can replicate itself and spread from one computer to another.

true

AEI is includes human emotions.

true

According to Commandment 4 of the Ten Commandments of Computer Ethics, stealing sensitive information or leaking confidential information is as good as robbery.

true

According to the "Netiquette Guidelines", it is seen as rude not to put your name at the bottom of an email.

true

According to the CDT, the US does not have a set of basic privacy laws for online.

true

After Lossless compression, it is possible that the original representation can be reproduced perfectly.

true

All computer software has bugs.

true

An integer number such as 40 would be stored differently in a computer than a decimal number such a 40.25.

true

Big Data may affect your privacy.

true

Bit is short for binary digit.

true

CSS is made up of rules. Rules are made up of selectors which are used to target HTML elements and declarations, which contain properties and values that the browser then uses to style the element.

true

CSS is used to control how the HTML looks.

true

Computer forensics experts can pull data (that people try to hide) off computers, CD's, DVD's, iPods, phones, etc.

true

Computer forensics is trying to find data that people are trying to hide.

true

Cookies and GUID are techniques for gathering information on computers.

true

DNA data storage will last longer than magnetic disk storage.

true

Data visualization can help change someone's mind by helping them engage with the information.

true

Digital information is represented as strings of bits.

true

Disabling cookies on your computer may help protect your privacy.

true

E-Discovery is used in civil cases as well as criminal ones.

true

Edge servers and caching help people browsing websites to receive the information (web page) faster.

true

Flaming is sending rude or offensive materials either via email or other form of messaging.

true

Food can be printed using a 3D printer.

true

For large websites, it is fairly common that a web page is written in more than one language.

true

Genome data is expanding faster than computer power.

true

Hyperlinks are used to connect web pages on the world wide web.

true

If p is True, then (p AND q) is only true if q is ___________

true

In a balloon race visualization the higher up the balloon the more data there is to support the idea being represented.

true

In most cases, the more RAM and cache in a computer, the faster the computer can process data.

true

It is a rule of thumb to assume that you are monitored at work.

true

It is thought that the 9/11 attacks used steganography to transmit data/messages.

true

It is unethical to hack passwords unless it is done against illegal use of computers.

true

L1 Cache is high speed memory that may be found on the CPU.

true

Raw digital video (before any type of compression) is a series of still images. The quality of video depends on the frame rate and the number of pixels.

true

Strong AI is where computers can think as well as humans and may be estimated to be about 30 years away

true

The communication etiquette that we follow in the real world applies to communication over computers as well. For example, we should be courteous and considerate with a novice computer user.

true

The internet was developed from the ARPANET, from a Department of Defense Project in the 1960's and 1970's.

true

The location of the person requesting the webpage can be monitored on a large website.

true

The part of the 3D printer where a thin stream of melted material comes out is an extrusion head.

true

The video card you put in the computer can impact the size of the power supply that you purchase for the computer.

true

There is a huge database of all known organisms.

true

USB, firewire, SATA, eSATA and SCSI are all different connection types for hard disk.

true

UT - Knoxville reserves the right to monitor everything you do on its computers and networks. You should have no expectation of privacy - even in your email.

true

UT Policy requires you to report any illegal use of computer / network services that goes against their policies.

true

Using a DVI port to a digital monitor prevents the conversion of the video signal to analog.

true

Visualization of data can help put data into context and uses patterns to help understand data.

true

Web analytics can be used to track ecommerce activities such as sales and performance.

true

Web analytics can track the time a person stays on a page.

true

When converting sound to digital representation, measurements are taken at regular intervals called samples.

true

While 800 homework points is used to calculate the grade - there are more homework points (extra credit) built into the course schedule.

true

A test for intelligence in a computer, requiring that a human being should be unable to distinguish the machine from another human being by using the replies to questions put to both.

turing test

Values stored by a program for later use are called ________.

variables

What are the 3 V's of Big Data?

volume, velocity, variety

A __________is a program that pre-visits web pages to build an index. It goes to known web pages, and then follows those pages' links to other pages, following those pages' links, etc., like a spider moves around a spider web, updating the index information

web crawler

Which of the following tools on the internet is not used by Evan in the story "It takes a village".

www.myblog.com

Would the following Python code create an error? print('My Answer")

yes


Related study sets

Week 12: Measurement and Data Collection

View Set

Ch 35 NC of Pts with Liver, Pancreatic, and Gallbladder Diseases

View Set

This is for English 2 answers lol

View Set

Firearms, Tool Marks, and Explosives

View Set