COSC100 Final 2019 (Holt, UTK)
20 in base 10 is ________ in binary a. 0001 0000 b. 0000 0000 c. 0001 0100 d. 0010 1010
0001 0100
33 in base 10 is ________ in binary a. 0010 0001 b. 0011 1111 c. 1100 0001 d. 0110 0000
0010 0001
How long did it take for Evan to find Ivanna's phone back after he first posted a webpage about it online? a. a week b. ten days c. more than a month d. two weeks
10 days
How many peripheral devices can be daisy-chained to one single USB port? a. 255 b. 127 c. 128 d. 256
127
0000 1111 in binary is ________ in base 10 a. 15 b. 11 c. 19 d. 21
15
What is the minimum number of points you must receive on the final to get an A in this course?
160
Assume each audio sample is stored as two bytes and the sampling rate is 44,100 samples/second. What is the size of a 3 minute audio recording? a. 120 x 44100 x 3 b. 180 x 44100 x 2 c. 3 x 44100 x 2 d. 3 x 22000 x 2
180 x 44100 x 2
The graphical user interface was invented for the Macintosh in what year? a. 1984 b. 2001 c. 1975 d. 1992
1984
In Python, what would be the output of the following code assuming each year printed was on the same line? leapYear = 2016 for i in range(1, 4): print(leapYear) leapYear = leapYear + 4 a. 2016 2020 2024 2028 b. 2016 2020 2024 c. 2020 2024 2028 d. 2020 2024 2028 2032
2016 2020 2024
The binary number 1101 0001 is ________ a. 64 b. 209 c. 310 d. 311
209
If you posted something that was not true about a friend on Facebook, which of the computer ethical 10 commandments might you break? a. 6 b. 5 c. 7 d. 8
5
At least how many bits do we have to use in order to represent all of the common symbols on an American Keyboard with ASCII? a. 6 b. 10 c. 16 d. 7
7
In HTML5 the ______________declaration instructs the web browser about what type of document follows. a. <title> b. <body> c. <!DOCTYPE html> d. <html>
<!DOCTYPE html>
If the opening is <body> what would the closing look like? a. </body> b. <quit body> c. <exit body> d. <end body>
</body>
If the closing tag is </font> what would the opening look like? a. <text font="body"> b. <open font> c. <font> d. <begin font>
<font>
What formula would you type in cell C2 ( instead of ?? ) if you wanted to add cells A2 and B2 and have the value of C2 change if A2 or B2 changes? A B C D 1 10 15 25 30 2 20 25 ?? 60 3 5 10 15 20 a. 45 b. A2 + B2 c. =A2 + B2 d. =A2:B2
=A2 + B2
What is a cell in a cellular network? a. A smaller land area within a cellular network that contains a cell tower or base station b. a fiber optic network c. a radio wave d. a part of the body that receives radio waves
A smaller land area within a cellular network that contains a cell tower or base station
Who created one of the first compilers which lead to the development of the COBOL programming language? a. Herman Hollerith b. Teddy Roosevelt c. Admiral Grace Hopper d. Alan Turning
Admiral Grace Hopper
Flame wars can happen in a. e-mails b. social media c. personal blogs d. all of the above
All of the above
What can we learn from EPIC's request to FTC regarding Google Drive? a. All of the above. b. Google may disclose documents you created and saved on Google Docs to users who lack the permission to view the file. c. It is good habit to read Terms of Service. d. Google may permit unauthorized individuals to access the files you created and saved on Google Docs.
All of the above
When violating UT policies, it may result in: a. All of the above b. Legal action c. Disciplinary review d. Expulsion
All of the above
Which of the following can make your computer more susceptible to Trojans? a. All of the above b. Play online games c. Download from an unknown source d. Use internet-driven applications
All of the above
In the computer, mathematical functions are done in the ________? a. Control Unit b. RAM c. Hard Drive d. Arithmetic Logic Unit (ALU)
Arithmetic Logic Unit (ALU)
Which language is NOT a high level programming language? a. Assembler b. Python c. C++ d. Fortran
Assembler
When searching the web for words DOG and CAT, the AND requires a. none of the above b. BOTH words be on the page c. the words are not on the page d. either word should be on the page
BOTH words be on the page
Who helped sequence the first human genome? a. Bonnie Berger b. Alan Turing c. Bill Gates d. Mark Weiser
Bonnie Berger
Starting the computer and OS is called a. Booting b. RAM c. Kernel d. USB
Booting
An early computing machine was an abacus - where was it invented? a. China b. France c. India d. United States
China
Which of the following types of server is not mentioned by Mr. Shewmake in the video? a. Database server b. Application server c. Video server d. Content server
Content server
Which of the following is not a method to hide data? a. Change the file extension b. Move a file into system folders c. Delete a file d. Create a hash for the file
Create a hash for the file
A new way of storing massive amounts of data is to store it using the 4 building blocks of... a. RAM b. DNA c. Excel d. Hard drives
DNA
What can be used to create a LAN? a. CPU b. monitor c. RAM d. Ethernet cables
Ethernet cables
Which of the following did NOT happen in Shirky's HERE COMES EVERYBODY story? a. Ivana got her phone back eventually b. the police got involved to help get the phone back c. Ivana lost her phone in a cab d. Facebook was used to recover the phone
Facebook was used to recover the phone
A 1 byte memory location can store the number 999. (T/F)
False
A browser is a hardware device on your computer used to view web pages. (T/F)
False
A copyright lasts for 70 years. (T/F)
False
A degree in computer science makes a person eligible to perform forensics and testify in court. (T/F)
False
A frame rate and a sample rate are exactly the same. (T/F)
False
A good web page has lots of animation, such as horses continually galloping across a screen. (T/F)
False
A good web page should use subjective and powerful language, rather than neutral language. (T/F)
False
A software is called a Malware if it has legitimate purpose but contains harmful bugs that were not corrected before release. (T/F)
False
A swap file is located in main memory. (T/F)
False
A typical computer screen has over 600 pixels per inch. (T/F)
False
According to EPIC, when you use Google drive, the files you upload are private and Google will keep them that way at all times. (T/F)
False
All robotic movements are done via hydraulic systems. (T/F)
False
An assembler translates a high-level language program into low-level machine instructions. (T/F)
False
Antivirus software removes all viruses, worms, trojans, spyware, an adware? (T/F)
False
Because of privacy laws, companies cannot monitor employees computer usage at work. (T/F)
False
CSS can be used to animate objects on a web page. (T/F)
False
Ethics are laws protecting people. If it is unethical it is illegal. (T/F)
False
IT IS APPROPRIATE TO TYPE ALL IN CAPITAL LETTERS FOR EMPHASIS. (T/F)
False
If p is True and q is False, then ~p AND q is ____________ (T/F)
False
If p is True, then ~~~p is ________________? (T/F)
False
If you like a song really well you may use the whole song for background to a slide show you create and put on your website for this class. (T/F)
False
In the Arithmetic Logic Unit (ALU), the accumulator holds data to be processed and the registers hold results of arithmetic or logical operation. (T/F)
False
In the TED talk "Data is the new soil" means that data is dirty and is corrupting us. (T/F)
False
In the large commercial website discussed in lesson 9 it is acceptable to have up to a 3 second delay in a web page loading. (T/F)
False
It is illegal for employers to follow things you do on a company computer.
False
It would be legal to copy a short book to distribute to other students in the class for educational use. This helps make education affordable. (T/F)
False
Just using Wifi (no other cabling/wires) you can connect from your house in the United States to Europe (T/F)
False
Narrow AI should exist within the next 50 years. (T/F)
False
Once data is deleted on a computer or other device it can no longer be read by forensics. (T/F)
False
One large team of no more than 10 people are able to create and maintain the Scripps websites. (T/F)
False
ROM, cache and registers are all volatile. T/F
False
Renaming a file extension makes the data inaccessible to computer forensic specialists. (T/F)
False
Sasha, the girl who kept Ivanna's phone, got arrested and imprisoned. (T/F)
False
Ten bits make 1 byte. (T/F)
False
The University of Tennessee allows students to download all music and videos for their own personal use. (T/F)
False
The first step in forensically copying a hard drive is to boot the computer to see how big the hard drive is and how much data is on it. (T/F)
False
The time it takes to position the heads on a hard drive to the correct data is called the RPM. (T/F)
False
The university can guarantee the privacy of files, emails, or confidential information stored or transmitted on UT IT resources. (T/F)
False
Unless information on the web explicitly says it is copyrighted, it is free to use. (T/F)
False
Viruses, worms, Trojans, spyware and adware can be detected and removed by anti-virus software. (T/F)
False
We are able to analyze the majority of data gathered today. (T/F)
False
Web Analytics can collect what browser a person is using - but cannot collect the page the person came from to get there. (T/F)
False
When building a computer, buying a fast CPU and an older hard drive is a good way to save money without sacrificing speed. (T/F)
False
When buying a computer, it is always better to get a CPU that is a lot faster than your hard disk. (T/F)
False
You may always use up to 5 minutes of a copyrighted video on your own web site. (T/F)
False
Your email at the University of Tennessee is private. (T/F)
False
Which of the following is NOT on the motherboard of the computer? a. Flash Drive b. RAM c. ROM d. Expansion slots
Flash drive
Of the following compression methods for video, which is the newest? a. mpeg b. mp4 c. mp3 d. H264
H264
Which of the following includes both digital video connectors? a. composite and S-video b. DVI and composite c. HDMI and DVI d. VGA and HDMI
HDMI and DVI
Tags are keywords to make a webpage in ____________ a. HTML b. hexidecimal codes c. RGB d. RAM
HTML
The "language" that allows your computer to ask for a web page (ex: an HTML document) from another computer. __________ actually is a protocol. a. MAC protocol b. HTTP c. USB d. port protocol (PP)
HTTP
Who developed a machine to use punch cards in a census? The company founded eventually became part of of IBM? a. Steve Jobs b. Herman Hollerith c. Bill Gates d. Charles Babbage
Herman Hollerith
Rules that specifies how to communicate over the Internet and specifies what is included in a packet. Ex: The destination address must be provided first, followed by the size of the message, followed by the message. a. memory b. MAC c. Transmission Address d. Internet Protocol (IP)
IP (Internet Protocol)
When a computer connects to the Internet it is assigned a(n) ____________ that is typically 32 bits, divided into four 8-bit groups, each group often written as a decimal number (ex. 198.51.100.7). a. its file number (FP). b. IP Address c. House number address d. Modem
IP address
Which of the following are functions a computer can do? a. input, recycle b. input, loop c. output, recycle d. recycle. stop
Input/loop
Is the following HTML code valid or invalid? You must read <em><cite>A Tale of Two Cities</em></cite>, one of the best selling books of all time.
Invalid
Ubiquitous computing means a. One computer for many people b. Many computers for one person c. One computer for one person
Many computers for one person
Data about data are called a. Data paths b. Metadata c. Data images d Databases
Metadata
It is allowed to send group emails soliciting votes for your favorite candidate on UT networks. (T/F)
No, False
Which of the following is not a computer professional's obligation? a. Protect data with backup procedures b. Protect data from prying eyes c. Notify authorities of certain illegal activities on the internet d. None of the above
None of the above
Which of the following is not a factor to consider for a video card? a. None of the above b. memory c. power usage d. speed
None of the above
Which of the following statements about spyware is not correct? a. Spyware can result in slow internet connections. b. None of the above. c. Spyware can be used by the owner of a public computer to monitor users. d. Spyware can change computer settings, browser settings or software settings
None of the above
To get pages that have just one of several words, include _____ between the words. a. OR b. "or" c. AND d. nothing
OR
A piece of information routed through a computer network that contain information such as the data, data size, and destination address. a. Router b. Packet c. Modem d. Envelope
Packet
Which program might be best used to EDIT the file myfile.jpg? a. Photoshop (image) b. Excel (spreadsheet) c. Notepad (text) d. Microsoft Access (database processing)
Photoshop
Which of the following is not part of the codes of conduct for computer professionals? a. Safety first b. Professional attire c. Professional responsibility d. Professional competence
Professional attire
Which of the following are volatile? a. Flash Drive b. ROM c. RAM d. Hard Drive
RAM
Which of the following is not part of a CPU? a. Control Unit b. on-chip cache c. ALU d. ROM
ROM
This type of malware collects information about the computer secretly a. spyware b. trojan horse c. virus d. worm
Spyware
Playing video directly from the Internet (such as from YouTube, Netflix, etc.) using a web browser or other app, without ever storing the video as a file on a device, is called a. playback b. buffering c. streaming d. downloading
Streaming
Which type of bus moves things between the CPU and main memory? a. Internal bus b. Serial bus c. System bus d. Extension bus
System bus
HTML is made up of ____________ a. Tags b. RAM c. hexidecimal codes d. RGB
Tags
In Shirky's book HERE COMES EVERYBODY the best choice for the main point of the story is that a. cell phones should always be password protected for security's sake b. the Internet can be a powerful tool and aid in justice c. technology is advancing and cell phones are the wave of the future d. Cab drivers should clean out their cabs after each customer
The Internet can be a powerful took and aid in justice
How does most of your information become public on the Internet? a. most information is gathered by secret programs that companies put on your computer b. bad programs such as viruses collect information about you without your knowledge c. The information is freely given by filling in forms etc on the web d. none of the other answers
The information is freely given by filling in forms etc on the web
What is bandwidth on the internet? a. how wide the transmission band is b. Transmission capacity measured in bitrate c. the number of electrons moving over a wire measured in ohms d. transmission capacity measured in volts
Transmission capacity measured in bitrate
1 GHz would be faster than 1 MHz. (T/F)
True
A 1-byte memory location can store the decimal number 250. (T/F)
True
A CPU can access an item from cache faster than from RAM memory. (T/F)
True
A barrier to DNA storage is the time it takes to synthesize and sequence the DNA. (T/F)
True
A bus moves data on the motherboard from RAM to the CPU. (T/F)
True
A computer program that cannot replicate itself should not be called 'virus'. (T/F)
True
A computer worm does not need to attach itself to an existing program to spread. (T/F)
True
A file might remain in the same location years after it has been deleted. (T/F)
True
A good web page should be scannable. (T/F)
True
A good web page will have fewer words than the same content in a written paper. (T/F)
True
A hard drive can also contain cache memory to help speed up data retrieval. (T/F)
True
A hash code (ex md5) is use to make sure all bits of a hard drive are copied correctly? (T/F)
True
A packet can be lost before arriving at the destination. In this case, the recipient will request a resend. (T/F)
True
A text editor can be used to create a web page. (T/F)
True
A virus is a computer program that can replicate itself and spread from one computer to another. (T/F)
True
AEI is includes human emotions. (T/F)
True
According to Commandment 4 of the Ten Commandments of Computer Ethics, stealing sensitive information or leaking confidential information is as good as robbery. (T/F)
True
According to the "Netiquette Guidelines", it is seen as rude not to put your name at the bottom of an email. (T/F)
True
According to the CDT, the US does not have a set of basic privacy laws for online. (T/F)
True
After Lossless compression, it is possible that the original representation can be reproduced perfectly. (T/F)
True
All computer software has bugs. (T/F)
True
An integer number such as 40 would be stored differently in a computer than a decimal number such a 40.25. (T/F)
True
Big Data may affect your privacy. (T/F)
True
Bit is short for binary digit. (T/F)
True
CSS is made up of rules. Rules are made up of selectors which are used to target HTML elements and declarations, which contain properties and values that the browser then uses to style the element. (T/F)
True
CSS is used to control how the HTML looks. (T/F)
True
Computer forensics experts can pull data (that people try to hide) off computers, CD's, DVD's, iPods, phones, etc. (T/F)
True
Computer forensics is trying to find data that people are trying to hide. (T/F)
True
Cookies and GUID are techniques for gathering information on computers. (T/F)
True
DNA data storage will last longer than magnetic disk storage. (T/F)
True
Data visualization can help change someone's mind by helping them engage with the information. (T/F)
True
Digital information is represented as strings of bits. (T/F)
True
Disabling cookies on your computer may help protect your privacy. (T/F)
True
E-Discovery is used in civil cases as well as criminal ones. (T/F)
True
Edge servers and caching help people browsing websites to receive the information (web page) faster. (T/F)
True
Flaming is sending rude or offensive materials either via email or other form of messaging. (T/F)
True
Food can be printed using a 3D printer. (T/F)
True
For large websites, it is fairly common that a web page is written in more than one language. (T/F)
True
Genome data is expanding faster than computer power. (T/F)
True
Hyperlinks are used to connect web pages on the world wide web. (T/F)
True
If p is True, then (p AND q) is only true if q is ___________ (T/F)
True
In a balloon race visualization the higher up the balloon the more data there is to support the idea being represented. (T/F)
True
In most cases, the more RAM and cache in a computer, the faster the computer can process data. (T/F)
True
It is a rule of thumb to assume that you are monitored at work. (T/F)
True
It is thought that the 9/11 attacks used steganography to transmit data/messages. (T/F)
True
It is unethical to hack passwords unless it is done against illegal use of computers. (T/F)
True
L1 Cache is high speed memory that may be found on the CPU. (T/F)
True
Raw digital video (before any type of compression) is a series of still images. The quality of video depends on the frame rate and the number of pixels. (T/F)
True
Strong AI is where computers can think as well as humans and may be estimated to be about 30 years away. (T/F)
True
The browser for the Dark Web is The Onion Router. (T/F)
True
The communication etiquette that we follow in the real world applies to communication over computers as well. For example, we should be courteous and considerate with a novice computer user. (T/F)
True
The internet was developed from the ARPANET, from a Department of Defense Project in the 1960's and 1970's. (T/F)
True
The location of the person requesting the webpage can be monitored on a large website. (T/F)
True
The part of the 3D printer where a thin stream of melted material comes out is an extrusion head. (T/F)
True
The video card you put in the computer can impact the size of the power supply that you purchase for the computer. (T/F)
True
There is a huge database of all known organisms. (T/F)
True
USB, firewire, SATA, eSATA and SCSI are all different connection types for hard disk. (T/F)
True
UT - Knoxville reserves the right to monitor everything you do on its computers and networks. You should have no expectation of privacy - even in your email. (T/F)
True
UT Policy requires you to report any illegal use of computer / network services that goes against their policies. (T/F)
True
Using a DVI port to a digital monitor prevents the conversion of the video signal to analog. (T/F)
True
Visualization of data can help put data into context and uses patterns to help understand data. (T/F)
True
Web analytics can be used to track ecommerce activities such as sales and performance. (T/F)
True
Web analytics can track the time a person stays on a page. (T/F)
True
When converting sound to digital representation, measurements are taken at regular intervals called samples. (T/F)
True
While 800 homework points is used to calculate the grade - there are more homework points (extra credit) built into the course schedule. (T/F)
True
A test for intelligence in a computer, requiring that a human being should be unable to distinguish the machine from another human being by using the replies to questions put to both. a. Super AI Test b. Turing Test c. Humanistic Test d. Big Bang Test
Turing Test
Which of the following is not an optical drive? a. Blue-Ray Re-Writer b. CD-RW drive c. USB 3.0 Multi-Media Card Reader/Writer d. DVD-RW Burner
USB Flash Media Card Reader/Writer
Would the following Python code create an error? print('My Answer") (Y/N)
Yes
What is an Exabyte? a. a million gigabytes b. a million megabytes c. two gigabytes d. a billion gigabytes
a billion gigabytes
What would be printed by the following Python code? answer = 20 print('answer')
answer
Where should all email relating to this course be sent? a. TA's b. [email protected] c. the instructor d. none of these answers
DNA storage does not use binary math. What number system does it use? a. hexadecimal b. decimal c. base 4 d. octal
base 4
What is pervasive internet? a. internet that sings a song b. be able to log into the internet anywhere you go c. internet that is totally private d. internet that costs
be able to log into the internet anywhere you go
In this description of a processor: "Intel® Core™ i5-4440 Processor (4x 3.10GHz/6MB L3 cache), what does "3.10GHz" indicate? a. clock speed b. graphics speed c. number of cores d. cache size
clock speed
What unit contains a clock that acts like an electronic drummer? a. Hard disk b. RAM c. Control d. Register
control
The operating system communicates with the hardware via ______. a. device drivers b. pdf files c. modem d. document files
device drivers
In web analytics, device type, browser, or geographic location of a visitor may be called a ______________________ a. URL b. dimension c. locator item d. dimetric
dimension
A ____________ is an easy-to-remember name for an IP address, like utk.edu a. domain name b. browser name c. packet name d. USB name
domain name
A _________________is a company authorized to reserve domain names. a. domain name registrar b. the US government reservation system c. domain name server d. a url registration company
domain name registrar
Each time you connect to the Internet at UTK with your laptop, you most likely are given a ____________________. a. static IP address b. a new MAC address c. a wifi address d. dynamic IP address
dynamic IP adress
Which of the following types of caching is used especially when users from another continent try to make. a. Memory b. File c. Browser d. Edge
edge
This type of cable is used to send internet transmissions across the oceans so the signal doesn't degrade. a. plastic tubing b. phone wire c. fiber optic d. copper wire
fiber optic
A type of image file that is commonly used on the web that uses lossy compression is: a. gif b. png c. bmp d. jpeg
jpeg
What does 2133 indicate in"16GB[4GBx4]DDR3-2133" for RAM? a. memory speed b. size of memory c. CPU clock speed d. number of memory modules
memory speed
When restoring power to network devices, which ordering is recommended? a. router, modem, PC b. modem,PC, router c. modem, router, PC d. PC, modem, router
modem, router, PC
The maintenance team that maintains the large websites at Scripps consists of how many people? a. 1 b. 5 c. more than 10 d. 3
more than 10
A compressed audio file is better to use on the internet since it is smaller. ________ is a type of a compressed audio file. a. zip b. png c. mp3 d. wav
mp3
The internet is controlled by: a. The government b. No one or everyone c. Bill Gates d. Al Gore
no one or everyone
In the Data Visualization "Every single __________________ should testify directly to the content" Edward Tufte. a. square b. number c. pixel d. point
pixel
In a database, a unique identifier for a record is call the ________. a. access value b. the name c. primary key d. index value
primary key
The most common criticism of ubiquitous computing is a. cheating in school b. driving hazard c. privacy and lack of human interaction d. electric power used
privacy and lack of human interaction
EPIC is an organization that a. promotes online (electronic) privacy and civil liberties b. covers the magnitude of epic earthquakes and storms on the web c. none of the other answers d. handles the spread of online virus epidemics
promotes online (electronic) privacy and civil liberties
To search for an exact set of words, use... a. colon : b. quotes " " c. two periods without space .. d. asterisk *
quotes " "
The usual configuration to create wifi at home is to connect a ___________ to the ISP's modem. a. keyboard b. mouse c. monitor d. router
router
The outline that is traced when printing a 3D object is called a ________. a. layer b. shell c. infill d. density
shell
The point where artificial intelligence passes human intelligence is the... a. big data b. super blast c. singularity d. big bang
singularity
Which of the following would search for the word "news" ONLY on the cnn.com website? a. site:cnn.com news b. site:cnn.com c. cnn.com AND news d. cnn.com news
site:cnn.com news
A 3D model that has an overhang of more than 45 degrees needs ________. a. supports b. layers c. rafts d. density
supports
The Turing Machine uses an infinitely long __________ consisting of cells a. flash drive b. hard drive c. tape d. punch card
tape
This project created a "parts list" for humans a. Project X b. The human genome project c. The Vandergriff project d. Project G
the human genome project
Values stored by a program for later use are called ________. a. answers b. kernels c. variables d. memories
variables
What are the 3 V's of Big Data? a. Volume, Velocity, Variance b. Variety, Variables, Volume c. Variance, Variety, Volume d. Volume, Velocity, Variety
volume, velocity, variety
A __________ is a program that pre-visits web pages to build an index. It goes to known web pages, and then follows those pages' links to other pages, following those pages' links, etc., like a spider moves around a spider web, updating the index information a. Spyder me b. spider app c. Web accessor d. Web Crawler
web crawler
Which of the following tools on the internet is not used by Evan in the story "It takes a village". a. www.myblog.com b. personal website c. Bulletin Board Service/System d. Digg -- a collaborative news website
www.myblog.com