CS 1030 final exam

Ace your homework & exams now with Quizwiz!

What is a hacker?

A programmer with a high skill level

Which of the following is NOT a LAN typology?

Coaxial

The Internet is owned by:

No one

What are switching centers maintained by Internet providers called?

Point of presence

What important concept was attributed to Ada Lovelace?

The program loop

A database is divided into tables.

True

Which of the following is NOT a bus signal group?

fetch

Organize the steps for making a database.

1. investigate 2. make a master column list 3. create tables 4. work on relationships 5. analyze design 6. re-eveluate

What is the standard port number for HTTP?

80

Which of the following attack types match this description: Attack on a system that can include snooping, eavesdropping, and interception?

Access

Who was the first programmer?

Ada Lovelace

What are the 4 basic functions implemented in the CPU?

Adding, decoding, shifting, and storing

In 1642 Pascal created a mechanical device with gears and levers. The device was capable of what kinds of calculation?

Addition and subtraction

Who is the father of modern computers?

Alan Turing

Name the 4 important elements of Babbage's Analytical Engine that are components of today's computers.

An input device, memory, a central processing unit, and an output device

Which OSI level is responsible for giving applications access to the network?

Application

What factor reduces the strength of an electrical signal as it travels along a transmission medium?

Attenuation

The _____ contains instructions and data that provide the startup program for a computer.

BIOS

What logical elements did Charles Sanders Peirce realize electrical switches could emulate in 1880?

Boolean algebra

Which networking hardware is used for allowing only specific network traffic through, based on destination address?

Bridge

Who is the father of the computer?

Charles Babbage

Which of the following converts source code into computer language and results in an executable file?

Compiler

Which of the following protocols is responsible for assigning IP addresses to services?

DHCP

Which network device is used to resolve domain names into IP addresses?

DNS servers

Which OSI level is responsible for physical addressing, data error notification, ordered delivery of frames and flow control?

Data-link

Which of the following attack types match this description: Attacks that prevents legitimate users from using the system or accessing the information?

Denial of Service

What is the set of possible value for a column called?

Domain

What important pastry helped move your job up in the queue in second generation software, and what third generation software development made that pastry unnecessary?

Donuts and time-sharing

What does First Normal Form state?

Eliminate repeated fields.

What does Third Normal Form state?

Every column that's not part of the primary key is fully dependent on the primary key.

Computer security affects:

Everyone

DSL is a combination of what two types of multiplexing?

FDM and TDM

Which of the following protocols is responsible for reliable file transfer between computers?

FTP

By default, data returned by the SQL SELECT statement is in descending order.

False

Pseudo code should be written after the source code to ensure that the program was written correctly.

False

The internet is a collection of LANS and WLANS.

False

Which type of guided medium is the least susceptible to attention and inductance?

Fiber-optic cable

What does FDM stand for?

Frequency-division multiplexing

Who is responsible for coming up with the concepts of a compiler and debugging?

Grace Hopper

Which of the following is NOT an innovation that belongs to the Third Generation of Computing?

Graphical user interfaces

What is the language of the World Wide Web?

HTML

Which of the following protocols is responsible for sending and receiving data on the web?

HTTP

Why are we switching from IPv4 to IPv6?

IPv6 has more addresses than IPv4.

Which of the following is NOT an innovation that belongs to the Fifth Generation of Computing?

Internet

Which of the following translates a program's statements, one by one, into a language the computer can understand?

Interpreter

Which type of I/O processing is most efficient?

Interrupt

How does a WLAN differ from a LAN?

It uses unguided media

Which of the following attack types match this description: Attack on a system that alter information illicitly?

Modification

Which of the following is NOT a part of a transistor?

Modulator

Leibniz built on pascal's work by creating the Leibniz Wheel. This device was capable of what kind of calculations in addition to the ones Pascal's could do?

Multiplication and division

What is a circuit board that connects a network to the system bus and converts a computer's binary information into a format suitable for the transmission medium called?

NIC

What does NBP stand for?

National Backbone Provider

What does Second Normal Form state?

No nonkey columns depend on another non key column.

Most computers these days use the _____ bus

PCI

What uniquely identifies a row in a table?

Primary key

Which type of memory can't be easily written to?

ROM

Which networking hardware is used for amplifying signals on long cables between nodes?

Repeater

Which of the following attack types match this description: Attacks on a system that injure information's reliability?

Repudiation

The Jacquard loom is important in the history of computing for what innovation?

Reusable cards with holes held information.

Which of the following is NOT an innovation that belongs to the First Generation of Computing?

Rotating drum storage

Which of the following protocols is responsible for sending email?

SMTP

Which topology became popular due to the Internet and home networking?

Star

Which of the following protocols is responsible for reliable delivery of data between computers?

TCP/IP

Which of the following protocols maintains port information?

TCP/IP

Which of the following protocols manages sequencing data packets?

TCP/IP

What prevents TCP/IP packets from bouncing from router to router forever?

TTL

What is the likely motivation of an undirected cracker?

Technical challenge

The Apple computer became very popular. What was its largest market, and what software made it interesting to that market?

The business market and the program VisiCalc

What important concept is attributed to John von Neumann?

The stored program concept

What features of transistors made them superior for computers, compared with vacuum tubes?

They were cheaper, smaller, and cooler than tubers and lasted longer.

What does TDM stand for?

Time-division multiplexing

What is the legal protection usually sought for software source code?

Trade secret

Which of the following malicious code names match the description: A program that poses as an innocent program?

Trojan

The term "script kiddie" refers to what?

Unsophisticated cracker

What is a name used to identify a specific location and value in memory?

Variable

What are most computers today based on?

Von Neumann Architecture

Which of the following is NOT an innovation that belongs to the Second Generation of Computing?

Von Neumann architecture

Which of the following is NOT an innovation that belongs to the Fourth Generation of Computing?

World Wide Web

Which of the following malicious code names match the description: A type of bot that can roam a network looking for vulnerable systems and replicate itself on those systems?

Worm

What is the computer science term for a logically ordered set of statements used to solve a problem?

algorithm

A _____ is computer terminology is a set of wires and protocols designed to facilitate data transfer.

bus

High-speed ___________ is used to speed processing in a computer system.

cache memory

Bandwidth is the speed of a transmission, measured in bytes per second.

false

Which networking hardware is used for connecting networks of different types?

gateway

What is fiber-optic cable made out of?

glass

Which networking hardware functions as a multiport signal amplifier?

hub

Which OSI level is responsible for assigning addresses to messages and provides connectivity and path selection?

network

Which OSI level is responsible for electrical, mechanical, procedural, and functional specifications?

physical

Which OSI level is responsible for formatting data and and character format translation?

presentation

What is a readable description of a algorithm written in human language called?

pseudocode

Which networking hardware is used for directing network traffic, based on its logical address?

router

Which OSI level is responsible for establishing, maintaining, and terminating the communication session between applications?

session

Which OSI level is responsible for guaranteed delivery of datagrams, fault detection, error recovery, and flow control?

transport

It's best to place a company's website servers can in a DMZ

true

Modems covert binary digits into sounds by modulating tones.

true

Privacy is protected by law, but employees have fewer rights to privacy while on the job.

true

The only language computers can understand consists of 1s and 0s.

true

The term "hacker" originally has a positive connotation

true

Which of the following malicious code names match the description: An uninvited guest program with the potential to damage files and the operating system?

virus


Related study sets

Database Design & Development Final Exam

View Set

World History: The Industrial Revolution

View Set

Vulnerable Subjects - Research Involving Workers/Employees (ID 483)

View Set

Bio 1260 exam 3 - clicker question

View Set