CS 1030 final exam
What is a hacker?
A programmer with a high skill level
Which of the following is NOT a LAN typology?
Coaxial
The Internet is owned by:
No one
What are switching centers maintained by Internet providers called?
Point of presence
What important concept was attributed to Ada Lovelace?
The program loop
A database is divided into tables.
True
Which of the following is NOT a bus signal group?
fetch
Organize the steps for making a database.
1. investigate 2. make a master column list 3. create tables 4. work on relationships 5. analyze design 6. re-eveluate
What is the standard port number for HTTP?
80
Which of the following attack types match this description: Attack on a system that can include snooping, eavesdropping, and interception?
Access
Who was the first programmer?
Ada Lovelace
What are the 4 basic functions implemented in the CPU?
Adding, decoding, shifting, and storing
In 1642 Pascal created a mechanical device with gears and levers. The device was capable of what kinds of calculation?
Addition and subtraction
Who is the father of modern computers?
Alan Turing
Name the 4 important elements of Babbage's Analytical Engine that are components of today's computers.
An input device, memory, a central processing unit, and an output device
Which OSI level is responsible for giving applications access to the network?
Application
What factor reduces the strength of an electrical signal as it travels along a transmission medium?
Attenuation
The _____ contains instructions and data that provide the startup program for a computer.
BIOS
What logical elements did Charles Sanders Peirce realize electrical switches could emulate in 1880?
Boolean algebra
Which networking hardware is used for allowing only specific network traffic through, based on destination address?
Bridge
Who is the father of the computer?
Charles Babbage
Which of the following converts source code into computer language and results in an executable file?
Compiler
Which of the following protocols is responsible for assigning IP addresses to services?
DHCP
Which network device is used to resolve domain names into IP addresses?
DNS servers
Which OSI level is responsible for physical addressing, data error notification, ordered delivery of frames and flow control?
Data-link
Which of the following attack types match this description: Attacks that prevents legitimate users from using the system or accessing the information?
Denial of Service
What is the set of possible value for a column called?
Domain
What important pastry helped move your job up in the queue in second generation software, and what third generation software development made that pastry unnecessary?
Donuts and time-sharing
What does First Normal Form state?
Eliminate repeated fields.
What does Third Normal Form state?
Every column that's not part of the primary key is fully dependent on the primary key.
Computer security affects:
Everyone
DSL is a combination of what two types of multiplexing?
FDM and TDM
Which of the following protocols is responsible for reliable file transfer between computers?
FTP
By default, data returned by the SQL SELECT statement is in descending order.
False
Pseudo code should be written after the source code to ensure that the program was written correctly.
False
The internet is a collection of LANS and WLANS.
False
Which type of guided medium is the least susceptible to attention and inductance?
Fiber-optic cable
What does FDM stand for?
Frequency-division multiplexing
Who is responsible for coming up with the concepts of a compiler and debugging?
Grace Hopper
Which of the following is NOT an innovation that belongs to the Third Generation of Computing?
Graphical user interfaces
What is the language of the World Wide Web?
HTML
Which of the following protocols is responsible for sending and receiving data on the web?
HTTP
Why are we switching from IPv4 to IPv6?
IPv6 has more addresses than IPv4.
Which of the following is NOT an innovation that belongs to the Fifth Generation of Computing?
Internet
Which of the following translates a program's statements, one by one, into a language the computer can understand?
Interpreter
Which type of I/O processing is most efficient?
Interrupt
How does a WLAN differ from a LAN?
It uses unguided media
Which of the following attack types match this description: Attack on a system that alter information illicitly?
Modification
Which of the following is NOT a part of a transistor?
Modulator
Leibniz built on pascal's work by creating the Leibniz Wheel. This device was capable of what kind of calculations in addition to the ones Pascal's could do?
Multiplication and division
What is a circuit board that connects a network to the system bus and converts a computer's binary information into a format suitable for the transmission medium called?
NIC
What does NBP stand for?
National Backbone Provider
What does Second Normal Form state?
No nonkey columns depend on another non key column.
Most computers these days use the _____ bus
PCI
What uniquely identifies a row in a table?
Primary key
Which type of memory can't be easily written to?
ROM
Which networking hardware is used for amplifying signals on long cables between nodes?
Repeater
Which of the following attack types match this description: Attacks on a system that injure information's reliability?
Repudiation
The Jacquard loom is important in the history of computing for what innovation?
Reusable cards with holes held information.
Which of the following is NOT an innovation that belongs to the First Generation of Computing?
Rotating drum storage
Which of the following protocols is responsible for sending email?
SMTP
Which topology became popular due to the Internet and home networking?
Star
Which of the following protocols is responsible for reliable delivery of data between computers?
TCP/IP
Which of the following protocols maintains port information?
TCP/IP
Which of the following protocols manages sequencing data packets?
TCP/IP
What prevents TCP/IP packets from bouncing from router to router forever?
TTL
What is the likely motivation of an undirected cracker?
Technical challenge
The Apple computer became very popular. What was its largest market, and what software made it interesting to that market?
The business market and the program VisiCalc
What important concept is attributed to John von Neumann?
The stored program concept
What features of transistors made them superior for computers, compared with vacuum tubes?
They were cheaper, smaller, and cooler than tubers and lasted longer.
What does TDM stand for?
Time-division multiplexing
What is the legal protection usually sought for software source code?
Trade secret
Which of the following malicious code names match the description: A program that poses as an innocent program?
Trojan
The term "script kiddie" refers to what?
Unsophisticated cracker
What is a name used to identify a specific location and value in memory?
Variable
What are most computers today based on?
Von Neumann Architecture
Which of the following is NOT an innovation that belongs to the Second Generation of Computing?
Von Neumann architecture
Which of the following is NOT an innovation that belongs to the Fourth Generation of Computing?
World Wide Web
Which of the following malicious code names match the description: A type of bot that can roam a network looking for vulnerable systems and replicate itself on those systems?
Worm
What is the computer science term for a logically ordered set of statements used to solve a problem?
algorithm
A _____ is computer terminology is a set of wires and protocols designed to facilitate data transfer.
bus
High-speed ___________ is used to speed processing in a computer system.
cache memory
Bandwidth is the speed of a transmission, measured in bytes per second.
false
Which networking hardware is used for connecting networks of different types?
gateway
What is fiber-optic cable made out of?
glass
Which networking hardware functions as a multiport signal amplifier?
hub
Which OSI level is responsible for assigning addresses to messages and provides connectivity and path selection?
network
Which OSI level is responsible for electrical, mechanical, procedural, and functional specifications?
physical
Which OSI level is responsible for formatting data and and character format translation?
presentation
What is a readable description of a algorithm written in human language called?
pseudocode
Which networking hardware is used for directing network traffic, based on its logical address?
router
Which OSI level is responsible for establishing, maintaining, and terminating the communication session between applications?
session
Which OSI level is responsible for guaranteed delivery of datagrams, fault detection, error recovery, and flow control?
transport
It's best to place a company's website servers can in a DMZ
true
Modems covert binary digits into sounds by modulating tones.
true
Privacy is protected by law, but employees have fewer rights to privacy while on the job.
true
The only language computers can understand consists of 1s and 0s.
true
The term "hacker" originally has a positive connotation
true
Which of the following malicious code names match the description: An uninvited guest program with the potential to damage files and the operating system?
virus