Final Exam Question - University of Scranton Computing 期末考試的問題-斯克蘭頓大學(xué)計算機(jī)_第1頁
Final Exam Question - University of Scranton Computing 期末考試的問題-斯克蘭頓大學(xué)計算機(jī)_第2頁
Final Exam Question - University of Scranton Computing 期末考試的問題-斯克蘭頓大學(xué)計算機(jī)_第3頁
Final Exam Question - University of Scranton Computing 期末考試的問題-斯克蘭頓大學(xué)計算機(jī)_第4頁
Final Exam Question - University of Scranton Computing 期末考試的問題-斯克蘭頓大學(xué)計算機(jī)_第5頁
已閱讀5頁,還剩40頁未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進(jìn)行舉報或認(rèn)領(lǐng)

文檔簡介

1、Prepared by Students in Dr. Sidburys classes, Fall Semester 2019All of the questions pertain to material from the course. All of the answers are correct, more or less. Several of the questions are ambiguous enough or picky enough that I would not put them on my final exam.Note that on the exam itsel

2、f the topics will not be given with the questions. They are included here so that you will know where to look to find more on this topicWhen you finish this slide show you will probably know what Pfishing is The Answer is c. 297. To answer this question you do not need to calculate the value. Since

3、the last digit is 1 the value is odd which eliminates d. Since the first digit is in the place for 256 the answer must be more than 256.100101001 is a binary number. What is it in decimal form?a. 57c. 297b. 45d. 136 a. 254b. 255c. 256d. 257Answer: c. 256a. Pattern Recognitionb. Face Recognitionc. Pi

4、cture Recognitiond. Color RecognitionAnswer: a. Pattern RecognitionWhich of the following is not part of the CPU?Control Unit ALURAMMicroprocessorThe microprocessor is a single chip, integrated circuit, that contains all of the circuiting necessary for doing processing. The control unit figures out

5、what to do, while the ALU does the actual computations. RAM (random access memory) is part of storage.What is Pfishing (Phishing)?Technology that stores information in a small, inexpensive tag that can be retrieved via radio.E-mail fraud scams that attempt to steal a persons identity.Manufacture, us

6、e, and dispose of computers in an environmentally friendly way.Process of automatically identifying objects in videos/images using a computer.These e-mails appear to be legitimate, and the message attempts to gather personal and financial information from the intended victim.A) It is only available

7、on certain operating systemsB) It uses twice the amount of storage space for numbersC) It is outdated and not used by manyAnswer: B) It uses twice the amount of storage space for numbersA) Using the computer for shorter amounts of time to reduce usage of electricityB) Using time online to research w

8、ays to better the environmentC) Manufacturing, using, and disposing of computers in an environmentally friendly wayAnswer: C) Manufacturing, using, and disposing of computers in an environmentally friendly way a) fixed point number b) binary numbersc) floating point numbersAnswer: cWhat are the two

9、types of multi-tasking?Preemptive multi-tasking, Resource managementMultiple processors, process switchingMemory, Virtual memoryWhat three things does an message consist of?Address, the Subject, and the MessageThe Message, the Header, and AttachmentsPackets, the Message, and the SubjectAnswer: BWhat

10、 is academic freedom?Stuff that is created by an individual or group that is intellectual in nature such as a book or poem or drawing.The concept that students and teachers can use others intellectual property for studying within certain guidelines.The concept that if you use other peoples work you

11、should give them credit and not claim the work as your own.Answer: BWhat are the three parts of an e-mail message?Text file, Pictures, HeaderHeader, Footer, IP AddressC. Destination, Message itself, AttachmentsD. Message itself (text file), Attachments, Header informationE. IP Address of sender, Foo

12、ter, HeaderD. Message itself (text file), Attachments, Header information E-mail Downloading from websites Cookies Software already installed on your computerA. E-mailThere are two technologies for RAM chips: dynamic RAM and static RAM. Dynamic RAM is _and has larger capacities. Static RAM operates

13、_.a. cheaper; slowerb. more costly; fasterc. cheaper; fasterd. free; as fast as dynamic RAMA. Open source softwareB. Proprietary softwareC. Network softwareD. Copyrighted softwareB. Proprietary software Dr Sidburys comment: Both Network software and copyrighted software could satisfy this definition

14、 but Proprietary always does.What the computer uses to identify the different parts of the CPU. Named access point for wireless internet connections. Identifies the ports that extorter device are connected to. Ex. USB ports in useCorrect answer: B. Named access point for wireless internet connection

15、s.A computer that was built with the sole purpose of working with economic exchanges . Usually used to help run the stock trading on Wall Street. A computer that is the color green.Is the manufacture, use, and disposal of computers in an environmentally friendly wayCorrect Answer : C. Is the manufac

16、ture, use, and disposal of computers in an environmentally friendly wayA.) Microsoft Windows VistaB.) Apple MAC OS XC.) LinuxD.) Microsoft Internet ExplorerAnswer: D. Microsoft Internet ExplorerIP Addresses are 32 bit binary numbers whose octets are each made up from how many possible numbers?A- 3C-

17、 Approximately 4.9 Billion B- 512D- 256Answer: D- each octet can use any number from 0 to 255ANSWER: B. 180 MILLIONDR. SIDBURYS COMMENT: THE AMOUNT OF SPACE REQUIRED TO STORE THIS ANIMATION WOULD DEPEND ON HOW MANY BYTES WERE NEEDED TO STORE EACH DOT.Animation and VideoIf you were to take a picture

18、on a 6 megapixel camera and animate it at a rate of 30 frames per second, there would be how many dots per second?8 billion180 million1 billion60 millionANSWER: C. AN FRAUD SCAM THAT USES AN THAT APPEARS TO BE LEGITIMATE.PfishingPfishing is a way of searching the internet.how a website gets informat

19、ion from your computer.an fraud scam that uses an that appears to be legitimate.PrinterBarcode readerMouseMonitorAnswer: Mouse (DR. SIDBURYS COMMENT: BARCODE READER IS ALSO AN INPUT DEVICE BUT THE AUTHOR OF THIS QUESTION PROBABLY ELIMINATED IT ON THE GROUNDS THAT IT WAS NOT “STANDARD”)FraudPhishingE

20、ncryptionE-mail scamAnswer: PhishingACADEMIC HONESTY IS THE CONCEPT THATA. If you use others work you must credit them and not use it as your ownB. Students cannot use anothers intellectual property for studyingC. You will not use another persons work, even if it is properly citedD. All of the above

21、A. If you use others work you must credit them and not use it as your ownA.) printerB.) monitorC.) webcamD.) audio systemC.) webcam (is an input device not output)A.) popular computer gameB.) e-mail fraud scam to gain personal infoC.) search engineD.) security softwareB.) e-mail fraud scam to gain p

22、ersonal infoTO PLAY SOUND ON A COMPUTER IT MUST BE IN WHAT FORM?ANALOGDIGITALWAVEANY OF THE ABOVEA. ANALOGDr. Sidburys comment: to be stored on a computer it must be digital. But when its actually played its a wave. The sound card that is manipulating the sound is actually converting it to analog. F

23、or me the question is waaay too picky._ is the process of automatically identifying objects in video/images using a computerA) Video RecordingB) Pattern RecognitionC) Face RecordingD) Person Identification Internet CensorshipInternet Censorshipa Blacklist Systema Whitelist SystemThe Censorware proje

24、ctThe Golden Shield projectAnswer: a whitelist systemParallel portSerial portFirewire portPs/2 portAnswer: Serial portThis type of connection, which is used for connecting a device to a computer, communicates one bit at a time.Your IP AddressYour Operating SystemBoth A and BYour MAC AddressAnswer: C

25、HTMLHMLSHTTPSAnswer: DMEMORYDynamic and Static are two technologies for _ chips.CPUMotherboardROMRAMAnswer d. RAMDATA MINING/LOYALTY CARDS BACKGROUNDWhat is the term for when a computer analyzes large amounts of seemingly random data in order to automatically determine interesting patterns?Loyalty c

26、ardsCookiesData miningControversyAnswer c. Data miningWhat is the most common use of hex that you are likely to encounter? A. To update the utilities on your hard driveB. Memory StorageC. As a code for colors in Web pagesD. Binary ConversionsAnswer: C. As a code for colors in Web pages 25 is a HEX number. What is it in the decimal system?16 c. 2537 d. 52 Answer: b. 37What is a text file stored on your computer by a web site that you visit called? A) Byte B) Cookie C) Domain D) Service set identifierCorrect Answer: B) Cookie Each compu

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論