1
Test 3: ch 7-10
CSC 1010 Tuesday and Thursday 5:30pm - 6:45pm
Nicholas A. Keller
October 27, 2016
Put your name; first then last, (example: Nicholas Keller) under this line:
Put your campus ID (example: nkeller4) under this line:
Put your Panther # (example: 123 - 45 - 6789) under this line:
(important!) Read before beginning:
1) Each question has one answer.
21) put cellphones away
29) Circle the whole answer and not just the letter of the answer.
Chapter 7
1. Which of these is TRUE about primary storage:
A. It's nonvolatile
B. less expensive than secondary storage
C. slower than secondary storage
D. used for short term storage
2. The "R" in "RAID" stands for
A. relevant
B. redundant
C. repeating
D. Rutherford
E. really
3. Which of these stores the most information:
A. DVD
B. Blu-Ray
C. CD
4. Which of these stores less than 1 GB per side:
A. DVD
B. Blu-Ray
C. CD
5. Which of these has a moving part(s) (small electric motor in the device):
A. HD
B. SSD
C. external SSD
D. https USB
6. Which of these statements about the cloud is FALSE:
A. it only stores files and provides a way to download them remotely
B. it requires an internet connection
C. it can be used to rent computing capacity
D. software can be licensed on the cloud
7. An office wants to collectively edit a 1TB file they should use:
A. a Blu-Ray disk they pass around
B. an external hard drive they pass around
C. a network attached storage system
8. Which of these is NOT a benefit of cloud storage (over buying the same hardware/software to use on-site):
A. cheaper software/hardware maintenance
B. access speed
C. lower initial hardware cost
9. When an operating system opens a program it loads it into:
A. RAM
B. HD
C. SSD
Chapter 8
10. Which of these is NOT digital:
A. a file stored on a computer
B. The sound emitted by speakers
C. the signal carried by a USB wire between a microphone and a computer
11. 8 gigabits per second equals:
A. 80 megabits per second
B. 80 megabytes per second
C . 1 megabytes per second
D. 1 gigabyte per second
12. Modulation and demodulation refers to:
A. conversions between analog and digital signals
B. the 2 different computer chips that compress and decompress files
C. A signal to noise ratio increaser common on newer digital TVs
D. A signal to noise ratio decreaser common on newer digital TVs
13. A company based in Atlanta wants internet far faster than a home internet connection as cheap as they can get it (without sacrificing speed), they should get:
A. 3G
B. Satellite
C. fiber optic
14. Bandwidth refers to:
A. The number of different file types an internet connection can transfer
B. the speed of an internet connection
C. The number of different customer types an ISP serves
15. Which of these is false about HTTPS:
A. your ISP charges you extra to use it
B. banks use it
C. it uses encryption
16. Which of these covers the widest geographical area:
A. WAN
B. LAN
C. MAN
D. CAN
E. RAN
F. NAK
17. All of the computers in a room (except for 1) are connected to 1 computer; called the central node. If two computers, neither a central node computer, want to communicate their communication is relayed/passed by the central node. I have just described what type of network:
A. bus
B. ring
C. star
D. tree
E. mesh
F. social
18. I'm attacking a network; in which of these networks can the destruction of 1 computer more substantially reduce the value provided by the network:
A. client/server
B. peer-to-peer
19. Which of these statements is true:
A. Two companies have an intranet connected through an extranet
B. Two companies have an extranet connected through an intranet
20. Which of these statements is TRUE:
A. Firewalls prevent all communication
B. Firewalls protect networks against internal threats
C. Firewalls protect networks from external threats
Chapter 9
21. You're entitled to look at your records held by government agencies:
A. true
B. false
22. Employers can monitor anything you do on their computers:
A. true
B. false
23. Online advertisers primarily use:
A. first party cookies
B. second party cookies
C. third party cookies
24. Which of these is potentially more harmful to a computer user:
A. second party cookie
B. keystroke logger
C. small images hidden within an email message
25. Which of these types of personal information is not protected by a privacy law:
A. financial information
B. internet search history
C. medical records
D. educational records
26. When your computer is remotely controlled by a hacker it is called a:
A. virus
B. worm
C. trojan horse
D. zombie
27. The "D" in "DoS" stands for:
A. denial
B. distributed
C. devious
28. Which of these types of malware is disguised a legitimate program:
A. virus
B. worm
C. trojan horse
D. zombie
29. Which of these is true about a phishing attack:
A. Can only be stopped by anti-phishing software (free or paid)
B. tricks a user into downloading a malicious program
C. tricks a user into giving the attacker confidential information like passwords
30. Which of these is NOT a biometric credential:
A. fingerprint
B. iris scan
C. password
31. Which of these is used to give a remote employee secure access to a company network:
A. SADD
B. WEP
C. VPN
D. HTTP
32. The "R" in "DRM" stands for:
A. rights
B. reasonable
C. relevant
D. redundant
Chapter 10
33. What is the name of the department that would hire, fire, and manage employee benefits:
A. accounting
B. marketing
C. human resources
D. production
E. research
34. There is a coal company, DeadCarbon Inc. The person that directly manages the coal miners is what level of management:
A. middle management
B. supervisors
C. top management
35. A manager that is doing long range planning is engaged in what type of thinking:
A. operational
B. strategic
C. tactical
36. Which of these is NOT an expert system:
A. database of student records
B. cancer diagnosis program
C. pharmacy drug interaction program
END