CSC110 Fundamental of Computer Science

CSC110 Fundamental of Computer Science

1

CSC110 Fundamental of Computer Science

Fall 2007

Exam III (Paper –A)

Name______
Answer all of the following questions by circling the right choice. For example, if a is the correct answer, please draw a circle around the alphabet a.

  1. How do we call the components of a PC such as cables, motherboard, monitor?
  2. Hardware
  3. Software
  4. Firmware
  5. Network
  6. What does CPU represent?
  7. Central Processing Unit
  8. Core Processing Unit
  9. Computer Processing Unit
  10. None of the above
  11. What does CPU include?
  12. Control and Memory
  13. Hard-drive and Memory
  14. Control and ALU
  15. ALU and Memory
  16. None of the above
  17. What does ALU represent?
  18. Alabama Liberal University
  19. Arithmetic Logic Unit
  20. Application Logic Unit
  21. None of the above
  22. What is Hz?
  23. Hurts
  24. A unit for measuring CPU speed
  25. A unit for measuring memory capacity
  26. A unit for measuring hard drive capacity
  27. None of the above
  28. What is the term DIMM about?
  29. Software
  30. Memory
  31. CPU
  32. ALU
  33. Control
  34. None of the above
  35. In the context of computing, control cycle is related to
  36. Control Unit
  37. Memory
  38. ALU
  39. None of the above
  1. Pentium is a type of
  2. Software
  3. Memory
  4. CPU
  5. Processor
  6. Control
  7. None of the above
  8. A control cycle has ______stages.
  9. 3
  10. 4
  11. 8
  12. 16
  13. None of the above
  14. Which type of RAM is more expensive?
  15. DRAM
  16. SRAM
  17. None of the above
  18. Which type of RAM runs faster?
  19. DRAM
  20. SRAM
  21. None of the above
  22. LAN, MAN, WAN are
  23. Memory
  24. CPU
  25. Control
  26. Networks
  27. None of the above
  28. What is required for connecting a PC to the Internet?
  29. A modem
  30. A hub
  31. A switch
  32. A router
  33. None of the above
  34. What do I have to have on my PC to connect to a network?
  35. NIC
  36. Memory
  37. A hub
  38. A switch
  39. A router
  40. None of the above
  41. What does NIC stand for?
  42. Network Interface Control
  43. Network Interface Controller
  44. Network Interface Card
  45. None of the above
  46. What is a protocol?
  47. A set of rules.
  48. A set of PC’s.
  49. A set of languages
  50. A set of sender and receiver
  51. None of the above
  52. What is TCP/IP?
  53. A protocol stack
  54. A set of programs
  55. A network management system
  56. A special kind of hardware for connecting a PC to the Internet
  57. None of the above
  58. Connecting computers together to form a network only involves the usage of hardware. True or False?
  59. True
  60. False
  61. How do we connect several PC’s together for using one link to access the Internet?
  62. Connect all PC’s to a modem, and connect the modem to the Internet.
  63. Connect all PC’s to a hub, and connect the hub to a modem, then to the Internet
  64. Connect all PC’s to the modem and then connect the modem to the Internet
  65. None of the above
  66. Which of the following device is more complicated and therefore more expensive?
  67. A hub
  68. A switch (layer 2)
  69. A router
  70. None of the above
  71. Is security an issue in computing?
  72. Yes
  73. No
  74. Cryptography is a brand new field in computing and has never been used in any warfare in the past.
  75. True
  76. False
  77. Representing Dr. Yang as Dr. WYLE is called.
  78. Encryption
  79. Decryption
  80. None of the above
  1. Can security breach be caused only by problems in computer software or hardware?
  2. Yes
  3. No
  1. Which type of cyber attacks become more frequent?
  2. Direct attacks
  3. Indirect attacks
  4. None of the above
  5. What is LC4?
  6. Hardware
  7. Computer networking software
  8. Packet capturing software
  9. Password guessing software
  10. None of the above
  11. What is Trojan horse?
  12. Software program
  13. An e-mail message
  14. Hardware
  15. An animal
  16. None of the above
  17. What is the frontier of the last defense?.
  18. Computer Policing
  19. Cyber CIA
  20. Computer Forensics
  21. LC4
  22. None of the above
  23. What type of attack is LC4 attack?
  24. Direct
  25. Indirect
  26. None of the above
  27. What is DeepFreeze?
  28. A Microsoft product
  29. Hardware
  30. Software for fighting against virus
  31. Software for clearing all other software downloaded from the Internet
  32. None of the above