Computer Science. Exam 3: Michelangelo Computer Virus, server networks, program file

A peer-to-peer (P2P) network is an example of ________ administration.

A) corporate
B) central
C) wide area
D) localD. localThe most popular transmission media option for wired home Ethernet networks is ________ cable.
A) coaxial
B) fiber-optic
C)unshielded twisted-pair (UTP)
D) power-lineC. unshielded twisted-pair (UTP)Sophisticated networks generally use which of the following hardware devices to ease the flow of data through the network?
A) Routers and switches
B) Firmware
C) USB ports
D) FirewallsA. Routers and switchesClient/server networks are controlled by a central server that runs specialized software called a(n) ________.
A. Windows 7
C. firewall
D. firmwareB. network operating system (NOS)Wireless network devices use ________ to communicate with each other.
A)satellitesB)

fiber optics

C)

DSL

D)

radio wavesD) radio wavesData are sent through a network in bundles called ________.
A. packages
B. pouches
C. packets
D. switchesC. packetsWhich of the following is NOT a wired broadband Internet connection option?
A)Dial-upB)

DSL

C)

Fiber-optic

D)

CableA) dial upAll of the following are extra precautions you can take to secure a wireless network EXCEPT ________.
A. change your network name (SSID)
B. enable SSID broadcast
C. turn on security protocols
D. create a passphraseB. enable SSID broadcastThe unique number assigned to a network adapter by the manufacturer is referred to as the ________ address.
A. MAC
B. IP
C. SSID
D. networkA. MACA large network designed to provide access to a specific geographic area, such as a large city, is a ________.
A. MAN
B. PAN
C. LAN
D. WANA. MANFor the nodes on a network to communicate with each other and access the network, each node needs a ________.
A. DSL modem
B. network adapter
C. network interface card
D. routerB. network adapterA ________ is a network located in your residence that connects to all your digital devices.
A. MAN
B. WAN
C. HAN
D. LANGC. HANA computer ________ is two or more computers connected using software and hardware so that they can communicate with each other.
A. node
B. switch
C. broadband
D.networkD. networkThe fastest version of wireless Ethernet is ________.
A) 802.11ab
B) 802.11n
C) 802.11g
D) 802.11acD) 802.11acTo transfer data packets between two or more networks, a ________ is used
A) firewall
B) router
C) switch
D) hubB. routerUsing a network without the network owner’s permission is known as ________.
A. hijacking
B. chillijacking
C. piggybacking
D. hybackingC. piggybackingA(n) ________ device facilitates file sharing and data backup.
A) NAS
B) UTP
C) NOS
D) WANA. NASA ________ is a device connected to a network such as a printer or a game console.
A) packet
B) NOS
C) NIC
D) nodeD. nodeNormal telephone cable is a type of ________.
A) fiber-optic cable
B)coaxial cable
C) twisted-pair cable
D) Ethernet cableB. twisted pairWhich of the following is NOT a type of UTP cable you would use in a wired Ethernet network
A) Cat 6A
B) Cat 5E
C) Cat 7B
D) Cat 6C) Cat 7BA network that spans a large physical distance is called a ________.
A)WANB)

LAN

C)

MAN

D)

PANC) WANOn a network, a(n) ________ helps prevent data packets from colliding with each other.
A)hubB)

switch

C)

adapter

D)

routerB. switch________ is the actual speed of data transfer that is achieved and is always less than or equal to the data transfer rate.
A)BandwidthB)

Benchmark

C)

Broadband

D) ThroughputD. throughputWhich of the following is NOT used to classify network architectures?
A)Distance between nodesB)

Communication medium

C)

Protocol used to exchange data

D)

Speed of the networkD. speed of the networkWhich of the following is NOT a type of cable used in wired networks?
A)Unshielded coaxialB)

Unshielded twisted-pair

C)

Fiber-optic

D)

CoaxialA) unshielded coaxialAll of the following are tasks for network administration of a large organization EXCEPT ________.
A)monitoring network performanceB)

purchasing initial equipment for the network

C)

installing new computers and devices on the network

D)

updating and installing new software on the networkB) purchasing initial equipment for the networkA client/server network is an example of ________ administration
A)remoteB)

local

C)

central

D)

wideC) central________ is the maximum speed at which data can be transferred between two nodes
A)ThroughputB)

Broadband

C)

Bandwidth

D)

Through speedC) BandwithWhich transmission medium transmits data the fastest?
A)Fiber-optic cableB)

Twisted-pair cable

C)

Wireless

D)

Coaxial cableA) Fiber-optic cableAll of the following operating systems support P2P networking EXCEPT ________.
A)LinuxB)

Unix

C)

Windows

D)

OS XB) UnixA ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.
A)denial of service (DoS)B)

rootkit

C)

zombie

D)

logic bombB) rootkitWhich of the following is NOT a virus category?
A)macroB)

logic bomb

C)

worm

D)

pharmingD) pharmingRules for creating passwords include all of the following EXCEPT ________.
A)change your password frequentlyB)

use letters, numbers and symbols in your passwords

C)

use a dictionary to find a lengthy word that is easy to remember

D)

keep your password a secretC) use a dictionary to find a lengthy word that is easy to rememberAdware and spyware are referred to collectively as ________.
A)graywareB)

firmware

C)

viruses

D)

alertwareA) graywareA ________ is named after a housing construction feature that slows the spread of fires from house to house.
A)firehouseB)

fire extinguisher

C)

firebreak

D)

firewallD) firewallCAPTCHA stands for ________.
A)Complete Automated Public Turing Trial to Tell Computers and Humans ApartB)

Completely Automated Public Turing Test to Tell Computers and Humans Apart

C)

Completely Amazing Public Turing Test to Tell Computers and Humans Apart

D)

Completely Automated Private Turing Trial to Tell Computers and Humans ApartB) Completely Automated Public Turing Test to Tell Computers and Humans ApartUsing your computer for non-work activities while you are being paid to work is known as ________.
A)cyberlazingB)

cyberbreaking

C)

cybersleeping

D)

cyberloafingD) cyberloafingWhich of the following statements about cookies is NOT true?
A)Cookies are text files.B)

Some companies sell the personal information found in cookies to other companies.

C)

Cookies help companies determine the traffic flow through their website.

D)

Cookies obtain your personal information by searching your hard drive.D) Cookies obtain your personal information by searching your hard drive.A(n) ________ is the portion of virus code that is unique to a particular computer virus.
A)compression codeB)

virus pattern

C)

encryption code

D)

virus signatureD) virus signatureAll of the following were top cybercrimes reported to the IC3 in 2012 EXCEPT ________.
A)non-auction scamB)

identity theft

C)

advance fee fraud

D)

theft of servicesD) theft of servicesA ________ is a virus that is triggered on a certain date
A)logic bombB)

time bomb

C)

worm

D)

macroB) time bomb________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
A)PretextingB)

A DDoS attack

C)

A Trojan horse

D)

A polymorphic virusB) DDoS attackSocial ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
A)theftB)

engineering

C)

pretexting

D)

pharmingB) engineeringCreating and distributing ________ is one of the most widespread types of cybercrimes
A)computer virusesB)

spam

C)

cookies

D)

zombiesA) computer virusesWith regard to computer protection, quarantining is defined as ________.
A)placing a found virus in a secure area on the hard driveB)

updating your antivirus software

C)

repairing an infected file

D)

deleting an infected fileA) placing a found virus in a secure area on the hard driveYou can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________.
A)antivirus softwareB)

a packet sniffer

C)

a firewall

D)

a packet filterC) a firewallFBI-related scams involve ________.
A)running auctions that do not existB)

convincing people to send money as a “good faith” gesture

C)

collecting funds and not delivering the goods

D)

people pretending to represent official organizationsD) people pretending to represent official organizations________ viruses are often transmitted by a flash drive left in a USB port.
A)Time bombB)

Logic bomb

C)

Macro

D)

Boot-sectorD) Boot-sector________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.
A)Gray-hatB)

Green-hat

C)

Black-hat

D)

White-hatD) White-hatA packet sniffer is a program that can enable a hacker to do all of the following EXCEPT ________.
A)steal your logons and passwords for various accountsB)

use your debit card information to purchase items illegally

C)

assume your identity

D)

launch a denial of service (DoS) attack on your computerD) launch a denial of service (DoS) attack on your computerWhich of the following classifications of viruses can change its own code to avoid detection?
A)StealthB)

Multipartite

C)

Worm

D)PolymorphicD) PolymorphicConfiguring a firewall to ignore all incoming packets that request access to a specific port is known as ________.
A)packet switchingB)

logical port blocking

C)

static addressing

D)

packet filteringB) logical port blockingWhich of the following provides a visual representation of the patterns of an algorithm?
A)PseudocodeB)

Flow analysis

C)

Flowchart

D)

Gantt chartC) flowchartThe flowchart shape for a process is a(n) ________.
A)rectangleB)

parallelogram

C)

oval

D)

diamondD) diamond________ is the process of translating a task into a series of commands that a computer will use to perform the task
A)DebuggingB)

Diagramming

C)

Analyzing

D)

ProgrammingD) programming

________ is a combination of natural language and programming language that is used to document an algorithm.

A)

Diagramming

B)

Flowcharting

C)

Debugging

D)

PseudocodeD) Psuedocode

In object-oriented programming, ________ allows a new class to automatically use all the data and methods of an existing class.

A)

reusability

B)

inheritance

C)

regression

D)

scalabilityB) inheritance

Corona and Magmito can be used to develop ________.

A)

Web pages

B)

Mac software

C) apps for smartphones

D)

complex web applicationsC) apps for smartphones

________ is the instructions programmers have written in a higher-level language.

A)

Compiled code

B)

Source code

C)

Executable code

D)

Base codeB) Source codeWhich language is the most popular language for writing Apple OS X applications?
A)C++B)

Objective C

C)

HTML

D)

JavaB) objective c

________ is a powerful programming language that can be used to create a wide range of Windows applications.

A)

PHP

B)

HTML

C)

Visual Basic

D)

BASICC) visual basicWhat is the first step of the system development life cycle (SDLC)?
A)Problem and opportunity identificationB)

Development and documentation

C)

Analysis

D)

DesignA) problem and opportunity identificationAn integrated development environment (IDE) is a ________.
A)program that helps interpret codeB)

collection of tools that helps programmers write and test their programs

C)

program that translates code into binary 1s and 0s and ignores comments

D)

tool that converts one programming language into a different programming languageB) collection of tools that helps programmers write and test their programsThe first-generation language is ________.
A)machine languageB)

assembly language

C)

COBOL

D)

BASICA) machine languageWhich of the following is the final stage of the program development life cycle (PDLC)?
A)Making the planB)

Debugging the code

C)

Testing and documentation

D)

CodingC) testing and documentationA small Java-based program is called a ________.
A)Java appletB)

JSP

C)

JavaScript

D)

Java classA) java applet

Before its final commercial release, a(n) ________ version of software may be offered to certain test sites or to interested users free or at a reduced cost.

A)

general availability (GA)

B)

gamma

C)

beta

D)

release to manufacturers (RTM)C) BetaA loop decision point consists of three features: an initial value, a set of actions to be performed, and a(n) ________.
A)testing planB)

test condition

C)

operator

D)

classB) test condition________ is the standard communications protocol used on most client/server networks.
A)TCP/IPB)

VPN

C)

Ethernet

D)

NOSC) EthernetIn a ________ network, data collisions can occur fairly easily because the network is essentially composed of a single cable
A)HierarchicalB)

Bus

C)

Cluster

D)

StarB) Bus________ cable is NOT subject to electromagnetic interference or radio frequency interference.
A)Fiber-opticB)

Polycarbonate

C)

Twisted-pair

D)

CoaxialA) fiber-optic________ is the amount of data that can be transmitted across a transmission medium in a certain amount of time.
A)InfusionB)

Data capacity

C)

Bandwidth

D)

ScalabilityC) bandwidthA(n) ________ server is a server that stores and manages files for network users
A)e-mailB)

print

C)

database

D)

fileD) fileA ________ sends data from one collision domain to another
A)linkB)

router

C)

switch

D)

bridgeD) bridgeRing networks use the ________ method to avoid data collisions
A)passive-checkB)

token

C)

packet screening

D)

active-checkB) tokenA(n) ________ address is the address that external entities use when communicating with your network.
A)ALUB)

WAP

C)

IP

D)

MACC) IPThe physical address assigned each network adapter is called its ________.
A)network physical address (NPA)B)

media access control (MAC)

C)

network access control (NAC)

D)

physical address control (PAC)B) media access control (MAC)A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.
A)fileB)

authentication

C)

application

D)

dedicatedB) authenticationConfiguring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.
A)Trojan horseB)

worm

C)

spammer

D)

brute force attackB) wormA print server uses a print ________ as a software holding area for jobs waiting to be printed.
A)loggerB)

spooler

C)

heap

D)

stackB) spooler

All of the following are ways that can infect your computer with a virus EXCEPT ________.

A)

downloading or running an e-mail attachment file
B)

sharing flash drives

C)

downloading video files from peer-to-peer sites

D)

installing a manufacturer’s printer driverA) downloading or running an e-mail attachment fileThe Internet Crime Complaint Center (IC3) is a partnership between the ________.
A)FBI and National White Collar Crime CenterB)

FBI and local police departments

C)

FBI and National Defense Department

D)

National White Collar Crime Center and U.S. Department of DefenseA) FBI and National White Collar Crime CenterWhen malicious code is planted on your computer and alters your browser’s ability to find web addresses, it is known as ________.
A)phishingB)

pharming

C)

polymorphing

D)

pretextingB) pharming________ is a program that gathers information about your surfing habits without your knowledge.
A)GhostwareB)

Adware

C)

Shareware

D)

SpywareD) spyware

Which type of virus was the famous Michelangelo virus?

A) time bomb

B)

An e-mail virus

C)

A worm

D)

A script virusA) time bombA ________ is a virus that is attached to documents such as Word or Excel files.
A)Trojan horseB)

script virus

C)

polymorphic virus

D)

macro virusD) macro virusA(n) ________ takes advantage of file transport methods to spread on its own.
A)encryption virusB)

script virus

C)

macro virus

D)

wormD) wormWhich of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
A)Social networkingB)

Hacking

C)

Phishing

D)

CybercrimeD) cybercrimeThe keywords used in programming languages that use decisions to redirect the flow of a program are called ________.
A)flowchartsB)

operators

C)

pseudocode

D)Let us write you a custom essay sample onComputer Science. Exam 3: Michelangelo Computer Virus, server…For Only $13.90/page

ORDER NOW

control structuresD) control structuresThe final step of the system development life cycle (SDLC) is ________.
A)analysisB)

maintenance and evaluation

C)

testing and installation

D)

designB) maintenance and evaluationWhich of the following would NOT be used to build websites with interactive capabilities?
A)Java Server PagesB)

PHP (hypertext preprocessor)

C)

Fortran

D)

Active Server PagesC) fortranObject-oriented ________ are defined by the information (data) and the actions (methods) associated with them.
A)fieldsB)

classes

C)

blocks

D)

unitsB) classes________ enables users to define their own data-based tags and facilitates exchange of information between websites.
A)PHPB)

HTML

C)

XHTML

D)

XMLD) XMLSQL is an example of a ________.
A)2GLB)

3GL

C)

4GL

D)

5GLC) 4GLWhich statement does NOT describe fifth-generation languages?
A)They use a set of short, English-based commands (such as SUB) that speak directly to the CPU.B)

Problems are presented as a series of facts or constraints rather than as a specific algorithm.

C)

The system of facts can be queried.

D)

They are the most “natural” of languages.A) They use a set of short, English-based commands (such as SUB) that speak directly to the CPU.Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network
A)scanningB)

viewing

C)

sniffing

D)

screeningD) screeningA ________ keeps your computer safe by determining who is trying to access it.
A)firewallB)

switch

C)

gateway

D)

hubA) firewallThe ends of the cable in a bus network use a(n) ________ to absorb signals so that they are not reflected back to network components that have already received the signals.
A)blockB)

stopper

C)

terminator

D)

endcapC) terminatorWhich of the following is NOT a common network topology?
A)Linear busB)

Ring

C)

Star

D)

ClusterD) clusterFor business networks, which of the following is NOT a main cable type?
A)DuplexB)

Coaxial

C)

Fiber-optic

D)

Twisted-pairA) DuplexA ________ sends data between two networks.
A)routerB)

switch

C)

hub

D)

repeaterA) routerSpecial symbols called tags are used in which of the following languages?
A)HTML/XHTMLB)

Java

C)

C++

D)

C#A) HTML/XHTMLTranslating an algorithm into a programming language is called ________.
A)codingB)

compiling

C)

executing

D)

interpretingA) coding________ breaks down a problem into a series of high-level tasks and continues to break each task into successively more detailed subtasks.
A)Object-oriented analysisB)

Top-down design

C)

Inheritance

D)

Bottom-up designB) top-down designThe process that converts program code into machine language is called
A)documentationB)

compilation

C)

variable declaration

D)

executionB) compilationWhich of the following is NOT a factor to consider when selecting network cabling?
A)Maximum run lengthB)

Interference

C)

Cable diameter

D)

BandwidthC) cable diameterWhich of the following is the most commonly used client/server network topology?
A)HierarchicalB)

Star

C)

Ring

D)

ClusterB) StarA(n) ________ server is a heavily secured server located between a company’s secure internal network and its firewall
A)transitionalB)

armored

C)

proxy

D)

bastion hostD) bastion hostDivision by zero is a ________ error that is caught when the program executes.
A)logicalB)

syntax

C)

runtime

D)

compilerC) runtimeThe set of specific, sequential steps that describe exactly what a computer program must do to complete the work is called a(n) ________.
A)algorithmB)

flowchart

C)

structure chart

D)

pseudocodeA) algorithmThe computers in a lab on a floor of a building would be connected using a ________.
A)WANB)

LAN

C)

PAN

D)

MANB) LANA ________ network can contain servers as well as individual computers.
A)switchB)

client/server

C)

peer-to-peer

D)

distributedB) client/serverIn an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal.
A)stopB)

hit

C)

crash

D)

jamD) jamA ________ is a set of rules for how information and communication are exchanged.
A)protocolB)

packet

C)

frame

D)

tokenA) protocolA ________ is a group of two or more computers, or nodes, designed to share information and resources.
A)busB)

router

C)

network

D)

bridgeC) networkMost home networks use ________ cable, which is most susceptible to interference.
A)fiber-opticB)

wi-fi

C)

unshielded twisted-pair

D)

coaxialB) wi-fiA ________ uses the Internet communications infrastructure to build a secure and private network.
A)HANB)

VPN

C)

PAN

D)

WANB) VPNA ________ topology uses more than one topology when building a network.
A)fusionB)

hybrid

C)

crossover

D)

multiple-useB) hybridIn a ________ network, each node connected to the network communicates directly with every other node
A)bridgeB)

router

C)

client/server

D)

peer-to-peerD) peer to peer

The capability of moving a completed programming solution easily from one type of computer to another is known as ________.

A)

portability

B)

transferability

C)

inheritance

D)

scalabilityA) portability

]]>

Related Essay Examples

Leave a Comment

Your email address will not be published. Required fields are marked *