Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Exam 3 with Solution Key - Computer Concepts and Applications | ITEC 1050, Exams of Information Technology

Material Type: Exam; Class: INTRO COMP CONCPTS & APPLICA; Subject: Information Technology; University: Armstrong Atlantic State University; Term: Summer 2007;

Typology: Exams

Pre 2010

Uploaded on 08/04/2009

koofers-user-jlo-1
koofers-user-jlo-1 🇺🇸

10 documents

1 / 8

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Read Carefully
Name Answer Key
ITEC 1050 Exam 3 (100 points)
Professor Malinowski July 24, 2007
Multiple Choice (2 points each)
1. Cookies:
a. have no legitimate purpose
b. help companies track personal preferences of users
c. are malicious programs embedded in useful software
d. are popup ads used to sell products
2. A word processing document with an embedded ____________ could be traced back
to the computer upon which it was created.
a. cookie
b. GUID
c. macro
d. .NET passport
3. Which of the following is NOT a technique you can effectively use to reduce the
amount of unauthorized e-mail on your computer?
a. Use a temporary e-mail address when visiting a chat room
b. Avoid giving your name and e-mail address on marketing questionnaires
c. Disable cookies on your Web browser
d. Reply to spam and ask to be removed from the mailing list
4. Most computer viruses are spread by:
a. CDs and DVDs
b. e-mail attachments
c. software downloaded from the Internet
5. A destructive program that remains on a computer system until the occurrence of a
special event or time is called a:
a. time bomb
b. Trojan horse
c. virus
d. worm
pf3
pf4
pf5
pf8

Partial preview of the text

Download Exam 3 with Solution Key - Computer Concepts and Applications | ITEC 1050 and more Exams Information Technology in PDF only on Docsity!

Read Carefully

Name Answer Key ITEC 1050 Exam 3 (100 points) Professor Malinowski July 24, 2007

Multiple Choice (2 points each)

  1. Cookies: a. have no legitimate purpose b. help companies track personal preferences of users c. are malicious programs embedded in useful software d. are popup ads used to sell products
  2. A word processing document with an embedded ____________ could be traced back to the computer upon which it was created. a. cookie b. GUID c. macro d. .NET passport
  3. Which of the following is NOT a technique you can effectively use to reduce the amount of unauthorized e-mail on your computer? a. Use a temporary e-mail address when visiting a chat room b. Avoid giving your name and e-mail address on marketing questionnaires c. Disable cookies on your Web browser d. Reply to spam and ask to be removed from the mailing list
  4. Most computer viruses are spread by: a. CDs and DVDs b. e-mail attachments c. software downloaded from the Internet
  5. A destructive program that remains on a computer system until the occurrence of a special event or time is called a: a. time bomb b. Trojan horse c. virus d. worm
  1. Internet auction sites are susceptible to the unsavory practices of shills who: a. auction items that do not exist b. secretly bid on items to artificially drive up prices c. auction an attractive item and then mail an inferior version to the winning bidder d. auction an item as “one-of-a-kind” when, in fact there are thousands available
  2. Which type of crime occurs when a small amount of money is removed from multiple bank accounts and is transferred to an embezzler’s account? a. Data diddling b. Dumpster diving c. Forgery d. Salami shaving
  3. _____________ key encryption requires that the receiver obtain the key before the message can be decoded. a. Asymmetric b. Digital certificate c. Digital signature d. Symmetric
  4. Which type of language is representative of the first generation of programming languages? a. Assembly b. Machine c. Procedural d. Object-oriented
  5. All of the following languages are considered to be high-level (3rd^ generation or higher) EXCEPT: a. Assembly b. C c. Java d. Visual Basic
  1. Which of the following statements best describes a distributed technology infrastructure? a. Each user in an enterprise is able to customize his technology tools b. A central IT department offers a single technology solution to all users c. A distributed database product is used so that users can share remote data. d. Local area networks are connected to a larger company minicomputer or mainframe
  2. Assume that you are working in a computer lab. Each time a PC boots, you see the same Windows desktop and application options. This computer lab is using a ____________ structure. a. centralized b. decentralized c. distributed d. hierarchical
  3. The ability of hardware and software to effectively adapt to increased demands and volume of use is known as: a. continuity b. compatibility c. interoperability d. scalability
  4. The third phase of the PDLC is concerned with: a. coding b. designing the solution c. documentation d. implementation and maintenance
  5. A rogue program disguised as a useful program that contains hidden instructions to perform a malicious task. a. worm b. trap door c. trojan horse d. macro
  1. The result after applying an encryption key and algorithm to a message. a. cybertext b. decryption c. plaintext d. ciphertext
  2. This system conversion involves running the old and new systems simultaneously before converting completely to the new system. a. direct conversion b. parallel conversion c. pilot conversion d. phased conversion
  3. This system conversion is also known as a crash conversion. a. direct conversion b. parallel conversion c. pilot conversion d. phased conversion
  4. What are the purpose and differences of compiler, assembler and interpreter? ( points) All these software are used to translate a computer program to machine code. Assembler is to convert a program written by assembly language to machine code, and assembler and interpreter are used to translate a program developed by high level languages to machine code. Compiler translates the whole program as a unit. Interpreter translates one line and executes the line, then move to the next line.
  5. In class we discussed the details of private key and public key encryption. What are their differences according to their purpose? (4 pts) Private key is to encrypt the plaintext to be ciphertext, which is to prevent other people knowing your message contents. Public key is usually used for authentication purpose, which is to uniquely identify the sender by looking up the public key table.
  6. In class we discussed different types of computer programming languages. What’s the most important feature of Java, which is not in any others? What’s the tool to implement this feature? (6 pts) Platform independent Java Virtual Machine

i. Analyze the existing system. Determine the new system’s requirements. c. Design i. Create the overall logical design of the project, using tools such as ERD, dataflow diagrams, project dictionary, prototype, etc. d. Implement i. Decide whether to build or buy (request for proposal or quotation). Develop, test, train the personnel, and convert from old to new. e. Maintain i. Evaluate the new system to ensure it has met its intended needs.

  1. Extra Credit: (10 points) Encrypt the following message using a private key of 5: information technology. Decrypt the following ciphertext using a private key of 5: aorotfyneepsnttci. imnnynatofteloicorohg a test of encryption
  1. Matching (20 points)

P 1.^ information

warfare a. (^) a file written to your hard disk by a Web site for the purpose of storing information about your visit.

G 2.^ trojan horse^ b.^ destructive program that activates on a certain date or

event

L 3.^ packet sniffer^ c.^ a program that does not have to be executed in order to

propagate over a network

M 4.^ job fair^ d.^ training on new products by the company that created

them or experts in the field

N 5.^ application

testing e. (^) used to visually show the logic of a program

T 6.^ Cryptography^ f.^ evaluation of the system by end users

R 7.^ conference^ g.^ destructive program disguised as a useful utility or

game

O 8.^ logic error^ h.^ immediate exchange of the existing information system

with the new one

Q 9.^ parallel

conversion i. (^) examination of company refuse for user identifications or passwords

A 10.^ cookie^ j.^ trying the new information system with a small group

within the organization

S 11.^ shoulder

surfing k. (^) demonstrations of new products and services

D 12.^ seminar^ l.^ program that monitors network traffic for useful

information

F 13.^ acceptance

testing m. (^) opportunity to meet with potential employers

J 14.^ pilot

conversion n. (^) testing individual parts of a system and then the entire system together

B 15.^ time bomb^ o.^ allows a program to run but produce an incorrect result

I 16.^ dumpster

diving p. (^) Using information technologies to alter or wipe out an enemy’s information and industrial infrastructure

H 17.^ direct or crash

conversion q. (^) bringing the new system online with the old system to make sure it works before converting completely

C 18.^ worm^ r.^ gathering of university and industry professionals for

discussions

E 19.^ flowchart^ s.^ theft of a user id or password by watching someone

enter keyboard data

K 20.^ trade show^ t.^ study of converting information into encoded or

scrambled formats