Name - Armstrong Atlantic State University

advertisement
Read Carefully
Name Answer Key
ITEC 1050
Professor Malinowski
Exam 3 (100 points)
July 24, 2007
Multiple Choice (2 points each)
1. Cookies:
a. have no legitimate purpose
b. help companies track personal preferences of users
c. are malicious programs embedded in useful software
d. are popup ads used to sell products
2. A word processing document with an embedded ____________ could be traced back
to the computer upon which it was created.
a. cookie
b. GUID
c. macro
d. .NET passport
3. Which of the following is NOT a technique you can effectively use to reduce the
amount of unauthorized e-mail on your computer?
a. Use a temporary e-mail address when visiting a chat room
b. Avoid giving your name and e-mail address on marketing questionnaires
c. Disable cookies on your Web browser
d. Reply to spam and ask to be removed from the mailing list
4. Most computer viruses are spread by:
a. CDs and DVDs
b. e-mail attachments
c. software downloaded from the Internet
5. A destructive program that remains on a computer system until the occurrence of a
special event or time is called a:
a. time bomb
b. Trojan horse
c. virus
d. worm
Name: _____________________________
6. Internet auction sites are susceptible to the unsavory practices of shills who:
a. auction items that do not exist
b. secretly bid on items to artificially drive up prices
c. auction an attractive item and then mail an inferior version to the winning
bidder
d. auction an item as “one-of-a-kind” when, in fact there are thousands available
7. Which type of crime occurs when a small amount of money is removed from multiple
bank accounts and is transferred to an embezzler’s account?
a. Data diddling
b. Dumpster diving
c. Forgery
d. Salami shaving
8. _____________ key encryption requires that the receiver obtain the key before the
message can be decoded.
a. Asymmetric
b. Digital certificate
c. Digital signature
d. Symmetric
9. Which type of language is representative of the first generation of programming
languages?
a. Assembly
b. Machine
c. Procedural
d. Object-oriented
10. All of the following languages are considered to be high-level (3rd generation or
higher) EXCEPT:
a. Assembly
b. C
c. Java
d. Visual Basic
Page 2 of 8
Name: _____________________________
11. What is the best definition of spaghetti code?
a. It is the term for an inefficient program, often written by a novice programmer
b. It is code characterized by loops in which blocks of code repeat
c. It is code containing many IF statements in which different statements are
executed, depending on the state of the data
d. It is code containing many GOTO statements, which cause unconditional
jumps from one section of code to another
12. Structured Query Language (SQL) used in conjunction with database management is
often used as an example of a ____________-generation language.
a. first
b. second
c. third
d. fourth
13. A project that is ____________ feasible can be completed within an organization’s
budget constraints.
a. economically
b. operationally
c. tangibly
d. technically
14. If a company wishes to track completion times of various phases of a project, it might
make use of a(n):
a. data flow diagram
b. entity relationship diagram
c. Gantt chart
d. requirements analysis document
15. A phased system conversion:
a. experiments with the new system on only a small group within the
organization
b. implements components of the new system one at a time
c. begins the new system directly after stopping the old one
d. runs both the old and new systems simultaneously
Page 3 of 8
Name: _____________________________
16. Which of the following statements best describes a distributed technology
infrastructure?
a. Each user in an enterprise is able to customize his technology tools
b. A central IT department offers a single technology solution to all users
c. A distributed database product is used so that users can share remote data.
d. Local area networks are connected to a larger company minicomputer or
mainframe
17. Assume that you are working in a computer lab. Each time a PC boots, you see the
same Windows desktop and application options. This computer lab is using a
____________ structure.
a. centralized
b. decentralized
c. distributed
d. hierarchical
18. The ability of hardware and software to effectively adapt to increased demands and
volume of use is known as:
a. continuity
b. compatibility
c. interoperability
d. scalability
19. The third phase of the PDLC is concerned with:
a. coding
b. designing the solution
c. documentation
d. implementation and maintenance
20. A rogue program disguised as a useful program that contains hidden instructions to
perform a malicious task.
a. worm
b. trap door
c. trojan horse
d. macro
Page 4 of 8
Name: _____________________________
21. The result after applying an encryption key and algorithm to a message.
a. cybertext
b. decryption
c. plaintext
d. ciphertext
22. This system conversion involves running the old and new systems simultaneously
before converting completely to the new system.
a. direct conversion
b. parallel conversion
c. pilot conversion
d. phased conversion
23. This system conversion is also known as a crash conversion.
a. direct conversion
b. parallel conversion
c. pilot conversion
d. phased conversion
24. What are the purpose and differences of compiler, assembler and interpreter? (6
points)
All these software are used to translate a computer program to machine code.
Assembler is to convert a program written by assembly language to machine
code, and assembler and interpreter are used to translate a program developed
by high level languages to machine code. Compiler translates the whole program
as a unit. Interpreter translates one line and executes the line, then move to the
next line.
25. In class we discussed the details of private key and public key encryption. What are
their differences according to their purpose? (4 pts)
Private key is to encrypt the plaintext to be ciphertext, which is to prevent other
people knowing your message contents. Public key is usually used for
authentication purpose, which is to uniquely identify the sender by looking up
the public key table.
26. In class we discussed different types of computer programming languages. What’s the
most important feature of Java, which is not in any others? What’s the tool to
implement this feature? (6 pts)
Platform independent
Java Virtual Machine
Page 5 of 8
Name: _____________________________
27. Describe the five generations of programming languages by listing some
characteristics of each. Be sure to highlight their differences. (5 points)
a. Machine
i. 0’s and 1’s. Machine (processor) dependent. Only language the
computer understands without further translation. Hard to
program without making mistakes.
b. Assembly
i. Uses mnemonics to make it easier for humans. Assembler
processes it into machine language. Also processor dependant.
c. Procedural
i. Tell the computer what to do and how to do it. Allows the user to
create programs at a higher level of abstraction. More userfriendly. Uses compilers and interpreters. Spaghetti code present
due to the use of GOTO statements in ealier languages of this type.
d. Problem-oriented (non-procedural)
i. Query languages like SQL or report generators. Language is
closer to normal English, making it easier for the end user to craft
their queries.
e. Natural
i. Spoken languages like English.
28. Provide a definition for syntax and logic errors. Be sure to focus on the difference
between them. (8 points)
a. Syntax errors violate the grammar rules of the language and are
automatically found by the compiler/interpreter when the program is
being converted to machine language. Examples are typographical errors
such as misspelling a key word (REED instead of READ), a missing
semicolon at the end of a line, and using an incorrect symbol (|| instead of
//) for a comment.
b. Logic errors are not discovered until run-time. Once again, these can be
typographical errors, such as a + (addition) in place of a *
(multiplication). This is a logic error and not a syntax error. Using a +
instead of a * will result in a miscalculation, but it would not violate the
grammar rules. Other logic errors would include endless loops and
incorrect branch tests.
29. Describe the five phases of the Systems Development Life Cycle (SDLC). (5 points)
a. Plan
i. Recognize the need, define the problem, examine alternatives,
develeop a plan, determine feasibility.
b. Analyze
Page 6 of 8
Name: _____________________________
i. Analyze the existing system. Determine the new system’s
requirements.
c. Design
i. Create the overall logical design of the project, using tools such as
ERD, dataflow diagrams, project dictionary, prototype, etc.
d. Implement
i. Decide whether to build or buy (request for proposal or
quotation). Develop, test, train the personnel, and convert from
old to new.
e. Maintain
i. Evaluate the new system to ensure it has met its intended needs.
30. Extra Credit: (10 points)
Encrypt the following message using a private key of 5: information technology.
Decrypt the following ciphertext using a private key of 5: aorotfyneepsnttci.
imnnynatofteloicorohg
a test of encryption
Page 7 of 8
Name: _____________________________
31. Matching (20 points)
a.
a file written to your hard disk by a Web site for the purpose
of storing information about your visit.
2.
information
warfare
trojan horse
b.
L
3.
packet sniffer
c.
M
4.
job fair
d.
N
5.
e.
T
R
6.
application
testing
Cryptography
destructive program that activates on a certain date or
event
a program that does not have to be executed in order to
propagate over a network
training on new products by the company that created
them or experts in the field
used to visually show the logic of a program
f.
evaluation of the system by end users
7.
conference
g.
O
8.
logic error
h.
Q
9.
i.
A
10.
parallel
conversion
cookie
S
11.
k.
D
12.
shoulder
surfing
seminar
destructive program disguised as a useful utility or
game
immediate exchange of the existing information system
with the new one
examination of company refuse for user identifications
or passwords
trying the new information system with a small group
within the organization
demonstrations of new products and services
F
13.
m.
J
14.
B
I
15.
acceptance
testing
pilot
conversion
time bomb
p.
H
17.
C
18.
dumpster
diving
direct or crash
conversion
worm
E
19.
flowchart
s.
K
20.
trade show
t.
P
1.
G
16.
j.
l.
n.
o.
q.
r.
program that monitors network traffic for useful
information
opportunity to meet with potential employers
testing individual parts of a system and then the entire
system together
allows a program to run but produce an incorrect result
Using information technologies to alter or wipe out an
enemy’s information and industrial infrastructure
bringing the new system online with the old system to
make sure it works before converting completely
gathering of university and industry professionals for
discussions
theft of a user id or password by watching someone
enter keyboard data
study of converting information into encoded or
scrambled formats
Page 8 of 8
Download