Read Carefully Name Answer Key ITEC 1050 Professor Malinowski Exam 3 (100 points) July 24, 2007 Multiple Choice (2 points each) 1. Cookies: a. have no legitimate purpose b. help companies track personal preferences of users c. are malicious programs embedded in useful software d. are popup ads used to sell products 2. A word processing document with an embedded ____________ could be traced back to the computer upon which it was created. a. cookie b. GUID c. macro d. .NET passport 3. Which of the following is NOT a technique you can effectively use to reduce the amount of unauthorized e-mail on your computer? a. Use a temporary e-mail address when visiting a chat room b. Avoid giving your name and e-mail address on marketing questionnaires c. Disable cookies on your Web browser d. Reply to spam and ask to be removed from the mailing list 4. Most computer viruses are spread by: a. CDs and DVDs b. e-mail attachments c. software downloaded from the Internet 5. A destructive program that remains on a computer system until the occurrence of a special event or time is called a: a. time bomb b. Trojan horse c. virus d. worm Name: _____________________________ 6. Internet auction sites are susceptible to the unsavory practices of shills who: a. auction items that do not exist b. secretly bid on items to artificially drive up prices c. auction an attractive item and then mail an inferior version to the winning bidder d. auction an item as “one-of-a-kind” when, in fact there are thousands available 7. Which type of crime occurs when a small amount of money is removed from multiple bank accounts and is transferred to an embezzler’s account? a. Data diddling b. Dumpster diving c. Forgery d. Salami shaving 8. _____________ key encryption requires that the receiver obtain the key before the message can be decoded. a. Asymmetric b. Digital certificate c. Digital signature d. Symmetric 9. Which type of language is representative of the first generation of programming languages? a. Assembly b. Machine c. Procedural d. Object-oriented 10. All of the following languages are considered to be high-level (3rd generation or higher) EXCEPT: a. Assembly b. C c. Java d. Visual Basic Page 2 of 8 Name: _____________________________ 11. What is the best definition of spaghetti code? a. It is the term for an inefficient program, often written by a novice programmer b. It is code characterized by loops in which blocks of code repeat c. It is code containing many IF statements in which different statements are executed, depending on the state of the data d. It is code containing many GOTO statements, which cause unconditional jumps from one section of code to another 12. Structured Query Language (SQL) used in conjunction with database management is often used as an example of a ____________-generation language. a. first b. second c. third d. fourth 13. A project that is ____________ feasible can be completed within an organization’s budget constraints. a. economically b. operationally c. tangibly d. technically 14. If a company wishes to track completion times of various phases of a project, it might make use of a(n): a. data flow diagram b. entity relationship diagram c. Gantt chart d. requirements analysis document 15. A phased system conversion: a. experiments with the new system on only a small group within the organization b. implements components of the new system one at a time c. begins the new system directly after stopping the old one d. runs both the old and new systems simultaneously Page 3 of 8 Name: _____________________________ 16. Which of the following statements best describes a distributed technology infrastructure? a. Each user in an enterprise is able to customize his technology tools b. A central IT department offers a single technology solution to all users c. A distributed database product is used so that users can share remote data. d. Local area networks are connected to a larger company minicomputer or mainframe 17. Assume that you are working in a computer lab. Each time a PC boots, you see the same Windows desktop and application options. This computer lab is using a ____________ structure. a. centralized b. decentralized c. distributed d. hierarchical 18. The ability of hardware and software to effectively adapt to increased demands and volume of use is known as: a. continuity b. compatibility c. interoperability d. scalability 19. The third phase of the PDLC is concerned with: a. coding b. designing the solution c. documentation d. implementation and maintenance 20. A rogue program disguised as a useful program that contains hidden instructions to perform a malicious task. a. worm b. trap door c. trojan horse d. macro Page 4 of 8 Name: _____________________________ 21. The result after applying an encryption key and algorithm to a message. a. cybertext b. decryption c. plaintext d. ciphertext 22. This system conversion involves running the old and new systems simultaneously before converting completely to the new system. a. direct conversion b. parallel conversion c. pilot conversion d. phased conversion 23. This system conversion is also known as a crash conversion. a. direct conversion b. parallel conversion c. pilot conversion d. phased conversion 24. What are the purpose and differences of compiler, assembler and interpreter? (6 points) All these software are used to translate a computer program to machine code. Assembler is to convert a program written by assembly language to machine code, and assembler and interpreter are used to translate a program developed by high level languages to machine code. Compiler translates the whole program as a unit. Interpreter translates one line and executes the line, then move to the next line. 25. In class we discussed the details of private key and public key encryption. What are their differences according to their purpose? (4 pts) Private key is to encrypt the plaintext to be ciphertext, which is to prevent other people knowing your message contents. Public key is usually used for authentication purpose, which is to uniquely identify the sender by looking up the public key table. 26. In class we discussed different types of computer programming languages. What’s the most important feature of Java, which is not in any others? What’s the tool to implement this feature? (6 pts) Platform independent Java Virtual Machine Page 5 of 8 Name: _____________________________ 27. Describe the five generations of programming languages by listing some characteristics of each. Be sure to highlight their differences. (5 points) a. Machine i. 0’s and 1’s. Machine (processor) dependent. Only language the computer understands without further translation. Hard to program without making mistakes. b. Assembly i. Uses mnemonics to make it easier for humans. Assembler processes it into machine language. Also processor dependant. c. Procedural i. Tell the computer what to do and how to do it. Allows the user to create programs at a higher level of abstraction. More userfriendly. Uses compilers and interpreters. Spaghetti code present due to the use of GOTO statements in ealier languages of this type. d. Problem-oriented (non-procedural) i. Query languages like SQL or report generators. Language is closer to normal English, making it easier for the end user to craft their queries. e. Natural i. Spoken languages like English. 28. Provide a definition for syntax and logic errors. Be sure to focus on the difference between them. (8 points) a. Syntax errors violate the grammar rules of the language and are automatically found by the compiler/interpreter when the program is being converted to machine language. Examples are typographical errors such as misspelling a key word (REED instead of READ), a missing semicolon at the end of a line, and using an incorrect symbol (|| instead of //) for a comment. b. Logic errors are not discovered until run-time. Once again, these can be typographical errors, such as a + (addition) in place of a * (multiplication). This is a logic error and not a syntax error. Using a + instead of a * will result in a miscalculation, but it would not violate the grammar rules. Other logic errors would include endless loops and incorrect branch tests. 29. Describe the five phases of the Systems Development Life Cycle (SDLC). (5 points) a. Plan i. Recognize the need, define the problem, examine alternatives, develeop a plan, determine feasibility. b. Analyze Page 6 of 8 Name: _____________________________ i. Analyze the existing system. Determine the new system’s requirements. c. Design i. Create the overall logical design of the project, using tools such as ERD, dataflow diagrams, project dictionary, prototype, etc. d. Implement i. Decide whether to build or buy (request for proposal or quotation). Develop, test, train the personnel, and convert from old to new. e. Maintain i. Evaluate the new system to ensure it has met its intended needs. 30. Extra Credit: (10 points) Encrypt the following message using a private key of 5: information technology. Decrypt the following ciphertext using a private key of 5: aorotfyneepsnttci. imnnynatofteloicorohg a test of encryption Page 7 of 8 Name: _____________________________ 31. Matching (20 points) a. a file written to your hard disk by a Web site for the purpose of storing information about your visit. 2. information warfare trojan horse b. L 3. packet sniffer c. M 4. job fair d. N 5. e. T R 6. application testing Cryptography destructive program that activates on a certain date or event a program that does not have to be executed in order to propagate over a network training on new products by the company that created them or experts in the field used to visually show the logic of a program f. evaluation of the system by end users 7. conference g. O 8. logic error h. Q 9. i. A 10. parallel conversion cookie S 11. k. D 12. shoulder surfing seminar destructive program disguised as a useful utility or game immediate exchange of the existing information system with the new one examination of company refuse for user identifications or passwords trying the new information system with a small group within the organization demonstrations of new products and services F 13. m. J 14. B I 15. acceptance testing pilot conversion time bomb p. H 17. C 18. dumpster diving direct or crash conversion worm E 19. flowchart s. K 20. trade show t. P 1. G 16. j. l. n. o. q. r. program that monitors network traffic for useful information opportunity to meet with potential employers testing individual parts of a system and then the entire system together allows a program to run but produce an incorrect result Using information technologies to alter or wipe out an enemy’s information and industrial infrastructure bringing the new system online with the old system to make sure it works before converting completely gathering of university and industry professionals for discussions theft of a user id or password by watching someone enter keyboard data study of converting information into encoded or scrambled formats Page 8 of 8