FINALS

Subdecks (1)

Cards (70)

  • Which statement(s) is/are true?
    S1) When two computers are connected over the Internet, they can send and receive all kinds of information such as text, graphics, voice,
    video, and computer programs.
    S2) A single person did not create the Internet that we know and use today.
    S3) There are people who helped contribute to and develop the Internet.
    1. S1 & S3 are true. B) S2 is true. C) S3 is true. D) All of the choice
    D
  • These helps people find the information they are looking for online using keywords or phrases.
    1. web browser B) search engine C) HTML D) None of the choice
    V
  • Which statement(s) is/are true?
    S1) Internet is a means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers .
    S2) The Internet also has hundreds of services that help make life more convenient.
    S3) The Arpanet contains billions of web pages making it a limitless place to locate information and entertainment.
    1. S1 is true. B) S2 is true. C) S1 & S3 are true. D) All of the choices.
    A
  • A ___is a software program created as a simplified means to present and explore content on the World Wide Web.
    1. web browser B) search engine C) HTML D) None of the choices.
    A
  • ___ translates domain names to IP addresses so browsers can load Internet resources.
    1. UDP B) TCP/IP C) DNS D) None of the choices
    C
  • These is the places where the ARPANET host located.
    1. UCLA & MIT B) SRI & HARVARD C) UCLA & SRI D) None of the choices.

    C
  • hat is the meaning of URL?
    1. Universal Resource Locator C) Uniform Resource Location
    B) Uniform Reference Locator D) None of the choices
    D
  • He attempt to log into the SRI computer from UCLA but it encounters a system error or crash. Who is this?
    1. JCR Licklider B) Leonard Kleinrock C) Charlie Kline D) None of the choices.
    D - CHARLEY
  • This protocol is still the primary protocol used on the Internet today.
    1. UDP B) TCP/IP C) DNS D) None of the choices.
    B
  • What was the name of “Internet” before?
    1. MOSAIC B) ARPANET C) IMP D) None of the choices
    B
  • It is the first Text based web browser created by Berners-Lee in 1990.
    1. MOSAIC B) NETSCAPE C) NEXUS D) None of the choices.

    C
  • BBN was awarded the contract to design and build the IMP subnetwork. What is the meaning of BBN?
    1. Bolt, Beranek & Newman C) Bulk, Beranek & Newman
    B) Bolt, Barenek & Newman D) None of the choices.
    A
  • Which statement(s) is/are true?
    S1) The full form of the internet is an Interconnected Network.
    S2) The interconnected network is basically a combination of various computer nodes along with a mobile, computer and various servers.
    S3) The Internet contains billions of web pages created by people and companies from around the world .
    1. S1 is true. B) S2 is true. C) S1 & S3 are true. D) All of the choices.
    D
  • “Bus topology consists of one continuous length of cable that is shared by all the nodes in the network and a terminating resistor at each end
    that absorbs the signal when it reaches the beginning of line.”
    1. The statement is true. B) The statement is false. C) None of the choices.
    B
  • Each node on a network has a unique address, known as an ___ address.
    1. DNS B) UDP C) IP D) None of the choices.
    C
  • n mesh topology, ___ means that the link carries the traffic only between two devices it connects.
    1. dedicated B) node C) connecting D) None of the choices
    A
  • What kind of topology is a good example for peer to peer relationship?
    1. star topology B) mesh topology C) bus topology D) None of the choices.
    B
  • Which statement(s) is/are true?
    S1) In choosing network node it must consider that not all network hardware are available in particular area.
    S2) It must put into consideration that budget is very important in choosing network topology.
    S3) The size of the nodes matter when choosing network topology.
    1. S1 is true. B) S2 is true. C) S1 & S3 are true. D) All of the choices
    B
  • In ___, each node is connected to every other node in the network.
    1. star topology B) ring topology C) bus topology D) None of the choices.
    D
  • his unique address allows device to identify and communicate with a node.
    1. DNS B) UDP C) IP D) None of the choices.
    C
  • Which statement(s) is/are true?
    S1) The term Network Nodes defines the geographic arrangement of computer networking devices.
    S2) Ease of Implementation is one factors when choosing a network node.
    S3) The term Topology refers to the way in which the various nodes or computers of a network are linked together .
    1. S1 & S3 are true. B) S2 is true. C) S3 is true. D) All of the choices
    C
  • There are how many node relationships in a network?
    1. 2 B) 3 C) 4 D) None of the choices
    A
  • The physical ring Topology is a circular loop of point-to-point ___. Each device connects directly to the ring or indirectly through and interface
    device or drop cable.
    1. Nodes B) Links C) End D) None of the choices
    B
  • The following are basic network topology, except;
    1. Bus Topology
    B) Ring Topology
    C) Star Topology
    D) None of the choice
    D
  • Lawrence Roberts and Barry Wessler created this specialized computer that was used to connect networks to the ARPANET.
    1. MODEM B) TCP C) IMP D) None of the choices.
    C
  • The initial idea of the Internet is credited to ___.
    1. JCR Licklider B) Leonard Kleinrock C) Charlie Kline D) None of the choices.
    B
  • Star Topology has ___ between other computers and the computers can communicate via central controller only.
    1. direct link B) reverse link C) no direct link D) None of the choices.
    C
  • The following are Factors when choosing a network topology, except;
    1. Future expansion
    B) Reliability
    C) Credibility
    D) None of the choices.
    C
  • Which statement(s) is/are true?
    S1) There’s no one-size-fits-all when it comes to network topology.
    S2) Topology determines the data paths that may be used between any pair of devices of the network.
    S3) Two or more links form a topology.
    1. S1 is true. B) S2 is true. C) S2 & S3 are true. D) All of the choices.
    D
  • In star topology the ___ acts as a server and the connecting nodes act as clients.
    1. node B) center C) device D) None of the choices
    D
  • Which statement(s) is/are true?
    S1) The ILOVEYOU virus obtained a world record for being the most virulent biological virus at the time.
    S2) Republic Act No. 8972, otherwise known as the E-Commerce Law.
    S3) Since there were no laws in the Philippines against writing malware at the time, both Ramones and de Guzman were
    released with all charges dropped by state prosecutors.
    1. S1 is true.
    B) S2 is true
    C) S3 is true.
    D) All statements are true
    C
  • A computer that is infected with this kind of computer virus will display a short poem on every 40th boot. What is this?
    1. Trojan Horse
    B) Elk Cloner
    C) Worm
    D) None of the choices.
    D
  • ___ is a program that appears to be something safe, but in is performing tasks such as giving access to your computer or
    sending personal information to other computers.
    1. Trojan horse
    B) Worm
    C) ILoveYou
    D) None of the choices
    A
  • Iloveyou virus carrying messages generated in the Philippines began to spread Eastwards through corporate email systems
    starting with?
    1. Norway
    B) Hongkong
    C) UK
    D) None of the choices
    D - WESTWARDS
  • Which statement(s) is/are true?
    S1) If a computer infects a virus without an antivirus program, it may delete files, prevent access to files, send spam, spy on
    you, or perform other malicious actions.
    S2) If and when a virus is detected, the computer displays a warning asking what action should be done, often giving the
    options to remove, ignore, or move the file to the vault.
    S3) An antivirus program is a software utility designed to protect your computer or network against biological viruses.
    1. S1 is true.
    B) S2 is true
    C) S3 is true.
    D) All statements are true.
    B
  • ___ coined the term virus in a 1984 research paper as "a computer program that can affect other computer programs by
    modifying them in such a way as to include a (possibly evolved) copy of itself."
    1. Rich Skrenta
    B) John von Neumann
    C) Fred Cohen
    D) None of the choices
    C
  • To make money, to steal account information and to cause problems and trouble for others are?
    1. Not the reasons why computer viruses are created.
    B) The content of biological virus.
    C) The golden rules of computer.
    D) None of the choices.
    D
  • Which statement(s) is/are true?
    S1) No major operating systems can contract a computer virus.
    S2) You can’t protect your computer from viruses by installing an antivirus protection program.
    S3) If you do not update your antivirus it will not be able to detect any new virus.
    1. S1 is true.
    B) S2 is true
    C) S3 is true.
    D) All statements are true.
    C
  • It is a powerful computer worm designed by U.S. and Israeli. It was designed to destroy the centrifuges Iran was using to enrich
    uranium as part of its nuclear program.
    1. StuxNet
    B) Trojan Horse
    C) Elk Cloner
    D) None of the choices.
    A
  • Once installed on a computer a virus monitors, detects, and cleans any computer viruses by looking for ___.
    1. virus signatures
    B) virus
    C) Signatures
    D) None of the choices.
    D