. | |
Permanent data is stored on disk instead of in RAM because | A.
disk is faster than RAM B. IC memory is volatile C. disks can be replaced when they fail D. RAM is vulnerable to hackers |
. | |
"Drop down" refers to | A.
a style of menu B. an earthquake protection strategy C. reduction in available memory D. reduction of processor speed E. increasing miniaturization of circuits |
. | |
When
we speak of a computer system's "desktop" ... |
A.
we are referring to the external case B. we are using a metaphor C. we mean any part which sits on the desk (as opposed to under it, for example) D. we mean the shell of a Unix system |
. | |
Which
of the following (parts of URLs or e-mail addresses) generally IS
case-sensitive? |
A.
the path B. the domain C. the username D. the protocol E. the port |
Try it out! Type a URL into a
browser, such as Then change one letter from upper to lower case, or
vice versa, in different parts of the string. Try the same with an
e-mail address. |
. | |
When
an host (domain) name is translated into an IP address, which part of
the IP
address is the translation of the TLD? |
A.
The first 3 digits B. The seond 3 digts C. The third 3 digits D. The fourth 3 digits E. There is no simple correspondence |
Just like, your last name
doesn't
translate into any particular part of your phone number. You have
to look it up in the
phone book. The Domain Name System (DNS) provides the look-up for
domain names. |
. | |
When
a packet is sent from one host to another on the Internet, it may
pass through several other computers (hosts and routers). What
prevents an evil computer from deliberately not forwarding the packet
to the proper place? |
A.
a password B. a sequence code C. on-line monitoring by the W3C D. the http protocol E. none of the above |
The Internet was originally
designed with the idea that the computers were cooperative and
trustworthy. It is impossible to prevent incorrect
or malicious decisions by the individual computers. In fact, it
is difficult even to detect such actions after the fact.
Fortunately, there is strong social pressure for the operators of
Internet computers and routers to behave properly. |
. | |
A
student whose UWNetID is snoboader has a Dante account set up in the
usual way. In the web area, the student has created a directory
called images with a subdirectory called snowy, and within snowy there
are files, including one named holiday.html and another named
powder.jpg. (Pause for a breath! Visualize or draw the
structure). What is the correct URL to reach the page holiday.html? |
A.
http://students.washington.edu/snoboader/public_html/snowy/images/holiday.html B. http://dante.washington.edu/public_html/holiday.html C. ssh://snoboader.u.washington.edu/holiday.html D. http://students.washington.edu/snoboader/images/snowy/holiday.html E. http://snoboader.washington.edu/images.snowy |
. | |
(Same
situation as above) If the page holiday.html contains an img
tag, what is a correct way for the tag to reference the file powder.jpg? |
A.
src="powder.jpg" B. src="images/powder.jpg" C. src="/images/powder.jpg" D. src="snowy/images/powder.jpg" E. src="holiday.html/powder.jpg" |
. | |
On
Unix systems, typing in the command ls ... |
A.
logs the user out of a shell B. logs the user into a shell C. shows directories and files D. starts SSH E. shows the last time SSH was used |
. | |
On
a Unix system, if you are in a directory named lab2 and want
to get to the directory which contains it, a suitable command would be |
A.
mkdir lab2 B. pwd /lab2 C. pwd lab2/.. D. exit lab2 E. cd .. |
. | |
The
main purpose of the site http://validator.w3.org
is to: |
A.
index web pages B. modify (mark up) web pages C. be a reference manual for W3C standards of all kinds D. point out possible errors in html code E. validate domains |
. | |
Ethernet
is used primarily |
A.
within a PAN B. within a LAN C. within a WAN D. to connect major gateways on the Internet E. internally within a computer |
. | |
The
number of "hops" of a packet refers to |
A.
how many times it is sent back because of errors B. how many times it is forwarded before reaching the destination C. the number of top-level domains it must travel to reach its destination D. the number of data bytes it contains E. the number of different hosts it is addressed to |
. | |
What
is true about default web pages? |
A.
Whenever the server cannot find a requested page (because a URL is
incorrect), it creates a default web page B. There can only be one default web page per site C. There can be a default web page in each folder within a web site D. On every system, a default web page must be named index.html |
See Lab 3. A default web
page has a special name, such as index.htm or index.html, which is
known to the web server. You can place such a page within any
directory of a web site. |
. | |
The
hexadecimal number #990003 represents a shade of |
A.
black B. gray C. blue D. green E. red |
. | |
Which
statement is true about files whose name ends in .jpg? |
A.
Giving a file a name ending in .jpg makes it an image file B. Giving a file a name ending in .jpg compresses it C. Giving a file a name ending in .jpg signals that it should contain an image D. Changing a file name which ends in .jpg to .doc converts the file to Word document format |
There is no necessary
relationship between the contents of a file and the name given to the
file. Changing a file name does not change the contents of the
file (and vice versa). A name ending in .jpg is normally given to
files containing images compressed in a certain format. Some
applications may operate incorrectly if that convention is
violated. Still, there is nothing to prevent an uninformed or
malicious user from naming files inappropriately. |
. | |
A
Domain Name Server |
A.
lets companies and individual register names for their use B. locates the IP address for domains C. locates the domain name given a IP address D. is an organization which decides which decides which domain names are legal |
Also see note on question
#5. The DNS is the Internet's internal, on-line look-up service
for translating domain names (host names) into IP
addresses.
A Domain Name Server or DNS server is a computer which provides such a
service. This is needed to support the Internet's primary
activity, which is routing packets to the right place, since packets
are addressed by IP address rather than domain name. The
reverse operation (C) is less crucial and might be available though a
"whois" service. |
. (worth 4 MC questions) | |
Here
is a small html file. In the space to the side, render it as
best
you can: draw a browser window and the file as it would be displayed. <html> <head><title>Color Magic</title></head> <body>January 1, 1977 <h1>Rainbow colors</h1> Traditionally, the colors of the rainbow are <ol> <li>red orange yellow</li> <li>green<br>blue</li></ol> violet. <p>Tradition <b>can</b> be misleading.</p> </body> </html> |
January 1, 1977
Rainbow colorsTraditionally, the colors of the rainbow are
Tradition can be misleading. |
In addition to the rendering shown, a fully correct answer should also indicate that the browser displays "Color Magic" in the title bar of its window (not in the same area as the page). |
. (worth 2 MC questions) | |
Is
the Internet the same thing as the World Wide Web? Answer Yes
or No, and the explain
your answer in no more than one paragraph. |
The
answer is No. There were many ways of explaining this.
The basic idea is that the Internet is the totality of hardware
(subnetworks, computers, wires, routers, etc.) connected directly or
indirectly through certain pathways (the Internet backbones, the root
domain servers) and communicating using Internet protocols (such as
TCP/IP); whereas the Web is a set of protocols (such as http) and
applications (primarily web servers and web browsers) which use the
Internet to facilitate retrieving information, such as files and
images, primarily by end users. Without the Internet, the Web
would not exist. Without the Web, the Internet would still exist
and do useful things (e-mail, FTP, etc.). |
|
. (worth 2 MC questions) | |
Sometimes
using a hierarchy works better for
finding information than
an index-based strategy, and sometimes the reverse is true. Give
a brief (but convincing!) example of each situation. |
For
full credit, it wasn't enough to give definitions. You had to
give convincing, concrete examples. The examples did not have to
computer-based. |