Sample DSC340 Final Exam Questions
Transcription
Sample DSC340 Final Exam Questions
DSC 340 Business Information Systems Sample DSC340 Final Exam Questions Question 1. When logged in to the network here on campus, you open your browser and try to surf to the site classes.uoregon.edu. What is “classes.uoregon.edu?” a) A top level domain b) A second-level domain c) A subdomain d) A domain-name server Question 2. What is a “domain name registrar?” a) A firm that leases domain names b) A firm that sells domain names c) A person who leases a domain name. d) A person who buys a domain name. Question 3. How do we represent the decimal value of 170 in hexadecimal? a. AA. b. F20. c. 17A. d. None of the above Question 4. The hex number C8 is equivalent to the decimal value ________. a. 50. b. 100. c. 108. d. 150. e. 200. Question 5. How many different colors are possible when using standard RGB color codes (such as 33FF00)? a. 16 * 16 * 16 b. 24 * 24 * 24 c. 128 * 128 * 128 d. 256 * 256 * 256 Question 6. Consider a digital camera sensor that records an image as a grid with 3000 rows and 3000 columns. How many pixels is that camera storing? a) 3 mega-pixels b) 6 mega-pixels c) 9 mega-pixels d) 30 mega-pixels Question 7. How many gigabytes of storage will 100 hours of music require, if that music is digitized via a 192Kbps mp3 encoder? (Assume 200Kbps to make math easier.) a) 720 MB b) 1 GB c) 9 GB d) 72 GB e) 81 GB DEPARTMENT OF DECISION SCIENCES 1208 University of Oregon, Eugene OR 97403-1208 T (541) 346-3306 F (541) 346-0073 lcb.uoregon.edu DSC 340 Business Information Systems Question 8. Estimate the volume of data implied by a video that is 20 minutes long, assuming 30 frames/sec. Assume each frame has a 1250 x 800 resolution with 65,536 colors. a) 600 megabytes b) 1200 megabytes c) 72 gigabytes d) 2359 terabytes Question 9. You want to perform a Google search for any version of Office 2007, 2008, 2009, 2010, and you want pages specifically about the Student Edition and Windows version, and NOT the Mac version. Which of the following is the Google.com search query that most closely reflects these stipulations? a. "student edition" windows "office 2007..2010" -mac b. "student edition" windows "office 2007..2010" NOT mac c. "student edition" windows "office 2007, 2008, 2009, 2010" -mac d. "student edition" windows "office 2007, 2008, 2009, 2010" ~mac e. "student edition" windows "office 2007 * 2010" ~mac Question 10. You are interested in pages that include the exact word football and contain text that starts with “Ducks” and ends with “number one.” a. “football” “Ducks..number one” b. ~football “Ducks..number one” c. “football” “Ducks * number one” d. ~football “Ducks * number one” e. ~football “Ducks % number one” Consider the following two tables: Team and Player. Team Player TeamID TeamName Name TeamID Phone 1 Lizards A. Ray 2 344-3431 2 Bluejays K. Sims 1 234-4578 3 Fish U. Rye 1 452-2352 M. Erk 3 234-2523 W. Lipp 4 422-2145 S. Stone 2 543-2513 Question 11. How many rows will the following SQL query return? SELECT * FROM Team, Player a. 6 b. 9 c. 12 d. 18 DEPARTMENT OF DECISION SCIENCES 1208 University of Oregon, Eugene OR 97403-1208 T (541) 346-3306 F (541) 346-0073 lcb.uoregon.edu DSC 340 Business Information Systems Question 12. How many rows will the following SQL query return? SELECT * FROM Team, Player WHERE Player.TeamID = Team.TeamID a. 3 b. 5 c. 15 d. 18 Question 13. Identify the correct SQL statement for asking the DBMS to report how many players are on all teams other than team 4. a. SELECT count(teamID) FROM Player WHERE TeamID <> 4 b. SELECT sum(teamID) FROM Player WHERE TeamID <> 4 c. SELECT count(teamID) FROM Team WHERE TeamID <> 4 d. SELECT sum(teamID) FROM Team WHERE TeamID <> 4 Question 14. In database terminology, which of the following is most appropriate to serve as an identifier for an employee entity within a large corporate database? a. A person’s name. b. A person’s email address. c. A person’s password. d. A person’s birth-date. Question 15. If Amazon.com wished to have one table that stores all book titles, and another table that stores the names of all authors, then we would say that the connecting relationship between book titles and authors is _______. a. 1-to-1. b. 1-to-Many. c. Many-to-1. d. Many-to-Many. Question 16. If you have two tables in a relational database and you want to add a oneto-many relationship for those two tables, how do you accomplish that goal? a. add a foreign-key column to one of the two tables b. add a foreign-key column to each of the two tables c. add a foreign-key row to each of the two tables d. create a new (third) table Question 17. Complete the analogy- Telephone service: circuit-switched networks; Internet: _____ networks a. bit switched b. line switched c. data switched d. packet switched e. byte switched Question 18. Public IP addresses are converted to private ones and vice versa using: a. PSDN b. .NET c. ATM d. MAC e. NAT DEPARTMENT OF DECISION SCIENCES 1208 University of Oregon, Eugene OR 97403-1208 T (541) 346-3306 F (541) 346-0073 lcb.uoregon.edu DSC 340 Business Information Systems Question 19. Which of the following network types would cover the smallest geographic area? a) a LAN b) a WAN c) an internet d) the Internet Question 20. Which of the following technology acronyms refers to resolving an IP address from a URL such as www.amazon.com? a) DHCP b) DNS c) IEEE d) TCP e) MAC Question 21. Within the .html file: you wish to include the image: Valid HTML to do so is: a. <src=”tv1.jpg”> b. <img src=”images/tv1.jpg”> c. <img src=”/images/tv1.jpg”> d. <pic src=”images/tv1.jpg”> e. <pic src=”/images/tv1.jpg”> public_html/products/tvs/TV.html public_html/products/tvs/images/tv1.jpg Question 22. The HTML tag you use to create a numbered list is: a. <BULLET> b. <BL> c. <LIST> d. <OL> e. <UL> Question 23. If you are sending a secret message using public-key encryption methods to your friend, then you will encrypt your outgoing messages with ________ public key, and you will decrypt incoming messages with ________ private key. a. her | her b. your | her c. her | your d. your | your Question 24. With public-key encryption, you sign a message with your ______. a. private key and that way only your trusted partners can read your message. b. public key and that way only your trusted partners can read your message. c. private key and that way the recipients can verify that you wrote the message. d. public key and that way the recipients can verify that you wrote the message. DEPARTMENT OF DECISION SCIENCES 1208 University of Oregon, Eugene OR 97403-1208 T (541) 346-3306 F (541) 346-0073 lcb.uoregon.edu DSC 340 Business Information Systems Question 25. What will this CSS style declaration do? h1 h6 {font-family: times;} a. style h1 will be assigned font “times,” h6 will have no assigned font b. style h1 and h6 will be assigned font “times” c. occurrences of style h1 within h6 will be assigned font “times” d. occurrences of style h6 within h1 will be assigned font “times” e. styles h1 through h6 (i.e., h1, h2, h3, h4, h5, and h6) will be assigned font “times” Question 26. Consider the following lines of CSS / HTML within a file: h1{color:yellow;} body{color:green} p{color:black} <body> <h1> Welcome!! </h1> <br> Currently under construction. </body> The text “Welcome!!” will render as ________ and the text “Currently under construction…” will render as ________. a. yellow | black b. yellow | green c. green | black d. green | green Question 27. Where in an HTML page should you refer to an external style sheet? a. In the <head> section b. At the end of the document (after the <body>) c. In the <body> section d. At the top of the document (before the <head>) Question 28. If modeling a decision problem in Excel with two decision variables, and you want to assess a wide range of values for both decision variables, then you should consider using a… a. One-way Data Table b. Two-way Data Table c. Pivot table d. VLOOKUP table Question 29. A virus embedded in a legitimate file is called a(n)__________. (a) worm (b) Trojan (c) hack (d) theft (e) active content Question 30. What are cookies? (a) Text files used by browsers to store information (b) Review IP address to track online browsing (c) Hidden applications to record keystrokes (d) Malware designed to slow down your PC (e) Program offered by an organization which post rules DEPARTMENT OF DECISION SCIENCES 1208 University of Oregon, Eugene OR 97403-1208 T (541) 346-3306 F (541) 346-0073 lcb.uoregon.edu