Sample DSC340 Final Exam Questions

Transcription

Sample DSC340 Final Exam Questions
DSC 340
Business Information Systems
Sample DSC340 Final Exam Questions
Question 1. When logged in to the network here on campus, you open your browser
and try to surf to the site classes.uoregon.edu. What is “classes.uoregon.edu?”
a) A top level domain
b) A second-level domain
c) A subdomain
d) A domain-name server
Question 2. What is a “domain name registrar?”
a) A firm that leases domain names
b) A firm that sells domain names
c) A person who leases a domain name.
d) A person who buys a domain name.
Question 3. How do we represent the decimal value of 170 in hexadecimal?
a. AA.
b. F20.
c. 17A.
d. None of the above
Question 4. The hex number C8 is equivalent to the decimal value ________.
a.
50.
b.
100.
c.
108.
d.
150.
e.
200.
Question 5. How many different colors are possible when using standard RGB color
codes (such as 33FF00)?
a. 16 * 16 * 16
b. 24 * 24 * 24
c. 128 * 128 * 128
d. 256 * 256 * 256
Question 6. Consider a digital camera sensor that records an image as a grid with
3000 rows and 3000 columns. How many pixels is that camera storing?
a)
3 mega-pixels
b)
6 mega-pixels
c)
9 mega-pixels
d)
30 mega-pixels
Question 7. How many gigabytes of storage will 100 hours of music require, if that
music is digitized via a 192Kbps mp3 encoder? (Assume 200Kbps to make math
easier.)
a)
720 MB
b)
1 GB
c)
9 GB
d)
72 GB
e)
81 GB
DEPARTMENT OF DECISION SCIENCES
1208 University of Oregon, Eugene OR 97403-1208 T (541) 346-3306 F (541) 346-0073 lcb.uoregon.edu
DSC 340
Business Information Systems
Question 8. Estimate the volume of data implied by a video that is 20 minutes long,
assuming 30 frames/sec. Assume each frame has a 1250 x 800 resolution with 65,536
colors.
a)
600 megabytes
b)
1200 megabytes
c)
72 gigabytes
d)
2359 terabytes
Question 9. You want to perform a Google search for any version of Office 2007,
2008, 2009, 2010, and you want pages specifically about the Student Edition and
Windows version, and NOT the Mac version. Which of the following is the Google.com
search query that most closely reflects these stipulations?
a. "student edition" windows "office 2007..2010" -mac
b. "student edition" windows "office 2007..2010" NOT mac
c. "student edition" windows "office 2007, 2008, 2009, 2010" -mac
d. "student edition" windows "office 2007, 2008, 2009, 2010" ~mac
e. "student edition" windows "office 2007 * 2010" ~mac
Question 10. You are interested in pages that include the exact word football and
contain text that starts with “Ducks” and ends with “number one.”
a. “football” “Ducks..number one”
b. ~football “Ducks..number one”
c. “football” “Ducks * number one”
d. ~football “Ducks * number one”
e. ~football “Ducks % number one”
Consider the following two tables: Team and Player.
Team
Player
TeamID
TeamName
Name
TeamID
Phone
1
Lizards
A. Ray
2
344-3431
2
Bluejays
K. Sims
1
234-4578
3
Fish
U. Rye
1
452-2352
M. Erk
3
234-2523
W. Lipp
4
422-2145
S. Stone
2
543-2513
Question 11. How many rows will the following SQL query return?
SELECT * FROM Team, Player
a. 6
b. 9
c. 12
d. 18
DEPARTMENT OF DECISION SCIENCES
1208 University of Oregon, Eugene OR 97403-1208 T (541) 346-3306 F (541) 346-0073 lcb.uoregon.edu
DSC 340
Business Information Systems
Question 12. How many rows will the following SQL query return?
SELECT * FROM Team, Player WHERE Player.TeamID = Team.TeamID
a. 3
b. 5
c. 15
d. 18
Question 13. Identify the correct SQL statement for asking the DBMS to report how
many players are on all teams other than team 4.
a. SELECT count(teamID) FROM Player WHERE TeamID <> 4
b. SELECT sum(teamID) FROM Player WHERE TeamID <> 4
c. SELECT count(teamID) FROM Team WHERE TeamID <> 4
d. SELECT sum(teamID) FROM Team WHERE TeamID <> 4
Question 14. In database terminology, which of the following is most appropriate to
serve as an identifier for an employee entity within a large corporate database?
a. A person’s name.
b. A person’s email address.
c. A person’s password.
d. A person’s birth-date.
Question 15. If Amazon.com wished to have one table that stores all book titles, and
another table that stores the names of all authors, then we would say that the
connecting relationship between book titles and authors is _______.
a. 1-to-1.
b. 1-to-Many.
c. Many-to-1.
d. Many-to-Many.
Question 16. If you have two tables in a relational database and you want to add a oneto-many relationship for those two tables, how do you accomplish that goal?
a. add a foreign-key column to one of the two tables
b. add a foreign-key column to each of the two tables
c. add a foreign-key row to each of the two tables
d. create a new (third) table
Question 17. Complete the analogy- Telephone service: circuit-switched networks;
Internet: _____ networks
a. bit switched
b. line switched
c. data switched
d. packet switched
e. byte switched
Question 18. Public IP addresses are converted to private ones and vice versa using:
a.
PSDN
b.
.NET
c.
ATM
d.
MAC
e.
NAT
DEPARTMENT OF DECISION SCIENCES
1208 University of Oregon, Eugene OR 97403-1208 T (541) 346-3306 F (541) 346-0073 lcb.uoregon.edu
DSC 340
Business Information Systems
Question 19. Which of the following network types would cover the smallest geographic
area?
a) a LAN
b) a WAN
c) an internet
d) the Internet
Question 20. Which of the following technology acronyms refers to resolving an IP
address from a URL such as www.amazon.com?
a) DHCP
b) DNS
c) IEEE
d) TCP
e) MAC
Question 21. Within the .html file:
you wish to include the image:
Valid HTML to do so is:
a. <src=”tv1.jpg”>
b. <img src=”images/tv1.jpg”>
c. <img src=”/images/tv1.jpg”>
d. <pic src=”images/tv1.jpg”>
e. <pic src=”/images/tv1.jpg”>
public_html/products/tvs/TV.html
public_html/products/tvs/images/tv1.jpg
Question 22. The HTML tag you use to create a numbered list is:
a. <BULLET>
b. <BL>
c. <LIST>
d. <OL>
e. <UL>
Question 23. If you are sending a secret message using public-key encryption methods
to your friend, then you will encrypt your outgoing messages with ________ public key,
and you will decrypt incoming messages with ________ private key.
a. her | her
b. your | her
c. her | your
d. your | your
Question 24. With public-key encryption, you sign a message with your ______.
a. private key and that way only your trusted partners can read your message.
b. public key and that way only your trusted partners can read your message.
c. private key and that way the recipients can verify that you wrote the message.
d. public key and that way the recipients can verify that you wrote the message.
DEPARTMENT OF DECISION SCIENCES
1208 University of Oregon, Eugene OR 97403-1208 T (541) 346-3306 F (541) 346-0073 lcb.uoregon.edu
DSC 340
Business Information Systems
Question 25. What will this CSS style declaration do?
h1 h6 {font-family: times;}
a. style h1 will be assigned font “times,” h6 will have no assigned font
b. style h1 and h6 will be assigned font “times”
c. occurrences of style h1 within h6 will be assigned font “times”
d. occurrences of style h6 within h1 will be assigned font “times”
e. styles h1 through h6 (i.e., h1, h2, h3, h4, h5, and h6) will be assigned font “times”
Question 26. Consider the following lines of CSS / HTML within a file:
h1{color:yellow;}
body{color:green}
p{color:black}
<body>
<h1> Welcome!! </h1>
<br> Currently under construction.
</body>
The text “Welcome!!” will render as ________ and the text “Currently under
construction…” will render as ________.
a. yellow
| black
b. yellow
| green
c. green
| black
d. green
| green
Question 27. Where in an HTML page should you refer to an external style sheet?
a. In the <head> section
b. At the end of the document (after the <body>)
c. In the <body> section
d. At the top of the document (before the <head>)
Question 28. If modeling a decision problem in Excel with two decision variables, and
you want to assess a wide range of values for both decision variables, then you should
consider using a…
a. One-way Data Table
b. Two-way Data Table
c. Pivot table
d. VLOOKUP table
Question 29. A virus embedded in a legitimate file is called a(n)__________.
(a) worm
(b) Trojan
(c) hack
(d) theft
(e) active content
Question 30. What are cookies?
(a) Text files used by browsers to store information
(b) Review IP address to track online browsing
(c) Hidden applications to record keystrokes
(d) Malware designed to slow down your PC
(e) Program offered by an organization which post rules
DEPARTMENT OF DECISION SCIENCES
1208 University of Oregon, Eugene OR 97403-1208 T (541) 346-3306 F (541) 346-0073 lcb.uoregon.edu