You are on page 1of 14

CS 006: Practice Final

UC Riverside
NAME_______________________ LAST 4 SID______________________

1. By market cap, on May 2018, what were the 4 most valuable companies on the planet
earth?
a. Google (Alphabet), Apple, Amazon, Microsoft
b. Google (Alphabet), Apple, Amazon, Facebook
c. Google (Alphabet), Amazon, Microsoft, Samsung
d. Google (Alphabet), Amazon, Microsoft, AT&T
e. None of the above

2. The combined value of the 4 largest companies in the world in May of 2018 was
approximately as large as the GDP for China, Brazil, and India.
a. TRUE
b. FALSE

3. Microsoft’s first commercial product operating system was Windows 1.


a. TRUE
b. FALSE

4. Apple earned parity in market share for operating systems with Microsoft shortly after the
two companies came into existence.
a. TRUE
b. FALSE
c.
5. Which 4 universities connected first on ARPANET?
a. UCSB, UCR, MIT, HARVARD
b. UCLA, UCSB, UTAH, STANFORD
c. UCLA, UCSD, UTAH, STANFORD
d. UCSB, UCLA, MIT, HARVARD

6. DNS
a. What does DNS stand for?
Answer: Domain Name System (Server OK)

b. What does a DNS server do?


Answer: Translates human-readable domain to numeric IP address.
Example: www.google.com to 216.58.193.206.

7. What does URL stand for?


Answer: Uniform Resource Locator
CS 006: Practice Final
UC Riverside
NAME_______________________ LAST 4 SID______________________
8. What are the two main components of a URL? Give an example domain that uses https.
Then label each of the two main components of the URL.
Answer:
Protocol identifier:
http://example.com (http, Hypertext Transfer Protocol)
Resource name:
https://example.com (resource name is example.com)

9. What does SMTP stand for? What is it a protocol for?


Answer: Simple Mail Transfer Protocol (SMTP), outgoing email protocol.

10. What does POP stand for? What does IMAP stand for? What do these protocols provide
for? What distinguishes them from one another?
Answer:
POP (Post Office Protocol) current POP3.
Receives and downloads message from incoming mail server.

IMAP (Internet Message Access Protocol (IMAP)


Receives message from incoming mail server. Leaves message on server.

11. Which of the following protocols allows for designation of an attachment’s file type?
a. SMTP
b. MIME
c. POP
d. IMAP

12. What does TCP stand for?


Answer: Transmission Control Protocol

13. How many unique IP addresses does IPv4 provide for?


a. 4 Billion (approx.)
b. 4 Trillion (approx.)
c. 255 * 4
d. 340,282,366,920,938,463,463,347,607,431,768,211,456
14. Both a web browser and web server are programs that run at the application layer of the
OSI model.
a. TRUE
b. FALSE
CS 006: Practice Final
UC Riverside
NAME_______________________ LAST 4 SID______________________
15. Who was the engineer that conceived one of the Internet’s building blocks—packet
switching—while working at the Rand Corporation in 1960?
a. Vint Cerf
b. Paul Baran
c. Leonard Kleinrock
d. Marc Andreessen
e. Tim Berners-Lee

16. Who invented the use of the ‘@’ symbol to separate the name of the recipient from the
machine and the machine (server) that recipient is on? This is used to this day for email.
a. Vint Cerf
Ray Tomlinson
b. Paul Baran
c. Leonard Kleinrock
d. Marc Andreessen
e. Tim Berners-Lee

17. What two universities connected two of the first IMP (“interface message processors”)
packet switch machines to a network connection to communicate across becoming the
first two “nodes” on ARPANET?
a. UCLA, UCSB
b. UTAH, STANFORD
c. UCLA, STANFORD
d. UCSB, UTAH

18. Who was the CEO of America Online?


a. Steve Jobs
b. Steve Case
c. Steve Ballmer
d. Jeff Bezos

19. The first significant Internet attack came on November 2, 1988, in the form of the so
called Morris Worm, created by a Cornell graduate student named Robert Tappan
Morris. What is Robert Tappan Morris doing today?
a. 30 years to life
b. Works for the IRS
c. Author of Sci-Fi novels
d. Professor in Computer Science at MIT
CS 006: Practice Final
UC Riverside
NAME_______________________ LAST 4 SID______________________
20. Who co-developed the Mosaic web browser and later went on to co-found Netscape?
a. Tim Berners-Lee
b. Marc Andreessen
c. Bill Gates
d. Robert Cailliau

21. In 1991, CERN, one of the world’s largest physics laboratories, based in Geneva,
produced the World Wide Web. Who is known as the inventor or the World Wide Web?
a. Vint Cerf
b. Paul Baran
c. Leonard Kleinrock
d. Marc Andreessen
e. Tim Berners-Lee

22. Explain the difference between the World Wide Web and the Internet. Briefly in no more
than 2-3 sentences. Write neatly please.
Answer: Internet is a collection of connected networks. WWW are the URL-based web
resources linked by hypertext (HTTP, HTML) accessible via a browser.

23. Which of the following is correct HTML code for a heading with the largest font?
a. <h1>TITLE</h1>
b. <head>TITLE</head>
c. <heading>TITLE
d. <h5>TITLE</5>
e. None of the above

24. Which HTML element (section) contains text and elements that display in the web page
directly?
a. head
b. body
c. title
d. html
e. None of the above
25. When a program such as McAfee SiteAdvisor marks a particular URL as “safe” with a
green check mark, how is this verified?
a. The URL is checked against a list of reputable companies.
b. McAfee SiteAdvisor previously opens link to check if safe
c. McAfee SiteAdvisor keeps a score for each site
d. None of the above.
CS 006: Practice Final
UC Riverside
NAME_______________________ LAST 4 SID______________________
26. What is the purpose for a “sandbox” in terms of antivirus malware testing? Choose the
best answer.
a. To provide an isolated environment to open and investigate suspicious files.
b. To provide a development environment to implement malware.
c. To provide a development environment search for brand new malware.
d. None of the above.
27. What is the order of software versions, from least to greatest, for reliability and
functionality?
a. Alpha, beta, commercial release
b. Beta, Alpha, commercial release
c. Commercial release, alpha, beta
d. Commercial release, beta, alpha
e. None of the above.
28. What organization sets the standards for HTML and its related languages?
a. World Wide Web Consortium
b. World Internet Society
c. ASCII (American Standard Code for Information Interchange)
d. ICANN (Internet Corporation for Assigned Names and Numbers)
e. None of the above.
29. What does HTML stand for?
a. Hypertext Markup Language
b. Higher Text Markup Language
c. Hyperlink Markup Language
d. None of the above.
30. Which version of HTML are we using in CS006 this term?
a. XML
b. XHTML5
c. HTML
d. HTML5
e. None of the above.
31. Which of the following is NOT true for a computer virus?
a. Malicious
b. Replicates
c. Attaches to a host program
d. Can lie dormant
e. None of the above.
32. If a user sets up an administrator password, then by default all new security updates will
be applied automatically, after password verification.
a. TRUE
b. FALSE
CS 006: Practice Final
UC Riverside
NAME_______________________ LAST 4 SID______________________
33. Microsoft offers only a minimal amount of software support (critical security updates) for
Windows 7 in January 2019.
a. TRUE
b. FALSE
34. List three ways a user can protect themselves from malware, as presented in lecture and
the slides.

Answer
● Anti-virus software
● Set-up admin password
● Turn-on Automatic Updates

35. Which block of HTML code below correctly implements an image element that displays
happy.png.
a. <image src="happy.png" height="420" width="420">
b. <img height="420" width="420">"happy.png"</img>
c. <img src="happy.png" height="420" width="420">
d. <img src="happy" height="420" width="420">
e. None of the above.
36. The height and width attributes for an image element represent what units of measure?
a. DPI (dots per inch)
b. PPI (pixels per inch)
c. pixels
d. mm (millimeters)
37. In HTML5, a stand-alone, or self-contained element, is referred to as a void element.
a. TRUE
b. FALSE
38. Which of the following is NOT true for a computer worm?
a. malicious
b. replicates
c. attaches to a host program
d. exploits security vulnerabilities on systems
e. None of the above
39. For a website, what file name is used (typically) for the homepage, default page, or
landing place for the website?
a. main.html
b. index.html
c. home.html
d. default.html
e. None of the above.
CS 006: Practice Final
UC Riverside
NAME_______________________ LAST 4 SID______________________

40. What is spyware? Explain in 1-2 sentences.

Answer: Spyware collects personal information about users. It does so without user
consent.

41. What is a backdoor on a computer? What malicious program is known the installation of
backdoors. Be brief, but explain clearly and completely.

Answer:
● The back door gives another user access to a system, and possibly allows
confidential or personal information to be compromised.
● Trojan horses typically create a backdoor.

42. The California Consumer Privacy Act of 2018 was signed into law by the Governor of
California when?
a. Not signed until January 2020
b. June 28, 2018
c. June 28, 2017
d. January 1, 2017
e. None of the above.

43. List 3 methods for increasing the strength of a password. Clearly number each item.
Answer:
1. Expand number of possible characters for each position in password. For
example passwords composed of {a-z, A-Z, 0-9} are harder to guess than
passwords composed of {a-z, A-z}.
2. Increase password length: a longer password is harder to guess.
3. Use two factor authentication, e.g., sends a single use code to phone. This code
and individual’s password to must be validated to login.

44. Give the definition of privacy as presented in the lecture slides.

Answer:
​ he right of people to choose freely under what circumstances and to what
Privacy: T
extent they will reveal themselves, their attitude, and their behavior to others.
CS 006: Practice Final
UC Riverside
NAME_______________________ LAST 4 SID______________________
45. Give the personal information definitions for the following four classes of data sharing
between an individual, a company, and a third party.

Answer:
● No Uses. The information ought to be deleted when the
store is finished with it (for example, when the payment
has cleared), because there is no further need for it.
● Approval or Opt-In. The store can use it for other
purposes, but only if you approve the use.
● Objection or Opt-Out. The store can use it for other purposes, but not if
you object to a use.
● No Limits. The information can be used any way the store chooses.

46. Give the HTML code for the bulleted list below with bold course abbreviations and
course numbers. Write your code to the right of the displayed list.

Answer:
<ul>
<li><b>CS 006:</b></li>
<li><b>ECON 107:</b></li>
<li><b>ECON 134:</b></li>
<li><b>ECON 135:</b></li>
</ul>

47. Give the 2 reasons (as presented in lecture), most people disclose personal information.

Answer:
● Follow the “nothing to hide, nothing to fear,” principle.
(G. Marx, 1996; Viseu, Clement, & Aspinall, 2004)
● People voluntarily disclose information online to create online presence or persona
Defined as ​information revelation​ behaviors (Gross & Acquisti, 2005)

48. For the study on Canadian undergrads, what type of information were students more
least likely to disclose?
a. Age
b. Political Views
c. First Name
d. Last Name
CS 006: Practice Final
UC Riverside
NAME_______________________ LAST 4 SID______________________
49. If you received an e-mail indicating you needed to update your google password. Which
of the following links (contained in the body of the e-mail) would you assume navigates
to a legitimate update password webpage?
a. https://account.google.com
b. http://googleaccount.com
c. https://googleaccount.com
d. https://tinyurl.com/2tx
e. None of the above.
50. What does CSS stand for?
a. Captcha Style Sheets
b. Container Style Sheets
c. Concise Style Sheets
d. Cascading Style Sheets
e. None of the above.
51. If a style rule for <h2> is specified in both the <head> of and HTML file, and in the style
attribute of an <h2> tag, what will be rendered in a web browser?
a. The style declaration specified in the <head>.
b. Any style declaration of <h2> defined in an external CSS file linked in <head>.
c. The style declaration in the <h2> tag.
d. None of the above.
52. CSS was first introduced as a standard in what year?
a. 2001
b. 1999
c. 1996
d. 1990
e. None of the above.
53. Which of the following is NOT provided for by the California Consumer Privacy Act of
2018?
a. The bill would require a business to make disclosures about the information and
the purposes for which it is used.
b. The bill would grant a consumer the right to request deletion of personal
information.
c. The bill would authorize businesses to offer financial incentives for collection of
personal information.
d. The bill would require a business to provide this information in response to a
verifiable consumer request.
e. All are provided for in the legislation.
CS 006: Practice Final
UC Riverside
NAME_______________________ LAST 4 SID______________________
54. How is an external style sheet linked to an HTML file?
a. <link rel="stylesheet" href="color.css">
b. <style rel=”stylesheet” href=”color.cc”>
c. <link style="color.css">
d. <style>link <href="color.css">
e. None of the above.
55. What is the age at which companies do not need specific consent (opt-in) harvest
individual’s data, according to the California Consumer Privacy Act of 2018?
a. 18
b. 19
c. 16
d. 17
e. None of the above
56. Give the HTML, with inline style, to output the bulleted list below with bold course
abbreviations, that have a color of green. Write your code to the right of the displayed
list.

Answer:
OR, individual list item elements (<li>) can have style attribute, with color:green.
<li style="color:green"><strong>CS 006:</strong></l1>

57. What does Jaron Lanier describe tribalism as in his book, ​Ten Arguments for Selecting
your Social Media Account Now​? Hint: He calls it a switch.

Answer: A switch that toggles between solitary wolf and wolf-pack.

58. What is the European Union privacy legislation that was recently enacted called?
a. User Data Protection Act
b. General Data Protection Act
c. General Data Protection Regulation
d. General Protection Data Regulation
e. None of the above.
CS 006: Practice Final
UC Riverside
NAME_______________________ LAST 4 SID______________________
59. When the European Union privacy legislation that was written?
a. April, 2016
b. May 25, 2018
c. April 25, 2018
d. May 25, 2016
e. None of the above.

60. Why would European Union regulation on US companies matter to US consumers?


a. Many large US tech companies have international offices.
b. Companies tend to meet the most restrictive regulations faced.
c. US consumers are likely to demand the same protections as European
consumers.
d. All of the above.
e. None of the above.

61. FB CEO Mark Zuckerberg was asked the following as part of his congressional
testimony (in follow-up written testimony) for Senate Committee on the Judiciary, Senate
Committee on Commerce, Science, and Transportation:

“Does Facebook offer individuals, whether registered users or not, any opportunity to not
be subject to facial-recognition technology or to have data collected using
facial-recognition technology deleted?”

a. TRUE
b. FALSE

62. If the following style rule declaration resides in an external CSS file that was linked to the
current HTML file, how would one “override” the background color to grey, using inline
style sheets. Provide only the opening tag for the header.

header { margin-left: auto;


margin-right: auto;
width: 100%;
background-color:#dde4f0;
text-align: center; border-bottom: 4mm ridge #1f66ad;
box-shadows: 25px -5px #800060;
}

Answer:
Declare style rule at a high precedence level, internal (embedded) CSS or inline CSS.
CS 006: Practice Final
UC Riverside
NAME_______________________ LAST 4 SID______________________

63. Give an embedded style sheet rule to make each of the following h2 headings have a
color of red. Do not worry about making the text bold. Also, show your style rule for h2 is
located in the appropriate HTML element outside of the <body>...<\body>.

Answer:
<head>
h2 { color:red;}
</head>

64. Project 1 (slide presentation check-in)


a. What topic will you choose for project 1? Answer: GRADED SEPARATELY.

b. List 3 items or sub-topics you will research to present as part of your


presentation. Answer: GRADED SEPARATELY.

c. How is your choice of subject area related to WWW, Internet, or Digital World.
Answer: GRADED SEPARATELY.

65. What are two ways you could improve the diagram below, to it more appropriate for a
professional setting, with regards to clip art? HINT: Remove or replace what content?

Answer:
a. Do not use cloud image with Zeus
b. Do not use server image with cartoon figurines
CS 006: Practice Final
UC Riverside
NAME_______________________ LAST 4 SID______________________
66. E-commerce was not practical until what occurred?
a. SSL allowed for secure ads
b. SSL provided for secure transactions
c. Immediate account deductions for purchases using SSL
d. Immediate account return payments using SSL

67. What does SSL stand for?


a. Secure Sockets Layer
b. Security Servers Layer
c. Stable Servers Location
d. Stable Sortings Layer
68. SSL provides for encrypted client-server communication.
a. TRUE
b. FALSE
69. Give the definition for the following types of businesses.
a. B2C: Business to Consumer
b. B2B: Business to Business
c. C2C: Consumer to Consumer
d. B2B2C: Business to Business to Consumer
70. Give an example company for each of the following types of businesses.
a. B2C: Target
b. B2B: Staples
c. C2C: Ebay, Craigslist
d. B2B2C: Amazon

71. What is Guy Kawasaki’s 10-20-30 rule. What main concern does it address, with regards
to giving presentations?

Answer:
10-20-30 Rule (Guy Kawasaki)
10 slides - the optimal number for presentation
20 minutes - longest time you should speak
30 point font - smallest font size use

72. List three of the categories for the ​7 Deadly Sins of PowerPoint Presentation by Joseph
Sommerville.​ Briefly describe what each category warns against.

Answer: Any 3, with explanation.


a. Slide Transitions And Sound Effects - distracts, timing can be off, misaligned
CS 006: Practice Final
UC Riverside
NAME_______________________ LAST 4 SID______________________
b. Standard Clipart - often familiar, miss the point or non-specific to use, appear
amateurish, cliché
c. Presentation Templates - see standard clipart (more subtle), eventually everyone
sees them, overdone
d. Text-Heavy Slides - be concise, limit sentence to phrases
e. The “Me” Paradigm - Material looks good on laptop, not
on big screen, careful for fonts, screen resolution
f. Reading - summarize print, talk should support text
g. Faith in Technology - have backup plans: connectors, no web, no sound, no
projector

You might also like