a. The song was saved using fewer bits per second than the original song.

Size: px
Start display at page:

Download "a. The song was saved using fewer bits per second than the original song."

Transcription

1 1 1. A student is recording a song on her computer. When the recording is finished, she saves a copy on her computer. The student notices that the saved copy is of lower sound quality than the original recording. Which of the following could be a possible explanation for the difference in sound quality? a. The song was saved using fewer bits per second than the original song. b. The song was saved using more bits per second than the original song. c. The song was saved using a lossless compression technique d. Some information is lost every time a file is saved from one location on a computer to another location 2. A user enters a Web address in a browser, and a request for a file is sent to a Web server. Which of the following best describes how the file is sent to the user? a. The file is broken into packets for transmission. The packets must be reassembled upon receipt. b. The file is broken into packets for transmission. The user s browser must request each packet in order until all packets are received. c. The server attempts to connect directly to the user s computer. If the connects is successful, the entire file is sent. If the connection is unsuccessful, an error message is sent to the user. d. The server repeatedly attempts to connect directly to the user s computer until a connection is made. Once the connection is made, the entire file is sent. 3. An online store uses 6-bit binary sequences to identify each unique item for sale. The store plans to increase the number of items it sell and is considering using 7-bit binary sequences. Which of the follow best describes the result of using 7-bit sequences instead of 6-bit sequences? a. 2 more items can be uniquely identified b. 10 more items can be uniquely identified c. 2 times as many items can be uniquely identified. d. 10 times as many items can be uniquely identified.

2 2 ASCII is a character-encoding scheme that uses 7 bits to represent each character. The decimal (base 10) values 65 through 90 represent the capital letters A through Z, as shown in the table below. Decimal ASCII Character Decimal ASCII Character 65 A 78 N 66 B 79 O 67 C 80 P 68 D 81 Q 69 E 82 R 70 F 83 S 71 G 84 T 72 H 85 U 73 I 86 V 74 J 87 W 75 K 88 X 76 L 89 Y 77 M 90 Z 4. What ASCII character is represented by the binary (base 2) number ? a. H b. I c. J d. K 5. ASCII characters can also be represented by hexadecimal numbers. According to ASCII character encoding, which of the follow letters is represented by the hexadecimal (base 16) number 56? a) A b) L c) V d) Y

3 3 6. Which of the following best explains what happens when a new device is connected to the Internet? a. A device drives is assigned to the device b. An Internet Protocol (IP) address is assigned to the device c. A packet number is assigned to the device d. A Web is assigned to the device. 7. Consider the following numbers. Binary 1100 Decimal 11 Hexadecimal D Which of the following lists the numbers in order from least to greatest? a. Binary 1100, Decimal 11, Hexadecimal D b. Decimal 11, Hexadecimal D, Binary 1100 c. Hexadecimal D, Binary 1100, Decimal 11 d. Decimal 11, Binary 1100, Hexadecimal D 8. A computer program uses 3 bits to represent integers. When the program add the decimal (base 10) numbers 5 and 3, the result is 0. Which of the following is the best explanation for the result? a) An overflow error occurred. b) A round-off error occurred. c) The result was affected by lossy data compression. d) The result was approximated by a floating-point representation. A binary questions is defined as: a) A piece of information that is sent in pairs b) Two questions which share the same answer c) A message which has two possible states d) A question which can be answered in only one of two possible ways

4 4 9. Which of the following can be represented by a single binary digit? Select TWO answers. a) The position of the minute hand of a clock b) The remainder when dividing a whole number by 2 c) The value of a Boolean variable d) The volume of a car radio 10. A video-streaming Web site uses 32-bit integers to count the number of times each video has been played. In anticipation of some videos being played more times than can be represented with 32 bits, the Web site is planning to change to 64-bit integers for the counter. Which of the following best describes the result of using 64-bit inters instead of 32-bit integers? a) 2 times as many values can be represented b) 32 times as many values can be represent c) 2 32 times as many values can be represented d) 3 22 times as many values can be represented. 11. The Internet Engineering Task Force (IETF) defines the protocols and standards for how the Internet works. The members of the IETF are: a) An International coalition of government agencies who oversee the Internet in their countries. b) The worldwide leaders of the Tier 1 internet service providers. c) A loosely organized collection of citizens and engineers who communicate mostly by . d) Political leaders and heads of state 12. What is an RFC? a) Restricted Fiduciary Contract b) Request For Comments c) Radio Frequency Controller d) Related Fundamental Content

5 5 13. Choose the two best answers to complete the sentence: If I understand how the internet works then I will be able to: a) Make informed choices to support or oppose decisions my government makes about access to the internet. b) Connect the latest devices to the internet. c) Make informed choices about my privacy on the internet d) Get the best price for my cell phone plan 14. What is an IP Address? a) A number assigned to an item or device that is connected to the internet b) The address of the DNS c) Small chunks of information that have been formed from larger chunks of information. d) A set of rules governing the exchange or transmission of data between devices. 15. What is an IP Packet? a) A number assigned to an item or device that is connected to the internet b) The address of the DNS c) Small chunks of information that have been formed from larger chunks of information. d) A set of rules governing the exchange or transmission of data between devices. 16. How many users would a fixed-length IP address system using 6 bits support? a) 6 users b) 12 users c) 32 users d) 64 users

6 6 17. What is a router? a) Used to translate computer hostnames into IP addresses. b) A computer which receives messages traveling across a network and redirects them towards their intended destinations based on the addressing information included with the message c) A number assigned to an item or device that is connected to the internet d) Small chunks of information that have been formed from larger chunks of information. 18. What is the purpose of the Domain Name System (DNS)? a) Used to translate computer hostnames into IP addresses. b) A computer which receives messages traveling across a network and redirects them towards their intended destinations based on the addressing information included with the message c) A number assigned to an item or device that is connected to the internet d) Small chunks of information that have been formed from larger chunks of information. 19. According to the domain name system (DNS) which of the following is a subdomain of the domain example.com? a) about.example.com b) example.co.uk c) example.com.org d) example.org 20. Choose two: Pick the two statements about packets and routing on the Internet which are true. a) Packets travelling across the Internet take a standardized amount of time and so can be counted on to arrive in the order they were sent. b) TCP ensures messages can be reliably transmitted across the Internet. c) TCP depends on the infrastructure of the Internet to be reliable enough to ensure no packets are lost in transmission. d) TCP must account for the fact that packets may not arrive at a destination computer in the intended order.

7 7 21. Which of the following is NOT true about packets? a) Packets are numbered, so if they arrive out of order, the message can be reassembled. b) A message sent across the Internet can always be contained in a single packet. c) Packets are routed on different paths from sender to receiver. d) The receiver computer must confirm to the sending computer that each packet was received. 22. A single central register of IP addresses and names (i.e. a DNS-style system) is an efficient means of translating human-readable names to IP addresses. Which of the following is NOT solved by DNS? a) It s inefficient to have everyone on the Internet maintain their own list of IP addresses. b) There are too few IP addresses to meet the current demand. c) When someone new joins the Internet, they need to inform everyone of their IP address. d) When an IP address changes, it is impossible to locate a computer until the owner announces the change. 23. Which of the following best describes a Distributed Denial of Service (DDoS) attack? a) An attempt by a country to deny its citizens access to the Internet b) An attempt to deny users access to a Web site s resources by flooding the Web site with requests from multiple systems c) An attempt by one user to deny service to another user by posting material on a social network d) An attempt by a user of the Internet to get private information from a secure database. 24. What is a Protocol? a) A number assigned to an item or device that is connected to the internet b) The address of the DNS c) Small chunks of information that have been formed from larger chunks of information. d) A set of rules governing the exchange or transmission of data between devices.

8 8 25. Two computers are built by different manufacturers. One is running a Web server and the other is running a Web browser. Which of the following best describes the ability of the two computers to communicate with each other across the Internet? a) The computers cannot communicate because different manufacturers use different communication protocols. b) The computers can communicate, but additional hardware is needed to convert date packets from one computer s protocol to the other computer s protocol. c) The computers can communicate directly only if the messages consist of text; other formats cannot be interpreted across computers. d) The computers can communicate directly because Internet communication uses standard protocols. 26. Researchers have developed a simulation of packets traveling between server computers and client computers in a network. Of the following, which two outcomes are most likely to be results of the simulation? a) Better understanding of the effect of temporarily unavailable network connections. b) Better understanding of the effect of using hexadecimal representations for binary data c) Better understanding of the impact of access to public data in identifying solutions to problems d) Better understanding of the impact of increased connection speeds for frequently visited servers 27. Multiple Choice: HTTP is considered to be a high-level protocol because: a) HTTP requests are given higher priority for fast delivery when being routed on the Internet. b) HTTP requests are encoded using higher-frequency radio waves. c) HTTP messages can be either requests or responses. d) HTTP requests make use of abstractions provided by lower-level protocols.

9 9 28. Choose Two: Choose the two true statements about HTTP: a) An HTTP request is sent from a client to request access to data stored on a server. b) HTTP requests and responses have identical formats. c) Displaying a web page will often require multiple HTTP requests in order to acquire all the necessary data. d) An HTTP response code is only used when a server could not fulfill a request. 29. Which two of the following statements are true about routing on the internet? a) Information travelling between two computers over the internet will always take the same path. b) Your router receives all the traffic of the internet and delivers only the messages intended for you. c) There is one router which receives and redirects all the traffic of the internet. d) A packet travelling between two computers on the internet may be rerouted many times along the way. e) A packet contains addressing information to allow routers to decide how best to forward along that packet towards its destination. 30. Which statement best describes the principle of Net Neutrality? a) All Internet traffic should be treated equally. b) Countries should remain neutral regarding website naming conventions. c) Control or suppression of what can be accessed, published, or viewed on the Internet. d) Use of personal date obtained via the Internet. 31. Which statement best describes the practice of Internet Censorship? a) All Internet traffic should be treated equally. b) Countries should remain neutral regarding website naming conventions. c) Control or suppression of what can be accessed, published, or viewed on the Internet. d) The monitoring of computer activity and data stored on a hard drive, or data being transferred over computer networks such as the Internet.

10 Which statement best describes the practice of computer and network surveillance? a) All Internet traffic should be treated equally. b) Countries should remain neutral regarding website naming conventions. c) Control or suppression of what can be accessed, published, or viewed on the Internet. d) The monitoring of computer activity and data stored on a hard drive, or data being transferred over computer networks such as the Internet. 33. Which file format is used for lossless compression of an image? a) WAV b) JPEG c) ZIP d) MP3 e) PNG 34. Which file format is used for lossy compression of sound? a) WAV b) JPEG c) ZIP d) MP3 e) PNG

11 What is Lossy compression? a) A compression scheme in which every bit of the original data can be recovered from the compressed file. b) A Compression scheme in which the metadata has been lost. c) A compression scheme in which "useless" or less-than-totally-necessary information is thrown out in order to reduce the size of the data. The eliminated data is unrecoverable. d) A compression scheme in which unnecessary data is cached until the file is accessed. 36. Which symbol represents the decimal number 13 in the hexadecimal number system. a) A b) B c) C d) D e) E 37. What is Metadata? a) Data that describes other data. b) Data that is lost in compression. c) Data used my marketers to target ads d) Data entered by internet users that is collected online 38. What is a Pixel? a) One square centimeter of space on a display b) The amount of bytes recorded by a digital camera c) The fundamental unit of a digital image which contains a single point of color. d) The fundamental unit of measure for sound files 39. Shakespeare s complete works have approximately 3.5 million characters. Which is the approximate file size of Shakespeare s complete works stored in plain (8 bit) ASCII text? a) 3.5 KB b) 35 GB c) 3.5 MB d) 3.5 GB

12 An artist makes an RGB raster image in which each pixel color is encoded with 12-bits 4 bits each for red, green, and blue. Which of the following correctly shows the hexadecimal value for Red as a 12- bit compression? a) F00 b) 00F c) FF00 d) FF A compression scheme for long strings of bits called run-length encoding is described as follows: Rather than record each 0 and 1 individually, instead record runs of bits by storing the number of consecutive 1s and 0s that appear. Since its binary, any run of 0s must be followed by a run of 1s (even if the run is only 1-bit long) and vice versa. To uncompress the data back into its original binary state, your simply reverse the process. This technique is an example of what type of compression? a) Lossy compression b) Lossless compression c) Fast Fourier Transform compression d) Tailored compression

13 A certain social media Web site allows users to post messages and to comment on other messages that have been posted. When a user posts a message, the message itself is considered data. In addition to the data, the site stores the following metadata. The time the message was posted The name of the user who posted the message The names of any users who comment on the message and the times the comments were made For which of the following goals would it be more useful to analyze the data instead of the metadata? a) To determine the users who post messages most frequently b) To determine the time of day that the site is most active c) To determine the topics that many users are posting about d) To determine which posts from a particular user have received the greatest number of comments 43. The table below shows the time a computer system takes to complete a specified task on the customer data of different-sized companies. Task Small Company (approximately) 100 customers) Medium Company (approximately 1,000 customers) Backing up data 2 hours 20 hours 200 hours Deleting entries from 100 hours 200 hours 300 hours data Searching through data 250 hours 300 hours 350 hours Sorting data 0.01 hour 1 hour 100 hours Large Company (approximately 10,000 customers) Based on the information in the table, which of the following tasks is likely to take the longest amount of time when scaled up for a very large company of approximately 100,000 customers? a) Backing up data b) Deleting entries from data c) Searching through data d) Sorting data

14 Under which of the following conditions is it most beneficial to use a heuristic approach to solve a problem? a) When the problem can be solved in a reasonable time and an approximate solution is acceptable b) When the problem can be solved in a reasonable time and an exact solution is needed c) When the problem cannot be solved in a reasonable time and an approximate solution is acceptable d) When the problem cannot be solved in a reasonable time and an exact solution is needed. 45. Which of the following are true statements about digital certificates in Web browsers? Digital certificates are used to verify the ownership of encrypted keys used in secured communication. Digital certificates are used to verify that the connection to a Web sites is fault tolerant. a) I only b) II only c) I and II d) Neither I nor II 46. Biologists often attach tracking collars to wild animals. For each animal, the following geolocation data is collected at frequent intervals. The time The date The location of the animal Which of the following questions about a particular animal could not be answered using only the data collected from the tracking collars? a) Approximately how many miles did the animal travel in one week? b) Does the animal travel in groups with other tracked animals? c) Do the movement patterns of the animal vary according to the weather? d) In what geographic locations does the animal typically travel?

15 Which of the following is a true statement about data compression? a) Data compression is only useful for files being transmitted over the Internet b) Regardless of the compression technique used, once a data file is compressed, it cannot be restored to its original state. c) Sending a compressed version of a file ensures that the contents of the file cannot be intercepted by an unauthorized user. d) There are trade-offs involved in choosing a compression technique for storing and transmitting data. 48. Which of the following statements about writing functions and Top-Down Design is NOT true? a) Writing functions helps manage complexity in a program b) Top-Down Design leads to programs which feature multiple layers of abstraction c) Two programmers solving the same problems using Top-Down Design should arrive at identical programs d) Top-Down Design relies upon identifying sub-problems of a larger problem e) Top-down design assists in identifying the layers of functions that will be used to solve a programming problem. 49. Choose the two (2) statements that are true about functions. a) Meaningful function names help people better understand programs b) Meaningful function names help computers better understand programs c) Functions in programming are useful mathematical tools for doing complex computations d) Functions in programming are named groupings of programming instructions. 50. Which of the following is NOT a true statement about functions? a) Functions are reusable programming abstractions b) Functions help reduce the complexity of writing and maintain programs c) Functions help break a problem into logical chunks d) Once defined, a function can be called many time from different parts of a program. e) Functions cannot make calls to other functions written by the same programmer.

16 What is a function parameter? a) Para-meter: a measure of the distance between a function s conception and implementation. b) A way to give input to a function that controls how the function runs. c) A collection of commands that can be used in a programming language. d) Another name for the purpose of a function e) A named memory location. 52. What is an API? a) Abstract Programming Inheritance - The idea that abstractions in languages get "passed down" in newer versions. b) Artificial Parameter Intelligence - The idea that function parameters should be intelligent enough to "know" what you want as a programmer. c) Application Program Interface - A well-documented library of functions provided in a programming language that helps to simplify complex programming tasks. d) Applied Power Implementation - A process by which functions are given extra override power related to parameters. e) Abstract Parameter Interface - A programming construct in which parameters are passed down through levels of abstraction. 53. Select the two true statements about functions with parameters. Choose two. a) Parameters can only be used once within the body of a function b) Functions with parameters can be used to prevent the creation of duplicate code c) Parameters help generalize the solution of a specific problem. d) Values do not need to be provided to a function with parameters in any particular order.

17 17 The next two questions use a robot in a grid of squares. The robot is represented as a triangle, which is initially facing towards the right side of the grid. The robot is moved according to the following instructions. Instruction Explanation MOVE_FORWARD() The robot moves one square forward in the direction it is facing. ROTATE_RIGHT() The robot rotates in place 90 degrees clockwise (i.e., makes an in-place right turn). ROTATE_LEFT() The robot rotates in place 90 degrees counterclockwise (i.e., makes an inplace left turn). REPEAT n TIMES The block of instructions contained between the braces { } is repeated n times. 54. Consider the following program which uses commands from the pseudocode described above. REPEAT 4 TIMES { MOVE_FORWARD() MOVE_FORWARD() MOVE_FORWARD() ROTATE_RIGHT() MOVE_FORWARD() ROTATE_RIGHT() MOVE_FORWARD() ROTATE_RIGHT() } Which of the following images shows the path and ending location of the robot that will result from executing the code above. The starting location of the robot is shown as dotted triangle for cases where the robot does not start and end at the same location. a. b. c. d. e.

18 Consider the following incorrect program, which is intended to move the robot around the perimeter of a grid, as indicated by the drawing below. Line 1: REPEAT 4 TIMES Line 2: { Line 3: Line 4: Line 5: Line 6: Line 7: Line 8: Line 9: Line 10: } MOVE_FORWARD() ROTATE_RIGHT() MOVE_FORWARD() MOVE_FORWARD() MOVE_FORWARD() MOVE_FORWARD() ROTATE_RIGHT() Fig: What the robot is supposed to do Given the options below, which lines should be removed so the program will work as intended? a) Line 3 and Line 4 b) Lines 5, 6, 7, 8 and 9 c) Line 8 and Line 9 d) Line Programming languages have some similarities and differences to the natural language you use in everyday speech. Select the two true statements about programming languages: a) Ambiguities in natural language necessitate the creation of programming languages for controlling a computer b) Compared to the number of words in a natural language, the number of defined words in a programming language is very small. c) The number of defined words in a programming language is about the same as the number of words in a natural language. d) There are typically many possible ways to interpret an instruction written in a programming language.

19 Which of the following is NOT true about functions in programming? a) Functions are reusable programming abstractions. b) Functions help reduce the complexity of writing and maintaining programs. c) Functions cannot make calls to other functions within the same program. d) Functions help break a problem into logical chunks. e) Once defined, a function can be called many times from different parts of a program. 58. What is one important naming convention of functions? a) A function name should indicate how long the function takes to run. b) Two functions with similar behavior should be given identical names to indicate the relationship between them. c) A function name should be as descriptive as possible to indicate what the function does. d) Function names should be organized alphabetically. e) The function name should begin with a number that indicates the order in which it should be executed. 59. Which one of the following statements about functions is TRUE a) A function can change names over the course of a program. b) Code can be added or removed dynamically from a function while the program is running. c) Functions can be called using different names depending on where in the program they are called. d) Two functions can be given identical names as long as their code is identical. e) Two functions in a single program can have different names but contain identical code. 60. When programmers work together, what is an example of how abstraction in programming can promote collaboration? a) Team members can rely on one another to explain their code. b) Programmers can write functions without needing to know what they do or how they should work. c) Programmers can use functions created by their partners, relying on the functionality without needing to know the specific details of how the function is implemented. d) In order for programmers to work together, they must work in the same room. f) Abstraction allows programmers to brainstorm more creative solutions to problems.

20 Which of the following will call the function drawstar in Javascript? a) drawstar; b) drawstar(); c) function drawstar(){ for(var i = 0; i < 5; i++){ moveforward(100); turnleft(36); } } d) function drawstar; e) function drawstar(); 62. Why are parameters useful when programming? a) Parameters determine the number of times the function will run. b) Parameters allow for more flexible, generalized behaviors in functions. c) Parameters are useful for teams of programmers because they help define the boundaries of the problem they re trying to solve. d) Parameters change the order of operations within a function. 63. What is the most likely outcome of running the code shown at right? a) It will draw a star with each side 150 pixels long. b) The program will stop with an error at line 3 because parameters may not be used in for loops. c) The program will stop with an error at line 5 because it s dividing by 0. d) The program will run without error, but will not draw anything.

21 Which of the following is a possible output (turtle drawing) of the code segment given below? a. b. c. d. e. 65. For each of the following scenarios related to turtle drawing, indicate whether it is better to write a loop or a function (or a set of functions) to handle the task. Scenario Best Choice (circle one) 1. Drawing out the letters of a word HELLO Loop Function(s) 2. Drawing a hexagon (six-sided shape) Loop Function(s) 3. Drawing 100 tiny dots in a line Loop Function(s) 4. Drawing a circle of any size at any point on the screen Loop Function(s)

22 66. 22

23 67. 23

24 68. 24

25 69. 25

26 70. 26

27

28 73. 28

29 74. 29

30 Consider the following code segment, whih uses the variables r, s and t. r 1 s 2 t 3 r s s t DISPLAY (r) DISPLAY (s) What is displayed as a result of running the code segment? A. 1 1 B. 1 2 C. 2 3 D Consider the following code segment. Which of the following replacements for <MISSING CONDITION> will result in an infinite loop? A. j = 6 B. j 6 C. j = 7 D. j > 7

31 Consider the following program, which is intended to display the number of times a number target appears in a list. Which of the following best describes the behavior of the program? A. The program correctly displays the number of times target appears in the list. B. The program does not work as intended when target does not appear in the list C. The program does not work as intended when target appears in the list more than once. D. The program does not work as intended when target appears as the last element of the list.

32 In the program below, the intial value of X is 5 and the intial value of Y is 10. IF ( X < 0) { DISPLAY ( Foxtrot ) } ELSE { IF ( X > Y) { Display = ( Hotel ) } ELSE { IF (Y > 0) { DISPLAY ( November ) } ELSE { DISPLAY ( Yankees ) } } } What is displayed as a result of running the program? A. Foxtrot B. Hotel C. November D. Yankees

33 What is 13 MOD 17? A. 0 B. 1 4/13 C. 4 D. 13 E What is 20 MOD 15? A. 0 B. 1.5 C. 5 D. 15 E What is 10 MOD 3? A. 1 B. 1.5 C. 5 D. 15 E Which makes for a password that is harder to crack? A. A word from the dictionary B. 8 random characters that include numbers and punctuation C. A 16-character password that is all letters of the alphabet D. A 32-character password that is all letters of the alphabet E. A 150-character password that is all the same character.

34 Instead of HTTP (HyperText Transfer Protocol), some websites use HTTPS. Using HTTPS, the computers agree on a "code" between them, and then they scramble the messages using that "code" so that no one in between can read them. This keeps your information safe from hackers.what does the s in https refer to? A. It s the plural of http - a more robust version of http that runs on multiple channels. B. s is for secure - a version of http that is encrypted. C. s is for simple - a simplified version of http that runs faster on modern computers D. s is for standard - to distinguish the original http from non-standard versions like httpv and httpx 84. A perpetrator is seeking to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. This is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled. The result is analogous to a group of people crowding the entry door or gate to a shop or business, and not letting legitimate parties enter into the shop or business, disrupting normal operations. When someone attemps to compromise a target by flooding it with requests from multiple, often hundreds of thousands of, unique IP addresses that is called a: A. distributed denial-of-service attack (DDoS attack) B. Phishing Scam C. Virus D. Sockets layer/transport layer security (SSL/TLS) 85. When someone tries to get you to give up personal information through or a bogus website it is called a: A. DDoS Attack B. Phishing Scam C. Virus D. Sockets layer/transport layer security (SSL/TLS)

35 Public key encryption is a method of encryption involving one key for encryption and another key for decryption. This form of encryption is called: A. Symmetric encryption B. Asymmetric encryption C. Private Key D. Sockets layer/transport layer security (SSL/TLS) Sockets layer/transport layer security (SSL/TLS) 87. When you see the little lock icon and https it means that you are visiting a website over HTTP but the data going back and forth between you and the server is encrypted. Which of the following are encryption layers of HTTP that employ public key cryptography to establish a secure connection. A. DDoS Attack B. Phishing Scam C. Virus D. Sockets layer/transport layer security (SSL/TLS) 88. Decrypt the following message that has been encrypted using the Caesar Cipher. E fmvh mr lerh mw asvxl xas mr xli fywl.

36 36

37 37

38 38

39 39

40 40

41 41

42 42

Word Found Meaning Innovation

Word Found Meaning Innovation AP CSP Quarter 1 Study Guide Vocabulary from Unit 1 & 3 Word Found Meaning Innovation A novel or improved idea, device, product, etc, or the development 1.1 thereof Binary 1.2 A way of representing information

More information

(2½ hours) Total Marks: 75

(2½ hours) Total Marks: 75 (2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.

More information

Computers and Security

Computers and Security The contents of this Supporting Material document have been prepared from the Eight units of study texts for the course M150: Date, Computing and Information, produced by The Open University, UK. Copyright

More information

GCSE Computer Science for OCR Overview Scheme of Work

GCSE Computer Science for OCR Overview Scheme of Work GCSE Computer Science for OCR Overview Scheme of Work The following assumes a two-year model. During the course, the final challenges can be used for practice in computational thinking, algorithm design

More information

3 Data Storage 3.1. Foundations of Computer Science Cengage Learning

3 Data Storage 3.1. Foundations of Computer Science Cengage Learning 3 Data Storage 3.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: List five different data types used in a computer. Describe how

More information

Content (c) 2017 Readers Question Bank Group. Logo is trademark Readers Question Bank Group.

Content (c) 2017 Readers Question Bank Group. Logo is trademark Readers Question Bank Group. Content (c) 2017 Readers Question Bank Group. Logo is trademark Readers Question Bank Group. For individual teachers: Readers Question Bank(tm) Question Sets are for in-classroom use only. Usage is free.

More information

Access to the Web. Coverage. Basic Communication Technology. CMPT 165: Review

Access to the Web. Coverage. Basic Communication Technology. CMPT 165: Review Access to the Web CMPT 165: Review Tamara Smyth, tamaras@cs.sfu.ca School of Computing Science, Simon Fraser University December 5, 2011 Access to the Web requires: a computer (of some kind) a connection

More information

Introduction to computer networking

Introduction to computer networking edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing

More information

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning 6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories

More information

AQA GCSE Computer Science PLC

AQA GCSE Computer Science PLC 1 - Fundamentals of Algorithms Useful Websites BBC Bite Size Cambridge GCSE Exam Dates https://www.bbc.co.uk/education/subjects/z34k7ty Paper 1 14/05/2018 am https://www.cambridgegcsecomputing.org/ Paper

More information

PRACTICE QUESTIONS FOR FINAL EXAMINATION Spring 2005

PRACTICE QUESTIONS FOR FINAL EXAMINATION Spring 2005 PRACTICE QUESTIONS FOR 15.561 FINAL EXAMINATION Spring 2005 CLARIFICATION: This is not a practice final but a collection of questions similar to those likely to be on the final. COMPUTER FUNDAMENTALS PRACTICE

More information

Autumn 1 Autumn 2 Spring 1 Spring 2 Summer 1 Summer 2. networks. environmental concerns. Knowledge and skills covered: Knowledge and skills covered:

Autumn 1 Autumn 2 Spring 1 Spring 2 Summer 1 Summer 2. networks. environmental concerns. Knowledge and skills covered: Knowledge and skills covered: Autumn 1 Autumn 2 Spring 1 Spring 2 Summer 1 Summer 2 1.8 Ethical, 1.4 Wired 1.8 Ethical, 1.4 Wired 1.8 Ethical, 1.4 Wired legal, cultural and and wireless legal, cultural and and wireless legal, cultural

More information

HASTINGS HIGH SCHOOL

HASTINGS HIGH SCHOOL HASTINGS HIGH SCHOOL EXAMINATION GUIDE 2017-19 Subject Course code Website address Provisional examination dates Computer Science Computer Science (9-1) - J276 https://www.ocr.org.uk/qualifications/gcse/computerscience-j276-from-2016/

More information

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam

More information

CS Paul Krzyzanowski

CS Paul Krzyzanowski Computer Security 17. Tor & Anonymous Connectivity Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2018 1 2 Anonymity on the Internet Often considered bad Only criminals need to hide

More information

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University Computer Networks Network Security and Ethics Week 14 College of Information Science and Engineering Ritsumeikan University Security Intro for Admins l Network administrators can break security into two

More information

Unit 2 Digital Information. Chapter 1 Study Guide

Unit 2 Digital Information. Chapter 1 Study Guide Unit 2 Digital Information Chapter 1 Study Guide 2.5 Wrap Up Other file formats Other file formats you may have encountered or heard of include:.doc,.docx,.pdf,.mp4,.mov The file extension you often see

More information

AP Computer Science Principles Exam Reference Sheet

AP Computer Science Principles Exam Reference Sheet AP Computer Science Principles Exam Reference Sheet July 2015 As AP Computer Science Principles does not designate any particular programming language, this reference sheet provides instructions and explanations

More information

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks. Chapter 4: Networking and the 4.1 Network Fundamentals 4.2 The 4.3 The World Wide Web 4.4 Protocols 4.5 Security Network Classifications Scope Local area network (LAN) Metropolitan area (MAN) Wide area

More information

REFERENCE MATERIALS. Assignment, Display, and Input Evaluates expression and assigns the result to the variable a.

REFERENCE MATERIALS. Assignment, Display, and Input Evaluates expression and assigns the result to the variable a. a expression Assignment, Display, and Input Evaluates expression and assigns the result to the variable a. DISPLAY (expression) Displays the value of expression, followed by a space. INPUT () Accepts a

More information

Cryptography Lesson Plan

Cryptography Lesson Plan Cryptography Lesson Plan Overview - Cryptography Summary There is a large amount of sensitive information being stored on computers and transmitted between computers today, including account passwords,

More information

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322 1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet

More information

Authentication CHAPTER 17

Authentication CHAPTER 17 Authentication CHAPTER 17 Authentication Authentication is the process by which you decide that someone is who they say they are and therefore permitted to access the requested resources. getting entrance

More information

Chapter Two. The OSI Model

Chapter Two. The OSI Model Chapter Two الملزمة الثانية The OSI Model The International Standards Organization (ISO) is a multinational body dedicated to worldwide agreement on international standards (Established in 1947). An ISO

More information

Most Common Security Threats (cont.)

Most Common Security Threats (cont.) Most Common Security Threats (cont.) Denial of service (DoS) attack Distributed denial of service (DDoS) attack Insider attacks. Any examples? Poorly designed software What is a zero-day vulnerability?

More information

OCR J276 (9-1) GCSE Computer Science

OCR J276 (9-1) GCSE Computer Science Name: Class Teacher: Date: OCR J276 (9-1) GCSE Computer Science SPECIFICATION CHECKLIST J276/01 & J276/02 Content in OCR J276 (9-1) GCSE Computer Science: 1.1 Systems Architecture 1.2 Memory 1.3 Storage

More information

Second Semester Examination Higher National Diploma in Information Technology First Year

Second Semester Examination Higher National Diploma in Information Technology First Year Q1). Second Semester Examination -2011 Higher National Diploma in Information Technology First Year IT2004 - Introduction to Data Communication and Networks No of pages: 17 Marking Scheme a) Define Analog

More information

Switching to AQA from Edexcel

Switching to AQA from Edexcel Switching to AQA from Edexcel This resource compares our new GCSE Computer Science specification (8520) with the new Edexcel Computer Science specification (1CP1). If you are thinking of switching from

More information

CYBER SECURITY MADE SIMPLE

CYBER SECURITY MADE SIMPLE CYBER SECURITY MADE SIMPLE Author: Christopher Gorog www.logiccentral.org www.newcyberfrontier.com Christopher Gorog, MBA, PMP, CISSP Lead Faculty for Cybersecurity at Colorado Technical University; Published

More information

This document contains additional questions; it is not intended to be treated as a complete paper.

This document contains additional questions; it is not intended to be treated as a complete paper. 1 AS COMPUTER SCIENCE Paper 2 Additional Questions These questions focus primarily on topics that were not covered by the AQA AS and A-level Computing specifications, introduced in 2009. It is hoped that

More information

Computing 1: Computer Systems

Computing 1: Computer Systems U1 U2 U3 1 2 3 Computing 1: Computer Systems G: I know how to create strong passwords G: I know how to stay safe online and how to alert an adult if I am worried about anything G: I can list a range of

More information

Chapter 3. The Basics of Networking

Chapter 3. The Basics of Networking Chapter 3 The Basics of Networking Learning Objectives Tell whether a communication technology (Internet, radio, LAN, etc.) is synchronous or asynchronous; broadcast or point-to-point Explain the roles

More information

Edexcel GCSE in Computer Science Microsoft IT Academy Mapping

Edexcel GCSE in Computer Science Microsoft IT Academy Mapping Edexcel GCSE in Computer Science Microsoft IT Academy Mapping Topic 1: Problem solving Subject Content: 1.1 Algorithms MOAC course and lesson(s) MVA course and module(s) : 1.1.1 Understand what an algorithm

More information

Stonelaw High School. Computing Science. BGE - Computer Systems

Stonelaw High School. Computing Science. BGE - Computer Systems Stonelaw High School Computing Science BGE - Computer Systems Contents Computer Systems... 3 Computer Systems... 3 Hardware & Software... 3 Data Representation... 3 Representing Positive Integers... 3

More information

Chapter -4 OSI Reference Model

Chapter -4 OSI Reference Model Chapter -4 OSI Reference Model Objectives Concept of Reference Model. OSI Reference Model Concept. Layers of OSI Reference Model. 4.1 Introduction Layered Architecture, Peer-to- Peer Processes, Interfaces

More information

OCR GCSE (9-1) Computer Science J276 Accompanying Instructional Document

OCR GCSE (9-1) Computer Science J276 Accompanying Instructional Document OCR GCSE (9-1) Computer Science J276 Accompanying Instructional Document Curriculum area Non-coding theory* 1.1 Systems Architecture Content The purpose of the CPU Von Neumann architecture: MAR (Memory

More information

OCR J276 GCSE Computer Science

OCR J276 GCSE Computer Science Name: Class Teacher: Date: OCR J276 GCSE Computer Science REVISION BOOKLET 2.6 DATA REPRESENTATION Content in J276 GCSE Computer Science: 1.1 Systems Architecture 1.2 Memory 1.3 Storage 1.4 Wireless and

More information

Network Security and Cryptography. 2 September Marking Scheme

Network Security and Cryptography. 2 September Marking Scheme Network Security and Cryptography 2 September 2015 Marking Scheme This marking scheme has been prepared as a guide only to markers. This is not a set of model answers, or the exclusive answers to the questions,

More information

CS Final Exam

CS Final Exam CS 600.443 Final Exam Name: This exam is closed book and closed notes. You are required to do this completely on your own without any help from anybody else. Feel free to write on the back of any page

More information

Cambridge Ordinary Level 2210 Computer Science November 2016 Principal Examiner Report for Teachers

Cambridge Ordinary Level 2210 Computer Science November 2016 Principal Examiner Report for Teachers COMPUTER SCIENCE Paper 2210/12 Paper 1 Key messages If a candidate writes the answer to a question on an additional page they must indicate very clearly to the Examiner where the revised answer can be

More information

Final Exam COS 116 Spring 2012: The Computational Universe

Final Exam COS 116 Spring 2012: The Computational Universe Final Exam COS 116 Spring 2012: The Computational Universe Name: ANSWER KEY Email: @princeton.edu This is an in-class exam. No collaboration is allowed. There are 8 questions on 7 pages. You may use the

More information

A Modified Playfair Encryption Using Fibonacci Numbers

A Modified Playfair Encryption Using Fibonacci Numbers A Modified Playfair Encryption Using Fibonacci Numbers Mohd Vasim Ahamad 1, Maria Masroor 2, Urooj Fatima 3 Aligarh Muslim University (India) ABSTRACT With the technology advancements and easy availability

More information

Content (c) 2017 Readers Question Bank Group. Logo is trademark Readers Question Bank Group.

Content (c) 2017 Readers Question Bank Group. Logo is trademark Readers Question Bank Group. Content (c) 2017 Readers Question Bank Group. Logo is trademark Readers Question Bank Group. For individual teachers: Readers Question Bank(tm) Question Sets are for in-classroom use only. Usage is free.

More information

Wireless Attacks and Countermeasures

Wireless Attacks and Countermeasures Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections

More information

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network Chapter Goals Chapter 15 Networks Describe the core issues related to computer networks List various types of networks and their characteristics Explain various topologies of local-area networks Explain

More information

Cryptography (Overview)

Cryptography (Overview) Cryptography (Overview) Some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) Modern secret key cryptography DES, AES Public key cryptography RSA, digital signatures Cryptography

More information

Example 1: Denary = 1. Answer: Binary = (1 * 1) = 1. Example 2: Denary = 3. Answer: Binary = (1 * 1) + (2 * 1) = 3

Example 1: Denary = 1. Answer: Binary = (1 * 1) = 1. Example 2: Denary = 3. Answer: Binary = (1 * 1) + (2 * 1) = 3 1.1.1 Binary systems In mathematics and digital electronics, a binary number is a number expressed in the binary numeral system, or base-2 numeral system, which represents numeric values using two different

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 6 Release 1 System i Security Digital Certificate Manager Version 6 Release 1 Note Before using this information and the product it supports, be sure

More information

Network Models. Behrouz A. Forouzan Data communication and Networking Fourth edition

Network Models. Behrouz A. Forouzan Data communication and Networking Fourth edition Chapter 2 Network Models Behrouz A. Forouzan Data communication and Networking Fourth edition 1 Layered Tasks We use the concept of layers in our daily life. As an example, let us consider two friends

More information

CMPE150 Midterm Solutions

CMPE150 Midterm Solutions CMPE150 Midterm Solutions Question 1 Packet switching and circuit switching: (a) Is the Internet a packet switching or circuit switching network? Justify your answer. The Internet is a packet switching

More information

Network Security Issues and Cryptography

Network Security Issues and Cryptography Network Security Issues and Cryptography PriyaTrivedi 1, Sanya Harneja 2 1 Information Technology, Maharishi Dayanand University Farrukhnagar, Gurgaon, Haryana, India 2 Information Technology, Maharishi

More information

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP, , SMTP, Telnet, FTP, Security-PGP-SSH.

APPLICATION LAYER APPLICATION LAYER : DNS, HTTP,  , SMTP, Telnet, FTP, Security-PGP-SSH. APPLICATION LAYER : DNS, HTTP, E-mail, SMTP, Telnet, FTP, Security-PGP-SSH. To identify an entity, the Internet used the IP address, which uniquely identifies the connection of a host to the Internet.

More information

Worksheet - Reading Guide for Keys and Passwords

Worksheet - Reading Guide for Keys and Passwords Unit 2 Lesson 15 Name(s) Period Date Worksheet - Reading Guide for Keys and Passwords Background Algorithms vs. Keys. An algorithm is how to execute the encryption and decryption and key is the secret

More information

CISNTWK-440. Chapter 4 Network Vulnerabilities and Attacks

CISNTWK-440. Chapter 4 Network Vulnerabilities and Attacks CISNTWK-440 Intro to Network Security Chapter 4 Network Vulnerabilities and Attacks Objectives Explain the types of network vulnerabilities List categories of network attacks Define different methods of

More information

Standard File Formats

Standard File Formats Standard File Formats Introduction:... 2 Text: TXT and RTF... 4 Grapics: BMP, GIF, JPG and PNG... 5 Audio: WAV and MP3... 8 Video: AVI and MPG... 11 Page 1 Introduction You can store many different types

More information

NETWORK SECURITY. Ch. 3: Network Attacks

NETWORK SECURITY. Ch. 3: Network Attacks NETWORK SECURITY Ch. 3: Network Attacks Contents 3.1 Network Vulnerabilities 3.1.1 Media-Based 3.1.2 Network Device 3.2 Categories of Attacks 3.3 Methods of Network Attacks 03 NETWORK ATTACKS 2 3.1 Network

More information

Internet Architecture

Internet Architecture Internet Architecture Lecture 10: How Email Work Assistant Teacher Samraa Adnan Al-Asadi 1 How Email Works Electronic mail, or email, might be the most heavily used feature of the Internet. You can use

More information

ECS 15; Lectures 17 and 18. The Internet. What is the internet, and how does it work? TA feedback

ECS 15; Lectures 17 and 18. The Internet. What is the internet, and how does it work? TA feedback ECS 15; Lectures 17 and 18 The Internet What is the internet, and how does it work? TA feedback Python -- Run your code!! Term paper: Start a paragraph with the point of the paragraph, not in modern times

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

Digital Media. Daniel Fuller ITEC 2110

Digital Media. Daniel Fuller ITEC 2110 Digital Media Daniel Fuller ITEC 2110 Daily Question: Which statement is True? 5 + 5 = 10 1 + 1 = 10 F + 1 = 10 Email answer to DFullerDailyQuestion@gmail.com Subject Line: ITEC2110-26 First, some mac

More information

CS 0478 Topic 1.2. only. From sender to receiver. directions simultaneously. data can be sent from A to B and from B to A along the same line

CS 0478 Topic 1.2. only. From sender to receiver. directions simultaneously. data can be sent from A to B and from B to A along the same line Communication and Internet Technologies:- When data is sent from one device to another, it is important to consider how that data is transmitted. It is also important to ensure that the data hasn t been

More information

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L

CSE 3461/5461: Introduction to Computer Networking and Internet Technologies. Network Security. Presentation L CS 3461/5461: Introduction to Computer Networking and Internet Technologies Network Security Study: 21.1 21.5 Kannan Srinivasan 11-27-2012 Security Attacks, Services and Mechanisms Security Attack: Any

More information

CS244a: An Introduction to Computer Networks

CS244a: An Introduction to Computer Networks Do not write in this box MCQ 13: /10 14: /10 15: /0 16: /0 17: /10 18: /10 19: /0 0: /10 Total: Name: Student ID #: Campus/SITN-Local/SITN-Remote? CS44a Winter 004 Professor McKeown CS44a: An Introduction

More information

elc International School

elc International School Subject: COMPUTER SCIENCE (0478) Syllabus 2016 Topics to be covered Section 1: Theory of Computer Science Theory: At the end of the section candidates should be able to Practical: At the end of the section

More information

key distribution requirements for public key algorithms asymmetric (or public) key algorithms

key distribution requirements for public key algorithms asymmetric (or public) key algorithms topics: cis3.2 electronic commerce 24 april 2006 lecture # 22 internet security (part 2) finish from last time: symmetric (single key) and asymmetric (public key) methods different cryptographic systems

More information

Lecture (02) Network Protocols and Standards

Lecture (02) Network Protocols and Standards Lecture (02) Network Protocols and Standards Dr. Ahmed M. ElShafee 1 Agenda - - 2 Preface Protocols and standards are what make networks work together. Protocols make it possible for the various components

More information

interface Question 1. a) Applications nslookup/dig Web Application DNS SMTP HTTP layer SIP Transport layer OSPF ICMP IP Network layer

interface Question 1. a) Applications  nslookup/dig Web Application DNS SMTP HTTP layer SIP Transport layer OSPF ICMP IP Network layer TDTS06 Computer networks, August 23, 2008 Sketched answers to the written examination, provided by Juha Takkinen, IDA, juhta@ida.liu.se. ( Sketched means that you, in addition to the below answers, need

More information

9/8/2016. Characteristics of multimedia Various media types

9/8/2016. Characteristics of multimedia Various media types Chapter 1 Introduction to Multimedia Networking CLO1: Define fundamentals of multimedia networking Upon completion of this chapter students should be able to define: 1- Multimedia 2- Multimedia types and

More information

Data Representation From 0s and 1s to images CPSC 101

Data Representation From 0s and 1s to images CPSC 101 Data Representation From 0s and 1s to images CPSC 101 Learning Goals After the Data Representation: Images unit, you will be able to: Recognize and translate between binary and decimal numbers Define bit,

More information

Part 1: Introduction. Goal: Review of how the Internet works Overview

Part 1: Introduction. Goal: Review of how the Internet works Overview Part 1: Introduction Goal: Review of how the Internet works Overview Get context Get overview, feel of the Internet Application layer protocols and addressing Network layer / Routing Link layer / Example

More information

IBM. Security Digital Certificate Manager. IBM i 7.1

IBM. Security Digital Certificate Manager. IBM i 7.1 IBM IBM i Security Digital Certificate Manager 7.1 IBM IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in

More information

Exam Questions v8

Exam Questions v8 Exam Questions 412-79v8 EC-Council Certified Security Analyst https://www.2passeasy.com/dumps/412-79v8/ 1.Which of the following password cracking techniques is used when the attacker has some information

More information

Integrating the Hardware Management Console s Broadband Remote Support Facility into your Enterprise

Integrating the Hardware Management Console s Broadband Remote Support Facility into your Enterprise System z Integrating the Hardware Management Console s Broadband Remote Support Facility into your Enterprise SC28-6880-00 System z Integrating the Hardware Management Console s Broadband Remote Support

More information

Computer Security. 15. Tor & Anonymous Connectivity. Paul Krzyzanowski. Rutgers University. Spring 2017

Computer Security. 15. Tor & Anonymous Connectivity. Paul Krzyzanowski. Rutgers University. Spring 2017 Computer Security 15. Tor & Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2017 April 24, 2017 CS 419 2017 Paul Krzyzanowski 1 Private Browsing Browsers offer a "private" browsing modes

More information

Innovation and Cryptoventures. Technology 101. Lee Jacobs and Campbell R. Harvey. February 22, 2017

Innovation and Cryptoventures. Technology 101. Lee Jacobs and Campbell R. Harvey. February 22, 2017 Innovation and Cryptoventures Technology 101 Lee Jacobs and Campbell R. Harvey February 22, 2017 What is a computer? Electronic device that has the ability to store, retrieve, and process data Hardware

More information

The OSI Model and the TCP/IP Protocol Suite Outline: 1. Protocol Layers 2. OSI Model 3. TCP/IP Model 4. Addressing

The OSI Model and the TCP/IP Protocol Suite Outline: 1. Protocol Layers 2. OSI Model 3. TCP/IP Model 4. Addressing The OSI Model and the TCP/IP Protocol Suite Outline: 1. Protocol Layers 2. OSI Model 3. TCP/IP Model 4. Addressing OBJECTIVES To discuss the OSI model and its layer architecture and to show the interface

More information

Private Browsing. Computer Security. Is private browsing private? Goal. Tor & The Tor Browser. History. Browsers offer a "private" browsing modes

Private Browsing. Computer Security. Is private browsing private? Goal. Tor & The Tor Browser. History. Browsers offer a private browsing modes Private Browsing Computer Security 16. Tor & Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2017 Browsers offer a "private" browsing modes Apple Private Browsing, Mozilla Private Browsing,

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 16, 2013 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2013-75 minutes This examination

More information

Layered Architecture

Layered Architecture 1 Layered Architecture Required reading: Kurose 1.7 CSE 4213, Fall 2006 Instructor: N. Vlajic Protocols and Standards 2 Entity any device capable of sending and receiving information over the Internet

More information

Activity Guide - Public Key Cryptography

Activity Guide - Public Key Cryptography Unit 2 Lesson 19 Name(s) Period Date Activity Guide - Public Key Cryptography Introduction This activity is similar to the cups and beans encryption we did in a previous lesson. However, instead of using

More information

Chapter 3: Network Protocols and Communications CCENT Routing and Switching Introduction to Networks v6.0 Instructor Planning Guide

Chapter 3: Network Protocols and Communications CCENT Routing and Switching Introduction to Networks v6.0 Instructor Planning Guide Chapter 3: Network Protocols and Communications CCENT Routing and Switching Introduction to Networks v6.0 Instructor Planning Guide CCNET v6 1 Chapter 3: Network Protocols and Communications CCENT Routing

More information

Operating Systems Design Exam 3 Review: Spring Paul Krzyzanowski

Operating Systems Design Exam 3 Review: Spring Paul Krzyzanowski Operating Systems Design Exam 3 Review: Spring 2012 Paul Krzyzanowski pxk@cs.rutgers.edu 1 Question 1 An Ethernet device driver implements the: (a) Data Link layer. (b) Network layer. (c) Transport layer.

More information

R (2) Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing.

R (2) Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing. R (2) N (5) Oral (3) Total (10) Dated Sign Experiment No: 1 Problem Definition: Implementation of following spoofing assignments using C++ multi-core Programming a) IP Spoofing b) Web spoofing. 1.1 Prerequisite:

More information

MiPDF.COM. 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below.

MiPDF.COM. 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below. CCNA1 v6.0 Pretest Exam Answers 2017 (100%) MiPDF.COM 1. Convert the decimal number 231 into its binary equivalent. Select the correct answer from the list below. 11110010 11011011 11110110 11100111* 11100101

More information

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to

The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to 1 The World Wide Web is widely used by businesses, government agencies, and many individuals. But the Internet and the Web are extremely vulnerable to compromises of various sorts, with a range of threats

More information

CS164 Final Exam Winter 2013

CS164 Final Exam Winter 2013 CS164 Final Exam Winter 2013 Name: Last 4 digits of Student ID: Problem 1. State whether each of the following statements is true or false. (Two points for each correct answer, 1 point for each incorrect

More information

Discussion. Why do we use Base 10?

Discussion. Why do we use Base 10? MEASURING DATA Data (the plural of datum) are anything in a form suitable for use with a computer. Whatever a computer receives as an input is data. Data are raw facts without any clear meaning. Computers

More information

Modern cryptography 2. CSCI 470: Web Science Keith Vertanen

Modern cryptography 2. CSCI 470: Web Science Keith Vertanen Modern cryptography 2 CSCI 470: Web Science Keith Vertanen Modern cryptography Overview Asymmetric cryptography Diffie-Hellman key exchange (last time) Pubic key: RSA Pretty Good Privacy (PGP) Digital

More information

Internet Architecture & Performance. What s the Internet: nuts and bolts view

Internet Architecture & Performance. What s the Internet: nuts and bolts view Internet Architecture & Performance Internet, Connection, Protocols, Performance measurements What s the Internet: nuts and bolts view millions of connected computing devices: hosts, end systems pc s workstations,

More information

Configuring IP Services

Configuring IP Services This module describes how to configure optional IP services. For a complete description of the IP services commands in this chapter, refer to the Cisco IOS IP Application Services Command Reference. To

More information

2nd Paragraph should make a point (could be an advantage or disadvantage) and explain the point fully giving an example where necessary.

2nd Paragraph should make a point (could be an advantage or disadvantage) and explain the point fully giving an example where necessary. STUDENT TEACHER WORKING AT GRADE TERM TARGET CLASS YEAR TARGET The long answer questions in this booklet are designed to stretch and challenge you. It is important that you understand how they should be

More information

N5 Computing Science - Solutions

N5 Computing Science - Solutions Revision 1 1. Convert the following decimal numbers to binary using the table below. 128 64 32 16 8 4 2 1 22 0 0 0 1 0 1 1 0 144 1 0 0 1 0 0 0 0 73 0 1 0 0 1 0 0 1 2. How does a computer represent characters

More information

Full file at https://fratstock.eu

Full file at https://fratstock.eu Solutions Manual Introduction to Computer Security Version 1.1 M. T. Goodrich and R. Tamassia December 20, 2010 1 Terms of Use This manual contains solutions for selected exercises in the book Introduction

More information

Computing Science: National 5 and Higher skills, knowledge and understanding

Computing Science: National 5 and Higher skills, knowledge and understanding Software design and development Development methodologies Analysis Design Describe and implement the phases of an iterative development process: analysis, design, implementation, testing, documentation,

More information

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START Page 1 of 11 MIDTERM EXAMINATION #1 OCT. 13, 2011 COMPUTER NETWORKS : 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Fall 2011-75 minutes This examination

More information

Internet Architecture

Internet Architecture Internet Architecture Lecture 3: How TCP/IP Works & Understanding the Internet's Software Structure Assistant Teacher Samraa Adnan Al-Asadi 1 How TCP/IP Works Packet: A piece of data broken down into pieces

More information

Chapter 5: Networking and the Internet

Chapter 5: Networking and the Internet Chapter 5: Networking and the Internet (Completion Time: 3 weeks) Topics: Internet Basics An overview of how the internet works and how we as users interact with it. This topic can also be used as sort

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet. SSL ensures the secure transmission of data between a client and a server through

More information

How Secured2 Uses Beyond Encryption Security to Protect Your Data

How Secured2 Uses Beyond Encryption Security to Protect Your Data Secured2 Beyond Encryption How Secured2 Uses Beyond Encryption Security to Protect Your Data Secured2 Beyond Encryption Whitepaper Document Date: 06.21.2017 Document Classification: Website Location: Document

More information

ES623 Networked Embedded Systems

ES623 Networked Embedded Systems ES623 Networked Embedded Systems Introduction to Network models & Data Communication 16 th April 2013 OSI Models An ISO standard that covers all aspects of network communication is the Open Systems Interconnection

More information