CMPSCI 120 Fall 2017 Midterm Exam #1 Solution Key Friday, October 6, 2017 Professor William T. Verts

Similar documents
What happened in 1955 that was significant for the future of computers?

NAME: Question Points TOTAL 100

COMPSCI 120 Review for Final Exam Professor William T. Verts MISCELLANEOUS. What is rule # 34? List 3 Anti-Virus programs. BIAS, POLLS, AND SEARCHING

CMPSCI 120 Fall 2016 Professor William T. Verts

CMPSCI 120 Extra Credit #1 Professor William T. Verts

Clickbank Domination Presents. A case study by Devin Zander. A look into how absolutely easy internet marketing is. Money Mindset Page 1

INFOPOP S UBB.CLASSIC SOFTWARE. User Guide. Infopop Corporation Westlake Avenue North Suite 605 Phone Fax

CMPSCI 105 Midterm Exam Solution Spring 2005 March 24, 2005 Professor William T. Verts

Codes and Coding. Objectives: Related Careers

JS Lab 1: (Due Thurs, April 27)

Lecture (02) Network Protocols and Standards

CMPSCI 120 Fall 2015 Midterm Exam #2 Solution Key Monday, November 16, 2015 Professor William T. Verts

CMPSCI 105 Midterm Exam Spring 2015 March 5, 2015 Professor William T. Verts

CMPSCI 105 Midterm Exam Solution Key. Fall 2013 October 17, Professor William T. Verts

Azon Master Class. By Ryan Stevenson Guidebook #4 WordPress Installation & Setup

ECE 461 Internetworking Fall Quiz 1

Problem 1: Textbook Questions [4 marks]

Programming Lab 1 (JS Hwk 3) Due Thursday, April 28

Using WebBoard at UIS

CMPSCI 119 Fall 2018 Thursday, November 29, 2018 Midterm #3 Solution Key Professor William T. Verts

Midterm. You have two and a half hours to complete this exam (but you shouldn t need it).

ArcMap Online Tutorial Sarah Pierce How to map in ArcMap Online using the Fresh Prince of Bel Air as an example

Networking. Melissa Winstanley

CSCI 1100L: Topics in Computing Spring 2018 Web Page Project 50 points

EECS 122: Introduction to Communication Networks Final Exam Solutions

CSCI4211: Introduction to Computer Networks Fall 2017 Homework Assignment 1

Privacy and Security in Online Social Networks Department of Computer Science and Engineering Indian Institute of Technology, Madras

3. WWW and HTTP. Fig.3.1 Architecture of WWW

VERSION Lab 3: Link Layer

CS144 Review Session: Fall 2010 Behram Mistree

NCMail: Microsoft Outlook User s Guide

The Paperless Classroom with Google Docs by - Eric Curts

Genie Snoop lab. Laboration in data communication GenieLab Department of Information Technology, Uppsala University

CMPSCI 120 Lab #1 Professor William T. Verts

Introduction! 2. Why You NEED This Guide 2. Step One: Research! 3. What Are Your Customers Searching For? 3. Step Two: Title Tag!

Azon Master Class. By Ryan Stevenson Guidebook #5 WordPress Usage

CS-537: Midterm Exam (Fall 2008) Hard Questions, Simple Answers

COSC 6377 Mid-Term #2 Fall 2000

WebQuest. Question-File Quick-Start Instructions

1 GSW Bridging and Switching

Starting the Import From the Start menu, select the [Import Questions] task. A window will appear:

3.5. Regina A. Bobak, Ed.D. Technology Support Services, Bloomsburg University

Master Syndication Gateway V2. User's Manual. Copyright Bontrager Connection LLC

Chapter 4 The Internet

Announcements. Chapter 7 for Friday

The Quick And Easy Affiliate Setup List

Imagery International website manual

NAME: Question Points TOTAL 100

The name of our class will be Yo. Type that in where it says Class Name. Don t hit the OK button yet.

CS 134 Midterm Fall 2006

Introduction to Multimedia. MMP100 Spring 2016 thiserichagan.com/mmp100

Fall 2010 CS61C Midterm 1 Solutions

Kevin DeBoer. Professor Culik. English October 12, Algorithms

Computer Science Department 2 nd semester- Lecture13

In this course we will go over the basic functions of Microsoft Word, more advanced functions are omitted from this class and walkthrough.

Within Kodi you can add additional programs called addons. Each of these addons provides access to lots of different types of video content.

MOODLE MANUAL TABLE OF CONTENTS

Computer Networks Prof. S. Ghosh Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 28 IP Version 4

CNBK Communications and Networks Lab Book: Purpose of Hardware and Protocols Associated with Networking Computer Systems

and the World Wide Web

Lime Survey User Guide

6.6 Subnetting and Variable Length Subnet Masks (VLSMs)

CS 4349 Lecture October 18th, 2017

CMPSCI 119 Fall 2017 Monday, October 10, 2017 Midterm #1 Solution Key Professor William T. Verts

Spam. Time: five years from now Place: England

A quick guide to the Internet. David Clark 6.978J/ESD.68J Lecture 1 V1.0 Spring 2006

Unit 9 Tech savvy? Tech support. 1 I have no idea why... Lesson A. A Unscramble the questions. Do you know which battery I should buy?

25 Tried and True Direct Marketing Rules

Network Security Fundamentals. Network Security Fundamentals. Roadmap. Security Training Course. Module 2 Network Fundamentals

How To Launch A Campaign On MediaTraffic

Chat Reference Assignment

Staff Directory & Online Classroom: A Picture Book

Introduction To The New University Service. Bob Booth November 2010 AP- 2

HTML/CSS Lesson Plans

Lecture (03) Internet Protocol tcp/ip> OSI>

Appendix 8 Universal Powerline Bus (UPB)

Introduction. Three button technique. "Dynamic Data Grouping" using MS Reporting Services Asif Sayed

COMPSCI 120 Fall 2017 Review Questions for Midterm #2 Professor William T. Verts

NCMail: Microsoft Outlook User s Guide

THE DEFINITIVE GUIDE

Hello World! Computer Programming for Kids and Other Beginners. Chapter 1. by Warren Sande and Carter Sande. Copyright 2009 Manning Publications

Text Only Version of Lessons

Using web-based

CS244a: An Introduction to Computer Networks

Introduction to Information Science and Technology 2017 Networking I. Sören Schwertfeger 师泽仁

CMPSCI 105 Midterm Exam Solution Fall 2009

Midterm 1 Review Sheet CSS 305 Sp 06

Creating Pages with the CivicPlus System

Lecture 11: IPv6. CSE 123: Computer Networks Alex C. Snoeren. HW 2 due NOW

CS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT

CSE 123: Computer Networks Fall Quarter, 2017 MIDTERM EXAM

ECE 461 Internetworking Fall Quiz 1

search engines without algorithms behind them providing you with this filtered information.

CSC-105 Exam #1 October 10, 2013

CSC 101: PreLab Reading for Lab #4 More HTML (some of this reading on Tables and Images are based on previous writings of Prof William Turkett)

Browsing the World Wide Web with Firefox

GENERAL MATH FOR PASSING

Below is another example, taken from a REAL profile on one of the sites in my packet of someone abusing the sites.

BullsEye Digital Voice Toolbar Quick Reference Guide

CS3516 B10 Computer Networks Final Exam December 14, 2010

Transcription:

CMPSCI 120 Fall 2017 Midterm Exam #1 Solution Key Friday, October 6, 2017 Professor William T. Verts <1> 30 Points Answer any 30 of the following questions. Answer more for extra credit. Blank answers will be ignored. Correct answers gain 1 point. Incorrect answers lose one-half point (but the total will not go below zero). For example, if you answer all 35 questions, and get 25 correct but the other 10 are incorrect, the final score for this question will be 25-(10/2) = 20. Yourself Pareidolia 8 256 FF 2 9D 93 4 128 Star Point-to-Point Who is the easiest person in the world to fool? What is it called when I see Elvis in my cornflakes? Do people tend to change their opinions when given evidence contrary to their strongly-held beliefs? How many bits are in a byte? How many distinct values can be stored in a byte? What is the hex value of the largest number storable in a byte? Can the hex value 1AE be stored in a byte? How many hex digits will fit into a byte? What is the equivalent hex value to the binary number 10011101? What is the equivalent hex value to the decimal number 147? How many bytes make up an IPv4 address? How many bits make up an IPv6 address? What network type has a big central computer with many terminals? What network type has a direct wire between each pair of computers? Page 1

Token Ring Collision DNS YES YES Cache Poisoning Packet Sniffer T F T F T Postcard Host Address Web Spider/Crawler Deprecated What network type is in the form of a circle? What is it called when computers talk simultaneously on Ethernet? What service maps URLs into IP addresses? My solar panel controller is at IP address 192.168.1.100 can anyone on the Internet see my panels except me? Can all machines connected to a hub see each other s traffic? Can all machines connected to a switch see each other s traffic? Can a computer with 802.11g wireless talk to an 802.11b router? What is it called when bad guys make DNS map URLs to wrong IPs? What is the program called that watches packet traffic on a server? T/F: A router can hide a local network behind a single IP address. T/F: All packets are guaranteed to reach their destination. T/F: Packets may arrive at their destination out of order. T/F: The Internet completely fails if someone nukes a major city. T/F: Most of the email traffic worldwide is SPAM. Is an email more like a letter in an envelope or a postcard? Is it a good idea to send sensitive information in a plain email? You get an email from your boss with an attachment and the subject line I love you. Is it a good idea to open the attachment? In a URL, what is the www.cs.umass.edu part called? What kind of program follows links to catalog many Web pages? Should you trust emails that say, Click here to check your account? What is it called when an HTML tag is discouraged from being used? Page 2

<2> 15 Points (3 points each) Here is an IPv4 address, in binary, using classful addressing: 10000000.00001111.11110000.11110000 A. What is the class represented? Class B (Starts with 10) B. What is the network identifier (write the number in binary)? 00000000001111 (6 bits from first byte, all 8 of second byte) C. What is the machine identifier (write the number in binary)? 1111000011110000 (all of third and fourth bytes) Here is an IPv4 address using CIDR: 106.147.15.123/23 D. How many bits are in the machine identifier? 9 (32 bits total: 23 used by network identifier) E. How many distinct machine identifiers can there be for this domain? 2 9 = 512 (Accept either answer) Page 3

<3> 15 Points Write an HTML fragment (not a complete Web page) that links to www.smash.com when you click on the image named Hulk.jpg (the image file is in the same folder as the referring document). <A HREF="http://www.smash.com/"> <IMG SRC="Hulk.jpg"> </A> 4 Points for <A HREF=" "> -1 for use of wrong attributes -1 for missing quotes -1 for missing angle brackets -1 for any other syntax errors 3 Points for http://www.smash.com/ (The trailing slash is optional) -1 for omitting http:// part -1 for any other syntax errors, such as slashes in the wrong direction 4 Points for <IMG SRC=" "> -1 for use of wrong attribute (such as HREF instead of SRC) -1 for missing quotes -1 for missing angle brackets -1 for any other syntax errors 3 Points for Hulk.jpg -1 for capitalization errors -1 for changing file name (such as Hulk.gif) -1 for any other syntax errors 1 Point for </A> -1 for missing angle brackets or slash In addition, remove 3 points for the inclusion of any other HTML that is not necessary to the solution of the problem. Page 4

<4> 10 Points Mark up the following text so that the phrase Web page is italic, the phrase COMPSCI 120 is in bold, and the word really is both bold and italic. Use a nondeprecated tag to underline the word neat. Add a deprecated attribute to make the background of the page yellow. <BODY BGCOLOR="yellow"> This is my fancy <I>Web page</i> for my <B>COMPSCI 120</B> class. It contains lots of <B><I>really</I></B> <INS>neat</INS> content. </BODY> Remove 1 point per error, but do not go below zero. Note: the bold-and-italic may be either <B><I> </I></B> or <I><B> </B></I>, but may not be <B><I> </B></I> or <I><B> </I></B>. If this is found, remove 1 extra point from the total, but do not go below zero. <5> 5 Points Very Short Answer Many years ago I saw magician James Randi interviewing a couple of Russian psychic women who claimed to be able to determine a person s personality from a photograph. When shown a picture of serial killer Ted Bundy, they went on for several minutes about how nice he was, and how he was obviously a good person. Only after being told who he was and what he did, they said You know, I thought there was something wrong with him! What kind of bias is being demonstrated here? Explain your answer. This is an example of hindsight bias, where, when information is made available after a decision must be made, is the decision changed to match the information. The belief that there was something wrong with Bundy was made only after his true nature was known, in order to justify the decision that he was actually OK (but with misgivings). Grade as 5=completely correct answer, 3=something is there but incomplete, and 0=completely wrong. Accept anything reasonable. If the student determines a different type of bias was in play here, and makes a carefully reasoned and reasonable argument supporting it, give full credit. Page 5

<6> 10 Points Very Short Answers An open but extremely biased political site holds a poll that gets badly Pharyngulated (swamped with votes counter to the bias of the site). What is wrong with each of the following attempts to prevent that from happening? 1. Using browser cookies to prevent each browser from voting more than once. 5 points: People can clear their browser cookies and vote again. Browser cookies do nothing to prevent one-browser-one-vote. Pharyngulation is still easy. 2. Requiring voters to be registered with the poll site as legitimate participants. 5 points: The only people likely to register with the poll site are those people who already agree with the bias of the site. People who disagree probably won t register. From the standpoint of the site owners this may not be a bad thing, but it definitely results in a skewed poll. <7> 15 Points Longer Answer Consider an Ethernet wire with several computers on it. Machine A wants to send a message to machine Z, and Machine B wants to send a message to Machine X. Describe the process they go through in order to talk, and describe what happens and how they react when the messages collide. You may use the back of the page for your answer. Any machine wishing to send a message listens to the wire to see if anyone else is talking. If yes, it waits. If no, it starts talking. Everyone else can hear the message, but all but the destination machine ignore the message. If machines A and B both wish to talk at the same time, they go through the same process of both listening to the wire to see if anyone else is talking. If yes, they wait. If no, they both start talking, but at the same time. Since each machine is also listening to its own outgoing message, both will detect the collision by determining that what they are sending is not what they are hearing. (That is, 0 bits are changed to 1s, and 1 bits are changed to 0s.) When this happens, both machines stop talking, both pick a random number indicating how long to wait, and both will start listening again after the wait time has expired. Since it is unlikely that the random numbers will be the same, one machine will start listening before the other one, decreasing the likelihood of another collision by the same pair of machines for the same messages. Score as 2 points per boldfaced point these are the highlights. Not everyone will express these seven core ideas the same way, so be flexible about scoring. Page 6