Exam Questions and CORRECT Answers
Tablets and smartphones make extensive use of ________ to store the operating system and
applications that are included with the device. - CORRECT ANSWER - flash memory
Which media stores information in the form of tiny pits which can then be read by a laser? -
CORRECT ANSWER - optical storage
A gigabyte (GB) is roughly. - CORRECT ANSWER - 1 billion bytes
With hyper threading, the number of virtual cores is usually the same as the number of physical
cores. - CORRECT ANSWER - FALSE
Cache usually has lower latency (waiting time) than RAM. - CORRECT ANSWER -
TRUE
Windows 8 is an example of a(n) ________. - CORRECT ANSWER - operating system
Running more than one operating system on the same hardware simultaneously is __________. -
CORRECT ANSWER - virtualization
Which of the following authentication methods is 100 percent accurate? - CORRECT
ANSWER - none (fingerprints, passwords)
Where do organizations typically place firewalls? - CORRECT ANSWER - between the
server and the internet
How often should you back up your computer? - CORRECT ANSWER - it depends
, In the movie Minority Report Tom Cruise's character, John Anderton, gets an eye transplant, but
keeps his original eyes in order to access his former workplace. This is an example of what
technology? - CORRECT ANSWER - biometrics
In the movie Sneakers, Dr. Werner Brandes works in the office that Marty and the team need to
break into. Marty and the team learned all about Werner by examining his trash. This "dumpster
diving" is one form of - CORRECT ANSWER - social engineering
According to Terms and Conditions May Apply, companies are only allowed to gather your
personal information if it serves a justifiable business need. - CORRECT ANSWER -
FALSE (companies can use your info for whatever they want)
Browser cookies are used to identify you to advertising companies so they can track your
browsing behavior. - CORRECT ANSWER - TRUE
In online settings, which of the following is a reason people share their personal information? -
CORRECT ANSWER - monetary incentive, convenience, to feel close to their friends and
self-promotion/prestige
According to our in-class discussion, information privacy is essentially a constitutional right that
cannot be violated. - CORRECT ANSWER - FALSE (info privacy is not a constitutional
right)
This protocol takes care of dividing a message into a number of small pieces before sending it
across the internet. - CORRECT ANSWER - TCP (transmission control protocol)
This protocol takes care of lining up packets in their proper order on the receiving end and
reassembling them into the original message. - CORRECT ANSWER - TCP
A router's primary purpose (directing traffic) is accomplished by following this protocol. -
CORRECT ANSWER - IP