Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CSE 490/590 Midterm Exam - 2025 V2 Solution: A Comprehensive Guide for Computer Science Students

Beoordeling
-
Verkocht
-
Pagina's
88
Cijfer
A+
Geüpload op
17-09-2025
Geschreven in
2025/2026

CSE 490/590 Midterm Exam - 2025 V2 Solution: A Comprehensive Guide for Computer Science Students

Instelling
CSE 490/590 Mi
Vak
CSE 490/590 Mi

Voorbeeld van de inhoud

CSE 490/590 Midterm Exam - 2025 V2 Solution: A
Comprehensive Guide for Computer Science Students


Denial of Service Attack - (correct answer --->)Large
number of requests are sent to a server all at once,
designed to flood a server with useless traffic, sever will
come to a halt to deal with all traffic, prevents a user from
gaining access to a website

difference between text based and biometric - (correct
answer --->)Characters can be typed at a keyboard, can
be changed by the user
Biometric password, a stored physical measurement e.g.
fingerprint, compared to a previously scanned human
measurement
Difference, text based passwords easier to hack, biometric
are unique to that person and cannot be shared.

how to prevent accidental loss or damage of data -
(correct answer --->)1. Use backups, so if data is lost
or damaged, original data is still there, to the cloud
2. Use passwords, so only specific users can access and
thus chances of loss is less
3. Set data to read only, to prevent accidental editing
4. Save data on a regular basis
5.Use correct shut down and start up procedures
6. Keep storage devices in a safe place

,Copyright - (correct answer --->)ownership of
intellectual property,

plagiarism - (correct answer --->)take someones
ideas and claim them as your own

Free software - (correct answer --->)users have
freedom to run, copy change, adapt available software,
users can run software as they choose, study how
software works and change to meet their own needs,
redistribute their modified copies and distributes modified
versions of software

Freeware - (correct answer --->)software can be
downloaded for free and then use without price but
copyright laws apply for freeware and not possible to
modify

Shareware - (correct answer --->)Gives users chance
to ry out of software free of charge before buying it,
subejct o all copyright laws features of full version of
software is not available until full version is bought

Importance of ethics - (correct answer --->)Help stop
the misuse of computers, use of computers needs to be
governed, helps users to be safer when using computers,
provides rules for using computers, helps stop intellectual
property theft, helps prevent the misuse of personal
information, laws such as ... and security issues such as ...

,Computer use regulations - (correct answer --->)Set
of laws that regulate the use of computers, covers
intellectual property rights, privacy issues and the impact
of computers on society.

Double Entry Verification Technique - (correct answer
--->)Data is entered twice and the computer checks that
they match up and error message is outputted if there are
any discrepancies

Visual Check Verification Technique - (correct answer
--->)Manual system, whee original data is compared to
data typed in manually, reading it and checking against
other doc

Problems with parity check - (correct answer --->)If >
two bits have been changed its possible for parity check to
fail and find error

Parity byte - (correct answer --->)Parity byte is also
sent along with other binary numbers which uses a parity
check for each number. Parity byte is the additional parity
bits found from a vertical parity check on the binary
numbers, sent to indicated end of binary block

Finding errors in parity bytes - (correct answer ---
>)See which rows have an incorrect parity and columns,

, find intersection of row and column and change to make
correct parity.

Automatic repeat request verification technique -
(correct answer --->)ARQ = error control method used
during data transmission, uses acknowledgements
(messages sent by receiver indicating that data has been
received correctly) and timeouts (time period allowed to
elapse before an acknowledgement has been received. If
sender doesn't receive an acknowledgement before
timeot, then data is usually re-transmitted automatically.



binary numbers are used in - (correct answer ---
>)computer systems

conversion from denary to binary and from binary to den -
(correct answer --->)use place values

memory size of a computer is measured in terms of the
number of - (correct answer --->)bytes

1 kilobyte is - (correct answer --->)2 to the 10 bytes

1 megabyte is - (correct answer --->)2 to 20 bytes

Geschreven voor

Instelling
CSE 490/590 Mi
Vak
CSE 490/590 Mi

Documentinformatie

Geüpload op
17 september 2025
Aantal pagina's
88
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€23,80
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kan je een ander document kiezen. Je kan het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
wise254 Chamberlain College Of Nursng
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
54
Lid sinds
2 jaar
Aantal volgers
3
Documenten
2404
Laatst verkocht
2 maanden geleden
StudySphere

Success starts with the right resources, and these study documents are exactly what you need to stay ahead. Carefully crafted, easy to understand, and packed with key points, these notes take the stress out of studying. Whether you're aiming for top grades or just need a clearer way to review, these materials are made to help you succeed. Stop struggling with scattered information—get organized, get focused, and get results. Download now and experience the difference smart studying makes!

Lees meer Lees minder
5,0

571 beoordelingen

5
559
4
4
3
5
2
2
1
1

Populaire documenten

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen