=========================preview======================
(comp101)[2006](s)midterm1~masze^_10100.pdf
Back to COMP101 Login to download
======================================================
For questions 1 to 18, please use a pencil to fill in the circle on the answer sheet that represents the best answer (4 points for each question).


1. The operating system is an interface between
A. the CPU and peripheral devices.




B. the browser and the Web server.

C. the user and the computer.

D. the computer and another computer.


2. A new floppy disk which is already formatted



A. does not contain any virus.

B. may contain some virus.

C. could be infected by virus if it is kept next to an infected floppy disk.

D. could be infected by virus if it is formatted again.


3. If the computer suddenly loses electrical power,


A. data stored in RAM are lost.

B. data stored in ROM are lost.

C. all data stored in RAM and ROM are lost.

D. all data stored in RAM, ROM, and hard disk are lost.







4. How many English characters, numerals, and symbols are represented in the ASCII code which takes up one byte each in the computer?



A. 64

B. 128

C. 256

D. 1024

5. Which of the following operating systems is not found on the desktop personal computer?

A. GNU Linux

B. Palm OS

C. Redhat

D. Windows

6. When a user wants to find information about confidential e-mail within the COMP101 course website, which of the following is the best keywords for a search engine, such as Google:

A. "confidential e-mail" site:course.cs.ust.hk/comp101

B. "confidential e-mail" site:www.ust.hk/course/comp101

C. "confidential e-mail" url:course.cs.ust.hk/comp101

D. "confidential e-mail" url:www.ust.hk/course/comp101


7. In the Internet, the network hardware includes: server, router, personal computer, and

A. cable

B. DNS

C. PKI

D. TCP/IP
8. When a user wishes to digitally sign a mail message, the mail tool would use

A. the receivers public key.

B. the receivers private key.

C. the senders public key.

D. the senders private key.

9. One of the most important contributions of Internet to the society is

A. a robust network to share computing power.

B. a reliable network to share specialized hardware, such as a laser color printer.

C. a secure network to share private information.

D. an inexpensive network to exchange short messages.


10. In a computer network, we call the computer which manages network traffic

A. mainframe

B. router

C. PDA

D. supercomputer


11. Which of the following is not an extension card for the personal computer?


A. Graphics card

B. Modem card

C. Smart card

D. Sound card
12. A user wants to download all the e-mails from the e-mail server and keeps no copy on the mail server. Which of the following mail protocols should he choose?

A. HTTP

B. IMAP

C. POP3

D. SMTP

13. Which of the following actions has the lowest security risk?