=========================preview======================
(comp101)[2003](f)midterm2~masze^_10085.pdf
Back to COMP101 Login to download
======================================================
For questions 1 to 20, please tick all boxes that are correct (4 points for each question).
1.
Which of the following can be used to provide privacy when filling out a form on a website? . Pingyin input . https

. public-key encryption
. SVG


2.
In order to hide the contents of their communications from their parents, which of the following should Romeoand Juliet use?

. PKI
. SMTP
. FAX
. HTML


3.
What do a Universal Resource Identifier (URI/URL) and an e-mail address have in common?


. They both contain an @ symbol.
. They both contain at least one dot (.) in the string.
. They both can contain www in the address.
. They both identify a location or a recipient on the

Internet.

4.
Given an e-mail address, how would the computer know where to deliver the message? . It uses the post office website to find the IP address. . It uses DNS to find the IP address.

. It uses URI to find the IP address.
. It uses http to find the IP address.


5.
Which of the following protocols is used to send email?

. SMTP
. POP3
. IMAP
. HTTPS


6.
What is an advantage of webmail (such as offered byHotmail or Yahoo) over a local mail program (such as Outlook Express)?


. Webmail is much faster.
. Webmail can attach pictures to an email.
. Webmail can be used to send spam messages.
. Webmail can be accessed from any computer with a

browser.
7. Why is it a good idea to send e-mails to a mail server, instead of sending them directly to the recipients own computer?
. The recipients computer may not be fast enough to handle e-mail traffic.
. The recipients computer may not be powered up all thetime.
. The recipients computer may not be equipped with suitable mail handling programs.
. The recipients computer does not have firewalls toprotect against unauthorized accesses.
8. Suppose Alice wants to send Bob a secret message. To make sure that nobody but Bob can read it, Alice decides to use public-key cryptography. Which key should Alice use to encrypt the message?
. Alices public key
. Alices secret key
. Bobs public key
. Bobs secret key
9. If Alice uses her own secret key to encrypt the message to Bob, what is she trying to accomplish?
. She wants Bob to know her secret, as a sign of love.
. She wants Bob to know for sure that this is a message from her.
. She wants anyone who sees the message to know that there is a special relationship between her and Bob.
. She wants to keep the relationship secret.
10. Some websites can remember a username and password between visits... how do they do that?
. The username and password are recorded and stored at the Web server of the site visited.
. The username and password are recorded and stored in the users operating system.
. The username and password are recorded and stored in acookie file at the website.
. The username and password are recorded and stored in acookie file on the