=========================preview======================
(comp101)[2004](s)midterm1~masze^_10090.pdf
Back to COMP101 Login to download
======================================================
For questions 1 to 20, please tick all boxes that are correct (4 points for each question).
1.
Linux is less popular as an operating system on a personal computer than MS Windows because... . Linux is less reliable than Windows. . Linux is less secure than Windows.

. Linux is more expensive than Windows.
. Linux has fewer applications than Windows.


2.
The hard disk of a computer is used to store programs and data: . only before they are transferred to RAM for processing. . only before the computer is shut down.

. always permanently unless the device is broken.
. only after they are processed.


3.
Which of the following is hardware?

. Keyboard
. LaserJet printer driver
. Floppy disk
. Internet Explorer


4.
When someone says the GUI for this application is difficult to learn, he means:

. The look-and-feel is poorly designed. . The software is not suitable for the application. . The hardware functions are too complicated. . There is too much global user information.

5.
How is Chinese text in simplified characters encoded ine-mail messages?

. CJK
. Big5
. Unicode
. GB2312


6.
The CPU is often referred to as the brain of the computer because...

. It manages all the hardware components on the
motherboard.
. It allows the computer to make decisions.
. It performs complex computations.
. It adjusts the brightness of the display.


7.
When a user clicks on a button in Outlook Express, whatis the detailed route by which the mouse click is delivered to the computer?

. Mouse . Windows . Outlook Express . Mouse . Mouse driver . Outlook Express . Mouse . Windows . Mouse driver . Outlook Express . Mouse . Mouse driver . Windows . Outlook Express

8.
When a user wishes to send a confidential mail message,he would use

. The shared secret key to encrypt the message . His own public key to encrypt the message . His own private key to encrypt the message . The recipients public key to encrypt the message

9.
A message containing an unsolicited commercial message is often called

. a SCAM
. a SCAN
. a SPAM
. a SPAN


10.
A gigabyte is roughly

. 1,000,000 bytes
. 1,000,000,000 bytes
. 1,000,000,000,000 bytes
. 1,000,000,000,000,000 bytes


11.
To reduce the chance of becoming a victim of a virus attack, one should

. Use only Webmail as mail tool . Never open attachments sent from strangers . Never open unexpected attachments sent from friends . Update anti-virus software frequently

12.
The Internet is very useful these days mainly because

. it is free.
. it has several killer applications such as e-mail.
. it is available everywhere in the world.
. it provides privacy protection for its users.


13.
The Intranet is

. another name for a LAN.
. a misspelling for the Internet.
. an Internet restricted to a certain organization.
. an Internet using encrypted IP packets.


14.
The current IP address scheme