CSC 101 Introduction to Computers

Fall 2004

Final Exam

December 21/22, 2004

Connecticut Community Colleges Gateway Community College Student Info System Contact Instructor

Course Home Page

Syllabus

Assignments - Tuesday Class

Assignments - Mon-Wed Class

Lecture Overviews

Directions:
  1. Open MS Word
  2. Select the fifteen questions and the extra credit questions below and cut and paste into the Word document
  3. Add a header with your name, "Test 2", and the date
  4. Save the document
  5. Answer each question within the Word document immediately following each question
  6. Spell check the exam
  7. Printout a copy of the exam and turn it in.

Each question is worth 10 points. Partial credit will be given for partially correct answers.


What is an intranet? What technology would an intranet use?

How is an extranet similar to an intranet? How are they different?

What is a VPN and how does a VPN work?

What does a server computer do? What is a computer that connects to a server called?

What hardware is needed to connect two computers over a phone line? What is needed to connect a computer to a LAN?

Name and briefly describe two types of modems.

What is "twisted pair" and what is it used for?

What is the limitation of microwave signals and what is used to overcome this limitation?

How many satellites are needed to create a communications network? Why do you need that number?

What is Wi-Fi and how does it work?

What is the purpose of Bluetooth technology?

What is a network topology? Name and briefly describe two topologies.

Name and briefly describe two of the three types of servers one might find on a LAN?

What do the following stand for: LAN, MAN, WAN. Briefly describe each.

What is the advantage of using a LAN ?

What is a front-end application ? What is a back-end application?

Name four places that may store personal data. What kind of data would each place store?

How does a hacker differ from a cracker?

Name and briefly describe two types of malware?

What is the name of the institution that keeps track of network security holes?

What is software piracy? Briefly describe. What countries are the biggest software pirates?

Who commits the most cybercrime? Why is most cybercrime unreported?

What consumes the most bandwidth on the Internet?

How does a worm work? How does a trojan horse work?

Last Updated: 12/15/04