Download as pdf
Download as pdf
You are on page 1of 5
Ministry of Higher Education gerbe Coedty Dull pled 3yhiy guia — LepolgtGilly oolall dnols Republic of Yemen o Agreed Tuygeadl University of Science and Technolog genta otalat First Semester / Academic Year 1444H/1445H (2022/2023) Course Name: Computer Fundamental (Final Exam) Date of Examination: 13/12/2022 Duration: 120 Mins Total Marks: 40 Marks Student's Nam Academic ID: Part 1: Select the best answer in each of the following multiple-choice questions: [1 Mark Each] 1. What is the name of a piece of software that looks usefill but carries out maliciousactivity on your computer? a. virus b. worm ©. router 4. Trojan 2. What kind of network is set up by a business for its customers, staff, and businesspartners to securely access from outside the office network? a. P2P b. extranet ©. intranet internet 3. How many binary digits are in an IPv6 address? | ai b 64 ©. 128 a i44 4. Whats it called when a hacker tries to capture packets of data from the network? a, spoofing b. phishing ¢. spamming 4. sniffing Republic of Yemen i Reed Lygeott peel CoeSlg StS! pebed! 35139 Ministry of Higher Education i= 21 University of Science and Technolog p LipoloiSuslly oglall deol, 5, memory loses its data when not continuously supplied with electricity. a. Dynamic b. Static ¢. Synchronous 4. Non-volatile 6. Which type of network could be used to connect tow networks or more inside the city? a, personal area network b, local area network c. wide area network 4. metropolitan area network The purpose of a VPN isto be able to a, connect securely to a remote network », upload large files quickly ¢. send and receive email from multiple addresses . protect your PC from viruses 8. What should you do if you receive an email telling you that you have won aboliday trip you did not enter? a. Open the message and claim the holiday. . Open the message to see ifthe holiday is worth claiming c. Contact the sender of the email and tell him he has made a mistake. Delete the mail immediately. ‘What would be the best top-level domain to use for a fund-raising charity? a.com b. org ©. ac d. edu 10. When using a home network, aenables multiple computers to share asingle Internet connection. 2. router b. gateway «©. bridge 4. repeater ) pod! Lypgot! geet Coady Stal gale 3y9 Republic of Yemen Ministry of Higher Education Lip ola ically oolall deols ~) Part 2: Choose True or false of the following questions: [1 Mark Each] 1. Amainframe is more powerful than a supercomputer, C ] 2, A satellite is a data transmitter/receiver in geosynchronous orbit withthe Earth. [ ] 3. MAC addresses are mostly unique but are repeatable depending on thecountry, fee 4. zombie is the name used for a computer that launches DoS attacks othe Internet THe 5, Linux isa platform, [ ] 6, The control unit in the CPU does the actual processing. (ieee | 7. The Ctrl key ona keyboard is an example of positional keys. Teel 8, “http://" indicates thet a web browser connection is secure. Eee] 9. A mechanical device communicates with the computer via a transceiver. [oo] 20.chipset is NOT located on the motherboard, tc 4] Part 3: Answer ALL following essay questions: [1 Mark Each] 1, What kind of attack floods a website or service with thousands of requests for access at once? What is a GUI? 3. What are the four steps in the information processing cycle? 4. What are the five parts of an information system? Tsed! duysgedt ell Cee Sta pales 8yb55 Lapel ills oglall deols Republic of Yemen istry of Higher Education University of Science and Technolog y- 5. Explain what is “information system”? 6. What is the significance of an address starting with https! rather than http://? 7. What type of malware spreads from computer to computer over a network, rather than being attached to a specific executable file? 8, What type of Internet attack has the attacker’ computer assume a false Intemet address in order to gain access to a network? 9. What is it called when an email message seems to be from a legitimate company but is actually from a criminal hoping to get personal information from you? 10. What type of server translates between IP addresses and domain names? 11. What is a Uniform Resource Locator? 12. What type of cable is most common in an Ethemet network? Aptos)! dysgott cette! Sette Slt pled! dyliy University of Science and Technolog wygqynyiye — LapalgiGlly oolall deols cea ~ Republic of Yemen Ministry of Higher Education 13. What device serves as a central gathering point for all the computers in an Ethernet LAN? 14, How many servers are there in a P2P network? 15. What is the protocol stack used on the Intemet and in most networks today? 16. Where thermal printers can be used? 17. What is the term for each tiny individually colored dot in a monitor display? 18. What type of scanner would be used to read a UPC (Universal Product Number) symbol? 19. What kind of computer is a SO-DIMM designed for? 20. How many bits in 15 kilobytes?

You might also like