=========================preview======================
(comp101)[2007](sum)midterm1~masze^_10103.pdf
Back to COMP101 Login to download
======================================================
For each of the questions 1 to 18, please use a pencil to fill in the circle on the answer sheet that represents the best answer (4 points for each question).
1.When a user clicks on a button in Outlook Express, what is the detailed route by which the mouse click is delivered to the computer?
A.Mouse -> Mouse driver -> Outlook Express
B.Mouse -> Windows -> Outlook Express
C.Mouse -> Mouse driver -> Windows -> Outlook Express
D.Mouse -> Windows -> Mouse driver -> Outlook Express
2.To reduce the chance of becoming a victim of a virus attack, one should:
I.Never open attachments sent from strangers
II.Never open unexpected attachments sent from friends
III.Update anti-virus software frequently
IV.Use only Webmail as mail tool
A.I and II only
B.III and IV only
C.I, II and III only
D.I, II and IV only
3.The main functions of the TCP protocol are:
I.To find out where the received IP packets should go next
II.To make sure all IP packets reach their destinations
III.To reassemble the IP packets received in the same order that they were sent
IV.To seek re-transmission of IP packets lost
A.I and II only
B.I and III only
C.I, II and III only
D.II, III and IV only
4.Most of the time there will be several programs running at the same time on your computer, say, Microsoft Excel and Internet Explorer running together. How is this possible?
A.The CPU is only running the application currently at the active window.
B.The CPU is so fast that the user will not notice that these applications are completed one after another.
C.The CPU knows which application the user is watching and runs that to keep the user happy.
D.The operating system assigns a slice of time for the CPU to run the applications in turns.
5.A byte can be used to represent
A.8 different characters or symbols.
B.64 different characters or symbols.
C.128 different characters or symbols.
D.256 different characters or symbols.
6.To find the IP address of your own computer, you may
A.run ipconfig in the cmd window.
B.run nslookup in the cmd window.
C.use Google search to find my IP address.
D.use Google search with the name of your computer.
7.In where should the firewall be located in order to best protect my computer?
A.My computer.
B.The cable connecting my computer and the Intranet.
C.The Internet Service Provider.
D.The router connecting the Intranet and the Internet.
8.The operating system is an interface between
A.the browser and the Web server.
B.the computer and another computer.
C.the CPU and peripheral devices.
D.the user and the computer.
9.Which part of a computer is used for primary data storag