Cis106

In: Computers and Technology

Submitted By bajangrl
Words 1854
Pages 8
Quiz 2 conisists of multiple choice questions from chapters 8-10. You will have 1 hour to complete it. Good Luck!
Question 1
2 out of 2 points
Correct
Which of the following is a mechanism for accomplishing confidentiality, integrity, authentication, and nonrepudiation?
Answer
Selected Answer:
Cryptography
Correct Answer: Cryptography
Question 2
2 out of 2 points
Correct
Which of the following is an asymmetric encryption algorithm?
Answer
Selected Answer:
RSA
Correct Answer: RSA
Question 3
2 out of 2 points
Correct
Identify a security objective that stops authorization for access to data.
Answer
Selected Answer:
Revocation
Correct Answer: Revocation
Question 4
2 out of 2 points
Correct
What type of cipher replaces bits, characters, or blocks of information with other bits, characters, or blocks?
Answer
Selected Answer:
Substitution
Correct Answer: Substitution

Question 5
2 out of 2 points
Correct
In which type of cipher attack can the cryptanalyst encrypt any information and observe the output, which offers the most flexibility and insight into the encryption mechanism.
Answer
Selected Answer:
Chosen-plaintext attack
Correct Answer: Chosen-plaintext attack
Question 6
2 out of 2 points
Correct
In which OSI reference model layer do you find e-mail software and other programs that end users interact with?
Answer
Selected Answer:
Application
Correct Answer: Application
Question 7
2 out of 2 points
Correct
In which type of cipher attack does the cryptanalyst have access only to a segment of encrypted data, and has no choice as to what that data may be. An example is the cryptogram in some daily newspapers.
Answer
Selected Answer:
Chosen-plaintext attack
Correct Answer: Chosen-plaintext attack
Question 6
2 out of 2 points
Correct
In which OSI reference model layer do you…...

Similar Documents

Ethics and Local Goverance

...Ethics and Local Government Ronald McMillan CIS106 Farzan Soroushi April 28, 2013 Ethics is defined as the discipline dealing with what is good and bad and with moral duty and obligation. Prior to 2006 the London Borough of Brent stored their citizen records across 12 different databases, one for each of the council’s division. Every division had its own separate copy of resident database that was either incorrect or incomplete. There are many ethical issues associated with the consolidation of citizen’s records in the London Borough of Brent but there are two issues that I think stand out the most. Those two ethical issues are the accuracy of the information that is being stored and privacy of the individual’s records. Accuracy, or the lack of, played a huge role in the consolidation of citizen records. The data of Brent’s residents was either inaccurate or incomplete and scattered across the 12 databases. “This situation meant that while one department might know that a resident was blind, and therefore required special services, the others might still treat them like any other” (Hudson, H. 2011, November, 03). There was a lot of confusion to both the employees and the residents of Brent. The London Borough of Brent’s customer information was scattered across numerous standalone databases that was not able to share the data across the enterprise. The information in these databases was filled with multiple errors and incomplete information. The Brent......

Words: 311 - Pages: 2

Cis106

...CIS106: Introduction to Operating Systems Study Guide 1 (Unit 1, Test 1) NAME: DATE: Part One: Windows OS Basics (1) VMWare: This keyboard shortcut sends a CTRL-ALT-DEL signal to the VMware Guest (it mimics CTRL-ALT-DEL in our virtual software): CTRL-ALT-INS (2) VMWare: This keyboard shortcut lets you switch from windowed mode to full-screen mode and back again in our virtual software: CTRl-ALT-ENTER (3) Unlike CTRL-ALT-DEL, this keyboard shortcut brings up Task Manager in XP, 2000, Vista and 7 no matter how the system is configured: CTRL-SHIFT-ESC (4) What is the default appearance of the mouse pointer when it is waiting for an action to complete in Windows XP? (I-beam, hour-glass, two-headed arrow, or arrow) (5) What is the default appearance of the mouse pointer when it is not on an active area of the window? (I-beam, hour-glass, two-headed arrow, or arrow) (6) What is the default appearance of the mouse pointer when you wish to resize a window on the desktop? (I-beam, hour-glass, two-headed arrow, or arrow) (7) If you press certain keys (example, the Alt key), the Windows OS will designate hot keys (accelerator keys) by changing them in this way: (boldface, italics, underline, or blinking) (8) Provide two other names for the Status Area (where you see the clock, date, and background programs): System Tray___ , _Notification Area_____ (9) Windows 7 allows you to “pin” applications to the......

Words: 929 - Pages: 4

Hw 1 Cis106

...Unit 1 Homework Assignment 1. Explain the difference between operating system software, application software, and utility software. Operating system is the software that bridges the gap between the system and the user. Utility software performs actions essential for protecting, guiding, securing, and storing information or data appropriately Application software manages specific actions 2. For the following software programs, determine whether they are examples of • operating system software, • application software, or • utility software Norton Antivirus utility Microsoft Windows XP Operating system MAC OS X 10.6 Operating system Microsoft Word application An email program application A hard drive backup program utility An Internet browser application Microsoft Windows 98 Operating System RealPlayer application Microsoft Windows 7 Operating System 3. Explain the concept of virtual memory and why it is needed. Sets aside a portion of the Hard drive and uses it to add to the RAM making programs run faster and better. Prevents overworking the RAM and causing system crashes and slowdowns. 4. What would be a possible cause of disk “thrashing”? Overworking the hard drive or Ram by trying to run too many programs at once. 5. What is considered the first usable version of Windows? 3.0 6. What was the first business version of Windows? NT3.1 7. Which version of Windows joined......

Words: 324 - Pages: 2

Homework Cis106

...Shawn Mayer CIS106 17OCT2013 Unit 2 Homework 1.  What is the difference between a directory and a file? A file is any computer document folder, a directory is a collection of organized computer document folders, similar to a filing cabinet.  2.  What is the difference between an ASCII file and a binary file? ASCII file is text, while binary is a combination of ASC II characters and binary code.  3.  Explain what a root directory is. A root directory is the home directory of a computer, comprised of the most basic files required to run the computer/software/hardware.  4.  What are the default file extensions for the following types of files?  ASCII text file .txt Microsoft Word file .docx Microsoft Excel file .xls Microsoft PowerPoint file .ppt Compressed (zipped) file .zip Web page .html or .htm 5.  What basic type of files have file extensions of .bmp, .gif, or .jpg ? images  6.  If you create a new file with the long file name Budget Analysis 2005.html, what would be the short name generated by Windows? Budgetan.htm  7.   A file’s system attribute is set.  Which of the following settings for its folder will allow you to see the file?        a.   Show Hidden......

Words: 268 - Pages: 2

Von Neumann Architecture

...Von Neumann architecture CIS106 11/12/13 Von Neumann architecture marks the beginning modern information system processing. To fully understand why it is so important, we must first consider the purpose of computer programs. We can then fathom the magnitude of this architecture. The von Neumann architecture allows instructions and data to be mixed and stored in the same memory module and the contents of this memory are addressed by location only. This all takes place in a sequential order. The Von Neumann machine had five basic parts comprised of memory, ALU, the program control unit, input equipment & output equipment. The programs uses a language that to the naked eye can in most cases resemble spoken language. Upper-level languages such as C and Java are designed with this in mind. However, computers understand natural language without significant human effort. The physical hardware cannot truly understand language, but instead processes electrical signals. Computer programs are a list of and data, and are represented as binary strings. We can produce a list of high level requirements that a Central Processing Unit (CPU) could execute. This then leads us to a list of functional units that implement the high-level functionality. Neumann m/c are called control flow computer because instruction are executed sequentially as controlled by a program counter. To increase the speed, parallel processing of computer have been developed in which serial CPU’s are......

Words: 2408 - Pages: 10

Intro to Information Technology

...Week 4 Assignment 1: Computer Architecture Tony D. Everett Professor Jennifer Merritt CIS106 Intro to Information Technology July 28, 2013 Introduction The use of Information Technology is well recognized. Information Technology has become a must for survival of all business housing with the growing IT trends. The computer is the main component of any Information Technology system. Today, computer technology has filled every scope of existence of modern man. From airline reservations to auto repair diagnosis, from government services databases to manufacturing and production systems that are used by the likes of Pepsi, Kellogg’s and Kraft Foods-everywhere we witness the elegance, complexity and effectiveness possible only with the help of computers. These systems operate using the Von Neumann Architecture. The Von Neumann Architecture and Importance The von Neumann architecture is a design model for a stored-program digital computer that uses a processing unit and a single separate storage structure to hold both instructions and data. The instructions are executed sequentially which is a slow process. One shared memory for instructions and data with one data bus and one address bus between processor and memory. Commands and data have to be fetched in sequential order (known as the Von Neumann Bottleneck), limiting the operation bandwidth. Its design is simpler than that of the Harvard architecture. It is mostly used to interface to external memory. Neumann......

Words: 1237 - Pages: 5

Scavenger Hunt Questions and Answers

...Requirements Course ID BUS122 CIS102 CIS121 CIS131 CIS150 CIS282 CIS420 CIS471 CAP480 COM110 ENG110 ENG120 HUM205 MTH131 MTH200 PHY120 Course Name Principles of Business and Management Fundamentals of Customer Service Logic and Design Database I Networking I Web Interface Design System Analysis and Design IT Project Management Arts and Sciences Capstone Principles of Speech English Composition Advanced Composition Culture and Diversity or a Humanities/Fine Art College Algebra Pre-calculus (may also use MTH140/Statistics) Physics Credits 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 Core Curriculum 24 semester credit hours Arts and Sciences 31 semester credit hours Page 22 2012 Catalog ECPI University School of Technology PHY120L PSY105 PSY220 CIS106 COR090 FOR112 IST120 Course ID CIS126 CIS203 CIS206 CIS214 CIS215 CIS218 CIS250 CIS266 Various CIS151 CIS202 CIS212 CIS245 CIS403 HCA101 HCA112 IST286 Various CIS151 CIS202 CIS204 CIS206 CIS212 CIS245 CIS403 CIS410 Various CIS126 CIS201 CIS203 CIS206 CIS214 CIS215 CIS250 MTH200 Various Physics LAB Introduction to Psychology Positive Psychology Introduction to Operating Systems Career Orientation College Orientation Computer Applications Course Name Programming I Code Design and Debugging UNIX Administration Object-oriented Programming Using C# Programming II Object-Oriented Programming Using Java Database Scripting I Intermediate Database Electives Networking II Introduction to Routing and Switching Network Security Concepts......

Words: 130938 - Pages: 524

Binaryhexworksheet

...CIS106 (Introduction to Operating Systems) BINARY AND HEXADECIMAL: Numbering Systems Binary has TWO symbols (0-1); decimal has TEN (0-9), and hexadecimal has SIXTEEN (0-9, A-F). Write binary out in sets of four digits each time. Each binary digit is called a “bit”. Eight bits make up a Byte, and four bits are a nibble. Each hex digit represents one nibble. Use Calc.exe to check your work; click on View – Scientific in XP, or View – Programmer in Windows 7. Part A: Counting in Binary, Decimal, and Hexadecimal. Fill in the symbols and digits in Table 1. Binary Decimal Hexadecimal Binary Decimal Hexadecimal 0000 0 0 8 1 9 2 1010 10 A 3 11 4 12 5 13 6 14 0111 7 7 15 Part B: Binary to Decimal and Hexadecimal. Complete the chart. Add h to each hex number. Fill in the power of 2’s as well. *2^ means “2 to the power of”; for example, 2^5 = 2 * 2 * 2 * 2 * 2 = 64 No. Binary (1 Byte format) 128 64 32 16 8 4 2 1 Decimal Hexa-decimal *2^ 2^ 25 2^ 2^ 22 2^ 2^ 1 11001100 1 1 0 0 1 1 0 0 128+64+8+4=204 CCh 2 10101010 3 11100011 4 10110011 5 00110101 6 00011101 7 01000110 8 10110001 9 11000001 10 11110000 Part C: Decimal to Binary: Complete the following table to practice converting a number from decimal notation to binary format. Mark each hexadecimal number with h. No. Decimal 128 64 32 16 8 4 2 1 Add them up to......

Words: 337 - Pages: 2

Form

...chemistry. Transfer Credit in Arts and Sciences Students who have completed Arts and Sciences (General Education) courses at other postsecondary education institutions may have their courses evaluated for transfer credit. ECPI requires specific arts and sciences courses to support program and University core outcomes, and transfer credits are evaluated with those requirements in mind. Therefore, students may not be able to transfer all their previously earned credits in Arts and Sciences to ECPI University. Self-Integration courses All students are required to take FOR110 (Essentials for Success) or an equivalent orientation course, which helps students learn to use the learning resources available to them at ECPI. They may also take CIS106 (Introduction to Operating Systems) and CIS115 (Computer Applications) so that they are comfortable with using the technologies available to them at school and at work. Near the end of their academic careers, they take a Career Orientation course, where they learn a variety of professional skills, including how to complete an interview process successfully and how to prepare effective resumes for their career searches. www.ecpi.edu Page 114 ECPI UNIVERSITY Academic Policies ACADEMIC POLICIES The following academic policies apply to all students attending ECPI University. Additional policies for students pursing a graduate degree are included in this Catalog under the Graduate Program Policies. Students pursing......

Words: 149595 - Pages: 599

Cis106 Week 5 Midterm Exam

...cis106 Week 5 Midterm Exam Click Link Below To Buy: http://hwcampus.com/shop/3960/ Date 2016 Score 100 out of 100 points Question 1 Of the following, which operating system is considered to be open source? Question 2 You check the contents of your computer toolkit before performing internal upgrades on a desktop computer. Which of the following tools in your toolkit should you use to prevent ESD damage to internal components? Question 3 The CompTIA six-step troubleshooting process includes a step in which you “Verify full system functionality and, if applicable, implement preventative measures.” Which number is this step? Question 4 Of the following, which would be considered system utilities? (Choose all that apply.) Question 5 Which of the following can prevent the discharge of ESD? (Choose all that apply.) Question 6 A Narrow SCSI host adapter supports an 8-bit data channel and uses a(an) ______-pin connector? Question 7 Which of the following is not a common integrated I/O port? Question 8 A specialized expansion slot used to convert audio between analog and digital signal format is classed as a(n) ____________. Question 9 Of the ATX motherboards, which one has a maximum number of seven expansion slots and is used for a full tower? Question 10 A ________ determines what CPUs a system can use, what integrated ports the system can provide without use of third-party products, and the number and types of...

Words: 560 - Pages: 3

A Complete Home Network

... A Complete Home Network Jorge J. Garcia Strayer University at Palm Beach Gardens, FL CIS106 Dr. Otto June 12, 2015 Abstract It is a daunting task to create a working business network from the ground up when all you are allotted in the budget is $1000 dollars. Every item purchased and configured will need to be the cheapest available in the market, some will even need to be acquired for free in order to meet the requirements. Needless to say labor charges and service or maintenance contracts, aside from ISP monthly charges, will not be part of the equation. As far as my 25+ years of experience goes, there would only be two reasons to accommodate such a ridiculous request: Either my younger brother is begging me to address this because he has no other choice and time is of the essence due to an opportunity which could not be passed up or I am being tasked to be overly creative for a hundred point project due in a college class. Let’s get creative then. A Complete Home Network If we have $1000 dollars to create this project then the first thing to look at is the computers involved as they will be sucking up the most from this budget. There is no explanation for what this office with a minimal budget will do therefore there is no idea as to what type of computing power or software requirements will be needed. In my book minimum budget means minimum requirements. There is no way to make all this work with desktop PCs. The market has made a 180 degree shift from laptops being......

Words: 1427 - Pages: 6

Cis106 Week 5 Midterm Exam

...cis106 Week 5 Midterm Exam Click Link Below To Buy: http://hwcampus.com/shop/3960/ Date 2016 Score 100 out of 100 points Question 1 Of the following, which operating system is considered to be open source? Question 2 You check the contents of your computer toolkit before performing internal upgrades on a desktop computer. Which of the following tools in your toolkit should you use to prevent ESD damage to internal components? Question 3 The CompTIA six-step troubleshooting process includes a step in which you “Verify full system functionality and, if applicable, implement preventative measures.” Which number is this step? Question 4 Of the following, which would be considered system utilities? (Choose all that apply.) Question 5 Which of the following can prevent the discharge of ESD? (Choose all that apply.) Question 6 A Narrow SCSI host adapter supports an 8-bit data channel and uses a(an) ______-pin connector? Question 7 Which of the following is not a common integrated I/O port? Question 8 A specialized expansion slot used to convert audio between analog and digital signal format is classed as a(n) ____________. Question 9 Of the ATX motherboards, which one has a maximum number of seven expansion slots and is used for a full tower? Question 10 A ________ determines what CPUs a system can use, what integrated ports the system can provide without use of third-party products, and the number and types of...

Words: 560 - Pages: 3

Assigment 2 a Complete Home Network

...Assignment 2: A Complete Home Network Jonathan Scholl Strayer University CIS106 Professor Jamshid Haghighi June 7, 2016 A Complete Home Network Introduction: I believe this is way more than enough money for an entire home network, but it also comes down to what the needs of everyone in the household are. If you have gamers or those with workstations, then you’ll definitely need to take into consideration that you’ll need better than average hardware. But some family members may only need a simple notebook, tablet, or even their smart phone to connect to the internet. Most people enjoy streaming applications such as Hulu, Netflix, and Crunchyroll. Before you start, you need to figure out what the network will be used for and tailor it to the needs of everyone who uses it. For this example, I’m going to use my own family’s network. It’s a simple network that will most likely be sufficient for the average family. Starting out, you need to research the internet service providers (ISPs) in your area. These can range from large companies to small local companies. If you do a lot of video streaming and gaming, then you’ll want a fairly good connection speed. I’d recommend going with at least 20Mbps download and 5Mbps upload. The company we use is a local company called Forsyth CableNet. Hardware: You’re ISP can provide you with rental modems. I believe this to be a great option because modems can be costly to replace if they’re damaged. It usually means adding a...

Words: 1436 - Pages: 6

Lolnohkers

...Assignment 1: Computer Memory Hacking Albert Pigg| |Mr. De Monte’ Thomason| |CIS106| |05/09/16| Assignment 1: Computer Memory Hacking Hacking of Memory When it comes to the term “hacking” essentially the “hackers” are usually categorized in two categories, “white-hat” and “black-hat.” White-hat refers to the hacker affiliating themselves with light and justice. Black-hat refers to the hacker affiliating themselves with the darker side of the net and with malicious intent. What is “hacking”? Essentially it is accessing, altering, or such manipulation of data while circumventing preventative measures. There is however numerous preventative measures corporations, governments and other private institutions take to secure their data. (Harvey, 1985) Common Tools of a Hacker “To catch a thief, it takes a thief.” We’ve all heard it sometime in life likely. To first take the steps of understanding how to prevent hacking, we must familiarize ourselves with some of their tools. DDOS and DOS Attacks Denial of service attacks are a frequent occurrence on the internet. Often referred to as “DOS attacks”. DOS attacks are initiated by hackers sending packets, or bits of data, very repetitively to the victim’s computer until it is unable to communicate any other packets. (PBS, 2001) One such attack was executed against some big United States companies. On February 8th 2000, “MafiaBoy” or Michael Calce attacked sites such as Yahoo!, CNN, eBay, and E-Trade, with repeated DOS......

Words: 913 - Pages: 4

Cis106 Week 5 Midterm Exam

...cis106 Week 5 Midterm Exam Click Link Below To Buy: http://hwcampus.com/shop/3960/ Date 2016 Score 100 out of 100 points Question 1 Of the following, which operating system is considered to be open source? Question 2 You check the contents of your computer toolkit before performing internal upgrades on a desktop computer. Which of the following tools in your toolkit should you use to prevent ESD damage to internal components? Question 3 The CompTIA six-step troubleshooting process includes a step in which you “Verify full system functionality and, if applicable, implement preventative measures.” Which number is this step? Question 4 Of the following, which would be considered system utilities? (Choose all that apply.) Question 5 Which of the following can prevent the discharge of ESD? (Choose all that apply.) Question 6 A Narrow SCSI host adapter supports an 8-bit data channel and uses a(an) ______-pin connector? Question 7 Which of the following is not a common integrated I/O port? Question 8 A specialized expansion slot used to convert audio between analog and digital signal format is classed as a(n) ____________. Question 9 Of the ATX motherboards, which one has a maximum number of seven expansion slots and is used for a full tower? Question 10 A ________ determines what CPUs a system can use, what integrated ports the system can provide without use of third-party products, and the number and types of...

Words: 560 - Pages: 3