CSC 101 Introduction to Computers

Spring 2005

Final Exam

December 21/22, 2004

Connecticut Community Colleges Gateway Community College Student Info System Contact Instructor

Course Home Page


Assignments - Tuesday Class

Assignments - Mon-Wed Class

Lecture Overviews

Compare and contrast raster graphics and vector graphics?

What does the TCP part of TCP/IP stand for? How does TCP work.

What was the name of the network which evolved into the Internet? What was this network's purpose?

What is a protocol?

What is a podcast?

What is a blog?

What is a FAQ and where would you find one?

What is an IP address, give an example of what an IP address might look like?

Compare and contrast a mailing list and a newsgroup.

What is a packet and what protocol is used to route one?

Who governs the Internet?

What is a file? Describe two types of files and the extension used to denote each type of file.

What is the difference between narrowband and broadband?

What is a domain name? How is a domain name related to an IP number?

What is an intranet? What technology would an intranet use?

How is an extranet similar to an intranet? How are they different?

What is a VPN and how does a VPN work?

What does a server computer do? What is a computer that connects to a server called?

What hardware is needed to connect two computers over a phone line? What is needed to connect a computer to a LAN?

Name and briefly describe two types of modems.

What is "twisted pair" and what is it used for?

What is the limitation of microwave signals and what is used to overcome this limitation?

How many satellites are needed to create a communications network? Why do you need that number?

What is Wi-Fi and how does it work?

What is the purpose of Bluetooth technology?

What is a network topology? Name and briefly describe two topologies.

Name and briefly describe two of the three types of servers one might find on a LAN?

What do the following stand for: LAN, MAN, WAN. Briefly describe each.

What is a front-end application ? What is a back-end application?

Name four places that may store personal data. What kind of data would each place store?

How does a hacker differ from a cracker?

Name and briefly describe two types of malware?

What is the name of the institution that keeps track of network security holes?

What is software piracy? Briefly describe. What countries are the biggest software pirates?

Who commits the most cybercrime? Why is most cybercrime unreported?

What consumes the most bandwidth on the Internet?

How does a worm work? How does a trojan horse work?

Last Updated: 5/3/05