This preview shows pages 1–3. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: https://original-oncourse.iu.edu/...nse&testID=17824&classID=2009%2D8%2DIN%2DBUS%2DK201%2D14845&classTitle=[4/11/2010 12:42:11 PM] Final Exam Fall 2009 Points Possible 34 Points Earned 33 Points Missed 1 Points Ungraded Score 97.1% 1. Computer _____ is the discovery, collection, and analysis of evidence found on computers and networks. A. anthropology B. epistemology C. forensics D. reduction Response: C Points: 1 / 1 2. A(n)______ name is the text version of an IP address. A. index B. identifier C. domain D. link Response: C Points: 1 / 1 3. A(n) _____ is a navigation system that consists of one or more earth-based receivers that accept and analyze signals sent by satellites in order to determine the receiver's geographic location. A. MMS B. GPS C. SMS D. TMS Response: B Points: 1 / 1 4. With a (n) _____, users choose which folders and files to include in a backup. A. full backup B. incremental backup C. differential backup D. selective backup Response: D Points: 1 / 1 5. In a Web address, the _______, is a set of rules that defines how pages transfer on the Internet. A. html, which stands for Hypertext markup Language B. www, which stands for World Wide Web C. http, which stands for Hypertext Transfer Protocol D. url, which stands for Uniform Resource Locator Response: C Points: 1 / 1 6. To start up, a computer locates A. application software in storage and loads it into memory B. application software in memory and loads it onto storage C. an operating system in storage and loads it into memory https://original-oncourse.iu.edu/...nse&testID=17824&classID=2009%2D8%2DIN%2DBUS%2DK201%2D14845&classTitle=[4/11/2010 12:42:11 PM] D. an operating system in memory and loads it onto storage Response: C Points: 1 / 1 7. The person overseeing network operations, called the _____, uses the network OS to add and remove users, computers, and other devices to and from a network....
View Full Document
- Fall '09