Your browser does not support JavaScript. You will need to view non-JavaScript portions of this page.

CGS 1555: Spring Term 2005 On-Line Quizzes

Test Timer

In order to forward you YOUR test results please enter YOUR name & email address below:

Enter First Name followed by a space then your Last Name here:



Enter E-mail Address here:



Tutorial Nine: Advanced Web Topics

Chapter 9 Quiz Masters:

Scott Hammack ( DOBBIE1@prodigy.net) [Text Input]

John Taylor (jtaylor@hccfl.edu) [Consultant]


Multiple Choice [One Answer Only]


Question 1

__________ are enhancements that allow your browser to do things it was not originally designed to do.

a) Plug-ins
b) Helper applications
c) Helper apps
d) All of the above


Question 2

__________ players deliver content (e.g.,audio clips, on-screen movies) to an end user.

a) Content-development
b) Browser extension
c) VRML
d) SSL


Question 3

RealAudio offers a free plug-in named __________, which plays streaming audio files over the Internet.

a) RealPlayer
b) QuickTime
c) Live Audio
d) All of the above


Question 4

When you don't have the required plug-ins to play or listen to the current page's content,__________.

a) the computer locks up
b) nothing happens
c) it loads a similar web page
d) none of the above


Question 5

__________, which makes video, sound, music, 3-D, and and virtual reality come alive on both Macintosh and PC's was one of the first movie players developed.

a) ClearFusion
b) QuickTime
c) VDOLive
d) None of the above


Question 6

VRML is an acronym for__________.

a) Visual Reality Modeling Language
b) Vocal Reality Modeling Language
c) Virtual Reality Modeling Laguage
d) None of the above


Question 7

__________ is an Internet programming language which creates three-dimensional environments that can mimic known worlds or define fictional ones.

a) VRML
b) Cosmo Player
c) Beatnik
d) None of the above


Question 8

Acrobat Reader will open documents with__________extensions.

a) .ar
b) .acr
c) .pdf
d) .abr


Question 9

Macromedia's Shockwave is a browser plug_in that provides

a) animated interfaces.
b) interactive advertisements.
c) streaming CD-quality audio.
d) All of the above


Question 10

The QuickTime movie format works on__________systems.

a) Windows
b) Macintosh
c) UNIX
d) all of the above


Question 11

Which of the following are uses for VRML sites?

a) games using three dimensional worlds
b) universities offering a virtual campus tour
c) automobile manufactures providing a virtual driving experience
d) all of the above


Question 12

any act or object that threatens computing assets is known as a

a) menace
b) threat
c) rogue
d) virus


Question 13

protection of assets using non-physical protections is called

a) physical security
b) computer security
c) logical security
d) all of the above


Question 14

__________is the general name for a procedure, either physical or logical, that recognizes, or eliminates a threat.

a) counter measure
b) anti-terrorist tacket
c) security measure
d) threat blocker


Question 15

A{n}__________ program moniters and analyzes network traffic

a) authentication
b) network manager
c) crossing guard
d) sniffer


Question 16

cookies normally store information about your interests and your

a) click-stream
b) log in
c) password
d) credit card information


Question 17

the goal of a{n}__________ attack is to disrupt normal computer processing or to disable prossing entirely.

a) integrity
b) secrecy
c) delay/denial
d) privacy


Question 18

an organization named__________ has teams around the world to recognize and respond to computer attacks.

a) CERT
b) SSL
c) NSF
d) W3C


Question 19

a__________ claims to be a legitimate program that accomplishes some task when, infact, it does harm.

a) trojan horse
b) virus
c) worm
d) cookie


Question 20

a hacker might use__________ to attack computers and the programs they run.

a) trojan horses
b) PCs
c) MACs
d) none of the above


Question 21

an intruder who successfully guesses your user name and password is__________ as you.

a) masquerading
b) dissembling
c) identifying
d) authenticating


Question 22

most systems store passwords in a special,__________ form in order to make them unreadable by hackers

a) digital
b) incrypted
c) autenticated
d) scanned


Question 23

a digital certificate contains

a) the certificate holder's name,address,and e-mail address
b) a special key that unlocks the digital certificate
c) a certificate's expiration date
d) all of the above


Question 24

the first and largest certifying authority is

a) Microsoft,Inc
b) Internet Explorer
c) Verisigen,Inc
d) BBB


Question 25

encrypted information is called__________ text

a) symmetric
b) asymmetric
c) cipher
d) plain


Question 26

unencrypted information is called__________ text

a) symmetric
b) plain
c) cipher
d) asymmetric


Question 27

__________ is a type of encryption used today.

a) symmetric
b) asymmetric
c) ciphered
d) both A and B


Question 28

SSL uses__________ to insure privacy

a) symmetric encryption
b) asymmetric encryption
c) keys
d) all of the above


Question 29

keys that are 128 bits long are called__________ keys.

a) symmetric
b) strong
c) SSL
d) encrypted


Question 30

a destructive Java__________, which is a small program written in the Java programming language, could consume all your computer's resources.

a) SET
b) cookie
c) applet
d) activeX control




True/False Questions


Question 31

When the web was being developed, Web browsers displayed only text and graphics.

a) The statement above is TRUE.
b) The statement above is FALSE.



Question 32

The majority of plug-ins are free.

a) The statement above is TRUE.
b) The statement above is FALSE.



Question 33

When you install a Web browser, many popular plug-ins are usually installed with it.

a) The statement above is TRUE.
b) The statement above is FALSE.



Question 34

Streaming can reduce the time required to play a file from several minutes to several seconds.

a) The statement above is TRUE.
b) The statement above is FALSE.



Question 35

Each time you start your browser, you must tell the browser which plug-ins you have installed.

a) The statement above is TRUE.
b) The statement above is FALSE.



Question 36

Playing movies delivered on a modem connection is always a fast process.

a) The statement above is TRUE.
b) The statement above is FALSE.



Question 37

The Quick Time proprietary format is computer-format neutral.

a) The statement above is TRUE.
b) The statement above is FALSE.



Question 38

Any act that threatens company assets is known as a threat.

a) The statement above is TRUE.
b) The statement above is FALSE.



Question 39

All viruses are trojan horses because they hide within legitimate programs.

a) The statement above is TRUE.
b) The statement above is FALSE.



Question 40

Shorter keys provide significantly stronger protection than longer keys.

a) The statement above is TRUE.
b) The statement above is FALSE.




Fill-in-the-Blank


Fill in the Blank with the word(s) that best fits the definition:

(hint: use vocabulary from the checkboxes below)

Question 41. (two words) extensions let your Web browser play sounds.



Question 42. (two words)extensions deliver movies to the internet.



Question 43. VRML stands for (four words).



Question 44. is the plug-in of choice to play stored digital media.



Question 45. security is the protection of assets using non-physical protection.



Question 46. Any act or object that threatens computer assets is known as a



Question 47. A program monitors and analyzes network traffic.



Question 48. PGP stands for (three words)



Question 49. CERT stands for (four words)



Question 50. To keep Web sites form recording and processing your click stream, you should disablein your web browser.






I have


Please add a comment below



The 'Muddy Water' Issues that I need help on are as follows:





I need class review on the following vocabulary words from this chapter:

plug-ins browser extentions Multimedia Sound Players Video Players

Virtual Reality Modeling Language-VRML buffered play decryption Secure Sockets Layer-SSL Java applet

ActiveX components Shockwave cookie computer emergency response team Pretty Good Privacy-PGP


sniffer threat session keys algorithm masquerading



When you have completed this quiz, press the ALL DONE-CHECK TEST button below to check the test! Then you may go back and change the incorrect answers before you submit the test. You may check the answers as many times as you need until you achieve a perfect grade. Sometimes the pop-up box does not appear when you click on the button after checking the test the first time. If this happens, minimize the test and the answer box will be behind the browser. close the box and maximize the test to continue checking the test and finally submitting it.



When you have finished checking the test, press the SUBMIT button to send answers to your instructor


Back to CGS 1555 Course Menu Page



Users whose browser does not support JavaScript, when you have completed this quiz click the submit button below to send answers to your instructor