COM155 F2019 Sheet3
COM155 F2019 Sheet3
Page 1 of 3
MSA University, Faculty Of Engineering, GSE Department
Fall 2019–COM 155–Introduction of Information Technology
_________________________________________________________________________________
r. ....(22).... is a software utility, which scans the hard disk for viruses and tries to remove them
if found.
s. The process of altering messages to hide their meaning from adversaries who might intercept
them is called ....(23)....
2. Select the best choice in the following statements:
a. The transmission mode which allows both communicating devices to transmit and receive
data simultaneously is (Simplex - Full duplex - Half duplex - None of these).
b. (Optical fibers - Coaxial cable – Microwave - Twisted Pair) does not come under the
guided media.
c. LAN stands for (Long area network - Local area network - Local audible network -
Limited area network).
d. The network device that connects two or more networks together and whose aim is to trace
the best route for the information to travel is (Hub – Gateway – Switch – Router).
e. (Fiber optic cable - Coaxial cable - UTP cable - Twisted-pair cable) supports the highest
bandwidth and faster transmission rate.
f. A computer network, which provides long-distance transmission of data, images, and
sound over a large distance, is (MAN – WAN – LAN – CAN).
g. URL is (a computer software program - a type of Web server - the address of a document
or “page” on the WWW - an acronym for unlimited resources for learning).
h. The URL http://www.uni.edu is associated with (an educational institution - a military
establishment - a commercial organization - None of these).
i. A home page is (a Web page created by an individual home user - the Web page you like
to visit the most - the Web page that identifies a Web site for specific corporation - a Web
page you eventually reach by clicking a series of hyperlinks).
j. Cryptography relies on (encryption Algorithm – decryption algorithm – key – all of these).
Page 2 of 3
MSA University, Faculty Of Engineering, GSE Department
Fall 2019–COM 155–Introduction of Information Technology
_________________________________________________________________________________
3. State True or False and correct the false statement:
a. Twisted-pair cable is an example of unguided media for data communication.
b. Hub is also called as protocol converter.
c. In full-duplex transmission, both parties can communicate at the same time LANs operate
within a wide area network.
d. All URLs are unique.
e. .EDU is a valid domain type.
f. Fraud can be committed by both insiders and outsiders of an organization.
g. A person who breaks into the computer security without authorization for ulterior purposes
is called white-hat hacker.
h. Worm is a self-replicating program, which is self-contained and does not require a host
program.
i. Cryptography comprises conversion of plain text into cipher text and vice versa.
j. Digital signature is created and verified by means of cryptography.
Descriptive Questions
4. Define the following network devices: Router, Hub and Gateway
5. Explain a typical structure of a URL.
6. Write short notes on: Worm - Trojan horse - Logic bomb.
7. State the aspects of computer security.
8. Draw a flowchart for Ceaser algorithm to encrypt a message “Meet me at the party” the
private key = 3, write down the cipher text.
9. Give a definition to “Firewall”
Page 3 of 3