0% found this document useful (0 votes)
25 views3 pages

COM155 F2019 Sheet3

The document is a worksheet for an Introduction to Information Technology course at MSA University, focusing on data transmission, network devices, and computer security concepts. It includes fill-in-the-blank questions, multiple-choice questions, true/false statements, and descriptive questions related to networking and cybersecurity topics. The content aims to assess students' understanding of key IT concepts and terminology.

Uploaded by

omarrabh54
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views3 pages

COM155 F2019 Sheet3

The document is a worksheet for an Introduction to Information Technology course at MSA University, focusing on data transmission, network devices, and computer security concepts. It includes fill-in-the-blank questions, multiple-choice questions, true/false statements, and descriptive questions related to networking and cybersecurity topics. The content aims to assess students' understanding of key IT concepts and terminology.

Uploaded by

omarrabh54
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

MSA University, Faculty Of Engineering, GSE Department

Fall 2019–COM 155–Introduction of Information Technology


_________________________________________________________________________________
Sheet # 3
1. Fill in the blanks
a. .......(1)........... is the exchange of data between two devices using some form of wired or
wireless transmission medium.
b. The three types of data transmission modes are.......(2).......,….(3)…… and ........(4)..........
c. The maximum volume of data that can be transferred over any communication medium at a
given point of time is known as......(5)............
d. A network spread around October city and its suburbs can be termed as .......(6)......... network.
e. …….(7)…..refers to a set of rules that coordinate the exchange of information.
f. ……(8)…….is the physical path that communicates the message from the sender to receiver.
g. The device, which joins networks operating on different protocols together, is ......(9).........
h. Each Web page has a unique address, called ........(10)....... that identifies its location on the
Internet.
i. The .......(11)........ is a collection of linked documents or pages, stored on millions of
computers and distributed across the world.
j. A program that enables users to read/view Web pages and jump from one Web page to
another is known as ......(12).........
k. AltaVista, Google, and HotBot are the examples of .......(13)...........
l. Computer security involves the measures and controls that ensure ....(14)...., .....(15)....., and
...(16)...... of the information processed and stored by a computer.
m. A person with the intention of finding some weak points in the security of websites and other
computer systems in order to gain unauthorized access is termed as ...(17).....
n. ....(18)..... is a small segment of code, which replicates by attaching copies of itself to existing
executables files.
o. ....(19)..... are the programs constructed to infiltrate on the legitimate data processing
programs and alter or destroy the data.
p. A destructive program, which enters into a computer through an e-mail or free programs that
have been downloaded from the Internet, is called ...(20).......
q. A ....(21)..... is a program or portion of a program, which lies dormant until a specific piece
of program logic is activated.

Page 1 of 3
MSA University, Faculty Of Engineering, GSE Department
Fall 2019–COM 155–Introduction of Information Technology
_________________________________________________________________________________
r. ....(22).... is a software utility, which scans the hard disk for viruses and tries to remove them
if found.
s. The process of altering messages to hide their meaning from adversaries who might intercept
them is called ....(23)....
2. Select the best choice in the following statements:
a. The transmission mode which allows both communicating devices to transmit and receive
data simultaneously is (Simplex - Full duplex - Half duplex - None of these).
b. (Optical fibers - Coaxial cable – Microwave - Twisted Pair) does not come under the
guided media.
c. LAN stands for (Long area network - Local area network - Local audible network -
Limited area network).
d. The network device that connects two or more networks together and whose aim is to trace
the best route for the information to travel is (Hub – Gateway – Switch – Router).
e. (Fiber optic cable - Coaxial cable - UTP cable - Twisted-pair cable) supports the highest
bandwidth and faster transmission rate.
f. A computer network, which provides long-distance transmission of data, images, and
sound over a large distance, is (MAN – WAN – LAN – CAN).
g. URL is (a computer software program - a type of Web server - the address of a document
or “page” on the WWW - an acronym for unlimited resources for learning).
h. The URL http://www.uni.edu is associated with (an educational institution - a military
establishment - a commercial organization - None of these).
i. A home page is (a Web page created by an individual home user - the Web page you like
to visit the most - the Web page that identifies a Web site for specific corporation - a Web
page you eventually reach by clicking a series of hyperlinks).
j. Cryptography relies on (encryption Algorithm – decryption algorithm – key – all of these).

Page 2 of 3
MSA University, Faculty Of Engineering, GSE Department
Fall 2019–COM 155–Introduction of Information Technology
_________________________________________________________________________________
3. State True or False and correct the false statement:
a. Twisted-pair cable is an example of unguided media for data communication.
b. Hub is also called as protocol converter.
c. In full-duplex transmission, both parties can communicate at the same time LANs operate
within a wide area network.
d. All URLs are unique.
e. .EDU is a valid domain type.
f. Fraud can be committed by both insiders and outsiders of an organization.
g. A person who breaks into the computer security without authorization for ulterior purposes
is called white-hat hacker.
h. Worm is a self-replicating program, which is self-contained and does not require a host
program.
i. Cryptography comprises conversion of plain text into cipher text and vice versa.
j. Digital signature is created and verified by means of cryptography.

Descriptive Questions
4. Define the following network devices: Router, Hub and Gateway
5. Explain a typical structure of a URL.
6. Write short notes on: Worm - Trojan horse - Logic bomb.
7. State the aspects of computer security.
8. Draw a flowchart for Ceaser algorithm to encrypt a message “Meet me at the party” the
private key = 3, write down the cipher text.
9. Give a definition to “Firewall”

Page 3 of 3

You might also like