RattlerRyan All American 8660 Posts user info edit post |
Alright folks, I know this class is easy, and I'm not asking for every answer to the study guide, but there are a few questions that I have googled and looked through the notes/foils for and cannot find anywhere. I appreciate any help. If you are in the library studying hit me up and we can study together.
1. A new way for providing voice telephone service using the same cable that you use to receive your tv channels is: A. cable voice. B. digi-voice. C. VTSC. D. voice over IP. E. TVoice.
2. The major work on letter frequency distributon, in English, was done approximately in what decade? A. 1500 B. 1610 C. 1720 D. 1830 E. 1940
More to come in a little bit. 4/4/2006 9:57:02 PM |
johnny57 All American 624 Posts user info edit post |
1. D 2. Shouldnt be on the test
[Edited on April 4, 2006 at 9:58 PM. Reason : .] 4/4/2006 9:57:54 PM |
RattlerRyan All American 8660 Posts user info edit post |
3. The NC law that makes spam illegal is house bill # a)1275 b)1386 c)1497 d)1508 e)1619
4. The OS interface that was used with IBM computer punch card systems was a.) OS interlink b.)task definition expression c.) resource allocation system d.) job control language e.) work management communicator
[Edited on April 4, 2006 at 11:08 PM. Reason : ] 4/4/2006 10:51:08 PM |
skyfallen All American 944 Posts user info edit post |
god i hated that class...... ....sorry, i dont remember the answers though.. 4/4/2006 11:08:27 PM |
OmarBadu zidik 25071 Posts user info edit post |
nelson is by far the most stupid person employed by the csc department - under janitors and secretaries 4/4/2006 11:14:21 PM |
RattlerRyan All American 8660 Posts user info edit post |
looks like 3 was C and 4 was D
a very big THANK YOU to johnny57 for his help
and just to clarify things...
Quote : | "nelson is by far the most stupid person employed by the csc department NCSU- far, far below janitors and secretaries" |
4/4/2006 11:43:57 PM |
Noen All American 31346 Posts user info edit post |
2 should be 1830, as English crypto was really researched or used much at all until the Civil War. 4/7/2006 2:24:37 AM |
rosschilen All American 1025 Posts user info edit post |
this class shouldn't even be taught at state let alone need a thread on tww about it 4/7/2006 12:40:51 PM |
RattlerRyan All American 8660 Posts user info edit post |
There' are four questions on the final exam review packet that I cannot find the answers to, any help would be greatly appreciated.
1. What was a concern about software changes made to fix the Y2K problem? A. latent bugs B. trap doors C. concurrent processes D. broken links E. intentional detents
2. Which of these have courts allowed empolyers to monitor? A. personal phone calls made from work B. personal e-mail messages sent from work (I'm pretty sure this one is allowed) C. both A and B D. neither A or B
3. One of the major vulnerabilities in Windows that enabled hackers to take control of computers is: A. data scaling. B. memory detents. C. active synchs. D. buffer overrun. E. header corruption.
4. The attack that uses massive tables to determine your login password is the: A. Star table. B. Galaxy table. C. Ether table. D. Spectrum table. E. Rainbow table.
Like I said before, I've run through the notes with a fine-toothed comb and spent hours googling but to no avail. Thanks in advance for your help.
[Edited on May 3, 2006 at 10:04 PM. Reason : asdf] 5/3/2006 10:02:53 PM |
dre018 Veteran 367 Posts user info edit post |
lets see..i believe
1. B 2. i wanna say C but can't remember 3.D 4. E
[Edited on May 4, 2006 at 12:22 AM. Reason : ]
[Edited on May 4, 2006 at 12:22 AM. Reason : ] 5/4/2006 12:20:23 AM |
RattlerRyan All American 8660 Posts user info edit post |
Awesome, thanks a bunch. And if anyone else has conformation and/or input on the answers, feel free to let me know! 5/4/2006 1:32:55 AM |
MOODY All American 9700 Posts user info edit post |
2 is def. C 5/4/2006 4:05:18 AM |