1.
What is the name of the computer in the 1957 film, "Desk Set"?
Correct Answer
C. Emerac
Explanation
In the 1957 film "Desk Set," the name of the computer is Emerac.
2.
What does the "NT" acronym in Windows NT stand for?
Correct Answer
C. New Technology
Explanation
The "NT" acronym in Windows NT stands for New Technology. This is because Windows NT was a new operating system developed by Microsoft that introduced several advanced features and improvements compared to its predecessor, Windows 3.1. Windows NT was designed to be more robust, secure, and scalable, making it suitable for both personal and business use. The "NT" designation was used to differentiate this new operating system from the previous versions of Windows.
3.
What was the storage capacity of IBM's first hard drive?
Correct Answer
B. 5 Megabytes
Explanation
IBM's first hard drive had a storage capacity of 5 Megabytes. This means that it could store approximately 5 million characters of data. This was a significant milestone in computer storage technology at that time, as it provided a much larger storage capacity compared to previous storage devices. This advancement in storage capacity paved the way for the development of more sophisticated and powerful computer systems in the future.
4.
What was the first type of early computer memory?
Correct Answer
C. Electrostatic Tube
Explanation
The correct answer is Electrostatic Tube. Electrostatic tubes were the first type of early computer memory. They were used in the early 1940s and stored data as an electric charge on a vacuum tube. However, they were not very reliable and were eventually replaced by more efficient and reliable memory technologies such as magnetic core and magnetic drum.
5.
Which company introduced the first hard drive?
Correct Answer
A. IBM
Explanation
IBM is the correct answer because they introduced the first hard drive.
6.
Which pair are widely credited with inventing the TCP/IP protocol?
Correct Answer
D. Kahn And Cerf
Explanation
Kahn and Cerf are widely credited with inventing the TCP/IP protocol. Vinton Cerf and Robert Kahn are computer scientists who played a crucial role in the development of the Internet. They co-designed the TCP/IP protocol suite, which is the foundation of the modern internet. This protocol allows for the transmission of data between different networks, enabling the interconnectedness of computers worldwide. Their work revolutionized communication and paved the way for the internet as we know it today.
7.
Which of the following innovators is credited with inventing ethernet?
Correct Answer
C. Robert Metcalfe
Explanation
Robert Metcalfe is credited with inventing Ethernet. Ethernet is a widely used technology for connecting devices in a local area network (LAN). Metcalfe, along with his team at Xerox PARC, developed the first Ethernet protocol in the 1970s. This protocol allowed multiple computers to communicate and share data over a network. Metcalfe's invention of Ethernet revolutionized computer networking and laid the foundation for the modern internet.
8.
What university did Michael Dell drop out of?
Correct Answer
B. University Of Texas
Explanation
Michael Dell dropped out of the University of Texas.
9.
Who is credited with developing ARPANET, one of the original computer networks?
Correct Answer
B. Vinton Cerf
Explanation
Vinton Cerf is credited with developing ARPANET, one of the original computer networks. ARPANET was a groundbreaking project that laid the foundation for the modern internet. Cerf, along with his colleague Robert Kahn, developed the TCP/IP protocol suite, which enabled different computer networks to communicate with each other. This development was crucial in the growth and expansion of the internet, making Cerf a key figure in its development.
10.
Microsoft Windows NT has development roots in which older operating system?
Correct Answer
D. VMS
Explanation
Microsoft Windows NT has development roots in VMS. VMS stands for Virtual Memory System, which was an operating system developed by Digital Equipment Corporation (DEC). Windows NT was designed to be a high-performance, multi-user operating system, and it borrowed several concepts and features from VMS. These include the use of a hierarchical file system, a security model based on access control lists (ACLs), and the separation of user mode and kernel mode. The influence of VMS on Windows NT can be seen in various aspects of the operating system's design and functionality.
11.
What type of cryptosystem prevents the breaking of one key from aiding the breaking of others?
Correct Answer
B. Perfect Forward Secrecy
Explanation
Perfect Forward Secrecy is a type of cryptosystem that ensures that the breaking of one key does not aid in breaking other keys. In this system, a unique session key is generated for each communication session, and even if one session key is compromised, it does not compromise the security of other sessions. This provides an additional layer of protection against attacks and ensures that past communications remain secure even if future keys are compromised.
12.
The RC4 symmetric key algorithm was designed by an employee of what firm?
Correct Answer
D. RSA Data Security
Explanation
The correct answer is RSA Data Security because the RC4 symmetric key algorithm was indeed designed by an employee of this firm.
13.
Wireless efficiency can be increased by "DTIM" in data packets, which stands for what?
Correct Answer
B. Delivery Traffic Indication Message
Explanation
DTIM stands for Delivery Traffic Indication Message. This feature in data packets helps to increase wireless efficiency. DTIM allows devices to know when there is data waiting for them on the network, reducing the time they spend in sleep mode and improving responsiveness. It helps in managing power consumption and optimizing the delivery of data packets in wireless networks.
14.
In IPSec, the abbreviation "SA" refers to what when setting up a VPN?
Correct Answer
D. Security Association
15.
What technique uses odd packet headers to detect a remote machine's operating system?
Correct Answer
B. TCP Fingerprinting
Explanation
TCP Fingerprinting is a technique that uses odd packet headers to detect a remote machine's operating system. By analyzing the specific characteristics and behavior of TCP packets sent by a remote machine, such as the order of flags set in the packet header or the specific options included, it is possible to make educated guesses about the operating system running on that machine. This can be useful for network administrators to identify potential vulnerabilities or to gather information about the systems on their network.