Alright folks, I know this class is easy, and I'm not asking for every answer to the study guide, but there are a few questions that I have googled and looked through the notes/foils for and cannot find anywhere. I appreciate any help. If you are in the library studying hit me up and we can study together.1. A new way for providing voice telephone service using the same cable that you use to receive your tv channels is:A. cable voice.B. digi-voice.C. VTSC.D. voice over IP.E. TVoice.2. The major work on letter frequency distributon, in English, was done approximately in what decade?A. 1500B. 1610C. 1720D. 1830E. 1940More to come in a little bit.
4/4/2006 9:57:02 PM
1. D2. Shouldnt be on the test[Edited on April 4, 2006 at 9:58 PM. Reason : .]
4/4/2006 9:57:54 PM
3. The NC law that makes spam illegal is house bill # a)1275 b)1386 c)1497 d)1508 e)16194. The OS interface that was used with IBM computer punch card systems wasa.) OS interlink b.)task definition expression c.) resource allocation system d.) job control language e.) work management communicator[Edited on April 4, 2006 at 11:08 PM. Reason : ]
4/4/2006 10:51:08 PM
god i hated that class...... ....sorry, i dont remember the answers though..
4/4/2006 11:08:27 PM
nelson is by far the most stupid person employed by the csc department - under janitors and secretaries
4/4/2006 11:14:21 PM
looks like 3 was C and 4 was Da very big THANK YOU to johnny57 for his helpand just to clarify things...
4/4/2006 11:43:57 PM
2 should be 1830, as English crypto was really researched or used much at all until the Civil War.
4/7/2006 2:24:37 AM
this class shouldn't even be taught at state let alone need a thread on tww about it
4/7/2006 12:40:51 PM
There' are four questions on the final exam review packet that I cannot find the answers to, any help would be greatly appreciated.1. What was a concern about software changes made to fix the Y2K problem?A. latent bugsB. trap doorsC. concurrent processesD. broken linksE. intentional detents2. Which of these have courts allowed empolyers to monitor?A. personal phone calls made from workB. personal e-mail messages sent from work (I'm pretty sure this one is allowed)C. both A and BD. neither A or B3. One of the major vulnerabilities in Windows that enabled hackers to take control of computers is:A. data scaling.B. memory detents.C. active synchs.D. buffer overrun.E. header corruption.4. The attack that uses massive tables to determine your login password is the:A. Star table.B. Galaxy table.C. Ether table.D. Spectrum table.E. Rainbow table.Like I said before, I've run through the notes with a fine-toothed comb and spent hours googling but to no avail. Thanks in advance for your help.[Edited on May 3, 2006 at 10:04 PM. Reason : asdf]
5/3/2006 10:02:53 PM
lets see..i believe1. B2. i wanna say C but can't remember3.D4. E[Edited on May 4, 2006 at 12:22 AM. Reason : ][Edited on May 4, 2006 at 12:22 AM. Reason : ]
5/4/2006 12:20:23 AM
Awesome, thanks a bunch. And if anyone else has conformation and/or input on the answers, feel free to let me know!
5/4/2006 1:32:55 AM
2 is def. C
5/4/2006 4:05:18 AM