| Preface| Top| Map| Card| Surf| Family| Life| Forestry| Computers|


War of the Minds - Computer Questions

I21
When an MS-DOS computer is first turned on it begins reading the hard disk drive by reading the master record located at track 0, head 0, sector 1 or, if reading a floppy disk, it reads the boot record there. The master record contains the Disk Partition Table which contains the location of the boot record. The boot record begins with a three byte jump instruction which allows room in the following bytes for the 8 byte system name and the BIOS Parameter Block. What essential information is contained in the BIOS Parameter Block?
I20
In MS-DOS assembly language programming a NEAR procedure call pushes how many bytes onto the stack? (Hint: It pushes the current IP.) How does a FAR call differ?
I19
What is a hash table?
I18
If a string is located and defined in BASIC by means of a three byte pointer, what is the maximum number of bytes in the string?
I17
This question is a nostalgic question for those in on the beginning of the computer age. In Crowther and Woods' "Colossal Cave Adventure" written in the early 1970s the first problem after entering the cave is the huge green fierce snake which blocks the passageway. How does one get past the snake?
I16
In hexidecimal format what is the sum of 1234h and ABCDh? What is the product of 2Ah and 2?
I15
A recent article in the New York Times listed six major computer languages still in general use. They are Cobol, Basic, Pascal, C, C++, and Java. I was surprised that this list did not include the so-called science language or engineer's language. What language is this?
I14
The title of this web page is "War of the Minds". Its URL is http://www.kyphilom.com/duane/warmind.html. If you type that URL into your web browser you may get access to this page on the WWW. Or you may get a message, "failed DNS lookup" or something similiar. If you do get such a message you may still be able to access the page by typing the URL as http://206.2.192.35/duane/warmind.html.
What do the following terms mean? What could be the cause of the message "failed DNS lookup" and why would you still be able to access the page by using the second form of the address?
I13
In regard to the FAT what are lost clusters and what are cross linked clusters?
I12
In the original IBM-PC and the IBM-PC XT, IRQ 2 was unused and IRQ 3 was used by COM1. In the AT or 386 class PC, IRQ 2 was said to be cascaded. What does this mean and why was it done?

If a device installed in an XT and using IRQ 2 was put into an AT class machine it would work fine but it would not actually use IRQ 2. What IRQ would it use?

I11
The QWERTY keyboard was originally designed to be inefficient so that typists could not hit the keys fast enough to cause typewriter keys to jam. What is the name of the most popular keyboard purposely designed so that the keys are arranged for maximum efficiency in typing speed?
I10
Before the IBM-PC there were three microcomputers - the TRS-80, the Apple, and the Commodore Pet. It was felt that to sell computers one would have to be able to answer the question: "But what will it do?". So the industry looked for a killer application, a computer program that was so useful people would buy the computer just to be able to use that one program. The very first killer application had the very same initials as had the enemy American had fought ten years before and had called "Charlie". What was the name of this program and what general type of program was it?
I9
In programming the Intel 80x86 chip, the assembly language command, "CMP AL, 07" when compiled into machine language by a compiler calls for what type of action when the resulting program is executed.
I8
Tandy Corp. or Radio Shack began marketing one of the first microcomputers in the fall of 1977. It was the 4k TRS-80 Model I. What chip was used for the ALU of that computer?
I7
On the Internet "http" is an abbreviation for what?
I6
A bit mapped image in 256 colors that is 640 X 480 pixels in size takes up how many kilobytes in uncompressed format?
I5
An MSDOS call to interrupt 10H affects what computer functions?
I4
What does "BIOS" mean and what is its purpose?
I3
What is the purpose of a compiler?
I2
ASCII - 65 decimal - is what character?
I1
How many nybbles are necessary to store the phrase, "Merry Christmas!"?
Quotation marks are not included.
II15
WMF is to BMP as MIDI is to ---?
see Answer
II14
Why does my fast modem connect at a slower speed and why would I set my COM port at 38.4k or higher if my modem is only 28.8k?
see Answer
II13
DOS and the original version of Windows 95 used a 16 bit FAT in which a 2 gigabyte FAT partition used 32k clusters. Windows 95 OEM Service Release 2 supports 4k clusters on 2 gigabyte hard disk drives. What fundamental change in the OS allowed this and what are the advantages? Disadvantages?
see Answer
II12
The maximum compression ratio for a V.42bis modem is 4:1. Does this mean that a 9600 bps modem with V.42bis can download a GIF file at 38,400 bps? Explain.
II11
Why does the standard keyboard on an IBM-PC compatible computer have the cursor movement keys including [HOME], [END], [Pg Up], and [Pg Dn] duplicated on the numeric keypad?
II10
Using MS-DOS 6.22 a driver is loaded in conventional memory. Use of the MEM command shows that the driver occupies 24,622 bytes. It also shows 25,155 bytes free in upper memory. Therefore you decide to load the driver in upper memory freeing space to be used by your programs. However, use of the LH command in the AUTOEXEC.BAT file to load the driver into upper memory results in an "insufficient memory" error message and the driver loads low. Why?
II9
A week to ten days after Christmas 1987 people using the TRS-80 microcomputer and running Radio Shack's TRSDOS hard disk operating system began calling Tandy's help line because of problems with their computer. The help lines soon became swamped with calls. What problem caused this?
II8
The Interpreted Basic for the 4k TRS-80 microcomputer Model I had very primitive graphics and the Basic graphic commands made most animation too slow for realistic movement of very many pixels at once. A high school teacher named Leo Christopherson was the first to write a game in this language using a technique to move several pixels at once producing realistic movement. Some of the games he wrote using this technique included "Android Nim", "Bee Wary", "Dueling Droids", and "Dancing Demon". What technique did he use?
II7
Those familiar with the early days of microcomputers in the early 1980s have probably read these words:
        "IN SOME CASES MUD IS GOOD, IN OTHERS..."
        "You're in a hidden grove."
        "You're in a dismal swamp."
        "*DRAGON EGGS* (very rare)"
        "*SMALL STATUE OF A BLUE OX*"
Where are these words found and who is the author?
II6
Bruce Artwick was first known for developing what computer simulation?
II5
If I write a TSR program that takes control of Interrupt 5 on an IBM-PC system, what will trigger the execution of my program? (This is software Interrupt 5, not IRQ 5 often used by peripherals such as the Sound Blaster.)
II4
First developed in 1967 as a tool for learning, this computer programming language often involves the Turtle and is used, among other things, to teach elementary programming concepts to school children. What language is this?
II3
In the fantasy town of Binary the Lord Ruler first assigned a number 1 to 8,000 to each of the 8,000 citizens. He then ordered the royal data master to construct a database using the minimum amount of memory possible to keep information on each citizen. The Lord Ruler required that for each citizen the data master be able to keep sex (male or female), hair color (red, blonde, brown, or black), weight in whole pounds (0 to 511) and eye color (blue, brown, or green). Then he realized that there were a few blind citizens of indeterminate eye color and required that they be accounted for in the database also. What is the minimum number of bytes necessary to carry out the Lord Ruler's instructions?
II2
According to Arthur C. Clarke what event of significance to Dave Bowman happened on January 12, 1997?
II1
What hole in Gnu-Emacs did a hacker use to obtain system manager privileges? How was the atrun program involved? What type of system was vulnerable to this type of attack?
III5
A secretary using a courier 10 cpi font says "85 by 66".
A graphic designer using a 300 dpi scanner says "2550 by 3300".
What is the common object to which they are both referring?
see Answer
III4
What is this?

and how did computers make study of the related branch of mathematics practical?
see Answer
III3
What is the "public key" and "private key" required by PGP?
see Answer
III2
A GIF graphic file has a 256 color palette. The 256 colors are chosen from over 16 million possible colors. Each pixel is mapped or indexed to one of these 256 colors. How does a "true color" graphic differ?
see Answer
III1
13 XOR 13 = ?
see Answer
IV14
How many nybbles are necessary to store the name, "Frank Sinatra" in ASCII format? (Quotation marks are not included.)
see Answer
IV13
PEEK and POKE, programmers sometimes do. To what do these terms refer?
see Answer
IV12
Observe the following computer program. What does it do? In what language is it written?
   CLS
   RANDOMIZE TIMER
   X=INT(RND*100)+1
   Y=0
   C=0
   WHILE X<>Y
       C=C+1
       INPUT Y
       IF Y<X THEN PRINT"<" ELSE PRINT">"
   WEND
   PRINT "YES";C;" TRIES."
   END

see Answer
IV11
The following computer subroutine written in BASIC for a PC compatible computer is designed to display on the computer monitor, one screenful at a time, a text file already opened in buffer 1. It should stop when each screenful of text is displayed until a key is pressed. It should then display the next screenful of text. It should continue until either the end of the text file is reached or the [ESC] key is pressed. The subroutine below has two bugs. Please identify them? Tell their effect and how to correct them.
    1000 CLS:V=1:H=30:Z$="TEXT FILE":LOCATE V,H:PRINT Z$;
    1010 V=3:H=1:ZQ=0
    1100 WHILE NOT EOF(1) AND ZQ<>27
    1110   LINE INPUT #1,A$
    1120   LOCATE V,H:PRINT A$;
    1130   V=V+1
    1140   IF V<23 THEN GOTO 1200
    1150   X$=INKEY$:IF X$="" THEN GOTO 1150
    1152   ZQ=ASC(X$)
    1160   FOR Z=3 TO 23:LOCATE Z,H:PRINT SPACE$(80);:NEXT
    1200 WEND
    1400 CLS:RETURN

see Answer
IV10
Which of the following does not belong?
see Answer
IV9
When I began using computers I was familiar with the following terms:
        Wayne Green - 80 Micro
        Osborne 1
        Sinclair
        TRS-80
        Kaypro
        Lisa
        PET
        David Ahl - Creative Computing
        Gary Kildall - CP/M
        VisiCalc
        Ada
        Grace Hopper
        Charles Babbage
Who or what are (were) they?
see Answer
IV8
The Mandelbrot set can be thought of as an index to ________ sets. Fill in the blank. (Maybe more a math than a computer question.)
see Answer
IV7
There is a message encoded in the image below.

What is it?


see Answer
IV6
If the numbers 16707, 18515, 17952, 20300, 8279, 19539, and 22351 are stored as two byte integers (lsb+msb) in BASIC and read as ASCII, a statement which could be a comment on a business' finances will be produced. What is that statement?
see Answer
IV5
How did Mosaic doom gopher?
see Answer
IV4
Users of Windows 95 should be prepared by making use of the ERU. What is the ERU and what does it do?
see Answer
IV3
This Internet upstart, in claiming it is "Earth's biggest bookstore", ruffled the feathers of an established bookseller. The established company then established an Internet presence and billed itself as "The World's Largest Bookseller Online". Who are these two Internet goliaths?
see Answer
IV2
An Internet Protocol address contains 32 bits.
In decimal it looks like this: 140.78.34.45
or this: 209.1.28.62.
Since each of the four numbers in an IP can range from 0 to 255 a total of 256 to the 4th power (or 4,295 million) IP addresses are theoretically available.

The first example given above, 140.78.34.45 is a Class B address. What is the subnet mask for this address? How many nodes are supported in a Class B network?

The second example given above, 209.1.28.62 is a Class C address. What is the subnet mask for this address? How many nodes are supported in a Class C network?
see Answer

IV1
The salesman sold me a computer with a two gigabyte hard disk drive. "Huge", he said. I said I wanted to store photographs in my computer, so he sold me a high resolution scanner. He said that with that baby I could scan my 8 X 10 family photos into the computer at 600 dots per inch with millions of colors. He said I needed this equipment to get the great quality pictures I wanted. After I scanned in about twenty pictures I found that my "Huge" hard disk drive was full. I met a guy once who showed me 20 or so great looking pictures on his computer and he had them all stored on a little floppy disk. What's the difference?
see Answer
V6
What is the output of the following program?
 
    A$="Bad Dog!"
    T=0
    FOR Z=1 TO LEN(A$)
       T=T+ASC(MID$(A$,Z,1))
    NEXT Z
    PRINT T
 

see Answer
V5
What is the difference in quality and method of sound production between FM synthesis and wave table?
see Answer
V4
Windows '95 uses the VFAT to store long file names. However, file names are still registered in the FAT in 8.3 format. So, in 8.3 format, how would a file named "Ford Escort Sales.doc" be registered?
see Answer
V3
What's a Winsock?
see Answer
V2
Dates entered in the format mm/dd/yy can be most compactly stored, compared and sorted in the format chr$(y)+chr$(m)+chr$(d), requiring only three bytes for storage. Since this same storage format can handle up to 255 years, it will work fine after the year 2000 if a fixed window is used to solve the Y2K computer problem and 50, or some other year near the middle of a century, is used as the break point. This means that the year for any date entered before 01/01/50 would have 100 added. What date would be indicated by each of the following:
(include the proper century in your answers.)
"i"+CHR$(3)+CHR$(15)?
"b"+CHR$(3)+CHR$(15)?
"1"+CHR$(3)+CHR$(15)?
see Answer
V1
An MSDOS call to interrupt 13H affects what computer functions?
see Answer
V8
Xmodem, Ymodem, Zmodem. Which is the most efficient and allows recovery from an interrupted transmission?
see Answer
V7
History of Computers
The Model 1 came with 4Kb RAM standard. The built in Basic, called Basic Level 1, was extremely limited. It had only 26 possible variables, labelled A-Z of course, and one and only one integer array variable, called A(). The monitor was basically an RCA TV with the tuner removed. Storage was on cassette tape. Most Model 1s were upgraded to 16Kb and Level 2 Basic. Additional expandability was gained through the Expansion Interface. This fair sized box connected to the back of the Model 1 via a short ribbon cable. The monitor then sat on top of the Expansion Interface. With an Expansion Interface, you could add additional memory, control serial devices, use two tape decks instead of just one, and control up to four floppy drives.

Identify this early microcomputer first marketed to the public in the late 1970s.
see Answer
V9
Why would changing your Windows '95 MTU from 1500 (the default) to 576 speed up Internet performance?
see Answer
V10
Considering HTML, how many words are between the quotations marks in the following sentence:
"There are more than thirteen words in this sentence because some, are invisible."
see Answer
V11
My network uses BNC T type connectors with terminators at each end. I am limited to 30 nodes in a 185 meter maximum length segment. Am I using bus, ring, or star topology?
see Answer
V12
Daughter of a famous English poet, she was enlisted to translate a description of a machine from the Italian original. She corresponded with the inventor of the machine and wrote notes on her translation describing a general purpose computer which she said could be used for music and graphics as well as for mathematical calculations. Who was she? Who was her famous father, whom she never knew? Who was the inventor of the machine? What was the machine called? When did this occur?
see Answer
V13
Introduced in 1983 it contained a twiggy floppy disk drive and one megabyte of memory. It was a window based rather than a text based system. What was the name of this revolutionary computer and what uncommon input device did it use?
see Answer
V14
Using an image editing program to work with a particular graphic image may involve loading the image from disk, editing it, and then saving it a number of times. When I do this I use an image format such as GIF or BMP but never JPEG. Why not?
see Answer
V15
Convert the 15 character string "War of the Mind" to a Base 64 encoded string.
see Answer
V16
The poem below:
        The fog comes
        on little cat feet.
           
        It sits looking
        over harbor and city
        on silent haunches
        and then moves on.
is encoded in this picture

How is it encoded there? You may get a hint from this picture:


see Answer
V17
Which of the following does not belong and why?
see Answer
V18
The color palette for a 256 color BMP file is coded as follows:
        color #    R   G   B
          0        0   0   0
          1        1   1   1
          2        2   2   2
          .        .   .   .
          .        .   .   .
          .        .   .   .
         255      255 255 255
What type of color scheme will a picture from this file exhibit?
see Answer
VI1
Why would Bill feel threatened by a cute penguin and GNU?
see Answer
VI2
In 1967 Abe wrote a computer program which, in his date conversion algorithm, contained the line:
LET D(2)=28
In 1968 this program failed to work properly so Bob fixed it by adding the line:
IF Y/4=INT(Y/4) THEN LET D(2)=29
Chuck observed Bob's work and said, "Why not make it more general by adding the line:
IF Y/100=INT(Y/100) THEN LET D(2)=28"
So Chuck did.
In the year 2000 which of the three versions of the program, if any, will work properly and what computer line (in the same language as above), if any, should be added to the above three lines to make the program work properly?
see Answer
VI3
In this context which of the following does belong? (may be more than one.) Supply suitable web references.
see Answer
VI4
<BODY BGCOLOR="#FFFFFF" TEXT="#FFFFFF" LINK="#0000FF" VLINK="#008080">
If this line is included in the header of an HTML document, what will be the effect?
see Answer
VI5
In hexidecimal what is the product of AA and BB?
see Answer
VI6
Which one of the following does not belong and why?
  1. ram
  2. jpeg
  3. tiff
  4. psd
  5. bmp
  6. gif
  7. dxf
  8. fpx

see Answer
VI7
What is the difference between Javascript and JAVA?
see Answer
VI8
What is 1073741824?
see Answer
VI9
Here is an algorithm to compress an unsigned integer, A. The output of the algorithm is a 4 byte string, X$.
       IF A>=256^3 THEN X$=CHR$(INT(A/256^3)):A=A-INT(A/256^3)*256^3 ELSE X$=CHR$(0)
       IF A>=256^2 THEN X$=X$+CHR$(INT(A/256^2)):A=A-INT(A/256^2)*256^2 ELSE X$=X$+CHR$(0)
       IF A>=256 THEN X$=X$+CHR$(INT(A/256)):A=A-INT(A/256)*256 ELSE X$=X$+CHR$(0)
       IF A>255 THEN IF A<255.5 THEN A=255 ELSE A=0:MID$(X$,3,1)=CHR$(ASC(RIGHT$(X$,1))+1)
         X$=X$+CHR$(A)
What is the largest integer that can be compressed by this algorithm? Design an algorithm to uncompress this string and return the original integer.
see Answer
VI10
What will the following program print on the screen on an IBM-PC compatible computer in a DOS environment?
        PRINT CHR$(218)+CHR$(196)+CHR$(191)
        PRINT CHR$(192)+CHR$(196)+CHR$(217)

see Answer
VI11
Place the following file types in two columns with sound on the left and pictures on the right so that analogous file types are matched on the same line in descending order of relative file size. Tell in what way an audio file type from the list is analogous to the corresponding graphic file type.
      ra
      bmp
      wmp
      wav
      jpg
      mid

see Answer
VI12
In a Windows 95/98 operating system three files of identical size will be found. They are named LOGO.SYS, LOGOS.SYS, and LOGOW.SYS. Sometimes there is a fourth file of the same size named STRTLOGO.OEM. What type of files are these? Where will they be located? What is their purpose? What technique does Windows use to simulate movement with these files?
see Answer
VI13
The computer subroutine below is designed to convert a year and julian date as set in the variables, YEAR and JULIANDATE to a conventional date format.
For instance setting the YEAR=1999 and the JULIANDATE=1 should result in the printout:
Julian date 1 of year 1999 is JANUARY 1, 1999.
What will be the output of the subroutine if the YEAR=2000 and JULIANDATE=60?
    DIM MONTH$(20),DAYS(20)
    DATA JANUARY,31,FEBRUARY,28,MARCH,31,APRIL,30,MAY,31,JUNE,30
    DATA JULY,31,AUGUST,31,SEPTEMBER,30,OCTOBER,31,NOVEMBER,30,DECEMBER,31,END,0
    MO=0
    WHILE Z$<>"END"
       READ Z$,Z
       MONTH$(MO)=Z$:DAYS(MO)=Z
       MO=MO+1
    WEND
    IF YEAR/4=INT(YEAR/4) THEN DAYS(2)=29
    JD=JULIANDATE
    MONTH=1
    WHILE JD>DAYS(MONTH)
       JD=JD-DAYS(MONTH):MONTH=MONTH+1
    WEND
    PRINT "Julian date"+STR$(JULIANDATE)+" of year"+STR$(YEAR)+" is "+MONTH$(MONTH)+STR$(JD)+","+STR$(YEAR)+"."

see Answer
VI14
Trying to run a DOS program under Windows may cause an error message, "FCB not available." What does this mean and how can one get the program to execute?
see Answer
VI15
What will be the result of running this program on an MSDOS computer system if Drive A is a floppy disk drive with a formatted floppy disk with 730,112 bytes free and containing no files?
   FOR Z=1 TO 200
       FL$="A:\"+RIGHT$(STR$(Z),LEN(STR$(Z))-1)
       OPEN FL$ FOR OUTPUT AS 1
          PRINT #1,FL$
       CLOSE
   NEXT Z

see Answer
VI16
Storage of files on my hard disk drive is more efficient than before because I am using Windows '98 with FAT32. I understand that I can increase capacity even more with DriveSpace3. Is this true? How does DriveSpace3 work to increase disk capacity?
see Answer
VI17
If an Int 16h function 1 is performed on an MS-DOS computer system, how does one interpret the results returned in the AH and AL registers?
see Answer
VI18
He invented http and html and is considered the father of the www?
see Answer
VI19
<b><p>What is wrong with this HTML segment?</b></p>
see Answer
VII1
*.txt, *.html, *.uue, *.exe, *.gif, *.mid, *.bmp
Which should be transmitted over the internet as a binary file? What is a binary file?
see Answer
VII2
Why does the standard keyboard on an IBM-PC compatible computer have the cursor movement keys including [HOME], [END], [Pg Up], and [Pg Dn] duplicated on the numeric keypad?
see Answer
VII3
        If binary 00010000 equals
        10 hexadecimal equals
        16 decimal
   
        What is the product of
        binary 00100001 and
        binary 00000101?
 
        Please give the answer in 
        binary, hex, and decimal.
  

see Answer
VII4
What is this?


see Answer
VII5
The BASIC computer program below opens a file with record length 36 bytes. It then writes 18 numbers into the file buffer in the 2 byte integer format (lsb+msb) and prints the buffer contents to the screen. What message is printed on the computer screen?
   DIM A$(20)
   OPEN "R",1,"temp.txt",36
   FIELD 1, 2 AS A$(1),2 AS A$(2),2 AS A$(3),2 AS A$(4),2 AS A$(5),2 AS A$(6),2 AS A$(7),2 AS A$(8),2 AS A$(9),2 AS A$(10),2 AS A$(11),2 AS A$(12),2 AS A$(13),2 AS A$(14),2 AS A$(15),2 AS A$(16),2 AS A$(17),2 AS A$(18)
   FIELD 1, 36 AS A99$
   RESTORE
   FOR Z=1 TO 18:READ X:LSET A$(Z)=MKI$(X):NEXT
   PRINT A99$
   CLOSE
   END
   DATA 28505,8309,25975,25970,24864,26400,28527 
   DATA 8292,24941,8302,26691,29281,25964,8307,25427,30056,31340,8225

see Answer
VII6
With a given monitor and video card, if we increase the screen resolution, what effect will this have on the vertical refresh rate?
see Answer
VII7
In the picture of a motherboard below identify each type of slots labeled 1, 2, and 3.


see Answer
VII8
Please explain the difference between embedding an object and linking to an object and discuss the advantages and disadvantages of each.
see Answer
VII9
MUD, MOO, MUSH. What are these?
see Answer
VIII1
Why use UDF rather than ISO 9660?
see Answer
VIII2
Specifically, what is this?
21AA:0100 B409          MOV     AH,09           ;display string of characters
21AA:0102 BA1701        MOV     DX,0117         ;point to string                
21AA:0105 CD21          INT     21              ;do it                  
21AA:0107 B401          MOV     AH,01           ;keyboard input function        
21AA:0109 CD21          INT     21              ;do it                          
21AA:010B B44C          MOV     AH,4C           ;exit function                  
21AA:010D 2C30          SUB     AL,30           ;convert to number
21AA:010F 7EF6          JLE     0107            ;jump to 107 if < "1"        
21AA:0111 3C09          CMP     AL,09           ;compare to "9"                 
21AA:0113 7FF2          JG      0107            ;jump to 107 if greater     
21AA:0115 CD21          INT     21              ;do exit                        

see Answer
VIII3
If I record my mp3 music files on a CDR recordable CD as data files I can get about 240 files per CD. If I play these on my computer with an mp3 player they will play beautiful music for about ten hours. However, if I record these same files on the same CD as music to be played with a CD player I can only get about 1/10 as many which will play for about one hour. Why the difference?
see Answer
VIII4
Specifically, what is MMX technology?
see Answer
VIII5
What is the purpose of the command: "AT &F L3 E1 V1 &C1 &D2 X4"? Specifically what does it do?
see Answer
VIII6
What does the program below do and what is the name of the algorithm demonstrated?
    FOR Z=1 TO 10
       A%(Z)=RND*1000+.5
    NEXT
    N=1
    WHILE N>0
       N=0
       FOR Z=1 TO 9
           IF A%(Z)<A%(Z+1) THEN SWAP A%(Z),A%(Z+1):N=N+1
       NEXT
    WEND
    FOR Z=1 TO 10
       PRINT A%(Z)
    NEXT

see Answer
VIII7
The program fragment below can be used to encode one string of characters, A, by use of another "key" string of characters, B. The encoded string of characters is then printed out. What will be the printout of this particular set of strings of characters?
     A$="SUPERCALIFRAGILISTICEXPEALIDOCIUS"
     B$=SPACE$(40)
     FOR Z=1 TO LEN(A$)
        MID$(A$,Z,1)=CHR$(ASC(MID$(A$,Z,1))+ASC(MID$(B$,Z,1)))
     NEXT
     PRINT A$

see Answer
VIII8
If I designate my hard disk drive, C, on my Windows '98 computer as a shared network resource, I will have to give it a resource name such as "C". I can, of course, give it any name I choose such as "Master" or "Marketing" or "Mary". I might even add a $ sign to the end of the resource name as in "C$". If I do this what will be the effect?
see Answer
VIII9
Not too long ago it was necessary to connect two computers in a LAN. The two computers were in two different buildings about 250 feet apart. I ran a twisted pair cable through an underground pipe to connect the network cards on the two computers. I also ran a 12/3 electrical cable between the two buildings so that I could plug the computer in one building into the electrical system of the other building. Why did I not just plug that computer into an electrical outlet of that building instead of running an extra electric cable?
see Answer
VIII10
What is the status of the RSA patent? What is the RSA patent?
see Answer
VIII11
For what might I use my cmf and voc files? Specifically what type of files are these?
see Answer
VIII12
In 1969, a Columbus, Ohio insurance company purchased a mainframe computer that was more powerful than needed. The company leased the excess capacity to other companies. This evolved into what service?
see Answer
VIII13
Who, in the mid 1970s, first used the term "Information Superhighway" to describe what we now call the internet?
see Answer
VIII14
If I have a 35mm color photographic negative so that the negative image is 35mm X 2/3 of 35mm and I scan it into my computer in 24 bit color using the maximum resolution of my scanner which is 1200 dpi X 1200 dpi and I then print the resulting bmp file on my printer at 300 dpi what size will the print be in inches and how many bytes will the resulting bmp file require on my hard disk drive?
see Answer
IX1
Joe has two computers connected in a network with a ten foot long crossover cable. Working late one night he decides to move one computer to a location fifteen feet from the other computer. Unfortunately his network cable will not now reach from the other computer. Joe searches the office and cannot find a cable longer than ten feet. However, he does find that there is a package of five ten foot crossover cables and a package of five standard network cable couplers in a closet. Can Joe connect his computers so that they will be able to network using these items without rewiring any of them? If so, specifically what items will he finally use to connect the computers? If he cannot connect the computers, why not?
see Answer
IX2
The three file systems commonly used under Windows platforms are FAT (file allocation table), FAT32 (32-bit file allocation table) and NTfs (NT File System). How do these systems differ and what characteristics of the FAT (not FAT32) file system limits it to 2GB partitions?
see Answer
IX3
If I have an Ultra ATA/100 IDE hard disk drive, how many conductors must I have in my hard disk cable for maximum performance?
see Answer
IX4
If I sit down at my computer and using a word processor begin writing a text document with this first line:
#VRML V1.0 ascii
What type of document am I writing? What is its purpose? How is it to be used? What type of program is necessary to use it?
see Answer
IX5
I found a Windows '98 program furnished as a part of Windows '98 by Microsoft that gave me this list of tools I could use to fix, maintain, optimize and tweak Windows '98:
    DirectX Diagnostic Tool     
    Windows Report Tool         
    Update Wizard Uninstall     
    System File Checker         
    Signature Verification Tool 
    Registry Checker            
    Automatic Skip Driver Agent 
    Dr. Watson                  
    System Configuration Utility
    ScanDisk                    
    Version Conflict Manager    
Where did I find this list?
see Answer
IX6
I may want to include some of the symbols below in a Microsoft Word file? Where can I find these symbols for that purpose?


see Answer
IX7
A 24 bit image is composed of the following three colors in RGB format:
255,0,0 and 255,255,255 and 0,0,255.
What are these colors?
see Answer
IX8
Which one of these does not belong and what are the rest?
see Answer
IX9
There are a number of programs and methods to let me convert my midi music file to an MP3 file to play on my MP3 player or to burn onto a CD. However, I cannot convert my MP3 sound files to midi files. Why not?
see Answer
IX10
What is the ascii sum of the bytes in the character string, "Easter"?
see Answer
IX11
Please order the computers below by date of introduction:
see Answer
IX12
A CPU can schedule transfers from and to peripherals by polling or by use of interrupts. Discuss each method in terms of advantages and disadvantages.
see Answer
IX13
Identify the company which manufactured each of the following computers:
see Answer
IX14
If I have text data to store in a file I can create a random access file with 80 byte records and store the data one line per record so that I can recall any record and display it on one line of the screen. It might make more sense though to create 82 byte records in the random access file and put ASCII character 13 in the 81st byte and ASCII character 10 in the 82nd byte of each record. If I did this I would probably also fill the last record of the file with ASCII character 26. Why would it make sense to set up the file this way?
see Answer
IX15
What do the column headings, 1, 2, 3, and 4, in the following table indicate?
        1        2       3        4
        -        -       -        -
        1        3       7       15
        2        5      11
        4        6      13
        8        9      14
                10
                12

see Answer
IX16
In a Windows 98 operating system where will we find the winipcfg program and for what is it used?
see Answer
IX17
In order of use:
  1. Microsoft Internet Explorer
  2. Netscape
Web Browsers!
What's the third browser on this list, said to be the "Fastest Web Browser on Earth."
see Answer
IX18
The recent Sircam virus selects a file at random from an infected computer and appends it to the virus which is then emailed as an attachment to a random email address found on the infected computer. I have received 30 or 40 of these emails. At first I simply deleted them as I do all unknown or unsolicited email. Then I thought it might be interesting to look at some of the files sent from infected computers. I found an employment contract between a church in Lexington, Kentucky and its minister, an order for over $42,000 worth of construction equipment, and a love poem. Then I quit wasting my time and went back to deleting the emails. Most people are either ignorant of email viruses and open them, infecting their computer, or are very scared of viruses and will not touch them but delete them immediately. How was I able to look at the content of a virus infected email attachment without infecting my computer? Your answer does not require the specific program used (you wouldn't know that), but simply a discussion of how a virus infects computers and how it can be examined and analyzed.
see Answer
X1
I have a Microsoft network consisting of three computers, two running Windows 3.11 and one running Windows 95. I decide to expand the network by adding two new computers running Windows 98 SE with the network cards, drivers, etc. already installed by the manufacturer. When I plug the new computers into the five port network hub used by the system and restart everything, I find that the two new computers can see each other on the network but cannot see the older computers and the older computers can still see each other but cannot see the new computers. What must I do to get all five computers to recognize each other on the network properly?
see Answer
X2
It is based on a map of a cave in Kentucky
The magic word is "xyzzy"
"You are in a twisty maze of passageways, all alike"
It is a successor to Wumpus
What is it and what can you tell me about it?
see Answer
X3
I perform three logical operations on the following pairs of numbers with the results below:
  number pair    17, 42             42, 18
   operator      result             result
    1                0                 2
    2               59                58
    3               59                56
What logical operators am I using?
see Answer
X4
Which one of the following does not belong and why?
  1. MOV AX,09
  2. MOV DX,0117
  3. INT 21
  4. SUB AL,30
  5. LET DX=6
  6. JLE 0107
  7. CMP AL,09
  8. JG 0107

see Answer
X5
A computer magazine said that, due to fusion, dll hell would freeze over in whistler. What in the world did they mean?
see Answer
X6
XMF,abc,NIFF,SASL,RMF,SSS,DARMS,GUIDO
What type of data am I storing?
see Answer
X7
The BASIC computer program below opens a file with record length 36 bytes. It then writes 18 numbers into the file buffer in the 2 byte integer format (lsb+msb) and prints the buffer contents to the screen. What message is printed on the computer screen?
   DIM A$(20)
   OPEN "R",1,"temp.txt",36
   FIELD 1, 2 AS A$(1),2 AS A$(2),2 AS A$(3),2 AS A$(4),2 AS A$(5),2 AS A$(6),2 AS A$(7),2 AS A$(8),2 AS A$(9),2 AS A$(10),2 AS A$(11),2 AS A$(12),2 AS A$(13),2 AS A$(14),2 AS A$(15),2 AS A$(16),2 AS A$(17),2 AS A$(18)
   FIELD 1, 36 AS A99$
   RESTORE
   FOR Z=1 TO 18:READ X:LSET A$(Z)=MKI$(X):NEXT
   PRINT A99$
   CLOSE
   END
   DATA 25933,29298,8313,26691,26994,29811,24941,8307,28257
   DATA 8292,24904,28784,8313,25934,8311,25945,29281,8225

see Answer
X8
What is this?


see Answer
X9
avi is to mpeg as bmp is to jpeg as wav is to what?
see Answer
XI1
MPEG is an abbreviation for what? What technique does MPEG use to compress video? Name two competing video compression standards?
see Answer
XI2
Recently I started my computer and it froze after displaying the manufacturer's logo screen. A customer service representative said to try pressing "delete" to enter the setup screen but when I did this a message, "Entering Setup", appeared on the screen but the system went no farther. Next I tried using a floppy boot disk with no better results. Am I most likely to repair this computer by replacing the hard disk drive, the motherboard and memory chips, the power supply, the floppy disk drive, or the CDROM drive? Why do you think so?
see Answer
XI3
If I want to play an MPEG-4 video with my Windows Media Player, what codec will I need? What is a codec?
see Answer
XI4
Name the sons of Atrus and Catherine. Where do we find their story?
see Answer
XI5
Below is a partial list of commands available in Windows XP. How do we get this complete list from within Windows XP and how are these commands accessed?
ASSOC    Displays or modifies file extension associations.
AT       Schedules commands and programs to run on a computer.
ATTRIB   Displays or changes file attributes.
BREAK    Sets or clears extended CTRL+C checking.
CACLS    Displays or modifies access control lists (ACLs) of files.
CALL     Calls one batch program from another.
CD       Displays the name of or changes the current directory.
CHCP     Displays or sets the active code page number.
CHDIR    Displays the name of or changes the current directory.
CHKDSK   Checks a disk and displays a status report.
CHKNTFS  Displays or modifies the checking of disk at boot time.
CLS      Clears the screen.

see Answer
XI6
In a DOS window in Windows 98 or Windows ME I can use the DELTREE command to delete a subdirectory tree. This command is not available in the DOS window of Windows XP. What is the equivalent command in Windows XP DOS?
see Answer
XI7
If I want to share a single IP address among multiple network clients and I want to provide bandwidth control by keeping data out of subnets where it doesn't belong, should I use a network hub, a bridge, a switch or a router? Give an example of such a configuration.
see Answer
XI8
On a new Windows XP installation I found two files on the Windows XP installation CD which had not been used by Windows XP. I copied Nbf.sys to c:\windows\system32\drivers and I copied Netnbf.inf to c:\windows\inf, a hidden directory. Why would I do this?
see Answer
XI9
This child prodigy became interested in problems in physics and math and science in general. After studying cellular automata he became convinced that existing mathematical tools were inadequate for the studies he wanted to pursue. So he took time in the mid 1980s to invent a whole new mathematical computer language and became rich enough marketing it that he could finance his studies. In April 2002 he published the results of his studies done in seclusion at night over the last ten years. What is the name of this visionary and what is the title of the book he has just published?
see Answer
XII1
Who are these people?
see Answer
XII2
Put these computer languages in order as to the year of their introduction:
see Answer
XII3
This computing system consists of 640 supercomputers that are connected by a high- speed network (data transfer speed; 12.3 GBytes). Each supercomputer (1 node) contains eight vector processors with a peak performance of 8GFlops and a high- speed memory of 16 GBytes. The total number of processors is 5120 (8 x 640), which translates to a total of approximately 40 TFlops peak performance, and a total main memory of 10 TeraBytes. It is the world's fastest supercomputer as of mid 2002 and is approximately five times as powerful as the world's second fastest supercomputer. What and where is this powerful system? What is a TFlop?
see Answer
XII4
In programming the Intel 80x86 chip, the assembly language command, "JLE 0107" when compiled into machine language by a compiler calls for what type of action when the resulting program is executed.
see Answer
XII5
In Windows XP at the command prompt the following commands may be given:
c:\windows\NET TIME \\MASTER /SET /YES
W32tm /config /syncfromflags:MANUAL /manualpeerlist:time.windows.com,tick.usno.navy.mil
What is the purpose of each of these commands?
see Answer
XII6
What are DLL files?
What are INI files?
see Answer
XII7
LBA, ATA, Landing Zone, Int 13h. To what are we referring? Please define or describe each of these.
see Answer
XII8
This law professor at Stanford who once clerked for a Supreme Court Justice, and helped Judge Thomas Penfield Jackson with the case of "Department of Justice vs. Microsoft" will in October 2002 argue before the U. S. Supreme Court against the Sonny Bono Copyright Term Extension Act also known as the Mickey Mouse Preservation Act. He is considered a leading expert in cyberlaw and has written a couple of books on the subject. Please identify this proponent of cyber freedom and the books he authored.
see Answer
XIII1
In the history of computer gaming rank these in order of appearance. Give approximate years.
see Answer
XIII2
What will be the output of the following basic program if the user inputs 100 at the first prompt and 50 at the second?
INPUT X
INPUT Y
PRINT X OR Y
PRINT X XOR Y
PRINT X AND Y
PRINT NOT X
PRINT NOT Y
PRINT X IMP Y
PRINT X EQV Y

see Answer
XIII3
What will be the output of the following basic program?
PRINT (8 IMP 4)*(8 EQV 4)
see Answer
XIII4
If the following batch file is run in the Windows XP command interpreter, what will be the final directory entered?
cd \temp
pushd \bak
cd \work
popd

see Answer
XIII5
Diskeeper is a defragmentation program. What does such a program do and why is it useful?
see Answer
XIII6
If I put the following line
127.0.0.1     x.acme.com
in the file c:\windows\system32\drivers\etc\hosts
I can stop my teenage son from accessing the acme web site from my windows XP computer.
Why does this work?
see Answer
XIII7
In Windows XP my user name is Duane. What is the purpose of the file I find on my computer:
"\Documents and Settings\Duane\NTUSER.DAT"?
see Answer
XIII8
What are these?
see Answer
XIII9
My first desktop computer, the 4k TRS-80 model I, did not have a hard disk drive. It also did not have a floppy disk drive. As a matter of fact it was simply a keyboard with 4,000 bytes of RAM memory and a connection to a modified television monitor. The first computer program I wrote for business was an accounts receivable program for a coal company. I stored this program by typing the command, "CSAVE". How was the program saved?
see Answer
XIII10
Try to answer the question below.
What color is the sky on a clear day ?
see Answer
XIII11
I have a hard disk drive with a capacity of 120,000,000,000 bytes. How many gigabytes is this? How many megabytes?
see Answer
XIV1
How is WAP different than bluetooth?
see Answer
XIV2
I am creating an array matrix for a boat dock to show houseboat reservations. They have 25 houseboats, I need to store the number of days reserved by houseboat number and by month of the year and by home state of the customer.
They want to keep up with customers from each state of the United States and to use another array element for foreign countries.
Assuming I use a two byte integer to store the number of days reserved, what is the minimum number of bytes necessary to store this array?
see Answer
XV1
"Android Nim", "Bee Wary", "Dueling Droids", and "Dancing Demon".
Who wrote these computer games and what is significant about them?
see Answer
XV2
If I have a file on my Windows XP computer named "Test.vbs", what type of file is it? How is it created? If I click on this file with my left mouse button, what program will Windows associate with this file?
see Answer
XV3
During setup Windows XP may or may not install an ACPI HAL. How is this determination made?
see Answer
XV4
If I find a file on my computer with the file extension .swf, what program should I use to open the file?
see Answer
XV5
If you had visited Alan Kay's workshop at Xerox in 1979, what might you have found there?
see Answer
XV6
What is the output of the following program?
    A$="Saddam Hussein"
    T=0
    FOR Z=1 TO LEN(A$)
       T=T+ASC(MID$(A$,Z,1))
    NEXT Z
    PRINT T

see Answer
XV7
What is the next character in this sequence?
xyz{|}
see Answer
XV8
You are in a maze of twisty little passages, all alike...
Magic word 'XYZZY'
A huge green fierce snake bars the way!
With what? Your bare hands?
PLUGH
Who? What? When?
see Answer
XV10
As a group, what are these?
see Answer
XV11
If I must use Samba, what do you know about my network?
see Answer
XV12
What are these and what does each one do?
see Answer

Jump back to War of the Minds.

| Welcome| Index| New| Review| Map| Top Pages|


Last revised November 19, 2003.

URL: http://www.kyphilom.com/duane/womcom1.html

Go to Top Menu.. ..of Duane & Eva's Old Kentucky Home Page

Duane Bristow (oldky@kyphilom.com)

Please send comments.
All contents copyright (C) 2001, Duane Bristow. All rights reserved.