CS101 FINAL TERM BY ARHAM - DWNLD From
CS101 FINAL TERM BY ARHAM - DWNLD From
OBJECTIVEs
1. A computer translator is best described as System Software
2. Which of the following data type is used for a variable having whole numeric values Integer.
3. Each pass through a loop is called a(n) Literation
4. TUG robot can carry medications of 450
5. THE field of NLP tends towards which direction All
6. Which of the following is a block element of HTML? <table>
7. ………….. is a band coding environmental for writing and editing HTML and JavaScript Adobe
Dreamweaver Code View.
8. XML stands for? Extra modem link Extensible Mark Up Language.
9. Compilers and editors come under which type of software System Software.
10. In Which type of SDLC, interaction of the system with outside world is defined as Requirement
Analysis.
11. Previously computers were based on dedicated ......... CPUs, those CPUs performed Only One Task
12. Which of the following testing technique focus on the functional requirements of the software? Black
Box Testing.
13. Which of the following is not the primary area of the concern in design phase? Architecture.
14. Which of the following symbol is used for grouping in a pseudo code 0.
15. Hearing loss due to computer is more common in those listening to. High Volume.
16. Consider the XML statement <staff clef=’’treble ‘’><?staff> and tell what is the value of
attribute in the statement ?Treble.
17. Specific legal rights which protect the owners of IP are IPR
18. Privacy uses the theory of: Natural Rights
19. Generally, the technique is used to transmit passwords securely over the internet Encryption.
20. DVD stands for. Digital Versatile Disk.
21. MS word is a part of ... Microsoft Office.
22. Button to increase and decrease size of text are available on Font Group.
23. Font effects include ...... Italicize
24. What will be the output of = MIN(A6:A8) in the given table 34
25. Shortcut key to insert new comment in MS word is Shift +F2
26. We can store ……... samples per seconds for long distance telephone: A3
27. Address of sheet containing value “5”in given below: ……. B2
28. An interrupt converts the CPU into previdlge mode and transfers control to within the operating system
...... Interrupt Handler
29. Page group options include ……. Page Break
30. Title page of documents is called ………Cover Page
31. When we share the document with others and wants them to understand it easily we can add
:……Comments
32. A one dimensional array with ...... elements could be used to store the number of times each alphabet letter
occurs in a page of text ......... 26
33. Inserting a new entry at the top of a stack is called ….an entry Pushing
34. We often refer to the number of nodes in the longest path from the root to leaf as the ….. of the tree Depth
35. The nodes at the other extremes called …. nodes ........ Terminal
37. How many bytes store in 1 Megabyte? 1048
79. In the case of incremental model these prototypes evolve into the complete, final system, a process known
as Evolutionary
80. A stronger form of cohesion is also called as ……….. cohesion Functional
81. The syntax for using && is Cmd1 & Cmd2
82. {count<<i;l=i+1;} How many times loops will execute 5
83. Inti=1; While (I,=5) {Count<<I; I=i+1;} ... 5
84. From a lay person’s perspective design is often equated with Software Lifecycle
85. How many relational operators are offered by C++? 6
86. …. Is not a phase of SDLC Problem Identification
87. The software of binary digit is 2
88. …… Model allows the development process only in one direction………Water Fall
89. A translator which takes assembly language program as in produce machine language code as output is
known as ……Assembler
90. Stakeholders can be a. Government Agencies
91. The description of the objects properties is called …Class
92. The syntax for using && is CMD & CMD2
93. Week cohesion is also called as …………. Cohesion Logical
94. Which of the following language is related to functional paradigm LISP
95. Which of the following is not the reason due to which a software is moved to maintenance
stage……Repair Process
96. The description of the objects properties is called …Class
97. In the case of highly standardized languages compiler designers often provide features, sometimes called
Language Extension
98. The traditional development phase of the software lifecycle does not include the stage Maintenance
99. An alternative to translators ,… Interpreter
100. Recurring problems which are handled by the pre developed module in software design is called
……Design Pattern
101. …… is aimed to give detail explanation about the use and features of the software User Documentation
102. How many relational operators are offered by C++? 6
103. The traditional development phase of the software lifecycle does not include the stage, Maintenance
104. In structure chart functions are represented by… Arrows
105. ….. are generally used for the creation of loosely coupled systems factory Design Patter
106. True parallel processing requires CPU cores …Multiple
107. Which software testing refers to tests that do not rely on knowledge the software’s interior composition
Black Box Testing
108. Float CGPA=3.5; If (CGPA>=3.0) Count<<”Give scholarship”; Else Count<<” Sorry
you do not qualify for the scholarship” Sorry You Do Not Qualify For This Scholarship.
110. If the result after comparison of two variables in relational operators False, then if statement returns
value 0.
111. Which one is not a valid data type? HTML
112. …………. Model allows the development process only in one direction……Waterfall
113. In the case of highly standardized languages compiler designers often provide features, sometimes called
Factory Design Pattern
114. Which of the following is correct for .... incremental model? 1st Increment Is Simplified Version
115. … are the sophisticated software packages that are primarily designed for the software Ideas
116. Which phase provides a road map for developers during project planning SYSTEM ANALYSIS
117. If the result after comparison of two variables in relational operators False, then if statement returns
value……O
118. Which documentation is required that can be used for software maintenance later on in the software
User Documentation
119. …………. Is not a phase of SDLC Problem Identification
120. The incremental Model can be equated sometimes with the … mode Lterative
121. Which of the following is correct for incremental modes......1st Increment Is Simplified Version
122. The traditional development phase of the software lifecycle does not include the stage Maintenance
123. We use ………… to reduce unnecessary dependencies or effects or modules. Information Hiding
124. Which of the following is the correct syntax to initialize a 3element integer array in
C/C++?.........Intarr[3]=(1,2,3)
125. Which software testing refers to tests that do not rely on knowledge the software’s interior composition
Black Box Testing
126. Which of the following technique is used in software testing that examines the functionality of an
application without peering into its internal structures or workings……. Black Box Testing
127. Which of the following statement is used for output in C++… Count<<
128. How many choices are possible when using a single if-else statement 2
129. Which one is unary operator? Not
130. Which of the following is the contrast of the declarative paradigm? Object D Oriented Paradigm
131. Which of the following is the traditional approach of programming process? Imperative Paradigm
132. ..... Refers to data items that can take on only the values true or false…Boolean
133. In object-oriented paradigm each object will have its own collections of functions which is known
as…… Method
134. Writing programs in a machine language is a tedious task that leads to errors that must be located and
corrected Debugging
135. 5%2 would give 1
136. Which of the following might be used to convert high level language instructions into machine
language…. An Interpreter
137. A ………… alters the execution sequence of program Control Statement
138. Page group includes options:… Cover Page
139. A mark or any other distinctive sign associated with products is called Trademark
140. We can customize indentation with R Uler
141. Retailers manage record of their costumers Purchasers
142. Social sites includes:…… Twitter
143. Computer science has made hacking bank account:…… Possible
144. Attacks that can be made to prevent access to web sites dDOS
145. Software licenses provide end users with the right to one or more copies of the software without
Violating Copyrights
146. Learning procedural knowledge usually involves a process Trialand-Error
147. Which of the following is a robot used in medical field:…… Belgian Robot
148. Shortcut to select the whole text in a document:…… Ctrl+A
149. Editing group have commands 3
150. Matching geometric characteristics technique cannot read: …… Handwritten Material
151. Content filtering is used to implement company policies related To INFORMATION SYSTEM
152. The location that is used to temporary store the information that has been cut from somewhere:…
Clipboard
153. A Sequential File is a file that is accessed in a serial manner from its beginning to its end as though the
information in the file were arranged in one long row.
154. Arrange Group is in which ribbon of MS Word? Page Layout
155. Justify option is used to give spaces to the paragraph on left and right side ....... Equal
156. Shortcut to insert a new comment in MS word is Shift+F2
157. The people present around the e-waste gain Diseases
158. The field of Artificial intelligence is being pursued along paths … 2
159. People are working in sitting position and thus have more chance to develop:. Obesity
160. Privacy is the "right to be let alone" is written by:…… Samuel D. Warren
161. The shortcut key that Track Changes is Ctrl+Shift+E.
162. Information that was once buried in arcane records has become accessible Database
163. In the United States is the Privacy Act of 1974 whose purpose was to protect citizens from abusive use
of databases Government
164. Want to reapply a command, you can use Redo
165. Displaying text in two columns feature is in which tab of MS word Page Layout
166. There are many types of sensors All of These (Microphones, Cameras, Range Sensors)
167. Matching geometric characteristics techniques of recognizing images is used in…. Optical Imaging
Recognition.
168. Electronic Theft include Online Scam
169. How many common forms of data mining? .... 2 (Class Description and Class Discrimination)
170. Act that gives parents control over what information websites can collect from kids Is:….. Coppa
171. Text files, which are _ in which each logical record is a single symbol encoded using ASCII or Unicode
Sequential Files
172. Actions according to environment knowledge: …. Intelligent Action
173. Ribbon has types of Commands Three
174. Plagiarism is a major problem in Education
175. Data comes from All of The Above
176. Which of the following acts as a security guard between the Internet and your local area network
Firewall
177. Ctrl+y is used for Redo
178. Ctrl+z is used for: Undo
179. Process of understanding what the characteristics of images is step Two
180. Researchers are trying to develop systems that exhibits intelligent behaviour in_ track:. Engineering
181. The option of justify is in group Paragraph
182. The option of bullets is in group:. Paragraph
183. The option of strike through is in group:… Font
184. Hyperlinks have by default color:…. Blue
185. Format painter is in group of:….. Clipboard
186. Process of understanding what the characteristics of images means refer to:…. Image Analysis
187. Undo is used by:… Ctrl+Z
188. In Belgian Pepper Robot works in:….. Hospitals
189. The part where different bullets options are given is called:……. Bullet Library
190. Software licenses are:… All Of These (Proprietary, Free, Open Source)
191. Proofing Group is in which ribbon of MS word? Review
192. Word provides you preformatted text boxes through Text Box
193. A program DOCTOR developed by Joseph Weizenbaum in the mid-1960s named as:… Eliza
194. The amount of paper American use in a year is: ……85 Million Tons
195. One method that got on social media is the idea of a parent/child cell phone: ……Contract
196. Pages is an option in the ribbon: Insert 60. When we draw a table in MS word the table have Initial
column(s):…… One
197. A patent can last:…. 20 Years
198. Content filtering works by matching _ of characters Strings
199. Procedural knowledge is learning :…… “ How”
200. Declarative knowledge is learning …… “What”
201. We can add charts in MS word from group Illustrations
202. Illustration is part of ribbon Insert
203. Shortcut to insert end note …. Ctrl+Shift+D
204. Shortcut to insert footnote…… Alt+Ctrl+F
205. major component of syntactic analysis is :…… Parsing
206. Command that can immediately go to a page or any marked location within your document Go To
207. The test that matches will have a chance to pass to Turing was of 5 Minutes
208. Each statement in a natural language can have Multiple Meanings
209. Shortcut key of paste is Ctrl+V
210. Act that mandates about financial institutions must deal with the private information of individuals
Gramm-Leach-Bliley Act
211. Meaning of a statement in natural language depends on its Context
212. Copyright can be applied on … All Of These (Dramatic Works, Artistic
213. and Musical Works)
214. Content Risks include:…. Harmful Advice
215. Information security Risks include:…. Malicious Code
216. Sequential Files are ideal for storing data that will be processed in the order in which the file’s entries
are stored.
217. To select shapes that are hidden or behind the text we can click: …Select Objects
218. We have paste options:… Multiple
219. Reports can be received at home through email because of investment in:.. Computer Science
220. Font group includes options: ….All Of These (Typefaces, Highlight, Font Size)
221. Attacks can be made to prevent access to websites by crashing: ….Servers
222. Meaning of a statement in natural language depends on the manner in which it is: Communicated
223. Paragraph group have option:…. Shading
224. Arial is a famous type of:…. Font Family
225. option is MS word prevent others from making changes to the selected text…. Block Authors
226. Sometimes when a device is continuously running it damages us by: Radiations
227. In some cases, the data collection process is readily apparent; In Others It Is Subtle
228. Usual way of protecting software is : Copyright
229. When we apply header it is shown at:…. Every Page Of The Document
230. Programming languages are well-designed so that each statement has meaning:.. Only One
231. AI is helping to make…. Robots
231. Act that ranges government restrictions on wire taps to include transmissions of data is: ECPA
232. We have to write an equation with 2 as a number and 3 as its power. Which option can be used for this
purpose:….. Superscript
233. In context of environment, computer science have impacts: B oth positive & negative
234. Shortcut key of Cut is: …..Ctrl+X
235. Turing gave a percentage of a machine that will have a chance to pass Turing test in year:….. 2000
236. Paste option is a part of home ribbon group called:….. Clipboard
237. The communication between people because of computer science has:…… Improved
238. Eye for long amount of time is not meant to look:…. 2 D
239. Home ribbon contains groups : All Of These (Paragraph, Font, Clipboard)
240. We can highlight a text from group:…. Font
241. Microsoft office includes:…. Word
242. MS Word is an example of:…. Word processors
243. Content filters are part of Internet:…. Firewalls
244. The default theme of MS word is:…. Office
245. Table group is a part of _ ribbon….. Insert
246. We can decrease indent from group:….. Paragraph
247. Insert tab can have group:…. Pages
248. If we want to end a page at a specific point and move to the next page we can use:..Page Break
249. Computer science helps in faster response times through: …All of The Given (Emails, Instant
Messaging, Chat)
250. Access to the forbidden literature because of: …Computer
251. Style groups in MS word can have:….. Shading
252. Data can come from:…… All of these (Emails, Personal software, Passwords)
253. Gaming addiction can cause problems: …..Financial
254. Content filtering is serving for purpose of: ……All of these(Security, Socialism, Transaction)
255. The style group in the home ribbon is the:….. Fourth group
257. We can set line spacing from group:…… Paragraph
258. Self-driven cars are example of:…. AI
259. Legal notations to control digital ownership are: …..Copyrights
260. The fifth group in the home ribbon is the:…. Editing
261. Find option includes: ….All of these (Find, Advance find, Go to)
262. Shortcut key to select whole text in a document: ….Ctrl+A
263. The Turing test result of program DOCTOR developed by Joseph Weizenbaum was: …. Passed
264. With computer science the access to private information has: …. Increased
265. Pre written mathematical expressions or formulas are called:…. Symbol
266. In turn the collected information is potentially available to:…. all of these (marketing firms, political
parties, employers)
267. The field of linguistic tends towards which direction: … Theoretical
268. CAN-SPAM Act applies in: US ]
269. Data mining is practiced on data collections, called data warehouses…… Static
270. Easy access to online health centres is because of : …….Computer Science
271. Theoretical track is a part of:….. AI domain
272. The approach leads to a simulation-oriented methodology….. Theoretical
273. The approach leads to a performance-oriented methodology. Engineering
274. …… maximizes the Word window on the screen and removes all toolbars etc to allow easy reading
Read Mode
275. A is a specially formatted letter that appears at the beginning of a paragraph just like you see in
newspapers or in books drop cap
276. Are a way to keep track of reading…… Bookmarks
277. We can perform text through ............ Text box
278. …….is used to combine different relations into one relation ....... JOIN
279. Inserting a new entry at the top of stack is called …..an entry……Pushing
280. Conditional statements, which are used within another conditional statements, are called….Nesting
conditional statements
281. The chance of machine to pass tuning test according to tuning were 30%
282. A process over internet can interact with other processes as a ;….All(client,server,peer)
283. Which of the following is not an INLINE element of HTML? <ul>
284. Adaptive dictionary encoding technique is also called ….Dynamic dictionary encoding
285. Operation calculating NOT of the OR can be represented as…..NOR
286. The importance of software design can be summarized in a single word which is …..Efficiency
287. The ability of GIF is to encode ……makes it unstable for application in which higher precation is
required….256 colors
288. In which stage of SDLC interaction of the system with outside world is defined …..Requirement
analysis
289. Rational unified process was created by ….IBM
290. Using HTTP protocol ,hypertext documents are normally transferred between ….and …Browser and
web server
291. The internet and computers have made it easier for spiteful people to attack people via the anonymous
platform is ……Cyber Bullying
292. Content Risk can be…….Illegal content
293. Software licensing terms and conditions usually include…….All(Fair use of software,limitations of
hability,warranties and disclaimers)
294. What is the level of recursion to find 899 in following array?(2,5,7,99,899)…….Level 1
295. …….tracks contain more information in mass storage system…..Outer
296. Which of the following is used to sort on the basis of more than one column in MS Excel…..Basic sort
297. What will be the output of the following excel formula?if A1=4,B1- =15,C1=17,(A1^(B1+C1)\2…8
298. The evalution process for the determination of software product that satisfy all the conditions is known
as……Software validation
299. Imperative paradigm is also known as …….Procedural paradigm
300. A computer translator is best described as System soft ware
301. One typical medical robot can alleviate a person …….times a day 40
302. Robots in comparison of humans are able to take blood from the veins ,……accurately
303. HTML stands for Hyper tool markup language
304. XML stands for …..Extensible markup language
305. Which option in MS Access provides the ability to enter new record and navigate through existing
records easily Forms
306. Orignally the length of IP address is ……..32-bits
307. The idea of storing a computer’s program in its main memory is known as .... Stored program concept
308. A person involved with the entire development process, requirements analysis and design
steps……Software analysts
309. Which of the following symbol used for grouping in a pseudo code……()
310. Computer science allows hospitals to be managed ….Efficiently
311. Message sent from source to destination via internet usually passes through…layers architecture.Two
312. EPIC is a research centre that is Non profitable
313. USB and Fire Wire are examples of high speed data transfer over a ……Short distance
314. …….is a step of steps that define how a task is performed ....... Algorithm
315. The home tab in Excel and power point are Similar
316. Which of the following is valid type of sort in MS Excel Basic sort
317. We can have an equally spaced paragraph from left to right side through .......Justify
318. A good presentation slide should have maximum how many points 3
319. Which of the following is not a type of page margin in MS Word? Centre
320. Table templates can be added through Insert table
321. Using illustration group we can add Shapes
322. The point at which all the steps in a transaction have been recorded in the log is called Commit point
323. Columns in a relation are reffered to as Attributes
324. Which of these describes stepwise refinement? It Is Top Down Approach
325. In MS word A=r2 is ….Equation
326. Page group options include Page Break
327. Rows are identified by …..in the left most column of MS Excel Numbers
328. We can modify a style by ….Settings
329. Things thought to be secure can be accessed by unintended sources such as ........ Email
330. ……..act prevents wrongful disclosure of an individual’s personality ‘identifiable information stemming
from their rental material……Video primary protection
331. …….is a process in which operating system is loaded from mass storage to main memory Booting
332. The importance of software design can be summarized in a single word which is ….Quality
333. Fetal Therac -25 X ray radiation is an example of Software failure
334. The symbol << is known as…..operator Extraction
335. Which option in MS Access provides provides the ability to enter ..... new record and negative through
existing record only Forms
336. What will be the output of the following LISP statement List Atom
337. What does ICANN stands for …. Internet Corporation for Assigned Names and Numbers
338. If the result after comparison of two variables in relational operators ……… false then if statement
returns value 0
339. Soft ware engineering is an engineering discipline that is concerned with ….All aspects of software
production
340. Stakeholders can be a Government agencies
341. The description of the object’s properties is called……Class
342. An alternative to translators …..Interpreter
343. Recurring problems which are handled by the pre developed module in software design is
called…..Design pattern
344. In structure chart functions are represented by ….Arrows
345. ….are generally used for the creation of loosely coupled systems….. Factory Design System
346. True parallel processing requires ….CPU cores ……Multiple
347. Which one is not a valid data type? HTML
348. The incremental model can be required some times with the model……Iterative
349. Contrl structure which iterates a set of instructions based on the provided conditions,is called Loop
350. Which of the following is the correct syntax to initialize a 3 element integer array in C\c++……int
arr[3]=(1,2,3)
351. In structure chart functions are represented by Arrows
352. In object oriented paradigm each object will have its own collector of functions which is known
as….Method
SUBJECTIVEs
1. Define Artificial Intelligence?
Artificial Intelligence (AI) is a specialized field of Computer Science that aims at building such
Computer Systems which can act intelligently. AI is helping to make Robots and self-driving cars.
5. What Is Trademark?
A trademark is a mark (logo) or other distinctive sign applied to or associated with products or
services, which does not describe the products or services. (Once registered the trademark IPR is unlimited.)
The average American household throws away 13,000 pieces of paper (around 1 billion trees in total
in USA) each year. Most in the form of packaging and junk mail.
Due to the usage of computer, the above waste of trees is minimizing in the world.
16.What Is Webpage?
A web page is nothing more than a file, a HTML file to be exact. It's called HTML because web
page documents have the file extension .html or .htm. A web browser displays a web page on a monitor or
mobile device. We can use WebPages to display information to a large audience.
18.Define Database?
Database, also called electronic database, any collection of data, or information, that is specially
organized for rapid search and retrieval by a computer. Databases are structured to facilitate the storage,
retrieval, modification, and deletion of data in conjunction with various data-processing operations. A
database management system (DBMS) extracts information from the database in response to queries.
in a more useful format. In particular, a DBMS contains routines that translate commands stated in terms
of a conceptual view of the database into the actions required by the actual data storage system. This
conceptual view of the database is called a database model.
+, -, and * are the same as used in the mathematics. However, the “/” has a difference. If one of the
operands is decimal number, then it results in the same way as in mathematics, for example: 5.0/2.0 would
result into 2.5. However, when both operands are integers, then it would truncate the decimal point and 5/2
would result into 2. The remaining “1” can be acquired by using the modulus operator (%). 5%2 would give
1.
27.What Is Control Statement?
A control statement alters the execution sequence of the program. Of all the programming constructs. if
(condition)
StatementA
else
StatementB.
31.Define Debugging?
Writing programs in a machine language is a tedious task that often leads to errors that must be
located and corrected a process known as debugging.
Trojan Horses
❖ Unlike viruses, they are stand-alone programs
❖ The look like what they are not
❖ They appear to be something interesting and harmless (e.g. a game) but when they are executed,
destruction results
Logic- Or Time-Bombs
• It executes its payload when a predetermined event occurs
• Example events:
✓ A particular word or phrase is typed
✓ A particular date or time is reached
Worms
Harmless in the sense that they only make copies of themselves on the infected computer
Harmful in the sense that it can use up available computer resources (i.e. memory, storage,
processing), making it slow or even completely useless Designing, writing, or propagating malicious
code or participating in any of the fore-mentioned activities can result in criminal prosecution, which
in turn, may lead to jail terms and fines!
Holographic storage:
Holographic data storage is a potential replacement technology in the area of high-capacity
data storage currently dominated by magnetic and conventional optical data storage.
35. What Is Semantic Web and How Is It Different from Normal Web? (2 Marks)
Symantec Web:
The Semantic Web is the future generation in WWW technology. It envisages information from
diverse sources being easily combined and used in profoundly different and more powerful ways.
SW programs or SW/HW systems designed to perform complex tasks employing strategies that
mimic some aspect of human thought.
41. What Is a Compiler? Write Its One Benefit Over Interpreter? (5 Marks)
Compiler:
Compiler translates the program written in a HLL in one go. The translated code is then used by
the up whenever the program needs to be run.
To run a program you've written, e.g. in JAVA, it must first be translated into machine code so the
computer can read it. This is what compilers and interpreters do. However, compilers convert the code all at
once, save it, and then run it; whereas interpreters translate the code one line at a time, as it is run.
Interpreters tend to result in faster translating of code so they are used mostly for debugging. This
is because if you used a compiler, you'd have to re-compile your entire project every time you changed one
little thing.
47. How Can We Include Images in A Web Page Using HTML And Java Script? (3
Marks)
Images in HTML
It is quite straight forward to include gif and jpg images in an HTML webpage using the <IMG>
tag. Format:
<img src=URL, alt=text height=pixels width=pixels align="bottom/middle/top">
Images in java script can be manipulated in many ways using the built in object image.
Properties: name,border,complete,height,width,hspace,bspace,lowsrc,src
Methods: none
49. Differentiate Between for And While Loop By Writing The Syntax Of Both Loops.
(5 Marks)
The only difference between FOR loop and WHILE loop is the syntax for defining them. There is
no performance difference at all.
Syntax of both loops
For( x = 99 ; x < 6000 : x = x + 1)
{ document . write (x) :}
While (tanks full == false )
{ tank = tank + bucket : }
Document. write ("tank is full now");
50. Can A Human Doctor Be Replaced By An Expert System? Give Reasons To Support
Your Answer. (5 Marks)
Yes, a human doctor can be replaced by an expert system because systems that, in some limited
sense, can replace an expert. Expert system can act as intelligent assistant to human experts or serve as a
resource to people who may not have access to expert. And also the purpose of all application (expert system)
is not to replace our human experts but to make their knowledge and experience more widely available.
a. Distance learning has received a boost due to the low price of internet and the availability of web
based interactive content.
b. Physical location is less of a hindrance now.
c. It has also become possible for students to interact with other students as well as teachers situated
along distance from them.
d. Students enrolled in distance education programs have more control over what they want to learn,
how and when they want to learn.
e. The lack of face to face interaction and immediate questions and answers reduce the amount of
knowledge that can be transferred from the teacher to the students.
f. Computer based distance education may be the only source of high quality education for many,
especially those in remote locations.
g. Distance education is the best mode of education and convenient, which has become more
effective with the augmentation of computer based learning.
h. Distance learning is also world most important education system by which we can study at home
and manage or get our study materials online.
i. Also Distance learning allows us to refer online quizzes, assignments timely.
j. By this field of computing one can get billions of knowledge by searching through internet.
54. What Are the Responsibilities and Profile Of A Team Lead? (5 Marks)
Team Lead
❖ Responsibilities:
Planning and tracking of the project
Detailed design
Professional development of team members – In case of small teams, development activities
❖ Profile:
55. Is Tabular Data Storage Better Than Flat File Data Storage?
Yes, tabular data storage is better than flat file data storage
56. What Are Local or Function-Level Variables?
In computer science, a local variable is a variable that is given local scope. Such a variable is
accessible only from the function or block in which it is declared. In programming languages with only two
levels of visibility, local variables are contrasted with global variables, on the other hand, many ALGOL-
derived languages allow any number of levels of nested functions with private variables, functions, constants
and types hidden within them.
59. What Is The Preferred Organizational Structure For The Organization? (3 Marks)
Preferred Organizational Structure for organization is hierarchal. Where there is different departments
interconnected with each other and are been divided according to the functions they perform.
62. How Dos Attack Is a Cyber Crime? For What Cyber Crime Can Be Used? (5 Marks)
DoS stands for Decline of Service and it is a cybercrime as it jams and in some cases shut down
the targeted computer by sending too much unnecessary data packets to it which ultimately exceeds the
normal processing eventually results the computer or server to stuck and unable to provide services to others.
It can be used to destroy the fame and diminishing of no of users requesting information and services from
that particular server or computer.
63. What Are The Elements Of Website Design? Any One (1 Mark)
Elements Of Webdesign
There are in 3 elements of web design and below are their names:
• Navigation scheme
• Overall look and feel
• Layout of information
68.How Many Types of Errors Can Be Found During A Program Development? List
Them. (3 Marks)
o Syntax errors
o Semantic errors
o Run-time errors
69.Why The Number of Temporary Workers Is On The Rise? Discuss Main Reasons? (5
Marks)
Temporary Workers:
Temporary workers are those workers which a company can hire to perform a certain task with
in a defined time period. Temporary workers are mostly consultants which move organization to organization
to perform assigned workers.
Reasons:
Now-a-days; whole world is suffering from financial crisis, most of the companies have frozen there
hiring, just in case they need a resource they are looking for a temporary worker for a specified time
span to perform a specialized task and they just pay him for that period of time.
Temporary workers are mostly consultants which have expertise in a certain field and they are
considered specialists in that field. 3. Employer doesn’t need to train the temporary worker.
74. Can You Define a Consistent Web Design? Why Is It Needed? (3 Marks)
A consistent web design is Easy understandable, not with heavy graphics, easy navigation. It is
needed because most of the website views leave the site because of poor navigation and not easy to
understand, text and design is not clear etc.
76.What Are The Advantages Of Multimedia Presentations? Write Any Five. (5 Marks)
Multimedia presentation is a great tool for effective communication:
Advantages:
A large database of knowledge can be added to and kept up to date, it can store more knowledge than
a person.
The Expert System cannot FORGET or get facts wrong.
It survives forever. There is no loss of knowledge as there is when a doctor retires.
The Expert System can access specialist knowledge that a doctor may not have.
78. Explain the Following Issues Of Data Management? (3+4+3)
Data Entry
Data Updates
Data Security
DATA ENTRY:
o There is new data entered every day.
o New customers are added every day.
o Some of the data entry requires the manual entry into computer system.
o New data entry needs to be entered correctly
DATA UPDATES:
❖ Old titles must be removed regularly.
❖ Data changes every time
❖ Prices change
ANIMATE GIFS:
We can save 16 gif images of the previous example in a single file in the form of an animated
gif, and then used it in a regular <IMG> tag to display a moving image. However, JavaScript provide better
control over the sequencing and the gap between the individual images.
80. What Are The Types Of Computer Network According To The Distance Between
Nodes? (5 Mark)
Types of Computer Networks according to the distance between nodes
LAN: Local Area Network)
WAN: Wide Area Network)
LAN
A network of computers located in the same building or a handful of nearby buildings Examples:
Computer network at your PVC
Computer network of a university campus
WAN
A network in which computers are separated by great distances, typically across cities or even
continents. May consist of several interconnected LANs Example:
The network connecting the ATM of a bank located in various cities
A network connecting the local and oversea offices of a SW house –Internet
81. What Is the Difference Between Internet and Intranet? (2 Marks)
There's one major distinction between an intranet and the Internet: The Internet is an open, public space,
while an intranet is designed to be a private space. An intranet may be accessible from the Internet, but as a
rule it's protected by a password and accessible only to employees or other authorized users.
86. How Marketing Strategies Are Changed with The Progress In Computing? How
New Marketing Strategies Are Implemented? (5 Marks)
Marketing Strategy Changes with the new requirements of the modern era and the applications
of the business. The web has changed marketing strategy from a mass focus to single person focus. We
collected data and analyze accordingly to find out the behavior of the market and end users. In new marketing
more advertising is being done through email and web and get feedback.
FTP ( File Transfer Protocol): This protocol is used to upload and download the files on remote computers.
Telnet: FTP allows file operations only while Telnet can log on to a computer of other users through TCP/IP
network and use like a local user, it help in testing of remote web server.
Instant Messaging: This is the service of messaging provided on the internet like MSN messenger, Yahoo
messenger, through which we interact people randomly whenever required.
VOIP: Voice over IP, It is used to transmit the voice from one IP to another IP, In which voice is first broken
down and then transmitted over a network.
Antivirus: This is the software design for preventing your system from harmful effects and maintain the
speed of computer. This software is available on the CD’s and DVD’s. These software continuously monitor
the systems and aware when any harmful virus is detected and asked for the further operations. Some
automatically remove the viruses from the system.
91.How Can You Define a Consistent Web Design? Why Is It Needed? (3 Marks)
A consistent web design is Easy understandable, not with heavy graphics, easy navigation. It is
needed because most of the website views leave the site because of poor navigation and not easy to
understand, text and design is not clear etc.
92.Elaborate Vector Or Object Oriented Graphics With At least One Example. (3 Marks)
Vector treats everything that is drawn as object, they are resolution in dependent and relatively small
file size. For example, swg, svg, wmf.
93.What Are The Advantages Of Multimedia Presentations? Write Any Five. (5 Marks)
Multimedia presentation is a great tool for effective communication:
Advantages:
ANIMATE GIFS:
We can save 16 gif images of the previous example in a single file in the form of an animated
gif, and then used it in a regular <IMG> tag to display a moving image. However, JavaScript provide better
control over the sequencing and the gap between the individual images.
96. What Are Application Software? List Down the Names of Three Application
Software (3 Marks)
Application Software are that software then can interact directory with the user for performance
of respective type of work.
that is DBA. In the old system many people are writing the data in registers and then its also very difficult to
find the specific record.
Now we can see companies are hiring:- Data Entry Operators, System Engineers Software Developer
DBA etc.
104. How Dos Attack Is A Cyber Crime? For What Cyber Crime Can Be Used? (3
Marks)
DoS is the crime but of a new type. A new type for policing system is required to tackle such
crimes. Cyber Crime can be used to Damage a home computer, Bring down the Business, Weaken the
financial and defense system of country.
108. How Marketing Strategies Are Changed With The Progress In Computing? How
New Marketing Strategies Are Implemented? (5 Marks)
Marketing Strategy Changes with the new requirements of the modern era and the applications of the
business. The web has changed marketing strategy from a mass focus to single person focus. We collected
data and analyze accordingly to find out the behavior of the market and end users. In new marketing more
advertising is being done through email and web and get feedback.
110. Explain How Many Ways Businesses Monitor Their Employees? (3 Marks)
Systems are available that monitor or most every key stroke that an employee makes on computer.
Systems are available that read and sensor all incoming and outgoing email. It is quite straight forward to
monitor where you surf and when.
112. Elaborate Vector Or Object Oriented Graphics With At Least One Example. (3
Marks)
Treats everything that is drawn an object. Objects retain their identity after their drawn. These objects
can later be easily moved stretched duplicated deleted etc are resolution independent relatively small size. e.
g. swf, wmf,
113. Why Should We, As Computing Professionals, Be Interested In Studying The Social
Implications Of Our Creations? (5 Marks)
This is imp. Because of keeping the track of money wise while implementation actually and see the
results. This fits with the organization or no. to check there is any side effects morally or no. we have to be
very careful while creation of any system., error free, data loose recovery. Etc.
Function is a reusable code (group of statement) that is executed when the function is called. It is also
known as sub-program. Function is normally defined in the head section of the code.
119. What Are The Sub Categories Of Artificial Intelligence? Briefly Explain Any Two.
(3 Marks)
Robotics
These are the machines which are computer programmed and perform work which was previously done
by humans. They can be found in the manufacturing industry, the military, space exploration and medical
applications.
Expert Systems
These systems are designed to replace an expert. The medical expert system is an example of such system
which can replace a Doctor/medical expert.
120. What Are The Steps Of Working Of TCP And IP Protocols In Internet
Transmission? (3 Marks)
TCP divide messages in to many packets (capsulation) and sent these messages over the internet and
IP route these messages on the internet to the correct destination and upon reaching the messages on its
destination the messages are encapsulated.
FTP is a service of internet. FTP was to transfer files between computers on ECP/IP network e.g.:-
simple commands allows the user to list, creators on a remote computer upload or downloads .Typical we
transferring web content from the developers PC to the web servers.
123. What Is The Data Normalization? Also Define Its Goal.(2 Marks)
It is to sort complex data into simple from. It uses to simplify the complex information to make it
more users friendly.
125. What Kind of New Jobs Are Created Because Of Computing? And Which Old
Professions Are Being Eliminated? (3 Marks)
Due to computing where people are getting benefits from automated system on the other hand the
people that are with KHATA system or manual system and they do not now anything about computer are
eliminated due to reasons before computer 4 people required in a office and now only 1 person required and
in old system many people are writing the data in a registers and then its abosvery difficult to find the specific
record but with the help of database we can store more than 1000 of information and only one person is
managing the whole data that is DBA.
Every machine on the Internet has a unique identifying number, called an IP Address. A typical IP
address looks like this:
216.27.61.137
131. Define Semantic Web with Respect to The Present Web? (2 Marks)
In the Semantic Web data itself becomes part of the Web and is able to be processed independently
of application, platform, or domain. This is in contrast to the World Wide Web as we know it today,
which contains virtually boundless information in the form of documents. We can use computers to
search for these documents, but they still have to be read and interpreted by humans before any useful
information can be extrapolated.
In star topology, the information is travel from the central hub or router to all the nodes, While in
Ring topology, the information is travel from nodes to nodes in a ring manner in one direction.
133. Code Using Java Script to Find the Even Number Between 0-20 (5 Marks)
for( i=0; i<=20; i++ ){
if( i % 2 == 0 ){
console.log(i); }}
134. HTML Page For File Upload Having Browse And Submit Query Buttons
<form action="/action_page.php">
<input type="file" id="arhamFile" name="filename">
<input type="submit">
</form>
135. Arrays in JavaScript
An array is a special variable, which can hold more than one value:
<script>
function arhamImage() {
alert("Arham’s image is loaded");
}
</script>
Onfocus
The onfocus event occurs when an element gets focus.
<script>
function arhamFunction(x) {
x.style.background = "White";
}
</script>
<input type="text" onfocus="arhamFunction()">
onBlur
The onblur event occurs when an HTML element loses focus.
<script>
function aizaFunc() {
let x = document.getElementById("arham");
x.value = x.value.toUpperCase();
}
</script>
Submit
<script>
function arhamFunc() {
Reset
The onreset event occurs when a form is reset.
<form onreset="aizaFunction()">
Enter name: <input type="text">
<input type="reset">
</form>
<script>
function aizaFunction() {
alert("The form was reset");
}
</script>
،ارگمتھجمںیموکیئبیعدوھکیوتھجمےسیہوہکیسکاورےسںیہن
،ویکہکناسبیعوکںیمےنیہدبانلہ۔۔۔۔یسکاورےنںیہن
،ارگےھجموہکوتتحیصنالہکےئگ۔۔۔۔۔اوروثاباھکلاجےئاگ
ن
اورارگیسکاورےسوہکےگوتتبیغالہکےئگگاہاھکلاجےئاگ۔
شیخ سعدی