0% found this document useful (0 votes)
86 views35 pages

CS101 FINAL TERM BY ARHAM - DWNLD From

1. The document contains objectives and questions from past papers for the final term of CS101 - Introduction to Computing course. It includes over 100 questions related to computing concepts like programming, software development lifecycle, operating systems, databases and more. 2. The questions are multiple choice and cover topics such as data types, loops, HTML, software testing, arrays, algorithms and more. 3. Contact information is provided at the top for the authors ARHAM and AIZA WRITES who compiled the objectives and questions from past files.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
86 views35 pages

CS101 FINAL TERM BY ARHAM - DWNLD From

1. The document contains objectives and questions from past papers for the final term of CS101 - Introduction to Computing course. It includes over 100 questions related to computing concepts like programming, software development lifecycle, operating systems, databases and more. 2. The questions are multiple choice and cover topics such as data types, loops, HTML, software testing, arrays, algorithms and more. 3. Contact information is provided at the top for the authors ARHAM and AIZA WRITES who compiled the objectives and questions from past files.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Spring 2023

CS101 – INTRODUCTION TO COMPUTING MAVERICKS


ALL OBJECTIVEs & SUBJECTIVEs FROM PAST FILES FOR FINAL TERM
FAM
🤖: AIZA WRITES |💻 : ARHAM ( +923351328979 ) | ✍️: AIZA WRITES

OBJECTIVEs
1. A computer translator is best described as System Software
2. Which of the following data type is used for a variable having whole numeric values Integer.
3. Each pass through a loop is called a(n) Literation
4. TUG robot can carry medications of 450
5. THE field of NLP tends towards which direction All
6. Which of the following is a block element of HTML? <table>
7. ………….. is a band coding environmental for writing and editing HTML and JavaScript Adobe
Dreamweaver Code View.
8. XML stands for? Extra modem link Extensible Mark Up Language.
9. Compilers and editors come under which type of software System Software.
10. In Which type of SDLC, interaction of the system with outside world is defined as Requirement
Analysis.
11. Previously computers were based on dedicated ......... CPUs, those CPUs performed Only One Task
12. Which of the following testing technique focus on the functional requirements of the software? Black
Box Testing.
13. Which of the following is not the primary area of the concern in design phase? Architecture.
14. Which of the following symbol is used for grouping in a pseudo code 0.
15. Hearing loss due to computer is more common in those listening to. High Volume.
16. Consider the XML statement <staff clef=’’treble ‘’><?staff> and tell what is the value of
attribute in the statement ?Treble.
17. Specific legal rights which protect the owners of IP are IPR
18. Privacy uses the theory of: Natural Rights
19. Generally, the technique is used to transmit passwords securely over the internet Encryption.
20. DVD stands for. Digital Versatile Disk.
21. MS word is a part of ... Microsoft Office.
22. Button to increase and decrease size of text are available on Font Group.
23. Font effects include ...... Italicize
24. What will be the output of = MIN(A6:A8) in the given table 34
25. Shortcut key to insert new comment in MS word is Shift +F2
26. We can store ……... samples per seconds for long distance telephone: A3
27. Address of sheet containing value “5”in given below: ……. B2
28. An interrupt converts the CPU into previdlge mode and transfers control to within the operating system
...... Interrupt Handler
29. Page group options include ……. Page Break
30. Title page of documents is called ………Cover Page
31. When we share the document with others and wants them to understand it easily we can add
:……Comments
32. A one dimensional array with ...... elements could be used to store the number of times each alphabet letter
occurs in a page of text ......... 26
33. Inserting a new entry at the top of a stack is called ….an entry Pushing
34. We often refer to the number of nodes in the longest path from the root to leaf as the ….. of the tree Depth
35. The nodes at the other extremes called …. nodes ........ Terminal
37. How many bytes store in 1 Megabyte? 1048

Efforts By : ARHAM & AIZA WRITES ------------------------------------------------- Page -1


CS101 – INTRODUCTION TO COMPUTING MAVERICKS
ALL OBJECTIVEs & SUBJECTIVEs FROM PAST FILES FOR FINAL TERM
FAM
🤖: AIZA WRITES |💻 : ARHAM ( +923351328979 ) | ✍️: AIZA WRITES

38. How many bytes can store in 1 kilobyte? 1024


39. In imperative paradigm ,we start with finding …..and express this as sequence of :Algorithm Commands
40. Which of the following language is not related to functional paradigm:….. Scheme
41. The symbol << is known as ….operator , Insertion.
42. Relational in 11001101 identify the mantissa field M1104
43. ISP stands for ……. Internet Service Provider
44. Cluster computing describes a distributed system in which many computers work closely together to
provide computation Independent
45. Robots in comparison of humans are able to take blood from the veins .Accurately
46. When you search jaguar on google then,it will show the result of car and …..Animal
47. We Write .. operator then it will try to search all terms individually: Inurl
48. A test that shows the performance of Al model is called :…Turing Test
49. The problems are associated with general image analysis are:…Enormous
50. To understand natural language humans rely on :…….Additional Knowledge
51. Which operators are used to compare the values of operands to produce logical value in in C language?
Relational Operator
52. A software consists of ……. Set Of Instruction + Operating Procedure
53. Which of the following is the first phase of software development life cycle? Requirement Analysis.
54. The importance of software design can be summarized in a single word which is :… Quality
55. Which of the following is not related to white box testing………Clear Box Testing
56. In RGB we have ……bytes 3
57. Content filtering can be used to implement company’s …. policies. =
58. An important component within today’s GUI shells is the …..Window Manager
59. In Excel, Rows are labeled as …..1,2,3 Etc
60. Example of combination command is ……Underline
61. If we have pasted the text in wrong line and want to cancel this action we can use command…….Undo
62. We can perform sort from group:…….Paragraph
64. Which one of the following will not be considered as the use of word processor? Making Ledger
65. In style menu we can ……All Of These
66. Sniffing software records user activates and report them to Intruder
67. When we want to move to a book mark we select it and click on the button:…..Move
68. What will the output of the following excel formula? If A1=4,B1=6,C1=2,=(B1^(A1- C1)\2……48
69. What will be the output of following excel formula……12.5
70. Address of the cell containing value 4 in spread sheet given below is …… A2
71. We can insert a preformatted sidebar text box through :……Text Box
72. When we are using themes in MS word the tool tip indicates themes ; ........... Current
73. The select operation extracts ……from a relation :……Rows
74. A one-dimensional array with …. elements could be used to store the number of times each alphabet letter
occurs in page of text 26
75. A …… array consists of multiple rows and columns in which positions are identified by pairs of
indices…….2-Dimentional
76. The simplest form of array is the …. array …. . Dimention
77. ….. ,is a phase that make distinction between the tasks of software analyst and a programmer
Implementation
78. We use … to reduce unnecessary dependencies or effects or modules Information Hiding

Efforts By : ARHAM & AIZA WRITES ------------------------------------------------- Page -2


CS101 – INTRODUCTION TO COMPUTING MAVERICKS
ALL OBJECTIVEs & SUBJECTIVEs FROM PAST FILES FOR FINAL TERM
FAM
🤖: AIZA WRITES |💻 : ARHAM ( +923351328979 ) | ✍️: AIZA WRITES

79. In the case of incremental model these prototypes evolve into the complete, final system, a process known
as Evolutionary
80. A stronger form of cohesion is also called as ……….. cohesion Functional
81. The syntax for using && is Cmd1 & Cmd2
82. {count<<i;l=i+1;} How many times loops will execute 5
83. Inti=1; While (I,=5) {Count<<I; I=i+1;} ... 5
84. From a lay person’s perspective design is often equated with Software Lifecycle
85. How many relational operators are offered by C++? 6
86. …. Is not a phase of SDLC Problem Identification
87. The software of binary digit is 2
88. …… Model allows the development process only in one direction………Water Fall
89. A translator which takes assembly language program as in produce machine language code as output is
known as ……Assembler
90. Stakeholders can be a. Government Agencies
91. The description of the objects properties is called …Class
92. The syntax for using && is CMD & CMD2
93. Week cohesion is also called as …………. Cohesion Logical
94. Which of the following language is related to functional paradigm LISP
95. Which of the following is not the reason due to which a software is moved to maintenance
stage……Repair Process
96. The description of the objects properties is called …Class
97. In the case of highly standardized languages compiler designers often provide features, sometimes called
Language Extension
98. The traditional development phase of the software lifecycle does not include the stage Maintenance
99. An alternative to translators ,… Interpreter
100. Recurring problems which are handled by the pre developed module in software design is called
……Design Pattern
101. …… is aimed to give detail explanation about the use and features of the software User Documentation
102. How many relational operators are offered by C++? 6
103. The traditional development phase of the software lifecycle does not include the stage, Maintenance
104. In structure chart functions are represented by… Arrows
105. ….. are generally used for the creation of loosely coupled systems factory Design Patter
106. True parallel processing requires CPU cores …Multiple
107. Which software testing refers to tests that do not rely on knowledge the software’s interior composition
Black Box Testing
108. Float CGPA=3.5; If (CGPA>=3.0) Count<<”Give scholarship”; Else Count<<” Sorry
you do not qualify for the scholarship” Sorry You Do Not Qualify For This Scholarship.
110. If the result after comparison of two variables in relational operators False, then if statement returns
value 0.
111. Which one is not a valid data type? HTML
112. …………. Model allows the development process only in one direction……Waterfall
113. In the case of highly standardized languages compiler designers often provide features, sometimes called
Factory Design Pattern
114. Which of the following is correct for .... incremental model? 1st Increment Is Simplified Version
115. … are the sophisticated software packages that are primarily designed for the software Ideas
116. Which phase provides a road map for developers during project planning SYSTEM ANALYSIS

Efforts By : ARHAM & AIZA WRITES ------------------------------------------------- Page -3


CS101 – INTRODUCTION TO COMPUTING MAVERICKS
ALL OBJECTIVEs & SUBJECTIVEs FROM PAST FILES FOR FINAL TERM
FAM
🤖: AIZA WRITES |💻 : ARHAM ( +923351328979 ) | ✍️: AIZA WRITES

117. If the result after comparison of two variables in relational operators False, then if statement returns
value……O
118. Which documentation is required that can be used for software maintenance later on in the software
User Documentation
119. …………. Is not a phase of SDLC Problem Identification
120. The incremental Model can be equated sometimes with the … mode Lterative
121. Which of the following is correct for incremental modes......1st Increment Is Simplified Version
122. The traditional development phase of the software lifecycle does not include the stage Maintenance
123. We use ………… to reduce unnecessary dependencies or effects or modules. Information Hiding
124. Which of the following is the correct syntax to initialize a 3element integer array in
C/C++?.........Intarr[3]=(1,2,3)
125. Which software testing refers to tests that do not rely on knowledge the software’s interior composition
Black Box Testing
126. Which of the following technique is used in software testing that examines the functionality of an
application without peering into its internal structures or workings……. Black Box Testing
127. Which of the following statement is used for output in C++… Count<<
128. How many choices are possible when using a single if-else statement 2
129. Which one is unary operator? Not
130. Which of the following is the contrast of the declarative paradigm? Object D Oriented Paradigm
131. Which of the following is the traditional approach of programming process? Imperative Paradigm
132. ..... Refers to data items that can take on only the values true or false…Boolean
133. In object-oriented paradigm each object will have its own collections of functions which is known
as…… Method
134. Writing programs in a machine language is a tedious task that leads to errors that must be located and
corrected Debugging
135. 5%2 would give 1
136. Which of the following might be used to convert high level language instructions into machine
language…. An Interpreter
137. A ………… alters the execution sequence of program Control Statement
138. Page group includes options:… Cover Page
139. A mark or any other distinctive sign associated with products is called Trademark
140. We can customize indentation with R Uler
141. Retailers manage record of their costumers Purchasers
142. Social sites includes:…… Twitter
143. Computer science has made hacking bank account:…… Possible
144. Attacks that can be made to prevent access to web sites dDOS
145. Software licenses provide end users with the right to one or more copies of the software without
Violating Copyrights
146. Learning procedural knowledge usually involves a process Trialand-Error
147. Which of the following is a robot used in medical field:…… Belgian Robot
148. Shortcut to select the whole text in a document:…… Ctrl+A
149. Editing group have commands 3
150. Matching geometric characteristics technique cannot read: …… Handwritten Material
151. Content filtering is used to implement company policies related To INFORMATION SYSTEM
152. The location that is used to temporary store the information that has been cut from somewhere:…
Clipboard

Efforts By : ARHAM & AIZA WRITES ------------------------------------------------- Page -4


CS101 – INTRODUCTION TO COMPUTING MAVERICKS
ALL OBJECTIVEs & SUBJECTIVEs FROM PAST FILES FOR FINAL TERM
FAM
🤖: AIZA WRITES |💻 : ARHAM ( +923351328979 ) | ✍️: AIZA WRITES

153. A Sequential File is a file that is accessed in a serial manner from its beginning to its end as though the
information in the file were arranged in one long row.
154. Arrange Group is in which ribbon of MS Word? Page Layout
155. Justify option is used to give spaces to the paragraph on left and right side ....... Equal
156. Shortcut to insert a new comment in MS word is Shift+F2
157. The people present around the e-waste gain Diseases
158. The field of Artificial intelligence is being pursued along paths … 2
159. People are working in sitting position and thus have more chance to develop:. Obesity
160. Privacy is the "right to be let alone" is written by:…… Samuel D. Warren
161. The shortcut key that Track Changes is Ctrl+Shift+E.
162. Information that was once buried in arcane records has become accessible Database
163. In the United States is the Privacy Act of 1974 whose purpose was to protect citizens from abusive use
of databases Government
164. Want to reapply a command, you can use Redo
165. Displaying text in two columns feature is in which tab of MS word Page Layout
166. There are many types of sensors All of These (Microphones, Cameras, Range Sensors)
167. Matching geometric characteristics techniques of recognizing images is used in…. Optical Imaging
Recognition.
168. Electronic Theft include Online Scam
169. How many common forms of data mining? .... 2 (Class Description and Class Discrimination)
170. Act that gives parents control over what information websites can collect from kids Is:….. Coppa
171. Text files, which are _ in which each logical record is a single symbol encoded using ASCII or Unicode
Sequential Files
172. Actions according to environment knowledge: …. Intelligent Action
173. Ribbon has types of Commands Three
174. Plagiarism is a major problem in Education
175. Data comes from All of The Above
176. Which of the following acts as a security guard between the Internet and your local area network
Firewall
177. Ctrl+y is used for Redo
178. Ctrl+z is used for: Undo
179. Process of understanding what the characteristics of images is step Two
180. Researchers are trying to develop systems that exhibits intelligent behaviour in_ track:. Engineering
181. The option of justify is in group Paragraph
182. The option of bullets is in group:. Paragraph
183. The option of strike through is in group:… Font
184. Hyperlinks have by default color:…. Blue
185. Format painter is in group of:….. Clipboard
186. Process of understanding what the characteristics of images means refer to:…. Image Analysis
187. Undo is used by:… Ctrl+Z
188. In Belgian Pepper Robot works in:….. Hospitals
189. The part where different bullets options are given is called:……. Bullet Library
190. Software licenses are:… All Of These (Proprietary, Free, Open Source)
191. Proofing Group is in which ribbon of MS word? Review
192. Word provides you preformatted text boxes through Text Box
193. A program DOCTOR developed by Joseph Weizenbaum in the mid-1960s named as:… Eliza

Efforts By : ARHAM & AIZA WRITES ------------------------------------------------- Page -5


CS101 – INTRODUCTION TO COMPUTING MAVERICKS
ALL OBJECTIVEs & SUBJECTIVEs FROM PAST FILES FOR FINAL TERM
FAM
🤖: AIZA WRITES |💻 : ARHAM ( +923351328979 ) | ✍️: AIZA WRITES

194. The amount of paper American use in a year is: ……85 Million Tons
195. One method that got on social media is the idea of a parent/child cell phone: ……Contract
196. Pages is an option in the ribbon: Insert 60. When we draw a table in MS word the table have Initial
column(s):…… One
197. A patent can last:…. 20 Years
198. Content filtering works by matching _ of characters Strings
199. Procedural knowledge is learning :…… “ How”
200. Declarative knowledge is learning …… “What”
201. We can add charts in MS word from group Illustrations
202. Illustration is part of ribbon Insert
203. Shortcut to insert end note …. Ctrl+Shift+D
204. Shortcut to insert footnote…… Alt+Ctrl+F
205. major component of syntactic analysis is :…… Parsing
206. Command that can immediately go to a page or any marked location within your document Go To
207. The test that matches will have a chance to pass to Turing was of 5 Minutes
208. Each statement in a natural language can have Multiple Meanings
209. Shortcut key of paste is Ctrl+V
210. Act that mandates about financial institutions must deal with the private information of individuals
Gramm-Leach-Bliley Act
211. Meaning of a statement in natural language depends on its Context
212. Copyright can be applied on … All Of These (Dramatic Works, Artistic
213. and Musical Works)
214. Content Risks include:…. Harmful Advice
215. Information security Risks include:…. Malicious Code
216. Sequential Files are ideal for storing data that will be processed in the order in which the file’s entries
are stored.
217. To select shapes that are hidden or behind the text we can click: …Select Objects
218. We have paste options:… Multiple
219. Reports can be received at home through email because of investment in:.. Computer Science
220. Font group includes options: ….All Of These (Typefaces, Highlight, Font Size)
221. Attacks can be made to prevent access to websites by crashing: ….Servers
222. Meaning of a statement in natural language depends on the manner in which it is: Communicated
223. Paragraph group have option:…. Shading
224. Arial is a famous type of:…. Font Family
225. option is MS word prevent others from making changes to the selected text…. Block Authors
226. Sometimes when a device is continuously running it damages us by: Radiations
227. In some cases, the data collection process is readily apparent; In Others It Is Subtle
228. Usual way of protecting software is : Copyright
229. When we apply header it is shown at:…. Every Page Of The Document
230. Programming languages are well-designed so that each statement has meaning:.. Only One
231. AI is helping to make…. Robots
231. Act that ranges government restrictions on wire taps to include transmissions of data is: ECPA
232. We have to write an equation with 2 as a number and 3 as its power. Which option can be used for this
purpose:….. Superscript
233. In context of environment, computer science have impacts: B oth positive & negative
234. Shortcut key of Cut is: …..Ctrl+X

Efforts By : ARHAM & AIZA WRITES ------------------------------------------------- Page -6


CS101 – INTRODUCTION TO COMPUTING MAVERICKS
ALL OBJECTIVEs & SUBJECTIVEs FROM PAST FILES FOR FINAL TERM
FAM
🤖: AIZA WRITES |💻 : ARHAM ( +923351328979 ) | ✍️: AIZA WRITES

235. Turing gave a percentage of a machine that will have a chance to pass Turing test in year:….. 2000
236. Paste option is a part of home ribbon group called:….. Clipboard
237. The communication between people because of computer science has:…… Improved
238. Eye for long amount of time is not meant to look:…. 2 D
239. Home ribbon contains groups : All Of These (Paragraph, Font, Clipboard)
240. We can highlight a text from group:…. Font
241. Microsoft office includes:…. Word
242. MS Word is an example of:…. Word processors
243. Content filters are part of Internet:…. Firewalls
244. The default theme of MS word is:…. Office
245. Table group is a part of _ ribbon….. Insert
246. We can decrease indent from group:….. Paragraph
247. Insert tab can have group:…. Pages
248. If we want to end a page at a specific point and move to the next page we can use:..Page Break
249. Computer science helps in faster response times through: …All of The Given (Emails, Instant
Messaging, Chat)
250. Access to the forbidden literature because of: …Computer
251. Style groups in MS word can have:….. Shading
252. Data can come from:…… All of these (Emails, Personal software, Passwords)
253. Gaming addiction can cause problems: …..Financial
254. Content filtering is serving for purpose of: ……All of these(Security, Socialism, Transaction)
255. The style group in the home ribbon is the:….. Fourth group
257. We can set line spacing from group:…… Paragraph
258. Self-driven cars are example of:…. AI
259. Legal notations to control digital ownership are: …..Copyrights
260. The fifth group in the home ribbon is the:…. Editing
261. Find option includes: ….All of these (Find, Advance find, Go to)
262. Shortcut key to select whole text in a document: ….Ctrl+A
263. The Turing test result of program DOCTOR developed by Joseph Weizenbaum was: …. Passed
264. With computer science the access to private information has: …. Increased
265. Pre written mathematical expressions or formulas are called:…. Symbol
266. In turn the collected information is potentially available to:…. all of these (marketing firms, political
parties, employers)
267. The field of linguistic tends towards which direction: … Theoretical
268. CAN-SPAM Act applies in: US ]
269. Data mining is practiced on data collections, called data warehouses…… Static
270. Easy access to online health centres is because of : …….Computer Science
271. Theoretical track is a part of:….. AI domain
272. The approach leads to a simulation-oriented methodology….. Theoretical
273. The approach leads to a performance-oriented methodology. Engineering
274. …… maximizes the Word window on the screen and removes all toolbars etc to allow easy reading
Read Mode
275. A is a specially formatted letter that appears at the beginning of a paragraph just like you see in
newspapers or in books drop cap
276. Are a way to keep track of reading…… Bookmarks
277. We can perform text through ............ Text box

Efforts By : ARHAM & AIZA WRITES ------------------------------------------------- Page -7


CS101 – INTRODUCTION TO COMPUTING MAVERICKS
ALL OBJECTIVEs & SUBJECTIVEs FROM PAST FILES FOR FINAL TERM
FAM
🤖: AIZA WRITES |💻 : ARHAM ( +923351328979 ) | ✍️: AIZA WRITES

278. …….is used to combine different relations into one relation ....... JOIN
279. Inserting a new entry at the top of stack is called …..an entry……Pushing
280. Conditional statements, which are used within another conditional statements, are called….Nesting
conditional statements
281. The chance of machine to pass tuning test according to tuning were 30%
282. A process over internet can interact with other processes as a ;….All(client,server,peer)
283. Which of the following is not an INLINE element of HTML? <ul>
284. Adaptive dictionary encoding technique is also called ….Dynamic dictionary encoding
285. Operation calculating NOT of the OR can be represented as…..NOR
286. The importance of software design can be summarized in a single word which is …..Efficiency
287. The ability of GIF is to encode ……makes it unstable for application in which higher precation is
required….256 colors
288. In which stage of SDLC interaction of the system with outside world is defined …..Requirement
analysis
289. Rational unified process was created by ….IBM
290. Using HTTP protocol ,hypertext documents are normally transferred between ….and …Browser and
web server
291. The internet and computers have made it easier for spiteful people to attack people via the anonymous
platform is ……Cyber Bullying
292. Content Risk can be…….Illegal content
293. Software licensing terms and conditions usually include…….All(Fair use of software,limitations of
hability,warranties and disclaimers)
294. What is the level of recursion to find 899 in following array?(2,5,7,99,899)…….Level 1
295. …….tracks contain more information in mass storage system…..Outer
296. Which of the following is used to sort on the basis of more than one column in MS Excel…..Basic sort
297. What will be the output of the following excel formula?if A1=4,B1- =15,C1=17,(A1^(B1+C1)\2…8
298. The evalution process for the determination of software product that satisfy all the conditions is known
as……Software validation
299. Imperative paradigm is also known as …….Procedural paradigm
300. A computer translator is best described as System soft ware
301. One typical medical robot can alleviate a person …….times a day 40
302. Robots in comparison of humans are able to take blood from the veins ,……accurately
303. HTML stands for Hyper tool markup language
304. XML stands for …..Extensible markup language
305. Which option in MS Access provides the ability to enter new record and navigate through existing
records easily Forms
306. Orignally the length of IP address is ……..32-bits
307. The idea of storing a computer’s program in its main memory is known as .... Stored program concept
308. A person involved with the entire development process, requirements analysis and design
steps……Software analysts
309. Which of the following symbol used for grouping in a pseudo code……()
310. Computer science allows hospitals to be managed ….Efficiently
311. Message sent from source to destination via internet usually passes through…layers architecture.Two
312. EPIC is a research centre that is Non profitable
313. USB and Fire Wire are examples of high speed data transfer over a ……Short distance
314. …….is a step of steps that define how a task is performed ....... Algorithm

Efforts By : ARHAM & AIZA WRITES ------------------------------------------------- Page -8


CS101 – INTRODUCTION TO COMPUTING MAVERICKS
ALL OBJECTIVEs & SUBJECTIVEs FROM PAST FILES FOR FINAL TERM
FAM
🤖: AIZA WRITES |💻 : ARHAM ( +923351328979 ) | ✍️: AIZA WRITES

315. The home tab in Excel and power point are Similar
316. Which of the following is valid type of sort in MS Excel Basic sort
317. We can have an equally spaced paragraph from left to right side through .......Justify
318. A good presentation slide should have maximum how many points 3
319. Which of the following is not a type of page margin in MS Word? Centre
320. Table templates can be added through Insert table
321. Using illustration group we can add Shapes
322. The point at which all the steps in a transaction have been recorded in the log is called Commit point
323. Columns in a relation are reffered to as Attributes
324. Which of these describes stepwise refinement? It Is Top Down Approach
325. In MS word A=r2 is ….Equation
326. Page group options include Page Break
327. Rows are identified by …..in the left most column of MS Excel Numbers
328. We can modify a style by ….Settings
329. Things thought to be secure can be accessed by unintended sources such as ........ Email
330. ……..act prevents wrongful disclosure of an individual’s personality ‘identifiable information stemming
from their rental material……Video primary protection
331. …….is a process in which operating system is loaded from mass storage to main memory Booting
332. The importance of software design can be summarized in a single word which is ….Quality
333. Fetal Therac -25 X ray radiation is an example of Software failure
334. The symbol << is known as…..operator Extraction
335. Which option in MS Access provides provides the ability to enter ..... new record and negative through
existing record only Forms
336. What will be the output of the following LISP statement List Atom
337. What does ICANN stands for …. Internet Corporation for Assigned Names and Numbers
338. If the result after comparison of two variables in relational operators ……… false then if statement
returns value 0
339. Soft ware engineering is an engineering discipline that is concerned with ….All aspects of software
production
340. Stakeholders can be a Government agencies
341. The description of the object’s properties is called……Class
342. An alternative to translators …..Interpreter
343. Recurring problems which are handled by the pre developed module in software design is
called…..Design pattern
344. In structure chart functions are represented by ….Arrows
345. ….are generally used for the creation of loosely coupled systems….. Factory Design System
346. True parallel processing requires ….CPU cores ……Multiple
347. Which one is not a valid data type? HTML
348. The incremental model can be required some times with the model……Iterative
349. Contrl structure which iterates a set of instructions based on the provided conditions,is called Loop
350. Which of the following is the correct syntax to initialize a 3 element integer array in C\c++……int
arr[3]=(1,2,3)
351. In structure chart functions are represented by Arrows
352. In object oriented paradigm each object will have its own collector of functions which is known
as….Method

Efforts By : ARHAM & AIZA WRITES ------------------------------------------------- Page -9


CS101 – INTRODUCTION TO COMPUTING MAVERICKS
ALL OBJECTIVEs & SUBJECTIVEs FROM PAST FILES FOR FINAL TERM
FAM
🤖: AIZA WRITES |💻 : ARHAM ( +923351328979 ) | ✍️: AIZA WRITES

SUBJECTIVEs
1. Define Artificial Intelligence?
Artificial Intelligence (AI) is a specialized field of Computer Science that aims at building such
Computer Systems which can act intelligently. AI is helping to make Robots and self-driving cars.

2. What Is Information Retrieval


Information retrieval refers to the task of identifying documents that relate to the topic at hand. An
example is the problem faced by users of the World Wide Web as they try to find the sites that relate to a
particular topic. The current state of the art is to search sites for key words, but this often produces an
avalanche of false leads and can overlook an important site because it deals with “automobiles” instead of
“cars.” What is needed is a search mechanism that understands the contents of the sites being considered.
The difficulty of obtaining such under- standing is the reason many are turning to techniques such as XML
to produce a semantic Web.

3. What Is Contextual Analysis?


At this level the context of the sentence is brought into the understanding process. For example, it
is easy to identify the grammatical role of each word in the sentence: “The bat fell to the ground.”

4. EPIC Stands For?


“Electronic Privacy Information Centre”

5. What Is Trademark?
A trademark is a mark (logo) or other distinctive sign applied to or associated with products or
services, which does not describe the products or services. (Once registered the trademark IPR is unlimited.)

6. What Is Digital Ownership?


Digital mediums have allowed information to flow more freely than before. This exchange of ideas
comes with a legal and ethical backlash. How can ownership be established in the digital realm? Things can
be easily copied and pasted online, which makes intellectual property hard to control. Legal notions such
as copyright have struggled to keep up with the digital era. Companies in the music and entertainment
industries have pushed for greater legal protections for intellectual properties while other activists have
sought to provide greater freedoms for the exchange of ideas in the digital realm.

7. What Are Positive Impacts of CS On Environment?


Computer Science has both positive and negative impacts on the environment as well.
Positive impact
 Paperless – Online reading and publishing.
 Americans use about 680 pounds of paper per person, per year
 This amounts to about 85 million tons of paper or 2 billion trees.

Efforts By : ARHAM & AIZA WRITES ------------------------------------------------- Page - 10


CS101 – INTRODUCTION TO COMPUTING MAVERICKS
ALL OBJECTIVEs & SUBJECTIVEs FROM PAST FILES FOR FINAL TERM
FAM
🤖: AIZA WRITES |💻 : ARHAM ( +923351328979 ) | ✍️: AIZA WRITES

 The average American household throws away 13,000 pieces of paper (around 1 billion trees in total
in USA) each year. Most in the form of packaging and junk mail.
 Due to the usage of computer, the above waste of trees is minimizing in the world.

8. What Is the Email-Spams and Laws?


As email spam continues to become a major issue, governments around the world have put specific
regulations in place to protect their citizens from spams.
Important Laws
 CAN-SPAM Act in US
 Canada’s Anti-Spam Legislation (CASL)
 Anti-spam law in Europe ✓ Spam Act of 2003 in Australia
 Africa, Asia and South America have looser spam-law requirements

9. What Is the Use of Hyperlink?


Hyperlink is used to add link of other documents or web pages in your Document.

10.What Are Social Issues of IT?


The growth in the availability of affordable computing technology has caused a number of major shifts
in the way that society operates. The majority of these have been for the better, however, some less positive
social issues generated as a direct result of technological advances. I,e
o Communication Breakdown
o Defamation of Character
o Access to forbidden literature
o Terrorism & Crime
o Education
o Health & Fitness
o Privacy
o Gaming Addiction
o Cyber Bullying
o Identity Theft

11. What Is Smart Art?


A new feature introduced in Word 2007 is Smart Art. Using Smart Art, you can communicate your
ideas visually. Whether it’s a process, hierarchy or life cycle all can be illustrated using Smart Art.

12.Name The Command of Editing Group In MS Word? OR How Many Commands Of


Editing Groups?
The commands in the Editing group are Find, Replace, and Select.

13.What Are the Steps to Create a Basic Formula in Excel?

Efforts By : ARHAM & AIZA WRITES ------------------------------------------------- Page - 11


CS101 – INTRODUCTION TO COMPUTING MAVERICKS
ALL OBJECTIVEs & SUBJECTIVEs FROM PAST FILES FOR FINAL TERM
FAM
🤖: AIZA WRITES |💻 : ARHAM ( +923351328979 ) | ✍️: AIZA WRITES

To create a basic formula, you need to do the following:


➢ Select the cell for the formula
➢ Type “=” (the equal sign) and the formula
➢ The formula is of sum which would sum the values.
➢ “:” is used to specify the range of the cell on which you want to apply the formula
➢ Click Enter

14.Define Formula in MS Excel?


A formula is a set of mathematical instructions that can be used in Excel to perform calculations.
Formals are started in the formula box starting with an = sign.

15.What Is Sorting and Filter?


Sorting and Filtering allow you to manipulate data in a worksheet based on given set of criteria.
You can sort the data in ascending and descending order.

16.What Is Webpage?
A web page is nothing more than a file, a HTML file to be exact. It's called HTML because web
page documents have the file extension .html or .htm. A web browser displays a web page on a monitor or
mobile device. We can use WebPages to display information to a large audience.

17.What Is Adobe Dreamweaver?


Adobe Dreamweaver is a web design and development application that provides a visual
WYSIWYG editor (What You See Is What You Get) and a code editor with standard features such as syntax
highlighting, code completion, and code collapsing as well as more sophisticated features such as real-time
syntax checking and code introspection for generating code hints to assist the user in writing code.
Dreamweaver is a powerful application for developing websites and mobile applications.

18.Define Database?
Database, also called electronic database, any collection of data, or information, that is specially
organized for rapid search and retrieval by a computer. Databases are structured to facilitate the storage,
retrieval, modification, and deletion of data in conjunction with various data-processing operations. A
database management system (DBMS) extracts information from the database in response to queries.

19.Define Schema and Subschema?


A schema is a description of the entire database structure that is used by the database software to
maintain the database. A subschema is a description of only that portion of the database pertinent to a
particular user’s needs.

20.What Is Relational Database Model?


We have repeatedly seen how abstraction can be used to hide internal complexities. Database
management systems provide yet another example. They hide the complexities of a database’s internal
structure, allowing the user of the database to imagine that the information stored in the database is arranged

Efforts By : ARHAM & AIZA WRITES ------------------------------------------------- Page - 12


CS101 – INTRODUCTION TO COMPUTING MAVERICKS
ALL OBJECTIVEs & SUBJECTIVEs FROM PAST FILES FOR FINAL TERM
FAM
🤖: AIZA WRITES |💻 : ARHAM ( +923351328979 ) | ✍️: AIZA WRITES

in a more useful format. In particular, a DBMS contains routines that translate commands stated in terms
of a conceptual view of the database into the actions required by the actual data storage system. This
conceptual view of the database is called a database model.

21.What Is Inexpensive DBMS?


Inexpensive database management systems for personal use are relatively simple systems. They
tend to have a single objective—to shield the user from the technical details of the database implementation.
The databases maintained by these systems are relatively small and generally contain information whose
loss or corruption would be inconvenient rather than disastrous. When a problem does arise, the user can
usually correct the erroneous items directly or reload the database from a backup copy and manually make
the modifications required to bring that copy up to date. This process might be inconvenient, but the cost of
avoiding the inconvenience tends to be greater than the inconvenience itself. In any case, the inconvenience
is restricted to only a few people, and any financial loss is generally limited.

22.Define Commit Point?


The Point at Which All the Steps In A Transaction Have Been Recorded In The Log Is Called The
Commit Point.

23.How Many Types of Locks? Mentions Their Names:


Two types of locks are common
Shared Locks and Exclusive Locks.
If a transaction is not going to alter a data item, then it requires shared access, meaning that other
transactions are also allowed to view the data. However, if the transaction is going to alter the item, it must
have exclusive access, meaning that it must be the only transaction with access to that data.
24.Define Prototype:
Prototype: Incomplete version of the Proposed system called prototypes, are built and evaluated
in iterative and incremental models.

25.Define Water Fall Model and Incremental Models:


Water fall model: is a linear, Sequential approach to the software development lifecycle (SDLC) that is
popular in software engineering and product development
Incremental Model: is a process of software development where requirements divided into multiple
standalone modules of the software development cycle.

26.Write The Arithmetic Operators Examples:


C-language has the following arithmetic operators:
+ Addition
- Subtraction
* Multiplication
/ Division
% Modulus

Efforts By : ARHAM & AIZA WRITES ------------------------------------------------- Page - 13


CS101 – INTRODUCTION TO COMPUTING MAVERICKS
ALL OBJECTIVEs & SUBJECTIVEs FROM PAST FILES FOR FINAL TERM
FAM
🤖: AIZA WRITES |💻 : ARHAM ( +923351328979 ) | ✍️: AIZA WRITES

+, -, and * are the same as used in the mathematics. However, the “/” has a difference. If one of the
operands is decimal number, then it results in the same way as in mathematics, for example: 5.0/2.0 would
result into 2.5. However, when both operands are integers, then it would truncate the decimal point and 5/2
would result into 2. The remaining “1” can be acquired by using the modulus operator (%). 5%2 would give
1.
27.What Is Control Statement?
A control statement alters the execution sequence of the program. Of all the programming constructs. if
(condition)
StatementA
else
StatementB.

28.Define Heterogeneous Array?


In contrast to an array in which all data items are the same type, an aggregate type (also called a
structure, a record, or sometimes a heterogeneous array) is a block of data in which different elements can
have different types. For instance, a block of data referring to an employee might consist of an entry called
Name of type character, an entry called Age of type integer, and an entry called Skill Rating of type float.
Such an aggregate type would be declared in C by the statement.

29.How Many Types Of Data Types? Write Their Names?


Integer: refer to numeric data consisting of whole numbers, probably stored using two’s complement
notation.
Float: Sometimes called real refers to numeric data that might contain values other than whole numbers,
probably stored in floating-point notation.
Character: refer to data consisting of symbols, probably stored using ASCII or UNICODE.
Boolean: Refers to data items that can take on only the values true or false.
30.Define Machine Language?
Programs for modern computers consist of sequences of instructions that are encoded as numeric
digits. Such an encoding system is known as a machine language.

31.Define Debugging?
Writing programs in a machine language is a tedious task that often leads to errors that must be
located and corrected a process known as debugging.

32.What Are The Purpose Of Mnemonic System?


In the 1940s, researchers simplified the programming process by developing notational systems
by which instructions could be represented in mnemonic rather than numeric form. For example, the
instruction move the contents of register 5 to register 6 would be expressed as: 4056 using the machine
language introduced in Figure 46, whereas in a mnemonic system it might appear as:
MOV R5, R6

Efforts By : ARHAM & AIZA WRITES ------------------------------------------------- Page - 14


SPRING 2023

CS101 – INTRODUCTION TO COMPUTING MAVERICKS


ALL OBJECTIVEs & SUBJECTIVEs FROM PAST FILES FOR FINAL TERM
FAM
🤖: AIZA WRITES |💻 : ARHAM ( +923351328979 ) | ✍️: AIZA WRITES

As a more extensive example, the machine language routine


156C
166D
5056
306E C000
which adds the contents of memory cells 6C and 6D and stores the result at location 6E (Figure
46) might be expressed as LD R5,Price
LD R6, ShippingCharge
ADDI R0,R5 R6
ST R0,TotalCost
HLT
using mnemonics. (Here we have used LD, ADDI, ST, and HLT to represent load, add, store, and
halt. Moreover, we have used the descriptive names Price, ShippingCharge, and TotalCost to refer to the
memory cells at locations 6C, 6D, and 6E, respectively. Such descriptive names are often called program
variables or identifiers.) Note that the mnemonic form, although still lacking, does a better job of
representing the meaning of the routine than does the numeric form.

33. Write A Note on Other Virus Like Programs (10)


Other Virus-Like Programs
There are other computer programs that are similar to viruses in some ways but different in some
others. Three types:
➢ Trojan horses
➢ Logic- or time-bombs
➢ Worms

Trojan Horses
❖ Unlike viruses, they are stand-alone programs
❖ The look like what they are not
❖ They appear to be something interesting and harmless (e.g. a game) but when they are executed,
destruction results

Logic- Or Time-Bombs
• It executes its payload when a predetermined event occurs
• Example events:
✓ A particular word or phrase is typed
✓ A particular date or time is reached

Worms
 Harmless in the sense that they only make copies of themselves on the infected computer
 Harmful in the sense that it can use up available computer resources (i.e. memory, storage,
processing), making it slow or even completely useless Designing, writing, or propagating malicious
code or participating in any of the fore-mentioned activities can result in criminal prosecution, which
in turn, may lead to jail terms and fines!

34. What Is Holographic Storage? (2 Marks)

Efforts By : ARHAM & AIZA WRITES ------------------------------------------------- Page - 15


CS101 – INTRODUCTION TO COMPUTING MAVERICKS
ALL OBJECTIVEs & SUBJECTIVEs FROM PAST FILES FOR FINAL TERM
FAM
🤖: AIZA WRITES |💻 : ARHAM ( +923351328979 ) | ✍️: AIZA WRITES

Holographic storage:
Holographic data storage is a potential replacement technology in the area of high-capacity
data storage currently dominated by magnetic and conventional optical data storage.

35. What Is Semantic Web and How Is It Different from Normal Web? (2 Marks)
Symantec Web:
The Semantic Web is the future generation in WWW technology. It envisages information from
diverse sources being easily combined and used in profoundly different and more powerful ways.

36. Write The Types of Computer Networks? (2 Marks)


Types of Computer Networks according to the network access policy
 Private
 Public
37. What Are Structured Vector Graphics? (3 Marks)
Structured Vector Graphics
 New format; may become more popular than Flash
 Plug-in required
 Text-file storage; search engine friendly
38. What Is in Line Java Script Event Handling? (5 Marks)
In-Line JavaScript Event Handling:
Event handlers are placed in the BODY portion of a Web page as attributes of HTML Tags
The event handler attribute consists of 3 parts:
o The identifier of the event handler
o The equal sign
o A string consisting of JavaScript statements enclosed in double or single quotes Multiple JavaScript
statements (separated by semicolons) can be placed in that string, but All have to fit in a single line;
no new line characters are allowed in that string Due to this limitation, sophisticated event handling
is not possible with in-line event Handling
39. Define the Term 3D Rendering? (2 Marks)
3D Rendering:
The process of converting information about 3D objects into a bit map that can be displayed on a 2D
computer display Computationally, very expensive!
Steps:
 Draw the wire-frame (skeleton, made with thin lines)
 Fill with colors, textures, patterns
 Add lighting effects (reflections shadows)
40. What Is an Intelligent System? (2 Marks)
Intelligent system:

Efforts By : ARHAM & AIZA WRITES ------------------------------------------------- Page - 16


CS101 – INTRODUCTION TO COMPUTING MAVERICKS
ALL OBJECTIVEs & SUBJECTIVEs FROM PAST FILES FOR FINAL TERM
FAM
🤖: AIZA WRITES |💻 : ARHAM ( +923351328979 ) | ✍️: AIZA WRITES

SW programs or SW/HW systems designed to perform complex tasks employing strategies that
mimic some aspect of human thought.

41. What Is a Compiler? Write Its One Benefit Over Interpreter? (5 Marks)
Compiler:
Compiler translates the program written in a HLL in one go. The translated code is then used by
the up whenever the program needs to be run.
To run a program you've written, e.g. in JAVA, it must first be translated into machine code so the
computer can read it. This is what compilers and interpreters do. However, compilers convert the code all at
once, save it, and then run it; whereas interpreters translate the code one line at a time, as it is run.

Interpreters tend to result in faster translating of code so they are used mostly for debugging. This
is because if you used a compiler, you'd have to re-compile your entire project every time you changed one
little thing.

42. Who Is a Computing Professional? (3 Marks)


Computing Professional
Computer scientists, software engineers, computer engineers, and some of the Telecom engineers
are generally classified as computing professionals

43. What Is ICMP? (3 Marks)


ICMP stands for Internet Control Message Protocol.

44. What Is ARPANET And Who Developed It? (5 Marks)


The Advanced Research Projects Agency Network (ARPANET), was the world's first
operational packet switching network and the core network of a set that came to compose the global Internet.
The network was created by a small research team at the Massachusetts Institute of Technology and the
Defense Advanced Research Projects Agency (DARPA) of the United States Department of Defense. The
packet switching of the ARPANET was based on designs by Lawrence Roberts of the Lincoln Laboratory.

45. Write Down the Advantages Of Natural Language Processing. (5 Marks)


If your question is more specifically about prolog vs the more commonly seen OO languages I
would argue that you're really comparing apples to oranges - the "advantage" (such as it is) is just a different
way of thinking about the world, and sometimes changing the way you ask a question provides a better tool
for solving a problem.
46. What Is Meant By Universal Access Of Internet Services? (2 Marks)
Universal access of internet services means same functionality to every one.

47. How Can We Include Images in A Web Page Using HTML And Java Script? (3
Marks)
Images in HTML

Efforts By : ARHAM & AIZA WRITES ------------------------------------------------- Page - 17


CS101 – INTRODUCTION TO COMPUTING MAVERICKS
ALL OBJECTIVEs & SUBJECTIVEs FROM PAST FILES FOR FINAL TERM
FAM
🤖: AIZA WRITES |💻 : ARHAM ( +923351328979 ) | ✍️: AIZA WRITES

It is quite straight forward to include gif and jpg images in an HTML webpage using the <IMG>
tag. Format:
<img src=URL, alt=text height=pixels width=pixels align="bottom/middle/top">

Images In Java Script

Images in java script can be manipulated in many ways using the built in object image.
Properties: name,border,complete,height,width,hspace,bspace,lowsrc,src
Methods: none

Event handler: on Abort, on error, on load etc.

48. Define Primary Key and Queries? (3 Marks)


Primary Key
Primary key is a field that uniquely identifies each record stored in a table.
Queries
Queries are used to view, change, and analyse data. They can be used to combine data from
different table and extract the exact data that is desired. 4. What is a compound condition? Give example. (3
marks)

49. Differentiate Between for And While Loop By Writing The Syntax Of Both Loops.
(5 Marks)
The only difference between FOR loop and WHILE loop is the syntax for defining them. There is
no performance difference at all.
Syntax of both loops
For( x = 99 ; x < 6000 : x = x + 1)
{ document . write (x) :}
While (tanks full == false )
{ tank = tank + bucket : }
Document. write ("tank is full now");

50. Can A Human Doctor Be Replaced By An Expert System? Give Reasons To Support
Your Answer. (5 Marks)
Yes, a human doctor can be replaced by an expert system because systems that, in some limited
sense, can replace an expert. Expert system can act as intelligent assistant to human experts or serve as a
resource to people who may not have access to expert. And also the purpose of all application (expert system)
is not to replace our human experts but to make their knowledge and experience more widely available.

51. How Education Is Changed Because Of Advancements In The Field Of Computing?


(10 Marks)

Efforts By : ARHAM & AIZA WRITES ------------------------------------------------- Page - 18


CS101 – INTRODUCTION TO COMPUTING MAVERICKS
ALL OBJECTIVEs & SUBJECTIVEs FROM PAST FILES FOR FINAL TERM
FAM
🤖: AIZA WRITES |💻 : ARHAM ( +923351328979 ) | ✍️: AIZA WRITES

a. Distance learning has received a boost due to the low price of internet and the availability of web
based interactive content.
b. Physical location is less of a hindrance now.
c. It has also become possible for students to interact with other students as well as teachers situated
along distance from them.

d. Students enrolled in distance education programs have more control over what they want to learn,
how and when they want to learn.
e. The lack of face to face interaction and immediate questions and answers reduce the amount of
knowledge that can be transferred from the teacher to the students.
f. Computer based distance education may be the only source of high quality education for many,
especially those in remote locations.
g. Distance education is the best mode of education and convenient, which has become more
effective with the augmentation of computer based learning.
h. Distance learning is also world most important education system by which we can study at home
and manage or get our study materials online.
i. Also Distance learning allows us to refer online quizzes, assignments timely.
j. By this field of computing one can get billions of knowledge by searching through internet.

52. What Is the Database? (2 Marks)


Database:
❖ A collection of data organized in such a fashion that the computer can quickly search for a desired
data item
❖ All data items in it are generally related to each other and share a single domain
❖ They allow for easy manipulation of the data
❖ They are designed for easy modification & reorganization of the information they contain
❖ They generally consist of a collection of interrelated computer files.
53. What Do You Mean by FTP Or File Transfer Protocol? (3 Marks)
File Transfer Protocol (FTP), a standard Internet protocol, is the simplest way to exchange files
between computers on the Internet. Like the Hypertext Transfer Protocol (HTTP), which transfers
displayable Web pages and related files, and the Simple Mail Transfer Protocol (SMTP), which transfers e-
mail, FTP is an application protocol that uses the Internet's TCP/IP protocols. FTP is commonly used to
transfer Web page files from their creator to the computer that acts as their server for everyone on the Internet.
It's also commonly used to download programs and other files to your computer from other servers.

54. What Are the Responsibilities and Profile Of A Team Lead? (5 Marks)
Team Lead
❖ Responsibilities:
 Planning and tracking of the project
 Detailed design
 Professional development of team members – In case of small teams, development activities
❖ Profile:

Efforts By : ARHAM & AIZA WRITES ------------------------------------------------- Page - 19


CS101 – INTRODUCTION TO COMPUTING MAVERICKS
ALL OBJECTIVEs & SUBJECTIVEs FROM PAST FILES FOR FINAL TERM
FAM
🤖: AIZA WRITES |💻 : ARHAM ( +923351328979 ) | ✍️: AIZA WRITES

o 5+ years of development experience


o Excellent interpersonal skills
o Good planning skills
o Good design skills

55. Is Tabular Data Storage Better Than Flat File Data Storage?
Yes, tabular data storage is better than flat file data storage
56. What Are Local or Function-Level Variables?
In computer science, a local variable is a variable that is given local scope. Such a variable is
accessible only from the function or block in which it is declared. In programming languages with only two
levels of visibility, local variables are contrasted with global variables, on the other hand, many ALGOL-
derived languages allow any number of levels of nested functions with private variables, functions, constants
and types hidden within them.

57. What Is A Function? Give One Example. (2 Marks)


User Define Functions are used to define its own T-Sql Function which can have 0 or more input
parameters and Returns a single scalar data value type or table data type.
We have three type of UDF:-
 Scalar user defined function
 Inline table valued Function
 Multiple tables valued function
58. What Is the Data Normalization? Also Define Its Goal. (2 Marks)
Data normalization is to sort out complex data into simple form. It uses to simplify the complex
information to make it more user-friendly.

59. What Is The Preferred Organizational Structure For The Organization? (3 Marks)
Preferred Organizational Structure for organization is hierarchal. Where there is different departments
interconnected with each other and are been divided according to the functions they perform.

60. Differentiate Local And Global Variables. (3 Marks)


Local variables are the variables have limited scope while global have bigger scope Local
variables are not accessed by others while global is accessible to everyone Local variable used by single user
while global variable can be used by different users at time from all around.

61. Elaborate Vector or Object-Oriented Graphics With At Least One Example. (3


Marks)
Object Oriented Graphics are the graphics which are generally oriented towards the objects and
have good quality to portray objects these graphics are object oriented and use in animation, games and
movies as well.

Efforts By : ARHAM & AIZA WRITES ------------------------------------------------- Page - 20


CS101 – INTRODUCTION TO COMPUTING MAVERICKS
ALL OBJECTIVEs & SUBJECTIVEs FROM PAST FILES FOR FINAL TERM
FAM
🤖: AIZA WRITES |💻 : ARHAM ( +923351328979 ) | ✍️: AIZA WRITES

62. How Dos Attack Is a Cyber Crime? For What Cyber Crime Can Be Used? (5 Marks)
DoS stands for Decline of Service and it is a cybercrime as it jams and in some cases shut down
the targeted computer by sending too much unnecessary data packets to it which ultimately exceeds the
normal processing eventually results the computer or server to stuck and unable to provide services to others.
It can be used to destroy the fame and diminishing of no of users requesting information and services from
that particular server or computer.

63. What Are The Elements Of Website Design? Any One (1 Mark)
Elements Of Webdesign
There are in 3 elements of web design and below are their names:
• Navigation scheme
• Overall look and feel
• Layout of information

64.What Kind Of Information Can Be Stored In A Database?(2 Marks)


➢ Numbers, Booleans, text
➢ Sounds
➢ Images
➢ Video

65.Why Hub Is Used In Networks? (2 Marks)


HUB: Hub is networking component which can be used to connect the networks and it can also be
used to extend the size of networks. Simply it can be explained as a common connection point for devices
in a network. It contains multiple ports like 8port, 16 port , 23 port hubs

66.Write Names of The Dos Attack’s Phases? (2 Marks)


DoS (Denail of service): DoS attach has in total 3 phases and below they are listed:
 Search
 Arm
 Attack

67.What Do You Mean by FTP Or File Transfer Protocol? (3 Marks)


FTP: File transfer protocol was first introduced in 1973; it standardized the transfer of files between
computers on a TCP/IP network (e.g internet). It can download or upload files to a remote computer using
the FTP protocol Operations performed using FTP:
o List, change, create folders on a remote computer
o Upload and download files
Usage: Transferring Web content from the developer’s PC to the Web server

68.How Many Types of Errors Can Be Found During A Program Development? List
Them. (3 Marks)
o Syntax errors

Efforts By : ARHAM & AIZA WRITES ------------------------------------------------- Page - 21


CS101 – INTRODUCTION TO COMPUTING MAVERICKS
ALL OBJECTIVEs & SUBJECTIVEs FROM PAST FILES FOR FINAL TERM
FAM
🤖: AIZA WRITES |💻 : ARHAM ( +923351328979 ) | ✍️: AIZA WRITES

o Semantic errors
o Run-time errors

69.Why The Number of Temporary Workers Is On The Rise? Discuss Main Reasons? (5
Marks)
Temporary Workers:
Temporary workers are those workers which a company can hire to perform a certain task with
in a defined time period. Temporary workers are mostly consultants which move organization to organization
to perform assigned workers.
Reasons:
 Now-a-days; whole world is suffering from financial crisis, most of the companies have frozen there
hiring, just in case they need a resource they are looking for a temporary worker for a specified time
span to perform a specialized task and they just pay him for that period of time.
 Temporary workers are mostly consultants which have expertise in a certain field and they are
considered specialists in that field. 3. Employer doesn’t need to train the temporary worker.

70.Define Network Organization? What Are Important Features Of Network


Organization? (4+6)
Network Organization:
Network organization is an interfirm organization that is characterized by organic or informal
social systems. A company or group of companies that has a minimum of formal structures and relies instead
on the formation and dissolution of teams to meet specific objectives.
Features of Network Organization:
➢ The organizations are learning that business can be done in a more effective manner if emphasis is
placed upon cooperation, shared responsibility and networking:
➢ Within the organization
➢ And also with their customers and suppliers
➢ Changes according to the demand of the times
➢ Works effectively to meet the business goals of the organization
➢ Everyone has a feeling that he/she is playing a major role in the organization which eventually gives
a feel of ownership and because of that employee can put his best effort to accomplish a task.
71. For What Purposes FTP Is Used in Networks? (2 Marks)
To download or upload files / data to a remote computer

72.How Can You Define a Readable Program? (2 Marks)


a. program that is easy to read & understand also easy to maintain and enhance.

73.What Is the Preferred Organizational Structure for The Organization? (2 Marks)


The Network Organization: It is becoming the preferred organizational structure.

74. Can You Define a Consistent Web Design? Why Is It Needed? (3 Marks)

Efforts By : ARHAM & AIZA WRITES ------------------------------------------------- Page - 22


CS101 – INTRODUCTION TO COMPUTING MAVERICKS
ALL OBJECTIVEs & SUBJECTIVEs FROM PAST FILES FOR FINAL TERM
FAM
🤖: AIZA WRITES |💻 : ARHAM ( +923351328979 ) | ✍️: AIZA WRITES

A consistent web design is Easy understandable, not with heavy graphics, easy navigation. It is
needed because most of the website views leave the site because of poor navigation and not easy to
understand, text and design is not clear etc.

75. Elaborate Vector or Object-Oriented Graphics With At least One Example.


Vector treats everything that is drawn as object, they are resolution in dependent and relatively
small file size. For example, swg, svg, wmf.

76.What Are The Advantages Of Multimedia Presentations? Write Any Five. (5 Marks)
Multimedia presentation is a great tool for effective communication:
Advantages:

❖ Easy to make last minute change


❖ More attractive
❖ Can include animation, videos etc.
❖ Better presentation easy to understandable for participants comparing to manual presentation.
❖ Undo feature

77.Can A Human Doctor Be Replaced by An Expert System? Give Reasons To Support


Your Answer. (5 Marks)
Expert System is a computer system which simulates the knowledge and expertise of a human
expert. Yes, a human doctor can be replaced by an Expert System. Following are the reasons to support my
answer:

 A large database of knowledge can be added to and kept up to date, it can store more knowledge than
a person.
 The Expert System cannot FORGET or get facts wrong.
 It survives forever. There is no loss of knowledge as there is when a doctor retires.
 The Expert System can access specialist knowledge that a doctor may not have.
78. Explain the Following Issues Of Data Management? (3+4+3)
 Data Entry
 Data Updates
 Data Security

DATA ENTRY:
o There is new data entered every day.
o New customers are added every day.
o Some of the data entry requires the manual entry into computer system.
o New data entry needs to be entered correctly
DATA UPDATES:
❖ Old titles must be removed regularly.
❖ Data changes every time
❖ Prices change

Efforts By : ARHAM & AIZA WRITES ------------------------------------------------- Page - 23


CS101 – INTRODUCTION TO COMPUTING MAVERICKS
ALL OBJECTIVEs & SUBJECTIVEs FROM PAST FILES FOR FINAL TERM
FAM
🤖: AIZA WRITES |💻 : ARHAM ( +923351328979 ) | ✍️: AIZA WRITES

❖ Transportation / shipping cost changes


❖ Customer personal data changes
❖ Schemes changing, new offers
❖ Every new entry needs to be entered correctly
DATA SECURITY:
All data in the system is very critical to its operation, the security of the customer’s personal data
is most important. Most of the hackers are always trying for that type of information specially Credit Card
Numbers.
This problem can be managed by using proper security arrangements and mechanisms that
provides access to only authorized entities. System Security can be improved through, encryption, firewalls
and updated Antivirus Software’s

79. Write A Note on The Followings (10 Marks)

 Image Preloading process


 Animated Gifs

IMAGE PRELOADING PROCESS:


The primary use of image preloading process is to download the image into the cache before it
is actually needed to display.
PROCESS:
o An example of the image object is shaped using the NEW keyword
o The src property of this instance is set equal to the filename of the image to be pre-loaded
o This step starts the down-loading of the image into the cache without actually displaying
o When a pre-loaded image is required to be displayed, the src property of the displayed image is
set to the src property of pre fetched image

ANIMATE GIFS:
We can save 16 gif images of the previous example in a single file in the form of an animated
gif, and then used it in a regular <IMG> tag to display a moving image. However, JavaScript provide better
control over the sequencing and the gap between the individual images.

80. What Are The Types Of Computer Network According To The Distance Between
Nodes? (5 Mark)
Types of Computer Networks according to the distance between nodes
LAN: Local Area Network)
WAN: Wide Area Network)

LAN
A network of computers located in the same building or a handful of nearby buildings Examples:
 Computer network at your PVC
 Computer network of a university campus

Efforts By : ARHAM & AIZA WRITES ------------------------------------------------- Page - 24


CS101 – INTRODUCTION TO COMPUTING MAVERICKS
ALL OBJECTIVEs & SUBJECTIVEs FROM PAST FILES FOR FINAL TERM
FAM
🤖: AIZA WRITES |💻 : ARHAM ( +923351328979 ) | ✍️: AIZA WRITES

WAN
A network in which computers are separated by great distances, typically across cities or even
continents. May consist of several interconnected LANs Example:
 The network connecting the ATM of a bank located in various cities
 A network connecting the local and oversea offices of a SW house –Internet
81. What Is the Difference Between Internet and Intranet? (2 Marks)
There's one major distinction between an intranet and the Internet: The Internet is an open, public space,
while an intranet is designed to be a private space. An intranet may be accessible from the Internet, but as a
rule it's protected by a password and accessible only to employees or other authorized users.

82. List Any Five Issues of Data Management. (5 Marks)


a. Decentralized Data Management
b. Data Security
c. Audit ability
d. Low leverage of data assets
e. Inefficient use of Resources

83. What Does TCP/IP Stand For? (1 Mark)


TCP/IP stands for Transmission Control Protocol/Internet Protocol, which is a set of networking
protocols that allows two or more computers to communicate.

84. Define The Key Weakness of The Web? (2 Marks)


Initially web was designed only for humans to read not for computers to understand it.

85. How Can We Define a Pixel? (3 Marks)


It is the smallest element of image which is spread with regular array on display and each element
consist of particular color.

86. How Marketing Strategies Are Changed with The Progress In Computing? How
New Marketing Strategies Are Implemented? (5 Marks)
Marketing Strategy Changes with the new requirements of the modern era and the applications
of the business. The web has changed marketing strategy from a mass focus to single person focus. We
collected data and analyze accordingly to find out the behavior of the market and end users. In new marketing
more advertising is being done through email and web and get feedback.

87.Write A Brief Note On Each Of The Following. (10 Marks)


o FTP
o Telnet
o Instant messaging
o VOIP

FTP ( File Transfer Protocol): This protocol is used to upload and download the files on remote computers.

Efforts By : ARHAM & AIZA WRITES ------------------------------------------------- Page - 25


CS101 – INTRODUCTION TO COMPUTING MAVERICKS
ALL OBJECTIVEs & SUBJECTIVEs FROM PAST FILES FOR FINAL TERM
FAM
🤖: AIZA WRITES |💻 : ARHAM ( +923351328979 ) | ✍️: AIZA WRITES

Telnet: FTP allows file operations only while Telnet can log on to a computer of other users through TCP/IP
network and use like a local user, it help in testing of remote web server.
Instant Messaging: This is the service of messaging provided on the internet like MSN messenger, Yahoo
messenger, through which we interact people randomly whenever required.
VOIP: Voice over IP, It is used to transmit the voice from one IP to another IP, In which voice is first broken
down and then transmitted over a network.

88.What Are Common-sense Guidelines to Avoid Viruses? Discuss About Antivirus as


Well. (10 Marks)
Common-sense Guidelines to avoid viruses are as follows:
a. Do not open attachment of unwanted emails.
b. Don’t used copied/pirated Software 3. Regularly place data somewhere as backup
o Use Registered and Trusted Software only.
o Install Antivirus in the system
o Update your Windows and software with the passage of time.
o Scan before using any external device with your system as USB Device.

Antivirus: This is the software design for preventing your system from harmful effects and maintain the
speed of computer. This software is available on the CD’s and DVD’s. These software continuously monitor
the systems and aware when any harmful virus is detected and asked for the further operations. Some
automatically remove the viruses from the system.

89. How Can You Define a Readable Program? (2 Marks)


A program that is easy to read & understand also easy to maintain and enhance.

90.What Is The Preferred Organizational Structure For The Organization? (2 Marks)


The Network Organization: It is becoming the preferred organizational structure.

91.How Can You Define a Consistent Web Design? Why Is It Needed? (3 Marks)
A consistent web design is Easy understandable, not with heavy graphics, easy navigation. It is
needed because most of the website views leave the site because of poor navigation and not easy to
understand, text and design is not clear etc.

92.Elaborate Vector Or Object Oriented Graphics With At least One Example. (3 Marks)
Vector treats everything that is drawn as object, they are resolution in dependent and relatively small
file size. For example, swg, svg, wmf.

93.What Are The Advantages Of Multimedia Presentations? Write Any Five. (5 Marks)
Multimedia presentation is a great tool for effective communication:

Advantages:

Efforts By : ARHAM & AIZA WRITES ------------------------------------------------- Page - 26


CS101 – INTRODUCTION TO COMPUTING MAVERICKS
ALL OBJECTIVEs & SUBJECTIVEs FROM PAST FILES FOR FINAL TERM
FAM
🤖: AIZA WRITES |💻 : ARHAM ( +923351328979 ) | ✍️: AIZA WRITES

a. Easy to make last minute change


b. More attractive
c. Can include animation, videos etc.
d. Better presentation easy to understandable for participants comparing to manual presentation.
e. Undo feature

94.Can A Human Doctor Be Replaced by An Expert System? Give Reasons to Support


Your Answer.
Expert System is a computer system which simulates the knowledge and expertise of a human
expert. Yes, a human doctor can be replaced by an Expert System.
Following are the reasons to support my answer:
A large database of knowledge can be added to and kept up to date; it can store more knowledge than a
person. The Expert System cannot FORGET or get facts wrong. It survives forever. There is no loss of
knowledge as there is when a doctor retires. The Expert System can access specialist knowledge that a doctor
may not have.

95. Write A Note on The Followings (10 Marks)

 Image Preloading process


 Animated Gifs

IMAGE PRELOADING PROCESS:


The primary use of image preloading process is to download the image into the cache before it
is actually needed to display.
PROCESS:
o An example of the image object is shaped using the NEW keyword
o The src property of this instance is set equal to the filename of the image to be pre-loaded
o This step starts the down-loading of the image into the cache without actually displaying
o When a pre-loaded image is required to be displayed, the src property of the displayed image is
set to the src property of pre fetched image

ANIMATE GIFS:
We can save 16 gif images of the previous example in a single file in the form of an animated
gif, and then used it in a regular <IMG> tag to display a moving image. However, JavaScript provide better
control over the sequencing and the gap between the individual images.

96. What Are Application Software? List Down the Names of Three Application
Software (3 Marks)
Application Software are that software then can interact directory with the user for performance
of respective type of work.

Efforts By : ARHAM & AIZA WRITES ------------------------------------------------- Page - 27


CS101 – INTRODUCTION TO COMPUTING MAVERICKS
ALL OBJECTIVEs & SUBJECTIVEs FROM PAST FILES FOR FINAL TERM
FAM
🤖: AIZA WRITES |💻 : ARHAM ( +923351328979 ) | ✍️: AIZA WRITES

Following are the types of Application Software’s: -

• AutoCAD and Corel Draw


• Business Software
• Productivity SW
• Games Software

97. Why Local Variable Is Preferred Over Global Variable? (5 Marks)


In my point of view Global variable has some advantage with Local variables is preferred due to the
following reasons: -
When we declare any global variable in web page then in case of error and logic it’s very difficult to
see on which line this variable is used and what’s his value if we have more than 2000 lines and all the
functions in web page using that Global Variable so Global variables can make the logic of a Web page
difficult to understand.
As we know we can use Global variable everywhere so Global variables also make the reuse and
maintenance of your code much more complex.
98. In Javascript, What Is Event Handling? What Are The Two Types Of Events? (5
Marks)
In java script we can capture events on do some operation on the basis of that particular event. For
example we want to load some data on web page then with the help of event handling we can do this operation
by using onLoad event.
We can put Event handlers in the body of web page and also in attributes of HTML. From the attribute
we can call any JavaScript function that will do his operation and come back. Now we can also interact with
server side with the help of AJAX in JavaScript function.
In-Line Event Handling
We can place event handlers in the BODY part and also in HTML attributes the event handlers
attributes consist of 3 parts the event handler, equal sign and a string of JavaScript statement enclosed in
quotes (single or double). And one more thing these should be put in one line without newline due to this
sophisticated event handling is not possible with in-line event handling.

99. What Is Structured Vector Graphics? (2 Marks)


This is a plug-in that is required to view swf (flash) files in the web browser
100. What Kind Of New Jobs Are Created Because Of Computing? And Which
Old Professions Are Being Eliminated? (3 Marks)
Due to computing where people are getting benefits from automated systems on the other hand
the people that are with KHATA system or Manual system and they don’t know about computers are
eliminated due to this reason and people take place of many people. We can see in the offices where before
computer if there are four person required now only one person is required for example with the help of
database we can store more than thousand of information and only one person is managing the whole data

Efforts By : ARHAM & AIZA WRITES ------------------------------------------------- Page - 28


CS101 – INTRODUCTION TO COMPUTING MAVERICKS
ALL OBJECTIVEs & SUBJECTIVEs FROM PAST FILES FOR FINAL TERM
FAM
🤖: AIZA WRITES |💻 : ARHAM ( +923351328979 ) | ✍️: AIZA WRITES

that is DBA. In the old system many people are writing the data in registers and then its also very difficult to
find the specific record.
Now we can see companies are hiring:- Data Entry Operators, System Engineers Software Developer
DBA etc.

101. What Is Logic- Or Time-Bombs? (3 Marks)


It execute the payload when predetermined event occurs. For example, use type particular phrase
and particular data is reached.
102. What Do You Mean By FTP Or File Transfer Protocol? (3 Marks)
This protocol is used to upload the files on remote computers. This is used to transfer files between
computer on TCP/IP network e.g. internet and now a day’s many software are available for uploading files
using FTP like Mozila FTP, cute FTP etc.
103. Why Should We, As Computing Professionals, Be Interested In Studying The Social
Implications Of Our Creations? (3 Marks)
If we see our life then we can judge computing technology is changing our life fast if we compare
with other technology.
We should highlight the mistakes and successes of the past. We should learn then and select future
direction accordingly. Computers are keep becoming more and more powerful and gaining more autonomy.

104. How Dos Attack Is A Cyber Crime? For What Cyber Crime Can Be Used? (3
Marks)
DoS is the crime but of a new type. A new type for policing system is required to tackle such
crimes. Cyber Crime can be used to Damage a home computer, Bring down the Business, Weaken the
financial and defense system of country.

105. What Kind of Information Can Be Stored in A Database? (1 Mark)


It can store numbers, Booleans, sound, video, images etc.

106. Define The Key Weakness of The Web? (2 Marks)


Initially web was designed only for humans to read not for computers to understand it.

107. How Can We Define A Pixel? (2 Marks)


It is the smallest element of image which is spread with regular array on display and each element
consist of particular color.

108. How Marketing Strategies Are Changed With The Progress In Computing? How
New Marketing Strategies Are Implemented? (5 Marks)
Marketing Strategy Changes with the new requirements of the modern era and the applications of the
business. The web has changed marketing strategy from a mass focus to single person focus. We collected
data and analyze accordingly to find out the behavior of the market and end users. In new marketing more
advertising is being done through email and web and get feedback.

Efforts By : ARHAM & AIZA WRITES ------------------------------------------------- Page - 29


CS101 – INTRODUCTION TO COMPUTING MAVERICKS
ALL OBJECTIVEs & SUBJECTIVEs FROM PAST FILES FOR FINAL TERM
FAM
🤖: AIZA WRITES |💻 : ARHAM ( +923351328979 ) | ✍️: AIZA WRITES

109. What Is Output of The Following Javascript Code? (2 Marks)


Str=”Virtual University of Pakistan”;
document.write(str.substring(5,str.length)) ;

110. Explain How Many Ways Businesses Monitor Their Employees? (3 Marks)
Systems are available that monitor or most every key stroke that an employee makes on computer.
Systems are available that read and sensor all incoming and outgoing email. It is quite straight forward to
monitor where you surf and when.

111. Differentiate Local and Global Variables. (3 Marks)


Local or function level variable effective only in the function in which they are declared while globale
variables visible everywhere on the webpage. Declaration variables using the var keyword within a function
makes them local. They are available only within the function and hold no meaning outside of vs global.

112. Elaborate Vector Or Object Oriented Graphics With At Least One Example. (3
Marks)
Treats everything that is drawn an object. Objects retain their identity after their drawn. These objects
can later be easily moved stretched duplicated deleted etc are resolution independent relatively small size. e.
g. swf, wmf,

113. Why Should We, As Computing Professionals, Be Interested In Studying The Social
Implications Of Our Creations? (5 Marks)
This is imp. Because of keeping the track of money wise while implementation actually and see the
results. This fits with the organization or no. to check there is any side effects morally or no. we have to be
very careful while creation of any system., error free, data loose recovery. Etc.

114. Write Responsibilities of The Followings (5 Marks)


Developer
 Module level design.
 Coding
 Unit testing
Executive Team
o Responsible for the day to day operations.
o All the decision related issues.
o Policy making and changing etc.
o In this usually CEO and CMSO involves
o He is responsible for the day to day operation and great organizational skills.
Support Team
The support team is responsible for the complete operations such as arrangement for performing
any kind of task from the starts to the end. Fully project handling and performing etc. In case of any
maintenance they are the responsible for commencing the job and making sure to complete.

115. What Is a Function? Give One Example. (2 Marks)

Efforts By : ARHAM & AIZA WRITES ------------------------------------------------- Page - 30


CS101 – INTRODUCTION TO COMPUTING MAVERICKS
ALL OBJECTIVEs & SUBJECTIVEs FROM PAST FILES FOR FINAL TERM
FAM
🤖: AIZA WRITES |💻 : ARHAM ( +923351328979 ) | ✍️: AIZA WRITES

Function is a reusable code (group of statement) that is executed when the function is called. It is also
known as sub-program. Function is normally defined in the head section of the code.

116. What Is an Intelligent System? (2 Marks)


Intelligent systems are the programs developed to perform complicated jobs that reflect human brain
and thoughts. If the algorithms are too much complex or cannot be solved instantly then we can use such
systems. Therefore the well intelligent system not only performs well but it has the capability to rectify any
errors by himself if it occurs within his domain. The examples of intelligent systems are Robotics, Business
Intelligence etc.

117. What Is Meant by Semantic Error? (3 Marks)


It is an error which a developer encounters when a statement is executed but it was not intended by
him (the developer). Such errors are very difficult to locate during testing. Mostly these occur during
abnormal circumstances. It may be referred as the logical error.

118. What Is Best Algorithm? (3 Marks)


Greedy algorithm is the best algorithm as it is n algorithm that always takes the best immediate or
local solution while finding an answer.

119. What Are The Sub Categories Of Artificial Intelligence? Briefly Explain Any Two.
(3 Marks)
 Robotics
These are the machines which are computer programmed and perform work which was previously done
by humans. They can be found in the manufacturing industry, the military, space exploration and medical
applications.
 Expert Systems
These systems are designed to replace an expert. The medical expert system is an example of such system
which can replace a Doctor/medical expert.

120. What Are The Steps Of Working Of TCP And IP Protocols In Internet
Transmission? (3 Marks)
TCP divide messages in to many packets (capsulation) and sent these messages over the internet and
IP route these messages on the internet to the correct destination and upon reaching the messages on its
destination the messages are encapsulated.

121. What Is ARPANET And Who Developed It?(5 Marks)


ARPANET stands for Advanced Research Projects. The initial purpose was to communicate with and
share computer resources among mainly scientific users at the connected institutions. In the beginning it was
connected four universities and enabled scientists to share resources.

It was headed by Dr. J.C.R. Licklider.

122. For What Purposes FTP Is Used In Networks? (2 Marks)

Efforts By : ARHAM & AIZA WRITES ------------------------------------------------- Page - 31


CS101 – INTRODUCTION TO COMPUTING MAVERICKS
ALL OBJECTIVEs & SUBJECTIVEs FROM PAST FILES FOR FINAL TERM
FAM
🤖: AIZA WRITES |💻 : ARHAM ( +923351328979 ) | ✍️: AIZA WRITES

FTP is a service of internet. FTP was to transfer files between computers on ECP/IP network e.g.:-
simple commands allows the user to list, creators on a remote computer upload or downloads .Typical we
transferring web content from the developers PC to the web servers.

123. What Is The Data Normalization? Also Define Its Goal.(2 Marks)
It is to sort complex data into simple from. It uses to simplify the complex information to make it
more users friendly.

124. Define the Key Weakness Of The Web? (3marks)


A Web was designed for humans to read, not for computers to understand and manipulate
meaningfully. As, computers language is different from human language, computer face great problems in
dealing with the current text and graphics-based contact of the web.

125. What Kind of New Jobs Are Created Because Of Computing? And Which Old
Professions Are Being Eliminated? (3 Marks)
Due to computing where people are getting benefits from automated system on the other hand the
people that are with KHATA system or manual system and they do not now anything about computer are
eliminated due to reasons before computer 4 people required in a office and now only 1 person required and
in old system many people are writing the data in a registers and then its abosvery difficult to find the specific
record but with the help of database we can store more than 1000 of information and only one person is
managing the whole data that is DBA.

126. What Is the Difference Between Internet And Intranet? (5 Marks)


Intranet and internet are 2 domains that are very a like but often segregated in order to maintain
security. Internet is where I am having exam now it provides access to the rest of digital world e.g:- world
wide web Intranet is a small varsim of this used by companies and is normally local, e.g:- only the people
who work those have access to the information being shared on its seriver.There is one major distination
between an intranet and the internet the internet is an open, public places while intranet is in only in pravite
places.

127. Differentiate Between On Load And On Unload (3 Marks)


On load executes the specified JavaScript code when a new document is loaded into windows.
ON Unload executes he specified JavaScript code when a user exits a document.

128. Mention Any Five Applications Of Artificial Intelligent System. (3 Marks)


o Medical Diagnosis
o Robots
o Games
o Business intelligence
o Image Recognition.

129. What Is an IP Address? (1 Mark)

Efforts By : ARHAM & AIZA WRITES ------------------------------------------------- Page - 32


CS101 – INTRODUCTION TO COMPUTING MAVERICKS
ALL OBJECTIVEs & SUBJECTIVEs FROM PAST FILES FOR FINAL TERM
FAM
🤖: AIZA WRITES |💻 : ARHAM ( +923351328979 ) | ✍️: AIZA WRITES

Every machine on the Internet has a unique identifying number, called an IP Address. A typical IP
address looks like this:

 216.27.61.137

130. What Is Internet? (2 Marks)


The Internet, sometimes called simply "the Net," is a worldwide system of computer networks - a
network of networks in which users at any one computer can, if they have permission, get information from
any other computer (and sometimes talk directly to users at other computers).

131. Define Semantic Web with Respect to The Present Web? (2 Marks)

In the Semantic Web data itself becomes part of the Web and is able to be processed independently
of application, platform, or domain. This is in contrast to the World Wide Web as we know it today,
which contains virtually boundless information in the form of documents. We can use computers to
search for these documents, but they still have to be read and interpreted by humans before any useful
information can be extrapolated.

132. Star Topology and Ring Topology

In star topology, the information is travel from the central hub or router to all the nodes, While in
Ring topology, the information is travel from nodes to nodes in a ring manner in one direction.

133. Code Using Java Script to Find the Even Number Between 0-20 (5 Marks)
for( i=0; i<=20; i++ ){
if( i % 2 == 0 ){
console.log(i); }}

134. HTML Page For File Upload Having Browse And Submit Query Buttons

<form action="/action_page.php">
<input type="file" id="arhamFile" name="filename">
<input type="submit">
</form>
135. Arrays in JavaScript
An array is a special variable, which can hold more than one value:

const students = ["Aiza", "Pretty", "Arham"];

136. For Loop?

Efforts By : ARHAM & AIZA WRITES ------------------------------------------------- Page - 33


CS101 – INTRODUCTION TO COMPUTING MAVERICKS
ALL OBJECTIVEs & SUBJECTIVEs FROM PAST FILES FOR FINAL TERM
FAM
🤖: AIZA WRITES |💻 : ARHAM ( +923351328979 ) | ✍️: AIZA WRITES

A for Loop Repeats until a specified condition evaluates to false.

for (let i = 0; i < 5; i++) {


text += "The number is " + i + "<br>";
}

137. Onload - Onfocus - Onblur - Submit - Reset Ki Examples in JavaScript


Coding?
Onload
The onload event occurs when an object has been loaded.
<img src="Arham.gif" onload="arhamImage()" width="200" height="264">

<script>
function arhamImage() {
alert("Arham’s image is loaded");
}
</script>

Onfocus
The onfocus event occurs when an element gets focus.
<script>
function arhamFunction(x) {
x.style.background = "White";
}
</script>
<input type="text" onfocus="arhamFunction()">
onBlur
The onblur event occurs when an HTML element loses focus.
<script>
function aizaFunc() {
let x = document.getElementById("arham");
x.value = x.value.toUpperCase();
}
</script>

Efforts By : ARHAM & AIZA WRITES ------------------------------------------------- Page - 34


CS101 – INTRODUCTION TO COMPUTING MAVERICKS
ALL OBJECTIVEs & SUBJECTIVEs FROM PAST FILES FOR FINAL TERM
FAM
🤖: AIZA WRITES |💻 : ARHAM ( +923351328979 ) | ✍️: AIZA WRITES

<input type="text" id="arham" onblur="aizaFunc()">

Submit

The onsubmit event occurs when a form is submitted.


<form action="/action_page.php" onsubmit="arhamFunc()">
Enter name: <input type="text" name="fname">
<input type="submit" value="Submit">
</form>

<script>
function arhamFunc() {

alert("The form was submitted");


}
</script>

Reset
The onreset event occurs when a form is reset.
<form onreset="aizaFunction()">
Enter name: <input type="text">
<input type="reset">
</form>

<script>
function aizaFunction() {
alert("The form was reset");
}
</script>
،‫ارگمتھجمںیموکیئبیعدوھکیوتھجمےسیہوہکیسکاورےسںیہن‬

،‫ویکہکناسبیعوکںیمےنیہدبانلہ۔۔۔۔یسکاورےنںیہن‬

،‫ارگےھجموہکوتتحیصنالہکےئگ۔۔۔۔۔اوروثاباھکلاجےئاگ‬
‫ن‬
‫اورارگیسکاورےسوہکےگوتتبیغالہکےئگگاہاھکلاجےئاگ۔‬
‫شیخ سعدی‬

Efforts By : ARHAM & AIZA WRITES ------------------------------------------------- Page - 35

You might also like