0% found this document useful (0 votes)
15 views288 pages

Cs101-Final & Mid Term

CS101-FINAL & MID TERM
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views288 pages

Cs101-Final & Mid Term

CS101-FINAL & MID TERM
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd

FINALTERM EXAMINATION

Question No: 1 ( Marks: 1 ) - Please choose one


__________% of the users have left websites in frustration due to poor navigation.
► 40
► 62
► 83
► 91

Question No: 2 ( Marks: 1 ) - Please choose one


The impact of a digit in a number is determined by its ---------------
► Value
► Location
► Length
► None of above

Question No: 3 ( Marks: 1 ) - Please choose one


Hexadecimal number system is based on -------------------- digits
►2
►8
► 12
► 16

Question No: 4 ( Marks: 1 ) - Please choose one


TCP stands for ___________.
► Total communication protocol
► Transmission control protocol
► Transfer control protocol
► Transfer collection protocol

Question No: 5 ( Marks: 1 ) - Please choose one


The browser breaks down the URL into ________ parts.
►2
►3
►4
►5

Question No: 6 ( Marks: 1 ) - Please choose one


A single pixel can acquire approximately ___________ color schemes.
► 1 million
► 2 million
► 10 million
► 16 million

Question No: 7 ( Marks: 1 ) - Please choose one

Serial arrangement in which things follow logical order or a recurrent pattern,


such as statements executing one by one, is called __________.
► Loop
► Sequence
► Condition
► Array
Question No: 8 ( Marks: 1 ) - Please choose one
According to a popular heuristic, success is defined by ___________.
► The user
► The builder
► Both user and builder
► None of the given options
Question No: 9 ( Marks: 1 ) - Please choose one
Which one is the best option for designing a Medical Expert System?
► Rule Based System
► Genetic Algorithm
► Fuzzy Logic
► Neural Network
Question No: 10 ( Marks: 1 ) - Please choose one
document.write("20"+"12") ;
The out put of the above statement is ____________.
► 1220
► 2012
► 20 12
► 32
Question No: 11 ( Marks: 1 ) - Please choose one
Due to working at home, contact with the colleagues is __________, which may
result in __________ quality of work
► Reduced, Poorer
► Reduced, Better
► Increased, Poorer
► Increased, Better
Question No: 12 ( Marks: 1 ) - Please choose one
The effective way not to only write programs but also it works properly and
further more to minimize the time and the development cost of the program is
called___________________
► Programming Mechanism
► Programming Methodology
► Programming Synchronization
► None of the given options
Question No: 13 ( Marks: 1 ) - Please choose one
The tasks performed to determine the existence of defects is called _______
► Debugging
► Testing
► Repairing
► Coding
Question No: 14 ( Marks: 1 ) - Please choose one
Deep Blue was the name of
► computer
► human
► city
► game

Question No: 15 ( Marks: 1 ) - Please choose one


There is a battery on the motherboard to:
► Give power to the processor
► Save information when computer is off
► Save information when computer is on
► Give power to the motherboard
Question No: 16 ( Marks: 1 ) - Please choose one
Compound Statement after decision constructs in JavaScript is enclosed with
►( )
►[ ]
► { };
►{ }
Question No: 17 ( Marks: 1 ) - Please choose one
______ occurs when a function calls itself.
► Recursion
► Call by value
► Call by reference
► Parsing
Question No: 18 ( Marks: 1 ) - Please choose one
Which function returns integer nearest to x ?
► random()
► exp(x)
► log(x)
► round(x)

Question No: 19 ( Marks: 1 ) - Please choose one


Microphone is an input as well as output device. This statement is
► True
► False
Question No: 20 ( Marks: 1 ) - Please choose one
74HC163 has two enable input pins which are _______ and _________
► ENP, ENT
► ENI, ENC
► ENP, ENC
► ENT, ENI
Question No: 21 ( Marks: 1 ) - Please choose one
Radio Buttons are used when you want the user to select one of a limited number
of choices.
► True
► False
Question No: 22 ( Marks: 1 ) - Please choose one
In partitioning of program/module, it should be assured that partitioned
chunks should be as _________ as possible.
► Dependent
► Independent
► Complex
► All of the above
Question No: 23 ( Marks: 1 ) - Please choose one
In a library’s database, if there is an entry in the register for Book # 423 then
the corresponding Book must actually exist; is an example of which type of
data integrity:
► Type integrity
► Limit integrity
► Physical Integrity
► Referential Integrity
Question No: 24 ( Marks: 1 ) - Please choose one
DBMS and Database are two names of one term .
► True
► False
Question No: 25 ( Marks: 1 ) - Please choose one
There are _______ types of program errors
►2
►4
►6
►3

Question No: 26 ( Marks: 1 ) - Please choose one


Super computers consists of more than one parallel processors because
► One big processor is more expensive than parallel processors
► Through parallel processors problems can be solved easily
► Small processors are easy to manufacture
► All of the given

Question No: 27 ( Marks: 2 )


What is the difference between ‘single-line text input field’ and ‘password input
field’ ?
ANS:
A Password Field is good for sensitive information. The only item that is
absolutely necessary is the Submit Button. It is a good idea to include a Reset
Button for the convenience of the user.
A text field gathers information using a single line of text. This field is useful for
short answers. The default text field is blank. If you want to specify default text,
use the VALUE attribute.
.
Question No: 28 ( Marks: 2 )

What is internet?
ANS:
Internet is also called WAN, which means the interconnection of large
number of computer networks and it consists of millions of private, public,
academic, business, and government networks of local to global scope that are
linked by a broad array of electronic and optical networking technologies.
Question No: 29 ( Marks: 2 )

In JavaScript, what is event handling? What are the two types of events?
ANS:
Event handling means capturing an event and responding to that.
Events e.g. onMouseOver, OnClick, onLoad, Onunload, updating the clock etc. are
captured by the Java script & according to the programs they are responded
accordingly
Question No: 30 ( Marks: 2 )

Define the key weakness of the web?


ANS:
Question No: 31 ( Marks: 3 )
How can we include images in a web page using HTML and Java script?
ANS:
Image in HTML
It is easier to insert images and pictures i.e. JPG, GIF & BMP files in the web page
through HTM codes.
The <IMG> tag is used which is used as under:-
<img src=URL, alt=text
Height=(in pixels) width=(in pixels)

Images in JavaScript
Images in JavaScript may be used with the event handling i.e. OnLoad, OnUnload,
OnError and OnAbort etc.
The properties i.e. used for Java script are as under:-
1. Name
2. Border
3. Complete
4. Height
5. src
for example:-
<img name=”xyz” src=”abc.jpg”>
Question No: 32 ( Marks: 3 )

Differentiate between onLoad and onUnload


ANS:
On load event is used when the page is load in the browser while on the other
side onUnload event works when the page closes down.

Question No: 33 ( Marks: 3 )

Elaborate Rester Graphics with examples.


ANS:
Raster graphics are digital images created or captured (for example, by scanning
in a photo) as a set of samples of a given space . A raster file is usually larger
than a vector graphics image file. A raster file is usually difficult to modify
without loss of information.
Examples of raster image file types are: BMP, TIFF, GIF, and JPEG files.
Question No: 34 ( Marks: 5 )

What is a Relational Database? Give the names of any three RDBMS software.
(2+3)
ANS:
Database architecture consists of three levels, external, conceptual and internal.
Clearly separating the three levels was a major feature of the relational
database.
NAMES:
Oracle Database software, Linux, and oracle e business database software , and
Oracle OLAP.
Question No: 35 ( Marks: 5 )

How many ways are there to call a function in a program ? Explain with example
ANS:
there are two methods of function in a program
1st method is used within the html coding with immediate in the even handling
on the other side function can also be defined in the heading portion of the html
page
it is a better choice to use function as it include many statments in it.
OnMouseOver= “if(document.sendEmail.sender.value.length<1)
Window.alert(‘empty field!’)”
while in the heading portion
it will be as
function checkForm() {
if ( document.sendEmail.sender.value.length < 1) {
window.alert( “Empty Field” );
}
Question No: 36 ( Marks: 5 )

What do you mean by the term 'Telepresence' in Computing World?


ANS:

Question No: 1 ( Marks: 1 ) - Please choose one

Analytical Engine is ------------------


► An electrical machine
► A digital machine
► An analog machine
► A special purpose machine

Question No: 2 ( Marks: 1 ) - Please choose one

Website design should NOT be __________.


► Unified
► Complex
► Consistent
► Predictable

Question No: 3 ( Marks: 1 ) - Please choose one


TCP stands for ___________.
► Total communication protocol
► Transmission control protocol
► Transfer control protocol
► Transfer collection protocol

Question No: 4 ( Marks: 1 ) - Please choose one


A vocabulary and set of grammatical rules for instructing a computer to perform
specific tasks is called
► Software
► Programming language
► Device driver
► Interpreter

Question No: 5 ( Marks: 1 ) - Please choose one


A _________ is a meaningful, easy-to-remember ‘label’ for an IP address.
► TCP address
► Domain name
► Network name
► VoIP

Question No: 6 ( Marks: 1 ) - Please choose one

In spreadsheets, cell address A12 means _______.


► Row A, Cloumn 12
► Row 12, Cloumn A
► Row 2,Cloumn A1
► Row A1, Cloumn 2
Question No: 7 ( Marks: 1 ) - Please choose one

According to the heuristic, the number of defects remaining in a system after a


given level of tests is proportional to ___________.
► The number found on very first day.
► The number found during the development.
► The number found during the test.
► None of the given options.

Question No: 8 ( Marks: 1 ) - Please choose one

Which one is the best option for designing a Medical Expert System?
► Rule Based System
► Genetic Algorithm
► Fuzzy Logic
► Neural Network
Question No: 9 ( Marks: 1 ) - Please choose one

Command that allows you to recover form mistakes is called __________.


► Clear
► Edit
► Undo
► Break

Question No: 10 ( Marks: 1 ) - Please choose one

The document.write( ) method expects ___________ as its argument.

► Integer
► Float
► String
► Boolean

Question No: 11 ( Marks: 1 ) - Please choose one

We use ___________ to stop Break-Ins.


► Scanners
► Intrusion detectors
► Utilities
► None of the given options

Question No: 12 ( Marks: 1 ) - Please choose one

The developer report to ___________ in a development team.


► Team Lead
► Project Manager
► CEO
► IT Manager

Question No: 13 ( Marks: 1 ) - Please choose one

The key responsibilities of a project manager is _____________.


► Planning and tracking of the project
► Arranging of the appropriate resources
► Client relationship management
► All of the given options

Question No: 14 ( Marks: 1 ) - Please choose one

The key responsibilities of the architect of the project is______________.


► Technology selection
► High-level design
► Makes certain that the implementation remains true to the design
► All of the given options

Question No: 15 ( Marks: 1 ) - Please choose one

The important attribute of image tag is ________________.


► src
► image
► None of the given options
► alt

Question No: 16 ( Marks: 1 ) - Please choose one

onAbort , onError are the _______________ of the image object.


► Event Handler
► Properties
► Methods
► None of the given options

Question No: 17 ( Marks: 1 ) - Please choose one

Now a days, users communicate with the computer using a consistent __________
provided by the Operating System.
► Command-line interface
► Application Interface
► User Interface
► Protocol
Question No: 18 ( Marks: 1 ) - Please choose one

One can browse documents residing on a remote computer using ________


protocol.
► HTTP
► SMTP
► FTP
► TELNET

Question No: 19 ( Marks: 1 ) - Please choose one

Which of the following device can be used to control network traffic?


► Cable
► Connector
► Hub
► Repeater

Question No: 20 ( Marks: 1 ) - Please choose one

User can remotely log on to a computer and can have a control over it like a local
user using
► TelNet Protocol
► TelNet Protocol and connected to the user through TCP/IP network
► TelNet protocol and FTP
► TCP/IP and FTP
Question No: 21 ( Marks: 1 ) - Please choose one

If(studentMarks>70);
(
document.write( "Grade A");}

Which of following is correct format of above code:


► If(studentMarks>70);(
document.write( "Grade A");};
► If(studentMarks<>70) (
document.write( "Grade A");}
► If(studentMarks>70){
document.write( "Grade A");}
► None of above options

Question No: 22 ( Marks: 1 ) - Please choose one

Which of the following language is object based but not object oriented language.
► javascript
► visual basic
► C++
► C#

Question No: 23 ( Marks: 1 ) - Please choose one


asin(x) stands for __________
► Asynchronous sine
► Alpha Sine
► Automated Sine
► ArcSine

Question No: 24 ( Marks: 1 ) - Please choose one


The output of POW (3, 2) is______________.
►6
►4
►9
► 12
Question No: 25 ( Marks: 1 ) - Please choose one

The Right most portion or the third portion of the URL contains______ .
► Protocol Identifier
► Server Name
► Directory Name
► None of the given
Question No: 26 ( Marks: 1 ) - Please choose one

Which Image format is known as Lossless original format.


► JPEG
► GIF
► Bitmap
► Vector

Question No: 27 ( Marks: 2 )

What is a function? Give one example.


Answer:
Function is a reusable code (group of statement) that is executed when the
function is called. It is also known as sub-program. Function is normally defined
in the head section of the code.
Question No: 28 ( Marks: 2 )

What is an intelligent system?


Answer:
Intelligent systems are the programs developed to perform complicated jobs that
reflect human brain and thoughts. If the algorithms are too much complex or can
not be solved instantly then we can use such systems. Therefore the well
intelligent system not only performs well but it has the capability to rectify any
errors by himself if it occurs within his domain.
The examples of intelligent systems are Robotics, Business Intelligence …etc.
Question No: 29 ( Marks: 2 )

What is meant by semantic error ?


Answer:
It is an error which a developer encounters when a statement is executed but it
was not intended by him (the developer). Such errors are very difficult to locate
during testing. Mostly these occur during abnormal circumstances. It may be
referred as the logical error.
Question No: 30 ( Marks: 2 )

What is best algorithm?


Answer:
Greedy algorithm is the best algorithm as it is n algorithm that always takes the
best immediate, or local solution while finding an answer.
Question No: 31 ( Marks: 3 )

How can we include images in a web page using HTML and Java script?
Answer:

Images can be included in HTML by employing tag, below is the format of

align="bottom|middle|top">
Question No: 32 ( Marks: 3 )

What are the Sub categories of Artificial Intelligence? Briefly explain any two.
Answer:
1. Robotics
These are the machines which are computer programmed and perform work
which was previously done by humans. They can be found in the manufacturing
industry, the military, space exploration and medical applications.
2. Expert Systems
These systems are designed to replace an expert. The medical expert system is
an example of such system which can replace a Doctor/medical expert.

Question No: 33 ( Marks: 3 )

What are the steps of working of TCP and IP protocols in internet


transmission?
Answer:
TCP divide messages in to many packets (capsulation) and sent these messages
over the internet and IP route these messages on the internet to the correct
destination and upon reaching the messages on its destination the messages are
encapsulated.
Question No: 34 ( Marks: 5 )

What is ARPANET and who developed it?


Answer:
ARPANET stands for Advanced Research Projects. The initial purpose was to
communicate with and share computer resources among mainly scientific users
at the connected institutions. In the beginning it was connected four universities
and enabled scientists to share resources.
It was headed by Dr. J.C.R. Licklider.
Question No: 35 ( Marks: 5 )

Define professional ethics and its benefits with an example?


Question No: 36 ( Marks: 5 )
Write JavaScript code for the following:
Make a function compareWithTen(value)
Compare the function argument with ‘10’ and display a message whether the
value is less than, equal to or greater than 10.

Question No: 1 ( Marks: 1 ) - Please choose one

In a good presentation each slide should contain____________.


► Heading
► Phrases not sentences
► Sentences not phrases
► Heading, sentences not phrases

Question No: 2 ( Marks: 1 ) - Please choose one

Which one of the following is not an event handler's attribute?


► Function
► Identifier
► Equal sign
► String consisting of JavaScript statements
Question No: 3 ( Marks: 1 ) - Please choose one

According to the heuristic, the number of defects remaining in a system after a


given level of tests is proportional to ___________.
► The number found on very first day.
► The number found during the development.
► The number found during the test.
► None of the given options.
Question No: 4 ( Marks: 1 ) - Please choose one

Which one is the best option for designing a Medical Expert System?
► Rule Based System
► Genetic Algorithm
► Fuzzy Logic
► Neural Network
Question No: 5 ( Marks: 1 ) - Please choose one

A combination of word processing and graphic design is


► Corel Draw
► Desktop Publishing
► Paint
► WordPad

Question No: 6 ( Marks: 1 ) - Please choose one

A microprocessor can be made more powerful by increasing its ________


► Clock frequency
► Word length
► Clock frequency and Word length
► None of above
Question No: 7 ( Marks: 1 ) - Please choose one
Security can also be improved through _____________.
► Encryption
► Typing errors
► Transmission errors
► Hardware malfunctions

Question No: 8 ( Marks: 1 ) - Please choose one

______________ is a field that uniquely identifies each record stored in a table.


► Composite Key
► Primary key
► Foreign key
► None of the given options
Question No: 9 ( Marks: 1 ) - Please choose one

There are _________ types of errors.


►2
►3
►4
►5
Question No: 10 ( Marks: 1 ) - Please choose one

______ is simply a fast port that lets you connect computer peripherals and
consumer electronics to your computer without restart.
► Freeware
► Shareware
► Firewire
► Firmware

Question No: 11 ( Marks: 1 ) - Please choose one

___ provides a simple, consistent way for applications to interact with the HW
without having to know all the details of the HW
► Explorer.exe
► System Files
► Operating System
► Application Software
Question No: 12 ( Marks: 1 ) - Please choose one

One can browse documents residing on a remote computer using ________


protocol.
► HTTP
► SMTP
► FTP
► TELNET
Question No: 13 ( Marks: 1 ) - Please choose one

Which event handler executes the specified JavaScript code when a window/form
element loses focus ?
► onBlur
► onLoad
► onUnload
► onFocus
Question No: 14 ( Marks: 1 ) - Please choose one

Which event handler executes the specified JavaScript code when a window/form
element receives focus ?
► onBlur
► onLoad
► onUnload
► onFocus

Question No: 15 ( Marks: 1 ) - Please choose one

_____________ loop is a flow control statement that allows code to be executed


repeatedly based on a given Boolean condition.
► For
► Do-While
► If-else
► While
Question No: 16 ( Marks: 1 ) - Please choose one

A B C D
4 ABC003 65 =c4=c4

Expression format in cell D4 is NOT correct.


► True
► False

Question No: 17 ( Marks: 1 ) - Please choose one

for(var i=1; i<=2;i=i+1)


{
document.write( "Sorted Words:" + "
")
}
Which of the following shall be the output of above code:
► Sorted Words: Sorted Words:
► Sorted Words:
Sorted Words:
► Sorted Words: “

Sorted Words: “

► Sorted Words:

Sorted Words:

Question No: 18 ( Marks: 1 ) - Please choose one

Data integrity, in Database management system is necessary because it:


► Refers to provide insecurity to the data
► Refers to provide security to the data
► Refers to maintaining the correctness of data
► Refers to maintaining the consistency of the data

Question No: 19 ( Marks: 1 ) - Please choose one

Which of the following formula is used in spreadsheet for addition?


► C6+E6
► =C6+E6
► 6+6=12
► 6+E6

Question No: 20 ( Marks: 1 ) - Please choose one

Which of the following keyword is used to jump out of switch statement


as soon as the match is found?
► Default
► Else
► Jump
► Break
Question No: 21 ( Marks: 1 ) - Please choose one

How many types the string methods have?


►1
►2
►3

Question No: 22 ( Marks: 1 ) - Please choose one

Which Internet Service is comparatively Slow but Inexpensive and Fast.


► E-mail
► Instant Messaging
► Web
► None of the given
Question No: 23 ( Marks: 1 ) - Please choose one

Semantic web is ________ .


► The extension of web
► Designed for both human beings and computers
► The extension of web and Designed for both human beings and
computers
► None of the given

Question No: 24 ( Marks: 1 ) - Please choose one

Coding is the responsibility of ________________


► Software designer
► Software developer
► Project manager
► None of given
Question No: 25 ( Marks: 1 ) - Please choose one
Run time error occurs when ___________ .
► The complier compiles the programs
► The compiler ends the execution of the program
► The compiler start running the program
► The compiler finds a semantic error
Question No: 26 ( Marks: 1 ) - Please choose one

Heuristics are ________ .


► Intelligent systems
► Always ends with the solution of the problem
► Both of the given
► None of the given

Question No: 27 ( Marks: 2 )

What are application softwares? List down the names of three application
softwares.
Definition: Application Software are that software then can interact directory with
the user for performance of respective type of work.
Following are the types of Application Softwares:-
· AutoCAD and Corel Draw
· Business Software
· Productivity SW
· Games Software
Question No: 28 ( Marks: 2 )

Why Local variable is preferred over Global variable ?


In my point of view Global variable has some advantage with Local variables is
preferred due to the following reasons:-
When we declare any global variable in web page then in case of error and logic
it’s very difficult to see on which line this variable is used and what’s his value if
we have more than 2000 lines and all the functions in web page using that Global
Variable so Global variables can make the logic of a Web page difficult to
understand.
As we know we can use Global variable everywhere so Global variables also
make the reuse and maintenance of your code much more complex.
Question No: 29 ( Marks: 2 )

In JavaScript, what is event handling? What are the two types of events?
In java script we can capture events on do some operation on the basis of that
particular event. For example we want to load some data on web page then with
the help of event handling we can do this operation by using onLoad event.
We can put Event handlers in the body of web page and also in attributes of
HTML. From the attribute we can call any JavaScript function that will do his
operation and come back. Now we can also interact with server side with the
help of AJAX in JavaScript function.
In-Line Event Handling
We can place event handlers in the BODY part and also in HTML attributes the
event handlers attributes consist of 3 parts the event handler, equal sign and a
string of JavaScript statement enclosed in quotes (single or double). And one
more thing these should be put in one line without newline due to this
sophisticated event handling is not possible with in-line event handling.
Question No: 30 ( Marks: 2 )

What is Structured Vector Graphics ?


This is a plug-in that is required to view swf (flash) files in the web
browser
Question No: 31 ( Marks: 3 )

What kind of new jobs are created because of computing? And which old
professions are being eliminated?
Due to computing where people are getting benefits from automated systems on
the other hand the people that are with KHATA system or Manual system and
they don’t know about computers are eliminated due to this reason and people
take place of many people. We can see in the offices where before computer if
there are four person required now only one person is required for example with
the help of database we can store more than thousand of information and only
one person is managing the whole data that is DBA. In the old system many
people are writing the data in registers and then its also very difficult to find the
specific record.
Now we can see companies are hiring:-
Data Entry Operators
System Engineers
Software Developer
DBA etc.

Question No: 32 ( Marks: 3 )


What are Logic- or Time-Bombs ?
It execute the payload when predetermined event occurs
For example use type particular phrase and particular data is reached.
Question No: 33 ( Marks: 3 )

What do you mean by FTP or File Transfer Protocol?


This protocol is used to upload the files on remote computers. This is used to
transfer files between computer on TCP/IP network e.g. internet and now a day’s
many software are available for uploading files using FTP like Mozila FTP, cute
FTP etc.
Question No: 34 ( Marks: 5 )

Why should we, as computing professionals, be interested in studying the social


implications of our creations?
If we see our life then we can judge computing technology is changing our life
fast if we compare with other technology.
We should highlight the mistakes and successes of the past. We should learn
then and select future direction accordingly. Computers are keep becoming more
and more powerful and gaining more autonomy.
Powerful Global Corporation.
The network Organization
Question No: 35 ( Marks: 5 )

How DoS attack is a cyber crime? For what cyber crime can be used?
DoS is the crime but of a new type. A new type for policing system is
required to tackle such crimes.
Cyber Crime can be used to Damage a home computer, Bring down the
Business, Weaken the financial and defense system of country.
Question No: 36 ( Marks: 5 )

What are the key characteristics of internet? Write the names of any
five.

Question No: 1 ( Marks: 1 ) - Please choose one


Which of the following hardware component of a computer can also be
called as engine?
► Bus
► Storage
► Memory
► Processor

Question No: 2 ( Marks: 1 ) - Please choose one


To improve the time for scannig a web page, text should be ___________.
► Centered
► Left Aligned
► Right Aligned
► Staggered

Question No: 3 ( Marks: 1 ) - Please choose one


__________% of the users have left websites in frustration due to poor navigation.
► 40
► 62
► 83
► 91
Question No: 4 ( Marks: 1 ) - Please choose one
Logical operation that is performed on single input variable is ---------------
► AND
► OR
► NOT
► NOR

Question No: 5 ( Marks: 1 ) - Please choose one


Which one is correct for JavaScript?
► onMouseOver
► OnMouseOver
► onmouseover
► All of the given

Question No: 6 ( Marks: 1 ) - Please choose one


A group of statements that are put together (or defined) once and then can be
used (by reference) repeatedly is called ____________.
► Repeater
► Array
► Function
► Pointer
Question No: 7 ( Marks: 1 ) - Please choose one
___________ color should be used in background for a good presentation.
► Light
► Dark
► Red
► None of the given options
Question No: 8 ( Marks: 1 ) - Please choose one
Which one of the following is NOT a primary color?
► Red
► Green
► Yellow
► Blue

Question No: 9 ( Marks: 1 ) - Please choose one


Which of the following is a true statement?
► Flat-file storage is better than tabular storage.
► Tabular storage is better than flat-file storage.
► Flat-file storage is better than relational storage.
► None of the given options

Question No: 10 ( Marks: 1 ) - Please choose one


Due to working at home, lack of interaction may result in ___________
professional growth.
► Slower
► Faster
► Higher
► Improved

Question No: 11 ( Marks: 1 ) - Please choose one


_____________ team is responsible for a project after the specification’s stage till
the very end.
► Executive
► Architect
► Development
► HR

Question No: 12 ( Marks: 1 ) - Please choose one


_____________ team consists on the sharpest technical minds in the company.
► Architecture
► Business Development
► Configuration Management
► Developer

Question No: 13 ( Marks: 1 ) - Please choose one


Smart editors can automatically color different parts of statements in different
colors e.g. comments in ____________ color.
► Green
► Grey
► Blue
► Red
Question No: 14 ( Marks: 1 ) - Please choose one
When the packets reach at destination, __________ reassembles them into
original message.
► Protocol
► TCP
► IP
► NIC

Question No: 15 ( Marks: 1 ) - Please choose one


In a System having many parts to be designed, one should always do the _____
first
► Hard part
► Simple part
► Development part
► Quality part

Question No: 16 ( Marks: 1 ) - Please choose one


Heuristics _______ lead to the best results.
► Sometimes
► Do not
► Occasionally
► Not always

Question No: 17 ( Marks: 1 ) - Please choose one


One can run a program on a remote computer using ________ protocol.
► HTTP
► SMTP
► FTP
► TELNET

Question No: 18 ( Marks: 1 ) - Please choose one


Which protocol is used to send email ?
► FTP
► SMTP
► TELNET
► All of the given choices
Question No: 19 ( Marks: 1 ) - Please choose one
Which event handler executes the specified JavaScript code when a
window/form element loses focus ?
► onBlur
► onLoad
► onUnload
► onFocus

Question No: 20 ( Marks: 1 ) - Please choose one


_____ is the process of analyzing large databases to identify patterns.
► Data normalization
► Data management
► Data Mining
► None of the given options

Question No: 21 ( Marks: 1 ) - Please choose one


Which is the user-friendly way of presenting data ?
► Query
► Form
► Report
► All of the given options

Question No: 22 ( Marks: 1 ) - Please choose one


JavaScript is an ______________________ language.
► Markup language
► Structured language
► Object based language
► None of the Given options

Question No: 23 ( Marks: 1 ) - Please choose one


In latest computers, ___________ are used instead of a vacuum tube
► Diodes
► Triodes
► ICs
► Transistors
Question No: 24 ( Marks: 1 ) - Please choose one
---------------is the process of starting or restarting a computer.
► BIOS
► Refreshing
► Booting
► None of given

Question No: 25 ( Marks: 1 ) - Please choose one


Java script supports drawing of objects.
► True
► False

Question No: 26 ( Marks: 1 ) - Please choose one


Computer programmer that perform various actions continuously, autonomously
on behalf of their principal is known as ______________ .
► Robotics
► Mobile agents
► Decision Support System
► None of above

Question No: 27 ( Marks: 2 )


What is internet?
The Internet is a global system of interconnected computer networks that use the
standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. It is
a network of networks that consists of millions of private, public, academic,
business, and government networks of local to global scope that are linked by a
broad array of electronic and optical networking technologies. The Internet
carries a vast array of information resources and services, most notably the inter-
linked hypertext documents of the World Wide Web (WWW) and the
infrastructure to support electronic mail.
Question No: 28 ( Marks: 2 )
Write names of the DoS attack’s phases?

Question No: 29 ( Marks: 2 )


Write HTML format to include gif and jpg images in a web page.
Question No: 30 ( Marks: 2 )
What is best algorithm?
Question No: 31 ( Marks: 3 )
What kind of new jobs are created because of computing? And which old
professions are being eliminated?

Question No: 32 ( Marks: 3 )


Briefly mention any three problems in old modes of presentation development
Lack of resolution
Low color configuration
No graphic animation
Question No: 33 ( Marks: 3 )
Differentiate between onLoad and onUnload

Question No: 34 ( Marks: 5 )


Why the quality of image in dithering scheme is not good?
Question No: 35 ( Marks: 5 )
Can a human doctor be replaced by an Expert System? Give reasons to support
your answer..

Question No: 36 ( Marks: 5 )


How many members are in the Process Team? What are the responsibilities of
the Process Team?

Question No: 1 ( Marks: 1 ) - Please choose one

Analytical Engine is ------------------

► An electrical machine

► A digital machine

► An analog machine

► A special purpose machine

Question No: 2 ( Marks: 1 ) - Please choose one

__________% of the users have left websites in frustration due to poor navigation.

► 40

► 62

► 83

► 91

Question No: 3 ( Marks: 1 ) - Please choose one


__________ breaks down the message to be sent over the internet into packets.

► FTP

► HTTP

► TCP

► IP

Question No: 4 ( Marks: 1 ) - Please choose one

The first spread sheet was called as_____________.

► Excel

► PowerPoint

► Word

► VisiCalc

Question No: 5 ( Marks: 1 ) - Please choose one

Which is correct?

► onUnload

► onUnLoad

► onUNLOAD

► All of the above

Question No: 6 ( Marks: 1 ) - Please choose one

Variables allow us to manipulate data through the ___________.

► Actual Value

► Reference

► Length

► Name

Question No: 7 ( Marks: 1 ) - Please choose one

We use ___________ to stop Break-Ins.

► Scanners

► Intrusion detectors
► Utilities

► None of the given options

Question No: 8 ( Marks: 1 ) - Please choose one

Which attribute of the IMG tag tells us about the source of the image ____________.

► source

► path

► loc

► src

Question No: 9 ( Marks: 1 ) - Please choose one

The developer report to ___________ in a development team.

► Team Lead

► Project Manager

► CEO

► IT Manager

Question No: 10 ( Marks: 1 ) - Please choose one

The key responsibilities of the architect of the project is______________.

► Technology selection

► High-level design

► Makes certain that the implementation remains true to the design

► All of the given options

Question No: 11 ( Marks: 1 ) - Please choose one

Using smart editors they can automatically color different parts of statements in
different colors e.g. HTML tags in ____________ color.

► Green

► Grey

► Blue

► None of the given options


Question No: 12 ( Marks: 1 ) - Please choose one

_______ is responsible for all the essential operations like basic house keeping, task
scheduling, etc. Also contains low-level HW interfaces

► Hardware

► Device Manager

► Kernel

► Device Driver

Question No: 13 ( Marks: 1 ) - Please choose one

Randomized algorithms are often ________ than deterministic algorithms for the
same problem.

► Simpler and more slow

► Simpler and more efficient

► Complex and more efficient

► Complex and more slow

Question No: 14 ( Marks: 1 ) - Please choose one

Compound Statement after decision constructs in JavaScript is enclosed with

►( )

►[ ]

► { };

►{ }

Question No: 15 ( Marks: 1 ) - Please choose one

The key property of the ‘Array’ object in JavaScript is

► Value

► Length

► Name

► All of the given choices

Question No: 16 ( Marks: 1 ) - Please choose one


Which protocol is used to send email ?

► FTP

► SMTP

► TELNET

► All of the given choices

Question No: 17 ( Marks: 1 ) - Please choose one

Following is highest level of heading tag in list given below.

► H3

► H4

► H5

► H2

Question No: 18 ( Marks: 1 ) - Please choose one

Blue Pacific is a name of ______ computer.

► Mini

► Desktop

► Micro

► Super

Question No: 19 ( Marks: 1 ) - Please choose one

__________ correctness is easier to check as compared with __________

► Syntactic, Semantic

► Semantically, Syntactically

► Systematically, Semantically

► None of the given options

Question No: 20 ( Marks: 1 ) - Please choose one

__________ refers maintaining the correctness and consistency of data

► Security
► Integrity

► Reliability

► None of the given

Question No: 21 ( Marks: 1 ) - Please choose one

Which of the following keyword is used to jump out of switch statement as soon as
the match is found?

► Default

► Else

► Jump

► Break

Question No: 22 ( Marks: 1 ) - Please choose one

How much parameters does POW () function have?

►2

►1

►3

Question No: 23 ( Marks: 1 ) - Please choose one

How many types the string methods have?

►1

►2

►3

Question No: 24 ( Marks: 1 ) - Please choose one

The output of document.write( "2" + Math.PI ) ; is__________.

► 23.141592653589793

► 3.146

► 2.3141592653589793

► None of them

Question No: 25 ( Marks: 1 ) - Please choose one


POP, IMAP and SMTP are related to one of the following service/services?

► Electronic Mail

► Instant Messaging

► Both a and b

► None of above

Question No: 26 ( Marks: 1 ) - Please choose one

_______ is designed for 2D-Animation .

► Flash Animation

► HTML image class

► Web Browser

► HTML 2D class

Question No: 27 ( Marks: 2 )

Define the term 3D Rendering

The process of converting information about 3-D objects into a bit-map that can be
displayed on a 2-D computer display.

Question No: 28 ( Marks: 2 )

What is an intelligent system?

SW programs or SW/HW systems designed to perform complex tasks employing


strategies that mimic some aspect of human thought.

Question No: 29 ( Marks: 2 )

Define testing with respect to programming..

Testing:- The tasks performed to determine the existence of defects.

Programming:- The process of telling the computer what to do.

Question No: 30 ( Marks: 2 )

What is a compiler? Write its one benifit over interpreter.

Question No: 31 ( Marks: 3 )

Who is a Computing Professional?


Question No: 32 ( Marks: 3 )

What are Trojan Horses ?

Question No: 33 ( Marks: 3 )

What is ICMP?

Question No: 34 ( Marks: 5 )

What is ARPANET and who developed it?

Question No: 35 ( Marks: 5 )

Write down the advantages of Natural Language Processing.

Question No: 36 ( Marks: 5 )

Draw hierarchy of the people in the small project?

Question No: 31 (Marks: 1)


What is heuristic?
Heuristic is a procedure that usually, but not always, works or that gives nearly
the right answer.

Question No: 32 (Marks: 1)


In programming, what is an object?
Object is a named collection of properties (data, state) & methods (instructions,
behavior).
Question No: 33 (Marks: 2)
What is spreadsheet? List any two jobs that it can do.

A spreadsheet is a grid that organizes data into columns and rows. Spreadsheets
make it easy to display information, and people can insert formulas to work with
the data.
Electronic replacement for ledgers
Charts
Financial-forecasting.

Question No: 34 (Marks: 2)


In JavaScript, what is event handling? What are the two types of events?
In JavaScript capturing events and responding to them is event handling. The
system sends events to the program and the program responds to them as they
arrive.
1. Events can include things a user does - like clicking the mouse.
2. Events that the system itself does - like updating the clock.
Question No: 35 ( Marks: 3 )
Explain how many ways businesses monitor their employees?
• Systems are available that monitor almost every key stroke that an employee
makes on a computer.
• Systems are available that read and censor all incoming and outgoing eMail.
• It is quite straight forward to monitor where you surf the web.

Question No: 36 ( Marks: 3 )


What is difference between Design and System Architecture?
System architecture is the conceptual design that defines
the structure and/or behavior of a system. Whereas designs it as an
independent, self-contained system.
Question No: 37 ( Marks: 3 )
What are the Sub categories of Artificial Intelligence? Briefly explain any
two.
1. Expert systems:

Expert system is that system which is in some limited sense, can replace an
expert.
2. Robotics:
Robotics is an automatic machine that performs various tasks that were
previously done by humans.
Question No: 38 ( Marks: 5 )
How many ways are there to call a function in a program? Explain with
example.
Two Ways of Calling Functions:
Functions do not run automatically. When the page loads, each function waits
quietly until it is told to run.
1. A function calls appearing as a complete statement:
function popUp( message ) {
window.alert( message ) ;
}
popUp( “Warning!” ) ;

2. A function calls appearing as part of a statement. Definitions of such


functions include a ‘return’ statement:

function add( a, b ) {
c=a+b;
return c ;
}
sum = add( 2, 4 ) ;
document.write( sum ) ;

Question No: 39 ( Marks: 5 )


Elaborate the ‘+ ’ operator and its constraints with the help of examples.
The + Operator Used on Strings. The + operator can also be used to add string
variables or text values together. To add two or more string variables together,
use the + operator.

Example:
txt1="What a very";
txt2="nice day";
txt3=txt1+txt2;
Now txt3 will be having this value "What a very nice day".
txt3=txt1+txt2; this statement due to + sign.

Question No: 40 ( Marks: 10 )


Write a JavaScript program having two functions sum and mean.
The web page will ask the user to enter five values to be added.
After taking input it will calculate the sum and mean of those values by
calling sum and mean functions.

Question No: 41 ( Marks: 10 )


Define the following terms.

Object
Object is a named collection of properties (data, state) & methods (instructions,
behavior).

Event Handler
An event handler is a command which calls a function when an event happens,
such as the user clicking a button.

Local Variable
Declaring variables (using the var keyword) within a function makes them local.
They are available only within the function and hold no meaning outside of it.

Scope of Variable
Defining the space in which a variable is effective is known as defining the scope
of a variable. A variable can be either local or global in scope.

Array
Array is an indexed list of elements.
Question No: 27 ( Marks: 1 )
What BIOS stands for?
BIOS stand for Basic input/output system.

Question No: 28 ( Marks: 1 )


List down the Analytical Engine's components name (any two)
Input
Memory
Processor
Output.

Question No: 29 ( Marks: 2 )


Why uploading a web page is important? Describe in 2 – 3 lines.

By only uploading webpage we could place our information so that other can
reach up to what we have loaded. Upload means make available our data or
information for the world web browsers.

Question No: 30 ( Marks: 3 )


What is the difference between microprocessors and microcontrollers?
Give one example of both.
The microprocessor is electronic equipment which can perform several functions
and also processing of data and information present in a computer, while
microcontroller can only perform one function for that its design.
Example:
Microprocessor: Pentium 4 & Personal Computer.
Microcontroller: Electrical device, washing machines, microwave ovens,
telephones etc.

Question No: 31 ( Marks: 5 )


Differentiate uni-Processor OS from Multi-Processor OS.

Uni-processor OS’es is designed to schedule tasks on a single uP only whereas


Multi-processor OS’es can control computers having multiple uPs, at times
1000’s of them.

Question No: 32 (Marks: 5)


Why do we call JavaScript an Object-based Language?

JavaScript shares many similarities with object-oriented languages, and therefore


is called an object-based language.
Question No: 31 (Marks: 1)
When does recursion occur?

Question No: 32 (Marks: 1)


What are the types of computer network according to the distance
between nodes?
There are two types of networks.
1. LAN (Local Area Network)
2. WAN (Wide Area Network)

Question No: 33 (Marks: 2)


What is meant by semantic error?
Occur when a statement executes and has an effect not intended by the
programmer and Often times occur only in unusual & infrequent circumstances.

Question No: 34 (Marks: 2)


List down the names of two array methods available in JavaScript.
1. sort( ) [sorts elements in alphabetical order].
2. reverse( ) [Reverses the order of elements].
Question No: 35 ( Marks: 3 )
How can you define a consistent web design? Why is it needed?
A consistent good designed website is generated for general public that allows
users to attain what they want as quickly as possible without spending much
effort. A consistent good design is needed to assists the user in recovering from
errors.
Question No: 36 ( Marks: 3 )
How can we include images in a web page using HTML and Java script?
Image in HTML
<IMG src=URL, alt=text height=pixels width=pixels align="bottom|middle|top">
Image in Javascript
Images in JavaScript can be manipulated in many ways using the built-in object
Image.
Additional properties to HTML are hspace, vspace & lowsrc.
Example: It can be used by many handlers like, onAbort, onLoad & onError
Question No: 37 ( Marks: 3 )
The event handler attribute consists of three parts. Write about each of
them.
1. The identifier of the event handler.
2. The equal sign.
3. A string consisting of JavaScript statements enclosed in double or single
quotes.
Question No: 38 (Marks: 5 )
What is a packet in the network environment? What kind of information
does it contain?

A packet is the smallest unit of data transmitted over a computer network. It’s a
message to be transferred over the network is broken up into small packets by
the sending computer.

Each packet contains the following info:


–Sender's address
–Destination address
–Data
–Error-recovery info.
Question No: 39 ( Marks: 5 )
Suppose we have a big project. Draw hierarchy of the people involved in
the project?
Executive Team
CEO, COO,
CMSO

Architecture
Team
Business Technology
Development Team Transfer
Team

Configuration Process
Management Team
Team Quality Support
Assurance Team
Team

Quality
Development Development Development Development
Team A Team B Team C Team D

Question No: 40 ( Marks: 10 )


Write down HTML and JavaScript code for the following requirements:
Declare an Array with the identifier SUBJECT having length 5. Assign following
values to the array elements:
MIS, Java, Algorithms, Databases, C++
Show all values in reverse order.

Question No: 41 ( Marks: 10 )


How instant messaging works? Write the steps involved in this process.
The Instant Messaging services available allow us to maintain a list of people
(contacts) that we interact with regularly. We can send instant messages to any
of the contacts in our list as long as that contact is online.
Following steps are involved in IM working:
1. User commences the IM client.
2. IM client finds the IM server & logs in.
3. It launches communication info (IP address, etc) to the IM server.
4. IM server finds user’s contacts & sends him/her the communication info.
5. IM server also notifies the contacts that the user is online; sends his/her
communication info to them.
6. The user’s & the contact’s IM clients are ready to communicate directly
(P2P).
7. As new contact has come online, IM server informs them about the user
being online & vice versa.
8. Multiple, real-time chat are possible.
9. When the user logs-off, his/her IM client informs the IM server.
10. IM server wipes away the temporary file and informs the user’s contact’s
about his/her ‘offline’ status.
Question No: 5 ( Marks: 10 )
What kind of operations takes place
inside Microprocessors Building Blocks? Enlist them with brief
description.
Bus Interface Unit: The bus interface unit is the part of the processor that
interfaces with the rest of the PC. Its name comes from the fact that it deals with
moving information over the processor data bus.

Instruction Decoder: The instruction decoder of a processor is a combinatorial


circuit sometimes in the form of a read-only memory, sometimes in the form of an
ordinary combinatorial circuit.

Arithmetic & Logic Unit (ALU): An arithmetic and logical unit (ALU) also known
as “Integer Unit” is one of the core components of all central processing units. It
is capable of calculating the results of a wide variety of common computations.

Floating-Point Unit (FPU): A floating point unit (FPU) is a part of a CPU


specially designed to carry out operations on floating point numbers.

Registers: A register is a device for storing data. It is a small amount of very


fast computer memory used to speed the execution of computer programs by
providing quick access to commonly used values.

Control Unit: A control unit is the part of a CPU or other device that directs its
operation. The outputs of the unit control the activity of the rest of the device.

Instruction Set: This is the set of machine instructions that a microprocessor


recognizes and can execute. It is the only language microprocessor knows.

Question No: 7 ( Marks: 8 )


a) Differentiate between SMTP and POP3 server. (3 marks)

SMTP (Simple Mail Transfer Protocol) is a protocol used to send and receive
eMail messages over a TCP/IP network. Whereas POP3 (Post Office Protocol) is
a protocol used for receiving eMail messages. A POP3 server maintains text files
(one file per user accounts) containing all messages received by a user. eMail
client interacts with the POP3 server for discovering and downloading new eMail
messages.
b) How can you justify that a DBMS is better to use than Flat-file database?
(5 marks)

A DBMS takes care of the storage, retrieval, and management of large data sets
on a Database. It provides SW tools needed to organize & manipulate that data
in a flexible manner.

Whereas in Flat-file database the text file format makes it hard to search for
specific information or to create reports that include only certain fields from each
record.

Question No: 8 ( Marks: 8 )


What will be the output of this programme? Write comments where you
find “//” symbol in the following code.

<html>
<head>
<script language="JavaScript">
function doSomething() { // 1
setTimeout('doSomething()',10000); // 2
}
</script>
</head>
<body onLoad="doSomething()"> // 3
document.write(“Virtual University of Pakistan”);
</body>
</html>

// 3 document.write(“Virtual University of Pakistan”);


Question No: 9 ( Marks: 8 )
a) How Trojan Horses and Worms affect a computer system? What
guidelines should be adopted to troubleshoot with malicious software? (6
marks)

Trojan horses are stand-alone programs. The look like what they are not and
appear to be something interesting and harmless (e.g. a game) there execution
results in destruction. Worms only make copies of themselves on the infected
computer.

Following guidelines should be adopted to troubleshoot with malicious software:

• Download SW from trusted sites only.


• Do not open attachments of unsolicited eMails.
• Use floppy disks and CDROMs that have been used in trusted computers only.
• When transferring files from your computer to another, use the write-protection
notches.
• Stay away from pirated SW.
• Regularly back your data up.
• Install Antivirus SW; keep it and its virus definitions updated.

b) Which part of a virus consists of malicious computer instructions? (2


marks)
Payload is the part of virus that generally consists of malicious computer
instructions.

Question No: 31 ( Marks: 1 )


What is the function of Network Interface Card?
NIC is an I/O device that plugs into the computer and it enables it to
communicate over a network.

Question No: 32 (Marks: 1)


In programming, what is a loop?
A loop is a programming language statement which allows code to be
repeatedly executed.
Question No: 33 (Marks: 2)
What is an intelligent system?

Intelligent system is a SW programs or SW/HW systems designed to perform


complex tasks employing strategies that mimic some aspect of human thought.

Question No: 34 (Marks: 2 )


Why hub is used in networks?

Hub is networking equipment and a device which connects several computers to


form a network. In a network the NIC translates the message into electrical
pulses suitable for the computer network in use & transmits it to the hub through
the cable. The hub receives them and forwards them to all computers connected
to it.

Question No: 35 ( Marks: 3 )


What are Trojan Horses?

Trojan Horses are unlike viruses, they are stand-alone programs. The look like
what they are not. They appear to be something interesting and harmless (e.g. a
game) but when their execution result in destruction.

Question No: 36 (Marks: 3)


Elaborate with examples Vector or Object oriented graphics.

Vector or Object-Oriented Graphics treats everything that is drawn as an object.


Objects retain their identity after they are drawn. These objects can later be
easily moved, stretched, duplicated, deleted, etc
They are resolution independent and relatively small file size.
Examples: swf, svg, wmf, ps.

Question No: 37 (Marks: 3)


How can you define a consistent web design? Why is it needed?
A consistent web design should be the one that achieves the result that it was
designed for, that result can only be achieved by giving the user what he wants,
as quickly as possible, without her/him expending much effort. One definition of
usability: Let the user have what he wants, quickly, without much effort “Quickly”
is important!
Question No: 39 (Marks: 5)
What are the advantages of multimedia presentations? Write any five.

Following are the advantages of multimedia presentations:


· Great tool for effectively communicating ideas to an audience
· All electronic
· Easy to make last minute changes
· The undo feature encourages experimentation
· More attractive; commanded more interest
· May include animations, sound, video
· Easy to catalog, store, and recall
· Great tool for making presenter-free interactive material (e.g. self-learning
tutorials)

Question No: 41 (Marks: 10)


How virtual communities are formed? How these are different from other
communities? Give examples.

Virtual Communities are interest-based communities. Members with common


interest share ideas, ask questions, post answers and make announcements
through mailing-lists, news groups or message boards. This is how they are
formed. These communities are definitely very different from traditional ones.
There are generally no bars on membership based on gender, race or religion.
However, they may lack the respect for the individual and civility that are the
norm within conventional, geography-based communities.

Question No: 1 ( Marks: 1 ) - Please choose one


__________ breaks down the message to be sent over the internet into
packets.

► FTP
► HTTP
► TCP (page.no.317)
► IP

Question No: 2 ( Marks: 1 ) - Please choose one


A protocol used for receiving email messages is called ____________.
► URL
► Telnet
► POP3 (page.no.213)
► SMTP

Question No: 3 ( Marks: 1 ) - Please choose one


Aliasing problem can be managed by ____________the size of pixels.
► Reducing (page.no.236)
► Increasing
► Gaining
► Modifying

Question No: 4 ( Marks: 1 ) - Please choose one


Variables allow us to manipulate data through the ___________.
► Actual Value
► Reference (page.no.143)
► Length
► Name

Question No: 5 ( Marks: 1 ) - Please choose one


The __________ reserved word allows a determined action to be taken if
the first condition is false.
► For
► While
► Else
► Switch

Question No: 6 ( Marks: 1 ) - Please choose one


ERP is a type of __________________ .

► Entertainment software

► Productivity software

► Business software

► Scientific software

Question No: 7 ( Marks: 1 ) - Please choose one


What is/are the use/uses of Word processor?
► To write a letter
► To write Research paper or report
► To create address labels
► All of the given

Question No: 8 ( Marks: 1 ) - Please choose one


Command that allows you to recover form mistakes is called __________.
► Clear
► Edit
► Undo
► Break

Question No: 9 ( Marks: 1 ) - Please choose one


Automatic machines performing various tasks that were previously done
by humans, are called ____________.
► Robotics (page.no.244)
► Computers
► Decision Making Systems
► Autonomous Web Agents

Question No: 10 ( Marks: 1 ) - Please choose one


The ______ is connected to all other modules of the microprocessor.

► Control unit
► Memory unit
► Floating Point unit
► Arithmetic and Logic unit

Question No: 11 ( Marks: 1 ) - Please choose one


Database consisting of two or more related tables, is called
_____________.
► Flat file database
► Object oriented database
► Tabular storage database
► Relational database (page.no.263)

Question No: 12 ( Marks: 1 ) - Please choose one


_________ can be used for entering, editing, or viewing data, one record at
a time.
► Queries
► Forms (page.no.263)
► Reports
► None of the given options

Question No: 13 ( Marks: 1 ) - Please choose one


Distance learning has got a boost due to the ___________.
► Easy communication
► Online interactive contents
► Flexibility
► All of the given options

Question No: 14 ( Marks: 1 ) - Please choose one


____________ DBMS supports data in terabytes.
► Personal
► Desktop
► Enterprise
► Single-user

Question No: 15 ( Marks: 1 ) - Please choose one


After the DoS attack in year 2000, Yahoo servers were recovered in
__________.
► 1 hour
► 2 hours
► 3 hours
► 4 hours

Question No: 16 ( Marks: 1 ) - Please choose one


When web server is busy it gives the following message to the user :
► Time out
► Waiting
► Server busy
► None of the given options

Question No: 17 ( Marks: 1 ) - Please choose one


To stop industrial espionage, we use__________.
► Private network
► Encryption
► Network sniffer
► All of the given options (page.no.277)

Question No: 18 ( Marks: 1 ) - Please choose one


_______________ based communication allows business entities to
coordinate the activities of their globally spread units with greater
accuracy.
► Intranet
► Internet
► Home
► LAN
Question No: 19 ( Marks: 1 ) - Please choose one
onAbort , onError are the _______________ of the image object.
► Event Handler (page.no.286)
► Properties
► Methods
► None of the given options

Question No: 20 ( Marks: 1 ) - Please choose one


Processed data is called ________.

► Information
► Data
► Entity
► Attribute

Question No: 21 ( Marks: 1 ) - Please choose one


______ is a client program that uses HTTP to make requests to Web
servers throughout the internet on behalf of the user.
► Web Application
► Web Browser (page.no.18)
► Internet Application
► HTML

Question No: 22 ( Marks: 1 ) - Please choose one


_______ consists of cells arranged in rows & columns
► Spreadsheets Software
► Word processor
► Presentation Software
► Microsoft Paint Software

Question No: 23 ( Marks: 1 ) - Please choose one


Flow control constructs in JavaScript includes:
► If-Else
► Loops and If -Else
► Switch and If-Else
► All of the given choices

Question No: 24 ( Marks: 1 ) - Please choose one


Which is NOT true for JavaScript variable name ?
► Student
► Roll_no_1111
► For
► _schedule

Visit this page


http://groups.google.com/group/vuZs

Question No: 25 ( Marks: 1 ) - Please choose one


In JavaScript, second element of an array has the index:
►2
►0
►1
►3
JAVASCRIPT ARRAY BASICS
5 May 2008 ... In this tutorial you learn what a JavaScript array is, ... The
first element hasan index of 0, the second element has an index of 1, ...
www.elated.com/articles/javascript-array-basics/ - Cached - Similar -

Question No: 26 ( Marks: 1 ) - Please choose one


Which protocol is used to control other computer from our own
computer ?
► FTP
► NNTP
► TELNET (page.no.211)
► None of the given choices
Question No: 27 ( Marks: 1 ) - Please choose one
______ occurs when a function calls itself.
► Recursion
► Call by value
► Call by reference
► Parsing
RECURSION - WIKIPEDIA, THE FREE ENCYCLOPEDIA
The function calls itself recursively on a smaller version of the input (n - 1)
and multiplies the result of the recursive call by n, until reaching the ...
en.wikipedia.org/wiki/Recursion - Cached - Similar -
Question No: 28 ( Marks: 1 ) - Please choose one
Which function returns a randomly selected floating point number between
0 and 1 ?
► floor(x)
► ceil(x)
► random()
► round(x)

Question No: 29 ( Marks: 1 ) - Please choose one


Using Java Script you can write a character at random location on screen
► By applying randomCh() method
► With the help of String object
► With the help of random character property
► There is no built in approach in Java Script

Question No: 30 ( Marks: 1 ) - Please choose one


The most used form tag is the <input> tag.

► True
► False

Question No: 31 ( Marks: 1 )


What are the elements of website design? Any one

Question No: 32 ( Marks: 1 )


What kind of information can be stored in a database ?

Question No: 33 ( Marks: 2 )


What is meant by universal access of internet services ?

Question No: 34 ( Marks: 2 )


What is the database?

Question No: 35 ( Marks: 3 )


The event handler attribute consists of three parts. Write about each of
them.

Question No: 36 ( Marks: 3 )


What is difference between Design and System Architecture?

Question No: 37 ( Marks: 3 )


What are Trojan Horses ?

Question No: 38 ( Marks: 5 )


Differentiate between For and While loop by writing the syntax of both
loops.

Question No: 39 ( Marks: 5 )


Suppose we have a big project. Draw hierarchy of the people involved in
the project?

Question No: 40 ( Marks: 10 )


Write down output for the following JavaScript code.

a) <script type="text/javascript">
document.write(Math.sqrt(25)); // output ?
</script>
b) <script type="text/javascript">
document.write(Math.pow(5, 3)); // output ?
</script>
c) <script type="text/javascript">
document.write(Math.min(5, 3)); // output ?
</script>
d) <script type="text/javascript">
document.write(Math.max(5, 3)); // output ?
</script>
e) <script type="text/javascript">
document.write(Math.floor(9.87)); // output ?
</script>

Question No: 41 ( Marks: 10 )


Is tabular data storage better than flat file data storage? Justify your
answer.
Question No: 1 ( Marks: 1 ) - Please choose one
Which of the following hardware component of a computer can
also be called as engine?
► Bus
► Storage
► Memory
► Processor
Question No: 2 ( Marks: 1 ) - Please choose one
TCP stands for ___________.
► Total communication protocol
► Transmission control protocol (page. no.317)
► Transfer control protocol
► Transfer collection protocol

Question No: 3 ( Marks: 1 ) - Please choose one


__________ breaks down the message to be sent over the
internet into packets.

► FTP
► HTTP
► TCP (Page.no.317)
► IP

Question No: 4 ( Marks: 1 ) - Please choose one


A variable can be _________ in scope.
► Local
► Global
► Either local or global (page.no.204)
► None of the given options

Question No: 5 ( Marks: 1 ) - Please choose one


A protocol used for receiving email messages is called
____________.
► URL
► Telnet
► POP3
► SMTP (page.no.213)

Question No: 6 ( Marks: 1 ) - Please choose one


A function is also called __________.

► Sub-program

► Procedure

► Sub-routine

► All of the given option

Question No: 7 ( Marks: 1 ) - Please choose one


Capturing events and responding to them is called __________.

► Function Handling
► Event Handling (page.no.228)

► Event Procedure

► All of the given option

Question No: 8 ( Marks: 1 ) - Please choose one


Which one of the following is NOT a primary color?
► Red
► Green
► Yellow
► Blue

Question No: 9 ( Marks: 1 ) - Please choose one


__________ are those programs in which the flow of the program
is determined by the user's actions (mouse clicks, key presses)
or messages from other programs.
► Event called programs
► Event processed programs
► Event driven programs
► Event declared programs

Question No: 10 ( Marks: 1 ) - Please choose one


a = Math.ceil(12.01)

What will be the value of a ?

► 12
► 13
► 12.0
► 13.01

Question No: 11 ( Marks: 1 ) - Please choose one


Event handlers are placed in the ___________ portion of a Web
page as attributes in HTML tags.
► HEAD
► BODY (page.no229)
► SCRIPT
► TITLE

Question No: 12 ( Marks: 1 ) - Please choose one


_________ can be used for entering, editing, or viewing data,
one record at a time.
► Queries
► Forms (page.no.263)
► Reports
► None of the given options

Question No: 13 ( Marks: 1 ) - Please choose one


random() function returns a randomly-selected, floating-point
number between ____________.
► 0 and 1
► 0 and 10
► 0 and -10
► 0 and -1

Question No: 14 ( Marks: 1 ) - Please choose one


The organizations are learning that business can be done in a
more effective manner if emphasis is placed upon ___________.
► Cooperation
► Shared responsibility
► Networking
► All of the given options (page.no.281)

Question No: 15 ( Marks: 1 ) - Please choose one


In relational database, data store in the form of _____________.
► Tables (page.no.321)
► Rows
► Columns
► None of the given options

Question No: 16 ( Marks: 1 ) - Please choose one


Spies of one business monitoring the network traffic of their
competitors’ ___________.
► Industrial Intelligence
► Industrial Espionage (page.no.277)
► Industrial Spying
► Industrial Surveillance

Question No: 17 ( Marks: 1 ) - Please choose one


_____________ waits for some time and then launch a function.
► Timeout( )
► setTimeout( )

(page.no.290)

► setTime( )
► setTimeIn( )

Question No: 18 ( Marks: 1 ) - Please choose one


_______________ based communication allows business entities to
coordinate the activities of their globally spread units with
greater accuracy.
► Intranet
► Internet (page.no.294)
► Home
► LAN

Question No: 19 ( Marks: 1 ) - Please choose one


The key responsibilities of a project manager is _____________.
► Planning and tracking of the project
► Arranging of the appropriate resources
► Client relationship management
► All of the given options (page.no.296)

Question No: 20 ( Marks: 1 ) - Please choose one


_____________ team consists on the sharpest technical minds in
the company.
► Architecture (page.no.302)
► Business Development
► Configuration Management
► Developer

Question No: 21 ( Marks: 1 ) - Please choose one


Smart editors can automatically color different parts of
statements in different colors e.g. comments in ____________
color.
► Green
► Grey (page.no.315)
► Blue
► Red

Question No: 22 ( Marks: 1 ) - Please choose one


A collection of data organized in such a way that the computer
can quickly search for a desired data item is known as :
► Retrieving
► Database (page.no.321)
► Information
► DBMS

Question No: 23 ( Marks: 1 ) - Please choose one


Deep Blue was the name of
► computer (page.no.9)
► human
► city
► game
Question No: 24 ( Marks: 1 ) - Please choose one
Information available on the web is
► mostly free of cost
► costly
► very cheap
► of no use

Question No: 25 ( Marks: 1 ) - Please choose one


Which one is correct?

► <BODY></BODY>
► <body></body>
► Both <BODY></BODY> and <body></body> ( Ref: As
HTML is not case sensitive)
► <BODY/>

Question No: 26 ( Marks: 1 ) - Please choose one


_________ is the best known builder for supercomputers.
► Sun
► Cray Research (page.no.21)
► Microsoft
► Apple

Question No: 27 ( Marks: 1 ) - Please choose one


Which one is the example of spreadsheet software ?
► MS Word
► MS PowerPoint
► MS Excel
► MS Access

Question No: 28 ( Marks: 1 ) - Please choose one


Currently the BlueRay DVD can store more than ________ of
data.
► 10 GB
► 100 GB
► 50 GB (page.no.305)
► 150 GB

Question No: 29 ( Marks: 1 ) - Please choose one


Blue Pacific is a name of ______ computer.
► Mini
► Desktop
► Micro
► Super (page.no.21)
Question No: 30 ( Marks: 1 ) - Please choose one
_________________ are powerful pieces of hardware, but not much
useful on their own.
► Microcontrollers
► Microprocessors (page.no.33)
► Integrated circuits
► Ports

Question No: 31 ( Marks: 1 )


In programming, what is a loop?
In computer science a for loop is a programming language
statement which allows code to be repeatedly executed. A for
loop is classified as an iteration statement.
Question No: 32 ( Marks: 1 )
What are the other names of function? Any one.
Routine , procedure , sub prograam

Question No: 33 ( Marks: 2 )


How JavaScript Arrays are heterogeneous ?
Arrays are heterogeneous in java script because at the same
time stimultanously they can hold elements of multiple data
types

Question No: 34 ( Marks: 2 )


What is the database?
Data base is a collection of organized data in a proper way
that computer can quickly search for any desired data item ,
its an easy way of allowing of manipulation of data,they are
design in such a way that access to any desired data can be
identified and reached quickly and easy , they are generally
consist of collection of interrelated files

Question No: 35 ( Marks: 3 )


Differentiate between LAN and WAN with one example of
each.
Lan is a local area network where as wan is a wide area
network
Lan can be used in a specific areas with limited computers
where as wan can be used on computers shared by large
distances
For example lan can be used on pc s or an organization located
in one building but wan can be used on large scales like banks
all over or in any Large communication systems

Question No: 36 ( Marks: 3 )


What are Trojan Horses ?
Trojen horses are a kind of cyber crime , they are v harmful to
computer because they are stand alone programme and the
look like what they are not like any thing amusing or not
harmless like games..
Question No: 37 ( Marks: 3 )
Elaborate Rester Graphics with examples.
A raster graphics image, digital image, or bitmap, is a data file
or structure representing a generally rectangular grid of
pixels, or points of color, on a computer monitor, paper, or
other display device.

To illustrate the matter further - here's the letter "J":


J
Look closely at it... Take a magnifying glass to it if you like.
You see a "J", the computer sees something more like this,
where '.' represents a zero and 'X' represents a one:

....X
....X
....X
....X
....X
....X
....X
X...X
X...X
.XXX.

Where you see a zero, the computer instructs its video


hardware to paint the current background color. A one calls for
the current foreground color. Yes, it is actually a bit more
complicated, but it all basically boils down to one bit or the
other making a distinction
between the colors of adjacent pixels, which together form an
image.
Question No: 38 ( Marks: 5 )
What are the important properties, methods and event
handlers of image object?
The primary use of the image object is to download an image
into the cache before it is needed to display , image object can
be used to create different kinds of animations or to display
one of several images based on the desired requirement , in
java script image object can be used to display the required
pre loaded image
Properties of image object is : height , width ,hspace ,vspace ,
src , name border etc
Methods :none
Event handlers:on aboart , onload, onerror etc
Question No: 39 ( Marks: 5 )
Write the JavaScript code for the Function
SumOddNumbers(maxNumber) that can add non-negative odd
numbers up to maxNumber and return their sum.
Function sum odd numbers(maxnumber){var sum=0;
For(i=0; <maxNumbers;I++){{if(i / 2 == 1 || i == 1)sum += i;}
return sum;}
Question No: 40 ( Marks: 10 )
Write a note on :
· Coding guidelines
· Guidelines for developing short programs.
· Coding guidelines
· • Always use semicolons to end statements
· • Indent blocks of code (2 to 5 spaces)
· • Identifiers
· • Use the camel back scheme
· • Variables: nouns
· • Functions: verbs
· • Comment Liberally
· • Make them descriptive but concise
·
Gudelines for developing short programs.
· • Read and understand the problem
· • Do you have all the required data?
· • No: Get it
· • Else assume it. State it explicitly
· • Do the design

Question No: 41 ( Marks: 10 )


write a note on each of the following:
a. Vector or Object-Oriented Graphics:
b. Bit-Mapped or Raster Graphics:
A:In Vector or object oriented graphic everything drawn is
treated as object. objects retain their identity after they are
drawon. these objects can later be moved, stretched,
duplicated, deleted,etc. they are resolution independent and
have relatively small file size. the examples are: swf, svg, wmf,
ps
brass_ibrahim: Vector graphics is the use of geometrical
primitives such as points, lines, curves, and shapes or
polygon(s), which are all based on mathematical equations, to
represent images in computer graphics.
brass_ibrahim: The term "vector graphics" is mainly used today
in the context of two-dimensional computer graphicsVirtually
all modern 3D rendering is done using extensions of 2D vector
graphics techniques .Virtually all modern 3D rendering is done
using extensions of 2D vector graphics techniques
B:Bit-Mapped or Raster Graphics:
Treats everything that is drawn as a bit-map
If an object is drawn on top of another, it is difficult to move
just one of them while
leaving the other untouched
Changing the resolution often requires considerable touch-up
work
Relatively large file size
Examples: gif, jpg, bmp
masood.tariq: Bit-Mapped or Raster Graphics:
Treats everything that is drawn as a bit-map
If an object is drawn on top of another, it is difficult to move
just one of them while
leaving the other untouched
Changing the resolution often requires considerable touch-up
work
Relatively large file size
Examples: gif, jpg, bmp
Question No: 1 ( Marks: 1 ) - Please choose one
Which function returns a randomly selected floating point number between 0 and 1 ?
► floor(x)
► ceil(x)
► random()(Correct)
► round(x)

Question No: 2 ( Marks: 1 ) - Please choose one


Functions are also called:
► Heuristics
► Variables
► Arrays
► Subprograms (Correct)

Question No: 3 ( Marks: 1 ) - Please choose one


In JavaScript, each element of array can store data of type
► A Number
► An Array
► A String variable
► All of the given choices (Correct)

Question No: 4 ( Marks: 1 ) - Please choose one


The weaknesses of the computer are:
► Pattern recognition & Storage
► Speed & Innovative ideas
► Pattern recognition & Innovative ideas (Correct)
► Speed & Storage

Question No: 5 ( Marks: 1 ) - Please choose one


Processed data is called ________.
► Information (Correct)
► Data
► Entity
► Attribute

Question No: 6 ( Marks: 1 ) - Please choose one


Many developers write the _________ first and then incrementally convert each line into
_________.
► Real code & Pseudo code
► Pseudo code & Real code (Correct)
► Real code & Artificial code
► None of the given options

Question No: 7 ( Marks: 1 ) - Please choose one


When we buy a software package, we do not really buy it, we just by a license that allows us to
use it, the ___________stays with the maker.

► Agreement
► Ownership (Correct)
► Membership
► Software

Question No: 8 ( Marks: 1 ) - Please choose one


Name, Border, Source are the ____________ of the image object.
► Event Handler
► Properties
► Methods
► None of the given options

Question No: 9 ( Marks: 1 ) - Please choose one


Using smart editors they can automatically color different parts of statements in different colors
e.g. HTML tags in ____________ color.

► Green
► Grey
► Blue (Correct)
► None of the given options

Question No: 10 ( Marks: 1 ) - Please choose one


____________ is in Executive team.
► Project Manager
► CEO (Correct) Page no. 296
► Team Lead
► Developer

Question No: 11 ( Marks: 1 ) - Please choose one


Module level design and unit testing the responsibility of _____________.
► Team Lead
► Developer (Correct)
► Project Manager
► Quality Assurance Expert

Question No: 12 ( Marks: 1 ) - Please choose one


_____________ team is responsible for a project after the specification’s stage till the very end.
► Executive
► Architect
► Development (Correct)
► HR

Question No: 13 ( Marks: 1 ) - Please choose one


_____________ waits for some time and then launch a function.
► Timeout( )
► setTimeout( ) (Correct)
► setTime( )
► setTimeIn( )

Question No: 14 ( Marks: 1 ) - Please choose one


Which of the following is NOT an event handler for image object?
► onAbort
► onError
► onLoad
► onUser (Correct)

Question No: 15 ( Marks: 1 ) - Please choose one


______________ is a field that uniquely identifies each record stored in a table.
► Composite Key
► Primary key (Correct)
► Foreign key
► None of the given options

Question No: 16 ( Marks: 1 ) - Please choose one


Distance learning has got a boost due to the ___________.
► Easy communication
► Online interactive contents
► Flexibility
► All of the given options (Correct)

Question No: 17 ( Marks: 1 ) - Please choose one


By default in a web page Hyper Link for another web page is represented as ________________

► Blue only
► Black and Underlined
► Blue and Bold
► Blue and Underlined (Correct)

Question No: 18 ( Marks: 1 ) - Please choose one


To store rounded number of 8.6 in a variable called "r_number", we write _____________.
► r_number=Maths.round(8.6)
► r_numbers=Maths.rounds(8.6)
► r_number=Math.rounds(8.6)
► r_number=Math.round(8.6) (Correct)

Question No: 19 ( Marks: 1 ) - Please choose one


Which one is the best option for designing a Medical Expert System?
► Rule Based System
► Genetic Algorithm
► Fuzzy Logic
► Neural Network

Question No: 20 ( Marks: 1 ) - Please choose one


Variables allow us to manipulate data through the ___________.
► Actual Value
► Reference (Correct)
► Length
► Name

Question No: 21 ( Marks: 1 ) - Please choose one


Which is correct?

► onUnload (Correct) (P.no.245)

► onUnLoad
► onUNLOAD
► All of the above
Question No: 22 ( Marks: 1 ) - Please choose one

Capturing events and responding to them is called __________.

► Function Handling

► Event Handling (Correct)

► Event Procedure

► All of the given option

Question No: 23 ( Marks: 1 ) - Please choose one


___________ color should be used in background for a good presentation.

► Light

► Dark (Correct)

► Red

► None of the given options

Question No: 24 ( Marks: 1 ) - Please choose one


Which of the following symbol is used for multiple line comments in JavaScript?

►/
► //
► /* (Correct)
► //*

Question No: 25 ( Marks: 1 ) - Please choose one


In JavaScript, what will be the result of the follwoing operation
79%3
►0
► 1 (Correct)
►2
►3
Explanation:- 79 divided by 3 and remainder is 1
Question No: 26 ( Marks: 1 ) - Please choose one
A new cell using HTML is added in table row by
► <TC>…</TC>
► <TR>…</TR>
► <TD>…</TD> (Correct) (P.No.54)
► <NC>…</NC>

Question No: 27 ( Marks: 1 ) - Please choose one


TCP stands for ___________.
► Total communication protocol
► Transmission control protocol (Correct)
► Transfer control protocol
► Transfer collection protocol

Question No: 28 ( Marks: 1 ) - Please choose one


What is NOT a key factor while designing a website?
► Usability
► User-friendly
► Consistency
► Complexity (Correct)

Question No: 29 ( Marks: 1 ) - Please choose one


It represents the ________________ flow chart element.

► Process
► Input or Output (correct) P.no.105
► Decision
► Connector

Question No: 30 ( Marks: 1 ) - Please choose one


Vacuum tubes were replaced by ___
► Punch cards
► Transistors (Correct) P.no.14
► Micro Processors
► Resistors

Question No: 31 ( Marks: 1 )


When does recursion occur?

Possible Answer:-
The power of recursion evidently lies in the possibility of defining an infinite set of objects by
a finite statement.

Question No: 32 ( Marks: 1 )


What are the types of computer network according to the distance between nodes ?

Answer:
There are two types of networks.
1. LAN (Local Area Network)
2. WAN (Wide Area Network)

Question No: 33 ( Marks: 2 )


What is meant by semantic error ?

Answer:
Occur when a statement executes and has an effect not intended by the programmer and
Often times occur only in unusual & infrequent circumstances

Question No: 34 ( Marks: 2 )


List down the names of two array methods available in JavaScript.

Answer:
1. sort( ) [sorts elements in alphabetical order]
2. reverse( ) [Reverses the order of elements]

Question No: 35 ( Marks: 3 )


How can you define a consistent web design? Why is it needed?

Answer:
A consistent good designed website is generated for general public that allows users to
attain what they want as quickly as possible without spending much effort.

A consistent good design assists the user in recovering from errors.

Question No: 36 ( Marks: 3 )


How can we include images in a web page using HTML and Java script?

Answer:
Image in HTML
<IMG src=URL, alt=text height=pixels width=pixels align="bottom|middle|top">

Image in Javascript
Images in JavaScript can be manipulated in many ways using the built-in object Image.
Additional properties to HTML are hspace, vspace & lowsrc.
Example: It can be used by many handlers like, onAbort, onLoad & onError

Question No: 37 ( Marks: 3 )


The event handler attribute consists of three parts. Write about each of them.

Answer :
The identifier of the event handler
The equal sign
A string statement enclosed in double or single quotes.

Question No: 38 ( Marks: 5 )


What is a packet in the network environment? What kind of information does it contain?

Answer:

 Packet is data chopped up into pieces in a network environment.

 These packets contain information about which computer sent the data and where
the data is going.
 If a packet runs into a problem during its trip, it can attempt to find another route.
When all the packets get where they are going, the recipient computer puts them together
again.
Question No: 39 ( Marks: 5 )
Suppose we have a big project. Draw hierarchy of the people involved in the project?

Answer:
Please ignore small lines relating Sub Teams to subordinates due to shortage of time.
ABCD etc are connected directly to Team Lead 1,2 & 3 accordingly.

Question No: 40 ( Marks: 10 )


Write down HTML and JavaScript code for the following requirements:
Declare an Array with the identifier SUBJECT having length 5. Assign following values to the
array elements:
MIS, Java, Algorithms, Databases, C++
Show all values in reverse order.

Question No: 41 ( Marks: 10 )


How instant messaging works? Write the steps involved in this process.

Answer:
The Instant Messaging services available allow us to maintain a list of people (contacts)
that we interact with regularly. We can send instant messages to any of the contacts in our
list as long as that contact is online.

Following steps are involved in IM working.

1. User commences the IM client.

2. IM client finds the IM server & logs in.

3. It launches communication info (IP address, etc) to the IM server.

4. IM server finds user’s contacts & sends him/her the communication info.

5. IM server also notifies the contacts that the user is online; sends his/her

communication info to them.

6. The user’s & the contact’s IM clients are ready to communicate directly (P2P).

7. As new contact has come online, IM server informs them about the user being

online & vice versa.

8. Multiple, real-time chat are possible.

9. When the user logs-off, his/her IM client informs the IM server.

10. IM server wipes away the temporary file and informs the user’s contact’s about

his/her ‘offline’ status.

The transistor is a solid state semiconductor device used for amplification and
switching, and has __________ terminals.
► one
► two
► three
► four

Question No: 2 ( Marks: 1 ) - Please choose one


Blue Pacific is a name of _____ computer.
► Mini
► Desktop
► Micro
► Super

Question No: 3 ( Marks: 1 ) - Please choose one


Monte Carlo algorithm is an example of __________

► Randomized algorithm (page.no.102)


► Greedy algorithm
► both greedy and randomized
► Heuristics

Question No: 4 ( Marks: 1 ) - Please choose one


A set of stand alone productivity applications designed to work together known
as ______.

► Productivity software suites


► Compiled software
► Secure software
► Intelligent software

Question No: 5 ( Marks: 1 ) - Please choose one


The most used form tag is the <input> tag.

► True
► False

Question No: 6 ( Marks: 1 ) - Please choose one


What is the key feature of computer which is against human nature.?
Can’t get bored.
► Can’t get bored.
► Pattern recognition
► Repetition
► None

Question No: 7 ( Marks: 1 ) - Please choose one


_____ was designed as a replacement for typewriter
► Spreadsheet Software
► Word Processor Software
► Presentation Software
► Database Software

Question No: 8 ( Marks: 1 ) - Please choose one


Forms can be submitted by using _________ different methods
►2
►3
►4
►5
Methods are GET and POST

Question No: 9 ( Marks: 1 ) - Please choose one


To display a checkbox on the web page, we use ___ tag
► CHECKBOX
► CHECK
► INPUT
► INPUTBOX

Checkbox is not not a tag, input is a tag,

Question No: 10 ( Marks: 1 ) - Please choose one


_____ attribute of FORM tag is used to mention a URL when the form is being
submitted
► name
► action
► method
► submit

Question No: 11 ( Marks: 1 ) - Please choose one


You can ________ from/to a website containing interactive forms.
► Only read
► Only write
► Read and write
► Not read and write

Question No: 12 ( Marks: 1 ) - Please choose one


Using COLSPAN, number of rows of the current cell should extend itself None of
the given choices

► Upward
► Downward (page.no.56)
► Both Upward and Downward
► None of the given choices

Question No: 13 ( Marks: 1 ) - Please choose one


ASCII WHITE is the fastest Super computer which can perform ___ calculations
in one second.
► 1.3 billion
► 1.3 trillion
► 1.3 miillion
► 1.3 thousand

Question No: 14 ( Marks: 1 ) - Please choose one


____ is a related collection of WWW files that includes a beginning file called a
homepage
► HTML
► Website
► HTTP
► Web page

Question No: 15 ( Marks: 1 ) - Please choose one


If a computer could pass the Turing test then it would be able to:

► think like human beings


► do the things faster
► win a million dollar prize
► store more information

Question No: 16 ( Marks: 1 ) - Please choose one


The key strengths of computers are -
► Speed
► Storage
► Do not get bored
► All of the given choices

Question No: 17 ( Marks: 1 ) - Please choose one


Compared to vacuum tubes, Transistors offer:
► Much smaller size
► Better reliability
► Much lower cost
► All of the given choices

Question No: 18 ( Marks: 1 ) - Please choose one


Which of the following is NOT a component of IC?
► Transistors
► Diodes
► Resistors
► Vacuum tubes

Visit this Group of vuZs


http://groups.google.com/group/vuZs
Question No: 19 ( Marks: 1 ) - Please choose one
When we use <INPUT type=“password”>, what will happen?

► Text will not be visible

► Text will be in normal format

► Text will be in **** format

► Text will be in #### format

Question No: 20 ( Marks: 1 ) - Please choose one


Spread sheet is a type of _ Mathematical software ________.
► Productivity software
► Engineering software
► Mathematical software
► Business software

Question No: 21 ( Marks: 1 ) - Please choose one


Word Processor is a ____ Application Software__
► System Software
► Application Software
► Device
► Utility

Question No: 22 ( Marks: 1 ) - Please choose one


_ Utility Program refers to the firmware code which is run by an IBM compatible
PC when first powered on.
► DOS
► BIOS
► Utility Program
► None of these

Question No: 23 ( Marks: 1 ) - Please choose one


A computer program that facilitates the communication between the computer
and a peripheral device is called____ Language Translator _______

► Operating system
► Utilities
► Language Translator
► Device Drives

Question No: 24 ( Marks: 1 ) - Please choose one


In JavaScript, what will be the result of the following operation 79%3
►0
►1
►2
►3

if we divide 79 by 3 ,we will get remainder=1 ,


Question No: 25 ( Marks: 1 ) - Please choose one
Which of the following number system is used by microprocessor?

► Binary
► Decimal
► Octal
► Hexadecimal

Question No: 26 ( Marks: 1 ) - Please choose one


Web site is collection of related ______
► Web pages
► Information
► Search Engines
► None of the given choices

Question No: 27 ( Marks: 1 )


What BIOS stands for? – Binary Input Output System

Question No: 28 ( Marks: 1 )


List down the Analytical Engine's components name (any two)
Answer : Google & Netscape,

Question No: 29 ( Marks: 2 )


Why uploading a web page is important? Describe in 2 – 3 lines.
Answer : By only uploading webpage we could place our information in order the
other can reach up to ready what we load, upload means make available our
data or information for the world web browsers

Question No: 30 ( Marks: 3 )


What is the difference between microprocessors and microcontrollers? Give one
example of both.
Answer : The microprocessor is electronic equipment which can perform several
function and also processing of data and information present in a computer, while
microcontroller can only perform one function for that its design
Example
Microprocessors _ Pentium 4
Microcontroller _ can be a switch in side the washing machine

Question No: 31 ( Marks: 5 )


Differentiate uni-Processor OS from Multi-Processor OS.
Answer : The Multiprocessors is when more than one processor is under
operation it can be several or may hundreds of the kind to perform one great
operation or calculation, while our PC is a kind of uni-processor

Question No: 32 ( Marks: 5 )


Why do we call JavaScript an Object-based Language?
Answer : Java Script is a language by which we are writing our web-pages, this
language is designed to work for web pages
Question No: 1 ( Marks: 1 ) - Please choose one
---------- was known as “mill” in Analytical engine.
► Memory
► Processor
► Monitor
► Mouse
Ref: An arithmetical unit (the "mill") would be able to perform all four arithmetic
operations, plus comparisons and optionally square roots. Initially it was
conceived as a difference engine curved back upon itself, in a generally circular
layout,[2] with the long store exiting off to one side.

Question No: 2 ( Marks: 1 ) - Please choose one


First electronic computer was
► ABC ( Page No. 14)
► UNVAC 1
► Harvard Mark 1
► IBM PC

Question No: 3 ( Marks: 1 ) - Please choose one


What is NOT a key factor while designing a website?
► Usability
► User-friendly
► Consistency
► Complexity

Question No: 4 ( Marks: 1 ) - Please choose one


What happens if I start a new list without closing the original one?

► An error will be generated


► A nested list will be created
► Previous list will end and a new will start.
► Nothing will happen

Question No: 5 ( Marks: 1 ) - Please choose one


The most upper right pixel of the screen is of ___________ color.
► Any
► Red
► Green
► Blue

Question No: 6 ( Marks: 1 ) - Please choose one


A single pixel can acquire approximately ___________ color schemes.
► 1 million
► 2 million
► 10 million
► 16 million (P.NO.235)

Question No: 7 ( Marks: 1 ) - Please choose one


The idea of Neural Networks field is based upon ______________.
► Human nature
► Human brain
► Human culture
► Human actions

Question No: 8 ( Marks: 1 ) - Please choose one


Which one of the following is an application for artificial intelligence?
► Robotic
► Web Agent
► Decision Support System
► All of the given options

Question No: 9 ( Marks: 1 ) - Please choose one


Register is a kind of ______memory

► Fast
► Super fast
► Slow
► Very slow

Question No: 10 ( Marks: 1 ) - Please choose one


Which of the following is a true statement?
► Flat-file storage is better than tabular storage.
► Tabular storage is better than flat-file storage. (Page. No 257)
► Flat-file storage is better than relational storage.
► None of the given options

Question No: 11 ( Marks: 1 ) - Please choose one


substring(n, m) returns a string containing characters copied from position n
to___________.
►m–2
► m – 1 (Page.no. 270)
►m+1
►m

Question No: 12 ( Marks: 1 ) - Please choose one


The __________ is the old profession which is being eliminated because of
computing.
► Typist
► Bank manager
► Operational manager
► All of the given options

Question No: 13 ( Marks: 1 ) - Please choose one


The system that manages relational database, is called ______________.
► None of the given options
► Database Management System
► Data Management System
► Relational Database Management System (page.no.274)

Question No: 14 ( Marks: 1 ) - Please choose one


When web server is busy it gives the following message to the user :
► Time out
► Waiting
► Server busy
► None of the given options

Question No: 15 ( Marks: 1 ) - Please choose one


The group of technologies concerned with the capturing, processing and
transmission of information in the digital electronic form is called
_____________.
► Telecom Engineering
► Computer Engineering
► Computer Science
► Information Technology (page.no.295)

Question No: 16 ( Marks: 1 ) - Please choose one


_____________ team consists on the sharpest technical minds in the company.

► Architecture (page.no.300)
► Business Development
► Configuration Management
► Developer

Question No: 17 ( Marks: 1 ) - Please choose one


TCP stands for ________.
► Transfer Center protocol
► Transmission Control Protocol (page.no.317)
► Transmission Center Protocol
► Telephone Center Protocol

Question No: 18 ( Marks: 1 ) - Please choose one


A collection of data organized in such a way that the computer can quickly
search for a desired data item is known as :
► Retrieving
► Database (page.no.321)
► Information
► DBMS

Question No: 19 ( Marks: 1 ) - Please choose one


Microsoft Word is a type of:
► System Software
► Freeware Software
► Shrink-Wrapped Software (page.no.64)
► Custom-built Software

Question No: 20 ( Marks: 1 ) - Please choose one


Users __________, how things work.
► Analyze in detail
► Muddle through (page.no.170)
► Figure out
► Read in detail

Question No: 21 ( Marks: 1 ) - Please choose one


Popular schemes used for reducing bytes for storage are:
► RGB and Color mapping
► RGB and Dithering
► RGB, Color mapping and Dithering
► Color mapping and Dithering (page.no.235)

Question No: 22 ( Marks: 1 ) - Please choose one


Hardware malfunctions is related to
► Data updates
► Data integrity (page.no.253)
► Data security
► Data accessibility

Question No: 23 ( Marks: 1 ) - Please choose one


If incorrectly we enter the negative age it is check by
► Limit Integrity (page.no.253)
► Type Integrity
► Referential Integrity
► Physical Integrity

Question No: 24 ( Marks: 1 ) - Please choose one


Which is the user-friendly way of presenting data ?
► Query
► Form
► Report
► All of the given options

Question No: 25 ( Marks: 1 ) - Please choose one


Currently the BlueRay DVD can store more than ________ of data.
► 10 GB
► 100 GB
► 50 GB (page.no.305)
► 150 GB

Question No: 26 ( Marks: 1 ) - Please choose one


In JavaScript, a || b is interpreted as
► a is true or b is false
► a is true and b is true
► a is false and b is true
► a is true or b is true or both are true (page.no.148)

Question No: 27 ( Marks: 1 ) - Please choose one


Speakers fall into the hardware category.
► True
► False

Question No: 28 ( Marks: 1 ) - Please choose one


onBlur event is occurred for a form element when it ____________
► Gets focus
► Losts focus (page.no.230)
► Some thing is typed in
► onBlur is not an event

Question No: 29 ( Marks: 1 ) - Please choose one


You can view a 3-D image on a _____________.
► 3-D display
► 2-D display
► On both 2-D and 3-D displays
► We can not view a 3-D image

Question No: 30 ( Marks: 1 ) - Please choose one


Module level design and unit testing is the responsibility of _____________.
► Team Lead
► Developer (page.no.298)
► Project Manager
► Quality Assurance Expert
Question No: 31 ( Marks: 1 )
What is heuristic?

Common sense Lesson drawn from experience


(Artificial) Intelligent Systems
SW programs or SW/HW systems designed to perform complex tasks employing
strategies that mimic
some aspect of human thought

or

 a commonsense rule (or set of rules) intended to increase the probability


of solving some problem

 of or relating to or using a general formulation that serves to guide


investigation

Question No: 32 ( Marks: 1 )


In programming, what is an object ?

Object: A named collection of properties (data, state) & methods (instructions,


behavior)

Question No: 33 ( Marks: 2 )


What is spreadsheet? List any two jobs that it can do.
A spreadsheet is a grid that organizes data into columns and rows. Spreadsheets
make it easy to display
information, and people can insert formulas to work with the data.

Electronic replacement for ledgers


Charts
financial-forecasting

Question No: 34 ( Marks: 2 )


In JavaScript, what is event handling? What are the two types of events?

Capturing events and responding to them


The system sends events to the program and the program responds to them as
they arrive
Events can include things a user does - like clicking the mouse - or things that
the system itself does -
like updating the clock.

Question No: 35 ( Marks: 3 )


Explain how many ways businesses monitor their employees?
• Systems are available that monitor almost every key stroke that an employee
makes on a computer
• Systems are available that read and censor all incoming and outgoing eMail
• It is quite straight forward to monitor where you surf, and when

Question No: 36 ( Marks: 3 )


What is difference between Design and System Architecture?
Only the higher level designs are called System Architecture and lower
level designs can not be called system Architecture, and we can also say
the every Architecture can be called design but every design can not be
called Architecture. (For Reference Listen Lecture No.24)
Question No: 37 ( Marks: 3 )
What are the Sub categories of Artificial Intelligence? Briefly explain any
two.
Expert systems
Systems that, in some limited sense, can replace an expert
Robotics
Automatic machines that perform various tasks that were previously done by
humans
Example:
Pilot-less combat air planes

Decision Support Systems:


Interactive software designed to improve the decision-making capability of their
users
Utilize historical data, models to solve problems

Question No: 38 ( Marks: 5 )


How many ways are there to call a function in a program ? Explain with
example
Functions do not run automatically. When the page loads, each function waits
quietly until it is told to run
CALLING A FUNCTION FROM AN EVENT HANDLER
AN EVENT HANDLER IS A COMMAND WHICH CALLS A
FUNCTION WHEN AN EVENT HAPPENS, SUCH AS THE
USER CLICKING A BUTTON.
THE COMMAND IS WRITTEN IN THE FORMAT ONEVENT,
WHERE EVENT IS THE NAME FOR A SPECIFIC ACTION.
HERE ARE SOME COMMON EXAMPLES:

CALLING A FUNCTION FROM ANOTHER FUNCTION

function doSomething() {
doSomethingElse(); // This line calls the next function

Question No: 39 ( Marks: 5 )


Elaborate the ‘+ ’ operator and its constraints with the help of examples
The “+” String Operator
The “+” operator can be used to concatenate two strings
title = “bhola” + “continental”
The value of the variable title becomes “bholacontinental”

Question No: 40 ( Marks: 10 )


Write a JavaScript program having two functions sum and mean.
The web page will ask the user to enter five values to be added.
After taking input it will calculate the sum and mean of those values by
calling sum and mean functions.

Question No: 41 ( Marks: 10 )


Define the following terms.
Object
A named collection of properties(data, state) & methods (instructions,
behavior)
Event Handler
AN EVENT HANDLER IS A COMMAND WHICH CALLS A
FUNCTION WHEN AN EVENT HAPPENS, SUCH AS THE
USER CLICKING A BUTTON
Local Variable
Declaring variables (using the var keyword) within a function, makes them
local•They are available only
within the function and hold no meaning outside of it
Scope of Variable
Defining the space in which a variable is effective is known as
defining the scope of a variable. A variable can be either local or global in
scope
Array
An indexed list of elements

Question No: 1 ( Marks: 1 ) - Please choose one


First computer network was ___________.
► NSFNET
► FIRSTNET
► ARPANET
► ORPHANET

Question No: 2 ( Marks: 1 ) - Please choose one


In a good presentation each slide should contain____________.
► Heading
► Phrases not sentences
► Sentences not phrases
► Heading, sentences not phrases

Question No: 3 ( Marks: 1 ) - Please choose one


A function is also called __________.
► Sub-program
► Procedure
► Sub-routine
► All of the given option

Question No: 4 ( Marks: 1 ) - Please choose one


A single pixel can acquire approximately ___________ color schemes.
► 1 million
► 2 million
► 10 million
► 16 million

Question No: 5 ( Marks: 1 ) - Please choose one


Which of the following is NOT a Loop statement?
► For
► While
► Switch
► Do-While

Question No: 6 ( Marks: 1 ) - Please choose one


Which one of the following is NOT a component of Rule Based System?
► Rule Compiler
► Rule Interpreter
► Rules Base
► Working Memory
Question No: 7 ( Marks: 1 ) - Please choose one
Spread sheet is a type of _______________.

► Productivity software

► Engineering software

► Mathematical software
► Business software
Question No: 8 ( Marks: 1 ) - Please choose one
A combination of word processing and graphic design is
► Corel Draw
► Desktop Publishing
► Paint
► WordPad

Question No: 9 ( Marks: 1 ) - Please choose one


To store rounded number of 8.6 in a variable called "r_number", we write
_____________.
► r_numbers=Maths.rounds(8.6)
► r_number=Math.rounds(8.6)
► r_number=Math.round(8.6)
► r_number=Maths.round(8.6)

Question No: 10 ( Marks: 1 ) - Please choose one


Which of the following is a true statement?
► Flat-file storage is better than tabular storage.
► Tabular storage is better than flat-file storage.
► Flat-file storage is better than relational storage.
► None of the given options

Question No: 11 ( Marks: 1 ) - Please choose one


The political process is also influenced by the use of ___________.
► Discussion forums
► Newsgroups
► Mailing lists
► All of the given options
Question No: 12 ( Marks: 1 ) - Please choose one
The system that manages relational database, is called ______________.
► None of the given options
► Database Management System
► Data Management System
► Relational Database Management System

Question No: 13 ( Marks: 1 ) - Please choose one


____________ DBMS supports data in terabytes.
► Personal
► Desktop
► Enterprise
► Single-user

Question No: 14 ( Marks: 1 ) - Please choose one


Trinoo is a __________ software.
► DoS
► Scanning
► Utility
► None of the given options

Question No: 15 ( Marks: 1 ) - Please choose one


What is the major problem with flash based website?
► Its two heavy
► Cannot be indexed
► Less attractive
► Inaccessible

Question No: 16 ( Marks: 1 ) - Please choose one


The organization is the collection of ____________.
► Peoples
► Professionals
► Teams
► Individuals

Question No: 17 ( Marks: 1 ) - Please choose one


The tasks performed to determine the existence of defects is called _______
► Debugging
► Testing
► Repairing
► Coding

Question No: 18 ( Marks: 1 ) - Please choose one


Many developers write the _________ first and then incrementally convert each
line into _________.
► Real code & Pseudo code
► Pseudo code & Real code
► Real code & Artificial code
► None of the given options

Question No: 19 ( Marks: 1 ) - Please choose one


Forms can be submitted through _______ & _______ methods
► INCLUDE, POST
► INCLUDE, GET
► GET, POST
► SEND, POST

Question No: 20 ( Marks: 1 ) - Please choose one


If an algorithm is syntactically correct, but semantically incorrect then this
situation is
► Very good situation
► Very dangerous situation
► Not very bad
► Neutral situation

Question No: 21 ( Marks: 1 ) - Please choose one


Heuristics _______ lead to the best results.
► Sometimes
► Do not
► Occasionally
► Not always
Question No: 22 ( Marks: 1 ) - Please choose one
In TCPIP communication fragmentation is responsibility of
► TCP
► IP
► Both TCP and IP
► Internet

Question No: 23 ( Marks: 1 ) - Please choose one


Access to the internet became easy after the invention of
► WWW & Web Browsers
► Mainframes
► Binary system
► Signals

Question No: 24 ( Marks: 1 ) - Please choose one


Which one is the example of spreadsheet software ?
► MS Word
► MS PowerPoint
► MS Excel
► MS Access

Question No: 25 ( Marks: 1 ) - Please choose one


User can remotely log on to a computer and can have a control over it like a
local user using
► TelNet Protocol
► TelNet Protocol and connected to the user through TCP/IP network
► TelNet protocol and FTP
► TCP/IP and FTP

Question No: 26 ( Marks: 1 ) - Please choose one


If incorrectly we enter the negative age it is check by
► Limit Integrity
► Type Integrity
► Referential Integrity
► Physical Integrity

Question No: 27 ( Marks: 1 ) - Please choose one


------------------ is a digital programmable mechanical machine
► Analytical Engine
► Difference Engine
► Harvard Mark 1
► Mechanical engine

Question No: 28 ( Marks: 1 ) - Please choose one

This element of Flow Chart is called_____________.


► Process
► Off page connector
► Decision
► Connector

Question No: 29 ( Marks: 1 ) - Please choose one


In a library’s database, if there is an entry in the register for Book # 423 then
the corresponding Book must actually exist; is an example of which type of
data integrity:
► Type integrity

► Limit integrity

► Physical Integrity
► Referential Integrity

Question No: 30 ( Marks: 1 ) - Please choose one


Ada is a programming language specifically designed for
► Analytical Engine
► Difference Engine
► Harvard Mark 1
► Mechanical engine

Question No: 31 ( Marks: 1 )


What are the elements of website design? Any one

Question No: 32 ( Marks: 1 )


What does TCP/IP stand for?

Question No: 33 ( Marks: 2 )


What is the database?

Question No: 34 ( Marks: 2 )


What is the use of Default keyword in switch structure?

Question No: 35 ( Marks: 3 )


How can we include images in a web page using HTML and Java script?

Question No: 36 ( Marks: 3 )


Where "While" loop is more preferable than "For" loop and vice versa ? , explain
with the help of example.

Question No: 37 ( Marks: 3 )


What do you mean by FTP or File Transfer Protocol?

Question No: 38 ( Marks: 5 )


Differentiate between For and While loop by writing the syntax of both loops.

Question No: 39 ( Marks: 5 )


Write JavaScript code for the following:
Make a function compareWithTen(value)
Compare the function argument with ‘10’ and display a message whether the
value is less than, equal to or greater than 10.

Question No: 40 ( Marks: 10 )


What is the problem with Relational Database and what solution you can
suggest for it?

Question No: 41 ( Marks: 10 )

Develop a web page that displays six thumbnail images. A main image
should change to a larger version of the thumbnail as soon as the
mouse moves over a thumbnail image. Write complete HTML and
JavaScript code.

Question No: 1 ( Marks: 1 ) - Please choose one


Cray-1 was first commercial _________ computer
► Super
► Mini
► Micro
► Personal

Question No: 2 ( Marks: 1 ) - Please choose one


The name of first browser was ______
► Internet Explorer
► Moziac
► Netscape
► Firefox
Question No: 3 ( Marks: 1 ) - Please choose one
The impact of a digit in a number is determined by its ---------------

► Value
► Location
► Length
► None of above

Question No: 4 ( Marks: 1 ) - Please choose one


First computer network was ___________.
► NSFNET
► FIRSTNET
► ARPANET
► ORPHANET

Question No: 5 ( Marks: 1 ) - Please choose one


A variable can be _________ in scope.
► Local
► Global
► Either local or global
► None of the given options

Question No: 6 ( Marks: 1 ) - Please choose one


___________ color should be used in background for a good presentation.
► Light
► Dark
► Red
► None of the given options

Question No: 7 ( Marks: 1 ) - Please choose one


Which one of the following is not an event handler's attribute?
► Function
► Identifier
► Equal sign
► String consisting of JavaScript statements
http://groups.google.com/group/vuZs
Question No: 8 ( Marks: 1 ) - Please choose one
Variables allow us to manipulate data through the ___________.
► Actual Value
► Reference
► Length
► Name

Question No: 9 ( Marks: 1 ) - Please choose one


Which one of the following is NOT a component of Rule Based System?
► Rule Compiler
► Rule Interpreter
► Rules Base
► Working Memory

Question No: 10 ( Marks: 1 ) - Please choose one


Fuzzy logic is based on ____________.
► Ground facts
► Experience
► Practice
► Approximation

Question No: 11 ( Marks: 1 ) - Please choose one


a = Math.ceil(12.01)
What will be the value of a ?

► 12
► 13
► 12.0
► 13.01

Question No: 12 ( Marks: 1 ) - Please choose one


Tag used to make a Text Bold is __________________

► <BOLD></BOLD>
► <B></B>
► <BODY></BODY>
► None of these

Question No: 13 ( Marks: 1 ) - Please choose one


<P> </P> and <BR> tags are not same because

► <p></p> goes to the next line


► <BR> goes to the next after next line
► <P></P> goes to the next after next line
► Both are same
Question No: 14 ( Marks: 1 ) - Please choose one
Event handlers are placed in the ___________ portion of a Web page as
attributes in HTML tags.
► HEAD
► BODY
► SCRIPT
► TITLE

Question No: 15 ( Marks: 1 ) - Please choose one


Due to working at home, lack of interaction may result in ___________
professional growth.
► Slower
► Faster
► Higher
► Improved

Question No: 16 ( Marks: 1 ) - Please choose one


____________ DBMS supports data in terabytes.
► Personal
► Desktop
► Enterprise
► Single-user

Question No: 17 ( Marks: 1 ) - Please choose one


_____________ waits for some time and then launch a function.
► Timeout( )
► setTimeout( )
► setTime( )
► setTimeIn( )

Question No: 18 ( Marks: 1 ) - Please choose one


The responsibilities of the Team Lead includes_____________.
► Planning and tracking of the project
► Detailed design
► Professional development of team members
► All of the given options

Question No: 19 ( Marks: 1 ) - Please choose one


______ is also known as System Architecture
► High level system design
► Low level system design
► Every system design
► Software Requirement

Question No: 20 ( Marks: 1 ) - Please choose one


The key property of the ‘Array’ object in JavaScript is
► Value
► Length
► Name
► All of the given choices

Question No: 21 ( Marks: 1 ) - Please choose one


There are _________ ways of calling functions.
► One
► Two
► Three
► Four

Question No: 22 ( Marks: 1 ) - Please choose one


Which event handler executes the specified JavaScript code when a
window/form element loses focus ?
► onBlur
► onLoad
► onUnload
► onFocus

Question No: 23 ( Marks: 1 ) - Please choose one


Popular schemes used for reducing bytes for storage are:
► RGB and Color mapping
► RGB and Dithering
► RGB, Color mapping and Dithering
► Color mapping and Dithering

Question No: 24 ( Marks: 1 ) - Please choose one


Hardware malfunctions is related to
► Data updates
► Data integrity
► Data security
► Data accessibility

Question No: 25 ( Marks: 1 ) - Please choose one


Users communicate with the computer using a consistent user interface
provided by the OS.
► True
► False

Question No: 26 ( Marks: 1 ) - Please choose one


Extension for saving web page is / are;
► *.html
► *.htm
► *.html and *.htm both are in use
► None of These

Question No: 27 ( Marks: 1 ) - Please choose one


_____________ loop is a flow control statement that allows code to be executed
repeatedly based on a given Boolean condition.
► For
► Do-While
► If-else
► While

Question No: 28 ( Marks: 1 ) - Please choose one


onBlur event is occurred for a form element when it ____________
► Gets focus

► Losts focus

► Some thing is typed in

► onBlur is not an event

Question No: 29 ( Marks: 1 ) - Please choose one


<script>
Number=new Array(5);
for(var i=1; i<=5 ; i=i+1)
{
for( var k=6; k<=10; k=k+1)
{
Number[i]= k*i;
}
}

</script>
For how many times the Nested For Loop shall execute;

► 20
► 15
► 25
► Shall terminate in first loop.

Question No: 30 ( Marks: 1 ) - Please choose one


In JavaScript: In order to display the text on browser Grade A, which of following
statement is True.

► documentwrite( "Grade A")


► document.write( "Grade A");
► document.write( "Grade” && A");
► document.write( "Grade” && “A");

Question No: 31 ( Marks: 1 )


In programming, what is an object ?
Answer: It is a named collection of properties and methods.

Question No: 32 ( Marks: 1 )


What kind of information can be stored in a database ?
Answer:
It can stored numbers, boleans, sound, video, images etc.

Question No: 33 ( Marks: 2 )


Define the key weakness of the web?
Answer:
Initially web was designed only for humans to read not for computers to
understand it.

Question No: 34 ( Marks: 2 )


How many iterations would this ‘for’ loop run for?
for ( x = 50 ; x < 0 ; x = x - 1 ) {
document.write ( x ) ;
}

Answer:
50 iterations

Question No: 35 ( Marks: 3 )


How can we define a Pixel?
Answer:
It is the smallest element of image which is spread with regular array on display
and each element consist of particular color.

Question No: 36 ( Marks: 3 )


Write JavaScript code to convert the number 236.2363611111556 into currency
format and JavaScript statement to show output.

Question No: 37 ( Marks: 3 )


Write code in JavaScript to display the odd numbers between 20 to
100 using FOR statement.
Note: No need to write whole HTML program. Just JavaScript code of require
part is require.

Question No: 38 ( Marks: 5 )


How marketing strategies are changed with the progress in computing? How
new marketing strategies are implemented?
Answer:
Marketing Strategy Changes with the new requirements of the modern era and
the applications of the business. The web has changed marketing strategy from a
mass focus to single person focus. We collected data and analyze accordingly to
find out the behavior of the market and end users. In new marketing more
advertising is being done through email and web and get feedback.

Question No: 39 ( Marks: 5 )

<script>

Number = new Array(5);

var abc=4;

for(var i=1; i<=5 ; i=i+1)


{
Number[i]= abc*i;

}
Number.reverse();

for(j=0;j<5;j=j+1)
{
document.write(" "+Number[j]+"<BR>");
}
</script>

A) What should be output of above code?


B) Explain the highlighted lines of code?

Question No: 40 ( Marks: 10 )


Write a brief note on each of the following.
Ø FTP
Ø Telnet
Ø Instant messaging
Ø VoIP
FTP: File Transfer Protocol: This protocol is used to upload and download the
files on remote computers.

Telnet: FTP allows file operations only while Telnet can log on to a computer of
other users through TCP/IP network and use like a local user, it help in testing of
remote web server.

Instant Messaging: This is the service of messaging provided on the internet


like MSN messenger, Yahoo messenger, through which we interact people
randomly whenever required.

VoIP: Voice over IP, It is used to transmit the voice from one IP to another IP, In
which voice is first broken down and then transmitted over a network.
vuZs

Question No: 41 ( Marks: 10 )


What are Commonsense Guidelines to avoid viruses? Discuss about Antivirus
as well.

Answer:

Commonsense Guidelines to avoid viruses are as follows:


1. Do not open attachment of unwanted emails.
2. Don’t used copied/pirated Softwares
3. Regularly place data somewhere as backup
4. Use Registered and Trusted Softwares only.
5. Install Antivirous in the system
6. Update your Windows and softwares with the passage of time.
7. Scan before using any external device with your system as USB
Device.
Antivirus:

This is the software design for preventing your system from harmful
effects and maintain the speed of computer. These softwares are
available on the CD’s and DVD’s. These softwares continuously monitor
the systems and aware when any harmful virus is detected and asked
for the further operations. Some automatically remove the viruses
from the system.

Question No: 1 ( Marks: 1 ) - Please choose one


Vacuum tubes were replaced by _ ► Transistors
__
► Punch cards
► Transistors
► Micro Processors
► Resistors
Question No: 2 ( Marks: 1 ) - Please choose one
First electronic computer was ► ABC

► ABC
► UNVAC 1
► Harvard Mark 1
► IBM PC

Question No: 3 ( Marks: 1 ) - Please choose one


To improve the time for scannig a web page, text should be ___
► Centered
________.
► Centered
► Left Aligned
► Right Aligned
► Staggered

Question No: 4 ( Marks: 1 ) - Please choose one


JavaScript does not support_► Graphics ______________

► User interaction
► Graphics
► Network operations
► Both Graphics and Network operations

Question No: 5 ( Marks: 1 ) - Please choose one


► Identifier
_________ is a container that holds a value.
► Identifier
► Variable
► Function
► Constant

Question No: 6 ( Marks: 1 ) - Please choose one


The default bullet for the list in HTML is► Circle shape
► Circle shape

► Disc shape

► Square shape

► Triangle shape

Question No: 7 ( Marks: 1 ) - Please choose one


A single pixel can acquire approximately ► 16 million
___________ color schemes.
► 1 million
► 2 million
► 10 million
► 16 million

Question No: 8 ( Marks: 1 ) - Please choose one


According to a popular heuristic, success is defined by _ ► The user
__________.
► The user
► The builder
► Both user and builder
► None of the given options

Question No: 9 ( Marks: 1 ) - Please choose one


Which one of the following is NOT a component of Rule Based System? Rule
Compiler

► Rule Compiler
► Rule Interpreter
► Rules Base
► Working Memory

Question No: 10 ( Marks: 1 ) - Please choose one


► Event processed programs __________ are those programs in which the
flow of the program is determined by the user's actions (mouse clicks, key
presses) or messages from other programs.
► Event called programs
► Event processed programs
► Event driven programs
► Event declared programs

Question No: 11 ( Marks: 1 ) - Please choose one


The ► Control unit
______ is connected to all other modules of the microprocessor.

► Control unit
► Memory unit
► Floating Point unit
► Arithmetic and Logic unit

Question No: 12 ( Marks: 1 ) - Please choose one


Which of the followings is NOT a Relational DBMS software. ► FrontPage

► Access
► FrontPage
► FileMaker Pro
► SQL Server

Question No: 13 ( Marks: 1 ) - Please choose one


random() function returns a randomly-selected, floating-point number
between ► 0 and 1____________.
► 0 and 1
► 0 and 10
► 0 and -10
► 0 and -1

Question No: 14 ( Marks: 1 ) - Please choose one


__ ► Network
___________ organization is replacing the old-style layered, tree-structured
organizational model.
► Network
► Hierarchical
► Matrix
► None of the given options

Question No: 15 ( Marks: 1 ) - Please choose one


The _►Typist _________ is the old profession which is being eliminated
because of computing.
►Typist
►Bank manager
►Operational manager
►All of the given options

Question No: 16 ( Marks: 1 ) - Please choose one


Distance learning has got a boost due to the ►All of the given
options
___________.
►Easy communication
►Online interactive contents
►Flexibility
►All of the given options

Question No: 17 ( Marks: 1 ) - Please choose one


What is the 2nd step of DoS attack?► Search

►Race
►Arm
►Search
►Attack
Question No: 18 ( Marks: 1 ) - Please choose one
The _►Network paradigm
___________ is becoming the preferred organizational structure for more and
more organizations with the passage of time.
►Tree structured organizational model
►Network paradigm
►Hierarchical structure
►None of the given options

Question No: 19 ( Marks: 1 ) - Please choose one


_ ► TCP
____________ routes the packets through the internet to go to their destination.

► Protocol
► TCP
► IP
► NIC

Question No: 20 ( Marks: 1 ) - Please choose one


Many developers write the► Pseudo code _________ first and then
incrementally convert each line into Real code_________.
► Real code & Pseudo code
► Pseudo code & Real code
► Real code & Artificial code
► None of the given options

Question No: 21 ( Marks: 1 ) - Please choose one


Processed data is called _
► Information
_______.

► Information
► Data
► Entity
► Attribute

Question No: 22 ( Marks: 1 ) - Please choose one


In a System having many parts to be designed, one should always do the _
► Simple part
____ first
► Hard part
► Simple part
► Development part
► Quality part

Question No: 23 ( Marks: 1 ) - Please choose one


One can download or upload files to a remote computer using _ ► TELNET
_______ protocol.
► HTTP
► SMTP
► FTP
► TELNET

Question No: 24 ( Marks: 1 ) - Please choose one


Which one is the example of spreadsheet software ? ► MS Excel

► MS Word
► MS PowerPoint
► MS Excel
► MS Access

Question No: 25 ( Marks: 1 ) - Please choose one


User can remotely log on to a computer and can have a control over it like a
local user using► TelNet Protocol and connected to the user through TCP/IP
network
► TelNet Protocol
► TelNet Protocol and connected to the user through TCP/IP network
► TelNet protocol and FTP
► TCP/IP and FTP

Question No: 26 ( Marks: 1 ) - Please choose one


Hardware malfunctions is related to ► Data integrity

► Data updates
► Data integrity
► Data security
► Data accessibility

Question No: 27 ( Marks: 1 ) - Please choose one


With the passage of time the field of Computing and Telecommunication is _
► Converging
____________.
► Diverging
► Converging
► Becoming different
► Becoming unique

Question No: 28 ( Marks: 1 ) - Please choose one


Microphone is an input as well as output device. This statement is ►
False

► True
► False

Question No: 29 ( Marks: 1 ) - Please choose one


Application developers do not need to know much about the HW, especially the
microProcessor, while they are developing their application. ► True

► True
► False

Question No: 30 ( Marks: 1 ) - Please choose one


From which of the following is NOT a technique through which Security can be
improved : ► Metal detectors
► Private or virtual-private networks
► Firewalls
► Metal detectors
► Virus detectors

Question No: 31 ( Marks: 1 )


SMTP stands for what?
Ans: Simple Message transfer protocol

Question No: 32 ( Marks: 1 )


In programming, what is an object ?
Ans: An object is the collection of properties(date,state) ans methods
(instruction ,behavior)

Question No: 33 ( Marks: 2 )


In which situation we should use Inline Event Handling?
Ans:Event handler are palced in the BODY portion of a web page as attributes of
HTML tages
The event handler attributes consist of 3 parts
a) The equal sign
b) The identifier of event handler
c) A string consisting of java script statements enclosed in double or
single string
Multiple javascript statements can be placed in that string ,but all have to fit in
a single line .
No new line characters with in line event handling

Inline event handler can be used normally in a condition when we want to


execute the eventd direclty and quickly in the same line of code.

Question No: 34 ( Marks: 2 )


In JavaScript, what is event handling? What are the two types of events?
Ans: In JavaScript capturing of an events and responding to them is event
handling. The system sends events to the program and the program responds to
them as they arrive.
1. Events can include things a user does - like clicking the mouse.
2. Events that the system itself does - like updating the clock.

Question No: 35 ( Marks: 3 )


What is the preferred organizational structure for the organization?

Ans: Preferred Organizational Structure for organization is hierarchal. Where


there is different departments interconnected with each other and are been
divided according to the functions they perform.

1)Executive Team
2)
a)business development team
b )ArchitecutreTeam
c)technology Transfer team
3)
a) configuration Management Team
b)Process Team
c)Quality assurance Team
d)Support team

4)
a) development Team A
b) development Team B
c) development Team C
d) development Team D

Question No: 36 ( Marks: 3 )


What are the Sub categories of Artificial Intelligence? Briefly explain any two.
Ans
a)Neural networks: original inspiration was human brainemphasis now
usefulness as a computational tool
1) Genetic Algorithms : based on darwins evolutionary principle
GA requires the ability to recognize a good solution but not
howto get to that solution
2) rulebased systems
b) the right techniques
Question No: 37 ( Marks: 3 )
Diffentiate Local and Global Variables.
Ans:
Local Variables:
When a function is define the variable use for storing values are
incorporated inside the function these variable are found and used only inside
these function are called local variable .these have no presence out side the
function
Global Variables :Global variable on other hand are present through out the
script and their values can be access by any function .They global scope

Question No: 38 ( Marks: 5 )


Write the JavaScript code for the Function SumOddNumbers(maxNumber) that
can add non-negative odd numbers up to maxNumber and return their sum.

Question No: 39 ( Marks: 5 )


What is animated gif? How can we use it? If we animate images in JavaScript
then is it better?
Ans: It is bit mape image format introduced in 1987by compuserve.It support up
to 8 bits per pixel.It also support animation And allow a separate palette of 256
colors for each frame.
Uses:We can use it in web site they are suitable for sharp edged line art with
limited number of colors.They are good for small animation and low resolution
clips.
The size is small and on web site they can uploaded and downloaded easily

Question No: 40 ( Marks: 10 )


What is the problem with Relational Database and what solution you can
suggest for it?
Ans:
when we use to store object oriented data into a Relational database
it need to be translated in form which is suitable for the relational database.
Again when we need to read RDBMs the Data need again back to be translated
into object oriented form to read.
This two process delay associated processing and time spent in writing and
maintaining the translation codes are the key disadvantage with Relational
Database .
Solution:
Object oriented database
Object Relational database

The data should be divided and save in multiple table and tabular form ,so that
open ,searching .sorting ,editing and saving of data can be performed quickly.
With tabular form one can sort w.r

Question No: 41 ( Marks: 10 )


How can we neutralize DoS attack? Can we track the attacker?
Ans: Denial of service attempt to make a computer resource unavailable to its
Intended user . Easiest way to survive an attack is to have planned for the attack.
Good contact with ISP and some security providers and CERT are essential also
having a separate emergency block of IP address for Critical servers with a
separate rout can be effective.
We should use genuine operating system can also be helpful.
By using an extremely stateful packet filter that will inexpensively drop any
unwanted packet serviving DoS attack Becomes much Easier.
We can also use Fierwalls .
Using Antivirus softwear
Using private net work
Using encryption
Network Sniffer
Intrusion detector By using all these techniques we can neutralize DoS Attack

Investigative process should begin immediately after the DoS Attack begins.

By using IP address we can Track Attacker.

Question No: 1 ( Marks: 1 ) - Please choose one


The memory size of the Altair 8800 was
► 128 bytes
► 128 Kilo bytes
► 256 Kilo bytes
► 256 bytes

Question No: 2 ( Marks: 1 ) - Please choose one


A named collection of properties (data, state) and methods
(instruction, behavior) is called ____________.
► Array
► Function
► Variable
► Object

Question No: 3 ( Marks: 1 ) - Please choose one


JavaScript Variables are ____________.
► Dynamically Typed
► Statically Typed
► Strong Typed
► None of the given options
Question No: 4 ( Marks: 1 ) - Please choose one
Serial arrangement in which things follow logical order or a recurrent
pattern, such as statements executing one by one, is called __________.
► Loop
► Sequence
► Condition
► Array
Question No: 5 ( Marks: 1 ) - Please choose one
Rule of thumb learned through trial and error is called ___________.
► Design
► Heuristic
► Plan
► Aim

Question No: 6 ( Marks: 1 ) - Please choose one


According to heuristic, if you can’t explain it in ____________ minutes,
either you don’t understand it or it does not work.
► 10
►2
►5
►4

Question No: 7 ( Marks: 1 ) - Please choose one


To store rounded number of 8.6 in a variable called "r_number", we write
_____________.
► r_numbers=Maths.rounds(8.6)
► r_number=Math.rounds(8.6)
► r_number=Math.round(8.6)
► r_number=Maths.round(8.6)

Question No: 8 ( Marks: 1 ) - Please choose one


Using only HTML we can create

► Dynamic web pages


► Static web pages
► Both Static and Dynamic pages
► None of these

Question No: 9 ( Marks: 1 ) - Please choose one


__________ function returns the largest integer that is less than or equal to x.
► round(x)
► floor
► ceil
► abs(x)

Question No: 10 ( Marks: 1 ) - Please choose one


Due to working at home, contact with the colleagues is __________, which may
result in __________ quality of work
► Reduced, Poorer
► Reduced, Better
► Increased, Poorer
► Increased, Better
Question No: 11 ( Marks: 1 ) - Please choose one
The distance among families is ___________ because of spending more time
on internet.
► Increased
► Expanded
► Contracted
► Decreased

Question No: 12 ( Marks: 1 ) - Please choose one


When web server is busy it gives the following message to the user :
► Time out
► Waiting
► Server busy
► None of the given options

Question No: 13 ( Marks: 1 ) - Please choose one


____________ is designed for detecting viruses and inoculating.
► Antivirus
► Utility
► Trojan
► None of the given choices

Question No: 14 ( Marks: 1 ) - Please choose one


The ____________ is becoming the preferred organizational structure for more
and more organizations with the passage of time.
► Tree structured organizational model
► Network paradigm
► Hierarchical structure
► None of the given options

Question No: 15 ( Marks: 1 ) - Please choose one


Planning and tracking of the project is the responsibility of the___________.
► Project Manager
► Architect
► Developer
► Chief Executive Officer

Question No: 16 ( Marks: 1 ) - Please choose one


The responsibilities of the Team Lead includes_____________.
► Planning and tracking of the project
► Detailed design
► Professional development of team members
► All of the given options

Question No: 17 ( Marks: 1 ) - Please choose one


_____________ team is responsible for a project after the specification’s stage
till the very end.
► Executive
► Architect
► Development
► HR

Question No: 18 ( Marks: 1 ) - Please choose one


There are _________ types of errors.
►2
►3
►4
►5

Question No: 19 ( Marks: 1 ) - Please choose one


________ are the computers that perform at or near the currently highest
operational rate for computers.
► Minicomputers
► Microcomputers
► Supercomputers
► Personal Computers

Question No: 20 ( Marks: 1 ) - Please choose one


Which one of these is NOT an example of storage devices?
► Tape
► RAM
► Floppy
► DVD

Question No: 21 ( Marks: 1 ) - Please choose one


Forms can be submitted by using __________ different methods
►2
►3
►4
►5

Question No: 22 ( Marks: 1 ) - Please choose one


Which is NOT true for JavaScript variable name ?
► Student
► Roll_no_1111
► For
► _schedule

Question No: 23 ( Marks: 1 ) - Please choose one


One can browse documents residing on a remote computer using ________
protocol.
► HTTP
► SMTP
► FTP
► TELNET

Question No: 24 ( Marks: 1 ) - Please choose one


Which one is the example of spreadsheet software ?
► MS Word
► MS PowerPoint
► MS Excel
► MS Access

Question No: 25 ( Marks: 1 ) - Please choose one


User can remotely log on to a computer and can have a control over it like a
local user using
► TelNet Protocol
► TelNet Protocol and connected to the user through TCP/IP network
► TelNet protocol and FTP
► TCP/IP and FTP

Question No: 26 ( Marks: 1 ) - Please choose one


Hardware malfunctions is related to
► Data updates
► Data integrity
► Data security
► Data accessibility

Question No: 27 ( Marks: 1 ) - Please choose one


PowerBuilder falls in the category of ______________.

► Assembly Languages
► 4-th Generation Languages
► Machine Languages
► High-Level Languages

Question No: 28 ( Marks: 1 ) - Please choose one


Backbone is also called as ________.
► vBNS
► BNS
► vHBNS
► HBNS

Question No: 29 ( Marks: 1 ) - Please choose one


Global variables can make the logic of a web page.
► Difficult to understand
► Easier to understand and maintain
► Difficult to reuse and maintain
► Difficult to understand, reuse and maintain

Question No: 30 ( Marks: 1 ) - Please choose one


In JavaScript: In order to display the text on browser Grade A, which of following
statement is True.

► documentwrite( "Grade A")


► document.write( "Grade A");
► document.write( "Grade” && A");
► document.write( "Grade” && “A");

Question No: 31 ( Marks: 1 )


What is bandwidth?
Bandwidth is a capacity of communication channel of carrying data.

Question No: 32 ( Marks: 1 )


What is “My Personal Agent”?
A computer programe that work automatically and have voice interface

Question No: 33 ( Marks: 2 )


For what purposes FTP is used in networks ?
To download or upload files / data to a remote computer

Question No: 34 ( Marks: 2 )


How can you define a readable program?
A program that is easy to read & understand also easy to maintain and enhance.

Question No: 35 ( Marks: 3 )


What is the preferred organizational structure for the organization?
The Network Organization: It is becoming the preferred organizational structure.

Question No: 36 ( Marks: 3 )


How can you define a consistent web design? Why is it needed?
A consistent web design is Easy understandable, not with heavy graphics, easy
navigation. It is needed because most of the website views leave the site
because of poor navigation and not easy to understand, text and design is not
clear etc.

Question No: 37 ( Marks: 3 )


Elaborate Vector or Object oriented graphics with atleast one example.
Vector treats everything that is drawn as object, they are resolution in dependent
and relatively small file size. For example swg, svg, wmf.

Question No: 38 ( Marks: 5 )


What are the advantages of multimedia presentations? Write any five.
Multimedia presentation is a great tool for effective communication:
Advantages:
1. Easy to make last minute change
2. More attractive
3. Can include animation, videos etc.
4. Better presentation easy to understandable for participants comparing to manual
presentation.
5. Undo feature

Question No: 39 ( Marks: 5 )


Can a human doctor be replaced by an Expert System? Give reasons to support
your answer.
Expert System is a computer system which simulates the knowledge and
expertise of a human expert. Yes, a human doctor can be replaced by an Expert
System. Following are the reasons to support my answer:
1. A large database of knowledge can be added to and kept up to date, it can store more

knowledge than a person.

2. The Expert System cannot FORGET or get facts wrong.

3. It survives forever. There is no loss of knowledge as there is when a doctor retires.

4. The Expert System can access specialist knowledge that a doctor may not have.

Question No: 40 ( Marks: 10 )


Explain the following issues of Data Management? (3+4+3)

1. Data entry
2. Data updates
3. Data security

DATA ENTRY:
There is new data entered every day.
New customers are added every day.
Some of the data entry requires the manual entry into computer system
New data entry needs to be entered correctly

DATA UPDATES:
Old titles must be removed regularly
Data changes every time
Prices change
Transportation / shipping cost changes
Customer personal data changes
Schemes changing, new offers
Every new entry needs to be entered correctly
DATA SECURITY:
All data in the system is very critical to its operation, the security of the
customer’s personal data is most important. Most of the hackers are always
trying for that type of information specially Credit Card Numbers.
This problem can be managed by using proper security arrangements and
mechanisms that provides access to only authorized entities. System Security
can be improved through, encryption, firewalls and updated Antivirus Softwares

Question No: 41 ( Marks: 10 )


Write a note on the followings

a. Image Preloading process


b. Animated Gifs

IMAGE PRELOADING PROCESS:

The primary use of image preloading process is to download the image into the
cache before it is actually needed to display.

PROCESS:
1. An example of the image object is shaped using the NEW keyword
2. The src property of this instance is set equal to the filename of the
image to be pre-loaded
3. This step starts the down-loading of the image into the cache
without actually displaying
4. When a pre-loaded image is required to be displayed, the src
property of the displayed image is set to the src property of pre fetched image

ANIMATE GIFS:

We can save 16 gif images of the previous example in a single file in


the form of an animated gif, and then used it in a regular <IMG> tag to
display a moving image. However, JavaScript provide better control
over the sequencing and the gap between the individual images.
Question No: 1 ( Marks: 1 ) - Please choose one

Success of a website is defined by ____________.

► User
► Designer
► Developer

► Programmer

Question No: 2 ( Marks: 1 ) - Please choose one

Which one is correct for JavaScript?

► onMouseOver

► OnMouseOver

► onmouseover 232 not confuse this is correct 100%


► All of the given

Question No: 3 ( Marks: 1 ) - Please choose one

An indexed list of elements is called _____________.

► Collection

► Array
► Set

► Group

Question No: 4 ( Marks: 1 ) - Please choose one

________ is the way that internet domain names are located and translated into
IP addresses.

► FTP

► VoIP

► DNS
► TCP

Question No: 5 ( Marks: 1 ) - Please choose one

The browser breaks down the URL into ________ parts.

►2

► 3

►4
►5

Question No: 6 ( Marks: 1 ) - Please choose one

Which one of the following is not an event handler's attribute?

► Function
► Identifier

► Equal sign

►String consisting of JavaScript statements

Question No: 7 ( Marks: 1 ) - Please choose one

JavaScript Variables are ____________.

►Dynamically Typed

► Statically Typed

► Strong Typed

► None of the given options

Question No: 8 ( Marks: 1 ) - Please choose one

Which of the following is NOT a Loop statement?

► For

► While

►Switch

► Do-While

Question No: 9 ( Marks: 1 ) - Please choose one

According to a popular heuristic, success is defined by ___________.

►The user

► The builder

► Both user and builder

► None of the given options


Question No: 10 ( Marks: 1 ) - Please choose one

Which one of the following is an application for artificial intelligence?

► Robotic

► Web Agent

► Decision Support System

► All of the given options

Question No: 11 ( Marks: 1 ) - Please choose one

Using only HTML we can create

► Dynamic web pages

► Static web pages

►Both Static and Dynamic pages

► None of these

Question No: 12 ( Marks: 1 ) - Please choose one

The ______ is connected to all other modules of the microprocessor.

►Control unit

► Memory unit

► Floating Point unit

► Arithmetic and Logic unit

Question No: 13 ( Marks: 1 ) - Please choose one

Which of the followings is NOT a Relational DBMS software.

► Access

► FrontPage
► FileMaker Pro

►SQL Server

Question No: 14 ( Marks: 1 ) - Please choose one


country=”Hello Pakistan”;

document.write(country.length);

The out put of the above statement is ____________. ?


► 12

► 13

► 14
►15

Question No: 15 ( Marks: 1 ) - Please choose one

The distance among families is ___________ because of spending more time


on internet.

►Increased
► Expanded

► Contracted

► Decreased

Question No: 16 ( Marks: 1 ) - Please choose one

______________ is a field that uniquely identifies each record stored in a table.

► Composite Key

►Primary key
► Foreign key

► None of the given options

Question No: 17 ( Marks: 1 ) - Please choose one

Planning and tracking of the project is the responsibility of the___________.

► Architect

►Team Lead
► Developer

► Chief Executive Officer

Question No: 18 ( Marks: 1 ) - Please choose one

___________ has great PR skills.

► Architect

► Team Lead

►Project Manager

►Chief Executive Officer

Question No: 19 ( Marks: 1 ) - Please choose one

_____________ team is responsible for a project after the specification’s stage


till the very end.

►Executive

► Architect

►Development

► HR

Question No: 20 ( Marks: 1 ) - Please choose one

A large number of networks interconnected physically is called ______

► LAN

► MAN

►Internet

► Network collection

Question No: 21 ( Marks: 1 ) - Please choose one

Efficiency is ______ to universality

► Equal

►Direct proportional
► Inversely proportional

► Not proportional

Question No: 22 ( Marks: 1 ) - Please choose one

There are _________ ways of calling functions.

► One

►Two

► Three

► Four

Question No: 23 ( Marks: 1 ) - Please choose one

Which protocol is use to transfer a file over the network ?

► UDP

► FTP

► TCP

► OSI

Question No: 24 ( Marks: 1 ) - Please choose one

Writing a response, multiple statements are separated from each other with the
help of

► Period ( . )

► Comma ( , )

► Colon ( : )

► Semicolon ( ;)
Question No: 25 ( Marks: 1 ) - Please choose one

Popular schemes used for reducing bytes for storage are:

► RGB and Color mapping

► RGB and Dithering

► RGB, Color mapping and Dithering


►Color mapping and Dithering
Question No: 26 ( Marks: 1 ) - Please choose one

______________ has the ability to automate and simplify daily tasks.

► Productivity software

► Application software
► System software

► Graphical software

Question No: 27 ( Marks: 1 ) - Please choose one

Which representation technique of algorithm is more suitable for developer to


make actual code___________.

► pseudo code
► flow chart

► both pseudo code and flow chart

► Heuristics

Question No: 28 ( Marks: 1 ) - Please choose one

_____________ is used to terminate all JavaScript statements.

► Colon

►Semicolon

► Underscore

► Apostrophe

Question No: 29 ( Marks: 1 ) - Please choose one

CONCATENATE operator is used to____________ elements.

► Subtract

► Multiply

►Join
► Add
Question No: 30 ( Marks: 1 ) - Please choose one

In partitioning of program/module, it should be assured that partitioned


chunks should be as _________ as possible.

► Dependent

►Independent
► Complex

► All of the above

Question No: 31 ( Marks: 1 )

What is the out put of the following JavaScript code ?

name=”Ali Akbar”;

document.write(name.charAt(4)) ;

Ans. A

Question No: 32 ( Marks: 1 )

What does WAN stand for?

Wide Area Network – A network in which computers are separated by great


distances typically across cities or even continents.

Question No: 33 ( Marks: 2 )

Why hub is used in networks?

The network traffic controller – components of convential computer networks.


Hub is used to connect the different computers in the network i.e. to the server.

Question No: 34 ( Marks: 2 )

What is output of the following JavaScript code ?

Str=”Virtual University of Pakistan”;

document.write(str.substring(5,str.length)) ;

Question No: 35 ( Marks: 3 )

Explain how many ways businesses monitor their employees?


Systems are available that monitor or most every key stroke that an employee
makes on computer. Systems are available that read and sensor all incoming
and outgoing email. It is quite straight forward to monitor where you surf and
when.

Question No: 36 ( Marks: 3 )

Diffentiate Local and Global Variables.

Local or function level variable effective only in the function in which they are
declared while globale variables visible everywhere on the webpage. Declaration
variables using the var keyword within a function makes them local. They are
available only within the function and hold no meaning outside of vs global.

Question No: 37 ( Marks: 3 )

Elaborate Vector or Object oriented graphics with atleast one example.

Treats everything that is drawn an object. Objects retain their identity after their
drawn. These objects can later be easily moved stretched duplicated deleted etc
are resolution independent relatively small size. e. g. swf, wmf,

Question No: 38 ( Marks: 5 )

Show output of the following code:

for (i=0; i<=10; i++)

document.write("The number is " + i);

document.write("<br />");

The number is 0

The number is 1

The number is 2

The number is 3

The number is 4

The number is 5

The number is 6
The number is 7

The number is 8

The number is 9

The number is 10

Question No: 39 ( Marks: 5 )

Why should we, as computing professionals, be interested in studying the social


implications of our creations?

This is imp. Because of keeping the track of money wise while implementation
actually and see the results. This fits with the organization or no. to check there is
any side effects morally or no. we have to be very careful while creation of any
system., error free, data loose recovery. Etc.

Question No: 40 ( Marks: 10 )

Write responsibilities of the followings

1. Developer

a) Module level design.

b) Coding

c) Unit testing

2. Executive Team

a) Responsible for the day to day operations.

b) All the decision related issues.

c) Policy making and changing etc.

e.g. In this usually CEO and CMSO involves

1. He is responsible for the day to day operation and great organizational skills.

3. Support Team

The support team is responsible for the complete operations such as


arrangement for performing any kind of task from the starts to the end. Fully
project handling and performing etc. In case of any maintenance they are the
responsible for commencing the job and making sure to complete.

Question No: 41 ( Marks: 10 )

Write HTML and JavaScript code for the requirements shown in the diagram
below.

When ConvertoUpperCase button is pressed, the entered text is converted to


upper case and result is displayed in the result text box. Similarly, when
ConvertoLowerCase button is pressed, the entered text is converted to lower
case and result is displayed in the result text box.

Q1. Computers are good at:


Select correct option:

Speed
Storage
Never bored
All of the given choices

Q2.Grace Hopper of US Navy develops the very first_______ compiler


Select correct option:

Low-level Language
High-level language
Both high and low level language
None of the given choices

2.5 Harvard Mark 1 – 1943:

Howard Aiken and Grace Hopper designed the MARK series of computers at Harvard
University. The MARK series of computers began with the Mark I in 1944. Imagine a
giant roomful of noisy, clicking metal parts, 55 feet long and 8 feet high. The 5-ton
device contained almost 760,000 separate pieces. Used by the US Navy for gunnery
andballistic calculations, the Mark I was in operation until 1959. The computer,
controlled by pre-punched paper tape, could carry out addition, subtraction,
multiplication, division and reference to previous results. It had special

subroutines for logarithms and trigonometric functions and used 23 decimal place
numbers. Data was stored andcounted mechanically using 3000 decimal storage wheels,
1400 rotary dial switches, and 500 miles of wire. Its electromagnetic relays classified the
machine as a relay computer. All output was displayed on an electric typewriter. By
today's standards, the Mark I was slow, requiring 3-5 seconds for a multiplication
operation
(p14
Q3.The first Web browser with a GUI was generally available in:
Select correct option:

1992
1993
1994
1995

The first Web browser with a graphical user interface was generally available (Mosaic, in
1993), the term seemed to apply to Web content, too. Technically, a Web browser is a
client program that uses the Hypertext Transfer Protocol (HTTP) to make requests of
Web servers throughout the Internet on behalf of the browser user.(18

Q4. If a computer could pass the Turing test then it would be able to:
Select correct option:

win a million dollar prize


think like human begins

think but slower than humans


do the things faster

2.2 The “Turing test”

A test proposed to determine if a computer has the ability to think. In 1950, Alan Turing
(Turing, 1950) proposed a method for determining if machines can think. This method is
known as The Turing Test. (13

Q5.The name of programming language, specifically designed by the US Department of


Defense for developing military applications, was:
Select correct option:

Smalltalk
C
C++
Ada

Ada: A programming language specifically designed by the US Dept of Defense for


developing military applications was named Ada to honor her contributions towards
computing(p9

Q6.TCP Stands for:


Select correct option:
Transmission Control Principles
Transmission Control Protocol
Transformation Control Protocol
Translation Control Protocol

Communications on the Internet is controlled by a set of two protocols: TCP and IP


TCP/IP Transmission Control Protocol/Internet Protocol Networking protocol used by all
computers and networks on the Internet Originally developed by the US DoD for Unix,
but now available for most other OSes TCP breaks down the message to be sent over the
Internet into packets IP routes these packets through the Internet to get them to their
destination When the packets reach the destination computer, TCP reassembles them into
the original message (p196

Q7.Web is a unique invention by humans in terms that it is:


Select correct option:

accessible to all humans


accessible to only the owners who control it
accessible to particular locations only
None of the given choices

Q8.The name of first commercially available PC was:


Select correct option:

UNIVAC 1
ENIAC
EDVAC
Altair 8800

2.9 UNIVAC 1 – 1951

UNIVAC-1. The first commercially successful electronic computer, UNIVAC I, was also
the first general purpose computer - designed to handle both numeric and textual
information. It was designed by J. Presper Eckert and John Mauchly. The implementation
of this machine marked the real beginning of the computer era.(P14

Q9. A strategy in which all possible combinations are examined and best one is selected
called……………
Select correct option:

Divide and conquer


Brute force
Heuristic
All of given
16.12 The Brute Force Strategy (1)

A strategy in which all possible combinations are examined and the best among them is
Selected (p103
Q10.Super Computers are used in:
Select correct option:

Weather forecasting
Aeroplane manufacturing
Atomic Bomb experiments
All of the given choices
<!--[if !supportLineBreakNewLine]-->
<!--[endif]-->

Q11.ENIAC was first____ Computer


Select correct option:

Large-scale
General-purpose
Electronic
All of the given choices

2.6 ENIAC – 1946:

ENIAC I (Electrical Numerical Integrator And Calculator). The U.S. military sponsored
their research; they needed a calculating device for writing artillery-firing tables (the
settings used for different weapons under varied conditions for target accuracy).(p14)

Q12.Which one of the following units can be called as the brain of computer
microprocessor?
Select correct option:
ALU (Arithmetic & Logic Unit)
FPU (Floating Point Unit)
Control Unit
Bus Interface Unit

A control unit is the part of a CPU or other device that directs its operation. The outputs
of the unit control the activity of the rest of the device. A control unit can be thought of as
a finite state machine. It is called the brain of computer microprcessor. (p36

Q13.Which one of the following is a really fast port that lets you connect computer
peripherals and consumer electronics to your computer without the need to restart?
Select correct option:
Freeware
Shareware
Fire wire
Firmware

FireWire is simply a really fast port that lets you connect computer peripherals and
consumer electronics to your computer without the need to restart. It is a simple common
plug-in serial connector on the back of your computer. It has the ability to chain devices
together in a number of different ways without terminators for example, simply join 2
computers with a FireWire cable for instant high-speed networking.(P24 )

Q14.The name of programming language, specifically designed by the US Department of


Defense for developing military applications, was:
Select correct option:
Smalltalk
C
C++
Ada

Ada: A programming language specifically designed by the US Dept of Defense for


developing military applications was named Ada to honor her contributions towards
computing(p9

Q15 Which one of these is NOT an example of storage devices?


Select correct option:
CD
Floppy
Hard Disk

Q16 Which category of computers lies between Workstation and Mainframe computers?
Select correct option:
Microcomputer
Desktop
Laptop
Minicomputer

4.4 Servers / Minicomputers A midsized computer. In size and power, minicomputers lie
between workstations and mainframes. In the past decade, the distinction between large
minicomputers and small mainframes has blurred, however, as has the distinction
between small minicomputers and workstations. But in general, a minicomputer is a
multiprocessing system capable of supporting from 4 to about 200 users simultaneously.
(21

Q17 Algorithm is a precise sequence of a limited number of _________ ,


___________steps that terminates in the form of a solution
Select correct option:
Ambiguous, Executable
Nondeterministic, Finite
Finite, countable
Unambiguous, executable

Ref

1st Definition:
Sequence of steps that is taken to solve a problem
Better Definition:
A precise sequence of a limited number of unambiguous, executable
steps that terminates in the form of a solution

Q18 Which one of the following web programming languages used to do client-side
scripting?
Select correct option:
ASP
Server Side JavaScript
PHP
VBScript

We’ll use JavaScript to do client-side scripting. However, there are many other
languages p119

Q19 This principle called the “Ockham’s Razor,” states when choosing among
competing, successful solutions to a problem; choose the one which is the least ________
Select correct option:
Time Consuming
Ambiguous
Complex

Selecting Among Algorithms

When choosing among competing, successful solutions to a problem, choose the one
which is the least

complex This principle is called the “Ockham’s Razor,” after William of Ockham -
famous 13-th century English philosopher(101

Q20 _________ software sits on top of ________ software for performing user tasks.
Select correct option:
System, Application
System, Productivity
Application, System
System, Programming

Q21 Deep Blue was the name of:


Select correct option:
Human
Computer
City
None of the given choices

In 1997 Deep Blue, a supercomputer designed by IBM, beat Gary Kasparov, the World
Chess Champion That computer was exceptionally fast, did not get tired or bored. It just
kept on analyzing the situation and kept on searching until it found the perfect move from
its list of possible moves (P9)
Q22 Linux and Mac are examples of :
Select correct option:
Uni processor OS
Multi processor OS

Q23 Given the HTML code, <A HREF="mailto: [email protected] ">


[email protected] </A> My email. Read the code carefully and tell what out put
browser will generate?
Select correct option:
[email protected]
[email protected]
My email [email protected]
None of the given choices

ref: right answer will be

[email protected] My email.

paste following code in any html file and view in browser

<html>

<body>

<A HREF="mailto: [email protected] "> [email protected] </A> My email.

</body>

</html>

Q24 There is a battery on the mother board to:


Select correct option:
give power to the processor
Save information when computer is OFF
Help the boot process
Save information when computer is ON

ROM

ROM is "built-in" computer memory containing data that normally can only be
read, not

written to. ROM contains the programming that allows your computer to be
"booted
up" or regenerated each time you turn it on. Unlike a computer's random access
memory

(RAM), the data in ROM is not lost when the computer power is turned off.

The ROM is sustained by a small long-life battery in your computer.

Q25 Alan Turing of Cambridge University presented his idea of a theoretically simplified
but fully capable computer, now known as:
Select correct option:
<!--[if !supportLineBreakNewLine]-->
<!--[endif]-->

Analytical Engine
Turing Machine
Difference Engine
None of the given choices
Q26 _ is the example of a Web browser
Select correct option:

Yahoo
Netscape Navigator
Web Application
Google

Q27 The Analytical Engine was machine of which type?


Select correct option:

Programmable
Mechanical
Digital
All of the given choices

1.2. The Analytical Engine A programmable, mechanical, digital machine Could carryout
any calculation Could make decisions based upon the results of the previous calculation
Components: input; memory; processor; output(p 9)

Q28 Interactive Forms are always placed between:


Select correct option:

Body tags of a Web page


Head tags of a Webpage

Q29 Which interface on computer supports transmission of multiple bits at the same
time?
Select correct option:
Serial Port
Parallel Port
PS/2 Port
Universal Serial Bus

Parallel

An interface on a computer that supports transmission of multiple bits at the same time;
almost exclusively used for connecting a printer. On IBM or compatible computers, the
parallel port uses a 25-pin connector.p24

Q30 If we want to show numbers with List Items, then we use


Select correct option:

<UL>
<OL>
<DL>
none of the given

Q31 Trialware Softwares are used for


Select correct option:

short period
long period
life time
none of the given
Software that can be run for a limited period of time before it is
purchased. Trialware has a built-in expiration date and will cease to
operate beyond that date if it has not been paid for. Also called
"demoware.(
http://encyclopedia2.thefreedictionary.com/trialware)

Q32 Babbage’s Analytical Engine could store information permanently in:


Select correct option:

Magnetic Tape
Floppy Disk
Punched Cards
None of the given choices

Q33 First computer that could not only manipulate numbers but also text data as well
was:
Select correct option:

ENIAC
EDVAC
UNIVAC 1
Attanasoff-Berry Computer

ENIAC I (Electrical Numerical Integrator And Calculator). The U.S. military sponsored
their research; they needed a calculating device for writing artillery-firing tables (the
settings used for different weapons under varied conditions for target accuracy). John
Mauchly was the chief consultant and J Presper Eckert was the chief engineer.

Eckert was a graduate student studying at the Moore School when he met John Mauchly
in 1943. It took the team about one year to design the ENIAC and 18 months and 500,000
tax dollars to build it. The ENIAC contained 17,468 vacuum tubes, along with 70,000
resistors and 10,000 Capacitors.

Q34 Greedy algorithms are usually faster, since they don't consider the details of possible
alternatives
Select correct option:

True
False

KEY ADVANTAGE: Greedy algorithms are usually faster, since they don't consider the
details of possible alternatives (P102

Q35 SCSI stands for:


Select correct option:

Small Computer System Interface


System Common Small Integration
Silicon Computer System Interface
None of the given choices
SCSI

A port that's faster than the serial and parallel ports but slower and harder to configure
than the newer USB port. Also know as the Small Computer System Interface.(24

Q36 Greedy algorithm does not support……………….. Situation.


Select correct option:

Local
Global
Complex
All of given

Q37 Which of the followings is not a Flowchart Element?


Select correct option:
Off- frame connector
Input or output
Process
Connector
flowchart elements

Start or stop

Process

Input or output

Connector

Decision

Flow line

Off-page connector

these are all the elements of flow chart so?

Q38 During one of the international cricket tournaments, one of the teams intentionally
lost a match, so that they could qualify for the next round If they had won that particular
match, some other team would have qualified This is an example of a
_________________
Greedy algorithm
Non-greedy algorithm

Q39 Teraflop stands for:


Select correct option:

Thousand floating point operations per second


Thousand floating point operations per hour
Trillion floating point operations per second
Trillion floating point operations per hour
A____________________ is the process of analyzing large databases to identify patterns

Data Mining

Data Normalization

Data Redundancy

Data Manipulation
onFocus executes the specified JavaScript code when ___________

a window receives focus

a form element receives input focus

a window receives focus or when a form element receives input focus

None of the Given.

CERN releases WWW in:

1992

1993

1994

None of the given choices

Communications on the internet is controlled by a set of two protocols, named :

HTTP & SMTP

FTP & TELNET

TCP & IP

None of the given choices

One of the disadvantages of working at home is________________

Family life may be happier because of living at home.

Family life may suffer as well, as some never turn off, and keep on working through out the
day, evening and night

Family life may become happier because he can give more time to his family.

There is no disadvantage of working at home.

The greatest, shared resource of information created by humankind is:

Web

Dictionary

Vocabulary

Glossary

There are _____________ types communication channels.

3
4

The Cyberwarefare is a ______

Crime

War

Software

Game

In the statement “PopUp(“Message”)” :

“PopUp” is the function Name, “Message” is the argument

“Message” is function identifier

Syntax Error: functions cannot be called in this way

Error: function is undefined

RGB scheme stands for _________________________________.

Red Grey Blue

Red Green Brown

Red Green Blue

Red Green Black

_____________ is the part of the virus that generally consists of malicious computer instructions

Off load

Payload

Loader

Transmitter

Unlike viruses, __________________ are stand-alone programs

Trojan horses

Logic- or time-bombs

Worms

None of the given

Voice over IP has _____ modes

3
4

We use __________ to stop Break-Ins.

Scanners

Intrusion detectors

Firewalls

Intrusion detectors and Firewalls

Which one can lead user to leave your website?

Simple design

Poor navigation

Information layout

Adaptable design

_____________________ are the subcategories of AI

Expert Systems

Robotics

Natural Language Processing

All of the above

With the Help of FTP we can:

List, change, create folders on a remote computer

Upload and download files

Transferring Web content from the developer’s PC to the Web server

All of the given choices

Which protocol is used for receiving E-mail messages?

FTP

POP

Telnet Protocol

SMTP

The organizations are learning that business can be done in a more effective manner if emphasis is
placed upon ______________.

Cooperation

Shared responsibility
Networking

All of the given

___ is used to transfer files between computers on a TCP/IP network

FTP

POP

Telnet Protocol

SMTP

Which of the following is True about “pareseFloat(String)” function: I) If the first character cannot
be converted to a number, parseFloat returns NaN. II) it returns the fractional portion of floating
point number. III) Parses the string argument; returns a FP number. IV) Non of given options.

I and II Only

II and III Only

I and III Only

IV Only

Event-driven programs can ____________________ events.

capture

respond

capture and respond

None of the Given.

Which of the statements is NOT true about “Color Usage Guidelines” for developing a presentation?

Use color sparingly to to highlight a point, but don't get carried away

Do not use colors like yellow or red for background except where needed.

Do not use colors like green, blue and such like colors except where needed.

None of given options

_________________ Type of databases management systems are supporting Terabytes of Data

Personal

Desktop

Enterprise

Single-user

Because of the ever-decreasing costs of verbal, text, video communications; the distances have
_________
Increased

Expanded

Contracted

Lengthened

The structure of the networked organization is _________.

Simple

Flexible

Complex

All of the given

A CAD drawing consist of many geometric shapes like straight lines , arc , tc and therefore is stored
in a ___________ format.

Scalar

Vector

Both a & b

____ is a type of computer-to-computer messaging.

TCP

Telnet

E-mail

FTP

None of these

RDBMS stands for ________________________________

Relative Data Base Management System

Relational Data Base Management System

Recursive Data Base Management System

Responsible Data Base Management System

Using Color Mapping scheme only a limited number of color called _____________ are allowed.

Reserved

Pointers

Platelet

None of these

Using _________ topology, adding new nodes is difficult.


Ring

Bus

Star

None of the given choices

Problems with old presentation methods was (transparencies and projectors etc):

They were costly

Electronic transmission, in some cases, was not easy

Presentation some times gets ambiguous

All of given options

ARPANET splits into two nets to keep military & non-military network sites separate, named :

ARPANET & MILNET

MICRONET & MILNET

PICONET & ARPANET

None of the given choices

Arguments values are passed to the function _________

by value

by reference

Both a & b

Non of the Given.

__________________ is a field that uniquely identifies each record stored in a table.

Primary Key

Foreign Key

Secondary key

Special Key

The IP address consists of _____ bits

64

32

16

128

Credit Card Fraud can be minimized by using _________________


single credit card numbers

multiple-use credit card numbers

single-use credit card numbers

Firewalls

hotWeather = (Temperature == 40); in the above statement, the variable hotWeather is of type

Number

String

Boolean

None of the given

NCSA stands for :

NationalCenter for Supercomputing Applications

NationalCenter for Supreme Applications

NationalCenter for Super Authority

None of the given choices

Self-replicating SW that eludes detection and is designed to attach itself to other files is called
_____________.

Trojans

Viruses

Sniffers

Operating System

SVG stands for _________________________________________.

Structured Vector Graphics

Software Vector Graphics

Structured Visual Graphics

None of these

Viruses move from one computer to another with the __________ and spring into action when the
_____________ is executed or opened

Host – Host

Host – Client

Client – Host

Client – Client
____________________ is a layered structure consisting of a number of homogenous and simple
processing elements.

Genetic Algorithms

Rule-based Systems

Feed-Forward Network

None of these

A property that gives the value of Pi is:

PI()

Graph.PI

Math.PI

Math.PI()

The smallest image forming element on a computer display is called ____________.

Resolution

Pixel

Grey area

None of these

SMTP stands for _______________________________________.

Simple Mail Transfer Protocol

Simple Mail Transparent Protocol

Simple Mail Transfer Paradigm

None of these

________________ network allows data to be sent directly from one computer to another.

Ring

Bus

Star

None of the given choices

Viruses attach themselves to other computer programs or data files, are known as____

Trojans

Guests

Hosts

Spies
Avoid __________ to ensure readability of web page

Overuse of bold and italics

Use of paragraphs

Use of white space

Use of contrast colors

STP stands for :

Shielded Twisted Pair

Silver Twisted Pair

Single Twisted Pair

None of the given choices

In ______, the spies of one business monitors the network traffic of their competitors.

Industrial intelligence

Industrial Espionage

Industrial spying

Industrial surveillance

Color mapping scheme reducing the size of 2.25 MB graphic to _________ MB.

0.90 MB

0.75 MB

1.00 MB

None of these

The functions which call themselves from their (own) body are called:

Virtual functions

Abstract functions

Overriding functions

Recursive functions

Browser sends ‘_________’ request to web server to access a file.

SET

GET

TRANSFER

All of the given choices


The internet communities are ___________.

Geographical based

Interest based

Country based

Religion based

Infection propagation and Actual destructive are the components of _______________

Transmission mechanism

Payload

Worms

Trojan Horse

An algorithm that always takes the best immediate or local solution while finding an answer
is called____.

► Deterministic Algorithm
► Non deterministic Algorithm
► Greedy Algorithm
► Randomized Algorithm

Which of the following command allows you to recover form mistakes in MS Word?

► Clear

► Edit

► Undo
► Break

A ____________ operating system allows many users to take advantage of the


computer's resources, simultaneously

► Single user
► Multi- user
► Single tasking
► Multi tasking
Network Interface Card is an __________ device
► Input
► Output
► Input/Output
► Storage

The decimal equivalent of binary 1000 is


► 7
► 8
► 9
► 10
Which of the following is NOT RDBMS software?

► My Sql
► MS Excel
► Oracle
► SQL Server

A computer virus is a
► Software that saves the computer from being damaged.
► Application software that helps to make different type of viruses and worms
► Program that spreads itself and destroys other program
► Program that corrects the problems in your computer

What will be the result of a?


a = Math.abs(-23)
► 23
► -23
► 23.0
► 2.3

A Special program required to view swf (Shockwave Flash) files in web Browser is called
► TFlash
► Vflash
► plug-in
► None of the given options

Using Java Script you can write a character at random location on screen

► By applying randomCh() method


► With the help of String object
► With the help of random character property
► There is no built in approach in Java Script

If incorrectly we enter the negative age it is check by

► Limit Integrity
► Type Integrity
► Referential Integrity
► Physical Integrity

Which protocol is use to transfer a file over the network?

► UDP
► FTP
► TCP
► OSI

One can send an email message to a remote computer using _______ protocol

► HTTP
► SMTP
► FTP
► TELNET

In a System having many parts to be designed, one should always do the _____ first
► Hard part
► Simple part
► Development part
► Quality part

Flow control constructs in JavaScript includes:


► If-Else
► Loops and If -Else
► Switch and If-Else
► All of the given choices

___ provides a simple, consistent way for applications to interact with the HW without having to
know all the details of the HW

► Explorer.exe
► System Files
► Operating System
► Application Software

Machine language is also called

► Assembly Language
► Binary Language
► High Level Language
► HTML Language

_________ is the best known builder for supercomputers.

► Sun
► Cray Research
► Microsoft
► Apple

The weaknesses of the computer are:

► Pattern recognition & Storage


► Speed & Innovative ideas
► Pattern recognition & Innovative ideas
► Speed & Storage

Communication protocol is a __________that governs the flow of information over a network

► Set of methods
► Set of protocols
► Set of rules
► Device

_____________ team is responsible for the maintenance, expansion , improvement of the


infrastructure consisting of workstations, networking equipment, software and network security.

► Support
► Configuration Management
► Quality Assurance
► Developer
_____________ team consists on the sharpest technical minds in the company.

► Architecture
► Business Development
► Configuration Management
► Developer
_______________ is responsible for day to day operations.

► CEO
► COO
► CMSO
► Developer

One of the key responsibilities of the ___________ is client relationship management.

► Project Manager
► Team Lead
► Developer
► Quality Assurance Engineer

What is the major problem with flash based website?

► Its two heavy


► Cannot be indexed
► Less attractive
► Inaccessible

Which of the following is NOT an event handler for image object?

► onAbort
► onError
► onLoad
► onUser

The organizations are learning that business can be done in a more effective manner if emphasis is
placed upon ___________.

► Cooperation
► Shared responsibility
► Networking
► All of the given options

a = Math.abs(-23)

What will be the value of a ?

► 23
► -23
► 23.0
► 2.3

ERP is a type of __________________ .

► Entertainment software
► Productivity software
► Business software
► Scientific software

In Genetic Algorithm the most important thing you should know, is the ___________.

► Procedure
► Recognition of a good solution
► Different techniques
► None of the given options
According to a popular heuristic, success is defined by ___________.

► The user
► The builder
► Both user and builder
► None of the given options

Rule of thumb learned through trial and error is called ___________.

► Design
► Heuristic
► Plan
► Aim

JavaScript Variables are ____________.


► Dynamically Typed
► Statically Typed
► Strong Typed
► None of the given options

Which of the following application are collections of cells?

► Word
► Excel
► PowerPoint
► Outlook Express

The browser breaks down the URL into ________ parts.

►2
►3
►4
►5

A named collection of properties (data, state) and methods (instruction, behavior) is called
____________.

► Array
► Function
► Variable
► Object

First computer network was ___________.

► NSFNET
► FIRSTNET
► ARPANET
► ORPHANET

In JavaScript, a variable declaration is

► Optional
► Mandatory
► Not allowed
► None of the given

A protocol used for receiving email messages is called ____________.


► URL
► Telnet
► POP3
► SMTP

which one is correct?

► onUnload
► onUnLoad
► onUNLOAD
► All of the above

Serial arrangement in which things follow logical order or a recurrent pattern, such as statements
executing one by one, is called __________.

► Loop
► Sequence
► Condition
► Array

Variables allow us to manipulate data through the ___________.

► Actual Value
► Reference
► Length
► Name

Fuzzy logic is based on ____________.

► Ground facts
► Experience
► Practice
► Approximation

Word Processor is a _________________


► System Software
► Application Software
► Device
► Utility

In the old days, databases did NOT support ____________.

► Number
► Boolean
► Video
► Text

In tabular storage, fields placed in a particular row are strongly ___________.

► Independent
► Dependent
► Interrelated
► Inconsistent

Due to working at home, lack of interaction may result in ___________ professional growth.

► Slower
► Faster
► Higher
► Improved
Distance learning has got a boost due to the ___________.
► Easy communication
► Online interactive contents
► Flexibility
► All of the given options

_____________ technique can be used to create smooth animations or to display one of several
images based on the requirement.

► Image downloading
► Image preloading
► Image uploading
► Image postloading

The ____________ is becoming the preferred organizational structure for more and more
organizations with the passage of time.

► Tree structured organizational model


► Network paradigm
► Hierarchical structure
► None of the given options

The group of technologies concerned with the capturing, processing and transmission of
information in the digital electronic form is called
_____________.

► Telecom Engineering
► Computer Engineering
► Computer Science
► Information Technology

A large number of networks interconnected physically is called ______

► LAN
► MAN
► Internet
► Network collection

TCP stands for ________.

► Transfer Center protocol


► Transmission Control Protocol
► Transmission Center Protocol
► Telephone Center Protocol

A collection of data organized in such a way that the computer can quickly search for a desired data
item is known as :
► Retrieving
► Database
► Information
► DBMS

______ is simply a fast port that lets you connect computer peripherals and consumer electronics to
your computer without restart.

► Freeware
► Shareware
► Firewire
► Firmware
Structures, in which another list starts before the first list is finished, are called:

► Multiple Lists
► Nested Lists
► Ordered Lists
► Un-ordered Lists

The key property of the ‘Array’ object in JavaScript is


► Value
► Length
► Name
► All of the given choices

Which one is the example of spreadsheet software ?

► MS Word
► MS PowerPoint
► MS Excel
► MS Access

The Encryption of data is related to

► Data updates
► Data security
► Data integrity
► Data accessibility

_____ is the process of analyzing large databases to identify patterns.


► Data normalization
► Data management
► Data Mining
► None of the given options

Which is the user-friendly way of presenting data ?

► Query
► Form
► Report
► All of the given options

<form> Tags always placed between the <BODY> and </BODY> tags of a Web page

► True
► False

Java script has ----------------- ability to create and draw graphics.

► Limited
► Versatile
► Medium
► Not at all

Which of the following is incorrect for making design elements legible?


Select correct option:
Elements should be large enough
Elements must contrast sufficiently
Related elements should be visually grouped
Elements should have no visual focus

Function is also known as ______________.


Select correct option:
subprogram
procedure
subroutine
All of given

In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET.
Select correct option:
1973
1983
1972
None of the given choices

E-mail system has ______ component(s)

Select correct option:


E-mail client
SMTP server
POP3 server
All of the given choices
_______ / / /______/ A Parallelogram (Tilted rectangle) represents the ________________ flow chart
element.

Select correct option:


Process
Input or Output
Decision
Connector

If a computer could pass the Turing test then it would be able to:
Select correct option:

win a million dollar prize


think like human begins
think but slower than humans
do the things faster

Punched cards were replaced by:

Select correct option:


Floppy Disk
Zip Drives
Magnetic storage
None of the given choices

The ________virus may display an annoying, but harmless message

Select correct option:


Malicious
Neutral
Helpful
DoS

The name of very first computer was:


Select correct option:
ABC
BCD
EDC
None of the given choices

The internet communities are ___________.

Select correct option:


Geographical based
Interest based
Country based
Religion based

which one is correct?

► onUnload
► onUnLoad
► onUNLOAD
► All of the above

Serial arrangement in which things follow logical order or a recurrent pattern, such as statements
executing one by one, is called __________.
► Loop
► Sequence
► Condition
► Array

Variables allow us to manipulate data through the ___________.

► Actual Value
► Reference
► Length
► Name

Fuzzy logic is based on ____________.

► Ground facts
► Experience
► Practice
► Approximation

Word Processor is a _________________

► System Software
► Application Software
► Device
► Utility

In the old days, databases did NOT support ____________.

► Number
► Boolean
► Video
► Text

In tabular storage, fields placed in a particular row are strongly ___________.

► Independent
► Dependent
► Interrelated
► Inconsistent

Due to working at home, lack of interaction may result in ___________ professional growth.

► Slower
► Faster
► Higher
► Improved

Distance learning has got a boost due to the ___________.


► Easy communication
► Online interactive contents
► Flexibility
► All of the given options

_____________ technique can be used to create smooth animations or to display one of several
images based on the requirement.

► Image downloading
► Image preloading
► Image uploading
► Image postloading

The ____________ is becoming the preferred organizational structure for more and more
organizations with the passage of time.

► Tree structured organizational model


► Network paradigm
► Hierarchical structure
► None of the given options

The group of technologies concerned with the capturing, processing and transmission of
information in the digital electronic form is called
_____________.

► Telecom Engineering
► Computer Engineering
► Computer Science
► Information Technology

A large number of networks interconnected physically is called ______

► LAN
► MAN
► Internet
► Network collection

TCP stands for ________.

► Transfer Center protocol


► Transmission Control Protocol
► Transmission Center Protocol
► Telephone Center Protocol

A collection of data organized in such a way that the computer can quickly search for a desired data
item is known as :
► Retrieving
► Database
► Information
► DBMS

______ is simply a fast port that lets you connect computer peripherals and consumer electronics to
your computer without restart.

► Freeware
► Shareware
► Firewire
► Firmware

Structures, in which another list starts before the first list is finished, are called:
► Multiple Lists
► Nested Lists
► Ordered Lists
► Un-ordered Lists

The key property of the ‘Array’ object in JavaScript is

► Value
► Length
► Name
► All of the given choices

Which one is the example of spreadsheet software ?

► MS Word
► MS PowerPoint
► MS Excel
► MS Access

_____ is the process of analyzing large databases to identify patterns.


► Data normalization
► Data management
► Data Mining
► None of the given options

Which is the user-friendly way of presenting data ?

► Query
► Form
► Report
► All of the given options

JavaScript function fixed() has equivalent HTML tag-set ____

► <.FIX>……………</FIX>
► <F>………………..</F>
► <PRE>………….</PRE>
► <H>………………..</H>

<form> Tags always placed between the <BODY> and </BODY> tags of a Web page

► True
► False

Java script has ----------------- ability to create and draw graphics.

► Limited
► Versatile
► Medium
► Not at all

Internet is an example of ______________ network.


Private
Public
Both Private and Public
None of the given choices

The name of first commercially available PC was:


UNIVAC 1
ENIAC
EDVAC
Altair 8800

Algorithm is a ____________________

Definition of a problem
Sequence of steps to solve a problem
Understanding of a problem
Solving a problem

A group of information is called __________________

File
Database
Record
Field

___________________ is a branch of computer science concerned with manipulating and enhancing


computer graphics.
Image Handling
Image Processing
Image Engineering
None of these

__________has changed our way of life like no other technology.

Computational technology
Computer technology
Computing technology
None of the Above

Sophisticated event handling is not possible with _______________ event handling

Off-Line
In-Line
Out-Line
Non of the given choices

Babbage’s Analytical Engine could store information permanently in:

Magnetic Tape
Floppy Disk
Punched Cards
None of the given choices
There are __________ popular schemes to reduce the number of bytes that are required for storing
graphics.
4
3
2
None of these

The internet-society is considered under Surveillance because:


While surfing, we are being watched, constantly
Our every click is recorded and analyzed to extract patterns and behaviors
Webcams are becoming common. Providing a cheap way for parents to watch their children's every move
All of the given

URL is a/an ________


► Device
► Component
► Address
► Tool

To improve the time for scanning a web page, text should be ___________.

► Centered
► Left Aligned
► Right Aligned
► Staggered

Communications on the internet is controlled by a set of two protocols which are ____________.

► IMAP and SMTP


► FTP and HTTP
► TCP and IP
► TCP and HTTP

FTP stands for __________.

► File transmission protocol


► File transmission path
► File transfer protocol
► Fine transfer path

A named collection of properties (data, state) and methods (instruction, behavior) is called
____________.
► Array
► Function
► Variable
► Object

Anchor tag denoted by <A> is used to create

► Address
► Hyperlink
► Paragraph
► Title

<UL> tag is used to


► underline text
► end the line
► create ordered list
► create unordered list

A user may access any item on the web through __________.


► URL
► Telnet
► POP
► SMTP

The browser breaks down the URL into ________ parts.


►2
►3
►4
►5

Which one of the following is NOT a primary color?

► Red
► Green
► Yellow
► Blue

According to a popular heuristic, success is defined by ___________.


► The user
► The builder
► Both user and builder
► None of the given options

The idea of Neural Networks field is based upon ______________.


► Human nature
► Human brain
► Human culture
► Human actions

ERP is a type of __________________ .

► Entertainment software
► Productivity software
► Business software
► Scientific software

__________ are those programs in which the flow of the program is determined by the user's actions
(mouse clicks, key presses) or messages from other programs.

► Event called programs


► Event processed programs
► Event driven programs
► Event declared programs

Automatic machines performing various tasks that were previously done by humans, are called
____________.
► Robotics
► Computers
► Decision Making Systems
► Autonomous Web Agents

country=”Hello Pakistan”;
document.write(country.charAt(6));
The out put of the above statement is _____________.

►o
►P
►a
►k

The distance among families is ___________ because of spending more time on internet.
► Increased
► Expanded
► Contracted
► Decreased

The software used for the scanning of internet severs, is called __________.

► Wscan
► Mscan
► Sscan
► Vscan

Adding images to html page, we use___________ tag.

► <IMG>
► <IMAGE>
► <PICTURE>
► <PIC>

The group of technologies concerned with the capturing, processing and transmission of
information in the digital electronic form is called _____________.

► Telecom Engineering
► Computer Engineering
► Computer Science
► Information Technology

The responsibilities of the Team Lead includes_____________.

► Planning and tracking of the project


► Detailed design
► Professional development of team members
► All of the given options

When the packets reach at destination, __________ reassembles them into original message.

► Protocol
► TCP
► IP
► NIC

Many developers write the _________ first and then incrementally convert each line into _________.
► Real code & Pseudo code
► Pseudo code & Real code
► Real code & Artificial code
► None of the given options
Machine language is also called

► Assembly Language
► Binary Language
► High Level Language
► HTML Language

In JavaScript, second element of an array has the index:

►2
►0
►1
►3

Each element in an array is given an index, which is an integer value between 0 and one less than the
length of the array. The first element has an index of 0, the second element has an index of 1, and so on.

One can download or upload files to a remote computer using ________ protocol.

► HTTP
► SMTP
► FTP
► TELNET

JavaScript ________ support drawing of graphics


► Does
► Does not
► Always
► At times

Which of the following is NOT true about modern computers?

► More powerful
► Smaller in size
► Consume less energy
► Costly

Ada written a computer programme for ?

► Analytical Engine
► Difference Engine
► Harvard Mark 1
► Mechanical engine

A set of stand alone productivity applications designed to work together known as ______________ .

► Productivity software suites


► Compiled software
► Secure software
► Intelligent software

Because of spending more time on the internet, the distances among the families have been _____.
Increased
Expanded
Contracted
Shortened
Sophisticated event handling is not possible with _______________ event handling
Off-Line
In-Line
Out-Line
Non of the given choices

Autonomous Web Agents are also known as _________________


Mobile Agents
Softbots
Both "Mobile Agents" & "Softbots"
None of these

A communication protocol is a __________that governs the flow of information over a network.

Set of Methods
Set of Protocols
Set of rules
None of the given choices

By default in a web page Hyper Link for another web page is represented as:
Blue only
Black and Underlined
Blue and Bold
Blue and Underlined
The organizations are learning that business can be done in a more effective manner if emphasis is
placed upon ______________.
Cooperation
Shared responsibility
Networking
All of the given

Monitor is an example of __________devices


Output
Input
Processing
None of the given choices
The code in the ________ portion is the right choice for developing larger JavaScript scripts
Body
At End
Head
Separate

____________________ based on the principles of the logical reasoning ability of humans.


Genetic Algorithms
Rule-based Systems
Feed-Forward Network
None of these

The key benefit of VPNs over conventional PNs is:


Security
Efficiency
Lower Cost
None of the given choices
Which of the following is incorrect for making design elements legible?
Select correct option:

Elements should be large enough


Elements must contrast sufficiently
Related elements should be visually grouped
Elements should have no visual focus
1. Function is also known as ______________.
Select correct option:
subprogram
procedure
subroutine
All of given
In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET.

Select correct option:


1973
1983
1972
None of the given choices

E-mail system has ______ component(s)

Select correct option:


http://groups.google.com/group/vuZs
E-mail client
SMTP server
POP3 server
All of the given choices
_______ / / /______/ A Parallelogram (Tilted rectangle) represents the ________________ flow chart
element.
Select correct option:
Process
Input or Output
Decision
Connector

If a computer could pass the Turing test then it would be able to:
Select correct option:
win a million dollar prize
think like human begins
think but slower than humans
do the things faster

Punched cards were replaced by:


Select correct option:

Floppy Disk
Zip Drives
Magnetic storage
None of the given choices

The ________virus may display an annoying, but harmless message


Select correct option:

Malicious
Neutral
Helpful
DoS
The name of very first computer was:

Select correct option:


ABC
BCD
EDC
None of the given choices
The internet communities are ___________.
Select correct option:
Geographical based
Interest based
Country based
Religion based
__________% of the users have left websites in frustration due to poor navigation.
► 40
► 62
► 83
► 91

In JavaScript, a variable declaration is

► Optional
► Mandatory
► Not allowed
► None of the given

A protocol used for receiving email messages is called ____________.

► URL
► Telnet
► POP3
► SMTP

which one is correct?


► onUnload
► onUnLoad
► onUNLOAD
► All of the above

Serial arrangement in which things follow logical order or a recurrent pattern, such as statements
executing one by one, is called __________.

► Loop
► Sequence
► Condition
► Array

Variables allow us to manipulate data through the ___________.

► Actual Value
► Reference
► Length
► Name

Fuzzy logic is based on ____________.

► Ground facts
► Experience
► Practice
► Approximation

Word Processor is a _________________

► System Software
► Application Software
► Device
► Utility
In the old days, databases did NOT support ____________.

► Number
► Boolean
► Video
► Text

In tabular storage, fields placed in a particular row are strongly ___________.


► Independent
► Dependent
► Interrelated
► Inconsistent

Due to working at home, lack of interaction may result in ___________ professional growth.

► Slower
► Faster
► Higher
► Improved

Distance learning has got a boost due to the ___________.


► Easy communication
► Online interactive contents
► Flexibility
► All of the given options

_____________ technique can be used to create smooth animations or to display one of several
images based on the requirement.

► Image downloading
► Image preloading
► Image uploading
► Image postloading

► Tree structured organizational model


► Network paradigm
► Hierarchical structure
► None of the given options

The group of technologies concerned with the capturing, processing and transmission of
information in the digital electronic form is called
_____________.
► Telecom Engineering
► Computer Engineering
► Computer Science
► Information Technology

A large number of networks interconnected physically is called ______

► LAN
► MAN
► Internet
► Network collection

TCP stands for ________.

► Transfer Center protocol


► Transmission Control Protocol
► Transmission Center Protocol
► Telephone Center Protocol

A collection of data organized in such a way that the computer can quickly search for a desired data
item is known as :
► Retrieving
► Database
► Information
► DBMS

______ is simply a fast port that lets you connect computer peripherals and consumer electronics to
your computer without restart.

► Freeware
► Shareware
► Firewire
► Firmware

Structures, in which another list starts before the first list is finished, are called:

► Multiple Lists
► Nested Lists
► Ordered Lists
► Un-ordered Lists

The key property of the ‘Array’ object in JavaScript is

► Value
► Length
► Name
► All of the given choices

Which one is the example of spreadsheet software ?


► MS Word
► MS PowerPoint
► MS Excel
► MS Access

The Encryption of data is related to

► Data updates
► Data security
► Data integrity
► Data accessibility

_____ is the process of analyzing large databases to identify patterns.

► Data normalization
► Data management
► Data Mining
► None of the given options

Which is the user-friendly way of presenting data ?

► Query
► Form
► Report
► All of the given options

JavaScript function fixed() has equivalent HTML tag-set ____


► <.FIX>……………</FIX>
► <F>………………..</F>
► <PRE>………….</PRE>
► <H>………………..</H>

<form> Tags always placed between the <BODY> and </BODY> tags of a Web page

► True
► False

Java script has ----------------- ability to create and draw graphics.

► Limited
► Versatile
► Medium
► Not at all
Question # 1 of 10 ( Start time: 05:21:25 PM ) Total Marks: 1
Internet is an example of ______________ network.
Select correct option:

Private
Public
Both Private and Public
None of the given choices

Question # 2 of 10 ( Start time: 05:21:53 PM ) Total Marks: 1


The name of first commercially available PC was:
Select correct option:

UNIVAC 1
ENIAC
EDVAC
Altair 8800

Question # 3 of 10 ( Start time: 05:22:43 PM ) Total Marks: 1


Algorithm is a ____________________
Select correct option:

Definition of a problem
Sequence of steps to solve a problem
Understanding of a problem
Solving a problem

Question # 4 of 10 ( Start time: 05:23:52 PM ) Total Marks: 1


A group of information is called __________________
Select correct option:

File
Database
Record
Field

Question # 5 of 10 ( Start time: 05:24:17 PM ) Total Marks: 1


___________________ is a branch f computer science concerned with manipulating and enhancing
computer graphics.
Select correct option:

Image Handling
Image Processing
Image Engineering
None of these
Question # 6 of 10 ( Start time: 05:25:34 PM ) Total Marks: 1
__________has changed our way of life like no other technology.
Select correct option:

Computational technology
Computer technology
Computing technology
None of the Above

Question # 7 of 10 ( Start time: 05:26:27 PM ) Total Marks: 1


Sophisticated event handling is not possible with _______________ event handling
Select correct option:

Off-Line
In-Line
Out-Line
Non of the given choices

Question # 8 of 10 ( Start time: 05:27:03 PM ) Total Marks: 1


Babbage’s Analytical Engine could store information permanently in:
Select correct option:

Magnetic Tape
Floppy Disk
Punched Cards
None of the given choices

Question # 9 of 10 ( Start time: 05:28:30 PM ) Total Marks: 1


There are __________ popular schemes to reduce the number of bytes that are required for storing
graphics.
Select correct option:

4
3
2
None of these

A number of clever schemes have been invented to reduce the number of bytes that are required for storing
graphics. 2 popular ones:
Color mapping
Dithering

Question # 10 of 10 ( Start time: 05:30:01 PM ) Total Marks: 1


The internet-society is considered under Surveillance because:
Select correct option:

While surfing, we are being watched, constantly


Our every click is recorded and analyzed to extract patterns and behaviors
Webcams are becoming common. Providing a cheap way for parents to watch their children's every move
All of the given

Which of the following is incorrect for making design elements legible?


Select correct option:
Elements should be large enough
Elements must contrast sufficiently
Related elements should be visually grouped
Elements should have no visual focus
25.10 Making Display Elements Legible:
1. Designing (arranging) Display Elements
Elements must be large enough to be processed visually
Elements must contrast sufficiently with their backgrounds
Related elements should be visually grouped through the use of space, color, or graphical boundaries
The relative levels of importance among elements in a display should be revealed graphically

Question # 2 of 10 ( Start time: 05:03:37 PM ) Total Marks: 1


1. Function is also known as ______________.
Select correct option:
subprogram
procedure
subroutine
All of given

Function:
A group of statements that is put together (or defined) once and then can be used (by reference)
repeatedly on a Web page Also known as subprogram, procedure, subroutine

In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET.
Select correct option:
1973
1983
1972
None of the given choices

E-mail system has ______ component(s)


1983 - The TCP/IP protocols becomes the only set of protocols used on the ARPANET
This sets a standard for all networks, and generates the use of the term Internet as the net of nets
ARPANET splits into two nets to keep military & non-military network sites separate: ARPANET and
MILNET

Select correct option:


E-mail client
SMTP server
POP3 server
All of the given choices

_______ / / /______/ A Parallelogram (Tilted rectangle) represents the ________________ flow chart
element.
Select correct option:
Process
Input or Output
Decision
Connector

Punched cards were replaced by:


Select correct option:
Floppy Disk
Zip Drives
Magnetic storage
None of the given choices

During the 1960s, the punched card was gradually replaced as the primary means for data
storage by magnetic tape, as better, more capable computers became available.
The ________virus may display an annoying, but harmless message
Select correct option:
Malicious
Neutral
Helpful
DoS

The internet communities are ___________.


Select correct option:
Geographical based
Interest based
Country based
Religion based

Question # 1 of 10 ( Start time: 04:51:32 PM ) Total Marks: 1


Because of spending more time on the internet, the distances among the families have been _____.
Select correct option:
Increased
Expanded
Contracted
Shortened

Question # 3 of 10 ( Start time: 04:53:30 PM ) Total Marks: 1


Autonomous Web Agents are also known as _________________
Select correct option:
Mobile Agents
Softbots
Both "Mobile Agents" & "Softbots"
None of these

A communication protocol is a __________that governs the flow of information over a network.


Select correct option:
Set of Methods
Set of Protocols
Set of rules
None of the given choices

Protocol
–Rules governing communications over the network
By default in a web page Hyper Link for another web page is represented as:
Select correct option:
Blue only
Black and Underlined
Blue and Bold
Blue and Underlined

The organizations are learning that business can be done in a more effective manner if emphasis is placed
upon ______________.
Select correct option:
Cooperation
Shared responsibility
Networking
All of the given

Question # 7 of 10 ( Start time: 04:57:19 PM ) Total Marks: 1


Monitor is an example of __________devices
Select correct option:
Output
Input
Processing
None of the given choices
The code in the ________ portion is the right choice for developing larger JavaScript scripts
Select correct option:
Body
At End
Head
Separate
____________________ based on the principles of the logical reasoning ability of humans.
Select correct option:
Genetic Algorithms
Rule-based Systems
Feed-Forward Network
None of these

Rulebased Systems (1):


Based on the principles of the logical reasoning ability of humans

The key benefit of VPNs over conventional PNs is:


Select correct option:
Security
Efficiency
Lower Cost
None of the given choices
In __________________ automatic machines perform various tasks that were previously performed by
humans.
Select correct option:
Fuzzy Logic
Robotics
Rule based Systems
None of these

Avoid __________ to ensure readability of web page


Select correct option:

Overuse of bold and italics


Use of paragraphs
Use of white space
Use of contrast colors

Deep Blue was the name of:


Select correct option:
Human
Computer
City
None of the given choices

Using ____, a user can remotely log on to a computer (connected to the user through a network, e.g.
Internet) & have control over it like a local user, including control over running various programs ?
Select correct option:

FTP
TCP
Telnet Protocol
None of the given choices

Telnet Protocol
Using Telnet, a user can remotely log on to a computer (connected to the user’s through a TCP/IP
network, e.g. Internet) & have control over it like a local user, including control over running various
programs In contrast, FTP allows file operations only
Typical use: Configuring and testing of a remote Web server

DoS is________ ?
Select correct option:
Crime
Cyber crime
Not a crime
A software

__________ enables users located at far-way locations to easily share information with others located all
over the world.
Select correct option:

Protocol
Internet
Communication Channel
None of the given choices

Vacuum tubes were replaced by:


Select correct option:

Transistors
Electrodes
Electric Relays
None of the given choices

Cyber crime can be used to


Select correct option:

Damage a home computer


Bring down a business
Weaken the telecom, financial, or even defense-related systems of a country
All of the given

___ provides a simple, consistent way for applications to interact with the HW without having to know all the
details of the HW
► Explorer.exe
► System Files
► Operating System
► Application Software

Communication protocol is a __________that governs the flow of information over a network


► Set of methods
► Set of protocols
► Set of rules
► Device
_____________ team is responsible for the maintenance, expansion , improvement of the infrastructure
consisting of workstations, networking equipment, software and network security.
► Support
► Configuration Management
► Quality Assurance
► Developer
_____________ team consists on the sharpest technical minds in the company.
► Architecture
► Business Development
► Configuration Management
► Developer

_______________ is responsible for day to day operations.


► CEO
► COO
► CMSO
► Developer
Using Java Script you can write a character at random location on screen
► By applying randomCh() method
► With the help of String object
► With the help of random character property
► There is no built in approach in Java Script

The transistor is a solid state semiconductor device used for amplification and switching, and has _____
terminals.
► one
► two
► three
► four

Question No: 2 ( Marks: 1 ) - Please choose one


Blue Pacific is a name of _____ computer.
► Mini
► Desktop
► Micro
► Super

Question No: 3 ( Marks: 1 ) - Please choose one


Monte Carlo algorithm is an example of
► Randomized algorithm
► Greedy algorithm
► both greedy and randomized
► Heuristics

Question No: 4 ( Marks: 1 ) - Please choose one


A set of stand alone productivity applications designed to work together known as __

► Productivity software suites


► Compiled software
► Secure software
► Intelligent software

MID TERM EXAMINATION

Question No: 1 (Marks: 1) - Please choose one

__________% of the users has left websites in frustration due to poor navigation.

► 40

► 62

► 83

► 91

Question No: 2 vuzs ( Marks: 1 ) - Please choose one

The impact of a digit in a number is determined by its ---------------

► Value

► Location
► Length

► None of above

Question No: 3 ( Marks: 1 ) - Please choose one

Hexadecimal number system is based on -------------------- digits

►2

►8

► 12

► 16

Question No: 4 ( Marks: 1 ) - Please choose one

TCP stands for ___________.

► Total communication protocol

► Transmission control protocol

► Transfer control protocol

► Transfer collection protocol

Question No: 5 ( Marks: 1 ) - Please choose one

The browser breaks down the URL into ________ parts.

►2

►3

►4

► Question No: 6 (Marks: 1) - Please choose one

A single pixel can acquire approximately ___________ colour schemes.

► 1 million

► 2 million

► 10 million

► 16 million

Question No: 7 (Marks: 1) - Please choose one


Serial arrangement in which things follow logical order or a recurrent pattern, such
as statements executing one by one, is called __________

► Loop

► Sequence

► Condition

► Array

Question No: 8 (Marks: 1) - Please choose one

According to a popular heuristic, success is defined by ___________.

► The user

► The builder

► Both user and builder

► None of the given options

Question No: 9 (Marks: 1) - Please choose one

Which one is the best option for designing a Medical Expert System?

► Rule Based System

► Genetic Algorithm

► Fuzzy Logic

► Neural Network

Question No: 10 (Marks: 1) - Please choose one

Document. Write ("20"+"12");

The out put of the above statement is ____________.

► 1220

► 2012

► 20 12
► 32

Question No: 11 ( Marks: 1 ) - Please choose one

Due to working at home, contact with the colleagues is __________, which may
result in __________ quality of work

► Reduced, Poorer

► Reduced, Better

► Increased, Poorer

► Increased, Better

Question No: 12 ( Marks: 1 ) - Please choose one

The effective way not to only write programs but also it works properly and further
more to minimize the time and the development cost of the program is
called___________________

► Programming Mechanism

► Programming Methodology

► Programming Synchronization

► None of the given options

Question No: 13 ( Marks: 1 ) - Please choose one


The tasks performed to determine the existence of defects is called _______
► Debugging
► Testing
► Repairing
► Coding
Question No: 14 ( Marks: 1 ) - Please choose one
Deep Blue was the name of
► Computer
► Human
► City
► Game
Question No: 15 ( Marks: 1 ) - Please choose one

There is a battery on the motherboard to:

► Give power to the processor

► Save information when computer is off

► Save information when computer is on


► Give power to the motherboard

Question No: 16 ( Marks: 1 ) - Please choose one

Compound Statement after decision constructs in JavaScript is enclosed with

►( )

►[ ]

► { };

►{ }

Question No: 17 ( Marks: 1 ) - Please choose one

______ occurs when a function calls itself.

► Recursion

► Call by value

► Call by reference

► Parsing

Question No: 18 ( Marks: 1 ) - Please choose one

Which function returns integer nearest to x

► random()

► exp(x)

► log(x)

► round(x)

Question No: 19 ( Marks: 1 ) - Please choose one

Microphone is an input as well as output device. This statement is

► True

► False

Question No: 20 ( Marks: 1 ) - Please choose one

74HC163 has two enable input pins which are _______ and _________

► ENP, ENT
► ENI, ENC

► ENP, ENC

► ENT, ENI

Question No: 21 ( Marks: 1 ) - Please choose one

Radio Buttons are used when you want the user to select one of a limited number of
choices.

► True

► False

Question No: 22 ( Marks: 1 ) - Please choose one

In partitioning of program/module, it should be assured that partitioned chunks


should be as _________ as possible.

Dependent

► Independent

► Complex

► All of the above

Question No: 23 ( Marks: 1 ) - Please choose one

In a library’s database, if there is an entry in the register for Book # 423 then the
corresponding Book must actually exist; is an example of which type of data
integrity:

► Type integrity

► Limit integrity

► Physical Integrity

► Referential Integrity

Question No: 24 ( Marks: 1 ) - Please choose one

DBMS and Database are two names of one term .

► True

► False
Question No: 25 ( Marks: 1 ) - Please choose one

There are _______ types of program errors

►2

►4

►6

►3

Question No: 26 ( Marks: 1 ) - Please choose one

Super computers consists of more than one parallel processors because

► One big processor is more expensive than parallel processors

► Through parallel processors problems can be solved easily

► Small processors are easy to manufacture

► All of the given

Question No: 27 ( Marks: 2 )

What is the difference between ‘single-line text input field’ and ‘password input
field’ ?

ANS:

A Password Field is good for sensitive information. The only item that is absolutely
necessary is the Submit Button. It is a good idea to include a Reset Button for the
convenience of the user.
A text field gathers information using a single line of text. This field is useful for
short answers. The default text field is blank. If you want to specify default text, use
the VALUE attribute.

Question No: 28 ( Marks: 2 )

What is internet?

ANS:

Internet is also called WAN, which means the interconnection of large number
of computer networks and it consists of millions of private, public, academic,
business, and government networks of local to global scope that are linked by a
broad array of electronic and optical networking technologies.

Question No: 29 ( Marks: 2 )


In JavaScript, what is event handling? What are the two types of events?

ANS:

Event handling means capturing an event and responding to that.


Events e.g. onMouseOver, On Click, on Load, On unload, updating the clock etc.
are captured by the Java script & according to the programs they are responded
accordingly

Question No: 30 ( Marks: 2 )

Define the key weakness of the web?

ANS:

The Web as it currently exists was designed for humans to read, not for computers to
understand and manipulate meaningfully. The Computers face great problems in dealing
with the current text- and graphics-based content of the Web

Question No: 31 ( Marks: 3 )

How can we include images in a web page using HTML and Java script?

ANS:

Image in HTML

It is easier to insert images and pictures i.e. JPG, GIF & BMP files in the web page
through HTM codes.

The tag is used which is used as under:-

Height=(in pixels) width=(in pixels)

Images in JavaScript
Images in JavaScript may be used with the event handling i.e. OnLoad, OnUnload,
OnError and OnAbort etc.
The properties i.e. used for Java script are as under:-
1. Name
2. Border
3. Complete
4. Height
5. src
for example:-

xyz” src=”abc.jpg”>

Question No: 32 ( Marks: 3 )

Differentiate between onLoad and onUnload

ANS:

On load event is used when the page is load in the browser while on the other side
onUnload event works when the page closes down.

Question No: 33 ( Marks: 3 )

Elaborate Rester Graphics with examples.

ANS:

Raster graphics are digital images created or captured (for example, by scanning in
a photo) as a set of samples of a given space . A raster file is usually larger than a
vector graphics image file. A raster file is usually difficult to modify without loss of
information.

Examples of raster image file types are: BMP, TIFF, GIF, and JPEG files.

Question No: 34 ( Marks: 5 )

What is a Relational Database? Give the names of any three RDBMS software.
(2+3)

ANS:

Database architecture consists of three levels, external, conceptual and internal.


Clearly separating the three levels was a major feature of the relational database.

NAMES:

Oracle Database software, Linux, and oracle e business database software , and
Oracle OLAP.

Question No: 35 ( Marks: 5 )

How many ways are there to call a function in a program ? Explain with example

ANS:

there are two methods of function in a program


1st method is used within the html coding with immediate in the even handling
on the other side function can also be defined in the heading portion of the html
page
it is a better choice to use function as it include many statments in it.
OnMouseOver= “if(document.sendEmail.sender.value.length<1)
Window.alert(‘empty field!’)”
while in the heading portion
it will be as
function checkForm() {
if ( document.sendEmail.sender.value.length < 1) {
window.alert( “Empty Field” );
}

Question No: 36 ( Marks: 5 )

What do you mean by the term 'Telepresence' in Computing World?

Spring 2009
CS101- Introduction to Computing (Session - 6)
Time: 60 min
Marks: 43

Question No: 1 ( Marks: 1 ) - Please choose one


Cray-1 was first commercial _________ computer
► Super
► Mini
► Micro
► Personal

Question No: 2 ( Marks: 1 ) - Please choose one


Browser is a __________________ used for browsing.
► Tool
► Component
► Device
► None of these

Question No: 3 ( Marks: 1 ) - Please choose one

It represents the _____________ flow chart element.

► Flow Line
► Connector
► Off-page connector
► Start or stop
Question No: 4 ( Marks: 1 ) - Please choose one
JavaScript is an example of _____________ language.
► Object-based
► Object oriented
► Machine
► Assembly

Question No: 5 ( Marks: 1 ) - Please choose one


The set of rules and guidelines a team of developers follow to construct reasonably
complex SW systems is called

► Object Oriented Design


► Object Oriented Software
► Design Methodology
► Programming language

Question No: 6 ( Marks: 1 ) - Please choose one


Waterfall is a _________ life-cycle model.

► Spiral
► Sequential
► Circular
► Spherical

Question No: 7 ( Marks: 1 ) - Please choose one


What happens if I start a new list without closing the original one?
► An error will be generated
► A nested list will be created
► Previous list will end and a new will start.
► Nothing will happen

Question No: 8 ( Marks: 1 ) - Please choose one


In Spreadsheets, you can create a relationship between two cells by using _____.

► Numbers
► Text
► Formulas
► None of the given choices

Question No: 9 ( Marks: 1 ) - Please choose one


VisiCalc was the first popular _______application on PC’s.

► Spreadsheet
► Word processor
► Presentation
► Database
Question No: 10 ( Marks: 1 ) - Please choose one
Fins are used to --------------

► Communicate with microprocessor


► Increase surface area of Fan
► Decrease surface area of Fan
► Speed up the Fan.

Question No: 11 ( Marks: 1 ) - Please choose one


Using only HTML we can create

► Dynamic web pages


► Static web pages
► Both Static and Dynamic pages
► None of these

Question No: 12 ( Marks: 1 ) - Please choose one


Everything that JavaScript manipulates is treated as:
► Object
► Window
► Text
► Script

Question No: 13 ( Marks: 1 ) - Please choose one


The ______ is connected to all other modules of the microprocessor.

► Control unit
► Memory unit
► Floating Point unit
► Arithmetic and Logic unit

Question No: 14 ( Marks: 1 ) - Please choose one


Communication protocol is a __________that governs the flow of information over a
network
► Set of protocols
► Set of rules
► Device
► Set of methods

Question No: 15 ( Marks: 1 ) - Please choose one


_________ is the interface in computer that supports transmission of multiple bits at the
same time.
► Serial Port
► Parallel Port
► Universal Serial Bus
► None of the given choices

Question No: 16 ( Marks: 1 ) - Please choose one


_____ was designed as a replacement for typewriter
► Spreadsheet Software
► Word Processor Software
► Presentation Software
► Database Software

Question No: 17 ( Marks: 1 ) - Please choose one


Which one of these translates the program once at a time?
► Interpreter
► Compiler
► Operating system
► Translator

Question No: 18 ( Marks: 1 ) - Please choose one


Randomized algorithms are often ________ than deterministic algorithms for the same
problem.
► Simpler and more slow
► Simpler and more efficient
► Complex and more efficient
► Complex and more slow
Question No: 19 ( Marks: 1 ) - Please choose one
Ada written a computer programme for?

► Analytical Engine
► Difference Engine
► Harvard Mark 1
► Mechanical engine

Question No: 20 ( Marks: 1 ) - Please choose one


A test proposed to determine if a computer has the ability to think. It is called?

► Turing test
► Turning test
► Intelligence test
► None

Question No: 21 ( Marks: 1 ) - Please choose one


The most used form tag is the <input> tag.
► True
► False
Question No: 22 ( Marks: 1 ) - Please choose one
When the user clicks on the "Submit" button, the content of the form is sent to the server.
► True
► False

Question No: 23 (Marks: 1) - Please choose one


Extensions for saving web page are / is;
► *.html
► *.htm
► *.htm and *.htm both are used
► None of These

Question No: 24 ( Marks: 1 ) - Please choose one


In spread sheet a cell may contain

► Numbers
► Text
► Formulas
► All of the given

Question No: 25 ( Marks: 1 ) - Please choose one


Programs where no user interaction found during program execution are called
__________.
► Batch programs
► Event-driven programs
► Graphics based programs
► None of the given

Question No: 26 (Marks: 1) - Please choose one


OO (object oriented) software is all about _____________.

► Behaviours
► Methods
► Properties
► Objects

Question No: 27 ( Marks: 1 )


What is the key feature of batch programs?
Answer: The key feature is no user interaction with computer while a program is
running.

Question No: 28 ( Marks: 1 )


Name two languages which are used for client side scripting?
Answer: JavaScript, VBscript

Question No: 29 (Marks: 2)


What is the purpose of MODEM?
Answer: It receive data analog signal from a phone line and then convert them into digital
signal and send back to the computer with which it is attached. It also receives data from
computer and converts it into analog signals.

Question No: 30 (Marks: 3)


What is Home Page of a web site?
Answer: For a web user it is a first page displayed when a user starts a web browser and
for a web developer it is a first page when a user selects a site.

Question No: 31 (Marks: 5)


Why microprocessor uses the binary number system and not the decimal or any other
number system?
Answer: Because this system is natural for digital computer. Digital computer have
fundamental building blocks like ON & OFF Etc so it is natural to represent those in a
number system that has only two symbols e.g. Binary Numbers 0,1. Whereas decimal
system is natural for human.

Question No: 32 ( Marks: 5 )


What is the difference between Interactive-mode and Batch-mode Application Software?
Answer: Batch-mode: This Mode Program has no user interaction with computer while a
program is running e.g. Payroll
Interactive-mode: The user runs the program on the computer and keeps interacting with
the computer while a program is running e.g. word processor

MIDTERM EXAMINATION
Fall 2009
CS101- Introduction to Computing (Session - 4)

Question No: 1 (Marks: 1) - Please choose one


Human are better than computers at:

► Efficiency
► Accuracy
► Pattern recognition
► None of the given choices

Question No: 2 (Marks: 1) - Please choose one


The memory size of the Altair 8800 was
► 128 bytes
► 128 Kilo bytes
► 256 Kilo bytes
► 256 bytes

Question No: 3 (Marks: 1) - Please choose one


Information on World Wide Web is __
► Physically
► Logically
► Really
► None of the given choices

Question No: 4 (Marks: 1) - Please choose one


Mainframe Computers are also called
► Enterprise Servers
► Personal Servers
► Enterprise Managers
► Window Servers

Question No: 5 ( Marks: 1 ) - Please choose one


Which of the following is NOT a category of Mobile Computers?
► Laptop
► Palmtop
► Desktop
► Wearable

Question No: 6 ( Marks: 1 ) - Please choose one


Hexadecimal number system is based on -----
►2
►8
► 12
► 16

Question No: 7 ( Marks: 1 ) - Please choose one


<UL> tag is used to
► Underline text
► End the line
► create ordered list
► create unordered list

Question No: 8 (Marks: 1) - Please choose one


Bringing subsystems together to form the system is called
► Integration
► Merging
► Splitting
► Operation & Maintenance

Question No: 9 (Marks: 1) - Please choose one


__________ give us the ability to manipulate data through reference instead of actual
value.

► Constants
► Variables
► Data Types
► Operators

Question No: 10 ( Marks: 1 ) - Please choose one


In spreadsheets, cell address A12 means
______.

► Row A, Cloumn 12
► Row 12, Cloumn A
► Row 2,Cloumn A1
► Row A1, Cloumn 2

Question No: 11 ( Marks: 1 ) - Please choose one


Which of the following is/are the parts Operating system of components?

► GUI
► Device Manager
► Shell
► All of these

Question No: 12 ( Marks: 1 ) - Please choose one


The key feature of Scientific/Engineering/Graphics applications is

► Intense calculations

► User-friendly

► Reliability

► Cost-effective

Question No: 13 ( Marks: 1 ) - Please choose one


Command which saves the selected text before deleting is

► Copy
► Delete
► Cut
► Undo

Question No: 14 ( Marks: 1 ) - Please choose one


All the hardware components of the Computer system are installed on--
► Microprocessor
► Motherboard
► Monitor
► Memory

Question No: 15 ( Marks: 1 ) - Please choose one


By default in a web page Hyper Link for another web page is represented as _

► Blue only
► Black and Underlined
► Blue and Bold
► Blue and Underlined

Question No: 16 ( Marks: 1 ) - Please choose one


A microprocessor can be made more powerful by increasing its
► Clock frequency
► Word length
► Clock frequency and Word length
► None of above

Question No: 17 ( Marks: 1 ) - Please choose one


___ is a related collection of WWW files that includes a beginning file called a
homepage

► HTML
► Website
► HTTP
► Web page

Question No: 18 (Marks: 1) - Please choose one


Structures, in which another list starts before the first list is finished, are called:
► Multiple Lists
► Nested Lists
► Ordered Lists
► Un-ordered Lists

Question No: 19 (Marks: 1) - Please choose one


When the user needs something to be done by the computer, he/she gives instructions in
the form of ____ to computer ___
► Software, Hardware
► Hardware, Software
► System Software, Application Software
► Graph, Monitor
Question No: 20 (Marks: 1) - Please choose one
Application developers do not need to know much about the________ while they are
developing their applications
► Software
► Hardware
► Operating System
► Kernel

Question No: 21 (Marks: 1) - Please choose one


Which of the following is NOT an Application Software?

► Word Processor

► Web Browser

► Windows XP

► MS Excel

Question No: 22 (Marks: 1) - Please choose one


Web Pages developed for human as well computer understanding are called as;
► Static Web Pages
► Semantic Web Pages
► Dynamic Web Pages
► Java Web Pages

Question No: 23 (Marks: 1) - Please choose one


JavaScript stores all numbers as
► Integers
► Floating point numbers
► Strings
► Character values

Question No: 24 (Marks: 1) - Please choose one


Java script and HTML are
► Case sensitive
► Not case sensitive
► Java script is case sensitive but HTML is not
► HTML is case sensitive but Java script is not
Question No: 25 (Marks: 1) - Please choose one
A diode functions as the electronic version of a _________way valve.
► One
► Two
► Three
► Four
Question No: 26 (Marks: 1) - Please choose one
The first -------------was invented at Bell Laboratories on December 16, 1947 by William
Shockley.

► Transistor
► Vacuum Tube
► Punch card
► Transmitter

Question No: 27 (Marks: 1)


What are compilers used for?
Ans: compiler is software that can translate the whole programme in once. It also
saves the program. Compiling takes time, but super-fast execution

Question No: 28 (Marks: 1)


What is Script?
Ans: script is a sequence of steps to carry out a work by processor and manage by a
language like JavaScript and VBscripts.

Question No: 29 (Marks: 2)


What is <P> tag in HTML and how it is different from <br> tag?
Ans: <p> is used for paragraph in HTML language it has a closing tag </p> unlike
<br> which has no closing tag. Br is only used to break the current line while <p> can be
used for more lines
Question No: 30 (Marks: 3)
How can you manipulate the address of a file (resource) accessible on the Internet?
World Wide Web, URL, domain name
www.youtube.com

Question No: 31 (Marks: 5)


Write Hyper Link for a Web Page and for an Email Address.
Ans: Following are the hyper link for a web page
www.vu.edu.pk
www.yahoo.com
www.hotmail.com

Following are the hyperlinks for Email address


[email protected]
[email protected]
Question No: 32 ( Marks: 5 )
Write down the requirement of Desktop Publishing?
User requirement
Softwear requirements
. Laser printer
Scanner
DESktop publishing softwears
e.g
adobe page maker
Ms publisher
High end pc with a large screen monitor
Formate
Numerical data
Text
MIDTERM EXAMINATION
Fall 2009
CS101- Introduction to Computing (Session - 3)

Question No: 1 (Marks: 1) - Please choose one


Vacuum tubes were replaced by _________.
► Punch cards
► Transistors
► Micro Processors
► Resistors

Question No: 2 (Marks: 1) - Please choose one


Today’s computers are based on the technology of _________.
► Punch cards
► Vacuum tubes
► Transistors
► Resistors

Question No: 3 (Marks: 1) - Please choose one


Browser is a _________ used for browsing.
► Tool
► Component
► Device
► None of the given choices

Question No: 4 (Marks: 1) - Please choose one


It represents the __________ flow chart element.
► Process
► Input or Output
► Decision
► Connector

Question No: 5 (Marks: 1) - Please choose one


Which of the following number system is used by microprocessor?
► Binary
► Decimal
► Octal
► Hexadecimal

Question No: 6 ( Marks: 1 ) - Please choose one


Hexadecimal number system is based on ---------- digits
►2
►8
► 12
► 16

Question No: 7 (Marks: 1) - Please choose one


Java script interacts with user through_________.
► Special control
► Internet explorer
► Event handlers
► Java script does not interact with user

Question No: 8 (Marks: 1) - Please choose one


Programs that are typically started from a shell (or automatically via a scheduler) are
called
► Batch programs
► Event-driven programs
► Sequential programs
► Application programs

Question No: 9 (Marks: 1) - Please choose one


A new cell using HTML is added in table row by________?
► <TC>…</TC>
► <TR>…</TR>
► <TD>…</TD>
► <NC>…</NC>

Question No: 10 (Marks: 1) - Please choose one


Waterfall is a _______ life-cycle model.

► Spiral
► Sequential
► Circular
► Spherical

Question No: 11 (Marks: 1) - Please choose one


What will be the result of the following formula in Spreadsheet application?
SUM (A2:A3) =_______ (Assume that A2 = 25 A3 = 75)

► 25
► 50
► 75
► 100

Question No: 12 ( Marks: 1 ) - Please choose one

A _________ operating system allows many users to take advantage of the computer's
resources, simultaneously
► Single user

► Multi- user

► Single tasking

► Multi tasking

Question No: 13 ( Marks: 1 ) - Please choose one


When we use <INPUT type=“password”>, what will happen?
► Text will not be visible

► Text will be in normal format

► Text will be in **** format

► Text will be in #### format

Question No: 14 (Marks: 1) - Please choose one


The world first computer program was written to compute:
► Simple sequence
► Multiple sequence
► Bernoulli’s sequence
► Increasing sequence

Question No: 15 ( Marks: 1 ) - Please choose one


The first Web browser with a GUI was generally available in:
► 1992
► 1993
► 1994
► 1995

Question No: 16 ( Marks: 1 ) - Please choose one


ASCII WHITE is the fastest Super computer which can perform ________ calculations
in one second.
► 1.3 billion
► 1.3 trillion
► 1.3 million
► 1.3 thousand

Question No: 17 ( Marks: 1 ) - Please choose one


Monitor is an example of:
► Input Device
► Processing Device
► Output Device
► Storage Device

Question No: 18 ( Marks: 1 ) - Please choose one

Forms can be submitted through __________ methods


► INCLUDE, POST
► INCLUDE, GET
► GET, POST
► SEND, POST

Question No: 19 ( Marks: 1 ) - Please choose one


______ is responsible for all the essential operations like basic house keeping, task
scheduling, etc. Also contains low-level HW interfaces
► Hardware
► Device Manager
► Kernel
► Device Driver

Question No: 20 ( Marks: 1 ) - Please choose one


Which of the following is NOT an Application Software.

► Word Processor

► Web Browser

► Windows XP

► MS Excel
Question No: 21 ( Marks: 1 ) - Please choose one
Bit-mapped graphics is also known as ________ graphics
► Vector
► Raster
► Scalar
► Simple

Question No: 22 ( Marks: 1 ) - Please choose one


A set of stand alone productivity applications designed to work together known as
___________ .

► Productivity software suites


► Compiled software
► Secure software
► Intelligent software

Question No: 23 ( Marks: 1 ) - Please choose one


________ is used to terminate all JavaScript statements.
► Colon
► Semicolon
► Underscore
► Apostrophe

Question No: 24 ( Marks: 1 ) - Please choose one


By today's standards, the Mark-I was slow and requiring 3 to 5 seconds for a
multiplication operation. True

► True
► False
Question No: 25 ( Marks: 1 ) - Please choose one
There are_________________ rules to write the Pseudo Code.

► Standard
► No standard
► Pre-defined
► Strict

Question No: 26 ( Marks: 1 ) - Please choose one


In flow charts, there is only one entry point in conditions while there is/are _____ exit
points.

►1
►2
►3
►4

Question No: 27 ( Marks: 1 )


Define URL
URL(Uniform resource locator)
URL (Uniform Resource Locator, previously Universal Resource Locator) - is the
address of a file (resource) accessible on the Internet. The type of file or resource depends
on the Internet application protocol.
Examples of URLs: http://vu.edu.pk
http://www.yahoo.com

Question No: 28 ( Marks: 1 )


What is Randomized Algorithm?
Randomized Algorithm:
Any algorithm whose behavior is not only determined by the input, but also values
produced by a random number generator
These algorithms are often simpler and more efficient than deterministic algorithms for
the same problem. And because of there simplicity they are easier to analyze which is the
most important thing in the decision making of an algorithm.

Question No: 29 ( Marks: 2 )


What was the name of first super computer. When it was introduced?

CRAY1 is the first computer and it was introduced in 1971


Question No: 30 ( Marks: 3 )
How a designer makes Structured Design?
Structured Design is known as a Top-down design.
The designed first conceives about the High level design and then further designs the
details of the high level design components and it goes on and on.
Making small changes in the functionality of the systems sometimes leads to major re-
design exercise. Structured design separates the functionality from programs data and
that’s why program’s deisgned by this methodology are difficult to maintain.

Question No: 31 ( Marks: 5 )


Why microprocessor uses the binary number system and not the decimal or any other
number system?
The processor is the logic of a computer and functions comparably to a human central
nervous system, directing signals from one component to another and enabling
everything to happen. A microprocessor is made from miniaturized transistors and other
circuit elements on a single
semiconductor integrated circuit (IC) . These are made up oof semiconductor and silicon.
Microprocessor are composed of components which has only two states either 0 or 1.
Binary number system is also composed of these two states.

Microprocessor till today only understand the machine language and machine language is
only based on binary number system. Even today’s 64 bit microprocessors are also based
on this technology.

Question No: 32 ( Marks: 5 )


Why do we need an Interactive Form in a webpage?
1. Interactive forms are used to gather user data and interact with the user.
2. Forms can be made interactive with the use of client side scripting and server side

sciprting.

3. In HTML, <FORM> </FORM> tag is used to insert the form in a web page and it

always lie in <BODY></BODY> html tag.

4. without form’s web site is only “READ ONLY”.

5. with the help of forms a user and can search the contents, place order for goods

and services.

6. Forms can be simple or very complex, based on the requirement.

7. forms can contain a single element or many e.g text area, buttons

MIDTERM EXAMINATION
Fall 2009
CS101- Introduction to Computing s2

Question No: 1 ( Marks: 1 ) - Please choose one


Human are better than computers at:
► Efficiency
► Accuracy
► Pattern recognition
► None of the given choices

Question No: 2 ( Marks: 1 ) - Please choose one


Cray-1 was first commercial _________ computer
► Super
► Mini
► Micro
► Personal

Question No: 3 ( Marks: 1 ) - Please choose one


URL is a/an ________
► Device
► Component
► Address
► Tool

Question No: 4 ( Marks: 1 ) - Please choose one


Mainframe Computers are also called _____
► Enterprise Servers
► Personal Servers
► Enterprise Managers
► Window Servers

Question No: 5 ( Marks: 1 ) - Please choose one


Which of the following is NOT a category of Mobile Computers?
► Laptop
► Palmtop
► Desktop
► Wearable

Question No: 6 ( Marks: 1 ) - Please choose one


Preliminary exploration of possible solutions, technologies, suppliers is called

► Viability
► Feasibility
► Specification
► Integration

Question No: 7 ( Marks: 1 ) - Please choose one


__________ give us the ability to manipulate data through reference instead of actual
value.

► Constants
► Variables
► Data Types
► Operators

Question No: 8 ( Marks: 1 ) - Please choose one


Consider the following statement written in JavaScript:
str = ”Hello” + ” World”

What will be the value of str ?


► HelloWorld
► Hello World

► Hello + World
► It will result in error

Question No: 9 ( Marks: 1 ) - Please choose one


A tool that helps you to find the synonyms is called ______________.

► Language
► Paragraph
► Thesaurus
► Symbol

Question No: 10 ( Marks: 1 ) - Please choose one


Communication protocol is a __________that governs the flow of information over a
network
► Set of protocols
► Set of rules
► Device
► Set of methods

Question No: 11 ( Marks: 1 ) - Please choose one


If a computer could pass the Turing test then it would be able to:
► think like human beings
► do the things faster
► win a million dollar prize
► store more information

Question No: 12 ( Marks: 1 ) - Please choose one


The first Web browser with a GUI was generally available in:
► 1992
► 1993
► 1994
► 1995

Question No: 13 ( Marks: 1 ) - Please choose one


Web is a unique invention by humans in terms that it is:
► accessible to only the owners who control it
► accessible from particular locations only
► accessible to all humans
► accessible to only the educational institutes

Question No: 14 ( Marks: 1 ) - Please choose one


In this URL http://www.msn.com , _____identifies the domain name
► http
► www
► msn
► com

Question No: 15 ( Marks: 1 ) - Please choose one


______ is simply a fast port that lets you connect computer peripherals and consumer
electronics to your computer without restart.
► Freeware
► Shareware
► Firewire
► Firmware

Question No: 16 ( Marks: 1 ) - Please choose one


Which of the following is NOT supported by PC's power supply.
► -12 and +12 V DC
► -10 and +10 V DC
► -5 and + 5 V DC
► All are supported

Question No: 17 ( Marks: 1 ) - Please choose one


In which case Cache Memory is used
► To increase RAM speed
► To overcome BUS speed
► To overcome Speed rate between RAM and CPU
► To overcome CPU speed

Question No: 18 ( Marks: 1 ) - Please choose one


To display a single line text area on the web page, we use ___ tag
► TEXT
► TEXTBOX
► INPUT
► INPUTBOX

Question No: 19 ( Marks: 1 ) - Please choose one


If an algorithm is syntactically correct, but semantically incorrect then this situation is
► Very good situation
► Very dangerous situation
► Not very bad
► Neutral situation

Question No: 20 ( Marks: 1 ) - Please choose one


Users communicate with the computer using a consistent user interface provided by the
OS.
► True
► False

Question No: 21 ( Marks: 1 ) - Please choose one


Application developers do not need to know much about the HW, especially the
microProcessor, while they are developing their application.
► True
► False

Question No: 22 ( Marks: 1 ) - Please choose one


The first spread sheet program was invented by
► Charles Babbage
► Dan Bricklin
► Paul Graham
► John von Neumann

Question No: 23 ( Marks: 1 ) - Please choose one


Which representation technique of algorithm is more suitable for developer to make
actual code___________.

► pseudo code
► flow chart
► both pseudo code and flow chart
► Heuristics

Question No: 24 ( Marks: 1 ) - Please choose one


_____________ is used to terminate all JavaScript statements.
► Colon
► Semicolon
► Underscore
► Apostrophe

Question No: 25 ( Marks: 1 ) - Please choose one


In java script cookies can be created for future use_____.

► Easily
► No facility at all
► This is not possible without Java language.
► Cookies are files so java script can not handle it.

Question No: 26 ( Marks: 1 ) - Please choose one


When the microprocessor desires to look at a piece of data, it checks in
the __________ first.
► RAM
► ROM
► hard disk
► cache
MIDTERM EXAMINATION
Spring 2009
CS101- Introduction to Computing
Question No: 1 ( Marks: 1 ) - Please choose one
A diode functions as the electronic version of a __________-way valve.
► one
► two
► three
► four

Question No: 2 ( Marks: 1 ) - Please choose one


What is name of book from which word algorithm is taken ?

► Algebra and trigonometry


► Introduction to algorithms
► Research for new horizons
► Algoritmi de numero Indorum

Question No: 3 ( Marks: 1 ) - Please choose one


Tags always placed between the and tags of a Web page
► True
► False

Question No: 4 ( Marks: 1 ) - Please choose one


_______ consists of cells arranged in rows & columns
► Spreadsheets Software
► Word processor
► Presentation Software
► Microsoft Paint Software

Question No: 5 ( Marks: 1 ) - Please choose one


_____ was designed as a replacement for typewriter
► Spreadsheet Software
► Word Processor Software
► Presentation Software
► Database Software

Question No: 6 ( Marks: 1 ) - Please choose one


_________ manages the HW and SW resources ( memory, disk drives etc) of the
computer system, often invisibly.
► Explorer.exe
► System Files
► Operating System
► Application Software

Question No: 7 ( Marks: 1 ) - Please choose one


To display a radio button on the web page, we use ___ tag
► INPUTBUTTON
► INPUT
► RADIOBUTTON
► RADIO

Question No: 8 ( Marks: 1 ) - Please choose one


Machine language is also called
► Assembly Language
► Binary Language
► High Level Language
► HTML Language

Question No: 9 ( Marks: 1 ) - Please choose one


When the user needs something to be done by the computer, he/she gives instructions in
the form of _____ to computer ____
► Software, Hardware
► Hardware, Software
► System Software, Application Software
► Graph, Monitor

Question No: 10 ( Marks: 1 ) - Please choose one


A truth table defines the _________of a logic function for all possible _________
► Input -- Outputs
► Output -- Inputs
► Process -- Inputs
► Input -- Processes

Question No: 11 ( Marks: 1 ) - Please choose one


Which one is correct?



► Both and
► tags of a Web page
► True
► False

Question No: 4 ( Marks: 1 ) - Please choose one


_______ consists of cells arranged in rows & columns
► Spreadsheets Software
► Word processor
► Presentation Software
► Microsoft Paint Software

Question No: 5 ( Marks: 1 ) - Please choose one


_____ was designed as a replacement for typewriter
► Spreadsheet Software
► Word Processor Software
► Presentation Software
► Database Software

Question No: 6 ( Marks: 1 ) - Please choose one


_________ manages the HW and SW resources ( memory, disk drives etc) of the
computer system, often invisibly.
► Explorer.exe
► System Files
► Operating System
► Application Software

Question No: 7 ( Marks: 1 ) - Please choose one


To display a radio button on the web page, we use ___ tag
► INPUTBUTTON
► INPUT
► RADIOBUTTON
► RADIO

Question No: 8 ( Marks: 1 ) - Please choose one


Machine language is also called
► Assembly Language
► Binary Language
► High Level Language
► HTML Language

Question No: 9 ( Marks: 1 ) - Please choose one


When the user needs something to be done by the computer, he/she gives instructions in
the form of _____ to computer ____
► Software, Hardware
► Hardware, Software
► System Software, Application Software
► Graph, Monitor

Question No: 10 ( Marks: 1 ) - Please choose one


A truth table defines the _________of a logic function for all possible _________
► Input -- Outputs
► Output -- Inputs
► Process -- Inputs
► Input -- Processes

Question No: 11 ( Marks: 1 ) - Please choose one


Which one is correct?



► Both and

Question No: 12 ( Marks: 1 ) - Please choose one


WWW stands for:
► Wide World Web
► World Wide Web
► World White Web
► World Web Wide

Question No: 13 ( Marks: 1 ) - Please choose one


A _________translates a high-level language (that is easy to understand for humans) into
a language that the computer can understand
► Computer
► Transistor
► Compiler
► Device

Question No: 14 ( Marks: 1 ) - Please choose one


Deep Blue was the name of
► computer
► human
► city
► game

Question No: 15 ( Marks: 1 ) - Please choose one


Data travels through bus in the form of ---------------------------

► Packets
► Bits
► Bytes
► Word

Question No: 16 ( Marks: 1 ) - Please choose one


Command which saves the selected text before deleting is
► Copy
► Delete
► Cut
► Undo

Question No: 17 ( Marks: 1 ) - Please choose one


AutoCAD falls in the category of _________________

► Engineering Applications

► Graphics Applications

► Scientific Applications

► Business Applications
Question No: 18 ( Marks: 1 ) - Please choose one
In Spreadsheets, you can create a relationship between two cells by using _____.

► Numbers
► Text
► Formulas
► None of the given choices

Question No: 19 ( Marks: 1 ) - Please choose one


Which of the following symbol is used for multiple line comments in JavaScript?

►/
► //
► /*
► //*

Question No: 20 ( Marks: 1 ) - Please choose one


____________ is a system software that converts the source code written in high level
language into machine language code.
► Utilities
► Drivers
► Language Translator
► None of the these

Question No: 21 ( Marks: 1 ) - Please choose one


__________ is a particularly good language for processing numerical data, but it does
not lend itself very well to large business programs

► BASIC
► PASCAL
► JAVA
► FORTRAN

Question No: 22 ( Marks: 1 ) - Please choose one


Which of the following number system is used by microprocessor?

► Binary
► Decimal
► Octal
► Hexadecimal

Question No: 23 ( Marks: 1 ) - Please choose one


The __________Processor is specially designed for PDA?
► PowerPC
► StrongARM
► Crusoe
► SPARC

Question No: 24 ( Marks: 1 ) - Please choose one


Mainframe Computers are also called _____
► Enterprise Servers
► Personal Servers
► Enterprise Managers
► Window Servers

Question No: 25 ( Marks: 1 ) - Please choose one


URL is a/an ________
► Device
► Component
► Address
► Tool

Question No: 26 ( Marks: 1 ) - Please choose one


Ada, Countess of Lovelace developed first:
► Computer
► Website
► Computer Program
► Analytical engine

MIDTERM EXAMINATION
Spring 2010
CS101- Introduction to Computing (Session - 4)
Marks: 38
Question No: 1 ( Marks: 1 ) - Please choose one
JavaScript does not support_______________
► User interaction
► Graphics
► Network operations
► Both Graphics and Network operations

Question No: 2 ( Marks: 1 ) - Please choose one


_________ language is very good for writing well-structured and readable programs, but
it is not as flexible as the C programming language

► BASIC
► PASCAL
► JAVA
► FORTRAN
Question No: 3 ( Marks: 1 ) - Please choose one
__________ is the example of Shrink-wrapped software

► PIA information system


► WinZip trial pack
► Linux
► MS Word
Question No: 4 ( Marks: 1 ) - Please choose one
___________ refers to the firmware code which is run by an IBM compatible PC when
first powered on.
► DOS
► BIOS
► Utility Program
► None of these

Question No: 5 ( Marks: 1 ) - Please choose one


RTOS stands for____________________

► Real Task Operating System


► Random Time Operating System
► Rational Time Operating System
► Real Time Operating System
Question No: 6 ( Marks: 1 ) - Please choose one
------------- is an electronic path within a Computer System along which bits are
transmitted.

► Port
► Slots
► Bus
► Modem

Question No: 7 ( Marks: 1 ) - Please choose one


A microprocessor can be made more powerful by increasing its ________

► Clock frequency
► Word length
► Clock frequency and Word length
► None of above

Question No: 8 ( Marks: 1 ) - Please choose one


Which one of these translates the program once at a time ?
► Interpreter
► Compiler
► Operating system
► Translator
Question No: 9 ( Marks: 1 ) - Please choose one
------------ is volatile memory

RAM►
ROM►
Hard► Disk
CD► ROM

Question No: 10 ( Marks: 1 ) - Please choose one


A British scientist named John A. Fleming made a vacuum tube known today as a diode.
Then the diode was known as a "valve," Is it true?

► True
► False

Question No: 11 ( Marks: 1 ) - Please choose one


<form> Tags always placed between the <BODY> and </BODY> tags of a Web page
►True
False►

Question No: 12 ( Marks: 1 ) - Please choose one


_____________ is generally measured in terms of the number of steps required to
execute an algorithm.

► Space
► Time
► Memory and time
► Bandwidth

Question No: 13 ( Marks: 1 ) - Please choose one


Programs where no user interaction found during program execution are called
__________.

Batch► programs
Event-driven► programs
Graphics► based programs
None► of the given

Question No: 14 ( Marks: 1 ) - Please choose one


For connector the following symbol is used:
Square►
Rectangle►
Diamond►
Circle►
Question No: 15 ( Marks: 1 ) - Please choose one
After starting computer, which module of operating system activates first?

►Linker
Kernel►
Loader►
Device► manager
Question No: 16 ( Marks: 1 ) - Please choose one
"Every minute dies a man, And one and a sixteenth is born" said by?

►Alfred, Lord Tennyson


►Charles Babbage
►Ada, Countess of Lovelace
►Babbage and Lord Tennyson

Question No: 17 ( Marks: 2 )


Why JavaScript is called Object-based language, why not Object-Oriented ?

JavaScript is not a true object-oriented language like C++ or Java

It is so because it lacks two key features:


– A formal inheritance mechanism
– Strong typing
Nevertheless, JavaScript shares many similarities with object-oriented
languages, and therefore is called an object-based language
Everything that JavaScript manipulates, it treats as an object – e.g. a window or a button
An object has properties – e.g. a window has size, position, status, etc.
Properties are modified with methods – e.g. a resize a window with resizeTo(150, 200)

Question No: 18 ( Marks: 2 )


Draw flow chart symbols for "process" and "off page connector" ?

Process
Off Page Connector

Question No: 19 ( Marks: 2 )


How can you open a link in a new browser window?
We can open by using these two commands:

<A Href = "URL">


document.write (title.link("URL"));

Question No: 22 ( Marks: 5 )


Which two phases of the SW lifecycle do you think are the most important and effort
consuming steps? Explain with reasons.
concept and decommissioning
Concept ka reason yeh key it gives the first idea about WHAT is required
and decommissioning ensures that WHAT is required has been
achieved

Question No: 23 ( Marks: 5 )


Write down the algorithm for converting decimal number to binary?

Q1. Computers are good at:


Select correct option:

Speed
Storage
Never bored
All of the given choices

Q2.Grace Hopper of US Navy develops the very first_______ compiler


Select correct option:

Low-level Language
High-level language
Both high and low level language
None of the given choices

2.5 Harvard Mark 1 – 1943:

Howard Aiken and Grace Hopper designed the MARK series of computers at Harvard
University. The MARK series of computers began with the Mark I in 1944. Imagine a
giant roomful of noisy, clicking metal parts, 55 feet long and 8 feet high. The 5-ton
device contained almost 760,000 separate pieces. Used by the US Navy for gunnery
andballistic calculations, the Mark I was in operation until 1959. The computer,
controlled by pre-punched paper tape, could carry out addition, subtraction,
multiplication, division and reference to previous results. It had special

subroutines for logarithms and trigonometric functions and used 23 decimal place
numbers. Data was stored andcounted mechanically using 3000 decimal storage wheels,
1400 rotary dial switches, and 500 miles of wire. Its electromagnetic relays classified the
machine as a relay computer. All output was displayed on an electric typewriter. By
today's standards, the Mark I was slow, requiring 3-5 seconds for a multiplication
operation

(p14
Q3.The first Web browser with a GUI was generally available in:
Select correct option:

1992
1993
1994
1995

The first Web browser with a graphical user interface was generally available (Mosaic, in
1993), the term seemed to apply to Web content, too. Technically, a Web browser is a
client program that uses the Hypertext Transfer Protocol (HTTP) to make requests of
Web servers throughout the Internet on behalf of the browser user.(18
Q4. If a computer could pass the Turing test then it would be able to:
Select correct option:

win a million dollar prize


think like human begins

think but slower than humans


do the things faster

2.2 The “Turing test”

A test proposed to determine if a computer has the ability to think. In 1950, Alan Turing
(Turing, 1950) proposed a method for determining if machines can think. This method is
known as The Turing Test. (13

Q5.The name of programming language, specifically designed by the US Department of


Defense for developing military applications, was:
Select correct option:

Smalltalk
C
C++
Ada

Ada: A programming language specifically designed by the US Dept of Defense for


developing military applications was named Ada to honor her contributions towards
computing(p9

Q6.TCP Stands for:


Select correct option:
Transmission Control Principles
Transmission Control Protocol
Transformation Control Protocol
Translation Control Protocol

Communications on the Internet is controlled by a set of two protocols: TCP and IP


TCP/IP Transmission Control Protocol/Internet Protocol Networking protocol used by all
computers and networks on the Internet Originally developed by the US DoD for Unix,
but now available for most other OSes TCP breaks down the message to be sent over the
Internet into packets IP routes these packets through the Internet to get them to their
destination When the packets reach the destination computer, TCP reassembles them into
the original message (p196

Q7.Web is a unique invention by humans in terms that it is:


Select correct option:

accessible to all humans


accessible to only the owners who control it
accessible to particular locations only
None of the given choices

Q8.The name of first commercially available PC was:


Select correct option:

UNIVAC 1
ENIAC
EDVAC
Altair 8800

2.9 UNIVAC 1 – 1951

UNIVAC-1. The first commercially successful electronic computer, UNIVAC I, was also
the first general purpose computer - designed to handle both numeric and textual
information. It was designed by J. Presper Eckert and John Mauchly. The implementation
of this machine marked the real beginning of the computer era.(P14

Q9. A strategy in which all possible combinations are examined and best one is selected
called……………
Select correct option:
Divide and conquer
Brute force
Heuristic
All of given
16.12 The Brute Force Strategy (1)

A strategy in which all possible combinations are examined and the best among them is
Selected (p103
Q10.Super Computers are used in:
Select correct option:

Weather forecasting
Aeroplane manufacturing
Atomic Bomb experiments
All of the given choices
<!--[if !supportLineBreakNewLine]-->
<!--[endif]-->

Q11.ENIAC was first____ Computer


Select correct option:

Large-scale
General-purpose
Electronic
All of the given choices

2.6 ENIAC – 1946:


ENIAC I (Electrical Numerical Integrator And Calculator). The U.S. military sponsored
their research; they needed a calculating device for writing artillery-firing tables (the
settings used for different weapons under varied conditions for target accuracy).(p14)

Q12.Which one of the following units can be called as the brain of computer
microprocessor?
Select correct option:
ALU (Arithmetic & Logic Unit)
FPU (Floating Point Unit)
Control Unit
Bus Interface Unit

A control unit is the part of a CPU or other device that directs its operation. The outputs
of the unit control the activity of the rest of the device. A control unit can be thought of as
a finite state machine. It is called the brain of computer microprcessor. (p36

Q13.Which one of the following is a really fast port that lets you connect computer
peripherals and consumer electronics to your computer without the need to restart?
Select correct option:
Freeware
Shareware
Fire wire
Firmware

FireWire is simply a really fast port that lets you connect computer peripherals and
consumer electronics to your computer without the need to restart. It is a simple common
plug-in serial connector on the back of your computer. It has the ability to chain devices
together in a number of different ways without terminators for example, simply join 2
computers with a FireWire cable for instant high-speed networking.(P24 )

Q14.The name of programming language, specifically designed by the US Department of


Defense for developing military applications, was:
Select correct option:
Smalltalk
C
C++
Ada

Ada: A programming language specifically designed by the US Dept of Defense for


developing military applications was named Ada to honor her contributions towards
computing(p9

Q15 Which one of these is NOT an example of storage devices?


Select correct option:
CD
Floppy
Hard Disk
Q16 Which category of computers lies between Workstation and Mainframe computers?
Select correct option:
Microcomputer
Desktop
Laptop
Minicomputer

4.4 Servers / Minicomputers A midsized computer. In size and power, minicomputers lie
between workstations and mainframes. In the past decade, the distinction between large
minicomputers and small mainframes has blurred, however, as has the distinction
between small minicomputers and workstations. But in general, a minicomputer is a
multiprocessing system capable of supporting from 4 to about 200 users simultaneously.
(21

Q17 Algorithm is a precise sequence of a limited number of _________ ,


___________steps that terminates in the form of a solution
Select correct option:
Ambiguous, Executable
Nondeterministic, Finite
Finite, countable
Unambiguous, executable

Ref

1st Definition:
Sequence of steps that is taken to solve a problem
Better Definition:
A precise sequence of a limited number of unambiguous, executable
steps that terminates in the form of a solution

Q18 Which one of the following web programming languages used to do client-side
scripting?
Select correct option:
ASP
Server Side JavaScript
PHP
VBScript

We’ll use JavaScript to do client-side scripting. However, there are many other
languages p119

Q19 This principle called the “Ockham’s Razor,” states when choosing among
competing, successful solutions to a problem; choose the one which is the least ________
Select correct option:
Time Consuming
Ambiguous
Complex

Selecting Among Algorithms

When choosing among competing, successful solutions to a problem, choose the one
which is the least

complex This principle is called the “Ockham’s Razor,” after William of Ockham -
famous 13-th century English philosopher(101

Q20 _________ software sits on top of ________ software for performing user tasks.
Select correct option:
System, Application
System, Productivity
Application, System
System, Programming

Q21 Deep Blue was the name of:


Select correct option:
Human
Computer
City
None of the given choices

In 1997 Deep Blue, a supercomputer designed by IBM, beat Gary Kasparov, the World
Chess Champion That computer was exceptionally fast, did not get tired or bored. It just
kept on analyzing the situation and kept on searching until it found the perfect move from
its list of possible moves (P9)

Q22 Linux and Mac are examples of :


Select correct option:
Uni processor OS
Multi processor OS

Q23 Given the HTML code, <A HREF="mailto: [email protected] ">


[email protected] </A> My email. Read the code carefully and tell what out put
browser will generate?
Select correct option:
[email protected]
[email protected]
My email [email protected]
None of the given choices

ref: right answer will be

[email protected] My email.
paste following code in any html file and view in browser

<html>

<body>

<A HREF="mailto: [email protected] "> [email protected] </A> My email.

</body>

</html>

Q24 There is a battery on the mother board to:


Select correct option:
give power to the processor
Save information when computer is OFF
Help the boot process
Save information when computer is ON

ROM

ROM is "built-in" computer memory containing data that normally can only be
read, not

written to. ROM contains the programming that allows your computer to be
"booted

up" or regenerated each time you turn it on. Unlike a computer's random access
memory

(RAM), the data in ROM is not lost when the computer power is turned off.

The ROM is sustained by a small long-life battery in your computer.

Q25 Alan Turing of Cambridge University presented his idea of a theoretically simplified
but fully capable computer, now known as:
Select correct option:
<!--[if !supportLineBreakNewLine]-->
<!--[endif]-->

Analytical Engine
Turing Machine
Difference Engine
None of the given choices
Q26 _ is the example of a Web browser
Select correct option:

Yahoo
Netscape Navigator
Web Application
Google

Q27 The Analytical Engine was machine of which type?


Select correct option:

Programmable
Mechanical
Digital
All of the given choices

1.2. The Analytical Engine A programmable, mechanical, digital machine Could carryout
any calculation Could make decisions based upon the results of the previous calculation
Components: input; memory; processor; output(p 9)

Q28 Interactive Forms are always placed between:


Select correct option:

Body tags of a Web page


Head tags of a Webpage

Q29 Which interface on computer supports transmission of multiple bits at the same
time?
Select correct option:

Serial Port
Parallel Port
PS/2 Port
Universal Serial Bus

Parallel

An interface on a computer that supports transmission of multiple bits at the same time;
almost exclusively used for connecting a printer. On IBM or compatible computers, the
parallel port uses a 25-pin connector.p24
Q30 If we want to show numbers with List Items, then we use
Select correct option:

<UL>
<OL>
<DL>
none of the given

Q31 Trialware Softwares are used for


Select correct option:

short period
long period
life time
none of the given
Software that can be run for a limited period of time before it is purchased.
Trialware has a built-in expiration date and will cease to operate beyond that date
if it has not been paid for. Also called "demoware.(

Q32 Babbage’s Analytical Engine could store information permanently in:


Select correct option:

Magnetic Tape
Floppy Disk
Punched Cards
None of the given choices

Q33 First computer that could not only manipulate numbers but also text data as well
was:
Select correct option:

ENIAC
EDVAC
UNIVAC 1
Attanasoff-Berry Computer

ENIAC I (Electrical Numerical Integrator And Calculator). The U.S. military sponsored
their research; they needed a calculating device for writing artillery-firing tables (the
settings used for different weapons under varied conditions for target accuracy). John
Mauchly was the chief consultant and J Presper Eckert was the chief engineer.

Eckert was a graduate student studying at the Moore School when he met John Mauchly
in 1943. It took the team about one year to design the ENIAC and 18 months and 500,000
tax dollars to build it. The ENIAC contained 17,468 vacuum tubes, along with 70,000
resistors and 10,000 Capacitors.
Q34 Greedy algorithms are usually faster, since they don't consider the details of possible
alternatives
Select correct option:

True
False

KEY ADVANTAGE: Greedy algorithms are usually faster, since they don't consider the
details of possible alternatives (P102

Q35 SCSI stands for:


Select correct option:

Small Computer System Interface


System Common Small Integration
Silicon Computer System Interface
None of the given choices
SCSI

A port that's faster than the serial and parallel ports but slower and harder to configure
than the newer USB port. Also know as the Small Computer System Interface.(24

Q36 Greedy algorithm does not support……………….. Situation.


Select correct option:

Local
Global
Complex
All of given

Q37 Which of the followings is not a Flowchart Element?


Select correct option:

Off- frame connector


Input or output
Process
Connector
flowchart elements

Start or stop

Process

Input or output

Connector
Decision

Flow line

Off-page connector

these are all the elements of flow chart so?

Q38 During one of the international cricket tournaments, one of the teams intentionally
lost a match, so that they could qualify for the next round If they had won that particular
match, some other team would have qualified This is an example of a
_________________
Greedy algorithm
Non-greedy algorithm

Q39 Teraflop stands for:


Select correct option:

Thousand floating point operations per second


Thousand floating point operations per hour
Trillion floating point operations per second
Trillion floating point operations per hour
A____________________ is the process of analyzing large databases to identify patterns

Data Mining

Data Normalization

Data Redundancy

Data Manipulation

onFocus executes the specified JavaScript code when ___________

a window receives focus

a form element receives input focus

a window receives focus or when a form element receives input focus

None of the Given.

CERN releases WWW in:

1992

1993

1994

None of the given choices

Communications on the internet is controlled by a set of two protocols, named :


HTTP & SMTP

FTP & TELNET

TCP & IP

None of the given choices

One of the disadvantages of working at home is________________

Family life may be happier because of living at home.

Family life may suffer as well, as some never turn off, and keep on working through out the
day, evening and night

Family life may become happier because he can give more time to his family.

There is no disadvantage of working at home.

The greatest, shared resource of information created by humankind is:

Web

Dictionary

Vocabulary

Glossary

There are _____________ types communication channels.

The Cyberwarefare is a ______

Crime

War

Software

Game

In the statement “PopUp(“Message”)” :

“PopUp” is the function Name, “Message” is the argument

“Message” is function identifier

Syntax Error: functions cannot be called in this way

Error: function is undefined

RGB scheme stands for _________________________________.


Red Grey Blue

Red Green Brown

Red Green Blue

Red Green Black

_____________ is the part of the virus that generally consists of malicious computer instructions

Off load

Payload

Loader

Transmitter

Unlike viruses, __________________ are stand-alone programs

Trojan horses

Logic- or time-bombs

Worms

None of the given

Voice over IP has _____ modes

We use __________ to stop Break-Ins.

Scanners

Intrusion detectors

Firewalls

Intrusion detectors and Firewalls

Which one can lead user to leave your website?

Simple design

Poor navigation

Information layout

Adaptable design

_____________________ are the subcategories of AI


Expert Systems

Robotics

Natural Language Processing

All of the above

With the Help of FTP we can:

List, change, create folders on a remote computer

Upload and download files

Transferring Web content from the developer’s PC to the Web server

All of the given choices

Which protocol is used for receiving E-mail messages?

FTP

POP

Telnet Protocol

SMTP

The organizations are learning that business can be done in a more effective manner if emphasis is
placed upon ______________.

Cooperation

Shared responsibility

Networking

All of the given

___ is used to transfer files between computers on a TCP/IP network

FTP

POP

Telnet Protocol

SMTP

Which of the following is True about “pareseFloat(String)” function: I) If the first character cannot be
converted to a number, parseFloat returns NaN. II) it returns the fractional portion of floating point
number. III) Parses the string argument; returns a FP number. IV) Non of given options.

I and II Only

II and III Only

I and III Only

IV Only
Event-driven programs can ____________________ events.

capture

respond

capture and respond

None of the Given.

Which of the statements is NOT true about “Color Usage Guidelines” for developing a presentation?

Use color sparingly to to highlight a point, but don't get carried away

Do not use colors like yellow or red for background except where needed.

Do not use colors like green, blue and such like colors except where needed.

None of given options

_________________ Type of databases management systems are supporting Terabytes of Data

Personal

Desktop

Enterprise

Single-user

Because of the ever-decreasing costs of verbal, text, video communications; the distances have
_________

Increased

Expanded

Contracted

Lengthened

The structure of the networked organization is _________.

Simple

Flexible

Complex

All of the given

A CAD drawing consist of many geometric shapes like straight lines , arc , tc and therefore is stored
in a ___________ format.

Scalar

Vector

Both a & b
____ is a type of computer-to-computer messaging.

TCP

Telnet

E-mail

FTP

None of these

RDBMS stands for ________________________________

Relative Data Base Management System

Relational Data Base Management System

Recursive Data Base Management System

Responsible Data Base Management System

Using Color Mapping scheme only a limited number of color called _____________ are allowed.

Reserved

Pointers

Platelet

None of these

Using _________ topology, adding new nodes is difficult.

Ring

Bus

Star

None of the given choices

Problems with old presentation methods was (transparencies and projectors etc):

They were costly

Electronic transmission, in some cases, was not easy

Presentation some times gets ambiguous

All of given options

ARPANET splits into two nets to keep military & non-military network sites separate, named :
ARPANET & MILNET

MICRONET & MILNET

PICONET & ARPANET

None of the given choices

Arguments values are passed to the function _________

by value

by reference

Both a & b

Non of the Given.

__________________ is a field that uniquely identifies each record stored in a table.

Primary Key

Foreign Key

Secondary key

Special Key

The IP address consists of _____ bits

64

32

16

128

Credit Card Fraud can be minimized by using _________________

single credit card numbers

multiple-use credit card numbers

single-use credit card numbers

Firewalls

hotWeather = (Temperature == 40); in the above statement, the variable hotWeather is of type
Number

String

Boolean

None of the given

NCSA stands for :

NationalCenter for Supercomputing Applications

NationalCenter for Supreme Applications

NationalCenter for Super Authority

None of the given choices

Self-replicating SW that eludes detection and is designed to attach itself to other files is called
_____________.

Trojans

Viruses

Sniffers

Operating System

SVG stands for _________________________________________.

Structured Vector Graphics

Software Vector Graphics

Structured Visual Graphics

None of these

Viruses move from one computer to another with the __________ and spring into action when the
_____________ is executed or opened

Host – Host

Host – Client

Client – Host

Client – Client

____________________ is a layered structure consisting of a number of homogenous and simple


processing elements.
Genetic Algorithms

Rule-based Systems

Feed-Forward Network

None of these

A property that gives the value of Pi is:

PI()

Graph.PI

Math.PI

Math.PI()

The smallest image forming element on a computer display is called ____________.

Resolution

Pixel

Grey area

None of these

SMTP stands for _______________________________________.

Simple Mail Transfer Protocol

Simple Mail Transparent Protocol

Simple Mail Transfer Paradigm

None of these

________________ network allows data to be sent directly from one computer to another.

Ring

Bus

Star

None of the given choices

Viruses attach themselves to other computer programs or data files, are known as____
Trojans

Guests

Hosts

Spies

Avoid __________ to ensure readability of web page

Overuse of bold and italics

Use of paragraphs

Use of white space

Use of contrast colors

STP stands for :

Shielded Twisted Pair

Silver Twisted Pair

Single Twisted Pair

None of the given choices

In ______, the spies of one business monitors the network traffic of their competitors.

Industrial intelligence

Industrial Espionage

Industrial spying

Industrial surveillance

Color mapping scheme reducing the size of 2.25 MB graphic to _________ MB.

0.90 MB

0.75 MB

1.00 MB

None of these

The functions which call themselves from their (own) body are called:

Virtual functions

Abstract functions

Overriding functions
Recursive functions

Browser sends ‘_________’ request to web server to access a file.

SET

GET

TRANSFER

All of the given choices

The internet communities are ___________.

Geographical based

Interest based

Country based

Religion based

Infection propagation and Actual destructive are the components of _______________

Transmission mechanism

Payload

Worms

Trojan Horse

An algorithm that always takes the best immediate or local solution while finding an answer
is called____.

► Deterministic Algorithm
► Non deterministic Algorithm
► Greedy Algorithm
► Randomized Algorithm
Which of the following command allows you to recover form mistakes in MS Word?

► Clear

► Edit

► Undo
► Break

A ____________ operating system allows many users to take advantage of the


computer's resources, simultaneously

► Single user
► Multi- user
► Single tasking
► Multi tasking

Network Interface Card is an __________ device


► Input
► Output
► Input/Output
► Storage

The decimal equivalent of binary 1000 is


► 7
► 8
► 9
► 10
Which of the following is NOT RDBMS software?

► My Sql
► MS Excel
► Oracle
► SQL Server
A computer virus is a
► Software that saves the computer from being damaged.
► Application software that helps to make different type of viruses and worms
► Program that spreads itself and destroys other program
► Program that corrects the problems in your computer

What will be the result of a?


a = Math.abs(-23)
► 23
► -23
► 23.0
► 2.3

A Special program required to view swf (Shockwave Flash) files in web Browser is called

► TFlash
► Vflash
► plug-in
► None of the given options

Using Java Script you can write a character at random location on screen

► By applying randomCh() method


► With the help of String object
► With the help of random character property
► There is no built in approach in Java Script

If incorrectly we enter the negative age it is check by

► Limit Integrity
► Type Integrity
► Referential Integrity
► Physical Integrity

Which protocol is use to transfer a file over the network?

► UDP
► FTP
► TCP
► OSI
One can send an email message to a remote computer using _______ protocol

► HTTP
► SMTP
► FTP
► TELNET

In a System having many parts to be designed, one should always do the _____ first

► Hard part
► Simple part
► Development part
► Quality part

Flow control constructs in JavaScript includes:

► If-Else
► Loops and If -Else
► Switch and If-Else
► All of the given choices

___ provides a simple, consistent way for applications to interact with the HW without having to
know all the details of the HW

► Explorer.exe
► System Files
► Operating System
► Application Software

Machine language is also called

► Assembly Language
► Binary Language
► High Level Language
► HTML Language

_________ is the best known builder for supercomputers.

► Sun
► Cray Research
► Microsoft
► Apple

The weaknesses of the computer are:

► Pattern recognition & Storage


► Speed & Innovative ideas
► Pattern recognition & Innovative ideas
► Speed & Storage

Communication protocol is a __________that governs the flow of information over a network

► Set of methods
► Set of protocols
► Set of rules
► Device

_____________ team is responsible for the maintenance, expansion , improvement of the


infrastructure consisting of workstations, networking equipment, software and network security.
► Support
► Configuration Management
► Quality Assurance
► Developer
_____________ team consists on the sharpest technical minds in the company.

► Architecture
► Business Development
► Configuration Management
► Developer

_______________ is responsible for day to day operations.

► CEO
► COO
► CMSO
► Developer

One of the key responsibilities of the ___________ is client relationship management.

► Project Manager
► Team Lead
► Developer
► Quality Assurance Engineer

What is the major problem with flash based website?

► Its two heavy


► Cannot be indexed
► Less attractive
► Inaccessible

Which of the following is NOT an event handler for image object?

► onAbort
► onError
► onLoad
► onUser

The organizations are learning that business can be done in a more effective manner if emphasis is
placed upon ___________.

► Cooperation
► Shared responsibility
► Networking
► All of the given options

a = Math.abs(-23)

What will be the value of a ?

► 23
► -23
► 23.0
► 2.3
ERP is a type of __________________ .

► Entertainment software
► Productivity software
► Business software
► Scientific software

In Genetic Algorithm the most important thing you should know, is the ___________.

► Procedure
► Recognition of a good solution
► Different techniques
► None of the given options

According to a popular heuristic, success is defined by ___________.

► The user
► The builder
► Both user and builder
► None of the given options

Rule of thumb learned through trial and error is called ___________.

► Design
► Heuristic
► Plan
► Aim

JavaScript Variables are ____________.

► Dynamically Typed
► Statically Typed
► Strong Typed
► None of the given options

Which of the following application are collections of cells?

► Word
► Excel
► PowerPoint
► Outlook Express
The browser breaks down the URL into ________ parts.

►2
►3
►4
►5

A named collection of properties (data, state) and methods (instruction, behavior) is called
____________.

► Array
► Function
► Variable
► Object

First computer network was ___________.


► NSFNET
► FIRSTNET
► ARPANET
► ORPHANET

In JavaScript, a variable declaration is

► Optional
► Mandatory
► Not allowed
► None of the given

A protocol used for receiving email messages is called ____________.

► URL
► Telnet
► POP3
► SMTP

which one is correct?

► onUnload
► onUnLoad
► onUNLOAD
► All of the above

Serial arrangement in which things follow logical order or a recurrent pattern, such as statements
executing one by one, is called __________.

► Loop
► Sequence
► Condition
► Array

Variables allow us to manipulate data through the ___________.

► Actual Value
► Reference
► Length
► Name

Fuzzy logic is based on ____________.

► Ground facts
► Experience
► Practice
► Approximation
Word Processor is a _________________

► System Software
► Application Software
► Device
► Utility

In the old days, databases did NOT support ____________.


► Number
► Boolean
► Video
► Text

In tabular storage, fields placed in a particular row are strongly ___________.


► Independent
► Dependent
► Interrelated
► Inconsistent

Due to working at home, lack of interaction may result in ___________ professional growth.

► Slower
► Faster
► Higher
► Improved

Distance learning has got a boost due to the ___________.


► Easy communication
► Online interactive contents
► Flexibility
► All of the given options

_____________ technique can be used to create smooth animations or to display one of several
images based on the requirement.

► Image downloading
► Image preloading
► Image uploading
► Image postloading

The ____________ is becoming the preferred organizational structure for more and more
organizations with the passage of time.

► Tree structured organizational model


► Network paradigm
► Hierarchical structure
► None of the given options

The group of technologies concerned with the capturing, processing and transmission of
information in the digital electronic form is called
_____________.

► Telecom Engineering
► Computer Engineering
► Computer Science
► Information Technology

A large number of networks interconnected physically is called ______

► LAN
► MAN
► Internet
► Network collection

TCP stands for ________.

► Transfer Center protocol


► Transmission Control Protocol
► Transmission Center Protocol
► Telephone Center Protocol

A collection of data organized in such a way that the computer can quickly search for a desired data
item is known as :
► Retrieving
► Database
► Information
► DBMS

______ is simply a fast port that lets you connect computer peripherals and consumer electronics to
your computer without restart.

► Freeware
► Shareware
► Firewire
► Firmware

Structures, in which another list starts before the first list is finished, are called:

► Multiple Lists
► Nested Lists
► Ordered Lists
► Un-ordered Lists
The key property of the ‘Array’ object in JavaScript is

► Value
► Length
► Name
► All of the given choices

Which one is the example of spreadsheet software ?

► MS Word
► MS PowerPoint
► MS Excel
► MS Access

The Encryption of data is related to

► Data updates
► Data security
► Data integrity
► Data accessibility

_____ is the process of analyzing large databases to identify patterns.

► Data normalization
► Data management
► Data Mining
► None of the given options

Which is the user-friendly way of presenting data ?

► Query
► Form
► Report
► All of the given options

<form> Tags always placed between the <BODY> and </BODY> tags of a Web page
► True
► False

Java script has ----------------- ability to create and draw graphics.


► Limited
► Versatile
► Medium
► Not at all

Which of the following is incorrect for making design elements legible?


Select correct option:

Elements should be large enough


Elements must contrast sufficiently
Related elements should be visually grouped
Elements should have no visual focus

Function is also known as ______________.


Select correct option:
subprogram
procedure
subroutine
All of given

In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET.
Select correct option:
1973
1983
1972
None of the given choices

E-mail system has ______ component(s)


Select correct option:
E-mail client
SMTP server
POP3 server
All of the given choices
_______ / / /______/ A Parallelogram (Tilted rectangle) represents the ________________ flow chart
element.
Select correct option:
Process
Input or Output
Decision
Connector

If a computer could pass the Turing test then it would be able to:
Select correct option:
win a million dollar prize
think like human begins
think but slower than humans
do the things faster

Punched cards were replaced by:


Select correct option:
Floppy Disk
Zip Drives
Magnetic storage
None of the given choices

The ________virus may display an annoying, but harmless message


Select correct option:
Malicious
Neutral
Helpful
DoS

The name of very first computer was:


Select correct option:
ABC
BCD
EDC
None of the given choices
The internet communities are ___________.
Select correct option:
Geographical based
Interest based
Country based
Religion based
which one is correct?

► onUnload
► onUnLoad
► onUNLOAD
► All of the above

Serial arrangement in which things follow logical order or a recurrent pattern, such as statements
executing one by one, is called __________.

► Loop
► Sequence
► Condition
► Array

Variables allow us to manipulate data through the ___________.

► Actual Value
► Reference
► Length
► Name

Fuzzy logic is based on ____________.

► Ground facts
► Experience
► Practice
► Approximation

Word Processor is a _________________

► System Software
► Application Software
► Device
► Utility

In the old days, databases did NOT support ____________.


► Number
► Boolean
► Video
► Text

In tabular storage, fields placed in a particular row are strongly ___________.


► Independent
► Dependent
► Interrelated
► Inconsistent

Due to working at home, lack of interaction may result in ___________ professional growth.
► Slower
► Faster
► Higher
► Improved

Distance learning has got a boost due to the ___________.


► Easy communication
► Online interactive contents
► Flexibility
► All of the given options

_____________ technique can be used to create smooth animations or to display one of several
images based on the requirement.
► Image downloading
► Image preloading
► Image uploading
► Image postloading

The ____________ is becoming the preferred organizational structure for more and more
organizations with the passage of time.

► Tree structured organizational model


► Network paradigm
► Hierarchical structure
► None of the given options

The group of technologies concerned with the capturing, processing and transmission of
information in the digital electronic form is called
_____________.

► Telecom Engineering
► Computer Engineering
► Computer Science
► Information Technology

A large number of networks interconnected physically is called ______

► LAN
► MAN
► Internet
► Network collection

TCP stands for ________.


► Transfer Center protocol
► Transmission Control Protocol
► Transmission Center Protocol
► Telephone Center Protocol

A collection of data organized in such a way that the computer can quickly search for a desired data
item is known as :
► Retrieving
► Database
► Information
► DBMS
______ is simply a fast port that lets you connect computer peripherals and consumer electronics to
your computer without restart.
► Freeware
► Shareware
► Firewire
► Firmware

Structures, in which another list starts before the first list is finished, are called:
► Multiple Lists
► Nested Lists
► Ordered Lists
► Un-ordered Lists

The key property of the ‘Array’ object in JavaScript is


► Value
► Length
► Name
► All of the given choices

Which one is the example of spreadsheet software ?

► MS Word
► MS PowerPoint
► MS Excel
► MS Access

_____ is the process of analyzing large databases to identify patterns.

► Data normalization
► Data management
► Data Mining
► None of the given options

Which is the user-friendly way of presenting data ?


► Query
► Form
► Report
► All of the given options

JavaScript function fixed() has equivalent HTML tag-set ____


► <.FIX>……………</FIX>
► <F>………………..</F>
► <PRE>………….</PRE>
► <H>………………..</H>

<form> Tags always placed between the <BODY> and </BODY> tags of a Web page

► True
► False

Java script has ----------------- ability to create and draw graphics.

► Limited
► Versatile
► Medium
► Not at all

Internet is an example of ______________ network.


Private
Public
Both Private and Public
None of the given choices
The name of first commercially available PC was:
UNIVAC 1
ENIAC
EDVAC
Altair 8800

Algorithm is a ____________________
Definition of a problem
Sequence of steps to solve a problem
Understanding of a problem
Solving a problem
A group of information is called __________________
File
Database
Record
Field
___________________ is a branch of computer science concerned with manipulating and enhancing
computer graphics.
Image Handling
Image Processing
Image Engineering
None of these

__________has changed our way of life like no other technology.


Computational technology
Computer technology
Computing technology
None of the Above

Sophisticated event handling is not possible with _______________ event handling


Off-Line
In-Line
Out-Line
Non of the given choices

Babbage’s Analytical Engine could store information permanently in:


Magnetic Tape
Floppy Disk
Punched Cards
None of the given choices

There are __________ popular schemes to reduce the number of bytes that are required for storing
graphics.
4
3
2
None of these

The internet-society is considered under Surveillance because:


While surfing, we are being watched, constantly
Our every click is recorded and analyzed to extract patterns and behaviors
Webcams are becoming common. Providing a cheap way for parents to watch their children's every move
All of the given

URL is a/an ________

► Device
► Component
► Address
► Tool

To improve the time for scanning a web page, text should be ___________.

► Centered
► Left Aligned
► Right Aligned
► Staggered

Communications on the internet is controlled by a set of two protocols which are ____________.

► IMAP and SMTP


► FTP and HTTP
► TCP and IP
► TCP and HTTP
FTP stands for __________.

► File transmission protocol


► File transmission path
► File transfer protocol
► Fine transfer path

A named collection of properties (data, state) and methods (instruction, behavior) is called
____________.
► Array
► Function
► Variable
► Object
Anchor tag denoted by <A> is used to create

► Address
► Hyperlink
► Paragraph
► Title

<UL> tag is used to

► underline text
► end the line
► create ordered list
► create unordered list
A user may access any item on the web through __________.

► URL
► Telnet
► POP
► SMTP
The browser breaks down the URL into ________ parts.

►2
►3
►4
►5

Which one of the following is NOT a primary color?


► Red
► Green
► Yellow
► Blue

According to a popular heuristic, success is defined by ___________.

► The user
► The builder
► Both user and builder
► None of the given options

The idea of Neural Networks field is based upon ______________.

► Human nature
► Human brain
► Human culture
► Human actions
ERP is a type of __________________ .

► Entertainment software
► Productivity software
► Business software
► Scientific software

__________ are those programs in which the flow of the program is determined by the user's actions
(mouse clicks, key presses) or messages from other programs.

► Event called programs


► Event processed programs
► Event driven programs
► Event declared programs

Automatic machines performing various tasks that were previously done by humans, are called
____________.

► Robotics
► Computers
► Decision Making Systems
► Autonomous Web Agents
country=”Hello Pakistan”;

document.write(country.charAt(6));

The out put of the above statement is _____________.


►o
►P
►a
►k

The distance among families is ___________ because of spending more time on internet.
► Increased
► Expanded
► Contracted
► Decreased

The software used for the scanning of internet severs, is called __________.
► Wscan
► Mscan
► Sscan
► Vscan
Adding images to html page, we use___________ tag.
► <IMG>
► <IMAGE>
► <PICTURE>
► <PIC>

The group of technologies concerned with the capturing, processing and transmission of
information in the digital electronic form is called _____________.
► Telecom Engineering
► Computer Engineering
► Computer Science
► Information Technology

The responsibilities of the Team Lead includes_____________.


► Planning and tracking of the project
► Detailed design
► Professional development of team members
► All of the given options
When the packets reach at destination, __________ reassembles them into original message.
► Protocol
► TCP
► IP
► NIC
Many developers write the _________ first and then incrementally convert each line into _________.
► Real code & Pseudo code
► Pseudo code & Real code
► Real code & Artificial code
► None of the given options
Machine language is also called
► Assembly Language
► Binary Language
► High Level Language
► HTML Language

In JavaScript, second element of an array has the index:


►2
►0
►1
►3

Each element in an array is given an index, which is an integer value between 0 and one less than the
length of the array. The first element has an index of 0, the second element has an index of 1, and so on.

One can download or upload files to a remote computer using ________ protocol.

► HTTP
► SMTP
► FTP
► TELNET

JavaScript ________ support drawing of graphics


► Does
► Does not
► Always
► At times

Which of the following is NOT true about modern computers?


► More powerful
► Smaller in size
► Consume less energy
► Costly

Ada written a computer programme for ?


► Analytical Engine
► Difference Engine
► Harvard Mark 1
► Mechanical engine

A set of stand alone productivity applications designed to work together known as ______________ .

► Productivity software suites


► Compiled software
► Secure software
► Intelligent software

Because of spending more time on the internet, the distances among the families have been _____.
Increased
Expanded
Contracted
Shortened

Sophisticated event handling is not possible with _______________ event handling


Off-Line
In-Line
Out-Line
Non of the given choices
Autonomous Web Agents are also known as _________________
Mobile Agents
Softbots
Both "Mobile Agents" & "Softbots"
None of these
A communication protocol is a __________that governs the flow of information over a network.

Set of Methods
Set of Protocols
Set of rules
None of the given choices
By default in a web page Hyper Link for another web page is represented as:
Blue only
Black and Underlined
Blue and Bold
Blue and Underlined
The organizations are learning that business can be done in a more effective manner if emphasis is
placed upon ______________.
Cooperation
Shared responsibility
Networking
All of the given
Monitor is an example of __________devices
Output
Input
Processing
None of the given choices
The code in the ________ portion is the right choice for developing larger JavaScript scripts
Body
At End
Head
Separate
____________________ based on the principles of the logical reasoning ability of humans.
Genetic Algorithms
Rule-based Systems
Feed-Forward Network
None of these
The key benefit of VPNs over conventional PNs is:
Security
Efficiency
Lower Cost
None of the given choices
An algorithm that always takes the best immediate or local solution while finding an answer
is called____.
► Deterministic Algorithm
► Non deterministic Algorithm
► Greedy Algorithm
► Randomized Algorithm
Which of the following command allows you to recover form mistakes in MS Word?
► Clear

► Edit

► Undo
► Break

A ____________ operating system allows many users to take advantage of the


computer's resources, simultaneously
► Single user
► Multi- user
► Single tasking
► Multi tasking
Network Interface Card is an __________ device
► Input
► Output
► Input/Output
► Storage

The decimal equivalent of binary 1000 is


► 7
► 8
► 9
► 10
Which of the following is NOT RDBMS software?
► My Sql
► MS Excel
► Oracle
► SQL Server
A computer virus is a
► Software that saves the computer from being damaged.
► Application software that helps to make different type of viruses and worms
► Program that spreads itself and destroys other program
► Program that corrects the problems in your computer
What will be the result of a?
a = Math.abs(-23)
► 23
► -23
► 23.0
► 2.3
A Special program required to view swf (Shockwave Flash) files in web Browser is called
► TFlash
► Vflash
► plug-in
► None of the given options

Using Java Script you can write a character at random location on screen

► By applying randomCh() method


► With the help of String object
► With the help of random character property
► There is no built in approach in Java Script

If incorrectly we enter the negative age it is check by

► Limit Integrity
► Type Integrity
► Referential Integrity
► Physical Integrity

Which protocol is use to transfer a file over the network?

► UDP
► FTP
► TCP
► OSI

One can send an email message to a remote computer using _______ protocol

► HTTP
► SMTP
► FTP
► TELNET
In a System having many parts to be designed, one should always do the _____ first

► Hard part
► Simple part
► Development part
► Quality part
Flow control constructs in JavaScript includes:
► If-Else
► Loops and If -Else
► Switch and If-Else
► All of the given choices
___ provides a simple, consistent way for applications to interact with the HW without having to
know all the details of the HW
► Explorer.exe
► System Files
► Operating System
► Application Software

Machine language is also called

► Assembly Language
► Binary Language
► High Level Language
► HTML Language
_________ is the best known builder for supercomputers.

► Sun
► Cray Research
► Microsoft
► Apple

The weaknesses of the computer are:


► Pattern recognition & Storage
► Speed & Innovative ideas
► Pattern recognition & Innovative ideas
► Speed & Storage

Communication protocol is a __________that governs the flow of information over a network

► Set of methods
► Set of protocols
► Set of rules
► Device

_____________ team is responsible for the maintenance, expansion , improvement of the


infrastructure consisting of workstations, networking equipment, software and network security.

► Support
► Configuration Management
► Quality Assurance
► Developer
_____________ team consists on the sharpest technical minds in the company.
► Architecture
► Business Development
► Configuration Management
► Developer

_______________ is responsible for day to day operations.


► CEO
► COO
► CMSO
► Developer
One of the key responsibilities of the ___________ is client relationship management.

► Project Manager
► Team Lead
► Developer
► Quality Assurance Engineer
What is the major problem with flash based website?

► Its two heavy


► Cannot be indexed
► Less attractive
► Inaccessible
Which of the following is NOT an event handler for image object?

► onAbort
► onError
► onLoad
► onUser

The organizations are learning that business can be done in a more effective manner if emphasis is
placed upon ___________.

► Cooperation
► Shared responsibility
► Networking
► All of the given options
a = Math.abs(-23)
What will be the value of a ?
► 23
► -23
► 23.0
► 2.3
ERP is a type of __________________ .

► Entertainment software
► Productivity software
► Business software
► Scientific software

In Genetic Algorithm the most important thing you should know, is the ___________.

► Procedure
► Recognition of a good solution
► Different techniques
► None of the given options
According to a popular heuristic, success is defined by ___________.
► The user
► The builder
► Both user and builder
► None of the given options

Rule of thumb learned through trial and error is called ___________.


► Design
► Heuristic
► Plan
► Aim

JavaScript Variables are ____________.


► Dynamically Typed
► Statically Typed
► Strong Typed
► None of the given options

Which of the following application are collections of cells?

► Word
► Excel
► PowerPoint
► Outlook Express
The browser breaks down the URL into ________ parts.

►2
►3
►4
►5

A named collection of properties (data, state) and methods (instruction, behavior) is called
____________.

► Array
► Function
► Variable
► Object

First computer network was ___________.

► NSFNET
► FIRSTNET
► ARPANET
► ORPHANET

In JavaScript, a variable declaration is

► Optional
► Mandatory
► Not allowed
► None of the given

A protocol used for receiving email messages is called ____________.

► URL
► Telnet
► POP3
► SMTP

which one is correct?


► onUnload
► onUnLoad
► onUNLOAD
► All of the above
Serial arrangement in which things follow logical order or a recurrent pattern, such as statements
executing one by one, is called __________.
► Loop
► Sequence
► Condition
► Array

Variables allow us to manipulate data through the ___________.

► Actual Value
► Reference
► Length
► Name

Fuzzy logic is based on ____________.

► Ground facts
► Experience
► Practice
► Approximation
Word Processor is a _________________

► System Software
► Application Software
► Device
► Utility

In the old days, databases did NOT support ____________.

► Number
► Boolean
► Video
► Text

In tabular storage, fields placed in a particular row are strongly ___________.

► Independent
► Dependent
► Interrelated
► Inconsistent

Due to working at home, lack of interaction may result in ___________ professional growth.
► Slower
► Faster
► Higher
► Improved

Distance learning has got a boost due to the ___________.


► Easy communication
► Online interactive contents
► Flexibility
► All of the given options

_____________ technique can be used to create smooth animations or to display one of several
images based on the requirement.

► Image downloading
► Image preloading
► Image uploading
► Image postloading

The ____________ is becoming the preferred organizational structure for more and more
organizations with the passage of time.

► Tree structured organizational model


► Network paradigm
► Hierarchical structure
► None of the given options

The group of technologies concerned with the capturing, processing and transmission of
information in the digital electronic form is called
_____________.
► Telecom Engineering
► Computer Engineering
► Computer Science
► Information Technology

A large number of networks interconnected physically is called ______

► LAN
► MAN
► Internet
► Network collection

TCP stands for ________.

► Transfer Center protocol


► Transmission Control Protocol
► Transmission Center Protocol
► Telephone Center Protocol

A collection of data organized in such a way that the computer can quickly search for a desired data
item is known as :
► Retrieving
► Database
► Information
► DBMS

______ is simply a fast port that lets you connect computer peripherals and consumer electronics to
your computer without restart.
► Freeware
► Shareware
► Firewire
► Firmware

Structures, in which another list starts before the first list is finished, are called:

► Multiple Lists
► Nested Lists
► Ordered Lists
► Un-ordered Lists
The key property of the ‘Array’ object in JavaScript is

► Value
► Length
► Name
► All of the given choices

Which one is the example of spreadsheet software ?


► MS Word
► MS PowerPoint
► MS Excel
► MS Access

The Encryption of data is related to

► Data updates
► Data security
► Data integrity
► Data accessibility

_____ is the process of analyzing large databases to identify patterns.


► Data normalization
► Data management
► Data Mining
► None of the given options

Which is the user-friendly way of presenting data ?

► Query
► Form
► Report
► All of the given options

<form> Tags always placed between the <BODY> and </BODY> tags of a Web page

► True
► False

Java script has ----------------- ability to create and draw graphics.

► Limited
► Versatile
► Medium
► Not at all

Which of the following is incorrect for making design elements legible?


Select correct option:
Elements should be large enough
Elements must contrast sufficiently
Related elements should be visually grouped
Elements should have no visual focus
Function is also known as ______________.
Select correct option:
subprogram
procedure
subroutine
All of given

In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET.
Select correct option:
1973
1983
1972
None of the given choices
E-mail system has ______ component(s)
Select correct option:
E-mail client
SMTP server
POP3 server
All of the given choices
_______ / / /______/ A Parallelogram (Tilted rectangle) represents the ________________ flow chart
element.
Select correct option:
Process
Input or Output
Decision
Connector
If a computer could pass the Turing test then it would be able to:
Select correct option:
win a million dollar prize
think like human begins
think but slower than humans
do the things faster
Punched cards were replaced by:
Select correct option:
Floppy Disk
Zip Drives
Magnetic storage
None of the given choices
The ________virus may display an annoying, but harmless message
Select correct option:
Malicious
Neutral
Helpful
DoS
The name of very first computer was:
Select correct option:
ABC
BCD
EDC
None of the given choices

The internet communities are ___________.


Select correct option:
Geographical based
Interest based
Country based
Religion based
which one is correct?
► onUnload
► onUnLoad
► onUNLOAD
► All of the above
Serial arrangement in which things follow logical order or a recurrent pattern, such as statements
executing one by one, is called __________.

► Loop
► Sequence
► Condition
► Array

Variables allow us to manipulate data through the ___________.

► Actual Value
► Reference
► Length
► Name

Fuzzy logic is based on ____________.

► Ground facts
► Experience
► Practice
► Approximation

Word Processor is a _________________

► System Software
► Application Software
► Device
► Utility

In the old days, databases did NOT support ____________.

► Number
► Boolean
► Video
► Text

In tabular storage, fields placed in a particular row are strongly ___________.

► Independent
► Dependent
► Interrelated
► Inconsistent

Due to working at home, lack of interaction may result in ___________ professional growth.

► Slower
► Faster
► Higher
► Improved

Distance learning has got a boost due to the ___________.


► Easy communication
► Online interactive contents
► Flexibility
► All of the given options

_____________ technique can be used to create smooth animations or to display one of several
images based on the requirement.
► Image downloading
► Image preloading
► Image uploading
► Image postloading

The ____________ is becoming the preferred organizational structure for more and more
organizations with the passage of time.

► Tree structured organizational model


► Network paradigm
► Hierarchical structure
► None of the given options

The group of technologies concerned with the capturing, processing and transmission of
information in the digital electronic form is called
_____________.

► Telecom Engineering
► Computer Engineering
► Computer Science
► Information Technology

A large number of networks interconnected physically is called ______

► LAN
► MAN
► Internet
► Network collection

TCP stands for ________.

► Transfer Center protocol


► Transmission Control Protocol
► Transmission Center Protocol
► Telephone Center Protocol

A collection of data organized in such a way that the computer can quickly search for a desired data
item is known as :
► Retrieving
► Database
► Information
► DBMS

______ is simply a fast port that lets you connect computer peripherals and consumer electronics to
your computer without restart.

► Freeware
► Shareware
► Firewire
► Firmware

Structures, in which another list starts before the first list is finished, are called:

► Multiple Lists
► Nested Lists
► Ordered Lists
► Un-ordered Lists

The key property of the ‘Array’ object in JavaScript is


► Value
► Length
► Name
► All of the given choices

Which one is the example of spreadsheet software ?

► MS Word
► MS PowerPoint
► MS Excel
► MS Access

_____ is the process of analyzing large databases to identify patterns.

► Data normalization
► Data management
► Data Mining
► None of the given options

Which is the user-friendly way of presenting data ?


► Query
► Form
► Report
► All of the given options

JavaScript function fixed() has equivalent HTML tag-set ____

► <.FIX>……………</FIX>
► <F>………………..</F>
► <PRE>………….</PRE>
► <H>………………..</H>

<form> Tags always placed between the <BODY> and </BODY> tags of a Web page

► True
► False

Java script has ----------------- ability to create and draw graphics.

► Limited
► Versatile
► Medium
► Not at all

Internet is an example of ______________ network.


Private
Public
Both Private and Public
None of the given choices
The name of first commercially available PC was:
UNIVAC 1
ENIAC
EDVAC
Altair 8800

Algorithm is a ____________________
Definition of a problem
Sequence of steps to solve a problem
Understanding of a problem
Solving a problem
A group of information is called __________________
File
Database
Record
Field
___________________ is a branch of computer science concerned with manipulating and enhancing
computer graphics.
Image Handling
Image Processing
Image Engineering
None of these

__________has changed our way of life like no other technology.


Computational technology
Computer technology
Computing technology
None of the Above

Sophisticated event handling is not possible with _______________ event handling


Off-Line
In-Line
Out-Line
Non of the given choices

Babbage’s Analytical Engine could store information permanently in:


Magnetic Tape
Floppy Disk
Punched Cards
None of the given choices
There are __________ popular schemes to reduce the number of bytes that are required for storing
graphics.
4
3
2
None of these

The internet-society is considered under Surveillance because:


While surfing, we are being watched, constantly
Our every click is recorded and analyzed to extract patterns and behaviors
Webcams are becoming common. Providing a cheap way for parents to watch their children's every move
All of the given
URL is a/an ________
► Device
► Component
► Address
► Tool
To improve the time for scanning a web page, text should be ___________.
► Centered
► Left Aligned
► Right Aligned
► Staggered
Communications on the internet is controlled by a set of two protocols which are ____________.
► IMAP and SMTP
► FTP and HTTP
► TCP and IP
► TCP and HTTP
FTP stands for __________.
► File transmission protocol
► File transmission path
► File transfer protocol
► Fine transfer path
A named collection of properties (data, state) and methods (instruction, behavior) is called
____________.

► Array
► Function
► Variable
► Object

Anchor tag denoted by <A> is used to create


► Address
► Hyperlink
► Paragraph
► Title
<UL> tag is used to
► underline text
► end the line
► create ordered list
► create unordered list
A user may access any item on the web through __________.
► URL
► Telnet
► POP
► SMTP
The browser breaks down the URL into ________ parts.

►2
►3
►4
►5

Which one of the following is NOT a primary color?


► Red
► Green
► Yellow
► Blue
According to a popular heuristic, success is defined by ___________.
► The user
► The builder
► Both user and builder
► None of the given options
The idea of Neural Networks field is based upon ______________.
► Human nature
► Human brain
► Human culture
► Human actions
ERP is a type of __________________ .

► Entertainment software
► Productivity software
► Business software
► Scientific software
__________ are those programs in which the flow of the program is determined by the user's actions
(mouse clicks, key presses) or messages from other programs.
► Event called programs
► Event processed programs
► Event driven programs
► Event declared programs
Automatic machines performing various tasks that were previously done by humans, are called
____________.
► Robotics
► Computers
► Decision Making Systems
► Autonomous Web Agents
country=”Hello Pakistan”;
document.write(country.charAt(6));
The out put of the above statement is _____________.
►o
►P
►a
►k
The distance among families is ___________ because of spending more time on internet.
► Increased
► Expanded
► Contracted
► Decreased

The software used for the scanning of internet severs, is called __________.
► Wscan
► Mscan
► Sscan
► Vscan

Adding images to html page, we use___________ tag.


► <IMG>
► <IMAGE>
► <PICTURE>
► <PIC>
The group of technologies concerned with the capturing, processing and transmission of
information in the digital electronic form is called _____________.
► Telecom Engineering
► Computer Engineering
► Computer Science
► Information Technology
The responsibilities of the Team Lead includes_____________.
► Planning and tracking of the project
► Detailed design
► Professional development of team members
► All of the given options

When the packets reach at destination, __________ reassembles them into original message.
► Protocol
► TCP
► IP
► NIC

Many developers write the _________ first and then incrementally convert each line into _________.
► Real code & Pseudo code
► Pseudo code & Real code
► Real code & Artificial code
► None of the given options

Machine language is also called

► Assembly Language
► Binary Language
► High Level Language
► HTML Language
In JavaScript, second element of an array has the index:
►2
►0
►1
►3

Each element in an array is given an index, which is an integer value between 0 and one less than the
length of the array. The first element has an index of 0, the second element has an index of 1, and so on.

One can download or upload files to a remote computer using ________ protocol.
► HTTP
► SMTP
► FTP
► TELNET
JavaScript ________ support drawing of graphics
► Does
► Does not
► Always
► At times
Which of the following is NOT true about modern computers?
► More powerful
► Smaller in size
► Consume less energy
► Costly
Ada written a computer programme for ?
► Analytical Engine
► Difference Engine
► Harvard Mark 1
► Mechanical engine
A set of stand alone productivity applications designed to work together known as ______________ .
► Productivity software suites
► Compiled software
► Secure software
► Intelligent software
Because of spending more time on the internet, the distances among the families have been _____.
Increased
Expanded
Contracted
Shortened

Sophisticated event handling is not possible with _______________ event handling


Off-Line
In-Line
Out-Line
Non of the given choices
Autonomous Web Agents are also known as _________________
Mobile Agents
Softbots
Both "Mobile Agents" & "Softbots"
None of these
A communication protocol is a __________that governs the flow of information over a network.
Set of Methods
Set of Protocols
Set of rules
None of the given choices
By default in a web page Hyper Link for another web page is represented as:
Blue only
Black and Underlined
Blue and Bold
Blue and Underlined
The organizations are learning that business can be done in a more effective manner if emphasis is
placed upon ______________.
Cooperation
Shared responsibility
Networking
All of the given
Monitor is an example of __________devices
Output
Input
Processing
None of the given choices

The code in the ________ portion is the right choice for developing larger JavaScript scripts
Body
At End
Head
Separate
____________________ based on the principles of the logical reasoning ability of humans.
Genetic Algorithms
Rule-based Systems
Feed-Forward Network
None of these
The key benefit of VPNs over conventional PNs is:
Security
Efficiency
Lower Cost
None of the given choices
Which of the following is incorrect for making design elements legible?
Select correct option:
Elements should be large enough
Elements must contrast sufficiently
Related elements should be visually grouped
Elements should have no visual focus
1. Function is also known as ______________.
Select correct option:
subprogram
procedure
subroutine
All of given
In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET.
Select correct option:
1973
1983
1972
None of the given choices
E-mail system has ______ component(s)
Select correct option:
E-mail client
SMTP server
POP3 server
All of the given choices

_______ / / /______/ A Parallelogram (Tilted rectangle) represents the ________________ flow chart
element.
Select correct option:
Process
Input or Output
Decision
Connector
If a computer could pass the Turing test then it would be able to:
Select correct option:
win a million dollar prize
think like human begins
think but slower than humans
do the things faster

Punched cards were replaced by:


Select correct option:
Floppy Disk
Zip Drives
Magnetic storage
None of the given choices

The ________virus may display an annoying, but harmless message


Select correct option:
Malicious
Neutral
Helpful
DoS

The name of very first computer was:


Select correct option:
ABC
BCD
EDC
None of the given choices
The internet communities are ___________.
Select correct option:

Geographical based
Interest based
Country based
Religion based
__________% of the users have left websites in frustration due to poor navigation.
► 40
► 62
► 83
► 91

In JavaScript, a variable declaration is

► Optional
► Mandatory
► Not allowed
► None of the given

A protocol used for receiving email messages is called ____________.

► URL
► Telnet
► POP3
► SMTP

which one is correct?

► onUnload
► onUnLoad
► onUNLOAD
► All of the above
Serial arrangement in which things follow logical order or a recurrent pattern, such as statements
executing one by one, is called __________.

► Loop
► Sequence
► Condition
► Array

Variables allow us to manipulate data through the ___________.

► Actual Value
► Reference
► Length
► Name

Fuzzy logic is based on ____________.

► Ground facts
► Experience
► Practice
► Approximation

Word Processor is a _________________

► System Software
► Application Software
► Device
► Utility

In the old days, databases did NOT support ____________.

► Number
► Boolean
► Video
► Text

In tabular storage, fields placed in a particular row are strongly ___________.


► Independent
► Dependent
► Interrelated
► Inconsistent
Due to working at home, lack of interaction may result in ___________ professional growth.
► Slower
► Faster
► Higher
► Improved
Distance learning has got a boost due to the ___________.
► Easy communication
► Online interactive contents
► Flexibility
► All of the given options

_____________ technique can be used to create smooth animations or to display one of several
images based on the requirement.

► Image downloading
► Image preloading
► Image uploading
► Image postloading
► Tree structured organizational model
► Network paradigm
► Hierarchical structure
► None of the given options

The group of technologies concerned with the capturing, processing and transmission of
information in the digital electronic form is called
_____________.

► Telecom Engineering
► Computer Engineering
► Computer Science
► Information Technology

A large number of networks interconnected physically is called ______

► LAN
► MAN
► Internet
► Network collection

TCP stands for ________.

► Transfer Center protocol


► Transmission Control Protocol
► Transmission Center Protocol
► Telephone Center Protocol

A collection of data organized in such a way that the computer can quickly search for a desired data
item is known as :
► Retrieving
► Database
► Information
► DBMS

______ is simply a fast port that lets you connect computer peripherals and consumer electronics to
your computer without restart.
► Freeware
► Shareware
► Firewire
► Firmware

Structures, in which another list starts before the first list is finished, are called:
► Multiple Lists
► Nested Lists
► Ordered Lists
► Un-ordered Lists

The key property of the ‘Array’ object in JavaScript is


► Value
► Length
► Name
► All of the given choices

Which one is the example of spreadsheet software ?

► MS Word
► MS PowerPoint
► MS Excel
► MS Access

The Encryption of data is related to


► Data updates
► Data security
► Data integrity
► Data accessibility

_____ is the process of analyzing large databases to identify patterns.

► Data normalization
► Data management
► Data Mining
► None of the given options

Which is the user-friendly way of presenting data ?

► Query
► Form
► Report
► All of the given options

JavaScript function fixed() has equivalent HTML tag-set ____

► <.FIX>……………</FIX>
► <F>………………..</F>
► <PRE>………….</PRE>
► <H>………………..</H>

<form> Tags always placed between the <BODY> and </BODY> tags of a Web page

► True
► False

Java script has ----------------- ability to create and draw graphics.

► Limited
► Versatile
► Medium
► Not at all
Internet is an example of ______________ network.
Select correct option:

Private
Public
Both Private and Public
None of the given choices

Question # 2 of 10 ( Start time: 05:21:53 PM ) Total Marks: 1


The name of first commercially available PC was:
Select correct option:

UNIVAC 1
ENIAC
EDVAC
Altair 8800

Question # 3 of 10 ( Start time: 05:22:43 PM ) Total Marks: 1


Algorithm is a ____________________
Select correct option:

Definition of a problem
Sequence of steps to solve a problem
Understanding of a problem
Solving a problem

Question # 4 of 10 ( Start time: 05:23:52 PM ) Total Marks: 1


A group of information is called __________________
Select correct option:

File
Database
Record
Field

Question # 5 of 10 ( Start time: 05:24:17 PM ) Total Marks: 1


___________________ is a branch f computer science concerned with manipulating and enhancing
computer graphics.
Select correct option:

Image Handling
Image Processing
Image Engineering
None of these
Question # 6 of 10 ( Start time: 05:25:34 PM ) Total Marks: 1
__________has changed our way of life like no other technology.
Select correct option:

Computational technology
Computer technology
Computing technology
None of the Above

Question # 7 of 10 ( Start time: 05:26:27 PM ) Total Marks: 1


Sophisticated event handling is not possible with _______________ event handling
Select correct option:

Off-Line
In-Line
Out-Line
Non of the given choices

Question # 8 of 10 ( Start time: 05:27:03 PM ) Total Marks: 1


Babbage’s Analytical Engine could store information permanently in:
Select correct option:

Magnetic Tape
Floppy Disk
Punched Cards
None of the given choices

Question # 9 of 10 ( Start time: 05:28:30 PM ) Total Marks: 1


There are __________ popular schemes to reduce the number of bytes that are required for storing
graphics.
Select correct option:

4
3
2
None of these

A number of clever schemes have been invented to reduce the number of bytes that are required for storing
graphics. 2 popular ones:
Color mapping
Dithering

Question # 10 of 10 ( Start time: 05:30:01 PM ) Total Marks: 1


The internet-society is considered under Surveillance because:
Select correct option:

While surfing, we are being watched, constantly


Our every click is recorded and analyzed to extract patterns and behaviors
Webcams are becoming common. Providing a cheap way for parents to watch their children's every move
All of the given

Which of the following is incorrect for making design elements legible?


Select correct option:
Elements should be large enough
Elements must contrast sufficiently
Related elements should be visually grouped
Elements should have no visual focus

25.10 Making Display Elements Legible:

1. Designing (arranging) Display Elements


Elements must be large enough to be processed visually
Elements must contrast sufficiently with their backgrounds
Related elements should be visually grouped through the use of space, color, or graphical boundaries
The relative levels of importance among elements in a display should be revealed graphically

Question # 2 of 10 ( Start time: 05:03:37 PM ) Total Marks: 1


1. Function is also known as ______________.
Select correct option:
subprogram
procedure
subroutine
All of given

Function:
A group of statements that is put together (or defined) once and then can be used (by reference)
repeatedly on a Web page Also known as subprogram, procedure, subroutine

In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET.
Select correct option:
1973
1983
1972
None of the given choices

E-mail system has ______ component(s)


1983 - The TCP/IP protocols becomes the only set of protocols used on the ARPANET
This sets a standard for all networks, and generates the use of the term Internet as the net of nets
ARPANET splits into two nets to keep military & non-military network sites separate: ARPANET and
MILNET
Select correct option:
E-mail client
SMTP server
POP3 server
All of the given choices

_______ / / /______/ A Parallelogram (Tilted rectangle) represents the ________________ flow chart
element.
Select correct option:
Process
Input or Output
Decision
Connector

Punched cards were replaced by:


Select correct option:
Floppy Disk
Zip Drives
Magnetic storage
None of the given choices

During the 1960s, the punched card was gradually replaced as the primary means for data
storage by magnetic tape, as better, more capable computers became available.

The ________virus may display an annoying, but harmless message


Select correct option:
Malicious
Neutral
Helpful
DoS

The internet communities are ___________.


Select correct option:
Geographical based
Interest based
Country based
Religion based

Question # 1 of 10 ( Start time: 04:51:32 PM ) Total Marks: 1


Because of spending more time on the internet, the distances among the families have been _____.
Select correct option:
Increased
Expanded
Contracted
Shortened

Question # 3 of 10 ( Start time: 04:53:30 PM ) Total Marks: 1


Autonomous Web Agents are also known as _________________
Select correct option:
Mobile Agents
Softbots
Both "Mobile Agents" & "Softbots"
None of these

A communication protocol is a __________that governs the flow of information over a network.


Select correct option:
Set of Methods
Set of Protocols
Set of rules
None of the given choices

Protocol
–Rules governing communications over the network

By default in a web page Hyper Link for another web page is represented as:

Select correct option:


Blue only
Black and Underlined
Blue and Bold
Blue and Underlined

The organizations are learning that business can be done in a more effective manner if emphasis is placed
upon ______________.
Select correct option:
Cooperation
Shared responsibility
Networking
All of the given

Question # 7 of 10 ( Start time: 04:57:19 PM ) Total Marks: 1


Monitor is an example of __________devices
Select correct option:
Output
Input
Processing
None of the given choices

The code in the ________ portion is the right choice for developing larger JavaScript scripts
Select correct option:
Body
At End
Head
Separate
____________________ based on the principles of the logical reasoning ability of humans.
Select correct option:
Genetic Algorithms
Rule-based Systems
Feed-Forward Network
None of these

Rulebased Systems (1):


Based on the principles of the logical reasoning ability of humans

The key benefit of VPNs over conventional PNs is:


Select correct option:
Security
Efficiency
Lower Cost
None of the given choices
In __________________ automatic machines perform various tasks that were previously performed by
humans.
Select correct option:
Fuzzy Logic
Robotics
Rule based Systems
None of these
Avoid __________ to ensure readability of web page
Select correct option:

Overuse of bold and italics


Use of paragraphs
Use of white space
Use of contrast colors
Deep Blue was the name of:
Select correct option:

Human
Computer
City
None of the given choices

Using ____, a user can remotely log on to a computer (connected to the user through a network, e.g.
Internet) & have control over it like a local user, including control over running various programs ?
Select correct option:

FTP
TCP
Telnet Protocol
None of the given choices

Telnet Protocol

Using Telnet, a user can remotely log on to a computer (connected to the user’s through a TCP/IP
network, e.g. Internet) & have control over it like a local user, including control over running various
programs In contrast, FTP allows file operations only
Typical use: Configuring and testing of a remote Web server

DoS is________ ?
Select correct option:

Crime
Cyber crime
Not a crime
A software

__________ enables users located at far-way locations to easily share information with others located all
over the world.
Select correct option:

Protocol
Internet
Communication Channel
None of the given choices

Vacuum tubes were replaced by:


Select correct option:

Transistors
Electrodes
Electric Relays
None of the given choices

Cyber crime can be used to


Select correct option:
Damage a home computer
Bring down a business
Weaken the telecom, financial, or even defense-related systems of a country
All of the given

___ provides a simple, consistent way for applications to interact with the HW without having to know all the
details of the HW
► Explorer.exe
► System Files
► Operating System
► Application Software

Communication protocol is a __________that governs the flow of information over a network


► Set of methods
► Set of protocols
► Set of rules
► Device
_____________ team is responsible for the maintenance, expansion , improvement of the infrastructure
consisting of workstations, networking equipment, software and network security.
► Support
► Configuration Management
► Quality Assurance
► Developer
_____________ team consists on the sharpest technical minds in the company.
► Architecture
► Business Development
► Configuration Management
► Developer

_______________ is responsible for day to day operations.


► CEO
► COO
► CMSO
► Developer

Using Java Script you can write a character at random location on screen
► By applying randomCh() method
► With the help of String object
► With the help of random character property
► There is no built in approach in Java Script

The transistor is a solid state semiconductor device used for amplification and switching, and has _____
terminals.
► one
► two
► three
► four

Question No: 2 ( Marks: 1 ) - Please choose one


Blue Pacific is a name of _____ computer.
► Mini
► Desktop
► Micro
► Super

Question No: 3 ( Marks: 1 ) - Please choose one


Monte Carlo algorithm is an example of
► Randomized algorithm
► Greedy algorithm
► both greedy and randomized
► Heuristics
Question No: 4 ( Marks: 1 ) - Please choose one
A set of stand alone productivity applications designed to work together known as __

► Productivity software suites


► Compiled software
► Secure software
► Intelligent software

Question No: 1 ( Marks: 1 ) - Please choose one

Detailed plan, specifying the required resources and expected deliverables, is done in
________ phase.

► Planning

► User Requirements

► Design

► Developer Specification

Question No: 2 ( Marks: 1 ) - Please choose one

A combination of word processing and graphic design is

► Corel Draw

► Desktop Publishing page 83

► Paint

► WordPad

Question No: 3 ( Marks: 1 ) - Please choose one

------------- is an electronic path within a Computer System along which bits are
transmitted.

► Port

► Slots

► Bus

► Modem

Question No: 4 ( Marks: 1 ) - Please choose one

The key strengths of computers are


► Speed

► Storage

► Do not get bored

► All of the given choices

Question No: 5 ( Marks: 1 ) - Please choose one

We can change the background color in HTML, using ___ attribute of <body>

► background

► bgcolor

► backcolor

► backgroundcolor

Question No: 6 ( Marks: 1 ) - Please choose one

ASCII WHITE is the fastest Super computer which can perform __________ calculations
in one second.

► 1.3 billion

► 1.3 trillion

► 1.3 miillion

► 1.3 thousand

Question No: 7 ( Marks: 1 ) - Please choose one

_____ is the example of server-side scripts on Unix servers.

► ASP

► CGI page 71

► VBScript

► JavaScript

Question No: 8 ( Marks: 1 ) - Please choose one

We need _____________ for memory management in computer


► Software

► Hardware

► Operating System

► Application Software

Question No: 9 ( Marks: 1 ) - Please choose one

Data was stored and counted mechanically using ----------- decimal storage wheels,
--------------------- rotary dial switches.

► 300,400

► 1300,1400

► 30100,14100

► 3000 , 1400 page 14

Question No: 10 ( Marks: 1 ) - Please choose one

The first spread sheet program was invented by

► Charles Babbage

► Dan Bricklin

► Paul Graham

► John von Neumann

Question No: 11 ( Marks: 1 ) - Please choose one

In x = x + 20, x is called a __________.

► Constant

► String

► Variable

► Number

Question No: 12 ( Marks: 1 ) - Please choose one

The transistor is a solid state semiconductor device used for amplification and switching, and has
__________ terminals.
►one

►two

►three page 32

►four

Question No: 13 ( Marks: 1 ) - Please choose one

A diode functions as the electronic version of a __________-way valve.

► one page 32

► two

► three

► four

Question No: 14 ( Marks: 1 ) - Please choose one

This element of Flow Chart is called_____________.

► Process

► Off page connector

► Decision

► Connector

Question No: 15 ( Marks: 1 ) - Please choose one

Choose the correct html format to create a checkbox.

► <checkbox>

► <input type=”checkbox”>

► <check>

► <input type=”check”>

Question No: 16 ( Marks: 1 ) - Please choose one

---------------is the process of starting or restarting a computer.

►BIOS
►Refreshing

►Booting

►None of given

Question No: 17 ( Marks: 2 )

What is the Title of the web page for following code segment?

<Head>

<TITLE> VU Web <\TITLE>

<TITLE> Page </TITLE>

</Head>

Question No: 18 ( Marks: 2 )

What do you mean by Comments?

Question No: 19 ( Marks: 2 )

How can an operating system be viewed as a resource allocator?

Question No: 20 ( Marks: 3 )

What is the role of application software in Education?

Question No: 21 ( Marks: 3 )

Give four properties and two methods of window object ?

Question No: 22 ( Marks: 5 )

What is the difference between High-level and Low-level programming languages?

Question No: 23 ( Marks: 5 )

Elaborate greedy algorithm definition with solid example in favour and one counter
example?

Question No: 1 ( Marks: 1 ) - Please choose one

Ada, Countess of Lovelace developed first:

► Computer

► Website
► Computer Program

► Analytical engine

Question No: 2 ( Marks: 1 ) - Please choose one

Charles Babbage was a/an

► Mathematician

► Computer Scientist

► Physician

► Analyst

Question No: 3 ( Marks: 1 ) - Please choose one

Detailed plan, specifying the required resources and expected deliverables, is done in
________ phase.

► Planning

► User Requirements

► Design

► Developer Specification

Question No: 4 ( Marks: 1 ) - Please choose one

A computer program that facilitates the communication between the computer and a
peripheral device is called___________________

► Operating system

► Utilities

► Language Translator

► Device Drives

Question No: 5 ( Marks: 1 ) - Please choose one

To start an ordered list from 20 instead of 1, we will write

► <OL begin = “20">

► <OL initiate = “20">


► <OL start = “20">

► <OL from = “20">

Question No: 6 ( Marks: 1 ) - Please choose one

_________ is the best known builder for supercomputers.

► Sun

► Cray Research

► Microsoft

► Apple

Question No: 7 ( Marks: 1 ) - Please choose one

Using COLSPAN, number of rows of the current cell should extend itself

► Upward

► Downward

► Both Upward and Downward

► None of the given choice

Question No: 8 ( Marks: 1 ) - Please choose one

Interactive forms are always placed between ___ tag-set

► TITLE

► HEAD

► BODY

► HTM

Question No: 9 ( Marks: 1 ) - Please choose one

_________ manages the HW and SW resources ( memory, disk drives etc) of the
computer system, often invisibly.

► Explorer.exe

► System Files

► Operating System
► Application Software

Question No: 10 ( Marks: 1 ) - Please choose one

Speakers fall into the hardware category.

► True

► False

Question No: 11 ( Marks: 1 ) - Please choose one

______________ software directly interacts with the hardware.

► Application software

► System software

► Dynamic software

► Distributed software

Question No: 12 ( Marks: 1 ) - Please choose one

In spreadsheet, which of the following function is used to solve the equation ?

► =COUNTIF

► =GoalSeek

► None of the above

► =Sum

Question No: 13 ( Marks: 1 ) - Please choose one

_______ is known as the best feature in word processing.

► Cut

► Copy

► Paste

► Undo

Question No: 14 ( Marks: 1 ) - Please choose one

In java script objects may have___________ properties.

► Single
► Several

► Multiple

► All of the given options

Question No: 15 ( Marks: 1 ) - Please choose one

_________ are great for showing parts of a whole that are generally expressed in
percentages.

► Line Charts

► Pie Charts

► Bar Charts

► None of the options described

Question No: 16 ( Marks: 1 ) - Please choose one

Small Computer System Interface is

► Slower and harder to configure then serial and parallel ports

► Faster then USB

► Both first choices

► Slower then USB but Faster then serial and parallel

Question No: 17 ( Marks: 2 )

Write the major types of softwares with examples?

Software is the set of instructions which guides the computer hardware through
their jobs. A computer is useless without software. We use different software to solve
different problems. The types of software we need depend on the job we want to do.
There are basically two types of software's system software and application software.
System software’s are used to help the computer parts work together and also provide
support to the application software. The most common type of system software is
operating system.
Application software’s are used to improve our work ability. Different application
software’s and system software’s are used in daily life.

Question No: 18 ( Marks: 2 )

What is the major difference between paragraph <p> and Line Break <BR> tags?
<p> tag is use to Insert paragraph breaks into the text of your HTML document
Note that this tag is special in that it does not require an ending tag.

The <br> tag inserts a single line break. The <br> tag is an empty tag which means that it
has no end tag.

Question No: 19 ( Marks: 2 )

Why PASCAL was designed and what is the problem with PASCAL?

Pascal was originally intended primarily as a teaching language, but it has been more
and more often recommended as a language for serious programming as well, for
example, for system programming tasks and even operating systems.

Question No: 20 ( Marks: 3 )

What are the key requirements of E-commerce Software?

There are more possible approaches depending to the specific context.


The information used for building a software system has more levels:
- Business process level (overall process of the customer business). This is the context
where the future software system will be activated
- Business needs allocated to the software system
- System features that will satisfy those business needs
- System feature details as SRS

Question No: 21 ( Marks: 3 )

Write down the pseudo code for the following flow chart.

Question No: 22 ( Marks: 5 )

(a) Write down two positive features of client-side scripting.

Client-side scripting offers an easy way to provide additional functionality and flexibility
to your project. HTML is very limited; its main purpose is to display and format content.
It allows little or no interaction with the visitors of your site.
Scripting technologies like JavaScript, JScript, VBScript and others are used on many
sites to add extra functionality to a web site. Ranging from simple mouse over image
effects, animation, form field validation to complex dynamic menu systems, these scripts
enhances the functionality and user experience.

(b) Discuss two deficiencies of JavaScript.

uestion No: 23 ( Marks: 5 )

What are the key features of a word processor?


Insert text: Allows you to insert text anywhere in the document.
delete text: Allows you to erase characters, words, lines, or pages as easily as you can
cross them out on paper.
cut and paste : Allows you to remove (cut) a section of text from one place in a document
and insert (paste) it somewhere else.
copy : Allows you to duplicate a section of text.
page size and margins : Allows you to define various page sizes and margins, and the
word processor will automatically readjust the text so that it fits.
search and replace : Allows you to direct the word processor to search for a particular
word or phrase. You can also direct the word processor to replace one group of characters
with another everywhere that the first group appears.
word wrap : The word processor automatically moves to the next line when you have
filled one line with text, and it will readjust text if you change the margins.
print: Allows you to send a document to a printer to get hardcopy.
file management : Many word processors contain file management capabilities that allow
you to create, delete, move, and search for files.
font specifications: Allows you to change fonts within a document. For example, you can
specify bold, italics, and underlining. Most word processors also let you change the font
size and even the typeface.
footnotes and cross-references: Automates the numbering and placement of footnotes and
enables you to easily cross-reference other sections of the document.
graphics graphics: Allows you to embed illustrations and graphs into a document. Some
word processors let you create the illustrations within the word processor; others let you
insert an illustration produced by a different program.
headers , footers , and page numbering: Allows you to specify customized headers and
footers that the word processor will put at the top and bottom of every page. The word
processor automatically keeps track of page numbers so that the correct number appears
on each page.
layout : Allows you to specify different margins within a single document and to specify
various methods for indenting paragraphs.
macros : A macro is a character or word that represents a series of keystrokes. The
keystrokes can represent text or commands. The ability to define macros allows you to
save yourself a lot of time by replacing common combinations of keystrokes.
merges: Allows you to merge text from one file into another file. This is particularly
useful for generating many files that have the same format but different data. Generating
mailing labels is the classic example of using merges.
spell checker : A utility that allows you to check the spelling of words. It will highlight
any words that it does not recognize.
tables of contents and indexes: Allows you to automatically create a table of contents and
index based on special codes that you insert in the document.
thesaurus: A built-in thesaurus that allows you to search for synonyms without leaving
the word processor.

Question No: 1 ( Marks: 1 ) - Please choose one


Human are better than computers at:

► Efficiency

► Accuracy

► Pattern recognition

► None of the given choices

Question No: 2 ( Marks: 1 ) - Please choose one

Cray-1 was first commercial _________ computer

► Super

► Mini

► Micro

► Personal

Question No: 3 ( Marks: 1 ) - Please choose one

URL is a/an ________

► Device

► Component

► Address

► Tool

Question No: 4 ( Marks: 1 ) - Please choose one

Mainframe Computers are also called _____

► Enterprise Servers

► Personal Servers

► Enterprise Managers

► Window Servers

Question No: 5 ( Marks: 1 ) - Please choose one

Which of the following is NOT a category of Mobile Computers?

► Laptop
► Palmtop

► Desktop

► Wearable

Question No: 6 ( Marks: 1 ) - Please choose one

Preliminary exploration of possible solutions, technologies, suppliers is called

► Viability

► Feasibility

► Specification

► Integration

Question No: 7 ( Marks: 1 ) - Please choose one CS101 Mid Term Papers

__________ give us the ability to manipulate data through reference instead of actual

value.

► Constants

► Variables

► Data Types

► Operators

Question No: 8 ( Marks: 1 ) - Please choose one

Consider the following statement written in JavaScript:

str = ”Hello” + ” World”

What will be the value of str ?

► HelloWorld

► Hello World

► Hello + World

► It will result in error

Question No: 9 ( Marks: 1 ) - Please choose one


A tool that helps you to find the synonyms is called ______________

► Language

► Paragraph

► Thesaurus

► Symbol

Question No: 10 ( Marks: 1 ) - Please choose one

Communication protocol is a __________that governs the flow of information over a

network

► Set of protocols

► Set of rules

► Device

► Set of methods

Question No: 11 ( Marks: 1 ) - Please choose one

If a computer could pass the Turing test then it would be able to:

► think like human beings

► do the things faster

► win a million dollar prize

► store more information

Question No: 12 ( Marks: 1 ) - Please choose one

The first Web browser with a GUI was generally available in:

► 1992

► 1993

► 1994

► 1995

Question No: 13 ( Marks: 1 ) - Please choose one

Web is a unique invention by humans in terms that it is:


► accessible to only the owners who control it

► accessible from particular locations only

► accessible to all humans

► accessible to only the educational institutes

Question No: 14 ( Marks: 1 ) - Please choose one

In this URL http://www.msn.com , _____identifies the domain name

► http

► www

► msn

► com

Question No: 15 ( Marks: 1 ) - Please choose one

______ is simply a fast port that lets you connect computer peripherals and consumer

electronics to your computer without restart.

► Freeware

► Shareware

► Firewire

► Firmware

Question No: 16 ( Marks: 1 ) - Please choose one

Which of the following is NOT supported by PC's power supply.

► -12 and +12 V DC

► -10 and +10 V DC

► -5 and + 5 V DC

► All are supported

Question No: 17 ( Marks: 1 ) - Please choose one

In which case Cache Memory is used

► To increase RAM speed


► To overcome BUS speed

► To overcome Speed rate between RAM and CPU

► To overcome CPU speed

Question No: 18 ( Marks: 1 ) - Please choose one

To display a single line text area on the web page, we use ___ tag

► TEXT

► TEXTBOX

► INPUT

► INPUTBOX

Question No: 19 ( Marks: 1 ) - Please choose one

If an algorithm is syntactically correct, but semantically incorrect then this situation is

► Very good situation

► Very dangerous situation

► Not very bad

► Neutral situation

Question No: 20 ( Marks: 1 ) - Please choose one

Users communicate with the computer using a consistent user interface provided by the

OS.

► True

► False

Question No: 21 ( Marks: 1 ) - Please choose one

Application developers do not need to know much about the HW, especially the

microProcessor, while they are developing their application.

► True

► False

Question No: 22 ( Marks: 1 ) - Please choose one


The first spread sheet program was invented by

► Charles Babbage

► Dan Bricklin

► Paul Graham

► John von Neumann

Question No: 23 ( Marks: 1 ) - Please choose one

Which representation technique of algorithm is more suitable for developer to make

actual code___________.

► pseudo code

► flow chart

► both pseudo code and flow chart

► Heuristics

Question No: 24 ( Marks: 1 ) - Please choose one

_____________ is used to terminate all JavaScript statements.

► Colon

► Semicolon

► Underscore

► Apostrophe

Question No: 25 ( Marks: 1 ) - Please choose one

In java script cookies can be created for future use_____.

► Easily

► No facility at all

► This is not possible without Java language.

► Cookies are files so java script can not handle it.

Question No: 26 ( Marks: 1 ) - Please choose one

When the microprocessor desires to look at a piece of data, it checks in


the __________ first.

► RAM

► ROM

► hard disk

► cache

Question No: 27 ( Marks: 1 )

What is the basic difference between 'magnetic tapes' and 'floppy disks' ?

Question No: 28 ( Marks: 1 )

What was the name of first microprocessor built by Intel ?

Answer: The Intel 4004.

Question No: 29 ( Marks: 2 )

What was the name of first super computer. When it was introduced?

Answer

<!--[if !supportLists]-->1.) <!--[endif]-->ENIAC is the first super computer in world

<!--[if !supportLists]-->2.) <!--[endif]-->Supercomputers were introduced in the 1960s


and were designed primarily by Seymour Cray at Control Data Corporation (CDC)

Question No: 30 ( Marks: 3 )

Write a short note on blue pacific Super Computer.

Answer: At the high end of supercomputing are computers like IBM's "Blue Pacific,"
announced

on October 29, 1998. Built in partnership with Lawrence Livermore National Laboratory
in California, Blue Pacific is reported to operated at 3.9 teraflop (trillion floating point
operations per second), 15,000 times faster than the average personal computer. It
consists of 5,800 processors containing a total of 2.6 trillion bytes of memory and
interconnected with five miles of cable.

Question No: 31 ( Marks: 5 )

What are JavaScript literal and what are its types?

Answer: JavaScript Literals


A data value that appears directly in a statement

Literals can be of several types. Some of them are:

Number

String

Boolean

Numeric Literals

24,-230000000000000000,9.80665,1.67e-27,

JavaScript stores all numbers, even integers, as floating-point numbers

String Literals

“” , ’‘Bhola” , “Where is the Bhola Continental Hotel?”

String literals are always enclosed in a matching pair of single or double quotes

Boolean Literals

True, false ,

if ( tankFull == false)

addMoreWater = true

Question No: 32 ( Marks: 5 )

Can you say that URL and semantic web sites are same? Justify your answer by defining

the both terms?

Question No: 31 (Marks: 1)


What is heuristic?
Heuristic is a procedure that usually, but not always, works or that gives nearly
the right answer.

Question No: 32 (Marks: 1)


In programming, what is an object?

Object is a named collection of properties (data, state) & methods (instructions,


behavior).

Question No: 33 (Marks: 2)


What is spreadsheet? List any two jobs that it can do.
A spreadsheet is a grid that organizes data into columns and rows. Spreadsheets
make it easy to display information, and people can insert formulas to work with
the data.

Electronic replacement for ledgers


Charts
Financial-forecasting.

Question No: 34 (Marks: 2)


In JavaScript, what is event handling? What are the two types of events?

In JavaScript capturing events and responding to them is event handling. The


system sends events to the program and the program responds to them as they
arrive.
1. Events can include things a user does - like clicking the mouse.
2. Events that the system itself does - like updating the clock.

Question No: 35 ( Marks: 3 )


Explain how many ways businesses monitor their employees?

• Systems are available that monitor almost every key stroke that an employee
makes on a computer.
• Systems are available that read and censor all incoming and outgoing eMail.
• It is quite straight forward to monitor where you surf the web.

Question No: 36 ( Marks: 3 )


What is difference between Design and System Architecture?
System architecture is the conceptual design that defines
the structure and/or behavior of a system. Whereas designs it as an
independent, self-contained system.

http://groups.google.com/group/vuZs

Question No: 37 ( Marks: 3 )


What are the Sub categories of Artificial Intelligence? Briefly explain any
two.

1. Expert systems:
Expert system is that system which is in some limited sense, can replace an
expert.

2. Robotics:

Robotics is an automatic machine that performs various tasks that were


previously done by humans.

Question No: 38 ( Marks: 5 )


How many ways are there to call a function in a program? Explain with
example.

Two Ways of Calling Functions:

Functions do not run automatically. When the page loads, each function waits
quietly until it is told to run.

1. A function calls appearing as a complete statement:

function popUp( message ) {


window.alert( message ) ;
}
popUp( “Warning!” ) ;

2. A function calls appearing as part of a statement. Definitions of such


functions include a ‘return’ statement:

function add( a, b ) {
c=a+b;
return c ;
}
sum = add( 2, 4 ) ;
document.write( sum ) ;

Question No: 39 ( Marks: 5 )


Elaborate the ‘+ ’ operator and its constraints with the help of examples.

The + Operator Used on Strings. The + operator can also be used to add string
variables or text values together. To add two or more string variables together,
use the + operator.

Example:
txt1="What a very";
txt2="nice day";
txt3=txt1+txt2;
Now txt3 will be having this value "What a very nice day".
txt3=txt1+txt2; this statement due to + sign.

Question No: 40 ( Marks: 10 )


Write a JavaScript program having two functions sum and mean.
The web page will ask the user to enter five values to be added.
After taking input it will calculate the sum and mean of those values by
calling sum and mean functions.

Question No: 41 ( Marks: 10 )


Define the following terms.

Object
Object is a named collection of properties (data, state) & methods (instructions,
behavior).

Event Handler
An event handler is a command which calls a function when an event happens,
such as the user clicking a button.

Local Variable
Declaring variables (using the var keyword) within a function makes them local.
They are available only within the function and hold no meaning outside of it.

Scope of Variable
Defining the space in which a variable is effective is known as defining the scope
of a variable. A variable can be either local or global in scope.

Array
Array is an indexed list of elements.
Question No: 27 ( Marks: 1 )
What BIOS stands for?
BIOS stand for Basic input/output system.

http://groups.google.com/group/vuZs

Question No: 28 ( Marks: 1 )


List down the Analytical Engine's components name (any two)
Input

Memory
Processor
Output.
Question No: 29 ( Marks: 2 )
Why uploading a web page is important? Describe in 2 – 3 lines.

By only uploading webpage we could place our information so that other can
reach up to what we have loaded. Upload means make available our data or
information for the world web browsers.

Question No: 30 ( Marks: 3 )


What is the difference between microprocessors and microcontrollers?
Give one example of both.
The microprocessor is electronic equipment which can perform several functions
and also processing of data and information present in a computer, while
microcontroller can only perform one function for that its design.
Example:
Microprocessor: Pentium 4 & Personal Computer.
Microcontroller: Electrical device, washing machines, microwave ovens,
telephones etc.

Question No: 31 ( Marks: 5 )


Differentiate uni-Processor OS from Multi-Processor OS.

Uni-processor OS’es is designed to schedule tasks on a single uP only whereas


Multi-processor OS’es can control computers having multiple uPs, at times
1000’s of them.

Question No: 32 (Marks: 5)


Why do we call JavaScript an Object-based Language?

JavaScript shares many similarities with object-oriented languages, and therefore


is called an object-based language.
Question No: 31 (Marks: 1)
When does recursion occur?

Question No: 32 (Marks: 1)


What are the types of computer network according to the distance
between nodes?
There are two types of networks.
1. LAN (Local Area Network)
2. WAN (Wide Area Network)

Question No: 33 (Marks: 2)


What is meant by semantic error?
Occur when a statement executes and has an effect not intended by the
programmer and Often times occur only in unusual & infrequent circumstances.

Question No: 34 (Marks: 2)


List down the names of two array methods available in JavaScript.
1. sort( ) [sorts elements in alphabetical order].
2. reverse( ) [Reverses the order of elements].
Question No: 35 ( Marks: 3 )
How can you define a consistent web design? Why is it needed?
A consistent good designed website is generated for general public that allows
users to attain what they want as quickly as possible without spending much
effort. A consistent good design is needed to assists the user in recovering from
errors.
Question No: 36 ( Marks: 3 )
How can we include images in a web page using HTML and Java script?
Image in HTML
<IMG src=URL, alt=text height=pixels width=pixels align="bottom|middle|top">
Image in Javascript
Images in JavaScript can be manipulated in many ways using the built-in object
Image.
Additional properties to HTML are hspace, vspace & lowsrc.
Example: It can be used by many handlers like, onAbort, onLoad & onError
Question No: 37 ( Marks: 3 )
The event handler attribute consists of three parts. Write about each of
them.
1. The identifier of the event handler.
2. The equal sign.
3. A string consisting of JavaScript statements enclosed in double or single
quotes.
Question No: 38 (Marks: 5 )
What is a packet in the network environment? What kind of information
does it contain?

A packet is the smallest unit of data transmitted over a computer network. It’s a
message to be transferred over the network is broken up into small packets by
the sending computer.

Each packet contains the following info:


–Sender's address
–Destination address
–Data
–Error-recovery info.

You might also like