FINALTERM EXAMINATION
Question No: 1 ( Marks: 1 ) - Please choose one
__________% of the users have left websites in frustration due to poor navigation.
► 40
► 62
► 83
► 91
Question No: 2 ( Marks: 1 ) - Please choose one
The impact of a digit in a number is determined by its ---------------
► Value
► Location
► Length
► None of above
Question No: 3 ( Marks: 1 ) - Please choose one
Hexadecimal number system is based on -------------------- digits
►2
►8
► 12
► 16
Question No: 4 ( Marks: 1 ) - Please choose one
TCP stands for ___________.
► Total communication protocol
► Transmission control protocol
► Transfer control protocol
► Transfer collection protocol
Question No: 5 ( Marks: 1 ) - Please choose one
The browser breaks down the URL into ________ parts.
►2
►3
►4
►5
Question No: 6 ( Marks: 1 ) - Please choose one
A single pixel can acquire approximately ___________ color schemes.
► 1 million
► 2 million
► 10 million
► 16 million
Question No: 7 ( Marks: 1 ) - Please choose one
Serial arrangement in which things follow logical order or a recurrent pattern,
such as statements executing one by one, is called __________.
► Loop
► Sequence
► Condition
► Array
Question No: 8 ( Marks: 1 ) - Please choose one
According to a popular heuristic, success is defined by ___________.
► The user
► The builder
► Both user and builder
► None of the given options
Question No: 9 ( Marks: 1 ) - Please choose one
Which one is the best option for designing a Medical Expert System?
► Rule Based System
► Genetic Algorithm
► Fuzzy Logic
► Neural Network
Question No: 10 ( Marks: 1 ) - Please choose one
document.write("20"+"12") ;
The out put of the above statement is ____________.
► 1220
► 2012
► 20 12
► 32
Question No: 11 ( Marks: 1 ) - Please choose one
Due to working at home, contact with the colleagues is __________, which may
result in __________ quality of work
► Reduced, Poorer
► Reduced, Better
► Increased, Poorer
► Increased, Better
Question No: 12 ( Marks: 1 ) - Please choose one
The effective way not to only write programs but also it works properly and
further more to minimize the time and the development cost of the program is
called___________________
► Programming Mechanism
► Programming Methodology
► Programming Synchronization
► None of the given options
Question No: 13 ( Marks: 1 ) - Please choose one
The tasks performed to determine the existence of defects is called _______
► Debugging
► Testing
► Repairing
► Coding
Question No: 14 ( Marks: 1 ) - Please choose one
Deep Blue was the name of
► computer
► human
► city
► game
Question No: 15 ( Marks: 1 ) - Please choose one
There is a battery on the motherboard to:
► Give power to the processor
► Save information when computer is off
► Save information when computer is on
► Give power to the motherboard
Question No: 16 ( Marks: 1 ) - Please choose one
Compound Statement after decision constructs in JavaScript is enclosed with
►( )
►[ ]
► { };
►{ }
Question No: 17 ( Marks: 1 ) - Please choose one
______ occurs when a function calls itself.
► Recursion
► Call by value
► Call by reference
► Parsing
Question No: 18 ( Marks: 1 ) - Please choose one
Which function returns integer nearest to x ?
► random()
► exp(x)
► log(x)
► round(x)
Question No: 19 ( Marks: 1 ) - Please choose one
Microphone is an input as well as output device. This statement is
► True
► False
Question No: 20 ( Marks: 1 ) - Please choose one
74HC163 has two enable input pins which are _______ and _________
► ENP, ENT
► ENI, ENC
► ENP, ENC
► ENT, ENI
Question No: 21 ( Marks: 1 ) - Please choose one
Radio Buttons are used when you want the user to select one of a limited number
of choices.
► True
► False
Question No: 22 ( Marks: 1 ) - Please choose one
In partitioning of program/module, it should be assured that partitioned
chunks should be as _________ as possible.
► Dependent
► Independent
► Complex
► All of the above
Question No: 23 ( Marks: 1 ) - Please choose one
In a library’s database, if there is an entry in the register for Book # 423 then
the corresponding Book must actually exist; is an example of which type of
data integrity:
► Type integrity
► Limit integrity
► Physical Integrity
► Referential Integrity
Question No: 24 ( Marks: 1 ) - Please choose one
DBMS and Database are two names of one term .
► True
► False
Question No: 25 ( Marks: 1 ) - Please choose one
There are _______ types of program errors
►2
►4
►6
►3
Question No: 26 ( Marks: 1 ) - Please choose one
Super computers consists of more than one parallel processors because
► One big processor is more expensive than parallel processors
► Through parallel processors problems can be solved easily
► Small processors are easy to manufacture
► All of the given
Question No: 27 ( Marks: 2 )
What is the difference between ‘single-line text input field’ and ‘password input
field’ ?
ANS:
A Password Field is good for sensitive information. The only item that is
absolutely necessary is the Submit Button. It is a good idea to include a Reset
Button for the convenience of the user.
A text field gathers information using a single line of text. This field is useful for
short answers. The default text field is blank. If you want to specify default text,
use the VALUE attribute.
.
Question No: 28 ( Marks: 2 )
What is internet?
ANS:
Internet is also called WAN, which means the interconnection of large
number of computer networks and it consists of millions of private, public,
academic, business, and government networks of local to global scope that are
linked by a broad array of electronic and optical networking technologies.
Question No: 29 ( Marks: 2 )
In JavaScript, what is event handling? What are the two types of events?
ANS:
Event handling means capturing an event and responding to that.
Events e.g. onMouseOver, OnClick, onLoad, Onunload, updating the clock etc. are
captured by the Java script & according to the programs they are responded
accordingly
Question No: 30 ( Marks: 2 )
Define the key weakness of the web?
ANS:
Question No: 31 ( Marks: 3 )
How can we include images in a web page using HTML and Java script?
ANS:
Image in HTML
It is easier to insert images and pictures i.e. JPG, GIF & BMP files in the web page
through HTM codes.
The <IMG> tag is used which is used as under:-
<img src=URL, alt=text
Height=(in pixels) width=(in pixels)
Images in JavaScript
Images in JavaScript may be used with the event handling i.e. OnLoad, OnUnload,
OnError and OnAbort etc.
The properties i.e. used for Java script are as under:-
1. Name
2. Border
3. Complete
4. Height
5. src
for example:-
<img name=”xyz” src=”abc.jpg”>
Question No: 32 ( Marks: 3 )
Differentiate between onLoad and onUnload
ANS:
On load event is used when the page is load in the browser while on the other
side onUnload event works when the page closes down.
Question No: 33 ( Marks: 3 )
Elaborate Rester Graphics with examples.
ANS:
Raster graphics are digital images created or captured (for example, by scanning
in a photo) as a set of samples of a given space . A raster file is usually larger
than a vector graphics image file. A raster file is usually difficult to modify
without loss of information.
Examples of raster image file types are: BMP, TIFF, GIF, and JPEG files.
Question No: 34 ( Marks: 5 )
What is a Relational Database? Give the names of any three RDBMS software.
(2+3)
ANS:
Database architecture consists of three levels, external, conceptual and internal.
Clearly separating the three levels was a major feature of the relational
database.
NAMES:
Oracle Database software, Linux, and oracle e business database software , and
Oracle OLAP.
Question No: 35 ( Marks: 5 )
How many ways are there to call a function in a program ? Explain with example
ANS:
there are two methods of function in a program
1st method is used within the html coding with immediate in the even handling
on the other side function can also be defined in the heading portion of the html
page
it is a better choice to use function as it include many statments in it.
OnMouseOver= “if(document.sendEmail.sender.value.length<1)
Window.alert(‘empty field!’)”
while in the heading portion
it will be as
function checkForm() {
if ( document.sendEmail.sender.value.length < 1) {
window.alert( “Empty Field” );
}
Question No: 36 ( Marks: 5 )
What do you mean by the term 'Telepresence' in Computing World?
ANS:
Question No: 1 ( Marks: 1 ) - Please choose one
Analytical Engine is ------------------
► An electrical machine
► A digital machine
► An analog machine
► A special purpose machine
Question No: 2 ( Marks: 1 ) - Please choose one
Website design should NOT be __________.
► Unified
► Complex
► Consistent
► Predictable
Question No: 3 ( Marks: 1 ) - Please choose one
TCP stands for ___________.
► Total communication protocol
► Transmission control protocol
► Transfer control protocol
► Transfer collection protocol
Question No: 4 ( Marks: 1 ) - Please choose one
A vocabulary and set of grammatical rules for instructing a computer to perform
specific tasks is called
► Software
► Programming language
► Device driver
► Interpreter
Question No: 5 ( Marks: 1 ) - Please choose one
A _________ is a meaningful, easy-to-remember ‘label’ for an IP address.
► TCP address
► Domain name
► Network name
► VoIP
Question No: 6 ( Marks: 1 ) - Please choose one
In spreadsheets, cell address A12 means _______.
► Row A, Cloumn 12
► Row 12, Cloumn A
► Row 2,Cloumn A1
► Row A1, Cloumn 2
Question No: 7 ( Marks: 1 ) - Please choose one
According to the heuristic, the number of defects remaining in a system after a
given level of tests is proportional to ___________.
► The number found on very first day.
► The number found during the development.
► The number found during the test.
► None of the given options.
Question No: 8 ( Marks: 1 ) - Please choose one
Which one is the best option for designing a Medical Expert System?
► Rule Based System
► Genetic Algorithm
► Fuzzy Logic
► Neural Network
Question No: 9 ( Marks: 1 ) - Please choose one
Command that allows you to recover form mistakes is called __________.
► Clear
► Edit
► Undo
► Break
Question No: 10 ( Marks: 1 ) - Please choose one
The document.write( ) method expects ___________ as its argument.
► Integer
► Float
► String
► Boolean
Question No: 11 ( Marks: 1 ) - Please choose one
We use ___________ to stop Break-Ins.
► Scanners
► Intrusion detectors
► Utilities
► None of the given options
Question No: 12 ( Marks: 1 ) - Please choose one
The developer report to ___________ in a development team.
► Team Lead
► Project Manager
► CEO
► IT Manager
Question No: 13 ( Marks: 1 ) - Please choose one
The key responsibilities of a project manager is _____________.
► Planning and tracking of the project
► Arranging of the appropriate resources
► Client relationship management
► All of the given options
Question No: 14 ( Marks: 1 ) - Please choose one
The key responsibilities of the architect of the project is______________.
► Technology selection
► High-level design
► Makes certain that the implementation remains true to the design
► All of the given options
Question No: 15 ( Marks: 1 ) - Please choose one
The important attribute of image tag is ________________.
► src
► image
► None of the given options
► alt
Question No: 16 ( Marks: 1 ) - Please choose one
onAbort , onError are the _______________ of the image object.
► Event Handler
► Properties
► Methods
► None of the given options
Question No: 17 ( Marks: 1 ) - Please choose one
Now a days, users communicate with the computer using a consistent __________
provided by the Operating System.
► Command-line interface
► Application Interface
► User Interface
► Protocol
Question No: 18 ( Marks: 1 ) - Please choose one
One can browse documents residing on a remote computer using ________
protocol.
► HTTP
► SMTP
► FTP
► TELNET
Question No: 19 ( Marks: 1 ) - Please choose one
Which of the following device can be used to control network traffic?
► Cable
► Connector
► Hub
► Repeater
Question No: 20 ( Marks: 1 ) - Please choose one
User can remotely log on to a computer and can have a control over it like a local
user using
► TelNet Protocol
► TelNet Protocol and connected to the user through TCP/IP network
► TelNet protocol and FTP
► TCP/IP and FTP
Question No: 21 ( Marks: 1 ) - Please choose one
If(studentMarks>70);
(
document.write( "Grade A");}
Which of following is correct format of above code:
► If(studentMarks>70);(
document.write( "Grade A");};
► If(studentMarks<>70) (
document.write( "Grade A");}
► If(studentMarks>70){
document.write( "Grade A");}
► None of above options
Question No: 22 ( Marks: 1 ) - Please choose one
Which of the following language is object based but not object oriented language.
► javascript
► visual basic
► C++
► C#
Question No: 23 ( Marks: 1 ) - Please choose one
asin(x) stands for __________
► Asynchronous sine
► Alpha Sine
► Automated Sine
► ArcSine
Question No: 24 ( Marks: 1 ) - Please choose one
The output of POW (3, 2) is______________.
►6
►4
►9
► 12
Question No: 25 ( Marks: 1 ) - Please choose one
The Right most portion or the third portion of the URL contains______ .
► Protocol Identifier
► Server Name
► Directory Name
► None of the given
Question No: 26 ( Marks: 1 ) - Please choose one
Which Image format is known as Lossless original format.
► JPEG
► GIF
► Bitmap
► Vector
Question No: 27 ( Marks: 2 )
What is a function? Give one example.
Answer:
Function is a reusable code (group of statement) that is executed when the
function is called. It is also known as sub-program. Function is normally defined
in the head section of the code.
Question No: 28 ( Marks: 2 )
What is an intelligent system?
Answer:
Intelligent systems are the programs developed to perform complicated jobs that
reflect human brain and thoughts. If the algorithms are too much complex or can
not be solved instantly then we can use such systems. Therefore the well
intelligent system not only performs well but it has the capability to rectify any
errors by himself if it occurs within his domain.
The examples of intelligent systems are Robotics, Business Intelligence …etc.
Question No: 29 ( Marks: 2 )
What is meant by semantic error ?
Answer:
It is an error which a developer encounters when a statement is executed but it
was not intended by him (the developer). Such errors are very difficult to locate
during testing. Mostly these occur during abnormal circumstances. It may be
referred as the logical error.
Question No: 30 ( Marks: 2 )
What is best algorithm?
Answer:
Greedy algorithm is the best algorithm as it is n algorithm that always takes the
best immediate, or local solution while finding an answer.
Question No: 31 ( Marks: 3 )
How can we include images in a web page using HTML and Java script?
Answer:
Images can be included in HTML by employing tag, below is the format of
align="bottom|middle|top">
Question No: 32 ( Marks: 3 )
What are the Sub categories of Artificial Intelligence? Briefly explain any two.
Answer:
1. Robotics
These are the machines which are computer programmed and perform work
which was previously done by humans. They can be found in the manufacturing
industry, the military, space exploration and medical applications.
2. Expert Systems
These systems are designed to replace an expert. The medical expert system is
an example of such system which can replace a Doctor/medical expert.
Question No: 33 ( Marks: 3 )
What are the steps of working of TCP and IP protocols in internet
transmission?
Answer:
TCP divide messages in to many packets (capsulation) and sent these messages
over the internet and IP route these messages on the internet to the correct
destination and upon reaching the messages on its destination the messages are
encapsulated.
Question No: 34 ( Marks: 5 )
What is ARPANET and who developed it?
Answer:
ARPANET stands for Advanced Research Projects. The initial purpose was to
communicate with and share computer resources among mainly scientific users
at the connected institutions. In the beginning it was connected four universities
and enabled scientists to share resources.
It was headed by Dr. J.C.R. Licklider.
Question No: 35 ( Marks: 5 )
Define professional ethics and its benefits with an example?
Question No: 36 ( Marks: 5 )
Write JavaScript code for the following:
Make a function compareWithTen(value)
Compare the function argument with ‘10’ and display a message whether the
value is less than, equal to or greater than 10.
Question No: 1 ( Marks: 1 ) - Please choose one
In a good presentation each slide should contain____________.
► Heading
► Phrases not sentences
► Sentences not phrases
► Heading, sentences not phrases
Question No: 2 ( Marks: 1 ) - Please choose one
Which one of the following is not an event handler's attribute?
► Function
► Identifier
► Equal sign
► String consisting of JavaScript statements
Question No: 3 ( Marks: 1 ) - Please choose one
According to the heuristic, the number of defects remaining in a system after a
given level of tests is proportional to ___________.
► The number found on very first day.
► The number found during the development.
► The number found during the test.
► None of the given options.
Question No: 4 ( Marks: 1 ) - Please choose one
Which one is the best option for designing a Medical Expert System?
► Rule Based System
► Genetic Algorithm
► Fuzzy Logic
► Neural Network
Question No: 5 ( Marks: 1 ) - Please choose one
A combination of word processing and graphic design is
► Corel Draw
► Desktop Publishing
► Paint
► WordPad
Question No: 6 ( Marks: 1 ) - Please choose one
A microprocessor can be made more powerful by increasing its ________
► Clock frequency
► Word length
► Clock frequency and Word length
► None of above
Question No: 7 ( Marks: 1 ) - Please choose one
Security can also be improved through _____________.
► Encryption
► Typing errors
► Transmission errors
► Hardware malfunctions
Question No: 8 ( Marks: 1 ) - Please choose one
______________ is a field that uniquely identifies each record stored in a table.
► Composite Key
► Primary key
► Foreign key
► None of the given options
Question No: 9 ( Marks: 1 ) - Please choose one
There are _________ types of errors.
►2
►3
►4
►5
Question No: 10 ( Marks: 1 ) - Please choose one
______ is simply a fast port that lets you connect computer peripherals and
consumer electronics to your computer without restart.
► Freeware
► Shareware
► Firewire
► Firmware
Question No: 11 ( Marks: 1 ) - Please choose one
___ provides a simple, consistent way for applications to interact with the HW
without having to know all the details of the HW
► Explorer.exe
► System Files
► Operating System
► Application Software
Question No: 12 ( Marks: 1 ) - Please choose one
One can browse documents residing on a remote computer using ________
protocol.
► HTTP
► SMTP
► FTP
► TELNET
Question No: 13 ( Marks: 1 ) - Please choose one
Which event handler executes the specified JavaScript code when a window/form
element loses focus ?
► onBlur
► onLoad
► onUnload
► onFocus
Question No: 14 ( Marks: 1 ) - Please choose one
Which event handler executes the specified JavaScript code when a window/form
element receives focus ?
► onBlur
► onLoad
► onUnload
► onFocus
Question No: 15 ( Marks: 1 ) - Please choose one
_____________ loop is a flow control statement that allows code to be executed
repeatedly based on a given Boolean condition.
► For
► Do-While
► If-else
► While
Question No: 16 ( Marks: 1 ) - Please choose one
A B C D
4 ABC003 65 =c4=c4
Expression format in cell D4 is NOT correct.
► True
► False
Question No: 17 ( Marks: 1 ) - Please choose one
for(var i=1; i<=2;i=i+1)
{
document.write( "Sorted Words:" + "
")
}
Which of the following shall be the output of above code:
► Sorted Words: Sorted Words:
► Sorted Words:
Sorted Words:
► Sorted Words: “
”
Sorted Words: “
”
► Sorted Words:
Sorted Words:
Question No: 18 ( Marks: 1 ) - Please choose one
Data integrity, in Database management system is necessary because it:
► Refers to provide insecurity to the data
► Refers to provide security to the data
► Refers to maintaining the correctness of data
► Refers to maintaining the consistency of the data
Question No: 19 ( Marks: 1 ) - Please choose one
Which of the following formula is used in spreadsheet for addition?
► C6+E6
► =C6+E6
► 6+6=12
► 6+E6
Question No: 20 ( Marks: 1 ) - Please choose one
Which of the following keyword is used to jump out of switch statement
as soon as the match is found?
► Default
► Else
► Jump
► Break
Question No: 21 ( Marks: 1 ) - Please choose one
How many types the string methods have?
►1
►2
►3
Question No: 22 ( Marks: 1 ) - Please choose one
Which Internet Service is comparatively Slow but Inexpensive and Fast.
► E-mail
► Instant Messaging
► Web
► None of the given
Question No: 23 ( Marks: 1 ) - Please choose one
Semantic web is ________ .
► The extension of web
► Designed for both human beings and computers
► The extension of web and Designed for both human beings and
computers
► None of the given
Question No: 24 ( Marks: 1 ) - Please choose one
Coding is the responsibility of ________________
► Software designer
► Software developer
► Project manager
► None of given
Question No: 25 ( Marks: 1 ) - Please choose one
Run time error occurs when ___________ .
► The complier compiles the programs
► The compiler ends the execution of the program
► The compiler start running the program
► The compiler finds a semantic error
Question No: 26 ( Marks: 1 ) - Please choose one
Heuristics are ________ .
► Intelligent systems
► Always ends with the solution of the problem
► Both of the given
► None of the given
Question No: 27 ( Marks: 2 )
What are application softwares? List down the names of three application
softwares.
Definition: Application Software are that software then can interact directory with
the user for performance of respective type of work.
Following are the types of Application Softwares:-
· AutoCAD and Corel Draw
· Business Software
· Productivity SW
· Games Software
Question No: 28 ( Marks: 2 )
Why Local variable is preferred over Global variable ?
In my point of view Global variable has some advantage with Local variables is
preferred due to the following reasons:-
When we declare any global variable in web page then in case of error and logic
it’s very difficult to see on which line this variable is used and what’s his value if
we have more than 2000 lines and all the functions in web page using that Global
Variable so Global variables can make the logic of a Web page difficult to
understand.
As we know we can use Global variable everywhere so Global variables also
make the reuse and maintenance of your code much more complex.
Question No: 29 ( Marks: 2 )
In JavaScript, what is event handling? What are the two types of events?
In java script we can capture events on do some operation on the basis of that
particular event. For example we want to load some data on web page then with
the help of event handling we can do this operation by using onLoad event.
We can put Event handlers in the body of web page and also in attributes of
HTML. From the attribute we can call any JavaScript function that will do his
operation and come back. Now we can also interact with server side with the
help of AJAX in JavaScript function.
In-Line Event Handling
We can place event handlers in the BODY part and also in HTML attributes the
event handlers attributes consist of 3 parts the event handler, equal sign and a
string of JavaScript statement enclosed in quotes (single or double). And one
more thing these should be put in one line without newline due to this
sophisticated event handling is not possible with in-line event handling.
Question No: 30 ( Marks: 2 )
What is Structured Vector Graphics ?
This is a plug-in that is required to view swf (flash) files in the web
browser
Question No: 31 ( Marks: 3 )
What kind of new jobs are created because of computing? And which old
professions are being eliminated?
Due to computing where people are getting benefits from automated systems on
the other hand the people that are with KHATA system or Manual system and
they don’t know about computers are eliminated due to this reason and people
take place of many people. We can see in the offices where before computer if
there are four person required now only one person is required for example with
the help of database we can store more than thousand of information and only
one person is managing the whole data that is DBA. In the old system many
people are writing the data in registers and then its also very difficult to find the
specific record.
Now we can see companies are hiring:-
Data Entry Operators
System Engineers
Software Developer
DBA etc.
Question No: 32 ( Marks: 3 )
What are Logic- or Time-Bombs ?
It execute the payload when predetermined event occurs
For example use type particular phrase and particular data is reached.
Question No: 33 ( Marks: 3 )
What do you mean by FTP or File Transfer Protocol?
This protocol is used to upload the files on remote computers. This is used to
transfer files between computer on TCP/IP network e.g. internet and now a day’s
many software are available for uploading files using FTP like Mozila FTP, cute
FTP etc.
Question No: 34 ( Marks: 5 )
Why should we, as computing professionals, be interested in studying the social
implications of our creations?
If we see our life then we can judge computing technology is changing our life
fast if we compare with other technology.
We should highlight the mistakes and successes of the past. We should learn
then and select future direction accordingly. Computers are keep becoming more
and more powerful and gaining more autonomy.
Powerful Global Corporation.
The network Organization
Question No: 35 ( Marks: 5 )
How DoS attack is a cyber crime? For what cyber crime can be used?
DoS is the crime but of a new type. A new type for policing system is
required to tackle such crimes.
Cyber Crime can be used to Damage a home computer, Bring down the
Business, Weaken the financial and defense system of country.
Question No: 36 ( Marks: 5 )
What are the key characteristics of internet? Write the names of any
five.
Question No: 1 ( Marks: 1 ) - Please choose one
Which of the following hardware component of a computer can also be
called as engine?
► Bus
► Storage
► Memory
► Processor
Question No: 2 ( Marks: 1 ) - Please choose one
To improve the time for scannig a web page, text should be ___________.
► Centered
► Left Aligned
► Right Aligned
► Staggered
Question No: 3 ( Marks: 1 ) - Please choose one
__________% of the users have left websites in frustration due to poor navigation.
► 40
► 62
► 83
► 91
Question No: 4 ( Marks: 1 ) - Please choose one
Logical operation that is performed on single input variable is ---------------
► AND
► OR
► NOT
► NOR
Question No: 5 ( Marks: 1 ) - Please choose one
Which one is correct for JavaScript?
► onMouseOver
► OnMouseOver
► onmouseover
► All of the given
Question No: 6 ( Marks: 1 ) - Please choose one
A group of statements that are put together (or defined) once and then can be
used (by reference) repeatedly is called ____________.
► Repeater
► Array
► Function
► Pointer
Question No: 7 ( Marks: 1 ) - Please choose one
___________ color should be used in background for a good presentation.
► Light
► Dark
► Red
► None of the given options
Question No: 8 ( Marks: 1 ) - Please choose one
Which one of the following is NOT a primary color?
► Red
► Green
► Yellow
► Blue
Question No: 9 ( Marks: 1 ) - Please choose one
Which of the following is a true statement?
► Flat-file storage is better than tabular storage.
► Tabular storage is better than flat-file storage.
► Flat-file storage is better than relational storage.
► None of the given options
Question No: 10 ( Marks: 1 ) - Please choose one
Due to working at home, lack of interaction may result in ___________
professional growth.
► Slower
► Faster
► Higher
► Improved
Question No: 11 ( Marks: 1 ) - Please choose one
_____________ team is responsible for a project after the specification’s stage till
the very end.
► Executive
► Architect
► Development
► HR
Question No: 12 ( Marks: 1 ) - Please choose one
_____________ team consists on the sharpest technical minds in the company.
► Architecture
► Business Development
► Configuration Management
► Developer
Question No: 13 ( Marks: 1 ) - Please choose one
Smart editors can automatically color different parts of statements in different
colors e.g. comments in ____________ color.
► Green
► Grey
► Blue
► Red
Question No: 14 ( Marks: 1 ) - Please choose one
When the packets reach at destination, __________ reassembles them into
original message.
► Protocol
► TCP
► IP
► NIC
Question No: 15 ( Marks: 1 ) - Please choose one
In a System having many parts to be designed, one should always do the _____
first
► Hard part
► Simple part
► Development part
► Quality part
Question No: 16 ( Marks: 1 ) - Please choose one
Heuristics _______ lead to the best results.
► Sometimes
► Do not
► Occasionally
► Not always
Question No: 17 ( Marks: 1 ) - Please choose one
One can run a program on a remote computer using ________ protocol.
► HTTP
► SMTP
► FTP
► TELNET
Question No: 18 ( Marks: 1 ) - Please choose one
Which protocol is used to send email ?
► FTP
► SMTP
► TELNET
► All of the given choices
Question No: 19 ( Marks: 1 ) - Please choose one
Which event handler executes the specified JavaScript code when a
window/form element loses focus ?
► onBlur
► onLoad
► onUnload
► onFocus
Question No: 20 ( Marks: 1 ) - Please choose one
_____ is the process of analyzing large databases to identify patterns.
► Data normalization
► Data management
► Data Mining
► None of the given options
Question No: 21 ( Marks: 1 ) - Please choose one
Which is the user-friendly way of presenting data ?
► Query
► Form
► Report
► All of the given options
Question No: 22 ( Marks: 1 ) - Please choose one
JavaScript is an ______________________ language.
► Markup language
► Structured language
► Object based language
► None of the Given options
Question No: 23 ( Marks: 1 ) - Please choose one
In latest computers, ___________ are used instead of a vacuum tube
► Diodes
► Triodes
► ICs
► Transistors
Question No: 24 ( Marks: 1 ) - Please choose one
---------------is the process of starting or restarting a computer.
► BIOS
► Refreshing
► Booting
► None of given
Question No: 25 ( Marks: 1 ) - Please choose one
Java script supports drawing of objects.
► True
► False
Question No: 26 ( Marks: 1 ) - Please choose one
Computer programmer that perform various actions continuously, autonomously
on behalf of their principal is known as ______________ .
► Robotics
► Mobile agents
► Decision Support System
► None of above
Question No: 27 ( Marks: 2 )
What is internet?
The Internet is a global system of interconnected computer networks that use the
standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. It is
a network of networks that consists of millions of private, public, academic,
business, and government networks of local to global scope that are linked by a
broad array of electronic and optical networking technologies. The Internet
carries a vast array of information resources and services, most notably the inter-
linked hypertext documents of the World Wide Web (WWW) and the
infrastructure to support electronic mail.
Question No: 28 ( Marks: 2 )
Write names of the DoS attack’s phases?
Question No: 29 ( Marks: 2 )
Write HTML format to include gif and jpg images in a web page.
Question No: 30 ( Marks: 2 )
What is best algorithm?
Question No: 31 ( Marks: 3 )
What kind of new jobs are created because of computing? And which old
professions are being eliminated?
Question No: 32 ( Marks: 3 )
Briefly mention any three problems in old modes of presentation development
Lack of resolution
Low color configuration
No graphic animation
Question No: 33 ( Marks: 3 )
Differentiate between onLoad and onUnload
Question No: 34 ( Marks: 5 )
Why the quality of image in dithering scheme is not good?
Question No: 35 ( Marks: 5 )
Can a human doctor be replaced by an Expert System? Give reasons to support
your answer..
Question No: 36 ( Marks: 5 )
How many members are in the Process Team? What are the responsibilities of
the Process Team?
Question No: 1 ( Marks: 1 ) - Please choose one
Analytical Engine is ------------------
► An electrical machine
► A digital machine
► An analog machine
► A special purpose machine
Question No: 2 ( Marks: 1 ) - Please choose one
__________% of the users have left websites in frustration due to poor navigation.
► 40
► 62
► 83
► 91
Question No: 3 ( Marks: 1 ) - Please choose one
__________ breaks down the message to be sent over the internet into packets.
► FTP
► HTTP
► TCP
► IP
Question No: 4 ( Marks: 1 ) - Please choose one
The first spread sheet was called as_____________.
► Excel
► PowerPoint
► Word
► VisiCalc
Question No: 5 ( Marks: 1 ) - Please choose one
Which is correct?
► onUnload
► onUnLoad
► onUNLOAD
► All of the above
Question No: 6 ( Marks: 1 ) - Please choose one
Variables allow us to manipulate data through the ___________.
► Actual Value
► Reference
► Length
► Name
Question No: 7 ( Marks: 1 ) - Please choose one
We use ___________ to stop Break-Ins.
► Scanners
► Intrusion detectors
► Utilities
► None of the given options
Question No: 8 ( Marks: 1 ) - Please choose one
Which attribute of the IMG tag tells us about the source of the image ____________.
► source
► path
► loc
► src
Question No: 9 ( Marks: 1 ) - Please choose one
The developer report to ___________ in a development team.
► Team Lead
► Project Manager
► CEO
► IT Manager
Question No: 10 ( Marks: 1 ) - Please choose one
The key responsibilities of the architect of the project is______________.
► Technology selection
► High-level design
► Makes certain that the implementation remains true to the design
► All of the given options
Question No: 11 ( Marks: 1 ) - Please choose one
Using smart editors they can automatically color different parts of statements in
different colors e.g. HTML tags in ____________ color.
► Green
► Grey
► Blue
► None of the given options
Question No: 12 ( Marks: 1 ) - Please choose one
_______ is responsible for all the essential operations like basic house keeping, task
scheduling, etc. Also contains low-level HW interfaces
► Hardware
► Device Manager
► Kernel
► Device Driver
Question No: 13 ( Marks: 1 ) - Please choose one
Randomized algorithms are often ________ than deterministic algorithms for the
same problem.
► Simpler and more slow
► Simpler and more efficient
► Complex and more efficient
► Complex and more slow
Question No: 14 ( Marks: 1 ) - Please choose one
Compound Statement after decision constructs in JavaScript is enclosed with
►( )
►[ ]
► { };
►{ }
Question No: 15 ( Marks: 1 ) - Please choose one
The key property of the ‘Array’ object in JavaScript is
► Value
► Length
► Name
► All of the given choices
Question No: 16 ( Marks: 1 ) - Please choose one
Which protocol is used to send email ?
► FTP
► SMTP
► TELNET
► All of the given choices
Question No: 17 ( Marks: 1 ) - Please choose one
Following is highest level of heading tag in list given below.
► H3
► H4
► H5
► H2
Question No: 18 ( Marks: 1 ) - Please choose one
Blue Pacific is a name of ______ computer.
► Mini
► Desktop
► Micro
► Super
Question No: 19 ( Marks: 1 ) - Please choose one
__________ correctness is easier to check as compared with __________
► Syntactic, Semantic
► Semantically, Syntactically
► Systematically, Semantically
► None of the given options
Question No: 20 ( Marks: 1 ) - Please choose one
__________ refers maintaining the correctness and consistency of data
► Security
► Integrity
► Reliability
► None of the given
Question No: 21 ( Marks: 1 ) - Please choose one
Which of the following keyword is used to jump out of switch statement as soon as
the match is found?
► Default
► Else
► Jump
► Break
Question No: 22 ( Marks: 1 ) - Please choose one
How much parameters does POW () function have?
►2
►1
►3
Question No: 23 ( Marks: 1 ) - Please choose one
How many types the string methods have?
►1
►2
►3
Question No: 24 ( Marks: 1 ) - Please choose one
The output of document.write( "2" + Math.PI ) ; is__________.
► 23.141592653589793
► 3.146
► 2.3141592653589793
► None of them
Question No: 25 ( Marks: 1 ) - Please choose one
POP, IMAP and SMTP are related to one of the following service/services?
► Electronic Mail
► Instant Messaging
► Both a and b
► None of above
Question No: 26 ( Marks: 1 ) - Please choose one
_______ is designed for 2D-Animation .
► Flash Animation
► HTML image class
► Web Browser
► HTML 2D class
Question No: 27 ( Marks: 2 )
Define the term 3D Rendering
The process of converting information about 3-D objects into a bit-map that can be
displayed on a 2-D computer display.
Question No: 28 ( Marks: 2 )
What is an intelligent system?
SW programs or SW/HW systems designed to perform complex tasks employing
strategies that mimic some aspect of human thought.
Question No: 29 ( Marks: 2 )
Define testing with respect to programming..
Testing:- The tasks performed to determine the existence of defects.
Programming:- The process of telling the computer what to do.
Question No: 30 ( Marks: 2 )
What is a compiler? Write its one benifit over interpreter.
Question No: 31 ( Marks: 3 )
Who is a Computing Professional?
Question No: 32 ( Marks: 3 )
What are Trojan Horses ?
Question No: 33 ( Marks: 3 )
What is ICMP?
Question No: 34 ( Marks: 5 )
What is ARPANET and who developed it?
Question No: 35 ( Marks: 5 )
Write down the advantages of Natural Language Processing.
Question No: 36 ( Marks: 5 )
Draw hierarchy of the people in the small project?
Question No: 31 (Marks: 1)
What is heuristic?
Heuristic is a procedure that usually, but not always, works or that gives nearly
the right answer.
Question No: 32 (Marks: 1)
In programming, what is an object?
Object is a named collection of properties (data, state) & methods (instructions,
behavior).
Question No: 33 (Marks: 2)
What is spreadsheet? List any two jobs that it can do.
A spreadsheet is a grid that organizes data into columns and rows. Spreadsheets
make it easy to display information, and people can insert formulas to work with
the data.
Electronic replacement for ledgers
Charts
Financial-forecasting.
Question No: 34 (Marks: 2)
In JavaScript, what is event handling? What are the two types of events?
In JavaScript capturing events and responding to them is event handling. The
system sends events to the program and the program responds to them as they
arrive.
1. Events can include things a user does - like clicking the mouse.
2. Events that the system itself does - like updating the clock.
Question No: 35 ( Marks: 3 )
Explain how many ways businesses monitor their employees?
• Systems are available that monitor almost every key stroke that an employee
makes on a computer.
• Systems are available that read and censor all incoming and outgoing eMail.
• It is quite straight forward to monitor where you surf the web.
Question No: 36 ( Marks: 3 )
What is difference between Design and System Architecture?
System architecture is the conceptual design that defines
the structure and/or behavior of a system. Whereas designs it as an
independent, self-contained system.
Question No: 37 ( Marks: 3 )
What are the Sub categories of Artificial Intelligence? Briefly explain any
two.
1. Expert systems:
Expert system is that system which is in some limited sense, can replace an
expert.
2. Robotics:
Robotics is an automatic machine that performs various tasks that were
previously done by humans.
Question No: 38 ( Marks: 5 )
How many ways are there to call a function in a program? Explain with
example.
Two Ways of Calling Functions:
Functions do not run automatically. When the page loads, each function waits
quietly until it is told to run.
1. A function calls appearing as a complete statement:
function popUp( message ) {
window.alert( message ) ;
}
popUp( “Warning!” ) ;
2. A function calls appearing as part of a statement. Definitions of such
functions include a ‘return’ statement:
function add( a, b ) {
c=a+b;
return c ;
}
sum = add( 2, 4 ) ;
document.write( sum ) ;
Question No: 39 ( Marks: 5 )
Elaborate the ‘+ ’ operator and its constraints with the help of examples.
The + Operator Used on Strings. The + operator can also be used to add string
variables or text values together. To add two or more string variables together,
use the + operator.
Example:
txt1="What a very";
txt2="nice day";
txt3=txt1+txt2;
Now txt3 will be having this value "What a very nice day".
txt3=txt1+txt2; this statement due to + sign.
Question No: 40 ( Marks: 10 )
Write a JavaScript program having two functions sum and mean.
The web page will ask the user to enter five values to be added.
After taking input it will calculate the sum and mean of those values by
calling sum and mean functions.
Question No: 41 ( Marks: 10 )
Define the following terms.
Object
Object is a named collection of properties (data, state) & methods (instructions,
behavior).
Event Handler
An event handler is a command which calls a function when an event happens,
such as the user clicking a button.
Local Variable
Declaring variables (using the var keyword) within a function makes them local.
They are available only within the function and hold no meaning outside of it.
Scope of Variable
Defining the space in which a variable is effective is known as defining the scope
of a variable. A variable can be either local or global in scope.
Array
Array is an indexed list of elements.
Question No: 27 ( Marks: 1 )
What BIOS stands for?
BIOS stand for Basic input/output system.
Question No: 28 ( Marks: 1 )
List down the Analytical Engine's components name (any two)
Input
Memory
Processor
Output.
Question No: 29 ( Marks: 2 )
Why uploading a web page is important? Describe in 2 – 3 lines.
By only uploading webpage we could place our information so that other can
reach up to what we have loaded. Upload means make available our data or
information for the world web browsers.
Question No: 30 ( Marks: 3 )
What is the difference between microprocessors and microcontrollers?
Give one example of both.
The microprocessor is electronic equipment which can perform several functions
and also processing of data and information present in a computer, while
microcontroller can only perform one function for that its design.
Example:
Microprocessor: Pentium 4 & Personal Computer.
Microcontroller: Electrical device, washing machines, microwave ovens,
telephones etc.
Question No: 31 ( Marks: 5 )
Differentiate uni-Processor OS from Multi-Processor OS.
Uni-processor OS’es is designed to schedule tasks on a single uP only whereas
Multi-processor OS’es can control computers having multiple uPs, at times
1000’s of them.
Question No: 32 (Marks: 5)
Why do we call JavaScript an Object-based Language?
JavaScript shares many similarities with object-oriented languages, and therefore
is called an object-based language.
Question No: 31 (Marks: 1)
When does recursion occur?
Question No: 32 (Marks: 1)
What are the types of computer network according to the distance
between nodes?
There are two types of networks.
1. LAN (Local Area Network)
2. WAN (Wide Area Network)
Question No: 33 (Marks: 2)
What is meant by semantic error?
Occur when a statement executes and has an effect not intended by the
programmer and Often times occur only in unusual & infrequent circumstances.
Question No: 34 (Marks: 2)
List down the names of two array methods available in JavaScript.
1. sort( ) [sorts elements in alphabetical order].
2. reverse( ) [Reverses the order of elements].
Question No: 35 ( Marks: 3 )
How can you define a consistent web design? Why is it needed?
A consistent good designed website is generated for general public that allows
users to attain what they want as quickly as possible without spending much
effort. A consistent good design is needed to assists the user in recovering from
errors.
Question No: 36 ( Marks: 3 )
How can we include images in a web page using HTML and Java script?
Image in HTML
<IMG src=URL, alt=text height=pixels width=pixels align="bottom|middle|top">
Image in Javascript
Images in JavaScript can be manipulated in many ways using the built-in object
Image.
Additional properties to HTML are hspace, vspace & lowsrc.
Example: It can be used by many handlers like, onAbort, onLoad & onError
Question No: 37 ( Marks: 3 )
The event handler attribute consists of three parts. Write about each of
them.
1. The identifier of the event handler.
2. The equal sign.
3. A string consisting of JavaScript statements enclosed in double or single
quotes.
Question No: 38 (Marks: 5 )
What is a packet in the network environment? What kind of information
does it contain?
A packet is the smallest unit of data transmitted over a computer network. It’s a
message to be transferred over the network is broken up into small packets by
the sending computer.
Each packet contains the following info:
–Sender's address
–Destination address
–Data
–Error-recovery info.
Question No: 39 ( Marks: 5 )
Suppose we have a big project. Draw hierarchy of the people involved in
the project?
Executive Team
CEO, COO,
CMSO
Architecture
Team
Business Technology
Development Team Transfer
Team
Configuration Process
Management Team
Team Quality Support
Assurance Team
Team
Quality
Development Development Development Development
Team A Team B Team C Team D
Question No: 40 ( Marks: 10 )
Write down HTML and JavaScript code for the following requirements:
Declare an Array with the identifier SUBJECT having length 5. Assign following
values to the array elements:
MIS, Java, Algorithms, Databases, C++
Show all values in reverse order.
Question No: 41 ( Marks: 10 )
How instant messaging works? Write the steps involved in this process.
The Instant Messaging services available allow us to maintain a list of people
(contacts) that we interact with regularly. We can send instant messages to any
of the contacts in our list as long as that contact is online.
Following steps are involved in IM working:
1. User commences the IM client.
2. IM client finds the IM server & logs in.
3. It launches communication info (IP address, etc) to the IM server.
4. IM server finds user’s contacts & sends him/her the communication info.
5. IM server also notifies the contacts that the user is online; sends his/her
communication info to them.
6. The user’s & the contact’s IM clients are ready to communicate directly
(P2P).
7. As new contact has come online, IM server informs them about the user
being online & vice versa.
8. Multiple, real-time chat are possible.
9. When the user logs-off, his/her IM client informs the IM server.
10. IM server wipes away the temporary file and informs the user’s contact’s
about his/her ‘offline’ status.
Question No: 5 ( Marks: 10 )
What kind of operations takes place
inside Microprocessors Building Blocks? Enlist them with brief
description.
Bus Interface Unit: The bus interface unit is the part of the processor that
interfaces with the rest of the PC. Its name comes from the fact that it deals with
moving information over the processor data bus.
Instruction Decoder: The instruction decoder of a processor is a combinatorial
circuit sometimes in the form of a read-only memory, sometimes in the form of an
ordinary combinatorial circuit.
Arithmetic & Logic Unit (ALU): An arithmetic and logical unit (ALU) also known
as “Integer Unit” is one of the core components of all central processing units. It
is capable of calculating the results of a wide variety of common computations.
Floating-Point Unit (FPU): A floating point unit (FPU) is a part of a CPU
specially designed to carry out operations on floating point numbers.
Registers: A register is a device for storing data. It is a small amount of very
fast computer memory used to speed the execution of computer programs by
providing quick access to commonly used values.
Control Unit: A control unit is the part of a CPU or other device that directs its
operation. The outputs of the unit control the activity of the rest of the device.
Instruction Set: This is the set of machine instructions that a microprocessor
recognizes and can execute. It is the only language microprocessor knows.
Question No: 7 ( Marks: 8 )
a) Differentiate between SMTP and POP3 server. (3 marks)
SMTP (Simple Mail Transfer Protocol) is a protocol used to send and receive
eMail messages over a TCP/IP network. Whereas POP3 (Post Office Protocol) is
a protocol used for receiving eMail messages. A POP3 server maintains text files
(one file per user accounts) containing all messages received by a user. eMail
client interacts with the POP3 server for discovering and downloading new eMail
messages.
b) How can you justify that a DBMS is better to use than Flat-file database?
(5 marks)
A DBMS takes care of the storage, retrieval, and management of large data sets
on a Database. It provides SW tools needed to organize & manipulate that data
in a flexible manner.
Whereas in Flat-file database the text file format makes it hard to search for
specific information or to create reports that include only certain fields from each
record.
Question No: 8 ( Marks: 8 )
What will be the output of this programme? Write comments where you
find “//” symbol in the following code.
<html>
<head>
<script language="JavaScript">
function doSomething() { // 1
setTimeout('doSomething()',10000); // 2
}
</script>
</head>
<body onLoad="doSomething()"> // 3
document.write(“Virtual University of Pakistan”);
</body>
</html>
// 3 document.write(“Virtual University of Pakistan”);
Question No: 9 ( Marks: 8 )
a) How Trojan Horses and Worms affect a computer system? What
guidelines should be adopted to troubleshoot with malicious software? (6
marks)
Trojan horses are stand-alone programs. The look like what they are not and
appear to be something interesting and harmless (e.g. a game) there execution
results in destruction. Worms only make copies of themselves on the infected
computer.
Following guidelines should be adopted to troubleshoot with malicious software:
• Download SW from trusted sites only.
• Do not open attachments of unsolicited eMails.
• Use floppy disks and CDROMs that have been used in trusted computers only.
• When transferring files from your computer to another, use the write-protection
notches.
• Stay away from pirated SW.
• Regularly back your data up.
• Install Antivirus SW; keep it and its virus definitions updated.
b) Which part of a virus consists of malicious computer instructions? (2
marks)
Payload is the part of virus that generally consists of malicious computer
instructions.
Question No: 31 ( Marks: 1 )
What is the function of Network Interface Card?
NIC is an I/O device that plugs into the computer and it enables it to
communicate over a network.
Question No: 32 (Marks: 1)
In programming, what is a loop?
A loop is a programming language statement which allows code to be
repeatedly executed.
Question No: 33 (Marks: 2)
What is an intelligent system?
Intelligent system is a SW programs or SW/HW systems designed to perform
complex tasks employing strategies that mimic some aspect of human thought.
Question No: 34 (Marks: 2 )
Why hub is used in networks?
Hub is networking equipment and a device which connects several computers to
form a network. In a network the NIC translates the message into electrical
pulses suitable for the computer network in use & transmits it to the hub through
the cable. The hub receives them and forwards them to all computers connected
to it.
Question No: 35 ( Marks: 3 )
What are Trojan Horses?
Trojan Horses are unlike viruses, they are stand-alone programs. The look like
what they are not. They appear to be something interesting and harmless (e.g. a
game) but when their execution result in destruction.
Question No: 36 (Marks: 3)
Elaborate with examples Vector or Object oriented graphics.
Vector or Object-Oriented Graphics treats everything that is drawn as an object.
Objects retain their identity after they are drawn. These objects can later be
easily moved, stretched, duplicated, deleted, etc
They are resolution independent and relatively small file size.
Examples: swf, svg, wmf, ps.
Question No: 37 (Marks: 3)
How can you define a consistent web design? Why is it needed?
A consistent web design should be the one that achieves the result that it was
designed for, that result can only be achieved by giving the user what he wants,
as quickly as possible, without her/him expending much effort. One definition of
usability: Let the user have what he wants, quickly, without much effort “Quickly”
is important!
Question No: 39 (Marks: 5)
What are the advantages of multimedia presentations? Write any five.
Following are the advantages of multimedia presentations:
· Great tool for effectively communicating ideas to an audience
· All electronic
· Easy to make last minute changes
· The undo feature encourages experimentation
· More attractive; commanded more interest
· May include animations, sound, video
· Easy to catalog, store, and recall
· Great tool for making presenter-free interactive material (e.g. self-learning
tutorials)
Question No: 41 (Marks: 10)
How virtual communities are formed? How these are different from other
communities? Give examples.
Virtual Communities are interest-based communities. Members with common
interest share ideas, ask questions, post answers and make announcements
through mailing-lists, news groups or message boards. This is how they are
formed. These communities are definitely very different from traditional ones.
There are generally no bars on membership based on gender, race or religion.
However, they may lack the respect for the individual and civility that are the
norm within conventional, geography-based communities.
Question No: 1 ( Marks: 1 ) - Please choose one
__________ breaks down the message to be sent over the internet into
packets.
► FTP
► HTTP
► TCP (page.no.317)
► IP
Question No: 2 ( Marks: 1 ) - Please choose one
A protocol used for receiving email messages is called ____________.
► URL
► Telnet
► POP3 (page.no.213)
► SMTP
Question No: 3 ( Marks: 1 ) - Please choose one
Aliasing problem can be managed by ____________the size of pixels.
► Reducing (page.no.236)
► Increasing
► Gaining
► Modifying
Question No: 4 ( Marks: 1 ) - Please choose one
Variables allow us to manipulate data through the ___________.
► Actual Value
► Reference (page.no.143)
► Length
► Name
Question No: 5 ( Marks: 1 ) - Please choose one
The __________ reserved word allows a determined action to be taken if
the first condition is false.
► For
► While
► Else
► Switch
Question No: 6 ( Marks: 1 ) - Please choose one
ERP is a type of __________________ .
► Entertainment software
► Productivity software
► Business software
► Scientific software
Question No: 7 ( Marks: 1 ) - Please choose one
What is/are the use/uses of Word processor?
► To write a letter
► To write Research paper or report
► To create address labels
► All of the given
Question No: 8 ( Marks: 1 ) - Please choose one
Command that allows you to recover form mistakes is called __________.
► Clear
► Edit
► Undo
► Break
Question No: 9 ( Marks: 1 ) - Please choose one
Automatic machines performing various tasks that were previously done
by humans, are called ____________.
► Robotics (page.no.244)
► Computers
► Decision Making Systems
► Autonomous Web Agents
Question No: 10 ( Marks: 1 ) - Please choose one
The ______ is connected to all other modules of the microprocessor.
► Control unit
► Memory unit
► Floating Point unit
► Arithmetic and Logic unit
Question No: 11 ( Marks: 1 ) - Please choose one
Database consisting of two or more related tables, is called
_____________.
► Flat file database
► Object oriented database
► Tabular storage database
► Relational database (page.no.263)
Question No: 12 ( Marks: 1 ) - Please choose one
_________ can be used for entering, editing, or viewing data, one record at
a time.
► Queries
► Forms (page.no.263)
► Reports
► None of the given options
Question No: 13 ( Marks: 1 ) - Please choose one
Distance learning has got a boost due to the ___________.
► Easy communication
► Online interactive contents
► Flexibility
► All of the given options
Question No: 14 ( Marks: 1 ) - Please choose one
____________ DBMS supports data in terabytes.
► Personal
► Desktop
► Enterprise
► Single-user
Question No: 15 ( Marks: 1 ) - Please choose one
After the DoS attack in year 2000, Yahoo servers were recovered in
__________.
► 1 hour
► 2 hours
► 3 hours
► 4 hours
Question No: 16 ( Marks: 1 ) - Please choose one
When web server is busy it gives the following message to the user :
► Time out
► Waiting
► Server busy
► None of the given options
Question No: 17 ( Marks: 1 ) - Please choose one
To stop industrial espionage, we use__________.
► Private network
► Encryption
► Network sniffer
► All of the given options (page.no.277)
Question No: 18 ( Marks: 1 ) - Please choose one
_______________ based communication allows business entities to
coordinate the activities of their globally spread units with greater
accuracy.
► Intranet
► Internet
► Home
► LAN
Question No: 19 ( Marks: 1 ) - Please choose one
onAbort , onError are the _______________ of the image object.
► Event Handler (page.no.286)
► Properties
► Methods
► None of the given options
Question No: 20 ( Marks: 1 ) - Please choose one
Processed data is called ________.
► Information
► Data
► Entity
► Attribute
Question No: 21 ( Marks: 1 ) - Please choose one
______ is a client program that uses HTTP to make requests to Web
servers throughout the internet on behalf of the user.
► Web Application
► Web Browser (page.no.18)
► Internet Application
► HTML
Question No: 22 ( Marks: 1 ) - Please choose one
_______ consists of cells arranged in rows & columns
► Spreadsheets Software
► Word processor
► Presentation Software
► Microsoft Paint Software
Question No: 23 ( Marks: 1 ) - Please choose one
Flow control constructs in JavaScript includes:
► If-Else
► Loops and If -Else
► Switch and If-Else
► All of the given choices
Question No: 24 ( Marks: 1 ) - Please choose one
Which is NOT true for JavaScript variable name ?
► Student
► Roll_no_1111
► For
► _schedule
Visit this page
http://groups.google.com/group/vuZs
Question No: 25 ( Marks: 1 ) - Please choose one
In JavaScript, second element of an array has the index:
►2
►0
►1
►3
JAVASCRIPT ARRAY BASICS
5 May 2008 ... In this tutorial you learn what a JavaScript array is, ... The
first element hasan index of 0, the second element has an index of 1, ...
www.elated.com/articles/javascript-array-basics/ - Cached - Similar -
Question No: 26 ( Marks: 1 ) - Please choose one
Which protocol is used to control other computer from our own
computer ?
► FTP
► NNTP
► TELNET (page.no.211)
► None of the given choices
Question No: 27 ( Marks: 1 ) - Please choose one
______ occurs when a function calls itself.
► Recursion
► Call by value
► Call by reference
► Parsing
RECURSION - WIKIPEDIA, THE FREE ENCYCLOPEDIA
The function calls itself recursively on a smaller version of the input (n - 1)
and multiplies the result of the recursive call by n, until reaching the ...
en.wikipedia.org/wiki/Recursion - Cached - Similar -
Question No: 28 ( Marks: 1 ) - Please choose one
Which function returns a randomly selected floating point number between
0 and 1 ?
► floor(x)
► ceil(x)
► random()
► round(x)
Question No: 29 ( Marks: 1 ) - Please choose one
Using Java Script you can write a character at random location on screen
► By applying randomCh() method
► With the help of String object
► With the help of random character property
► There is no built in approach in Java Script
Question No: 30 ( Marks: 1 ) - Please choose one
The most used form tag is the <input> tag.
► True
► False
Question No: 31 ( Marks: 1 )
What are the elements of website design? Any one
Question No: 32 ( Marks: 1 )
What kind of information can be stored in a database ?
Question No: 33 ( Marks: 2 )
What is meant by universal access of internet services ?
Question No: 34 ( Marks: 2 )
What is the database?
Question No: 35 ( Marks: 3 )
The event handler attribute consists of three parts. Write about each of
them.
Question No: 36 ( Marks: 3 )
What is difference between Design and System Architecture?
Question No: 37 ( Marks: 3 )
What are Trojan Horses ?
Question No: 38 ( Marks: 5 )
Differentiate between For and While loop by writing the syntax of both
loops.
Question No: 39 ( Marks: 5 )
Suppose we have a big project. Draw hierarchy of the people involved in
the project?
Question No: 40 ( Marks: 10 )
Write down output for the following JavaScript code.
a) <script type="text/javascript">
document.write(Math.sqrt(25)); // output ?
</script>
b) <script type="text/javascript">
document.write(Math.pow(5, 3)); // output ?
</script>
c) <script type="text/javascript">
document.write(Math.min(5, 3)); // output ?
</script>
d) <script type="text/javascript">
document.write(Math.max(5, 3)); // output ?
</script>
e) <script type="text/javascript">
document.write(Math.floor(9.87)); // output ?
</script>
Question No: 41 ( Marks: 10 )
Is tabular data storage better than flat file data storage? Justify your
answer.
Question No: 1 ( Marks: 1 ) - Please choose one
Which of the following hardware component of a computer can
also be called as engine?
► Bus
► Storage
► Memory
► Processor
Question No: 2 ( Marks: 1 ) - Please choose one
TCP stands for ___________.
► Total communication protocol
► Transmission control protocol (page. no.317)
► Transfer control protocol
► Transfer collection protocol
Question No: 3 ( Marks: 1 ) - Please choose one
__________ breaks down the message to be sent over the
internet into packets.
► FTP
► HTTP
► TCP (Page.no.317)
► IP
Question No: 4 ( Marks: 1 ) - Please choose one
A variable can be _________ in scope.
► Local
► Global
► Either local or global (page.no.204)
► None of the given options
Question No: 5 ( Marks: 1 ) - Please choose one
A protocol used for receiving email messages is called
____________.
► URL
► Telnet
► POP3
► SMTP (page.no.213)
Question No: 6 ( Marks: 1 ) - Please choose one
A function is also called __________.
► Sub-program
► Procedure
► Sub-routine
► All of the given option
Question No: 7 ( Marks: 1 ) - Please choose one
Capturing events and responding to them is called __________.
► Function Handling
► Event Handling (page.no.228)
► Event Procedure
► All of the given option
Question No: 8 ( Marks: 1 ) - Please choose one
Which one of the following is NOT a primary color?
► Red
► Green
► Yellow
► Blue
Question No: 9 ( Marks: 1 ) - Please choose one
__________ are those programs in which the flow of the program
is determined by the user's actions (mouse clicks, key presses)
or messages from other programs.
► Event called programs
► Event processed programs
► Event driven programs
► Event declared programs
Question No: 10 ( Marks: 1 ) - Please choose one
a = Math.ceil(12.01)
What will be the value of a ?
► 12
► 13
► 12.0
► 13.01
Question No: 11 ( Marks: 1 ) - Please choose one
Event handlers are placed in the ___________ portion of a Web
page as attributes in HTML tags.
► HEAD
► BODY (page.no229)
► SCRIPT
► TITLE
Question No: 12 ( Marks: 1 ) - Please choose one
_________ can be used for entering, editing, or viewing data,
one record at a time.
► Queries
► Forms (page.no.263)
► Reports
► None of the given options
Question No: 13 ( Marks: 1 ) - Please choose one
random() function returns a randomly-selected, floating-point
number between ____________.
► 0 and 1
► 0 and 10
► 0 and -10
► 0 and -1
Question No: 14 ( Marks: 1 ) - Please choose one
The organizations are learning that business can be done in a
more effective manner if emphasis is placed upon ___________.
► Cooperation
► Shared responsibility
► Networking
► All of the given options (page.no.281)
Question No: 15 ( Marks: 1 ) - Please choose one
In relational database, data store in the form of _____________.
► Tables (page.no.321)
► Rows
► Columns
► None of the given options
Question No: 16 ( Marks: 1 ) - Please choose one
Spies of one business monitoring the network traffic of their
competitors’ ___________.
► Industrial Intelligence
► Industrial Espionage (page.no.277)
► Industrial Spying
► Industrial Surveillance
Question No: 17 ( Marks: 1 ) - Please choose one
_____________ waits for some time and then launch a function.
► Timeout( )
► setTimeout( )
(page.no.290)
► setTime( )
► setTimeIn( )
Question No: 18 ( Marks: 1 ) - Please choose one
_______________ based communication allows business entities to
coordinate the activities of their globally spread units with
greater accuracy.
► Intranet
► Internet (page.no.294)
► Home
► LAN
Question No: 19 ( Marks: 1 ) - Please choose one
The key responsibilities of a project manager is _____________.
► Planning and tracking of the project
► Arranging of the appropriate resources
► Client relationship management
► All of the given options (page.no.296)
Question No: 20 ( Marks: 1 ) - Please choose one
_____________ team consists on the sharpest technical minds in
the company.
► Architecture (page.no.302)
► Business Development
► Configuration Management
► Developer
Question No: 21 ( Marks: 1 ) - Please choose one
Smart editors can automatically color different parts of
statements in different colors e.g. comments in ____________
color.
► Green
► Grey (page.no.315)
► Blue
► Red
Question No: 22 ( Marks: 1 ) - Please choose one
A collection of data organized in such a way that the computer
can quickly search for a desired data item is known as :
► Retrieving
► Database (page.no.321)
► Information
► DBMS
Question No: 23 ( Marks: 1 ) - Please choose one
Deep Blue was the name of
► computer (page.no.9)
► human
► city
► game
Question No: 24 ( Marks: 1 ) - Please choose one
Information available on the web is
► mostly free of cost
► costly
► very cheap
► of no use
Question No: 25 ( Marks: 1 ) - Please choose one
Which one is correct?
► <BODY></BODY>
► <body></body>
► Both <BODY></BODY> and <body></body> ( Ref: As
HTML is not case sensitive)
► <BODY/>
Question No: 26 ( Marks: 1 ) - Please choose one
_________ is the best known builder for supercomputers.
► Sun
► Cray Research (page.no.21)
► Microsoft
► Apple
Question No: 27 ( Marks: 1 ) - Please choose one
Which one is the example of spreadsheet software ?
► MS Word
► MS PowerPoint
► MS Excel
► MS Access
Question No: 28 ( Marks: 1 ) - Please choose one
Currently the BlueRay DVD can store more than ________ of
data.
► 10 GB
► 100 GB
► 50 GB (page.no.305)
► 150 GB
Question No: 29 ( Marks: 1 ) - Please choose one
Blue Pacific is a name of ______ computer.
► Mini
► Desktop
► Micro
► Super (page.no.21)
Question No: 30 ( Marks: 1 ) - Please choose one
_________________ are powerful pieces of hardware, but not much
useful on their own.
► Microcontrollers
► Microprocessors (page.no.33)
► Integrated circuits
► Ports
Question No: 31 ( Marks: 1 )
In programming, what is a loop?
In computer science a for loop is a programming language
statement which allows code to be repeatedly executed. A for
loop is classified as an iteration statement.
Question No: 32 ( Marks: 1 )
What are the other names of function? Any one.
Routine , procedure , sub prograam
Question No: 33 ( Marks: 2 )
How JavaScript Arrays are heterogeneous ?
Arrays are heterogeneous in java script because at the same
time stimultanously they can hold elements of multiple data
types
Question No: 34 ( Marks: 2 )
What is the database?
Data base is a collection of organized data in a proper way
that computer can quickly search for any desired data item ,
its an easy way of allowing of manipulation of data,they are
design in such a way that access to any desired data can be
identified and reached quickly and easy , they are generally
consist of collection of interrelated files
Question No: 35 ( Marks: 3 )
Differentiate between LAN and WAN with one example of
each.
Lan is a local area network where as wan is a wide area
network
Lan can be used in a specific areas with limited computers
where as wan can be used on computers shared by large
distances
For example lan can be used on pc s or an organization located
in one building but wan can be used on large scales like banks
all over or in any Large communication systems
Question No: 36 ( Marks: 3 )
What are Trojan Horses ?
Trojen horses are a kind of cyber crime , they are v harmful to
computer because they are stand alone programme and the
look like what they are not like any thing amusing or not
harmless like games..
Question No: 37 ( Marks: 3 )
Elaborate Rester Graphics with examples.
A raster graphics image, digital image, or bitmap, is a data file
or structure representing a generally rectangular grid of
pixels, or points of color, on a computer monitor, paper, or
other display device.
To illustrate the matter further - here's the letter "J":
J
Look closely at it... Take a magnifying glass to it if you like.
You see a "J", the computer sees something more like this,
where '.' represents a zero and 'X' represents a one:
....X
....X
....X
....X
....X
....X
....X
X...X
X...X
.XXX.
Where you see a zero, the computer instructs its video
hardware to paint the current background color. A one calls for
the current foreground color. Yes, it is actually a bit more
complicated, but it all basically boils down to one bit or the
other making a distinction
between the colors of adjacent pixels, which together form an
image.
Question No: 38 ( Marks: 5 )
What are the important properties, methods and event
handlers of image object?
The primary use of the image object is to download an image
into the cache before it is needed to display , image object can
be used to create different kinds of animations or to display
one of several images based on the desired requirement , in
java script image object can be used to display the required
pre loaded image
Properties of image object is : height , width ,hspace ,vspace ,
src , name border etc
Methods :none
Event handlers:on aboart , onload, onerror etc
Question No: 39 ( Marks: 5 )
Write the JavaScript code for the Function
SumOddNumbers(maxNumber) that can add non-negative odd
numbers up to maxNumber and return their sum.
Function sum odd numbers(maxnumber){var sum=0;
For(i=0; <maxNumbers;I++){{if(i / 2 == 1 || i == 1)sum += i;}
return sum;}
Question No: 40 ( Marks: 10 )
Write a note on :
· Coding guidelines
· Guidelines for developing short programs.
· Coding guidelines
· • Always use semicolons to end statements
· • Indent blocks of code (2 to 5 spaces)
· • Identifiers
· • Use the camel back scheme
· • Variables: nouns
· • Functions: verbs
· • Comment Liberally
· • Make them descriptive but concise
·
Gudelines for developing short programs.
· • Read and understand the problem
· • Do you have all the required data?
· • No: Get it
· • Else assume it. State it explicitly
· • Do the design
Question No: 41 ( Marks: 10 )
write a note on each of the following:
a. Vector or Object-Oriented Graphics:
b. Bit-Mapped or Raster Graphics:
A:In Vector or object oriented graphic everything drawn is
treated as object. objects retain their identity after they are
drawon. these objects can later be moved, stretched,
duplicated, deleted,etc. they are resolution independent and
have relatively small file size. the examples are: swf, svg, wmf,
ps
brass_ibrahim: Vector graphics is the use of geometrical
primitives such as points, lines, curves, and shapes or
polygon(s), which are all based on mathematical equations, to
represent images in computer graphics.
brass_ibrahim: The term "vector graphics" is mainly used today
in the context of two-dimensional computer graphicsVirtually
all modern 3D rendering is done using extensions of 2D vector
graphics techniques .Virtually all modern 3D rendering is done
using extensions of 2D vector graphics techniques
B:Bit-Mapped or Raster Graphics:
Treats everything that is drawn as a bit-map
If an object is drawn on top of another, it is difficult to move
just one of them while
leaving the other untouched
Changing the resolution often requires considerable touch-up
work
Relatively large file size
Examples: gif, jpg, bmp
masood.tariq: Bit-Mapped or Raster Graphics:
Treats everything that is drawn as a bit-map
If an object is drawn on top of another, it is difficult to move
just one of them while
leaving the other untouched
Changing the resolution often requires considerable touch-up
work
Relatively large file size
Examples: gif, jpg, bmp
Question No: 1 ( Marks: 1 ) - Please choose one
Which function returns a randomly selected floating point number between 0 and 1 ?
► floor(x)
► ceil(x)
► random()(Correct)
► round(x)
Question No: 2 ( Marks: 1 ) - Please choose one
Functions are also called:
► Heuristics
► Variables
► Arrays
► Subprograms (Correct)
Question No: 3 ( Marks: 1 ) - Please choose one
In JavaScript, each element of array can store data of type
► A Number
► An Array
► A String variable
► All of the given choices (Correct)
Question No: 4 ( Marks: 1 ) - Please choose one
The weaknesses of the computer are:
► Pattern recognition & Storage
► Speed & Innovative ideas
► Pattern recognition & Innovative ideas (Correct)
► Speed & Storage
Question No: 5 ( Marks: 1 ) - Please choose one
Processed data is called ________.
► Information (Correct)
► Data
► Entity
► Attribute
Question No: 6 ( Marks: 1 ) - Please choose one
Many developers write the _________ first and then incrementally convert each line into
_________.
► Real code & Pseudo code
► Pseudo code & Real code (Correct)
► Real code & Artificial code
► None of the given options
Question No: 7 ( Marks: 1 ) - Please choose one
When we buy a software package, we do not really buy it, we just by a license that allows us to
use it, the ___________stays with the maker.
► Agreement
► Ownership (Correct)
► Membership
► Software
Question No: 8 ( Marks: 1 ) - Please choose one
Name, Border, Source are the ____________ of the image object.
► Event Handler
► Properties
► Methods
► None of the given options
Question No: 9 ( Marks: 1 ) - Please choose one
Using smart editors they can automatically color different parts of statements in different colors
e.g. HTML tags in ____________ color.
► Green
► Grey
► Blue (Correct)
► None of the given options
Question No: 10 ( Marks: 1 ) - Please choose one
____________ is in Executive team.
► Project Manager
► CEO (Correct) Page no. 296
► Team Lead
► Developer
Question No: 11 ( Marks: 1 ) - Please choose one
Module level design and unit testing the responsibility of _____________.
► Team Lead
► Developer (Correct)
► Project Manager
► Quality Assurance Expert
Question No: 12 ( Marks: 1 ) - Please choose one
_____________ team is responsible for a project after the specification’s stage till the very end.
► Executive
► Architect
► Development (Correct)
► HR
Question No: 13 ( Marks: 1 ) - Please choose one
_____________ waits for some time and then launch a function.
► Timeout( )
► setTimeout( ) (Correct)
► setTime( )
► setTimeIn( )
Question No: 14 ( Marks: 1 ) - Please choose one
Which of the following is NOT an event handler for image object?
► onAbort
► onError
► onLoad
► onUser (Correct)
Question No: 15 ( Marks: 1 ) - Please choose one
______________ is a field that uniquely identifies each record stored in a table.
► Composite Key
► Primary key (Correct)
► Foreign key
► None of the given options
Question No: 16 ( Marks: 1 ) - Please choose one
Distance learning has got a boost due to the ___________.
► Easy communication
► Online interactive contents
► Flexibility
► All of the given options (Correct)
Question No: 17 ( Marks: 1 ) - Please choose one
By default in a web page Hyper Link for another web page is represented as ________________
► Blue only
► Black and Underlined
► Blue and Bold
► Blue and Underlined (Correct)
Question No: 18 ( Marks: 1 ) - Please choose one
To store rounded number of 8.6 in a variable called "r_number", we write _____________.
► r_number=Maths.round(8.6)
► r_numbers=Maths.rounds(8.6)
► r_number=Math.rounds(8.6)
► r_number=Math.round(8.6) (Correct)
Question No: 19 ( Marks: 1 ) - Please choose one
Which one is the best option for designing a Medical Expert System?
► Rule Based System
► Genetic Algorithm
► Fuzzy Logic
► Neural Network
Question No: 20 ( Marks: 1 ) - Please choose one
Variables allow us to manipulate data through the ___________.
► Actual Value
► Reference (Correct)
► Length
► Name
Question No: 21 ( Marks: 1 ) - Please choose one
Which is correct?
► onUnload (Correct) (P.no.245)
► onUnLoad
► onUNLOAD
► All of the above
Question No: 22 ( Marks: 1 ) - Please choose one
Capturing events and responding to them is called __________.
► Function Handling
► Event Handling (Correct)
► Event Procedure
► All of the given option
Question No: 23 ( Marks: 1 ) - Please choose one
___________ color should be used in background for a good presentation.
► Light
► Dark (Correct)
► Red
► None of the given options
Question No: 24 ( Marks: 1 ) - Please choose one
Which of the following symbol is used for multiple line comments in JavaScript?
►/
► //
► /* (Correct)
► //*
Question No: 25 ( Marks: 1 ) - Please choose one
In JavaScript, what will be the result of the follwoing operation
79%3
►0
► 1 (Correct)
►2
►3
Explanation:- 79 divided by 3 and remainder is 1
Question No: 26 ( Marks: 1 ) - Please choose one
A new cell using HTML is added in table row by
► <TC>…</TC>
► <TR>…</TR>
► <TD>…</TD> (Correct) (P.No.54)
► <NC>…</NC>
Question No: 27 ( Marks: 1 ) - Please choose one
TCP stands for ___________.
► Total communication protocol
► Transmission control protocol (Correct)
► Transfer control protocol
► Transfer collection protocol
Question No: 28 ( Marks: 1 ) - Please choose one
What is NOT a key factor while designing a website?
► Usability
► User-friendly
► Consistency
► Complexity (Correct)
Question No: 29 ( Marks: 1 ) - Please choose one
It represents the ________________ flow chart element.
► Process
► Input or Output (correct) P.no.105
► Decision
► Connector
Question No: 30 ( Marks: 1 ) - Please choose one
Vacuum tubes were replaced by ___
► Punch cards
► Transistors (Correct) P.no.14
► Micro Processors
► Resistors
Question No: 31 ( Marks: 1 )
When does recursion occur?
Possible Answer:-
The power of recursion evidently lies in the possibility of defining an infinite set of objects by
a finite statement.
Question No: 32 ( Marks: 1 )
What are the types of computer network according to the distance between nodes ?
Answer:
There are two types of networks.
1. LAN (Local Area Network)
2. WAN (Wide Area Network)
Question No: 33 ( Marks: 2 )
What is meant by semantic error ?
Answer:
Occur when a statement executes and has an effect not intended by the programmer and
Often times occur only in unusual & infrequent circumstances
Question No: 34 ( Marks: 2 )
List down the names of two array methods available in JavaScript.
Answer:
1. sort( ) [sorts elements in alphabetical order]
2. reverse( ) [Reverses the order of elements]
Question No: 35 ( Marks: 3 )
How can you define a consistent web design? Why is it needed?
Answer:
A consistent good designed website is generated for general public that allows users to
attain what they want as quickly as possible without spending much effort.
A consistent good design assists the user in recovering from errors.
Question No: 36 ( Marks: 3 )
How can we include images in a web page using HTML and Java script?
Answer:
Image in HTML
<IMG src=URL, alt=text height=pixels width=pixels align="bottom|middle|top">
Image in Javascript
Images in JavaScript can be manipulated in many ways using the built-in object Image.
Additional properties to HTML are hspace, vspace & lowsrc.
Example: It can be used by many handlers like, onAbort, onLoad & onError
Question No: 37 ( Marks: 3 )
The event handler attribute consists of three parts. Write about each of them.
Answer :
The identifier of the event handler
The equal sign
A string statement enclosed in double or single quotes.
Question No: 38 ( Marks: 5 )
What is a packet in the network environment? What kind of information does it contain?
Answer:
Packet is data chopped up into pieces in a network environment.
These packets contain information about which computer sent the data and where
the data is going.
If a packet runs into a problem during its trip, it can attempt to find another route.
When all the packets get where they are going, the recipient computer puts them together
again.
Question No: 39 ( Marks: 5 )
Suppose we have a big project. Draw hierarchy of the people involved in the project?
Answer:
Please ignore small lines relating Sub Teams to subordinates due to shortage of time.
ABCD etc are connected directly to Team Lead 1,2 & 3 accordingly.
Question No: 40 ( Marks: 10 )
Write down HTML and JavaScript code for the following requirements:
Declare an Array with the identifier SUBJECT having length 5. Assign following values to the
array elements:
MIS, Java, Algorithms, Databases, C++
Show all values in reverse order.
Question No: 41 ( Marks: 10 )
How instant messaging works? Write the steps involved in this process.
Answer:
The Instant Messaging services available allow us to maintain a list of people (contacts)
that we interact with regularly. We can send instant messages to any of the contacts in our
list as long as that contact is online.
Following steps are involved in IM working.
1. User commences the IM client.
2. IM client finds the IM server & logs in.
3. It launches communication info (IP address, etc) to the IM server.
4. IM server finds user’s contacts & sends him/her the communication info.
5. IM server also notifies the contacts that the user is online; sends his/her
communication info to them.
6. The user’s & the contact’s IM clients are ready to communicate directly (P2P).
7. As new contact has come online, IM server informs them about the user being
online & vice versa.
8. Multiple, real-time chat are possible.
9. When the user logs-off, his/her IM client informs the IM server.
10. IM server wipes away the temporary file and informs the user’s contact’s about
his/her ‘offline’ status.
The transistor is a solid state semiconductor device used for amplification and
switching, and has __________ terminals.
► one
► two
► three
► four
Question No: 2 ( Marks: 1 ) - Please choose one
Blue Pacific is a name of _____ computer.
► Mini
► Desktop
► Micro
► Super
Question No: 3 ( Marks: 1 ) - Please choose one
Monte Carlo algorithm is an example of __________
► Randomized algorithm (page.no.102)
► Greedy algorithm
► both greedy and randomized
► Heuristics
Question No: 4 ( Marks: 1 ) - Please choose one
A set of stand alone productivity applications designed to work together known
as ______.
► Productivity software suites
► Compiled software
► Secure software
► Intelligent software
Question No: 5 ( Marks: 1 ) - Please choose one
The most used form tag is the <input> tag.
► True
► False
Question No: 6 ( Marks: 1 ) - Please choose one
What is the key feature of computer which is against human nature.?
Can’t get bored.
► Can’t get bored.
► Pattern recognition
► Repetition
► None
Question No: 7 ( Marks: 1 ) - Please choose one
_____ was designed as a replacement for typewriter
► Spreadsheet Software
► Word Processor Software
► Presentation Software
► Database Software
Question No: 8 ( Marks: 1 ) - Please choose one
Forms can be submitted by using _________ different methods
►2
►3
►4
►5
Methods are GET and POST
Question No: 9 ( Marks: 1 ) - Please choose one
To display a checkbox on the web page, we use ___ tag
► CHECKBOX
► CHECK
► INPUT
► INPUTBOX
Checkbox is not not a tag, input is a tag,
Question No: 10 ( Marks: 1 ) - Please choose one
_____ attribute of FORM tag is used to mention a URL when the form is being
submitted
► name
► action
► method
► submit
Question No: 11 ( Marks: 1 ) - Please choose one
You can ________ from/to a website containing interactive forms.
► Only read
► Only write
► Read and write
► Not read and write
Question No: 12 ( Marks: 1 ) - Please choose one
Using COLSPAN, number of rows of the current cell should extend itself None of
the given choices
► Upward
► Downward (page.no.56)
► Both Upward and Downward
► None of the given choices
Question No: 13 ( Marks: 1 ) - Please choose one
ASCII WHITE is the fastest Super computer which can perform ___ calculations
in one second.
► 1.3 billion
► 1.3 trillion
► 1.3 miillion
► 1.3 thousand
Question No: 14 ( Marks: 1 ) - Please choose one
____ is a related collection of WWW files that includes a beginning file called a
homepage
► HTML
► Website
► HTTP
► Web page
Question No: 15 ( Marks: 1 ) - Please choose one
If a computer could pass the Turing test then it would be able to:
► think like human beings
► do the things faster
► win a million dollar prize
► store more information
Question No: 16 ( Marks: 1 ) - Please choose one
The key strengths of computers are -
► Speed
► Storage
► Do not get bored
► All of the given choices
Question No: 17 ( Marks: 1 ) - Please choose one
Compared to vacuum tubes, Transistors offer:
► Much smaller size
► Better reliability
► Much lower cost
► All of the given choices
Question No: 18 ( Marks: 1 ) - Please choose one
Which of the following is NOT a component of IC?
► Transistors
► Diodes
► Resistors
► Vacuum tubes
Visit this Group of vuZs
http://groups.google.com/group/vuZs
Question No: 19 ( Marks: 1 ) - Please choose one
When we use <INPUT type=“password”>, what will happen?
► Text will not be visible
► Text will be in normal format
► Text will be in **** format
► Text will be in #### format
Question No: 20 ( Marks: 1 ) - Please choose one
Spread sheet is a type of _ Mathematical software ________.
► Productivity software
► Engineering software
► Mathematical software
► Business software
Question No: 21 ( Marks: 1 ) - Please choose one
Word Processor is a ____ Application Software__
► System Software
► Application Software
► Device
► Utility
Question No: 22 ( Marks: 1 ) - Please choose one
_ Utility Program refers to the firmware code which is run by an IBM compatible
PC when first powered on.
► DOS
► BIOS
► Utility Program
► None of these
Question No: 23 ( Marks: 1 ) - Please choose one
A computer program that facilitates the communication between the computer
and a peripheral device is called____ Language Translator _______
► Operating system
► Utilities
► Language Translator
► Device Drives
Question No: 24 ( Marks: 1 ) - Please choose one
In JavaScript, what will be the result of the following operation 79%3
►0
►1
►2
►3
if we divide 79 by 3 ,we will get remainder=1 ,
Question No: 25 ( Marks: 1 ) - Please choose one
Which of the following number system is used by microprocessor?
► Binary
► Decimal
► Octal
► Hexadecimal
Question No: 26 ( Marks: 1 ) - Please choose one
Web site is collection of related ______
► Web pages
► Information
► Search Engines
► None of the given choices
Question No: 27 ( Marks: 1 )
What BIOS stands for? – Binary Input Output System
Question No: 28 ( Marks: 1 )
List down the Analytical Engine's components name (any two)
Answer : Google & Netscape,
Question No: 29 ( Marks: 2 )
Why uploading a web page is important? Describe in 2 – 3 lines.
Answer : By only uploading webpage we could place our information in order the
other can reach up to ready what we load, upload means make available our
data or information for the world web browsers
Question No: 30 ( Marks: 3 )
What is the difference between microprocessors and microcontrollers? Give one
example of both.
Answer : The microprocessor is electronic equipment which can perform several
function and also processing of data and information present in a computer, while
microcontroller can only perform one function for that its design
Example
Microprocessors _ Pentium 4
Microcontroller _ can be a switch in side the washing machine
Question No: 31 ( Marks: 5 )
Differentiate uni-Processor OS from Multi-Processor OS.
Answer : The Multiprocessors is when more than one processor is under
operation it can be several or may hundreds of the kind to perform one great
operation or calculation, while our PC is a kind of uni-processor
Question No: 32 ( Marks: 5 )
Why do we call JavaScript an Object-based Language?
Answer : Java Script is a language by which we are writing our web-pages, this
language is designed to work for web pages
Question No: 1 ( Marks: 1 ) - Please choose one
---------- was known as “mill” in Analytical engine.
► Memory
► Processor
► Monitor
► Mouse
Ref: An arithmetical unit (the "mill") would be able to perform all four arithmetic
operations, plus comparisons and optionally square roots. Initially it was
conceived as a difference engine curved back upon itself, in a generally circular
layout,[2] with the long store exiting off to one side.
Question No: 2 ( Marks: 1 ) - Please choose one
First electronic computer was
► ABC ( Page No. 14)
► UNVAC 1
► Harvard Mark 1
► IBM PC
Question No: 3 ( Marks: 1 ) - Please choose one
What is NOT a key factor while designing a website?
► Usability
► User-friendly
► Consistency
► Complexity
Question No: 4 ( Marks: 1 ) - Please choose one
What happens if I start a new list without closing the original one?
► An error will be generated
► A nested list will be created
► Previous list will end and a new will start.
► Nothing will happen
Question No: 5 ( Marks: 1 ) - Please choose one
The most upper right pixel of the screen is of ___________ color.
► Any
► Red
► Green
► Blue
Question No: 6 ( Marks: 1 ) - Please choose one
A single pixel can acquire approximately ___________ color schemes.
► 1 million
► 2 million
► 10 million
► 16 million (P.NO.235)
Question No: 7 ( Marks: 1 ) - Please choose one
The idea of Neural Networks field is based upon ______________.
► Human nature
► Human brain
► Human culture
► Human actions
Question No: 8 ( Marks: 1 ) - Please choose one
Which one of the following is an application for artificial intelligence?
► Robotic
► Web Agent
► Decision Support System
► All of the given options
Question No: 9 ( Marks: 1 ) - Please choose one
Register is a kind of ______memory
► Fast
► Super fast
► Slow
► Very slow
Question No: 10 ( Marks: 1 ) - Please choose one
Which of the following is a true statement?
► Flat-file storage is better than tabular storage.
► Tabular storage is better than flat-file storage. (Page. No 257)
► Flat-file storage is better than relational storage.
► None of the given options
Question No: 11 ( Marks: 1 ) - Please choose one
substring(n, m) returns a string containing characters copied from position n
to___________.
►m–2
► m – 1 (Page.no. 270)
►m+1
►m
Question No: 12 ( Marks: 1 ) - Please choose one
The __________ is the old profession which is being eliminated because of
computing.
► Typist
► Bank manager
► Operational manager
► All of the given options
Question No: 13 ( Marks: 1 ) - Please choose one
The system that manages relational database, is called ______________.
► None of the given options
► Database Management System
► Data Management System
► Relational Database Management System (page.no.274)
Question No: 14 ( Marks: 1 ) - Please choose one
When web server is busy it gives the following message to the user :
► Time out
► Waiting
► Server busy
► None of the given options
Question No: 15 ( Marks: 1 ) - Please choose one
The group of technologies concerned with the capturing, processing and
transmission of information in the digital electronic form is called
_____________.
► Telecom Engineering
► Computer Engineering
► Computer Science
► Information Technology (page.no.295)
Question No: 16 ( Marks: 1 ) - Please choose one
_____________ team consists on the sharpest technical minds in the company.
► Architecture (page.no.300)
► Business Development
► Configuration Management
► Developer
Question No: 17 ( Marks: 1 ) - Please choose one
TCP stands for ________.
► Transfer Center protocol
► Transmission Control Protocol (page.no.317)
► Transmission Center Protocol
► Telephone Center Protocol
Question No: 18 ( Marks: 1 ) - Please choose one
A collection of data organized in such a way that the computer can quickly
search for a desired data item is known as :
► Retrieving
► Database (page.no.321)
► Information
► DBMS
Question No: 19 ( Marks: 1 ) - Please choose one
Microsoft Word is a type of:
► System Software
► Freeware Software
► Shrink-Wrapped Software (page.no.64)
► Custom-built Software
Question No: 20 ( Marks: 1 ) - Please choose one
Users __________, how things work.
► Analyze in detail
► Muddle through (page.no.170)
► Figure out
► Read in detail
Question No: 21 ( Marks: 1 ) - Please choose one
Popular schemes used for reducing bytes for storage are:
► RGB and Color mapping
► RGB and Dithering
► RGB, Color mapping and Dithering
► Color mapping and Dithering (page.no.235)
Question No: 22 ( Marks: 1 ) - Please choose one
Hardware malfunctions is related to
► Data updates
► Data integrity (page.no.253)
► Data security
► Data accessibility
Question No: 23 ( Marks: 1 ) - Please choose one
If incorrectly we enter the negative age it is check by
► Limit Integrity (page.no.253)
► Type Integrity
► Referential Integrity
► Physical Integrity
Question No: 24 ( Marks: 1 ) - Please choose one
Which is the user-friendly way of presenting data ?
► Query
► Form
► Report
► All of the given options
Question No: 25 ( Marks: 1 ) - Please choose one
Currently the BlueRay DVD can store more than ________ of data.
► 10 GB
► 100 GB
► 50 GB (page.no.305)
► 150 GB
Question No: 26 ( Marks: 1 ) - Please choose one
In JavaScript, a || b is interpreted as
► a is true or b is false
► a is true and b is true
► a is false and b is true
► a is true or b is true or both are true (page.no.148)
Question No: 27 ( Marks: 1 ) - Please choose one
Speakers fall into the hardware category.
► True
► False
Question No: 28 ( Marks: 1 ) - Please choose one
onBlur event is occurred for a form element when it ____________
► Gets focus
► Losts focus (page.no.230)
► Some thing is typed in
► onBlur is not an event
Question No: 29 ( Marks: 1 ) - Please choose one
You can view a 3-D image on a _____________.
► 3-D display
► 2-D display
► On both 2-D and 3-D displays
► We can not view a 3-D image
Question No: 30 ( Marks: 1 ) - Please choose one
Module level design and unit testing is the responsibility of _____________.
► Team Lead
► Developer (page.no.298)
► Project Manager
► Quality Assurance Expert
Question No: 31 ( Marks: 1 )
What is heuristic?
Common sense Lesson drawn from experience
(Artificial) Intelligent Systems
SW programs or SW/HW systems designed to perform complex tasks employing
strategies that mimic
some aspect of human thought
or
a commonsense rule (or set of rules) intended to increase the probability
of solving some problem
of or relating to or using a general formulation that serves to guide
investigation
Question No: 32 ( Marks: 1 )
In programming, what is an object ?
Object: A named collection of properties (data, state) & methods (instructions,
behavior)
Question No: 33 ( Marks: 2 )
What is spreadsheet? List any two jobs that it can do.
A spreadsheet is a grid that organizes data into columns and rows. Spreadsheets
make it easy to display
information, and people can insert formulas to work with the data.
Electronic replacement for ledgers
Charts
financial-forecasting
Question No: 34 ( Marks: 2 )
In JavaScript, what is event handling? What are the two types of events?
Capturing events and responding to them
The system sends events to the program and the program responds to them as
they arrive
Events can include things a user does - like clicking the mouse - or things that
the system itself does -
like updating the clock.
Question No: 35 ( Marks: 3 )
Explain how many ways businesses monitor their employees?
• Systems are available that monitor almost every key stroke that an employee
makes on a computer
• Systems are available that read and censor all incoming and outgoing eMail
• It is quite straight forward to monitor where you surf, and when
Question No: 36 ( Marks: 3 )
What is difference between Design and System Architecture?
Only the higher level designs are called System Architecture and lower
level designs can not be called system Architecture, and we can also say
the every Architecture can be called design but every design can not be
called Architecture. (For Reference Listen Lecture No.24)
Question No: 37 ( Marks: 3 )
What are the Sub categories of Artificial Intelligence? Briefly explain any
two.
Expert systems
Systems that, in some limited sense, can replace an expert
Robotics
Automatic machines that perform various tasks that were previously done by
humans
Example:
Pilot-less combat air planes
Decision Support Systems:
Interactive software designed to improve the decision-making capability of their
users
Utilize historical data, models to solve problems
Question No: 38 ( Marks: 5 )
How many ways are there to call a function in a program ? Explain with
example
Functions do not run automatically. When the page loads, each function waits
quietly until it is told to run
CALLING A FUNCTION FROM AN EVENT HANDLER
AN EVENT HANDLER IS A COMMAND WHICH CALLS A
FUNCTION WHEN AN EVENT HAPPENS, SUCH AS THE
USER CLICKING A BUTTON.
THE COMMAND IS WRITTEN IN THE FORMAT ONEVENT,
WHERE EVENT IS THE NAME FOR A SPECIFIC ACTION.
HERE ARE SOME COMMON EXAMPLES:
CALLING A FUNCTION FROM ANOTHER FUNCTION
function doSomething() {
doSomethingElse(); // This line calls the next function
Question No: 39 ( Marks: 5 )
Elaborate the ‘+ ’ operator and its constraints with the help of examples
The “+” String Operator
The “+” operator can be used to concatenate two strings
title = “bhola” + “continental”
The value of the variable title becomes “bholacontinental”
Question No: 40 ( Marks: 10 )
Write a JavaScript program having two functions sum and mean.
The web page will ask the user to enter five values to be added.
After taking input it will calculate the sum and mean of those values by
calling sum and mean functions.
Question No: 41 ( Marks: 10 )
Define the following terms.
Object
A named collection of properties(data, state) & methods (instructions,
behavior)
Event Handler
AN EVENT HANDLER IS A COMMAND WHICH CALLS A
FUNCTION WHEN AN EVENT HAPPENS, SUCH AS THE
USER CLICKING A BUTTON
Local Variable
Declaring variables (using the var keyword) within a function, makes them
local•They are available only
within the function and hold no meaning outside of it
Scope of Variable
Defining the space in which a variable is effective is known as
defining the scope of a variable. A variable can be either local or global in
scope
Array
An indexed list of elements
Question No: 1 ( Marks: 1 ) - Please choose one
First computer network was ___________.
► NSFNET
► FIRSTNET
► ARPANET
► ORPHANET
Question No: 2 ( Marks: 1 ) - Please choose one
In a good presentation each slide should contain____________.
► Heading
► Phrases not sentences
► Sentences not phrases
► Heading, sentences not phrases
Question No: 3 ( Marks: 1 ) - Please choose one
A function is also called __________.
► Sub-program
► Procedure
► Sub-routine
► All of the given option
Question No: 4 ( Marks: 1 ) - Please choose one
A single pixel can acquire approximately ___________ color schemes.
► 1 million
► 2 million
► 10 million
► 16 million
Question No: 5 ( Marks: 1 ) - Please choose one
Which of the following is NOT a Loop statement?
► For
► While
► Switch
► Do-While
Question No: 6 ( Marks: 1 ) - Please choose one
Which one of the following is NOT a component of Rule Based System?
► Rule Compiler
► Rule Interpreter
► Rules Base
► Working Memory
Question No: 7 ( Marks: 1 ) - Please choose one
Spread sheet is a type of _______________.
► Productivity software
► Engineering software
► Mathematical software
► Business software
Question No: 8 ( Marks: 1 ) - Please choose one
A combination of word processing and graphic design is
► Corel Draw
► Desktop Publishing
► Paint
► WordPad
Question No: 9 ( Marks: 1 ) - Please choose one
To store rounded number of 8.6 in a variable called "r_number", we write
_____________.
► r_numbers=Maths.rounds(8.6)
► r_number=Math.rounds(8.6)
► r_number=Math.round(8.6)
► r_number=Maths.round(8.6)
Question No: 10 ( Marks: 1 ) - Please choose one
Which of the following is a true statement?
► Flat-file storage is better than tabular storage.
► Tabular storage is better than flat-file storage.
► Flat-file storage is better than relational storage.
► None of the given options
Question No: 11 ( Marks: 1 ) - Please choose one
The political process is also influenced by the use of ___________.
► Discussion forums
► Newsgroups
► Mailing lists
► All of the given options
Question No: 12 ( Marks: 1 ) - Please choose one
The system that manages relational database, is called ______________.
► None of the given options
► Database Management System
► Data Management System
► Relational Database Management System
Question No: 13 ( Marks: 1 ) - Please choose one
____________ DBMS supports data in terabytes.
► Personal
► Desktop
► Enterprise
► Single-user
Question No: 14 ( Marks: 1 ) - Please choose one
Trinoo is a __________ software.
► DoS
► Scanning
► Utility
► None of the given options
Question No: 15 ( Marks: 1 ) - Please choose one
What is the major problem with flash based website?
► Its two heavy
► Cannot be indexed
► Less attractive
► Inaccessible
Question No: 16 ( Marks: 1 ) - Please choose one
The organization is the collection of ____________.
► Peoples
► Professionals
► Teams
► Individuals
Question No: 17 ( Marks: 1 ) - Please choose one
The tasks performed to determine the existence of defects is called _______
► Debugging
► Testing
► Repairing
► Coding
Question No: 18 ( Marks: 1 ) - Please choose one
Many developers write the _________ first and then incrementally convert each
line into _________.
► Real code & Pseudo code
► Pseudo code & Real code
► Real code & Artificial code
► None of the given options
Question No: 19 ( Marks: 1 ) - Please choose one
Forms can be submitted through _______ & _______ methods
► INCLUDE, POST
► INCLUDE, GET
► GET, POST
► SEND, POST
Question No: 20 ( Marks: 1 ) - Please choose one
If an algorithm is syntactically correct, but semantically incorrect then this
situation is
► Very good situation
► Very dangerous situation
► Not very bad
► Neutral situation
Question No: 21 ( Marks: 1 ) - Please choose one
Heuristics _______ lead to the best results.
► Sometimes
► Do not
► Occasionally
► Not always
Question No: 22 ( Marks: 1 ) - Please choose one
In TCPIP communication fragmentation is responsibility of
► TCP
► IP
► Both TCP and IP
► Internet
Question No: 23 ( Marks: 1 ) - Please choose one
Access to the internet became easy after the invention of
► WWW & Web Browsers
► Mainframes
► Binary system
► Signals
Question No: 24 ( Marks: 1 ) - Please choose one
Which one is the example of spreadsheet software ?
► MS Word
► MS PowerPoint
► MS Excel
► MS Access
Question No: 25 ( Marks: 1 ) - Please choose one
User can remotely log on to a computer and can have a control over it like a
local user using
► TelNet Protocol
► TelNet Protocol and connected to the user through TCP/IP network
► TelNet protocol and FTP
► TCP/IP and FTP
Question No: 26 ( Marks: 1 ) - Please choose one
If incorrectly we enter the negative age it is check by
► Limit Integrity
► Type Integrity
► Referential Integrity
► Physical Integrity
Question No: 27 ( Marks: 1 ) - Please choose one
------------------ is a digital programmable mechanical machine
► Analytical Engine
► Difference Engine
► Harvard Mark 1
► Mechanical engine
Question No: 28 ( Marks: 1 ) - Please choose one
This element of Flow Chart is called_____________.
► Process
► Off page connector
► Decision
► Connector
Question No: 29 ( Marks: 1 ) - Please choose one
In a library’s database, if there is an entry in the register for Book # 423 then
the corresponding Book must actually exist; is an example of which type of
data integrity:
► Type integrity
► Limit integrity
► Physical Integrity
► Referential Integrity
Question No: 30 ( Marks: 1 ) - Please choose one
Ada is a programming language specifically designed for
► Analytical Engine
► Difference Engine
► Harvard Mark 1
► Mechanical engine
Question No: 31 ( Marks: 1 )
What are the elements of website design? Any one
Question No: 32 ( Marks: 1 )
What does TCP/IP stand for?
Question No: 33 ( Marks: 2 )
What is the database?
Question No: 34 ( Marks: 2 )
What is the use of Default keyword in switch structure?
Question No: 35 ( Marks: 3 )
How can we include images in a web page using HTML and Java script?
Question No: 36 ( Marks: 3 )
Where "While" loop is more preferable than "For" loop and vice versa ? , explain
with the help of example.
Question No: 37 ( Marks: 3 )
What do you mean by FTP or File Transfer Protocol?
Question No: 38 ( Marks: 5 )
Differentiate between For and While loop by writing the syntax of both loops.
Question No: 39 ( Marks: 5 )
Write JavaScript code for the following:
Make a function compareWithTen(value)
Compare the function argument with ‘10’ and display a message whether the
value is less than, equal to or greater than 10.
Question No: 40 ( Marks: 10 )
What is the problem with Relational Database and what solution you can
suggest for it?
Question No: 41 ( Marks: 10 )
Develop a web page that displays six thumbnail images. A main image
should change to a larger version of the thumbnail as soon as the
mouse moves over a thumbnail image. Write complete HTML and
JavaScript code.
Question No: 1 ( Marks: 1 ) - Please choose one
Cray-1 was first commercial _________ computer
► Super
► Mini
► Micro
► Personal
Question No: 2 ( Marks: 1 ) - Please choose one
The name of first browser was ______
► Internet Explorer
► Moziac
► Netscape
► Firefox
Question No: 3 ( Marks: 1 ) - Please choose one
The impact of a digit in a number is determined by its ---------------
► Value
► Location
► Length
► None of above
Question No: 4 ( Marks: 1 ) - Please choose one
First computer network was ___________.
► NSFNET
► FIRSTNET
► ARPANET
► ORPHANET
Question No: 5 ( Marks: 1 ) - Please choose one
A variable can be _________ in scope.
► Local
► Global
► Either local or global
► None of the given options
Question No: 6 ( Marks: 1 ) - Please choose one
___________ color should be used in background for a good presentation.
► Light
► Dark
► Red
► None of the given options
Question No: 7 ( Marks: 1 ) - Please choose one
Which one of the following is not an event handler's attribute?
► Function
► Identifier
► Equal sign
► String consisting of JavaScript statements
http://groups.google.com/group/vuZs
Question No: 8 ( Marks: 1 ) - Please choose one
Variables allow us to manipulate data through the ___________.
► Actual Value
► Reference
► Length
► Name
Question No: 9 ( Marks: 1 ) - Please choose one
Which one of the following is NOT a component of Rule Based System?
► Rule Compiler
► Rule Interpreter
► Rules Base
► Working Memory
Question No: 10 ( Marks: 1 ) - Please choose one
Fuzzy logic is based on ____________.
► Ground facts
► Experience
► Practice
► Approximation
Question No: 11 ( Marks: 1 ) - Please choose one
a = Math.ceil(12.01)
What will be the value of a ?
► 12
► 13
► 12.0
► 13.01
Question No: 12 ( Marks: 1 ) - Please choose one
Tag used to make a Text Bold is __________________
► <BOLD></BOLD>
► <B></B>
► <BODY></BODY>
► None of these
Question No: 13 ( Marks: 1 ) - Please choose one
<P> </P> and <BR> tags are not same because
► <p></p> goes to the next line
► <BR> goes to the next after next line
► <P></P> goes to the next after next line
► Both are same
Question No: 14 ( Marks: 1 ) - Please choose one
Event handlers are placed in the ___________ portion of a Web page as
attributes in HTML tags.
► HEAD
► BODY
► SCRIPT
► TITLE
Question No: 15 ( Marks: 1 ) - Please choose one
Due to working at home, lack of interaction may result in ___________
professional growth.
► Slower
► Faster
► Higher
► Improved
Question No: 16 ( Marks: 1 ) - Please choose one
____________ DBMS supports data in terabytes.
► Personal
► Desktop
► Enterprise
► Single-user
Question No: 17 ( Marks: 1 ) - Please choose one
_____________ waits for some time and then launch a function.
► Timeout( )
► setTimeout( )
► setTime( )
► setTimeIn( )
Question No: 18 ( Marks: 1 ) - Please choose one
The responsibilities of the Team Lead includes_____________.
► Planning and tracking of the project
► Detailed design
► Professional development of team members
► All of the given options
Question No: 19 ( Marks: 1 ) - Please choose one
______ is also known as System Architecture
► High level system design
► Low level system design
► Every system design
► Software Requirement
Question No: 20 ( Marks: 1 ) - Please choose one
The key property of the ‘Array’ object in JavaScript is
► Value
► Length
► Name
► All of the given choices
Question No: 21 ( Marks: 1 ) - Please choose one
There are _________ ways of calling functions.
► One
► Two
► Three
► Four
Question No: 22 ( Marks: 1 ) - Please choose one
Which event handler executes the specified JavaScript code when a
window/form element loses focus ?
► onBlur
► onLoad
► onUnload
► onFocus
Question No: 23 ( Marks: 1 ) - Please choose one
Popular schemes used for reducing bytes for storage are:
► RGB and Color mapping
► RGB and Dithering
► RGB, Color mapping and Dithering
► Color mapping and Dithering
Question No: 24 ( Marks: 1 ) - Please choose one
Hardware malfunctions is related to
► Data updates
► Data integrity
► Data security
► Data accessibility
Question No: 25 ( Marks: 1 ) - Please choose one
Users communicate with the computer using a consistent user interface
provided by the OS.
► True
► False
Question No: 26 ( Marks: 1 ) - Please choose one
Extension for saving web page is / are;
► *.html
► *.htm
► *.html and *.htm both are in use
► None of These
Question No: 27 ( Marks: 1 ) - Please choose one
_____________ loop is a flow control statement that allows code to be executed
repeatedly based on a given Boolean condition.
► For
► Do-While
► If-else
► While
Question No: 28 ( Marks: 1 ) - Please choose one
onBlur event is occurred for a form element when it ____________
► Gets focus
► Losts focus
► Some thing is typed in
► onBlur is not an event
Question No: 29 ( Marks: 1 ) - Please choose one
<script>
Number=new Array(5);
for(var i=1; i<=5 ; i=i+1)
{
for( var k=6; k<=10; k=k+1)
{
Number[i]= k*i;
}
}
</script>
For how many times the Nested For Loop shall execute;
► 20
► 15
► 25
► Shall terminate in first loop.
Question No: 30 ( Marks: 1 ) - Please choose one
In JavaScript: In order to display the text on browser Grade A, which of following
statement is True.
► documentwrite( "Grade A")
► document.write( "Grade A");
► document.write( "Grade” && A");
► document.write( "Grade” && “A");
Question No: 31 ( Marks: 1 )
In programming, what is an object ?
Answer: It is a named collection of properties and methods.
Question No: 32 ( Marks: 1 )
What kind of information can be stored in a database ?
Answer:
It can stored numbers, boleans, sound, video, images etc.
Question No: 33 ( Marks: 2 )
Define the key weakness of the web?
Answer:
Initially web was designed only for humans to read not for computers to
understand it.
Question No: 34 ( Marks: 2 )
How many iterations would this ‘for’ loop run for?
for ( x = 50 ; x < 0 ; x = x - 1 ) {
document.write ( x ) ;
}
Answer:
50 iterations
Question No: 35 ( Marks: 3 )
How can we define a Pixel?
Answer:
It is the smallest element of image which is spread with regular array on display
and each element consist of particular color.
Question No: 36 ( Marks: 3 )
Write JavaScript code to convert the number 236.2363611111556 into currency
format and JavaScript statement to show output.
Question No: 37 ( Marks: 3 )
Write code in JavaScript to display the odd numbers between 20 to
100 using FOR statement.
Note: No need to write whole HTML program. Just JavaScript code of require
part is require.
Question No: 38 ( Marks: 5 )
How marketing strategies are changed with the progress in computing? How
new marketing strategies are implemented?
Answer:
Marketing Strategy Changes with the new requirements of the modern era and
the applications of the business. The web has changed marketing strategy from a
mass focus to single person focus. We collected data and analyze accordingly to
find out the behavior of the market and end users. In new marketing more
advertising is being done through email and web and get feedback.
Question No: 39 ( Marks: 5 )
<script>
Number = new Array(5);
var abc=4;
for(var i=1; i<=5 ; i=i+1)
{
Number[i]= abc*i;
}
Number.reverse();
for(j=0;j<5;j=j+1)
{
document.write(" "+Number[j]+"<BR>");
}
</script>
A) What should be output of above code?
B) Explain the highlighted lines of code?
Question No: 40 ( Marks: 10 )
Write a brief note on each of the following.
Ø FTP
Ø Telnet
Ø Instant messaging
Ø VoIP
FTP: File Transfer Protocol: This protocol is used to upload and download the
files on remote computers.
Telnet: FTP allows file operations only while Telnet can log on to a computer of
other users through TCP/IP network and use like a local user, it help in testing of
remote web server.
Instant Messaging: This is the service of messaging provided on the internet
like MSN messenger, Yahoo messenger, through which we interact people
randomly whenever required.
VoIP: Voice over IP, It is used to transmit the voice from one IP to another IP, In
which voice is first broken down and then transmitted over a network.
vuZs
Question No: 41 ( Marks: 10 )
What are Commonsense Guidelines to avoid viruses? Discuss about Antivirus
as well.
Answer:
Commonsense Guidelines to avoid viruses are as follows:
1. Do not open attachment of unwanted emails.
2. Don’t used copied/pirated Softwares
3. Regularly place data somewhere as backup
4. Use Registered and Trusted Softwares only.
5. Install Antivirous in the system
6. Update your Windows and softwares with the passage of time.
7. Scan before using any external device with your system as USB
Device.
Antivirus:
This is the software design for preventing your system from harmful
effects and maintain the speed of computer. These softwares are
available on the CD’s and DVD’s. These softwares continuously monitor
the systems and aware when any harmful virus is detected and asked
for the further operations. Some automatically remove the viruses
from the system.
Question No: 1 ( Marks: 1 ) - Please choose one
Vacuum tubes were replaced by _ ► Transistors
__
► Punch cards
► Transistors
► Micro Processors
► Resistors
Question No: 2 ( Marks: 1 ) - Please choose one
First electronic computer was ► ABC
► ABC
► UNVAC 1
► Harvard Mark 1
► IBM PC
Question No: 3 ( Marks: 1 ) - Please choose one
To improve the time for scannig a web page, text should be ___
► Centered
________.
► Centered
► Left Aligned
► Right Aligned
► Staggered
Question No: 4 ( Marks: 1 ) - Please choose one
JavaScript does not support_► Graphics ______________
► User interaction
► Graphics
► Network operations
► Both Graphics and Network operations
Question No: 5 ( Marks: 1 ) - Please choose one
► Identifier
_________ is a container that holds a value.
► Identifier
► Variable
► Function
► Constant
Question No: 6 ( Marks: 1 ) - Please choose one
The default bullet for the list in HTML is► Circle shape
► Circle shape
► Disc shape
► Square shape
► Triangle shape
Question No: 7 ( Marks: 1 ) - Please choose one
A single pixel can acquire approximately ► 16 million
___________ color schemes.
► 1 million
► 2 million
► 10 million
► 16 million
Question No: 8 ( Marks: 1 ) - Please choose one
According to a popular heuristic, success is defined by _ ► The user
__________.
► The user
► The builder
► Both user and builder
► None of the given options
Question No: 9 ( Marks: 1 ) - Please choose one
Which one of the following is NOT a component of Rule Based System? Rule
Compiler
► Rule Compiler
► Rule Interpreter
► Rules Base
► Working Memory
Question No: 10 ( Marks: 1 ) - Please choose one
► Event processed programs __________ are those programs in which the
flow of the program is determined by the user's actions (mouse clicks, key
presses) or messages from other programs.
► Event called programs
► Event processed programs
► Event driven programs
► Event declared programs
Question No: 11 ( Marks: 1 ) - Please choose one
The ► Control unit
______ is connected to all other modules of the microprocessor.
► Control unit
► Memory unit
► Floating Point unit
► Arithmetic and Logic unit
Question No: 12 ( Marks: 1 ) - Please choose one
Which of the followings is NOT a Relational DBMS software. ► FrontPage
► Access
► FrontPage
► FileMaker Pro
► SQL Server
Question No: 13 ( Marks: 1 ) - Please choose one
random() function returns a randomly-selected, floating-point number
between ► 0 and 1____________.
► 0 and 1
► 0 and 10
► 0 and -10
► 0 and -1
Question No: 14 ( Marks: 1 ) - Please choose one
__ ► Network
___________ organization is replacing the old-style layered, tree-structured
organizational model.
► Network
► Hierarchical
► Matrix
► None of the given options
Question No: 15 ( Marks: 1 ) - Please choose one
The _►Typist _________ is the old profession which is being eliminated
because of computing.
►Typist
►Bank manager
►Operational manager
►All of the given options
Question No: 16 ( Marks: 1 ) - Please choose one
Distance learning has got a boost due to the ►All of the given
options
___________.
►Easy communication
►Online interactive contents
►Flexibility
►All of the given options
Question No: 17 ( Marks: 1 ) - Please choose one
What is the 2nd step of DoS attack?► Search
►Race
►Arm
►Search
►Attack
Question No: 18 ( Marks: 1 ) - Please choose one
The _►Network paradigm
___________ is becoming the preferred organizational structure for more and
more organizations with the passage of time.
►Tree structured organizational model
►Network paradigm
►Hierarchical structure
►None of the given options
Question No: 19 ( Marks: 1 ) - Please choose one
_ ► TCP
____________ routes the packets through the internet to go to their destination.
► Protocol
► TCP
► IP
► NIC
Question No: 20 ( Marks: 1 ) - Please choose one
Many developers write the► Pseudo code _________ first and then
incrementally convert each line into Real code_________.
► Real code & Pseudo code
► Pseudo code & Real code
► Real code & Artificial code
► None of the given options
Question No: 21 ( Marks: 1 ) - Please choose one
Processed data is called _
► Information
_______.
► Information
► Data
► Entity
► Attribute
Question No: 22 ( Marks: 1 ) - Please choose one
In a System having many parts to be designed, one should always do the _
► Simple part
____ first
► Hard part
► Simple part
► Development part
► Quality part
Question No: 23 ( Marks: 1 ) - Please choose one
One can download or upload files to a remote computer using _ ► TELNET
_______ protocol.
► HTTP
► SMTP
► FTP
► TELNET
Question No: 24 ( Marks: 1 ) - Please choose one
Which one is the example of spreadsheet software ? ► MS Excel
► MS Word
► MS PowerPoint
► MS Excel
► MS Access
Question No: 25 ( Marks: 1 ) - Please choose one
User can remotely log on to a computer and can have a control over it like a
local user using► TelNet Protocol and connected to the user through TCP/IP
network
► TelNet Protocol
► TelNet Protocol and connected to the user through TCP/IP network
► TelNet protocol and FTP
► TCP/IP and FTP
Question No: 26 ( Marks: 1 ) - Please choose one
Hardware malfunctions is related to ► Data integrity
► Data updates
► Data integrity
► Data security
► Data accessibility
Question No: 27 ( Marks: 1 ) - Please choose one
With the passage of time the field of Computing and Telecommunication is _
► Converging
____________.
► Diverging
► Converging
► Becoming different
► Becoming unique
Question No: 28 ( Marks: 1 ) - Please choose one
Microphone is an input as well as output device. This statement is ►
False
► True
► False
Question No: 29 ( Marks: 1 ) - Please choose one
Application developers do not need to know much about the HW, especially the
microProcessor, while they are developing their application. ► True
► True
► False
Question No: 30 ( Marks: 1 ) - Please choose one
From which of the following is NOT a technique through which Security can be
improved : ► Metal detectors
► Private or virtual-private networks
► Firewalls
► Metal detectors
► Virus detectors
Question No: 31 ( Marks: 1 )
SMTP stands for what?
Ans: Simple Message transfer protocol
Question No: 32 ( Marks: 1 )
In programming, what is an object ?
Ans: An object is the collection of properties(date,state) ans methods
(instruction ,behavior)
Question No: 33 ( Marks: 2 )
In which situation we should use Inline Event Handling?
Ans:Event handler are palced in the BODY portion of a web page as attributes of
HTML tages
The event handler attributes consist of 3 parts
a) The equal sign
b) The identifier of event handler
c) A string consisting of java script statements enclosed in double or
single string
Multiple javascript statements can be placed in that string ,but all have to fit in
a single line .
No new line characters with in line event handling
Inline event handler can be used normally in a condition when we want to
execute the eventd direclty and quickly in the same line of code.
Question No: 34 ( Marks: 2 )
In JavaScript, what is event handling? What are the two types of events?
Ans: In JavaScript capturing of an events and responding to them is event
handling. The system sends events to the program and the program responds to
them as they arrive.
1. Events can include things a user does - like clicking the mouse.
2. Events that the system itself does - like updating the clock.
Question No: 35 ( Marks: 3 )
What is the preferred organizational structure for the organization?
‘
Ans: Preferred Organizational Structure for organization is hierarchal. Where
there is different departments interconnected with each other and are been
divided according to the functions they perform.
1)Executive Team
2)
a)business development team
b )ArchitecutreTeam
c)technology Transfer team
3)
a) configuration Management Team
b)Process Team
c)Quality assurance Team
d)Support team
4)
a) development Team A
b) development Team B
c) development Team C
d) development Team D
Question No: 36 ( Marks: 3 )
What are the Sub categories of Artificial Intelligence? Briefly explain any two.
Ans
a)Neural networks: original inspiration was human brainemphasis now
usefulness as a computational tool
1) Genetic Algorithms : based on darwins evolutionary principle
GA requires the ability to recognize a good solution but not
howto get to that solution
2) rulebased systems
b) the right techniques
Question No: 37 ( Marks: 3 )
Diffentiate Local and Global Variables.
Ans:
Local Variables:
When a function is define the variable use for storing values are
incorporated inside the function these variable are found and used only inside
these function are called local variable .these have no presence out side the
function
Global Variables :Global variable on other hand are present through out the
script and their values can be access by any function .They global scope
Question No: 38 ( Marks: 5 )
Write the JavaScript code for the Function SumOddNumbers(maxNumber) that
can add non-negative odd numbers up to maxNumber and return their sum.
Question No: 39 ( Marks: 5 )
What is animated gif? How can we use it? If we animate images in JavaScript
then is it better?
Ans: It is bit mape image format introduced in 1987by compuserve.It support up
to 8 bits per pixel.It also support animation And allow a separate palette of 256
colors for each frame.
Uses:We can use it in web site they are suitable for sharp edged line art with
limited number of colors.They are good for small animation and low resolution
clips.
The size is small and on web site they can uploaded and downloaded easily
Question No: 40 ( Marks: 10 )
What is the problem with Relational Database and what solution you can
suggest for it?
Ans:
when we use to store object oriented data into a Relational database
it need to be translated in form which is suitable for the relational database.
Again when we need to read RDBMs the Data need again back to be translated
into object oriented form to read.
This two process delay associated processing and time spent in writing and
maintaining the translation codes are the key disadvantage with Relational
Database .
Solution:
Object oriented database
Object Relational database
The data should be divided and save in multiple table and tabular form ,so that
open ,searching .sorting ,editing and saving of data can be performed quickly.
With tabular form one can sort w.r
Question No: 41 ( Marks: 10 )
How can we neutralize DoS attack? Can we track the attacker?
Ans: Denial of service attempt to make a computer resource unavailable to its
Intended user . Easiest way to survive an attack is to have planned for the attack.
Good contact with ISP and some security providers and CERT are essential also
having a separate emergency block of IP address for Critical servers with a
separate rout can be effective.
We should use genuine operating system can also be helpful.
By using an extremely stateful packet filter that will inexpensively drop any
unwanted packet serviving DoS attack Becomes much Easier.
We can also use Fierwalls .
Using Antivirus softwear
Using private net work
Using encryption
Network Sniffer
Intrusion detector By using all these techniques we can neutralize DoS Attack
Investigative process should begin immediately after the DoS Attack begins.
By using IP address we can Track Attacker.
Question No: 1 ( Marks: 1 ) - Please choose one
The memory size of the Altair 8800 was
► 128 bytes
► 128 Kilo bytes
► 256 Kilo bytes
► 256 bytes
Question No: 2 ( Marks: 1 ) - Please choose one
A named collection of properties (data, state) and methods
(instruction, behavior) is called ____________.
► Array
► Function
► Variable
► Object
Question No: 3 ( Marks: 1 ) - Please choose one
JavaScript Variables are ____________.
► Dynamically Typed
► Statically Typed
► Strong Typed
► None of the given options
Question No: 4 ( Marks: 1 ) - Please choose one
Serial arrangement in which things follow logical order or a recurrent
pattern, such as statements executing one by one, is called __________.
► Loop
► Sequence
► Condition
► Array
Question No: 5 ( Marks: 1 ) - Please choose one
Rule of thumb learned through trial and error is called ___________.
► Design
► Heuristic
► Plan
► Aim
Question No: 6 ( Marks: 1 ) - Please choose one
According to heuristic, if you can’t explain it in ____________ minutes,
either you don’t understand it or it does not work.
► 10
►2
►5
►4
Question No: 7 ( Marks: 1 ) - Please choose one
To store rounded number of 8.6 in a variable called "r_number", we write
_____________.
► r_numbers=Maths.rounds(8.6)
► r_number=Math.rounds(8.6)
► r_number=Math.round(8.6)
► r_number=Maths.round(8.6)
Question No: 8 ( Marks: 1 ) - Please choose one
Using only HTML we can create
► Dynamic web pages
► Static web pages
► Both Static and Dynamic pages
► None of these
Question No: 9 ( Marks: 1 ) - Please choose one
__________ function returns the largest integer that is less than or equal to x.
► round(x)
► floor
► ceil
► abs(x)
Question No: 10 ( Marks: 1 ) - Please choose one
Due to working at home, contact with the colleagues is __________, which may
result in __________ quality of work
► Reduced, Poorer
► Reduced, Better
► Increased, Poorer
► Increased, Better
Question No: 11 ( Marks: 1 ) - Please choose one
The distance among families is ___________ because of spending more time
on internet.
► Increased
► Expanded
► Contracted
► Decreased
Question No: 12 ( Marks: 1 ) - Please choose one
When web server is busy it gives the following message to the user :
► Time out
► Waiting
► Server busy
► None of the given options
Question No: 13 ( Marks: 1 ) - Please choose one
____________ is designed for detecting viruses and inoculating.
► Antivirus
► Utility
► Trojan
► None of the given choices
Question No: 14 ( Marks: 1 ) - Please choose one
The ____________ is becoming the preferred organizational structure for more
and more organizations with the passage of time.
► Tree structured organizational model
► Network paradigm
► Hierarchical structure
► None of the given options
Question No: 15 ( Marks: 1 ) - Please choose one
Planning and tracking of the project is the responsibility of the___________.
► Project Manager
► Architect
► Developer
► Chief Executive Officer
Question No: 16 ( Marks: 1 ) - Please choose one
The responsibilities of the Team Lead includes_____________.
► Planning and tracking of the project
► Detailed design
► Professional development of team members
► All of the given options
Question No: 17 ( Marks: 1 ) - Please choose one
_____________ team is responsible for a project after the specification’s stage
till the very end.
► Executive
► Architect
► Development
► HR
Question No: 18 ( Marks: 1 ) - Please choose one
There are _________ types of errors.
►2
►3
►4
►5
Question No: 19 ( Marks: 1 ) - Please choose one
________ are the computers that perform at or near the currently highest
operational rate for computers.
► Minicomputers
► Microcomputers
► Supercomputers
► Personal Computers
Question No: 20 ( Marks: 1 ) - Please choose one
Which one of these is NOT an example of storage devices?
► Tape
► RAM
► Floppy
► DVD
Question No: 21 ( Marks: 1 ) - Please choose one
Forms can be submitted by using __________ different methods
►2
►3
►4
►5
Question No: 22 ( Marks: 1 ) - Please choose one
Which is NOT true for JavaScript variable name ?
► Student
► Roll_no_1111
► For
► _schedule
Question No: 23 ( Marks: 1 ) - Please choose one
One can browse documents residing on a remote computer using ________
protocol.
► HTTP
► SMTP
► FTP
► TELNET
Question No: 24 ( Marks: 1 ) - Please choose one
Which one is the example of spreadsheet software ?
► MS Word
► MS PowerPoint
► MS Excel
► MS Access
Question No: 25 ( Marks: 1 ) - Please choose one
User can remotely log on to a computer and can have a control over it like a
local user using
► TelNet Protocol
► TelNet Protocol and connected to the user through TCP/IP network
► TelNet protocol and FTP
► TCP/IP and FTP
Question No: 26 ( Marks: 1 ) - Please choose one
Hardware malfunctions is related to
► Data updates
► Data integrity
► Data security
► Data accessibility
Question No: 27 ( Marks: 1 ) - Please choose one
PowerBuilder falls in the category of ______________.
► Assembly Languages
► 4-th Generation Languages
► Machine Languages
► High-Level Languages
Question No: 28 ( Marks: 1 ) - Please choose one
Backbone is also called as ________.
► vBNS
► BNS
► vHBNS
► HBNS
Question No: 29 ( Marks: 1 ) - Please choose one
Global variables can make the logic of a web page.
► Difficult to understand
► Easier to understand and maintain
► Difficult to reuse and maintain
► Difficult to understand, reuse and maintain
Question No: 30 ( Marks: 1 ) - Please choose one
In JavaScript: In order to display the text on browser Grade A, which of following
statement is True.
► documentwrite( "Grade A")
► document.write( "Grade A");
► document.write( "Grade” && A");
► document.write( "Grade” && “A");
Question No: 31 ( Marks: 1 )
What is bandwidth?
Bandwidth is a capacity of communication channel of carrying data.
Question No: 32 ( Marks: 1 )
What is “My Personal Agent”?
A computer programe that work automatically and have voice interface
Question No: 33 ( Marks: 2 )
For what purposes FTP is used in networks ?
To download or upload files / data to a remote computer
Question No: 34 ( Marks: 2 )
How can you define a readable program?
A program that is easy to read & understand also easy to maintain and enhance.
Question No: 35 ( Marks: 3 )
What is the preferred organizational structure for the organization?
The Network Organization: It is becoming the preferred organizational structure.
Question No: 36 ( Marks: 3 )
How can you define a consistent web design? Why is it needed?
A consistent web design is Easy understandable, not with heavy graphics, easy
navigation. It is needed because most of the website views leave the site
because of poor navigation and not easy to understand, text and design is not
clear etc.
Question No: 37 ( Marks: 3 )
Elaborate Vector or Object oriented graphics with atleast one example.
Vector treats everything that is drawn as object, they are resolution in dependent
and relatively small file size. For example swg, svg, wmf.
Question No: 38 ( Marks: 5 )
What are the advantages of multimedia presentations? Write any five.
Multimedia presentation is a great tool for effective communication:
Advantages:
1. Easy to make last minute change
2. More attractive
3. Can include animation, videos etc.
4. Better presentation easy to understandable for participants comparing to manual
presentation.
5. Undo feature
Question No: 39 ( Marks: 5 )
Can a human doctor be replaced by an Expert System? Give reasons to support
your answer.
Expert System is a computer system which simulates the knowledge and
expertise of a human expert. Yes, a human doctor can be replaced by an Expert
System. Following are the reasons to support my answer:
1. A large database of knowledge can be added to and kept up to date, it can store more
knowledge than a person.
2. The Expert System cannot FORGET or get facts wrong.
3. It survives forever. There is no loss of knowledge as there is when a doctor retires.
4. The Expert System can access specialist knowledge that a doctor may not have.
Question No: 40 ( Marks: 10 )
Explain the following issues of Data Management? (3+4+3)
1. Data entry
2. Data updates
3. Data security
DATA ENTRY:
There is new data entered every day.
New customers are added every day.
Some of the data entry requires the manual entry into computer system
New data entry needs to be entered correctly
DATA UPDATES:
Old titles must be removed regularly
Data changes every time
Prices change
Transportation / shipping cost changes
Customer personal data changes
Schemes changing, new offers
Every new entry needs to be entered correctly
DATA SECURITY:
All data in the system is very critical to its operation, the security of the
customer’s personal data is most important. Most of the hackers are always
trying for that type of information specially Credit Card Numbers.
This problem can be managed by using proper security arrangements and
mechanisms that provides access to only authorized entities. System Security
can be improved through, encryption, firewalls and updated Antivirus Softwares
Question No: 41 ( Marks: 10 )
Write a note on the followings
a. Image Preloading process
b. Animated Gifs
IMAGE PRELOADING PROCESS:
The primary use of image preloading process is to download the image into the
cache before it is actually needed to display.
PROCESS:
1. An example of the image object is shaped using the NEW keyword
2. The src property of this instance is set equal to the filename of the
image to be pre-loaded
3. This step starts the down-loading of the image into the cache
without actually displaying
4. When a pre-loaded image is required to be displayed, the src
property of the displayed image is set to the src property of pre fetched image
ANIMATE GIFS:
We can save 16 gif images of the previous example in a single file in
the form of an animated gif, and then used it in a regular <IMG> tag to
display a moving image. However, JavaScript provide better control
over the sequencing and the gap between the individual images.
Question No: 1 ( Marks: 1 ) - Please choose one
Success of a website is defined by ____________.
► User
► Designer
► Developer
► Programmer
Question No: 2 ( Marks: 1 ) - Please choose one
Which one is correct for JavaScript?
► onMouseOver
► OnMouseOver
► onmouseover 232 not confuse this is correct 100%
► All of the given
Question No: 3 ( Marks: 1 ) - Please choose one
An indexed list of elements is called _____________.
► Collection
► Array
► Set
► Group
Question No: 4 ( Marks: 1 ) - Please choose one
________ is the way that internet domain names are located and translated into
IP addresses.
► FTP
► VoIP
► DNS
► TCP
Question No: 5 ( Marks: 1 ) - Please choose one
The browser breaks down the URL into ________ parts.
►2
► 3
►4
►5
Question No: 6 ( Marks: 1 ) - Please choose one
Which one of the following is not an event handler's attribute?
► Function
► Identifier
► Equal sign
►String consisting of JavaScript statements
Question No: 7 ( Marks: 1 ) - Please choose one
JavaScript Variables are ____________.
►Dynamically Typed
► Statically Typed
► Strong Typed
► None of the given options
Question No: 8 ( Marks: 1 ) - Please choose one
Which of the following is NOT a Loop statement?
► For
► While
►Switch
► Do-While
Question No: 9 ( Marks: 1 ) - Please choose one
According to a popular heuristic, success is defined by ___________.
►The user
► The builder
► Both user and builder
► None of the given options
Question No: 10 ( Marks: 1 ) - Please choose one
Which one of the following is an application for artificial intelligence?
► Robotic
► Web Agent
► Decision Support System
► All of the given options
Question No: 11 ( Marks: 1 ) - Please choose one
Using only HTML we can create
► Dynamic web pages
► Static web pages
►Both Static and Dynamic pages
► None of these
Question No: 12 ( Marks: 1 ) - Please choose one
The ______ is connected to all other modules of the microprocessor.
►Control unit
► Memory unit
► Floating Point unit
► Arithmetic and Logic unit
Question No: 13 ( Marks: 1 ) - Please choose one
Which of the followings is NOT a Relational DBMS software.
► Access
► FrontPage
► FileMaker Pro
►SQL Server
Question No: 14 ( Marks: 1 ) - Please choose one
country=”Hello Pakistan”;
document.write(country.length);
The out put of the above statement is ____________. ?
► 12
► 13
► 14
►15
Question No: 15 ( Marks: 1 ) - Please choose one
The distance among families is ___________ because of spending more time
on internet.
►Increased
► Expanded
► Contracted
► Decreased
Question No: 16 ( Marks: 1 ) - Please choose one
______________ is a field that uniquely identifies each record stored in a table.
► Composite Key
►Primary key
► Foreign key
► None of the given options
Question No: 17 ( Marks: 1 ) - Please choose one
Planning and tracking of the project is the responsibility of the___________.
► Architect
►Team Lead
► Developer
► Chief Executive Officer
Question No: 18 ( Marks: 1 ) - Please choose one
___________ has great PR skills.
► Architect
► Team Lead
►Project Manager
►Chief Executive Officer
Question No: 19 ( Marks: 1 ) - Please choose one
_____________ team is responsible for a project after the specification’s stage
till the very end.
►Executive
► Architect
►Development
► HR
Question No: 20 ( Marks: 1 ) - Please choose one
A large number of networks interconnected physically is called ______
► LAN
► MAN
►Internet
► Network collection
Question No: 21 ( Marks: 1 ) - Please choose one
Efficiency is ______ to universality
► Equal
►Direct proportional
► Inversely proportional
► Not proportional
Question No: 22 ( Marks: 1 ) - Please choose one
There are _________ ways of calling functions.
► One
►Two
► Three
► Four
Question No: 23 ( Marks: 1 ) - Please choose one
Which protocol is use to transfer a file over the network ?
► UDP
► FTP
► TCP
► OSI
Question No: 24 ( Marks: 1 ) - Please choose one
Writing a response, multiple statements are separated from each other with the
help of
► Period ( . )
► Comma ( , )
► Colon ( : )
► Semicolon ( ;)
Question No: 25 ( Marks: 1 ) - Please choose one
Popular schemes used for reducing bytes for storage are:
► RGB and Color mapping
► RGB and Dithering
► RGB, Color mapping and Dithering
►Color mapping and Dithering
Question No: 26 ( Marks: 1 ) - Please choose one
______________ has the ability to automate and simplify daily tasks.
► Productivity software
► Application software
► System software
► Graphical software
Question No: 27 ( Marks: 1 ) - Please choose one
Which representation technique of algorithm is more suitable for developer to
make actual code___________.
► pseudo code
► flow chart
► both pseudo code and flow chart
► Heuristics
Question No: 28 ( Marks: 1 ) - Please choose one
_____________ is used to terminate all JavaScript statements.
► Colon
►Semicolon
► Underscore
► Apostrophe
Question No: 29 ( Marks: 1 ) - Please choose one
CONCATENATE operator is used to____________ elements.
► Subtract
► Multiply
►Join
► Add
Question No: 30 ( Marks: 1 ) - Please choose one
In partitioning of program/module, it should be assured that partitioned
chunks should be as _________ as possible.
► Dependent
►Independent
► Complex
► All of the above
Question No: 31 ( Marks: 1 )
What is the out put of the following JavaScript code ?
name=”Ali Akbar”;
document.write(name.charAt(4)) ;
Ans. A
Question No: 32 ( Marks: 1 )
What does WAN stand for?
Wide Area Network – A network in which computers are separated by great
distances typically across cities or even continents.
Question No: 33 ( Marks: 2 )
Why hub is used in networks?
The network traffic controller – components of convential computer networks.
Hub is used to connect the different computers in the network i.e. to the server.
Question No: 34 ( Marks: 2 )
What is output of the following JavaScript code ?
Str=”Virtual University of Pakistan”;
document.write(str.substring(5,str.length)) ;
Question No: 35 ( Marks: 3 )
Explain how many ways businesses monitor their employees?
Systems are available that monitor or most every key stroke that an employee
makes on computer. Systems are available that read and sensor all incoming
and outgoing email. It is quite straight forward to monitor where you surf and
when.
Question No: 36 ( Marks: 3 )
Diffentiate Local and Global Variables.
Local or function level variable effective only in the function in which they are
declared while globale variables visible everywhere on the webpage. Declaration
variables using the var keyword within a function makes them local. They are
available only within the function and hold no meaning outside of vs global.
Question No: 37 ( Marks: 3 )
Elaborate Vector or Object oriented graphics with atleast one example.
Treats everything that is drawn an object. Objects retain their identity after their
drawn. These objects can later be easily moved stretched duplicated deleted etc
are resolution independent relatively small size. e. g. swf, wmf,
Question No: 38 ( Marks: 5 )
Show output of the following code:
for (i=0; i<=10; i++)
document.write("The number is " + i);
document.write("<br />");
The number is 0
The number is 1
The number is 2
The number is 3
The number is 4
The number is 5
The number is 6
The number is 7
The number is 8
The number is 9
The number is 10
Question No: 39 ( Marks: 5 )
Why should we, as computing professionals, be interested in studying the social
implications of our creations?
This is imp. Because of keeping the track of money wise while implementation
actually and see the results. This fits with the organization or no. to check there is
any side effects morally or no. we have to be very careful while creation of any
system., error free, data loose recovery. Etc.
Question No: 40 ( Marks: 10 )
Write responsibilities of the followings
1. Developer
a) Module level design.
b) Coding
c) Unit testing
2. Executive Team
a) Responsible for the day to day operations.
b) All the decision related issues.
c) Policy making and changing etc.
e.g. In this usually CEO and CMSO involves
1. He is responsible for the day to day operation and great organizational skills.
3. Support Team
The support team is responsible for the complete operations such as
arrangement for performing any kind of task from the starts to the end. Fully
project handling and performing etc. In case of any maintenance they are the
responsible for commencing the job and making sure to complete.
Question No: 41 ( Marks: 10 )
Write HTML and JavaScript code for the requirements shown in the diagram
below.
When ConvertoUpperCase button is pressed, the entered text is converted to
upper case and result is displayed in the result text box. Similarly, when
ConvertoLowerCase button is pressed, the entered text is converted to lower
case and result is displayed in the result text box.
Q1. Computers are good at:
Select correct option:
Speed
Storage
Never bored
All of the given choices
Q2.Grace Hopper of US Navy develops the very first_______ compiler
Select correct option:
Low-level Language
High-level language
Both high and low level language
None of the given choices
2.5 Harvard Mark 1 – 1943:
Howard Aiken and Grace Hopper designed the MARK series of computers at Harvard
University. The MARK series of computers began with the Mark I in 1944. Imagine a
giant roomful of noisy, clicking metal parts, 55 feet long and 8 feet high. The 5-ton
device contained almost 760,000 separate pieces. Used by the US Navy for gunnery
andballistic calculations, the Mark I was in operation until 1959. The computer,
controlled by pre-punched paper tape, could carry out addition, subtraction,
multiplication, division and reference to previous results. It had special
subroutines for logarithms and trigonometric functions and used 23 decimal place
numbers. Data was stored andcounted mechanically using 3000 decimal storage wheels,
1400 rotary dial switches, and 500 miles of wire. Its electromagnetic relays classified the
machine as a relay computer. All output was displayed on an electric typewriter. By
today's standards, the Mark I was slow, requiring 3-5 seconds for a multiplication
operation
(p14
Q3.The first Web browser with a GUI was generally available in:
Select correct option:
1992
1993
1994
1995
The first Web browser with a graphical user interface was generally available (Mosaic, in
1993), the term seemed to apply to Web content, too. Technically, a Web browser is a
client program that uses the Hypertext Transfer Protocol (HTTP) to make requests of
Web servers throughout the Internet on behalf of the browser user.(18
Q4. If a computer could pass the Turing test then it would be able to:
Select correct option:
win a million dollar prize
think like human begins
think but slower than humans
do the things faster
2.2 The “Turing test”
A test proposed to determine if a computer has the ability to think. In 1950, Alan Turing
(Turing, 1950) proposed a method for determining if machines can think. This method is
known as The Turing Test. (13
Q5.The name of programming language, specifically designed by the US Department of
Defense for developing military applications, was:
Select correct option:
Smalltalk
C
C++
Ada
Ada: A programming language specifically designed by the US Dept of Defense for
developing military applications was named Ada to honor her contributions towards
computing(p9
Q6.TCP Stands for:
Select correct option:
Transmission Control Principles
Transmission Control Protocol
Transformation Control Protocol
Translation Control Protocol
Communications on the Internet is controlled by a set of two protocols: TCP and IP
TCP/IP Transmission Control Protocol/Internet Protocol Networking protocol used by all
computers and networks on the Internet Originally developed by the US DoD for Unix,
but now available for most other OSes TCP breaks down the message to be sent over the
Internet into packets IP routes these packets through the Internet to get them to their
destination When the packets reach the destination computer, TCP reassembles them into
the original message (p196
Q7.Web is a unique invention by humans in terms that it is:
Select correct option:
accessible to all humans
accessible to only the owners who control it
accessible to particular locations only
None of the given choices
Q8.The name of first commercially available PC was:
Select correct option:
UNIVAC 1
ENIAC
EDVAC
Altair 8800
2.9 UNIVAC 1 – 1951
UNIVAC-1. The first commercially successful electronic computer, UNIVAC I, was also
the first general purpose computer - designed to handle both numeric and textual
information. It was designed by J. Presper Eckert and John Mauchly. The implementation
of this machine marked the real beginning of the computer era.(P14
Q9. A strategy in which all possible combinations are examined and best one is selected
called……………
Select correct option:
Divide and conquer
Brute force
Heuristic
All of given
16.12 The Brute Force Strategy (1)
A strategy in which all possible combinations are examined and the best among them is
Selected (p103
Q10.Super Computers are used in:
Select correct option:
Weather forecasting
Aeroplane manufacturing
Atomic Bomb experiments
All of the given choices
<!--[if !supportLineBreakNewLine]-->
<!--[endif]-->
Q11.ENIAC was first____ Computer
Select correct option:
Large-scale
General-purpose
Electronic
All of the given choices
2.6 ENIAC – 1946:
ENIAC I (Electrical Numerical Integrator And Calculator). The U.S. military sponsored
their research; they needed a calculating device for writing artillery-firing tables (the
settings used for different weapons under varied conditions for target accuracy).(p14)
Q12.Which one of the following units can be called as the brain of computer
microprocessor?
Select correct option:
ALU (Arithmetic & Logic Unit)
FPU (Floating Point Unit)
Control Unit
Bus Interface Unit
A control unit is the part of a CPU or other device that directs its operation. The outputs
of the unit control the activity of the rest of the device. A control unit can be thought of as
a finite state machine. It is called the brain of computer microprcessor. (p36
Q13.Which one of the following is a really fast port that lets you connect computer
peripherals and consumer electronics to your computer without the need to restart?
Select correct option:
Freeware
Shareware
Fire wire
Firmware
FireWire is simply a really fast port that lets you connect computer peripherals and
consumer electronics to your computer without the need to restart. It is a simple common
plug-in serial connector on the back of your computer. It has the ability to chain devices
together in a number of different ways without terminators for example, simply join 2
computers with a FireWire cable for instant high-speed networking.(P24 )
Q14.The name of programming language, specifically designed by the US Department of
Defense for developing military applications, was:
Select correct option:
Smalltalk
C
C++
Ada
Ada: A programming language specifically designed by the US Dept of Defense for
developing military applications was named Ada to honor her contributions towards
computing(p9
Q15 Which one of these is NOT an example of storage devices?
Select correct option:
CD
Floppy
Hard Disk
Q16 Which category of computers lies between Workstation and Mainframe computers?
Select correct option:
Microcomputer
Desktop
Laptop
Minicomputer
4.4 Servers / Minicomputers A midsized computer. In size and power, minicomputers lie
between workstations and mainframes. In the past decade, the distinction between large
minicomputers and small mainframes has blurred, however, as has the distinction
between small minicomputers and workstations. But in general, a minicomputer is a
multiprocessing system capable of supporting from 4 to about 200 users simultaneously.
(21
Q17 Algorithm is a precise sequence of a limited number of _________ ,
___________steps that terminates in the form of a solution
Select correct option:
Ambiguous, Executable
Nondeterministic, Finite
Finite, countable
Unambiguous, executable
Ref
1st Definition:
Sequence of steps that is taken to solve a problem
Better Definition:
A precise sequence of a limited number of unambiguous, executable
steps that terminates in the form of a solution
Q18 Which one of the following web programming languages used to do client-side
scripting?
Select correct option:
ASP
Server Side JavaScript
PHP
VBScript
We’ll use JavaScript to do client-side scripting. However, there are many other
languages p119
Q19 This principle called the “Ockham’s Razor,” states when choosing among
competing, successful solutions to a problem; choose the one which is the least ________
Select correct option:
Time Consuming
Ambiguous
Complex
Selecting Among Algorithms
When choosing among competing, successful solutions to a problem, choose the one
which is the least
complex This principle is called the “Ockham’s Razor,” after William of Ockham -
famous 13-th century English philosopher(101
Q20 _________ software sits on top of ________ software for performing user tasks.
Select correct option:
System, Application
System, Productivity
Application, System
System, Programming
Q21 Deep Blue was the name of:
Select correct option:
Human
Computer
City
None of the given choices
In 1997 Deep Blue, a supercomputer designed by IBM, beat Gary Kasparov, the World
Chess Champion That computer was exceptionally fast, did not get tired or bored. It just
kept on analyzing the situation and kept on searching until it found the perfect move from
its list of possible moves (P9)
Q22 Linux and Mac are examples of :
Select correct option:
Uni processor OS
Multi processor OS
Q23 Given the HTML code, <A HREF="mailto: [email protected] ">
[email protected] </A> My email. Read the code carefully and tell what out put
browser will generate?
Select correct option:
[email protected] [email protected]My email
[email protected]None of the given choices
ref: right answer will be
[email protected] My email.
paste following code in any html file and view in browser
<html>
<body>
</body>
</html>
Q24 There is a battery on the mother board to:
Select correct option:
give power to the processor
Save information when computer is OFF
Help the boot process
Save information when computer is ON
ROM
ROM is "built-in" computer memory containing data that normally can only be
read, not
written to. ROM contains the programming that allows your computer to be
"booted
up" or regenerated each time you turn it on. Unlike a computer's random access
memory
(RAM), the data in ROM is not lost when the computer power is turned off.
The ROM is sustained by a small long-life battery in your computer.
Q25 Alan Turing of Cambridge University presented his idea of a theoretically simplified
but fully capable computer, now known as:
Select correct option:
<!--[if !supportLineBreakNewLine]-->
<!--[endif]-->
Analytical Engine
Turing Machine
Difference Engine
None of the given choices
Q26 _ is the example of a Web browser
Select correct option:
Yahoo
Netscape Navigator
Web Application
Google
Q27 The Analytical Engine was machine of which type?
Select correct option:
Programmable
Mechanical
Digital
All of the given choices
1.2. The Analytical Engine A programmable, mechanical, digital machine Could carryout
any calculation Could make decisions based upon the results of the previous calculation
Components: input; memory; processor; output(p 9)
Q28 Interactive Forms are always placed between:
Select correct option:
Body tags of a Web page
Head tags of a Webpage
Q29 Which interface on computer supports transmission of multiple bits at the same
time?
Select correct option:
Serial Port
Parallel Port
PS/2 Port
Universal Serial Bus
Parallel
An interface on a computer that supports transmission of multiple bits at the same time;
almost exclusively used for connecting a printer. On IBM or compatible computers, the
parallel port uses a 25-pin connector.p24
Q30 If we want to show numbers with List Items, then we use
Select correct option:
<UL>
<OL>
<DL>
none of the given
Q31 Trialware Softwares are used for
Select correct option:
short period
long period
life time
none of the given
Software that can be run for a limited period of time before it is
purchased. Trialware has a built-in expiration date and will cease to
operate beyond that date if it has not been paid for. Also called
"demoware.(
http://encyclopedia2.thefreedictionary.com/trialware)
Q32 Babbage’s Analytical Engine could store information permanently in:
Select correct option:
Magnetic Tape
Floppy Disk
Punched Cards
None of the given choices
Q33 First computer that could not only manipulate numbers but also text data as well
was:
Select correct option:
ENIAC
EDVAC
UNIVAC 1
Attanasoff-Berry Computer
ENIAC I (Electrical Numerical Integrator And Calculator). The U.S. military sponsored
their research; they needed a calculating device for writing artillery-firing tables (the
settings used for different weapons under varied conditions for target accuracy). John
Mauchly was the chief consultant and J Presper Eckert was the chief engineer.
Eckert was a graduate student studying at the Moore School when he met John Mauchly
in 1943. It took the team about one year to design the ENIAC and 18 months and 500,000
tax dollars to build it. The ENIAC contained 17,468 vacuum tubes, along with 70,000
resistors and 10,000 Capacitors.
Q34 Greedy algorithms are usually faster, since they don't consider the details of possible
alternatives
Select correct option:
True
False
KEY ADVANTAGE: Greedy algorithms are usually faster, since they don't consider the
details of possible alternatives (P102
Q35 SCSI stands for:
Select correct option:
Small Computer System Interface
System Common Small Integration
Silicon Computer System Interface
None of the given choices
SCSI
A port that's faster than the serial and parallel ports but slower and harder to configure
than the newer USB port. Also know as the Small Computer System Interface.(24
Q36 Greedy algorithm does not support……………….. Situation.
Select correct option:
Local
Global
Complex
All of given
Q37 Which of the followings is not a Flowchart Element?
Select correct option:
Off- frame connector
Input or output
Process
Connector
flowchart elements
Start or stop
Process
Input or output
Connector
Decision
Flow line
Off-page connector
these are all the elements of flow chart so?
Q38 During one of the international cricket tournaments, one of the teams intentionally
lost a match, so that they could qualify for the next round If they had won that particular
match, some other team would have qualified This is an example of a
_________________
Greedy algorithm
Non-greedy algorithm
Q39 Teraflop stands for:
Select correct option:
Thousand floating point operations per second
Thousand floating point operations per hour
Trillion floating point operations per second
Trillion floating point operations per hour
A____________________ is the process of analyzing large databases to identify patterns
Data Mining
Data Normalization
Data Redundancy
Data Manipulation
onFocus executes the specified JavaScript code when ___________
a window receives focus
a form element receives input focus
a window receives focus or when a form element receives input focus
None of the Given.
CERN releases WWW in:
1992
1993
1994
None of the given choices
Communications on the internet is controlled by a set of two protocols, named :
HTTP & SMTP
FTP & TELNET
TCP & IP
None of the given choices
One of the disadvantages of working at home is________________
Family life may be happier because of living at home.
Family life may suffer as well, as some never turn off, and keep on working through out the
day, evening and night
Family life may become happier because he can give more time to his family.
There is no disadvantage of working at home.
The greatest, shared resource of information created by humankind is:
Web
Dictionary
Vocabulary
Glossary
There are _____________ types communication channels.
3
4
The Cyberwarefare is a ______
Crime
War
Software
Game
In the statement “PopUp(“Message”)” :
“PopUp” is the function Name, “Message” is the argument
“Message” is function identifier
Syntax Error: functions cannot be called in this way
Error: function is undefined
RGB scheme stands for _________________________________.
Red Grey Blue
Red Green Brown
Red Green Blue
Red Green Black
_____________ is the part of the virus that generally consists of malicious computer instructions
Off load
Payload
Loader
Transmitter
Unlike viruses, __________________ are stand-alone programs
Trojan horses
Logic- or time-bombs
Worms
None of the given
Voice over IP has _____ modes
3
4
We use __________ to stop Break-Ins.
Scanners
Intrusion detectors
Firewalls
Intrusion detectors and Firewalls
Which one can lead user to leave your website?
Simple design
Poor navigation
Information layout
Adaptable design
_____________________ are the subcategories of AI
Expert Systems
Robotics
Natural Language Processing
All of the above
With the Help of FTP we can:
List, change, create folders on a remote computer
Upload and download files
Transferring Web content from the developer’s PC to the Web server
All of the given choices
Which protocol is used for receiving E-mail messages?
FTP
POP
Telnet Protocol
SMTP
The organizations are learning that business can be done in a more effective manner if emphasis is
placed upon ______________.
Cooperation
Shared responsibility
Networking
All of the given
___ is used to transfer files between computers on a TCP/IP network
FTP
POP
Telnet Protocol
SMTP
Which of the following is True about “pareseFloat(String)” function: I) If the first character cannot
be converted to a number, parseFloat returns NaN. II) it returns the fractional portion of floating
point number. III) Parses the string argument; returns a FP number. IV) Non of given options.
I and II Only
II and III Only
I and III Only
IV Only
Event-driven programs can ____________________ events.
capture
respond
capture and respond
None of the Given.
Which of the statements is NOT true about “Color Usage Guidelines” for developing a presentation?
Use color sparingly to to highlight a point, but don't get carried away
Do not use colors like yellow or red for background except where needed.
Do not use colors like green, blue and such like colors except where needed.
None of given options
_________________ Type of databases management systems are supporting Terabytes of Data
Personal
Desktop
Enterprise
Single-user
Because of the ever-decreasing costs of verbal, text, video communications; the distances have
_________
Increased
Expanded
Contracted
Lengthened
The structure of the networked organization is _________.
Simple
Flexible
Complex
All of the given
A CAD drawing consist of many geometric shapes like straight lines , arc , tc and therefore is stored
in a ___________ format.
Scalar
Vector
Both a & b
____ is a type of computer-to-computer messaging.
TCP
Telnet
E-mail
FTP
None of these
RDBMS stands for ________________________________
Relative Data Base Management System
Relational Data Base Management System
Recursive Data Base Management System
Responsible Data Base Management System
Using Color Mapping scheme only a limited number of color called _____________ are allowed.
Reserved
Pointers
Platelet
None of these
Using _________ topology, adding new nodes is difficult.
Ring
Bus
Star
None of the given choices
Problems with old presentation methods was (transparencies and projectors etc):
They were costly
Electronic transmission, in some cases, was not easy
Presentation some times gets ambiguous
All of given options
ARPANET splits into two nets to keep military & non-military network sites separate, named :
ARPANET & MILNET
MICRONET & MILNET
PICONET & ARPANET
None of the given choices
Arguments values are passed to the function _________
by value
by reference
Both a & b
Non of the Given.
__________________ is a field that uniquely identifies each record stored in a table.
Primary Key
Foreign Key
Secondary key
Special Key
The IP address consists of _____ bits
64
32
16
128
Credit Card Fraud can be minimized by using _________________
single credit card numbers
multiple-use credit card numbers
single-use credit card numbers
Firewalls
hotWeather = (Temperature == 40); in the above statement, the variable hotWeather is of type
Number
String
Boolean
None of the given
NCSA stands for :
NationalCenter for Supercomputing Applications
NationalCenter for Supreme Applications
NationalCenter for Super Authority
None of the given choices
Self-replicating SW that eludes detection and is designed to attach itself to other files is called
_____________.
Trojans
Viruses
Sniffers
Operating System
SVG stands for _________________________________________.
Structured Vector Graphics
Software Vector Graphics
Structured Visual Graphics
None of these
Viruses move from one computer to another with the __________ and spring into action when the
_____________ is executed or opened
Host – Host
Host – Client
Client – Host
Client – Client
____________________ is a layered structure consisting of a number of homogenous and simple
processing elements.
Genetic Algorithms
Rule-based Systems
Feed-Forward Network
None of these
A property that gives the value of Pi is:
PI()
Graph.PI
Math.PI
Math.PI()
The smallest image forming element on a computer display is called ____________.
Resolution
Pixel
Grey area
None of these
SMTP stands for _______________________________________.
Simple Mail Transfer Protocol
Simple Mail Transparent Protocol
Simple Mail Transfer Paradigm
None of these
________________ network allows data to be sent directly from one computer to another.
Ring
Bus
Star
None of the given choices
Viruses attach themselves to other computer programs or data files, are known as____
Trojans
Guests
Hosts
Spies
Avoid __________ to ensure readability of web page
Overuse of bold and italics
Use of paragraphs
Use of white space
Use of contrast colors
STP stands for :
Shielded Twisted Pair
Silver Twisted Pair
Single Twisted Pair
None of the given choices
In ______, the spies of one business monitors the network traffic of their competitors.
Industrial intelligence
Industrial Espionage
Industrial spying
Industrial surveillance
Color mapping scheme reducing the size of 2.25 MB graphic to _________ MB.
0.90 MB
0.75 MB
1.00 MB
None of these
The functions which call themselves from their (own) body are called:
Virtual functions
Abstract functions
Overriding functions
Recursive functions
Browser sends ‘_________’ request to web server to access a file.
SET
GET
TRANSFER
All of the given choices
The internet communities are ___________.
Geographical based
Interest based
Country based
Religion based
Infection propagation and Actual destructive are the components of _______________
Transmission mechanism
Payload
Worms
Trojan Horse
An algorithm that always takes the best immediate or local solution while finding an answer
is called____.
► Deterministic Algorithm
► Non deterministic Algorithm
► Greedy Algorithm
► Randomized Algorithm
Which of the following command allows you to recover form mistakes in MS Word?
► Clear
► Edit
► Undo
► Break
A ____________ operating system allows many users to take advantage of the
computer's resources, simultaneously
► Single user
► Multi- user
► Single tasking
► Multi tasking
Network Interface Card is an __________ device
► Input
► Output
► Input/Output
► Storage
The decimal equivalent of binary 1000 is
► 7
► 8
► 9
► 10
Which of the following is NOT RDBMS software?
► My Sql
► MS Excel
► Oracle
► SQL Server
A computer virus is a
► Software that saves the computer from being damaged.
► Application software that helps to make different type of viruses and worms
► Program that spreads itself and destroys other program
► Program that corrects the problems in your computer
What will be the result of a?
a = Math.abs(-23)
► 23
► -23
► 23.0
► 2.3
A Special program required to view swf (Shockwave Flash) files in web Browser is called
► TFlash
► Vflash
► plug-in
► None of the given options
Using Java Script you can write a character at random location on screen
► By applying randomCh() method
► With the help of String object
► With the help of random character property
► There is no built in approach in Java Script
If incorrectly we enter the negative age it is check by
► Limit Integrity
► Type Integrity
► Referential Integrity
► Physical Integrity
Which protocol is use to transfer a file over the network?
► UDP
► FTP
► TCP
► OSI
One can send an email message to a remote computer using _______ protocol
► HTTP
► SMTP
► FTP
► TELNET
In a System having many parts to be designed, one should always do the _____ first
► Hard part
► Simple part
► Development part
► Quality part
Flow control constructs in JavaScript includes:
► If-Else
► Loops and If -Else
► Switch and If-Else
► All of the given choices
___ provides a simple, consistent way for applications to interact with the HW without having to
know all the details of the HW
► Explorer.exe
► System Files
► Operating System
► Application Software
Machine language is also called
► Assembly Language
► Binary Language
► High Level Language
► HTML Language
_________ is the best known builder for supercomputers.
► Sun
► Cray Research
► Microsoft
► Apple
The weaknesses of the computer are:
► Pattern recognition & Storage
► Speed & Innovative ideas
► Pattern recognition & Innovative ideas
► Speed & Storage
Communication protocol is a __________that governs the flow of information over a network
► Set of methods
► Set of protocols
► Set of rules
► Device
_____________ team is responsible for the maintenance, expansion , improvement of the
infrastructure consisting of workstations, networking equipment, software and network security.
► Support
► Configuration Management
► Quality Assurance
► Developer
_____________ team consists on the sharpest technical minds in the company.
► Architecture
► Business Development
► Configuration Management
► Developer
_______________ is responsible for day to day operations.
► CEO
► COO
► CMSO
► Developer
One of the key responsibilities of the ___________ is client relationship management.
► Project Manager
► Team Lead
► Developer
► Quality Assurance Engineer
What is the major problem with flash based website?
► Its two heavy
► Cannot be indexed
► Less attractive
► Inaccessible
Which of the following is NOT an event handler for image object?
► onAbort
► onError
► onLoad
► onUser
The organizations are learning that business can be done in a more effective manner if emphasis is
placed upon ___________.
► Cooperation
► Shared responsibility
► Networking
► All of the given options
a = Math.abs(-23)
What will be the value of a ?
► 23
► -23
► 23.0
► 2.3
ERP is a type of __________________ .
► Entertainment software
► Productivity software
► Business software
► Scientific software
In Genetic Algorithm the most important thing you should know, is the ___________.
► Procedure
► Recognition of a good solution
► Different techniques
► None of the given options
According to a popular heuristic, success is defined by ___________.
► The user
► The builder
► Both user and builder
► None of the given options
Rule of thumb learned through trial and error is called ___________.
► Design
► Heuristic
► Plan
► Aim
JavaScript Variables are ____________.
► Dynamically Typed
► Statically Typed
► Strong Typed
► None of the given options
Which of the following application are collections of cells?
► Word
► Excel
► PowerPoint
► Outlook Express
The browser breaks down the URL into ________ parts.
►2
►3
►4
►5
A named collection of properties (data, state) and methods (instruction, behavior) is called
____________.
► Array
► Function
► Variable
► Object
First computer network was ___________.
► NSFNET
► FIRSTNET
► ARPANET
► ORPHANET
In JavaScript, a variable declaration is
► Optional
► Mandatory
► Not allowed
► None of the given
A protocol used for receiving email messages is called ____________.
► URL
► Telnet
► POP3
► SMTP
which one is correct?
► onUnload
► onUnLoad
► onUNLOAD
► All of the above
Serial arrangement in which things follow logical order or a recurrent pattern, such as statements
executing one by one, is called __________.
► Loop
► Sequence
► Condition
► Array
Variables allow us to manipulate data through the ___________.
► Actual Value
► Reference
► Length
► Name
Fuzzy logic is based on ____________.
► Ground facts
► Experience
► Practice
► Approximation
Word Processor is a _________________
► System Software
► Application Software
► Device
► Utility
In the old days, databases did NOT support ____________.
► Number
► Boolean
► Video
► Text
In tabular storage, fields placed in a particular row are strongly ___________.
► Independent
► Dependent
► Interrelated
► Inconsistent
Due to working at home, lack of interaction may result in ___________ professional growth.
► Slower
► Faster
► Higher
► Improved
Distance learning has got a boost due to the ___________.
► Easy communication
► Online interactive contents
► Flexibility
► All of the given options
_____________ technique can be used to create smooth animations or to display one of several
images based on the requirement.
► Image downloading
► Image preloading
► Image uploading
► Image postloading
The ____________ is becoming the preferred organizational structure for more and more
organizations with the passage of time.
► Tree structured organizational model
► Network paradigm
► Hierarchical structure
► None of the given options
The group of technologies concerned with the capturing, processing and transmission of
information in the digital electronic form is called
_____________.
► Telecom Engineering
► Computer Engineering
► Computer Science
► Information Technology
A large number of networks interconnected physically is called ______
► LAN
► MAN
► Internet
► Network collection
TCP stands for ________.
► Transfer Center protocol
► Transmission Control Protocol
► Transmission Center Protocol
► Telephone Center Protocol
A collection of data organized in such a way that the computer can quickly search for a desired data
item is known as :
► Retrieving
► Database
► Information
► DBMS
______ is simply a fast port that lets you connect computer peripherals and consumer electronics to
your computer without restart.
► Freeware
► Shareware
► Firewire
► Firmware
Structures, in which another list starts before the first list is finished, are called:
► Multiple Lists
► Nested Lists
► Ordered Lists
► Un-ordered Lists
The key property of the ‘Array’ object in JavaScript is
► Value
► Length
► Name
► All of the given choices
Which one is the example of spreadsheet software ?
► MS Word
► MS PowerPoint
► MS Excel
► MS Access
The Encryption of data is related to
► Data updates
► Data security
► Data integrity
► Data accessibility
_____ is the process of analyzing large databases to identify patterns.
► Data normalization
► Data management
► Data Mining
► None of the given options
Which is the user-friendly way of presenting data ?
► Query
► Form
► Report
► All of the given options
<form> Tags always placed between the <BODY> and </BODY> tags of a Web page
► True
► False
Java script has ----------------- ability to create and draw graphics.
► Limited
► Versatile
► Medium
► Not at all
Which of the following is incorrect for making design elements legible?
Select correct option:
Elements should be large enough
Elements must contrast sufficiently
Related elements should be visually grouped
Elements should have no visual focus
Function is also known as ______________.
Select correct option:
subprogram
procedure
subroutine
All of given
In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET.
Select correct option:
1973
1983
1972
None of the given choices
E-mail system has ______ component(s)
Select correct option:
E-mail client
SMTP server
POP3 server
All of the given choices
_______ / / /______/ A Parallelogram (Tilted rectangle) represents the ________________ flow chart
element.
Select correct option:
Process
Input or Output
Decision
Connector
If a computer could pass the Turing test then it would be able to:
Select correct option:
win a million dollar prize
think like human begins
think but slower than humans
do the things faster
Punched cards were replaced by:
Select correct option:
Floppy Disk
Zip Drives
Magnetic storage
None of the given choices
The ________virus may display an annoying, but harmless message
Select correct option:
Malicious
Neutral
Helpful
DoS
The name of very first computer was:
Select correct option:
ABC
BCD
EDC
None of the given choices
The internet communities are ___________.
Select correct option:
Geographical based
Interest based
Country based
Religion based
which one is correct?
► onUnload
► onUnLoad
► onUNLOAD
► All of the above
Serial arrangement in which things follow logical order or a recurrent pattern, such as statements
executing one by one, is called __________.
► Loop
► Sequence
► Condition
► Array
Variables allow us to manipulate data through the ___________.
► Actual Value
► Reference
► Length
► Name
Fuzzy logic is based on ____________.
► Ground facts
► Experience
► Practice
► Approximation
Word Processor is a _________________
► System Software
► Application Software
► Device
► Utility
In the old days, databases did NOT support ____________.
► Number
► Boolean
► Video
► Text
In tabular storage, fields placed in a particular row are strongly ___________.
► Independent
► Dependent
► Interrelated
► Inconsistent
Due to working at home, lack of interaction may result in ___________ professional growth.
► Slower
► Faster
► Higher
► Improved
Distance learning has got a boost due to the ___________.
► Easy communication
► Online interactive contents
► Flexibility
► All of the given options
_____________ technique can be used to create smooth animations or to display one of several
images based on the requirement.
► Image downloading
► Image preloading
► Image uploading
► Image postloading
The ____________ is becoming the preferred organizational structure for more and more
organizations with the passage of time.
► Tree structured organizational model
► Network paradigm
► Hierarchical structure
► None of the given options
The group of technologies concerned with the capturing, processing and transmission of
information in the digital electronic form is called
_____________.
► Telecom Engineering
► Computer Engineering
► Computer Science
► Information Technology
A large number of networks interconnected physically is called ______
► LAN
► MAN
► Internet
► Network collection
TCP stands for ________.
► Transfer Center protocol
► Transmission Control Protocol
► Transmission Center Protocol
► Telephone Center Protocol
A collection of data organized in such a way that the computer can quickly search for a desired data
item is known as :
► Retrieving
► Database
► Information
► DBMS
______ is simply a fast port that lets you connect computer peripherals and consumer electronics to
your computer without restart.
► Freeware
► Shareware
► Firewire
► Firmware
Structures, in which another list starts before the first list is finished, are called:
► Multiple Lists
► Nested Lists
► Ordered Lists
► Un-ordered Lists
The key property of the ‘Array’ object in JavaScript is
► Value
► Length
► Name
► All of the given choices
Which one is the example of spreadsheet software ?
► MS Word
► MS PowerPoint
► MS Excel
► MS Access
_____ is the process of analyzing large databases to identify patterns.
► Data normalization
► Data management
► Data Mining
► None of the given options
Which is the user-friendly way of presenting data ?
► Query
► Form
► Report
► All of the given options
JavaScript function fixed() has equivalent HTML tag-set ____
► <.FIX>……………</FIX>
► <F>………………..</F>
► <PRE>………….</PRE>
► <H>………………..</H>
<form> Tags always placed between the <BODY> and </BODY> tags of a Web page
► True
► False
Java script has ----------------- ability to create and draw graphics.
► Limited
► Versatile
► Medium
► Not at all
Internet is an example of ______________ network.
Private
Public
Both Private and Public
None of the given choices
The name of first commercially available PC was:
UNIVAC 1
ENIAC
EDVAC
Altair 8800
Algorithm is a ____________________
Definition of a problem
Sequence of steps to solve a problem
Understanding of a problem
Solving a problem
A group of information is called __________________
File
Database
Record
Field
___________________ is a branch of computer science concerned with manipulating and enhancing
computer graphics.
Image Handling
Image Processing
Image Engineering
None of these
__________has changed our way of life like no other technology.
Computational technology
Computer technology
Computing technology
None of the Above
Sophisticated event handling is not possible with _______________ event handling
Off-Line
In-Line
Out-Line
Non of the given choices
Babbage’s Analytical Engine could store information permanently in:
Magnetic Tape
Floppy Disk
Punched Cards
None of the given choices
There are __________ popular schemes to reduce the number of bytes that are required for storing
graphics.
4
3
2
None of these
The internet-society is considered under Surveillance because:
While surfing, we are being watched, constantly
Our every click is recorded and analyzed to extract patterns and behaviors
Webcams are becoming common. Providing a cheap way for parents to watch their children's every move
All of the given
URL is a/an ________
► Device
► Component
► Address
► Tool
To improve the time for scanning a web page, text should be ___________.
► Centered
► Left Aligned
► Right Aligned
► Staggered
Communications on the internet is controlled by a set of two protocols which are ____________.
► IMAP and SMTP
► FTP and HTTP
► TCP and IP
► TCP and HTTP
FTP stands for __________.
► File transmission protocol
► File transmission path
► File transfer protocol
► Fine transfer path
A named collection of properties (data, state) and methods (instruction, behavior) is called
____________.
► Array
► Function
► Variable
► Object
Anchor tag denoted by <A> is used to create
► Address
► Hyperlink
► Paragraph
► Title
<UL> tag is used to
► underline text
► end the line
► create ordered list
► create unordered list
A user may access any item on the web through __________.
► URL
► Telnet
► POP
► SMTP
The browser breaks down the URL into ________ parts.
►2
►3
►4
►5
Which one of the following is NOT a primary color?
► Red
► Green
► Yellow
► Blue
According to a popular heuristic, success is defined by ___________.
► The user
► The builder
► Both user and builder
► None of the given options
The idea of Neural Networks field is based upon ______________.
► Human nature
► Human brain
► Human culture
► Human actions
ERP is a type of __________________ .
► Entertainment software
► Productivity software
► Business software
► Scientific software
__________ are those programs in which the flow of the program is determined by the user's actions
(mouse clicks, key presses) or messages from other programs.
► Event called programs
► Event processed programs
► Event driven programs
► Event declared programs
Automatic machines performing various tasks that were previously done by humans, are called
____________.
► Robotics
► Computers
► Decision Making Systems
► Autonomous Web Agents
country=”Hello Pakistan”;
document.write(country.charAt(6));
The out put of the above statement is _____________.
►o
►P
►a
►k
The distance among families is ___________ because of spending more time on internet.
► Increased
► Expanded
► Contracted
► Decreased
The software used for the scanning of internet severs, is called __________.
► Wscan
► Mscan
► Sscan
► Vscan
Adding images to html page, we use___________ tag.
► <IMG>
► <IMAGE>
► <PICTURE>
► <PIC>
The group of technologies concerned with the capturing, processing and transmission of
information in the digital electronic form is called _____________.
► Telecom Engineering
► Computer Engineering
► Computer Science
► Information Technology
The responsibilities of the Team Lead includes_____________.
► Planning and tracking of the project
► Detailed design
► Professional development of team members
► All of the given options
When the packets reach at destination, __________ reassembles them into original message.
► Protocol
► TCP
► IP
► NIC
Many developers write the _________ first and then incrementally convert each line into _________.
► Real code & Pseudo code
► Pseudo code & Real code
► Real code & Artificial code
► None of the given options
Machine language is also called
► Assembly Language
► Binary Language
► High Level Language
► HTML Language
In JavaScript, second element of an array has the index:
►2
►0
►1
►3
Each element in an array is given an index, which is an integer value between 0 and one less than the
length of the array. The first element has an index of 0, the second element has an index of 1, and so on.
One can download or upload files to a remote computer using ________ protocol.
► HTTP
► SMTP
► FTP
► TELNET
JavaScript ________ support drawing of graphics
► Does
► Does not
► Always
► At times
Which of the following is NOT true about modern computers?
► More powerful
► Smaller in size
► Consume less energy
► Costly
Ada written a computer programme for ?
► Analytical Engine
► Difference Engine
► Harvard Mark 1
► Mechanical engine
A set of stand alone productivity applications designed to work together known as ______________ .
► Productivity software suites
► Compiled software
► Secure software
► Intelligent software
Because of spending more time on the internet, the distances among the families have been _____.
Increased
Expanded
Contracted
Shortened
Sophisticated event handling is not possible with _______________ event handling
Off-Line
In-Line
Out-Line
Non of the given choices
Autonomous Web Agents are also known as _________________
Mobile Agents
Softbots
Both "Mobile Agents" & "Softbots"
None of these
A communication protocol is a __________that governs the flow of information over a network.
Set of Methods
Set of Protocols
Set of rules
None of the given choices
By default in a web page Hyper Link for another web page is represented as:
Blue only
Black and Underlined
Blue and Bold
Blue and Underlined
The organizations are learning that business can be done in a more effective manner if emphasis is
placed upon ______________.
Cooperation
Shared responsibility
Networking
All of the given
Monitor is an example of __________devices
Output
Input
Processing
None of the given choices
The code in the ________ portion is the right choice for developing larger JavaScript scripts
Body
At End
Head
Separate
____________________ based on the principles of the logical reasoning ability of humans.
Genetic Algorithms
Rule-based Systems
Feed-Forward Network
None of these
The key benefit of VPNs over conventional PNs is:
Security
Efficiency
Lower Cost
None of the given choices
Which of the following is incorrect for making design elements legible?
Select correct option:
Elements should be large enough
Elements must contrast sufficiently
Related elements should be visually grouped
Elements should have no visual focus
1. Function is also known as ______________.
Select correct option:
subprogram
procedure
subroutine
All of given
In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET.
Select correct option:
1973
1983
1972
None of the given choices
E-mail system has ______ component(s)
Select correct option:
http://groups.google.com/group/vuZs
E-mail client
SMTP server
POP3 server
All of the given choices
_______ / / /______/ A Parallelogram (Tilted rectangle) represents the ________________ flow chart
element.
Select correct option:
Process
Input or Output
Decision
Connector
If a computer could pass the Turing test then it would be able to:
Select correct option:
win a million dollar prize
think like human begins
think but slower than humans
do the things faster
Punched cards were replaced by:
Select correct option:
Floppy Disk
Zip Drives
Magnetic storage
None of the given choices
The ________virus may display an annoying, but harmless message
Select correct option:
Malicious
Neutral
Helpful
DoS
The name of very first computer was:
Select correct option:
ABC
BCD
EDC
None of the given choices
The internet communities are ___________.
Select correct option:
Geographical based
Interest based
Country based
Religion based
__________% of the users have left websites in frustration due to poor navigation.
► 40
► 62
► 83
► 91
In JavaScript, a variable declaration is
► Optional
► Mandatory
► Not allowed
► None of the given
A protocol used for receiving email messages is called ____________.
► URL
► Telnet
► POP3
► SMTP
which one is correct?
► onUnload
► onUnLoad
► onUNLOAD
► All of the above
Serial arrangement in which things follow logical order or a recurrent pattern, such as statements
executing one by one, is called __________.
► Loop
► Sequence
► Condition
► Array
Variables allow us to manipulate data through the ___________.
► Actual Value
► Reference
► Length
► Name
Fuzzy logic is based on ____________.
► Ground facts
► Experience
► Practice
► Approximation
Word Processor is a _________________
► System Software
► Application Software
► Device
► Utility
In the old days, databases did NOT support ____________.
► Number
► Boolean
► Video
► Text
In tabular storage, fields placed in a particular row are strongly ___________.
► Independent
► Dependent
► Interrelated
► Inconsistent
Due to working at home, lack of interaction may result in ___________ professional growth.
► Slower
► Faster
► Higher
► Improved
Distance learning has got a boost due to the ___________.
► Easy communication
► Online interactive contents
► Flexibility
► All of the given options
_____________ technique can be used to create smooth animations or to display one of several
images based on the requirement.
► Image downloading
► Image preloading
► Image uploading
► Image postloading
► Tree structured organizational model
► Network paradigm
► Hierarchical structure
► None of the given options
The group of technologies concerned with the capturing, processing and transmission of
information in the digital electronic form is called
_____________.
► Telecom Engineering
► Computer Engineering
► Computer Science
► Information Technology
A large number of networks interconnected physically is called ______
► LAN
► MAN
► Internet
► Network collection
TCP stands for ________.
► Transfer Center protocol
► Transmission Control Protocol
► Transmission Center Protocol
► Telephone Center Protocol
A collection of data organized in such a way that the computer can quickly search for a desired data
item is known as :
► Retrieving
► Database
► Information
► DBMS
______ is simply a fast port that lets you connect computer peripherals and consumer electronics to
your computer without restart.
► Freeware
► Shareware
► Firewire
► Firmware
Structures, in which another list starts before the first list is finished, are called:
► Multiple Lists
► Nested Lists
► Ordered Lists
► Un-ordered Lists
The key property of the ‘Array’ object in JavaScript is
► Value
► Length
► Name
► All of the given choices
Which one is the example of spreadsheet software ?
► MS Word
► MS PowerPoint
► MS Excel
► MS Access
The Encryption of data is related to
► Data updates
► Data security
► Data integrity
► Data accessibility
_____ is the process of analyzing large databases to identify patterns.
► Data normalization
► Data management
► Data Mining
► None of the given options
Which is the user-friendly way of presenting data ?
► Query
► Form
► Report
► All of the given options
JavaScript function fixed() has equivalent HTML tag-set ____
► <.FIX>……………</FIX>
► <F>………………..</F>
► <PRE>………….</PRE>
► <H>………………..</H>
<form> Tags always placed between the <BODY> and </BODY> tags of a Web page
► True
► False
Java script has ----------------- ability to create and draw graphics.
► Limited
► Versatile
► Medium
► Not at all
Question # 1 of 10 ( Start time: 05:21:25 PM ) Total Marks: 1
Internet is an example of ______________ network.
Select correct option:
Private
Public
Both Private and Public
None of the given choices
Question # 2 of 10 ( Start time: 05:21:53 PM ) Total Marks: 1
The name of first commercially available PC was:
Select correct option:
UNIVAC 1
ENIAC
EDVAC
Altair 8800
Question # 3 of 10 ( Start time: 05:22:43 PM ) Total Marks: 1
Algorithm is a ____________________
Select correct option:
Definition of a problem
Sequence of steps to solve a problem
Understanding of a problem
Solving a problem
Question # 4 of 10 ( Start time: 05:23:52 PM ) Total Marks: 1
A group of information is called __________________
Select correct option:
File
Database
Record
Field
Question # 5 of 10 ( Start time: 05:24:17 PM ) Total Marks: 1
___________________ is a branch f computer science concerned with manipulating and enhancing
computer graphics.
Select correct option:
Image Handling
Image Processing
Image Engineering
None of these
Question # 6 of 10 ( Start time: 05:25:34 PM ) Total Marks: 1
__________has changed our way of life like no other technology.
Select correct option:
Computational technology
Computer technology
Computing technology
None of the Above
Question # 7 of 10 ( Start time: 05:26:27 PM ) Total Marks: 1
Sophisticated event handling is not possible with _______________ event handling
Select correct option:
Off-Line
In-Line
Out-Line
Non of the given choices
Question # 8 of 10 ( Start time: 05:27:03 PM ) Total Marks: 1
Babbage’s Analytical Engine could store information permanently in:
Select correct option:
Magnetic Tape
Floppy Disk
Punched Cards
None of the given choices
Question # 9 of 10 ( Start time: 05:28:30 PM ) Total Marks: 1
There are __________ popular schemes to reduce the number of bytes that are required for storing
graphics.
Select correct option:
4
3
2
None of these
A number of clever schemes have been invented to reduce the number of bytes that are required for storing
graphics. 2 popular ones:
Color mapping
Dithering
Question # 10 of 10 ( Start time: 05:30:01 PM ) Total Marks: 1
The internet-society is considered under Surveillance because:
Select correct option:
While surfing, we are being watched, constantly
Our every click is recorded and analyzed to extract patterns and behaviors
Webcams are becoming common. Providing a cheap way for parents to watch their children's every move
All of the given
Which of the following is incorrect for making design elements legible?
Select correct option:
Elements should be large enough
Elements must contrast sufficiently
Related elements should be visually grouped
Elements should have no visual focus
25.10 Making Display Elements Legible:
1. Designing (arranging) Display Elements
Elements must be large enough to be processed visually
Elements must contrast sufficiently with their backgrounds
Related elements should be visually grouped through the use of space, color, or graphical boundaries
The relative levels of importance among elements in a display should be revealed graphically
Question # 2 of 10 ( Start time: 05:03:37 PM ) Total Marks: 1
1. Function is also known as ______________.
Select correct option:
subprogram
procedure
subroutine
All of given
Function:
A group of statements that is put together (or defined) once and then can be used (by reference)
repeatedly on a Web page Also known as subprogram, procedure, subroutine
In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET.
Select correct option:
1973
1983
1972
None of the given choices
E-mail system has ______ component(s)
1983 - The TCP/IP protocols becomes the only set of protocols used on the ARPANET
This sets a standard for all networks, and generates the use of the term Internet as the net of nets
ARPANET splits into two nets to keep military & non-military network sites separate: ARPANET and
MILNET
Select correct option:
E-mail client
SMTP server
POP3 server
All of the given choices
_______ / / /______/ A Parallelogram (Tilted rectangle) represents the ________________ flow chart
element.
Select correct option:
Process
Input or Output
Decision
Connector
Punched cards were replaced by:
Select correct option:
Floppy Disk
Zip Drives
Magnetic storage
None of the given choices
During the 1960s, the punched card was gradually replaced as the primary means for data
storage by magnetic tape, as better, more capable computers became available.
The ________virus may display an annoying, but harmless message
Select correct option:
Malicious
Neutral
Helpful
DoS
The internet communities are ___________.
Select correct option:
Geographical based
Interest based
Country based
Religion based
Question # 1 of 10 ( Start time: 04:51:32 PM ) Total Marks: 1
Because of spending more time on the internet, the distances among the families have been _____.
Select correct option:
Increased
Expanded
Contracted
Shortened
Question # 3 of 10 ( Start time: 04:53:30 PM ) Total Marks: 1
Autonomous Web Agents are also known as _________________
Select correct option:
Mobile Agents
Softbots
Both "Mobile Agents" & "Softbots"
None of these
A communication protocol is a __________that governs the flow of information over a network.
Select correct option:
Set of Methods
Set of Protocols
Set of rules
None of the given choices
Protocol
–Rules governing communications over the network
By default in a web page Hyper Link for another web page is represented as:
Select correct option:
Blue only
Black and Underlined
Blue and Bold
Blue and Underlined
The organizations are learning that business can be done in a more effective manner if emphasis is placed
upon ______________.
Select correct option:
Cooperation
Shared responsibility
Networking
All of the given
Question # 7 of 10 ( Start time: 04:57:19 PM ) Total Marks: 1
Monitor is an example of __________devices
Select correct option:
Output
Input
Processing
None of the given choices
The code in the ________ portion is the right choice for developing larger JavaScript scripts
Select correct option:
Body
At End
Head
Separate
____________________ based on the principles of the logical reasoning ability of humans.
Select correct option:
Genetic Algorithms
Rule-based Systems
Feed-Forward Network
None of these
Rulebased Systems (1):
Based on the principles of the logical reasoning ability of humans
The key benefit of VPNs over conventional PNs is:
Select correct option:
Security
Efficiency
Lower Cost
None of the given choices
In __________________ automatic machines perform various tasks that were previously performed by
humans.
Select correct option:
Fuzzy Logic
Robotics
Rule based Systems
None of these
Avoid __________ to ensure readability of web page
Select correct option:
Overuse of bold and italics
Use of paragraphs
Use of white space
Use of contrast colors
Deep Blue was the name of:
Select correct option:
Human
Computer
City
None of the given choices
Using ____, a user can remotely log on to a computer (connected to the user through a network, e.g.
Internet) & have control over it like a local user, including control over running various programs ?
Select correct option:
FTP
TCP
Telnet Protocol
None of the given choices
Telnet Protocol
Using Telnet, a user can remotely log on to a computer (connected to the user’s through a TCP/IP
network, e.g. Internet) & have control over it like a local user, including control over running various
programs In contrast, FTP allows file operations only
Typical use: Configuring and testing of a remote Web server
DoS is________ ?
Select correct option:
Crime
Cyber crime
Not a crime
A software
__________ enables users located at far-way locations to easily share information with others located all
over the world.
Select correct option:
Protocol
Internet
Communication Channel
None of the given choices
Vacuum tubes were replaced by:
Select correct option:
Transistors
Electrodes
Electric Relays
None of the given choices
Cyber crime can be used to
Select correct option:
Damage a home computer
Bring down a business
Weaken the telecom, financial, or even defense-related systems of a country
All of the given
___ provides a simple, consistent way for applications to interact with the HW without having to know all the
details of the HW
► Explorer.exe
► System Files
► Operating System
► Application Software
Communication protocol is a __________that governs the flow of information over a network
► Set of methods
► Set of protocols
► Set of rules
► Device
_____________ team is responsible for the maintenance, expansion , improvement of the infrastructure
consisting of workstations, networking equipment, software and network security.
► Support
► Configuration Management
► Quality Assurance
► Developer
_____________ team consists on the sharpest technical minds in the company.
► Architecture
► Business Development
► Configuration Management
► Developer
_______________ is responsible for day to day operations.
► CEO
► COO
► CMSO
► Developer
Using Java Script you can write a character at random location on screen
► By applying randomCh() method
► With the help of String object
► With the help of random character property
► There is no built in approach in Java Script
The transistor is a solid state semiconductor device used for amplification and switching, and has _____
terminals.
► one
► two
► three
► four
Question No: 2 ( Marks: 1 ) - Please choose one
Blue Pacific is a name of _____ computer.
► Mini
► Desktop
► Micro
► Super
Question No: 3 ( Marks: 1 ) - Please choose one
Monte Carlo algorithm is an example of
► Randomized algorithm
► Greedy algorithm
► both greedy and randomized
► Heuristics
Question No: 4 ( Marks: 1 ) - Please choose one
A set of stand alone productivity applications designed to work together known as __
► Productivity software suites
► Compiled software
► Secure software
► Intelligent software
MID TERM EXAMINATION
Question No: 1 (Marks: 1) - Please choose one
__________% of the users has left websites in frustration due to poor navigation.
► 40
► 62
► 83
► 91
Question No: 2 vuzs ( Marks: 1 ) - Please choose one
The impact of a digit in a number is determined by its ---------------
► Value
► Location
► Length
► None of above
Question No: 3 ( Marks: 1 ) - Please choose one
Hexadecimal number system is based on -------------------- digits
►2
►8
► 12
► 16
Question No: 4 ( Marks: 1 ) - Please choose one
TCP stands for ___________.
► Total communication protocol
► Transmission control protocol
► Transfer control protocol
► Transfer collection protocol
Question No: 5 ( Marks: 1 ) - Please choose one
The browser breaks down the URL into ________ parts.
►2
►3
►4
► Question No: 6 (Marks: 1) - Please choose one
A single pixel can acquire approximately ___________ colour schemes.
► 1 million
► 2 million
► 10 million
► 16 million
Question No: 7 (Marks: 1) - Please choose one
Serial arrangement in which things follow logical order or a recurrent pattern, such
as statements executing one by one, is called __________
► Loop
► Sequence
► Condition
► Array
Question No: 8 (Marks: 1) - Please choose one
According to a popular heuristic, success is defined by ___________.
► The user
► The builder
► Both user and builder
► None of the given options
Question No: 9 (Marks: 1) - Please choose one
Which one is the best option for designing a Medical Expert System?
► Rule Based System
► Genetic Algorithm
► Fuzzy Logic
► Neural Network
Question No: 10 (Marks: 1) - Please choose one
Document. Write ("20"+"12");
The out put of the above statement is ____________.
► 1220
► 2012
► 20 12
► 32
Question No: 11 ( Marks: 1 ) - Please choose one
Due to working at home, contact with the colleagues is __________, which may
result in __________ quality of work
► Reduced, Poorer
► Reduced, Better
► Increased, Poorer
► Increased, Better
Question No: 12 ( Marks: 1 ) - Please choose one
The effective way not to only write programs but also it works properly and further
more to minimize the time and the development cost of the program is
called___________________
► Programming Mechanism
► Programming Methodology
► Programming Synchronization
► None of the given options
Question No: 13 ( Marks: 1 ) - Please choose one
The tasks performed to determine the existence of defects is called _______
► Debugging
► Testing
► Repairing
► Coding
Question No: 14 ( Marks: 1 ) - Please choose one
Deep Blue was the name of
► Computer
► Human
► City
► Game
Question No: 15 ( Marks: 1 ) - Please choose one
There is a battery on the motherboard to:
► Give power to the processor
► Save information when computer is off
► Save information when computer is on
► Give power to the motherboard
Question No: 16 ( Marks: 1 ) - Please choose one
Compound Statement after decision constructs in JavaScript is enclosed with
►( )
►[ ]
► { };
►{ }
Question No: 17 ( Marks: 1 ) - Please choose one
______ occurs when a function calls itself.
► Recursion
► Call by value
► Call by reference
► Parsing
Question No: 18 ( Marks: 1 ) - Please choose one
Which function returns integer nearest to x
► random()
► exp(x)
► log(x)
► round(x)
Question No: 19 ( Marks: 1 ) - Please choose one
Microphone is an input as well as output device. This statement is
► True
► False
Question No: 20 ( Marks: 1 ) - Please choose one
74HC163 has two enable input pins which are _______ and _________
► ENP, ENT
► ENI, ENC
► ENP, ENC
► ENT, ENI
Question No: 21 ( Marks: 1 ) - Please choose one
Radio Buttons are used when you want the user to select one of a limited number of
choices.
► True
► False
Question No: 22 ( Marks: 1 ) - Please choose one
In partitioning of program/module, it should be assured that partitioned chunks
should be as _________ as possible.
Dependent
► Independent
► Complex
► All of the above
Question No: 23 ( Marks: 1 ) - Please choose one
In a library’s database, if there is an entry in the register for Book # 423 then the
corresponding Book must actually exist; is an example of which type of data
integrity:
► Type integrity
► Limit integrity
► Physical Integrity
► Referential Integrity
Question No: 24 ( Marks: 1 ) - Please choose one
DBMS and Database are two names of one term .
► True
► False
Question No: 25 ( Marks: 1 ) - Please choose one
There are _______ types of program errors
►2
►4
►6
►3
Question No: 26 ( Marks: 1 ) - Please choose one
Super computers consists of more than one parallel processors because
► One big processor is more expensive than parallel processors
► Through parallel processors problems can be solved easily
► Small processors are easy to manufacture
► All of the given
Question No: 27 ( Marks: 2 )
What is the difference between ‘single-line text input field’ and ‘password input
field’ ?
ANS:
A Password Field is good for sensitive information. The only item that is absolutely
necessary is the Submit Button. It is a good idea to include a Reset Button for the
convenience of the user.
A text field gathers information using a single line of text. This field is useful for
short answers. The default text field is blank. If you want to specify default text, use
the VALUE attribute.
Question No: 28 ( Marks: 2 )
What is internet?
ANS:
Internet is also called WAN, which means the interconnection of large number
of computer networks and it consists of millions of private, public, academic,
business, and government networks of local to global scope that are linked by a
broad array of electronic and optical networking technologies.
Question No: 29 ( Marks: 2 )
In JavaScript, what is event handling? What are the two types of events?
ANS:
Event handling means capturing an event and responding to that.
Events e.g. onMouseOver, On Click, on Load, On unload, updating the clock etc.
are captured by the Java script & according to the programs they are responded
accordingly
Question No: 30 ( Marks: 2 )
Define the key weakness of the web?
ANS:
The Web as it currently exists was designed for humans to read, not for computers to
understand and manipulate meaningfully. The Computers face great problems in dealing
with the current text- and graphics-based content of the Web
Question No: 31 ( Marks: 3 )
How can we include images in a web page using HTML and Java script?
ANS:
Image in HTML
It is easier to insert images and pictures i.e. JPG, GIF & BMP files in the web page
through HTM codes.
The tag is used which is used as under:-
Height=(in pixels) width=(in pixels)
Images in JavaScript
Images in JavaScript may be used with the event handling i.e. OnLoad, OnUnload,
OnError and OnAbort etc.
The properties i.e. used for Java script are as under:-
1. Name
2. Border
3. Complete
4. Height
5. src
for example:-
xyz” src=”abc.jpg”>
Question No: 32 ( Marks: 3 )
Differentiate between onLoad and onUnload
ANS:
On load event is used when the page is load in the browser while on the other side
onUnload event works when the page closes down.
Question No: 33 ( Marks: 3 )
Elaborate Rester Graphics with examples.
ANS:
Raster graphics are digital images created or captured (for example, by scanning in
a photo) as a set of samples of a given space . A raster file is usually larger than a
vector graphics image file. A raster file is usually difficult to modify without loss of
information.
Examples of raster image file types are: BMP, TIFF, GIF, and JPEG files.
Question No: 34 ( Marks: 5 )
What is a Relational Database? Give the names of any three RDBMS software.
(2+3)
ANS:
Database architecture consists of three levels, external, conceptual and internal.
Clearly separating the three levels was a major feature of the relational database.
NAMES:
Oracle Database software, Linux, and oracle e business database software , and
Oracle OLAP.
Question No: 35 ( Marks: 5 )
How many ways are there to call a function in a program ? Explain with example
ANS:
there are two methods of function in a program
1st method is used within the html coding with immediate in the even handling
on the other side function can also be defined in the heading portion of the html
page
it is a better choice to use function as it include many statments in it.
OnMouseOver= “if(document.sendEmail.sender.value.length<1)
Window.alert(‘empty field!’)”
while in the heading portion
it will be as
function checkForm() {
if ( document.sendEmail.sender.value.length < 1) {
window.alert( “Empty Field” );
}
Question No: 36 ( Marks: 5 )
What do you mean by the term 'Telepresence' in Computing World?
Spring 2009
CS101- Introduction to Computing (Session - 6)
Time: 60 min
Marks: 43
Question No: 1 ( Marks: 1 ) - Please choose one
Cray-1 was first commercial _________ computer
► Super
► Mini
► Micro
► Personal
Question No: 2 ( Marks: 1 ) - Please choose one
Browser is a __________________ used for browsing.
► Tool
► Component
► Device
► None of these
Question No: 3 ( Marks: 1 ) - Please choose one
It represents the _____________ flow chart element.
► Flow Line
► Connector
► Off-page connector
► Start or stop
Question No: 4 ( Marks: 1 ) - Please choose one
JavaScript is an example of _____________ language.
► Object-based
► Object oriented
► Machine
► Assembly
Question No: 5 ( Marks: 1 ) - Please choose one
The set of rules and guidelines a team of developers follow to construct reasonably
complex SW systems is called
► Object Oriented Design
► Object Oriented Software
► Design Methodology
► Programming language
Question No: 6 ( Marks: 1 ) - Please choose one
Waterfall is a _________ life-cycle model.
► Spiral
► Sequential
► Circular
► Spherical
Question No: 7 ( Marks: 1 ) - Please choose one
What happens if I start a new list without closing the original one?
► An error will be generated
► A nested list will be created
► Previous list will end and a new will start.
► Nothing will happen
Question No: 8 ( Marks: 1 ) - Please choose one
In Spreadsheets, you can create a relationship between two cells by using _____.
► Numbers
► Text
► Formulas
► None of the given choices
Question No: 9 ( Marks: 1 ) - Please choose one
VisiCalc was the first popular _______application on PC’s.
► Spreadsheet
► Word processor
► Presentation
► Database
Question No: 10 ( Marks: 1 ) - Please choose one
Fins are used to --------------
► Communicate with microprocessor
► Increase surface area of Fan
► Decrease surface area of Fan
► Speed up the Fan.
Question No: 11 ( Marks: 1 ) - Please choose one
Using only HTML we can create
► Dynamic web pages
► Static web pages
► Both Static and Dynamic pages
► None of these
Question No: 12 ( Marks: 1 ) - Please choose one
Everything that JavaScript manipulates is treated as:
► Object
► Window
► Text
► Script
Question No: 13 ( Marks: 1 ) - Please choose one
The ______ is connected to all other modules of the microprocessor.
► Control unit
► Memory unit
► Floating Point unit
► Arithmetic and Logic unit
Question No: 14 ( Marks: 1 ) - Please choose one
Communication protocol is a __________that governs the flow of information over a
network
► Set of protocols
► Set of rules
► Device
► Set of methods
Question No: 15 ( Marks: 1 ) - Please choose one
_________ is the interface in computer that supports transmission of multiple bits at the
same time.
► Serial Port
► Parallel Port
► Universal Serial Bus
► None of the given choices
Question No: 16 ( Marks: 1 ) - Please choose one
_____ was designed as a replacement for typewriter
► Spreadsheet Software
► Word Processor Software
► Presentation Software
► Database Software
Question No: 17 ( Marks: 1 ) - Please choose one
Which one of these translates the program once at a time?
► Interpreter
► Compiler
► Operating system
► Translator
Question No: 18 ( Marks: 1 ) - Please choose one
Randomized algorithms are often ________ than deterministic algorithms for the same
problem.
► Simpler and more slow
► Simpler and more efficient
► Complex and more efficient
► Complex and more slow
Question No: 19 ( Marks: 1 ) - Please choose one
Ada written a computer programme for?
► Analytical Engine
► Difference Engine
► Harvard Mark 1
► Mechanical engine
Question No: 20 ( Marks: 1 ) - Please choose one
A test proposed to determine if a computer has the ability to think. It is called?
► Turing test
► Turning test
► Intelligence test
► None
Question No: 21 ( Marks: 1 ) - Please choose one
The most used form tag is the <input> tag.
► True
► False
Question No: 22 ( Marks: 1 ) - Please choose one
When the user clicks on the "Submit" button, the content of the form is sent to the server.
► True
► False
Question No: 23 (Marks: 1) - Please choose one
Extensions for saving web page are / is;
► *.html
► *.htm
► *.htm and *.htm both are used
► None of These
Question No: 24 ( Marks: 1 ) - Please choose one
In spread sheet a cell may contain
► Numbers
► Text
► Formulas
► All of the given
Question No: 25 ( Marks: 1 ) - Please choose one
Programs where no user interaction found during program execution are called
__________.
► Batch programs
► Event-driven programs
► Graphics based programs
► None of the given
Question No: 26 (Marks: 1) - Please choose one
OO (object oriented) software is all about _____________.
► Behaviours
► Methods
► Properties
► Objects
Question No: 27 ( Marks: 1 )
What is the key feature of batch programs?
Answer: The key feature is no user interaction with computer while a program is
running.
Question No: 28 ( Marks: 1 )
Name two languages which are used for client side scripting?
Answer: JavaScript, VBscript
Question No: 29 (Marks: 2)
What is the purpose of MODEM?
Answer: It receive data analog signal from a phone line and then convert them into digital
signal and send back to the computer with which it is attached. It also receives data from
computer and converts it into analog signals.
Question No: 30 (Marks: 3)
What is Home Page of a web site?
Answer: For a web user it is a first page displayed when a user starts a web browser and
for a web developer it is a first page when a user selects a site.
Question No: 31 (Marks: 5)
Why microprocessor uses the binary number system and not the decimal or any other
number system?
Answer: Because this system is natural for digital computer. Digital computer have
fundamental building blocks like ON & OFF Etc so it is natural to represent those in a
number system that has only two symbols e.g. Binary Numbers 0,1. Whereas decimal
system is natural for human.
Question No: 32 ( Marks: 5 )
What is the difference between Interactive-mode and Batch-mode Application Software?
Answer: Batch-mode: This Mode Program has no user interaction with computer while a
program is running e.g. Payroll
Interactive-mode: The user runs the program on the computer and keeps interacting with
the computer while a program is running e.g. word processor
MIDTERM EXAMINATION
Fall 2009
CS101- Introduction to Computing (Session - 4)
Question No: 1 (Marks: 1) - Please choose one
Human are better than computers at:
► Efficiency
► Accuracy
► Pattern recognition
► None of the given choices
Question No: 2 (Marks: 1) - Please choose one
The memory size of the Altair 8800 was
► 128 bytes
► 128 Kilo bytes
► 256 Kilo bytes
► 256 bytes
Question No: 3 (Marks: 1) - Please choose one
Information on World Wide Web is __
► Physically
► Logically
► Really
► None of the given choices
Question No: 4 (Marks: 1) - Please choose one
Mainframe Computers are also called
► Enterprise Servers
► Personal Servers
► Enterprise Managers
► Window Servers
Question No: 5 ( Marks: 1 ) - Please choose one
Which of the following is NOT a category of Mobile Computers?
► Laptop
► Palmtop
► Desktop
► Wearable
Question No: 6 ( Marks: 1 ) - Please choose one
Hexadecimal number system is based on -----
►2
►8
► 12
► 16
Question No: 7 ( Marks: 1 ) - Please choose one
<UL> tag is used to
► Underline text
► End the line
► create ordered list
► create unordered list
Question No: 8 (Marks: 1) - Please choose one
Bringing subsystems together to form the system is called
► Integration
► Merging
► Splitting
► Operation & Maintenance
Question No: 9 (Marks: 1) - Please choose one
__________ give us the ability to manipulate data through reference instead of actual
value.
► Constants
► Variables
► Data Types
► Operators
Question No: 10 ( Marks: 1 ) - Please choose one
In spreadsheets, cell address A12 means
______.
► Row A, Cloumn 12
► Row 12, Cloumn A
► Row 2,Cloumn A1
► Row A1, Cloumn 2
Question No: 11 ( Marks: 1 ) - Please choose one
Which of the following is/are the parts Operating system of components?
► GUI
► Device Manager
► Shell
► All of these
Question No: 12 ( Marks: 1 ) - Please choose one
The key feature of Scientific/Engineering/Graphics applications is
► Intense calculations
► User-friendly
► Reliability
► Cost-effective
Question No: 13 ( Marks: 1 ) - Please choose one
Command which saves the selected text before deleting is
► Copy
► Delete
► Cut
► Undo
Question No: 14 ( Marks: 1 ) - Please choose one
All the hardware components of the Computer system are installed on--
► Microprocessor
► Motherboard
► Monitor
► Memory
Question No: 15 ( Marks: 1 ) - Please choose one
By default in a web page Hyper Link for another web page is represented as _
► Blue only
► Black and Underlined
► Blue and Bold
► Blue and Underlined
Question No: 16 ( Marks: 1 ) - Please choose one
A microprocessor can be made more powerful by increasing its
► Clock frequency
► Word length
► Clock frequency and Word length
► None of above
Question No: 17 ( Marks: 1 ) - Please choose one
___ is a related collection of WWW files that includes a beginning file called a
homepage
► HTML
► Website
► HTTP
► Web page
Question No: 18 (Marks: 1) - Please choose one
Structures, in which another list starts before the first list is finished, are called:
► Multiple Lists
► Nested Lists
► Ordered Lists
► Un-ordered Lists
Question No: 19 (Marks: 1) - Please choose one
When the user needs something to be done by the computer, he/she gives instructions in
the form of ____ to computer ___
► Software, Hardware
► Hardware, Software
► System Software, Application Software
► Graph, Monitor
Question No: 20 (Marks: 1) - Please choose one
Application developers do not need to know much about the________ while they are
developing their applications
► Software
► Hardware
► Operating System
► Kernel
Question No: 21 (Marks: 1) - Please choose one
Which of the following is NOT an Application Software?
► Word Processor
► Web Browser
► Windows XP
► MS Excel
Question No: 22 (Marks: 1) - Please choose one
Web Pages developed for human as well computer understanding are called as;
► Static Web Pages
► Semantic Web Pages
► Dynamic Web Pages
► Java Web Pages
Question No: 23 (Marks: 1) - Please choose one
JavaScript stores all numbers as
► Integers
► Floating point numbers
► Strings
► Character values
Question No: 24 (Marks: 1) - Please choose one
Java script and HTML are
► Case sensitive
► Not case sensitive
► Java script is case sensitive but HTML is not
► HTML is case sensitive but Java script is not
Question No: 25 (Marks: 1) - Please choose one
A diode functions as the electronic version of a _________way valve.
► One
► Two
► Three
► Four
Question No: 26 (Marks: 1) - Please choose one
The first -------------was invented at Bell Laboratories on December 16, 1947 by William
Shockley.
► Transistor
► Vacuum Tube
► Punch card
► Transmitter
Question No: 27 (Marks: 1)
What are compilers used for?
Ans: compiler is software that can translate the whole programme in once. It also
saves the program. Compiling takes time, but super-fast execution
Question No: 28 (Marks: 1)
What is Script?
Ans: script is a sequence of steps to carry out a work by processor and manage by a
language like JavaScript and VBscripts.
Question No: 29 (Marks: 2)
What is <P> tag in HTML and how it is different from <br> tag?
Ans: <p> is used for paragraph in HTML language it has a closing tag </p> unlike
<br> which has no closing tag. Br is only used to break the current line while <p> can be
used for more lines
Question No: 30 (Marks: 3)
How can you manipulate the address of a file (resource) accessible on the Internet?
World Wide Web, URL, domain name
www.youtube.com
Question No: 31 (Marks: 5)
Write Hyper Link for a Web Page and for an Email Address.
Ans: Following are the hyper link for a web page
www.vu.edu.pk
www.yahoo.com
www.hotmail.com
Following are the hyperlinks for Email address
[email protected][email protected]Question No: 32 ( Marks: 5 )
Write down the requirement of Desktop Publishing?
User requirement
Softwear requirements
. Laser printer
Scanner
DESktop publishing softwears
e.g
adobe page maker
Ms publisher
High end pc with a large screen monitor
Formate
Numerical data
Text
MIDTERM EXAMINATION
Fall 2009
CS101- Introduction to Computing (Session - 3)
Question No: 1 (Marks: 1) - Please choose one
Vacuum tubes were replaced by _________.
► Punch cards
► Transistors
► Micro Processors
► Resistors
Question No: 2 (Marks: 1) - Please choose one
Today’s computers are based on the technology of _________.
► Punch cards
► Vacuum tubes
► Transistors
► Resistors
Question No: 3 (Marks: 1) - Please choose one
Browser is a _________ used for browsing.
► Tool
► Component
► Device
► None of the given choices
Question No: 4 (Marks: 1) - Please choose one
It represents the __________ flow chart element.
► Process
► Input or Output
► Decision
► Connector
Question No: 5 (Marks: 1) - Please choose one
Which of the following number system is used by microprocessor?
► Binary
► Decimal
► Octal
► Hexadecimal
Question No: 6 ( Marks: 1 ) - Please choose one
Hexadecimal number system is based on ---------- digits
►2
►8
► 12
► 16
Question No: 7 (Marks: 1) - Please choose one
Java script interacts with user through_________.
► Special control
► Internet explorer
► Event handlers
► Java script does not interact with user
Question No: 8 (Marks: 1) - Please choose one
Programs that are typically started from a shell (or automatically via a scheduler) are
called
► Batch programs
► Event-driven programs
► Sequential programs
► Application programs
Question No: 9 (Marks: 1) - Please choose one
A new cell using HTML is added in table row by________?
► <TC>…</TC>
► <TR>…</TR>
► <TD>…</TD>
► <NC>…</NC>
Question No: 10 (Marks: 1) - Please choose one
Waterfall is a _______ life-cycle model.
► Spiral
► Sequential
► Circular
► Spherical
Question No: 11 (Marks: 1) - Please choose one
What will be the result of the following formula in Spreadsheet application?
SUM (A2:A3) =_______ (Assume that A2 = 25 A3 = 75)
► 25
► 50
► 75
► 100
Question No: 12 ( Marks: 1 ) - Please choose one
A _________ operating system allows many users to take advantage of the computer's
resources, simultaneously
► Single user
► Multi- user
► Single tasking
► Multi tasking
Question No: 13 ( Marks: 1 ) - Please choose one
When we use <INPUT type=“password”>, what will happen?
► Text will not be visible
► Text will be in normal format
► Text will be in **** format
► Text will be in #### format
Question No: 14 (Marks: 1) - Please choose one
The world first computer program was written to compute:
► Simple sequence
► Multiple sequence
► Bernoulli’s sequence
► Increasing sequence
Question No: 15 ( Marks: 1 ) - Please choose one
The first Web browser with a GUI was generally available in:
► 1992
► 1993
► 1994
► 1995
Question No: 16 ( Marks: 1 ) - Please choose one
ASCII WHITE is the fastest Super computer which can perform ________ calculations
in one second.
► 1.3 billion
► 1.3 trillion
► 1.3 million
► 1.3 thousand
Question No: 17 ( Marks: 1 ) - Please choose one
Monitor is an example of:
► Input Device
► Processing Device
► Output Device
► Storage Device
Question No: 18 ( Marks: 1 ) - Please choose one
Forms can be submitted through __________ methods
► INCLUDE, POST
► INCLUDE, GET
► GET, POST
► SEND, POST
Question No: 19 ( Marks: 1 ) - Please choose one
______ is responsible for all the essential operations like basic house keeping, task
scheduling, etc. Also contains low-level HW interfaces
► Hardware
► Device Manager
► Kernel
► Device Driver
Question No: 20 ( Marks: 1 ) - Please choose one
Which of the following is NOT an Application Software.
► Word Processor
► Web Browser
► Windows XP
► MS Excel
Question No: 21 ( Marks: 1 ) - Please choose one
Bit-mapped graphics is also known as ________ graphics
► Vector
► Raster
► Scalar
► Simple
Question No: 22 ( Marks: 1 ) - Please choose one
A set of stand alone productivity applications designed to work together known as
___________ .
► Productivity software suites
► Compiled software
► Secure software
► Intelligent software
Question No: 23 ( Marks: 1 ) - Please choose one
________ is used to terminate all JavaScript statements.
► Colon
► Semicolon
► Underscore
► Apostrophe
Question No: 24 ( Marks: 1 ) - Please choose one
By today's standards, the Mark-I was slow and requiring 3 to 5 seconds for a
multiplication operation. True
► True
► False
Question No: 25 ( Marks: 1 ) - Please choose one
There are_________________ rules to write the Pseudo Code.
► Standard
► No standard
► Pre-defined
► Strict
Question No: 26 ( Marks: 1 ) - Please choose one
In flow charts, there is only one entry point in conditions while there is/are _____ exit
points.
►1
►2
►3
►4
Question No: 27 ( Marks: 1 )
Define URL
URL(Uniform resource locator)
URL (Uniform Resource Locator, previously Universal Resource Locator) - is the
address of a file (resource) accessible on the Internet. The type of file or resource depends
on the Internet application protocol.
Examples of URLs: http://vu.edu.pk
http://www.yahoo.com
Question No: 28 ( Marks: 1 )
What is Randomized Algorithm?
Randomized Algorithm:
Any algorithm whose behavior is not only determined by the input, but also values
produced by a random number generator
These algorithms are often simpler and more efficient than deterministic algorithms for
the same problem. And because of there simplicity they are easier to analyze which is the
most important thing in the decision making of an algorithm.
Question No: 29 ( Marks: 2 )
What was the name of first super computer. When it was introduced?
CRAY1 is the first computer and it was introduced in 1971
Question No: 30 ( Marks: 3 )
How a designer makes Structured Design?
Structured Design is known as a Top-down design.
The designed first conceives about the High level design and then further designs the
details of the high level design components and it goes on and on.
Making small changes in the functionality of the systems sometimes leads to major re-
design exercise. Structured design separates the functionality from programs data and
that’s why program’s deisgned by this methodology are difficult to maintain.
Question No: 31 ( Marks: 5 )
Why microprocessor uses the binary number system and not the decimal or any other
number system?
The processor is the logic of a computer and functions comparably to a human central
nervous system, directing signals from one component to another and enabling
everything to happen. A microprocessor is made from miniaturized transistors and other
circuit elements on a single
semiconductor integrated circuit (IC) . These are made up oof semiconductor and silicon.
Microprocessor are composed of components which has only two states either 0 or 1.
Binary number system is also composed of these two states.
Microprocessor till today only understand the machine language and machine language is
only based on binary number system. Even today’s 64 bit microprocessors are also based
on this technology.
Question No: 32 ( Marks: 5 )
Why do we need an Interactive Form in a webpage?
1. Interactive forms are used to gather user data and interact with the user.
2. Forms can be made interactive with the use of client side scripting and server side
sciprting.
3. In HTML, <FORM> </FORM> tag is used to insert the form in a web page and it
always lie in <BODY></BODY> html tag.
4. without form’s web site is only “READ ONLY”.
5. with the help of forms a user and can search the contents, place order for goods
and services.
6. Forms can be simple or very complex, based on the requirement.
7. forms can contain a single element or many e.g text area, buttons
MIDTERM EXAMINATION
Fall 2009
CS101- Introduction to Computing s2
Question No: 1 ( Marks: 1 ) - Please choose one
Human are better than computers at:
► Efficiency
► Accuracy
► Pattern recognition
► None of the given choices
Question No: 2 ( Marks: 1 ) - Please choose one
Cray-1 was first commercial _________ computer
► Super
► Mini
► Micro
► Personal
Question No: 3 ( Marks: 1 ) - Please choose one
URL is a/an ________
► Device
► Component
► Address
► Tool
Question No: 4 ( Marks: 1 ) - Please choose one
Mainframe Computers are also called _____
► Enterprise Servers
► Personal Servers
► Enterprise Managers
► Window Servers
Question No: 5 ( Marks: 1 ) - Please choose one
Which of the following is NOT a category of Mobile Computers?
► Laptop
► Palmtop
► Desktop
► Wearable
Question No: 6 ( Marks: 1 ) - Please choose one
Preliminary exploration of possible solutions, technologies, suppliers is called
► Viability
► Feasibility
► Specification
► Integration
Question No: 7 ( Marks: 1 ) - Please choose one
__________ give us the ability to manipulate data through reference instead of actual
value.
► Constants
► Variables
► Data Types
► Operators
Question No: 8 ( Marks: 1 ) - Please choose one
Consider the following statement written in JavaScript:
str = ”Hello” + ” World”
What will be the value of str ?
► HelloWorld
► Hello World
► Hello + World
► It will result in error
Question No: 9 ( Marks: 1 ) - Please choose one
A tool that helps you to find the synonyms is called ______________.
► Language
► Paragraph
► Thesaurus
► Symbol
Question No: 10 ( Marks: 1 ) - Please choose one
Communication protocol is a __________that governs the flow of information over a
network
► Set of protocols
► Set of rules
► Device
► Set of methods
Question No: 11 ( Marks: 1 ) - Please choose one
If a computer could pass the Turing test then it would be able to:
► think like human beings
► do the things faster
► win a million dollar prize
► store more information
Question No: 12 ( Marks: 1 ) - Please choose one
The first Web browser with a GUI was generally available in:
► 1992
► 1993
► 1994
► 1995
Question No: 13 ( Marks: 1 ) - Please choose one
Web is a unique invention by humans in terms that it is:
► accessible to only the owners who control it
► accessible from particular locations only
► accessible to all humans
► accessible to only the educational institutes
Question No: 14 ( Marks: 1 ) - Please choose one
In this URL http://www.msn.com , _____identifies the domain name
► http
► www
► msn
► com
Question No: 15 ( Marks: 1 ) - Please choose one
______ is simply a fast port that lets you connect computer peripherals and consumer
electronics to your computer without restart.
► Freeware
► Shareware
► Firewire
► Firmware
Question No: 16 ( Marks: 1 ) - Please choose one
Which of the following is NOT supported by PC's power supply.
► -12 and +12 V DC
► -10 and +10 V DC
► -5 and + 5 V DC
► All are supported
Question No: 17 ( Marks: 1 ) - Please choose one
In which case Cache Memory is used
► To increase RAM speed
► To overcome BUS speed
► To overcome Speed rate between RAM and CPU
► To overcome CPU speed
Question No: 18 ( Marks: 1 ) - Please choose one
To display a single line text area on the web page, we use ___ tag
► TEXT
► TEXTBOX
► INPUT
► INPUTBOX
Question No: 19 ( Marks: 1 ) - Please choose one
If an algorithm is syntactically correct, but semantically incorrect then this situation is
► Very good situation
► Very dangerous situation
► Not very bad
► Neutral situation
Question No: 20 ( Marks: 1 ) - Please choose one
Users communicate with the computer using a consistent user interface provided by the
OS.
► True
► False
Question No: 21 ( Marks: 1 ) - Please choose one
Application developers do not need to know much about the HW, especially the
microProcessor, while they are developing their application.
► True
► False
Question No: 22 ( Marks: 1 ) - Please choose one
The first spread sheet program was invented by
► Charles Babbage
► Dan Bricklin
► Paul Graham
► John von Neumann
Question No: 23 ( Marks: 1 ) - Please choose one
Which representation technique of algorithm is more suitable for developer to make
actual code___________.
► pseudo code
► flow chart
► both pseudo code and flow chart
► Heuristics
Question No: 24 ( Marks: 1 ) - Please choose one
_____________ is used to terminate all JavaScript statements.
► Colon
► Semicolon
► Underscore
► Apostrophe
Question No: 25 ( Marks: 1 ) - Please choose one
In java script cookies can be created for future use_____.
► Easily
► No facility at all
► This is not possible without Java language.
► Cookies are files so java script can not handle it.
Question No: 26 ( Marks: 1 ) - Please choose one
When the microprocessor desires to look at a piece of data, it checks in
the __________ first.
► RAM
► ROM
► hard disk
► cache
MIDTERM EXAMINATION
Spring 2009
CS101- Introduction to Computing
Question No: 1 ( Marks: 1 ) - Please choose one
A diode functions as the electronic version of a __________-way valve.
► one
► two
► three
► four
Question No: 2 ( Marks: 1 ) - Please choose one
What is name of book from which word algorithm is taken ?
► Algebra and trigonometry
► Introduction to algorithms
► Research for new horizons
► Algoritmi de numero Indorum
Question No: 3 ( Marks: 1 ) - Please choose one
Tags always placed between the and tags of a Web page
► True
► False
Question No: 4 ( Marks: 1 ) - Please choose one
_______ consists of cells arranged in rows & columns
► Spreadsheets Software
► Word processor
► Presentation Software
► Microsoft Paint Software
Question No: 5 ( Marks: 1 ) - Please choose one
_____ was designed as a replacement for typewriter
► Spreadsheet Software
► Word Processor Software
► Presentation Software
► Database Software
Question No: 6 ( Marks: 1 ) - Please choose one
_________ manages the HW and SW resources ( memory, disk drives etc) of the
computer system, often invisibly.
► Explorer.exe
► System Files
► Operating System
► Application Software
Question No: 7 ( Marks: 1 ) - Please choose one
To display a radio button on the web page, we use ___ tag
► INPUTBUTTON
► INPUT
► RADIOBUTTON
► RADIO
Question No: 8 ( Marks: 1 ) - Please choose one
Machine language is also called
► Assembly Language
► Binary Language
► High Level Language
► HTML Language
Question No: 9 ( Marks: 1 ) - Please choose one
When the user needs something to be done by the computer, he/she gives instructions in
the form of _____ to computer ____
► Software, Hardware
► Hardware, Software
► System Software, Application Software
► Graph, Monitor
Question No: 10 ( Marks: 1 ) - Please choose one
A truth table defines the _________of a logic function for all possible _________
► Input -- Outputs
► Output -- Inputs
► Process -- Inputs
► Input -- Processes
Question No: 11 ( Marks: 1 ) - Please choose one
Which one is correct?
►
►
► Both and
► tags of a Web page
► True
► False
Question No: 4 ( Marks: 1 ) - Please choose one
_______ consists of cells arranged in rows & columns
► Spreadsheets Software
► Word processor
► Presentation Software
► Microsoft Paint Software
Question No: 5 ( Marks: 1 ) - Please choose one
_____ was designed as a replacement for typewriter
► Spreadsheet Software
► Word Processor Software
► Presentation Software
► Database Software
Question No: 6 ( Marks: 1 ) - Please choose one
_________ manages the HW and SW resources ( memory, disk drives etc) of the
computer system, often invisibly.
► Explorer.exe
► System Files
► Operating System
► Application Software
Question No: 7 ( Marks: 1 ) - Please choose one
To display a radio button on the web page, we use ___ tag
► INPUTBUTTON
► INPUT
► RADIOBUTTON
► RADIO
Question No: 8 ( Marks: 1 ) - Please choose one
Machine language is also called
► Assembly Language
► Binary Language
► High Level Language
► HTML Language
Question No: 9 ( Marks: 1 ) - Please choose one
When the user needs something to be done by the computer, he/she gives instructions in
the form of _____ to computer ____
► Software, Hardware
► Hardware, Software
► System Software, Application Software
► Graph, Monitor
Question No: 10 ( Marks: 1 ) - Please choose one
A truth table defines the _________of a logic function for all possible _________
► Input -- Outputs
► Output -- Inputs
► Process -- Inputs
► Input -- Processes
Question No: 11 ( Marks: 1 ) - Please choose one
Which one is correct?
►
►
► Both and
►
Question No: 12 ( Marks: 1 ) - Please choose one
WWW stands for:
► Wide World Web
► World Wide Web
► World White Web
► World Web Wide
Question No: 13 ( Marks: 1 ) - Please choose one
A _________translates a high-level language (that is easy to understand for humans) into
a language that the computer can understand
► Computer
► Transistor
► Compiler
► Device
Question No: 14 ( Marks: 1 ) - Please choose one
Deep Blue was the name of
► computer
► human
► city
► game
Question No: 15 ( Marks: 1 ) - Please choose one
Data travels through bus in the form of ---------------------------
► Packets
► Bits
► Bytes
► Word
Question No: 16 ( Marks: 1 ) - Please choose one
Command which saves the selected text before deleting is
► Copy
► Delete
► Cut
► Undo
Question No: 17 ( Marks: 1 ) - Please choose one
AutoCAD falls in the category of _________________
► Engineering Applications
► Graphics Applications
► Scientific Applications
► Business Applications
Question No: 18 ( Marks: 1 ) - Please choose one
In Spreadsheets, you can create a relationship between two cells by using _____.
► Numbers
► Text
► Formulas
► None of the given choices
Question No: 19 ( Marks: 1 ) - Please choose one
Which of the following symbol is used for multiple line comments in JavaScript?
►/
► //
► /*
► //*
Question No: 20 ( Marks: 1 ) - Please choose one
____________ is a system software that converts the source code written in high level
language into machine language code.
► Utilities
► Drivers
► Language Translator
► None of the these
Question No: 21 ( Marks: 1 ) - Please choose one
__________ is a particularly good language for processing numerical data, but it does
not lend itself very well to large business programs
► BASIC
► PASCAL
► JAVA
► FORTRAN
Question No: 22 ( Marks: 1 ) - Please choose one
Which of the following number system is used by microprocessor?
► Binary
► Decimal
► Octal
► Hexadecimal
Question No: 23 ( Marks: 1 ) - Please choose one
The __________Processor is specially designed for PDA?
► PowerPC
► StrongARM
► Crusoe
► SPARC
Question No: 24 ( Marks: 1 ) - Please choose one
Mainframe Computers are also called _____
► Enterprise Servers
► Personal Servers
► Enterprise Managers
► Window Servers
Question No: 25 ( Marks: 1 ) - Please choose one
URL is a/an ________
► Device
► Component
► Address
► Tool
Question No: 26 ( Marks: 1 ) - Please choose one
Ada, Countess of Lovelace developed first:
► Computer
► Website
► Computer Program
► Analytical engine
MIDTERM EXAMINATION
Spring 2010
CS101- Introduction to Computing (Session - 4)
Marks: 38
Question No: 1 ( Marks: 1 ) - Please choose one
JavaScript does not support_______________
► User interaction
► Graphics
► Network operations
► Both Graphics and Network operations
Question No: 2 ( Marks: 1 ) - Please choose one
_________ language is very good for writing well-structured and readable programs, but
it is not as flexible as the C programming language
► BASIC
► PASCAL
► JAVA
► FORTRAN
Question No: 3 ( Marks: 1 ) - Please choose one
__________ is the example of Shrink-wrapped software
► PIA information system
► WinZip trial pack
► Linux
► MS Word
Question No: 4 ( Marks: 1 ) - Please choose one
___________ refers to the firmware code which is run by an IBM compatible PC when
first powered on.
► DOS
► BIOS
► Utility Program
► None of these
Question No: 5 ( Marks: 1 ) - Please choose one
RTOS stands for____________________
► Real Task Operating System
► Random Time Operating System
► Rational Time Operating System
► Real Time Operating System
Question No: 6 ( Marks: 1 ) - Please choose one
------------- is an electronic path within a Computer System along which bits are
transmitted.
► Port
► Slots
► Bus
► Modem
Question No: 7 ( Marks: 1 ) - Please choose one
A microprocessor can be made more powerful by increasing its ________
► Clock frequency
► Word length
► Clock frequency and Word length
► None of above
Question No: 8 ( Marks: 1 ) - Please choose one
Which one of these translates the program once at a time ?
► Interpreter
► Compiler
► Operating system
► Translator
Question No: 9 ( Marks: 1 ) - Please choose one
------------ is volatile memory
RAM►
ROM►
Hard► Disk
CD► ROM
Question No: 10 ( Marks: 1 ) - Please choose one
A British scientist named John A. Fleming made a vacuum tube known today as a diode.
Then the diode was known as a "valve," Is it true?
► True
► False
Question No: 11 ( Marks: 1 ) - Please choose one
<form> Tags always placed between the <BODY> and </BODY> tags of a Web page
►True
False►
Question No: 12 ( Marks: 1 ) - Please choose one
_____________ is generally measured in terms of the number of steps required to
execute an algorithm.
► Space
► Time
► Memory and time
► Bandwidth
Question No: 13 ( Marks: 1 ) - Please choose one
Programs where no user interaction found during program execution are called
__________.
Batch► programs
Event-driven► programs
Graphics► based programs
None► of the given
Question No: 14 ( Marks: 1 ) - Please choose one
For connector the following symbol is used:
Square►
Rectangle►
Diamond►
Circle►
Question No: 15 ( Marks: 1 ) - Please choose one
After starting computer, which module of operating system activates first?
►Linker
Kernel►
Loader►
Device► manager
Question No: 16 ( Marks: 1 ) - Please choose one
"Every minute dies a man, And one and a sixteenth is born" said by?
►Alfred, Lord Tennyson
►Charles Babbage
►Ada, Countess of Lovelace
►Babbage and Lord Tennyson
Question No: 17 ( Marks: 2 )
Why JavaScript is called Object-based language, why not Object-Oriented ?
JavaScript is not a true object-oriented language like C++ or Java
It is so because it lacks two key features:
– A formal inheritance mechanism
– Strong typing
Nevertheless, JavaScript shares many similarities with object-oriented
languages, and therefore is called an object-based language
Everything that JavaScript manipulates, it treats as an object – e.g. a window or a button
An object has properties – e.g. a window has size, position, status, etc.
Properties are modified with methods – e.g. a resize a window with resizeTo(150, 200)
Question No: 18 ( Marks: 2 )
Draw flow chart symbols for "process" and "off page connector" ?
Process
Off Page Connector
Question No: 19 ( Marks: 2 )
How can you open a link in a new browser window?
We can open by using these two commands:
<A Href = "URL">
document.write (title.link("URL"));
Question No: 22 ( Marks: 5 )
Which two phases of the SW lifecycle do you think are the most important and effort
consuming steps? Explain with reasons.
concept and decommissioning
Concept ka reason yeh key it gives the first idea about WHAT is required
and decommissioning ensures that WHAT is required has been
achieved
Question No: 23 ( Marks: 5 )
Write down the algorithm for converting decimal number to binary?
Q1. Computers are good at:
Select correct option:
Speed
Storage
Never bored
All of the given choices
Q2.Grace Hopper of US Navy develops the very first_______ compiler
Select correct option:
Low-level Language
High-level language
Both high and low level language
None of the given choices
2.5 Harvard Mark 1 – 1943:
Howard Aiken and Grace Hopper designed the MARK series of computers at Harvard
University. The MARK series of computers began with the Mark I in 1944. Imagine a
giant roomful of noisy, clicking metal parts, 55 feet long and 8 feet high. The 5-ton
device contained almost 760,000 separate pieces. Used by the US Navy for gunnery
andballistic calculations, the Mark I was in operation until 1959. The computer,
controlled by pre-punched paper tape, could carry out addition, subtraction,
multiplication, division and reference to previous results. It had special
subroutines for logarithms and trigonometric functions and used 23 decimal place
numbers. Data was stored andcounted mechanically using 3000 decimal storage wheels,
1400 rotary dial switches, and 500 miles of wire. Its electromagnetic relays classified the
machine as a relay computer. All output was displayed on an electric typewriter. By
today's standards, the Mark I was slow, requiring 3-5 seconds for a multiplication
operation
(p14
Q3.The first Web browser with a GUI was generally available in:
Select correct option:
1992
1993
1994
1995
The first Web browser with a graphical user interface was generally available (Mosaic, in
1993), the term seemed to apply to Web content, too. Technically, a Web browser is a
client program that uses the Hypertext Transfer Protocol (HTTP) to make requests of
Web servers throughout the Internet on behalf of the browser user.(18
Q4. If a computer could pass the Turing test then it would be able to:
Select correct option:
win a million dollar prize
think like human begins
think but slower than humans
do the things faster
2.2 The “Turing test”
A test proposed to determine if a computer has the ability to think. In 1950, Alan Turing
(Turing, 1950) proposed a method for determining if machines can think. This method is
known as The Turing Test. (13
Q5.The name of programming language, specifically designed by the US Department of
Defense for developing military applications, was:
Select correct option:
Smalltalk
C
C++
Ada
Ada: A programming language specifically designed by the US Dept of Defense for
developing military applications was named Ada to honor her contributions towards
computing(p9
Q6.TCP Stands for:
Select correct option:
Transmission Control Principles
Transmission Control Protocol
Transformation Control Protocol
Translation Control Protocol
Communications on the Internet is controlled by a set of two protocols: TCP and IP
TCP/IP Transmission Control Protocol/Internet Protocol Networking protocol used by all
computers and networks on the Internet Originally developed by the US DoD for Unix,
but now available for most other OSes TCP breaks down the message to be sent over the
Internet into packets IP routes these packets through the Internet to get them to their
destination When the packets reach the destination computer, TCP reassembles them into
the original message (p196
Q7.Web is a unique invention by humans in terms that it is:
Select correct option:
accessible to all humans
accessible to only the owners who control it
accessible to particular locations only
None of the given choices
Q8.The name of first commercially available PC was:
Select correct option:
UNIVAC 1
ENIAC
EDVAC
Altair 8800
2.9 UNIVAC 1 – 1951
UNIVAC-1. The first commercially successful electronic computer, UNIVAC I, was also
the first general purpose computer - designed to handle both numeric and textual
information. It was designed by J. Presper Eckert and John Mauchly. The implementation
of this machine marked the real beginning of the computer era.(P14
Q9. A strategy in which all possible combinations are examined and best one is selected
called……………
Select correct option:
Divide and conquer
Brute force
Heuristic
All of given
16.12 The Brute Force Strategy (1)
A strategy in which all possible combinations are examined and the best among them is
Selected (p103
Q10.Super Computers are used in:
Select correct option:
Weather forecasting
Aeroplane manufacturing
Atomic Bomb experiments
All of the given choices
<!--[if !supportLineBreakNewLine]-->
<!--[endif]-->
Q11.ENIAC was first____ Computer
Select correct option:
Large-scale
General-purpose
Electronic
All of the given choices
2.6 ENIAC – 1946:
ENIAC I (Electrical Numerical Integrator And Calculator). The U.S. military sponsored
their research; they needed a calculating device for writing artillery-firing tables (the
settings used for different weapons under varied conditions for target accuracy).(p14)
Q12.Which one of the following units can be called as the brain of computer
microprocessor?
Select correct option:
ALU (Arithmetic & Logic Unit)
FPU (Floating Point Unit)
Control Unit
Bus Interface Unit
A control unit is the part of a CPU or other device that directs its operation. The outputs
of the unit control the activity of the rest of the device. A control unit can be thought of as
a finite state machine. It is called the brain of computer microprcessor. (p36
Q13.Which one of the following is a really fast port that lets you connect computer
peripherals and consumer electronics to your computer without the need to restart?
Select correct option:
Freeware
Shareware
Fire wire
Firmware
FireWire is simply a really fast port that lets you connect computer peripherals and
consumer electronics to your computer without the need to restart. It is a simple common
plug-in serial connector on the back of your computer. It has the ability to chain devices
together in a number of different ways without terminators for example, simply join 2
computers with a FireWire cable for instant high-speed networking.(P24 )
Q14.The name of programming language, specifically designed by the US Department of
Defense for developing military applications, was:
Select correct option:
Smalltalk
C
C++
Ada
Ada: A programming language specifically designed by the US Dept of Defense for
developing military applications was named Ada to honor her contributions towards
computing(p9
Q15 Which one of these is NOT an example of storage devices?
Select correct option:
CD
Floppy
Hard Disk
Q16 Which category of computers lies between Workstation and Mainframe computers?
Select correct option:
Microcomputer
Desktop
Laptop
Minicomputer
4.4 Servers / Minicomputers A midsized computer. In size and power, minicomputers lie
between workstations and mainframes. In the past decade, the distinction between large
minicomputers and small mainframes has blurred, however, as has the distinction
between small minicomputers and workstations. But in general, a minicomputer is a
multiprocessing system capable of supporting from 4 to about 200 users simultaneously.
(21
Q17 Algorithm is a precise sequence of a limited number of _________ ,
___________steps that terminates in the form of a solution
Select correct option:
Ambiguous, Executable
Nondeterministic, Finite
Finite, countable
Unambiguous, executable
Ref
1st Definition:
Sequence of steps that is taken to solve a problem
Better Definition:
A precise sequence of a limited number of unambiguous, executable
steps that terminates in the form of a solution
Q18 Which one of the following web programming languages used to do client-side
scripting?
Select correct option:
ASP
Server Side JavaScript
PHP
VBScript
We’ll use JavaScript to do client-side scripting. However, there are many other
languages p119
Q19 This principle called the “Ockham’s Razor,” states when choosing among
competing, successful solutions to a problem; choose the one which is the least ________
Select correct option:
Time Consuming
Ambiguous
Complex
Selecting Among Algorithms
When choosing among competing, successful solutions to a problem, choose the one
which is the least
complex This principle is called the “Ockham’s Razor,” after William of Ockham -
famous 13-th century English philosopher(101
Q20 _________ software sits on top of ________ software for performing user tasks.
Select correct option:
System, Application
System, Productivity
Application, System
System, Programming
Q21 Deep Blue was the name of:
Select correct option:
Human
Computer
City
None of the given choices
In 1997 Deep Blue, a supercomputer designed by IBM, beat Gary Kasparov, the World
Chess Champion That computer was exceptionally fast, did not get tired or bored. It just
kept on analyzing the situation and kept on searching until it found the perfect move from
its list of possible moves (P9)
Q22 Linux and Mac are examples of :
Select correct option:
Uni processor OS
Multi processor OS
Q23 Given the HTML code, <A HREF="mailto: [email protected] ">
[email protected] </A> My email. Read the code carefully and tell what out put
browser will generate?
Select correct option:
[email protected] [email protected]My email
[email protected]None of the given choices
ref: right answer will be
[email protected] My email.
paste following code in any html file and view in browser
<html>
<body>
</body>
</html>
Q24 There is a battery on the mother board to:
Select correct option:
give power to the processor
Save information when computer is OFF
Help the boot process
Save information when computer is ON
ROM
ROM is "built-in" computer memory containing data that normally can only be
read, not
written to. ROM contains the programming that allows your computer to be
"booted
up" or regenerated each time you turn it on. Unlike a computer's random access
memory
(RAM), the data in ROM is not lost when the computer power is turned off.
The ROM is sustained by a small long-life battery in your computer.
Q25 Alan Turing of Cambridge University presented his idea of a theoretically simplified
but fully capable computer, now known as:
Select correct option:
<!--[if !supportLineBreakNewLine]-->
<!--[endif]-->
Analytical Engine
Turing Machine
Difference Engine
None of the given choices
Q26 _ is the example of a Web browser
Select correct option:
Yahoo
Netscape Navigator
Web Application
Google
Q27 The Analytical Engine was machine of which type?
Select correct option:
Programmable
Mechanical
Digital
All of the given choices
1.2. The Analytical Engine A programmable, mechanical, digital machine Could carryout
any calculation Could make decisions based upon the results of the previous calculation
Components: input; memory; processor; output(p 9)
Q28 Interactive Forms are always placed between:
Select correct option:
Body tags of a Web page
Head tags of a Webpage
Q29 Which interface on computer supports transmission of multiple bits at the same
time?
Select correct option:
Serial Port
Parallel Port
PS/2 Port
Universal Serial Bus
Parallel
An interface on a computer that supports transmission of multiple bits at the same time;
almost exclusively used for connecting a printer. On IBM or compatible computers, the
parallel port uses a 25-pin connector.p24
Q30 If we want to show numbers with List Items, then we use
Select correct option:
<UL>
<OL>
<DL>
none of the given
Q31 Trialware Softwares are used for
Select correct option:
short period
long period
life time
none of the given
Software that can be run for a limited period of time before it is purchased.
Trialware has a built-in expiration date and will cease to operate beyond that date
if it has not been paid for. Also called "demoware.(
Q32 Babbage’s Analytical Engine could store information permanently in:
Select correct option:
Magnetic Tape
Floppy Disk
Punched Cards
None of the given choices
Q33 First computer that could not only manipulate numbers but also text data as well
was:
Select correct option:
ENIAC
EDVAC
UNIVAC 1
Attanasoff-Berry Computer
ENIAC I (Electrical Numerical Integrator And Calculator). The U.S. military sponsored
their research; they needed a calculating device for writing artillery-firing tables (the
settings used for different weapons under varied conditions for target accuracy). John
Mauchly was the chief consultant and J Presper Eckert was the chief engineer.
Eckert was a graduate student studying at the Moore School when he met John Mauchly
in 1943. It took the team about one year to design the ENIAC and 18 months and 500,000
tax dollars to build it. The ENIAC contained 17,468 vacuum tubes, along with 70,000
resistors and 10,000 Capacitors.
Q34 Greedy algorithms are usually faster, since they don't consider the details of possible
alternatives
Select correct option:
True
False
KEY ADVANTAGE: Greedy algorithms are usually faster, since they don't consider the
details of possible alternatives (P102
Q35 SCSI stands for:
Select correct option:
Small Computer System Interface
System Common Small Integration
Silicon Computer System Interface
None of the given choices
SCSI
A port that's faster than the serial and parallel ports but slower and harder to configure
than the newer USB port. Also know as the Small Computer System Interface.(24
Q36 Greedy algorithm does not support……………….. Situation.
Select correct option:
Local
Global
Complex
All of given
Q37 Which of the followings is not a Flowchart Element?
Select correct option:
Off- frame connector
Input or output
Process
Connector
flowchart elements
Start or stop
Process
Input or output
Connector
Decision
Flow line
Off-page connector
these are all the elements of flow chart so?
Q38 During one of the international cricket tournaments, one of the teams intentionally
lost a match, so that they could qualify for the next round If they had won that particular
match, some other team would have qualified This is an example of a
_________________
Greedy algorithm
Non-greedy algorithm
Q39 Teraflop stands for:
Select correct option:
Thousand floating point operations per second
Thousand floating point operations per hour
Trillion floating point operations per second
Trillion floating point operations per hour
A____________________ is the process of analyzing large databases to identify patterns
Data Mining
Data Normalization
Data Redundancy
Data Manipulation
onFocus executes the specified JavaScript code when ___________
a window receives focus
a form element receives input focus
a window receives focus or when a form element receives input focus
None of the Given.
CERN releases WWW in:
1992
1993
1994
None of the given choices
Communications on the internet is controlled by a set of two protocols, named :
HTTP & SMTP
FTP & TELNET
TCP & IP
None of the given choices
One of the disadvantages of working at home is________________
Family life may be happier because of living at home.
Family life may suffer as well, as some never turn off, and keep on working through out the
day, evening and night
Family life may become happier because he can give more time to his family.
There is no disadvantage of working at home.
The greatest, shared resource of information created by humankind is:
Web
Dictionary
Vocabulary
Glossary
There are _____________ types communication channels.
The Cyberwarefare is a ______
Crime
War
Software
Game
In the statement “PopUp(“Message”)” :
“PopUp” is the function Name, “Message” is the argument
“Message” is function identifier
Syntax Error: functions cannot be called in this way
Error: function is undefined
RGB scheme stands for _________________________________.
Red Grey Blue
Red Green Brown
Red Green Blue
Red Green Black
_____________ is the part of the virus that generally consists of malicious computer instructions
Off load
Payload
Loader
Transmitter
Unlike viruses, __________________ are stand-alone programs
Trojan horses
Logic- or time-bombs
Worms
None of the given
Voice over IP has _____ modes
We use __________ to stop Break-Ins.
Scanners
Intrusion detectors
Firewalls
Intrusion detectors and Firewalls
Which one can lead user to leave your website?
Simple design
Poor navigation
Information layout
Adaptable design
_____________________ are the subcategories of AI
Expert Systems
Robotics
Natural Language Processing
All of the above
With the Help of FTP we can:
List, change, create folders on a remote computer
Upload and download files
Transferring Web content from the developer’s PC to the Web server
All of the given choices
Which protocol is used for receiving E-mail messages?
FTP
POP
Telnet Protocol
SMTP
The organizations are learning that business can be done in a more effective manner if emphasis is
placed upon ______________.
Cooperation
Shared responsibility
Networking
All of the given
___ is used to transfer files between computers on a TCP/IP network
FTP
POP
Telnet Protocol
SMTP
Which of the following is True about “pareseFloat(String)” function: I) If the first character cannot be
converted to a number, parseFloat returns NaN. II) it returns the fractional portion of floating point
number. III) Parses the string argument; returns a FP number. IV) Non of given options.
I and II Only
II and III Only
I and III Only
IV Only
Event-driven programs can ____________________ events.
capture
respond
capture and respond
None of the Given.
Which of the statements is NOT true about “Color Usage Guidelines” for developing a presentation?
Use color sparingly to to highlight a point, but don't get carried away
Do not use colors like yellow or red for background except where needed.
Do not use colors like green, blue and such like colors except where needed.
None of given options
_________________ Type of databases management systems are supporting Terabytes of Data
Personal
Desktop
Enterprise
Single-user
Because of the ever-decreasing costs of verbal, text, video communications; the distances have
_________
Increased
Expanded
Contracted
Lengthened
The structure of the networked organization is _________.
Simple
Flexible
Complex
All of the given
A CAD drawing consist of many geometric shapes like straight lines , arc , tc and therefore is stored
in a ___________ format.
Scalar
Vector
Both a & b
____ is a type of computer-to-computer messaging.
TCP
Telnet
E-mail
FTP
None of these
RDBMS stands for ________________________________
Relative Data Base Management System
Relational Data Base Management System
Recursive Data Base Management System
Responsible Data Base Management System
Using Color Mapping scheme only a limited number of color called _____________ are allowed.
Reserved
Pointers
Platelet
None of these
Using _________ topology, adding new nodes is difficult.
Ring
Bus
Star
None of the given choices
Problems with old presentation methods was (transparencies and projectors etc):
They were costly
Electronic transmission, in some cases, was not easy
Presentation some times gets ambiguous
All of given options
ARPANET splits into two nets to keep military & non-military network sites separate, named :
ARPANET & MILNET
MICRONET & MILNET
PICONET & ARPANET
None of the given choices
Arguments values are passed to the function _________
by value
by reference
Both a & b
Non of the Given.
__________________ is a field that uniquely identifies each record stored in a table.
Primary Key
Foreign Key
Secondary key
Special Key
The IP address consists of _____ bits
64
32
16
128
Credit Card Fraud can be minimized by using _________________
single credit card numbers
multiple-use credit card numbers
single-use credit card numbers
Firewalls
hotWeather = (Temperature == 40); in the above statement, the variable hotWeather is of type
Number
String
Boolean
None of the given
NCSA stands for :
NationalCenter for Supercomputing Applications
NationalCenter for Supreme Applications
NationalCenter for Super Authority
None of the given choices
Self-replicating SW that eludes detection and is designed to attach itself to other files is called
_____________.
Trojans
Viruses
Sniffers
Operating System
SVG stands for _________________________________________.
Structured Vector Graphics
Software Vector Graphics
Structured Visual Graphics
None of these
Viruses move from one computer to another with the __________ and spring into action when the
_____________ is executed or opened
Host – Host
Host – Client
Client – Host
Client – Client
____________________ is a layered structure consisting of a number of homogenous and simple
processing elements.
Genetic Algorithms
Rule-based Systems
Feed-Forward Network
None of these
A property that gives the value of Pi is:
PI()
Graph.PI
Math.PI
Math.PI()
The smallest image forming element on a computer display is called ____________.
Resolution
Pixel
Grey area
None of these
SMTP stands for _______________________________________.
Simple Mail Transfer Protocol
Simple Mail Transparent Protocol
Simple Mail Transfer Paradigm
None of these
________________ network allows data to be sent directly from one computer to another.
Ring
Bus
Star
None of the given choices
Viruses attach themselves to other computer programs or data files, are known as____
Trojans
Guests
Hosts
Spies
Avoid __________ to ensure readability of web page
Overuse of bold and italics
Use of paragraphs
Use of white space
Use of contrast colors
STP stands for :
Shielded Twisted Pair
Silver Twisted Pair
Single Twisted Pair
None of the given choices
In ______, the spies of one business monitors the network traffic of their competitors.
Industrial intelligence
Industrial Espionage
Industrial spying
Industrial surveillance
Color mapping scheme reducing the size of 2.25 MB graphic to _________ MB.
0.90 MB
0.75 MB
1.00 MB
None of these
The functions which call themselves from their (own) body are called:
Virtual functions
Abstract functions
Overriding functions
Recursive functions
Browser sends ‘_________’ request to web server to access a file.
SET
GET
TRANSFER
All of the given choices
The internet communities are ___________.
Geographical based
Interest based
Country based
Religion based
Infection propagation and Actual destructive are the components of _______________
Transmission mechanism
Payload
Worms
Trojan Horse
An algorithm that always takes the best immediate or local solution while finding an answer
is called____.
► Deterministic Algorithm
► Non deterministic Algorithm
► Greedy Algorithm
► Randomized Algorithm
Which of the following command allows you to recover form mistakes in MS Word?
► Clear
► Edit
► Undo
► Break
A ____________ operating system allows many users to take advantage of the
computer's resources, simultaneously
► Single user
► Multi- user
► Single tasking
► Multi tasking
Network Interface Card is an __________ device
► Input
► Output
► Input/Output
► Storage
The decimal equivalent of binary 1000 is
► 7
► 8
► 9
► 10
Which of the following is NOT RDBMS software?
► My Sql
► MS Excel
► Oracle
► SQL Server
A computer virus is a
► Software that saves the computer from being damaged.
► Application software that helps to make different type of viruses and worms
► Program that spreads itself and destroys other program
► Program that corrects the problems in your computer
What will be the result of a?
a = Math.abs(-23)
► 23
► -23
► 23.0
► 2.3
A Special program required to view swf (Shockwave Flash) files in web Browser is called
► TFlash
► Vflash
► plug-in
► None of the given options
Using Java Script you can write a character at random location on screen
► By applying randomCh() method
► With the help of String object
► With the help of random character property
► There is no built in approach in Java Script
If incorrectly we enter the negative age it is check by
► Limit Integrity
► Type Integrity
► Referential Integrity
► Physical Integrity
Which protocol is use to transfer a file over the network?
► UDP
► FTP
► TCP
► OSI
One can send an email message to a remote computer using _______ protocol
► HTTP
► SMTP
► FTP
► TELNET
In a System having many parts to be designed, one should always do the _____ first
► Hard part
► Simple part
► Development part
► Quality part
Flow control constructs in JavaScript includes:
► If-Else
► Loops and If -Else
► Switch and If-Else
► All of the given choices
___ provides a simple, consistent way for applications to interact with the HW without having to
know all the details of the HW
► Explorer.exe
► System Files
► Operating System
► Application Software
Machine language is also called
► Assembly Language
► Binary Language
► High Level Language
► HTML Language
_________ is the best known builder for supercomputers.
► Sun
► Cray Research
► Microsoft
► Apple
The weaknesses of the computer are:
► Pattern recognition & Storage
► Speed & Innovative ideas
► Pattern recognition & Innovative ideas
► Speed & Storage
Communication protocol is a __________that governs the flow of information over a network
► Set of methods
► Set of protocols
► Set of rules
► Device
_____________ team is responsible for the maintenance, expansion , improvement of the
infrastructure consisting of workstations, networking equipment, software and network security.
► Support
► Configuration Management
► Quality Assurance
► Developer
_____________ team consists on the sharpest technical minds in the company.
► Architecture
► Business Development
► Configuration Management
► Developer
_______________ is responsible for day to day operations.
► CEO
► COO
► CMSO
► Developer
One of the key responsibilities of the ___________ is client relationship management.
► Project Manager
► Team Lead
► Developer
► Quality Assurance Engineer
What is the major problem with flash based website?
► Its two heavy
► Cannot be indexed
► Less attractive
► Inaccessible
Which of the following is NOT an event handler for image object?
► onAbort
► onError
► onLoad
► onUser
The organizations are learning that business can be done in a more effective manner if emphasis is
placed upon ___________.
► Cooperation
► Shared responsibility
► Networking
► All of the given options
a = Math.abs(-23)
What will be the value of a ?
► 23
► -23
► 23.0
► 2.3
ERP is a type of __________________ .
► Entertainment software
► Productivity software
► Business software
► Scientific software
In Genetic Algorithm the most important thing you should know, is the ___________.
► Procedure
► Recognition of a good solution
► Different techniques
► None of the given options
According to a popular heuristic, success is defined by ___________.
► The user
► The builder
► Both user and builder
► None of the given options
Rule of thumb learned through trial and error is called ___________.
► Design
► Heuristic
► Plan
► Aim
JavaScript Variables are ____________.
► Dynamically Typed
► Statically Typed
► Strong Typed
► None of the given options
Which of the following application are collections of cells?
► Word
► Excel
► PowerPoint
► Outlook Express
The browser breaks down the URL into ________ parts.
►2
►3
►4
►5
A named collection of properties (data, state) and methods (instruction, behavior) is called
____________.
► Array
► Function
► Variable
► Object
First computer network was ___________.
► NSFNET
► FIRSTNET
► ARPANET
► ORPHANET
In JavaScript, a variable declaration is
► Optional
► Mandatory
► Not allowed
► None of the given
A protocol used for receiving email messages is called ____________.
► URL
► Telnet
► POP3
► SMTP
which one is correct?
► onUnload
► onUnLoad
► onUNLOAD
► All of the above
Serial arrangement in which things follow logical order or a recurrent pattern, such as statements
executing one by one, is called __________.
► Loop
► Sequence
► Condition
► Array
Variables allow us to manipulate data through the ___________.
► Actual Value
► Reference
► Length
► Name
Fuzzy logic is based on ____________.
► Ground facts
► Experience
► Practice
► Approximation
Word Processor is a _________________
► System Software
► Application Software
► Device
► Utility
In the old days, databases did NOT support ____________.
► Number
► Boolean
► Video
► Text
In tabular storage, fields placed in a particular row are strongly ___________.
► Independent
► Dependent
► Interrelated
► Inconsistent
Due to working at home, lack of interaction may result in ___________ professional growth.
► Slower
► Faster
► Higher
► Improved
Distance learning has got a boost due to the ___________.
► Easy communication
► Online interactive contents
► Flexibility
► All of the given options
_____________ technique can be used to create smooth animations or to display one of several
images based on the requirement.
► Image downloading
► Image preloading
► Image uploading
► Image postloading
The ____________ is becoming the preferred organizational structure for more and more
organizations with the passage of time.
► Tree structured organizational model
► Network paradigm
► Hierarchical structure
► None of the given options
The group of technologies concerned with the capturing, processing and transmission of
information in the digital electronic form is called
_____________.
► Telecom Engineering
► Computer Engineering
► Computer Science
► Information Technology
A large number of networks interconnected physically is called ______
► LAN
► MAN
► Internet
► Network collection
TCP stands for ________.
► Transfer Center protocol
► Transmission Control Protocol
► Transmission Center Protocol
► Telephone Center Protocol
A collection of data organized in such a way that the computer can quickly search for a desired data
item is known as :
► Retrieving
► Database
► Information
► DBMS
______ is simply a fast port that lets you connect computer peripherals and consumer electronics to
your computer without restart.
► Freeware
► Shareware
► Firewire
► Firmware
Structures, in which another list starts before the first list is finished, are called:
► Multiple Lists
► Nested Lists
► Ordered Lists
► Un-ordered Lists
The key property of the ‘Array’ object in JavaScript is
► Value
► Length
► Name
► All of the given choices
Which one is the example of spreadsheet software ?
► MS Word
► MS PowerPoint
► MS Excel
► MS Access
The Encryption of data is related to
► Data updates
► Data security
► Data integrity
► Data accessibility
_____ is the process of analyzing large databases to identify patterns.
► Data normalization
► Data management
► Data Mining
► None of the given options
Which is the user-friendly way of presenting data ?
► Query
► Form
► Report
► All of the given options
<form> Tags always placed between the <BODY> and </BODY> tags of a Web page
► True
► False
Java script has ----------------- ability to create and draw graphics.
► Limited
► Versatile
► Medium
► Not at all
Which of the following is incorrect for making design elements legible?
Select correct option:
Elements should be large enough
Elements must contrast sufficiently
Related elements should be visually grouped
Elements should have no visual focus
Function is also known as ______________.
Select correct option:
subprogram
procedure
subroutine
All of given
In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET.
Select correct option:
1973
1983
1972
None of the given choices
E-mail system has ______ component(s)
Select correct option:
E-mail client
SMTP server
POP3 server
All of the given choices
_______ / / /______/ A Parallelogram (Tilted rectangle) represents the ________________ flow chart
element.
Select correct option:
Process
Input or Output
Decision
Connector
If a computer could pass the Turing test then it would be able to:
Select correct option:
win a million dollar prize
think like human begins
think but slower than humans
do the things faster
Punched cards were replaced by:
Select correct option:
Floppy Disk
Zip Drives
Magnetic storage
None of the given choices
The ________virus may display an annoying, but harmless message
Select correct option:
Malicious
Neutral
Helpful
DoS
The name of very first computer was:
Select correct option:
ABC
BCD
EDC
None of the given choices
The internet communities are ___________.
Select correct option:
Geographical based
Interest based
Country based
Religion based
which one is correct?
► onUnload
► onUnLoad
► onUNLOAD
► All of the above
Serial arrangement in which things follow logical order or a recurrent pattern, such as statements
executing one by one, is called __________.
► Loop
► Sequence
► Condition
► Array
Variables allow us to manipulate data through the ___________.
► Actual Value
► Reference
► Length
► Name
Fuzzy logic is based on ____________.
► Ground facts
► Experience
► Practice
► Approximation
Word Processor is a _________________
► System Software
► Application Software
► Device
► Utility
In the old days, databases did NOT support ____________.
► Number
► Boolean
► Video
► Text
In tabular storage, fields placed in a particular row are strongly ___________.
► Independent
► Dependent
► Interrelated
► Inconsistent
Due to working at home, lack of interaction may result in ___________ professional growth.
► Slower
► Faster
► Higher
► Improved
Distance learning has got a boost due to the ___________.
► Easy communication
► Online interactive contents
► Flexibility
► All of the given options
_____________ technique can be used to create smooth animations or to display one of several
images based on the requirement.
► Image downloading
► Image preloading
► Image uploading
► Image postloading
The ____________ is becoming the preferred organizational structure for more and more
organizations with the passage of time.
► Tree structured organizational model
► Network paradigm
► Hierarchical structure
► None of the given options
The group of technologies concerned with the capturing, processing and transmission of
information in the digital electronic form is called
_____________.
► Telecom Engineering
► Computer Engineering
► Computer Science
► Information Technology
A large number of networks interconnected physically is called ______
► LAN
► MAN
► Internet
► Network collection
TCP stands for ________.
► Transfer Center protocol
► Transmission Control Protocol
► Transmission Center Protocol
► Telephone Center Protocol
A collection of data organized in such a way that the computer can quickly search for a desired data
item is known as :
► Retrieving
► Database
► Information
► DBMS
______ is simply a fast port that lets you connect computer peripherals and consumer electronics to
your computer without restart.
► Freeware
► Shareware
► Firewire
► Firmware
Structures, in which another list starts before the first list is finished, are called:
► Multiple Lists
► Nested Lists
► Ordered Lists
► Un-ordered Lists
The key property of the ‘Array’ object in JavaScript is
► Value
► Length
► Name
► All of the given choices
Which one is the example of spreadsheet software ?
► MS Word
► MS PowerPoint
► MS Excel
► MS Access
_____ is the process of analyzing large databases to identify patterns.
► Data normalization
► Data management
► Data Mining
► None of the given options
Which is the user-friendly way of presenting data ?
► Query
► Form
► Report
► All of the given options
JavaScript function fixed() has equivalent HTML tag-set ____
► <.FIX>……………</FIX>
► <F>………………..</F>
► <PRE>………….</PRE>
► <H>………………..</H>
<form> Tags always placed between the <BODY> and </BODY> tags of a Web page
► True
► False
Java script has ----------------- ability to create and draw graphics.
► Limited
► Versatile
► Medium
► Not at all
Internet is an example of ______________ network.
Private
Public
Both Private and Public
None of the given choices
The name of first commercially available PC was:
UNIVAC 1
ENIAC
EDVAC
Altair 8800
Algorithm is a ____________________
Definition of a problem
Sequence of steps to solve a problem
Understanding of a problem
Solving a problem
A group of information is called __________________
File
Database
Record
Field
___________________ is a branch of computer science concerned with manipulating and enhancing
computer graphics.
Image Handling
Image Processing
Image Engineering
None of these
__________has changed our way of life like no other technology.
Computational technology
Computer technology
Computing technology
None of the Above
Sophisticated event handling is not possible with _______________ event handling
Off-Line
In-Line
Out-Line
Non of the given choices
Babbage’s Analytical Engine could store information permanently in:
Magnetic Tape
Floppy Disk
Punched Cards
None of the given choices
There are __________ popular schemes to reduce the number of bytes that are required for storing
graphics.
4
3
2
None of these
The internet-society is considered under Surveillance because:
While surfing, we are being watched, constantly
Our every click is recorded and analyzed to extract patterns and behaviors
Webcams are becoming common. Providing a cheap way for parents to watch their children's every move
All of the given
URL is a/an ________
► Device
► Component
► Address
► Tool
To improve the time for scanning a web page, text should be ___________.
► Centered
► Left Aligned
► Right Aligned
► Staggered
Communications on the internet is controlled by a set of two protocols which are ____________.
► IMAP and SMTP
► FTP and HTTP
► TCP and IP
► TCP and HTTP
FTP stands for __________.
► File transmission protocol
► File transmission path
► File transfer protocol
► Fine transfer path
A named collection of properties (data, state) and methods (instruction, behavior) is called
____________.
► Array
► Function
► Variable
► Object
Anchor tag denoted by <A> is used to create
► Address
► Hyperlink
► Paragraph
► Title
<UL> tag is used to
► underline text
► end the line
► create ordered list
► create unordered list
A user may access any item on the web through __________.
► URL
► Telnet
► POP
► SMTP
The browser breaks down the URL into ________ parts.
►2
►3
►4
►5
Which one of the following is NOT a primary color?
► Red
► Green
► Yellow
► Blue
According to a popular heuristic, success is defined by ___________.
► The user
► The builder
► Both user and builder
► None of the given options
The idea of Neural Networks field is based upon ______________.
► Human nature
► Human brain
► Human culture
► Human actions
ERP is a type of __________________ .
► Entertainment software
► Productivity software
► Business software
► Scientific software
__________ are those programs in which the flow of the program is determined by the user's actions
(mouse clicks, key presses) or messages from other programs.
► Event called programs
► Event processed programs
► Event driven programs
► Event declared programs
Automatic machines performing various tasks that were previously done by humans, are called
____________.
► Robotics
► Computers
► Decision Making Systems
► Autonomous Web Agents
country=”Hello Pakistan”;
document.write(country.charAt(6));
The out put of the above statement is _____________.
►o
►P
►a
►k
The distance among families is ___________ because of spending more time on internet.
► Increased
► Expanded
► Contracted
► Decreased
The software used for the scanning of internet severs, is called __________.
► Wscan
► Mscan
► Sscan
► Vscan
Adding images to html page, we use___________ tag.
► <IMG>
► <IMAGE>
► <PICTURE>
► <PIC>
The group of technologies concerned with the capturing, processing and transmission of
information in the digital electronic form is called _____________.
► Telecom Engineering
► Computer Engineering
► Computer Science
► Information Technology
The responsibilities of the Team Lead includes_____________.
► Planning and tracking of the project
► Detailed design
► Professional development of team members
► All of the given options
When the packets reach at destination, __________ reassembles them into original message.
► Protocol
► TCP
► IP
► NIC
Many developers write the _________ first and then incrementally convert each line into _________.
► Real code & Pseudo code
► Pseudo code & Real code
► Real code & Artificial code
► None of the given options
Machine language is also called
► Assembly Language
► Binary Language
► High Level Language
► HTML Language
In JavaScript, second element of an array has the index:
►2
►0
►1
►3
Each element in an array is given an index, which is an integer value between 0 and one less than the
length of the array. The first element has an index of 0, the second element has an index of 1, and so on.
One can download or upload files to a remote computer using ________ protocol.
► HTTP
► SMTP
► FTP
► TELNET
JavaScript ________ support drawing of graphics
► Does
► Does not
► Always
► At times
Which of the following is NOT true about modern computers?
► More powerful
► Smaller in size
► Consume less energy
► Costly
Ada written a computer programme for ?
► Analytical Engine
► Difference Engine
► Harvard Mark 1
► Mechanical engine
A set of stand alone productivity applications designed to work together known as ______________ .
► Productivity software suites
► Compiled software
► Secure software
► Intelligent software
Because of spending more time on the internet, the distances among the families have been _____.
Increased
Expanded
Contracted
Shortened
Sophisticated event handling is not possible with _______________ event handling
Off-Line
In-Line
Out-Line
Non of the given choices
Autonomous Web Agents are also known as _________________
Mobile Agents
Softbots
Both "Mobile Agents" & "Softbots"
None of these
A communication protocol is a __________that governs the flow of information over a network.
Set of Methods
Set of Protocols
Set of rules
None of the given choices
By default in a web page Hyper Link for another web page is represented as:
Blue only
Black and Underlined
Blue and Bold
Blue and Underlined
The organizations are learning that business can be done in a more effective manner if emphasis is
placed upon ______________.
Cooperation
Shared responsibility
Networking
All of the given
Monitor is an example of __________devices
Output
Input
Processing
None of the given choices
The code in the ________ portion is the right choice for developing larger JavaScript scripts
Body
At End
Head
Separate
____________________ based on the principles of the logical reasoning ability of humans.
Genetic Algorithms
Rule-based Systems
Feed-Forward Network
None of these
The key benefit of VPNs over conventional PNs is:
Security
Efficiency
Lower Cost
None of the given choices
An algorithm that always takes the best immediate or local solution while finding an answer
is called____.
► Deterministic Algorithm
► Non deterministic Algorithm
► Greedy Algorithm
► Randomized Algorithm
Which of the following command allows you to recover form mistakes in MS Word?
► Clear
► Edit
► Undo
► Break
A ____________ operating system allows many users to take advantage of the
computer's resources, simultaneously
► Single user
► Multi- user
► Single tasking
► Multi tasking
Network Interface Card is an __________ device
► Input
► Output
► Input/Output
► Storage
The decimal equivalent of binary 1000 is
► 7
► 8
► 9
► 10
Which of the following is NOT RDBMS software?
► My Sql
► MS Excel
► Oracle
► SQL Server
A computer virus is a
► Software that saves the computer from being damaged.
► Application software that helps to make different type of viruses and worms
► Program that spreads itself and destroys other program
► Program that corrects the problems in your computer
What will be the result of a?
a = Math.abs(-23)
► 23
► -23
► 23.0
► 2.3
A Special program required to view swf (Shockwave Flash) files in web Browser is called
► TFlash
► Vflash
► plug-in
► None of the given options
Using Java Script you can write a character at random location on screen
► By applying randomCh() method
► With the help of String object
► With the help of random character property
► There is no built in approach in Java Script
If incorrectly we enter the negative age it is check by
► Limit Integrity
► Type Integrity
► Referential Integrity
► Physical Integrity
Which protocol is use to transfer a file over the network?
► UDP
► FTP
► TCP
► OSI
One can send an email message to a remote computer using _______ protocol
► HTTP
► SMTP
► FTP
► TELNET
In a System having many parts to be designed, one should always do the _____ first
► Hard part
► Simple part
► Development part
► Quality part
Flow control constructs in JavaScript includes:
► If-Else
► Loops and If -Else
► Switch and If-Else
► All of the given choices
___ provides a simple, consistent way for applications to interact with the HW without having to
know all the details of the HW
► Explorer.exe
► System Files
► Operating System
► Application Software
Machine language is also called
► Assembly Language
► Binary Language
► High Level Language
► HTML Language
_________ is the best known builder for supercomputers.
► Sun
► Cray Research
► Microsoft
► Apple
The weaknesses of the computer are:
► Pattern recognition & Storage
► Speed & Innovative ideas
► Pattern recognition & Innovative ideas
► Speed & Storage
Communication protocol is a __________that governs the flow of information over a network
► Set of methods
► Set of protocols
► Set of rules
► Device
_____________ team is responsible for the maintenance, expansion , improvement of the
infrastructure consisting of workstations, networking equipment, software and network security.
► Support
► Configuration Management
► Quality Assurance
► Developer
_____________ team consists on the sharpest technical minds in the company.
► Architecture
► Business Development
► Configuration Management
► Developer
_______________ is responsible for day to day operations.
► CEO
► COO
► CMSO
► Developer
One of the key responsibilities of the ___________ is client relationship management.
► Project Manager
► Team Lead
► Developer
► Quality Assurance Engineer
What is the major problem with flash based website?
► Its two heavy
► Cannot be indexed
► Less attractive
► Inaccessible
Which of the following is NOT an event handler for image object?
► onAbort
► onError
► onLoad
► onUser
The organizations are learning that business can be done in a more effective manner if emphasis is
placed upon ___________.
► Cooperation
► Shared responsibility
► Networking
► All of the given options
a = Math.abs(-23)
What will be the value of a ?
► 23
► -23
► 23.0
► 2.3
ERP is a type of __________________ .
► Entertainment software
► Productivity software
► Business software
► Scientific software
In Genetic Algorithm the most important thing you should know, is the ___________.
► Procedure
► Recognition of a good solution
► Different techniques
► None of the given options
According to a popular heuristic, success is defined by ___________.
► The user
► The builder
► Both user and builder
► None of the given options
Rule of thumb learned through trial and error is called ___________.
► Design
► Heuristic
► Plan
► Aim
JavaScript Variables are ____________.
► Dynamically Typed
► Statically Typed
► Strong Typed
► None of the given options
Which of the following application are collections of cells?
► Word
► Excel
► PowerPoint
► Outlook Express
The browser breaks down the URL into ________ parts.
►2
►3
►4
►5
A named collection of properties (data, state) and methods (instruction, behavior) is called
____________.
► Array
► Function
► Variable
► Object
First computer network was ___________.
► NSFNET
► FIRSTNET
► ARPANET
► ORPHANET
In JavaScript, a variable declaration is
► Optional
► Mandatory
► Not allowed
► None of the given
A protocol used for receiving email messages is called ____________.
► URL
► Telnet
► POP3
► SMTP
which one is correct?
► onUnload
► onUnLoad
► onUNLOAD
► All of the above
Serial arrangement in which things follow logical order or a recurrent pattern, such as statements
executing one by one, is called __________.
► Loop
► Sequence
► Condition
► Array
Variables allow us to manipulate data through the ___________.
► Actual Value
► Reference
► Length
► Name
Fuzzy logic is based on ____________.
► Ground facts
► Experience
► Practice
► Approximation
Word Processor is a _________________
► System Software
► Application Software
► Device
► Utility
In the old days, databases did NOT support ____________.
► Number
► Boolean
► Video
► Text
In tabular storage, fields placed in a particular row are strongly ___________.
► Independent
► Dependent
► Interrelated
► Inconsistent
Due to working at home, lack of interaction may result in ___________ professional growth.
► Slower
► Faster
► Higher
► Improved
Distance learning has got a boost due to the ___________.
► Easy communication
► Online interactive contents
► Flexibility
► All of the given options
_____________ technique can be used to create smooth animations or to display one of several
images based on the requirement.
► Image downloading
► Image preloading
► Image uploading
► Image postloading
The ____________ is becoming the preferred organizational structure for more and more
organizations with the passage of time.
► Tree structured organizational model
► Network paradigm
► Hierarchical structure
► None of the given options
The group of technologies concerned with the capturing, processing and transmission of
information in the digital electronic form is called
_____________.
► Telecom Engineering
► Computer Engineering
► Computer Science
► Information Technology
A large number of networks interconnected physically is called ______
► LAN
► MAN
► Internet
► Network collection
TCP stands for ________.
► Transfer Center protocol
► Transmission Control Protocol
► Transmission Center Protocol
► Telephone Center Protocol
A collection of data organized in such a way that the computer can quickly search for a desired data
item is known as :
► Retrieving
► Database
► Information
► DBMS
______ is simply a fast port that lets you connect computer peripherals and consumer electronics to
your computer without restart.
► Freeware
► Shareware
► Firewire
► Firmware
Structures, in which another list starts before the first list is finished, are called:
► Multiple Lists
► Nested Lists
► Ordered Lists
► Un-ordered Lists
The key property of the ‘Array’ object in JavaScript is
► Value
► Length
► Name
► All of the given choices
Which one is the example of spreadsheet software ?
► MS Word
► MS PowerPoint
► MS Excel
► MS Access
The Encryption of data is related to
► Data updates
► Data security
► Data integrity
► Data accessibility
_____ is the process of analyzing large databases to identify patterns.
► Data normalization
► Data management
► Data Mining
► None of the given options
Which is the user-friendly way of presenting data ?
► Query
► Form
► Report
► All of the given options
<form> Tags always placed between the <BODY> and </BODY> tags of a Web page
► True
► False
Java script has ----------------- ability to create and draw graphics.
► Limited
► Versatile
► Medium
► Not at all
Which of the following is incorrect for making design elements legible?
Select correct option:
Elements should be large enough
Elements must contrast sufficiently
Related elements should be visually grouped
Elements should have no visual focus
Function is also known as ______________.
Select correct option:
subprogram
procedure
subroutine
All of given
In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET.
Select correct option:
1973
1983
1972
None of the given choices
E-mail system has ______ component(s)
Select correct option:
E-mail client
SMTP server
POP3 server
All of the given choices
_______ / / /______/ A Parallelogram (Tilted rectangle) represents the ________________ flow chart
element.
Select correct option:
Process
Input or Output
Decision
Connector
If a computer could pass the Turing test then it would be able to:
Select correct option:
win a million dollar prize
think like human begins
think but slower than humans
do the things faster
Punched cards were replaced by:
Select correct option:
Floppy Disk
Zip Drives
Magnetic storage
None of the given choices
The ________virus may display an annoying, but harmless message
Select correct option:
Malicious
Neutral
Helpful
DoS
The name of very first computer was:
Select correct option:
ABC
BCD
EDC
None of the given choices
The internet communities are ___________.
Select correct option:
Geographical based
Interest based
Country based
Religion based
which one is correct?
► onUnload
► onUnLoad
► onUNLOAD
► All of the above
Serial arrangement in which things follow logical order or a recurrent pattern, such as statements
executing one by one, is called __________.
► Loop
► Sequence
► Condition
► Array
Variables allow us to manipulate data through the ___________.
► Actual Value
► Reference
► Length
► Name
Fuzzy logic is based on ____________.
► Ground facts
► Experience
► Practice
► Approximation
Word Processor is a _________________
► System Software
► Application Software
► Device
► Utility
In the old days, databases did NOT support ____________.
► Number
► Boolean
► Video
► Text
In tabular storage, fields placed in a particular row are strongly ___________.
► Independent
► Dependent
► Interrelated
► Inconsistent
Due to working at home, lack of interaction may result in ___________ professional growth.
► Slower
► Faster
► Higher
► Improved
Distance learning has got a boost due to the ___________.
► Easy communication
► Online interactive contents
► Flexibility
► All of the given options
_____________ technique can be used to create smooth animations or to display one of several
images based on the requirement.
► Image downloading
► Image preloading
► Image uploading
► Image postloading
The ____________ is becoming the preferred organizational structure for more and more
organizations with the passage of time.
► Tree structured organizational model
► Network paradigm
► Hierarchical structure
► None of the given options
The group of technologies concerned with the capturing, processing and transmission of
information in the digital electronic form is called
_____________.
► Telecom Engineering
► Computer Engineering
► Computer Science
► Information Technology
A large number of networks interconnected physically is called ______
► LAN
► MAN
► Internet
► Network collection
TCP stands for ________.
► Transfer Center protocol
► Transmission Control Protocol
► Transmission Center Protocol
► Telephone Center Protocol
A collection of data organized in such a way that the computer can quickly search for a desired data
item is known as :
► Retrieving
► Database
► Information
► DBMS
______ is simply a fast port that lets you connect computer peripherals and consumer electronics to
your computer without restart.
► Freeware
► Shareware
► Firewire
► Firmware
Structures, in which another list starts before the first list is finished, are called:
► Multiple Lists
► Nested Lists
► Ordered Lists
► Un-ordered Lists
The key property of the ‘Array’ object in JavaScript is
► Value
► Length
► Name
► All of the given choices
Which one is the example of spreadsheet software ?
► MS Word
► MS PowerPoint
► MS Excel
► MS Access
_____ is the process of analyzing large databases to identify patterns.
► Data normalization
► Data management
► Data Mining
► None of the given options
Which is the user-friendly way of presenting data ?
► Query
► Form
► Report
► All of the given options
JavaScript function fixed() has equivalent HTML tag-set ____
► <.FIX>……………</FIX>
► <F>………………..</F>
► <PRE>………….</PRE>
► <H>………………..</H>
<form> Tags always placed between the <BODY> and </BODY> tags of a Web page
► True
► False
Java script has ----------------- ability to create and draw graphics.
► Limited
► Versatile
► Medium
► Not at all
Internet is an example of ______________ network.
Private
Public
Both Private and Public
None of the given choices
The name of first commercially available PC was:
UNIVAC 1
ENIAC
EDVAC
Altair 8800
Algorithm is a ____________________
Definition of a problem
Sequence of steps to solve a problem
Understanding of a problem
Solving a problem
A group of information is called __________________
File
Database
Record
Field
___________________ is a branch of computer science concerned with manipulating and enhancing
computer graphics.
Image Handling
Image Processing
Image Engineering
None of these
__________has changed our way of life like no other technology.
Computational technology
Computer technology
Computing technology
None of the Above
Sophisticated event handling is not possible with _______________ event handling
Off-Line
In-Line
Out-Line
Non of the given choices
Babbage’s Analytical Engine could store information permanently in:
Magnetic Tape
Floppy Disk
Punched Cards
None of the given choices
There are __________ popular schemes to reduce the number of bytes that are required for storing
graphics.
4
3
2
None of these
The internet-society is considered under Surveillance because:
While surfing, we are being watched, constantly
Our every click is recorded and analyzed to extract patterns and behaviors
Webcams are becoming common. Providing a cheap way for parents to watch their children's every move
All of the given
URL is a/an ________
► Device
► Component
► Address
► Tool
To improve the time for scanning a web page, text should be ___________.
► Centered
► Left Aligned
► Right Aligned
► Staggered
Communications on the internet is controlled by a set of two protocols which are ____________.
► IMAP and SMTP
► FTP and HTTP
► TCP and IP
► TCP and HTTP
FTP stands for __________.
► File transmission protocol
► File transmission path
► File transfer protocol
► Fine transfer path
A named collection of properties (data, state) and methods (instruction, behavior) is called
____________.
► Array
► Function
► Variable
► Object
Anchor tag denoted by <A> is used to create
► Address
► Hyperlink
► Paragraph
► Title
<UL> tag is used to
► underline text
► end the line
► create ordered list
► create unordered list
A user may access any item on the web through __________.
► URL
► Telnet
► POP
► SMTP
The browser breaks down the URL into ________ parts.
►2
►3
►4
►5
Which one of the following is NOT a primary color?
► Red
► Green
► Yellow
► Blue
According to a popular heuristic, success is defined by ___________.
► The user
► The builder
► Both user and builder
► None of the given options
The idea of Neural Networks field is based upon ______________.
► Human nature
► Human brain
► Human culture
► Human actions
ERP is a type of __________________ .
► Entertainment software
► Productivity software
► Business software
► Scientific software
__________ are those programs in which the flow of the program is determined by the user's actions
(mouse clicks, key presses) or messages from other programs.
► Event called programs
► Event processed programs
► Event driven programs
► Event declared programs
Automatic machines performing various tasks that were previously done by humans, are called
____________.
► Robotics
► Computers
► Decision Making Systems
► Autonomous Web Agents
country=”Hello Pakistan”;
document.write(country.charAt(6));
The out put of the above statement is _____________.
►o
►P
►a
►k
The distance among families is ___________ because of spending more time on internet.
► Increased
► Expanded
► Contracted
► Decreased
The software used for the scanning of internet severs, is called __________.
► Wscan
► Mscan
► Sscan
► Vscan
Adding images to html page, we use___________ tag.
► <IMG>
► <IMAGE>
► <PICTURE>
► <PIC>
The group of technologies concerned with the capturing, processing and transmission of
information in the digital electronic form is called _____________.
► Telecom Engineering
► Computer Engineering
► Computer Science
► Information Technology
The responsibilities of the Team Lead includes_____________.
► Planning and tracking of the project
► Detailed design
► Professional development of team members
► All of the given options
When the packets reach at destination, __________ reassembles them into original message.
► Protocol
► TCP
► IP
► NIC
Many developers write the _________ first and then incrementally convert each line into _________.
► Real code & Pseudo code
► Pseudo code & Real code
► Real code & Artificial code
► None of the given options
Machine language is also called
► Assembly Language
► Binary Language
► High Level Language
► HTML Language
In JavaScript, second element of an array has the index:
►2
►0
►1
►3
Each element in an array is given an index, which is an integer value between 0 and one less than the
length of the array. The first element has an index of 0, the second element has an index of 1, and so on.
One can download or upload files to a remote computer using ________ protocol.
► HTTP
► SMTP
► FTP
► TELNET
JavaScript ________ support drawing of graphics
► Does
► Does not
► Always
► At times
Which of the following is NOT true about modern computers?
► More powerful
► Smaller in size
► Consume less energy
► Costly
Ada written a computer programme for ?
► Analytical Engine
► Difference Engine
► Harvard Mark 1
► Mechanical engine
A set of stand alone productivity applications designed to work together known as ______________ .
► Productivity software suites
► Compiled software
► Secure software
► Intelligent software
Because of spending more time on the internet, the distances among the families have been _____.
Increased
Expanded
Contracted
Shortened
Sophisticated event handling is not possible with _______________ event handling
Off-Line
In-Line
Out-Line
Non of the given choices
Autonomous Web Agents are also known as _________________
Mobile Agents
Softbots
Both "Mobile Agents" & "Softbots"
None of these
A communication protocol is a __________that governs the flow of information over a network.
Set of Methods
Set of Protocols
Set of rules
None of the given choices
By default in a web page Hyper Link for another web page is represented as:
Blue only
Black and Underlined
Blue and Bold
Blue and Underlined
The organizations are learning that business can be done in a more effective manner if emphasis is
placed upon ______________.
Cooperation
Shared responsibility
Networking
All of the given
Monitor is an example of __________devices
Output
Input
Processing
None of the given choices
The code in the ________ portion is the right choice for developing larger JavaScript scripts
Body
At End
Head
Separate
____________________ based on the principles of the logical reasoning ability of humans.
Genetic Algorithms
Rule-based Systems
Feed-Forward Network
None of these
The key benefit of VPNs over conventional PNs is:
Security
Efficiency
Lower Cost
None of the given choices
Which of the following is incorrect for making design elements legible?
Select correct option:
Elements should be large enough
Elements must contrast sufficiently
Related elements should be visually grouped
Elements should have no visual focus
1. Function is also known as ______________.
Select correct option:
subprogram
procedure
subroutine
All of given
In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET.
Select correct option:
1973
1983
1972
None of the given choices
E-mail system has ______ component(s)
Select correct option:
E-mail client
SMTP server
POP3 server
All of the given choices
_______ / / /______/ A Parallelogram (Tilted rectangle) represents the ________________ flow chart
element.
Select correct option:
Process
Input or Output
Decision
Connector
If a computer could pass the Turing test then it would be able to:
Select correct option:
win a million dollar prize
think like human begins
think but slower than humans
do the things faster
Punched cards were replaced by:
Select correct option:
Floppy Disk
Zip Drives
Magnetic storage
None of the given choices
The ________virus may display an annoying, but harmless message
Select correct option:
Malicious
Neutral
Helpful
DoS
The name of very first computer was:
Select correct option:
ABC
BCD
EDC
None of the given choices
The internet communities are ___________.
Select correct option:
Geographical based
Interest based
Country based
Religion based
__________% of the users have left websites in frustration due to poor navigation.
► 40
► 62
► 83
► 91
In JavaScript, a variable declaration is
► Optional
► Mandatory
► Not allowed
► None of the given
A protocol used for receiving email messages is called ____________.
► URL
► Telnet
► POP3
► SMTP
which one is correct?
► onUnload
► onUnLoad
► onUNLOAD
► All of the above
Serial arrangement in which things follow logical order or a recurrent pattern, such as statements
executing one by one, is called __________.
► Loop
► Sequence
► Condition
► Array
Variables allow us to manipulate data through the ___________.
► Actual Value
► Reference
► Length
► Name
Fuzzy logic is based on ____________.
► Ground facts
► Experience
► Practice
► Approximation
Word Processor is a _________________
► System Software
► Application Software
► Device
► Utility
In the old days, databases did NOT support ____________.
► Number
► Boolean
► Video
► Text
In tabular storage, fields placed in a particular row are strongly ___________.
► Independent
► Dependent
► Interrelated
► Inconsistent
Due to working at home, lack of interaction may result in ___________ professional growth.
► Slower
► Faster
► Higher
► Improved
Distance learning has got a boost due to the ___________.
► Easy communication
► Online interactive contents
► Flexibility
► All of the given options
_____________ technique can be used to create smooth animations or to display one of several
images based on the requirement.
► Image downloading
► Image preloading
► Image uploading
► Image postloading
► Tree structured organizational model
► Network paradigm
► Hierarchical structure
► None of the given options
The group of technologies concerned with the capturing, processing and transmission of
information in the digital electronic form is called
_____________.
► Telecom Engineering
► Computer Engineering
► Computer Science
► Information Technology
A large number of networks interconnected physically is called ______
► LAN
► MAN
► Internet
► Network collection
TCP stands for ________.
► Transfer Center protocol
► Transmission Control Protocol
► Transmission Center Protocol
► Telephone Center Protocol
A collection of data organized in such a way that the computer can quickly search for a desired data
item is known as :
► Retrieving
► Database
► Information
► DBMS
______ is simply a fast port that lets you connect computer peripherals and consumer electronics to
your computer without restart.
► Freeware
► Shareware
► Firewire
► Firmware
Structures, in which another list starts before the first list is finished, are called:
► Multiple Lists
► Nested Lists
► Ordered Lists
► Un-ordered Lists
The key property of the ‘Array’ object in JavaScript is
► Value
► Length
► Name
► All of the given choices
Which one is the example of spreadsheet software ?
► MS Word
► MS PowerPoint
► MS Excel
► MS Access
The Encryption of data is related to
► Data updates
► Data security
► Data integrity
► Data accessibility
_____ is the process of analyzing large databases to identify patterns.
► Data normalization
► Data management
► Data Mining
► None of the given options
Which is the user-friendly way of presenting data ?
► Query
► Form
► Report
► All of the given options
JavaScript function fixed() has equivalent HTML tag-set ____
► <.FIX>……………</FIX>
► <F>………………..</F>
► <PRE>………….</PRE>
► <H>………………..</H>
<form> Tags always placed between the <BODY> and </BODY> tags of a Web page
► True
► False
Java script has ----------------- ability to create and draw graphics.
► Limited
► Versatile
► Medium
► Not at all
Internet is an example of ______________ network.
Select correct option:
Private
Public
Both Private and Public
None of the given choices
Question # 2 of 10 ( Start time: 05:21:53 PM ) Total Marks: 1
The name of first commercially available PC was:
Select correct option:
UNIVAC 1
ENIAC
EDVAC
Altair 8800
Question # 3 of 10 ( Start time: 05:22:43 PM ) Total Marks: 1
Algorithm is a ____________________
Select correct option:
Definition of a problem
Sequence of steps to solve a problem
Understanding of a problem
Solving a problem
Question # 4 of 10 ( Start time: 05:23:52 PM ) Total Marks: 1
A group of information is called __________________
Select correct option:
File
Database
Record
Field
Question # 5 of 10 ( Start time: 05:24:17 PM ) Total Marks: 1
___________________ is a branch f computer science concerned with manipulating and enhancing
computer graphics.
Select correct option:
Image Handling
Image Processing
Image Engineering
None of these
Question # 6 of 10 ( Start time: 05:25:34 PM ) Total Marks: 1
__________has changed our way of life like no other technology.
Select correct option:
Computational technology
Computer technology
Computing technology
None of the Above
Question # 7 of 10 ( Start time: 05:26:27 PM ) Total Marks: 1
Sophisticated event handling is not possible with _______________ event handling
Select correct option:
Off-Line
In-Line
Out-Line
Non of the given choices
Question # 8 of 10 ( Start time: 05:27:03 PM ) Total Marks: 1
Babbage’s Analytical Engine could store information permanently in:
Select correct option:
Magnetic Tape
Floppy Disk
Punched Cards
None of the given choices
Question # 9 of 10 ( Start time: 05:28:30 PM ) Total Marks: 1
There are __________ popular schemes to reduce the number of bytes that are required for storing
graphics.
Select correct option:
4
3
2
None of these
A number of clever schemes have been invented to reduce the number of bytes that are required for storing
graphics. 2 popular ones:
Color mapping
Dithering
Question # 10 of 10 ( Start time: 05:30:01 PM ) Total Marks: 1
The internet-society is considered under Surveillance because:
Select correct option:
While surfing, we are being watched, constantly
Our every click is recorded and analyzed to extract patterns and behaviors
Webcams are becoming common. Providing a cheap way for parents to watch their children's every move
All of the given
Which of the following is incorrect for making design elements legible?
Select correct option:
Elements should be large enough
Elements must contrast sufficiently
Related elements should be visually grouped
Elements should have no visual focus
25.10 Making Display Elements Legible:
1. Designing (arranging) Display Elements
Elements must be large enough to be processed visually
Elements must contrast sufficiently with their backgrounds
Related elements should be visually grouped through the use of space, color, or graphical boundaries
The relative levels of importance among elements in a display should be revealed graphically
Question # 2 of 10 ( Start time: 05:03:37 PM ) Total Marks: 1
1. Function is also known as ______________.
Select correct option:
subprogram
procedure
subroutine
All of given
Function:
A group of statements that is put together (or defined) once and then can be used (by reference)
repeatedly on a Web page Also known as subprogram, procedure, subroutine
In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET.
Select correct option:
1973
1983
1972
None of the given choices
E-mail system has ______ component(s)
1983 - The TCP/IP protocols becomes the only set of protocols used on the ARPANET
This sets a standard for all networks, and generates the use of the term Internet as the net of nets
ARPANET splits into two nets to keep military & non-military network sites separate: ARPANET and
MILNET
Select correct option:
E-mail client
SMTP server
POP3 server
All of the given choices
_______ / / /______/ A Parallelogram (Tilted rectangle) represents the ________________ flow chart
element.
Select correct option:
Process
Input or Output
Decision
Connector
Punched cards were replaced by:
Select correct option:
Floppy Disk
Zip Drives
Magnetic storage
None of the given choices
During the 1960s, the punched card was gradually replaced as the primary means for data
storage by magnetic tape, as better, more capable computers became available.
The ________virus may display an annoying, but harmless message
Select correct option:
Malicious
Neutral
Helpful
DoS
The internet communities are ___________.
Select correct option:
Geographical based
Interest based
Country based
Religion based
Question # 1 of 10 ( Start time: 04:51:32 PM ) Total Marks: 1
Because of spending more time on the internet, the distances among the families have been _____.
Select correct option:
Increased
Expanded
Contracted
Shortened
Question # 3 of 10 ( Start time: 04:53:30 PM ) Total Marks: 1
Autonomous Web Agents are also known as _________________
Select correct option:
Mobile Agents
Softbots
Both "Mobile Agents" & "Softbots"
None of these
A communication protocol is a __________that governs the flow of information over a network.
Select correct option:
Set of Methods
Set of Protocols
Set of rules
None of the given choices
Protocol
–Rules governing communications over the network
By default in a web page Hyper Link for another web page is represented as:
Select correct option:
Blue only
Black and Underlined
Blue and Bold
Blue and Underlined
The organizations are learning that business can be done in a more effective manner if emphasis is placed
upon ______________.
Select correct option:
Cooperation
Shared responsibility
Networking
All of the given
Question # 7 of 10 ( Start time: 04:57:19 PM ) Total Marks: 1
Monitor is an example of __________devices
Select correct option:
Output
Input
Processing
None of the given choices
The code in the ________ portion is the right choice for developing larger JavaScript scripts
Select correct option:
Body
At End
Head
Separate
____________________ based on the principles of the logical reasoning ability of humans.
Select correct option:
Genetic Algorithms
Rule-based Systems
Feed-Forward Network
None of these
Rulebased Systems (1):
Based on the principles of the logical reasoning ability of humans
The key benefit of VPNs over conventional PNs is:
Select correct option:
Security
Efficiency
Lower Cost
None of the given choices
In __________________ automatic machines perform various tasks that were previously performed by
humans.
Select correct option:
Fuzzy Logic
Robotics
Rule based Systems
None of these
Avoid __________ to ensure readability of web page
Select correct option:
Overuse of bold and italics
Use of paragraphs
Use of white space
Use of contrast colors
Deep Blue was the name of:
Select correct option:
Human
Computer
City
None of the given choices
Using ____, a user can remotely log on to a computer (connected to the user through a network, e.g.
Internet) & have control over it like a local user, including control over running various programs ?
Select correct option:
FTP
TCP
Telnet Protocol
None of the given choices
Telnet Protocol
Using Telnet, a user can remotely log on to a computer (connected to the user’s through a TCP/IP
network, e.g. Internet) & have control over it like a local user, including control over running various
programs In contrast, FTP allows file operations only
Typical use: Configuring and testing of a remote Web server
DoS is________ ?
Select correct option:
Crime
Cyber crime
Not a crime
A software
__________ enables users located at far-way locations to easily share information with others located all
over the world.
Select correct option:
Protocol
Internet
Communication Channel
None of the given choices
Vacuum tubes were replaced by:
Select correct option:
Transistors
Electrodes
Electric Relays
None of the given choices
Cyber crime can be used to
Select correct option:
Damage a home computer
Bring down a business
Weaken the telecom, financial, or even defense-related systems of a country
All of the given
___ provides a simple, consistent way for applications to interact with the HW without having to know all the
details of the HW
► Explorer.exe
► System Files
► Operating System
► Application Software
Communication protocol is a __________that governs the flow of information over a network
► Set of methods
► Set of protocols
► Set of rules
► Device
_____________ team is responsible for the maintenance, expansion , improvement of the infrastructure
consisting of workstations, networking equipment, software and network security.
► Support
► Configuration Management
► Quality Assurance
► Developer
_____________ team consists on the sharpest technical minds in the company.
► Architecture
► Business Development
► Configuration Management
► Developer
_______________ is responsible for day to day operations.
► CEO
► COO
► CMSO
► Developer
Using Java Script you can write a character at random location on screen
► By applying randomCh() method
► With the help of String object
► With the help of random character property
► There is no built in approach in Java Script
The transistor is a solid state semiconductor device used for amplification and switching, and has _____
terminals.
► one
► two
► three
► four
Question No: 2 ( Marks: 1 ) - Please choose one
Blue Pacific is a name of _____ computer.
► Mini
► Desktop
► Micro
► Super
Question No: 3 ( Marks: 1 ) - Please choose one
Monte Carlo algorithm is an example of
► Randomized algorithm
► Greedy algorithm
► both greedy and randomized
► Heuristics
Question No: 4 ( Marks: 1 ) - Please choose one
A set of stand alone productivity applications designed to work together known as __
► Productivity software suites
► Compiled software
► Secure software
► Intelligent software
Question No: 1 ( Marks: 1 ) - Please choose one
Detailed plan, specifying the required resources and expected deliverables, is done in
________ phase.
► Planning
► User Requirements
► Design
► Developer Specification
Question No: 2 ( Marks: 1 ) - Please choose one
A combination of word processing and graphic design is
► Corel Draw
► Desktop Publishing page 83
► Paint
► WordPad
Question No: 3 ( Marks: 1 ) - Please choose one
------------- is an electronic path within a Computer System along which bits are
transmitted.
► Port
► Slots
► Bus
► Modem
Question No: 4 ( Marks: 1 ) - Please choose one
The key strengths of computers are
► Speed
► Storage
► Do not get bored
► All of the given choices
Question No: 5 ( Marks: 1 ) - Please choose one
We can change the background color in HTML, using ___ attribute of <body>
► background
► bgcolor
► backcolor
► backgroundcolor
Question No: 6 ( Marks: 1 ) - Please choose one
ASCII WHITE is the fastest Super computer which can perform __________ calculations
in one second.
► 1.3 billion
► 1.3 trillion
► 1.3 miillion
► 1.3 thousand
Question No: 7 ( Marks: 1 ) - Please choose one
_____ is the example of server-side scripts on Unix servers.
► ASP
► CGI page 71
► VBScript
► JavaScript
Question No: 8 ( Marks: 1 ) - Please choose one
We need _____________ for memory management in computer
► Software
► Hardware
► Operating System
► Application Software
Question No: 9 ( Marks: 1 ) - Please choose one
Data was stored and counted mechanically using ----------- decimal storage wheels,
--------------------- rotary dial switches.
► 300,400
► 1300,1400
► 30100,14100
► 3000 , 1400 page 14
Question No: 10 ( Marks: 1 ) - Please choose one
The first spread sheet program was invented by
► Charles Babbage
► Dan Bricklin
► Paul Graham
► John von Neumann
Question No: 11 ( Marks: 1 ) - Please choose one
In x = x + 20, x is called a __________.
► Constant
► String
► Variable
► Number
Question No: 12 ( Marks: 1 ) - Please choose one
The transistor is a solid state semiconductor device used for amplification and switching, and has
__________ terminals.
►one
►two
►three page 32
►four
Question No: 13 ( Marks: 1 ) - Please choose one
A diode functions as the electronic version of a __________-way valve.
► one page 32
► two
► three
► four
Question No: 14 ( Marks: 1 ) - Please choose one
This element of Flow Chart is called_____________.
► Process
► Off page connector
► Decision
► Connector
Question No: 15 ( Marks: 1 ) - Please choose one
Choose the correct html format to create a checkbox.
► <checkbox>
► <input type=”checkbox”>
► <check>
► <input type=”check”>
Question No: 16 ( Marks: 1 ) - Please choose one
---------------is the process of starting or restarting a computer.
►BIOS
►Refreshing
►Booting
►None of given
Question No: 17 ( Marks: 2 )
What is the Title of the web page for following code segment?
<Head>
<TITLE> VU Web <\TITLE>
<TITLE> Page </TITLE>
</Head>
Question No: 18 ( Marks: 2 )
What do you mean by Comments?
Question No: 19 ( Marks: 2 )
How can an operating system be viewed as a resource allocator?
Question No: 20 ( Marks: 3 )
What is the role of application software in Education?
Question No: 21 ( Marks: 3 )
Give four properties and two methods of window object ?
Question No: 22 ( Marks: 5 )
What is the difference between High-level and Low-level programming languages?
Question No: 23 ( Marks: 5 )
Elaborate greedy algorithm definition with solid example in favour and one counter
example?
Question No: 1 ( Marks: 1 ) - Please choose one
Ada, Countess of Lovelace developed first:
► Computer
► Website
► Computer Program
► Analytical engine
Question No: 2 ( Marks: 1 ) - Please choose one
Charles Babbage was a/an
► Mathematician
► Computer Scientist
► Physician
► Analyst
Question No: 3 ( Marks: 1 ) - Please choose one
Detailed plan, specifying the required resources and expected deliverables, is done in
________ phase.
► Planning
► User Requirements
► Design
► Developer Specification
Question No: 4 ( Marks: 1 ) - Please choose one
A computer program that facilitates the communication between the computer and a
peripheral device is called___________________
► Operating system
► Utilities
► Language Translator
► Device Drives
Question No: 5 ( Marks: 1 ) - Please choose one
To start an ordered list from 20 instead of 1, we will write
► <OL begin = “20">
► <OL initiate = “20">
► <OL start = “20">
► <OL from = “20">
Question No: 6 ( Marks: 1 ) - Please choose one
_________ is the best known builder for supercomputers.
► Sun
► Cray Research
► Microsoft
► Apple
Question No: 7 ( Marks: 1 ) - Please choose one
Using COLSPAN, number of rows of the current cell should extend itself
► Upward
► Downward
► Both Upward and Downward
► None of the given choice
Question No: 8 ( Marks: 1 ) - Please choose one
Interactive forms are always placed between ___ tag-set
► TITLE
► HEAD
► BODY
► HTM
Question No: 9 ( Marks: 1 ) - Please choose one
_________ manages the HW and SW resources ( memory, disk drives etc) of the
computer system, often invisibly.
► Explorer.exe
► System Files
► Operating System
► Application Software
Question No: 10 ( Marks: 1 ) - Please choose one
Speakers fall into the hardware category.
► True
► False
Question No: 11 ( Marks: 1 ) - Please choose one
______________ software directly interacts with the hardware.
► Application software
► System software
► Dynamic software
► Distributed software
Question No: 12 ( Marks: 1 ) - Please choose one
In spreadsheet, which of the following function is used to solve the equation ?
► =COUNTIF
► =GoalSeek
► None of the above
► =Sum
Question No: 13 ( Marks: 1 ) - Please choose one
_______ is known as the best feature in word processing.
► Cut
► Copy
► Paste
► Undo
Question No: 14 ( Marks: 1 ) - Please choose one
In java script objects may have___________ properties.
► Single
► Several
► Multiple
► All of the given options
Question No: 15 ( Marks: 1 ) - Please choose one
_________ are great for showing parts of a whole that are generally expressed in
percentages.
► Line Charts
► Pie Charts
► Bar Charts
► None of the options described
Question No: 16 ( Marks: 1 ) - Please choose one
Small Computer System Interface is
► Slower and harder to configure then serial and parallel ports
► Faster then USB
► Both first choices
► Slower then USB but Faster then serial and parallel
Question No: 17 ( Marks: 2 )
Write the major types of softwares with examples?
Software is the set of instructions which guides the computer hardware through
their jobs. A computer is useless without software. We use different software to solve
different problems. The types of software we need depend on the job we want to do.
There are basically two types of software's system software and application software.
System software’s are used to help the computer parts work together and also provide
support to the application software. The most common type of system software is
operating system.
Application software’s are used to improve our work ability. Different application
software’s and system software’s are used in daily life.
Question No: 18 ( Marks: 2 )
What is the major difference between paragraph <p> and Line Break <BR> tags?
<p> tag is use to Insert paragraph breaks into the text of your HTML document
Note that this tag is special in that it does not require an ending tag.
The <br> tag inserts a single line break. The <br> tag is an empty tag which means that it
has no end tag.
Question No: 19 ( Marks: 2 )
Why PASCAL was designed and what is the problem with PASCAL?
Pascal was originally intended primarily as a teaching language, but it has been more
and more often recommended as a language for serious programming as well, for
example, for system programming tasks and even operating systems.
Question No: 20 ( Marks: 3 )
What are the key requirements of E-commerce Software?
There are more possible approaches depending to the specific context.
The information used for building a software system has more levels:
- Business process level (overall process of the customer business). This is the context
where the future software system will be activated
- Business needs allocated to the software system
- System features that will satisfy those business needs
- System feature details as SRS
Question No: 21 ( Marks: 3 )
Write down the pseudo code for the following flow chart.
Question No: 22 ( Marks: 5 )
(a) Write down two positive features of client-side scripting.
Client-side scripting offers an easy way to provide additional functionality and flexibility
to your project. HTML is very limited; its main purpose is to display and format content.
It allows little or no interaction with the visitors of your site.
Scripting technologies like JavaScript, JScript, VBScript and others are used on many
sites to add extra functionality to a web site. Ranging from simple mouse over image
effects, animation, form field validation to complex dynamic menu systems, these scripts
enhances the functionality and user experience.
(b) Discuss two deficiencies of JavaScript.
uestion No: 23 ( Marks: 5 )
What are the key features of a word processor?
Insert text: Allows you to insert text anywhere in the document.
delete text: Allows you to erase characters, words, lines, or pages as easily as you can
cross them out on paper.
cut and paste : Allows you to remove (cut) a section of text from one place in a document
and insert (paste) it somewhere else.
copy : Allows you to duplicate a section of text.
page size and margins : Allows you to define various page sizes and margins, and the
word processor will automatically readjust the text so that it fits.
search and replace : Allows you to direct the word processor to search for a particular
word or phrase. You can also direct the word processor to replace one group of characters
with another everywhere that the first group appears.
word wrap : The word processor automatically moves to the next line when you have
filled one line with text, and it will readjust text if you change the margins.
print: Allows you to send a document to a printer to get hardcopy.
file management : Many word processors contain file management capabilities that allow
you to create, delete, move, and search for files.
font specifications: Allows you to change fonts within a document. For example, you can
specify bold, italics, and underlining. Most word processors also let you change the font
size and even the typeface.
footnotes and cross-references: Automates the numbering and placement of footnotes and
enables you to easily cross-reference other sections of the document.
graphics graphics: Allows you to embed illustrations and graphs into a document. Some
word processors let you create the illustrations within the word processor; others let you
insert an illustration produced by a different program.
headers , footers , and page numbering: Allows you to specify customized headers and
footers that the word processor will put at the top and bottom of every page. The word
processor automatically keeps track of page numbers so that the correct number appears
on each page.
layout : Allows you to specify different margins within a single document and to specify
various methods for indenting paragraphs.
macros : A macro is a character or word that represents a series of keystrokes. The
keystrokes can represent text or commands. The ability to define macros allows you to
save yourself a lot of time by replacing common combinations of keystrokes.
merges: Allows you to merge text from one file into another file. This is particularly
useful for generating many files that have the same format but different data. Generating
mailing labels is the classic example of using merges.
spell checker : A utility that allows you to check the spelling of words. It will highlight
any words that it does not recognize.
tables of contents and indexes: Allows you to automatically create a table of contents and
index based on special codes that you insert in the document.
thesaurus: A built-in thesaurus that allows you to search for synonyms without leaving
the word processor.
Question No: 1 ( Marks: 1 ) - Please choose one
Human are better than computers at:
► Efficiency
► Accuracy
► Pattern recognition
► None of the given choices
Question No: 2 ( Marks: 1 ) - Please choose one
Cray-1 was first commercial _________ computer
► Super
► Mini
► Micro
► Personal
Question No: 3 ( Marks: 1 ) - Please choose one
URL is a/an ________
► Device
► Component
► Address
► Tool
Question No: 4 ( Marks: 1 ) - Please choose one
Mainframe Computers are also called _____
► Enterprise Servers
► Personal Servers
► Enterprise Managers
► Window Servers
Question No: 5 ( Marks: 1 ) - Please choose one
Which of the following is NOT a category of Mobile Computers?
► Laptop
► Palmtop
► Desktop
► Wearable
Question No: 6 ( Marks: 1 ) - Please choose one
Preliminary exploration of possible solutions, technologies, suppliers is called
► Viability
► Feasibility
► Specification
► Integration
Question No: 7 ( Marks: 1 ) - Please choose one CS101 Mid Term Papers
__________ give us the ability to manipulate data through reference instead of actual
value.
► Constants
► Variables
► Data Types
► Operators
Question No: 8 ( Marks: 1 ) - Please choose one
Consider the following statement written in JavaScript:
str = ”Hello” + ” World”
What will be the value of str ?
► HelloWorld
► Hello World
► Hello + World
► It will result in error
Question No: 9 ( Marks: 1 ) - Please choose one
A tool that helps you to find the synonyms is called ______________
► Language
► Paragraph
► Thesaurus
► Symbol
Question No: 10 ( Marks: 1 ) - Please choose one
Communication protocol is a __________that governs the flow of information over a
network
► Set of protocols
► Set of rules
► Device
► Set of methods
Question No: 11 ( Marks: 1 ) - Please choose one
If a computer could pass the Turing test then it would be able to:
► think like human beings
► do the things faster
► win a million dollar prize
► store more information
Question No: 12 ( Marks: 1 ) - Please choose one
The first Web browser with a GUI was generally available in:
► 1992
► 1993
► 1994
► 1995
Question No: 13 ( Marks: 1 ) - Please choose one
Web is a unique invention by humans in terms that it is:
► accessible to only the owners who control it
► accessible from particular locations only
► accessible to all humans
► accessible to only the educational institutes
Question No: 14 ( Marks: 1 ) - Please choose one
In this URL http://www.msn.com , _____identifies the domain name
► http
► www
► msn
► com
Question No: 15 ( Marks: 1 ) - Please choose one
______ is simply a fast port that lets you connect computer peripherals and consumer
electronics to your computer without restart.
► Freeware
► Shareware
► Firewire
► Firmware
Question No: 16 ( Marks: 1 ) - Please choose one
Which of the following is NOT supported by PC's power supply.
► -12 and +12 V DC
► -10 and +10 V DC
► -5 and + 5 V DC
► All are supported
Question No: 17 ( Marks: 1 ) - Please choose one
In which case Cache Memory is used
► To increase RAM speed
► To overcome BUS speed
► To overcome Speed rate between RAM and CPU
► To overcome CPU speed
Question No: 18 ( Marks: 1 ) - Please choose one
To display a single line text area on the web page, we use ___ tag
► TEXT
► TEXTBOX
► INPUT
► INPUTBOX
Question No: 19 ( Marks: 1 ) - Please choose one
If an algorithm is syntactically correct, but semantically incorrect then this situation is
► Very good situation
► Very dangerous situation
► Not very bad
► Neutral situation
Question No: 20 ( Marks: 1 ) - Please choose one
Users communicate with the computer using a consistent user interface provided by the
OS.
► True
► False
Question No: 21 ( Marks: 1 ) - Please choose one
Application developers do not need to know much about the HW, especially the
microProcessor, while they are developing their application.
► True
► False
Question No: 22 ( Marks: 1 ) - Please choose one
The first spread sheet program was invented by
► Charles Babbage
► Dan Bricklin
► Paul Graham
► John von Neumann
Question No: 23 ( Marks: 1 ) - Please choose one
Which representation technique of algorithm is more suitable for developer to make
actual code___________.
► pseudo code
► flow chart
► both pseudo code and flow chart
► Heuristics
Question No: 24 ( Marks: 1 ) - Please choose one
_____________ is used to terminate all JavaScript statements.
► Colon
► Semicolon
► Underscore
► Apostrophe
Question No: 25 ( Marks: 1 ) - Please choose one
In java script cookies can be created for future use_____.
► Easily
► No facility at all
► This is not possible without Java language.
► Cookies are files so java script can not handle it.
Question No: 26 ( Marks: 1 ) - Please choose one
When the microprocessor desires to look at a piece of data, it checks in
the __________ first.
► RAM
► ROM
► hard disk
► cache
Question No: 27 ( Marks: 1 )
What is the basic difference between 'magnetic tapes' and 'floppy disks' ?
Question No: 28 ( Marks: 1 )
What was the name of first microprocessor built by Intel ?
Answer: The Intel 4004.
Question No: 29 ( Marks: 2 )
What was the name of first super computer. When it was introduced?
Answer
<!--[if !supportLists]-->1.) <!--[endif]-->ENIAC is the first super computer in world
<!--[if !supportLists]-->2.) <!--[endif]-->Supercomputers were introduced in the 1960s
and were designed primarily by Seymour Cray at Control Data Corporation (CDC)
Question No: 30 ( Marks: 3 )
Write a short note on blue pacific Super Computer.
Answer: At the high end of supercomputing are computers like IBM's "Blue Pacific,"
announced
on October 29, 1998. Built in partnership with Lawrence Livermore National Laboratory
in California, Blue Pacific is reported to operated at 3.9 teraflop (trillion floating point
operations per second), 15,000 times faster than the average personal computer. It
consists of 5,800 processors containing a total of 2.6 trillion bytes of memory and
interconnected with five miles of cable.
Question No: 31 ( Marks: 5 )
What are JavaScript literal and what are its types?
Answer: JavaScript Literals
A data value that appears directly in a statement
Literals can be of several types. Some of them are:
Number
String
Boolean
Numeric Literals
24,-230000000000000000,9.80665,1.67e-27,
JavaScript stores all numbers, even integers, as floating-point numbers
String Literals
“” , ’‘Bhola” , “Where is the Bhola Continental Hotel?”
String literals are always enclosed in a matching pair of single or double quotes
Boolean Literals
True, false ,
if ( tankFull == false)
addMoreWater = true
Question No: 32 ( Marks: 5 )
Can you say that URL and semantic web sites are same? Justify your answer by defining
the both terms?
Question No: 31 (Marks: 1)
What is heuristic?
Heuristic is a procedure that usually, but not always, works or that gives nearly
the right answer.
Question No: 32 (Marks: 1)
In programming, what is an object?
Object is a named collection of properties (data, state) & methods (instructions,
behavior).
Question No: 33 (Marks: 2)
What is spreadsheet? List any two jobs that it can do.
A spreadsheet is a grid that organizes data into columns and rows. Spreadsheets
make it easy to display information, and people can insert formulas to work with
the data.
Electronic replacement for ledgers
Charts
Financial-forecasting.
Question No: 34 (Marks: 2)
In JavaScript, what is event handling? What are the two types of events?
In JavaScript capturing events and responding to them is event handling. The
system sends events to the program and the program responds to them as they
arrive.
1. Events can include things a user does - like clicking the mouse.
2. Events that the system itself does - like updating the clock.
Question No: 35 ( Marks: 3 )
Explain how many ways businesses monitor their employees?
• Systems are available that monitor almost every key stroke that an employee
makes on a computer.
• Systems are available that read and censor all incoming and outgoing eMail.
• It is quite straight forward to monitor where you surf the web.
Question No: 36 ( Marks: 3 )
What is difference between Design and System Architecture?
System architecture is the conceptual design that defines
the structure and/or behavior of a system. Whereas designs it as an
independent, self-contained system.
http://groups.google.com/group/vuZs
Question No: 37 ( Marks: 3 )
What are the Sub categories of Artificial Intelligence? Briefly explain any
two.
1. Expert systems:
Expert system is that system which is in some limited sense, can replace an
expert.
2. Robotics:
Robotics is an automatic machine that performs various tasks that were
previously done by humans.
Question No: 38 ( Marks: 5 )
How many ways are there to call a function in a program? Explain with
example.
Two Ways of Calling Functions:
Functions do not run automatically. When the page loads, each function waits
quietly until it is told to run.
1. A function calls appearing as a complete statement:
function popUp( message ) {
window.alert( message ) ;
}
popUp( “Warning!” ) ;
2. A function calls appearing as part of a statement. Definitions of such
functions include a ‘return’ statement:
function add( a, b ) {
c=a+b;
return c ;
}
sum = add( 2, 4 ) ;
document.write( sum ) ;
Question No: 39 ( Marks: 5 )
Elaborate the ‘+ ’ operator and its constraints with the help of examples.
The + Operator Used on Strings. The + operator can also be used to add string
variables or text values together. To add two or more string variables together,
use the + operator.
Example:
txt1="What a very";
txt2="nice day";
txt3=txt1+txt2;
Now txt3 will be having this value "What a very nice day".
txt3=txt1+txt2; this statement due to + sign.
Question No: 40 ( Marks: 10 )
Write a JavaScript program having two functions sum and mean.
The web page will ask the user to enter five values to be added.
After taking input it will calculate the sum and mean of those values by
calling sum and mean functions.
Question No: 41 ( Marks: 10 )
Define the following terms.
Object
Object is a named collection of properties (data, state) & methods (instructions,
behavior).
Event Handler
An event handler is a command which calls a function when an event happens,
such as the user clicking a button.
Local Variable
Declaring variables (using the var keyword) within a function makes them local.
They are available only within the function and hold no meaning outside of it.
Scope of Variable
Defining the space in which a variable is effective is known as defining the scope
of a variable. A variable can be either local or global in scope.
Array
Array is an indexed list of elements.
Question No: 27 ( Marks: 1 )
What BIOS stands for?
BIOS stand for Basic input/output system.
http://groups.google.com/group/vuZs
Question No: 28 ( Marks: 1 )
List down the Analytical Engine's components name (any two)
Input
Memory
Processor
Output.
Question No: 29 ( Marks: 2 )
Why uploading a web page is important? Describe in 2 – 3 lines.
By only uploading webpage we could place our information so that other can
reach up to what we have loaded. Upload means make available our data or
information for the world web browsers.
Question No: 30 ( Marks: 3 )
What is the difference between microprocessors and microcontrollers?
Give one example of both.
The microprocessor is electronic equipment which can perform several functions
and also processing of data and information present in a computer, while
microcontroller can only perform one function for that its design.
Example:
Microprocessor: Pentium 4 & Personal Computer.
Microcontroller: Electrical device, washing machines, microwave ovens,
telephones etc.
Question No: 31 ( Marks: 5 )
Differentiate uni-Processor OS from Multi-Processor OS.
Uni-processor OS’es is designed to schedule tasks on a single uP only whereas
Multi-processor OS’es can control computers having multiple uPs, at times
1000’s of them.
Question No: 32 (Marks: 5)
Why do we call JavaScript an Object-based Language?
JavaScript shares many similarities with object-oriented languages, and therefore
is called an object-based language.
Question No: 31 (Marks: 1)
When does recursion occur?
Question No: 32 (Marks: 1)
What are the types of computer network according to the distance
between nodes?
There are two types of networks.
1. LAN (Local Area Network)
2. WAN (Wide Area Network)
Question No: 33 (Marks: 2)
What is meant by semantic error?
Occur when a statement executes and has an effect not intended by the
programmer and Often times occur only in unusual & infrequent circumstances.
Question No: 34 (Marks: 2)
List down the names of two array methods available in JavaScript.
1. sort( ) [sorts elements in alphabetical order].
2. reverse( ) [Reverses the order of elements].
Question No: 35 ( Marks: 3 )
How can you define a consistent web design? Why is it needed?
A consistent good designed website is generated for general public that allows
users to attain what they want as quickly as possible without spending much
effort. A consistent good design is needed to assists the user in recovering from
errors.
Question No: 36 ( Marks: 3 )
How can we include images in a web page using HTML and Java script?
Image in HTML
<IMG src=URL, alt=text height=pixels width=pixels align="bottom|middle|top">
Image in Javascript
Images in JavaScript can be manipulated in many ways using the built-in object
Image.
Additional properties to HTML are hspace, vspace & lowsrc.
Example: It can be used by many handlers like, onAbort, onLoad & onError
Question No: 37 ( Marks: 3 )
The event handler attribute consists of three parts. Write about each of
them.
1. The identifier of the event handler.
2. The equal sign.
3. A string consisting of JavaScript statements enclosed in double or single
quotes.
Question No: 38 (Marks: 5 )
What is a packet in the network environment? What kind of information
does it contain?
A packet is the smallest unit of data transmitted over a computer network. It’s a
message to be transferred over the network is broken up into small packets by
the sending computer.
Each packet contains the following info:
–Sender's address
–Destination address
–Data
–Error-recovery info.