Tuesday 8 July 2014

CS101- Introduction to Computing Solved Quizzes

Posted at  17:44 - by Unknown 0

Avoid __________ to ensure readability of web page
Overuse of bold and italics
Use of paragraphs
Use of white space
Use of contrast colors

Deep Blue was the name of:
Human
Computer
City
None of the given choices

Using ____, a user can remotely log on to a computer (connected to the user through a network, e.g. Internet) & have control over it like a local user, including control over running various programs ?
FTP
TCP
Telnet Protocol
None of the given choices

Telnet Protocol


Question # 1 of 15
Which of the following is used to attain something productive as opposed to games or entertainment softwares?
System software
Application software
Programming software
Productivity software

Question # 2 of 15
Altair 8800 was based on _____ processor
Inter 4004
Intel 8080
Intel 386
Pentium

Question # 3 of 15
Which one of the following is “built-in” computer memory containing data that normally can only be read , not written to?
RAM
ROM 000
Cache Memory
Magnetic Memory

Question # 4 of 15
This principle called the “Ockham’s Razor,” states when choosing among competing, successful solutions to a problem; choose the one which is the least ________
Time Consuming
Ambiguous
Complex 000
Restricted

Question # 5 of 15
By default in a web page Hyper Link for another web page is represented as:
Blue only
Black and Underlined
Blue and Bold
Blue and Underlined

Question # 6 of 15
(a) _____ is the concept embedded in an algorithm (the soul!) and (b)________ is the actual representation of an algorithm (the body!)
(a) Semantics (b) Syntax 000
(a) Syntax (b) Semantics
(a)Code (b) Logic
(a) Sequence (b) Flow Chart

Question # 7 of 15
_____ is an application program that provides a way to look at and interact with all the information on the World Wide Web.
URL
Browser 000
HTML
HTTP

Question # 8 of 15
First computer designed for commercial applications was:
UNIVAC 1
ENIAC
EDVAC
Attanasoff-Berry Computer

Question # 9 of 15
Which one of the following is a really fast port that lets you connect computer peripherals and consumer electronics to your computer without the need to restart?
Freeware
Shareware
Fire wire 000
Firmware

Question # 10 of 15

In which of the following operating systems the availability of sufficient and separate resources is ensured for various users simultaneously:
Single-User
 Multi-User
Batch type
Desktop

Question # 11 of 15
Compared to vacuum tubes, Transistors offer:
Much smaller size
Better reliability
Much lower cost
All of the given choices

Question # 12 of 15
What was the name of first commercial supercomputer?
UNIVAC 1
EDVAC
Cray 1
Altair 8800

Question # 13 of 15
Which one of the following register types stores SIMD instructions?
General Registers
Vector Registers
Data Registers
Address Registers

Question # 14 of 15
A data cell of a table contain
only text
images
tables
all of the given

Question # 15 of 15
Grace Hopper of US Navy develops the very first_______compiler
Low-level Language
High-level language
Both high and low level language
None of the given choices


Question # 1 of 15
Babbage’s Analytical Engine could store information permanently in:
Magnetic Tape
Floppy Disk
Punched Cards
None of the given choices

Question # 2 of 15
1 byte consists of _______ bits.
10
9
8
None of the given choices

Question # 3 of 15
The name of very first computer was:
ABC
BCD
EDC
None of the given choices

Question # 4 of 15
Quantum Mechanics is the branch of _______ ; which describes the activity of subatomic particles.
Chemistry
Computer Science
Physics
None of the given choices

Question # 5 of 15
First computer designed for commercial applications was:
UNIVAC 1
ENIAC
EDVAC
Attanasoff-Berry Computer

Question # 6 of 15
Greedy algorithms are usually faster, since they don't consider the details of possible alternatives
True
False

Question # 7 of 15
Intel 8088 took ______ cycles to execute.
80
15
20
50

Question # 8 of 15
Algorithm is a ____________________
Definition of a problem
Sequence of steps to solve a problem
Understanding of a problem
Solving a problem

Question # 9 of 15
Pseudo Code, Structured flow charts and Actual code are used for representing Algorithms.
True
False

Question # 10 of 15
Byte is a combination of……………
8 bits
16 bits
32 bits
4 bits

Question # 11 of 15
___________ software sits on top of __________ software for performing user tasks.
System, Application
System, Productivity
Application, System
System, Programming

Question # 12 of 15
A 1.5 G. HZ Microprocessor approximately contains:
30 Million Transistors
25 Million Transistors
10 Million Transistors
50 Million Transistors

Question # 13 of 15
Linux and Mac are examples of :
Uni processor OS
Multi processor OS

Question # 14 of 15
JavaScript can be used along with HTML to __________________.
style the Web
secure the web page
make content interactive
color the web page

Question # 15 of 15
________ are personal computers that are designed to be easily transported and relocated
Desktops
Portables
Servers
Workstations

onFocus executes the specified JavaScript code when ___________
            a window receives focus
            a form element receives input focus
            a window receives focus or when a form element receives input focus
            None of the Given.

CERN releases WWW in:
1992
1993
1994
None of the given choices

Communications on the internet is controlled by a set of two protocols, named :
            HTTP & SMTP
            FTP & TELNET
            TCP & IP
            None of the given choices
One of the disadvantages of working at home is________________
            Family life may be happier because of living at home.
            Family life may suffer as well, as some never turn off, and keep on working through out the day, evening and night
            Family life may become happier because he can give more time to his family.
            There is no disadvantage of working at home.

The greatest, shared resource of information created by humankind is:
            Web
            Dictionary
            Vocabulary
            Glossary



There are _____________ types communication channels.
            2
            3
            4
            5

The Cyberwarefare is a ______
            Crime
            War
            Software
            Game

In the statement “PopUp(“Message”)” :
            “PopUp” is the function Name, “Message” is the argument
            “Message” is function identifier
            Syntax Error: functions cannot be called in this way
            Error: function is undefined

RGB scheme stands for _________________________________.
            Red Grey Blue
            Red Green Brown
            Red Green Blue
            Red Green Black

_____________ is the part of the virus that generally consists of malicious computer instructions
            Off load
            Payload
            Loader
            Transmitter

Unlike viruses, __________________ are stand-alone programs
            Trojan horses
            Logic- or time-bombs
            Worms
            None of the given

Voice over IP has _____ modes

            2
            3
            4
            5

We use __________ to stop Break-Ins.
            Scanners
            Intrusion detectors
            Firewalls
            Intrusion detectors and Firewalls

Which one can lead user to leave your website?
            Simple design
            Poor navigation
            Information layout
            Adaptable design

_____________________ are the subcategories of AI
            Expert Systems
            Robotics
            Natural Language Processing
            All of the above

With the Help of FTP we can:

            List, change, create folders on a remote computer
            Upload and download files
            Transferring Web content from the developer’s PC to the Web server
            All of the given choices

Which protocol is used for receiving E-mail messages?
            FTP
            POP
            Telnet Protocol
            SMTP

The organizations are learning that business can be done in a more effective manner if emphasis is placed upon ______________.
            Cooperation
            Shared responsibility
            Networking
            All of the given

___ is used to transfer files between computers on a TCP/IP network
FTP
POP
Telnet Protocol
SMTP


Which of the following is True about “pareseFloat(String)” function: I) If the first character cannot be converted to a number, parseFloat returns NaN. II) it returns the fractional portion of floating point number. III) Parses the string argument; returns a FP number. IV) Non of given options.
            I and II Only
            II and III Only
            I and III Only
            IV Only

Event-driven programs can ____________________ events.
            capture
            respond
            capture and respond
            None of the Given.

Which of the statements is NOT true about “Color Usage Guidelines” for developing a presentation?
            Use color sparingly to to highlight a point, but don't get carried away
            Do not use colors like yellow or red for background except where needed.
            Do not use colors like green, blue and such like colors except where needed.
            None of given options

_________________ Type of databases management systems are supporting Terabytes of Data
            Personal
            Desktop
            Enterprise
            Single-user

Because of the ever-decreasing costs of verbal, text, video communications; the distances have _________
            Increased
            Expanded
            Contracted
            Lengthened

The structure of the networked organization is _________.
            Simple
            Flexible
            Complex
            All of the given

A CAD drawing consist of many geometric shapes like straight lines , arc , tc and therefore is stored in a ___________ format.
            Scalar
            Vector
            Both a & b
____ is a type of computer-to-computer messaging.
            TCP
            Telnet
            E-mail
            FTP


            None of these

RDBMS stands for ________________________________
            Relative Data Base Management System
            Relational Data Base Management System
            Recursive Data Base Management System
            Responsible Data Base Management System

Using Color Mapping scheme only a limited number of color called _____________ are allowed.
            Reserved
            Pointers
            Platelet
            None of these

Using _________ topology, adding new nodes is difficult.
            Ring
            Bus
            Star
            None of the given choices

Problems with old presentation methods was (transparencies and projectors etc):
            They were costly
            Electronic transmission, in some cases, was not easy
            Presentation some times gets ambiguous
            All of given options

ARPANET splits into two nets to keep military & non-military network sites separate, named :

            ARPANET & MILNET
            MICRONET & MILNET
            PICONET & ARPANET
            None of the given choices

Arguments values are passed to the function _________
            by value
            by reference
            Both a & b
            Non of the Given.

__________________ is a field that uniquely identifies each record stored in a table.
            Primary Key
            Foreign Key
            Secondary key
            Special Key

The IP address consists of _____ bits
            64
            32
            16
            128

Credit Card Fraud can be minimized by using _________________
            single credit card numbers
            multiple-use credit card numbers
            single-use credit card numbers
            Firewalls

hotWeather = (Temperature == 40); in the above statement, the variable hotWeather is of type
            Number
            String
            Boolean
            None of the given

Ref:

you are evaluating a condition (temperature ==40) and result of this condition is getting stored in HotWeather variable. which is boolean in form

Output of evaluation of condition is in the form of true or false which is a boolean value

Here I Try to key few lines to help you to see live (copy paste these in any test.htm) and run in broswer




NCSA stands for :
            NationalCenter for Supercomputing Applications
            NationalCenter for Supreme Applications
            NationalCenter for Super Authority
            None of the given choices

Self-replicating SW that eludes detection and is designed to attach itself to other files is called _____________.
            Trojans
            Viruses
            Sniffers
            Operating System

SVG stands for _________________________________________.
            Structured Vector Graphics
            Software Vector Graphics
            Structured Visual Graphics
            None of these

Viruses move from one computer to another with the __________ and spring into action when the _____________ is executed or opened
            Host – Host
            Host – Client
            Client – Host
            Client – Client



____________________ is a layered structure consisting of a number of homogenous and simple processing elements.
            Genetic Algorithms
            Rule-based Systems
            Feed-Forward Network
            None of these

A property that gives the value of Pi is:
            PI()
            Graph.PI
            Math.PI
            Math.PI()

The smallest image forming element on a computer display is called ____________.
            Resolution
            Pixel
            Grey area
            None of these

SMTP stands for _______________________________________.
            Simple Mail Transfer Protocol
            Simple Mail Transparent Protocol
            Simple Mail Transfer Paradigm
            None of these

________________ network allows data to be sent directly from one computer to another.
            Ring
            Bus
            Star
            None of the given choices

Viruses attach themselves to other computer programs or data files, are known as____
            Trojans
            Guests
            Hosts
            Spies
 Avoid __________ to ensure readability of web page

            Overuse of bold and italics
            Use of paragraphs
            Use of white space
            Use of contrast colors

STP stands for :
            Shielded Twisted Pair
            Silver Twisted Pair
            Single Twisted Pair
            None of the given choices

In ______, the spies of one business monitors the network traffic of their competitors.
            Industrial intelligence
            Industrial Espionage
            Industrial spying
            Industrial surveillance

Color mapping scheme reducing the size of 2.25 MB graphic to _________ MB.
            0.90 MB
            0.75 MB
            1.00 MB
            None of these

The functions which call themselves from their (own) body are called:
            Virtual functions
            Abstract functions
            Overriding functions
            Recursive functions

Browser sends ‘_________’ request to web server to access a file.
            SET
            GET
            TRANSFER
            All of the given choices

The internet communities are ___________.

            Geographical based
            Interest based
            Country based
            Religion based

Infection propagation and Actual destructive are the components of _______________
            Transmission mechanism
            Payload


 Computers are good at: 
Speed 
Storage 
Never bored 
All of the given choices 


CS101 Q2.Grace Hopper of US Navy develops the very first_______ compiler 
 Low-level Language 
High-level language 
Both high and low level language 
None of the given choices 
2.5  Harvard Mark 1 – 1943:
Howard Aiken and Grace Hopper designed the MARK series of computers at Harvard University. The MARK series of computers began with the Mark I in 1944. Imagine a giant roomful of noisy, clicking metal parts, 55 feet long and 8 feet high. The 5-ton device contained almost 760,000 separate pieces. Used by the US Navy for gunnery andballistic calculations, the Mark I was in operation until 1959.  The computer, controlled by pre-punched paper tape, could carry out addition, subtraction, multiplication, division and reference to previous results. It had special
subroutines for logarithms and trigonometric functions and used 23 decimal place numbers. Data was stored andcounted mechanically using 3000 decimal storage wheels, 1400 rotary dial switches, and 500 miles of wire. Its electromagnetic relays classified the machine as a relay computer. All output was displayed on an electric typewriter. By today's standards, the Mark I was slow, requiring 3-5 seconds for a multiplication operation
(p14
CS101 Q3.The first Web browser with a GUI was generally available in: 
1992 
1993 
1994 
1995 
The first Web browser with a graphical user interface was generally available (Mosaic, in 1993), the term seemed to apply to Web content, too. Technically, a Web browser is a client program that uses the Hypertext Transfer Protocol (HTTP) to make requests of Web servers throughout the Internet on behalf of the browser user.(18

The name of first program-controlled machine was:
ENIAC
Attanasoff-Berry Computer
Harvard Mark 1
Pentium
Harvard  Mark 1 – 1943  
  • Howard Aiken  of Harvard University 
  • The first program controlled machine
  • Included all the ideas proposed by Babbage for the Analytical Engine
  • The last famous electromechanical computer
CS101 Q4. If a computer could pass the Turing test then it would be able to: 
win a million dollar prize 
think like human begins 
SOLVED by PrIncess Sassi


think but slower than humans 
do the things faster 
2.2  The “Turing test”
A test proposed to determine if a computer has the ability to think. In 1950, Alan Turing (Turing, 1950) proposed a method for determining if machines can think. This method is known as The Turing Test.  (13
Q5.The name of programming language, specifically designed by the US Department of Defense for developing military applications, was: 
 

Smalltalk 
C 
C++ 
Ada 
Ada: A programming language specifically designed by the US Dept of Defense for developing military applications was named Ada to honor her contributions towards computing(p9
Q6.TCP Stands for: 
 

Transmission Control Principles 
Transmission Control Protocol 
Transformation Control Protocol 
Translation Control Protocol 
Communications on the Internet is controlled by a set of two protocols: TCP and IP TCP/IP Transmission Control Protocol/Internet Protocol Networking protocol used by all computers and networks on the Internet Originally developed by the US DoD for Unix, but now available for most other OSes TCP breaks down the message to be sent over the Internet into packets IP routes these packets through the Internet to get them to their destination When the packets reach the destination computer, TCP reassembles them into the original message  (p196
Q7.Web is a unique invention by humans in terms that it is: 
 

accessible to all humans 
accessible to only the owners who control it 
accessible to particular locations only 
None of the given choices 

Q8.The name of first commercially available PC was: 
 

UNIVAC 1 
ENIAC 
EDVAC 
Altair 8800 
2.9  UNIVAC 1 – 1951
UNIVAC-1. The first commercially successful electronic computer, UNIVAC I, was also the first general purpose computer - designed to handle both numeric and textual information. It was designed by J. Presper Eckert and John Mauchly. The implementation of this machine marked the real beginning of the computer era.(P14
SOLVED by PrIncess Sassi


Q9. A strategy in which all possible combinations are examined and best one is selected called…………… 
 

Divide and conquer 
Brute force 
Heuristic 
All of given 
16.12 The Brute Force Strategy (1)
A strategy in which all possible combinations are examined and the best among them is Selected (p103
Q10.Super Computers are used in: 
 

Weather forecasting 
Aeroplane manufacturing 
Atomic Bomb experiments 
All of the given choices 
Q11.ENIAC was first____ Computer 
Large-scale 
General-purpose 
Electronic 
All of the given choices 
Reference:  ENIAC – 1946:
ENIAC I (Electrical Numerical Integrator And Calculator). The U.S. military sponsored their research; they needed a calculating device for writing artillery-firing tables (the settings used for different weapons under varied conditions for target accuracy).(p14)
Q12.Which one of the following units can be called as the brain of computer microprocessor?

ALU (Arithmetic & Logic Unit)
FPU (Floating Point Unit)
Control Unit
Bus Interface Unit
Reference: A  control unit is the part of a CPU or other device that directs its operation. The outputs of the unit control the activity of the rest of the device. A control unit can be thought of as a finite state machine. It is called the brain of computer microprcessor. (p36
Q13.Which one of the following is a really fast port that lets you connect computer peripherals and consumer electronics to your computer without the need to restart?

Freeware
Shareware
Fire wire
Firmware
Ref.
FireWire is simply a really fast port that lets you connect computer peripherals and consumer electronics to your computer without the need to restart. It is a simple common plug-in serial connector on the back of your computer. It has the ability to chain devices together in a number of different ways without terminators for example, simply join 2 computers with a FireWire cable for instant high-speed networking.(P24 )
SOLVED by PrIncess Sassi


Q14.The name of programming language, specifically designed by the US Department of Defense for developing military applications, was:

Smalltalk
C
C++
Ada
Ref.
Ada
: A programming language specifically designed by the US Dept of Defense for developing military applications was named Ada to honor her contributions towards computing(p9
Q15 Which one of these is NOT an example of storage devices?

CD
Floppy
Hard Disk
 
Q16 Which category of computers lies between Workstation and Mainframe computers?

Microcomputer
Desktop
Laptop
Minicomputer
4.4 Servers / Minicomputers A midsized computer. In size and power, minicomputers lie between  workstations and mainframes. In the past decade, the distinction  between large minicomputers and small mainframes has blurred, however, as has the distinction between small minicomputers and workstations. But in general, a minicomputer is a multiprocessing system capable of supporting from 4 to about 200 users simultaneously.(21

Q17 Algorithm is a precise sequence of a limited number of _________ , ___________steps that terminates in the form of a solution

Ambiguous, Executable
Nondeterministic, Finite
Finite, countable
Unambiguous, executable
Ref
1st Definition:
      Sequence of steps that is taken  to solve a problem 
Better Definition:
      A precise sequence of a limited  number of unambiguous, executable  steps that terminates in the form of a solution
Q18 Which one of the following web programming languages used to do client-side scripting?

ASP
Server Side JavaScript
PHP
VBScript
We’ll use JavaScript to do client-side scripting.  However, there are many other languages p119
SOLVED by PrIncess Sassi

Q19 This principle called the “Ockham’s Razor,” states when choosing among competing, successful solutions to a problem; choose the one which is the least ________

Time Consuming
Ambiguous
Complex
Selecting Among Algorithms
When choosing among competing, successful solutions to a problem, choose the one which is the least
complex This principle is called the “Ockham’s Razor,” after William of Ockham - famous 13-th century English philosopher(101
Q20 _________ software sits on top of ________ software for performing user tasks.

System, Application
System, Productivity
Application, System
System, Programming
Q21 Deep Blue was the name of:

Human
Computer
City
None of the given choices
In 1997 Deep Blue, a supercomputer designed by IBM, beat Gary Kasparov, the World Chess Champion That computer was exceptionally fast, did not get tired or bored.  It just kept on analyzing the situation and kept on searching until it found the perfect move from its list of possible moves (P9)
Q22 Linux and Mac are examples of :

Uni processor OS
Multi processor OS
ref: right answer will be 
ahsan@vu.edu.pk My email.

 paste following code in any html file and view in browser 

Q24 There is a battery on the mother board to: 

give power to the processor
Save information when computer is OFF
Help the boot process
Save information when computer is ON
ROM 
ROM is "built-in" computer memory containing data that normally can only be read, not 
written to. ROM contains the programming that allows your computer to be "booted 
up" or regenerated each time you turn it on. Unlike a computer's random access memory 
(RAM), the data in ROM is not lost when the computer power is turned off.  
The ROM is sustained by a small long-life battery in your computer


Q25 Alan Turing of Cambridge University presented his idea of a theoretically simplified but fully capable computer, now known as:
Analytical Engine
Turing MachineDifference Engine
None of the given choices

Q26 _ is the example of a Web browser 
 

Yahoo 
Netscape Navigator 
Web Application 
Google 

Q27 The Analytical Engine was machine of which type? 
 

Programmable 
Mechanical 
Digital 
All of the given choices 
1.2. The Analytical Engine A programmable, mechanical, digital machine Could carryout any calculation Could make decisions based upon the results of the previous calculation Components: input; memory; processor; output(p 9)
SOLVED by PrIncess Sassi

Q28 Interactive Forms are always placed between: 
 

Body tags of a Web page 
Head tags of a Webpage 

Q29 Which interface on computer supports transmission of multiple bits at the same time? 
 

Serial Port 
Parallel Port 
PS/2 Port 
Universal Serial Bus 
Parallel
An interface on a computer that supports transmission of multiple bits at the same time; almost exclusively used for connecting a printer. On IBM or compatible computers, the parallel port uses a 25-pin connector.p24
Q30 If we want to show numbers with List Items, then we use 
 

 

  

none of the given

Q31 Trialware Softwares are used for 
 

short period 
long period 
life time 
none of the given

Software that can be run for a limited period of time before it is purchased. Trialware has a built-in expiration date and will cease to operate beyond that date if it has not been paid for. Also called "demoware.

Q32 Babbage’s Analytical Engine could store information permanently in: 
 

Magnetic Tape 
Floppy Disk 
Punched Cards 
None of the given choices 
SOLVED by PrIncess Sassi


Q33 First computer that could not only manipulate numbers but also text data as well was: 

ENIAC 
EDVAC 
UNIVAC 1 
Attanasoff-Berry Computer 
ENIAC I (Electrical Numerical Integrator And Calculator). The U.S. military sponsored their research; they needed a calculating device for writing artillery-firing tables (the settings used for different weapons under varied conditions for target accuracy). John Mauchly was the chief consultant and J Presper Eckert was the chief engineer.
Eckert was a graduate student studying at the Moore School when he met John Mauchly in 1943. It took the team about one year to design the ENIAC and 18 months and 500,000 tax dollars to build it. The ENIAC contained 17,468 vacuum tubes, along with 70,000 resistors and 10,000 Capacitors.
Q34 Greedy algorithms are usually faster, since they don't consider the details of possible alternatives 
 

True 
False 
KEY ADVANTAGE: Greedy algorithms are usually faster, since they don't consider the details of possible alternatives  (P102

Q35 SCSI stands for:  
Small Computer System Interface 
System Common Small Integration 
Silicon Computer System Interface 
None of the given choices 
SCSI
A port that's faster than the serial and parallel ports but slower and harder to configure than the newer USB port. Also know as the Small Computer System Interface.(24

SOLVED by PrIncess Sassi


Q36 Greedy algorithm does not support……………….. Situation. 
Local 
Global 
Complex 
All of given 
SOLVED by PrIncess Sassi


Q37 Which of the followings is not a Flowchart Element? 
Off- frame connector 
Input or output 
Process 
Connector 
flowchart elements 
Start or stop
Process
Input or output
Connector
Decision
Flow line
Off-page connector
these are all the elements of flow chart so?

 Q38 During one of the international cricket tournaments, one of the teams intentionally lost a match, so that they could qualify for the next round If they had won that particular match, some other team would have qualified This is an example of a _________________
Greedy algorithm
Non-greedy algorithm

Q39 Teraflop stands for:
Thousand floating point operations per second
Thousand floating point operations per hour
Trillion floating point operations per second
Trillion floating point operations per hour

An algorithm that always takes the best immediate or local solution while finding an answer is called____. Deterministic AlgorithmNon deterministic AlgorithmGreedy AlgorithmRandomized Algorithm
 

Which of the following command allows you to recover form mistakes in MS Word?
ClearEditUndoBreak
A ____________ operating system allows many users to take advantage of the computer's resources, simultaneously

          Single user
Multi- user
Single tasking
Multi tasking
 
Network Interface Card is an __________ device
Input
Output
Input/Output
Storage
 The decimal equivalent of binary 1000 is
7
8
9
10


Which of the following is NOT RDBMS software?
 My SqlMS ExcelOracleSQL Server
A computer virus is a
Software that saves the computer from being damaged.
Application software that helps to make different type of viruses and worms
Program that spreads itself and destroys other program
Program that corrects the problems in your computer






What will be the result of a?

a = Math.abs(-23)


 23
 -23
 23.0
 2.3

A Special program required to view swf (Shockwave Flash) files in web Browser is called



 TFlash

Vflash

plug-in

None of the given options


 Using Java Script you can write a character at random location on screen

       By applying randomCh() method
       With the help of String object
       With the help of random character property
        There is no built in approach in Java Script
   

 If incorrectly we enter the negative age it is check by

        Limit Integrity
       Type Integrity
       Referential Integrity
       Physical Integrity
   

  Which protocol is use to transfer a file over the network?


       UDP
        FTP
       TCP
       OSI
   

 One can send an email message to a remote computer using _______ protocol

       HTTP
       SMTP
       FTP
        TELNET


 In a System having many parts to be designed, one should always do the _____ first

        Hard part
       Simple part
       Development part
       Quality part
   

 Flow control constructs in JavaScript includes:


       If-Else
       Loops and If -Else
        Switch and If-Else
        All of the given choices
   

 ___ provides a simple, consistent way for applications to interact with the HW without having to know all the details of the HW


       Explorer.exe
       System Files
        Operating System
       Application Software
   

 Machine language is also called


       Assembly Language
       Binary Language
        High Level Language
       HTML Language
   

 _________ is the best known builder for supercomputers.


       Sun
        Cray Research
        Microsoft
       Apple

 The weaknesses of the computer are:


       Pattern recognition & Storage
       Speed & Innovative ideas

        Pattern recognition & Innovative ideas
       Speed & Storage
   

 Communication protocol is a __________that governs the flow of information over a network

       Set of methods
       Set of protocols
        Set of rules
       Device
   

 _____________ team is responsible for the maintenance, expansion , improvement of the infrastructure consisting of workstations, networking equipment, software and network security.

        Support
       Configuration Management
       Quality Assurance
       Developer
 _____________ team consists on the sharpest technical minds in the company.


        Architecture
       Business Development
       Configuration Management
       Developer
   

 _______________ is responsible for day to day operations.


       CEO
        COO
       CMSO
       Developer


 One of the key responsibilities of the ___________ is client relationship management.


        Project Manager
       Team Lead
       Developer
       Quality Assurance Engineer
   

 What is the major problem with flash based website?

        Its two heavy
        Cannot be indexed
       Less attractive
       Inaccessible
   

 Which of the following is NOT an event handler for image object?


       onAbort
       onError
       onLoad
        onUser
   

 The organizations are learning that business can be done in a more effective manner if emphasis is placed upon ___________.

       Cooperation
       Shared responsibility
       Networking
        All of the given options



a = Math.abs(-23)

What will be the value of a ?


        23
        -23
       23.0
       2.3
   

 ERP is a type of __________________ .
       Entertainment software
       Productivity software
        Business software
       Scientific software
   

In Genetic Algorithm the most important thing you should know, is the ___________.

       Procedure
        Recognition of a good solution
       Different techniques
       None of the given options
   

 According to a popular heuristic, success is defined by ___________.


        The user
       The builder
       Both user and builder
       None of the given options


 Rule of thumb learned through trial and error is called ___________.


       Design
        Heuristic
       Plan
       Aim
   

 JavaScript Variables are ____________.



       Dynamically Typed
       Statically Typed
       Strong Typed
       None of the given options
   

 Which of the following application are collections of cells?

       Word
        Excel
       PowerPoint
       Outlook Express


 The browser breaks down the URL into ________ parts.

       2
        3
       4
       5
   

 A named collection of properties (data, state) and methods (instruction, behavior) is called ____________.


       Array
       Function
       Variable
        Object
   

 First computer network was ___________.


       NSFNET
       FIRSTNET
        ARPANET
       ORPHANET
   
 In JavaScript, a variable declaration is
 
 Optional
Mandatory
Not allowed
None of the given

A protocol used for receiving email messages is called ____________.

URL
Telnet
 POP3
SMTP

which one is correct?
 
 onUnload

onUnLoad
Your browser may not support display of this image.
onUNLOAD

All of the above


Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called __________. 


 Loop
 Sequence
Condition
Array 

Variables allow us to manipulate data through the ___________. 


 
Actual Value
 Reference
Length
Name

Fuzzy logic is based on ____________. 

Ground facts
Experience
Practice
 Approximation
 
Word Processor is a _________________


System Software
 Application Software
Device
Utility

In the old days, databases did NOT support ____________. 

 Number
Boolean
 Video
Text

In tabular storage, fields placed in a particular row are strongly ___________. 



 
Independent
Dependent
 Interrelated
Inconsistent

Due to working at home, lack of interaction may result in ___________ professional growth. 


 Slower
Your browser may not support display of this image. Faster
Higher
Improved

Distance learning has got a boost due to the ___________.
 
Easy communication
Online interactive contents
Flexibility
 All of the given options

_____________ technique can be used to create smooth animations or to display one of several images based on the requirement. 


 
Image downloading
 Image preloading
Image uploading
Image postloading

The ____________ is becoming the preferred organizational structure for more and more organizations with the passage of time.


 
Tree structured organizational model
 Network paradigm
Hierarchical structure
None of the given options

The group of technologies concerned with the capturing, processing and transmission of information in the digital electronic form is called

_____________. 


Telecom Engineering
Computer Engineering
Computer Science
 Information Technology

A large number of networks interconnected physically is called ______ 

 
LAN
MAN
 Internet
Network collection

TCP stands for ________.

 
Transfer Center protocol
 Transmission Control Protocol
Transmission Center Protocol
Telephone Center Protocol

A collection of data organized in such a way that the computer can quickly search for a desired data item is known as :
 
Retrieving
 Database
Information
Your browser may not support display of this image. DBMS

______ is simply a fast port that lets you connect computer peripherals and consumer electronics to your computer without restart. 


 
Freeware
Shareware
 Firewire
Firmware

Structures, in which another list starts before the first list is finished, are called: 

Multiple Lists
Nested Lists
Ordered Lists
Un-ordered Lists

The key property of the ‘Array’ object in JavaScript is 



 
Value
 Length
Name
All of the given choices

Which one is the example of spreadsheet software ? 


MS Word
MS PowerPoint
 MS Excel
MS Access

The Encryption of data is related to 


 
Data updates
Data security
Data integrity
Data accessibility

_____ is the process of analyzing large databases to identify patterns. 


 
Data normalization
Data management
 Data Mining
None of the given options

Which is the user-friendly way of presenting data ? 

 
Query
Form
 Report
Your browser may not support display of this image. All of the given options

<form> Tags always placed between the <BODY> and </BODY> tags of a Web page 

 True
False 

Java script has ----------------- ability to create and draw graphics.
 
Limited
Versatile
Medium
  Not at all 


 Which of the following is incorrect for making design elements legible?

Select correct option:



Elements should be large enough


Elements must contrast sufficiently


Related elements should be visually grouped

Elements should have no visual focus



 Function is also known as ______________.

Select correct option:


subprogram

procedure


subroutine


All of given




In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET.



Select correct option:


1973

1983

1972


None of the given choices




E-mail system has ______ component(s)

Select correct option:




E-mail client


SMTP server


POP3 server

All of the given choices



_______ / / /______/ A Parallelogram (Tilted rectangle) represents the ________________ flow chart element.

Select correct option:

Process

Input or Output

Decision


Connector


 If a computer could pass the Turing test then it would be able to:

Select correct option:


win a million dollar prize

think like human begins

think but slower than humans


do the things faster




Punched cards were replaced by:

Select correct option:



Floppy Disk


Zip Drives

Magnetic storage

None of the given choices






The ________virus may display an annoying, but harmless message

Select correct option:



Malicious

Neutral

Helpful


DoS




The name of very first computer was:

Select correct option:




ABC


BCD


EDC

None of the given choices




The internet communities are ___________.

Select correct option:



Geographical based

Interest based

Country based


Religion based





which one is correct?
 
 onUnload

onUnLoad
Your browser may not support display of this image.
onUNLOAD

All of the above


Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called __________. 


 Loop
 Sequence
Condition
Array 

Variables allow us to manipulate data through the ___________. 


 
Actual Value
 Reference
Length
Name

Fuzzy logic is based on ____________. 


Ground facts
Experience
Practice
 Approximation

Word Processor is a _________________

System Software
 Application Software
Device
Utility

In the old days, databases did NOT support ____________. 


 
Number
Boolean
 Video
Text

In tabular storage, fields placed in a particular row are strongly ___________. 


 
Independent
Dependent
 Interrelated
Inconsistent

Due to working at home, lack of interaction may result in ___________ professional growth. 


 Slower
Your browser may not support display of this image. Faster
Higher
Improved

Distance learning has got a boost due to the ___________.
 
Easy communication
Online interactive contents
Flexibility
 All of the given options

_____________ technique can be used to create smooth animations or to display one of several images based on the requirement. 


 
Image downloading
 Image preloading
Image uploading
Image postloading

The ____________ is becoming the preferred organizational structure for more and more organizations with the passage of time.


 
Tree structured organizational model
 Network paradigm
Hierarchical structure
None of the given options

The group of technologies concerned with the capturing, processing and transmission of information in the digital electronic form is called

_____________. 


Telecom Engineering
Computer Engineering
Computer Science
 Information Technology

A large number of networks interconnected physically is called ______ 

 
LAN
MAN
 Internet
Network collection

TCP stands for ________.

 
Transfer Center protocol
 Transmission Control Protocol
Transmission Center Protocol
Telephone Center Protocol

A collection of data organized in such a way that the computer can quickly search for a desired data item is known as :
 
Retrieving
 Database
Information
Your browser may not support display of this image. DBMS 
 
______ is simply a fast port that lets you connect computer peripherals and consumer electronics to your computer without restart. 
 Freeware 
Shareware
 Firewire
Firmware

Structures, in which another list starts before the first list is finished, are called: 


Multiple Lists
Nested Lists
Ordered Lists
Un-ordered Lists

The key property of the ‘Array’ object in JavaScript is 


 
Value
 Length
Name
All of the given choices

Which one is the example of spreadsheet software ? 


MS Word
MS PowerPoint
 MS Excel
MS Access
 


_____ is the process of analyzing large databases to identify patterns. 


 
Data normalization
Data management
 Data Mining
None of the given options

Which is the user-friendly way of presenting data ? 


 
Query
Form
 Report
Your browser may not support display of this image. All of the given options

JavaScript function fixed() has equivalent HTML tag-set ____ 


<.FIX>……………</FIX>
<F>………………..</F>
<PRE>………….</PRE>
<H>………………..</H>

<form> Tags always placed between the <BODY> and </BODY> tags of a Web page 

 True
False 

Java script has ----------------- ability to create and draw graphics.
 
Limited
Versatile
Medium
  Not at all

Internet is an example of ______________ network. 




Private

Public

Both Private and Public


None of the given choices





The name of first commercially available PC was: 



UNIVAC 1

ENIAC 

EDVAC 

Altair 8800





Algorithm is a ____________________ 




Definition of a problem

Sequence of steps to solve a problem

Understanding of a problem


Solving a problem




A group of information is called __________________ 




File


Database

Record

Field





___________________ is a branch of computer science concerned with manipulating and enhancing computer graphics. 




Image Handling

Image Processing

Image Engineering


None of these





__________has changed our way of life like no other technology. 




Computational technology

Computer technology

Computing technology


None of the Above





Sophisticated event handling is not possible with _______________ event handling 




Off-Line

In-Line

Out-Line


Non of the given choices




Babbage’s Analytical Engine could store information permanently in: 



Magnetic Tape


Floppy Disk

Punched Cards

None of the given choices





There are __________ popular schemes to reduce the number of bytes that are required for storing graphics. 




4




2 


None of these 





The internet-society is considered under Surveillance because: 




While surfing, we are being watched, constantly


Our every click is recorded and analyzed to extract patterns and behaviors


Webcams are becoming common. Providing a cheap way for parents to watch their children's every move


All of the given




  


URL is a/an ________

       Device


       Component


        Address

       Tool


   


To improve the time for scanning a web page, text should be ___________.

       Centered


       Left Aligned


       Right Aligned


       Staggered




Communications on the internet is controlled by a set of two protocols which are ____________.

       IMAP and SMTP





       FTP and HTTP





        TCP and IP




       TCP and HTTP




  

FTP stands for __________.

       File transmission protocol


       File transmission path


        File transfer protocol

       Fine transfer path


   


A named collection of properties (data, state) and methods (instruction, behavior) is called ____________.

       Array


       Function


       Variable


        Object

   


Anchor tag denoted by <A> is used to create 

       Address


       Hyperlink


        Paragraph

       Title


   


<UL> tag is used to

       underline text


       end the line


       create ordered list


        create unordered list

   


A user may access any item on the web through __________.

        URL

       Telnet


       POP


       SMTP


   


The browser breaks down the URL into ________ parts.

       2


        3

       4


       5


   


Which one of the following is NOT a primary color?

        Red


       Green


        Yellow

       Blue


   


According to a popular heuristic, success is defined by ___________.

        The user

       The builder


       Both user and builder


       None of the given options


   


The idea of Neural Networks field is based upon ______________.

       Human nature


        Human brain

       Human culture


       Human actions


   

ERP is a type of __________________ .
       Entertainment software
       Productivity software
        Business software
       Scientific software

   


__________ are those programs in which the flow of the program is determined by the user's actions (mouse clicks, key presses) or messages from other programs.



       Event called programs


       Event processed programs


        Event driven programs

       Event declared programs


   


Automatic machines performing various tasks that were previously done by humans, are called ____________.




        Robotics

       Computers


       Decision Making Systems


       Autonomous Web Agents


   


country=”Hello Pakistan”;

document.write(country.charAt(6));



The out put of the above statement is _____________.

       o


        P

       a


       k


   


The distance among families is ___________ because of spending more time on internet.




        Increased

       Expanded


       Contracted


       Decreased


   

The software used for the scanning of internet severs, is called __________.




       Wscan


       Mscan


        Sscan

       Vscan


    


Adding images to html page, we use___________ tag.




        <IMG>

       <IMAGE>


       <PICTURE>


       <PIC>


   


The group of technologies concerned with the capturing, processing and transmission of information in the digital electronic form is called _____________.




       Telecom Engineering


       Computer Engineering


       Computer Science


        Information Technology

   


The responsibilities of the Team Lead includes_____________.




       Planning and tracking of the project


       Detailed design


       Professional development of team members


        All of the given options

   


When the packets reach at destination, __________ reassembles them into original message.




       Protocol


        TCP

       IP


       NIC


   


Many developers write the _________ first and then incrementally convert each line into _________.




        Real code & Pseudo code

        Pseudo code & Real code

       Real code & Artificial code


       None of the given options


   

Machine language is also called




       Assembly Language


       Binary Language


        High Level Language

       HTML Language


   


In JavaScript, second element of an array has the index:




       2


       0


        1

       3


    Each element in an array is given an index, which is an integer value between 0 and one less than the length of the array. The first element has an index of 0, the second element has an index of 1, and so on.




One can download or upload files to a remote computer using ________ protocol.



       HTTP


       SMTP


        FTP

       TELNET


   


JavaScript ________ support drawing of graphics



       Does


        Does not

       Always


       At times


 Which of the following is NOT true about modern computers?



       More powerful


       Smaller in size


       Consume less energy


        Costly

   


Ada written a computer programme for ?




        Analytical Engine





        Difference Engine




        Harvard Mark 1




        Mechanical engine




   

A set of stand alone productivity applications designed to work together known as ______________ .



        Productivity software suites




       Compiled software





       Secure software





       Intelligent software


Because of spending more time on the internet, the distances among the families have been _____.



Increased

Expanded


Contracted


Shortened





Sophisticated event handling is not possible with _______________ event handling




Off-Line

In-Line

Out-Line


Non of the given choices



Autonomous Web Agents are also known as _________________
Mobile Agents 
Softbots 
Both "Mobile Agents" & "Softbots" 
None of these
A communication protocol is a __________that governs the flow of information over a network.
Set of Methods 
Set of Protocols 
Set of rules 
None of the given choices
By default in a web page Hyper Link for another web page is represented as:
Blue only 
Black and Underlined 
Blue and Bold 
Blue and Underlined

The organizations are learning that business can be done in a more effective manner if emphasis is placed upon ______________.
Cooperation 
Shared responsibility 
Networking 
All of the given
Monitor is an example of __________devices
Output
Input  
Processing 
None of the given choices

The code in the ________ portion is the right choice for developing larger JavaScript scripts
Body 
At End 
Head 
Separate
____________________ based on the principles of the logical reasoning ability of humans.

Genetic Algorithms 
Rule-based Systems 
Feed-Forward Network
None of these
The key benefit of VPNs over conventional PNs is:
Security 
Efficiency 
Lower Cost
None of the given choices

Which of the following is incorrect for making design elements legible?
Elements should be large enough
Elements must contrast sufficiently
Related elements should be visually grouped 
Elements should have no visual focus
 
1. Function is also known as ______________.
subprogram
procedure
subroutine
All of given

In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET.

1973 
1983
1972
None of the given choices

E-mail system has ______ component(s)
E-mail client
SMTP server
POP3 server 
All of the given choices


A Parallelogram (Tilted rectangle) represents the ________________ flow chart element. 

Process 
Input or Output
Decision
Connector

 If a computer could pass the Turing test then it would be able to:
win a million dollar prize 
think like human begins
think but slower than humans
do the things faster



Punched cards were replaced by:
Floppy Disk
Zip Drives
Magnetic storage
None of the given choices




The ________virus may display an annoying, but harmless message

Malicious 
Neutral
Helpful
DoS

The name of very first computer was:
ABC
BCD
EDC
None of the given choices
 
The internet communities are ___________.
Geographical based
Interest based
Country based
Religion based

__________% of the users have left websites in frustration due to poor navigation. 40
 62
83
91

In JavaScript, a variable declaration is
 
Optional
Mandatory
Not allowed
None of the given

A protocol used for receiving email messages is called ____________.
URL
Telnet
POP3 
SMTP

which one is correct? 
onUnload
onUnLoad Your browser may not support display of this image.
onUNLOAD
All of the above
 


Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called __________. 
Loop
Sequence
Condition
Array 

Variables allow us to manipulate data through the ___________. 
Actual Value
Reference
Length
Name

Fuzzy logic is based on ____________. 
Ground facts
Experience
Practice
Approximation 

Word Processor is a _________________ 
System Software
Application Software
Device
Utility

In the old days, databases did NOT support ____________. 
Number
Boolean
Video
Text

In tabular storage, fields placed in a particular row are strongly ___________. 
Independent
Dependent
Interrelated
Inconsistent

Due to working at home, lack of interaction may result in ___________ professional growth. 
Slower 
Your browser may not support display of this image.Faster
Higher
Improved

Distance learning has got a boost due to the ___________. 
Easy communication
Online interactive contents
Flexibility
All of the given options

_____________ technique can be used to create smooth animations or to display one of several images based on the requirement. 
Image downloading
Image preloading
Image uploading
Image postloading 

Tree structured organizational model 

Network paradigm
Hierarchical structure
None of the given options

The group of technologies concerned with the capturing, processing and transmission of information in the digital electronic form is called 
_____________. 
Telecom Engineering
Computer Engineering
Computer Science
Information Technology 

A large number of networks interconnected physically is called ______ 
LAN
MAN
Internet
Network collection
  



TCP stands for ________.
 
Transfer Center protocol
Transmission Control Protocol
Transmission Center Protocol
Telephone Center Protocol

A collection of data organized in such a way that the computer can quickly search for a desired data item is known as : 
Retrieving
Database
Information
Your browser may not support display of this image.DBMS

______ is simply a fast port that lets you connect computer peripherals and consumer electronics to your computer without restart. 
Freeware
Shareware
Firewire
Firmware

Structures, in which another list starts before the first list is finished, are called: 
Multiple Lists
Nested Lists 
Ordered Lists
Un-ordered Lists

The key property of the ‘Array’ object in JavaScript is 
Value
Length
Name
All of the given choices

Which one is the example of spreadsheet software ? 
MS Word
MS PowerPoint
MS Excel
MS Access
  



The Encryption of data is related to 
Data updates
Data security Data integrity
Data accessibility

_____ is the process of analyzing large databases to identify patterns. 
Data normalization
Data management
Data Mining
None of the given options

Which is the user-friendly way of presenting data ? 
Query
Form
Report
Your browser may not support display of this image.All of the given options

JavaScript function fixed() has equivalent HTML tag-set ____ 
<.FIX>……………</FIX>
<F>………………..</F>
<PRE>………….</PRE> <H>………………..</H> 
<form> Tags always placed between the <BODY> and </BODY> tags of a Web page 
True
False 

Java script has ----------------- ability to create and draw graphics.   
Limited
Versatile
Medium
 Not at all

Question # 1 of 10  Total M - 1 
Internet is an example of ______________ network. 
Select correct option: 
Private
Public
Both Private and Public
None of the given choices

Question # 2 of 10  Total M - 1 
The name of first commercially available PC was: 
UNIVAC 1
ENIAC
EDVAC
Altair 8800

Question # 3 of 10  Total M - 1 
Algorithm is a ____________________ 
Definition of a problem
Sequence of steps to solve a problem
Understanding of a problem
Solving a problem


Question # 4 of 10  Total M - 1 
A group of information is called __________________ 
File
Database
Record
Field

 Question # 5 of 10 ( Start time: 05:24:17 PM )  Total M - 1 
___________________ is a branch f computer science concerned with manipulating and enhancing computer graphics. 
Image Handling
Image Processing
Image Engineering
None of these
Question # 6 of 10  Total M - 1 
__________has changed our way of life like no other technology. 
Computational technology
Computer technology
Computing technology
None of the Above

Question # 7 of 10 Total M - 1 
Sophisticated event handling is not possible with _______________ event handling 
Off-Line
In-Line
Out-Line
Non of the given choices

Question # 8 of 10 Total M - 1 
Babbage’s Analytical Engine could store information permanently in: 
Magnetic Tape
Floppy Disk
Punched Cards
None of the given choices
  
Question # 9 of 10   Total M - 1 
There are __________ popular schemes to reduce the number of bytes that are required for storing graphics. 

4
2 
None of these 

A number of clever schemes have been invented to reduce the number of bytes that are required for storing graphics. 2 popular ones:
Color mapping
Dithering
  
Question # 10 of 10 ( Start time: 05:30:01 PM )  Total M - 1 
The internet-society is considered under Surveillance because: 
While surfing, we are being watched, constantly
Our every click is recorded and analyzed to extract patterns and behaviors
Webcams are becoming common. Providing a cheap way for parents to watch their children's every move
All of the given

Which of the following is incorrect for making design elements legible?
Elements should be large enough
Elements must contrast sufficiently
Related elements should be visually grouped
Elements should have no visual focus

25.10 Making Display Elements Legible:

1. Designing (arranging) Display Elements
Elements must be large enough to be processed visually
Elements must contrast sufficiently with their backgrounds
Related elements should be visually grouped through the use of space, color, or graphical boundaries
The relative levels of importance among elements in a display should be revealed graphically

Question # 2 of 10  Total M - 1
1. Function is also known as ______________.
Select correct option:
subprogram
procedure
subroutine
All of given

Function:
A group of statements that is put together (or defined) once and then can be used (by reference)
repeatedly on a Web page Also known as subprogram, procedure, subroutine

In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET.
Select correct option:
1973
1983
1972
None of the given choices

E-mail system has ______ component(s)
Select correct option:
E-mail client
SMTP server
POP3 server
All of the given choices
 
A Parallelogram (Tilted rectangle) represents the ________________ flow chart element.
Select correct option:
Process
Input or Output
Decision
Connector


Punched cards were replaced by:

Floppy Disk
Zip Drives
Magnetic storage
None of the given choices

Ref:
 During the 1960s, the punched card was gradually replaced as the primary means for data storage by magnetic tape, as better, more capable computers became available.
  
The ________virus may display an annoying, but harmless message
Select correct option:
Malicious
Neutral
Helpful
DoS

The internet communities are ___________.
Select correct option:
Geographical based
Interest based
Country based
Religion based

Question # 1  of 10  Total M -  1
Because of spending more time on the internet, the distances among the families have been _____.
Select correct option:
Increased
Expanded
Contracted
Shortened


Question # 3  of 10  Total M -  1
Autonomous Web Agents are also known as _________________
Select correct option:
Mobile Agents
Softbots
Both "Mobile Agents" & "Softbots"
None of these

A communication protocol is a __________that governs the flow of information over a network.
Select correct option:
Set of Methods
Set of Protocols
Set of rules
None of the given choices

Protocol
–Rules governing communications over the network

By default in a web page Hyper Link for another web page is represented as:
Blue only
Black and Underlined
Blue and Bold
Blue and Underlined

The organizations are learning that business can be done in a more effective manner if emphasis is placed upon ______________.
Select correct option:
Cooperation
Shared responsibility
Networking
All of the given

Question # 7  of 10 Total M -  1
Monitor is an example of __________devices
Select correct option:
Output
Input
Processing
None of the given choices

The code in the ________ portion is the right choice for developing larger JavaScript scripts
Select correct option:
Body
At End
Head
Separate
 
____________________ based on the principles of the logical reasoning ability of humans.
Select correct option:
Genetic Algorithms
Rule-based Systems
Feed-Forward Network
None of these


Rulebased Systems (1):
Based on the principles of the logical reasoning ability of humans

The key benefit of VPNs over conventional PNs is:
Security
Efficiency
Lower Cost
None of the given choices
 
In __________________ automatic machines perform various tasks that were previously performed by humans.
Select correct option:
Fuzzy Logic
Robotics
Rule based Systems
None of these


Quiz Start Time: 10:47 PM Time Left 86
sec(s)

Question # 1 of 15 ( Start time: 10:47:57 PM ) Total M - 1
The name of very first computer was:
Select correct option:
ABC
BCD
EDC
None of the given choices
  
Quiz Start Time: 10:47 PM Time Left 85
sec(s)
Question # 2 of 15 ( Start time: 10:48:47 PM ) Total M - 1
You have learnt about tags, recalling Head Tag, Which one is correct?
Select correct option:

<HEAD> </HEAD>
<HEAD> <END>
<HEAD> </END>
<HEAD> <\HEAD


Quiz Start Time: 10:47 PM Time Left 84
sec(s)

Question # 3 of 15 ( Start time: 10:49:20 PM ) Total M - 1
Grace Hopper of US Navy develops the very first_______compiler
Select correct option:
Low-level Language
High-level language
Both high and low level language
None of the given choices

 

Quiz Start Time: 10:47 PM Time Left 86
sec(s)

Question # 4 of 15 ( Start time: 10:50:16 PM ) Total M - 1
Without one of following item a web site is read only:
Select correct option:

Form
Dialog Box
Button
Scroll Bar



Quiz Start Time: 10:47 PM Time Left 84
sec(s)

Question # 5 of 15 ( Start time: 10:50:52 PM ) Total M - 1
Greedy algorithms are usually faster, since they don't consider the details of possible alternatives
Select correct option:

True
False


Quiz Start Time: 10:47 PM Time Left 88
sec(s)

Question # 6 of 15 ( Start time: 10:51:51 PM ) Total M - 1
A strategy in which all possible combinations are examined and best one is selected called……………
Select correct option:

Divide and conquer
Brute force
Heuristic
All of given


Quiz Start Time: 10:47 PM Time Left 79
sec(s)

Question # 7 of 15 ( Start time: 10:52:29 PM ) Total M - 1
Utility Software is a type of ________ Software
Select correct option:

System
Application
both a & b
none of the given
 



Quiz Start Time: 10:47 PM Time Left 84
sec(s)


Question # 8 of 15 ( Start time: 10:53:32 PM ) Total M - 1
Quantum Mechanics is the branch of _____ ; which describes the activity of subatomic particles.
Select correct option:

Chemistry
Computer Science
Physics
None of the given choices





Quiz Start Time: 10:47 PM Time Left 87
sec(s)


Question # 9 of 15 ( Start time: 10:54:22 PM ) Total M - 1
Which one of these is NOT an example of embedded computers
Select correct option:

Microwave oven
IMB PC
Refrigerator
Calculator




Quiz Start Time: 10:47 PM Time Left 82
sec(s)


Question # 10 of 15 ( Start time: 10:55:51 PM ) Total M - 1
Which of the following is a computer storage device that saves and retrieves the data when required?
Select correct option:

Hard Disk
RAM
ROM
None of the given choices




Quiz Start Time: 10:47 PM Time Left 85
sec(s)


Question # 11 of 15 ( Start time: 10:57:22 PM ) Total M - 1
World wide web is a collection of web pages which is:
Select correct option:

logically unified
physically distributed
logically combined
logically unified and physically distributed

  NEXT




Quiz Start Time: 10:47 PM Time Left 86
sec(s)


Question # 12 of 15 ( Start time: 10:58:23 PM ) Total M - 1
Computer directly understand the _________ language
Select correct option:

human
high level
machine
none of given

Quiz Start Time: 10:47 PM Time Left 84
sec(s)

Question # 13 of 15 ( Start time: 10:59:22 PM ) Total M - 1
Algorithm is a __________________
Select correct option:

Definition of a problem
Sequence of steps to solve a problem
Understanding of a problem
Solving a problem




Quiz Start Time: 10:47 PM Time Left 87
sec(s)

Question # 15 of 15 ( Start time: 11:01:03 PM ) Total M - 1
Bit is originated from………………
Select correct option:

Decimal
Binary
Hexadecimal
Octal

About the Author

Write admin description here..

0 comments:

Search Your Solution Here

Copyright © 2013 Virtual University Of Pakistan. by Bloggertheme9 Powered by Blogger.
WP Theme-junkie converted by Blogger template