Avoid __________ to ensure readability of web page
Overuse of bold and italics
Use of paragraphs
Use of white space
Use of contrast colors
Deep Blue was the name of:
Human
Computer
City
None of the given choices
Using ____, a user can remotely log on to a computer (connected to the user through a network, e.g. Internet) & have control over it like a local user, including control over running various programs ?
FTP
TCP
Telnet Protocol
None of the given choices
Telnet Protocol
Overuse of bold and italics
Use of paragraphs
Use of white space
Use of contrast colors
Deep Blue was the name of:
Human
Computer
City
None of the given choices
Using ____, a user can remotely log on to a computer (connected to the user through a network, e.g. Internet) & have control over it like a local user, including control over running various programs ?
FTP
TCP
Telnet Protocol
None of the given choices
Telnet Protocol
Question # 1 of 15
Which of the following is used to attain something productive as opposed to games or entertainment softwares?
System software
Application software
Programming software
Productivity software
Question # 2 of 15
Altair 8800 was based on _____ processor
Inter 4004
Intel 8080
Intel 386
Pentium
Question # 3 of 15
Which one of the following is “built-in” computer memory containing data that normally can only be read , not written to?
RAM
ROM 000
Cache Memory
Magnetic Memory
Question # 4 of 15
This principle called the “Ockham’s Razor,” states when choosing among competing, successful solutions to a problem; choose the one which is the least ________
Time Consuming
Ambiguous
Complex 000
Restricted
Question # 5 of 15
By default in a web page Hyper Link for another web page is represented as:
Blue only
Black and Underlined
Blue and Bold
Blue and Underlined
Question # 6 of 15
(a) _____ is the concept embedded in an algorithm (the soul!) and (b)________ is the actual representation of an algorithm (the body!)
(a) Semantics (b) Syntax 000
(a) Syntax (b) Semantics
(a)Code (b) Logic
(a) Sequence (b) Flow Chart
Question # 7 of 15
_____ is an application program that provides a way to look at and interact with all the information on the World Wide Web.
URL
Browser 000
HTML
HTTP
Question # 8 of 15
First computer designed for commercial applications was:
UNIVAC 1
ENIAC
EDVAC
Attanasoff-Berry Computer
Question # 9 of 15
Which one of the following is a really fast port that lets you connect computer peripherals and consumer electronics to your computer without the need to restart?
Freeware
Shareware
Fire wire 000
Firmware
Question # 10 of 15
In which of the following operating systems the availability of sufficient and separate resources is ensured for various users simultaneously:
Single-User
Multi-User
Batch type
Desktop
Question # 11 of 15
Compared to vacuum tubes, Transistors offer:
Much smaller size
Better reliability
Much lower cost
All of the given choices
Question # 12 of 15
What was the name of first commercial supercomputer?
UNIVAC 1
EDVAC
Cray 1
Altair 8800
Question # 13 of 15
Which one of the following register types stores SIMD instructions?
General Registers
Vector Registers
Data Registers
Address Registers
Question # 14 of 15
A data cell of a table contain
only text
images
tables
all of the given
Question # 15 of 15
Grace Hopper of US Navy develops the very first_______compiler
Low-level Language
High-level language
Both high and low level language
None of the given choices
Which of the following is used to attain something productive as opposed to games or entertainment softwares?
System software
Application software
Programming software
Productivity software
Question # 2 of 15
Altair 8800 was based on _____ processor
Inter 4004
Intel 8080
Intel 386
Pentium
Question # 3 of 15
Which one of the following is “built-in” computer memory containing data that normally can only be read , not written to?
RAM
ROM 000
Cache Memory
Magnetic Memory
Question # 4 of 15
This principle called the “Ockham’s Razor,” states when choosing among competing, successful solutions to a problem; choose the one which is the least ________
Time Consuming
Ambiguous
Complex 000
Restricted
Question # 5 of 15
By default in a web page Hyper Link for another web page is represented as:
Blue only
Black and Underlined
Blue and Bold
Blue and Underlined
Question # 6 of 15
(a) _____ is the concept embedded in an algorithm (the soul!) and (b)________ is the actual representation of an algorithm (the body!)
(a) Semantics (b) Syntax 000
(a) Syntax (b) Semantics
(a)Code (b) Logic
(a) Sequence (b) Flow Chart
Question # 7 of 15
_____ is an application program that provides a way to look at and interact with all the information on the World Wide Web.
URL
Browser 000
HTML
HTTP
Question # 8 of 15
First computer designed for commercial applications was:
UNIVAC 1
ENIAC
EDVAC
Attanasoff-Berry Computer
Question # 9 of 15
Which one of the following is a really fast port that lets you connect computer peripherals and consumer electronics to your computer without the need to restart?
Freeware
Shareware
Fire wire 000
Firmware
Question # 10 of 15
In which of the following operating systems the availability of sufficient and separate resources is ensured for various users simultaneously:
Single-User
Multi-User
Batch type
Desktop
Question # 11 of 15
Compared to vacuum tubes, Transistors offer:
Much smaller size
Better reliability
Much lower cost
All of the given choices
Question # 12 of 15
What was the name of first commercial supercomputer?
UNIVAC 1
EDVAC
Cray 1
Altair 8800
Question # 13 of 15
Which one of the following register types stores SIMD instructions?
General Registers
Vector Registers
Data Registers
Address Registers
Question # 14 of 15
A data cell of a table contain
only text
images
tables
all of the given
Question # 15 of 15
Grace Hopper of US Navy develops the very first_______compiler
Low-level Language
High-level language
Both high and low level language
None of the given choices
Question # 1 of 15
Babbage’s Analytical Engine could store information permanently in:
Magnetic Tape
Floppy Disk
Punched Cards
None of the given choices
Question # 2 of 15
1 byte consists of _______ bits.
10
9
8
None of the given choices
Question # 3 of 15
The name of very first computer was:
ABC
BCD
EDC
None of the given choices
Question # 4 of 15
Quantum Mechanics is the branch of _______ ; which describes the activity of subatomic particles.
Chemistry
Computer Science
Physics
None of the given choices
Question # 5 of 15
First computer designed for commercial applications was:
UNIVAC 1
ENIAC
EDVAC
Attanasoff-Berry Computer
Question # 6 of 15
Greedy algorithms are usually faster, since they don't consider the details of possible alternatives
True
False
Question # 7 of 15
Intel 8088 took ______ cycles to execute.
80
15
20
50
Question # 8 of 15
Algorithm is a ____________________
Definition of a problem
Sequence of steps to solve a problem
Understanding of a problem
Solving a problem
Question # 9 of 15
Pseudo Code, Structured flow charts and Actual code are used for representing Algorithms.
True
False
Question # 10 of 15
Byte is a combination of……………
8 bits
16 bits
32 bits
4 bits
Question # 11 of 15
___________ software sits on top of __________ software for performing user tasks.
System, Application
System, Productivity
Application, System
System, Programming
Question # 12 of 15
A 1.5 G. HZ Microprocessor approximately contains:
30 Million Transistors
25 Million Transistors
10 Million Transistors
50 Million Transistors
Question # 13 of 15
Linux and Mac are examples of :
Uni processor OS
Multi processor OS
Question # 14 of 15
JavaScript can be used along with HTML to __________________.
style the Web
secure the web page
make content interactive
color the web page
Question # 15 of 15
________ are personal computers that are designed to be easily transported and relocated
Desktops
Portables
Servers
Workstations
onFocus executes the specified JavaScript code when ___________
a window receives focus
a form element receives input focus
a window receives focus or when a form element receives input focus
None of the Given.
CERN releases WWW in:
1992
1993
1994
None of the given choices
Communications on the internet is controlled by a set of two protocols, named :
HTTP & SMTP
FTP & TELNET
TCP & IP
None of the given choices
One of the disadvantages of working at home is________________
Family life may be happier because of living at home.
Family life may suffer as well, as some never turn off, and keep on working through out the day, evening and night
Family life may suffer as well, as some never turn off, and keep on working through out the day, evening and night
Family life may become happier because he can give more time to his family.
There is no disadvantage of working at home.
The greatest, shared resource of information created by humankind is:
Web
Dictionary
Vocabulary
Glossary
There are _____________ types communication channels.
2
3
4
5
The Cyberwarefare is a ______
Crime
War
Software
Game
In the statement “PopUp(“Message”)” :
“PopUp” is the function Name, “Message” is the argument
“Message” is function identifier
Syntax Error: functions cannot be called in this way
Error: function is undefined
RGB scheme stands for _________________________________.
Red Grey Blue
Red Green Brown
Red Green Blue
Red Green Black
_____________ is the part of the virus that generally consists of malicious computer instructions
Off load
Payload
Loader
Transmitter
Unlike viruses, __________________ are stand-alone programs
Trojan horses
Logic- or time-bombs
Worms
None of the given
Voice over IP has _____ modes
2
3
4
5
We use __________ to stop Break-Ins.
Scanners
Intrusion detectors
Firewalls
Intrusion detectors and Firewalls
Which one can lead user to leave your website?
Simple design
Poor navigation
Information layout
Adaptable design
_____________________ are the subcategories of AI
Expert Systems
Robotics
Natural Language Processing
All of the above
With the Help of FTP we can:
List, change, create folders on a remote computer
Upload and download files
Transferring Web content from the developer’s PC to the Web server
All of the given choices
Which protocol is used for receiving E-mail messages?
FTP
POP
Telnet Protocol
SMTP
The organizations are learning that business can be done in a more effective manner if emphasis is placed upon ______________.
Cooperation
Shared responsibility
Networking
All of the given
___ is used to transfer files between computers on a TCP/IP network
FTP
POP
Telnet Protocol
SMTP
Which of the following is True about “pareseFloat(String)” function: I) If the first character cannot be converted to a number, parseFloat returns NaN. II) it returns the fractional portion of floating point number. III) Parses the string argument; returns a FP number. IV) Non of given options.
I and II Only
II and III Only
I and III Only
IV Only
Event-driven programs can ____________________ events.
capture
respond
capture and respond
None of the Given.
Which of the statements is NOT true about “Color Usage Guidelines” for developing a presentation?
Use color sparingly to to highlight a point, but don't get carried away
Do not use colors like yellow or red for background except where needed.
Do not use colors like green, blue and such like colors except where needed.
None of given options
_________________ Type of databases management systems are supporting Terabytes of Data
Personal
Desktop
Enterprise
Single-user
Because of the ever-decreasing costs of verbal, text, video communications; the distances have _________
Increased
Expanded
Contracted
Lengthened
The structure of the networked organization is _________.
Simple
Flexible
Complex
All of the given
A CAD drawing consist of many geometric shapes like straight lines , arc , tc and therefore is stored in a ___________ format.
Scalar
Vector
Both a & b
____ is a type of computer-to-computer messaging.
TCP
Telnet
E-mail
FTP
None of these
RDBMS stands for ________________________________
Relative Data Base Management System
Relational Data Base Management System
Recursive Data Base Management System
Responsible Data Base Management System
Using Color Mapping scheme only a limited number of color called _____________ are allowed.
Reserved
Pointers
Platelet
None of these
Using _________ topology, adding new nodes is difficult.
Ring
Bus
Star
None of the given choices
Problems with old presentation methods was (transparencies and projectors etc):
They were costly
Electronic transmission, in some cases, was not easy
Presentation some times gets ambiguous
All of given options
ARPANET splits into two nets to keep military & non-military network sites separate, named :
ARPANET & MILNET
MICRONET & MILNET
PICONET & ARPANET
None of the given choices
Arguments values are passed to the function _________
by value
by reference
Both a & b
Non of the Given.
__________________ is a field that uniquely identifies each record stored in a table.
Primary Key
Foreign Key
Secondary key
Special Key
The IP address consists of _____ bits
64
32
16
128
Credit Card Fraud can be minimized by using _________________
single credit card numbers
multiple-use credit card numbers
single-use credit card numbers
Firewalls
hotWeather = (Temperature == 40); in the above statement, the variable hotWeather is of type
Number
String
Boolean
None of the given
Ref:
you are evaluating a condition (temperature ==40) and result of this condition is getting stored in HotWeather variable. which is boolean in form
Output of evaluation of condition is in the form of true or false which is a boolean value
Here I Try to key few lines to help you to see live (copy paste these in any test.htm) and run in broswer
NCSA stands for :
NationalCenter for Supercomputing Applications
NationalCenter for Supreme Applications
NationalCenter for Super Authority
None of the given choices
Self-replicating SW that eludes detection and is designed to attach itself to other files is called _____________.
Trojans
Viruses
Sniffers
Operating System
SVG stands for _________________________________________.
Structured Vector Graphics
Software Vector Graphics
Structured Visual Graphics
None of these
Viruses move from one computer to another with the __________ and spring into action when the _____________ is executed or opened
Host – Host
Host – Client
Client – Host
Client – Client
____________________ is a layered structure consisting of a number of homogenous and simple processing elements.
Genetic Algorithms
Rule-based Systems
Feed-Forward Network
None of these
A property that gives the value of Pi is:
PI()
Graph.PI
Math.PI
Math.PI()
The smallest image forming element on a computer display is called ____________.
Resolution
Pixel
Grey area
None of these
SMTP stands for _______________________________________.
Simple Mail Transfer Protocol
Simple Mail Transparent Protocol
Simple Mail Transfer Paradigm
None of these
________________ network allows data to be sent directly from one computer to another.
Ring
Bus
Star
None of the given choices
Viruses attach themselves to other computer programs or data files, are known as____
Trojans
Guests
Hosts
Spies
Avoid __________ to ensure readability of web page
Overuse of bold and italics
Use of paragraphs
Use of white space
Use of contrast colors
STP stands for :
Shielded Twisted Pair
Silver Twisted Pair
Single Twisted Pair
None of the given choices
In ______, the spies of one business monitors the network traffic of their competitors.
Industrial intelligence
Industrial Espionage
Industrial spying
Industrial surveillance
Color mapping scheme reducing the size of 2.25 MB graphic to _________ MB.
0.90 MB
0.75 MB
1.00 MB
None of these
The functions which call themselves from their (own) body are called:
Virtual functions
Abstract functions
Overriding functions
Recursive functions
Browser sends ‘_________’ request to web server to access a file.
SET
GET
TRANSFER
All of the given choices
The internet communities are ___________.
Geographical based
Interest based
Country based
Religion based
Infection propagation and Actual destructive are the components of _______________
Transmission mechanism
Payload
Computers are good at:
Speed
Storage
Never bored
All of the given choices
Speed
Storage
Never bored
All of the given choices
CS101 Q2.Grace Hopper of US Navy develops the very first_______ compiler
Low-level Language
High-level language
Both high and low level language
None of the given choices
High-level language
Both high and low level language
None of the given choices
2.5 Harvard Mark 1 – 1943:
Howard Aiken and Grace Hopper designed the MARK series of computers at Harvard University. The MARK series of computers began with the Mark I in 1944. Imagine a giant roomful of noisy, clicking metal parts, 55 feet long and 8 feet high. The 5-ton device contained almost 760,000 separate pieces. Used by the US Navy for gunnery andballistic calculations, the Mark I was in operation until 1959. The computer, controlled by pre-punched paper tape, could carry out addition, subtraction, multiplication, division and reference to previous results. It had special
subroutines for logarithms and trigonometric functions and used 23 decimal place numbers. Data was stored andcounted mechanically using 3000 decimal storage wheels, 1400 rotary dial switches, and 500 miles of wire. Its electromagnetic relays classified the machine as a relay computer. All output was displayed on an electric typewriter. By today's standards, the Mark I was slow, requiring 3-5 seconds for a multiplication operation
(p14
CS101 Q3.The first Web browser with a GUI was generally available in:
1992
1993
1994
1995
1993
1994
1995
The first Web browser with a graphical user interface was generally available (Mosaic, in 1993), the term seemed to apply to Web content, too. Technically, a Web browser is a client program that uses the Hypertext Transfer Protocol (HTTP) to make requests of Web servers throughout the Internet on behalf of the browser user.(18
The name of first program-controlled machine was:
ENIAC
Attanasoff-Berry Computer
Harvard Mark 1
Pentium
ENIAC
Attanasoff-Berry Computer
Harvard Mark 1
Pentium
Harvard Mark 1 – 1943
CS101 Q4. If a computer could pass the Turing test then it would be able to:
win a million dollar prize
think like human begins
think like human begins
SOLVED by PrIncess Sassi
think but slower than humans
do the things faster
2.2 The “Turing test”
A test proposed to determine if a computer has the ability to think. In 1950, Alan Turing (Turing, 1950) proposed a method for determining if machines can think. This method is known as The Turing Test. (13
Q5.The name of programming language, specifically designed by the US Department of Defense for developing military applications, was:
Smalltalk
C
C++
Ada
Smalltalk
C
C++
Ada
Ada: A programming language specifically designed by the US Dept of Defense for developing military applications was named Ada to honor her contributions towards computing(p9
Q6.TCP Stands for:
Transmission Control Principles
Transmission Control Protocol
Transformation Control Protocol
Translation Control Protocol
Transmission Control Principles
Transmission Control Protocol
Transformation Control Protocol
Translation Control Protocol
Communications on the Internet is controlled by a set of two protocols: TCP and IP TCP/IP Transmission Control Protocol/Internet Protocol Networking protocol used by all computers and networks on the Internet Originally developed by the US DoD for Unix, but now available for most other OSes TCP breaks down the message to be sent over the Internet into packets IP routes these packets through the Internet to get them to their destination When the packets reach the destination computer, TCP reassembles them into the original message (p196
Q7.Web is a unique invention by humans in terms that it is:
accessible to all humans
accessible to only the owners who control it
accessible to particular locations only
None of the given choices
Q8.The name of first commercially available PC was:
UNIVAC 1
ENIAC
EDVAC
Altair 8800
accessible to all humans
accessible to only the owners who control it
accessible to particular locations only
None of the given choices
Q8.The name of first commercially available PC was:
UNIVAC 1
ENIAC
EDVAC
Altair 8800
2.9 UNIVAC 1 – 1951
UNIVAC-1. The first commercially successful electronic computer, UNIVAC I, was also the first general purpose computer - designed to handle both numeric and textual information. It was designed by J. Presper Eckert and John Mauchly. The implementation of this machine marked the real beginning of the computer era.(P14
SOLVED by PrIncess Sassi
Q9. A strategy in which all possible combinations are examined and best one is selected called……………
Divide and conquer
Brute force
Heuristic
All of given
16.12 The Brute Force Strategy (1)
A strategy in which all possible combinations are examined and the best among them is Selected (p103
Q10.Super Computers are used in:
Weather forecasting
Aeroplane manufacturing
Atomic Bomb experiments
All of the given choices
Q10.Super Computers are used in:
Weather forecasting
Aeroplane manufacturing
Atomic Bomb experiments
All of the given choices
Q11.ENIAC was first____ Computer
Large-scale
General-purpose
Electronic
All of the given choices
Large-scale
General-purpose
Electronic
All of the given choices
Reference: ENIAC – 1946:
ENIAC I (Electrical Numerical Integrator And Calculator). The U.S. military sponsored their research; they needed a calculating device for writing artillery-firing tables (the settings used for different weapons under varied conditions for target accuracy).(p14)
Q12.Which one of the following units can be called as the brain of computer microprocessor?
ALU (Arithmetic & Logic Unit)
FPU (Floating Point Unit)
Control Unit
Bus Interface Unit
ALU (Arithmetic & Logic Unit)
FPU (Floating Point Unit)
Control Unit
Bus Interface Unit
Reference: A control unit is the part of a CPU or other device that directs its operation. The outputs of the unit control the activity of the rest of the device. A control unit can be thought of as a finite state machine. It is called the brain of computer microprcessor. (p36
Q13.Which one of the following is a really fast port that lets you connect computer peripherals and consumer electronics to your computer without the need to restart?
Freeware
Shareware
Fire wire
Firmware
Freeware
Shareware
Fire wire
Firmware
Ref.
FireWire is simply a really fast port that lets you connect computer peripherals and consumer electronics to your computer without the need to restart. It is a simple common plug-in serial connector on the back of your computer. It has the ability to chain devices together in a number of different ways without terminators for example, simply join 2 computers with a FireWire cable for instant high-speed networking.(P24 )
FireWire is simply a really fast port that lets you connect computer peripherals and consumer electronics to your computer without the need to restart. It is a simple common plug-in serial connector on the back of your computer. It has the ability to chain devices together in a number of different ways without terminators for example, simply join 2 computers with a FireWire cable for instant high-speed networking.(P24 )
SOLVED by PrIncess Sassi
Q14.The name of programming language, specifically designed by the US Department of Defense for developing military applications, was:
Smalltalk
C
C++
Ada
Smalltalk
C
C++
Ada
Ref.
Ada: A programming language specifically designed by the US Dept of Defense for developing military applications was named Ada to honor her contributions towards computing(p9
Ada: A programming language specifically designed by the US Dept of Defense for developing military applications was named Ada to honor her contributions towards computing(p9
Q15 Which one of these is NOT an example of storage devices?
CD
Floppy
Hard Disk
CD
Floppy
Hard Disk
Q16 Which category of computers lies between Workstation and Mainframe computers?
Microcomputer
Desktop
Laptop
Minicomputer
Microcomputer
Desktop
Laptop
Minicomputer
4.4 Servers / Minicomputers A midsized computer. In size and power, minicomputers lie between workstations and mainframes. In the past decade, the distinction between large minicomputers and small mainframes has blurred, however, as has the distinction between small minicomputers and workstations. But in general, a minicomputer is a multiprocessing system capable of supporting from 4 to about 200 users simultaneously.(21
Q17 Algorithm is a precise sequence of a limited number of _________ , ___________steps that terminates in the form of a solution
Ambiguous, Executable
Nondeterministic, Finite
Finite, countable
Unambiguous, executable
Ambiguous, Executable
Nondeterministic, Finite
Finite, countable
Unambiguous, executable
Ref
1st Definition:
Sequence of steps that is taken to solve a problem
Better Definition:
A precise sequence of a limited number of unambiguous, executable steps that terminates in the form of a solution
Sequence of steps that is taken to solve a problem
Better Definition:
A precise sequence of a limited number of unambiguous, executable steps that terminates in the form of a solution
Q18 Which one of the following web programming languages used to do client-side scripting?
ASP
Server Side JavaScript
PHP
VBScript
ASP
Server Side JavaScript
PHP
VBScript
We’ll use JavaScript to do client-side scripting. However, there are many other languages p119
SOLVED by PrIncess Sassi
Q19 This principle called the “Ockham’s Razor,” states when choosing among competing, successful solutions to a problem; choose the one which is the least ________
Time Consuming
Ambiguous
Complex
Time Consuming
Ambiguous
Complex
Selecting Among Algorithms
When choosing among competing, successful solutions to a problem, choose the one which is the least
complex This principle is called the “Ockham’s Razor,” after William of Ockham - famous 13-th century English philosopher(101
Q20 _________ software sits on top of ________ software for performing user tasks.
System, Application
System, Productivity
Application, System
System, Programming
System, Application
System, Productivity
Application, System
System, Programming
Q21 Deep Blue was the name of:
Human
Computer
City
None of the given choices
Human
Computer
City
None of the given choices
In 1997 Deep Blue, a supercomputer designed by IBM, beat Gary Kasparov, the World Chess Champion That computer was exceptionally fast, did not get tired or bored. It just kept on analyzing the situation and kept on searching until it found the perfect move from its list of possible moves (P9)
Q22 Linux and Mac are examples of :
Uni processor OS
Multi processor OS
Uni processor OS
Multi processor OS
Q23 Given the HTML code, ahsan@vu.edu.pk My email. Read the code carefully and tell what out put browser will generate?
ahsan@vu.edu.pk
ahasn@vu.edu.pk
My email ahasn@vu.edu.pk
None of the given choices
ref: right answer will be
ahsan@vu.edu.pk My email.
paste following code in any html file and view in browser
Q24 There is a battery on the mother board to:
give power to the processor
Save information when computer is OFF
Help the boot process
Save information when computer is ON
give power to the processor
Save information when computer is OFF
Help the boot process
Save information when computer is ON
ROM
ROM is "built-in" computer memory containing data that normally can only be read, not
written to. ROM contains the programming that allows your computer to be "booted
up" or regenerated each time you turn it on. Unlike a computer's random access memory
(RAM), the data in ROM is not lost when the computer power is turned off.
The ROM is sustained by a small long-life battery in your computer.
Q25 Alan Turing of Cambridge University presented his idea of a theoretically simplified but fully capable computer, now known as:
Analytical Engine
Turing MachineDifference Engine
None of the given choices
Q26 _ is the example of a Web browser
Yahoo
Netscape Navigator
Web Application
Google
Turing MachineDifference Engine
None of the given choices
Q26 _ is the example of a Web browser
Yahoo
Netscape Navigator
Web Application
Q27 The Analytical Engine was machine of which type?
Programmable
Mechanical
Digital
All of the given choices
Programmable
Mechanical
Digital
All of the given choices
1.2. The Analytical Engine A programmable, mechanical, digital machine Could carryout any calculation Could make decisions based upon the results of the previous calculation Components: input; memory; processor; output(p 9)
SOLVED by PrIncess Sassi
Q28 Interactive Forms are always placed between:
Body tags of a Web page
Head tags of a Webpage
Body tags of a Web page
Head tags of a Webpage
Q29 Which interface on computer supports transmission of multiple bits at the same time?
Serial Port
Parallel Port
PS/2 Port
Universal Serial Bus
Serial Port
Parallel Port
PS/2 Port
Universal Serial Bus
Parallel
An interface on a computer that supports transmission of multiple bits at the same time; almost exclusively used for connecting a printer. On IBM or compatible computers, the parallel port uses a 25-pin connector.p24
Q30 If we want to show numbers with List Items, then we use
none of the given
Q31 Trialware Softwares are used for
short period
long period
life time
none of the given
Software that can be run for a limited period of time before it is purchased. Trialware has a built-in expiration date and will cease to operate beyond that date if it has not been paid for. Also called "demoware.
Q32 Babbage’s Analytical Engine could store information permanently in:
Magnetic Tape
Floppy Disk
Punched Cards
None of the given choices
Magnetic Tape
Floppy Disk
Punched Cards
None of the given choices
SOLVED by PrIncess Sassi
Q33 First computer that could not only manipulate numbers but also text data as well was:
ENIAC
EDVAC
UNIVAC 1
Attanasoff-Berry Computer
ENIAC
EDVAC
UNIVAC 1
Attanasoff-Berry Computer
ENIAC I (Electrical Numerical Integrator And Calculator). The U.S. military sponsored their research; they needed a calculating device for writing artillery-firing tables (the settings used for different weapons under varied conditions for target accuracy). John Mauchly was the chief consultant and J Presper Eckert was the chief engineer.
Eckert was a graduate student studying at the Moore School when he met John Mauchly in 1943. It took the team about one year to design the ENIAC and 18 months and 500,000 tax dollars to build it. The ENIAC contained 17,468 vacuum tubes, along with 70,000 resistors and 10,000 Capacitors.
Q34 Greedy algorithms are usually faster, since they don't consider the details of possible alternatives
True
False
True
False
KEY ADVANTAGE: Greedy algorithms are usually faster, since they don't consider the details of possible alternatives (P102
Q35 SCSI stands for:
Small Computer System Interface
System Common Small Integration
Silicon Computer System Interface
None of the given choices
Small Computer System Interface
System Common Small Integration
Silicon Computer System Interface
None of the given choices
SCSI
A port that's faster than the serial and parallel ports but slower and harder to configure than the newer USB port. Also know as the Small Computer System Interface.(24
SOLVED by PrIncess Sassi
Q36 Greedy algorithm does not support……………….. Situation.
Local
Global
Complex
All of given SOLVED by PrIncess Sassi
Local
Global
Complex
All of given SOLVED by PrIncess Sassi
Q37 Which of the followings is not a Flowchart Element?
Off- frame connector
Input or output
Process
Connector flowchart elements
Off- frame connector
Input or output
Process
Connector flowchart elements
Start or stop
Process
Input or output
Connector
Decision
Flow line
Off-page connector
these are all the elements of flow chart so?
Q38 During one of the international cricket tournaments, one of the teams intentionally lost a match, so that they could qualify for the next round If they had won that particular match, some other team would have qualified This is an example of a _________________
Greedy algorithm
Non-greedy algorithm
Greedy algorithm
Non-greedy algorithm
Q39 Teraflop stands for:
Thousand floating point operations per second
Thousand floating point operations per hour
Trillion floating point operations per second
Trillion floating point operations per hour
Thousand floating point operations per second
Thousand floating point operations per hour
Trillion floating point operations per second
Trillion floating point operations per hour
An algorithm that always takes the best immediate or local solution while finding an answer is called____. Deterministic AlgorithmNon deterministic AlgorithmGreedy AlgorithmRandomized Algorithm
Which of the following command allows you to recover form mistakes in MS Word?
ClearEditUndoBreak
A ____________ operating system allows many users to take advantage of the computer's resources, simultaneously
Single user
Multi- user
Single tasking
Multi tasking
Network Interface Card is an __________ device
Input
Output
Input/Output
Storage
The decimal equivalent of binary 1000 is
7
8
9
10
Which of the following is NOT RDBMS software?
A computer virus is a
Software that saves the computer from being damaged.
Application software that helps to make different type of viruses and worms
Program that spreads itself and destroys other program
Program that corrects the problems in your computer
What will be the result of a?
a = Math.abs(-23)
23
-23
23.0
2.3
A Special program required to view swf (Shockwave Flash) files in web Browser is called
TFlash
Vflash
plug-in
None of the given options
Using Java Script you can write a character at random location on screen
By applying randomCh() method
With the help of String object
With the help of random character property
There is no built in approach in Java Script
If incorrectly we enter the negative age it is check by
Limit Integrity
Type Integrity
Referential Integrity
Physical Integrity
Which protocol is use to transfer a file over the network?
UDP
FTP
TCP
OSI
One can send an email message to a remote computer using _______ protocol
HTTP
SMTP
FTP
TELNET
In a System having many parts to be designed, one should always do the _____ first
Hard part
Simple part
Development part
Quality part
Flow control constructs in JavaScript includes:
If-Else
Loops and If -Else
Switch and If-Else
All of the given choices
___ provides a simple, consistent way for applications to interact with the HW without having to know all the details of the HW
Explorer.exe
System Files
Operating System
Application Software
Machine language is also called
Assembly Language
Binary Language
High Level Language
HTML Language
_________ is the best known builder for supercomputers.
Sun
Cray Research
Microsoft
Apple
The weaknesses of the computer are:
Pattern recognition & Storage
Speed & Innovative ideas
Pattern recognition & Innovative ideas
Speed & Storage
Communication protocol is a __________that governs the flow of information over a network
Set of methods
Set of protocols
Set of rules
Device
_____________ team is responsible for the maintenance, expansion , improvement of the infrastructure consisting of workstations, networking equipment, software and network security.
Support
Configuration Management
Quality Assurance
Developer
_____________ team consists on the sharpest technical minds in the company.
Architecture
Business Development
Configuration Management
Developer
_______________ is responsible for day to day operations.
CEO
COO
CMSO
Developer
One of the key responsibilities of the ___________ is client relationship management.
Project Manager
Team Lead
Developer
Quality Assurance Engineer
What is the major problem with flash based website?
Its two heavy
Cannot be indexed
Less attractive
Inaccessible
Which of the following is NOT an event handler for image object?
onAbort
onError
onLoad
onUser
The organizations are learning that business can be done in a more effective manner if emphasis is placed upon ___________.
Cooperation
Shared responsibility
Networking
All of the given options
a = Math.abs(-23)
What will be the value of a ?
23
-23
23.0
2.3
ERP is a type of __________________ .
Entertainment software
Productivity software
Business software
Scientific software
In Genetic Algorithm the most important thing you should know, is the ___________.
Procedure
Recognition of a good solution
Different techniques
None of the given options
According to a popular heuristic, success is defined by ___________.
The user
The builder
Both user and builder
None of the given options
Rule of thumb learned through trial and error is called ___________.
Design
Heuristic
Plan
Aim
JavaScript Variables are ____________.
Dynamically Typed
Statically Typed
Strong Typed
None of the given options
Which of the following application are collections of cells?
Word
Excel
PowerPoint
Outlook Express
The browser breaks down the URL into ________ parts.
2
3
4
5
A named collection of properties (data, state) and methods (instruction, behavior) is called ____________.
Array
Function
Variable
Object
First computer network was ___________.
NSFNET
FIRSTNET
ARPANET
ORPHANET
In JavaScript, a variable declaration is
Optional
Mandatory
Not allowed
None of the given
A protocol used for receiving email messages is called ____________.
Optional
Mandatory
Not allowed
None of the given
A protocol used for receiving email messages is called ____________.
URL
Telnet
POP3
SMTP
which one is correct?
onUnload
onUnLoad
onUNLOAD
All of the above
Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called __________.
Telnet
POP3
SMTP
which one is correct?
onUnload
onUnLoad
onUNLOAD
All of the above
Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called __________.
Loop
Sequence
Condition
Array
Variables allow us to manipulate data through the ___________.
Actual Value
Reference
Length
Name
Fuzzy logic is based on ____________.
Ground facts
Experience
Practice
Approximation
Word Processor is a _________________
System Software
Application Software
Device
Utility
In the old days, databases did NOT support ____________.
Application Software
Device
Utility
In the old days, databases did NOT support ____________.
Number
Boolean
Video
Text
In tabular storage, fields placed in a particular row are strongly ___________.
Boolean
Video
Text
In tabular storage, fields placed in a particular row are strongly ___________.
Independent
Dependent
Interrelated
Inconsistent
Due to working at home, lack of interaction may result in ___________ professional growth.
Slower
Faster
Higher
Improved
Distance learning has got a boost due to the ___________.
Easy communication
Online interactive contents
Flexibility
All of the given options
_____________ technique can be used to create smooth animations or to display one of several images based on the requirement.
Image downloading
Image preloading
Image uploading
Image postloading
The ____________ is becoming the preferred organizational structure for more and more organizations with the passage of time.
Tree structured organizational model
Network paradigm
Hierarchical structure
None of the given options
The group of technologies concerned with the capturing, processing and transmission of information in the digital electronic form is called
_____________.
Telecom Engineering
Computer Engineering
Computer Science
Information Technology
A large number of networks interconnected physically is called ______
LAN
MAN
Internet
Network collection
TCP stands for ________.
Transfer Center protocol
Transmission Control Protocol
Transmission Center Protocol
Telephone Center Protocol
A collection of data organized in such a way that the computer can quickly search for a desired data item is known as :
Retrieving
Database
Information
DBMS
______ is simply a fast port that lets you connect computer peripherals and consumer electronics to your computer without restart.
Freeware
Shareware
Firewire
Firmware
Structures, in which another list starts before the first list is finished, are called:
Multiple Lists
Nested Lists
Ordered Lists
Un-ordered Lists
The key property of the ‘Array’ object in JavaScript is
Value
Length
Name
All of the given choices
Which one is the example of spreadsheet software ?
MS Word
MS PowerPoint
MS Excel
MS Access
The Encryption of data is related to
Data updates
Data security
Data integrity
Data accessibility
_____ is the process of analyzing large databases to identify patterns.
Data normalization
Data management
Data Mining
None of the given options
Which is the user-friendly way of presenting data ?
Query
Form
Report
All of the given options
<form> Tags always placed between the <BODY> and </BODY> tags of a Web page
True
False
Java script has ----------------- ability to create and draw graphics.
Limited
Versatile
Medium
Not at all
Which of the following is incorrect for making design elements legible?
Select correct option:
Elements should be large enough
Elements must contrast sufficiently
Related elements should be visually grouped
Elements should have no visual focus
Function is also known as ______________.
Select correct option:
subprogram
procedure
subroutine
All of given
In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET.
Select correct option:
1973
1983
1972
None of the given choices
E-mail system has ______ component(s)
Select correct option:
E-mail client
SMTP server
POP3 server
All of the given choices
_______ / / /______/ A Parallelogram (Tilted rectangle) represents the ________________ flow chart element.
Select correct option:
Process
Input or Output
Decision
Connector
If a computer could pass the Turing test then it would be able to:
Select correct option:
win a million dollar prize
think like human begins
think but slower than humans
do the things faster
Punched cards were replaced by:
Select correct option:
Floppy Disk
Zip Drives
Magnetic storage
None of the given choices
The ________virus may display an annoying, but harmless message
Select correct option:
Malicious
Neutral
Helpful
DoS
The name of very first computer was:
Select correct option:
ABC
BCD
EDC
None of the given choices
The internet communities are ___________.
Select correct option:
Geographical based
Interest based
Country based
Religion based
which one is correct?
onUnload
onUnLoad
onUNLOAD
All of the above
Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called __________.
onUnload
onUnLoad
onUNLOAD
All of the above
Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called __________.
Loop
Sequence
Condition
Array
Variables allow us to manipulate data through the ___________.
Actual Value
Reference
Length
Name
Fuzzy logic is based on ____________.
Ground facts
Experience
Practice
Approximation
Word Processor is a _________________
System Software
Application Software
Device
Utility
In the old days, databases did NOT support ____________.
Application Software
Device
Utility
In the old days, databases did NOT support ____________.
Number
Boolean
Video
Text
In tabular storage, fields placed in a particular row are strongly ___________.
Independent
Dependent
Interrelated
Inconsistent
Due to working at home, lack of interaction may result in ___________ professional growth.
Slower
Faster
Higher
Improved
Distance learning has got a boost due to the ___________.
Easy communication
Online interactive contents
Flexibility
All of the given options
_____________ technique can be used to create smooth animations or to display one of several images based on the requirement.
Image downloading
Image preloading
Image uploading
Image postloading
The ____________ is becoming the preferred organizational structure for more and more organizations with the passage of time.
Tree structured organizational model
Network paradigm
Hierarchical structure
None of the given options
The group of technologies concerned with the capturing, processing and transmission of information in the digital electronic form is called
_____________.
Telecom Engineering
Computer Engineering
Computer Science
Information Technology
A large number of networks interconnected physically is called ______
LAN
MAN
Internet
Network collection
TCP stands for ________.
Transfer Center protocol
Transmission Control Protocol
Transmission Center Protocol
Telephone Center Protocol
A collection of data organized in such a way that the computer can quickly search for a desired data item is known as :
Retrieving
Database
Information
DBMS
______ is simply a fast port that lets you connect computer peripherals and consumer electronics to your computer without restart.
Freeware
Shareware
Firewire
Firmware
Structures, in which another list starts before the first list is finished, are called:
Firewire
Firmware
Structures, in which another list starts before the first list is finished, are called:
Multiple Lists
Nested Lists
Ordered Lists
Un-ordered Lists
The key property of the ‘Array’ object in JavaScript is
Value
Length
Name
All of the given choices
Which one is the example of spreadsheet software ?
MS Word
MS PowerPoint
MS Excel
MS Access
_____ is the process of analyzing large databases to identify patterns.
Data normalization
Data management
Data Mining
None of the given options
Which is the user-friendly way of presenting data ?
Query
Form
Report
All of the given options
JavaScript function fixed() has equivalent HTML tag-set ____
<.FIX>……………</FIX>
<F>………………..</F>
<PRE>………….</PRE>
<H>………………..</H>
<form> Tags always placed between the <BODY> and </BODY> tags of a Web page
True
False
Java script has ----------------- ability to create and draw graphics.
Limited
Versatile
Medium
Not at all
Internet is an example of ______________ network.
Private
Public
Both Private and Public
None of the given choices
The name of first commercially available PC was:
UNIVAC 1
ENIAC
EDVAC
Altair 8800
Algorithm is a ____________________
Definition of a problem
Sequence of steps to solve a problem
Understanding of a problem
Solving a problem
A group of information is called __________________
File
Database
Record
Field
___________________ is a branch of computer science concerned with manipulating and enhancing computer graphics.
Image Handling
Image Processing
Image Engineering
None of these
__________has changed our way of life like no other technology.
Computational technology
Computer technology
Computing technology
None of the Above
Sophisticated event handling is not possible with _______________ event handling
Off-Line
In-Line
Out-Line
Non of the given choices
Babbage’s Analytical Engine could store information permanently in:
Magnetic Tape
Floppy Disk
Punched Cards
None of the given choices
There are __________ popular schemes to reduce the number of bytes that are required for storing graphics.
4
3
2
None of these
The internet-society is considered under Surveillance because:
While surfing, we are being watched, constantly
Our every click is recorded and analyzed to extract patterns and behaviors
Webcams are becoming common. Providing a cheap way for parents to watch their children's every move
All of the given
URL is a/an ________
Device
Component
Address
Tool
To improve the time for scanning a web page, text should be ___________.
Centered
Left Aligned
Right Aligned
Staggered
Communications on the internet is controlled by a set of two protocols which are ____________.
IMAP and SMTP
FTP and HTTP
TCP and IP
TCP and HTTP
FTP stands for __________.
File transmission protocol
File transmission path
File transfer protocol
Fine transfer path
A named collection of properties (data, state) and methods (instruction, behavior) is called ____________.
Array
Function
Variable
Object
Anchor tag denoted by <A> is used to create
Address
Hyperlink
Paragraph
Title
<UL> tag is used to
underline text
end the line
create ordered list
create unordered list
A user may access any item on the web through __________.
URL
Telnet
POP
SMTP
The browser breaks down the URL into ________ parts.
2
3
4
5
Which one of the following is NOT a primary color?
Red
Green
Yellow
Blue
According to a popular heuristic, success is defined by ___________.
The user
The builder
Both user and builder
None of the given options
The idea of Neural Networks field is based upon ______________.
Human nature
Human brain
Human culture
Human actions
ERP is a type of __________________ .
Entertainment software
Productivity software
Business software
Scientific software
__________ are those programs in which the flow of the program is determined by the user's actions (mouse clicks, key presses) or messages from other programs.
Event called programs
Event processed programs
Event driven programs
Event declared programs
Automatic machines performing various tasks that were previously done by humans, are called ____________.
Robotics
Computers
Decision Making Systems
Autonomous Web Agents
country=”Hello Pakistan”;
document.write(country.charAt(6));
The out put of the above statement is _____________.
o
P
a
k
The distance among families is ___________ because of spending more time on internet.
Increased
Expanded
Contracted
Decreased
The software used for the scanning of internet severs, is called __________.
Wscan
Mscan
Sscan
Vscan
Adding images to html page, we use___________ tag.
<IMG>
<IMAGE>
<PICTURE>
<PIC>
The group of technologies concerned with the capturing, processing and transmission of information in the digital electronic form is called _____________.
Telecom Engineering
Computer Engineering
Computer Science
Information Technology
The responsibilities of the Team Lead includes_____________.
Planning and tracking of the project
Detailed design
Professional development of team members
All of the given options
When the packets reach at destination, __________ reassembles them into original message.
Protocol
TCP
IP
NIC
Many developers write the _________ first and then incrementally convert each line into _________.
Real code & Pseudo code
Pseudo code & Real code
Real code & Artificial code
None of the given options
Machine language is also called
Assembly Language
Binary Language
High Level Language
HTML Language
In JavaScript, second element of an array has the index:
2
0
1
3
Each element in an array is given an index, which is an integer value between 0 and one less than the length of the array. The first element has an index of 0, the second element has an index of 1, and so on.
One can download or upload files to a remote computer using ________ protocol.
HTTP
SMTP
FTP
TELNET
JavaScript ________ support drawing of graphics
Does
Does not
Always
At times
Which of the following is NOT true about modern computers?
More powerful
Smaller in size
Consume less energy
Costly
Ada written a computer programme for ?
Analytical Engine
Difference Engine
Harvard Mark 1
Mechanical engine
A set of stand alone productivity applications designed to work together known as ______________ .
Productivity software suites
Compiled software
Secure software
Intelligent software
Because of spending more time on the internet, the distances among the families have been _____.
Increased
Expanded
Contracted
Shortened
Sophisticated event handling is not possible with _______________ event handling
Off-Line
In-Line
Out-Line
Non of the given choices
Autonomous Web Agents are also known as _________________
Mobile Agents
Softbots
Both "Mobile Agents" & "Softbots"
None of these
A communication protocol is a __________that governs the flow of information over a network.
Set of Methods
Set of Protocols
Set of rules
None of the given choices
By default in a web page Hyper Link for another web page is represented as:
Blue only
Black and Underlined
Blue and Bold
Blue and Underlined
The organizations are learning that business can be done in a more effective manner if emphasis is placed upon ______________.
Cooperation
Shared responsibility
Networking
All of the given
Monitor is an example of __________devices
Output
Input
Processing
None of the given choices
The code in the ________ portion is the right choice for developing larger JavaScript scripts
Body
At End
Head
Separate
____________________ based on the principles of the logical reasoning ability of humans.
Genetic Algorithms
Rule-based Systems
Feed-Forward Network
None of these
The key benefit of VPNs over conventional PNs is:
Security
Efficiency
Lower Cost
None of the given choices
Which of the following is incorrect for making design elements legible?
Elements should be large enough
Elements must contrast sufficiently
Related elements should be visually grouped
Elements should have no visual focus
1. Function is also known as ______________.
subprogram
procedure
subroutine
All of given
In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET.
1973
1983
1972
None of the given choices
E-mail system has ______ component(s)
E-mail client
SMTP server
POP3 server
All of the given choices
A Parallelogram (Tilted rectangle) represents the ________________ flow chart element.
Process
Input or Output
Decision
Connector
If a computer could pass the Turing test then it would be able to:
win a million dollar prize
think like human begins
think but slower than humans
do the things faster
Punched cards were replaced by:
Floppy Disk
Zip Drives
Magnetic storage
None of the given choices
The ________virus may display an annoying, but harmless message
Malicious
Neutral
Helpful
DoS
The name of very first computer was:
ABC
BCD
EDC
None of the given choices
The internet communities are ___________.
Geographical based
Interest based
Country based
Religion based
__________% of the users have left websites in frustration due to poor navigation. 40
62
83
91
In JavaScript, a variable declaration is
Optional
Mandatory
Not allowed
None of the given
A protocol used for receiving email messages is called ____________.
62
83
91
In JavaScript, a variable declaration is
Optional
Mandatory
Not allowed
None of the given
A protocol used for receiving email messages is called ____________.
URL
Telnet
POP3
SMTP
which one is correct? onUnload
onUnLoad
onUNLOAD
All of the above
Telnet
POP3
SMTP
which one is correct? onUnload
onUnLoad
onUNLOAD
All of the above
Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called __________.
Loop
Sequence
Condition
Array
Variables allow us to manipulate data through the ___________.
Sequence
Condition
Array
Variables allow us to manipulate data through the ___________.
Actual Value
Reference
Length
Name
Fuzzy logic is based on ____________.
Reference
Length
Name
Fuzzy logic is based on ____________.
System Software
Application Software
Device
Utility
In the old days, databases did NOT support ____________.
Application Software
Device
Utility
In the old days, databases did NOT support ____________.
Number
Boolean
Video
Text
In tabular storage, fields placed in a particular row are strongly ___________.
Boolean
Video
Text
In tabular storage, fields placed in a particular row are strongly ___________.
Independent
Dependent
Interrelated
Inconsistent
Dependent
Interrelated
Inconsistent
Due to working at home, lack of interaction may result in ___________ professional growth.
Slower
Faster
Higher
Improved
Distance learning has got a boost due to the ___________. Easy communication
Online interactive contents
Flexibility
All of the given options
_____________ technique can be used to create smooth animations or to display one of several images based on the requirement.
Higher
Improved
Distance learning has got a boost due to the ___________. Easy communication
Online interactive contents
Flexibility
All of the given options
_____________ technique can be used to create smooth animations or to display one of several images based on the requirement.
Image downloading
Image preloading
Image uploading
Image postloading
Image preloading
Image uploading
Image postloading
Tree structured organizational model
Network paradigm
Hierarchical structure
None of the given options
The group of technologies concerned with the capturing, processing and transmission of information in the digital electronic form is called _____________.
Telecom Engineering
Computer Engineering
Computer Science
Information Technology
A large number of networks interconnected physically is called ______
Computer Engineering
Computer Science
Information Technology
A large number of networks interconnected physically is called ______
LAN
MAN
Internet
Network collection
MAN
Internet
Network collection
TCP stands for ________.
Transfer Center protocol
Transmission Control Protocol
Transmission Center Protocol
Telephone Center Protocol
Transfer Center protocol
Transmission Control Protocol
Transmission Center Protocol
Telephone Center Protocol
A collection of data organized in such a way that the computer can quickly search for a desired data item is known as : Retrieving
Database
Information
DBMS
______ is simply a fast port that lets you connect computer peripherals and consumer electronics to your computer without restart.
Freeware
Shareware
Firewire
Firmware
Structures, in which another list starts before the first list is finished, are called:
Shareware
Firewire
Firmware
Structures, in which another list starts before the first list is finished, are called:
Multiple Lists
Nested Lists
Ordered Lists
Un-ordered Lists
The key property of the ‘Array’ object in JavaScript is
Nested Lists
Ordered Lists
Un-ordered Lists
The key property of the ‘Array’ object in JavaScript is
Value
Length
Name
All of the given choices
Which one is the example of spreadsheet software ?
Length
Name
All of the given choices
Which one is the example of spreadsheet software ?
MS Word
MS PowerPoint
MS Excel
MS Access
MS PowerPoint
MS Excel
MS Access
The Encryption of data is related to
Data updates
Data security Data integrity
Data accessibility
_____ is the process of analyzing large databases to identify patterns.
Data security Data integrity
Data accessibility
_____ is the process of analyzing large databases to identify patterns.
Data normalization
Data management
Data Mining
None of the given options
Which is the user-friendly way of presenting data ?
Data management
Data Mining
None of the given options
Which is the user-friendly way of presenting data ?
Query
Form
Report
All of the given options
JavaScript function fixed() has equivalent HTML tag-set ____
Form
Report
All of the given options
JavaScript function fixed() has equivalent HTML tag-set ____
<.FIX>……………</FIX>
<F>………………..</F>
<PRE>………….</PRE> <H>………………..</H>
<F>………………..</F>
<PRE>………….</PRE> <H>………………..</H>
<form> Tags always placed between the <BODY> and </BODY> tags of a Web page
True
False
Java script has ----------------- ability to create and draw graphics. Limited
Versatile
Medium
Not at all
False
Java script has ----------------- ability to create and draw graphics. Limited
Versatile
Medium
Not at all
Question # 1 of 10 Total M - 1
Internet is an example of ______________ network.
Select correct option:
Private
Public
Both Private and Public
None of the given choices
Question # 2 of 10 Total M - 1
The name of first commercially available PC was:
UNIVAC 1
ENIAC
EDVAC
Altair 8800
Question # 3 of 10 Total M - 1
Algorithm is a ____________________
Definition of a problem
Sequence of steps to solve a problem
Understanding of a problem
Solving a problem
Question # 4 of 10 Total M - 1
A group of information is called __________________
File
Database
Record
Field
Question # 5 of 10 ( Start time: 05:24:17 PM ) Total M - 1
___________________ is a branch f computer science concerned with manipulating and enhancing computer graphics.
Image Handling
Image Processing
Image Engineering
None of these
Question # 6 of 10 Total M - 1
__________has changed our way of life like no other technology.
Computational technology
Computer technology
Computing technology
None of the Above
Question # 7 of 10 Total M - 1
Sophisticated event handling is not possible with _______________ event handling
Off-Line
In-Line
Out-Line
Non of the given choices
Question # 8 of 10 Total M - 1
Babbage’s Analytical Engine could store information permanently in:
Magnetic Tape
Floppy Disk
Punched Cards
None of the given choices
Question # 9 of 10 Total M - 1
There are __________ popular schemes to reduce the number of bytes that are required for storing graphics.
4
3
2
None of these
A number of clever schemes have been invented to reduce the number of bytes that are required for storing graphics. 2 popular ones:
Color mapping
Dithering
Question # 10 of 10 ( Start time: 05:30:01 PM ) Total M - 1
The internet-society is considered under Surveillance because:
While surfing, we are being watched, constantly
Our every click is recorded and analyzed to extract patterns and behaviors
Webcams are becoming common. Providing a cheap way for parents to watch their children's every move
All of the given
Which of the following is incorrect for making design elements legible?
Elements should be large enough
Elements must contrast sufficiently
Related elements should be visually grouped
Elements should have no visual focus
25.10 Making Display Elements Legible:
1. Designing (arranging) Display Elements
Elements must be large enough to be processed visually
Elements must contrast sufficiently with their backgrounds
Related elements should be visually grouped through the use of space, color, or graphical boundaries
The relative levels of importance among elements in a display should be revealed graphically
Question # 2 of 10 Total M - 1
1. Function is also known as ______________.
Select correct option:
subprogram
procedure
subroutine
All of given
Function:
A group of statements that is put together (or defined) once and then can be used (by reference)
repeatedly on a Web page Also known as subprogram, procedure, subroutine
In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET.
Select correct option:
1973
1983
1972
None of the given choices
E-mail system has ______ component(s)
Select correct option:
E-mail client
SMTP server
POP3 server
All of the given choices
A Parallelogram (Tilted rectangle) represents the ________________ flow chart element.
Select correct option:
Process
Input or Output
Decision
Connector
Punched cards were replaced by:
Floppy Disk
Zip Drives
Magnetic storage
None of the given choices
Ref:
During the 1960s, the punched card was gradually replaced as the primary means for data storage by magnetic tape, as better, more capable computers became available.
The ________virus may display an annoying, but harmless message
Select correct option:
Malicious
Neutral
Helpful
DoS
The internet communities are ___________.
Select correct option:
Geographical based
Interest based
Country based
Religion based
Question # 1 of 10 Total M - 1
Because of spending more time on the internet, the distances among the families have been _____.
Select correct option:
Increased
Expanded
Contracted
Shortened
Question # 3 of 10 Total M - 1
Autonomous Web Agents are also known as _________________
Select correct option:
Mobile Agents
Softbots
Both "Mobile Agents" & "Softbots"
None of these
A communication protocol is a __________that governs the flow of information over a network.
Select correct option:
Set of Methods
Set of Protocols
Set of rules
None of the given choices
Protocol
–Rules governing communications over the network
By default in a web page Hyper Link for another web page is represented as:
Blue only
Black and Underlined
Blue and Bold
Blue and Underlined
The organizations are learning that business can be done in a more effective manner if emphasis is placed upon ______________.
Select correct option:
Cooperation
Shared responsibility
Networking
All of the given
Question # 7 of 10 Total M - 1
Monitor is an example of __________devices
Select correct option:
Output
Input
Processing
None of the given choices
The code in the ________ portion is the right choice for developing larger JavaScript scripts
Select correct option:
Body
At End
Head
Separate
____________________ based on the principles of the logical reasoning ability of humans.
Select correct option:
Genetic Algorithms
Rule-based Systems
Feed-Forward Network
None of these
Rulebased Systems (1):
Based on the principles of the logical reasoning ability of humans
The key benefit of VPNs over conventional PNs is:
Security
Efficiency
Lower Cost
None of the given choices
In __________________ automatic machines perform various tasks that were previously performed by humans.
Select correct option:
Fuzzy Logic
Robotics
Rule based Systems
None of these
Quiz Start Time: 10:47 PM Time Left 86
sec(s)
Question # 1 of 15 ( Start time: 10:47:57 PM ) Total M - 1
The name of very first computer was:
Select correct option:
ABC
BCD
EDC
None of the given choices
sec(s)
Question # 1 of 15 ( Start time: 10:47:57 PM ) Total M - 1
The name of very first computer was:
Select correct option:
ABC
BCD
EDC
None of the given choices
Quiz Start Time: 10:47 PM Time Left 85
sec(s)
Question # 2 of 15 ( Start time: 10:48:47 PM ) Total M - 1
You have learnt about tags, recalling Head Tag, Which one is correct?
Select correct option:
<HEAD> </HEAD>
<HEAD> <END>
<HEAD> </END>
<HEAD> <\HEAD
Quiz Start Time: 10:47 PM Time Left 84
sec(s)
Question # 3 of 15 ( Start time: 10:49:20 PM ) Total M - 1
Grace Hopper of US Navy develops the very first_______compiler
Select correct option:
Low-level Language
High-level language
Both high and low level language
None of the given choices
Quiz Start Time: 10:47 PM Time Left 86
sec(s)
Question # 4 of 15 ( Start time: 10:50:16 PM ) Total M - 1
Without one of following item a web site is read only:
Select correct option:
Form
Dialog Box
Button
Scroll Bar
Button
Scroll Bar
Quiz Start Time: 10:47 PM Time Left 84
sec(s)
Question # 5 of 15 ( Start time: 10:50:52 PM ) Total M - 1
Greedy algorithms are usually faster, since they don't consider the details of possible alternatives
Select correct option:
True
False
Quiz Start Time: 10:47 PM Time Left 88
sec(s)
Question # 6 of 15 ( Start time: 10:51:51 PM ) Total M - 1
A strategy in which all possible combinations are examined and best one is selected called……………
Select correct option:
Divide and conquer
Brute force
Heuristic
All of given
Quiz Start Time: 10:47 PM Time Left 79
sec(s)
Question # 7 of 15 ( Start time: 10:52:29 PM ) Total M - 1
Utility Software is a type of ________ Software
Select correct option:
System
Application
both a & b
none of the given
Quiz Start Time: 10:47 PM Time Left 84
sec(s)
Question # 8 of 15 ( Start time: 10:53:32 PM ) Total M - 1
Quantum Mechanics is the branch of _____ ; which describes the activity of subatomic particles.
Select correct option:
Chemistry
Computer Science
Physics
None of the given choices
Quiz Start Time: 10:47 PM Time Left 87
sec(s)
Question # 9 of 15 ( Start time: 10:54:22 PM ) Total M - 1
Which one of these is NOT an example of embedded computers
Select correct option:
Microwave oven
IMB PC
Refrigerator
Calculator
Quiz Start Time: 10:47 PM Time Left 82
sec(s)
Question # 10 of 15 ( Start time: 10:55:51 PM ) Total M - 1
Which of the following is a computer storage device that saves and retrieves the data when required?
Select correct option:
Hard Disk
RAM
ROM
None of the given choices
Quiz Start Time: 10:47 PM Time Left 85
sec(s)
Question # 11 of 15 ( Start time: 10:57:22 PM ) Total M - 1
World wide web is a collection of web pages which is:
Select correct option:
logically unified
physically distributed
logically combined
logically unified and physically distributed
NEXT
Quiz Start Time: 10:47 PM Time Left 86
sec(s)
Question # 12 of 15 ( Start time: 10:58:23 PM ) Total M - 1
Computer directly understand the _________ language
Select correct option:
human
high level
machine
none of given
Quiz Start Time: 10:47 PM Time Left 84
sec(s)
Question # 13 of 15 ( Start time: 10:59:22 PM ) Total M - 1
Algorithm is a __________________
Select correct option:
Definition of a problem
Sequence of steps to solve a problem
Understanding of a problem
Solving a problem
Question # 13 of 15 ( Start time: 10:59:22 PM ) Total M - 1
Algorithm is a __________________
Select correct option:
Definition of a problem
Sequence of steps to solve a problem
Understanding of a problem
Solving a problem
Quiz Start Time: 10:47 PM Time Left 87
sec(s)
Question # 15 of 15 ( Start time: 11:01:03 PM ) Total M - 1
Bit is originated from………………
Select correct option:
Decimal
Binary
Hexadecimal
Octal
0 comments: