---------- was known as
“mill” in Analytical engine.
► Memory ► Processor ► Monitor ► Mouse Ref: An arithmetical unit (the "mill") would be able to perform all four arithmetic operations, plus comparisons and optionally square roots. Initially it was conceived as a difference engine curved back upon itself, in a generally circular layout,[2] with the long store exiting off to one side. First electronic computer was ► ABC ► UNVAC 1 ► Harvard Mark 1 ► IBM PC What is NOT a key factor while designing a website? ► Usability ► User-friendly ► Consistency ► Complexity What happens if I start a new list without closing the original one? ► An error will be generated ► A nested list will be created ► Previous list will end and a new will start. ► Nothing will happen The most upper right pixel of the screen is of ___________ color. ► Any ► Red ► Green ► Blue A single pixel can acquire approximately ___________ color schemes. ► 1 million ► 2 million ► 10 million ► 16 million The idea of Neural Networks field is based upon ______________. ► Human nature ► Human brain ► Human culture ► Human actions Which one of the following is an application for artificial intelligence? ► Robotic ► Web Agent ► Decision Support System ► All of the given options Register is a kind of ______memory ► Fast ► Super fast ► Slow ► Very slow Which of the following is a true statement? ► Flat-file storage is better than tabular storage. ► Tabular storage is better than flat-file storage. ► Flat-file storage is better than relational storage. ► None of the given options substring(n, m) returns a string containing characters copied from position n to___________. ► m – 2 ► m – 1 ► m + 1 ► m The __________ is the old profession which is being eliminated because of computing. ► Typist ► Bank manager ► Operational manager ► All of the given options The system that manages relational database, is called ______________. ► None of the given options ► Database Management System ► Data Management System ► Relational Database Management System When web server is busy it gives the following message to the user : ► Time out??? ► Waiting ► Server busy ► None of the given options The group of technologies concerned with the capturing, processing and transmission of information in the digital electronic form is called _____________. ► Telecom Engineering ► Computer Engineering ► Computer Science ► Information Technology _____________ team consists on the sharpest technical minds in the company. ► Architecture ► Business Development ► Configuration Management ► Developer TCP stands for ________. ► Transfer Center protocol ► Transmission Control Protocol ► Transmission Center Protocol ► Telephone Center Protocol A collection of data organized in such a way that the computer can quickly search for a desired data item is known as : ► Retrieving ► Database ► Information ► DBMS Microsoft Word is a type of: ► System Software ► Freeware Software ► Shrink-Wrapped Software ► Custom-built Software Users __________, how things work. ► Analyze in detail ► Muddle through ► Figure out ► Read in detail Popular schemes used for reducing bytes for storage are: ► RGB and Color mapping ► RGB and Dithering ► RGB, Color mapping and Dithering ► Color mapping and Dithering Hardware malfunctions is related to ► Data updates ► Data integrity ► Data security ► Data accessibility If incorrectly we enter the negative age it is check by ► Limit Integrity ► Type Integrity ► Referential Integrity ► Physical Integrity Which is the user-friendly way of presenting data ? ► Query ► Form ► Report ► All of the given options Currently the BlueRay DVD can store more than ________ of data. ► 10 GB ► 100 GB ► 50 GB ► 150 GB In JavaScript, a || b is interpreted as ► a is true or b is false ► a is true and b is true ► a is false and b is true ► a is true or b is true or both are true Speakers fall into the hardware category. ► True ► False onBlur event is occurred for a form element when it ____________ ► Gets focus ► Losts focus ► Some thing is typed in ► onBlur is not an event You can view a 3-D image on a _____________. ► 3-D display ► 2-D display ► On both 2-D and 3-D displays ► We can not view a 3-D image Module level design and unit testing is the responsibility of _____________. ► Team Lead ► Developer ► Project Manager ► Quality Assurance Expert ===================================== Using Java Script you can write a character at random location on screen ► By applying randomCh() method ► With the help of String object ► With the help of random character property ► There is no built in approach in Java Script The Encryption of data is related to ► Data updates ► Data security ► Data integrity ► Data accessibility Which protocol is use to transfer a file over the network ? ► UDP ► FTP ► TCP ► OSI One can send an email message to a remote computer using _______ protocol ► HTTP ► SMTP (Page # 173 of Handouts) ► FTP ► TELNET In a System having many parts to be designed, one should always do the _____ first ► Hard part ► Simple part ► Development part ► Quality part Flow control constructs in JavaScript includes: ► If-Else ► Loops and If -Else ► Switch and If-Else ► All of the given choices ___ provides a simple, consistent way for applications to interact with the HW without having to know all the details of the HW ► Explorer.exe ► System Files ► Operating System ► Application Software Machine language is also called ► Assembly Language ► Binary Language?? ► High Level Language ► HTML Language _________ is the best known builder for supercomputers. ► Sun ► Cray Research ► Microsoft ► Apple The weaknesses of the computer are: ► Pattern recognition & Storage ► Speed & Innovative ideas ► Pattern recognition & Innovative ideas ► Speed & Storage Communication protocol is a __________that governs the flow of information over a network ► Set of methods ► Set of protocols ► Set of rules ► Device _____________ team is responsible for the maintenance, expansion , improvement of the infrastructure consisting of workstations, networking equipment, software and network security. ► Support??? ► Configuration Management ► Quality Assurance ► Developer _______________ is responsible for day to day operations. ► CEO ► COO (Page # 294) ► CMSO ► Developer One of the key responsibilities of the ___________ is client relationship management. ► Project Manager (Page # 293) ► Team Lead ► Developer ► Quality Assurance Engineer What is the major problem with flash based website? ► Its two heavy ► Cannot be indexed ► Less attractive ► Inaccessible Which of the following is NOT an event handler for image object? ► onAbort ► onError ► onLoad ► onUser The organizations are learning that business can be done in a more effective manner if emphasis is placed upon ___________. ► Cooperation ► Shared responsibility ► Networking ► All of the given options (Page # 273) country=”Hello Pakistan”; document.write(country.charAt(6)); The out put of the above statement is _____________. ► o ► P ► a ► k a = Math.abs(-23) What will be the value of a ? ► 23 ► -23 ► 23.0 ► 2.3 ERP is a type of ______________ . ► Entertainment software ► Productivity software ► Business software ► Scientific software In Genetic Algorithm the most important thing you should know, is the ___________. ► Procedure ► Recognition of a good solution ► Different techniques ► None of the given options According to a popular heuristic, success is defined by ___________. ► The user ► The builder ► Both user and builder ► None of the given options Rule of thumb learned through trial and error is called ___________. ► Design ► Heuristic ► Plan ► Aim Which function returns a randomly selected floating point number between 0 and 1 ? ► floor(x) ► ceil(x) ► random() ► round(x) Functions are also called: ► Heuristics ► Variables ► Arrays ► Subprograms In JavaScript, each element of array can store data of type ► A Number ► An Array ► A String variable ► All of the given choices Processed data is called ________. ► Information ► Data ► Entity ► Attribute Many developers write the _________ first and then incrementally convert each line into _________. ► Real code & Pseudo code ► Pseudo code & Real code ► Real code & Artificial code ► None of the given options When we buy a software package, we do not really buy it, we just by a license that allows us to use it, the ___________stays with the maker. ► Agreement ► Ownership ► Membership ► Software Name, Border, Source are the ____________ of the image object. ► Event Handler ► Properties ► Methods ► None of the given options Using smart editors they can automatically color different parts of statements in different colors e.g. HTML tags in ____________ color. ► Green ► Grey ► Blue ► None of the given options ____________ is in Executive team. ► Project Manager ► CEO ► Team Lead ► Developer _____________ team is responsible for a project after the specification’s stage till the very end. ► Executive ► Architect ► Development ► HR _____________ waits for some time and then launch a function. ► Timeout( ) ► setTimeout( ) ► setTime( ) ► setTimeIn( ) ______________ is a field that uniquely identifies each record stored in a table. ► Composite Key ► Primary key ► Foreign key ► None of the given options Distance learning has got a boost due to the ___________. ► Easy communication ► Online interactive contents ► Flexibility ► All of the given options By default in a web page Hyper Link for another web page is represented as ________________ ► Blue only ► Black and Underlined ► Blue and Bold ► Blue and Underlined To store rounded number of 8.6 in a variable called "r_number", we write _____________. ► r_number=Maths.round(8.6) ► r_numbers=Maths.rounds(8.6) ► r_number=Math.rounds(8.6) ► r_number=Math.round(8.6) Which one is the best option for designing a Medical Expert System? ► Rule Based System ► Genetic Algorithm ► Fuzzy Logic ► Neural Network Variables allow us to manipulate data through the ___________. ► Actual Value ► Reference ► Length ► Name Which is correct? ► onUnload ► onUnLoad ► onUNLOAD ► All of the above Capturing events and responding to them is called __________. ► Function Handling ► Event Handling ► Event Procedure ► All of the given option ___________ color should be used in background for a good presentation. ► Light ► Dark ► Red ► None of the given options Which of the following symbol is used for multiple line comments in JavaScript? ► / ► // ► /* ► //* In JavaScript, what will be the result of the follwoing operation 79%3 ► 0 ► 1 ► 2 ► 3 A new cell using HTML is added in table row by ► <TC>…</TC> ► <TR>…</TR> ► <TD>…</TD> ► <NC>…</NC> _________ ///////////// ///////////// ------------ It represents the ____________ flow chart element. ► Process ► Input or Output ► Decision ► Connector Vacuum tubes were replaced by ___ ► Punch cards ► Transistors ► Micro Processors ► Resistors ================= Which of the following hardware component of a computer can also be called as engine? ► Bus ► Storage ► Memory ► Processor __________ breaks down the message to be sent over the internet into packets. ► FTP ► HTTP ► TCP ► IP A variable can be _________ in scope. ► Local ► Global ► Either local or global ► None of the given options A protocol used for receiving email messages is called ____________. ► URL ► Telnet ► POP3 ► SMTP A function is also called __________. ► Sub-program ► Procedure ► Sub-routine ► All of the given option a = Math.ceil(12.01) What will be the value of a ? ► 12 ► 13 ► 12.0 ► 13.01 Event handlers are placed in the ___________ portion of a Web page as attributes in HTML tags. ► HEAD ► BODY ► SCRIPT ► TITLE _________ can be used for entering, editing, or viewing data, one record at a time. ► Queries ► Forms ► Reports ► None of the given options random() function returns a randomly-selected, floating-point number between ____________. ► 0 and 1 ► 0 and 10 ► 0 and -10 ► 0 and -1 In relational database, data store in the form of _____________. ► Tables ► Rows ► Columns ► None of the given options Spies of one business monitoring the network traffic of their competitors’ ___________. ► Industrial Intelligence ► Industrial Espionage ► Industrial Spying ► Industrial Surveillance _______________ based communication allows business entities to coordinate the activities of their globally spread units with greater accuracy. ► Intranet ► Internet ► Home ► LAN Smart editors can automatically color different parts of statements in different colors e.g. comments in ____________ color. ► Green ► Grey ► Blue ► Red Deep Blue was the name of ► computer ► human ► city ► game Information available on the web is ► mostly free of cost ► costly ► very cheap ► of no use Which one is correct? ► <BODY></BODY> ► <body></body> ► Both <BODY></BODY> and <body></body> ► <BODY/> Which one is the example of spreadsheet software ? ► MS Word ► MS PowerPoint ► MS Excel ► MS Access Blue Pacific is a name of ______ computer. ► Mini ► Desktop ► Micro ► Super _________________ are powerful pieces of hardware, but not much useful on their own. ► Microcontrollers ► Microprocessors ► Integrated circuits ► Ports ========================== URL is a/an ________ ► Device ► Component ► Address ► Tool To improve the time for scannig a web page, text should be ___________. ► Centered ► Left Aligned ► Right Aligned ► Staggered Communications on the internet is controlled by a set of two protocols which are ____________. ► IMAP and SMTP ► FTP and HTTP ► TCP and IP ► TCP and HTTP FTP stands for __________. ► File transmission protocol ► File transmission path ► File transfer protocol ► Fine transfer path A named collection of properties (data, state) and methods (instruction, behavior) is called ____________. ► Array ► Function ► Variable ► Object Anchor tag denoted by <A> is used to create ► Address ► Hyperlink ► Paragraph ► Title <UL> tag is used to ► underline text ► end the line ► create ordered list ► create unordered list A user may access any item on the web through __________. ► URL ► Telnet ► POP ► SMTP The browser breaks down the URL into ________ parts. ► 2 ► 3 ► 4 ► 5 Which one of the following is NOT a primary color? ► Red ► Green ► Yellow ► Blue __________ are those programs in which the flow of the program is determined by the user's actions (mouse clicks, key presses) or messages from other programs. ► Event called programs ► Event processed programs ► Event driven programs ► Event declared programs Automatic machines performing various tasks that were previously done by humans, are called ____________. ► Robotics ► Computers ► Decision Making Systems ► Autonomous Web Agents The distance among families is ___________ because of spending more time on internet. ► Increased ► Expanded ► Contracted ► Decreased The software used for the scanning of internet severs, is called __________. ► Wscan ► Mscan ► Sscan ► Vscan Adding images to html page, we use______ tag. ► <IMG> ► <IMAGE> ► <PICTURE> ► <PIC> The responsibilities of the Team Lead includes_____________. ► Planning and tracking of the project ► Detailed design ► Professional development of team members ► All of the given options When the packets reach at destination, __________ reassembles them into original message. ► Protocol ► TCP ► IP ► NIC In JavaScript, second element of an array has the index: ► 2 ► 0 ► 1 ► 3 One can download or upload files to a remote computer using ________ protocol. ► HTTP ► SMTP ► FTP ► TELNET JavaScript ________ support drawing of graphics ► Does ► Does not ► Always ► At times Which of the following is NOT true about modern computers? ► More powerful ► Smaller in size ► Consume less energy ► Costly Ada written a computer programme for ? ► Analytical Engine ► Difference Engine ► Harvard Mark 1 ► Mechanical engine A set of stand alone productivity applications designed to work together known as ______________ . ► Productivity software suites ► Compiled software ► Secure software ► Intelligent software |
RE: CS101
Solved Quiz
Which of the
following is True about “pareseFloat(String)” function: I) If the first
character cannot be converted to a number, parseFloat returns NaN. II) it
returns the fractional portion of floating point number. III) Parses the
string argument; returns a FP number. IV) Non of given options.
I and II Only II and III Only I and III Only IV Only Which variables can make the logic of a Web page difficult to understand? Global Local Both Global and Local None of the given choices Infection propagation and Actual destructive are the components of _______________ Transmission mechanism Payload Worms Trojan Horse One of the key responsibility of the ___________is client relationship management Team Lead Project Manager Developer Chief Executive officer A method that rounds a number to its nearest integer is: Math.round( ) Math.Round Rnd() Round() The code in the ______ portion is the right choice for developing larger JavaScript scripts Body At End Head Separate Program(s) used for writing, sending, receiving, and displaying E-mail messages are: SMTP server E-mail client POP3 server All of the given choices JavaScript Arrays are _______________ Homogeneous Heterogeneous Homogeneous and Heterogeneous None of the given choices Which of the statements is true in context of developing a presentation? Use simple slide transitions. Too many different transitions are distractive Use any level of transitions as it doesn’t effect, what you present Normally text is more preferable than images as they are difficult to perceive All of the given options __________ is a collection of data organized in such way that the computer can quickly search for a desired data item. Select correct option: Data Base DBMS Data Mining File System RGB scheme stands for _______________________________. Select correct option: Red Grey Blue Red Green Brown Red Green Blue Red Green Black hotWeather = (Temperature == 40); in the above statement, the variable hotWeather is of type Number String Boolean None of the given ____________ images enhanced to impart the illusion of depth. Select correct option: Parallel Diagonal Flat None of these ___ is a smallest unit of data transmitted over a computer network. Select correct option: Frame Packet Message None of the given choices Yahoo Servers was recovered, from DoS attack, within ___ 12 hours 3 hours 24 hours 3 days Event-driven programs can __________________ events. capture respond capture and respond None of the Given. In 1969,DoD-ARPA created an experimental network as a test-bed for emerging networking technologies, the name of this network was: LAN ARPA ARPANET DoD-ARPA __________ is a type of computer-to-computer messaging. TCP Telnet FTP In Which topologies, network is not affected if one computer goes down? Star & Bus Bus & Ring Ring & Star None of the given choices The greatest, shared resource of information created by humankind is: Select correct option: Web Dictionary Vocabulary Glossary Function definition enclosed in a _____________ pair of curly braces
Pair of
parenthesis
Pair of Brackets All of the Given. One of the disadvantages of working at home is______________ Contact with the colleagues and the quality of communication is increased, which may result in a poorer quality of work Contact with the colleagues and the quality of communication is reduced, which may result in a poorer quality of work Contact with the colleagues and the quality of communication is reduced, which may result in a high quality of work There is no disadvantage of working at home. _________ is a field that uniquely identifies each record stored in a table Select correct option: Key Primary Key Foreign Key Query With the Help of FTP we can: List, change, create folders on a remote computer Upload and download files Transferring Web content from the developer’s PC to the Web server All of the given choices Table rows are called _________________ Records Fields Identifiers Data Credit Card Fraud can be minimized by using _______________ single credit card numbers multiple-use credit card numbers single-use credit card numbers Firewalls Using ___________ networks access is restricted to authorized computers only. Public Private Both Public & Private None of the given choices The solution of the Mail Bombing is ______ Select correct option: Filtering Do not accept emails eMail filtering JPEG stands for ___________________________________. Joint Photographic External Group Journal Photographic Experts Group Joint Photographic Experts Group None of these DBMS stands for ___________. Data Base Management System Data Base Mining System Data Base Merge System Data Base Manipulation System The process of converting information about 3-D objects into a bit-map that can be displayed on a 2-D computer display is called _____________________. Select correct option: C Rendering D Rendering E Rendering None of these ______________ are used for transferring files between computers on TCP/IP network. FTP DNS Telnet None of these The system that manages relational database is called _____ Database Management System Data Management System Relational Database Management System Flat-File System Unlike viruses, ________________ are stand-alone programs Trojan horses Logic- or time-bombs Worms None of the given There are ___________ types communication channels. 2 (correct option) wire and wireless 3 4 5 ___________ is the part of the virus that generally consists of malicious computer instructions Off load Payload Loader Transmitter The community in which members with common interest share ideas, ask questions, post answers and make announcements through mailing-lists, news groups or message boards is called _____ Select correct option: Geographical-based community Interest-based community Country-based community City-based community The Cyberwarefare is a ____ Crime War Software Game _________ converts computer messages to electrical pulses that are suitable for transmission over the telephone line. Modulator Demodulator Modulator and Demodulator Which of the following is incorrect for making design elements legible? Elements should be large enough Elements must contrast sufficiently Related elements should be visually grouped Elements should have no visual focus Which of the statements is NOT true about “Color Usage Guidelines” for developing a presentation? Use color sparingly to to highlight a point, but don't get carried away Do not use colors like yellow or red for background except where needed. Do not use colors like green, blue and such like colors except where needed. None of given options The output of statement “parseInt ( “3.1526” );” will be: 3 3.1526 3.2 NAN Tribal Flood Network is a _________ DoS Software Scanning Software Arming Software Network-related VoIP stands for ___________________________________ Video over Internet Protocol Visual on Internet Protocol Voice over Internet Protocol None of these MATH functions are accessed by referring to various ______________of the Math object Functions Events Properties Methods in motion is called __________________. Select correct option: Animation Screening Rendering None of these Internet is also know as: LAN Network Network of Networks All of the given choices There are mainly two types of networks according to network access policy namely : Public & Commercial Private & Public Private & Non- Private None of the given choices Internet is an example of ____________ network. Private Public Both Private and Public None of the given choices CERN releases WWW in: 1992 1993 1994 None of the given choices Function definition enclosed in a _____________ pair of curly braces Pair of parenthesis Pair of Brackets All of the Given. _______________ are harmful in the sense that it can use up available computer resources (i.e. memory, storage, processing), making it slow or even completely useless Trojan horses Logic- or time-bombs Worms Intrusions The ____________ is the Advantage of Functions. Number of lines of code is reduced Code becomes easier to read & understand Code becomes easier to maintain as changes need to be made only at a single location instead multiple locations All of the Given Normal range of text lines for an effective presentation is: 3 to 7 7 to 10 10-12 May be any number ________ is a network of computer that are lying within the same building or in a vicinity. LAN WAN LAN and WAN None of the given choices To stop Industrial Espionage we use_________ Private networks Encryption Network sniffers All of the given The pattern in which computer are connected together to form a network is called : Network Topology Network Transmission Network Protocol None of the given choices ____________executes its payload when a predetermined event occurs Trojan horses Logic- or time-bombs Worms Spyware One can run a program on a remote computer using the ____________ protocol. SMTP TELNET FTP None of the given choices Files can be downloaded or uploaded using ________________ protocol. SMTP FTP TELNET None of the given choices ________________ are the effective and user-friendly way of presenting summarized data Forms Reports Queries Tables Because of the ever-decreasing costs of verbal, text, video communications; the distances have _______ Increased Expanded Contracted Lengthened ______________ are used to view, change and analyze data Forms Reports Queries Tables The most common type of Relational database for server is _______________ Select correct option: Access Oracle MySQL Excel SMTP stands for _____________________________________. Simple Mail Transfer Protocol Simple Mail Transparent Protocol Simple Mail Transfer Paradigm None of these __________ addresses are difficult to recognize and remember for humans. TCP IP SMTP None of these Which of the following is termed as a P2P connection ? Select correct option: Client-less connection Server-Oriented connection Server-less connection Server-client connection Whenever a contact in our list comes online, who informs us through an alert message and by playing a sound ? Select correct option: IM server IM client Client Server A hardware device that stores data and programs, executes program instructions, and performs arithmetic/logic operations is known as the ____. a) CPU b) Integrated Circuit c) Main Storage d) Memory Viruses move from one computer to another with the ________ and spring into action when the ___________ is executed or opened Host – Host Host – Client Client – Host Client – Client In Cyberwarefare __________________. You attack the enemy You attack the telecommunication system You fire missile All of the given The first virus that spread world-wide was the ___________ virus. Brain Heart Skull Soul What is the 3rd step of DoS attack? Racy Arm Search Attack Cyber Crime is possible because of ________ Computer Networks Internet Websites Which of the following is a meaningful, easy-to-remember ‘label’ for an IP address Internet Domain Name Internet Service Provider Domain Name System We use ________ to stop Break-Ins. Scanners Intrusion detectors Firewalls Intrusion detectors and Firewalls A stream of large-sized eMails are sent to an address, overloading the destination account is called. Select correct option: DoS attack Break-Ins Mail Bombing All of the given The structure of the networked organization is _______. Simple Flexible Complex All of the given In the statement “PopUp(“Message”)” : “PopUp” is the function Name, “Message” is the argument “Message” is function identifier Syntax Error: functions cannot be called in this way Error: function is undefined The part of the virus that generally consists of malicious computer instructions is called_____________________ Infection propagation component Actual destructive component Payload Transmitter The __________ virus may destroy or broadcast private data. Malicious Neutral Helpful DoS ____________ are an effective, user-friendly way of presenting data. Reports Queries rows Columns Images in _______ can be manipulated in many ways using the built-in object Image. HTML XML JavaScript none of the given __________has changed our way of life like no other technology. Computational technology Computer technology Computing technology None of the Above JavaScript Array can hold elements of __________ simultaneously. Single data types Multiple data types Integers and strings only Integers and characters only _____ uses public telecom infrastructure, maintaining privacy through security procedures. Private Network Public Network VPN None of the given choices The ________virus may display an annoying, but harmless message Malicious Neutral Helpful DoS Bit-map images compresses using the ___________ algorithm. LZV LZW LZE None of these Each packet contains the following information Sender’s address Data Error recovery information None of the given choices NIC stands for : Network Interface Card Network International Card Network Interface Control None of the given choices |
P.S :
Correct these answers.
Yahoo Servers was recovered, from DoS attack, within ___
12 hours
3 hours
24 hours
3 days
Credit Card Fraud can be minimized by using _______________
single credit card numbers
multiple-use credit card numbers
single-use credit card numbers
Firewalls
Correct these answers.
Yahoo Servers was recovered, from DoS attack, within ___
12 hours
3 hours
24 hours
3 days
Credit Card Fraud can be minimized by using _______________
single credit card numbers
multiple-use credit card numbers
single-use credit card numbers
Firewalls
thanks
ReplyDeleteVirtual University Past Papers: Cs101 >>>>> Download Now
Delete>>>>> Download Full
Virtual University Past Papers: Cs101 >>>>> Download LINK
>>>>> Download Now
Virtual University Past Papers: Cs101 >>>>> Download Full
>>>>> Download LINK 7a
Download Past papers for all subjects single click
ReplyDeletehttps://vukwl.blogspot.com/search/label/Past%20Papers