CS101 Grand Quiz

Download  solved Midterm Grand Quiz 2020

CS101 Solved Midterm Grand Quiz 2020

Download old solved quiz’s here 

CS101 Quiz Mega Files Lecture 1 To 17

CS101 QUIZ NO 1 SOLVED FALL 2015

CS101 Quiz No-1 Fall 2013

CS101 SOLVED QUIZ NO 1 FALL 2017

CS101 SOLVED QUIZ NO-1 2014

CS101 Solved Quiz No-1 2012

CS101 SOLVED QUIZ NO-1 Fall 2010

CS101 SOLVED QUIZ NO-1 FALL 2012.

CS101 SOLVED QUIZ NO-1 FALL 2013

CS101 SOLVED QUIZ NO-1 FALL 2013

CS101 SOLVED QUIZ NO-1 FALL 2014

CS101 Solved Quiz no-1 Fall 2015

CS101 SOLVED QUIZ NO-1 FALL NOVEMBER 2012

CS101 Solved Quiz No-1 with Reference

CS101 Solved Quiz No-2 2012

CS101 Solved Quiz No-2 Reference by Zeeshan

CS101-Solved Quiz Reference by Masroor

HERE YOU CAN ALSO FIND MIDTERM SOLVED MCQ’S WITH REFERENCE BY MOAAZ, WAQAR SIDDHU, AND OTHER STUDENTS… CLICK ON LINK BELOW…

MIDTERM MOAAZ SOLVED PAPERS

MIDTERM WAQAR SIDDHU SOLVED PAPERS

MIDTERM SOLVED MCQ’S BY OTHER STUDENTS

MIDTERM SOLVED OLD QUIZ’S

Question # 1 of 15
Which of the following is used to attain something productive as opposed to games or entertainment softwares?
System software
Application software
Programming software
Productivity software

Question # 2 of 15
Altair 8800 was based on _ processor
Inter 4004
Intel 8080
Intel 386
Pentium

Question # 3 of 15
Which one of the following is “built-in” computer memory containing data that normally can only be read , not written to?
RAM
ROM 000
Cache Memory
Magnetic Memory

Question # 4 of 15
This principle called the “Ockham’s Razor,” states when choosing among competing, successful solutions to a problem; choose the one which is the least __
Time Consuming
Ambiguous
Complex 000
Restricted

Question # 5 of 15
By default in a web page Hyper Link for another web page is represented as:
Blue only
Black and Underlined
Blue and Bold
Blue and Underlined

Question # 6 of 15
(a) _ is the concept embedded in an algorithm (the soul!) and (b) is the actual representation of an algorithm (the body!)
(a) Semantics (b) Syntax 000
(a) Syntax (b) Semantics
(a)Code (b) Logic
(a) Sequence (b) Flow Chart

Question # 7 of 15
_ is an application program that provides a way to look at and interact with all the information on the World Wide Web.
URL
Browser 000
HTML
HTTP

Question # 8 of 15
First computer designed for commercial applications was:
UNIVAC 1
ENIAC
EDVAC
Attanasoff-Berry Computer

Question # 9 of 15
Which one of the following is a really fast port that lets you connect computer peripherals and consumer electronics to your computer without the need to restart?
Freeware
Shareware
Fire wire 000
Firmware

Question # 10 of 15

In which of the following operating systems the availability of sufficient and separate resources is ensured for various users simultaneously:
Single-User
Multi-User
Batch type
Desktop

Question # 11 of 15
Compared to vacuum tubes, Transistors offer:
Much smaller size
Better reliability
Much lower cost
All of the given choices

Question # 12 of 15
What was the name of first commercial supercomputer?
UNIVAC 1
EDVAC
Cray 1
Altair 8800

Question # 13 of 15
Which one of the following register types stores SIMD instructions?
General Registers
Vector Registers
Data Registers
Address Registers

Question # 14 of 15
A data cell of a table contain
only text
images
tables
all of the given

Question # 15 of 15
Grace Hopper of US Navy develops the very first_______compiler
Low-level Language
High-level language
Both high and low level language
None of the given choices

Question # 1 of 15
Babbage’s Analytical Engine could store information permanently in:
Magnetic Tape
Floppy Disk
Punched Cards
None of the given choices

Question # 2 of 15
1 byte consists of _ bits.
10
9
8
None of the given choices

Question # 3 of 15
The name of very first computer was:
ABC
BCD
EDC
None of the given choices

Question # 4 of 15
Quantum Mechanics is the branch of _ ; which describes the activity of subatomic particles.
Chemistry
Computer Science
Physics
None of the given choices

Question # 5 of 15
First computer designed for commercial applications was:
UNIVAC 1
ENIAC
EDVAC
Attanasoff-Berry Computer

Question # 6 of 15
Greedy algorithms are usually faster, since they don’t consider the details of possible alternatives
True
False

Question # 7 of 15
Intel 8088 took __ cycles to execute.
80
15
20
50

Question # 8 of 15
Algorithm is a ________
Definition of a problem
Sequence of steps to solve a problem
Understanding of a problem
Solving a problem

Question # 9 of 15
Pseudo Code, Structured flow charts and Actual code are used for representing Algorithms.
True
False

Question # 10 of 15
Byte is a combination of……………
8 bits
16 bits
32 bits
4 bits

Question # 11 of 15
software sits on top of ___ software for performing user tasks.
System, Application
System, Productivity
Application, System
System, Programming

Question # 12 of 15
A 1.5 G. HZ Microprocessor approximately contains:
30 Million Transistors
25 Million Transistors
10 Million Transistors
50 Million Transistors

Question # 13 of 15
Linux and Mac are examples of :
Uni processor OS
Multi processor OS

Question # 14 of 15
JavaScript can be used along with HTML to ______.
style the Web
secure the web page
make content interactive
color the web page

Question # 15 of 15
__ are personal computers that are designed to be easily transported and relocated
Desktops
Portables
Servers
Workstations

CS101 Q1. Computers are good at:
Speed
Storage
Never bored
All of the given choices

CS101 Q2.Grace Hopper of US Navy develops the very first_______ compiler

Low-level Language
High-level language
Both high and low level language
None of the given choices

2.5 Harvard Mark 1 – 1943:

Howard Aiken and Grace Hopper designed the MARK series of computers at Harvard University. The MARK series of computers began with the Mark I in 1944. Imagine a giant roomful of noisy, clicking metal parts, 55 feet long and 8 feet high. The 5-ton device contained almost 760,000 separate pieces. Used by the US Navy for gunnery andballistic calculations, the Mark I was in operation until 1959. The computer, controlled by pre-punched paper tape, could carry out addition, subtraction, multiplication, division and reference to previous results. It had special

subroutines for logarithms and trigonometric functions and used 23 decimal place numbers. Data was stored andcounted mechanically using 3000 decimal storage wheels, 1400 rotary dial switches, and 500 miles of wire. Its electromagnetic relays classified the machine as a relay computer. All output was displayed on an electric typewriter. By today’s standards, the Mark I was slow, requiring 3-5 seconds for a multiplication operation

(p14

CS101 Q3.The first Web browser with a GUI was generally available in:

1992
1993
1994
1995

The first Web browser with a graphical user interface was generally available (Mosaic, in 1993), the term seemed to apply to Web content, too. Technically, a Web browser is a client program that uses the Hypertext Transfer Protocol (HTTP) to make requests of Web servers throughout the Internet on behalf of the browser user.(18

The name of first program-controlled machine was:
ENIAC
Attanasoff-Berry Computer
Harvard Mark 1
Pentium

Harvard Mark 1 – 1943

Howard Aiken of Harvard University
The first program controlled machine
Included all the ideas proposed by Babbage for the Analytical Engine
The last famous electromechanical computer
CS101 Q4. If a computer could pass the Turing test then it would be able to:

win a million dollar prize
think like human begins

SOLVED by PrIncess Sassi

www.vuzs.info

think but slower than humans
do the things faster

2.2 The “Turing test”

A test proposed to determine if a computer has the ability to think. In 1950, Alan Turing (Turing, 1950) proposed a method for determining if machines can think. This method is known as The Turing Test. (13

Q5.The name of programming language, specifically designed by the US Department of Defense for developing military applications, was:

Smalltalk
C
C++
Ada

Ada: A programming language specifically designed by the US Dept of Defense for developing military applications was named Ada to honor her contributions towards computing(p9

Q6.TCP Stands for:

Transmission Control Principles
Transmission Control Protocol
Transformation Control Protocol
Translation Control Protocol

Communications on the Internet is controlled by a set of two protocols: TCP and IP TCP/IP Transmission Control Protocol/Internet Protocol Networking protocol used by all computers and networks on the Internet Originally developed by the US DoD for Unix, but now available for most other OSes TCP breaks down the message to be sent over the Internet into packets IP routes these packets through the Internet to get them to their destination When the packets reach the destination computer, TCP reassembles them into the original message (p196

Q7.Web is a unique invention by humans in terms that it is:

accessible to all humans
accessible to only the owners who control it
accessible to particular locations only
None of the given choices

Q8.The name of first commercially available PC was:

UNIVAC 1
ENIAC
EDVAC
Altair 8800

2.9 UNIVAC 1 – 1951

UNIVAC-1. The first commercially successful electronic computer, UNIVAC I, was also the first general purpose computer – designed to handle both numeric and textual information. It was designed by J. Presper Eckert and John Mauchly. The implementation of this machine marked the real beginning of the computer era.(P14

SOLVED by PrIncess Sassi

www.vuzs.info

Q9. A strategy in which all possible combinations are examined and best one is selected called……………

Divide and conquer
Brute force
Heuristic
All of given
16.12 The Brute Force Strategy (1)

A strategy in which all possible combinations are examined and the best among them is Selected (p103

Q10.Super Computers are used in:

Weather forecasting
Aeroplane manufacturing
Atomic Bomb experiments
All of the given choices

Q11.ENIAC was first____ Computer
Large-scale
General-purpose
Electronic
All of the given choices

Reference: ENIAC – 1946:

ENIAC I (Electrical Numerical Integrator And Calculator). The U.S. military sponsored their research; they needed a calculating device for writing artillery-firing tables (the settings used for different weapons under varied conditions for target accuracy).(p14)

Q12.Which one of the following units can be called as the brain of computer microprocessor?

ALU (Arithmetic & Logic Unit)
FPU (Floating Point Unit)
Control Unit
Bus Interface Unit

Reference: A control unit is the part of a CPU or other device that directs its operation. The outputs of the unit control the activity of the rest of the device. A control unit can be thought of as a finite state machine. It is called the brain of computer microprcessor. (p36

Q13.Which one of the following is a really fast port that lets you connect computer peripherals and consumer electronics to your computer without the need to restart?

Freeware
Shareware
Fire wire
Firmware

Ref.
FireWire is simply a really fast port that lets you connect computer peripherals and consumer electronics to your computer without the need to restart. It is a simple common plug-in serial connector on the back of your computer. It has the ability to chain devices together in a number of different ways without terminators for example, simply join 2 computers with a FireWire cable for instant high-speed networking.(P24 )

SOLVED by PrIncess Sassi

www.vuzs.info

Q14.The name of programming language, specifically designed by the US Department of Defense for developing military applications, was:

Smalltalk
C
C++
Ada

Ref.
Ada: A programming language specifically designed by the US Dept of Defense for developing military applications was named Ada to honor her contributions towards computing(p9

Q15 Which one of these is NOT an example of storage devices?

CD
Floppy
Hard Disk

Q16 Which category of computers lies between Workstation and Mainframe computers?

Microcomputer
Desktop
Laptop
Minicomputer

4.4 Servers / Minicomputers A midsized computer. In size and power, minicomputers lie between workstations and mainframes. In the past decade, the distinction between large minicomputers and small mainframes has blurred, however, as has the distinction between small minicomputers and workstations. But in general, a minicomputer is a multiprocessing system capable of supporting from 4 to about 200 users simultaneously.(21

Q17 Algorithm is a precise sequence of a limited number of _ , ___________steps that terminates in the form of a solution

Ambiguous, Executable
Nondeterministic, Finite
Finite, countable
Unambiguous, executable

Ref

1st Definition:
Sequence of steps that is taken to solve a problem
Better Definition:
A precise sequence of a limited number of unambiguous, executable steps that terminates in the form of a solution

Q18 Which one of the following web programming languages used to do client-side scripting?

ASP
Server Side JavaScript
PHP
VBScript

We’ll use JavaScript to do client-side scripting. However, there are many other languages p119

SOLVED by PrIncess Sassi

www.vuzs.info

Q19 This principle called the “Ockham’s Razor,” states when choosing among competing, successful solutions to a problem; choose the one which is the least __

Time Consuming
Ambiguous
Complex

Selecting Among Algorithms

When choosing among competing, successful solutions to a problem, choose the one which is the least

complex This principle is called the “Ockham’s Razor,” after William of Ockham – famous 13-th century English philosopher(101

Q20 _ software sits on top of software for performing user tasks.

System, Application
System, Productivity
Application, System
System, Programming

Q21 Deep Blue was the name of:

Human
Computer
City
None of the given choices

In 1997 Deep Blue, a supercomputer designed by IBM, beat Gary Kasparov, the World Chess Champion That computer was exceptionally fast, did not get tired or bored. It just kept on analyzing the situation and kept on searching until it found the perfect move from its list of possible moves (P9)

Q22 Linux and Mac are examples of :

Uni processor OS
Multi processor OS

Q23 Given the HTML code, ahsan@vu.edu.pk My email. Read the code carefully and tell what out put browser will generate?

ahsan@vu.edu.pk
ahasn@vu.edu.pk
My email ahasn@vu.edu.pk
None of the given choices

ref: right answer will be

ahsan@vu.edu.pk My email.

paste following code in any html file and view in browser

ahsan@vu.edu.pk My email.

Q24 There is a battery on the mother board to: wwwv.vuzs.info

give power to the processor
Save information when computer is OFF
Help the boot process
Save information when computer is ON

ROM

ROM is “built-in” computer memory containing data that normally can only be read, not

written to. ROM contains the programming that allows your computer to be “booted

up” or regenerated each time you turn it on. Unlike a computer’s random access memory

(RAM), the data in ROM is not lost when the computer power is turned off.

The ROM is sustained by a small long-life battery in your computer.

Q25 Alan Turing of Cambridge University presented his idea of a theoretically simplified but fully capable computer, now known as:

Analytical Engine
Turing Machine
Difference Engine
None of the given choices
Q26 _ is the example of a Web browser

Yahoo
Netscape Navigator
Web Application
Google

Q27 The Analytical Engine was machine of which type?

Programmable
Mechanical
Digital
All of the given choices

1.2. The Analytical Engine A programmable, mechanical, digital machine Could carryout any calculation Could make decisions based upon the results of the previous calculation Components: input; memory; processor; output(p 9)

SOLVED by PrIncess Sassi

www.vuzs.info

Q28 Interactive Forms are always placed between:

Body tags of a Web page
Head tags of a Webpage

Q29 Which interface on computer supports transmission of multiple bits at the same time?

Serial Port
Parallel Port
PS/2 Port
Universal Serial Bus

Parallel

An interface on a computer that supports transmission of multiple bits at the same time; almost exclusively used for connecting a printer. On IBM or compatible computers, the parallel port uses a 25-pin connector.p24

Q30 If we want to show numbers with List Items, then we use

none of the given

Q31 Trialware Softwares are used for

short period
long period
life time
none of the given
Software that can be run for a limited period of time before it is purchased. Trialware has a built-in expiration date and will cease to operate beyond that date if it has not been paid for. Also called “demoware.
Q32 Babbage’s Analytical Engine could store information permanently in:

Magnetic Tape
Floppy Disk
Punched Cards
None of the given choices

SOLVED by PrIncess Sassi

www.vuzs.info

Q33 First computer that could not only manipulate numbers but also text data as well was:

ENIAC
EDVAC
UNIVAC 1
Attanasoff-Berry Computer

ENIAC I (Electrical Numerical Integrator And Calculator). The U.S. military sponsored their research; they needed a calculating device for writing artillery-firing tables (the settings used for different weapons under varied conditions for target accuracy). John Mauchly was the chief consultant and J Presper Eckert was the chief engineer.

Eckert was a graduate student studying at the Moore School when he met John Mauchly in 1943. It took the team about one year to design the ENIAC and 18 months and 500,000 tax dollars to build it. The ENIAC contained 17,468 vacuum tubes, along with 70,000 resistors and 10,000 Capacitors.

Q34 Greedy algorithms are usually faster, since they don’t consider the details of possible alternatives

True
False

KEY ADVANTAGE: Greedy algorithms are usually faster, since they don’t consider the details of possible alternatives (P102

Q35 SCSI stands for:
Small Computer System Interface
System Common Small Integration
Silicon Computer System Interface
None of the given choices

SCSI

A port that’s faster than the serial and parallel ports but slower and harder to configure than the newer USB port. Also know as the Small Computer System Interface.(24

SOLVED by PrIncess Sassi

www.vuzs.info

Q36 Greedy algorithm does not support……………….. Situation.
Local
Global
Complex
All of given
SOLVED by PrIncess Sassi

www.vuzs.info

Q37 Which of the followings is not a Flowchart Element?
Off- frame connector
Input or output
Process
Connector
flowchart elements

Start or stop

Process

Input or output

Connector

Decision

Flow line

Off-page connector

these are all the elements of flow chart so?

Q38 During one of the international cricket tournaments, one of the teams intentionally lost a match, so that they could qualify for the next round If they had won that particular match, some other team would have qualified This is an example of a _____
Greedy algorithm
Non-greedy algorithm

Q39 Teraflop stands for:
Thousand floating point operations per second
Thousand floating point operations per hour
Trillion floating point operations per second
Trillion floating point operations per hour
SOLVED by PrIncess Sassi

CS101 Introduction to Computing MCQs 1

Question # 1 of 15 ( Start time: 02:43:44 PM ) Total M – 1

Which of the following is used to attain something productive as opposed to games or entertainment softwares?
Select correct option:

System software
Application software
Programming software
Productivity software

Question # 2 of 15 ( Start time: 02:45:04 PM ) Total M – 1
Altair 8800 was based on _ processor
Select correct option:

Inter 4004
Intel 8080
Intel 386
Pentium

Question # 3 of 15 ( Start time: 02:46:27 PM ) Total M – 1
Which one of the following is “built-in” computer memory containing data that normally can only be read , not written to?
Select correct option:

RAM
ROM 000
Cache Memory
Magnetic Memory

Question # 4 of 15 ( Start time: 02:46:59 PM ) Total M – 1
This principle called the “Ockham’s Razor,” states when choosing among competing, successful solutions to a problem; choose the one which is the least __
Select correct option:

Time Consuming
Ambiguous
Complex 000
Restricted

Question # 5 of 15 ( Start time: 02:47:54 PM ) Total M – 1
By default in a web page Hyper Link for another web page is represented as:
Select correct option:

Blue only
Black and Underlined
Blue and Bold
Blue and Underlined

Question # 6 of 15 ( Start time: 02:49:20 PM ) Total M – 1
(a) _ is the concept embedded in an algorithm (the soul!) and (b) is the actual representation of an algorithm (the body!)
Select correct option:

(a) Semantics (b) Syntax 000
(a) Syntax (b) Semantics
(a)Code (b) Logic
(a) Sequence (b) Flow Chart

Question # 7 of 15 ( Start time: 02:50:05 PM ) Total M – 1
_ is an application program that provides a way to look at and interact with all the information on the World Wide Web.
Select correct option:

URL
Browser 000
HTML
HTTP

Question # 8 of 15 ( Start time: 02:50:46 PM ) Total M – 1
First computer designed for commercial applications was:
Select correct option:

UNIVAC 1 00
ENIAC
EDVAC
Attanasoff-Berry Computer

Question # 9 of 15 ( Start time: 02:51:44 PM ) Total M – 1
Which one of the following is a really fast port that lets you connect computer peripherals and consumer electronics to your computer without the need to restart?
Select correct option:

Freeware
Shareware
Fire wire 000
Firmware

Question # 10 of 15 ( Start time: 02:52:24 PM ) Total M – 1
In which of the following operating systems the availability of sufficient and separate resources is ensured for various users simultaneously:
Select correct option:

  1. Single-User
  2. Multi-User 000
  3. Batch type
  4. Desktop

Question # 11 of 15 ( Start time: 02:53:05 PM ) Total M – 1
Compared to vacuum tubes, Transistors offer:
Select correct option:

Much smaller size
Better reliability
Much lower cost
All of the given choices 00

Question # 12 of 15 ( Start time: 02:53:21 PM ) Total M – 1
What was the name of first commercial supercomputer?
Select correct option:

UNIVAC 1
EDVAC
Cray 1
Altair 8800

Question # 13 of 15 ( Start time: 02:54:41 PM ) Total M – 1
Which one of the following register types stores SIMD instructions?
Select correct option:

General Registers
Vector Registers 00
Data Registers
Address Registers

Question # 14 of 15 ( Start time: 02:55:12 PM ) Total M – 1
A data cell of a table contain
Select correct option:

only text
images
tables
all of the given

Question # 15 of 15 ( Start time: 02:56:21 PM ) Total M – 1
Grace Hopper of US Navy develops the very first_______compiler
Select correct option:

Low-level Language
High-level language
Both high and low level language

None of the given choices

Quiz Start Time: 07:56 PM
Time Left 88
sec(s)
Question # 1 of 15 ( Start time: 07:56:08 PM ) Total M – 1
Babbage’s Analytical Engine could store information permanently in:
Select correct option:
Magnetic Tape
Floppy Disk
Punched Cards
None of the given choices
Click here to Save Answer & Move to Next Question
BC100201306 : Ahmed Raza
Quiz Start Time: 07:56 PM
Time Left 87
sec(s)
Question # 2 of 15 ( Start time: 07:56:32 PM ) Total M – 1
1 byte consists of bits.
Select correct option:
10
9
8
None of the given choices
Click here to Save Answer & Move to Next Question
BC100201306 : Ahmed Raza
Quiz Start Time: 07:56 PM
Time Left 88
sec(s)
Question # 3 of 15 ( Start time: 07:56:48 PM ) Total M – 1
The name of very first computer was:
Select correct option:
ABC
BCD
EDC
None of the given choices
Click here to Save Answer & Move to Next Question
BC100201306 : Ahmed Raza
Quiz Start Time: 07:56 PM
Time Left 88
sec(s)
Question # 4 of 15 ( Start time: 07:57:09 PM ) Total M – 1
Quantum Mechanics is the branch of
; which describes the activity of subatomic particles.
Select correct option:
Chemistry
Computer Science
Physics
None of the given choices
Click here to Save Answer & Move to Next Question
BC100201306 : Ahmed Raza
Quiz Start Time: 07:56 PM
Time Left 88
sec(s)
Question # 5 of 15 ( Start time: 07:57:38 PM ) Total M – 1
First computer designed for commercial applications was:
Select correct option:
UNIVAC 1
ENIAC
EDVAC
Attanasoff-Berry Computer
Click here to Save Answer & Move to Next Question
BC100201306 : Ahmed Raza
Quiz Start Time: 07:56 PM
Time Left 84
sec(s)
Question # 6 of 15 ( Start time: 07:58:09 PM ) Total M – 1
Greedy algorithms are usually faster, since they don’t consider the details of possible alternatives
Select correct option:
True
False
Click here to Save Answer & Move to Next Question
BC100201306 : Ahmed Raza
Quiz Start Time: 07:56 PM
Time Left 88
sec(s)
Question # 7 of 15 ( Start time: 07:58:45 PM ) Total M – 1
Intel 8088 took _ cycles to execute. Select correct option: 80 15 20 50 Click here to Save Answer & Move to Next Question BC100201306 : Ahmed Raza Quiz Start Time: 07:56 PM Time Left 87 sec(s) Question # 8 of 15 ( Start time: 07:59:18 PM ) Total M – 1 Algorithm is a _____________
Select correct option:
Definition of a problem
Sequence of steps to solve a problem
Understanding of a problem
Solving a problem
Click here to Save Answer & Move to Next Question
BC100201306 : Ahmed Raza
Quiz Start Time: 07:56 PM
Time Left 88
sec(s)
Question # 9 of 15 ( Start time: 07:59:37 PM ) Total M – 1
Pseudo Code, Structured flow charts and Actual code are used for representing Algorithms.
Select correct option:
True
False
Click here to Save Answer & Move to Next Question
BC100201306 : Ahmed Raza
Quiz Start Time: 07:56 PM
Time Left 88
sec(s)
Question # 10 of 15 ( Start time: 08:00:15 PM ) Total M – 1
Byte is a combination of……………
Select correct option:
8 bits
16 bits
32 bits
4 bits
Click here to Save Answer & Move to Next Question
BC100201306 : Ahmed Raza
Quiz Start Time: 07:56 PM
Time Left 89
sec(s)
Question # 11 of 15 ( Start time: 08:00:56 PM ) Total M – 1
software sits on top of _ software for performing user tasks.
Select correct option:
System, Application
System, Productivity
Application, System
System, Programming
Click here to Save Answer & Move to Next Question
BC100201306 : Ahmed Raza
Quiz Start Time: 07:56 PM
Time Left 88
sec(s)
Question # 12 of 15 ( Start time: 08:01:41 PM ) Total M – 1
A 1.5 G. HZ Microprocessor approximately contains:
Select correct option:
30 Million Transistors
25 Million Transistors
10 Million Transistors
50 Million Transistors
Click here to Save Answer & Move to Next Question
BC100201306 : Ahmed Raza
Quiz Start Time: 07:56 PM
Time Left 87
sec(s)
Question # 13 of 15 ( Start time: 08:02:58 PM ) Total M – 1
Linux and Mac are examples of :
Select correct option:
Uni processor OS
Multi processor OS
Click here to Save Answer & Move to Next Question
BC100201306 : Ahmed Raza
Quiz Start Time: 07:56 PM
Time Left 88
sec(s)
Question # 14 of 15 ( Start time: 08:03:52 PM ) Total M – 1
JavaScript can be used along with HTML to ________
.
Select correct option:
style the Web
secure the web page
make content interactive
color the web page
Click here to Save Answer & Move to Next Question
BC100201306 : Ahmed Raza
Quiz Start Time: 07:56 PM
Time Left 87
sec(s)
Question # 15 of 15 ( Start time: 08:04:48 PM ) Total M – 1
__ are personal computers that are designed to be easily transported and relocated
Select correct option:
Desktops
Portables
Servers
Workstations
Click here to Save Answer & Move to Next Question


CS101 LATEST QUIZ SOLVED BY BINISH AWAIS

hameedpk5: MC100200532 : Hameed Ul Haq

Quiz Start Time: 10:47 PM Time Left 86
sec(s)

Question # 1 of 15 ( Start time: 10:47:57 PM ) Total M – 1
The name of very first computer was:
Select correct option:
ABC
BCD
EDC
None of the given choices

hameedpk5: MC100200532 : Hameed Ul Haq
Quiz Start Time: 10:47 PM Time Left 85
sec(s)
Question # 2 of 15 ( Start time: 10:48:47 PM ) Total M – 1
You have learnt about tags, recalling Head Tag, Which one is correct?
Select correct option:



<\HEAD

hameedpk5: MC100200532 : Hameed Ul Haq

Quiz Start Time: 10:47 PM Time Left 84
sec(s)

Question # 3 of 15 ( Start time: 10:49:20 PM ) Total M – 1
Grace Hopper of US Navy develops the very first_______compiler
Select correct option:
Low-level Language
High-level language
Both high and low level language
None of the given choices

hameedpk5: MC100200532 : Hameed Ul Haq

Quiz Start Time: 10:47 PM Time Left 86
sec(s)

Question # 4 of 15 ( Start time: 10:50:16 PM ) Total M – 1
Without one of following item a web site is read only:
Select correct option:

Form

Dialog Box
Button
Scroll Bar

10:51 PM hameedpk5: MC100200532 : Hameed Ul Haq

Quiz Start Time: 10:47 PM Time Left 84
sec(s)

Question # 5 of 15 ( Start time: 10:50:52 PM ) Total M – 1
Greedy algorithms are usually faster, since they don’t consider the details of possible alternatives
Select correct option:

True
False

hameedpk5: MC100200532 : Hameed Ul Haq

Quiz Start Time: 10:47 PM Time Left 88
sec(s)

Question # 6 of 15 ( Start time: 10:51:51 PM ) Total M – 1
A strategy in which all possible combinations are examined and best one is selected called……………
Select correct option:

Divide and conquer
Brute force
Heuristic
All of given

hameedpk5: MC100200532 : Hameed Ul Haq

Quiz Start Time: 10:47 PM Time Left 79
sec(s)

Question # 7 of 15 ( Start time: 10:52:29 PM ) Total M – 1
Utility Software is a type of __ Software
Select correct option:

System
Application
both a & b
none of the given

hameedpk5: MC100200532 : Hameed Ul Haq

Quiz Start Time: 10:47 PM Time Left 84
sec(s)

Question # 8 of 15 ( Start time: 10:53:32 PM ) Total M – 1
Quantum Mechanics is the branch of _ ; which describes the activity of subatomic particles.
Select correct option:

Chemistry
Computer Science
Physics
None of the given choices

hameedpk5: MC100200532 : Hameed Ul Haq

Quiz Start Time: 10:47 PM Time Left 87
sec(s)

Question # 9 of 15 ( Start time: 10:54:22 PM ) Total M – 1
Which one of these is NOT an example of embedded computers
Select correct option:

Microwave oven
IMB PC
Refrigerator
Calculator

hameedpk5: MC100200532 : Hameed Ul Haq

Quiz Start Time: 10:47 PM Time Left 82
sec(s)

Question # 10 of 15 ( Start time: 10:55:51 PM ) Total M – 1
Which of the following is a computer storage device that saves and retrieves the data when required?
Select correct option:

Hard Disk
RAM
ROM
None of the given choices

hameedpk5: MC100200532 : Hameed Ul Haq

Quiz Start Time: 10:47 PM Time Left 85
sec(s)

Question # 11 of 15 ( Start time: 10:57:22 PM ) Total M – 1
World wide web is a collection of web pages which is:
Select correct option:

logically unified
physically distributed
logically combined
logically unified and physically distributed

NEXT

hameedpk5: MC100200532 : Hameed Ul Haq

Quiz Start Time: 10:47 PM Time Left 86
sec(s)

Question # 12 of 15 ( Start time: 10:58:23 PM ) Total M – 1
Computer directly understand the _ language
Select correct option:

human
high level
machine
none of given

hameedpk5: MC100200532 : Hameed Ul Haq
Quiz Start Time: 10:47 PM Time Left 84

sec(s)

Question # 13 of 15 ( Start time: 10:59:22 PM ) Total M – 1
Algorithm is a ______
Select correct option:

Definition of a problem
Sequence of steps to solve a problem
Understanding of a problem
Solving a problem

11:01 PM hameedpk5: MC100200532 : Hameed Ul Haq

Quiz Start Time: 10:47 PM Time Left 87
sec(s)

Question # 15 of 15 ( Start time: 11:01:03 PM ) Total M – 1
Bit is originated from………………
Select correct option:

Decimal
Binary
Hexadecimal
Octal

onFocus executes the specified JavaScript code when _

        a window receives focus

        a form element receives input focus

        a window receives focus or when a form element receives input focus

        None of the Given.

CERN releases WWW in:

1992

1993

1994

None of the given choices

Communications on the internet is controlled by a set of two protocols, named :

        HTTP & SMTP

        FTP & TELNET

        TCP & IP

        None of the given choices

One of the disadvantages of working at home is________________

        Family life may be happier because of living at home.
        Family life may suffer as well, as some never turn off, and keep on working through out the day, evening and night

        Family life may become happier because he can give more time to his family.

        There is no disadvantage of working at home.

The greatest, shared resource of information created by humankind is:

        Web

        Dictionary

        Vocabulary

        Glossary
http://groups.google.com/group/vuZs

There are _ types communication channels.

        2

        3

        4

        5

The Cyberwarefare is a __

        Crime

        War

        Software

        Game

In the statement “PopUp(“Message”)” :

        “PopUp” is the function Name, “Message” is the argument

        “Message” is function identifier

        Syntax Error: functions cannot be called in this way

        Error: function is undefined

RGB scheme stands for _____________________.

        Red Grey Blue

        Red Green Brown

        Red Green Blue

        Red Green Black

_ is the part of the virus that generally consists of malicious computer instructions

        Off load

        Payload

        Loader

        Transmitter

Unlike viruses, ______ are stand-alone programs

        Trojan horses

        Logic- or time-bombs

        Worms

        None of the given

Voice over IP has _ modes

        2

        3

        4

        5

We use __ to stop Break-Ins.

        Scanners

        Intrusion detectors

        Firewalls

        Intrusion detectors and Firewalls

Which one can lead user to leave your website?

        Simple design

        Poor navigation

        Information layout

        Adaptable design

_________ are the subcategories of AI

        Expert Systems

        Robotics

        Natural Language Processing

        All of the above

With the Help of FTP we can:

        List, change, create folders on a remote computer

        Upload and download files

        Transferring Web content from the developer’s PC to the Web server

        All of the given choices

Which protocol is used for receiving E-mail messages?

        FTP

        POP

        Telnet Protocol

        SMTP

The organizations are learning that business can be done in a more effective manner if emphasis is placed upon __.

        Cooperation

        Shared responsibility

        Networking

        All of the given

_ is used to transfer files between computers on a TCP/IP network

FTP

POP

Telnet Protocol

SMTP

http://groups.google.com/group/vuZs

Which of the following is True about “pareseFloat(String)” function: I) If the first character cannot be converted to a number, parseFloat returns NaN. II) it returns the fractional portion of floating point number. III) Parses the string argument; returns a FP number. IV) Non of given options.

        I and II Only

        II and III Only

        I and III Only

        IV Only

Event-driven programs can ________ events.

        capture

        respond

        capture and respond

        None of the Given.

Which of the statements is NOT true about “Color Usage Guidelines” for developing a presentation?

        Use color sparingly to to highlight a point, but don't get carried away

        Do not use colors like yellow or red for background except where needed.

        Do not use colors like green, blue and such like colors except where needed.

        None of given options

_____ Type of databases management systems are supporting Terabytes of Data

        Personal

        Desktop

        Enterprise

        Single-user

Because of the ever-decreasing costs of verbal, text, video communications; the distances have _

        Increased

        Expanded

        Contracted

        Lengthened

The structure of the networked organization is _.

        Simple

        Flexible

        Complex

        All of the given

A CAD drawing consist of many geometric shapes like straight lines , arc , tc and therefore is stored in a _ format.

        Scalar

        Vector

        Both a & b

__ is a type of computer-to-computer messaging.

        TCP

        Telnet

        E-mail

        FTP





        None of these

RDBMS stands for ____________________

        Relative Data Base Management System

        Relational Data Base Management System

        Recursive Data Base Management System

        Responsible Data Base Management System

Using Color Mapping scheme only a limited number of color called _ are allowed.

        Reserved

        Pointers

        Platelet

        None of these

Using _ topology, adding new nodes is difficult.

        Ring

        Bus

        Star

        None of the given choices

Problems with old presentation methods was (transparencies and projectors etc):

        They were costly

        Electronic transmission, in some cases, was not easy

        Presentation some times gets ambiguous

        All of given options

ARPANET splits into two nets to keep military & non-military network sites separate, named :

        ARPANET & MILNET

        MICRONET & MILNET

        PICONET & ARPANET

        None of the given choices

Arguments values are passed to the function _

        by value

        by reference

        Both a & b

        Non of the Given.

______ is a field that uniquely identifies each record stored in a table.

        Primary Key

        Foreign Key

        Secondary key

        Special Key

The IP address consists of _ bits

        64

        32

        16

        128

Credit Card Fraud can be minimized by using _____

        single credit card numbers

        multiple-use credit card numbers

        single-use credit card numbers

        Firewalls

hotWeather = (Temperature == 40); in the above statement, the variable hotWeather is of type

        Number

        String

        Boolean

        None of the given

Ref:

you are evaluating a condition (temperature ==40) and result of this condition is getting stored in HotWeather variable. which is boolean in form

Output of evaluation of condition is in the form of true or false which is a boolean value

Here I Try to key few lines to help you to see live (copy paste these in any test.htm) and run in broswer

NCSA stands for :

        NationalCenter for Supercomputing Applications

        NationalCenter for Supreme Applications

        NationalCenter for Super Authority

        None of the given choices

Self-replicating SW that eludes detection and is designed to attach itself to other files is called _.

        Trojans

        Viruses

        Sniffers

        Operating System

SVG stands for _____________________________.

        Structured Vector Graphics

        Software Vector Graphics

        Structured Visual Graphics

        None of these

Viruses move from one computer to another with the _ and spring into action when the ____ is executed or opened

        Host – Host

        Host – Client

        Client – Host

        Client – Client
http://groups.google.com/group/vuZs

________ is a layered structure consisting of a number of homogenous and simple processing elements.

        Genetic Algorithms

        Rule-based Systems

        Feed-Forward Network

        None of these

A property that gives the value of Pi is:

        PI()

        Graph.PI

        Math.PI

        Math.PI()

The smallest image forming element on a computer display is called __.

        Resolution

        Pixel

        Grey area

        None of these

SMTP stands for ___________________________.

        Simple Mail Transfer Protocol

        Simple Mail Transparent Protocol

        Simple Mail Transfer Paradigm

        None of these

____ network allows data to be sent directly from one computer to another.

        Ring

        Bus

        Star

        None of the given choices

Viruses attach themselves to other computer programs or data files, are known as____

        Trojans

        Guests

        Hosts

        Spies

Avoid __ to ensure readability of web page

        Overuse of bold and italics

        Use of paragraphs

        Use of white space

        Use of contrast colors

STP stands for :

        Shielded Twisted Pair

        Silver Twisted Pair

        Single Twisted Pair

        None of the given choices

In __, the spies of one business monitors the network traffic of their competitors.

        Industrial intelligence

        Industrial Espionage

        Industrial spying

        Industrial surveillance

Color mapping scheme reducing the size of 2.25 MB graphic to _ MB.

        0.90 MB

        0.75 MB

        1.00 MB

        None of these

The functions which call themselves from their (own) body are called:

        Virtual functions

        Abstract functions

        Overriding functions

        Recursive functions

Browser sends ‘_’ request to web server to access a file.

        SET

        GET

        TRANSFER

        All of the given choices

vuzs
The internet communities are _.

        Geographical based

        Interest based

        Country based

        Religion based

Infection propagation and Actual destructive are the components of ___

        Transmission mechanism

        Payload

        Worms

        Trojan Horse

An algorithm that always takes the best immediate or local solution while finding an answer is called____.
Deterministic Algorithm
Non deterministic Algorithm
Greedy Algorithm
Randomized Algorithm

Which of the following command allows you to recover form mistakes in MS Word?

Clear
Edit
Undo
Break

A __ operating system allows many users to take advantage of the computer’s resources, simultaneously

      Single user

Multi- user

Single tasking

Multi tasking

Network Interface Card is an __ device

Input

Output

Input/Output

Storage

The decimal equivalent of binary 1000 is

7

8

9

10

http://groups.google.com/group/vuZs

Which of the following is NOT RDBMS software?

My Sql
MS Excel
Oracle
SQL Server

A computer virus is a

Software that saves the computer from being damaged.

Application software that helps to make different type of viruses and worms

Program that spreads itself and destroys other program

Program that corrects the problems in your computer

What will be the result of a?

a = Math.abs(-23)

23

-23

23.0

2.3

http://groups.google.com/group/vuZs

A Special program required to view swf (Shockwave Flash) files in web Browser is called

TFlash

Vflash

plug-in

None of the given options

Using Java Script you can write a character at random location on screen

   By applying randomCh() method

   With the help of String object

   With the help of random character property

    There is no built in approach in Java Script

If incorrectly we enter the negative age it is check by

    Limit Integrity

   Type Integrity

   Referential Integrity

   Physical Integrity

Which protocol is use to transfer a file over the network?

   UDP

    FTP

   TCP

   OSI

One can send an email message to a remote computer using _ protocol

   HTTP

   SMTP

   FTP

    TELNET
http://groups.google.com/group/vuZs

In a System having many parts to be designed, one should always do the _ first

    Hard part

   Simple part

   Development part

   Quality part

Flow control constructs in JavaScript includes:

   If-Else

   Loops and If -Else

    Switch and If-Else

    All of the given choices

_ provides a simple, consistent way for applications to interact with the HW without having to know all the details of the HW

   Explorer.exe

   System Files

    Operating System

   Application Software

Machine language is also called

   Assembly Language

   Binary Language

    High Level Language

   HTML Language

_ is the best known builder for supercomputers.

   Sun

    Cray Research

    Microsoft

   Apple
http://groups.google.com/group/vuZs

The weaknesses of the computer are:

   Pattern recognition & Storage

   Speed & Innovative ideas



    Pattern recognition & Innovative ideas

   Speed & Storage

Communication protocol is a __________that governs the flow of information over a network

   Set of methods

   Set of protocols

    Set of rules

   Device

_ team is responsible for the maintenance, expansion , improvement of the infrastructure consisting of workstations, networking equipment, software and network security.

    Support

   Configuration Management

   Quality Assurance

   Developer
http://groups.google.com/group/vuZs

_ team consists on the sharpest technical minds in the company.

    Architecture

   Business Development

   Configuration Management

   Developer

___ is responsible for day to day operations.

   CEO

    COO

   CMSO

   Developer

http://groups.google.com/group/vuZs

One of the key responsibilities of the _ is client relationship management.

    Project Manager

   Team Lead

   Developer

   Quality Assurance Engineer

What is the major problem with flash based website?

    Its two heavy

    Cannot be indexed

   Less attractive

   Inaccessible

Which of the following is NOT an event handler for image object?

   onAbort

   onError

   onLoad

    onUser

The organizations are learning that business can be done in a more effective manner if emphasis is placed upon _.

   Cooperation

   Shared responsibility

   Networking

    All of the given options

a = Math.abs(-23)

What will be the value of a ?

    23

    -23

   23.0

   2.3

ERP is a type of ______ .

   Entertainment software

   Productivity software

    Business software

   Scientific software

In Genetic Algorithm the most important thing you should know, is the _.

   Procedure

    Recognition of a good solution

   Different techniques

   None of the given options

According to a popular heuristic, success is defined by _.

    The user

   The builder

   Both user and builder

   None of the given options
http://groups.google.com/group/vuZs

Rule of thumb learned through trial and error is called _.

   Design

    Heuristic

   Plan

   Aim

JavaScript Variables are __.

   Dynamically Typed

   Statically Typed

   Strong Typed

   None of the given options

Which of the following application are collections of cells?

   Word

    Excel

   PowerPoint

   Outlook Express
http://groups.google.com/group/vuZs

The browser breaks down the URL into __ parts.

   2

    3

   4

   5

A named collection of properties (data, state) and methods (instruction, behavior) is called __.

   Array

   Function

   Variable

    Object

First computer network was _.

   NSFNET

   FIRSTNET

    ARPANET

   ORPHANET

In JavaScript, a variable declaration is

Optional
Mandatory
Not allowed
None of the given

A protocol used for receiving email messages is called __.

URL
Telnet
POP3
SMTP

which one is correct?

onUnload

onUnLoad
Your browser may not support display of this image.
onUNLOAD

All of the above

Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called __.

Loop
Sequence
Condition
Array

Variables allow us to manipulate data through the _.

Actual Value
Reference
Length
Name

Fuzzy logic is based on __.

Ground facts
Experience
Practice
Approximation
http://groups.google.com/group/vuZs

Word Processor is a _____

System Software
Application Software
Device
Utility

In the old days, databases did NOT support __.

http://groups.google.com/group/vuZs

Number
Boolean
Video
Text

In tabular storage, fields placed in a particular row are strongly _.

Independent
Dependent
Interrelated
Inconsistent

Due to working at home, lack of interaction may result in _ professional growth.

Slower
Your browser may not support display of this image. Faster
Higher
Improved

Distance learning has got a boost due to the _.
Easy communication
Online interactive contents
Flexibility
All of the given options

_ technique can be used to create smooth animations or to display one of several images based on the requirement.

Image downloading
Image preloading
Image uploading
Image postloading

The __ is becoming the preferred organizational structure for more and more organizations with the passage of time.

Tree structured organizational model
Network paradigm
Hierarchical structure
None of the given options

The group of technologies concerned with the capturing, processing and transmission of information in the digital electronic form is called

_.

Telecom Engineering
Computer Engineering
Computer Science
Information Technology

A large number of networks interconnected physically is called __

LAN
MAN
Internet
Network collection

TCP stands for __.

Transfer Center protocol
Transmission Control Protocol
Transmission Center Protocol
Telephone Center Protocol

A collection of data organized in such a way that the computer can quickly search for a desired data item is known as :
Retrieving
Database
Information
Your browser may not support display of this image. DBMS
http://groups.google.com/group/vuZs

__ is simply a fast port that lets you connect computer peripherals and consumer electronics to your computer without restart.

Freeware
Shareware
Firewire
Firmware

Structures, in which another list starts before the first list is finished, are called:

Multiple Lists
Nested Lists
Ordered Lists
Un-ordered Lists
http://groups.google.com/group/vuZs

The key property of the ‘Array’ object in JavaScript is

Value
Length
Name
All of the given choices

Which one is the example of spreadsheet software ?

MS Word
MS PowerPoint
MS Excel
MS Access

The Encryption of data is related to

Data updates
Data security
Data integrity
Data accessibility

_ is the process of analyzing large databases to identify patterns.

Data normalization
Data management
Data Mining
None of the given options

Which is the user-friendly way of presenting data ?

Query
Form
Report
Your browser may not support display of this image. All of the given options Tags always placed between the and tags of a Web page

True
False

Java script has —————– ability to create and draw graphics.

Limited
Versatile
Medium
Not at all

Which of the following is incorrect for making design elements legible?

Select correct option:

Elements should be large enough

Elements must contrast sufficiently

Related elements should be visually grouped

Elements should have no visual focus

Function is also known as __.

Select correct option:

subprogram

procedure

subroutine

All of given

In _ TCP\IP protocols became the only set of protocols used on the ARPANET.

Select correct option:

1973

1983

1972

None of the given choices

E-mail system has __ component(s)

Select correct option:

E-mail client

SMTP server

POP3 server

All of the given choices

/ / // A Parallelogram (Tilted rectangle) represents the _________ flow chart element.

Select correct option:

Process

Input or Output

Decision

Connector

If a computer could pass the Turing test then it would be able to:

Select correct option:

http://groups.google.com/group/vuZs

win a million dollar prize

think like human begins

think but slower than humans

do the things faster

Punched cards were replaced by:

Select correct option:

Floppy Disk

Zip Drives

Magnetic storage

None of the given choices

vuzs

The ________virus may display an annoying, but harmless message

Select correct option:

Malicious

Neutral

Helpful

DoS

The name of very first computer was:

Select correct option:

ABC

BCD

EDC

None of the given choices

The internet communities are _.

Select correct option:

Geographical based

Interest based

Country based

Religion based

which one is correct?

onUnload

onUnLoad
Your browser may not support display of this image.
onUNLOAD

All of the above

Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called __.

Loop
Sequence
Condition
Array

Variables allow us to manipulate data through the _.

Actual Value
Reference
Length
Name

Fuzzy logic is based on __.

Ground facts
Experience
Practice
Approximation

Word Processor is a _____

System Software
Application Software
Device
Utility

In the old days, databases did NOT support __.

Number
Boolean
Video
Text

In tabular storage, fields placed in a particular row are strongly _.

Independent
Dependent
Interrelated
Inconsistent

Due to working at home, lack of interaction may result in _ professional growth.

Slower
Your browser may not support display of this image. Faster
Higher
Improved

Distance learning has got a boost due to the _.
Easy communication
Online interactive contents
Flexibility
All of the given options

_ technique can be used to create smooth animations or to display one of several images based on the requirement.

Image downloading
Image preloading
Image uploading
Image postloading

The __ is becoming the preferred organizational structure for more and more organizations with the passage of time.

Tree structured organizational model
Network paradigm
Hierarchical structure
None of the given options

The group of technologies concerned with the capturing, processing and transmission of information in the digital electronic form is called

_.

Telecom Engineering
Computer Engineering
Computer Science
Information Technology

A large number of networks interconnected physically is called __

LAN
MAN
Internet
Network collection

TCP stands for __.

Transfer Center protocol
Transmission Control Protocol
Transmission Center Protocol
Telephone Center Protocol

A collection of data organized in such a way that the computer can quickly search for a desired data item is known as :
Retrieving
Database
Information
Your browser may not support display of this image. DBMS

http://groups.google.com/group/vuZs

__ is simply a fast port that lets you connect computer peripherals and consumer electronics to your computer without restart.

Freeware

Shareware
Firewire
Firmware

Structures, in which another list starts before the first list is finished, are called:

Multiple Lists
Nested Lists
Ordered Lists
Un-ordered Lists

The key property of the ‘Array’ object in JavaScript is

Value
Length
Name
All of the given choices

Which one is the example of spreadsheet software ?

MS Word
MS PowerPoint
MS Excel
MS Access

_ is the process of analyzing large databases to identify patterns.

Data normalization
Data management
Data Mining
None of the given options

Which is the user-friendly way of presenting data ?

Query
Form
Report
Your browser may not support display of this image. All of the given options

JavaScript function fixed() has equivalent HTML tag-set __

<.FIX>……………
………………..

………….


………………..

Tags always placed between the and tags of a Web page

True
False

Java script has —————– ability to create and draw graphics.

Limited
Versatile
Medium
Not at all

Internet is an example of __ network.

Private

Public

Both Private and Public

None of the given choices

The name of first commercially available PC was:

UNIVAC 1

ENIAC

EDVAC

Altair 8800

Algorithm is a ________

Definition of a problem

Sequence of steps to solve a problem

Understanding of a problem

Solving a problem

A group of information is called ______

File

Database

Record

Field

_______ is a branch of computer science concerned with manipulating and enhancing computer graphics.

Image Handling

Image Processing

Image Engineering

None of these

__________has changed our way of life like no other technology.

Computational technology

Computer technology

Computing technology

None of the Above

Sophisticated event handling is not possible with ___ event handling

Off-Line

In-Line

Out-Line

Non of the given choices

Babbage’s Analytical Engine could store information permanently in:

Magnetic Tape

Floppy Disk

Punched Cards

None of the given choices

There are __ popular schemes to reduce the number of bytes that are required for storing graphics.

4

3

2

None of these

The internet-society is considered under Surveillance because:

While surfing, we are being watched, constantly

Our every click is recorded and analyzed to extract patterns and behaviors

Webcams are becoming common. Providing a cheap way for parents to watch their children’s every move

All of the given

URL is a/an __

   Device





   Component





    Address



   Tool

To improve the time for scanning a web page, text should be _.

   Centered





   Left Aligned





   Right Aligned





   Staggered

Communications on the internet is controlled by a set of two protocols which are __.

   IMAP and SMTP











   FTP and HTTP











    TCP and IP









   TCP and HTTP









http://groups.google.com/group/vuZs

FTP stands for __.

   File transmission protocol





   File transmission path





    File transfer protocol



   Fine transfer path

A named collection of properties (data, state) and methods (instruction, behavior) is called __.

   Array





   Function





   Variable





    Object

Which of the following is incorrect for making design elements legible?

Elements should be large enough

Elements must contrast sufficiently

Related elements should be visually grouped

Elements should have no visual focus

  1. Function is also known as __.

subprogram

procedure

subroutine

All of given

In _ TCP\IP protocols became the only set of protocols used on the ARPANET.

1973

1983

1972

None of the given choices

E-mail system has __ component(s)

E-mail client

SMTP server

POP3 server

All of the given choices

A Parallelogram (Tilted rectangle) represents the ____ flow chart element.

Process

Input or Output

Decision

Connector

If a computer could pass the Turing test then it would be able to:

win a million dollar prize

think like human begins

think but slower than humans

do the things faster

Punched cards were replaced by:

Floppy Disk

Zip Drives

Magnetic storage

None of the given choices

http://groups.google.com/group/vuZs

The ________virus may display an annoying, but harmless message

Malicious

Neutral

Helpful

DoS

The name of very first computer was:

ABC

BCD

EDC

None of the given choices

The internet communities are _.

Geographical based

Interest based

Country based

Religion based

__________% of the users have left websites in frustration due to poor navigation. 
40 
 62 
83 
91 
 
In JavaScript, a variable declaration is 
 
Optional 
Mandatory 
Not allowed 
None of the given 
 
A protocol used for receiving email messages is called ____________. 

URL 
Telnet 
POP3 
SMTP 
 
which one is correct? 
onUnload  
onUnLoad  
onUNLOAD  
All of the above 
Visit This Group:
http://groups.google.com/group/vuZs

 
Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called __________. 

Loop 
Sequence 
Condition 
Array 
 
Variables allow us to manipulate data through the ___________. 

Actual Value 
Reference 
Length 
Name 
 
Fuzzy logic is based on ____________. 

Ground facts 
Experience 
Practice 
Approximation
 
Word Processor is a _________________ 

System Software 
Application Software 
Device 
Utility 
 
In the old days, databases did NOT support ____________. 

Number 
Boolean 
Video 
Text 
 
In tabular storage, fields placed in a particular row are strongly ___________. 

Independent 
Dependent 
Interrelated 
Inconsistent 
http://groups.google.com/group/vuZs


Due to working at home, lack of interaction may result in ___________ professional growth. 

Slower 

Faster 
Higher 
Improved 
 
Distance learning has got a boost due to the ___________. 
Easy communication 
Online interactive contents 
Flexibility 
All of the given options 
 
_____________ technique can be used to create smooth animations or to display one of several images based on the requirement. 

Image downloading 
Image preloading 
Image uploading 
Image postloading

 
Tree structured organizational model 

Network paradigm 
Hierarchical structure 
None of the given options 
 
The group of technologies concerned with the capturing, processing and transmission of information in the digital electronic form is called 
_____________. 

Telecom Engineering 
Computer Engineering 
Computer Science 
Information Technology
 
A large number of networks interconnected physically is called ______ 

LAN 
MAN 
Internet 
Network collection

Visit This Group:
http://groups.google.com/group/vuZs

TCP stands for ________. 
 
Transfer Center protocol 
Transmission Control Protocol 
Transmission Center Protocol 
Telephone Center Protocolhttp://groups.google.com/group/vuZs


A collection of data organized in such a way that the computer can quickly search for a desired data item is known as : 
Retrieving 
Database 
Information 
DBMS 
 
______ is simply a fast port that lets you connect computer peripherals and consumer electronics to your computer without restart. 

Freeware 
Shareware 
Firewire 
Firmware 
 
Structures, in which another list starts before the first list is finished, are called: 

Multiple Lists 
Nested Lists 
Ordered Lists 
Un-ordered Lists 
 
The key property of the ‘Array’ object in JavaScript is 

Value 
Length 
Name 
All of the given choices 
 
Which one is the example of spreadsheet software ? 

MS Word 
MS PowerPoint 
MS Excel 
MS Access

Visit This Group:
http://groups.google.com/group/vuZs

The Encryption of data is related to 

Data updates 
Data security 
Data integrity 
Data accessibility 
 
_____ is the process of analyzing large databases to identify patterns. 

Data normalization 
Data management 
Data Mining 
None of the given options 
 
Which is the user-friendly way of presenting data ? 

Query 
Form 
Report 
All of the given options 
 
JavaScript function fixed() has equivalent HTML tag-set ____ 

<.FIX>……………</FIX> 
<F>………………..</F> 
<PRE>………….</PRE> 
<H>………………..</H> 
http://groups.google.com/group/vuZs


<form> Tags always placed between the <BODY> and </BODY> tags of a Web page 

Question # 1 of 10  Total M – 1 

Internet is an example of ______________ network. 

Select correct option: 

Private

Public

Both Private and Public

None of the given choices

Question # 2 of 10  Total M – 1 

The name of first commercially available PC was: 

UNIVAC 1

ENIAC

EDVAC

Altair 8800

Question # 3 of 10  Total M – 1 

Algorithm is a ____________________ 

Definition of a problem

Sequence of steps to solve a problem

Understanding of a problem

Solving a problem

Question # 4 of 10  Total M – 1 

A group of information is called __________________ 

File

Database

Record

Field

http://groups.google.com/group/vuZs

 Question # 5 of 10 ( Start time: 05:24:17 PM )  Total M – 1 

___________________ is a branch f computer science concerned with manipulating and enhancing computer graphics. 

Image Handling

Image Processing

Image Engineering

None of these

Question # 6 of 10  Total M – 1 

__________has changed our way of life like no other technology. 

Computational technology

Computer technology

Computing technology

None of the Above

Question # 7 of 10 Total M – 1 

Sophisticated event handling is not possible with _______________ event handling 

Off-Line

In-Line

Out-Line

Non of the given choices

Question # 8 of 10 Total M – 1 

Babbage’s Analytical Engine could store information permanently in: 

Magnetic Tape

Floppy Disk

Punched Cards

None of the given choices

Question # 9 of 10   Total M – 1 

There are __________ popular schemes to reduce the number of bytes that are required for storing graphics. 

4

None of these 

http://groups.google.com/group/vuZs

A number of clever schemes have been invented to reduce the number of bytes that are required for storing graphics. 2 popular ones:

Color mapping

Dithering

Question # 10 of 10 ( Start time: 05:30:01 PM )  Total M – 1 

The internet-society is considered under Surveillance because: 

While surfing, we are being watched, constantly

Our every click is recorded and analyzed to extract patterns and behaviors

Webcams are becoming common. Providing a cheap way for parents to watch their children’s every move

All of the given

http://groups.google.com/group/vuZs

Which of the following is incorrect for making design elements legible?

Elements should be large enough

Elements must contrast sufficiently

Related elements should be visually grouped

Elements should have no visual focus

25.10 Making Display Elements Legible:

1. Designing (arranging) Display Elements

Elements must be large enough to be processed visually

Elements must contrast sufficiently with their backgrounds

Related elements should be visually grouped through the use of space, color, or graphical boundaries

The relative levels of importance among elements in a display should be revealed graphically

Question # 2 of 10  Total M – 1

1. Function is also known as ______________.

Select correct option:

subprogram

procedure

subroutine

All of given

Function:

A group of statements that is put together (or defined) once and then can be used (by reference)

repeatedly on a Web page Also known as subprogram, procedure, subroutine

In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET.

Select correct option:

1973

1983

1972

None of the given choices

http://groups.google.com/group/vuZs

E-mail system has ______ component(s)

Select correct option:

E-mail client

SMTP server

POP3 server

All of the given choices
 

A Parallelogram (Tilted rectangle) represents the ________________ flow chart element.

Select correct option:

Process

Input or Output

Decision

Connector

Punched cards were replaced by:

Floppy Disk

Zip Drives

Magnetic storage

None of the given choices

Ref:

http://en.wikipedia.org/wiki/Punched_card

 During the 1960s, the punched card was gradually replaced as the primary means for data storage by magnetic tape, as better, more capable computers became available.

The ________virus may display an annoying, but harmless message

Select correct option:

Malicious

Neutral

Helpful

DoS

The internet communities are ___________.

Select correct option:

Geographical based

Interest based

Country based

Religion based

Question # 1  of 10  Total M –  1

Because of spending more time on the internet, the distances among the families have been _____.

Select correct option:

Increased

Expanded

Contracted

Shortened

Question # 3  of 10  Total M –  1

Autonomous Web Agents are also known as _________________

Select correct option:

Mobile Agents

Softbots

Both “Mobile Agents” & “Softbots”

None of these

A communication protocol is a __________that governs the flow of information over a network.

Select correct option:

Set of Methods

Set of Protocols

Set of rules

None of the given choices

http://groups.google.com/group/vuZs

Protocol

–Rules governing communications over the network

By default in a web page Hyper Link for another web page is represented as:

Blue only

Black and Underlined

Blue and Bold

Blue and Underlined

The organizations are learning that business can be done in a more effective manner if emphasis is placed upon ______________.

Select correct option:

Cooperation

Shared responsibility

Networking

All of the given

Question # 7  of 10 Total M –  1

Monitor is an example of __________devices

Select correct option:

Output

Input

Processing

None of the given choices

The code in the ________ portion is the right choice for developing larger JavaScript scripts

Select correct option:

Body

At End

Head

Separate
 

____________________ based on the principles of the logical reasoning ability of humans.

Select correct option:

Genetic Algorithms

Rule-based Systems

Feed-Forward Network

None of these

Rulebased Systems (1):

Based on the principles of the logical reasoning ability of humans

The key benefit of VPNs over conventional PNs is:

Security

Efficiency

Lower Cost

None of the given choices
 

In __________________ automatic machines perform various tasks that were previously performed by humans.

Select correct option:

Fuzzy Logic

Robotics

Rule based Systems

None of these

Avoid __________ to ensure readability of web page
Overuse of bold and italics
Use of paragraphs
Use of white space
Use of contrast colors

Deep Blue was the name of:
Human
Computer
City
None of the given choices

Using ____, a user can remotely log on to a computer (connected to the user through a network, e.g. Internet) & have control over it like a local user, including control over running various programs ?
FTP
TCP
Telnet Protocol
None of the given choices

Telnet Protocol
Using Telnet, a user can remotely log on to a computer (connected to the user’s through a TCP/IP
network, e.g. Internet) & have control over it like a local user, including control over running various programs In contrast, FTP allows file operations only

Typical use: Configuring and testing of a remote Web server
DoS is________ ?
Crime
Cyber crime
Not a crime
A software
__________ enables users located at far-way locations to easily share information with others located all over the world.
Protocol
Internet
Communication Channel
None of the given choices

Vacuum tubes were replaced by:
Transistors
Electrodes
Electric Relays
None of the given choices

Cyber crime can be used to
Damage a home computer
Bring down a business
Weaken the telecom, financial, or even defense-related systems of a country
All of the given

___ provides a simple, consistent way for applications to interact with the HW without having to know all the details of the HW
Explorer.exe
System Files
Operating System
Application Software

Communication protocol is a __________that governs the flow of information over a network
Set of methods
Set of protocols
Set of rules
Device

_____________ team is responsible for the maintenance, expansion , improvement of the infrastructure consisting of workstations, networking equipment, software and network security.
Support
Configuration Management
Quality Assurance
Developer
_____________ team consists on the sharpest technical minds in the company.
Architecture
Business Development
Configuration Management
Developer

_______________ is responsible for day to day operations.
CEO
COO
CMSO
Developer

Using Java Script you can write a character at random location on screen
By applying randomCh() method
With the help of String object
With the help of random character property
There is no built in approach in Java Script

The transistor is a solid state semiconductor device used for amplification and switching, and has _____ terminals.
one
two
three
four

Blue Pacific is a name of _____ computer.
Mini
Desktop
Micro
Super

Monte Carlo algorithm is an example of
Randomized algorithm
Greedy algorithm
both greedy and randomized
Heuristics

A set of stand alone productivity applications designed to work together known as __
Productivity software suites
Compiled software
Secure software
Intelligent software