We are here with you hands in hands to facilitate your learning & don't appreciate the idea of copying or replicating solutions. Read More>>

www.vustudents.ning.com

 www.bit.ly/vucodes + Link For Assignments, GDBs & Online Quizzes Solution www.bit.ly/papersvu + Link For Past Papers, Solved MCQs, Short Notes & More

Dear Students! Share your Assignments / GDBs / Quizzes files as you receive in your LMS, So it can be discussed/solved timely. Add Discussion

# CS101 All Current Final Term Papers Fall 2012 (20 February to 03 March 2013) at one Place

CS101 All Current Final Term Papers Fall 2012 (20 February to 03 March 2013) at one Place

From 20 February to 03 March 2013 Fall 2012

Current Final Term Papers Fall 2012 Papers, Feb 2013 Final Term Papers, Solved Final Term Papers, Solved Papers, Solved Past Papers, Solved MCQs

Please Share your Current Papers Questions/Pattern here to help each other. Thanks

+ How to Join Subject Study Groups & Get Helping Material?

+ How to become Top Reputation, Angels, Intellectual, Featured Members & Moderators?

+ VU Students Reserves The Right to Delete Your Profile, If?

Views: 3556

.

+ http://bit.ly/vucodes (Link for Assignments, GDBs & Online Quizzes Solution)

+ http://bit.ly/papersvu (Link for Past Papers, Solved MCQs, Short Notes & More)

### Replies to This Discussion

Please Share your Current Papers Questions/Pattern here to help each other. Thanks

Inline event Handle? usage?

URL?

HTML?

Database v/s DBMS?

Decimal to Binary and decimal to propositional notaion?

tele-presnts in context of computing and their many benefits with situation and example?

Today paper of CS101.The question which i have remebered? Total 52 questions.

Mcq's=40            each mcq carry 1mark.

Short questions=  2 and 3marks

Long question=5marks each

Q:Diffrentiate b/w TCP/IP  in terms os sending and receiving e-mails?

Q: Write six string examples of HTML wrapped?

Q:Professionals or organizations are using ethical behaviour but some professionals or organizations are not.Give two examples of unethical behavior of pfrofessional or organizationals?

Q:Why custom based is too expensive then public based?this is not the complete question but this i have remembered/.

Q:There are malicious virus which are harmfull for games.Tell the names of tehse viruses and discuss how they harmful?not completequestion.

and there are some questions from HTML and javascript.There were a table and we have to write the HTML code.

Q:Diffrentiate b/w TCP/IP  in terms os sending and receiving e-mails?

TCP break down the message into packets and IP routs these packetes thorugh internet to the recieving destination and then the TCP of recieving message computer again convert it into computer readable form.

Q: Write six string examples of HTML wrapped?

big()

small()

fontsize(n)

sub()

sup()

bold(), italics(), strike()

Q:Professionals or organizations are using ethical behaviour but some professionals or organizations are not.Give two examples of unethical behavior of professional or organizationals?

Illegal use.

Page 301.

Q:Why custom based is too expensive then public based?this is not the complete question but this i have remembered/.

I thnk costom based software is too expensive because its develope for a person or company or shop. the software is designed acording to all requirements of that company or shop.

Q:There are malicious virus which are harmfull for games.Tell the names of tehse viruses and discuss how they harmful?not completequestion.

+ (((♥╣✿PHY301 :(✿╠♥) + thanks for sharing to help other

Note for All Members: You don’t need to go any other site for current Final Term papers fall 2012, Because All discussed data/sharing of our members in this discussion are going from here to other sites. You can judge this at other sites yourself. So don’t waste your precious time with different links.

Today Final Term Paper Fall 2012

On 21 Feb 2013

Total Questions: 52

Total Marks: 80

Total MCQs: 40 (Each of 1 Mark)

Total Short Questions: 4 (Each of 2 Mark)

Total Short Questions: 4 (Each of 3 Mark)

Total Long Questions: 4 (Each of 5 Mark)

1. Discuss main reasons for hiring temporary professionals by computer organizations instead of permanent workers. (5)
2. HTML code for List. (5)
3. Discuss the function arguments with java script code example. (5)
4. Write javascript code “compare with (value)” which compare value 10 and display alert. (5)
5. Suggest any 5 security measures organization can ensure the security of data.
6. Suppose as a tester you asked to test a webpage designed by “user login”. Write any three test case you implement to test the webpage. (3)
7. Write any three problems a user face in odd modes of presentation. (3)
8. Ordered list HTML code. (3)
9. How many exit and entry points are there in conditional statement. (2)
10. Which protocol enables a user to login to a computer remotely. (2)

Today's solved subjective paper....

q1     2 marks

is it possible to run an application in the private memory space of another application?

Ans:

No, Application can neither run into the private memory space of another app, nor be run into by another application .Different types of memory (e.g. main, cache) in the system must be used properly, so that each app can run most effectively .

q2 marks 2

if we categorize the networks in termos of the distance they cover, then what will be the types of network? just write the names

Ans:

LAN:  local area network

WAN: wide area network

MAN: metropolitan area network

q3 maris 2

how animation of images is easy through javascript?

Ans:

Images in JavaScript can be manipulated in many ways using the built-in object,

Image.Properties: name, border, complete, height, width, hspace, vspace, lowsrc, src

• • Methods: None
• • Event handlers: onAbort, onError, onLoad, etc.

These all easy statements and command helps in javascript to animate any image .

q4 marks 2

each of javascript method has different functionality. Discuss the functionality of   tostring() method.

Ans:

The ‘toString’ Method assigns Explicit conversion to a string

EXAMPLE:

Convert 100.553478 into a currency format

a = 100.553478 ;

b = a.toString( ) ;

decimalPos = b.indexOf( ".", 0 ) ;

c = b.substring( 0, decimalPos + 3 ) ;

document.write( c ) ;

q5 marks 3

how can we reduce the heat effect for processor?

Ans:

A component designed to lower the temperature of an electronic device by dissipating heat into the surrounding air. All modern CPUs require a heat sink. Some also require a fan. A heat sink without a fan is called a passive heat sink; a heat sink with a fan is called an active heat sink.

q6 marks 3

suppose A& B are two java script based programs intending to solve the same problem. List any three differences between the program A and the program B assuming that only the program A is coded using the "Function" approach.

q 7 marks 3

Artificial intelligence is a wide field which can be further categorized into sub categories. you are required to briefly discribe its any three sub-categories.

Ans

a)Neural networks: original inspiration was human brainemphasis now

usefulness as a computational tool

1) Genetic Algorithms : based on darwins evolutionary principle

GA requires the ability to recognize a good solution but not howto get to that

solution

2) rulebased systems

b) the right techniques

Examples:

In medical: Artificial intelligence, Expert System for Chest Pain Diagnosis.

In industry: Artificial intelligence ,Expert System for Automobile Troubleshooting

In space: Artificial intelligence, tele-robots.

q 8  marks 3

A program is reviewed for finding and removing errors before it is handed over to its clients. Discuss the two main approaches of finding and removing errors from a program.

Ans:

A program is reviewed for finding and removing errors before it is handed over to its clients. the two main approaches of finding and removing errors from a program are as follows,

Testing:    The tasks performed to determine the existence of defects

Debugging: The tasks performed to detect the exact location of defects

q 9 mars 5

explain how does the process of instant messaging from one computer to another cmputer take place?

Ans:

User launches the IM client

IM client finds the IM server & logs in

It sends communication info (IP address, etc) to the IM server

IM server finds user’s contacts & sends him/her the communication info

for the ones online

IM server also tells the contacts that the user is online; sends his/her

communication info to them

Now the user’s & the contact’s IM clients are ready to communicate

directly (P2P)

Once the IM server provides the communication info to the user and his/her contact’s IM client, the two are able to communicate with each other without the IM server’s Assistance.

q 10 marks 5

the appropriateness of a technique of technology can be determined by considering some aspects related to that technique of technology . enlist any five aspects which may be considered while selecting an AI technique.

Ans:

if 2 techniques produce solutions of a similar quality, matching the right technique

to a problem can save on time & resources

Characteristics of an optimal technique:

The solution contains all of the required information

The solution meets all other necessary criteria

The solution uses all of the available (useful) knowledge

How do we determine the suitability of a particular AI technique for a given task. We

look at the task’s requirements and then see which technique fulfils those requirements

more completely – the one which does, is the one we use!

q 11 5 marks

write HTML code for the following output

I have a bike :

i have a car:

i have an airplane:

Ans:

<HTML>

<TITLE> cs101 final exam</TITLE>

<BODY>

<UL>

<LI> I have a bike:</LI>

<LI> i have a car:</LI>

<LI> i have an airplane:</LI>

</UL>

</BODY>

</HTML>

q 12 marks 5

how marketing strategies are being changed with the progress in the field of computer and also describe how new marketing strategies are being implemented.

Making and using a marketing strategyhas a strong positive impact on profitability.  The Web has changed marketing forever, redirecting it from a mass focus to a

single-person focus.one of the best sating about bussines is “Want more Business – Knock on more Doors”.and for this purpose net provide us the best solutions.  The vast quantity of online information and resources should always be utilized intelligently; One of the few exceptions to this premise is when someone discovers a great “Low Cost” product or service, and is able to market it efficiently and effectively using the internet.

Some effective marketing strategies are:

Perfect Website Title

Search engine optimization.

plz jin ka aj cs101 ka paper hua ha share ker da plzzzzzzzzzzzzzzzzzzzzzzzzzzz

total 52 questions;

40 mcq's

1- define animated GIF images?    2 marks

2-what will be the title of web page in given code?    2 marks

3-which DBMS technique presenets data in a user friendly way?   2 marks

4-why programmers dont use global variabels?  2 marks

5- how can we say that intranet is a smaller version of internet?    3 marks

6-mention three responsibities of project meneger?    3 marks

7-mention three sub categories of AI ?   3 marks

8-explain aspects of web desighn which play an important role in providing the relevent stuff from a web site in min time?  3 marks

9-give an example to create a cell space of 10 pixels b/w each cell of an HTML tabel. explain the example    5 marks

10-write down 4 properties, one method and two event handler of java script's built in image object.   5 marks

11-java script function can be used as an argument. write a java script code example for the function argument and discuss the function argument in example code?    5 marks

12-there are some popular computer programms which behave like a virus . mention the name of any two of them with their working?   5 marks

Q:Diffrentiate b/w TCP/IP  in terms os sending and receiving e-mails?

Q:Professionals or organizations are using ethical behaviour but some professionals or organizations are not.Give two examples of unethical behavior of professional or organizationals?

Q:Why custom based is too expensive then public based?this is not the complete question but this i have remembered/.

Q:There are malicious virus which are harmfull for games.Tell the names of tehse viruses and discuss how they harmful?not completequestion.

Q: Write six string examples of HTML wrapped?

big()

small()

fontsize(n)

sub()

sup()

bold(), italics(), strike()

Q:Diffrentiate b/w TCP/IP  in terms os sending and receiving e-mails?

Q: Write six string examples of HTML wrapped?

Q:There are malicious virus which are harmfull for games.Tell the names of tehse viruses and discuss how they harmful?not completequestion.

and there are some questions from HTML and javascript.There were a table and we have to write the HTML code.

Q:Professionals or organizations are using ethical behaviour but some professionals or organizations are not.Give two examples of unethical behavior of pfrofessional or organizationals?

Q:Why custom based is too expensive then public based?this is not the complete question but this i have remembered/.

Total Questions: 52

Total Marks: 80

Total MCQs: 40 (Each of 1 Mark)

Total Short Questions: 4 (Each of 2 Mark)

Total Short Questions: 4 (Each of 3 Mark)

Total Long Questions: 4 (Each of 5 Mark)

## Latest Activity

Alone Struggler replied to Isha Chuhdary's discussion Mera sher
4 minutes ago
Alone Struggler liked Isha Chuhdary's discussion Mera sher
5 minutes ago
5 minutes ago
Alone Struggler liked Isha Chuhdary's discussion paka
10 minutes ago
Alone Struggler replied to Isha Chuhdary's discussion paka
11 minutes ago
15 minutes ago
+ ! ! ! ❣ maho ❣ ! + added a discussion to the group MTH603 Numerical Analysis

### mth603 past paper

20 minutes ago
23 minutes ago
+ ! ! ! ❣ maho ❣ ! + joined + M.Tariq Malik's group

### MTH603 Numerical Analysis

26 minutes ago
+ ! ! ! ❣ maho ❣ ! + posted a discussion

### Ary kia krti ho??????????????????

28 minutes ago
31 minutes ago
+ıllıllı \$µǥąя ǥ€ɲɨµ\$ ıllıllı+ liked Isha Chuhdary's discussion paka
34 minutes ago

1

2

3