We have been working very hard since 2009 to facilitate in your learning Read More. We can't keep up without your support. Donate Now.

www.bit.ly/vucodes

+ Link For Assignments, GDBs & Online Quizzes Solution

www.bit.ly/papersvu

+ Link For Past Papers, Solved MCQs, Short Notes & More

CS101 Solved MCQs - CS101 Solved Online Quizzes - CS101 Solved MCQs Bank - CS101 MCQs Collection from Online Quizzes

CS101 Solved MCQs - CS101 Solved Online Quizzes - CS101 Solved MCQs Bank - CS101 MCQs Collection from Online Quizzes

Virtual University MCQs BANK - MCQs Collection from Online Quizzes

CS101 Introduction to Computing MCQs - Quizzes MCQs

Avoid __________ to ensure readability of web page
Overuse of bold and italics
Use of paragraphs
Use of white space
Use of contrast colors

Deep Blue was the name of:
Human
Computer
City
None of the given choices

Using ____, a user can remotely log on to a computer (connected to the user through a network, e.g. Internet) & have control over it like a local user, including control over running various programs ?
FTP
TCP
Telnet Protocol
None of the given choices

Telnet Protocol
Using Telnet, a user can remotely log on to a computer (connected to the user’s through a TCP/IP
network, e.g. Internet) & have control over it like a local user, including control over running various programs In contrast, FTP allows file operations only

Typical use: Configuring and testing of a remote Web server
DoS is________ ?
Crime
Cyber crime
Not a crime
A software
__________ enables users located at far-way locations to easily share information with others located all over the world.
Protocol
Internet
Communication Channel
None of the given choices

Vacuum tubes were replaced by:
Transistors
Electrodes
Electric Relays
None of the given choices

Cyber crime can be used to
Damage a home computer
Bring down a business
Weaken the telecom, financial, or even defense-related systems of a country
All of the given

___ provides a simple, consistent way for applications to interact with the HW without having to know all the details of the HW
Explorer.exe
System Files
Operating System
Application Software

Communication protocol is a __________that governs the flow of information over a network
Set of methods
Set of protocols
Set of rules
Device

_____________ team is responsible for the maintenance, expansion , improvement of the infrastructure consisting of workstations, networking equipment, software and network security.
Support
Configuration Management
Quality Assurance
Developer
_____________ team consists on the sharpest technical minds in the company.
Architecture
Business Development
Configuration Management
Developer

_______________ is responsible for day to day operations.
CEO
COO
CMSO
Developer

Using Java Script you can write a character at random location on screen
By applying randomCh() method
With the help of String object
With the help of random character property
There is no built in approach in Java Script

The transistor is a solid state semiconductor device used for amplification and switching, and has _____ terminals.
one
two
three
four

Blue Pacific is a name of _____ computer.
Mini
Desktop
Micro
Super
https://vustudents.ning.com/
Monte Carlo algorithm is an example of
Randomized algorithm
Greedy algorithm
both greedy and randomized
Heuristics

A set of stand alone productivity applications designed to work together known as __
Productivity software suites
Compiled software
Secure software
Intelligent software


+ http://bit.ly/vucodes (Link for Assignments, GDBs & Online Quizzes Solution)

+ http://bit.ly/papersvu (Link for Past Papers, Solved MCQs, Short Notes & More)

+ Click Here to Search (Looking For something at vustudents.ning.com?)

+ Click Here To Join (Our facebook study Group)


Views: 134

Replies to This Discussion

CS101 Introduction to Computing Multiple choice Questions

Question # 1 of 10  Total M - 1 

Internet is an example of ______________ network. 

Select correct option: 

Private

Public

Both Private and Public

None of the given choices

 

Question # 2 of 10  Total M - 1 

The name of first commercially available PC was: 

UNIVAC 1

ENIAC

EDVAC

Altair 8800

 

Question # 3 of 10  Total M - 1 

Algorithm is a ____________________ 

Definition of a problem

Sequence of steps to solve a problem

Understanding of a problem

Solving a problem

 

 

Question # 4 of 10  Total M - 1 

A group of information is called __________________ 

File

Database

Record

Field

 Question # 5 of 10 ( Start time: 05:24:17 PM )  Total M - 1 

___________________ is a branch f computer science concerned with manipulating and enhancing computer graphics. 

Image Handling

Image Processing

Image Engineering

None of these

Question # 6 of 10  Total M - 1 

__________has changed our way of life like no other technology. 

Computational technology

Computer technology

Computing technology

None of the Above

 

Question # 7 of 10 Total M - 1 

Sophisticated event handling is not possible with _______________ event handling 

Off-Line

In-Line

Out-Line

Non of the given choices

 

Question # 8 of 10 Total M - 1 

Babbage’s Analytical Engine could store information permanently in: 

Magnetic Tape

Floppy Disk

Punched Cards

None of the given choices

  

Question # 9 of 10   Total M - 1 

There are __________ popular schemes to reduce the number of bytes that are required for storing graphics. 

 

4

None of these 

A number of clever schemes have been invented to reduce the number of bytes that are required for storing graphics. 2 popular ones:

Color mapping

Dithering

  

Question # 10 of 10 ( Start time: 05:30:01 PM )  Total M - 1 

The internet-society is considered under Surveillance because: 

While surfing, we are being watched, constantly

Our every click is recorded and analyzed to extract patterns and behaviors

Webcams are becoming common. Providing a cheap way for parents to watch their children's every move

All of the given

 

Which of the following is incorrect for making design elements legible?

Elements should be large enough

Elements must contrast sufficiently

Related elements should be visually grouped

Elements should have no visual focus

 

25.10 Making Display Elements Legible:

 

1. Designing (arranging) Display Elements

Elements must be large enough to be processed visually

Elements must contrast sufficiently with their backgrounds

Related elements should be visually grouped through the use of space, color, or graphical boundaries
The relative levels of importance among elements in a display should be revealed graphically

 

Question # 2 of 10  Total M - 1

1. Function is also known as ______________.

Select correct option:

subprogram

procedure

subroutine

All of given

 

Function:

A group of statements that is put together (or defined) once and then can be used (by reference)

repeatedly on a Web page Also known as subprogram, procedure, subroutine

 

In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET.

Select correct option:

1973

1983

1972

None of the given choices

E-mail system has ______ component(s)

Select correct option:

E-mail client

SMTP server

POP3 server

All of the given choices
 

A Parallelogram (Tilted rectangle) represents the ________________ flow chart element.

Select correct option:

Process

Input or Output

Decision

Connector

 

 

Punched cards were replaced by:

 

Floppy Disk

Zip Drives

Magnetic storage

None of the given choices

 

Ref:

http://en.wikipedia.org/wiki/Punched_card 

 During the 1960s, the punched card was gradually replaced as the primary means for data storage by magnetic tape, as better, more capable computers became available.

  

The ________virus may display an annoying, but harmless message

Select correct option:

Malicious

Neutral

Helpful

DoS

 

The internet communities are ___________.

Select correct option:

Geographical based

Interest based

Country based

Religion based

 

Question # 1  of 10  Total M -  1

Because of spending more time on the internet, the distances among the families have been _____.

Select correct option:

Increased

Expanded

Contracted

Shortened

 

 

Question # 3  of 10  Total M -  1

Autonomous Web Agents are also known as _________________

Select correct option:

Mobile Agents

Softbots

Both "Mobile Agents" & "Softbots"

None of these

 

A communication protocol is a __________that governs the flow of information over a network.

Select correct option:

Set of Methods

Set of Protocols

Set of rules

None of the given choices

 

Protocol

–Rules governing communications over the network

 

By default in a web page Hyper Link for another web page is represented as:

Blue only

Black and Underlined

Blue and Bold

Blue and Underlined

 

The organizations are learning that business can be done in a more effective manner if emphasis is placed upon ______________.

Select correct option:

Cooperation

Shared responsibility

Networking

All of the given

 

Question # 7  of 10 Total M -  1

Monitor is an example of __________devices

Select correct option:

Output

Input

Processing

None of the given choices

 

The code in the ________ portion is the right choice for developing larger JavaScript scripts

Select correct option:

Body

At End

Head

Separate
 

____________________ based on the principles of the logical reasoning ability of humans.

Select correct option:

Genetic Algorithms

Rule-based Systems

Feed-Forward Network

None of these

 

 

Rulebased Systems (1):

Based on the principles of the logical reasoning ability of humans

The key benefit of VPNs over conventional PNs is:

Security

Efficiency

Lower Cost

None of the given choices
 

In __________________ automatic machines perform various tasks that were previously performed by humans.

Select correct option:

Fuzzy Logic

Robotics

Rule based Systems

None of these

 CS101 Introduction to Computing Solved  MCQs 3

 

__________% of the users have left websites in frustration due to poor navigation. 
40 
 62 
83 
91 
 
In JavaScript, a variable declaration is 
 
Optional 
Mandatory 
Not allowed 
None of the given 
 
A protocol used for receiving email messages is called ____________. 

URL 
Telnet 
POP3
SMTP 
 
which one is correct? 
onUnload  
onUnLoad Your browser may not support display of this image. 
onUNLOAD  
All of the above 
 
 

 
Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called __________. 

Loop 
Sequence 
Condition 
Array 
 
Variables allow us to manipulate data through the ___________. 

Actual Value 
Reference 
Length 
Name 
 
Fuzzy logic is based on ____________. 

Ground facts 
Experience 
Practice 
Approximation 
 
Word Processor is a _________________ 

System Software 
Application Software 
Device 
Utility 
 
In the old days, databases did NOT support ____________. 

Number 
Boolean 
Video 
Text 
 
In tabular storage, fields placed in a particular row are strongly ___________. 

Independent 
Dependent 
Interrelated 
Inconsistent 

Due to working at home, lack of interaction may result in ___________ professional growth. 

Slower 

Your browser may not support display of this image.Faster 
Higher 
Improved 
 
Distance learning has got a boost due to the ___________. 
Easy communication 

Online interactive contents 
Flexibility 
All of the given options 
 
_____________ technique can be used to create smooth animations or to display one of several images based on the requirement. 

Image downloading 
Image preloading 
Image uploading 
Image postloading 

 
Tree structured organizational model 

Network paradigm 
Hierarchical structure 
None of the given options 
 
The group of technologies concerned with the capturing, processing and transmission of information in the digital electronic form is called 
_____________. 

Telecom Engineering 
Computer Engineering 
Computer Science 
Information Technology 
 
A large number of networks interconnected physically is called ______ 

LAN 
MAN 
Internet 
Network collection 
  

 

TCP stands for ________. 
 
Transfer Center protocol 
Transmission Control Protocol 
Transmission Center Protocol 
Telephone Center Protocol 


A collection of data organized in such a way that the computer can quickly search for a desired data item is known as : 
Retrieving 

Database 
Information 
Your browser may not support display of this image.DBMS 
 
______ is simply a fast port that lets you connect computer peripherals and consumer electronics to your computer without restart. 

Freeware 
Shareware 
Firewire 
Firmware 
 
Structures, in which another list starts before the first list is finished, are called: 

Multiple Lists 
Nested Lists
Ordered Lists 
Un-ordered Lists 
 
The key property of the ‘Array’ object in JavaScript is 

Value 
Length 
Name 
All of the given choices 
 
Which one is the example of spreadsheet software ? 

MS Word 
MS PowerPoint 
MS Excel 
MS Access 
  

 

The Encryption of data is related to 

Data updates 
Data security 
Data integrity 

Data accessibility 
 
_____ is the process of analyzing large databases to identify patterns. 

Data normalization 
Data management 
Data Mining 
None of the given options 
 
Which is the user-friendly way of presenting data ? 

Query 
Form 
Report 

All of the given options 
 
JavaScript function fixed() has equivalent HTML tag-set ____ 

<.FIX>……………</FIX> 
<F>………………..</F> 
<PRE>………….</PRE> 
<H>………………..</H> 

<form> Tags always placed between the <BODY> and </BODY> tags of a Web page 

True 
False 
 
Java script has ----------------- ability to create and draw graphics.   
Limited 
Versatile 
Medium 
 Not at all

CS101 Introduction to Computing MCQs 5


Which of the following is incorrect for making design elements legible?

Elements should be large enough

Elements must contrast sufficiently

Related elements should be visually grouped 

Elements should have no visual focus
 

1. Function is also known as ______________.

subprogram

procedure

subroutine

All of given

 

In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET.

 

1973 

1983

1972

None of the given choices

 

E-mail system has ______ component(s)

E-mail client

SMTP server

POP3 server 

All of the given choices

 

 

A Parallelogram (Tilted rectangle) represents the ________________ flow chart element. 

 

Process 

Input or Output

Decision

Connector

 

 If a computer could pass the Turing test then it would be able to:

win a million dollar prize 

think like human begins

think but slower than humans

do the things faster

 

 

 

Punched cards were replaced by:

Floppy Disk

Zip Drives

Magnetic storage

None of the given choices

 

 

 

The ________virus may display an annoying, but harmless message

 

Malicious 

Neutral

Helpful

DoS

 

The name of very first computer was:

ABC

BCD

EDC

None of the given choices
 

The internet communities are ___________.

Geographical based

Interest based

Country based

Religion based

An algorithm that always takes the best immediate or local solution while finding an answer is called____. 
Deterministic Algorithm
Non deterministic Algorithm
Greedy Algorithm
Randomized Algorithm 
 

 

Which of the following command allows you to recover form mistakes in MS Word?

Clear
Edit
Undo
Break

A ____________ operating system allows many users to take advantage of the computer's resources, simultaneously

 

          Single user

Multi- user

Single tasking

Multi tasking
 

Network Interface Card is an __________ device

Input

Output

Input/Output

Storage

 The decimal equivalent of binary 1000 is

7

8

9

10

 

Which of the following is NOT RDBMS software?

 My Sql
MS Excel
Oracle
SQL Server

A computer virus is a

Software that saves the computer from being damaged.

Application software that helps to make different type of viruses and worms

Program that spreads itself and destroys other program

Program that corrects the problems in your computer

 

What will be the result of a?

 

a = Math.abs(-23)

 

 

 23

 -23

 23.0

 2.3

 

A Special program required to view swf (Shockwave Flash) files in web Browser is called

 

 

 

 TFlash

 

Vflash

 

plug-in

 

None of the given options

 

 

 Using Java Script you can write a character at random location on screen

 

       By applying randomCh() method

       With the help of String object

       With the help of random character property

        There is no built in approach in Java Script

   

 

 If incorrectly we enter the negative age it is check by

 

        Limit Integrity

       Type Integrity

       Referential Integrity

       Physical Integrity

   

 

  Which protocol is use to transfer a file over the network?

 

 

       UDP

        FTP

       TCP

       OSI

   

 

 One can send an email message to a remote computer using _______ protocol

 

       HTTP

       SMTP

       FTP

        TELNET

  

 

 In a System having many parts to be designed, one should always do the _____ first

 

        Hard part

       Simple part

       Development part

       Quality part

   

 

 Flow control constructs in JavaScript includes:

 

 

       If-Else

       Loops and If -Else

        Switch and If-Else

        All of the given choices

   

 

 ___ provides a simple, consistent way for applications to interact with the HW without having to know all the details of the HW

 

 

       Explorer.exe

       System Files

        Operating System

       Application Software

   

 

 Machine language is also called

 

 

       Assembly Language

       Binary Language

        High Level Language

       HTML Language

   

 

 _________ is the best known builder for supercomputers.

 

 

       Sun

        Cray Research

        Microsoft

       Apple

   

 The weaknesses of the computer are:

 

 

       Pattern recognition & Storage

       Speed & Innovative ideas

 

        Pattern recognition & Innovative ideas

       Speed & Storage

   

 

 Communication protocol is a __________that governs the flow of information over a network

 

       Set of methods

       Set of protocols

        Set of rules

       Device

   

 

 _____________ team is responsible for the maintenance, expansion , improvement of the infrastructure consisting of workstations, networking equipment, software and network security.

 

        Support

       Configuration Management

       Quality Assurance

       Developer

 

 _____________ team consists on the sharpest technical minds in the company.

 

 

        Architecture

       Business Development

       Configuration Management

       Developer

   

 

 _______________ is responsible for day to day operations.

 

 

       CEO

        COO

       CMSO

       Developer

     

 One of the key responsibilities of the ___________ is client relationship management.

 

 

        Project Manager

       Team Lead

       Developer

       Quality Assurance Engineer

   

 

 What is the major problem with flash based website?

 

        Its two heavy

        Cannot be indexed

       Less attractive

       Inaccessible

   

 

 Which of the following is NOT an event handler for image object?

 

 

       onAbort

       onError

       onLoad

        onUser

   

 

 The organizations are learning that business can be done in a more effective manner if emphasis is placed upon ___________.

 

       Cooperation

       Shared responsibility

       Networking

        All of the given options

 

 

 

a = Math.abs(-23)

 

What will be the value of a ?

 

 

        23

        -23

       23.0

       2.3

   

 

 ERP is a type of __________________ .

       Entertainment software

       Productivity software

        Business software

       Scientific software

   

 

In Genetic Algorithm the most important thing you should know, is the ___________.

 

       Procedure

        Recognition of a good solution

       Different techniques

       None of the given options

   

 

 According to a popular heuristic, success is defined by ___________.

 

 

        The user

       The builder

       Both user and builder

       None of the given options

   

 Rule of thumb learned through trial and error is called ___________.

 

 

       Design

        Heuristic

       Plan

       Aim

   

 

 JavaScript Variables are ____________.

 

 

 

       Dynamically Typed

       Statically Typed

       Strong Typed

       None of the given options

   

 

 Which of the following application are collections of cells?

 

       Word

        Excel

       PowerPoint

       Outlook Express

  

 The browser breaks down the URL into ________ parts.

 

       2

        3

       4

       5

   

 

 A named collection of properties (data, state) and methods (instruction, behavior) is called ____________.

 

 

       Array

       Function

       Variable

        Object

   

 

 First computer network was ___________.

 

 

       NSFNET

       FIRSTNET

        ARPANET

       ORPHANET

   

 
In JavaScript, a variable declaration is 
 
 Optional 
Mandatory 
Not allowed 
None of the given 
 
A protocol used for receiving email messages is called ____________. 

 

URL 
Telnet 
 POP3 
SMTP 
 
which one is correct? 
 
 onUnload 

 
onUnLoad 
Your browser may not support display of this image. 
onUNLOAD 
 
All of the above 
 
 
Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called __________. 

 


 Loop 

 Sequence 
Condition 
Array 
 
Variables allow us to manipulate data through the ___________. 

 


 
Actual Value 

 Reference 
Length 
Name 
 
Fuzzy logic is based on ____________. 


Ground facts 
Experience 
Practice 
 Approximation 
  
 
Word Processor is a _________________ 

 

 

System Software 
 Application Software 
Device 
Utility 
 
In the old days, databases did NOT support ____________. 

 Number 
Boolean 
 Video 
Text 
 
In tabular storage, fields placed in a particular row are strongly ___________. 

 

 


 
Independent 

Dependent 
 Interrelated 
Inconsistent 

Due to working at home, lack of interaction may result in ___________ professional growth. 

 


 Slower 

Your browser may not support display of this image. Faster 
Higher 
Improved 
 
Distance learning has got a boost due to the ___________. 
 
Easy communication 

Online interactive contents 
Flexibility 
 All of the given options 
 
_____________ technique can be used to create smooth animations or to display one of several images based on the requirement. 

 


 
Image downloading 

 Image preloading 
Image uploading 
Image postloading 
 
The ____________ is becoming the preferred organizational structure for more and more organizations with the passage of time.

 

 
 
Tree structured organizational model 

 Network paradigm 
Hierarchical structure 
None of the given options 
 
The group of technologies concerned with the capturing, processing and transmission of information in the digital electronic form is called

 

_____________. 

 


Telecom Engineering 

Computer Engineering 
Computer Science 
 Information Technology 
 
A large number of networks interconnected physically is called ______ 


 
LAN 
MAN 
 Internet 
Network collection 
 
TCP stands for ________. 
 
 
Transfer Center protocol 
 Transmission Control Protocol 
Transmission Center Protocol 
Telephone Center Protocol 
 
A collection of data organized in such a way that the computer can quickly search for a desired data item is known as : 
 
Retrieving 
 Database 
Information 

 DBMS 

______ is simply a fast port that lets you connect computer peripherals and consumer electronics to your computer without restart. 

 


 
Freeware 

Shareware 
 Firewire 
Firmware 
 
Structures, in which another list starts before the first list is finished, are called: 


Multiple Lists 
Nested Lists 
Ordered Lists 
Un-ordered Lists 
  


The key property of the ‘Array’ object in JavaScript is 

 

 


 
Value 

 Length 
Name 
All of the given choices 
 
Which one is the example of spreadsheet software ? 

 


MS Word 

MS PowerPoint 
 MS Excel 
MS Access 
 
The Encryption of data is related to 

 


 
Data updates 

Data security 
Data integrity 
Data accessibility 
 
_____ is the process of analyzing large databases to identify patterns. 

 


 
Data normalization 

Data management 
 Data Mining 
None of the given options 
 
Which is the user-friendly way of presenting data ? 


 
Query 
Form 
 Report 

 All of the given options 
 
<form> Tags always placed between the <BODY> and </BODY> tags of a Web page 


 True 
False 
 
Java script has ----------------- ability to create and draw graphics.  
 
Limited 
Versatile 
Medium 
  Not at all 

 

 

 Which of the following is incorrect for making design elements legible?

 

Select correct option:

 

 

 

Elements should be large enough

 

 

Elements must contrast sufficiently

 

 

Related elements should be visually grouped

 

Elements should have no visual focus

 

 

 

 Function is also known as ______________.

 

Select correct option:

 

 

subprogram

 

procedure

 

 

subroutine

 

 

All of given

 

 

 

 

In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET.

 

 

 

Select correct option:

 

 

1973

 

1983

 

1972

 

 

None of the given choices

 

 

 

 

E-mail system has ______ component(s)

 

Select correct option:

 

 

 

 

E-mail client

 

 

SMTP server

 

 

POP3 server

 

All of the given choices

 

 

 

_______ / / /______/ A Parallelogram (Tilted rectangle) represents the ________________ flow chart element.

 

Select correct option:

 

Process

 

Input or Output

 

Decision

 

 

Connector

If a computer could pass the Turing test then it would be able to:

 

Select correct option:

win a million dollar prize

 

think like human begins

 

think but slower than humans

 

 

do the things faster

 

 

 

 

Punched cards were replaced by:

 

Select correct option:

 

 

 

Floppy Disk

 

 

Zip Drives

 

Magnetic storage

 

None of the given choices

 

 

 

 

The ________virus may display an annoying, but harmless message

 

Select correct option:

 

 

 

Malicious

 

Neutral

 

Helpful

 

 

DoS

 

 

 

 

The name of very first computer was:

 

Select correct option:

 

 

 

 

ABC

 

 

BCD

 

 

EDC

 

None of the given choices

 

 

 

 

The internet communities are ___________.

 

Select correct option:

 

 

 

Geographical based

 

Interest based

 

Country based

 

 

Religion based

 

 

 

 

 

which one is correct? 
 
 onUnload 

 
onUnLoad 
Your browser may not support display of this image. 
onUNLOAD 
 
All of the above 
 
 
Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called __________. 

 


 Loop 

 Sequence 
Condition 
Array 
 
Variables allow us to manipulate data through the ___________. 

 


 
Actual Value 

 Reference 
Length 
Name 
 
Fuzzy logic is based on ____________. 

 


Ground facts 
Experience 
Practice 
 Approximation 
 
Word Processor is a _________________ 

 

System Software 
 Application Software 
Device 
Utility 
 
In the old days, databases did NOT support ____________. 

 


 
Number 

Boolean 
 Video 
Text 
 
In tabular storage, fields placed in a particular row are strongly ___________. 

 


 
Independent 

Dependent 
 Interrelated 
Inconsistent 
 
Due to working at home, lack of interaction may result in ___________ professional growth. 

 


 Slower 

Your browser may not support display of this image. Faster 
Higher 
Improved 
 
Distance learning has got a boost due to the ___________. 
 
Easy communication 

Online interactive contents 
Flexibility 
 All of the given options 
 
_____________ technique can be used to create smooth animations or to display one of several images based on the requirement. 

 


 
Image downloading 

 Image preloading 
Image uploading 
Image postloading 
 
The ____________ is becoming the preferred organizational structure for more and more organizations with the passage of time.

 

 
 
Tree structured organizational model 

 Network paradigm 
Hierarchical structure 
None of the given options 
 
The group of technologies concerned with the capturing, processing and transmission of information in the digital electronic form is called

 

_____________. 

 


Telecom Engineering 

Computer Engineering 
Computer Science 
 Information Technology 
 
A large number of networks interconnected physically is called ______ 


 
LAN 
MAN 
 Internet 
Network collection 
 
TCP stands for ________. 
 
 
Transfer Center protocol 
 Transmission Control Protocol 
Transmission Center Protocol 
Telephone Center Protocol 
 
A collection of data organized in such a way that the computer can quickly search for a desired data item is known as : 
 
Retrieving 
 Database 
Information

 DBMS 

 

 
______ is simply a fast port that lets you connect computer peripherals and consumer electronics to your computer without restart. 

 Freeware 

Shareware 
 Firewire 
Firmware 
 
Structures, in which another list starts before the first list is finished, are called: 

 


Multiple Lists 

Nested Lists 
Ordered Lists 
Un-ordered Lists 
 
The key property of the ‘Array’ object in JavaScript is 

 


 
Value 

 Length 
Name 
All of the given choices 

Which one is the example of spreadsheet software ? 

 


MS Word 

MS PowerPoint 
 MS Excel 
MS Access 
 

 

 
_____ is the process of analyzing large databases to identify patterns. 

 


 
Data normalization 

Data management 
 Data Mining 
None of the given options 
 
Which is the user-friendly way of presenting data ? 

 


 
Query 

Form 
 Report 
Your browser may not support display of this image. All of the given options 
 
JavaScript function fixed() has equivalent HTML tag-set ____ 

 


<.FIX>……………</FIX> 

<F>………………..</F> 
<PRE>………….</PRE> 
<H>………………..</H> 
 
<form> Tags always placed between the <BODY> and </BODY> tags of a Web page 


 True 
False 
 
Java script has ----------------- ability to create and draw graphics.  
 
Limited 
Versatile 
Medium 
  Not at all 

 

Internet is an example of ______________ network. 

 

 

 

 

Private

 

Public

 

Both Private and Public

 

 

None of the given choices

 

 

 

 

 

The name of first commercially available PC was: 

 

 

 

UNIVAC 1

 

ENIAC 

 

EDVAC 

 

Altair 8800

 

 

 

 

 

Algorithm is a ____________________ 

 

 

 

 

Definition of a problem

 

Sequence of steps to solve a problem

 

Understanding of a problem

 

 

Solving a problem

 

 

 

 

A group of information is called __________________ 

 

 

 

 

File

 

 

Database

 

Record

 

Field

 

 

 

 

 

___________________ is a branch of computer science concerned with manipulating and enhancing computer graphics. 

 

 

 

 

Image Handling

 

Image Processing

 

Image Engineering

 

 

None of these

 

 

 

 

 

__________has changed our way of life like no other technology. 

 

 

 

 

Computational technology

 

Computer technology

 

Computing technology

 

 

None of the Above

 

 

 

 

 

Sophisticated event handling is not possible with _______________ event handling 

 

 

 

 

Off-Line

 

In-Line

 

Out-Line

 

 

Non of the given choices

 

 

 

 

Babbage’s Analytical Engine could store information permanently in: 

 

 

 

Magnetic Tape

 

 

Floppy Disk

 

Punched Cards

 

None of the given choices

 

 

 

 

 

There are __________ popular schemes to reduce the number of bytes that are required for storing graphics. 

 

 

 

 

4

 

 

 

 

 

 

None of these 

 

 

 

 

 

The internet-society is considered under Surveillance because: 

 

 

 

 

While surfing, we are being watched, constantly

 

 

Our every click is recorded and analyzed to extract patterns and behaviors

 

 

Webcams are becoming common. Providing a cheap way for parents to watch their children's every move

 

 

All of the given

 

 

 

 

  

 

 

URL is a/an ________

 

       Device

 

 

       Component

 

 

        Address

 

       Tool

 

 

   

 

 

To improve the time for scanning a web page, text should be ___________.

 

       Centered

 

 

       Left Aligned

 

 

       Right Aligned

 

 

       Staggered

 

 

 

 

Communications on the internet is controlled by a set of two protocols which are ____________.

 

       IMAP and SMTP

 

 

 

 

 

       FTP and HTTP

 

 

 

 

 

        TCP and IP

 

 

 

 

       TCP and HTTP

 

 

 

 

FTP stands for __________.

 

       File transmission protocol

 

 

       File transmission path

 

 

        File transfer protocol

 

       Fine transfer path

 

 

   

 

 

A named collection of properties (data, state) and methods (instruction, behavior) is called ____________.

 

       Array

 

 

       Function

 

 

       Variable

 

 

        Object

Anchor tag denoted by <A> is used to create 

       Address

       Hyperlink

        Paragraph

        Title

 

<UL> tag is used to

 

       underline text

        end the line

        create ordered list

        create unordered list

 

A user may access any item on the web through __________.

 

        URL

        Telnet

       POP

        SMTP

  

The browser breaks down the URL into ________ parts.

 

       2

         3

       4

        5

 

  

Which one of the following is NOT a primary color?

 

        Red

 

 

       Green

 

 

        Yellow

 

       Blue

 

 

   

 

 

According to a popular heuristic, success is defined by ___________.

 

        The user

 

       The builder

 

 

       Both user and builder

 

 

       None of the given options

 

 

   

 

 

The idea of Neural Networks field is based upon ______________.

 

       Human nature

 

 

        Human brain

 

       Human culture

 

 

       Human actions

 

 

   

 

ERP is a type of __________________ .

       Entertainment software

       Productivity software

        Business software

       Scientific software

 

   

 

 

__________ are those programs in which the flow of the program is determined by the user's actions (mouse clicks, key presses) or messages from other programs.

 

 

 

       Event called programs

 

 

       Event processed programs

 

 

        Event driven programs

 

       Event declared programs

 

 

   

 

 

Automatic machines performing various tasks that were previously done by humans, are called ____________.

 

 

 

 

        Robotics

 

       Computers

 

 

       Decision Making Systems

 

 

       Autonomous Web Agents

 

 

   

 

 

country=”Hello Pakistan”;

 

document.write(country.charAt(6));

 

 

 

The out put of the above statement is _____________.

 

       o

 

 

        P

 

       a

 

 

       k

 

 

   

 

 

The distance among families is ___________ because of spending more time on internet.

 

 

 

 

        Increased

 

       Expanded

 

 

       Contracted

 

 

       Decreased

 

 

   

 

The software used for the scanning of internet severs, is called __________.

 

 

 

 

       Wscan

 

 

       Mscan

 

 

        Sscan

 

       Vscan

 

 

    

 

 

Adding images to html page, we use___________ tag.

 

 

 

 

        <IMG>

 

       <IMAGE>

 

 

       <PICTURE>

 

 

       <PIC>

 

 

   

 

 

The group of technologies concerned with the capturing, processing and transmission of information in the digital electronic form is called _____________.

 

 

 

 

       Telecom Engineering

 

 

       Computer Engineering

 

 

       Computer Science

 

 

        Information Technology

 

   

 

 

The responsibilities of the Team Lead includes_____________.

 

 

 

 

       Planning and tracking of the project

 

 

       Detailed design

 

 

       Professional development of team members

 

 

        All of the given options

 

   

 

 

When the packets reach at destination, __________ reassembles them into original message.

 

 

 

 

       Protocol

 

 

        TCP

 

       IP

 

 

       NIC

 

 

   

 

 

Many developers write the _________ first and then incrementally convert each line into _________.

 

 

 

 

        Real code & Pseudo code

 

        Pseudo code & Real code

 

       Real code & Artificial code

 

 

       None of the given options

 

 

   

 

Machine language is also called

 

 

 

 

       Assembly Language

 

 

       Binary Language

 

 

        High Level Language

 

       HTML Language

 

 

   

 

 

In JavaScript, second element of an array has the index:

 

 

 

 

       2

 

 

       0

 

 

        1

 

       3

 

 

    Each element in an array is given an index, which is an integer value between 0 and one less than the length of the array. The first element has an index of 0, the second element has an index of 1, and so on.

 

 

 

 

One can download or upload files to a remote computer using ________ protocol.

 

 

 

       HTTP

 

 

       SMTP

 

 

        FTP

 

       TELNET

 

 

   

 

 

JavaScript ________ support drawing of graphics

 

 

 

       Does

 

 

        Does not

 

       Always

 

 

       At times

 

 

 Which of the following is NOT true about modern computers?

 

 

 

       More powerful

 

 

       Smaller in size

 

 

       Consume less energy

 

 

        Costly

 

   

 

 

Ada written a computer programme for ?

 

 

 

 

        Analytical Engine

 

 

 

 

 

        Difference Engine

 

 

 

 

        Harvard Mark 1

 

 

 

 

        Mechanical engine

 

 

 

 

   

 

A set of stand alone productivity applications designed to work together known as ______________ .

 

 

 

        Productivity software suites

 

 

 

 

       Compiled software

 

 

 

 

 

       Secure software

 

 

 

 

 

       Intelligent software

 

 

Because of spending more time on the internet, the distances among the families have been _____.

 

 

 

Increased

 

Expanded

 

 

Contracted

 

 

Shortened

 

 

 

 

 

Sophisticated event handling is not possible with _______________ event handling

 

 

 

 

Off-Line

 

In-Line

 

Out-Line

 

 

Non of the given choices

 

 

Autonomous Web Agents are also known as _________________

Mobile Agents 

Softbots 

Both "Mobile Agents" & "Softbots" 

None of these
 

A communication protocol is a __________that governs the flow of information over a network.

Set of Methods 

Set of Protocols 

Set of rules 

None of the given choices
 

By default in a web page Hyper Link for another web page is represented as:

Blue only 

Black and Underlined 

Blue and Bold 

Blue and Underlined

 

The organizations are learning that business can be done in a more effective manner if emphasis is placed upon ______________.

Cooperation 

Shared responsibility 

Networking 

All of the given

Monitor is an example of __________devices

Output

Input  

Processing 

None of the given choices

 

The code in the ________ portion is the right choice for developing larger JavaScript scripts

Body 

At End 

Head 

Separate

____________________ based on the principles of the logical reasoning ability of humans.

 

Genetic Algorithms 

Rule-based Systems 

Feed-Forward Network

None of these
 

The key benefit of VPNs over conventional PNs is:

Security 

Efficiency 

Lower Cost

None of the given choices

onFocus executes the specified JavaScript code when ___________

            a window receives focus

            a form element receives input focus

            a window receives focus or when a form element receives input focus

            None of the Given.

 

CERN releases WWW in:

1992

1993

1994

None of the given choices

 

Communications on the internet is controlled by a set of two protocols, named :

            HTTP & SMTP

            FTP & TELNET

            TCP & IP

            None of the given choices

One of the disadvantages of working at home is________________

            Family life may be happier because of living at home.
            Family life may suffer as well, as some never turn off, and keep on working through out the day, evening and night

            Family life may become happier because he can give more time to his family.

            There is no disadvantage of working at home.

 

The greatest, shared resource of information created by humankind is:

            Web

            Dictionary

            Vocabulary

            Glossary

 

 

There are _____________ types communication channels.

            2

            3

            4

            5

 

The Cyberwarefare is a ______

            Crime

            War

            Software

            Game

 

In the statement “PopUp(“Message”)” :

            “PopUp” is the function Name, “Message” is the argument

            “Message” is function identifier

            Syntax Error: functions cannot be called in this way

            Error: function is undefined

 

RGB scheme stands for _________________________________.

            Red Grey Blue

            Red Green Brown

            Red Green Blue

            Red Green Black

 

_____________ is the part of the virus that generally consists of malicious computer instructions

            Off load

            Payload

            Loader

            Transmitter

 

Unlike viruses, __________________ are stand-alone programs

            Trojan horses

            Logic- or time-bombs

            Worms

            None of the given

 

Voice over IP has _____ modes

 

            2

            3

            4

            5

 

We use __________ to stop Break-Ins.

            Scanners

            Intrusion detectors

            Firewalls

            Intrusion detectors and Firewalls

 

Which one can lead user to leave your website?

            Simple design

            Poor navigation

            Information layout

            Adaptable design

 

_____________________ are the subcategories of AI

            Expert Systems

            Robotics

            Natural Language Processing

            All of the above

With the Help of FTP we can:

 

            List, change, create folders on a remote computer

            Upload and download files

            Transferring Web content from the developer’s PC to the Web server

            All of the given choices

 

Which protocol is used for receiving E-mail messages?

            FTP

            POP

            Telnet Protocol

            SMTP

 

The organizations are learning that business can be done in a more effective manner if emphasis is placed upon ______________.

            Cooperation

            Shared responsibility

            Networking

            All of the given

 

___ is used to transfer files between computers on a TCP/IP network

FTP

POP

Telnet Protocol

SMTP

 

Which of the following is True about “pareseFloat(String)” function: I) If the first character cannot be converted to a number, parseFloat returns NaN. II) it returns the fractional portion of floating point number. III) Parses the string argument; returns a FP number. IV) Non of given options.

            I and II Only

            II and III Only

            I and III Only

            IV Only

 

Event-driven programs can ____________________ events.

            capture

            respond

            capture and respond

            None of the Given.

 

Which of the statements is NOT true about “Color Usage Guidelines” for developing a presentation?

            Use color sparingly to to highlight a point, but don't get carried away

            Do not use colors like yellow or red for background except where needed.

            Do not use colors like green, blue and such like colors except where needed.

            None of given options

 

_________________ Type of databases management systems are supporting Terabytes of Data

            Personal

            Desktop

            Enterprise

            Single-user

 

Because of the ever-decreasing costs of verbal, text, video communications; the distances have _________

            Increased

            Expanded

            Contracted

            Lengthened

 

The structure of the networked organization is _________.

            Simple

            Flexible

            Complex

            All of the given

 

A CAD drawing consist of many geometric shapes like straight lines , arc , tc and therefore is stored in a ___________ format.

            Scalar

            Vector

            Both a & b

____ is a type of computer-to-computer messaging.

            TCP

            Telnet

            E-mail

            FTP

 

 

            None of these

 

RDBMS stands for ________________________________

            Relative Data Base Management System

            Relational Data Base Management System

            Recursive Data Base Management System

            Responsible Data Base Management System

 

Using Color Mapping scheme only a limited number of color called _____________ are allowed.

            Reserved

            Pointers

            Platelet

            None of these

Using _________ topology, adding new nodes is difficult.

            Ring

            Bus

            Star

            None of the given choices

 

Problems with old presentation methods was (transparencies and projectors etc):

            They were costly

            Electronic transmission, in some cases, was not easy

            Presentation some times gets ambiguous

            All of given options

 

ARPANET splits into two nets to keep military & non-military network sites separate, named :

 

            ARPANET & MILNET

            MICRONET & MILNET

            PICONET & ARPANET

            None of the given choices

 

Arguments values are passed to the function _________

            by value

            by reference

            Both a & b

            Non of the Given.

 

__________________ is a field that uniquely identifies each record stored in a table.

            Primary Key

            Foreign Key

            Secondary key

            Special Key

 

The IP address consists of _____ bits

            64

            32

            16

            128

 

Credit Card Fraud can be minimized by using _________________

            single credit card numbers

            multiple-use credit card numbers

            single-use credit card numbers

            Firewalls

 

hotWeather = (Temperature == 40); in the above statement, the variable hotWeather is of type

            Number

            String

            Boolean

            None of the given


Ref:
 
you are evaluating a condition (temperature ==40) and result of this condition is getting stored in HotWeather variable. which is boolean in form
 
Output of evaluation of condition is in the form of true or false which is a boolean value
 
Here I Try to key few lines to help you to see live (copy paste these in any test.htm) and run in broswer

RSS

© 2020   Created by +M.Tariq Malik.   Powered by

Promote Us  |  Report an Issue  |  Privacy Policy  |  Terms of Service

.