Академический Документы
Профессиональный Документы
Культура Документы
FINALTERM EXAMINATION
Spring 2010
CS101- Introduction to Computing
► An electrical machine
► A digital machine
► An analog machine
► Unified
► Complex
► Consistent
► Predictable
(Web Design for Usability)
Designs should be consistent & predictable (unified)
PAGE 185
A vocabulary and set of grammatical rules for instructing a computer to perform specific
tasks is called
► Software
► Programming language
► Device driver
► Interpreter
Programming Language
A vocabulary and set of grammatical rules for instructing a computer to perform
specific tasks
PAGE 129
► Domain name
► Network name
► VoIP
Domain Names
IP addresses are fine for computers, but difficult to recognize and remember for humans
A domain name is a meaningful, easy-to-remember label for an IP address
PAEGE 210
► Row A, Cloumn 12
► Row 2,Cloumn A1
EXCEL
According to the heuristic, the number of defects remaining in a system after a given
level of tests is proportional to ___________.
Which one is the best option for designing a Medical Expert System?
► Genetic Algorithm
► Fuzzy Logic
► Neural Network
► Clear
► Edit
► Undo
► Break
► Integer
► Float
► String
► Boolean
► Scanners
► Intrusion detectors
► Utilities
Break-Ins
• Hackers are always trying to break-in into Internet-connected computers to steal
info or plant malicious programs
Defense: Intrusion detectors
Page 276
► Team Lead
► Project Manager
► CEO
► IT Manager
Project Manager
• Responsibilities:
Planning and tracking of the project
Arranging of the appropriate resources
lient relationship management
page 296
► Technology selection
► High-level design
Architect
• Responsibilities:
Technology selection
High-level design
Makes certain that the implementation remains true to the design
Page 296-297
► src
► image
► None of the given options
► alt
<IMG src=URL
► Event Handler
► Properties
► Methods
Now a days, users communicate with the computer using a consistent __________
provided by the Operating System.
► Command-line interface
► Application Interface
► User Interface
► Protocol
User Interface
Users communicate with the computer using a consistent user interface provided by the
OS
Page 66
One can browse documents residing on a remote computer using ________ protocol.
► HTTP
► SMTP
► FTP
► TELNET
I can browse documents residing on a remote computer using the HTTP protocol
Page 185
► Cable
► Connector
► Hub
► Repeater
Hub
–The network traffic controller
Page 186
User can remotely log on to a computer and can have a control over it like a local user
using
► TelNet Protocol
Telnet Protocol
Using Telnet, a user can remotely log on to a computer (connected to the user’s through
a TCP/IP network, e.g. Internet) & have control over it like a local user, including
control over running various programs
In contrast, FTP allows file operations
Page 211
PAPER 2
FINALTERM EXAMINATION
Spring 2010
CS101- Introduction to Computing (Session – 2)
► Navigation
► Arrangement
► Layout
► Home
Website Navigation:
The interface/controls that a Website provides to the user for accessing various parts of
the Website
It probably is the most important aspect of the design of a Website
Page 171
► Object-based
► Object-oriented
► Machine
► Assembly
JavaScript is Object-Based
treats as an object – e.g. a windowor a button
page 120
SW Design Methodology ?
The set of (often flexible) rules and guidelines a team of developers followto construct
reasonably complex SW systems
page 131
Returns integer
nearest to x
page 249
Image
•Properties: name, border, complete, height, width, hspace, vspace, lowsrc, src
•Methods: None
•Event handlers: onAbort, onError, onLoad, etc.
Page 286
Firewire
FireWire is simply a really fast port that lets you connect computer peripherals and
consumer electronics to your computer without the need to restart.
Page 24
onBlur executes the specified JavaScript code when a window loses focus or a
form
element loses focus
http://www.roseindia.net/jsp/simple-jsp-example/while-loop-in-jsp.shtml
► Sorted Words:
Sorted Words:
http://www.w3schools.com/jsref/tryit.asp?filename=tryjsref_abs
Question No: 17 ( Marks: 1 ) - Please choose one
A good algorithm should have the following properties.
► Consistency
► Unambiguousness
► Efficiency
► All of the given options
► Literals
► Operators
PAPER 3
FINALTERM EXAMINATION
Spring 2010
CS101- Introduction to Computing
Question No: 1 ( Marks: 1 ) - Please choose one
► Heading
► Function
► Identifier
► Equal sign
LECTURE 32 SLIDE
According to the heuristic, the number of defects remaining in a system after a given
level of tests is proportional to ___________.
Which one is the best option for designing a Medical Expert System?
► Genetic Algorithm
► Fuzzy Logic
► Neural Network
► Corel Draw
► Desktop Publishing
► Paint
► WordPad
► Word length
► None of above
► Encryption
► Typing errors
► Transmission errors
► Hardware malfunctions
► Composite Key
► Primary key
► Foreign key
Primary Key is a field that uniquely identifies each record stored in a table
Page 263
Question No: 9 ( Marks: 1 ) - Please choose one
►2
►3
►4
►5
Types of Errors
•Syntax errors
•Semantic errors
•Run-time errors
Page 312
______ is simply a fast port that lets you connect computer peripherals and consumer
electronics to your computer without restart.
► Freeware
► Shareware
► Firewire
► Firmware
Firewire
FireWire is simply a really fast port that lets you connect computer peripherals and
consumer electronics to your computer without the need to restart.
Page 24
___ provides a simple, consistent way for applications to interact with the HW without
having to know all the details of the HW
► Explorer.exe
► System Files
► Operating System
► Application Software
The Role of An OS
•Manages the HW and SW resources of the computer system, often invisibly. These
include the processor, memory, disk drives, etc.
•Provides a simple, consistent way for applications to interact with the HW without
having to knowall the details of the HW
page 318
Question No: 12 ( Marks: 1 ) - Please choose one
One can browse documents residing on a remote computer using ________ protocol.
► HTTP
► SMTP
► FTP
► TELNET
Examples of Computer Network Usage
•I can send an eMail message to a remote computer using the SMTP protocol
•I can browse documents residing on a remote computer using the HTTP protocol
•I can download or upload files to a remote computer using the FTP protocol
•I can run a program on a remote computer using the TELNET protocol
185
Question No: 13 ( Marks: 1 ) - Please choose one
Which event handler executes the specified JavaScript code when a window/form
element loses focus ?
► onBlur
► onLoad
► onUnload
► onFocus
onBlur executes the specified JavaScript code when a windowloses focus or a form
element loses focus
page 230
Which event handler executes the specified JavaScript code when a window/form
element receives focus ?
► onBlur
► onLoad
► onUnload
► onFocus
onFocus executes the specified JavaScript code when a windowreceives focus or when a
form element receives input focus
page 230
► For
► Do-While
► If-else
► While
A B C D
4 ABC003 65 =c4=c4
► False
► Sorted Words:
Sorted Words:
http://www.w3schools.com/jsref/tryit.asp?filename=tryjsref_abs
Data Integrity:
Integrity refers to maintaining the correctness and consistency of the data
Correctness: Free from errors
Consistency: No conflict among related data items
Integrity can be compromised in many ways:
Typing errors
Transmission errors
Hardware malfunctions
Program bugs
Viruses
Fire, flood, etc PAGE 253
Question No: 19 ( Marks: 1 ) - Please choose one
► C6+E6
► =C6+E6
► 6+6=12
► 6+E6
Which of the following keyword is used to jump out of switch statement as soon as
the match is found?
► Default
► Else
► Jump
► Break
Question No: 21 ( Marks: 1 ) - Please choose one
►1
►2
►3
► Instant Messaging
► Web
► The extension of web and Designed for both human beings and computers
► None of the given
► Software designer
► Software developer
► Project manager
► None of given
Developer
• Responsibilities:
– Module-level design
– Coding
– Unit-testing
Page 298
Run-Time Errors
•Occur when the program is running and tries to do something that is against the
rules
Example: Accessing a non-existent variable, property, method, object, etc (e.g. a method
name is misspelled)
•Sources of these can be determined by a careful reading of the code, but
unfortunately, not always!
► Intelligent systems
If(studentMarks>70);
(
document.write( "Grade A");
}
► If(studentMarks>70);
(
document.write( "Grade A");
};
► If(studentMarks<>70)
(
document.write( "Grade A");
}
► If(studentMarks>70)
{
document.write( "Grade A");
}
► javascript
► visual basic
► C++
►C
Object Based
Everything that JavaScript manipulates, it treats as an object
► Asynchronous sine
► Alpha Sine
► Automated Sine
► ArcSine
asin( x ), acos( x ), atan( x ):
Standard inverse-trigonometric functions
Returns the arcsine, arccosine or arctangent of ‘r’
in radians
EXAMPLE
document.write( Math.asin( 1 ) )
►6
►4
►9
► 12
Math.pow( 3 , 2 ); // returns 9 (3 * 3)
The Right most portion or the third portion of the URL contains______ .
► Protocol Identifier
► Server Name
► Directory Name
► JPEG
► GIF
► Bitmap
► Vector
Some image file formats, like PNG or GIF, use only lossless compression
PAPER 4
FINALTERM EXAMINATION
Spring 2010
CS101- Introduction to Computing (Session - 2)
Question No: 1 ( Marks: 1 ) - Please choose one
What is NOT a key factor while designing a website?
► Usability
► User-friendly
► Consistency
► Complexity
► TCP and IP
► 12
► 13
► 12.0
► 13.01
► Space
► Time
► Memory and time
► Bandwidth
►Sorted Words:
Sorted Words:
► Entity
► Name
► Interpreter
Assembly languages are similar to machine languages, but are easier to program in as
they allowa programmer to substitute names for numbers
page 130
PAPER 5
FINALTERM EXAMINATION
Spring 2010
CS101- Introduction to Computing (Session - 3)
► 62
► 83
► 91
83% of users have left sites in frustration due to poor navigation,
www.altafkhan.com/cs101ppt/web-design-for-usability.ppt
Question No: 3 ( Marks: 1 ) - Please choose one
__________ breaks down the message to be sent over the internet into packets.
► FTP
► HTTP
► TCP
► IP
TCP breaks down the message to be sent over the Internet into packets
IP routes these packets through the Internet to get them to their destination
Page 196
Question No: 4 ( Marks: 1 ) - Please choose one
The first spread sheet was called as_____________.
► Excel
► PowerPoint
► Word
► VisiCalc
► onUnload
► onUnLoad
► onUNLOAD
► All of the above
onBlur
onReset
onSubmit
onLoad
onUnload
page 230
Question No: 6 ( Marks: 1 ) - Please choose one
Variables allow us to manipulate data through the ___________.
► Actual Value
► Reference
► Length
► Name
Variables
Variables give us the ability to manipulate data through reference instead of actual value.
Variables are names assigned to values.
Page 143
Question No: 7 ( Marks: 1 ) - Please choose one
We use ___________ to stop Break-Ins.
► Scanners
► Intrusion detectors
► Utilities
► None of the given options
Break-Ins
•Hackers are always trying to break-in into Internet-connected computers to steal
info or plant malicious programs
•Defense: Intrusion detectors
Page 276
Question No: 8 ( Marks: 1 ) - Please choose one
Which attribute of the IMG tag tells us about the source of the image ____________.
► source
► path
► loc
► src
Scr =source
► Green
► Grey
► Blue
► None of the given options
44.6 Helpful Editors
Automatically color different parts of statements in different colors, e.g. comments
in Gray, strings in Green, HTML tags in Blue
page 315
Question No: 12 ( Marks: 1 ) - Please choose one
_______ is responsible for all the essential operations like basic house keeping, task
scheduling, etc. Also contains low-level HW interfaces
► Hardware
► Device Manager
► Kernel
► Device Driver
11.4 Kernel
The heart of the OS
Responsible for all the essential operations like basic house keeping, task scheduling, etc.
Also contains low-level HW interfaces
Page 67
► Syntactic, Semantic
► Semantically, Syntactically
► Systematically, Semantically
► Default
► Else
► Jump
► Break
► 23.141592653589793
► 3.146
► 2.3141592653589793
► None of them
Page 272
23.141592653589793
Question No: 25 ( Marks: 1 ) - Please choose one
POP, IMAP and SMTP are related to one of the following service/services?
► Electronic Mail
► Instant Messaging
► Both a and b
► None of above
Tools & Services Available on the Internet
Electronic mail (POP, IMAP, SMTP)
Page 196
Question No: 26 ( Marks: 1 ) - Please choose one
_______ is designed for 2D-Animation .
► Flash Animation
► HTML image class
► Web Browser
► HTML 2D class
41.2 Flash Animation
•Designed for 2-D animations
Page 293
PAPER 6
FINALTERM EXAMINATION
Spring 2010
► data
► a field.
► a cell.
► an equation.
► row F column 5
► column F row 5
► functions available in cells
► Function key F4
excel
Which of the following describes how to select all the cells in a single column ?
► Round
► Wide
► $C$4
► 256
► C4
► None of these
► Chart Wizard
► Pie Wizard
► Excel Wizard
► Data Wizard
Question No: 7 ( Marks: 1 ) - Please choose one
► a dotted border
► a blinking border
► All of these
► All of these
News groups, message boards, forums
Instant messaging
–Multimedia delivery
Page 198
A(n) ____ line has transfer rates of 128 Kbps to 8.45 Mbps.
► DSL
► ISDN
► ATM
► Fractional T1
DSL (digital subscriber line): transmit data at fast speed on existing telephone
wiring, 128kbps to 8.45mbps ...
www.cs.uofs.edu/~bi/2003f-html/cil102/ch9-network.doc
____ refers to the amount of data, instructions, and information that can travel over a
communications channel.
► Latency
► Transfer rate
► Bandwidth
► Broadband
http://www.slideshare.net/Izaham/chapter09-presentation-640076 slide 40
Question No: 11 ( Marks: 1 ) - Please choose one
► normalization
► decryption
► validation
► encryption
► Data
► Instructions
► Files
► Memory
Computer data storage, often called storage or memory, refers to computer
components and recording media that retain digital data. Data storage is one of
the core functions and fundamental components of computers.
► Num lock
► Pause lock
► Caps lock
► Scroll lock
► Sun
► Java
► Html
► Microsoft
► Hardware
► Software -------
► Storage
► None of these
What is the keyboard shortcut (button or buttons to be pressed) for creating a Chart from
the selected cells ?
► F3
► F4
► F5
► F6
In Word which of the following shortcut key combination, changes the font.
► Ctrl + Shift + F
► Ctrl + Shift + I
► Ctrl + F
► Ctrl + I
► Shift + F12
► Alt + Shift + T
► Alt + Shift + S
► Clicking three times with the right mouse button in the spreadsheet
► None of these
► ALT+SHIFT+F1
► ALT+SHIFT+F2
► ALT+SHIFT+F3
► None of these.
► Clicking three times with the right mouse button in the spreadsheet
► None of these
► Data base
► Ledger
► All of above
A ____ is a device that converts analog signals to digital signals, and vice versa.
► Tablet PC
► modem
► microwave station
► notebook computer
4.16 Modem
Modem is output as well as input device at the same time. It receives the data (analog
signal) coming through telephone line, converts them to digital signals and sends them to
page 25
► F2
► F3
► F1
► None of these
► hardware vandalism
► software piracy
► hardware theft
► information theft
Hardware theft is the act of stealing computer equipment.
http://www.wong-sir.com/cit/social_impacts/hardware_theft.htm
PAPER 7
FINALTERM EXAMINATION
Spring 2009 Final
CS101- Introduction to Computing (Session - 2)
The transistor is a solid state semiconductor device used for amplification and switching,
and has __________ terminals.
► one
► two
► three
► four
The transistor is a solid state semiconductor device used for amplification and switching,
and has three terminals
page 32
► Randomized algorithm
► Greedy algorithm
► Heuristics
page 102
► Compiled software
► Secure software
► Intelligent software
► True
► False
Question No: 6 ( Marks: 1 ) - Please choose one
What is the key feature of computer which is against human nature.?
► Upward
► Downward
► Both Upward and Downward
► None of the given choices
COLSPAN
No. of rows the current cell should extend itself downward
page 14
Compared to vacuum tubes, it offered:
smaller size
better reliability
lower power consumption
lower cost
Question No: 18 ( Marks: 1 ) - Please choose one
Which of the following is NOT a component of IC?
► Transistors
► Diodes
►resistors
► Vacuum tubes
Component of IC
IN IC MATERIAL USED
SILICON- SEMICONDOUCTOR
COPPER-CONDUCTOR
during lecture
Application Software
Application software are programs that interact directly with the user They generally do
not talk directly to the hardware .The user runs the program on the computer and keeps
on interacting with the computer while the program runs
► None of these
BIOS refers to the firmware code run by a personal computer when first powered
on.
Page 61
►1 -------
►2
►3
PAPER 8
FINALTERM EXAMINATION
Spring 2010
CS101- Introduction to Computing (Session - 1)
Modem
I/O device used for connecting two computers over telephone lines
Page 187
Question No: 2 ( Marks: 1 ) - Please choose one
A protocol used for receiving email messages is called ____________.
► URL
► Telnet
► POP3
► SMTP
POP3: Post Office Protocol
A protocol used for receiving eMail messages
Page 213
Question No: 3 ( Marks: 1 ) - Please choose one
A function is also called __________.
► Sub-program
► Procedure
► Sub-routine
► Blue only
► Black and Underlined
► Blue and Bold
► Blue and Underlined
Data Mining
•The process of analyzing large databases to identify patterns
Page 263
Question No: 17 ( Marks: 1 ) - Please choose one
For connector the following symbol is used:
► Square
► Rectangle
► Diamond
► Circle
Page 99
► Compiler
► Open office
► Assembler
► Microsoft office
Compiler translates high-level instructions directly into machine language
page 130
Question No: 19 ( Marks: 1 ) - Please choose one
► Linker
► Kernel
► Loader
► Device manager
Lec 11
► Number
► String
► Boolean
► None of the above
Numbers, e.g., 23, 4.3, -230, 4.4e-24
Booleans, e.g., true, false
Strings, e.g., “hello”, “What’s the time?”
► True
► False
When a string is used in a mathematical context, if appropriate, JavaScript first converts
it into a number. Otherwise, a “NaN” is the result
Spreadsheet Software.
Presentation Software.
Database Software.
Web pages
Information
Search Engines
Project Manager
Developers
Developer
• Responsibilities:
– Module-level design
– Coding
Unit-testing
Page 298
ENI, ENC
ENP, ENC
ENT, ENI
Question No: 5 ( Marks: 1 ) - Please choose one
_____________ waits for some time and then launch a function.
Timeout( )
setTimeout( )
setTime( )
setTimeIn( )
VoIP
DNS
TCP
The domain name system (DNS) is the way that Internet domain names are
Object-based
Object-oriented
Machine
Assembly
Configuration Management
Quality Assurance
Developer
Support team
Responsible for the maintenance, expansion, improvement of the infrastructure
consisting of:
– Workstations, servers, printers
page 300
Using smart editors they can automatically color different parts of statements in different
colors e.g. HTML tags in ____________ color.
Green
Grey
Blue
Testing
Repairing
Coding
Page 316
Mainframes
Binary system
Signals
___ provides a simple, consistent way for applications to interact with the HW without
having to know all the details of the HW
Explorer.exe
System Files
Operating System
Application software
Provides a simple, consistent way for applications to interact with the HW without
having to knowall the details of the HW
page 318
23
-23
23.0
2.3
http://www.w3schools.com/jsref/tryit.asp?filename=tryjsref_abs
Question No: 14 ( Marks: 1 ) - Please choose one
In Genetic Algorithm the most important thing you should know, is the ___________.
Procedure
Different techniques
Genetic Algorithm
The ranking and formation of newsolutions is continued until a good enough solution is
found
page 242
Statically Typed
Strong Typed
Green
Grey
Blue
Input
Out put
Application software
TV
Good
Simple
Best
PAPER 10
FINALTERM EXAMINATION
Fall 2009
CS101- Introduction to Computing
► Consistent
► Conflicting
► Contradictory
► Unpredictable
► Identifier
► Variable
► Function
► Constant
Array:
An indexed list of elements
We said that a variable is a container that holds a value.
page 177
► Local
► Global
► Heading
► Any
► Red
► Green
► Blue
► Strings
► Numbers
► Undefined
► DOS
► Windows XP
► Linux
► Mainframe
Page 61
__________ are those programs in which the flow of the program is determined by the
user's actions (mouse clicks, key presses) or messages from other programs.
► Server-Side Scripts
► Client-Side Scripts
► Super Scripts
► Form Scripts
Server-Side Scripts
Are programs that reside on Web servers
Receive info that a user enters in a form
Process that info and take appropriate action page 71
By default in a web page Hyper Link for another web page is represented as ________________
► Blue only
► 0 and 1
► 0 and 10
► 0 and -10
► 0 and -1
country=”Hello Pakistan”;
document.write(country.length);
► 12
► 13
► 14
► 15 ----------------
► Integer
► Float
► String
► Boolean
► Discussion forums
► Newsgroups
► Mailing lists
► Project Manager
► Team Lead
► Developer
page 296
The group of technologies concerned with the capturing, processing and transmission of
information in the digital electronic form is called _____________.
► Telecom Engineering
► Computer Engineering
► Computer Science
► Information Technology
Question No: 18 (Marks: 1) - Please choose one
► Technology selection
► High-level design
► Architect
► Team Lead
► Project Manager
► Event Handler
► Properties
► Methods
► None of the given options
► Event Handler
► Properties
► Methods
Many developers write the _________ first and then incrementally convert each line into
_________.
Many developers write the pseudo code first and then incrementally convert each
line into real code
page 230
► Information
► Data
► Entity
► Attribute
_______ is a related collection of WWW files that includes a beginning file called a
homepage
► HTML
► Website
► HTTP
► Web page
________ are the computers that perform at or near the currently highest operational rate
for computers.
► Minicomputers
► Microcomputers
► Supercomputers
► Personal Computers
4.2 Supercomputers
A supercomputer is a computer that performs at or near the currently highest
operational rate for computers.
page 21
► Raster
► Scalar
► Simple
Which event handler executes the specified JavaScript code when a window/form
element receives focus?
► onBlur
► onLoad
► onUnload
► onFocus
Which function returns a randomly selected floating point number between 0 and 1?
► floor(x)
► ceil(x)
► random()
► round(x)
Page 250
► Data updates
► Data security
► Data integrity
► Data accessibility
All the data that BholiBooks has in its computer systems is quite critical to its operation
The security of the customers’ personal data is of utmost importance. Hackers are
always looking for that type of data, especially for credit card numbers
This problem can be managed by using appropriate security mechanisms that provide
access to authorized persons/computers only
Security can also be improved through:
Encryption
Private or virtual-private networks
Firewalls
Intrusion detectors
Virus detectors
Page 253
Question No: 30 (Marks: 1) - Please choose one
PAPER 11
Question No: 1 ( Marks: 1 ) - Please choose one
► Mathematician
► Computer Scientist
► Physician
► Analyst
Question No: 2 ( Marks: 1 ) - Please choose one
► Local
► Global
► TCP address
► Domain name
► Network name
► VoIP
IP addresses are fine for computers, but difficult to recognize and remember
for humans
A domain name is a meaningful, easy-to-remember ‘label’ for an IP address
Page 210
► MS Access
► CA Harvard Graphics
► Corel Presentation
► Lotus Freelance
► Function Handling
► Event Handling
► Event Procedure
► Design
► Heuristic
► Plan
► Aim
24.1 Heuristic
Rule of thumb learned through trial & error
Page 166
► Number
► Boolean
► Video
► Text
► Control unit
► Memory unit
► Independent
► Dependent
► Interrelated
► Inconsistent
__________ function returns the largest integer that is less than or equal to x.
► round(x)
► floor
► ceil
► abs(x)
Due to working at home, contact with the colleagues is __________, which may result in
__________ quality of work
► Reduced, Poorer
► Reduced, Better
► Increased, Poorer
► Increased, Better
► DoS
► Scanning
► Utility
A stream of large sized emails are sent to an email address for overloading the destination
account, is called ___________.
► DoS Attack
► Break-Ins
► Mail Bombing
► Private network
► Encryption
► Network sniffer
► Trojan horse
► Logic bomb
► Worm
► Time bomb
Trojan Horses
•Unlike viruses, they are stand-alone programs
Page 278
Question No: 16 ( Marks: 1 ) - Please choose one
Smart editors can automatically color different parts of statements in different colors e.g.
comments in ____________ color.
► Green
► Grey
► Blue
► Red
Automatically color different parts of statements in different colors, e.g. comments
in Gray, strings in Green, HTML tags in Blue
page 315
► Event Handler
► Properties
► Methods
► Chemistry
► Computer Science
► Physics
► Biology
► Set of protocols
► Set of rules
► Device
► Set of methods
► ASP
► CGI
► VBScript
► JavaScript
Examples:
CGI scripts on Unix servers
Page 71
► Student
► Roll_no_1111
► For
► _schedule
User can remotely log on to a computer and can have a control over it like a local user
using
► TelNet Protocol
A number of clever schemes have been invented to reduce the number of bytes that are
required for storing graphics. 2 popular ones:
Color mapping
Dithering
PAGE 235
Question No: 25 ( Marks: 1 ) - Please choose one
Which function returns a randomly selected floating point number between 0 and 1 ?
► floor(x)
► ceil(x)
► random()
► round(x)
► Horizontal bar
► Vertical bar
► Text bar
► Character bar
Each group of info – called a record - in that file was separated by a special character;
vertical bar ‘|’ was a popular option
PAGE 255
Question No: 27 ( Marks: 1 ) - Please choose one
► Diverging
► Converging
► Becoming different
► Becoming unique
http://www.eecs.berkeley.edu/~messer/PAPERS/96/Proc1/
► More powerful
► Smaller in size
► Costly
► Calculate
► Compute
An algorithm that always takes the best immediate or local solution while finding an
answer is called_____________________
► Deterministic Algorithm
► Greedy Algorithm
► Randomized Algorithm
PAPER 12
Spring 2009
CS101- Introduction to Computing (Session - 2)
► FTP
► HTTP
► TCP
► IP
TCP breaks down the message to be sent over the Internet into packets
IP routes these packets through the Internet to get them to their destination
PAGE 196
Question No: 2 ( Marks: 1 ) - Please choose one
A protocol used for receiving email messages is called ____________.
► URL
► Telnet
► POP3
► SMTP
PAGE 213
► Productivity software
► Business software
► Scientific software
► Clear
► Edit
► Undo
► Break
► Control unit
► Memory unit
► Floating Point unit
► Arithmetic and Logic unit
Control unit is called the brain of computer microprocessor
Question No: 11 ( Marks: 1 ) - Please choose one
Database consisting of two or more related tables, is called _____________.
► Flat file database
► Object oriented database
► Tabular storage database
► Relational database
Relational Databases
•Databases consisting of two or more related tables are called relational databases
Page 262
► Personal
► Desktop
► Enterprise
► Single-user
Classification of DBMS w.r.t. Size
•Personal/Desktop/Single-user (MB-GB)
Server-based/Multi-user/Enterprise (GB-TB)
•Seriously-huge databases (TB-PB-XB)
Page 274
Question No: 15 ( Marks: 1 ) - Please choose one
After the DoS attack in year 2000, Yahoo servers were recovered in __________.
► 1 hour
► 2 hours
► 3 hours
► 4 hours
Neutralizing the Attack
•The engineers responsible for monitoring the traffic on the Yahoo Web sites
quickly identified the key characteristics of the packets originating from those drones
•Then they setup filters that blocked all those packets
•It took them around 3 hours to identify and block most of the hostile packets
Page 275
► Information
► Data
► Entity
► Attribute
► True
► False
PAPER 13
FINALTERM EXAMINATION
Fall 2009
CS101- Introduction to Computing (Session - 2)
► None of these
► Assembly Languages
► 4-th Generation Languages
► Machine Languages
► High-Level Languages
PowerBuilder is a fourth generation language (4GL),
Question No: 28 ( Marks: 1 ) - Please choose one
Backbone is also called as ________.
► vBNS
► BNS
► vHBNS
► HBNS
(A backbone is a larger transmission line that carries data gathered
from smaller lines that interconnect with it) known as vBNS or NSFNet.
Page 21
Question No: 29 ( Marks: 1 ) - Please choose one
Global variables can make the logic of a web page.
► Difficult to understand
► Easier to understand and maintain
► Difficult to reuse and maintain
► Difficult to understand, reuse and maintain
Global variables can make the logic of a Web page difficult to understand
Global variables also make the reuse and maintenance of your code much more difficult
Page 207
Question No: 30 ( Marks: 1 ) - Please choose one
In JavaScript: In order to display the text on browser Grade A, which of following
statement is True.
PAPER 14
FINALTERM EXAMINATION
Fall 2009
CS101- Introduction to Computing (Session - 2)
► Process
► Input or Output
► Decision
► Connector
► Windows
► Linux
► DOS
► Solaris
Example: Current versions of Windows, Mac OS, Linux, Solaris
Page 67
Question No: 5 ( Marks: 1 ) - Please choose one
According to the heuristic, the number of defects remaining in a system after a
given level of tests is proportional to ___________.
► The number found on very first day.
► The number found during the development.
► The number found during the test.
► None of the given options.
The number of defects remaining in a system after a given level of tests is proportional to
the number found during the test
Page 169
Question No: 6 ( Marks: 1 ) - Please choose one
Which one of the following is NOT a component of Rule Based System?
► Rule Compiler
► Rule Interpreter
► Rules Base
► Working Memory
Rulebased Systems (1):
Based on the principles of the logical reasoning ability of humans
Components of an RBS:
Rulebase
Working memory
Rule interpreter
Page 242
Question No: 7 ( Marks: 1 ) - Please choose one
In RDBMS, table rows are called __________.
► Field
► Record
► Column
► Query
Table rows are called records; rowelements are called fields
Page 262
Question No: 8 ( Marks: 1 ) - Please choose one
_________ can be used for entering, editing, or viewing data, one record at a
time.
► Queries
► Forms
► Reports
► None of the given options
37.2 Some Terminology
Forms can be used for entering, editing, or viewing data, one record at a time
Page 263
Question No: 9 ( Marks: 1 ) - Please choose one
Tribal flood network is a ___________ software.
► DoS
► Scanning
► Utility
► None of the given options
2. Arming the Drones
•After several drones have been conquered, the DoS SW is loaded on to them
•Examples: Tribal Flood Network, Trinoo, TFN2K
Page 275
Question No: 10 ( Marks: 1 ) - Please choose one
Unlike virus, ___________ is a stand-alone program.
► Trojan horse
► Logic bomb
► Worm
► Time bomb
Trojan Horses
•Unlike viruses, they are stand-alone programs
Page 278
Question No: 11 ( Marks: 1 ) - Please choose one
The key responsibilities of a project manager is _____________.
► Planning and tracking of the project
► Arranging of the appropriate resources
► Client relationship management
► All of the given options
Project Manager
• Responsibilities:
– Planning and tracking of the project
– Arranging of the appropriate resources
lient relationship management
page 296
► Debugging
► Testing
► Repairing
► Monitoring
44.5 Testing & Debugging
•Testing: The tasks performed to determine the existence of defects
•Debugging: The tasks performed to detect the exact location of defects
Page 312
Question No: 16 ( Marks: 1 ) - Please choose one
_____________ routes the packets through the internet to go to their
destination.
► Protocol
► TCP
► IP
► NIC
► Agreement
► Ownership
► Membership
► Software
When we buy a SW package, we do not really buy it – we just buy a license that
allows us to use it, the ownership stays with the maker
page 319
Question No: 18 ( Marks: 1 ) - Please choose one
Sequence of steps that is taken to solve a problem is called _______.
► Algorithm
► Operating System
► Application software
► None of the given options
Algorithm
1st Definition:
Sequence of steps that is taken to solve a problem
Better Definition:
A precise sequence of a limited number of unambiguous, executable steps that terminates
in the form of a solution
page 320
Question No: 19 ( Marks: 1 ) - Please choose one
A collection of data organized in such a way that the computer can quickly
search for a desired data item is known as :
► Retrieving
► Database
► Information
► DBMS
Database
•A collection of data organized in such a fashion that the computer can quickly
search for a desired data item
•All data items in it are generally related to each other and share a single domain
Page 321
Question No: 20 ( Marks: 1 ) - Please choose one
To start an ordered list from 20 instead of 1, we will write
http://www.w3schools.com/jsref/tryit.asp?filename=tryjsref_abs