None of the given choices
Vacuum tubes were replaced by:
Transistors
Electrodes
Electric Relays
None of the given choices
Cyber crime can be used to
Damage a home computer
Bring down a business
Weaken the telecom, financial, or even defense-related systems of a country
All of the given
The internet communities are ___________.
Geographical based
Interest based
Country based
Religion based
Global variables are:
Visible everywhere on the web page
Visible only in the block in which they are declared
Visible only in the main code
None of the given choices
Infection propagation and Actual destructive are the components of _______________
Transmission mechanism
Payload
Worms
Trojan Horse
If a computer could pass the Turing test then it would be able to:
win a million dollar prize
think like human begins
think but slower than humans
do the things faster
__________ is a special purpose computer that connects and translates between network that use
different communication protocols.
Bridge
Router
Gateway
None of the given choices
The solution of the Mail Bombing is ________
Filtering
Do not accept emails
eMail filtering
There in no solution for it
The name of very first computer was:
ABC
BCD
EDC
None of the given choices
MATH functions are accessed by referring to various ______________of the Math object
Functions
Events
Properties
Methods
The color of each pixel is generally represented in the form of a __________.
Duplet
Triplet
Both a & b
None of these
Rule of thumb learned through trial & error is called
Heuristic
Mistake
Common sense
Experience
SCSI stands for:
Small Computer System Interface
System Common Small Integration
Silicon Computer System Interface
Internet is an example of ______________ network.
Private
public
Both Private and Public
None of the given choices
The name of first commercially available PC was:
UNIVAC 1
ENIAC
EDVAC
Altair 8800
Algorithm is a ____________________
Definition of a problem
Sequence of steps to solve a problem
Understanding of a problem
Solving a problem
A group of information is called __________________
File
Database
Record
Field
___________________ is a branch f computer science concerned with manipulating and enhancing
computer graphics.
Image Handling
Image Processing
Image Engineering
None of these
__________has changed our way of life like no other technology.
Computational technology
Computer technology
Computing technology
None of the Above
Sophisticated event handling is not possible with _______________ event handling
Off-Line
In-Line
Out-Line
Non of the given choices
Babbage’s Analytical Engine could store information permanently in:
Magnetic Tape
Floppy Disk
Punched Cards
None of the given choices
There are __________ popular schemes to reduce the number of bytes that are required for storing
graphics.
4
3
2
None of these
The internet-society is considered under Surveillance because:
While surfing, we are being watched, constantly
Our every click is recorded and analyzed to extract patterns and behaviors
Webcams are becoming common. Providing a cheap way for parents to watch their children's every move
All of the given
Which of the following is incorrect for making design elements legible?
Elements should be large enough
Elements must contrast sufficiently
Related elements should be visually grouped
Elements should have no visual focus
Function is also known as ______________.
subprogram
procedure
subroutine
All of given
In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET.
1973
1983
1972
None of the given choices
_______ / / /______/ A Parallelogram (Tilted rectangle) represents the ________________ flow chart
element.
Process
Input or Output
Decision
Connector
Punched cards were replaced by:
Floppy Disk
Zip Drives
Magnetic storage
None of the given choices
The ________virus may display an annoying, but harmless message
Malicious
Neutral
Helpful
DoS
The name of very first computer was:
ABC
BCD
EDC
None of the given choices
The internet communities are ___________.
Geographical based
Interest based
Country based
Religion based
_______ consists of cells arranged in rows & columns
► Spreadsheets Software
► Word processor
► Presentation Software
► Microsoft Paint Software
_________ manages the HW and SW resources ( memory, disk drives etc) of the computer system,
often invisibly.
► Explorer.exe
► System Files
► Operating System
► Application Software
Forms can be submitted through _______ & _______ methods
► INCLUDE, POST
► INCLUDE, GET
► GET, POST
► SEND, POST
To display a checkbox on the web page, we use ___ tag
► CHECKBOX
► CHECK
► INPUT
► INPUTBOX
You can ________ from/to a website containing interactive forms.
► Only read
► Only write
► Read and write
► Not read and write
There is a battery on the motherboard to:
► Give power to the processor
► Save information when computer is off
► Save information when computer is on
► Give power to the motherboard
We can change the background color in HTML, using ___ attribute of <body>
► background
► bgcolor
► backcolor
► backgroundcolor
___ contains the name of the protocol required to access the resource, a domain name that identifies a
specific computer on the internet and a pathname on the computer
► HTML
► HTTP
► URL
► WWW
______ is a client program that uses HTTP to make requests to Web servers throughout the internet on
behalf of the user.
► Web Application
► Web Browser
► Internet Application
► HTML
WWW stands for:
► Wide World Web
► World Wide Web
► World White Web
► World Web Wide
The weaknesses of the computer are:
► Pattern recognition & Storage
► Speed & Innovative ideas
► Pattern recognition & Innovative ideas
► Speed & Storage
Floating point unit is also known as _________ unit
► Real
► Integer
► Numeric
► Fractional
Programs that reside on Web servers and receive info that a user enters in a form, are known as:
► Server-Side Scripts
► Client-Side Scripts
► Super Scripts
► Form Scripts
------------ is volatile memory
► RAM
► ROM
► Hard Disk
► CD ROM
What will be the result of the following formula in Spreadsheet application ?
SUM(A2:A3) =_________(Assume that A2 = 25 A3 = 75)
► 25
► 50
► 75
► 100
VisiCalc was the first popular _______application on PC’s.
► Spreadsheet
► Word processor
► Presentation
► Database
____________ is a system software that converts the source code written in high level language into
machine language code.
► Utilities
► Drivers
► Language Translator
► None of the these
What happens if I start a new list without closing the original one?
► An error will be generated
► A nested list will be created
► Previous list will end and a new will start.
► Nothing will happen
__________ is a program that executes instructions line by line written in a high-level language.
► Interpreter
► Compiler
► Predictor
► Executor
There are_________________ rules to write the Pseudo Code.
► Standard
► No standard
► Strict
► Pre-defined
Which one is not the building block of an algorithm?
► Statements
► Sequences
► Repetitions
► Conditionals
A procedure that usually but not always works or that gives nearly the right answer is
called_____________
► Deterministic Algorithm
► Heuristic Algorithm
► Greedy Algorithm
► Randomized Algorithm
A Modem is a kind of ___
► Input device
► Output device
► Storage device
► Input and Output device
The memory size of the Altair 8800 was
► 128 bytes
► 128 Kilo bytes
► 256 Kilo bytes
► 256 bytes
---------- was known as “mill” in Analytical engine.
► Memory
► Processor
► Monitor
► Mouse
Because of spending more time on the internet, the distances among the families have been _____.
Increased
Expanded
Contracted
ShortenedAutonomous
Web Agents are also known as _________________
Mobile Agents
Softbots
Both "Mobile Agents" & "Softbots"
None of these
A communication protocol is a __________that governs the flow of information over a network.
Set of Methods
Set of Protocols
Set of rules
None of the given choices
By default in a web page Hyper Link for another web page is represented as:
Blue only
Black and Underlined
Blue and Bold
Blue and Underlined
The organizations are learning that business can be done in a more effective manner if emphasis is placed
upon ______________.
Cooperation
Shared responsibility
Networking
All of the given
Monitor is an example of __________devices
Output
Input
Processing
None of the given choices
The code in the ________ portion is the right choice for developing larger JavaScript
scripts
Body
At End
Head
Separate
____________________ based on the principles of the logical reasoning ability of humans.
Genetic Algorithms
Rule-based Systems
Feed-Forward Network
None of these
The key benefit of VPNs over conventional PNs is:
Security
Efficiency
Lower Cost
None of the given choices
In __________________ automatic machines perform various tasks that were previously performed by
humans.
Fuzzy Logic
Robotics
Rule based Systems
None of these
___ provides a simple, consistent way for applications to interact with the HW without having to know all
the details of the HW
► Explorer.exe
► System Files
► Operating System
► Application Software
Communication protocol is a __________that governs the flow of information over a network
► Set of methods
► Set of protocols
► Set of rules
► Device
_____________ team is responsible for the maintenance, expansion , improvement of the infrastructure
consisting of workstations, networking equipment, software and network security.
► Support
► Configuration Management
► Quality Assurance
► Developer
_____________ team consists on the sharpest technical minds in the company.
► Architecture
► Business Development
► Configuration Management
► Developer
_______________ is responsible for day to day operations.
► CEO
► COO
► CMSO
► Developer
Using Java Script you can write a character at random location on screen
► By applying randomCh() method
► With the help of String object
► With the help of random character property
► There is no built in approach in Java Script
The transistor is a solid state semiconductor device used for amplification and switching, and has _____
terminals.
► one
► two
► three
► four
Blue Pacific is a name of _____ computer.
► Mini
► Desktop
► Micro
► Super
Monte Carlo algorithm is an example of
► Randomized algorithm
► Greedy algorithm
► both greedy and randomized
► Heuristics
A set of stand alone productivity applications designed to work together known as __
► Productivity software suites
► Compiled software
► Secure software
► Intelligent software