virtual universty

virtual university

Virtual University TEST SERIES

By Ammad Javed

Cont # 03325527092

Que No # 01

Which computer is faster

1 Mini computer 2 Super computer 3 Micro computer 4 portable

Que No # 02

Human are better than computers at:

Efficiency Accuracy Micro computer Pattern recognition

Que No # 03

URL is a/an ________

Address Component Tool Device

Que No # 04

Which of the following is NOT a category of Mobile Computers?

Laptop Palmtop Desktop Wearable

Que No # 05

__________ give us the ability to manipulate data through reference instead of actual value.

Constants Variables Data Types Operators

Que No # 06

What will be the value of str ?

HelloWorld Hello World Hello + World It will result in error

Que No # 07

Communication protocol is a __________that governs the flow of information over a network

Set of protocols Device Set of methods Set of rules

Que No # 08

The first Web browser with a GUI was generally available in:

1992 1994 1993 1995

Que No # 09

Web is a unique invention by humans in terms that it is:

accessible to only the owners who control it accessible to all humans accessible from particular locations only accessible to only the educational institutes

Que No # 10

______ is simply a fast port that lets you connect computer peripherals and consumer electronics to your computer without restart.

Firewire Shareware Freeware r Firmware

If you want to need more powerfull information then you can contact me... cont # +923325527092..and wana to send Email then

Click Here

Thursday, 26 April 2012

Cs101 solved quiz ...................





 
CS-101 SOLVED BY SADIA ALI SADI (MBA)WWW.VUSTUDENT.NING
None of the given choices

Vacuum tubes were replaced by:
Transistors
Electrodes
Electric Relays
None of the given choices

Cyber crime can be used to
Damage a home computer
Bring down a business
Weaken the telecom, financial, or even defense-related systems of a country
All of the given

The internet communities are ___________.
Geographical based
Interest based
Country based
Religion based

Global variables are:
Visible everywhere on the web page
Visible only in the block in which they are declared
Visible only in the main code
None of the given choices

Infection propagation and Actual destructive are the components of _______________
Transmission mechanism
Payload
Worms
Trojan Horse

If a computer could pass the Turing test then it would be able to:
win a million dollar prize
think like human begins
think but slower than humans
do the things faster

__________ is a special purpose computer that connects and translates between network that use
different communication protocols.
Bridge
Router
Gateway
None of the given choices

The solution of the Mail Bombing is ________
Filtering
Do not accept emails
eMail filtering
There in no solution for it

The name of very first computer was:
ABC
BCD
EDC
None of the given choices

MATH functions are accessed by referring to various ______________of the Math object
Functions
Events
Properties
Methods

The color of each pixel is generally represented in the form of a __________.
Duplet
Triplet
Both a & b
None of these

Rule of thumb learned through trial & error is called
Heuristic
Mistake
Common sense
Experience

SCSI stands for:
Small Computer System Interface
System Common Small Integration
Silicon Computer System Interface

Internet is an example of ______________ network.
Private
public
Both Private and Public
None of the given choices

The name of first commercially available PC was:
UNIVAC 1
ENIAC
EDVAC
Altair 8800

Algorithm is a ____________________
Definition of a problem
Sequence of steps to solve a problem
Understanding of a problem
Solving a problem

A group of information is called __________________
File
Database
Record
Field
___________________ is a branch f computer science concerned with manipulating and enhancing
computer graphics.
Image Handling
Image Processing
Image Engineering
None of these

__________has changed our way of life like no other technology.
Computational technology
Computer technology
Computing technology
None of the Above

Sophisticated event handling is not possible with _______________ event handling
Off-Line
In-Line
Out-Line
Non of the given choices

Babbage’s Analytical Engine could store information permanently in:
Magnetic Tape
Floppy Disk
Punched Cards
None of the given choices

There are __________ popular schemes to reduce the number of bytes that are required for storing
graphics.
4
3
2
None of these

The internet-society is considered under Surveillance because:
While surfing, we are being watched, constantly
Our every click is recorded and analyzed to extract patterns and behaviors
Webcams are becoming common. Providing a cheap way for parents to watch their children's every move
All of the given

Which of the following is incorrect for making design elements legible?
Elements should be large enough
Elements must contrast sufficiently
Related elements should be visually grouped
Elements should have no visual focus

Function is also known as ______________.
subprogram
procedure
subroutine
All of given

In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET.
1973
1983
1972
None of the given choices

_______ / / /______/ A Parallelogram (Tilted rectangle) represents the ________________ flow chart
element.
Process
Input or Output
Decision
Connector

Punched cards were replaced by:
Floppy Disk
Zip Drives
Magnetic storage
None of the given choices

The ________virus may display an annoying, but harmless message
Malicious
Neutral
Helpful
DoS

The name of very first computer was:
ABC
BCD
EDC
None of the given choices

The internet communities are ___________.
Geographical based
Interest based
Country based
Religion based

_______ consists of cells arranged in rows & columns
Spreadsheets Software
► Word processor
► Presentation Software
► Microsoft Paint Software

_________ manages the HW and SW resources ( memory, disk drives etc) of the computer system,
often invisibly.
► Explorer.exe
► System Files
Operating System
► Application Software

Forms can be submitted through _______ & _______ methods
► INCLUDE, POST
► INCLUDE, GET
GET, POST
► SEND, POST

To display a checkbox on the web page, we use ___ tag
► CHECKBOX
► CHECK
INPUT
► INPUTBOX

You can ________ from/to a website containing interactive forms.
► Only read
► Only write
Read and write
► Not read and write

There is a battery on the motherboard to:
► Give power to the processor
Save information when computer is off
► Save information when computer is on
► Give power to the motherboard

We can change the background color in HTML, using ___ attribute of <body>
► background
► bgcolor
► backcolor
► backgroundcolor

___ contains the name of the protocol required to access the resource, a domain name that identifies a
specific computer on the internet and a pathname on the computer
► HTML
► HTTP
► URL
► WWW

______ is a client program that uses HTTP to make requests to Web servers throughout the internet on
behalf of the user.
► Web Application
► Web Browser
► Internet Application
► HTML

WWW stands for:
► Wide World Web
► World Wide Web
► World White Web
► World Web Wide

The weaknesses of the computer are:
► Pattern recognition & Storage
► Speed & Innovative ideas
► Pattern recognition & Innovative ideas
► Speed & Storage

Floating point unit is also known as _________ unit
► Real
► Integer
► Numeric
► Fractional

Programs that reside on Web servers and receive info that a user enters in a form, are known as:
► Server-Side Scripts
► Client-Side Scripts
► Super Scripts
► Form Scripts

------------ is volatile memory
► RAM
► ROM
► Hard Disk
► CD ROM

What will be the result of the following formula in Spreadsheet application ?
SUM(A2:A3) =_________(Assume that A2 = 25 A3 = 75)
► 25
► 50
► 75
► 100

VisiCalc was the first popular _______application on PC’s.
► Spreadsheet
► Word processor
► Presentation
► Database

____________ is a system software that converts the source code written in high level language into
machine language code.
► Utilities
► Drivers
► Language Translator
► None of the these

What happens if I start a new list without closing the original one?
► An error will be generated
► A nested list will be created
► Previous list will end and a new will start.
► Nothing will happen


__________ is a program that executes instructions line by line written in a high-level language.
► Interpreter
► Compiler
► Predictor
► Executor

There are_________________ rules to write the Pseudo Code.
► Standard
► No standard
► Strict
► Pre-defined

Which one is not the building block of an algorithm?
► Statements
► Sequences
► Repetitions
► Conditionals

A procedure that usually but not always works or that gives nearly the right answer is
called_____________
► Deterministic Algorithm
► Heuristic Algorithm
► Greedy Algorithm
► Randomized Algorithm

A Modem is a kind of ___
► Input device
► Output device
► Storage device
► Input and Output device

The memory size of the Altair 8800 was
► 128 bytes
► 128 Kilo bytes
► 256 Kilo bytes
► 256 bytes

---------- was known as “mill” in Analytical engine.
► Memory
► Processor
► Monitor
► Mouse

Because of spending more time on the internet, the distances among the families have been _____.
Increased
Expanded
Contracted
ShortenedAutonomous

Web Agents are also known as _________________
Mobile Agents
Softbots
Both "Mobile Agents" & "Softbots"
None of these

A communication protocol is a __________that governs the flow of information over a network.
Set of Methods
Set of Protocols
Set of rules
None of the given choices

By default in a web page Hyper Link for another web page is represented as:
Blue only
Black and Underlined
Blue and Bold
Blue and Underlined

The organizations are learning that business can be done in a more effective manner if emphasis is placed
upon ______________.
Cooperation
Shared responsibility
Networking
All of the given

Monitor is an example of __________devices
Output
Input
Processing
None of the given choices

The code in the ________ portion is the right choice for developing larger JavaScript
scripts
Body
At End
Head
Separate

____________________ based on the principles of the logical reasoning ability of humans.
Genetic Algorithms
Rule-based Systems
Feed-Forward Network
None of these

The key benefit of VPNs over conventional PNs is:
Security
Efficiency
Lower Cost
None of the given choices

In __________________ automatic machines perform various tasks that were previously performed by
humans.
Fuzzy Logic
Robotics
Rule based Systems
None of these

___ provides a simple, consistent way for applications to interact with the HW without having to know all
the details of the HW
► Explorer.exe
► System Files
► Operating System
► Application Software

Communication protocol is a __________that governs the flow of information over a network
► Set of methods
► Set of protocols
► Set of rules
► Device

_____________ team is responsible for the maintenance, expansion , improvement of the infrastructure
consisting of workstations, networking equipment, software and network security.
► Support
► Configuration Management
► Quality Assurance
► Developer

_____________ team consists on the sharpest technical minds in the company.
► Architecture
► Business Development
► Configuration Management
► Developer

_______________ is responsible for day to day operations.
► CEO
► COO
► CMSO
► Developer

Using Java Script you can write a character at random location on screen
► By applying randomCh() method
► With the help of String object
► With the help of random character property
► There is no built in approach in Java Script

The transistor is a solid state semiconductor device used for amplification and switching, and has _____
terminals.
► one
► two
► three
► four

Blue Pacific is a name of _____ computer.
► Mini
► Desktop
► Micro
► Super

Monte Carlo algorithm is an example of
► Randomized algorithm
► Greedy algorithm
► both greedy and randomized
► Heuristics

A set of stand alone productivity applications designed to work together known as __
► Productivity software suites
► Compiled software
► Secure software
► Intelligent software
 































































































Visit us for more: http://www.vusolutions.com/

Avoid __________ to ensure readability of web page
Overuse of bold and italics
Use of paragraphs
Use of white space
Use of contrast colors

Deep Blue was the name of:
Human
Computer
City
None of the given choices

DoS is________ ?
Crime
Cyber crime
Not a crime
A software


__________ enables users located at far-way locations to easily share information with others located all
over the world.
Protocol
Internet
Communication Channel

No comments:

Post a Comment