1 Question # 1 of 10 ( Start time: 05:12:59 PM ) Total Marks: 1 Global variables are: Visible everywhere on the web page Visible only in the block in which they are declared Visible only in the main code Question # 2 of 10 ( Start time: 05:13:37 PM ) Total Marks: 1 Infection propagation and Actual destructive are the components of Transmission mechanism Payload Worms Trojan Horse Question # 3 of 10 ( Start time: 05:14:24 PM ) Total Marks: 1 If a computer could pass the Turing test then it would be able to: win a million dollar prize think like human begins think but slower than humans do the things faster Question # 4 of 10 ( Start time: 05:14:53 PM ) Total Marks: 1 is a special purpose computer that connects and translates between network that use different communication protocols. Bridge Router Gateway Gateway A special-purpose computer that connects and translates between networks that use different communications protocols Question # 5 of 10 ( Start time: 05:15:51 PM ) Total Marks: 1 The solution of the Mail Bombing is Filtering Do not accept s filtering There in no solution for it Question # 6 of 10 ( Start time: 05:16:38 PM ) Total Marks: 1 The name of very first computer was:
3 Question # 2 of 10 ( Start time: 05:21:53 PM ) Total Marks: 1 The name of first commercially available PC was: UNIVAC 1 ENIAC EDVAC Altair 8800 Question # 3 of 10 ( Start time: 05:22:43 PM ) Total Marks: 1 Algorithm is a Definition of a problem Sequence of steps to solve a problem Understanding of a problem Solving a problem Question # 4 of 10 ( Start time: 05:23:52 PM ) Total Marks: 1 A group of information is called File Database Record Field Question # 5 of 10 ( Start time: 05:24:17 PM ) Total Marks: 1 is a branch f computer science concerned with manipulating and enhancing computer graphics. Image Handling Image Processing Image Engineering None of these Question # 6 of 10 ( Start time: 05:25:34 PM ) Total Marks: 1 has changed our way of life like no other technology. Computational technology Computer technology Computing technology None of the Above Question # 7 of 10 ( Start time: 05:26:27 PM ) Total Marks: 1 Sophisticated event handling is not possible with event handling Off-Line In-Line Out-Line Non of the given choices
4 Question # 8 of 10 ( Start time: 05:27:03 PM ) Total Marks: 1 Babbage s Analytical Engine could store information permanently in: Magnetic Tape Floppy Disk Punched Cards Question # 9 of 10 ( Start time: 05:28:30 PM ) Total Marks: 1 There are popular schemes to reduce the number of bytes that are required for storing graphics None of these A number of clever schemes have been invented to reduce the number of bytes that are required for storing graphics. 2 popular ones: Color mapping Dithering Question # 10 of 10 ( Start time: 05:30:01 PM ) Total Marks: 1 The internet-society is considered under Surveillance because: While surfing, we are being watched, constantly Our every click is recorded and analyzed to extract patterns and behaviors Webcams are becoming common. Providing a cheap way for parents to watch their children's every move All of the given Which of the following is incorrect for making design elements legible? Elements should be large enough Elements must contrast sufficiently Related elements should be visually grouped Elements should have no visual focus Making Display Elements Legible: 1. Designing (arranging) Display Elements Elements must be large enough to be processed visually Elements must contrast sufficiently with their backgrounds Related elements should be visually grouped through the use of space, color, or graphical boundaries The relative levels of importance among elements in a display should be revealed graphically Question # 2 of 10 ( Start time: 05:03:37 PM ) Total Marks: 1
5 1. Function is also known as. subprogram procedure subroutine All of given Function: A group of statements that is put together (or defined) once and then can be used (by reference) repeatedly on a Web page Also known as subprogram, procedure, subroutine In TCP\IP protocols became the only set of protocols used on the ARPANET system has component(s) The TCP/IP protocols becomes the only set of protocols used on the ARPANET This sets a standard for all networks, and generates the use of the term Internet as the net of nets ARPANET splits into two nets to keep military & non-military network sites separate: ARPANET and MILNET client SMTP server POP3 server All of the given choices / / / / A Parallelogram (Tilted rectangle) represents the flow chart element. Process Input or Output Decision Connector Punched cards were replaced by: Floppy Disk Zip Drives Magnetic storage Ref:
6 During the 1960s, the punched card was gradually replaced as the primary means for data storage by magnetic tape, as better, more capable computers became available. The virus may display an annoying, but harmless message Malicious Neutral Helpful DoS The internet communities are. Geographical based Interest based Country based Religion based Question # 1 of 10 ( Start time: 04:51:32 PM ) Total Marks: 1 Because of spending more time on the internet, the distances among the families have been. Increased Expanded Contracted Shortened Question # 3 of 10 ( Start time: 04:53:30 PM ) Total Marks: 1 Autonomous Web Agents are also known as Mobile Agents Softbots Both "Mobile Agents" & "Softbots" None of these A communication protocol is a that governs the flow of information over a network. Set of Methods Set of Protocols Set of rules Protocol Rules governing communications over the network By default in a web page Hyper Link for another web page is represented as: Blue only Black and Underlined Blue and Bold Blue and Underlined
8 Deep Blue was the name of: Human Computer City Using, a user can remotely log on to a computer (connected to the user through a network, e.g. Internet) & have control over it like a local user, including control over running various programs? FTP TCP Telnet Protocol Telnet Protocol Using Telnet, a user can remotely log on to a computer (connected to the user s through a TCP/IP network, e.g. Internet) & have control over it like a local user, including control over running various programs In contrast, FTP allows file operations only Typical use: Configuring and testing of a remote Web server DoS is? Crime Cyber crime Not a crime A software enables users located at far-way locations to easily share information with others located all over the world. Protocol Internet Communication Channel Vacuum tubes were replaced by: Transistors Electrodes Electric Relays Cyber crime can be used to
9 Damage a home computer Bring down a business Weaken the telecom, financial, or even defense-related systems of a country All of the given provides a simple, consistent way for applications to interact with the HW without having to know all the details of the HW Explorer.exe System Files Operating System Application Software Communication protocol is a that governs the flow of information over a network Set of methods Set of protocols Set of rules Device team is responsible for the maintenance, expansion, improvement of the infrastructure consisting of workstations, networking equipment, software and network security. Support Configuration Management Quality Assurance Developer team consists on the sharpest technical minds in the company. Architecture Business Development Configuration Management Developer is responsible for day to day operations. CEO COO CMSO Developer Using Java Script you can write a character at random location on screen By applying randomch() method With the help of String object With the help of random character property There is no built in approach in Java Script The transistor is a solid state semiconductor device used for amplification and switching, and has terminals. one
10 two three four Question No: 2 ( Marks: 1 ) - Please choose one Blue Pacific is a name of computer. Mini Desktop Micro Super Question No: 3 ( Marks: 1 ) - Please choose one Monte Carlo algorithm is an example of Randomized algorithm Greedy algorithm both greedy and randomized Heuristics Question No: 4 ( Marks: 1 ) - Please choose one A set of stand alone productivity applications designed to work together known as Productivity software suites Compiled software Secure software Intelligent software Question No: 1 ( Marks: 1 ) - Please choose one Which of the following hardware component of a computer can also be called as engine? Bus Storage Memory Processor Question No: 2 ( Marks: 1 ) - Please choose one TCP stands for. Total communication protocol Transmission control protocol Transfer control protocol Transfer collection protocol Question No: 3 ( Marks: 1 ) - Please choose one breaks down the message to be sent over the internet into packets. FTP HTTP
11 TCP IP Question No: 4 ( Marks: 1 ) - Please choose one A variable can be in scope. Local Global Either local or global None of the given options Question No: 5 ( Marks: 1 ) - Please choose one A protocol used for receiving messages is called. URL Telnet POP3 SMTP Question No: 6 ( Marks: 1 ) - Please choose one A function is also called. Sub-program Procedure Sub-routine All of the given option Question No: 7 ( Marks: 1 ) - Please choose one Capturing events and responding to them is called. Function Handling Event Handling Event Procedure All of the given option Question No: 8 ( Marks: 1 ) - Please choose one Which one of the following is NOT a primary color? Red Green Yellow Blue Question No: 9 ( Marks: 1 ) - Please choose one
12 are those programs in which the flow of the program is determined by the user's actions (mouse clicks, key presses) or messages from other programs. Event called programs Event processed programs Event driven programs Event declared programs Question No: 10 ( Marks: 1 ) - Please choose one a = Math.ceil(12.01) What will be the value of a? CS101 Solved MCQs For Final Term Exam Question No: 11 ( Marks: 1 ) - Please choose one Event handlers are placed in the portion of a Web page as attributes in HTML tags. HEAD BODY SCRIPT TITLE Question No: 12 ( Marks: 1 ) - Please choose one can be used for entering, editing, or viewing data, one record at a time. Queries Forms Reports None of the given options Question No: 13 ( Marks: 1 ) - Please choose one random() function returns a randomly-selected, floating-point number between. 0 and 1 0 and 10 0 and and -1 Question No: 14 ( Marks: 1 ) - Please choose one The organizations are learning that business can be done in a more effective manner if emphasis is placed upon. Cooperation Shared responsibility Networking
13 All of the given options Question No: 15 ( Marks: 1 ) - Please choose one In relational database, data store in the form of. Tables Rows Columns None of the given options Question No: 16 ( Marks: 1 ) - Please choose one Spies of one business monitoring the network traffic of their competitors. Industrial Intelligence Industrial Espionage Industrial Spying Industrial Surveillance Question No: 17 ( Marks: 1 ) - Please choose one waits for some time and then launch a function. Timeout( ) settimeout( ) settime( ) settimein( ) Question No: 18 ( Marks: 1 ) - Please choose one based communication allows business entities to coordinate the activities of their globally spread units with greater accuracy. Intranet Internet Home LAN Question No: 19 ( Marks: 1 ) - Please choose one The key responsibilities of a project manager is. Planning and tracking of the project Arranging of the appropriate resources Client relationship management All of the given options Question No: 20 ( Marks: 1 ) - Please choose one team consists on the sharpest technical minds in the company. Architecture Business Development Configuration Management Developer Question No: 21 ( Marks: 1 ) - Please choose one
14 Smart editors can automatically color different parts of statements in different colors e.g. comments in color. Green Grey Blue Red Question No: 22 ( Marks: 1 ) - Please choose one A collection of data organized in such a way that the computer can quickly search for a desired data item is known as : Retrieving Database Information DBMS Question No: 23 ( Marks: 1 ) - Please choose one Deep Blue was the name of computer human city game Question No: 24 ( Marks: 1 ) - Please choose one Information available on the web is mostly free of cost costly very cheap of no use Question No: 25 ( Marks: 1 ) - Please choose one Which one is correct? <BODY></BODY> <body></body> Both <BODY></BODY> and <body></body> <BODY/> Question No: 26 ( Marks: 1 ) - Please choose one is the best known builder for supercomputers. Sun Cray Research Microsoft Apple Question No: 27 ( Marks: 1 ) - Please choose one
16 are design in such a way that access to any desired data can be identified and reached quickly and easy, they are generally consist of collection of interrelated files Question No: 35 ( Marks: 3 ) Differentiate between LAN and WAN with one example of each. Lan is a local area network where as wan is a wide area network Lan can be used in a specific areas with limited computers where as wan can be used on computers shared by large distances For example lan can be used on pc s or an organization located in one building but wan can be used on large scales like banks all over or in any Large communication systems Question No: 36 ( Marks: 3 ) What are Trojan Horses? Trojen horses are a kind of cyber crime, they are v harmful to computer because they are stand alone programme and the look like what they are not like any thing amusing or not harmless like games.. Question No: 37 ( Marks: 3 ) Elaborate Rester Graphics with examples. A raster graphics image, digital image, or bitmap, is a data file or structure representing a generally rectangular grid of pixels, or points of color, on a computer monitor, paper, or other display device. To illustrate the matter further - here's the letter "J": J Look closely at it... Take a magnifying glass to it if you like. You see a "J", the computer sees something more like this, where '.' represents a zero and 'X' represents a one:...x...x...x...x...x...x...x X...X X...X.XXX. CS101 Solved MCQs For Final Term Exam Where you see a zero, the computer instructs its video hardware to paint the current background color. A one calls for the current foreground color. Yes, it is actually a bit more complicated, but it all basically boils down to one bit or the other making a distinction between the colors of adjacent pixels, which together form an image.
18 Question No: 41 ( Marks: 10 ) write a note on each of the following: a. Vector or Object-Oriented Graphics: b. Bit-Mapped or Raster Graphics: A:In Vector or object oriented graphic everything drawn is treated as object. objects retain their identity after they are drawon. these objects can later be moved, stretched, duplicated, deleted,etc. they are resolution independent and have relatively small file size. the examples are: swf, svg, wmf, ps brass_ibrahim: Vector graphics is the use of geometrical primitives such as points, lines, curves, and shapes or polygon(s), which are all based on mathematical equations, to represent images in computer graphics. brass_ibrahim: The term "vector graphics" is mainly used today in the context of twodimensional computer graphics Virtually all modern 3D rendering is done using extensions of 2D vector graphics techniques.virtually all modern 3D rendering is done using extensions of 2D vector graphics techniques B:Bit-Mapped or Raster Graphics: Treats everything that is drawn as a bit-map If an object is drawn on top of another, it is difficult to move just one of them while leaving the other untouched Changing the resolution often requires considerable touch-up work Relatively large file size Examples: gif, jpg, bmp masood.tariq: Bit-Mapped or Raster Graphics: Treats everything that is drawn as a bit-map If an object is drawn on top of another, it is difficult to move just one of them while leaving the other untouched Changing the resolution often requires considerable touch-up work Relatively large file size Examples: gif, jpg, bmp 28 objectives were from old papers out of 30. What is Array? Marks 2 what is computer prrofessional? Marks 2 define onload and onunload? Marks 2 waht is time bomb? Marks 2 what is bandwidth? Marks 2 "while" loop is more preferable than "For" loop? Marks 3 sementic web and present web? Marks 3
19 can we replace a human doctor by Expert system? Marks 5 Difference Internt and intranet? Marks 5 ways of navigation Heuristics? Marks 5 event handling? Define network organization and its advantages? Marks 10 Coding Guidline and guidlines for short programs? Marks 10 Dewelop a web page that displays six thumbnails images. A main image should be changed to a large version of thumbnail as soon as the mouse moves over the thumbnail. Write complete html and java script? Marks 10 characteristics of Internet? Marks 10 Profile and responsibilities of Team Leader? Marks 10 due to computer how many jobs are available and how many jobs are eliminated? Marks Today was my CS101 Paper. The Subjective Quizzes are as under: 1. How many members are in operational team and what there key resposibilities 2. What is Computer Screen? 3. What are weaknesses of the web? 4. Characteristics of Internet (Any Five)? 5. Breifly describe Telnet VoIP Instant Messaging FTP IP/TCP 6. Describe the organizational structure? 7. What is image process 8. Pixel?