CS101 Solved MCQs For Final Term Exam

Size: px
Start display at page:

Download "CS101 Solved MCQs For Final Term Exam"

Transcription

1 Question # 1 of 10 ( Start time: 05:12:59 PM ) Total Marks: 1 Global variables are: Visible everywhere on the web page Visible only in the block in which they are declared Visible only in the main code Question # 2 of 10 ( Start time: 05:13:37 PM ) Total Marks: 1 Infection propagation and Actual destructive are the components of Transmission mechanism Payload Worms Trojan Horse Question # 3 of 10 ( Start time: 05:14:24 PM ) Total Marks: 1 If a computer could pass the Turing test then it would be able to: win a million dollar prize think like human begins think but slower than humans do the things faster Question # 4 of 10 ( Start time: 05:14:53 PM ) Total Marks: 1 is a special purpose computer that connects and translates between network that use different communication protocols. Bridge Router Gateway Gateway A special-purpose computer that connects and translates between networks that use different communications protocols Question # 5 of 10 ( Start time: 05:15:51 PM ) Total Marks: 1 The solution of the Mail Bombing is Filtering Do not accept s filtering There in no solution for it Question # 6 of 10 ( Start time: 05:16:38 PM ) Total Marks: 1 The name of very first computer was:

2 ABC BCD EDC Question # 8 of 10 ( Start time: 05:17:34 PM ) Total Marks: 1 MATH functions are accessed by referring to various of the Math object Functions Events Properties Methods In addition to the simple arithmetic operations (e.g. +, *, etc.) JavaScript supports several advanced mathematical operations as well Notationaly, these functions are accessed by referring to various methods of the Math object Question # 7 of 10 ( Start time: 05:16:57 PM ) Total Marks: 1 The color of each pixel is generally represented in the form of a. Duplet Triplet Both a & b None of these Rule of thumb learned through trial & error is called Heuristic Mistake Common sense Experience Question # 9 of 10 ( Start time: 05:18:36 PM ) Total Marks: 1 SCSI stands for: Small Computer System Interface System Common Small Integration Silicon Computer System Interface Question # 1 of 10 ( Start time: 05:21:25 PM ) Total Marks: 1 Internet is an example of network. Private Public Both Private and Public

3 Question # 2 of 10 ( Start time: 05:21:53 PM ) Total Marks: 1 The name of first commercially available PC was: UNIVAC 1 ENIAC EDVAC Altair 8800 Question # 3 of 10 ( Start time: 05:22:43 PM ) Total Marks: 1 Algorithm is a Definition of a problem Sequence of steps to solve a problem Understanding of a problem Solving a problem Question # 4 of 10 ( Start time: 05:23:52 PM ) Total Marks: 1 A group of information is called File Database Record Field Question # 5 of 10 ( Start time: 05:24:17 PM ) Total Marks: 1 is a branch f computer science concerned with manipulating and enhancing computer graphics. Image Handling Image Processing Image Engineering None of these Question # 6 of 10 ( Start time: 05:25:34 PM ) Total Marks: 1 has changed our way of life like no other technology. Computational technology Computer technology Computing technology None of the Above Question # 7 of 10 ( Start time: 05:26:27 PM ) Total Marks: 1 Sophisticated event handling is not possible with event handling Off-Line In-Line Out-Line Non of the given choices

4 Question # 8 of 10 ( Start time: 05:27:03 PM ) Total Marks: 1 Babbage s Analytical Engine could store information permanently in: Magnetic Tape Floppy Disk Punched Cards Question # 9 of 10 ( Start time: 05:28:30 PM ) Total Marks: 1 There are popular schemes to reduce the number of bytes that are required for storing graphics None of these A number of clever schemes have been invented to reduce the number of bytes that are required for storing graphics. 2 popular ones: Color mapping Dithering Question # 10 of 10 ( Start time: 05:30:01 PM ) Total Marks: 1 The internet-society is considered under Surveillance because: While surfing, we are being watched, constantly Our every click is recorded and analyzed to extract patterns and behaviors Webcams are becoming common. Providing a cheap way for parents to watch their children's every move All of the given Which of the following is incorrect for making design elements legible? Elements should be large enough Elements must contrast sufficiently Related elements should be visually grouped Elements should have no visual focus Making Display Elements Legible: 1. Designing (arranging) Display Elements Elements must be large enough to be processed visually Elements must contrast sufficiently with their backgrounds Related elements should be visually grouped through the use of space, color, or graphical boundaries The relative levels of importance among elements in a display should be revealed graphically Question # 2 of 10 ( Start time: 05:03:37 PM ) Total Marks: 1

5 1. Function is also known as. subprogram procedure subroutine All of given Function: A group of statements that is put together (or defined) once and then can be used (by reference) repeatedly on a Web page Also known as subprogram, procedure, subroutine In TCP\IP protocols became the only set of protocols used on the ARPANET system has component(s) The TCP/IP protocols becomes the only set of protocols used on the ARPANET This sets a standard for all networks, and generates the use of the term Internet as the net of nets ARPANET splits into two nets to keep military & non-military network sites separate: ARPANET and MILNET client SMTP server POP3 server All of the given choices / / / / A Parallelogram (Tilted rectangle) represents the flow chart element. Process Input or Output Decision Connector Punched cards were replaced by: Floppy Disk Zip Drives Magnetic storage Ref:

6 During the 1960s, the punched card was gradually replaced as the primary means for data storage by magnetic tape, as better, more capable computers became available. The virus may display an annoying, but harmless message Malicious Neutral Helpful DoS The internet communities are. Geographical based Interest based Country based Religion based Question # 1 of 10 ( Start time: 04:51:32 PM ) Total Marks: 1 Because of spending more time on the internet, the distances among the families have been. Increased Expanded Contracted Shortened Question # 3 of 10 ( Start time: 04:53:30 PM ) Total Marks: 1 Autonomous Web Agents are also known as Mobile Agents Softbots Both "Mobile Agents" & "Softbots" None of these A communication protocol is a that governs the flow of information over a network. Set of Methods Set of Protocols Set of rules Protocol Rules governing communications over the network By default in a web page Hyper Link for another web page is represented as: Blue only Black and Underlined Blue and Bold Blue and Underlined

7 The organizations are learning that business can be done in a more effective manner if emphasis is placed upon. Cooperation Shared responsibility Networking All of the given Question # 7 of 10 ( Start time: 04:57:19 PM ) Total Marks: 1 Monitor is an example of devices Output Input Processing The code in the portion is the right choice for developing larger JavaScript scripts Body At End Head Separate based on the principles of the logical reasoning ability of humans. Genetic Algorithms Rule-based Systems Feed-Forward Network None of these Rulebased Systems (1): Based on the principles of the logical reasoning ability of humans The key benefit of VPNs over conventional PNs is: Security Efficiency Lower Cost In automatic machines perform various tasks that were previously performed by humans. Fuzzy Logic Robotics Rule based Systems None of these Avoid to ensure readability of web page Overuse of bold and italics Use of paragraphs Use of white space Use of contrast colors

8 Deep Blue was the name of: Human Computer City Using, a user can remotely log on to a computer (connected to the user through a network, e.g. Internet) & have control over it like a local user, including control over running various programs? FTP TCP Telnet Protocol Telnet Protocol Using Telnet, a user can remotely log on to a computer (connected to the user s through a TCP/IP network, e.g. Internet) & have control over it like a local user, including control over running various programs In contrast, FTP allows file operations only Typical use: Configuring and testing of a remote Web server DoS is? Crime Cyber crime Not a crime A software enables users located at far-way locations to easily share information with others located all over the world. Protocol Internet Communication Channel Vacuum tubes were replaced by: Transistors Electrodes Electric Relays Cyber crime can be used to

9 Damage a home computer Bring down a business Weaken the telecom, financial, or even defense-related systems of a country All of the given provides a simple, consistent way for applications to interact with the HW without having to know all the details of the HW Explorer.exe System Files Operating System Application Software Communication protocol is a that governs the flow of information over a network Set of methods Set of protocols Set of rules Device team is responsible for the maintenance, expansion, improvement of the infrastructure consisting of workstations, networking equipment, software and network security. Support Configuration Management Quality Assurance Developer team consists on the sharpest technical minds in the company. Architecture Business Development Configuration Management Developer is responsible for day to day operations. CEO COO CMSO Developer Using Java Script you can write a character at random location on screen By applying randomch() method With the help of String object With the help of random character property There is no built in approach in Java Script The transistor is a solid state semiconductor device used for amplification and switching, and has terminals. one

10 two three four Question No: 2 ( Marks: 1 ) - Please choose one Blue Pacific is a name of computer. Mini Desktop Micro Super Question No: 3 ( Marks: 1 ) - Please choose one Monte Carlo algorithm is an example of Randomized algorithm Greedy algorithm both greedy and randomized Heuristics Question No: 4 ( Marks: 1 ) - Please choose one A set of stand alone productivity applications designed to work together known as Productivity software suites Compiled software Secure software Intelligent software Question No: 1 ( Marks: 1 ) - Please choose one Which of the following hardware component of a computer can also be called as engine? Bus Storage Memory Processor Question No: 2 ( Marks: 1 ) - Please choose one TCP stands for. Total communication protocol Transmission control protocol Transfer control protocol Transfer collection protocol Question No: 3 ( Marks: 1 ) - Please choose one breaks down the message to be sent over the internet into packets. FTP HTTP

11 TCP IP Question No: 4 ( Marks: 1 ) - Please choose one A variable can be in scope. Local Global Either local or global None of the given options Question No: 5 ( Marks: 1 ) - Please choose one A protocol used for receiving messages is called. URL Telnet POP3 SMTP Question No: 6 ( Marks: 1 ) - Please choose one A function is also called. Sub-program Procedure Sub-routine All of the given option Question No: 7 ( Marks: 1 ) - Please choose one Capturing events and responding to them is called. Function Handling Event Handling Event Procedure All of the given option Question No: 8 ( Marks: 1 ) - Please choose one Which one of the following is NOT a primary color? Red Green Yellow Blue Question No: 9 ( Marks: 1 ) - Please choose one

12 are those programs in which the flow of the program is determined by the user's actions (mouse clicks, key presses) or messages from other programs. Event called programs Event processed programs Event driven programs Event declared programs Question No: 10 ( Marks: 1 ) - Please choose one a = Math.ceil(12.01) What will be the value of a? CS101 Solved MCQs For Final Term Exam Question No: 11 ( Marks: 1 ) - Please choose one Event handlers are placed in the portion of a Web page as attributes in HTML tags. HEAD BODY SCRIPT TITLE Question No: 12 ( Marks: 1 ) - Please choose one can be used for entering, editing, or viewing data, one record at a time. Queries Forms Reports None of the given options Question No: 13 ( Marks: 1 ) - Please choose one random() function returns a randomly-selected, floating-point number between. 0 and 1 0 and 10 0 and and -1 Question No: 14 ( Marks: 1 ) - Please choose one The organizations are learning that business can be done in a more effective manner if emphasis is placed upon. Cooperation Shared responsibility Networking

13 All of the given options Question No: 15 ( Marks: 1 ) - Please choose one In relational database, data store in the form of. Tables Rows Columns None of the given options Question No: 16 ( Marks: 1 ) - Please choose one Spies of one business monitoring the network traffic of their competitors. Industrial Intelligence Industrial Espionage Industrial Spying Industrial Surveillance Question No: 17 ( Marks: 1 ) - Please choose one waits for some time and then launch a function. Timeout( ) settimeout( ) settime( ) settimein( ) Question No: 18 ( Marks: 1 ) - Please choose one based communication allows business entities to coordinate the activities of their globally spread units with greater accuracy. Intranet Internet Home LAN Question No: 19 ( Marks: 1 ) - Please choose one The key responsibilities of a project manager is. Planning and tracking of the project Arranging of the appropriate resources Client relationship management All of the given options Question No: 20 ( Marks: 1 ) - Please choose one team consists on the sharpest technical minds in the company. Architecture Business Development Configuration Management Developer Question No: 21 ( Marks: 1 ) - Please choose one

14 Smart editors can automatically color different parts of statements in different colors e.g. comments in color. Green Grey Blue Red Question No: 22 ( Marks: 1 ) - Please choose one A collection of data organized in such a way that the computer can quickly search for a desired data item is known as : Retrieving Database Information DBMS Question No: 23 ( Marks: 1 ) - Please choose one Deep Blue was the name of computer human city game Question No: 24 ( Marks: 1 ) - Please choose one Information available on the web is mostly free of cost costly very cheap of no use Question No: 25 ( Marks: 1 ) - Please choose one Which one is correct? <BODY></BODY> <body></body> Both <BODY></BODY> and <body></body> <BODY/> Question No: 26 ( Marks: 1 ) - Please choose one is the best known builder for supercomputers. Sun Cray Research Microsoft Apple Question No: 27 ( Marks: 1 ) - Please choose one

15 Which one is the example of spreadsheet software? MS Word MS PowerPoint MS Excel MS Access Question No: 28 ( Marks: 1 ) - Please choose one Currently the BlueRay DVD can store more than of data. 10 GB 100 GB 50 GB 150 GB Question No: 29 ( Marks: 1 ) - Please choose one Blue Pacific is a name of computer. Mini Desktop Micro Super Question No: 30 ( Marks: 1 ) - Please choose one are powerful pieces of hardware, but not much useful on their own. Microcontrollers Microprocessors Integrated circuits Ports Question No: 31 ( Marks: 1 ) In programming, what is a loop? In computer science a for loop is a programming language statement which allows code to be repeatedly executed. A for loop is classified as an iteration statement. Question No: 32 ( Marks: 1 ) What are the other names of function? Any one. Routine, procedure, sub prograam Question No: 33 ( Marks: 2 ) How JavaScript Arrays are heterogeneous? Arrays are heterogeneous in java script because at the same time stimultanously they can hold elements of multiple data types Question No: 34 ( Marks: 2 ) What is the database? Data base is a collection of organized data in a proper way that computer can quickly search for any desired data item, its an easy way of allowing of manipulation of data,they

16 are design in such a way that access to any desired data can be identified and reached quickly and easy, they are generally consist of collection of interrelated files Question No: 35 ( Marks: 3 ) Differentiate between LAN and WAN with one example of each. Lan is a local area network where as wan is a wide area network Lan can be used in a specific areas with limited computers where as wan can be used on computers shared by large distances For example lan can be used on pc s or an organization located in one building but wan can be used on large scales like banks all over or in any Large communication systems Question No: 36 ( Marks: 3 ) What are Trojan Horses? Trojen horses are a kind of cyber crime, they are v harmful to computer because they are stand alone programme and the look like what they are not like any thing amusing or not harmless like games.. Question No: 37 ( Marks: 3 ) Elaborate Rester Graphics with examples. A raster graphics image, digital image, or bitmap, is a data file or structure representing a generally rectangular grid of pixels, or points of color, on a computer monitor, paper, or other display device. To illustrate the matter further - here's the letter "J": J Look closely at it... Take a magnifying glass to it if you like. You see a "J", the computer sees something more like this, where '.' represents a zero and 'X' represents a one:...x...x...x...x...x...x...x X...X X...X.XXX. CS101 Solved MCQs For Final Term Exam Where you see a zero, the computer instructs its video hardware to paint the current background color. A one calls for the current foreground color. Yes, it is actually a bit more complicated, but it all basically boils down to one bit or the other making a distinction between the colors of adjacent pixels, which together form an image.

17 Question No: 38 ( Marks: 5 ) What are the important properties, methods and event handlers of image object? The primary use of the image object is to download an image into the cache before it is needed to display, image object can be used to create different kinds of animations or to display one of several images based on the desired requirement, in java script image object can be used to display the required pre loaded image Properties of image object is : height, width,hspace,vspace, src, name border etc Methods :none Event handlers:on aboart, onload, onerror etc Question No: 39 ( Marks: 5 ) Write the JavaScript code for the Function SumOddNumbers(maxNumber) that can add non-negative odd numbers up to maxnumber and return their sum. Function sum odd numbers(maxnumber){var sum=0; For(i=0; <maxnumbers;i++) { { if(i / 2 == 1 i == 1) sum += i; } return sum; } CS101 Solved MCQs For Final Term Exam Question No: 40 ( Marks: 10 ) Write a note on : Coding guidelines Guidelines for developing short programs. Coding guidelines Always use semicolons to end statements Indent blocks of code (2 to 5 spaces) Identifiers Use the camel back scheme Variables: nouns Functions: verbs Comment Liberally Make them descriptive but concise Gudelines for developing short programs. Read and understand the problem Do you have all the required data? No: Get it Else assume it. State it explicitly Do the design

18 Question No: 41 ( Marks: 10 ) write a note on each of the following: a. Vector or Object-Oriented Graphics: b. Bit-Mapped or Raster Graphics: A:In Vector or object oriented graphic everything drawn is treated as object. objects retain their identity after they are drawon. these objects can later be moved, stretched, duplicated, deleted,etc. they are resolution independent and have relatively small file size. the examples are: swf, svg, wmf, ps brass_ibrahim: Vector graphics is the use of geometrical primitives such as points, lines, curves, and shapes or polygon(s), which are all based on mathematical equations, to represent images in computer graphics. brass_ibrahim: The term "vector graphics" is mainly used today in the context of twodimensional computer graphics Virtually all modern 3D rendering is done using extensions of 2D vector graphics techniques.virtually all modern 3D rendering is done using extensions of 2D vector graphics techniques B:Bit-Mapped or Raster Graphics: Treats everything that is drawn as a bit-map If an object is drawn on top of another, it is difficult to move just one of them while leaving the other untouched Changing the resolution often requires considerable touch-up work Relatively large file size Examples: gif, jpg, bmp masood.tariq: Bit-Mapped or Raster Graphics: Treats everything that is drawn as a bit-map If an object is drawn on top of another, it is difficult to move just one of them while leaving the other untouched Changing the resolution often requires considerable touch-up work Relatively large file size Examples: gif, jpg, bmp 28 objectives were from old papers out of 30. What is Array? Marks 2 what is computer prrofessional? Marks 2 define onload and onunload? Marks 2 waht is time bomb? Marks 2 what is bandwidth? Marks 2 "while" loop is more preferable than "For" loop? Marks 3 sementic web and present web? Marks 3

19 can we replace a human doctor by Expert system? Marks 5 Difference Internt and intranet? Marks 5 ways of navigation Heuristics? Marks 5 event handling? Define network organization and its advantages? Marks 10 Coding Guidline and guidlines for short programs? Marks 10 Dewelop a web page that displays six thumbnails images. A main image should be changed to a large version of thumbnail as soon as the mouse moves over the thumbnail. Write complete html and java script? Marks 10 characteristics of Internet? Marks 10 Profile and responsibilities of Team Leader? Marks 10 due to computer how many jobs are available and how many jobs are eliminated? Marks Today was my CS101 Paper. The Subjective Quizzes are as under: 1. How many members are in operational team and what there key resposibilities 2. What is Computer Screen? 3. What are weaknesses of the web? 4. Characteristics of Internet (Any Five)? 5. Breifly describe Telnet VoIP Instant Messaging FTP IP/TCP 6. Describe the organizational structure? 7. What is image process 8. Pixel?

20 Today I had CS 101 Paper.There were 41 questions.30 objective and 11 descriptive.few of the questions were: 3 attributes of event handler Difference between Internet and Intranet Function Commonsense to avoid viruses and explain antivirus TCP/IP An attack on Yahoo servers Spreadsheets Codes for uploading file Hierarchy in an organization Team lead COO Developer Businessess monitoring their employees '+' operator Image in Javascript

CS101-Introduction to Computing Prepared by Ali Hassan

CS101-Introduction to Computing Prepared by Ali Hassan FINALTERM EXAMINATION Spring 2009 CS101- Introduction to Computing (Session - 4) Note:- MCQs in Blue are sure answers and yellow highlighted are Quarantined M a r k s: 75 Time: 120 min Question No: 1 (

More information

CS101 Solved MCQS.

CS101 Solved MCQS. Question # 1 of 10 ( Start time: 05:12:59 PM ) Total Marks: 1 Global variables are: Visible everywhere on the web page Visible only in the block in which they are declared Visible only in the main code

More information

An algorithm that always takes the best immediate or local solution while finding an answer is called.

An algorithm that always takes the best immediate or local solution while finding an answer is called. An algorithm that always takes the best immediate or local solution while finding an answer is called. Deterministic Algorithm Non deterministic Algorithm Greedy Algorithm Randomized Algorithm Which of

More information

Cs101 Objective all past papers

Cs101 Objective all past papers Briefing CS101 Collection 1: Total Papers..06, different sessions. 2: Years..2011,2010,2009 & 2008 3: Only Solved 4: Subjective & Objective. 5: With Reference. Cs101 Objective all past papers CS101- Introduction

More information

CS101 Solved Subjective Questions from Old papers By

CS101 Solved Subjective Questions from Old papers By CS101 Solved Subjective Questions from Old papers By http://vustudents.ning.com Question No: 31 (Marks: 1) What is heuristic? Heuristic is a procedure that usually, but not always, works or that gives

More information

CS101 Finalterm Long Questions Solved. Question No: 31 (Marks: 1) What is heuristic? Heuristic is a procedure that usually, but not always, works or

CS101 Finalterm Long Questions Solved. Question No: 31 (Marks: 1) What is heuristic? Heuristic is a procedure that usually, but not always, works or CS101 Finalterm Long Questions Solved. Question No: 31 (Marks: 1) What is heuristic? Heuristic is a procedure that usually, but not always, works or that gives nearly the right answer. Question No: 32

More information

CS101 Introduction to Computing Midterm Solved Papers Spring 2012 by

CS101 Introduction to Computing Midterm Solved Papers Spring 2012 by CS101 Introduction to Computing Midterm Solved Papers Spring 2012 by www.virtualians.pk Question No: 1 ( Marks: 1 ) consists of cells arranged in rows & columns Spreadsheets Software Word processor Presentation

More information

Note: Though solved with care, not responsible for the accuracy.

Note: Though solved with care, not responsible for the accuracy. Question # 1 of 10 ( Start time: 05:10:26 PM ) () The name of first commercially available PC was: UNIVAC 1 ENIAC EDVAC Altair 8800 Question # 2 of 10 ( Start time: 05:11:49 PM ) () The first Web browser

More information

Mid Term Papers. Fall 2009 (Session 03) CS101. (Group is not responsible for any solved content)

Mid Term Papers. Fall 2009 (Session 03) CS101. (Group is not responsible for any solved content) Fall 2009 (Session 03) CS101 (Group is not responsible for any solved content) Subscribe to VU SMS Alert Service To Join Simply send following detail to bilal.zaheem@gmail.com Full Name Master Program

More information

CS101- Introduction to Computing. Composed By Faheem Saqib. Solved Subjective Final term Papers. For more Help Rep At.

CS101- Introduction to Computing. Composed By Faheem Saqib. Solved Subjective Final term Papers. For more Help Rep At. CS101- Introduction to Computing Composed By Faheem Saqib Solved Subjective Final term Papers For more Help Rep At Faheem_saqib2003@yahoo.com Faheem.saqib2003@gmail.com 0334-6034849 1. Write a note on

More information

CS101- Introduction to Computing. Composed By Faheem Saqib. 5 Final term Papers of For more Help Rep At.

CS101- Introduction to Computing. Composed By Faheem Saqib. 5 Final term Papers of For more Help Rep At. CS101- Introduction to Computing Composed By Faheem Saqib 5 Final term Papers of 2010 For more Help Rep At Faheem_saqib2003@yahoo.com Faheem.saqib2003@gmail.com 0334-6034849 Student Info MC100200011 OPKST

More information

Come & Join Us at VUSTUDENTS.net

Come & Join Us at VUSTUDENTS.net Come & Join Us at VUSTUDENTS.net For Assignment Solution, GDB, Online Quizzes, Helping Study material, Past Solved Papers, Solved MCQs, Current Papers, E-Books & more. Go to http://www.vustudents.net and

More information

Lesson-1 Computer Security

Lesson-1 Computer Security Threats to computer Security: What do they mean by a threat? Lesson-1 Computer Security A threat, in the context of computer security, refers to anything that has the potential to cause serious harm to

More information

FOR MORE PAPERS LOGON TO

FOR MORE PAPERS LOGON TO CS101 - Introduction to Computing Question No: 1 ( Marks: 1 ) - Please choose one Browser is a used for browsing. Tool Component Device None of the given choices Question No: 2 ( Marks: 1 ) - Please choose

More information

Full file at Chapter 2: Technology Infrastructure: The Internet and the World Wide Web

Full file at   Chapter 2: Technology Infrastructure: The Internet and the World Wide Web Chapter 2: Technology Infrastructure: The Internet and the World Wide Web TRUE/FALSE 1. Computer networks and the Internet form the basic technology structure that underlies all electronic commerce. T

More information

COLLEGEDUNIA MCA. 3. What would be displayed, if the following program is compiled and run?

COLLEGEDUNIA MCA. 3. What would be displayed, if the following program is compiled and run? MCA 1. If a 1Gb file is to be transmitted over a 10Mbps link, how much time would it take to complete the transmission? A) 10 seconds B) 100 seconds C) 1000 seconds D) 1024 seconds 2. Which one of the

More information

IBPS Practice Exam 1. One megabyte equals approximately 1) 1,000 bits 2) 1,000 bytes 3) 1 million bytes 4) 1 million bits 5) 2,000 bytes 2.

IBPS Practice Exam 1. One megabyte equals approximately 1) 1,000 bits 2) 1,000 bytes 3) 1 million bytes 4) 1 million bits 5) 2,000 bytes 2. IBPS Practice Exam 1. One megabyte equals approximately 1) 1,000 bits 2) 1,000 bytes 3) 1 million bytes 4) 1 million bits 5) 2,000 bytes 2. Data going into the computer is called? 1) Output 2) Algorithm

More information

Learning Objectives. In this chapter you will learn about:

Learning Objectives. In this chapter you will learn about: Ref Page Slide 1/17 Learning Objectives In this chapter you will learn about: Computer Data processing Characteristic features of computers Computers evolution to their present form Computer generations

More information

Chapter 1: Introduction to Computers. In this chapter you will learn about:

Chapter 1: Introduction to Computers. In this chapter you will learn about: Ref Page Slide 1/17 Learning Objectives In this chapter you will learn about: Computer Data processing Characteristic features of computers Computers evolution to their present form Computer generations

More information

v.m.g.rajasekaran ramani sri sarada sakthi mat. Hr. sec. school

v.m.g.rajasekaran ramani sri sarada sakthi mat. Hr. sec. school v.m.g.rajasekaran ramani sri sarada sakthi mat. Hr. sec. school STD: XI COMPUTER SCIENCE L.1. Introduction to computers 2 marks 1. What is a computer? Computer: A computer is an electronic machine, capable

More information

Copyright 2006 Prentice-Hall. All rights reserved. 1

Copyright 2006 Prentice-Hall. All rights reserved. 1 PC Basics CPSC 100 Hardware Software Networking Copyright 2006 Prentice-Hall. All rights reserved. 1 Objectives Identify basic components of a computer (hardware) Gain insight into how computers work (software)

More information

Internet. Class-In charge: S.Sasirekha

Internet. Class-In charge: S.Sasirekha Internet Class-In charge: S.Sasirekha COMPUTER NETWORK A computer network is a collection of two or more computers, which are connected together to share information and resources. Network Operating Systems

More information

Computer Technology Flash Card 2

Computer Technology Flash Card 2 Computer Technology Flash Card 2 Mouse An input device that allows the user to manipulate objects on the screen by moving the mouse along the surface of a desk. Data Refers to the symbols that represent

More information

KENDRIYA VIDYALAYA CHENANI (J & K)

KENDRIYA VIDYALAYA CHENANI (J & K) KENDRIYA VIDYALAYA CHENANI (J K) SESSION: 2017-18 SPLIT-UP OF COMPUTER EDUCATION Class : III INTRODUCTION ABOUT COMPUTERS What is Computer? April Introduction about main parts of computer 1. Advantages

More information

SCHOOL OF ACCOUNTING AND BUSINESS BSc. (APPLIED ACCOUNTING) GENERAL / SPECIAL DEGREE PROGRAMME

SCHOOL OF ACCOUNTING AND BUSINESS BSc. (APPLIED ACCOUNTING) GENERAL / SPECIAL DEGREE PROGRAMME All Rights Reserved Index No No. of Pages - 07 No of Questions - 04 SCHOOL OF ACCOUNTING AND BUSINESS BSc. (APPLIED ACCOUNTING) GENERAL / SPECIAL DEGREE PROGRAMME YEAR I SEMESTER I (Intake V- Group B)

More information

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies Comparison of Firewall, Intrusion Prevention and Antivirus Technologies (How each protects the network) Dr. Gaurav Kumar Jain Email: gaurav.rinkujain.jain@gmail.com Mr. Pradeep Sharma Mukul Verma Abstract

More information

Computer Skills Revision. By: Rana Hammady

Computer Skills Revision. By: Rana Hammady Computer Skills Revision By: Rana Hammady 1 Chapter 1 2 Introduction to Computer and Information Technology Definitions Computer tasks Uses of computer system History of computers and computer generations

More information

Chapter 1: Introduction to Computers

Chapter 1: Introduction to Computers Slide 1/17 Learning Objectives In this chapter you will learn about: Computer Data processing Characteristic features of computers Computers evolution to their present form Computer generations Characteristic

More information

Types Of Computer Virus Sources Of Virus Virus Warning Signs Virus Detection(Anti-Virus) Virus Prevention and Removal

Types Of Computer Virus Sources Of Virus Virus Warning Signs Virus Detection(Anti-Virus) Virus Prevention and Removal DATA PROCESSING NOTES FOR SS THREE FIRST TERM 2016/2017 SESSION SCHEME OF WORK Week 3 Week 4 Continuation of Spreadsheet(Practical) Computer Virus Types Of Computer Virus Sources Of Virus Virus Warning

More information

Chapter 4 The Internet

Chapter 4 The Internet Chapter 4 The Internet Dr. Farzana Rahman Assistant Professor Department of Computer Science James Madison University Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

1.2.1 Electronic computers based on digital switching

1.2.1 Electronic computers based on digital switching 1.2.1 Electronic computers based on digital switching The first true digital electronic computer was created by John V Atanasoff during 1937-1942. The Atanasoff-Berry Computer (called ABC figure 2.8) was

More information

CERT-In. Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES

CERT-In. Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES CERT-In Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES Department of Information Technology Ministry of Communications and Information Technology Government of India Anti Virus

More information

Chapter 2: Technology Infrastructure: The Internet and the World Wide Web

Chapter 2: Technology Infrastructure: The Internet and the World Wide Web Chapter 2: Technology Infrastructure: The Internet and the World Wide Web Student: 1. Networks of computers and the Internet that connects them to each other form the basic technological structure that

More information

Describe the layers of a computer system

Describe the layers of a computer system Chapter 1 The Big Picture Chapter Goals Describe the layers of a computer system Describe the concept of abstraction and its relationship to computing Describe the history of computer hardware and software

More information

INTRODUCTION TO ICT.

INTRODUCTION TO ICT. INTRODUCTION TO ICT. (Introducing Basic Network Concepts) Lecture # 24-25 By: M.Nadeem Akhtar. Department of CS & IT. URL: https://sites.google.com/site/nadeemcsuoliict/home/lectures 1 INTRODUCTION TO

More information

ADOBE DREAMWEAVER CS4 BASICS

ADOBE DREAMWEAVER CS4 BASICS ADOBE DREAMWEAVER CS4 BASICS Dreamweaver CS4 2 This tutorial focuses on the basic steps involved in creating an attractive, functional website. In using this tutorial you will learn to design a site layout,

More information

Full file at

Full file at ch02 True/False Indicate whether the statement is true or false. 1. Computer networks and the Internet form the basic technology structure that underlies all electronic commerce. 2. The USENET was the

More information

Vanavani Mat. Hr. Sec. School. Subject : Computer Science Std: XI. Quarterly Exam Key

Vanavani Mat. Hr. Sec. School. Subject : Computer Science Std: XI. Quarterly Exam Key Vanavani Mat. Hr. Sec. School Subject : Computer Science Std: XI Quarterly Exam Key Part I (15 X 1 = 15) 1. d 2. A 3. C 4. D 5. D 6. c 7. B 8. A 9. D 10. B 11. d 12. C 13. D 14. A 15. A Part B -Any Six

More information

Data Representation From 0s and 1s to images CPSC 101

Data Representation From 0s and 1s to images CPSC 101 Data Representation From 0s and 1s to images CPSC 101 Learning Goals After the Data Representation: Images unit, you will be able to: Recognize and translate between binary and decimal numbers Define bit,

More information

ZONAL EDUCATION OFFICE - JAFFNA

ZONAL EDUCATION OFFICE - JAFFNA ZONAL EDUCATION OFFICE - JAFFNA SECOND TERM EXAMINATION - 2014 Information and Communication Technology Grade 10 Time : 3 Hours Answer all the questions Part I 01. Which of the following is correct chronological

More information

Computer Fundamentals

Computer Fundamentals Computer Fundamentals Computers have made great inroads in our everyday life and thinking. They are put to use for all sorts of application ranging from complex calculations in the field or frontline research,

More information

Test Bank for Prelude to Programming Chapter 0

Test Bank for Prelude to Programming Chapter 0 Test Bank for Prelude to Programming Chapter 0 MULTIPLE CHOICE 1. Which of the following is not an attribute of a computer? a. can act on intermediate results without human intervention b. has its roots

More information

IT430- E-COMMERCE Solved MCQ(S) From Midterm Papers (1 TO 22 Lectures) BY Arslan Arshad

IT430- E-COMMERCE Solved MCQ(S) From Midterm Papers (1 TO 22 Lectures) BY Arslan Arshad IT430- E-COMMERCE Solved MCQ(S) From Midterm Papers (1 TO 22 Lectures) BY Arslan Arshad OCT 21,2016 BS110401050 BS110401050@vu.edu.pk Arslan.arshad01@gmail.com AKMP01 IT430 - E-COMMERCE Midterm Papers

More information

Overview of a computer

Overview of a computer Overview of a computer One marks 1. What is von Neumann concept also called as? Stored memory or stored program concept. 2. Who is the father of computer Charles Babbage 3. What is a computer? It is an

More information

HIGHER SECONDARY FIRST YEAR 2 MARK & 5 MARK NOTES CHAPTER 1 1. INTRODUCTION TO COMPUTER

HIGHER SECONDARY FIRST YEAR 2 MARK & 5 MARK NOTES CHAPTER 1 1. INTRODUCTION TO COMPUTER 1. What is computer? CHAPTER 1 1. INTRODUCTION TO COMPUTER A computer is an electronic machine, capable of performing basic operations like addition, subtraction, multiplication, division, etc. The computer

More information

Motivation For Networking. Information access Interaction among cooperative application programs Resource sharing

Motivation For Networking. Information access Interaction among cooperative application programs Resource sharing Motivation For Networking Information access Interaction among cooperative application programs Resource sharing CS422 -- PART 1 13 2003 Practical Results E-mail File transfer/access Web browsing Remote

More information

COMPUTER SKILLS COMP101

COMPUTER SKILLS COMP101 COMPUTER SKILLS COMP101 1 Course Content Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Introduction Numbering Systems Hardware Introduction to Computer Networks Introduction to the Internet

More information

INFORMATION TECHNOLOGY CONCEPTS (391) OPEN EVENT

INFORMATION TECHNOLOGY CONCEPTS (391) OPEN EVENT INFORMATION TECHNOLOGY CONCEPTS-OPEN- REGIONAL 2017 Page 1 of 10 INFORMATION TECHNOLOGY CONCEPTS (391) OPEN EVENT REGIONAL 2017 DO NOT WRITE ON TEST BOOKLET TOTAL POINTS (100 points) Failure to adhere

More information

UNIQUE IAS ACADEMY- COMPUTER QUIZ 2

UNIQUE IAS ACADEMY- COMPUTER QUIZ 2 1. Your business has contracted with another company to have them host and run an application for your company over the Internet. The company providing this service to your business is called an a) Internet

More information

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks. Chapter 4: Networking and the 4.1 Network Fundamentals 4.2 The 4.3 The World Wide Web 4.4 Protocols 4.5 Security Network Classifications Scope Local area network (LAN) Metropolitan area (MAN) Wide area

More information

1. This memory is for short term storage and is lost when the computer is turned off. A. Icon B. CPU C. Hard drive D. RAM 2. This input device will

1. This memory is for short term storage and is lost when the computer is turned off. A. Icon B. CPU C. Hard drive D. RAM 2. This input device will 1. This memory is for short term storage and is lost when the computer is turned off. A. Icon B. CPU C. Hard drive D. RAM 2. This input device will allow the user to move the pointer on the screen. A.

More information

Computer ANAMIKA ACADEMY. Mo Which function has the ability to move from one web page to another Hyper link

Computer ANAMIKA ACADEMY. Mo Which function has the ability to move from one web page to another Hyper link 1. Which function has the ability to move from one web page to another Hyper link web page? 2. What is the full name of GUI? GRAPHICAL USER INTERFACE 3. Which function keys are used to make spell and mild

More information

Adobe Dreamweaver CS5 Tutorial

Adobe Dreamweaver CS5 Tutorial Adobe Dreamweaver CS5 Tutorial GETTING STARTED This tutorial focuses on the basic steps involved in creating an attractive, functional website. In using this tutorial you will learn to design a site layout,

More information

Vocabulary Platform Computing\ First grade Theoretical number of hours=30 Practical number of hours =60

Vocabulary Platform Computing\ First grade Theoretical number of hours=30 Practical number of hours =60 Vocabulary Platform Computing\ First grade Theoretical number of hours=30 Practical number of hours =60 Sequence Subject Theoretical number of hours Introduction (Introduction to Computers, the concepts

More information

c. Compiler d. Program 9. To maximize a window means a. Fill it to capacity b. Expand it to fit the desktop c. Put only like files inside d.

c. Compiler d. Program 9. To maximize a window means a. Fill it to capacity b. Expand it to fit the desktop c. Put only like files inside d. SET 14 1. In Excel --- contains one or more worksheets a. Template b. Workbook c. Active cell d. Label 2. Which of the following is a popular programming language for developing multimedia web pages, websites

More information

Important Computer Abbreviations for IBPS Clerk & PO

Important Computer Abbreviations for IBPS Clerk & PO Important Computer Abbreviations for IBPS Clerk & PO Computer Basics for IBPS bank exams This is the scoring part of the IBPS bank exams like Clerk, PO, SO, RBI, SBI, and others. Computer Abbreviation

More information

Computers in Engineering COMP 208. A Brief History. Mechanical Calculators. A Historic Perspective Michael A. Hawker

Computers in Engineering COMP 208. A Brief History. Mechanical Calculators. A Historic Perspective Michael A. Hawker Computers in Engineering COMP 208 A Historic Perspective Michael A. Hawker Sept 4th, 2007 Computers in Engineering 1 A Brief History Abacus considered first mechanical computing device Used beads and rods

More information

Computers in Engineering COMP 208

Computers in Engineering COMP 208 Computers in Engineering COMP 208 A Historic Perspective Michael A. Hawker Sept 4th, 2007 Computers in Engineering 1 A Brief History Abacus considered first mechanical computing device Used beads and rods

More information

컴퓨터의기초 7 th Lecture 김현철 (2009 년여름학기 ) 컴퓨터공학부서울대학교. Copyrights 2008 Eom, Hyeonsang All Rights Reserved

컴퓨터의기초 7 th Lecture 김현철 (2009 년여름학기 ) 컴퓨터공학부서울대학교. Copyrights 2008 Eom, Hyeonsang All Rights Reserved 컴퓨터의기초 7 th Lecture 김현철 (2009 년여름학기 ) 컴퓨터공학부서울대학교 Copyrights 2008 Eom, Hyeonsang All Rights Reserved 순서 Networking and the Internet Algorithms Q&A Networking and the Internet Network Fundamentals The Internet

More information

Computing at Cox Green Curriculum Plan. Key Stage 3 Year 7

Computing at Cox Green Curriculum Plan. Key Stage 3 Year 7 Computing at Cox Green Curriculum Plan Key Stage 3 Year 7 Term 1 Term 2 Term 3 Term 4 Term 5 Term 6 E-safety Database Programming Spreadsheet and modelling Web design How data is represented in s? How

More information

Total Mark out of 35

Total Mark out of 35 University of Bahrain College of Information Technology Department of Information Systems ITBIS105 Test 1 Version 1 (35 points) 30 Oct 2013 @ 8:00-9:00 AM Student Name: Section: ID Number: Serial Number:

More information

BANK EXAMS COMPUTER KNOWLEDGE A) BASIC B) FORTRAN C) COBOL D) PASCAL E) JAVA

BANK EXAMS COMPUTER KNOWLEDGE A) BASIC B) FORTRAN C) COBOL D) PASCAL E) JAVA 1. Fourth Generations Computer were based on BANK EXAMS COMPUTER KNOWLEDGE A) BASIC B) FORTRAN C) COBOL D) PASCAL E) JAVA 2. Which of the following is first generation of computer? A) EDSAC B) IBM-1401

More information

Fundamentals Of Computer

Fundamentals Of Computer Fundamentals Of Computer Brief History Of Computers Abacus Earlier people used figures, Stones and bones for calculations. Abacus was the first calculating device, It was mainly used by merchants and traders.

More information

Word Found Meaning Innovation

Word Found Meaning Innovation AP CSP Quarter 1 Study Guide Vocabulary from Unit 1 & 3 Word Found Meaning Innovation A novel or improved idea, device, product, etc, or the development 1.1 thereof Binary 1.2 A way of representing information

More information

Chapter1 Overview of computers

Chapter1 Overview of computers 1 Chapter1 Overview of computers 1. What is a computer? 2. Which is the earliest computing machine? 3. Who invented the pascaline? 4. What is Charles babbage known as? 5. What is the machine proposed by

More information

COMPUTERIZED OFFICE MANAGEMENT

COMPUTERIZED OFFICE MANAGEMENT COMPUTERIZED OFFICE MANAGEMENT Module 1 (COMPUTER FUNDAMENTALS) COMPUTER FUNDAMENTALS : INTRODUCTION : The term computer is derived from the Latin word compute which means to calculate. Computer is a fast

More information

6. Something which has easily understood instructions is said to be: 1) User friendly 2) Information 3) Word Processing 4) Icon 5) None of these

6. Something which has easily understood instructions is said to be: 1) User friendly 2) Information 3) Word Processing 4) Icon 5) None of these 1. Pick the odd one out: 1) Interpreter 2) Operating System 3) Compiler 4) Assembler 2. When a particular object or an image is copied, in which of the following places it is stored? 1) Notice Board 2)

More information

Computer Basics. Computer Technology

Computer Basics. Computer Technology Computer Basics Computer Technology What is a Computer Information Processor Input Output Processing Storage Are physical parts like monitor, mouse, keyboard essential? Computer History Abacus 3,000 B.C.

More information

AQA GCSE Computer Science PLC

AQA GCSE Computer Science PLC 1 - Fundamentals of Algorithms Useful Websites BBC Bite Size Cambridge GCSE Exam Dates https://www.bbc.co.uk/education/subjects/z34k7ty Paper 1 14/05/2018 am https://www.cambridgegcsecomputing.org/ Paper

More information

Chapter 11: Wide-Area Networks and the Internet

Chapter 11: Wide-Area Networks and the Internet Chapter 11: Wide-Area Networks and the Internet MULTIPLE CHOICE 1. MAN stands for: a. Manchester Access Network c. Metropolitan-Area Network b. Multiple-Area Network d. Multiple Access Network 2. Packet

More information

4. A mail box 9) What is an embedded system? 1. A program that comes wrapped in a box 2. A program that is permanent part of a computer 3.

4. A mail box 9) What is an embedded system? 1. A program that comes wrapped in a box 2. A program that is permanent part of a computer 3. SET 6 1) A 32 bit word computer can access bytes at a time. 1. 4 2. 8 3. 16 4. 32 2) Access control based on a person s fingerprints is an example of 1. Biometric identification 2. Characteristic identification

More information

NetDefend Firewall UTM Services

NetDefend Firewall UTM Services NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860/1660/2560/2560G) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content

More information

WEB TECHNOLOGIES CHAPTER 1

WEB TECHNOLOGIES CHAPTER 1 WEB TECHNOLOGIES CHAPTER 1 WEB ESSENTIALS: CLIENTS, SERVERS, AND COMMUNICATION Modified by Ahmed Sallam Based on original slides by Jeffrey C. Jackson THE INTERNET Technical origin: ARPANET (late 1960

More information

(Refer Slide Time 00:01:09)

(Refer Slide Time 00:01:09) Computer Organization Part I Prof. S. Raman Department of Computer Science & Engineering Indian Institute of Technology Lecture 3 Introduction to System: Hardware In the previous lecture I said that I

More information

2 ZyWALL UTM Application Note

2 ZyWALL UTM Application Note 2 Application Note Threat Management Using ZyWALL 35 UTM Forward This support note describes how an SMB can minimize the impact of Internet threats using the ZyWALL 35 UTM as an example. The following

More information

Introduction to Computer Graphics

Introduction to Computer Graphics Introduction to 1.1 What is computer graphics? it would be difficult to overstate the importance of computer and communication technologies in our lives. Activities as wide-ranging as film making, publishing,

More information

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS) Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install

More information

E-Commerce. Infrastructure I: Computer Networks

E-Commerce. Infrastructure I: Computer Networks E-Commerce Infrastructure I: Computer Networks Almost all computers today are networked or part of a distributed system. I will provide an overview of networking and a basic description of network technology.

More information

Final Study Guide Arts & Communications

Final Study Guide Arts & Communications Final Study Guide Arts & Communications Programs Used in Multimedia Developing a multimedia production requires an array of software to create, edit, and combine text, sounds, and images. Elements of Multimedia

More information

Computer is an electronic machine that can receive, store, transform and output data of all kinds (image, text, numeric, graphics and sound).

Computer is an electronic machine that can receive, store, transform and output data of all kinds (image, text, numeric, graphics and sound). ELECTRONIC COMPUTERS THEN AND NOW Computer is an electronic machine that can receive, store, transform and output data of all kinds (image, text, numeric, graphics and sound). In the Past (i.e., during

More information

INTERNET BASICS / FILE OPERATIONS Defining Information Technology

INTERNET BASICS / FILE OPERATIONS Defining Information Technology L A B 2 INTERNET BASICS / FILE OPERATIONS Defining Information Technology This lab covers fundamental concepts of network organization, focusing on the client-server model for network resources such as

More information

Lecture 12. Application Layer. Application Layer 1

Lecture 12. Application Layer. Application Layer 1 Lecture 12 Application Layer Application Layer 1 Agenda The Application Layer (continue) Web and HTTP HTTP Cookies Web Caches Simple Introduction to Network Security Various actions by network attackers

More information

Q2#: A set of software that handle all database related operations of an organization is called.

Q2#: A set of software that handle all database related operations of an organization is called. CS101-FINAL TERM SOLVED PAPPER 2014 BY ARSLAN ARSHAD (ZAIN NASAR) Solved MCQS From Midterm and Final term Papers and also from daily based quizzes(1 to 45 lectures) SEPT 21,2014 BS110401050 BS110401050@vu.edu.pk

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems Security+ Guide to Network Security Fundamentals, Third Edition Chapter 3 Protecting Systems Objectives Explain how to harden operating systems List ways to prevent attacks through a Web browser Define

More information

Chapter 10: Security and Ethical Challenges of E-Business

Chapter 10: Security and Ethical Challenges of E-Business Chapter 10: Security and Ethical Challenges of E-Business Learning Objectives Identify several ethical issues in IT that affect employment, individuality, working condition, privacy, crime health etc.

More information

Midterm Review. October 17

Midterm Review. October 17 Midterm Review October 17 Midterm Layout Some multiple choice, matching, true/false Not much though Will mostly be short answer You will have to write/edit/sketch some HTML You will have to write/edit/sketch

More information

A Short History of Computers

A Short History of Computers A Short History of Computers Geoffrey M. Rockwell x 24072 Togo Salmon 309A grockwel@mcmaster.ca URL: http://www.humanities.mcmaster.ca/~hccrs/ihchome.htm McMaster University Administration u Homework 3

More information

How does the Internet Work? The Basics: Getting a Web Page. The Basics: Getting a Web Page. Client-Server model. The Internet: Basics

How does the Internet Work? The Basics: Getting a Web Page. The Basics: Getting a Web Page. Client-Server model. The Internet: Basics How does the Internet Work? When you type a URL (Uniform Resource Locator) into a Web Browser and press Return, what do you think happens? That is, what steps do you think are required to obtain a web

More information

FBCA-03 April Introduction to Internet and HTML Scripting (New Course)

FBCA-03 April Introduction to Internet and HTML Scripting (New Course) Seat No. : FBCA-03 April-2007 105-Introduction to Internet and HTML Scripting (New Course) Time : 3 Hours] [Max. Marks : 70 Instructions : (1) Figures to the right indicate marks allotted to that questions.

More information

Firewalls 1. Firewalls. Alexander Khodenko

Firewalls 1. Firewalls. Alexander Khodenko Firewalls 1 Firewalls Alexander Khodenko May 01, 2003 Firewalls 2 Firewalls Firewall is defined as a linkage in a network, which relays only those data packets that are clearly intended for and authorized

More information

NETWORK THREATS DEMAN

NETWORK THREATS DEMAN SELF-DEFENDING NETWORK NETWORK THREATS DEMAN NEW SECURITY: STRATEGIES TECHNOLOGIES Self-Propagating Threats A combination of: self propagating threats Collaborative applications Interconnected environments

More information

GoLive will first ask you if your new site will be for one individual or a work group; select for a Single User, and click Next.

GoLive will first ask you if your new site will be for one individual or a work group; select for a Single User, and click Next. Getting Started From the Start menu, located the Adobe folder which should contain the Adobe GoLive 6.0 folder. Inside this folder, click Adobe GoLive 6.0. GoLive will open to its initial project selection

More information

CS101 Lecture 29: Brief History of Computing

CS101 Lecture 29: Brief History of Computing CS101 Lecture 29: Brief History of Computing "There is no reason anyone would want a computer in their home." -- Ken Olson, founder and CEO of Digital Equipment Corp., 1977 John Magee 1 August 2013 Some

More information

Network Fundamentals. Chapter 7: Networking and Security 4. Network Fundamentals. Network Architecture

Network Fundamentals. Chapter 7: Networking and Security 4. Network Fundamentals. Network Architecture Network Fundamentals Chapter 7: Networking and Security CS10001 Computer Literacy Network Two or more computers connected by hardware or software so that they can communicate with each other Nodes Devices

More information

Computer networks 2013

Computer networks 2013 Chapter 4 EXERCISE 1 1 Describe what is meant by each of the following: a Router b Bridge c Proxy server Answers: see the Glossary. 2 Many small businesses have computer networks. a List three advantages

More information

STAR OFFICE CALC. Lesson 6

STAR OFFICE CALC. Lesson 6 Lesson 6 STAR OFFICE CALC 1. command is used to insert special characters? a. Insert Characters b. Special characters Insert c. Insert Special characters d. None of these 2. icon is used to present the

More information

AQU Information Systems Fundamentals Spring 2012 Pg. 9.1

AQU Information Systems Fundamentals Spring 2012 Pg. 9.1 AQU Information Systems Fundamentals Spring 2012 Pg. 9.1 c h a p t e r 9 THE INTERNET & THE NEW INFORMATION TECHNOLOGY INFRASTRUCTURE 9.1 LEARNING OBJECTIVES Describe features of infrastructure & connectivity

More information

Computer Principles and Components 1

Computer Principles and Components 1 Computer Principles and Components 1 Course Map This module provides an overview of the hardware and software environment being used throughout the course. Introduction Computer Principles and Components

More information

1. "To help others locate a Web site, the site should be registered with various " a. On Line services b. Backbone providers c.

1. To help others locate a Web site, the site should be registered with various  a. On Line services b. Backbone providers c. 1. "To help others locate a Web site, the site should be registered with various -----." a. On Line services b. Backbone providers c. Search engines d. Mail servers 2. "In technique, network communications

More information