CS101 Solved MCQs For Final Term Exam
|
|
- Georgina Watkins
- 5 years ago
- Views:
Transcription
1 Question # 1 of 10 ( Start time: 05:12:59 PM ) Total Marks: 1 Global variables are: Visible everywhere on the web page Visible only in the block in which they are declared Visible only in the main code Question # 2 of 10 ( Start time: 05:13:37 PM ) Total Marks: 1 Infection propagation and Actual destructive are the components of Transmission mechanism Payload Worms Trojan Horse Question # 3 of 10 ( Start time: 05:14:24 PM ) Total Marks: 1 If a computer could pass the Turing test then it would be able to: win a million dollar prize think like human begins think but slower than humans do the things faster Question # 4 of 10 ( Start time: 05:14:53 PM ) Total Marks: 1 is a special purpose computer that connects and translates between network that use different communication protocols. Bridge Router Gateway Gateway A special-purpose computer that connects and translates between networks that use different communications protocols Question # 5 of 10 ( Start time: 05:15:51 PM ) Total Marks: 1 The solution of the Mail Bombing is Filtering Do not accept s filtering There in no solution for it Question # 6 of 10 ( Start time: 05:16:38 PM ) Total Marks: 1 The name of very first computer was:
2 ABC BCD EDC Question # 8 of 10 ( Start time: 05:17:34 PM ) Total Marks: 1 MATH functions are accessed by referring to various of the Math object Functions Events Properties Methods In addition to the simple arithmetic operations (e.g. +, *, etc.) JavaScript supports several advanced mathematical operations as well Notationaly, these functions are accessed by referring to various methods of the Math object Question # 7 of 10 ( Start time: 05:16:57 PM ) Total Marks: 1 The color of each pixel is generally represented in the form of a. Duplet Triplet Both a & b None of these Rule of thumb learned through trial & error is called Heuristic Mistake Common sense Experience Question # 9 of 10 ( Start time: 05:18:36 PM ) Total Marks: 1 SCSI stands for: Small Computer System Interface System Common Small Integration Silicon Computer System Interface Question # 1 of 10 ( Start time: 05:21:25 PM ) Total Marks: 1 Internet is an example of network. Private Public Both Private and Public
3 Question # 2 of 10 ( Start time: 05:21:53 PM ) Total Marks: 1 The name of first commercially available PC was: UNIVAC 1 ENIAC EDVAC Altair 8800 Question # 3 of 10 ( Start time: 05:22:43 PM ) Total Marks: 1 Algorithm is a Definition of a problem Sequence of steps to solve a problem Understanding of a problem Solving a problem Question # 4 of 10 ( Start time: 05:23:52 PM ) Total Marks: 1 A group of information is called File Database Record Field Question # 5 of 10 ( Start time: 05:24:17 PM ) Total Marks: 1 is a branch f computer science concerned with manipulating and enhancing computer graphics. Image Handling Image Processing Image Engineering None of these Question # 6 of 10 ( Start time: 05:25:34 PM ) Total Marks: 1 has changed our way of life like no other technology. Computational technology Computer technology Computing technology None of the Above Question # 7 of 10 ( Start time: 05:26:27 PM ) Total Marks: 1 Sophisticated event handling is not possible with event handling Off-Line In-Line Out-Line Non of the given choices
4 Question # 8 of 10 ( Start time: 05:27:03 PM ) Total Marks: 1 Babbage s Analytical Engine could store information permanently in: Magnetic Tape Floppy Disk Punched Cards Question # 9 of 10 ( Start time: 05:28:30 PM ) Total Marks: 1 There are popular schemes to reduce the number of bytes that are required for storing graphics None of these A number of clever schemes have been invented to reduce the number of bytes that are required for storing graphics. 2 popular ones: Color mapping Dithering Question # 10 of 10 ( Start time: 05:30:01 PM ) Total Marks: 1 The internet-society is considered under Surveillance because: While surfing, we are being watched, constantly Our every click is recorded and analyzed to extract patterns and behaviors Webcams are becoming common. Providing a cheap way for parents to watch their children's every move All of the given Which of the following is incorrect for making design elements legible? Elements should be large enough Elements must contrast sufficiently Related elements should be visually grouped Elements should have no visual focus Making Display Elements Legible: 1. Designing (arranging) Display Elements Elements must be large enough to be processed visually Elements must contrast sufficiently with their backgrounds Related elements should be visually grouped through the use of space, color, or graphical boundaries The relative levels of importance among elements in a display should be revealed graphically Question # 2 of 10 ( Start time: 05:03:37 PM ) Total Marks: 1
5 1. Function is also known as. subprogram procedure subroutine All of given Function: A group of statements that is put together (or defined) once and then can be used (by reference) repeatedly on a Web page Also known as subprogram, procedure, subroutine In TCP\IP protocols became the only set of protocols used on the ARPANET system has component(s) The TCP/IP protocols becomes the only set of protocols used on the ARPANET This sets a standard for all networks, and generates the use of the term Internet as the net of nets ARPANET splits into two nets to keep military & non-military network sites separate: ARPANET and MILNET client SMTP server POP3 server All of the given choices / / / / A Parallelogram (Tilted rectangle) represents the flow chart element. Process Input or Output Decision Connector Punched cards were replaced by: Floppy Disk Zip Drives Magnetic storage Ref:
6 During the 1960s, the punched card was gradually replaced as the primary means for data storage by magnetic tape, as better, more capable computers became available. The virus may display an annoying, but harmless message Malicious Neutral Helpful DoS The internet communities are. Geographical based Interest based Country based Religion based Question # 1 of 10 ( Start time: 04:51:32 PM ) Total Marks: 1 Because of spending more time on the internet, the distances among the families have been. Increased Expanded Contracted Shortened Question # 3 of 10 ( Start time: 04:53:30 PM ) Total Marks: 1 Autonomous Web Agents are also known as Mobile Agents Softbots Both "Mobile Agents" & "Softbots" None of these A communication protocol is a that governs the flow of information over a network. Set of Methods Set of Protocols Set of rules Protocol Rules governing communications over the network By default in a web page Hyper Link for another web page is represented as: Blue only Black and Underlined Blue and Bold Blue and Underlined
7 The organizations are learning that business can be done in a more effective manner if emphasis is placed upon. Cooperation Shared responsibility Networking All of the given Question # 7 of 10 ( Start time: 04:57:19 PM ) Total Marks: 1 Monitor is an example of devices Output Input Processing The code in the portion is the right choice for developing larger JavaScript scripts Body At End Head Separate based on the principles of the logical reasoning ability of humans. Genetic Algorithms Rule-based Systems Feed-Forward Network None of these Rulebased Systems (1): Based on the principles of the logical reasoning ability of humans The key benefit of VPNs over conventional PNs is: Security Efficiency Lower Cost In automatic machines perform various tasks that were previously performed by humans. Fuzzy Logic Robotics Rule based Systems None of these Avoid to ensure readability of web page Overuse of bold and italics Use of paragraphs Use of white space Use of contrast colors
8 Deep Blue was the name of: Human Computer City Using, a user can remotely log on to a computer (connected to the user through a network, e.g. Internet) & have control over it like a local user, including control over running various programs? FTP TCP Telnet Protocol Telnet Protocol Using Telnet, a user can remotely log on to a computer (connected to the user s through a TCP/IP network, e.g. Internet) & have control over it like a local user, including control over running various programs In contrast, FTP allows file operations only Typical use: Configuring and testing of a remote Web server DoS is? Crime Cyber crime Not a crime A software enables users located at far-way locations to easily share information with others located all over the world. Protocol Internet Communication Channel Vacuum tubes were replaced by: Transistors Electrodes Electric Relays Cyber crime can be used to
9 Damage a home computer Bring down a business Weaken the telecom, financial, or even defense-related systems of a country All of the given provides a simple, consistent way for applications to interact with the HW without having to know all the details of the HW Explorer.exe System Files Operating System Application Software Communication protocol is a that governs the flow of information over a network Set of methods Set of protocols Set of rules Device team is responsible for the maintenance, expansion, improvement of the infrastructure consisting of workstations, networking equipment, software and network security. Support Configuration Management Quality Assurance Developer team consists on the sharpest technical minds in the company. Architecture Business Development Configuration Management Developer is responsible for day to day operations. CEO COO CMSO Developer Using Java Script you can write a character at random location on screen By applying randomch() method With the help of String object With the help of random character property There is no built in approach in Java Script The transistor is a solid state semiconductor device used for amplification and switching, and has terminals. one
10 two three four Question No: 2 ( Marks: 1 ) - Please choose one Blue Pacific is a name of computer. Mini Desktop Micro Super Question No: 3 ( Marks: 1 ) - Please choose one Monte Carlo algorithm is an example of Randomized algorithm Greedy algorithm both greedy and randomized Heuristics Question No: 4 ( Marks: 1 ) - Please choose one A set of stand alone productivity applications designed to work together known as Productivity software suites Compiled software Secure software Intelligent software Question No: 1 ( Marks: 1 ) - Please choose one Which of the following hardware component of a computer can also be called as engine? Bus Storage Memory Processor Question No: 2 ( Marks: 1 ) - Please choose one TCP stands for. Total communication protocol Transmission control protocol Transfer control protocol Transfer collection protocol Question No: 3 ( Marks: 1 ) - Please choose one breaks down the message to be sent over the internet into packets. FTP HTTP
11 TCP IP Question No: 4 ( Marks: 1 ) - Please choose one A variable can be in scope. Local Global Either local or global None of the given options Question No: 5 ( Marks: 1 ) - Please choose one A protocol used for receiving messages is called. URL Telnet POP3 SMTP Question No: 6 ( Marks: 1 ) - Please choose one A function is also called. Sub-program Procedure Sub-routine All of the given option Question No: 7 ( Marks: 1 ) - Please choose one Capturing events and responding to them is called. Function Handling Event Handling Event Procedure All of the given option Question No: 8 ( Marks: 1 ) - Please choose one Which one of the following is NOT a primary color? Red Green Yellow Blue Question No: 9 ( Marks: 1 ) - Please choose one
12 are those programs in which the flow of the program is determined by the user's actions (mouse clicks, key presses) or messages from other programs. Event called programs Event processed programs Event driven programs Event declared programs Question No: 10 ( Marks: 1 ) - Please choose one a = Math.ceil(12.01) What will be the value of a? CS101 Solved MCQs For Final Term Exam Question No: 11 ( Marks: 1 ) - Please choose one Event handlers are placed in the portion of a Web page as attributes in HTML tags. HEAD BODY SCRIPT TITLE Question No: 12 ( Marks: 1 ) - Please choose one can be used for entering, editing, or viewing data, one record at a time. Queries Forms Reports None of the given options Question No: 13 ( Marks: 1 ) - Please choose one random() function returns a randomly-selected, floating-point number between. 0 and 1 0 and 10 0 and and -1 Question No: 14 ( Marks: 1 ) - Please choose one The organizations are learning that business can be done in a more effective manner if emphasis is placed upon. Cooperation Shared responsibility Networking
13 All of the given options Question No: 15 ( Marks: 1 ) - Please choose one In relational database, data store in the form of. Tables Rows Columns None of the given options Question No: 16 ( Marks: 1 ) - Please choose one Spies of one business monitoring the network traffic of their competitors. Industrial Intelligence Industrial Espionage Industrial Spying Industrial Surveillance Question No: 17 ( Marks: 1 ) - Please choose one waits for some time and then launch a function. Timeout( ) settimeout( ) settime( ) settimein( ) Question No: 18 ( Marks: 1 ) - Please choose one based communication allows business entities to coordinate the activities of their globally spread units with greater accuracy. Intranet Internet Home LAN Question No: 19 ( Marks: 1 ) - Please choose one The key responsibilities of a project manager is. Planning and tracking of the project Arranging of the appropriate resources Client relationship management All of the given options Question No: 20 ( Marks: 1 ) - Please choose one team consists on the sharpest technical minds in the company. Architecture Business Development Configuration Management Developer Question No: 21 ( Marks: 1 ) - Please choose one
14 Smart editors can automatically color different parts of statements in different colors e.g. comments in color. Green Grey Blue Red Question No: 22 ( Marks: 1 ) - Please choose one A collection of data organized in such a way that the computer can quickly search for a desired data item is known as : Retrieving Database Information DBMS Question No: 23 ( Marks: 1 ) - Please choose one Deep Blue was the name of computer human city game Question No: 24 ( Marks: 1 ) - Please choose one Information available on the web is mostly free of cost costly very cheap of no use Question No: 25 ( Marks: 1 ) - Please choose one Which one is correct? <BODY></BODY> <body></body> Both <BODY></BODY> and <body></body> <BODY/> Question No: 26 ( Marks: 1 ) - Please choose one is the best known builder for supercomputers. Sun Cray Research Microsoft Apple Question No: 27 ( Marks: 1 ) - Please choose one
15 Which one is the example of spreadsheet software? MS Word MS PowerPoint MS Excel MS Access Question No: 28 ( Marks: 1 ) - Please choose one Currently the BlueRay DVD can store more than of data. 10 GB 100 GB 50 GB 150 GB Question No: 29 ( Marks: 1 ) - Please choose one Blue Pacific is a name of computer. Mini Desktop Micro Super Question No: 30 ( Marks: 1 ) - Please choose one are powerful pieces of hardware, but not much useful on their own. Microcontrollers Microprocessors Integrated circuits Ports Question No: 31 ( Marks: 1 ) In programming, what is a loop? In computer science a for loop is a programming language statement which allows code to be repeatedly executed. A for loop is classified as an iteration statement. Question No: 32 ( Marks: 1 ) What are the other names of function? Any one. Routine, procedure, sub prograam Question No: 33 ( Marks: 2 ) How JavaScript Arrays are heterogeneous? Arrays are heterogeneous in java script because at the same time stimultanously they can hold elements of multiple data types Question No: 34 ( Marks: 2 ) What is the database? Data base is a collection of organized data in a proper way that computer can quickly search for any desired data item, its an easy way of allowing of manipulation of data,they
16 are design in such a way that access to any desired data can be identified and reached quickly and easy, they are generally consist of collection of interrelated files Question No: 35 ( Marks: 3 ) Differentiate between LAN and WAN with one example of each. Lan is a local area network where as wan is a wide area network Lan can be used in a specific areas with limited computers where as wan can be used on computers shared by large distances For example lan can be used on pc s or an organization located in one building but wan can be used on large scales like banks all over or in any Large communication systems Question No: 36 ( Marks: 3 ) What are Trojan Horses? Trojen horses are a kind of cyber crime, they are v harmful to computer because they are stand alone programme and the look like what they are not like any thing amusing or not harmless like games.. Question No: 37 ( Marks: 3 ) Elaborate Rester Graphics with examples. A raster graphics image, digital image, or bitmap, is a data file or structure representing a generally rectangular grid of pixels, or points of color, on a computer monitor, paper, or other display device. To illustrate the matter further - here's the letter "J": J Look closely at it... Take a magnifying glass to it if you like. You see a "J", the computer sees something more like this, where '.' represents a zero and 'X' represents a one:...x...x...x...x...x...x...x X...X X...X.XXX. CS101 Solved MCQs For Final Term Exam Where you see a zero, the computer instructs its video hardware to paint the current background color. A one calls for the current foreground color. Yes, it is actually a bit more complicated, but it all basically boils down to one bit or the other making a distinction between the colors of adjacent pixels, which together form an image.
17 Question No: 38 ( Marks: 5 ) What are the important properties, methods and event handlers of image object? The primary use of the image object is to download an image into the cache before it is needed to display, image object can be used to create different kinds of animations or to display one of several images based on the desired requirement, in java script image object can be used to display the required pre loaded image Properties of image object is : height, width,hspace,vspace, src, name border etc Methods :none Event handlers:on aboart, onload, onerror etc Question No: 39 ( Marks: 5 ) Write the JavaScript code for the Function SumOddNumbers(maxNumber) that can add non-negative odd numbers up to maxnumber and return their sum. Function sum odd numbers(maxnumber){var sum=0; For(i=0; <maxnumbers;i++) { { if(i / 2 == 1 i == 1) sum += i; } return sum; } CS101 Solved MCQs For Final Term Exam Question No: 40 ( Marks: 10 ) Write a note on : Coding guidelines Guidelines for developing short programs. Coding guidelines Always use semicolons to end statements Indent blocks of code (2 to 5 spaces) Identifiers Use the camel back scheme Variables: nouns Functions: verbs Comment Liberally Make them descriptive but concise Gudelines for developing short programs. Read and understand the problem Do you have all the required data? No: Get it Else assume it. State it explicitly Do the design
18 Question No: 41 ( Marks: 10 ) write a note on each of the following: a. Vector or Object-Oriented Graphics: b. Bit-Mapped or Raster Graphics: A:In Vector or object oriented graphic everything drawn is treated as object. objects retain their identity after they are drawon. these objects can later be moved, stretched, duplicated, deleted,etc. they are resolution independent and have relatively small file size. the examples are: swf, svg, wmf, ps brass_ibrahim: Vector graphics is the use of geometrical primitives such as points, lines, curves, and shapes or polygon(s), which are all based on mathematical equations, to represent images in computer graphics. brass_ibrahim: The term "vector graphics" is mainly used today in the context of twodimensional computer graphics Virtually all modern 3D rendering is done using extensions of 2D vector graphics techniques.virtually all modern 3D rendering is done using extensions of 2D vector graphics techniques B:Bit-Mapped or Raster Graphics: Treats everything that is drawn as a bit-map If an object is drawn on top of another, it is difficult to move just one of them while leaving the other untouched Changing the resolution often requires considerable touch-up work Relatively large file size Examples: gif, jpg, bmp masood.tariq: Bit-Mapped or Raster Graphics: Treats everything that is drawn as a bit-map If an object is drawn on top of another, it is difficult to move just one of them while leaving the other untouched Changing the resolution often requires considerable touch-up work Relatively large file size Examples: gif, jpg, bmp 28 objectives were from old papers out of 30. What is Array? Marks 2 what is computer prrofessional? Marks 2 define onload and onunload? Marks 2 waht is time bomb? Marks 2 what is bandwidth? Marks 2 "while" loop is more preferable than "For" loop? Marks 3 sementic web and present web? Marks 3
19 can we replace a human doctor by Expert system? Marks 5 Difference Internt and intranet? Marks 5 ways of navigation Heuristics? Marks 5 event handling? Define network organization and its advantages? Marks 10 Coding Guidline and guidlines for short programs? Marks 10 Dewelop a web page that displays six thumbnails images. A main image should be changed to a large version of thumbnail as soon as the mouse moves over the thumbnail. Write complete html and java script? Marks 10 characteristics of Internet? Marks 10 Profile and responsibilities of Team Leader? Marks 10 due to computer how many jobs are available and how many jobs are eliminated? Marks Today was my CS101 Paper. The Subjective Quizzes are as under: 1. How many members are in operational team and what there key resposibilities 2. What is Computer Screen? 3. What are weaknesses of the web? 4. Characteristics of Internet (Any Five)? 5. Breifly describe Telnet VoIP Instant Messaging FTP IP/TCP 6. Describe the organizational structure? 7. What is image process 8. Pixel?
20 Today I had CS 101 Paper.There were 41 questions.30 objective and 11 descriptive.few of the questions were: 3 attributes of event handler Difference between Internet and Intranet Function Commonsense to avoid viruses and explain antivirus TCP/IP An attack on Yahoo servers Spreadsheets Codes for uploading file Hierarchy in an organization Team lead COO Developer Businessess monitoring their employees '+' operator Image in Javascript
CS101-Introduction to Computing Prepared by Ali Hassan
FINALTERM EXAMINATION Spring 2009 CS101- Introduction to Computing (Session - 4) Note:- MCQs in Blue are sure answers and yellow highlighted are Quarantined M a r k s: 75 Time: 120 min Question No: 1 (
More informationCS101 Solved MCQS.
Question # 1 of 10 ( Start time: 05:12:59 PM ) Total Marks: 1 Global variables are: Visible everywhere on the web page Visible only in the block in which they are declared Visible only in the main code
More informationAn algorithm that always takes the best immediate or local solution while finding an answer is called.
An algorithm that always takes the best immediate or local solution while finding an answer is called. Deterministic Algorithm Non deterministic Algorithm Greedy Algorithm Randomized Algorithm Which of
More informationCs101 Objective all past papers
Briefing CS101 Collection 1: Total Papers..06, different sessions. 2: Years..2011,2010,2009 & 2008 3: Only Solved 4: Subjective & Objective. 5: With Reference. Cs101 Objective all past papers CS101- Introduction
More informationCS101 Solved Subjective Questions from Old papers By
CS101 Solved Subjective Questions from Old papers By http://vustudents.ning.com Question No: 31 (Marks: 1) What is heuristic? Heuristic is a procedure that usually, but not always, works or that gives
More informationCS101 Finalterm Long Questions Solved. Question No: 31 (Marks: 1) What is heuristic? Heuristic is a procedure that usually, but not always, works or
CS101 Finalterm Long Questions Solved. Question No: 31 (Marks: 1) What is heuristic? Heuristic is a procedure that usually, but not always, works or that gives nearly the right answer. Question No: 32
More informationCS101 Introduction to Computing Midterm Solved Papers Spring 2012 by
CS101 Introduction to Computing Midterm Solved Papers Spring 2012 by www.virtualians.pk Question No: 1 ( Marks: 1 ) consists of cells arranged in rows & columns Spreadsheets Software Word processor Presentation
More informationNote: Though solved with care, not responsible for the accuracy.
Question # 1 of 10 ( Start time: 05:10:26 PM ) () The name of first commercially available PC was: UNIVAC 1 ENIAC EDVAC Altair 8800 Question # 2 of 10 ( Start time: 05:11:49 PM ) () The first Web browser
More informationMid Term Papers. Fall 2009 (Session 03) CS101. (Group is not responsible for any solved content)
Fall 2009 (Session 03) CS101 (Group is not responsible for any solved content) Subscribe to VU SMS Alert Service To Join Simply send following detail to bilal.zaheem@gmail.com Full Name Master Program
More informationCS101- Introduction to Computing. Composed By Faheem Saqib. Solved Subjective Final term Papers. For more Help Rep At.
CS101- Introduction to Computing Composed By Faheem Saqib Solved Subjective Final term Papers For more Help Rep At Faheem_saqib2003@yahoo.com Faheem.saqib2003@gmail.com 0334-6034849 1. Write a note on
More informationCS101- Introduction to Computing. Composed By Faheem Saqib. 5 Final term Papers of For more Help Rep At.
CS101- Introduction to Computing Composed By Faheem Saqib 5 Final term Papers of 2010 For more Help Rep At Faheem_saqib2003@yahoo.com Faheem.saqib2003@gmail.com 0334-6034849 Student Info MC100200011 OPKST
More informationCome & Join Us at VUSTUDENTS.net
Come & Join Us at VUSTUDENTS.net For Assignment Solution, GDB, Online Quizzes, Helping Study material, Past Solved Papers, Solved MCQs, Current Papers, E-Books & more. Go to http://www.vustudents.net and
More informationLesson-1 Computer Security
Threats to computer Security: What do they mean by a threat? Lesson-1 Computer Security A threat, in the context of computer security, refers to anything that has the potential to cause serious harm to
More informationFOR MORE PAPERS LOGON TO
CS101 - Introduction to Computing Question No: 1 ( Marks: 1 ) - Please choose one Browser is a used for browsing. Tool Component Device None of the given choices Question No: 2 ( Marks: 1 ) - Please choose
More informationFull file at Chapter 2: Technology Infrastructure: The Internet and the World Wide Web
Chapter 2: Technology Infrastructure: The Internet and the World Wide Web TRUE/FALSE 1. Computer networks and the Internet form the basic technology structure that underlies all electronic commerce. T
More informationCOLLEGEDUNIA MCA. 3. What would be displayed, if the following program is compiled and run?
MCA 1. If a 1Gb file is to be transmitted over a 10Mbps link, how much time would it take to complete the transmission? A) 10 seconds B) 100 seconds C) 1000 seconds D) 1024 seconds 2. Which one of the
More informationIBPS Practice Exam 1. One megabyte equals approximately 1) 1,000 bits 2) 1,000 bytes 3) 1 million bytes 4) 1 million bits 5) 2,000 bytes 2.
IBPS Practice Exam 1. One megabyte equals approximately 1) 1,000 bits 2) 1,000 bytes 3) 1 million bytes 4) 1 million bits 5) 2,000 bytes 2. Data going into the computer is called? 1) Output 2) Algorithm
More informationLearning Objectives. In this chapter you will learn about:
Ref Page Slide 1/17 Learning Objectives In this chapter you will learn about: Computer Data processing Characteristic features of computers Computers evolution to their present form Computer generations
More informationChapter 1: Introduction to Computers. In this chapter you will learn about:
Ref Page Slide 1/17 Learning Objectives In this chapter you will learn about: Computer Data processing Characteristic features of computers Computers evolution to their present form Computer generations
More informationv.m.g.rajasekaran ramani sri sarada sakthi mat. Hr. sec. school
v.m.g.rajasekaran ramani sri sarada sakthi mat. Hr. sec. school STD: XI COMPUTER SCIENCE L.1. Introduction to computers 2 marks 1. What is a computer? Computer: A computer is an electronic machine, capable
More informationCopyright 2006 Prentice-Hall. All rights reserved. 1
PC Basics CPSC 100 Hardware Software Networking Copyright 2006 Prentice-Hall. All rights reserved. 1 Objectives Identify basic components of a computer (hardware) Gain insight into how computers work (software)
More informationInternet. Class-In charge: S.Sasirekha
Internet Class-In charge: S.Sasirekha COMPUTER NETWORK A computer network is a collection of two or more computers, which are connected together to share information and resources. Network Operating Systems
More informationComputer Technology Flash Card 2
Computer Technology Flash Card 2 Mouse An input device that allows the user to manipulate objects on the screen by moving the mouse along the surface of a desk. Data Refers to the symbols that represent
More informationKENDRIYA VIDYALAYA CHENANI (J & K)
KENDRIYA VIDYALAYA CHENANI (J K) SESSION: 2017-18 SPLIT-UP OF COMPUTER EDUCATION Class : III INTRODUCTION ABOUT COMPUTERS What is Computer? April Introduction about main parts of computer 1. Advantages
More informationSCHOOL OF ACCOUNTING AND BUSINESS BSc. (APPLIED ACCOUNTING) GENERAL / SPECIAL DEGREE PROGRAMME
All Rights Reserved Index No No. of Pages - 07 No of Questions - 04 SCHOOL OF ACCOUNTING AND BUSINESS BSc. (APPLIED ACCOUNTING) GENERAL / SPECIAL DEGREE PROGRAMME YEAR I SEMESTER I (Intake V- Group B)
More informationComparison of Firewall, Intrusion Prevention and Antivirus Technologies
Comparison of Firewall, Intrusion Prevention and Antivirus Technologies (How each protects the network) Dr. Gaurav Kumar Jain Email: gaurav.rinkujain.jain@gmail.com Mr. Pradeep Sharma Mukul Verma Abstract
More informationComputer Skills Revision. By: Rana Hammady
Computer Skills Revision By: Rana Hammady 1 Chapter 1 2 Introduction to Computer and Information Technology Definitions Computer tasks Uses of computer system History of computers and computer generations
More informationChapter 1: Introduction to Computers
Slide 1/17 Learning Objectives In this chapter you will learn about: Computer Data processing Characteristic features of computers Computers evolution to their present form Computer generations Characteristic
More informationTypes Of Computer Virus Sources Of Virus Virus Warning Signs Virus Detection(Anti-Virus) Virus Prevention and Removal
DATA PROCESSING NOTES FOR SS THREE FIRST TERM 2016/2017 SESSION SCHEME OF WORK Week 3 Week 4 Continuation of Spreadsheet(Practical) Computer Virus Types Of Computer Virus Sources Of Virus Virus Warning
More informationChapter 4 The Internet
Chapter 4 The Internet Dr. Farzana Rahman Assistant Professor Department of Computer Science James Madison University Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3
More informationNetworking interview questions
Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected
More information1.2.1 Electronic computers based on digital switching
1.2.1 Electronic computers based on digital switching The first true digital electronic computer was created by John V Atanasoff during 1937-1942. The Atanasoff-Berry Computer (called ABC figure 2.8) was
More informationCERT-In. Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES
CERT-In Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES Department of Information Technology Ministry of Communications and Information Technology Government of India Anti Virus
More informationChapter 2: Technology Infrastructure: The Internet and the World Wide Web
Chapter 2: Technology Infrastructure: The Internet and the World Wide Web Student: 1. Networks of computers and the Internet that connects them to each other form the basic technological structure that
More informationDescribe the layers of a computer system
Chapter 1 The Big Picture Chapter Goals Describe the layers of a computer system Describe the concept of abstraction and its relationship to computing Describe the history of computer hardware and software
More informationINTRODUCTION TO ICT.
INTRODUCTION TO ICT. (Introducing Basic Network Concepts) Lecture # 24-25 By: M.Nadeem Akhtar. Department of CS & IT. URL: https://sites.google.com/site/nadeemcsuoliict/home/lectures 1 INTRODUCTION TO
More informationADOBE DREAMWEAVER CS4 BASICS
ADOBE DREAMWEAVER CS4 BASICS Dreamweaver CS4 2 This tutorial focuses on the basic steps involved in creating an attractive, functional website. In using this tutorial you will learn to design a site layout,
More informationFull file at
ch02 True/False Indicate whether the statement is true or false. 1. Computer networks and the Internet form the basic technology structure that underlies all electronic commerce. 2. The USENET was the
More informationVanavani Mat. Hr. Sec. School. Subject : Computer Science Std: XI. Quarterly Exam Key
Vanavani Mat. Hr. Sec. School Subject : Computer Science Std: XI Quarterly Exam Key Part I (15 X 1 = 15) 1. d 2. A 3. C 4. D 5. D 6. c 7. B 8. A 9. D 10. B 11. d 12. C 13. D 14. A 15. A Part B -Any Six
More informationData Representation From 0s and 1s to images CPSC 101
Data Representation From 0s and 1s to images CPSC 101 Learning Goals After the Data Representation: Images unit, you will be able to: Recognize and translate between binary and decimal numbers Define bit,
More informationZONAL EDUCATION OFFICE - JAFFNA
ZONAL EDUCATION OFFICE - JAFFNA SECOND TERM EXAMINATION - 2014 Information and Communication Technology Grade 10 Time : 3 Hours Answer all the questions Part I 01. Which of the following is correct chronological
More informationComputer Fundamentals
Computer Fundamentals Computers have made great inroads in our everyday life and thinking. They are put to use for all sorts of application ranging from complex calculations in the field or frontline research,
More informationTest Bank for Prelude to Programming Chapter 0
Test Bank for Prelude to Programming Chapter 0 MULTIPLE CHOICE 1. Which of the following is not an attribute of a computer? a. can act on intermediate results without human intervention b. has its roots
More informationIT430- E-COMMERCE Solved MCQ(S) From Midterm Papers (1 TO 22 Lectures) BY Arslan Arshad
IT430- E-COMMERCE Solved MCQ(S) From Midterm Papers (1 TO 22 Lectures) BY Arslan Arshad OCT 21,2016 BS110401050 BS110401050@vu.edu.pk Arslan.arshad01@gmail.com AKMP01 IT430 - E-COMMERCE Midterm Papers
More informationOverview of a computer
Overview of a computer One marks 1. What is von Neumann concept also called as? Stored memory or stored program concept. 2. Who is the father of computer Charles Babbage 3. What is a computer? It is an
More informationHIGHER SECONDARY FIRST YEAR 2 MARK & 5 MARK NOTES CHAPTER 1 1. INTRODUCTION TO COMPUTER
1. What is computer? CHAPTER 1 1. INTRODUCTION TO COMPUTER A computer is an electronic machine, capable of performing basic operations like addition, subtraction, multiplication, division, etc. The computer
More informationMotivation For Networking. Information access Interaction among cooperative application programs Resource sharing
Motivation For Networking Information access Interaction among cooperative application programs Resource sharing CS422 -- PART 1 13 2003 Practical Results E-mail File transfer/access Web browsing Remote
More informationCOMPUTER SKILLS COMP101
COMPUTER SKILLS COMP101 1 Course Content Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Introduction Numbering Systems Hardware Introduction to Computer Networks Introduction to the Internet
More informationINFORMATION TECHNOLOGY CONCEPTS (391) OPEN EVENT
INFORMATION TECHNOLOGY CONCEPTS-OPEN- REGIONAL 2017 Page 1 of 10 INFORMATION TECHNOLOGY CONCEPTS (391) OPEN EVENT REGIONAL 2017 DO NOT WRITE ON TEST BOOKLET TOTAL POINTS (100 points) Failure to adhere
More informationUNIQUE IAS ACADEMY- COMPUTER QUIZ 2
1. Your business has contracted with another company to have them host and run an application for your company over the Internet. The company providing this service to your business is called an a) Internet
More informationChapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.
Chapter 4: Networking and the 4.1 Network Fundamentals 4.2 The 4.3 The World Wide Web 4.4 Protocols 4.5 Security Network Classifications Scope Local area network (LAN) Metropolitan area (MAN) Wide area
More information1. This memory is for short term storage and is lost when the computer is turned off. A. Icon B. CPU C. Hard drive D. RAM 2. This input device will
1. This memory is for short term storage and is lost when the computer is turned off. A. Icon B. CPU C. Hard drive D. RAM 2. This input device will allow the user to move the pointer on the screen. A.
More informationComputer ANAMIKA ACADEMY. Mo Which function has the ability to move from one web page to another Hyper link
1. Which function has the ability to move from one web page to another Hyper link web page? 2. What is the full name of GUI? GRAPHICAL USER INTERFACE 3. Which function keys are used to make spell and mild
More informationAdobe Dreamweaver CS5 Tutorial
Adobe Dreamweaver CS5 Tutorial GETTING STARTED This tutorial focuses on the basic steps involved in creating an attractive, functional website. In using this tutorial you will learn to design a site layout,
More informationVocabulary Platform Computing\ First grade Theoretical number of hours=30 Practical number of hours =60
Vocabulary Platform Computing\ First grade Theoretical number of hours=30 Practical number of hours =60 Sequence Subject Theoretical number of hours Introduction (Introduction to Computers, the concepts
More informationc. Compiler d. Program 9. To maximize a window means a. Fill it to capacity b. Expand it to fit the desktop c. Put only like files inside d.
SET 14 1. In Excel --- contains one or more worksheets a. Template b. Workbook c. Active cell d. Label 2. Which of the following is a popular programming language for developing multimedia web pages, websites
More informationImportant Computer Abbreviations for IBPS Clerk & PO
Important Computer Abbreviations for IBPS Clerk & PO Computer Basics for IBPS bank exams This is the scoring part of the IBPS bank exams like Clerk, PO, SO, RBI, SBI, and others. Computer Abbreviation
More informationComputers in Engineering COMP 208. A Brief History. Mechanical Calculators. A Historic Perspective Michael A. Hawker
Computers in Engineering COMP 208 A Historic Perspective Michael A. Hawker Sept 4th, 2007 Computers in Engineering 1 A Brief History Abacus considered first mechanical computing device Used beads and rods
More informationComputers in Engineering COMP 208
Computers in Engineering COMP 208 A Historic Perspective Michael A. Hawker Sept 4th, 2007 Computers in Engineering 1 A Brief History Abacus considered first mechanical computing device Used beads and rods
More information컴퓨터의기초 7 th Lecture 김현철 (2009 년여름학기 ) 컴퓨터공학부서울대학교. Copyrights 2008 Eom, Hyeonsang All Rights Reserved
컴퓨터의기초 7 th Lecture 김현철 (2009 년여름학기 ) 컴퓨터공학부서울대학교 Copyrights 2008 Eom, Hyeonsang All Rights Reserved 순서 Networking and the Internet Algorithms Q&A Networking and the Internet Network Fundamentals The Internet
More informationComputing at Cox Green Curriculum Plan. Key Stage 3 Year 7
Computing at Cox Green Curriculum Plan Key Stage 3 Year 7 Term 1 Term 2 Term 3 Term 4 Term 5 Term 6 E-safety Database Programming Spreadsheet and modelling Web design How data is represented in s? How
More informationTotal Mark out of 35
University of Bahrain College of Information Technology Department of Information Systems ITBIS105 Test 1 Version 1 (35 points) 30 Oct 2013 @ 8:00-9:00 AM Student Name: Section: ID Number: Serial Number:
More informationBANK EXAMS COMPUTER KNOWLEDGE A) BASIC B) FORTRAN C) COBOL D) PASCAL E) JAVA
1. Fourth Generations Computer were based on BANK EXAMS COMPUTER KNOWLEDGE A) BASIC B) FORTRAN C) COBOL D) PASCAL E) JAVA 2. Which of the following is first generation of computer? A) EDSAC B) IBM-1401
More informationFundamentals Of Computer
Fundamentals Of Computer Brief History Of Computers Abacus Earlier people used figures, Stones and bones for calculations. Abacus was the first calculating device, It was mainly used by merchants and traders.
More informationWord Found Meaning Innovation
AP CSP Quarter 1 Study Guide Vocabulary from Unit 1 & 3 Word Found Meaning Innovation A novel or improved idea, device, product, etc, or the development 1.1 thereof Binary 1.2 A way of representing information
More informationChapter1 Overview of computers
1 Chapter1 Overview of computers 1. What is a computer? 2. Which is the earliest computing machine? 3. Who invented the pascaline? 4. What is Charles babbage known as? 5. What is the machine proposed by
More informationCOMPUTERIZED OFFICE MANAGEMENT
COMPUTERIZED OFFICE MANAGEMENT Module 1 (COMPUTER FUNDAMENTALS) COMPUTER FUNDAMENTALS : INTRODUCTION : The term computer is derived from the Latin word compute which means to calculate. Computer is a fast
More information6. Something which has easily understood instructions is said to be: 1) User friendly 2) Information 3) Word Processing 4) Icon 5) None of these
1. Pick the odd one out: 1) Interpreter 2) Operating System 3) Compiler 4) Assembler 2. When a particular object or an image is copied, in which of the following places it is stored? 1) Notice Board 2)
More informationComputer Basics. Computer Technology
Computer Basics Computer Technology What is a Computer Information Processor Input Output Processing Storage Are physical parts like monitor, mouse, keyboard essential? Computer History Abacus 3,000 B.C.
More informationAQA GCSE Computer Science PLC
1 - Fundamentals of Algorithms Useful Websites BBC Bite Size Cambridge GCSE Exam Dates https://www.bbc.co.uk/education/subjects/z34k7ty Paper 1 14/05/2018 am https://www.cambridgegcsecomputing.org/ Paper
More informationChapter 11: Wide-Area Networks and the Internet
Chapter 11: Wide-Area Networks and the Internet MULTIPLE CHOICE 1. MAN stands for: a. Manchester Access Network c. Metropolitan-Area Network b. Multiple-Area Network d. Multiple Access Network 2. Packet
More information4. A mail box 9) What is an embedded system? 1. A program that comes wrapped in a box 2. A program that is permanent part of a computer 3.
SET 6 1) A 32 bit word computer can access bytes at a time. 1. 4 2. 8 3. 16 4. 32 2) Access control based on a person s fingerprints is an example of 1. Biometric identification 2. Characteristic identification
More informationNetDefend Firewall UTM Services
NetDefend Firewall UTM Services Unified Threat Management D-Link NetDefend UTM firewalls (DFL-260/860/1660/2560/2560G) integrate an Intrusion Prevention System (IPS), gateway AntiVirus (AV), and Web Content
More informationWEB TECHNOLOGIES CHAPTER 1
WEB TECHNOLOGIES CHAPTER 1 WEB ESSENTIALS: CLIENTS, SERVERS, AND COMMUNICATION Modified by Ahmed Sallam Based on original slides by Jeffrey C. Jackson THE INTERNET Technical origin: ARPANET (late 1960
More information(Refer Slide Time 00:01:09)
Computer Organization Part I Prof. S. Raman Department of Computer Science & Engineering Indian Institute of Technology Lecture 3 Introduction to System: Hardware In the previous lecture I said that I
More information2 ZyWALL UTM Application Note
2 Application Note Threat Management Using ZyWALL 35 UTM Forward This support note describes how an SMB can minimize the impact of Internet threats using the ZyWALL 35 UTM as an example. The following
More informationIntroduction to Computer Graphics
Introduction to 1.1 What is computer graphics? it would be difficult to overstate the importance of computer and communication technologies in our lives. Activities as wide-ranging as film making, publishing,
More informationIdentify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)
Course Outline Network+ Duration: 5 days (30 hours) Learning Objectives: Install and configure a network card Define the concepts of network layers Understand and implement the TCP/IP protocol Install
More informationE-Commerce. Infrastructure I: Computer Networks
E-Commerce Infrastructure I: Computer Networks Almost all computers today are networked or part of a distributed system. I will provide an overview of networking and a basic description of network technology.
More informationFinal Study Guide Arts & Communications
Final Study Guide Arts & Communications Programs Used in Multimedia Developing a multimedia production requires an array of software to create, edit, and combine text, sounds, and images. Elements of Multimedia
More informationComputer is an electronic machine that can receive, store, transform and output data of all kinds (image, text, numeric, graphics and sound).
ELECTRONIC COMPUTERS THEN AND NOW Computer is an electronic machine that can receive, store, transform and output data of all kinds (image, text, numeric, graphics and sound). In the Past (i.e., during
More informationINTERNET BASICS / FILE OPERATIONS Defining Information Technology
L A B 2 INTERNET BASICS / FILE OPERATIONS Defining Information Technology This lab covers fundamental concepts of network organization, focusing on the client-server model for network resources such as
More informationLecture 12. Application Layer. Application Layer 1
Lecture 12 Application Layer Application Layer 1 Agenda The Application Layer (continue) Web and HTTP HTTP Cookies Web Caches Simple Introduction to Network Security Various actions by network attackers
More informationQ2#: A set of software that handle all database related operations of an organization is called.
CS101-FINAL TERM SOLVED PAPPER 2014 BY ARSLAN ARSHAD (ZAIN NASAR) Solved MCQS From Midterm and Final term Papers and also from daily based quizzes(1 to 45 lectures) SEPT 21,2014 BS110401050 BS110401050@vu.edu.pk
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 3 Protecting Systems Objectives Explain how to harden operating systems List ways to prevent attacks through a Web browser Define
More informationChapter 10: Security and Ethical Challenges of E-Business
Chapter 10: Security and Ethical Challenges of E-Business Learning Objectives Identify several ethical issues in IT that affect employment, individuality, working condition, privacy, crime health etc.
More informationMidterm Review. October 17
Midterm Review October 17 Midterm Layout Some multiple choice, matching, true/false Not much though Will mostly be short answer You will have to write/edit/sketch some HTML You will have to write/edit/sketch
More informationA Short History of Computers
A Short History of Computers Geoffrey M. Rockwell x 24072 Togo Salmon 309A grockwel@mcmaster.ca URL: http://www.humanities.mcmaster.ca/~hccrs/ihchome.htm McMaster University Administration u Homework 3
More informationHow does the Internet Work? The Basics: Getting a Web Page. The Basics: Getting a Web Page. Client-Server model. The Internet: Basics
How does the Internet Work? When you type a URL (Uniform Resource Locator) into a Web Browser and press Return, what do you think happens? That is, what steps do you think are required to obtain a web
More informationFBCA-03 April Introduction to Internet and HTML Scripting (New Course)
Seat No. : FBCA-03 April-2007 105-Introduction to Internet and HTML Scripting (New Course) Time : 3 Hours] [Max. Marks : 70 Instructions : (1) Figures to the right indicate marks allotted to that questions.
More informationFirewalls 1. Firewalls. Alexander Khodenko
Firewalls 1 Firewalls Alexander Khodenko May 01, 2003 Firewalls 2 Firewalls Firewall is defined as a linkage in a network, which relays only those data packets that are clearly intended for and authorized
More informationNETWORK THREATS DEMAN
SELF-DEFENDING NETWORK NETWORK THREATS DEMAN NEW SECURITY: STRATEGIES TECHNOLOGIES Self-Propagating Threats A combination of: self propagating threats Collaborative applications Interconnected environments
More informationGoLive will first ask you if your new site will be for one individual or a work group; select for a Single User, and click Next.
Getting Started From the Start menu, located the Adobe folder which should contain the Adobe GoLive 6.0 folder. Inside this folder, click Adobe GoLive 6.0. GoLive will open to its initial project selection
More informationCS101 Lecture 29: Brief History of Computing
CS101 Lecture 29: Brief History of Computing "There is no reason anyone would want a computer in their home." -- Ken Olson, founder and CEO of Digital Equipment Corp., 1977 John Magee 1 August 2013 Some
More informationNetwork Fundamentals. Chapter 7: Networking and Security 4. Network Fundamentals. Network Architecture
Network Fundamentals Chapter 7: Networking and Security CS10001 Computer Literacy Network Two or more computers connected by hardware or software so that they can communicate with each other Nodes Devices
More informationComputer networks 2013
Chapter 4 EXERCISE 1 1 Describe what is meant by each of the following: a Router b Bridge c Proxy server Answers: see the Glossary. 2 Many small businesses have computer networks. a List three advantages
More informationSTAR OFFICE CALC. Lesson 6
Lesson 6 STAR OFFICE CALC 1. command is used to insert special characters? a. Insert Characters b. Special characters Insert c. Insert Special characters d. None of these 2. icon is used to present the
More informationAQU Information Systems Fundamentals Spring 2012 Pg. 9.1
AQU Information Systems Fundamentals Spring 2012 Pg. 9.1 c h a p t e r 9 THE INTERNET & THE NEW INFORMATION TECHNOLOGY INFRASTRUCTURE 9.1 LEARNING OBJECTIVES Describe features of infrastructure & connectivity
More informationComputer Principles and Components 1
Computer Principles and Components 1 Course Map This module provides an overview of the hardware and software environment being used throughout the course. Introduction Computer Principles and Components
More information1. "To help others locate a Web site, the site should be registered with various " a. On Line services b. Backbone providers c.
1. "To help others locate a Web site, the site should be registered with various -----." a. On Line services b. Backbone providers c. Search engines d. Mail servers 2. "In technique, network communications
More information