FINAL TERM PAPER 1. EXAMINATION Spring 2010 CS101- Introduction to Computing. Amel..

Similar documents
By Ali. FINALTERM EXAMINATION Spring 2010 CS001- VU-Computer Proficiency License Ref No: Time: 90 min Marks: 58 Student Info

CS101 Introduction to Computing Midterm Solved Papers Spring 2012 by

CS101- Introduction to Computing. Composed By Faheem Saqib. 5 Final term Papers of For more Help Rep At.


An algorithm that always takes the best immediate or local solution while finding an answer is called.

FOR MORE PAPERS LOGON TO

CS101 Finalterm Long Questions Solved. Question No: 31 (Marks: 1) What is heuristic? Heuristic is a procedure that usually, but not always, works or

CS101-Introduction to Computing Prepared by Ali Hassan

CS101 Solved Subjective Questions from Old papers By

Mid Term Papers. Fall 2009 (Session 03) CS101. (Group is not responsible for any solved content)

CS101 Solved MCQS.

Glossary. advance: to move forward

Downloaded From :

Pace University. Fundamental Concepts of CS121 1

KENDRIYA VIDYALAYA CHENANI (J & K)

CHAPTER 4: MICROSOFT OFFICE: EXCEL 2010

Microsoft Excel Level 2

Vocabulary Platform Computing\ First grade Theoretical number of hours=30 Practical number of hours =60

/ / / Chapter-8 INTRODUCTION TO HTML Difference between. 1. WYSIWYG editor & Text Editor.

The process by which a user can associate specific permissions to each username.

Basic Computer Skills: An Overview

6. Something which has easily understood instructions is said to be: 1) User friendly 2) Information 3) Word Processing 4) Icon 5) None of these

Excel 2013 for Beginners

Microsoft Excel 2010 Handout

Computer Software A computer contains two major sets of tools, software and hardware. Software is generally divided into Systems software and

Adobe Dreamweaver CS5 Tutorial

Computer ANAMIKA ACADEMY. Mo Which function has the ability to move from one web page to another Hyper link

Excel 2010: Basics Learning Guide

1) Which of the following is an example of a programming language? 1) A) Microsoft Word B) English C) HTML D) Java

Inserting Information into PowerPoint

Introduction to 9.0. Introduction to 9.0. Getting Started Guide. Powering collaborative online communities.

Lecture- 5. Introduction to Microsoft Excel

WEEK NO. 12 MICROSOFT EXCEL 2007

Define each of the following computer terms. 1 Period 7 Lesson Computer Terms 1 Wallpaper 2 URL 3 Mainframe 4 Function Keys 5 Font 6 Paste 7 Paint

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN

Blackboard staff how to guide Accessible Course Design

Introduction to the Internet and World Wide Web p. 1 The Evolution of the Internet p. 2 The Internet, Intranets, and Extranets p. 3 The Evolution of

RPS Technology Standards Grades 9 through 12 Technology Standards and Expectations

Introduction to Microsoft Excel 2010

Excel Select a template category in the Office.com Templates section. 5. Click the Download button.

Table Basics. The structure of an table

Excel 2016 Basics for Windows

Midterm 1 Review Sheet CSS 305 Sp 06

EXCEL 2010 BASICS JOUR 772 & 472 / Ira Chinoy

Dreamweaver Basics Outline

Getting help with Edline 2. Edline basics 3. Displaying a class picture and description 6. Using the News box 7. Using the Calendar box 9

Computer Applications SLC 1) A computer can be defined as a set of tools that helps you perform information-processing tasks.

By the end of this section of the practical, the students should be able to:

Such JavaScript Very Wow

Introduction to Microsoft Office PowerPoint 2010

Microsoft Word 2007 on Windows

1... is not part of the status bar. a. page number b. line c. column d. section *e. drop cap. 2. Convert to base 2

3) The contains a computer's main hardware components. 3) A) master case B) motherboard C) system unit D) CPU

This is a list of vocabulary related to information and communication technology. Coloque el significado en español sobre las líneas.

Excel 2016 Basics for Mac

The figure below shows the Dreamweaver Interface.

Working with Charts Stratum.Viewer 6

Condensed Technology Application TEKS K-8. Technology Applications TEKS Foundations 126.2b1A Use appropriate technology terminology

(Refer Slide Time: 01:40)

COMPUTER SOFTWARE RAYMOND ROSE

ADOBE DREAMWEAVER CS4 BASICS

3. WWW and HTTP. Fig.3.1 Architecture of WWW

MICROSOFT OFFICE. Courseware: Exam: Sample Only EXCEL 2016 CORE. Certification Guide

DRAFT. Table of Contents About this manual... ix About CuteSITE Builder... ix. Getting Started... 1

The Fundamentals. Document Basics

IT430- E-COMMERCE Solved MCQ(S) From Midterm Papers (1 TO 22 Lectures) BY Arslan Arshad

EXCEL BASICS: PROJECTS

Computing Science: National 5 and Higher skills, knowledge and understanding

EXCEL BASICS: MICROSOFT OFFICE 2007

41 X : ] [ : 100 : ] III IV V. [ Turn over

Contents. 1. Managing Seed Plan Spreadsheet

Solved by sam pari. MIDTERM EXAMINATION Spring 2010 CS101- Introduction to Computing Ref No: Time: 60 min Marks: 38. Student Info Student ID:

Parts of Computer hardware Software

IBPS Practice Exam 1. One megabyte equals approximately 1) 1,000 bits 2) 1,000 bytes 3) 1 million bytes 4) 1 million bits 5) 2,000 bytes 2.

Internet. Class-In charge: S.Sasirekha

Brooklyn City School District Technology Learning Targets Checklist

How to lay out a web page with CSS

Computer Applications I Vocabulary (Frameworks)

DRAFT WEB DESIGN 1 HBT 3131 HBT 3131 Web Design 1 Credit: Grade: Term: ACP Credit: Books: Resource List:

Excel 2010: Getting Started with Excel

Welcome to our Moodle site! What is Moodle?

Excel 2016: Part 1. Updated January 2017 Copy cost: $1.50

Libraries. Multi-Touch. Aero Peek. Sema Foundation 10 Classes 2 nd Exam Review ICT Department 5/22/ Lesson - 15

Computer Skills Revision. By: Rana Hammady

EXCEL BASICS: MICROSOFT OFFICE 2010

A Comprehensive Guide. IC3 - Module 1: Computing Fundamentals

Viewing Capture ATP Status

1. Introduction to Microsoft Excel

Recitation 3 Further Work with Dreamweaver and Photoshop: Refining your Web Site

Skills Exam Objective Objective Number

This Tutorial is for Word 2007 but 2003 instructions are included in [brackets] after of each step.

Microsoft Excel Important Notice

Chapter 10 Linking Calc Data

Introduction to Excel 2013

1. Web Technology... 6

CSC 170 Fall 2017 Dr. R. M. Siegfried. Study Guide for Final Exam

Northstar Digital Literacy Assessment Project Standards

HYPERSTUDIO TOOLS. THE GRAPHIC TOOL Use this tool to select graphics to edit. SPRAY PAINT CAN Scatter lots of tiny dots with this tool.

HIGHER SECONDARY COMPUTER SCIENCE

ITConnect KEEPING TRACK OF YOUR EXPENSES WITH YNAB

Transcription:

Amel.. PAPER 1 FINAL TERM EXAMINATION Spring 2010 CS101- Introduction to Computing Question No: 1 ( Marks: 1 ) - Please choose one Analytical Engine is ------------------ An electrical machine A digital machine An analog machine A special purpose machine The first general-purpose digital computer (1833) PAGE 9 LEC 1 A PROGRAMMABLE MECHANICAL DIGITAL MACHINE Question No: 2 ( Marks: 1 ) - Please choose one Website design should NOT be. Unified Complex Consistent Predictable (Web Design for Usability) Designs should be consistent & predictable (unified) PAGE 185 Question No: 3 ( Marks: 1 ) - Please choose one TCP stands for. Total communication protocol Transmission control protocol Transfer control protocol Transfer collection protocol TCP/IP Transmission Control Protocol/Internet Protocol PAGE 196 Question No: 4 ( Marks: 1 ) - Please choose one A vocabulary and set of grammatical rules for instructing a computer to perform specific tasks is called Software Programming language Device driver

Interpreter Programming Language A vocabulary and set of grammatical rules for instructing a computer to perform specific tasks PAGE 129 Question No: 5 ( Marks: 1 ) - Please choose one A is a meaningful, easy-to-remember label for an IP address. TCP address Domain name Network name VoIP Domain Names IP addresses are fine for computers, but difficult to recognize and remember for humans A domain name is a meaningful, easy-to-remember label for an IP address PAEGE 210 Question No: 6 ( Marks: 1 ) - Please choose one In spreadsheets, cell address A12 means. Row A, Cloumn 12 Row 12, Cloumn A Row 2,Cloumn A1 Row A1, Cloumn 2 EXCEL Question No: 7 ( Marks: 1 ) - Please choose one According to the heuristic, the number of defects remaining in a system after a given level of tests is proportional to. The number found on very first day. The number found during the development. The number found during the test. None of the given options. The number of defects remaining in a system after a given level of tests is proportional to the number found during the test PAGE 169 Question No: 8 ( Marks: 1 ) - Please choose one Which one is the best option for designing a Medical Expert System? Rule Based System Genetic Algorithm Fuzzy Logic Neural Network Question No: 9 ( Marks: 1 ) - Please choose one Command that allows you to recover form mistakes is called. Clear Edit Undo Break The Undo command undoes anything you do in Word, such as formatting text, moving blocks, typing and deleting text, formatting Undo command that allows you to recover quickly from simple mistakes like deleting or moving the wrong file

Question No: 10 ( Marks: 1 ) - Please choose one The document.write( ) method expects string as its argument. Integer Float String Boolean The document.write( ) method expects a string (or several strings, separated by commas) as its argument www.altafkhan.com/cs101ppt/javascript-images-animation.ppt Question No: 11 ( Marks: 1 ) - Please choose one We use to stop Break-Ins. Scanners Intrusion detectors Utilities None of the given options Break-Ins Hackers are always trying to break-in into Internet-connected computers to steal info or plant malicious programs Defense: Intrusion detectors Page 276 Question No: 12 ( Marks: 1 ) - Please choose one The developer report to in a development team. Team Lead Project Manager CEO IT Manager Question No: 13 ( Marks: 1 ) - Please choose one The key responsibilities of a project manager is. Planning and tracking of the project Arranging of the appropriate resources Client relationship management All of the given options Project Manager Responsibilities: Planning and tracking of the project Arranging of the appropriate resources lient relationship management page 296 Question No: 14 ( Marks: 1 ) - Please choose one The key responsibilities of the architect of the project is. Technology selection High-level design Makes certain that the implementation remains true to the design All of the given options Architect Responsibilities:

Technology selection High-level design Makes certain that the implementation remains true to the design Page 296-297 Question No: 15 ( Marks: 1 ) - Please choose one The important attribute of image tag is. src image None of the given options alt <IMG src=url Question No: 16 ( Marks: 1 ) - Please choose one onabort, onerror are the of the image object. Event Handler Properties Methods None of the given options Event handlers: onabort, onerror, onload, etc. Page 308 Question No: 17 ( Marks: 1 ) - Please choose one Now a days, users communicate with the computer using a consistent provided by the Operating System. Command-line interface Application Interface User Interface Protocol User Interface Users communicate with the computer using a consistent user interface provided by the OS Page 66 Question No: 18 ( Marks: 1 ) - Please choose one One can browse documents residing on a remote computer using protocol. HTTP SMTP FTP TELNET I can browse documents residing on a remote computer using the HTTP protocol Page 185 Question No: 19 ( Marks: 1 ) - Please choose one Which of the following device can be used to control network traffic? Cable Connector Hub Repeater Hub The network traffic controller Page 186

Question No: 20 ( Marks: 1 ) - Please choose one User can remotely log on to a computer and can have a control over it like a local user using TelNet Protocol TelNet Protocol and connected to the user through TCP/IP network TelNet protocol and FTP TCP/IP and FTP Telnet Protocol Using Telnet, a user can remotely log on to a computer (connected to the user s through a TCP/IP network, e.g. Internet) & have control over it like a local user, including control over running various programs In contrast, FTP allows file operations Page 211 PAPER 2 FINALTERM EXAMINATION Spring 2010 CS101- Introduction to Computing (Session 2) Question No: 1 ( Marks: 1 ) - Please choose one The interface that a website provides to the user for accessing various parts of the website is known as. Navigation Arrangement Layout Home Website Navigation: The interface/controls that a Website provides to the user for accessing various parts of the Website It probably is the most important aspect of the design of a Website Page 171 Question No: 2 ( Marks: 1 ) - Please choose one JavaScript is an example of language. Object-based Object-oriented Machine Assembly JavaScript is Object-Based treats as an object e.g. a window or a button page 120 Question No: 3 ( Marks: 1 ) - Please choose one The set of rules and guidelines a team of developers follow to construct reasonably complex SW systems is called

Object Oriented Design Object Oriented Software Design Methodology Programming language SW Design Methodology? The set of (often flexible) rules and guidelines a team of developers follow to construct reasonably complex SW systems page 131 Question No: 4 ( Marks: 1 ) - Please choose one A variable can be in scope. Local Global Either local or global None of the given options 29.6 Scope of Variable A variable can be either local or global in scope. Page 204 Question No: 5 ( Marks: 1 ) - Please choose one function returns the largest integer that is less than or equal to x. round(x) floor ceil abs(x) Returns integer nearest to x page 249 Question No: 6 ( Marks: 1 ) - Please choose one Trinoo is a software. DoS Scanning Utility None of the given options 2. Arming the Drones After several drones have been conquered, the DoS SW is loaded on to them Examples: Tribal Flood Network, Trinoo, TFN2K Page 275 Question No: 7 ( Marks: 1 ) - Please choose one A stream of large sized emails are sent to an email address for overloading the destination account, is called. DoS Attack Break-Ins Mail Bombing All of the given options Mail Bombing Similar in some ways to a DoS attack A stream of large-sized emails are sent to an address, overloading the destination Account Page 276

Question No: 8 ( Marks: 1 ) - Please choose one Name, Border, Source are the properties of the image object. Event Handler Properties Methods None of the given options Image Properties: name, border, complete, height, width, hspace, vspace, lowsrc, src Methods: None Event handlers: onabort, onerror, onload, etc. Page 286 Question No: 9 ( Marks: 1 ) - Please choose one is simply a fast port that lets you connect computer peripherals and consumer electronics to your computer without restart. Freeware Shareware Firewire Firmware Firewire FireWire is simply a really fast port that lets you connect computer peripherals and consumer electronics to your computer without the need to restart. Page 24 Question No: 10 ( Marks: 1 ) - Please choose one is also known as System Architecture High level system design Low level system design Every system design Software Requirement Heuristics for System Architecting heuristics in architectural (or high-level) design 166 Question No: 11 ( Marks: 1 ) - Please choose one One can send an email message to a remote computer using protocol HTTP SMTP FTP TELNET Examples of Computer Network Usage I can send an email message to a remote computer using the SMTP protocol I can browse documents residing on a remote computer using the HTTP protocol I can download or upload files to a remote computer using the FTP protocol I can run a program on a remote computer using the TELNET protocol Page 185 Question No: 12 ( Marks: 1 ) - Please choose one Which event handler executes the specified JavaScript code when a window/form element loses focus? onblur onload

onunload onfocus onfocus & onblur: onfocus executes the specified JavaScript code when a window receives focus or when a form element receives input focus onblur executes the specified JavaScript code when a window loses focus or a form element loses focus Question No: 13 ( Marks: 1 ) - Please choose one Using RGB scheme the image having 1024X1024 pixels can be stored in 3 MB 2.25MB 2.96 MB 3.25 MB Image size (in pixels) Image size on disk 256x256 192KB 512x512 257KB 1024x1024 2.25MB Question No: 14 ( Marks: 1 ) - Please choose one Hardware malfunctions is related to Data updates Data integrity Data security Data accessibility Data Integrity Integrity refers to maintaining the correctness and consistency of the data Correctness: Free from errors Consistency: No conflict among related data items Integrity can be compromised in many ways: Typing errors Transmission errors Hardware malfunctions Program bugs Viruses Fire, flood, etc. PAGE 259 Question No: 15 ( Marks: 1 ) - Please choose one loop is a flow control statement that allows code to be executed repeatedly based on a given Boolean condition. For Do-While If-else While The while loop is a control flow statement, which allows code to be executed repeatedly based on the given boolean condition http://www.roseindia.net/jsp/simple-jsp-example/while-loop-in-jsp.shtml Question No: 16 ( Marks: 1 ) - Please choose one

for(var i=1; i<=2;i=i+1) { document.write( "Sorted Words:" + "<BR>" ) } Which of the following shall be the output of above code: Sorted Words: Sorted Words: Sorted Words: Sorted Words: Sorted Words: <BR> Sorted Words: <BR> Sorted Words: <BR> Sorted Words: <BR> http://www.w3schools.com/jsref/tryit.asp?filename=tryjsref_abs Question No: 17 ( Marks: 1 ) - Please choose one A good algorithm should have the following properties. Consistency Unambiguousness Efficiency All of the given options A good algorithm has the following properties: It is Simple.... To be precise, an algorithm should have no ambiguity in the steps Algorithm Precise sequence of a limited number of unambiguous, executable steps that terminates in the form of a solution Question No: 18 ( Marks: 1 ) - Please choose one are names assigned to values. Variables Literals Operators None of the options described Variables are names assigned to values Page 143 Question No: 19 ( Marks: 1 ) - Please choose one The method property is used to specify the method used to send data, which can be ------------ and -----------. Method & Action Size & Maxlength Get & Post Send & Submit Forms can be submitted through two alternate methods GET & POST page 71 Question No: 20 ( Marks: 1 ) - Please choose one NaN is produced when a string is used in non mathematical context True False When a string is used in a mathematical context, if appropriate, JavaScript first converts

it into a number. Otherwise, a NaN is the result Question No: 21 ( Marks: 1 ) - Please choose one The Right most portion or the third portion of the URL contains. Protocol Identifier Server Name Directory Name None of the given The 3rd part: Directories and subdirectories Question No: 22 ( Marks: 1 ) - Please choose one Which Internet Service is comparatively Slow but Inexpensive and Fast. E-mail Instant Messaging Web None of the given Question No: 23 ( Marks: 1 ) - Please choose one Images in can be manipulated in many ways using the built-in object Image. HTML XML DHTML None of the given 41.1 Images in JavaScript Images in JavaScript can be manipulated in many ways using the built-in object Image PAGE 286 Question No: 24 ( Marks: 1 ) - Please choose one LCD stands for. Liquid color display Liquid crystal display Liquid computer display None of the given display technology http://acronyms.thefreedictionary.com/lcdhttp://acronyms.thefreedictionar y.com/lcd Question No: 25 ( Marks: 1 ) - Please choose one Semantic Errors are those errors that when run. The compiler will not complain Hard to detect during normal testing The compiler will not complain and Hard to detect during normal testing None of the given Semantic Errors Occur when a statement executes and has an effect not intended by the programmer Hard to detect during normal testing Often times occur only in unusual & infrequent circumstances The + operator often results in unintended consequences. Remedy: Convert, before use

PAGE 312 Question No: 26 ( Marks: 1 ) - Please choose one The group of technologies with capturing, processing and transmission of information in digital electronic is called Computer management Computer organization Internet management Information Technology The information technology department of a large company would be responsible for storing information, protecting information, processing the information, transmitting the information as necessary, and later retrieving information as necessary PAPER 3 FINALTERM EXAMINATION Spring 2010 CS101- Introduction to Computing Question No: 1 ( Marks: 1 ) - Please choose one In a good presentation each slide should contain. Heading Phrases not sentences Sentences not phrases Heading, sentences not phrases Each slide should have a clear heading Question No: 2 ( Marks: 1 ) - Please choose one Which one of the following is not an event handler's attribute? Function Identifier Equal sign String consisting of JavaScript statements LECTURE 32 SLIDE The event handler attribute consists of 3 parts: 1. The identifier of the event handler 2. The equal sign 3. A string consisting of JavaScript statements enclosed in double or single quotes Question No: 3 ( Marks: 1 ) - Please choose one According to the heuristic, the number of defects remaining in a system after a given level of tests is proportional to. The number found on very first day. The number found during the development. The number found during the test. None of the given options. 16 The number of defects remaining in a system after

a given level of tests is proportional to the number found during the test PAGE 169 Question No: 4 ( Marks: 1 ) - Please choose one Which one is the best option for designing a Medical Expert System? Rule Based System Genetic Algorithm Fuzzy Logic Neural Network Question No: 5 ( Marks: 1 ) - Please choose one A combination of word processing and graphic design is Corel Draw Desktop Publishing Paint WordPad 14.3 Desktop Publishing (DTP) A combination of word processing and graphic design. Used to develop elegant Documents Page 88 Question No: 6 ( Marks: 1 ) - Please choose one A microprocessor can be made more powerful by increasing its Clock frequency Word length Clock frequency and Word length None of above Increase the clock frequency 318 Question No: 7 ( Marks: 1 ) - Please choose one Security can also be improved through. Encryption Typing errors Transmission errors Hardware malfunctions Security can also be improved through: Encryption Private or virtual-private networks Firewalls Intrusion detectors Virus detectors Page 253 Question No: 8 ( Marks: 1 ) - Please choose one is a field that uniquely identifies each record stored in a table. Composite Key Primary key Foreign key None of the given options Primary Key is a field that uniquely identifies each record stored in a table Page 263

Question No: 9 ( Marks: 1 ) - Please choose one There are types of errors. 2 3 4 5 Types of Errors Syntax errors Semantic errors Run-time errors Page 312 Question No: 10 ( Marks: 1 ) - Please choose one is simply a fast port that lets you connect computer peripherals and consumer electronics to your computer without restart. Freeware Shareware Firewire Firmware Firewire FireWire is simply a really fast port that lets you connect computer peripherals and consumer electronics to your computer without the need to restart. Page 24 Question No: 11 ( Marks: 1 ) - Please choose one provides a simple, consistent way for applications to interact with the HW without having to know all the details of the HW Explorer.exe System Files Operating System Application Software The Role of An OS Manages the HW and SW resources of the computer system, often invisibly. These include the processor, memory, disk drives, etc. Provides a simple, consistent way for applications to interact with the HW without having to know all the details of the HW page 318 Question No: 12 ( Marks: 1 ) - Please choose one One can browse documents residing on a remote computer using protocol. HTTP SMTP FTP TELNET Examples of Computer Network Usage I can send an email message to a remote computer using the SMTP protocol I can browse documents residing on a remote computer using the HTTP protocol I can download or upload files to a remote computer using the FTP protocol I can run a program on a remote computer using the TELNET protocol 185

Question No: 13 ( Marks: 1 ) - Please choose one Which event handler executes the specified JavaScript code when a window/form element loses focus? onblur onload onunload onfocus onblur executes the specified JavaScript code when a window loses focus or a form element loses focus page 230 Question No: 14 ( Marks: 1 ) - Please choose one Which event handler executes the specified JavaScript code when a window/form element receives focus? onblur onload onunload onfocus onfocus executes the specified JavaScript code when a window receives focus or when a form element receives input focus page 230 Question No: 15 ( Marks: 1 ) - Please choose one loop is a flow control statement that allows code to be executed repeatedly based on a given Boolean condition. For Do-While If-else While The while loop is a control flow statement, which allows code to be executed repeatedly based on the given boolean condition Question No: 16 ( Marks: 1 ) - Please choose one Expression format in cell D4 is NOT correct. True False A B C D 4 ABC003 65 =c4=c4 Question No: 17 ( Marks: 1 ) - Please choose one for(var i=1; i<=2;i=i+1) { document.write( "Sorted Words:" + "<BR>" ) } Which of the following shall be the output of above code: Sorted Words: Sorted Words: Sorted Words: Sorted Words: Sorted Words: <BR> Sorted Words: <BR> Sorted Words: <BR>

Sorted Words: <BR> http://www.w3schools.com/jsref/tryit.asp?filename=tryjsref_abs Question No: 18 ( Marks: 1 ) - Please choose one Data integrity, in Database management system is necessary because it: Refers to provide insecurity to the data Refers to provide security to the data Refers to maintaining the correctness of data Refers to maintaining the consistency of the data Data Integrity: Integrity refers to maintaining the correctness and consistency of the data Correctness: Free from errors Consistency: No conflict among related data items Integrity can be compromised in many ways: Typing errors Transmission errors Hardware malfunctions Program bugs Viruses Fire, flood, etc PAGE 253 Question No: 19 ( Marks: 1 ) - Please choose one Which of the following formula is used in spreadsheet for addition? C6+E6 =C6+E6 6+6=12 6+E6 Question No: 20 ( Marks: 1 ) - Please choose one Which of the following keyword is used to jump out of switch statement as soon as the match is found? Default Else Jump Break Question No: 21 ( Marks: 1 ) - Please choose one How many types the string methods have? 1 2 3 Two Types of String Methods 1.HTML Shortcuts 2.All Others Pager 268 Question No: 22 ( Marks: 1 ) - Please choose one Which Internet Service is comparatively Slow but Inexpensive and Fast. E-mail Instant Messaging Web None of the given

Question No: 23 ( Marks: 1 ) - Please choose one Semantic web is. The extension of web Designed for both human beings and computers The extension of web and Designed for both human beings and computers None of the given Semantic Web is not a replacement but an extension of the present Web Page 304 Question No: 24 ( Marks: 1 ) - Please choose one Coding is the responsibility of Software designer Software developer Project manager None of given Developer Responsibilities: Module-level design Coding Unit-testing Page 298 Question No: 25 ( Marks: 1 ) - Please choose one Run time error occurs when. The complier compiles the programs The compiler ends the execution of the program The compiler start running the program The compiler finds a semantic error Run-Time Errors Occur when the program is running and tries to do something that is against the rules Example: Accessing a non-existent variable, property, method, object, etc (e.g. a method name is misspelled) Sources of these can be determined by a careful reading of the code, but unfortunately, not always! Question No: 26 ( Marks: 1 ) - Please choose one Heuristics are. Intelligent systems Always ends with the solution of the problem Both of the given None of the given Rule of thumb learned through trial & error Heuristic A procedure that usually, but not always, works or that gives nearly the right answer. page 102 Question No: 21 ( Marks: 1 ) - Please choose one If(studentMarks>70); ( document.write( "Grade A");

} Which of following is correct format of above code: If(studentMarks>70); ( document.write( "Grade A"); }; If(studentMarks<>70) ( document.write( "Grade A"); } If(studentMarks>70) { document.write( "Grade A"); } None of above options Question No: 22 ( Marks: 1 ) - Please choose one Which of the following language is object based but not object oriented language. javascript visual basic C++ C Object Based Everything that JavaScript manipulates, it treats as an object Question No: 23 ( Marks: 1 ) - Please choose one asin(x) stands for Asynchronous sine Alpha Sine Automated Sine ArcSine asin( x ), acos( x ), atan( x ): Standard inverse-trigonometric functions Returns the arcsine, arccosine or arctangent of r in radians EXAMPLE document.write( Math.asin( 1 ) ) Question No: 24 ( Marks: 1 ) - Please choose one The output of POW (3, 2) is. 6 4 9 12 Math.pow( 3, 2 ); // returns 9 (3 * 3) Question No: 25 ( Marks: 1 ) - Please choose one The Right most portion or the third portion of the URL contains. Protocol Identifier Server Name Directory Name

None of the given Directories and subdirectories The third part of the URL takes you directly to the directory and subdirectory where the page you want lives Question No: 26 ( Marks: 1 ) - Please choose one Which Image format is known as Lossless original format. JPEG GIF Bitmap Vector Some image file formats, like PNG or GIF, use only lossless compression PAPER 4 FINALTERM EXAMINATION Spring 2010 CS101- Introduction to Computing (Session - 2) Question No: 1 ( Marks: 1 ) - Please choose one What is NOT a key factor while designing a website? Usability User-friendly Consistency Complexity Question No: 2 ( Marks: 1 ) - Please choose one Communications on the internet is controlled by a set of two protocols which are. IMAP and SMTP FTP and HTTP TCP and IP TCP and HTTP Internet Networking Protocols Communications on the Internet is controlled by a set of two protocols: TCP and IP Page 196 Question No: 3 ( Marks: 1 ) - Please choose one A variable can be in scope. Local Global Either local or global None of the given options Question No: 4 ( Marks: 1 ) - Please choose one A protocol used for receiving email messages is called. URL Telnet

POP3 SMTP Question No: 5 ( Marks: 1 ) - Please choose one Aliasing problem can be managed by the size of pixels. Reducing Increasing Gaining Modifying Question No: 6 (Marks: 1 ) - Please choose one Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called. Loop Sequence Condition Array Question No: 7 ( Marks: 1 ) - Please choose one Which of the following data types are recognized by JavaScript? Strings Numbers Undefined All of the given options JavaScript Data Types JavaScript recognizes & distinguishes among the following types of values: Numbers Booleans Strings Undefined Variables Page 158 Question No: 8 ( Marks: 1 ) - Please choose one a = Math. ceil (12.01) What will be the value of a? 12 13 12.0 13.01 Question No: 9 ( Marks: 1 ) - Please choose one In the old days, databases did NOT support. Number Boolean Video Text In the old days, databases were limited to numbers, Booleans, and text Page 255 Question No: 10 ( Marks: 1 ) - Please choose one The organizations are learning that business can be done in a more effective manner if emphasis is placed upon.

Cooperation Shared responsibility Networking All of the given options The organizations are learning that business can be done in a more effective manner if emphasis is placed upon cooperation, shared responsibility and networking: page 281 Question No: 11 ( Marks: 1 ) - Please choose one Module level design is the responsibility of the. Architect Team Lead Developer CEO Question No: 12 ( Marks: 1 ) - Please choose one errors are caused by the code that somehow violates the rule of the language. Syntax Semantic Run time Load time Syntax Errors They are caused by the code that somehow violates the rules of the language Page 312 Question No: 13 ( Marks: 1 ) - Please choose one The world first computer program was written to compute: Simple sequence Multiple sequence Bernoulli s sequence Increasing sequence Wrote a program for computing the Bernoulli s sequence on the Analytical Engine - world s 1st computer program page 9 Question No: 14 ( Marks: 1 ) - Please choose one Microsoft Word is a type of: System Software Freeware Software Shrink-Wrapped Software Custom-built Software Shrink-Wrapped SW SW built in such a way that it is useful for many different users in many different ways. Example: MS Word Page 62 Question No: 15 ( Marks: 1 ) - Please choose one We need for memory management in computer Software Hardware Operating System

Application Software 11.2 Core Tasks of an OS Processor management Memory management Device management Storage management Page 65 Question No: 16 ( Marks: 1 ) - Please choose one is generally measured in terms of the number of steps required to execute an algorithm. Space Time Memory and time Bandwidth Question No: 17 ( Marks: 1 ) - Please choose one PowerBuilder falls in the category of. Assembly Languages 4-th Generation Languages Machine Languages High-Level Languages Question No: 18 ( Marks: 1 ) - Please choose one means to break down into simpler components and analyze. Recursion Parsing Scope Navigation Parsing splits a sequence of characters or values into smaller parts. It can be used for recognizing characters or values that occur in a specific order Question No: 19 ( Marks: 1 ) - Please choose one for(var i=1; i<=2;i=i+1) { document.write( "Sorted Words:" + "<BR>" ) } Which of the following shall be the output of above code: Sorted Words: Sorted Words: Sorted Words: Sorted Words: Sorted Words: <BR> Sorted Words: <BR> Sorted Words: <BR> Sorted Words: <BR> (correct) Question No: 20 ( Marks: 1 ) - Please choose one Assembly languages allow a programmer to use for numbers. Object Entity Name Interpreter

Assembly languages are similar to machine languages, but are easier to program in as they allow a programmer to substitute names for numbers page 130 Question No: 21 ( Marks: 1 ) - Please choose one means you have only one container to store more than one value in JavaScript. Variable Matrix Array String Variables are containers that hold values (Example: Hotel guest name, Guest room no). Generally, the value of a variable varies during code execution (that is why the term variable page 143 Question No: 22 ( Marks: 1 ) - Please choose one Coding is the responsibility of Software designer Software developer Project manager None of given Developer Responsibilities: Module-level design Coding Unit-testing Page 298 Question No: 23 ( Marks: 1 ) - Please choose one CEO stands for Central Executive officer Chief External officer Chief executive officer None of given Question No: 24 ( Marks: 1 ) - Please choose one Decision Support Systems will become a bigger part of the professional life of the. Doctors Mangers Marketers All of above Decision support systems will become a bigger part of the professional life of doctors, managers, marketers, etc page 244 Question No: 25 ( Marks: 1 ) - Please choose one The output of fuzzy Logic System is computed by using Technique. MAX-MAX MAX-MIN MIN-MAX None of the given

The output of a fuzzy system is computed by using: The MIN-MAX technique for combining fuzzy rules Page 242 Question No: 26 ( Marks: 1 ) - Please choose one In the statement Math.PI, Math is and PI is. Variable, Constant Object, Method Object, Function Object, Property PAPER 5 FINALTERM EXAMINATION Spring 2010 CS101- Introduction to Computing (Session - 3) Question No: 1 ( Marks: 1 ) - Please choose one Analytical Engine is ------------------ An electrical machine A digital machine An analog machine A special purpose machine Question No: 2 ( Marks: 1 ) - Please choose one % of the users have left websites in frustration due to poor navigation. 40 62 83 91 83% of users have left sites in frustration due to poor navigation, www.altafkhan.com/cs101ppt/web-design-for-usability.ppt Question No: 3 ( Marks: 1 ) - Please choose one breaks down the message to be sent over the internet into packets. FTP HTTP TCP IP TCP breaks down the message to be sent over the Internet into packets IP routes these packets through the Internet to get them to their destination Page 196 Question No: 4 ( Marks: 1 ) - Please choose one The first spread sheet was called as. Excel PowerPoint

Word VisiCalc A spreadsheet - VisiCalc - was the first popular application on PC s. Page 151 Question No: 5 ( Marks: 1 ) - Please choose one Which is correct? onunload onunload onunload All of the above onblur onreset onsubmit onload onunload page 230 Question No: 6 ( Marks: 1 ) - Please choose one Variables allow us to manipulate data through the. Actual Value Reference Length Name Variables Variables give us the ability to manipulate data through reference instead of actual value. Variables are names assigned to values. Page 143 Question No: 7 ( Marks: 1 ) - Please choose one We use to stop Break-Ins. Scanners Intrusion detectors Utilities None of the given options Break-Ins Hackers are always trying to break-in into Internet-connected computers to steal info or plant malicious programs Defense: Intrusion detectors Page 276 Question No: 8 ( Marks: 1 ) - Please choose one Which attribute of the IMG tag tells us about the source of the image. source path loc src Scr =source Question No: 9 ( Marks: 1 ) - Please choose one The developer report to in a development team. Team Lead

Project Manager CEO IT Manager Question No: 10 ( Marks: 1 ) - Please choose one The key responsibilities of the architect of the project is. Technology selection High-level design Makes certain that the implementation remains true to the design All of the given options Architect Responsibilities Technology selection High-level design Makes certain that the implementation remains true to the design Page 296-297 Question No: 11 ( Marks: 1 ) - Please choose one Using smart editors they can automatically color different parts of statements in different colors e.g. HTML tags in color. Green Grey Blue None of the given options 44.6 Helpful Editors Automatically color different parts of statements in different colors, e.g. comments in Gray, strings in Green, HTML tags in Blue page 315 Question No: 12 ( Marks: 1 ) - Please choose one is responsible for all the essential operations like basic house keeping, task scheduling, etc. Also contains low-level HW interfaces Hardware Device Manager Kernel Device Driver 11.4 Kernel The heart of the OS Responsible for all the essential operations like basic house keeping, task scheduling, etc. Also contains low-level HW interfaces Page 67 Question No: 13 ( Marks: 1 ) - Please choose one Randomized algorithms are often than deterministic algorithms for the same problem. Simpler and more slow Simpler and more efficient Complex and more efficient Complex and more slow Page 102 16.8 Randomized Algorithm (1) These algorithms are often simpler and more efficient

than deterministic algorithms for the same problem Question No: 14 ( Marks: 1 ) - Please choose one Compound Statement after decision constructs in JavaScript is enclosed with ( ) [ ] { }; { } These curly braces group the multiple statements into a single compound statement page 159 dig Question No: 15 ( Marks: 1 ) - Please choose one The key property of the Array object in JavaScript is Value Length Name All of the given choices The key property of the Array object is length, i.e the number of elements in an Array Page 178 Question No: 16 ( Marks: 1 ) - Please choose one Which protocol is used to send email? FTP SMTP TELNET All of the given choices can send an email message to a remote computer using the SMTP protocol -185 Question No: 17 ( Marks: 1 ) - Please choose one Following is highest level of heading tag in list given below. H3 H4 H5 H2 <h1>heading 1</h1> Heading 1 <h2>heading 2</h2> Heading 2 <h3>heading 3</h3> Heading 3 <h4>heading 4</h4> Heading 4 <h5>heading 5</h5> Heading 5 Question No: 18 ( Marks: 1 ) - Please choose one Blue Pacific is a name of computer. Mini Desktop Micro Super At the high end of supercomputing are computers like IBM's "Blue Pacific," announced on October 29, 1998.

Page 21 Question No: 19 ( Marks: 1 ) - Please choose one correctness is easier to check as compared with Syntactic, Semantic Semantically, Syntactically Systematically, Semantically None of the given options Warnings page 104 2. Syntactic correctness is easier to check as compared with semantic Question No: 20 ( Marks: 1 ) - Please choose one refers maintaining the correctness and consistency of data Security Integrity Reliability None of the given Data Integrity: Integrity refers to maintaining the correctness and consistency of the data Page 253 Question No: 21 ( Marks: 1 ) - Please choose one Which of the following keyword is used to jump out of switch statement as soon as the match is found? Default Else Jump Break Question No: 22 ( Marks: 1 ) - Please choose one How much parameters does POW () function have? 2 1 3 Pow() is the other key function in this group of three, and takes two parameters - a base and a power to raise it by Question No: 23 ( Marks: 1 ) - Please choose one How many types the string methods have? 1 2 3 string methods 1.HTML Shortcuts 2.All Others Page 268 Question No: 24 ( Marks: 1 ) - Please choose one The output of document.write( "2" + Math.PI ) ; is. 23.141592653589793 3.146 2.3141592653589793

None of them Page 272 23.141592653589793 Question No: 25 ( Marks: 1 ) - Please choose one POP, IMAP and SMTP are related to one of the following service/services? Electronic Mail Instant Messaging Both a and b None of above Tools & Services Available on the Internet Electronic mail (POP, IMAP, SMTP) Page 196 Question No: 26 ( Marks: 1 ) - Please choose one is designed for 2D-Animation. Flash Animation HTML image class Web Browser HTML 2D class 41.2 Flash Animation Designed for 2-D animations Page 293 PAPER 6 FINALTERM EXAMINATION Spring 2010 Question No: 1 ( Marks: 1 ) - Please choose one In excel the intersection of a row and a column is called: data a field. a cell. an equation. Question No: 2 ( Marks: 1 ) - Please choose one The cell labeled F5 refers to row F column 5 column F row 5 functions available in cells Function key F4 excel Question No: 3 ( Marks: 1 ) - Please choose one Which of the following describes how to select all the cells in a single column? Right click on column and select Pick From List Use the Data - Text to Columns menu item Left click on the gray column title button

Pressing CTRL + A on the keyboard Question No: 4 ( Marks: 1 ) - Please choose one What is the format of a spreadsheet? Round Rows and Columns Square Wide Question No: 5 ( Marks: 1 ) - Please choose one Which one is a relative address? $C$4 256 C4 None of these Question No: 6 ( Marks: 1 ) - Please choose one What do you use to create a chart? Chart Wizard Pie Wizard Excel Wizard Data Wizard Question No: 7 ( Marks: 1 ) - Please choose one On an Excel sheet the active cell is indicated by. a dark wide border a dotted border a blinking border All of these Question No: 8 ( Marks: 1 ) - Please choose one News Groups are... provided only by large international news services are online discussions about various topics are only available from 9am to 5pm EST All of these News groups, message boards, forums Instant messaging Multimedia delivery Page 198 Question No: 9 ( Marks: 1 ) - Please choose one A(n) line has transfer rates of 128 Kbps to 8.45 Mbps. DSL ISDN ATM Fractional T1 DSL (digital subscriber line): transmit data at fast speed on existing telephone wiring, 128kbps to 8.45mbps... www.cs.uofs.edu/~bi/2003f-html/cil102/ch9-network.doc Question No: 10 ( Marks: 1 ) - Please choose one refers to the amount of data, instructions, and information that can travel over a communications channel.

Latency Transfer rate Bandwidth Broadband http://www.slideshare.net/izaham/chapter09-presentation-640076 slide 40 Question No: 11 ( Marks: 1 ) - Please choose one The process of converting readable data into unreadable characters to prevent unauthorized use is called normalization decryption validation encryption Question No: 12 ( Marks: 1 ) - Please choose one To safeguard personal information, write your telephone number on credit receipts use shopping club and buyer cards do not reply to spam for any reason complete all requested information on registration forms Privacy concern is a desire to keep personal information out of the hands of others. Online privacy is becoming an increasingly important policy... Do not reply to spammers, for any reason Question No: 13 ( Marks: 1 ) - Please choose one Storage is also referred as Data Instructions Files Memory Computer data storage, often called storage or memory, refers to computer components and recording media that retain digital data. Data storage is one of the core functions and fundamental components of computers. Question No: 14 ( Marks: 1 ) - Please choose one To enter capital characters use Num lock Pause lock Caps lock Scroll lock Question No: 15 ( Marks: 1 ) - Please choose one Windows is software developed by Sun Java Html Microsoft Question No: 16 ( Marks: 1 ) - Please choose one Desktop Icon is a link to Hardware Software -------

Storage None of these Question No: 17 ( Marks: 1 ) - Please choose one What is the keyboard shortcut (button or buttons to be pressed) for creating a Chart from the selected cells? F3 F4 F5 F6 CORRECT OPTION IS F11 Question No: 18 ( Marks: 1 ) - Please choose one In Word which of the following shortcut key combination, changes the font. Ctrl + Shift + F Ctrl + Shift + I Ctrl + F Ctrl + I Question No: 19 ( Marks: 1 ) - Please choose one In Word which of the following shortcut key combination, Save. Shift + F12 Ctrl + Shift + F12 Alt + Shift + T Alt + Shift + S Question No: 20 ( Marks: 1 ) - Please choose one Which will select all the cells in a document? Clicking three times with the right mouse button in the spreadsheet Using the Edit - Select All menu item Pressing CTRL + A on the keyboard None of these Question No: 21 ( Marks: 1 ) - Please choose one will insert a new worksheet. ALT+SHIFT+F1 ALT+SHIFT+F2 ALT+SHIFT+F3 None of these. Question No: 22 ( Marks: 1 ) - Please choose one Which will not select all the cells in a document? Clicking three times with the right mouse button in the spreadsheet Using the Edit - Select All menu item Pressing CTRL + A on the keyboard None of these Question No: 23 ( Marks: 1 ) - Please choose one Spreadsheet can be used as : Accounting Data base Ledger All of above

Question No: 24 ( Marks: 1 ) - Please choose one A is a device that converts analog signals to digital signals, and vice versa. Tablet PC modem microwave station notebook computer 4.16 Modem Modem is output as well as input device at the same time. It receives the data (analog signal) coming through telephone line, converts them to digital signals and sends them to page 25 Question No: 25 ( Marks: 1 ) - Please choose one Displays the Help task pane. F2 F3 F1 None of these Question No: 26 ( Marks: 1 ) - Please choose one The act of defecting or destroying computer equipment is known as hardware vandalism software piracy hardware theft information theft Hardware theft is the act of stealing computer equipment. The act of defacing or destroying computer equipment is known as hardware vandalism. http://www.wong-sir.com/cit/social_impacts/hardware_theft.htm PAPER 7 FINALTERM EXAMINATION Spring 2009 Final CS101- Introduction to Computing (Session - 2) The transistor is a solid state semiconductor device used for amplification and switching, and has terminals. one two three four The transistor is a solid state semiconductor device used for amplification and switching, and has three terminals page 32 Question No: 2 ( Marks: 1 ) - Please choose one Blue Pacific is a name of computer.

Mini Desktop Micro Super Question No: 3 ( Marks: 1 ) - Please choose one Monte Carlo algorithm is an example of Randomized algorithm Greedy algorithm both greedy and randomized Heuristics page 102 Question No: 4 ( Marks: 1 ) - Please choose one A set of stand alone productivity applications designed to work together known as. Productivity software suites Compiled software Secure software Intelligent software Question No: 5 ( Marks: 1 ) - Please choose one The most used form tag is the <input> tag. True False Question No: 6 ( Marks: 1 ) - Please choose one What is the key feature of computer which is against human nature.? Can t get bored. Pattern recognition Repetition None Question No: 7 ( Marks: 1 ) - Please choose one was designed as a replacement for typewriter Spreadsheet Software Word Processor Software Presentation Software Database Software Question No: 8 ( Marks: 1 ) - Please choose one Forms can be submitted by using different methods 2 3 4 5 Methods are GET and POST Question No: 9 ( Marks: 1 ) - Please choose one To display a checkbox on the web page, we use tag CHECKBOX CHECK INPUT

INPUTBOX Question No: 10 ( Marks: 1 ) - Please choose one attribute of FORM tag is used to mention a URL when the form is being submitted name action method submit Question No: 11 ( Marks: 1 ) - Please choose one You can from/to a website containing interactive forms. Only read Only write Read and write Not read and write Interactive Forms (3) Are GUI-based May contain: Text fields Check boxes Buttons Scrollable lists Question No: 12 ( Marks: 1 ) - Please choose one Using COLSPAN, number of rows of the current cell should extend itself None of the given choices Upward Downward Both Upward and Downward None of the given choices COLSPAN No. of rows the current cell should extend itself downward Question No: 13 ( Marks: 1 ) - Please choose one ASCII WHITE is the fastest Super computer which can perform calculations in one second. 1.3 billion 1.3 trillion 1.3 miillion 1.3 thousand Question No: 14 ( Marks: 1 ) - Please choose one is a related collection of WWW files that includes a beginning file called a homepage HTML Website HTTP Web page A Web site is a related collection of World Wide Web (WWW) files that includes a

beginning file called a home page. Page 18 Question No: 15 ( Marks: 1 ) - Please choose one If a computer could pass the Turing test then it would be able to: think like human beings do the things faster win a million dollar prize store more information Question No: 16 ( Marks: 1 ) - Please choose one The key strengths of computers are - Speed Storage Do not get bored All of the given choices Question No: 17 ( Marks: 1 ) - Please choose one Compared to vacuum tubes, Transistors offer: Much smaller size Better reliability Much lower cost All of the given choices page 14 Compared to vacuum tubes, it offered: smaller size better reliability lower power consumption lower cost Question No: 18 ( Marks: 1 ) - Please choose one Which of the following is NOT a component of IC? Transistors Diodes resistors Vacuum tubes Component of IC TRANSISTORS, DIDOES, RESISTORS,CAPACITORS, WIRES IN IC MATERIAL USED SILICON- SEMICONDOUCTOR COPPER-CONDUCTOR during lecture Question No: 19 ( Marks: 1 ) - Please choose one When we use <INPUT type= password >, what will happen? Text will not be visible Text will be in normal format Text will be in **** format Text will be in #### format Question No: 20 ( Marks: 1 ) - Please choose one Spread sheet is a type of _ Mathematical software.

Productivity software Engineering software Mathematical software Business software Question No: 21 ( Marks: 1 ) - Please choose one Word Processor is a System Software Application Software Device Utility Application Software Application software are programs that interact directly with the user They generally do not talk directly to the hardware.the user runs the program on the computer and keeps on interacting with the computer while the program runs Example: Word processor Question No: 22 ( Marks: 1 ) - Please choose one refers to the firmware code which is run by an IBM compatible PC when first powered on. DOS BIOS utility program None of these BIOS refers to the firmware code run by a personal computer when first powered on. Question No: 23 ( Marks: 1 ) - Please choose one A computer program that facilitates the communication between the computer and a peripheral device is called Operating system Utilities Language translator Device Drives A device driver essentially converts the more general input/output instructions of the operating system to messages that the device type can understand. Page 61 Computer device drivers facilitate this by enabling communication between software on your computer and your hardware devices.... A device driver is required for interacting with all kinds of peripheral device Question No: 24 ( Marks: 1 ) - Please choose one In JavaScript, what will be the result of the following operation 79%3 0 1 ------- 2 3

PAPER 8 FINALTERM EXAMINATION Spring 2010 CS101- Introduction to Computing (Session - 1) Question No: 1 ( Marks: 1 ) - Please choose one A Modem is a kind of Input device Output device Storage device Input and Output device Modem I/O device used for connecting two computers over telephone lines Page 187 Question No: 2 ( Marks: 1 ) - Please choose one A protocol used for receiving email messages is called. URL Telnet POP3 SMTP POP3: Post Office Protocol A protocol used for receiving email messages Page 213 Question No: 3 ( Marks: 1 ) - Please choose one A function is also called. Sub-program Procedure Sub-routine All of the given option also called procedure, function, routine, method, or subprogram Question No: 4 ( Marks: 1 ) - Please choose one Aliasing problem can be managed by the size of pixels. Reducing Increasing Gaining Modifying 33.6 Aliasing: The computer screen consists of square-ish pixels arranged in a fixed grid At times, when a diagonal line is drawn on this grid, it looks more like a staircase, instead of a straight line This effect called aliasing can be managed by reducing the size of pixels Page 236 Question No: 5 ( Marks: 1 ) - Please choose one By default in a web page Hyper Link for another web page is represented as

Blue only Black and Underlined Blue and Bold Blue and Underlined Question No: 6 ( Marks: 1 ) - Please choose one random() function returns a randomly-selected, floating-point number between. 0 and 1 0 and 10 0 and -10 0 and -1 random( ) Returns a randomly-selected, floating-point number between 0 and 1 Page 250 Question No: 7 ( Marks: 1 ) - Please choose one What is the 2nd step of DoS attack? Race Arm Search Attack Three Phases of the DoS 1.Search 2.Arm 3.Attack Page 279 Question No: 8 ( Marks: 1 ) - Please choose one technique can be used to create smooth animations or to display one of several images based on the requirement. Image downloading Image preloading Image uploading Image postloading Image Preloading This technique can be used to create smooth animations or to display one of several images based on the requirement Page 286 Question No: 9 ( Marks: 1 ) - Please choose one has great PR skills. Architect Team Lead Project Manager Chief Executive Officer Project Manager Responsibilities: Planning and tracking of the project Arranging of the appropriate resources lient relationship management page 296

Question No: 10 ( Marks: 1 ) - Please choose one is in Executive team. Project Manager CEO Team Lead Developer Page 297 Question No: 11 ( Marks: 1 ) - Please choose one Which one of these translates the program once at a time? Interpreter Compiler Operating system Translator Compiler translates the program written in a HLL in one go. Interpreter translates the HLL program one statement at time. It reads a single statement, translates it into machine language and passes that machine language code to the up and then translates the next statement, and so on page 61 Question No: 12 ( Marks: 1 ) - Please choose one Users, how things work. Analyze in detail Muddle through Figure out Read in detail Question No: 13 ( Marks: 1 ) - Please choose one The key property of the Array object in JavaScript is Value Length Name All of the given choices Page 178 Question No: 14 ( Marks: 1 ) - Please choose one In JavaScript, first element of an array has the index: 1-1 2 None of the given choices The index number of items starts at 0 ar variable_name = array_name[0]; - array_name is the name of the Array. - The 0 in brackets is the index number for the first element of the array, the second has an index number of 1, the third has an index number of 2, and so on Question No: 15 ( Marks: 1 ) - Please choose one In JavaScript, second element of an array has the index: 2 0