CS101 Solved MCQs For Final Term Exam

Similar documents
CS101-Introduction to Computing Prepared by Ali Hassan

CS101 Solved MCQS.

An algorithm that always takes the best immediate or local solution while finding an answer is called.

Cs101 Objective all past papers

CS101 Solved Subjective Questions from Old papers By

CS101 Finalterm Long Questions Solved. Question No: 31 (Marks: 1) What is heuristic? Heuristic is a procedure that usually, but not always, works or

CS101 Introduction to Computing Midterm Solved Papers Spring 2012 by

Note: Though solved with care, not responsible for the accuracy.

Mid Term Papers. Fall 2009 (Session 03) CS101. (Group is not responsible for any solved content)

CS101- Introduction to Computing. Composed By Faheem Saqib. Solved Subjective Final term Papers. For more Help Rep At.

CS101- Introduction to Computing. Composed By Faheem Saqib. 5 Final term Papers of For more Help Rep At.

Come & Join Us at VUSTUDENTS.net

Lesson-1 Computer Security

FOR MORE PAPERS LOGON TO

Full file at Chapter 2: Technology Infrastructure: The Internet and the World Wide Web

COLLEGEDUNIA MCA. 3. What would be displayed, if the following program is compiled and run?

IBPS Practice Exam 1. One megabyte equals approximately 1) 1,000 bits 2) 1,000 bytes 3) 1 million bytes 4) 1 million bits 5) 2,000 bytes 2.

Learning Objectives. In this chapter you will learn about:

Chapter 1: Introduction to Computers. In this chapter you will learn about:

v.m.g.rajasekaran ramani sri sarada sakthi mat. Hr. sec. school

Copyright 2006 Prentice-Hall. All rights reserved. 1

Internet. Class-In charge: S.Sasirekha

Computer Technology Flash Card 2

KENDRIYA VIDYALAYA CHENANI (J & K)

SCHOOL OF ACCOUNTING AND BUSINESS BSc. (APPLIED ACCOUNTING) GENERAL / SPECIAL DEGREE PROGRAMME

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Computer Skills Revision. By: Rana Hammady

Chapter 1: Introduction to Computers

Types Of Computer Virus Sources Of Virus Virus Warning Signs Virus Detection(Anti-Virus) Virus Prevention and Removal

Chapter 4 The Internet

Networking interview questions

1.2.1 Electronic computers based on digital switching

CERT-In. Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES

Chapter 2: Technology Infrastructure: The Internet and the World Wide Web

Describe the layers of a computer system

INTRODUCTION TO ICT.

ADOBE DREAMWEAVER CS4 BASICS

Full file at

Vanavani Mat. Hr. Sec. School. Subject : Computer Science Std: XI. Quarterly Exam Key

Data Representation From 0s and 1s to images CPSC 101

ZONAL EDUCATION OFFICE - JAFFNA

Computer Fundamentals

Test Bank for Prelude to Programming Chapter 0

IT430- E-COMMERCE Solved MCQ(S) From Midterm Papers (1 TO 22 Lectures) BY Arslan Arshad

Overview of a computer

HIGHER SECONDARY FIRST YEAR 2 MARK & 5 MARK NOTES CHAPTER 1 1. INTRODUCTION TO COMPUTER

Motivation For Networking. Information access Interaction among cooperative application programs Resource sharing

COMPUTER SKILLS COMP101

INFORMATION TECHNOLOGY CONCEPTS (391) OPEN EVENT

UNIQUE IAS ACADEMY- COMPUTER QUIZ 2

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.

1. This memory is for short term storage and is lost when the computer is turned off. A. Icon B. CPU C. Hard drive D. RAM 2. This input device will

Computer ANAMIKA ACADEMY. Mo Which function has the ability to move from one web page to another Hyper link

Adobe Dreamweaver CS5 Tutorial

Vocabulary Platform Computing\ First grade Theoretical number of hours=30 Practical number of hours =60

c. Compiler d. Program 9. To maximize a window means a. Fill it to capacity b. Expand it to fit the desktop c. Put only like files inside d.

Important Computer Abbreviations for IBPS Clerk & PO

Computers in Engineering COMP 208. A Brief History. Mechanical Calculators. A Historic Perspective Michael A. Hawker

Computers in Engineering COMP 208

컴퓨터의기초 7 th Lecture 김현철 (2009 년여름학기 ) 컴퓨터공학부서울대학교. Copyrights 2008 Eom, Hyeonsang All Rights Reserved

Computing at Cox Green Curriculum Plan. Key Stage 3 Year 7

Total Mark out of 35

BANK EXAMS COMPUTER KNOWLEDGE A) BASIC B) FORTRAN C) COBOL D) PASCAL E) JAVA

Fundamentals Of Computer

Word Found Meaning Innovation

Chapter1 Overview of computers

COMPUTERIZED OFFICE MANAGEMENT

6. Something which has easily understood instructions is said to be: 1) User friendly 2) Information 3) Word Processing 4) Icon 5) None of these

Computer Basics. Computer Technology

AQA GCSE Computer Science PLC

Chapter 11: Wide-Area Networks and the Internet

4. A mail box 9) What is an embedded system? 1. A program that comes wrapped in a box 2. A program that is permanent part of a computer 3.

NetDefend Firewall UTM Services

WEB TECHNOLOGIES CHAPTER 1

(Refer Slide Time 00:01:09)

2 ZyWALL UTM Application Note

Introduction to Computer Graphics

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

E-Commerce. Infrastructure I: Computer Networks

Final Study Guide Arts & Communications

Computer is an electronic machine that can receive, store, transform and output data of all kinds (image, text, numeric, graphics and sound).

INTERNET BASICS / FILE OPERATIONS Defining Information Technology

Lecture 12. Application Layer. Application Layer 1

Q2#: A set of software that handle all database related operations of an organization is called.

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

Chapter 10: Security and Ethical Challenges of E-Business

Midterm Review. October 17

A Short History of Computers

How does the Internet Work? The Basics: Getting a Web Page. The Basics: Getting a Web Page. Client-Server model. The Internet: Basics

FBCA-03 April Introduction to Internet and HTML Scripting (New Course)

Firewalls 1. Firewalls. Alexander Khodenko

NETWORK THREATS DEMAN

GoLive will first ask you if your new site will be for one individual or a work group; select for a Single User, and click Next.

CS101 Lecture 29: Brief History of Computing

Network Fundamentals. Chapter 7: Networking and Security 4. Network Fundamentals. Network Architecture

Computer networks 2013

STAR OFFICE CALC. Lesson 6

AQU Information Systems Fundamentals Spring 2012 Pg. 9.1

Computer Principles and Components 1

1. "To help others locate a Web site, the site should be registered with various " a. On Line services b. Backbone providers c.

Transcription:

Question # 1 of 10 ( Start time: 05:12:59 PM ) Total Marks: 1 Global variables are: Visible everywhere on the web page Visible only in the block in which they are declared Visible only in the main code Question # 2 of 10 ( Start time: 05:13:37 PM ) Total Marks: 1 Infection propagation and Actual destructive are the components of Transmission mechanism Payload Worms Trojan Horse Question # 3 of 10 ( Start time: 05:14:24 PM ) Total Marks: 1 If a computer could pass the Turing test then it would be able to: win a million dollar prize think like human begins think but slower than humans do the things faster Question # 4 of 10 ( Start time: 05:14:53 PM ) Total Marks: 1 is a special purpose computer that connects and translates between network that use different communication protocols. Bridge Router Gateway Gateway A special-purpose computer that connects and translates between networks that use different communications protocols Question # 5 of 10 ( Start time: 05:15:51 PM ) Total Marks: 1 The solution of the Mail Bombing is Filtering Do not accept emails email filtering There in no solution for it Question # 6 of 10 ( Start time: 05:16:38 PM ) Total Marks: 1 The name of very first computer was:

ABC BCD EDC Question # 8 of 10 ( Start time: 05:17:34 PM ) Total Marks: 1 MATH functions are accessed by referring to various of the Math object Functions Events Properties Methods In addition to the simple arithmetic operations (e.g. +, *, etc.) JavaScript supports several advanced mathematical operations as well Notationaly, these functions are accessed by referring to various methods of the Math object Question # 7 of 10 ( Start time: 05:16:57 PM ) Total Marks: 1 The color of each pixel is generally represented in the form of a. Duplet Triplet Both a & b None of these Rule of thumb learned through trial & error is called Heuristic Mistake Common sense Experience Question # 9 of 10 ( Start time: 05:18:36 PM ) Total Marks: 1 SCSI stands for: Small Computer System Interface System Common Small Integration Silicon Computer System Interface Question # 1 of 10 ( Start time: 05:21:25 PM ) Total Marks: 1 Internet is an example of network. Private Public Both Private and Public

Question # 2 of 10 ( Start time: 05:21:53 PM ) Total Marks: 1 The name of first commercially available PC was: UNIVAC 1 ENIAC EDVAC Altair 8800 Question # 3 of 10 ( Start time: 05:22:43 PM ) Total Marks: 1 Algorithm is a Definition of a problem Sequence of steps to solve a problem Understanding of a problem Solving a problem Question # 4 of 10 ( Start time: 05:23:52 PM ) Total Marks: 1 A group of information is called File Database Record Field Question # 5 of 10 ( Start time: 05:24:17 PM ) Total Marks: 1 is a branch f computer science concerned with manipulating and enhancing computer graphics. Image Handling Image Processing Image Engineering None of these Question # 6 of 10 ( Start time: 05:25:34 PM ) Total Marks: 1 has changed our way of life like no other technology. Computational technology Computer technology Computing technology None of the Above Question # 7 of 10 ( Start time: 05:26:27 PM ) Total Marks: 1 Sophisticated event handling is not possible with event handling Off-Line In-Line Out-Line Non of the given choices

Question # 8 of 10 ( Start time: 05:27:03 PM ) Total Marks: 1 Babbage s Analytical Engine could store information permanently in: Magnetic Tape Floppy Disk Punched Cards Question # 9 of 10 ( Start time: 05:28:30 PM ) Total Marks: 1 There are popular schemes to reduce the number of bytes that are required for storing graphics. 4 3 2 None of these A number of clever schemes have been invented to reduce the number of bytes that are required for storing graphics. 2 popular ones: Color mapping Dithering Question # 10 of 10 ( Start time: 05:30:01 PM ) Total Marks: 1 The internet-society is considered under Surveillance because: While surfing, we are being watched, constantly Our every click is recorded and analyzed to extract patterns and behaviors Webcams are becoming common. Providing a cheap way for parents to watch their children's every move All of the given Which of the following is incorrect for making design elements legible? Elements should be large enough Elements must contrast sufficiently Related elements should be visually grouped Elements should have no visual focus 25.10 Making Display Elements Legible: 1. Designing (arranging) Display Elements Elements must be large enough to be processed visually Elements must contrast sufficiently with their backgrounds Related elements should be visually grouped through the use of space, color, or graphical boundaries The relative levels of importance among elements in a display should be revealed graphically Question # 2 of 10 ( Start time: 05:03:37 PM ) Total Marks: 1

1. Function is also known as. subprogram procedure subroutine All of given Function: A group of statements that is put together (or defined) once and then can be used (by reference) repeatedly on a Web page Also known as subprogram, procedure, subroutine In TCP\IP protocols became the only set of protocols used on the ARPANET. 1973 1983 1972 E-mail system has component(s) 1983 - The TCP/IP protocols becomes the only set of protocols used on the ARPANET This sets a standard for all networks, and generates the use of the term Internet as the net of nets ARPANET splits into two nets to keep military & non-military network sites separate: ARPANET and MILNET E-mail client SMTP server POP3 server All of the given choices / / / / A Parallelogram (Tilted rectangle) represents the flow chart element. Process Input or Output Decision Connector Punched cards were replaced by: Floppy Disk Zip Drives Magnetic storage Ref: http://en.wikipedia.org/wiki/punched_card

During the 1960s, the punched card was gradually replaced as the primary means for data storage by magnetic tape, as better, more capable computers became available. The virus may display an annoying, but harmless message Malicious Neutral Helpful DoS The internet communities are. Geographical based Interest based Country based Religion based Question # 1 of 10 ( Start time: 04:51:32 PM ) Total Marks: 1 Because of spending more time on the internet, the distances among the families have been. Increased Expanded Contracted Shortened Question # 3 of 10 ( Start time: 04:53:30 PM ) Total Marks: 1 Autonomous Web Agents are also known as Mobile Agents Softbots Both "Mobile Agents" & "Softbots" None of these A communication protocol is a that governs the flow of information over a network. Set of Methods Set of Protocols Set of rules Protocol Rules governing communications over the network By default in a web page Hyper Link for another web page is represented as: Blue only Black and Underlined Blue and Bold Blue and Underlined

The organizations are learning that business can be done in a more effective manner if emphasis is placed upon. Cooperation Shared responsibility Networking All of the given Question # 7 of 10 ( Start time: 04:57:19 PM ) Total Marks: 1 Monitor is an example of devices Output Input Processing The code in the portion is the right choice for developing larger JavaScript scripts Body At End Head Separate based on the principles of the logical reasoning ability of humans. Genetic Algorithms Rule-based Systems Feed-Forward Network None of these Rulebased Systems (1): Based on the principles of the logical reasoning ability of humans The key benefit of VPNs over conventional PNs is: Security Efficiency Lower Cost In automatic machines perform various tasks that were previously performed by humans. Fuzzy Logic Robotics Rule based Systems None of these Avoid to ensure readability of web page Overuse of bold and italics Use of paragraphs Use of white space Use of contrast colors

Deep Blue was the name of: Human Computer City Using, a user can remotely log on to a computer (connected to the user through a network, e.g. Internet) & have control over it like a local user, including control over running various programs? FTP TCP Telnet Protocol Telnet Protocol Using Telnet, a user can remotely log on to a computer (connected to the user s through a TCP/IP network, e.g. Internet) & have control over it like a local user, including control over running various programs In contrast, FTP allows file operations only Typical use: Configuring and testing of a remote Web server DoS is? Crime Cyber crime Not a crime A software enables users located at far-way locations to easily share information with others located all over the world. Protocol Internet Communication Channel Vacuum tubes were replaced by: Transistors Electrodes Electric Relays Cyber crime can be used to

Damage a home computer Bring down a business Weaken the telecom, financial, or even defense-related systems of a country All of the given provides a simple, consistent way for applications to interact with the HW without having to know all the details of the HW Explorer.exe System Files Operating System Application Software Communication protocol is a that governs the flow of information over a network Set of methods Set of protocols Set of rules Device team is responsible for the maintenance, expansion, improvement of the infrastructure consisting of workstations, networking equipment, software and network security. Support Configuration Management Quality Assurance Developer team consists on the sharpest technical minds in the company. Architecture Business Development Configuration Management Developer is responsible for day to day operations. CEO COO CMSO Developer Using Java Script you can write a character at random location on screen By applying randomch() method With the help of String object With the help of random character property There is no built in approach in Java Script The transistor is a solid state semiconductor device used for amplification and switching, and has terminals. one

two three four Question No: 2 ( Marks: 1 ) - Please choose one Blue Pacific is a name of computer. Mini Desktop Micro Super Question No: 3 ( Marks: 1 ) - Please choose one Monte Carlo algorithm is an example of Randomized algorithm Greedy algorithm both greedy and randomized Heuristics Question No: 4 ( Marks: 1 ) - Please choose one A set of stand alone productivity applications designed to work together known as Productivity software suites Compiled software Secure software Intelligent software Question No: 1 ( Marks: 1 ) - Please choose one Which of the following hardware component of a computer can also be called as engine? Bus Storage Memory Processor Question No: 2 ( Marks: 1 ) - Please choose one TCP stands for. Total communication protocol Transmission control protocol Transfer control protocol Transfer collection protocol Question No: 3 ( Marks: 1 ) - Please choose one breaks down the message to be sent over the internet into packets. FTP HTTP

TCP IP Question No: 4 ( Marks: 1 ) - Please choose one A variable can be in scope. Local Global Either local or global None of the given options Question No: 5 ( Marks: 1 ) - Please choose one A protocol used for receiving email messages is called. URL Telnet POP3 SMTP Question No: 6 ( Marks: 1 ) - Please choose one A function is also called. Sub-program Procedure Sub-routine All of the given option Question No: 7 ( Marks: 1 ) - Please choose one Capturing events and responding to them is called. Function Handling Event Handling Event Procedure All of the given option Question No: 8 ( Marks: 1 ) - Please choose one Which one of the following is NOT a primary color? Red Green Yellow Blue Question No: 9 ( Marks: 1 ) - Please choose one

are those programs in which the flow of the program is determined by the user's actions (mouse clicks, key presses) or messages from other programs. Event called programs Event processed programs Event driven programs Event declared programs Question No: 10 ( Marks: 1 ) - Please choose one a = Math.ceil(12.01) What will be the value of a? 12 13 12.0 13.01 CS101 Solved MCQs For Final Term Exam Question No: 11 ( Marks: 1 ) - Please choose one Event handlers are placed in the portion of a Web page as attributes in HTML tags. HEAD BODY SCRIPT TITLE Question No: 12 ( Marks: 1 ) - Please choose one can be used for entering, editing, or viewing data, one record at a time. Queries Forms Reports None of the given options Question No: 13 ( Marks: 1 ) - Please choose one random() function returns a randomly-selected, floating-point number between. 0 and 1 0 and 10 0 and -10 0 and -1 Question No: 14 ( Marks: 1 ) - Please choose one The organizations are learning that business can be done in a more effective manner if emphasis is placed upon. Cooperation Shared responsibility Networking

All of the given options Question No: 15 ( Marks: 1 ) - Please choose one In relational database, data store in the form of. Tables Rows Columns None of the given options Question No: 16 ( Marks: 1 ) - Please choose one Spies of one business monitoring the network traffic of their competitors. Industrial Intelligence Industrial Espionage Industrial Spying Industrial Surveillance Question No: 17 ( Marks: 1 ) - Please choose one waits for some time and then launch a function. Timeout( ) settimeout( ) settime( ) settimein( ) Question No: 18 ( Marks: 1 ) - Please choose one based communication allows business entities to coordinate the activities of their globally spread units with greater accuracy. Intranet Internet Home LAN Question No: 19 ( Marks: 1 ) - Please choose one The key responsibilities of a project manager is. Planning and tracking of the project Arranging of the appropriate resources Client relationship management All of the given options Question No: 20 ( Marks: 1 ) - Please choose one team consists on the sharpest technical minds in the company. Architecture Business Development Configuration Management Developer Question No: 21 ( Marks: 1 ) - Please choose one

Smart editors can automatically color different parts of statements in different colors e.g. comments in color. Green Grey Blue Red Question No: 22 ( Marks: 1 ) - Please choose one A collection of data organized in such a way that the computer can quickly search for a desired data item is known as : Retrieving Database Information DBMS Question No: 23 ( Marks: 1 ) - Please choose one Deep Blue was the name of computer human city game Question No: 24 ( Marks: 1 ) - Please choose one Information available on the web is mostly free of cost costly very cheap of no use Question No: 25 ( Marks: 1 ) - Please choose one Which one is correct? <BODY></BODY> <body></body> Both <BODY></BODY> and <body></body> <BODY/> Question No: 26 ( Marks: 1 ) - Please choose one is the best known builder for supercomputers. Sun Cray Research Microsoft Apple Question No: 27 ( Marks: 1 ) - Please choose one

Which one is the example of spreadsheet software? MS Word MS PowerPoint MS Excel MS Access Question No: 28 ( Marks: 1 ) - Please choose one Currently the BlueRay DVD can store more than of data. 10 GB 100 GB 50 GB 150 GB Question No: 29 ( Marks: 1 ) - Please choose one Blue Pacific is a name of computer. Mini Desktop Micro Super Question No: 30 ( Marks: 1 ) - Please choose one are powerful pieces of hardware, but not much useful on their own. Microcontrollers Microprocessors Integrated circuits Ports Question No: 31 ( Marks: 1 ) In programming, what is a loop? In computer science a for loop is a programming language statement which allows code to be repeatedly executed. A for loop is classified as an iteration statement. Question No: 32 ( Marks: 1 ) What are the other names of function? Any one. Routine, procedure, sub prograam Question No: 33 ( Marks: 2 ) How JavaScript Arrays are heterogeneous? Arrays are heterogeneous in java script because at the same time stimultanously they can hold elements of multiple data types Question No: 34 ( Marks: 2 ) What is the database? Data base is a collection of organized data in a proper way that computer can quickly search for any desired data item, its an easy way of allowing of manipulation of data,they

are design in such a way that access to any desired data can be identified and reached quickly and easy, they are generally consist of collection of interrelated files Question No: 35 ( Marks: 3 ) Differentiate between LAN and WAN with one example of each. Lan is a local area network where as wan is a wide area network Lan can be used in a specific areas with limited computers where as wan can be used on computers shared by large distances For example lan can be used on pc s or an organization located in one building but wan can be used on large scales like banks all over or in any Large communication systems Question No: 36 ( Marks: 3 ) What are Trojan Horses? Trojen horses are a kind of cyber crime, they are v harmful to computer because they are stand alone programme and the look like what they are not like any thing amusing or not harmless like games.. Question No: 37 ( Marks: 3 ) Elaborate Rester Graphics with examples. A raster graphics image, digital image, or bitmap, is a data file or structure representing a generally rectangular grid of pixels, or points of color, on a computer monitor, paper, or other display device. To illustrate the matter further - here's the letter "J": J Look closely at it... Take a magnifying glass to it if you like. You see a "J", the computer sees something more like this, where '.' represents a zero and 'X' represents a one:...x...x...x...x...x...x...x X...X X...X.XXX. CS101 Solved MCQs For Final Term Exam Where you see a zero, the computer instructs its video hardware to paint the current background color. A one calls for the current foreground color. Yes, it is actually a bit more complicated, but it all basically boils down to one bit or the other making a distinction between the colors of adjacent pixels, which together form an image.

Question No: 38 ( Marks: 5 ) What are the important properties, methods and event handlers of image object? The primary use of the image object is to download an image into the cache before it is needed to display, image object can be used to create different kinds of animations or to display one of several images based on the desired requirement, in java script image object can be used to display the required pre loaded image Properties of image object is : height, width,hspace,vspace, src, name border etc Methods :none Event handlers:on aboart, onload, onerror etc Question No: 39 ( Marks: 5 ) Write the JavaScript code for the Function SumOddNumbers(maxNumber) that can add non-negative odd numbers up to maxnumber and return their sum. Function sum odd numbers(maxnumber){var sum=0; For(i=0; <maxnumbers;i++) { { if(i / 2 == 1 i == 1) sum += i; } return sum; } CS101 Solved MCQs For Final Term Exam Question No: 40 ( Marks: 10 ) Write a note on : Coding guidelines Guidelines for developing short programs. Coding guidelines Always use semicolons to end statements Indent blocks of code (2 to 5 spaces) Identifiers Use the camel back scheme Variables: nouns Functions: verbs Comment Liberally Make them descriptive but concise Gudelines for developing short programs. Read and understand the problem Do you have all the required data? No: Get it Else assume it. State it explicitly Do the design

Question No: 41 ( Marks: 10 ) write a note on each of the following: a. Vector or Object-Oriented Graphics: b. Bit-Mapped or Raster Graphics: A:In Vector or object oriented graphic everything drawn is treated as object. objects retain their identity after they are drawon. these objects can later be moved, stretched, duplicated, deleted,etc. they are resolution independent and have relatively small file size. the examples are: swf, svg, wmf, ps brass_ibrahim: Vector graphics is the use of geometrical primitives such as points, lines, curves, and shapes or polygon(s), which are all based on mathematical equations, to represent images in computer graphics. brass_ibrahim: The term "vector graphics" is mainly used today in the context of twodimensional computer graphics Virtually all modern 3D rendering is done using extensions of 2D vector graphics techniques.virtually all modern 3D rendering is done using extensions of 2D vector graphics techniques B:Bit-Mapped or Raster Graphics: Treats everything that is drawn as a bit-map If an object is drawn on top of another, it is difficult to move just one of them while leaving the other untouched Changing the resolution often requires considerable touch-up work Relatively large file size Examples: gif, jpg, bmp masood.tariq: Bit-Mapped or Raster Graphics: Treats everything that is drawn as a bit-map If an object is drawn on top of another, it is difficult to move just one of them while leaving the other untouched Changing the resolution often requires considerable touch-up work Relatively large file size Examples: gif, jpg, bmp 28 objectives were from old papers out of 30. What is Array? Marks 2 what is computer prrofessional? Marks 2 define onload and onunload? Marks 2 waht is time bomb? Marks 2 what is bandwidth? Marks 2 "while" loop is more preferable than "For" loop? Marks 3 sementic web and present web? Marks 3

can we replace a human doctor by Expert system? Marks 5 Difference Internt and intranet? Marks 5 ways of navigation Heuristics? Marks 5 event handling? Define network organization and its advantages? Marks 10 Coding Guidline and guidlines for short programs? Marks 10 Dewelop a web page that displays six thumbnails images. A main image should be changed to a large version of thumbnail as soon as the mouse moves over the thumbnail. Write complete html and java script? Marks 10 characteristics of Internet? Marks 10 Profile and responsibilities of Team Leader? Marks 10 due to computer how many jobs are available and how many jobs are eliminated? Marks Today was my CS101 Paper. The Subjective Quizzes are as under: 1. How many members are in operational team and what there key resposibilities 2. What is Computer Screen? 3. What are weaknesses of the web? 4. Characteristics of Internet (Any Five)? 5. Breifly describe Telnet VoIP Instant Messaging FTP IP/TCP 6. Describe the organizational structure? 7. What is image process 8. Pixel?

Today I had CS 101 Paper.There were 41 questions.30 objective and 11 descriptive.few of the questions were: 3 attributes of event handler Difference between Internet and Intranet Function Commonsense to avoid viruses and explain antivirus TCP/IP An attack on Yahoo servers Spreadsheets Codes for uploading file Hierarchy in an organization Team lead COO Developer Businessess monitoring their employees '+' operator Image in Javascript