CS101- Introduction to Computing. Composed By Faheem Saqib. 5 Final term Papers of For more Help Rep At.

Similar documents
CS101 Introduction to Computing Midterm Solved Papers Spring 2012 by

CS101-Introduction to Computing Prepared by Ali Hassan

FINAL TERM PAPER 1. EXAMINATION Spring 2010 CS101- Introduction to Computing. Amel..

CS101 Finalterm Long Questions Solved. Question No: 31 (Marks: 1) What is heuristic? Heuristic is a procedure that usually, but not always, works or

An algorithm that always takes the best immediate or local solution while finding an answer is called.

CS101 Solved Subjective Questions from Old papers By

CS101- Introduction to Computing. Composed By Faheem Saqib. Solved Subjective Final term Papers. For more Help Rep At.

CS101 Solved MCQS.

FOR MORE PAPERS LOGON TO

CS101 Solved MCQs For Final Term Exam

Project 2: After Image

Computing at Cox Green Curriculum Plan. Key Stage 3 Year 7

Mid Term Papers. Fall 2009 (Session 03) CS101. (Group is not responsible for any solved content)

Ursuline College Accelerated Program

CIW 1D CIW Foundations Exam v5.

CONCEPTS OF MANAGEMENT COMPUTING

Pace University. Fundamental Concepts of CS121 1

(Refer Slide Time: 01:41) (Refer Slide Time: 01:42)

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN

Downloaded From :

Solved by sam pari. MIDTERM EXAMINATION Spring 2010 CS101- Introduction to Computing Ref No: Time: 60 min Marks: 38. Student Info Student ID:

Come & Join Us at VUSTUDENTS.net

3. WWW and HTTP. Fig.3.1 Architecture of WWW

IT430- E-COMMERCE Solved MCQ(S) From Midterm Papers (1 TO 22 Lectures) BY Arslan Arshad

Vanavani Mat. Hr. Sec. School. Subject : Computer Science Std: XI. Quarterly Exam Key

WEB TECHNOLOGIES CHAPTER 1

('cre Learning that works for Utah STRANDS AND STANDARDS WEB DEVELOPMENT 1

CHAPTER 2 MARKUP LANGUAGES: XHTML 1.0

CSC 170 Fall 2017 Dr. R. M. Siegfried. Study Guide for Final Exam

CLIENT SERVER ARCHITECTURE:

CMSC 332 Computer Networking Web and FTP

AQU Information Systems Fundamentals Spring 2012 Pg. 9.1

6. Under which of the following categories is a laptop computer classified? (1) Microcomputer (2) Minicomputer (3) Mainframe (4) Supercomputer

PLEASE READ CAREFULLY BEFORE YOU START

CS 3360 Design and Implementation of Programming Languages. Exam 1

Objectives. Introduction to HTML. Objectives. Objectives

RPS Technology Standards Grades 9 through 12 Technology Standards and Expectations

Computing 1: Computer Systems

FBCA-03 April Introduction to Internet and HTML Scripting (New Course)

Application Software

IT430 E-COMMERCE SHORT NOTES COMPOSED BY VUZS TEAM MEHREEN HUMAYUN LECTURE1-22

PLEASE READ CAREFULLY BEFORE YOU START

KENDRIYA VIDYALAYA CHENANI (J & K)

Windows 2000 Professional

ICT & Computing Progress Grid

COMPUTER SOFTWARE RAYMOND ROSE

Question No: 1 ( Marks: 1 ) - Please choose one One difference LISP and PROLOG is. AI Puzzle Game All f the given

E-Commerce. Infrastructure I: Computer Networks

SCP SC Network Defense and Countermeasures (NDC) Exam.

(Refer Slide Time: 01:40)

CGS 3066: Spring 2015 JavaScript Reference

Review of Previous Lecture

CS 3360 Design and Implementation of Programming Languages. Exam 1

5/19/2015. Objectives. JavaScript, Sixth Edition. Introduction to the World Wide Web (cont d.) Introduction to the World Wide Web

COURSE OUTLINE COMPUTER SCIENCE GENERAL YEAR 12: 2019 UNIT 3 AND UNIT 4

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

Cs101 Objective all past papers

C H A P T E R 1. Introduction to Computers and Programming

M3-R3: INTERNET AND WEB DESIGN

(5) Affiliation (10) XML (15) Web Augmentation (20) Gateways. (4) Kernel (9) ES test (14) SSL. (1) Portal (6) EDI (11) Web Directories (16) W3C

Objectives. Connecting with Computer Science 2

Total Mark out of 35

Textbook Charles Petzold, Programming Windows, 5th edition, Microsoft Press. References - other textbooks or materials none

Computing Science: National 5 and Higher skills, knowledge and understanding

Internet. Class-In charge: S.Sasirekha

Chapter Twelve. Systems Design and Development

TOPIC 2 INTRODUCTION TO JAVA AND DR JAVA

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates:

Data Communication & Computer Networks MCQ S

Network Applications Principles of Network Applications

E-companion. Quiz for IT-knowledge

Web Engineering (CC 552)

Chapter 7: The Internet

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN

Ministry of National Policies and Economic Affairs National Youth Corps. Curriculum of the Information Technology

Syllabus for Computer Science General Part I

(Refer Slide Time 3:31)

ADOBE DREAMWEAVER CS4 BASICS

Meltem Özturan misprivate.boun.edu.tr/ozturan/mis515

Vocabulary Platform Computing\ First grade Theoretical number of hours=30 Practical number of hours =60

UNIT I. A protocol is a precise set of rules defining how components communicate, the format of addresses, how data is split into packets

GCSE Computer Science for OCR Overview Scheme of Work

CONCEPTS OF MANAGEMENT COMPUTING

Computer Networks. Wenzhong Li. Nanjing University

Mail & Deploy Reference Manual. Version 2.0.5

Contents. Slide Set 1. About these slides. Outline of Slide Set 1. Typographical conventions: Italics. Typographical conventions. About these slides

ACE Chapter 4 review. Name: Class: Date: True/False Indicate whether the statement is true or false.

Chapter 11: Wide-Area Networks and the Internet

By the end of this section of the practical, the students should be able to:

1D CIW: Web Design Specialist. Course Outline. CIW: Web Design Specialist Apr 2018

User Manual. Version 3.1. Copyright 2000 Academia Software Solutions All Rights Reserved

PLEASE READ CAREFULLY BEFORE YOU START

PLEASE READ CAREFULLY BEFORE YOU START

GoLive will first ask you if your new site will be for one individual or a work group; select for a Single User, and click Next.

HIGER SECONDARY FIRST YEAR COMPUTER SCIENCE

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved.

National 5 Computing Science Software Design & Development

Software Development & Education Center PHP 5

Madhya Pradesh Bhoj (Open) University, Bhopal DIPLOMA IN COMPUTER APPLICATION (DCA)

Transcription:

CS101- Introduction to Computing Composed By Faheem Saqib 5 Final term Papers of 2010 For more Help Rep At Faheem_saqib2003@yahoo.com Faheem.saqib2003@gmail.com 0334-6034849 Student Info MC100200011 OPKST 07 Aug 2010 FINALTERM EXAMINATION Spring 2010 CS101- Introduction to Computing (Session - 3) Ref No: 1344120 Time: 90 min Marks: 58 StudentID: Center: ExamDate: Question No: 1 Analytical Engine is ------------------ An electrical machine A digital machine An analog machine A special purpose machine Question No: 2 % of the users have left websites in frustration due to poor navigation. 40 62 83 91

Question No: 3 breaks down the message to be sent over the internet into packets. FTP HTTP TCP IP Question No: 4 The first spread sheet was called as. Excel PowerPoint Word VisiCalc Question No: 5 Which is correct? onunload onunload onunload All of the above Question No: 6 Variables allow us to manipulate data through the. Actual Value Reference Length Name Question No: 7 We use to stop Break-Ins. Scanners

Intrusion detectors Utilities None of the given options Question No: 8 Which attribute of the IMG tag tells us about the source of the image. source path loc src Question No: 9 The developer report to in a development team. Team Lead Project Manager CEO IT Manager Question No: 10 The key responsibilities of the architect of the project is. Technology selection High-level design Makes certain that the implementation remains true to the design All of the given options Question No: 11 Using smart editors they can automatically color different parts of statements in different colors e.g. HTML tags in color. Green Grey Blue None of the given options Question No: 12 is responsible for all the essential operations like basic house keeping, task scheduling, etc. Also contains low-level HW interfaces Hardware Device Manager Kernel Device Driver Question No: 13 Randomized algorithms are often than deterministic algorithms for the same problem. Simpler and more slow

Simpler and more efficient Complex and more efficient Complex and more slow Question No: 14 Compound Statement after decision constructs in JavaScript is enclosed with ( ) [ ] { }; { } Question No: 15 The key property of the Array object in JavaScript is Value Length Name All of the given choices Question No: 16 Which protocol is used to send email? FTP SMTP TELNET All of the given choices Question No: 17 Following is highest level of heading tag in list given below. H3 H4 H5 H2 Question No: 18 Blue Pacific is a name of computer. Mini Desktop Micro Super Question No: 19 correctness is easier to check as compared with Syntactic, Semantic Semantically, Syntactically

Systematically, Semantically None of the given options Question No: 20 refers maintaining the correctness and consistency of data Security Integrity Reliability None of the given Question No: 21 Which of the following keyword is used to jump out of switch statement as soon as the match is found? Default Else Jump Break Question No: 22 How much parameters does POW () function have? 2 1 3 Question No: 23 How many types the string methods have? 1 2 3 Question No: 24 The output of document.write( "2" + Math.PI ) ; is. 23.141592653589793 3.146 2.3141592653589793 None of them Question No: 25 POP, IMAP and SMTP are related to one of the following service/services? Electronic Mail

Instant Messaging Both a and b None of above Question No: 26 is designed for 2D-Animation. Flash Animation HTML image class Web Browser HTML 2D class Question No: 27 ( Marks: 2 ) Define the term 3D Rendering The process of converting information about 3-D objects into a bit-map that can be Displayed on a 2-D computer display Question No: 28 ( Marks: 2 ) What is an intelligent system? An intelligent system is a dynamic system that utilises computational intelligence (CI) to analyse interconnections between causes, drivers and effects, so as to model, predict and control their dynamic interactions in a holistic manner Question No: 29 ( Marks: 2 ) Define testing with respect to programming.. Question No: 30 ( Marks: 2 ) What is a compiler? Write its one benifit over interpreter. Compiler translates the program written in a HLL in one go. The translated code is then used by the up whenever the program needs to be run Interpreter translates the HLL program one statement at time. It reads a single statement, translates it into machine language and passes that machine language code to The up and then translates the next statement, and so on Question No: 31 ( Marks: 3 ) Who is a Computing Professional? Professionals involved in the development and/or maintenance of SW and/or computer HW Computer scientists, software engineers, computer engineers, and some of the telecom engineers are generally classified as computing professionals Question No: 32 ( Marks: 3 ) What are Trojan Horses? Unlike viruses, they are stand-alone programs

The look like what they are not They appear to be something interesting and harmless (e.g. a game) but when they are executed, destruction results Question No: 33 ( Marks: 3 ) What is ICMP? Question No: 34 ( Marks: 5 ) What is ARPANET and who developed it? Question No: 35 ( Marks: 5 ) Write down the advantages of Natural Language Processing. Question No: 36 ( Marks: 5 ) Draw hierarchy of the people in the small project? Student Info Student ID: Center: Exam Date: FINALTERM EXAMINATION Spring 2010 CS101- Introduction to Computing Ref No: 1547519 Time: 90 min Marks: 58 Question No: 1 In a good presentation each slide should contain. Heading Phrases not sentences

Sentences not phrases Heading, sentences not phrases Question No: 2 Which one of the following is not an event handler's attribute? Function Identifier Equal sign String consisting of JavaScript statements Question No: 3 According to the heuristic, the number of defects remaining in a system after a given level of tests is proportional to. The number found on very first day. The number found during the development. The number found during the test. None of the given options. Question No: 4 Which one is the best option for designing a Medical Expert System?

Rule Based System Genetic Algorithm Fuzzy Logic Neural Network Question No: 5 A combination of word processing and graphic design is Corel Draw Desktop Publishing Paint WordPad Question No: 6 A microprocessor can be made more powerful by increasing its Clock frequency Word length Clock frequency and Word length None of above

Question No: 7 Security can also be improved through. Encryption Typing errors Transmission errors Hardware malfunctions Question No: 8 is a field that uniquely identifies each record stored in a table. Composite Key Primary key Foreign key None of the given options Question No: 9 There are types of errors. 2 3 4 5

Question No: 10 is simply a fast port that lets you connect computer peripherals and consumer electronics to your computer without restart. Freeware Shareware Firewire Firmware Question No: 11 provides a simple, consistent way for applications to interact with the HW without having to know all the details of the HW Explorer.exe System Files Operating System Application Software Question No: 12 One can browse documents residing on a remote computer using protocol. HTTP SMTP FTP TELNET

Question No: 13 Which event handler executes the specified JavaScript code when a window/form element loses focus? onblur onload onunload onfocus Question No: 14 Which event handler executes the specified JavaScript code when a window/form element receives focus? onblur onload onunload onfocus Question No: 15 loop is a flow control statement that allows code to be executed repeatedly based on a given Boolean condition. For Do-While If-else While

Question No: 16 A B C D 4 ABC003 65 =c4=c4 Expression format in cell D4 is NOT correct. True False Question No: 17 for(var i=1; i<=2;i=i+1) { document.write( "Sorted Words:" + "<BR>" ) } Which of the following shall be the output of above code: Sorted Words: Sorted Words: Sorted Words: Sorted Words: Sorted Words: <BR> Sorted Words: <BR> Sorted Words: <BR> Sorted Words: <BR> Question No: 18

Data integrity, in Database management system is necessary because it: Refers to provide insecurity to the data Refers to provide security to the data Refers to maintaining the correctness of data Refers to maintaining the consistency of the data Question No: 19 Which of the following formula is used in spreadsheet for addition? C6+E6 =C6+E6 6+6=12 6+E6 Question No: 20 Which of the following keyword is used to jump out of switch statement as soon as the match is found? Default Else Jump

Break Question No: 21 How many types the string methods have? 1 2 3 Question No: 22 Which Internet Service is comparatively Slow but Inexpensive and Fast. E-mail Instant Messaging Web None of the given Question No: 23 Semantic web is. The extension of web Designed for both human beings and computers The extension of web and Designed for both human beings and computers None of the given

Question No: 24 Coding is the responsibility of Software designer Software developer Project manager None of given Question No: 25 Run time error occurs when. The complier compiles the programs The compiler ends the execution of the program The compiler start running the program The compiler finds a semantic error Question No: 26 Heuristics are. Intelligent systems Always ends with the solution of the problem Both of the given None of the given

Question No: 27 ( Marks: 2 ) What are application softwares? List down the names of three application softwares. Definition: Application Software are that software then can interact directory with the user for performance of respective type of work. Following are the types of Application Softwares:- AutoCAD and Corel Draw Business Software Productivity SW Games Software Question No: 28 ( Marks: 2 ) Why Local variable is preferred over Global variable? In my point of view Global variable has some advantage with Local variables is preferred due to the following reasons:- When we declare any global variable in web page then in case of error and logic it s very difficult to see on which line this variable is used and what s his value if we have more than 2000 lines and all the functions in web page using that Global Variable so Global variables can make the logic of a Web page difficult to understand. As we know we can use Global variable everywhere so Global variables also make the reuse and maintenance of your code much more complex. Question No: 29 ( Marks: 2 ) In JavaScript, what is event handling? What are the two types of events? In java script we can capture events on do some operation on the basis of that particular event. For example we want to load some data on web page then with the help of event handling we can do this operation by using onload event. We can put Event handlers in the body of web page and also in attributes of HTML. From the attribute we can call any JavaScript function that will do his operation and come back. Now we can also interact with server side with the help of AJAX in JavaScript function.

In-Line Event Handling We can place event handlers in the BODY part and also in HTML attributes the event handlers attributes consist of 3 parts the event handler, equal sign and a string of JavaScript statement enclosed in quotes (single or double). And one more thing these should be put in one line without newline due to this sophisticated event handling is not possible with in-line event handling. Question No: 30 ( Marks: 2 ) What is Structured Vector Graphics? This is a plug-in that is required to view swf (flash) files in the web browser Question No: 31 ( Marks: 3 ) What kind of new jobs are created because of computing? And which old professions are being eliminated? Due to computing where people are getting benefits from automated systems on the other hand the people that are with KHATA system or Manual system and they don t know about computers are eliminated due to this reason and people take place of many people. We can see in the offices where before computer if there are four person required now only one person is required for example with the help of database we can store more than thousand of information and only one person is managing the whole data that is DBA. In the old system many people are writing the data in registers and then its also very difficult to find the specific record. Now we can see companies are hiring:- Data Entry Operators System Engineers Software Developer DBA etc. Question No: 32 ( Marks: 3 )

What are Logic- or Time-Bombs? It execute the payload when predetermined event occurs For example use type particular phrase and particular data is reached. Question No: 33 ( Marks: 3 ) What do you mean by FTP or File Transfer Protocol? This protocol is used to upload the files on remote computers. This is used to transfer files between computer on TCP/IP network e.g. internet and now a day s many software are available for uploading files using FTP like Mozila FTP, cute FTP etc. Question No: 34 ( Marks: 5 ) Why should we, as computing professionals, be interested in studying the social implications of our creations? If we see our life then we can judge computing technology is changing our life fast if we compare with other technology. We should highlight the mistakes and successes of the past. We should learn then and select future direction accordingly. Computers are keep becoming more and more powerful and gaining more autonomy. Powerful Global Corporation. The network Organization Question No: 35 ( Marks: 5 ) How DoS attack is a cyber crime? For what cyber crime can be used? DoS is the crime but of a new type. A new type for policing system is required to tackle such crimes. Cyber Crime can be used to Damage a home computer, Bring down the Business, Weaken the financial and defense system of country. Question No: 36 ( Marks: 5 )

What are the key characteristics of internet? Write the names of any five. Student Info Student ID: Center: Exam Date: FINALTERM EXAMINATION Spring 2010 CS101- Introduction to Computing Ref No: 1346055 Time: 90 min Marks: 58 For Teacher's Use Only Q No. 1 2 3 4 5 6 7 8 Total Marks Q No. 9 10 11 12 13 14 15 16 Marks Q No. 17 18 19 20 21 22 23 24 Marks Q No. 25 26 27 28 29 30 31 32 Marks Q No. 33 34 35 36 Marks

Question No: 1 Analytical Engine is ------------------ An electrical machine A digital machine An analog machine A special purpose machine Question No: 2 Website design should NOT be. Unified Complex Consistent Predictable Question No: 3 TCP stands for. Total communication protocol Transmission control protocol Transfer control protocol Transfer collection protocol

Question No: 4 A vocabulary and set of grammatical rules for instructing a computer to perform specific tasks is called Software Programming language Device driver Interpreter Question No: 5 A is a meaningful, easy-to-remember label for an IP address. TCP address Domain name Network name VoIP Question No: 6 In spreadsheets, cell address A12 means. Row A, Cloumn 12 Row 12, Cloumn A Row 2,Cloumn A1 Row A1, Cloumn 2

Question No: 7 According to the heuristic, the number of defects remaining in a system after a given level of tests is proportional to. The number found on very first day. The number found during the development. The number found during the test. None of the given options. Question No: 8 Which one is the best option for designing a Medical Expert System? Rule Based System Genetic Algorithm Fuzzy Logic Neural Network Question No: 9 Command that allows you to recover form mistakes is called. Clear Edit Undo

Break Question No: 10 The document.write( ) method expects as its argument. Integer Float String Boolean Question No: 11 We use to stop Break-Ins. Scanners Intrusion detectors Utilities None of the given options Question No: 12 The developer report to in a development team. Team Lead Project Manager CEO IT Manager

Question No: 13 The key responsibilities of a project manager is. Planning and tracking of the project Arranging of the appropriate resources Client relationship management All of the given options Question No: 14 The key responsibilities of the architect of the project is. Technology selection High-level design Makes certain that the implementation remains true to the design All of the given options Question No: 15 The important attribute of image tag is. src image None of the given options alt

Question No: 16 onabort, onerror are the of the image object. Event Handler Properties Methods None of the given options Question No: 17 Now a days, users communicate with the computer using a consistent provided by the Operating System. Command-line interface Application Interface User Interface Protocol Question No: 18 One can browse documents residing on a remote computer using protocol. HTTP SMTP FTP TELNET

Question No: 19 Which of the following device can be used to control network traffic? Cable Connector Hub Repeater Question No: 20 User can remotely log on to a computer and can have a control over it like a local user using TelNet Protocol TelNet Protocol and connected to the user through TCP/IP network TelNet protocol and FTP TCP/IP and FTP Question No: 21 If(studentMarks>70); ( document.write( "Grade A"); } Which of following is correct format of above code: ( If(studentMarks>70); document.write( "Grade A");

}; If(studentMarks<>70) ( document.write( "Grade A"); } If(studentMarks>70) { document.write( "Grade A"); } None of above options Question No: 22 Which of the following language is object based but not object oriented language. javascript visual basic C++ C# Question No: 23 asin(x) stands for Asynchronous sine Alpha Sine Automated Sine

ArcSine Question No: 24 The output of POW (3, 2) is. 6 4 9 12 Question No: 25 The Right most portion or the third portion of the URL contains. Protocol Identifier Server Name Directory Name None of the given Question No: 26 Which Image format is known as Lossless original format. JPEG GIF Bitmap

Vector Question No: 27 ( Marks: 2 ) What is a function? Give one example. Answer: Function is a reusable code (group of statement) that is executed when the function is called. It is also known as sub-program. Function is normally defined in the head section of the code. Question No: 28 ( Marks: 2 ) What is an intelligent system? Answer: Intelligent systems are the programs developed to perform complicated jobs that reflect human brain and thoughts. If the algorithms are too much complex or can not be solved instantly then we can use such systems. Therefore the well intelligent system not only performs well but it has the capability to rectify any errors by himself if it occurs within his domain. The examples of intelligent systems are Robotics, Business Intelligence etc. Question No: 29 ( Marks: 2 ) What is meant by semantic error? Answer: It is an error which a developer encounters when a statement is executed but it was not intended by him (the developer). Such errors are very difficult to locate during testing. Mostly these occur during abnormal circumstances. It may be referred as the logical error.

Question No: 30 ( Marks: 2 ) What is best algorithm? Answer: Greedy algorithm is the best algorithm as it is n algorithm that always takes the best immediate, or local solution while finding an answer. Question No: 31 ( Marks: 3 ) How can we include images in a web page using HTML and Java script? Answer: Images can be included in HTML by employing <IMG> tag, below is the format of <IMG> <IMG src=url, alt=text height=pixels width=pixels align="bottom middle top"> Question No: 32 ( Marks: 3 ) What are the Sub categories of Artificial Intelligence? Briefly explain any two. Answer: 1. Robotics These are the machines which are computer programmed and perform work which was previously done by humans. They can be found in the manufacturing industry, the military, space exploration and medical applications. 2. Expert Systems These systems are designed to replace an expert. The medical expert system is an example of such system which can replace a Doctor/medical expert. Question No: 33 ( Marks: 3 ) What are the steps of working of TCP and IP protocols in internet transmission?

Answer: TCP divide messages in to many packets (capsulation) and sent these messages over the internet and IP route these messages on the internet to the correct destination and upon reaching the messages on its destination the messages are encapsulated. Question No: 34 ( Marks: 5 ) What is ARPANET and who developed it? Answer: ARPANET stands for Advanced Research Projects. The initial purpose was to communicate with and share computer resources among mainly scientific users at the connected institutions. In the beginning it was connected four universities and enabled scientists to share resources. It was headed by Dr. J.C.R. Licklider. Question No: 35 ( Marks: 5 ) Define professional ethics and its benefits with an example? Question No: 36 ( Marks: 5 ) Write JavaScript code for the following: Make a function comparewithten(value) Compare the function argument with 10 and display a message whether the value is less than, equal to or greater than 10. Final TERM EXAMINATION Spring 2010 CS101- Introduction to Computing (Session - 2) Note: MCQs in Blue are the sure answers and Yellow highlighted are Quarantined Question No: 1 breaks down the message to be sent over the internet into packets.

FTP HTTP TCP (page.no.317) IP Question No: 2 A protocol used for receiving email messages is called. URL Telnet POP3 (page.no.213) SMTP Question No: 3 Aliasing problem can be managed by the size of pixels. Reducing (page.no.236) Increasing Gaining Modifying Question No: 4 Variables allow us to manipulate data through the. Actual Value Reference (page.no.143) Length Name Question No: 5 The reserved word allows a determined action to be taken if the first condition is false. For While Else Switch Question No: 6 ERP is a type of. Entertainment software

Productivity software Business software Scientific software Question No: 7 What is/are the use/uses of Word processor? To write a letter To write Research paper or report To create address labels All of the given Question No: 8 Command that allows you to recover form mistakes is called. Clear Edit Undo Break Question No: 9 Automatic machines performing various tasks that were previously done by humans, are called. Robotics (page.no.244) Computers Decision Making Systems Autonomous Web Agents Question No: 10 The is connected to all other modules of the microprocessor. Control unit Memory unit Floating Point unit Arithmetic and Logic unit Question No: 11 Database consisting of two or more related tables, is called. Flat file database Object oriented database Tabular storage database

Relational database (page.no.263) Question No: 12 can be used for entering, editing, or viewing data, one record at a time. Queries Forms (page.no.263) Reports None of the given option Question No: 13 Distance learning has got a boost due to the. Easy communication Online interactive contents Flexibility All of the given options Question No: 14 DBMS supports data in terabytes. Personal Desktop Enterprise Single-user Question No: 15 After the DoS attack in year 2000, Yahoo servers were recovered in. 1 hour 2 hours 3 hours 4 hours Question No: 16 When web server is busy it gives the following message to the user : Time out Waiting Server busy None of the given options Question No: 17 To stop industrial espionage, we use. Private network Encryption

Network sniffer All of the given options (page.no.277) Question No: 18 based communication allows business entities to coordinate the activities of their globally spread units with greater accuracy. Intranet Internet Home LAN Question No: 19 onabort, onerror are the of the image object. Event Handler (page.no.286) Properties Methods None of the given options Question No: 20 Processed data is called. Information Data Entity Attribute Question No: 21 is a client program that uses HTTP to make requests to Web servers throughout the internet on behalf of the user. Web Application Web Browser (page.no.18) Internet Application

HTML Question No: 22 consists of cells arranged in rows & columns Spreadsheets Software Word processor Presentation Software Microsoft Paint Software Question No: 23 Flow control constructs in JavaScript includes: If-Else Loops and If -Else Switch and If-Else All of the given choices Question No: 24 Which is NOT true for JavaScript variable name? Student Roll_no_1111 For _schedule Question No: 25 In JavaScript, second element of an array has the index: 2 0 1 3 JavaScript Array Basics 5 May 2008... In this tutorial you learn what a JavaScript array is,... The first element hasan index of 0, the second element has an index of 1,... www.elated.com/articles/javascript-array-basics/ - Cached - Similar - Question No: 26 Which protocol is used to control other computer from our own computer? FTP NNTP TELNET (page.no.211) None of the given choices Question No: 27 occurs when a function calls itself. Recursion

Call by value Call by reference Parsing Recursion - Wikipedia, the free encyclopedia The function calls itself recursively on a smaller version of the input (n - 1) and multiplies the result of the recursive call by n, until reaching the... en.wikipedia.org/wiki/recursion - Cached - Similar - Question No: 28 Which function returns a randomly selected floating point number between 0 and 1? floor(x) ceil(x) random() round(x) Question No: 29 Using Java Script you can write a character at random location on screen By applying randomch() method With the help of String object With the help of random character property There is no built in approach in Java Script Question No: 30 The most used form tag is the <input> tag. True False Question No: 31 ( Marks: 1 ) What are the elements of website design? Any one Question No: 32 ( Marks: 1 ) What kind of information can be stored in a database? Question No: 33 ( Marks: 2 ) What is meant by universal access of internet services? Question No: 34 ( Marks: 2 ) What is the database? Question No: 35 ( Marks: 3 ) The event handler attribute consists of three parts. Write about each of them.

Question No: 36 ( Marks: 3 ) What is difference between Design and System Architecture? Question No: 37 ( Marks: 3 ) What are Trojan Horses? Question No: 38 ( Marks: 5 ) Differentiate between For and While loop by writing the syntax of both loops. Question No: 39 ( Marks: 5 ) Suppose we have a big project. Draw hierarchy of the people involved in the project? Question No: 40 ( Marks: 10 ) Write down output for the following JavaScript code. a) <script type="text/javascript"> document.write(math.sqrt(25)); // output? </script> b) <script type="text/javascript"> document.write(math.pow(5, 3)); // output? </script> c) <script type="text/javascript"> document.write(math.min(5, 3)); // output? </script> d) <script type="text/javascript"> document.write(math.max(5, 3)); // output? </script> e) <script type="text/javascript"> document.write(math.floor(9.87)); // output?

</script> Question No: 41 ( Marks: 10 ) Is tabular data storage better than flat file data storage? Justify your answer. Student Info StudentID: Center: ExamDate: FINALTERM EXAMINATION Fall 2010 CS101- Introduction to Computing (Session - 2) MC090401039 OPKST 2/25/2010 12:00:00 AM Ref No: 1115842 Time: 120 min Marks: 75 Question No: 1 The memory size of the Altair 8800 was 128 bytes 128 Kilo bytes 256 Kilo bytes 256 bytes Question No: 2 A named collection of properties (data, state) and methods (instruction, behavior) is called. Array Function Variable Object Question No: 3 JavaScript Variables are. Dynamically Typed Statically Typed Strong Typed None of the given options Question No: 4 Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called. Loop Sequence Condition

Array Question No: 5 Rule of thumb learned through trial and error is called. Design Heuristic Plan Aim Question No: 6 According to heuristic, if you can t explain it in minutes, either you don t understand it or it does not work. 10 2 5 4 Question No: 7 To store rounded number of 8.6 in a variable called "r_number", we write. r_numbers=maths.rounds(8.6) r_number=math.rounds(8.6) r_number=math.round(8.6) r_number=maths.round(8.6) Question No: 8 Using only HTML we can create Dynamic web pages Static web pages Both Static and Dynamic pages None of these Question No: 9 function returns the largest integer that is less than or equal to x. round(x) floor ceil abs(x) Question No: 10 ( Marks: 1 ) - Please choose one

Due to working at home, contact with the colleagues is, which may result in quality of work Reduced, Poorer Reduced, Better Increased, Poorer Increased, Better Question No: 11 The distance among families is because of spending more time on internet. Increased Expanded Contracted Decreased Question No: 12 When web server is busy it gives the following message to the user : Time out Waiting Server busy None of the given options Question No: 13 is designed for detecting viruses and inoculating. Antivirus Utility Trojan None of the given choices Question No: 14 The is becoming the preferred organizational structure for more and more organizations with the passage of time. Tree structured organizational model Network paradigm Hierarchical structure None of the given options Question No: 15 Planning and tracking of the project is the responsibility of the. Project Manager Architect Developer Chief Executive Officer Question No: 16 The responsibilities of the Team Lead includes. Planning and tracking of the project

Detailed design Professional development of team members All of the given options Question No: 17 team is responsible for a project after the specification s stage till the very end. Executive Architect Development HR Question No: 18 There are types of errors. 2 3 4 5 Question No: 19 are the computers that perform at or near the currently highest operational rate for computers. Minicomputers Microcomputers Supercomputers Personal Computers Question No: 20 Which one of these is NOT an example of storage devices? Tape RAM Floppy DVD Question No: 21 Forms can be submitted by using different methods 2 3 4 5 Question No: 22 Which is NOT true for JavaScript variable name? Student Roll_no_1111 For

_schedule Question No: 23 One can browse documents residing on a remote computer using protocol. HTTP SMTP FTP TELNET Question No: 24 Which one is the example of spreadsheet software? MS Word MS PowerPoint MS Excel MS Access Question No: 25 User can remotely log on to a computer and can have a control over it like a local user using TelNet Protocol TelNet Protocol and connected to the user through TCP/IP network TelNet protocol and FTP TCP/IP and FTP Question No: 26 Hardware malfunctions is related to Data updates Data integrity Data security Data accessibility Question No: 27 PowerBuilder falls in the category of. Assembly Languages 4-th Generation Languages Machine Languages High-Level Languages Question No: 28 Backbone is also called as. vbns BNS vhbns

HBNS Question No: 29 Global variables can make the logic of a web page. Difficult to understand Easier to understand and maintain Difficult to reuse and maintain Difficult to understand, reuse and maintain Question No: 30 In JavaScript: In order to display the text on browser Grade A, which of following statement is True. documentwrite( "Grade A") document.write( "Grade A"); document.write( "Grade && A"); document.write( "Grade && A"); Question No: 31 ( Marks: 1 ) What is bandwidth? Bandwidth is a capacity of communication channel of carrying data. Question No: 32 ( Marks: 1 ) What is My Personal Agent? A computer programe that work automatically and have voice interface Question No: 33 ( Marks: 2 ) For what purposes FTP is used in networks? To download or upload files / data to a remote computer Question No: 34 ( Marks: 2 ) How can you define a readable program? A program that is easy to read & understand also easy to maintain and enhance. Question No: 35 ( Marks: 3 ) What is the preferred organizational structure for the organization? The Network Organization: It is becoming the preferred organizational structure. Question No: 36 ( Marks: 3 ) How can you define a consistent web design? Why is it needed? A consistent web design is Easy understandable, not with heavy graphics, easy navigation. It is needed because most of the website views leave the site because of poor navigation and not easy to understand, text and design is not clear etc. Question No: 37 ( Marks: 3 ) Elaborate Vector or Object oriented graphics with atleast one example.

Vector treats everything that is drawn as object, they are resolution in dependent and relatively small file size. For example swg, svg, wmf. Question No: 38 ( Marks: 5 ) What are the advantages of multimedia presentations? Write any five. Multimedia presentation is a great tool for effective communication: Advantages: 1. Easy to make last minute change 2. More attractive 3. Can include animation, videos etc. 4. Better presentation easy to understandable for participants comparing to manual presentation. 5. Undo feature Question No: 39 ( Marks: 5 ) Can a human doctor be replaced by an Expert System? Give reasons to support your answer. Expert System is a computer system which simulates the knowledge and expertise of a human expert. Yes, a human doctor can be replaced by an Expert System. Following are the reasons to support my answer: 1. A large database of knowledge can be added to and kept up to date, it can store more knowledge than a person. 2. The Expert System cannot FORGET or get facts wrong. 3. It survives forever. There is no loss of knowledge as there is when a doctor retires. 4. The Expert System can access specialist knowledge that a doctor may not have. Question No: 40 ( Marks: 10 ) Explain the following issues of Data Management? (3+4+3) 1. Data entry 2. Data updates 3. Data security DATA ENTRY: There is new data entered every day. New customers are added every day.

Some of the data entry requires the manual entry into computer system New data entry needs to be entered correctly DATA UPDATES: Old titles must be removed regularly Data changes every time Prices change Transportation / shipping cost changes Customer personal data changes Schemes changing, new offers Every new entry needs to be entered correctly DATA SECURITY: All data in the system is very critical to its operation, the security of the customer s personal data is most important. Most of the hackers are always trying for that type of information specially Credit Card Numbers. This problem can be managed by using proper security arrangements and mechanisms that provides access to only authorized entities. System Security can be improved through, encryption, firewalls and updated Antivirus Softwares Question No: 41 ( Marks: 10 ) Write a note on the followings a. Image Preloading process b. Animated Gifs IMAGE PRELOADING PROCESS: The primary use of image preloading process is to download the image into the cache before it is actually needed to display. PROCESS: 1. An example of the image object is shaped using the NEW keyword 2. The src property of this instance is set equal to the filename of the image to be pre-loaded 3. This step starts the down-loading of the image into the cache without actually displaying 4. When a pre-loaded image is required to be displayed, the src property of the displayed image is set to the src property of pre fetched image ANIMATE GIFS:

We can save 16 gif images of the previous example in a single file in the form of an animated gif, and then used it in a regular <IMG> tag to display a moving image. However, JavaScript provide better control over the sequencing and the gap between the individual images.