7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
1/86
Question # 1 of 10 ( Start time: 05:12:59 PM ) TotalMarks: 1 Global variables are:Select correct option:Visible everywhere on the web pageVisible only in the block in which they aredeclared Visible only in the main codeNone of the given choicesQuestion # 2 of 10 ( Start time: 05:13:37 PM ) Total Marks: 1Infection propagation and Actual destructive are the components of
_______________ Select correct option:TransmissionmechanismPayloadWormsTrojan HorseQuestion # 4 of 10 ( Start time: 05:14:53 PM ) Total Marks: 1
__________ is a special purpose computer that connects and translatesbetween network that use different communication protocols.Select correct option:BridgeRouterGatewayNone of the given choicesGatewayA special-purpose computer that connects and translates between networks that usedifferent communications protocols
Question # 5 of 10 ( Start time: 05:15:51 PM ) Total
Marks: 1 The solution of the Mail Bombing is________Select correct option:FilteringDo not acceptemails eMailfilteringThere in no solution for it
Question # 8 of 10 ( Start time: 05:17:34 PM ) Total Marks: 1MATH functions are accessed by referring to various ______________ofthe Math object Select correct option:FunctionsEventsPropertiesMethodsIn addition to the simple arithmetic operations (e.g. +, *, etc.) JavaScript supportsseveral advanced mathematical operations as wellNotationaly, these functions are accessed by referring to various methods of the Math objectQuestion # 7 of 10 ( Start time: 05:16:57 PM ) Total Marks: 1
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
2/86
The color of each pixel is generally represented in the form of a__________. Select correct option:DupletTripletBoth a & bNone of theseRule of thumb learned through trial & erroris called Select correct option:HeuristicMistakeCommonsenseExperienceQuestion # 9 of 10 ( Start time: 05:18:36 PM ) TotalMarks: 1 SCSI stands for:Select correct option:Small Computer SystemInterfaceSystem Common SmallIntegration
Silicon Computer SystemInterfaceNone of the given choicesSCSIA port that's faster than the serial and parallel ports but slower and harder to configurethan the newerUSB port. Also know as the Small Computer System Interface.A high-speed connection that
http://vustudents.ning.com
http://vustudents.ning.com/http://vustudents.ning.com/http://vustudents.ning.com/7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
3/86
CS101 Solved MCQShttp://vustudents.ning.com
Question # 1 of 10 ( Start time: 05:21:25 PM ) TotalMarks: 1 Internet is an example of ______________network.Select correct option:PrivatePublicBoth Private and PublicNone of the given choicesQuestion # 3 of 10 ( Start time: 05:22:43 PM ) TotalMarks: 1 Algorithm is a ____________________Select correct option:Definition of a problemSequence of steps to solve aproblem Understanding of aproblemSolving a problemQuestion # 4 of 10 ( Start time: 05:23:52 PM ) TotalMarks: 1 A group of information is called
__________________Select correct option:FileDatabaseRecordFieldQuestion # 5 of 10 ( Start time: 05:24:17 PM ) Total Marks: 1___________________ is a branch f computer science concerned withmanipulating and enhancing computer graphics.Select correct option:Image HandlingImageProcessingImageEngineeringNone of theseQuestion # 6 of 10 ( Start time: 05:25:34 PM ) Total Marks: 1
__________has changed our way of life like no other
technology. Select correct option:
ComputationaltechnologyComputer technologyComputing technologyNone of the AboveQuestion # 7 of 10 ( Start time: 05:26:27 PM ) Total Marks: 1
http://vustudents.ning.com
http://vustudents.ning.com/http://vustudents.ning.com/http://vustudents.ning.com/http://vustudents.ning.com/http://vustudents.ning.com/http://vustudents.ning.com/7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
4/86
CS101 Solved MCQShttp://vustudents.ning.com
Sophisticated event handling is not possible with _______________event handling Select correct option:Off-LineIn-LineOut-LineNon of the given choicesQuestion # 9 of 10 ( Start time: 05:28:30 PM ) Total Marks: 1There are __________ popular schemes to reduce the number of bytes thatare required for storing graphics.Select correct option:432None of theseA number of clever schemes have been invented to reduce the number of bytes that arerequired for storing graphics. 2 popular ones:Color mappingDitheringQuestion # 10 of 10 ( Start time: 05:30:01 PM ) TotalMarks: 1 The internet-society is considered underSurveillance because: Select correct option:While surfing, we are being watched, constantlyOur every click is recorded and analyzed to extract patterns and behaviors Webcams are becoming common. Providing a cheap way for parents to watchtheir children's every move
All of the givenWhich of the following is incorrect for making designelements legible? Select correct option:Elements should be large enoughElements must contrast sufficientlyRelated elements should be visuallygrouped Elements should have novisual focus25.10 Making Display Elements Legible:1. Designing (arranging) Display ElementsElements must be large enough to be processed visually
http://vustudents.ning.com
http://vustudents.ning.com/http://vustudents.ning.com/http://vustudents.ning.com/http://vustudents.ning.com/http://vustudents.ning.com/http://vustudents.ning.com/7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
5/86
CS101 Solved MCQShttp://vustudents.ning.com
Elements must contrast sufficiently with their backgroundsRelated elements should be visually grouped through the use of space, color, orgraphicalboundariesThe relative levels of importance among elements in a display should be revealed graphicallyQuestion # 2 of 10 ( Start time: 05:03:37 PM ) Total Marks: 1 1. Function is also known as
______________. Select correct option:subprogramproceduresubroutine
All ofgivenFunction:A group of statements that is put together (or defined) once and then can be used (byreference) repeatedly on a Web page Also known as subprogram, procedure, subroutine
In _____________ TCP\IP protocols became the only set of protocols used onthe ARPANET. Select correct option:197319831972None of the given choicesE-mail system has ______ component(s)1983 - The TCP/IP protocols becomes the only set of protocols used on the ARPANETThis sets a standard for all networks, and generates the use of the term Internet as the netof nets
ARPANET splits into two nets to keep military & non-military network sites separate:ARPANET andMILNETSelect correctoption: E-mailclientSMTPserverPOP3server
All of the given choices_______ / / /______/ A Parallelogram (Tilted rectangle) represents the
________________ flow chart element.Select correctoption:ProcessInput orOutputDecisionConnector
http://vustudents.ning.com/http://vustudents.ning.com/http://vustudents.ning.com/7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
6/86
The ________virus may display an annoying, butharmless message Select correct option:MaliciousNeutralHelpfulDoSThe internet communities are
___________. Select correct option:Geographicalbased InterestbasedCountrybasedReligionbased
Question # 3 of 10 ( Start time: 04:53:30 PM ) Total Marks: 1Autonomous Web Agents are also known as_________________ Select correct option:Mobile AgentsSoftbotsBoth "Mobile Agents" &"Softbots" None of these
A communication protocol is a __________that governs the flow of informationover a network. Select correct option:Set of MethodsSet ofProtocolsSet of rulesNone of the given choicesProtocol-Rules governing communications over the networkThe organizations are learning that business can be done in a more effectivemanner if emphasis is placed upon ______________.Select correct option:CooperationSharedresponsibilityNetworking
All of the givenQuestion # 7 of 10 ( Start time: 04:57:19 PM ) TotalMarks: 1 Monitor is an example of
__________devicesSelect correct option:
OutputInputProcessingNone of the given choicesThe code in the ________ portion is the right choice for developing largerJavaScript scripts Select correct option:Body
At EndHeadSeparate
____________________ based on the principles of the logical reasoningability of humans. Select correct option:Genetic AlgorithmsRule-based
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
7/86
SystemsFeed-ForwardNetworkNone of theseRulebased Systems (1):Based on the principles of the logical reasoning ability of humansThe key benefit of VPNs over conventionalPNs is: Select correct option:SecurityEfficiency
LowerCostNone of the given choicesIn __________________ automatic machines perform various tasks thatwere previously performed by humans.Select correctoption: FuzzyLogicRoboticsRule basedSystems None ofthese
Avoid __________ to ensure readability ofweb page Select correct option:Overuse of bold and italics
http://vustudents.ning.com
http://vustudents.ning.com/http://vustudents.ning.com/http://vustudents.ning.com/7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
8/86
Use of paragraphsUse of white spaceUse of contrast colors
Using ____, a user can remotely log on to a computer (connected to the userthrough a network,e.g. Internet) & have control over it like a local user, including control over runningvariousprograms ?Select correct option:FTPTCPTelnet ProtocolNone of the given choicesTelnet ProtocolUsing Telnet, a user can remotely log on to a computer(connected to the users through aTCP/IP network, e.g. Internet) & have control over it like a local user, including control
over running various programs In contrast, FTP allows file operations onlyTypical use: Configuring and testing of a remote Web serverDoS is________ ?Select correct option:CrimeCybercrimeNot a crime
A software__________ enables users located at far-way locations to easily shareinformation with others located all over the world.Select correct option:ProtocolInternetCommunicationChannelNone of the givenchoices
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
9/86
Cyber crime can be used toSelect correct option:Damage a homecomputerBring down a businessWeaken the telecom, financial, or even defense-related systemsof a country All of the given
___ provides a simple, consistent way for applications to interact with the HWwithout having to know all the details of the HW
Explorer.exe System Files Operating System Application Software
Communication protocol is a __________that governs the flow of informationover a network
Set of methods
Set of protocols Set of rules Device
_____________ team is responsible for the maintenance, expansion ,improvement of the infrastructure consisting of workstations, networkingequipment, software and network security.
Support Configuration Management Quality Assurance Developer
_____________ team consists on the sharpest technical minds in the company.
Architecture Business Development Configuration Management Developer
_______________ is responsible for day to day operations. CEO COO CMSO Developer
Using Java Script you can write a character at random location on screen By applying randomCh() method With the help of String object With the help of random character property There is no built in approach in Java Script
Question No: 2 ( Marks: 1 ) - Pleasechoose oneBlue Pacific is a name of _____computer. Mini
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
10/86
Desktop Micro SuperQuestion No: 3 ( Marks: 1 ) - Pleasechoose one Monte Carlo algorithm is anexample of Randomized algorithm Greedy algorithm both greedy and
randomized HeuristicsQuestion No: 4 ( Marks: 1 ) - Please choose one
A set of stand alone productivity applications designed to work together known as __ Productivity software suites Compiled software Secure software Intelligent software
__________% of the users have left websites in frustration due to poor navigation. 40 62 83 91In JavaScript, a variable declaration is Optional Mandatory
Notallowed None of the givenA protocol used for receiving email messages is called ____________. URL Telnet
http://vustudents.ning.com
http://vustudents.ning.com/http://vustudents.ning.com/http://vustudents.ning.com/7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
11/86
CS101 Solved MCQShttp://vustudents.ning.com
POP3 SMTPwhich one is correct? onUnload onUnLoad onUNLOAD All of the aboveSerial arrangement in which things follow logical order or a recurrentpattern, such as statements executing one by one, is called __________. LoopSequenceCondition ArrayVariables allow us to manipulate data through the ___________.Actual ValueReference Length NameFuzzy logic is based on ____________. Ground factsExperience Practice ApproximationWord Processor is a _________________ System Software ApplicationSoftware Device UtilityIn the old days, databases did NOT support ____________. NumberBoolean Video TextIn tabular storage, fields placed in a particular row are strongly ___________.
http://vustudents.ning.com/http://vustudents.ning.com/http://vustudents.ning.com/7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
12/86
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
13/86
Independent DependentInterrelatedInconsistent
_____________ technique can be used to create smooth animations or todisplay one of several images based on the requirement. Image downloading Imagepreloading Imageuploading Imagepostloading
Tree structured organizationalmodel Network paradigm Hierarchical structure None of the given optionsThe group of technologies concerned with the capturing, processing andtransmission of information in the digital electronic form is called
_____________. TelecomEngineering ComputerEngineering Computer Science InformationTechnologyTCP stands for ________. Transfer Center protocol Transmission ControlProtocol Transmission CenterProtocol Telephone CenterProtocolA collection of data organized in such a way that the computer canquickly search for a desired data item is known as : Retrieving DatabaseInformation DBMS
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
14/86
______ is simply a fast port that lets you connect computer peripheralsand consumer electronics to your computer without restart. FreewareShareware Firewire FirmwareStructures, in which another list starts before the first list is finished, are called: Multiple Lists Nested Lists Ordered Lists Un-ordered ListsThe key property of the Array object in JavaScript is ValueLength Name All of the given choices
Which one is the example of spreadsheet software ? MS Word MSPowerPoint MS Excel MS Access
The Encryption of data is related to
http://vustudents.ning.com
http://vustudents.ning.com/http://vustudents.ning.com/http://vustudents.ning.com/7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
15/86
CS101 Solved MCQShttp://vustudents.ning.com
Data updates Data security Data integrity Data accessibility
_____ is the process of analyzing large databases to identify patterns. Data normalization Datamanagement Data Mining None of the given optionsWhich is the user-friendly way of presenting data ? Query FormReport All of the given optionsJavaScript function fixed() has equivalent HTML tag-set ____ ..... Tags always placed between the and tags of a Web page True FalseJava script has ----------------- ability to create and draw graphics. Limited Versatile Medium Not at allWhich of the following is incorrect for making design
elements legible? Select correct option:
Elements should be large enoughElements must contrast sufficientlyRelated elements should be visually grouped
http://vustudents.ning.com/http://vustudents.ning.com/http://vustudents.ning.com/7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
16/86
Elements should have no visual focus
1. Function is also known as
______________. Select correct option:
subprogramprocedure
subroutine
All of
given
In _____________ TCP\IP protocols became the only set of protocolsused on the ARPANET.
Select correct
option:
19731983
1972None of the given choices
E-mail system has ______
component(s) Select correct
option:
E-mail clientSMTP
server
POP3
server
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
17/86
All of the given choices
_______ / / /______/ A Parallelogram (Tilted rectangle) represents the________________ flow chart element.Select correct option:ProcessInput or
Output
DecisionConnector
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
18/86
The ________virus may display an annoying, but
harmless message Select correct option:
MaliciousNeutral
Helpful
DoS
The internet communities are
___________. Select correct option:
Geographical
based Interest
basedCountry
based
Religion
based
An algorithm that always takes the best immediate or local solution while
finding an answer is called____. Deterministic Algorithm Non deterministic Algorithm Greedy Algorithm Randomized Algorithm
Which of the following command allows you to recover form mistakes in MS
Word? Clear
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
19/86
Edit Undo Break
A ____________ operating system allows many users to takeadvantage of the computer's resources, simultaneously
Single user Multi- user Single tasking
Multi taskingNetwork Interface Card is an __________ device
Input Output Input/Output Storage
The decimal equivalent of binary 1000 is 7
8 9 10
Which of the following is NOT RDBMS software? My Sql MS Excel Oracle SQL Server
A computer virus is a Software that saves the computer from being damaged. Application software that helps to make different type of viruses and
worms Program that spreads itself and destroys other program Program that corrects the problems in your computer
What will be the result of a?a = Math.abs(-23)
23 -23 23.0 2.3
A Special program required to view swf (Shockwave Flash) files in webBrowser is called
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
20/86
TFlash Vflash plug-in None of the given options
Using Java Script you can write a character at random location on screen
By applying randomCh() method With the help of String object With the help of random character property
There is no built in approach in Java Script
If incorrectly we enter the negative age it is check by
Limit Integrity Type Integrity Referential Integrity
Physical Integrity
Which protocol is use to transfer a file over the network?
UDP FTP
TCP
OSI
One can send an email message to a remote computer using _______protocol
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
21/86
HTTP
SMTP
FTP TELNET
In a System having many parts to be designed, one should always do the_____ first
Hard part Simple part Development part
Quality part
Flow control constructs in JavaScript includes:
If-Else Loops and If-Else Switch and If-Else All of the given choices
___ provides a simple, consistent way for applications to interact with theHW without having to know all the details of the HW
Explorer.exe System Files Operating System Application Software
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
22/86
Machine language is also called
Assembly Language Binary Language
High Level Language HTML Language
_________ is the best known builder for supercomputers.
Sun Cray Research
Microsoft Apple
Communication protocol is a __________that governs the flow ofinformation over a network
Set of methods Set of protocols
Set of rules
Device
_____________ team is responsible for the maintenance, expansion ,improvement of the infrastructure consisting of workstations, networkingequipment, software and network security.
Support
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
23/86
Configuration Management
Quality Assurance Developer
_____________ team consists on the sharpest technical minds in thecompany.
Architecture Business Development Configuration Management
Developer
_______________ is responsible for day to day operations.
CEO COO
CMSO Developer
One of the key responsibilities of the ___________ is client relationshipmanagement.
Project Manager Team Lead Developer Quality Assurance Engineer
What is the major problem with flash based website?
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
24/86
Its two heavy Cannot be indexed
Less attractive
Inaccessible
Which of the following is NOT an event handler for image object?
onAbort onError
onLoad
onUser
The organizations are learning that business can be done in a moreeffective manner if emphasis is placed upon ___________.
Cooperation
Shared responsibility Networking All of the given options
a = Math.abs(-23)What will be the value of a ?
23 -23
23.0
2.3
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
25/86
ERP is a type of __________________ . Entertainment software Productivity software
Business software
Scientific software
In Genetic Algorithm the most important thing you should know, is the___________.
Procedure Recognition of a good solution
Different techniques None of the given options
According to a popular heuristic, success is defined by ___________.
The user The builder Both user and builder None of the given options
Rule of thumb learned through trial and error is called ___________.
Design Heuristic
PlanAim
JavaScript Variables are____________.
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
26/86
Dynamically Typed Statically Typed
Strong Typed None of the given options
Which of the following application are collections of cells?
Word Excel PowerPoint Outlook Express
The browser breaks down the URL into ________ parts.
2 3
4
5
A named collection of properties (data, state) and methods (instruction,behavior) is called ____________.
Array Function
Variable
Object
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
27/86
In JavaScript, a variable declaration is Optional Mandatory Not allowed None of the givenA protocol used for receiving email messages is called ____________. URL Telnet POP3 SMTPwhich one is correct? onUnload onUnLoad onUNLOAD All of the above
Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called __________.
Loop Sequence Condition ArrayVariables allow us to manipulate data through the ___________.
Actual Value Reference Length NameFuzzy logic is based on ____________.
Ground facts Experience Practice Approximation
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
28/86
Word Processor is a _________________ System Software Application Software Device UtilityIn the old days, databases did NOT support ____________. Number Boolean Video TextIn tabular storage, fields placed in a particular row are strongly
___________.
Independent Dependent Interrelated Inconsistent
_____________ technique can be used to create smooth animations or todisplay one of several images based on the requirement.
Image downloading Image preloading Image uploading Image postloadingThe ____________ is becoming the preferred organizational structure for
more and more organizations with the passage of time.
Tree structured organizational model Network paradigm Hierarchical structure None of the given optionsThe group of technologies concerned with the capturing, processing and
transmission of information in the digital electronic form is called _____________.
Telecom Engineering Computer Engineering Computer Science Information TechnologyTCP stands for ________.
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
29/86
Transfer Center protocol Transmission Control Protocol Transmission Center Protocol Telephone Center ProtocolA collection of data organized in such a way that the computer can quicklysearch for a desired data item is known as : Retrieving Database Information DBMS
______ is simply a fast port that lets you connect computer peripherals andconsumer electronics to your computer without restart.
Freeware Shareware Firewire
FirmwareStructures, in which another list starts before the first list is finished, arecalled:
Multiple Lists Nested Lists Ordered Lists Un-ordered Lists
The key property of the Array object in JavaScript is
Value Length Name All of the given choicesWhich one is the example of spreadsheet software ?
MS Word MS PowerPoint MS Excel MS Access
The Encryption of data is related to
Data updates Data security
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
30/86
Data integrity Data accessibility
_____ is the process of analyzing large databases to identify patterns.
Data normalization Data management Data Mining None of the given optionsWhich is the user-friendly way of presenting data ? Query Form Report All of the given options Tags always placed between the and tags of aWeb page
True FalseJava script has ----------------- ability to create and draw graphics. Limited Versatile Medium Not at allWhich of the following is incorrect for making design elements legible?
Select correct option:
Elements should be large enough
Elements must contrast sufficientlyRelated elements should be visually grouped
Elements should have no visual focus
Function is also known as ______________.
Select correct option:
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
31/86
subprogramprocedure
subroutine
All of given
In _____________ TCP\IP protocols became the only set of protocols usedon the ARPANET.
Select correct option:
19731983
1972
None of the given choices
E-mail system has ______ component(s)
Select correct option:
E-mail clientSMTP server
POP3 serverAll of the given choices
_______ / / /______/ A Parallelogram (Tilted rectangle) represents the________________ flow chart element.Select correct option:ProcessInput or Output
DecisionConnector
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
32/86
The ________virus may display an annoying, but harmless message
Select correct option:
MaliciousNeutral
Helpful
DoS
The internet communities are ___________.
Select correct option:
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
33/86
Geographical basedInterest basedCountry based
Religion based
which one is correct? onUnload onUnLoad onUNLOAD All of the above
Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called __________.
Loop Sequence Condition ArrayVariables allow us to manipulate data through the ___________.Actual Value Reference Length NameFuzzy logic is based on ____________.
Ground facts Experience Practice Approximation
Word Processor is a _________________ System Software
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
34/86
Application Software Device UtilityIn the old days, databases did NOT support ____________.
Number Boolean Video
Text
In tabular storage, fields placed in a particular row are strongly___________.
Independent Dependent Interrelated Inconsistent
_____________ technique can be used to create smooth animations or todisplay one of several images based on the requirement.
Image downloading Image preloading
Image uploading Image postloadingThe ____________ is becoming the preferred organizational structure for
more and more organizations with the passage of time.
Tree structured organizational model Network paradigm Hierarchical structure None of the given optionsThe group of technologies concerned with the capturing, processing andtransmission of information in the digital electronic form is called
_____________.
Telecom Engineering Computer Engineering Computer Science Information TechnologyTCP stands for ________.
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
35/86
Transfer Center protocol Transmission Control Protocol Transmission Center Protocol Telephone Center ProtocolA collection of data organized in such a way that the computer can quickly
search for a desired data item is known as : Retrieving Database Information DBMS
______ is simply a fast port that lets you connect computer peripheralsand consumer electronics to your computer without restart.
Freeware Shareware
Firewire FirmwareStructures, in which another list starts before the first list is finished, arecalled:
Multiple Lists Nested Lists Ordered Lists Un-ordered ListsThe key property of the Array object in JavaScript is
Value Length Name All of the given choicesWhich one is the example of spreadsheet software ?
MS Word MS PowerPoint MS Excel MS Access
_____ is the process of analyzing large databases to identify patterns.
Data normalization
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
36/86
Data management Data Mining None of the given optionsWhich is the user-friendly way of presenting data ?
Query Form
Report All of the given optionsJavaScript function fixed() has equivalent HTML tag-set ____
.. . .. Tags always placed between the and tags of aWeb page
True FalseJava script has ----------------- ability to create and draw graphics. Limited Versatile
Medium Not at allInternet is an example of ______________ network.
PrivatePublicBoth Private and PublicNone of the given choices
Algorithm is a ____________________
Definition of a problem
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
37/86
Sequence of steps to solve a problem
Understanding of a problemSolving a problem
A group of information is called __________________
FileDatabase
RecordField
___________________ is a branch of computer science concerned withmanipulating and enhancing computer graphics.
Image HandlingImage ProcessingImage EngineeringNone of these
__________has changed our way of life like no other technology.
Computational technologyComputer technology
Computing technology
None of the Above
Sophisticated event handling is not possible with _______________ eventhandling
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
38/86
Off-Line
In-Line
Out-LineNon of the given choices
There are __________ popular schemes to reduce the number of bytes thatare required for storing graphics.
43
2None of these
The internet-society is considered under Surveillance because:
While surfing, we are being watched, constantly
Our every click is recorded and analyzed to extract patterns and behaviorsWebcams are becoming common. Providing a cheap way for parents to watchtheir children's every move
All of the given
To improve the time for scanning a web page, text should be ___________. Centered
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
39/86
Left Aligned
Right Aligned
Staggered
Communications on the internet is controlled by a set of two protocolswhich are ____________.
IMAP and SMTP
FTP and HTTP
TCP and IP
TCP and HTTP
FTP stands for __________. File transmission protocol
File transmission path
File transfer protocol
Fine transfer path
A named collection of properties (data, state) and methods (instruction,behavior) is called ____________.
Array Function
Variable
Object
Anchor tag denoted by is used to create
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
40/86
Address Hyperlink
Paragraph
Title
tag is used to
underline text
end the line create ordered list create unordered list
The browser breaks down the URL into ________ parts. 2 3
4
5
Which one of the following is NOT a primary color? Red Green
Yellow
Blue
According to a popular heuristic, success is defined by ___________. The user The builder
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
41/86
Both user and builder None of the given options
The idea of Neural Networks field is based upon ______________. Human nature Human brain
Human culture
Human actions
ERP is a type of __________________ . Entertainment software Productivity software
Business software
Scientific software
__________ are those programs in which the flow of the program isdetermined by the user's actions (mouse clicks, key presses) or messagesfrom other programs.
Event called programs Event processed programs
Event driven programs
Event declared programs
Automatic machines performing various tasks that were previously doneby humans, are called ____________.
Robotics Computers
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
42/86
Decision Making Systems
Autonomous Web Agents
country=Hello Pakistan;document.write(country.charAt(6));
The out put of the above statement is _____________. o P
a
k
The software used for the scanning of internet severs, is called__________.
Wscan Mscan
Sscan
Vscan
Adding images to html page, we use___________ tag.
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
43/86
The group of technologies concerned with the capturing, processing andtransmission of information in the digital electronic form is called
_____________.
Telecom Engineering
Computer Engineering
Computer Science
Information Technology
The responsibilities of the Team Lead includes_____________.
Planning and tracking of the project Detailed design Professional development of team members
All of the given options
When the packets reach at destination, __________ reassembles them intooriginal message.
Protocol TCP IP NIC
Many developers write the _________ first and then incrementally converteach line into _________.
Real code & Pseudo code
Pseudo code & Real code
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
44/86
Real code & Artificial code
None of the given options
Machine language is also called
Assembly Language Binary Language High Level Language
HTML Language
In JavaScript, second element of an array has the index:
2
0 1
3Each element in an array is given an index, which is an integer value between
0 and one less than the length of the array. The first element has an index of 0,the second element has an index of 1, and so on.
One can download or upload files to a remote computer using ________protocol.
HTTP
SMTP
FTP TELNET
JavaScript ________ support drawing of graphics
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
45/86
Does Does not
Always
At times
A set of stand alone productivity applications designed to work togetherknown as ______________ .
Productivity software suites
Compiled software
Secure software
Intelligent software
Sophisticated event handling is not possible with _______________ eventhandling
Off-Line
In-Line
Out-LineNon of the given choicesAutonomous Web Agents are also known as _________________
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
46/86
Mobile AgentsSoftbotsBoth "Mobile Agents" & "Softbots"
None of these
A communication protocol is a __________that governs the flow ofinformation over a network.
Set of MethodsSet of Protocols
Set of rulesNone of the given choices
The organizations are learning that business can be done in a moreeffective manner if emphasis is placed upon ______________.
CooperationShared responsibility
NetworkingAll of the given
Monitor is an example of __________devicesOutputInput
ProcessingNone of the given choices
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
47/86
The code in the ________ portion is the right choice for developing largerJavaScript scripts
BodyAt End
HeadSeparate
____________________ based on the principles of the logical reasoningability of humans.
Genetic Algorithms
Rule-based Systems
Feed-Forward Network
None of these
The key benefit of VPNs over conventional PNs is:
SecurityEfficiency
Lower Cost
None of the given choicesAn algorithm that always takes the best immediate or local solution whilefinding an answer is called____.
DeterministicAlgorithm Non deterministic Algorithm Greedy Algorithm Randomized Algorithm
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
48/86
Which of the following command allows you to recover form mistakes in MS
Word? Clear Edit Undo Break
A ____________ operating system allows many users to take
advantage of the computer's resources, simultaneously Single user Multi- user Single tasking Multi tasking
Network Interface Card is an __________ device Input Output Input/Output
Storage
The decimal equivalent of binary 1000 is 7 8 9 10
Which of the following is NOT RDBMS software? My Sql MS Excel
Oracle SQL Server
A computer virus is a Software that saves the computer from being damaged. Application software that helps to make different type of viruses and
worms Program that spreads itself and destroys other program Program that corrects the problems in your computer
What will be the result of a?a = Math.abs(-23)
23
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
49/86
-23 23.0 2.3
A Special program required to view swf (Shockwave Flash) files in web
Browser is called
TFlash Vflash plug-in None of the given options
Using Java Script you can write a character at random location on screen
By applying randomCh() method With the help of String object With the help of random character property
There is no built in approach in Java Script
If incorrectly we enter the negative age it is check by
Limit Integrity Type Integrity Referential Integrity
Physical Integrity
Which protocol is use to transfer a file over the network?
UDP FTP
TCP
OSI
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
50/86
One can send an email message to a remote computer using _______
protocol
HTTP
SMTP
FTP TELNET
In a System having many parts to be designed, one should always do the_____ first
Hard part Simple part Development part
Quality part
Flow control constructs in JavaScript includes:
If-Else Loops and If-Else Switch and If-ElseAll of the given choices
___ provides a simple, consistent way for applications to interact with theHW without having to know all the details of the HW
Explorer.exe System Files
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
51/86
Operating System Application Software
Machine language is also called
Assembly Language
Binary Language High Level Language
HTML Language
_________ is the best known builder for supercomputers.
Sun Cray Research
Microsoft Apple
Communication protocol is a __________that governs the flow ofinformation over a network
Set of methods Set of protocols
Set of rules Device
_____________ team is responsible for the maintenance, expansion ,
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
52/86
improvement of the infrastructure consisting of workstations, networking
equipment, software and network security.
Support Configuration Management
Quality Assurance Developer
_____________ team consists on the sharpest technical minds in thecompany.
Architecture Business Development Configuration Management
Developer
_______________ is responsible for day to day operations.
CEO COO
CMSO Developer
One of the key responsibilities of the ___________ is client relationshipmanagement.
Project Manager
Team Lead Developer Quality Assurance Engineer
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
53/86
What is the major problem with flash based website?
Its two heavy Cannot be indexed
Less attractive
Inaccessible
Which of the following is NOT an event handler for image object?
onAbort onError
onLoad
onUser
The organizations are learning that business can be done in a moreeffective manner if emphasis is placed upon ___________.
Cooperation Shared responsibility
Networking All of the given options
a = Math.abs(-23)What will be the value of a ?
23
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
54/86
-23
23.0
2.3
ERP is a type of __________________ . Entertainment software Productivity software
Business software
Scientific software
In Genetic Algorithm the most important thing you should know, is the___________.
Procedure Recognition of a good solution Different techniques None of the given options
According to a popular heuristic, success is defined by ___________.
The user The builder Both user and builder None of the given options
Rule of thumb learned through trial and error is called ___________.
Design Heuristic
Plan
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
55/86
Aim
JavaScript Variables are ____________.
Dynamically Typed Statically Typed
Strong Typed None of the given options
Which of the following application are collections of cells?
Word Excel PowerPoint Outlook Express
The browser breaks down the URL into ________ parts.
2 3
4
5
A named collection of properties (data, state) and methods (instruction,behavior) is called ____________.
Array
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
56/86
Function
Variable
Object
In JavaScript, a variable declaration is Optional Mandatory Not allowed None of the givenA protocol used for receiving email messages is called ____________. URL Telnet POP3 SMTPwhich one is correct? onUnload onUnLoad onUNLOAD All of the above
Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called __________.
Loop Sequence Condition
Array
Variables allow us to manipulate data through the ___________.
Actual Value Reference Length Name
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
57/86
Fuzzy logic is based on ____________.
Ground facts Experience Practice Approximation
Word Processor is a _________________ System Software Application Software Device UtilityIn the old days, databases did NOT support ____________.http://groups.google.com/group/vuZs Number Boolean
Video TextIn tabular storage, fields placed in a particular row are strongly
___________.
Independent Dependent Interrelated Inconsistent
_____________ technique can be used to create smooth animations or todisplay one of several images based on the requirement.
Image downloading Image preloading Image uploading Image postloadingThe ____________ is becoming the preferred organizational structure for
more and more organizations with the passage of time. Tree structured organizational model Network paradigm Hierarchical structure None of the given optionsThe group of technologies concerned with the capturing, processing andtransmission of information in the digital electronic form is called
_____________.
http://groups.google.com/group/vuzs/http://groups.google.com/group/vuzs/http://groups.google.com/group/vuzs/7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
58/86
Telecom Engineering Computer Engineering Computer Science Information TechnologyTCP stands for ________. Transfer Center protocol Transmission Control Protocol Transmission Center Protocol
Telephone Center Protocol
A collection of data organized in such a way that the computer can quicklysearch for a desired data item is known as : Retrieving Database Information DBMS
______ is simply a fast port that lets you connect computer peripherals andconsumer electronics to your computer without restart.
Freeware Shareware Firewire FirmwareStructures, in which another list starts before the first list is finished, arecalled:
Multiple Lists Nested Lists Ordered Lists Un-ordered Lists
The key property of the Array object in JavaScript is
Value Length
Name All of the given choicesWhich one is the example of spreadsheet software ?
MS Word MS PowerPoint MS Excel MS AccessThe Encryption of data is related to
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
59/86
Data updates Data security Data integrity Data accessibility
_____ is the process of analyzing large databases to identify patterns.
Data normalization Data management
Data Mining
None of the given optionsWhich is the user-friendly way of presenting data ?
Query Form Report All of the given options Tags always placed between the and tags of a
Web page
True FalseJava script has ----------------- ability to create and draw graphics. Limited Versatile Medium Not at allWhich of the following is incorrect for making design elements legible?
Select correct option:
Elements should be large enoughElements must contrast sufficientlyRelated elements should be visually grouped
Elements should have no visual focus
Function is also known as ______________.
Select correct option:
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
60/86
subprogramprocedure
subroutine
All of given
In _____________ TCP\IP protocols became the only set of protocols used
on the ARPANET.
Select correct option:
19731983
1972None of the given choices
E-mail system has ______ component(s)Select correct option:
E-mail clientSMTP server
POP3 serverAll of the given choices
_______ / / /______/ A Parallelogram (Tilted rectangle) represents the________________ flow chart element.Select correct option:ProcessInput or Output
Decision
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
61/86
ConnectorThe ________virus may display an annoying, but harmless message
Select correct option:
MaliciousNeutral
Helpful
DoS
The internet communities are ___________.
Select correct option:
Geographical based
Interest basedCountry based
Religion based
which one is correct? onUnload onUnLoad onUNLOAD All of the above
Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called __________.
Loop Sequence Condition
Array
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
62/86
Variables allow us to manipulate data through the ___________.
Actual Value Reference Length Name
Fuzzy logic is based on ____________.
Ground facts Experience Practice ApproximationWord Processor is a _________________ System Software Application Software Device UtilityIn the old days, databases did NOT support ____________.
Number Boolean Video
TextIn tabular storage, fields placed in a particular row are strongly
___________.
Independent Dependent Interrelated Inconsistent
_____________ technique can be used to create smooth animations or todisplay one of several images based on the requirement.
Image downloading Image preloading Image uploading Image postloadingThe ____________ is becoming the preferred organizational structure for
more and more organizations with the passage of time.
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
63/86
Tree structured organizational model Network paradigm Hierarchical structure None of the given optionsThe group of technologies concerned with the capturing, processing andtransmission of information in the digital electronic form is called
_____________.
Telecom Engineering Computer Engineering Computer Science Information TechnologyTCP stands for ________. Transfer Center protocol Transmission Control Protocol
Transmission Center Protocol Telephone Center Protocol
A collection of data organized in such a way that the computer can quicklysearch for a desired data item is known as : Retrieving Database Information DBMS
______ is simply a fast port that lets you connect computer peripheralsand consumer electronics to your computer without restart.
Freeware Shareware Firewire FirmwareStructures, in which another list starts before the first list is finished, arecalled:
Multiple Lists Nested Lists Ordered Lists Un-ordered ListsThe key property of the Array object in JavaScript is
Value
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
64/86
Length Name All of the given choicesWhich one is the example of spreadsheet software ?
MS Word MS PowerPoint MS Excel MS Access
_____ is the process of analyzing large databases to identify patterns.
Data normalization Data management Data Mining None of the given optionsWhich is the user-friendly way of presenting data ?
Query Form Report All of the given optionsJavaScript function fixed() has equivalent HTML tag-set ____
.. . .. Tags always placed between the and tags of aWeb page
True False
Java script has ----------------- ability to create and draw graphics. Limited Versatile Medium Not at allInternet is an example of ______________ network.
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
65/86
PrivatePublicBoth Private and Public
None of the given choices
Algorithm is a ____________________
Definition of a problemSequence of steps to solve a problem
Understanding of a problemSolving a problem
A group of information is called __________________
FileDatabase
RecordField
___________________ is a branch of computer science concerned withmanipulating and enhancing computer graphics.
Image HandlingImage Processing
Image Engineering
None of these
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
66/86
__________has changed our way of life like no other technology.
Computational technologyComputer technology
Computing technology
None of the Above
Sophisticated event handling is not possible with _______________ eventhandling
Off-Line
In-Line
Out-LineNon of the given choices
There are __________ popular schemes to reduce the number of bytes that
are required for storing graphics.
43
2None of these
The internet-society is considered under Surveillance because:
While surfing, we are being watched, constantlyOur every click is recorded and analyzed to extract patterns and behaviors
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
67/86
Webcams are becoming common. Providing a cheap way for parents to watchtheir children's every move
All of the given
To improve the time for scanning a web page, text should be ___________. Centered Left Aligned
Right Aligned
Staggered
Communications on the internet is controlled by a set of two protocolswhich are ____________.
IMAP and SMTP
FTP and HTTP
TCP and IP
TCP and HTTP
FTP stands for __________. File transmission protocol
File transmission path File transfer protocol
Fine transfer path
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
68/86
A named collection of properties (data, state) and methods (instruction,behavior) is called ____________.
Array Function
Variable
Object
Anchor tag denoted by is used to create Address Hyperlink
Paragraph
Title
tag is used to underline text
end the line create ordered list create unordered list
The browser breaks down the URL into ________ parts. 2 3
4
5
Which one of the following is NOT a primary color? Red
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
69/86
Green
Yellow
Blue
According to a popular heuristic, success is defined by ___________. The user The builder Both user and builder None of the given options
The idea of Neural Networks field is based upon ______________. Human nature Human brain
Human culture
Human actions
ERP is a type of __________________ . Entertainment software Productivity software
Business software
Scientific software
__________ are those programs in which the flow of the program isdetermined by the user's actions (mouse clicks, key presses) or messagesfrom other programs.
Event called programs
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
70/86
Event processed programs
Event driven programs
Event declared programs
Automatic machines performing various tasks that were previously doneby humans, are called ____________.
Robotics Computers Decision Making Systems
Autonomous Web Agents
country=Hello Pakistan;document.write(country.charAt(6));
The out put of the above statement is _____________. o P
a
k
The software used for the scanning of internet severs, is called__________.
Wscan
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
71/86
Mscan
Sscan
Vscan
Adding images to html page, we use___________ tag.
The group of technologies concerned with the capturing, processing andtransmission of information in the digital electronic form is called
_____________.
Telecom Engineering
Computer Engineering
Computer Science
Information Technology
The responsibilities of the Team Lead includes_____________.
Planning and tracking of the project
http://vustudents.ning.com
http://vustudents.ning.com/http://vustudents.ning.com/http://vustudents.ning.com/7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
72/86
CS101 Solved MCQShttp://vustudents.ning.com
Detailed design Professional development of team members
All of the given options
When the packets reach at destination, __________ reassembles them intooriginal message.
Protocol TCP IP NIC
Many developers write the _________ first and then incrementally convert
each line into _________.
Real code & Pseudo code
Pseudo code & Real code
Real code & Artificial code
None of the given options
Machine language is also called
Assembly Language Binary Language
High Level Language HTML Language
http://vustudents.ning.com/http://vustudents.ning.com/http://vustudents.ning.com/7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
73/86
In JavaScript, second element of an array has the index:
2 0
1
3Each element in an array is given an index, which is an integer value between
0 and one less than the length of the array. The first element has an index of 0,the second element has an index of 1, and so on.
One can download or upload files to a remote computer using ________
protocol.
HTTP
SMTP
FTP TELNET
JavaScript ________ support drawing of graphics
Does Does not
Always At times
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
74/86
A set of stand alone productivity applications designed to work togetherknown as ______________ .
Productivity software suites
Compiled software
Secure software
Intelligent software
Sophisticated event handling is not possible with _______________ eventhandling
Off-Line
In-Line
Out-LineNon of the given choices
Autonomous Web Agents are also known as _________________
Mobile AgentsSoftbotsBoth "Mobile Agents" & "Softbots"
None of these
A communication protocol is a __________that governs the flow ofinformation over a network.
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
75/86
Set of MethodsSet of Protocols
Set of rulesNone of the given choices
The organizations are learning that business can be done in a moreeffective manner if emphasis is placed upon ______________.
Cooperation
Shared responsibilityNetworking
All of the given
Monitor is an example of __________devicesOutputInputProcessingNone of the given choices
The code in the ________ portion is the right choice for developing largerJavaScript scripts
BodyAt End
HeadSeparate
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
76/86
____________________ based on the principles of the logical reasoningability of humans.
Genetic Algorithms
Rule-based Systems
Feed-Forward Network
None of these
The key benefit of VPNs over conventional PNs is:
SecurityEfficiency
Lower CostNone of the given choices
A____________________ is the process of analyzing large databases to
identify patternsData MiningData NormalizationData RedundancyData Manipulation
onFocus executes the specified JavaScript code when ___________a window receives focusa form element receives input focusa window receives focus or when a form element receives input focus None of the Given.
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
77/86
Communications on the internet is controlled by a set of two protocols,named :
HTTP & SMTP
FTP & TELNETTCP & IPNone of the given choices
There are _____________ types communication channels. 2345
The Cyberwarefare is a ______CrimeWarSoftwareGame
In the statement PopUp(Message) :PopUp is the function Name, Message is the argument Message is function identifierSyntax Error: functions cannot be called in this way
Error: function is undefinedRGB scheme stands for _________________________________.
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
78/86
Red Grey BlueRed Green BrownRed Green BlueRed Green Black
_____________ is the part of the virus that generally consists of malicious computer instructions
Off loadPayloadLoaderTransmitter
Unlike viruses, __________________ are stand-alone programsTrojan horsesLogic- or time-bombsWormsNone of the given
Voice over IP has _____ modes2345
We use __________ to stop Break-Ins.ScannersIntrusion detectorsFirewallsIntrusion detectors and Firewalls
Which one can lead user to leave your website? Simple design
Poor navigationInformation layout
Adaptable design_____________________ are the subcategories of AI
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
79/86
Expert SystemsRoboticsNatural Language ProcessingAll of the above
With the Help of FTP we can:List, change, create folders on a remote computerUpload and download filesTransferring Web content from the developers PC to the Web server
All of the given choicesWhich protocol is used for receiving E-mail messages?
FTPPOPTelnet ProtocolSMTP
The organizations are learning that business can be done in a moreeffective manner if emphasis is placed upon ______________.
CooperationShared responsibilityNetworkingAll of the given
___ is used to transfer files between computers on a TCP/IP networkFTPPOPTelnet ProtocolSMTP
Which of the following is True about pareseFloat(String) function: I) If the first character cannot be converted to a number, parseFloat returns NaN. II)
it returns the fractional portion of floating point number. III) Parses the string argument; returns a FP number. IV) Non of given options.
I and II OnlyII and III OnlyI and III OnlyIV Only
Event-driven programs can ____________________ events.
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
80/86
capturerespondcapture and respondNone of the Given.
Which of the statements is NOT true about Color Usage Guidelines fordeveloping a presentation?
Use color sparingly to to highlight a point, but don't get carried away Do not use colors like yellow or red for background except where needed. Do not use colors like green, blue and such like colors except where needed.None of given options
_________________ Type of databases management systems are supporting Terabytes of Data
PersonalDesktopEnterpriseSingle-user
Because of the ever-decreasing costs of verbal, text, videocommunications; the distances have _________
IncreasedExpandedContracted
LengthenedThe structure of the networked organization is _________.
SimpleFlexibleComplex
All of the givenA CAD drawing consist of many geometric shapes like straight lines , arc ,tc and therefore is stored in a ___________ format.
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
81/86
ScalarVectorBoth a & b____ is a type of computer-to-computer messaging.
TCPTelnetE-mailFTP
None of theseRDBMS stands for ________________________________
Relative Data Base Management SystemRelational Data Base Management SystemRecursive Data Base Management SystemResponsible Data Base Management System
Using Color Mapping scheme only a limited number of color called _____________are allowed.
ReservedPointersPlateletNone of
Using _________ topology, adding new nodes is difficult.RingBusStarNone of the given choices
Problems with old presentation methods was (transparencies andprojectors etc):
They were costlyElectronic transmission, in some cases, was not easyPresentation some times gets ambiguousAll of given options
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
82/86
Arguments values are passed to the function _________by valueby referenceBoth a & bNon of the Given.
__________________ is a field that uniquely identifies each record stored ina table.
Primary KeyForeign KeySecondary keySpecial Key
The IP address consists of _____ bits643216128
Credit Card Fraud can be minimized by using _________________single credit card numbersmultiple-use credit card numberssingle-use credit card numbersFirewalls
hotWeather = (Temperature == 40); in the above statement, the variable hotWeather is of type
NumberStringBooleanNone of the given
NCSA stands for:
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
83/86
National Center for Supercomputing ApplicationsNational Center for Supreme ApplicationsNational Center for Super AuthorityNone of the given choices
Self-replicating SW that eludes detection and is designed to attach itself to other files is called _____________.
TrojansVirusesSniffersOperating System
SVG stands for _________________________________________.Structured Vector Graphics
Software Vector GraphicsStructured Visual GraphicsNone of these
Viruses move from one computer to another with the __________ and spring into action when the _____________ is executed or opened
Host - HostHost - ClientClient - HostClient - Clienthttp://groups.google.com/group/vuZs
____________________ is a layered structure consisting of a number ofhomogenous and simple processing elements.
Genetic AlgorithmsRule-based SystemsFeed-Forward NetworkNone of these
A property that gives the value of Pi is:
PI()Graph.PIMath.PIMath.PI()
The smallest image forming element on a computer display is called ____________.
http://groups.google.com/group/vuzs/http://groups.google.com/group/vuzs/http://groups.google.com/group/vuzs/7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
84/86
ResolutionPixelGrey areaNone of these
SMTP stands for _______________________________________.Simple Mail Transfer ProtocolSimple Mail Transparent ProtocolSimple Mail Transfer Paradigm
None of these________________ network allows data to be sent directly from one computer to another.
RingBusStarNone of the given choices
Viruses attach themselves to other computer programs or data files, are known as____
TrojansGuestsHostsSpies
Avoid __________ to ensure readability of web pageOveruse of bold and italicsUse of paragraphsUse of white spaceUse of contrast colors
STP stands for :Shielded Twisted PairSilver Twisted PairSingle Twisted PairNone of the given choices
In ______, the spies of one business monitors the network traffic of theircompetitors.
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
85/86
Industrial intelligenceIndustrial EspionageIndustrial spyingIndustrial surveillance
Color mapping scheme reducing the size of 2.25 MB graphic to _________MB.
0.90 MB0.75 MB1.00 MBNone of these
The functions which call themselves from their (own) body are called: Virtual functions
Abstract functionsOverriding functionsRecursive functions
Browser sends _________ request to web server to access a file.SETGETTRANSFER
All of the given choicesvuzs
The internet communities are ___________.Geographical basedInterest basedCountry basedReligion based
Infection propagation and Actual destructive are the components of_______________
Transmission mechanismPayloadWormsTrojan Horse
7/27/2019 32622028 CS101 Solved MCQs Alot of Solved MCQs in One File
86/86
Top Related