Cs 101 File 5
Cs 101 File 5
J
join our group
https://chat.whatsapp.com/IsJnVTLAOsz061dsDcsUTk
2. How many comparisons are required to sort the elements using intersection sort algorithm?
13, 10, 9, 6, 33, 100
a) 3
b) 9
c) 7
d) 5
3. Which One of the following is correct for the symbolic representation of Primitives?
a) Semantic
b) Systematic
c) Abstract
d) Syntax
8. You might search the following or similar thing and might get unpleasant results which
might depress you.
a) Stomach Condition
b) Study
c) Teaching
d) Skin condition
a) Data
b) Instructions
c) Program
d) Information
11. We need _memory to store data permanently.
a) Volatile
b) DRAM
c) RAM
Downloaded by Osman Bey (beyosman1888@gmail.com)
lOMoARcPSD|42727504
d) Non-Volatile
18. one term can be used for more than one thing. For example, word “jaguar” is used in two
meanings such as:
a) Car and Cat
b) Car and Bus
c) Animal and Car
d) Car and helicopter
19. determines the number of bits to move radix point to either left or right.
a) Exponent field
b) Significant bit
c) Sign bit
d) Mantissa field
20. Breaking the tasks into a number of subtasks compatible with the number of available
processors is called
a) Interactive processing
b) Scaling
c) Throughput
d) Load balancing
21. _ is a malware which gathers data about your activities on the system and forwards
it to the outside party without your consent.
a) Worms
b) Spyware
c) Virus
d) Trojan Horses
22. Posttest loop structures refer to?
a) Test for termination is performed before the body is executed
b) Test for termination is performed as well as the body is executed
c) Test for termination is performed after the body is executed
d) Test for termination is performed with the body is executed
23. Starting with vocabulary words and them giving students a reading passage is an example
of:
a) A top-down approach
b) A cron-up approach
c) A bottom-up approach
d) A Pop-up approach
AL-JUNAID INSTITUE OF GROUP
24. _refers to distributed systems that are more loosely coupled than clusters but that still
work together to accomplish large tasks.
a) Cloud computing
b) Parallel Computing
c) Quantum Computing
d) Grid Computing
25. Capacity of one sector CD is of KB.
a) 2
b) 4
c) 1
d) 3
26. A transport layer is said to establish a connection before sending a message.
a) HTTP
b) SMTP
c) TCP
d) UDP
27. A sequence of transaction in which the user establishes initial contact with a computer’s
operating system is called ?
a) Logout
b) Process
c) Boot state
d) Login
28. Most_ codes used today are Huffman codes.
a) Differential
b) Relative
c) Frequency-dependent
Downloaded by Osman Bey (beyosman1888@gmail.com)
lOMoARcPSD|42727504
d) Run-length
29. contains the information needed by a browser the proper server and request the
desired document.
a) TCP
b) UDP
c) SMTP
d) URL
30. In black and whites, each pixel is represented as one bit- e.g., 0 for black and 1 for white. It
is an example of_
a) Matrix
b) Email
c) Facsimile
d) Searching
31. How many commons forms of data mining?
a) Five
b) Four
c) Three
d) Two
32. In context of environment, computer science have impacts:
a) Positive
b) Negative
c) Dangerous
d) Both positive and negative
33. Programming languages are well-designed so that each statement has meaning:
a) Only once
b) Multiple
c) No
d) Same
34. Access to the forbidden literature is because of:
a) Computer
b) Cyber building
c) Identity theft
d) Lacking privacy
35. Content filtering works by matching of characters:
a) String
b) Codes
c) Values
d) Paragraphs
36. Copyrights can be applied on:
a) Dramatic works
b) Music
c) Artistic work
d) All of these
37. Editing Group have commands:
a) 2
b) 3
c) 4
d) 5
38. A file’s is normally stored as a separate file on the same mass storage device as
the .
a) Index, indexed file
b) Sequential, sequential file
c) Database, database file
d) Flat, flat file
39. Major components of syntactic analysis is:
a) Context
b) Identifying
c) Parsing
d) Understanding syntax
40. In some cases, the data collection process is readily apparent; in others it is:
a) Outward
b) Subtle
c) Specious
d) Obvious
b) Free
c) Open source
d) All of these
48. In the United States the privacy act of 1974 was to protect citizens from abusive use of
databases:
a) Government
b) Public
c) Agencies
d) Companies
49. Matching Geometric Characteristics technique Cannot read:
a) Images
b) Pictures
c) Optical characters
d) Handwritten Material
50. The amount of paper use in a year is:
a) 83 million users
b) 85 million users
c) 90 million users
d) 95 million users
51. ctrl + Z is used for
a) Redo
b) Undo
c) Save
d) Load
52. A program DOCTOR developed by joseph Weizenbaum in the mid-1960’s named as:
a) Alexa
b) Smart Doctor
c) Eliza
d) Joseph
53. Turing gave a percentage of a machine that will have a chance to pass Turing test in year:
b) 2008
c) 2012
54. We can add charts in MS-word from group:
a) Illustrations
b) Table
c) Symbols
d) Apps
55. Contact Risks include:
a) Online Scam
b) Harmful Advice
c) Cyber Bullying
d) Unsuitable products
56. Computer Security is also Known as:
a) System-Security
b) Cyber-Security
c) Password
d) Copyright
57. The people present around the e-waste gain:
a) Benefits
b) Diseases
c) Substances
d) Electronic waste
58. Attacks can be made to prevent access to website by crashing:
a) Website
b) Servers
c) Network
d) Databases
59. We can increase the size of text from home ribbon group called:
a) Paragraph
b) Font AL-JUNAID INSTITUE OF GROUP
c) Clipboard
d) Styles
c) 4
d) 5
73. is not only used as a means of retrieving data from mass storage but also as a
means of retrieving items form large blocks of data storage in main memory.
a) Hashing
b) Indexing
c) Sequential
d) Database
74. option in MS-word prevent others from making changes to the selected text.
a) Block Authors
b) Protect Authors
c) Restrict Authors
d) Prevent Authors
75. IPR stands for:
a) Intellectual property restate
b) Intellectual property rights
c) Intellectual property resources
d) Intellectual property release
76. To control access to the printer, the must keep track of whether the printer has been
allocated
a) Process
b) Operating systems
c) Windows
d) Booting
77. loop structures referred to as a posttest loop
a) While
b) Repeat
c) For
d) For each
78. By using MPEG and MP3 compression techniques, videos cameras are able to record video
within _
a) 128 GB storage
b) 28 MB storage
c) 128 MB storage
d) 8 GB storage
79. Who introduce the idea of storing the program in main memory?
a) Jhon W. Mauchly
b) Jhon Von Neumann
c) J. Presper Eckert
d) Konrad Zuse
80. In the reverse engineering process, what refers to the sophistication of the design
information that can be extracted from the source code?
a) Interactive
b) Completeness
c) Abstraction level
d) Direction level
81. When we use tag while searching it shows only a particular pages related to it.
a) @
b) *
c) ``
d) #
82. In CS, we Store and link data in an organized Way using
a) SDLC
b) MSDB
c) DMBS
d) DBMS
83. Termination condition is .
a) Negation of the condition
b) Supporting
c) Halting process
d) Logical process
84. If we are interested to see the map of some location, we can use map operator in the
following way:
a) Location: map
b) Map: Location
c) Mph: Map
d) Locations
85. The node or PC which sends requests for services is called
a) Server
b) Client
c) Protocol
d) ISP
86. Which of the following technology is not related to the client side working?
a) Java applets
b) Java script
c) PHP
d) HTML
87. In binary Addition 1+0=
a) 8
b) 4
c) 2
d) 1
88. Computer does not stand any language except
a) Machine Language
b) Assembly Language
c) Binary Language
d) Programming Language
89. CPU required at least to fetch instructions from memory.
a) Two Nanosecond
b) Nanosecond
c) Three Nanosecond
d) One billion second
90. Each Textual Symbol is represented with a pattern.
a) Kilo byte
b) Unique byte
c) Byte
d) Bit
91. Which of the following is a disadvantage of a linear search?
a) Requires more space
b) Greater time Complexities compared to the other searching algorithms
c) Not easy to understand
d) Not easy to Implement
92. In digits on right side represent the fractional part.
a) Fraction
b) Decimal
c) Hexadecimal
d) Binary
93. The control of a loop consists of the activities.
a) Two
b) Three AL-JUNAID INSTITUE OF GROUP
c) Four
d) Five
94. Step wise refinement is a _ methodology in that it progresses from the general to the
specific.
a) Bottom up
b) Top down
c) Left to right
d) Right to left
95. which kind of server work as an intermediate between the client and server.
a) Client server
b) Server computer
c) Super server
d) Proxy server
96. The impact of truncation error can be reduced by using
a) Longer exponents field
b) Positive exponent field
c) Floating point Notation
d) Longer Mantissa field
97. When you type a query in the search bar of google. Google finds all those pages which
contain .
a) All the terms given in the query
b) None of the terms given in the query
c) Some of the given terms give in the query
d) Random
98. Software units that communicate with controller or sometimes directly to peripheral devices
called
a) Utility program
b) System software
c) Device drivers
d) Operating system
99. Process states include the value of the program counter as well as the contents of the
_
a) Related memory cells
b) Registers and related memory cells
c) Registers
d) Registers and cache memory cells
100. Approximately how many entries a typical dictionary in a word processor can contain?
a) 25,000 entries
b) 250,000 entries
c) Less than 25,000 entries
d) More than 250,000 entries
101. Previously how many bits were used to store 2`s complement notation.
a) 8 bits
b) 16 bits
c) 64 bits
d) 128 bits
102. Which of the following language is used for client-side scripting?
a) Phyton
b) JavaScript
c) PHP
d) ASP.net
Downloaded by Osman Bey (beyosman1888@gmail.com)
lOMoARcPSD|42727504
function is known as
a) Modularity
b) Verification
c) Validation
d) Requirement gathering
110. Distinction between program believed to the correct and the program that is correct is
a) Software Modularity
b) Software requirements gathering
c) Software verification
d) Software validation
111. Establishing a well-defined set of building blocks form which algorithm representations
can b constructed such a building block is called a .
a) Program
b) Primitive
c) Block
d) Pile
112. The repetitive use of an instructions or sequences of instructions is an important
algorithmic concept. One method of implementing such repetition is the iterative structure
known as the .
a) Loop
b) IF ELSE
c) Class
d) Condition
113. printer is an _ device.
a) Output
b) Input
c) Input/output
d) None of the given options
114. One is that a CPU should be designed to execute a minimal set of instructions. This
approach is called a
a) CISI
b) RISC AL-JUNAID INSTITUE OF GROUP
c) ENVIAC
Downloaded by Osman Bey (beyosman1888@gmail.com)
lOMoARcPSD|42727504
d) RISC/CISI
115. The computers of the were not very flexible or efficient.
a) 1940`s and 1950`s
b) 1950`s and 1960`s
c) 1930`s
d) 1961`s and 1970`s
116. Repeated erasing slowly_ the silicon dioxide chambers
a) Damages
b) Enhance
c) Increase
d) Decrease
117. For a network to function reliably, it is important to establish rules by which activities are
conducted. Such rules are called .
a) Properties
b) Patterns
c) Premises
d) Protocols
118. What is full form of JSP?
a) Java server Pages
b) Java Script pages
c) Java semantic pages
d) Java Source pages
119. ENIAC stands for
a) Electronic numerical integrator and calculator
b) Electronic numbers and integrator and calculator
c) Electronic numerical integer and calculations
d) Electronic numbers integer and calculations
120. Generally how many steps a machine cycle have?
a) Two
b) Three
c) Four
d) Two or more
c) 32867
d) 32868
127. Current status of the activity associated with the process is called the
a) Process Status
b) Process state
c) Process association
d) Process class
128. A private Key is used to messages.
a) Send
b) Receive
c) Encrypt
d) Decrypt
129. which one of the following is not a property of a good algorithm?
a) Consistency
b) Unambiguousness
c) Efficiency
d) Time Taking
130. Computer science approaches some problem by establishing a well-defined set of building
blocks from which algorithms representations can be constructed. These building blocks
are
a) Primitive
b) Non-Primitive
c) Scalar
d) Non-scalar
Question No: 1
It represents the flow chart element.
► Flow Line
► Connector
Downloaded by Osman Bey (beyosman1888@gmail.com)
lOMoARcPSD|42727504
► Off-page connector
► Start or Stop.
Question No: 2
What is NOT a key factor while designing a website?
► Usability
► User-friendly
► Consistency
► Complexity AL-JUNAID INSTITUE OF GROUP
Question No: 3:
% of the users have left websites in frustration due to poor navigation.
► 40
► 62
► 83
► 91
Question No: 4:
In JavaScript, a variable declaration is
► Optional
► Mandatory
► Not allowed
► None of the given
Question No: 5:
A protocol used for receiving email messages is called .
► URL
► Telnet
► POP3
► SMTP
Question No: 6:
Which is correct?
► onUnload
► onUnLoad
► onUNLOAD
► All of the above AL-JUNAID INSTITUE OF GROUP
Question No: 7
Serial arrangement in which things follow logical order or a recurrent pattern, such as
statements executing one by one, is called .
► Loop
► Sequence
► Condition
► Array
Question No: 8
Variables allow us to manipulate data through the .
► Actual Value
► Reference
► Length
► Name
Question No: 9
Fuzzy logic is based on .
► Ground facts
► Experience
► Practice
► Approximation
Downloaded by Osman Bey (beyosman1888@gmail.com)
lOMoARcPSD|42727504
Question No: 10
Word Processor is a
► System Software
► Application Software
► Device
► Utility
Question No: 11
In the old days, databases did NOT support .
► Number
► Boolean
► Video
► Text
Question No: 12
In tabular storage, fields placed in a particular row are strongly .
► Independent
► Dependent
► Interrelated AL-JUNAID INSTITUE OF GROUP
► Inconsistent
Question No: 13
Due to working at home, lack of interaction may result in _ professional growth.
► Slower
► Faster
► Higher
► Improved
Question No: 14
Distance learning has got a boost due to the .
► Easy communication
► Online interactive contents
► Flexibility
► All of the given options
Question No: 15
technique can be used to create smooth animations or to display one of
several images based on the requirement.
► Image downloading
► Image preloading
► Image uploading
► Image postloading
Question No: 16
The is becoming the preferred organizational structure for more and more
organizations with the passage of time.
► Tree structured organizational model
► Network paradigm
► Hierarchical structure
► None of the given options
Question No: 17
The group of technologies concerned with the capturing, processing and transmission of
information in the digital electronic form is called .
► Telecom Engineering
Downloaded by Osman Bey (beyosman1888@gmail.com)
lOMoARcPSD|42727504
► Computer Engineering
► Computer Science
► Information Technology
Question No: 18
A large number of networks interconnected physically is called .
► LAN
► MAN
► Internet
► Network collection
Question No: 19 TCP stands for .
► Transfer Center protocol
► Transmission Control Protocol
► Transmission Center Protocol
► Telephone Center Protocol
Question No: 20
A collection of data organized in such a way that the computer can quickly search for a desired
data item is known as:
► Retrieving
► Database
► Information
► DBMS
Question No: 21
is simply a fast port that lets you connect computer peripherals and consumer
electronics to your computer without restart.
Downloaded by Osman Bey (beyosman1888@gmail.com)
lOMoARcPSD|42727504
► Freeware
► Shareware
► Firewire
► Firmware
Question No: 22
Structures, in which another list starts before the first list is finished, are called:
► Multiple Lists
► Nested Lists
► Ordered Lists
► Un-ordered Lists
Question No: 23
The key property of the ‘Array’ object in JavaScript is:
► Value
► Length
► Name
► All of the given choices
Question No: 24
Which one is the example of spreadsheet software?
► MS Word
► MS PowerPoint
► MS Excel
► MS Access
Question No: 25
Question No: 29
Tags always placed between the and tags of a Web page:
► True
► False
Question No: 30
Java script has ---------------- ability to create and draw graphics.
► Limited
► Versatile
► Medium
► Not at all
Question No: 31
Google Drive is an example of -------- --.
► Grid and cluster Computing
► Cluster Computing
► Cloud Computing
► Grid Computing
Question No: 32
How many comparison are required to sort the element using insertion sort algorithm?
►3
►9
►7
►5
Question No: 33
Which one of the following is correct for the symbolic representation of primitives?
► Semantic
► Systematic
► Abstract
► syntax
Question No: 34
An algorithm is ----- and district from its representation.
► Abstract
► vision
► Visual
► Clear
Question No: 35
----------- Conects computer over a large geographical area od world.
► LAN
Downloaded by Osman Bey (beyosman1888@gmail.com)
lOMoARcPSD|42727504
► MAN
► WAN
► PAN
Question No: 36
In computer, GUI stands for -------- --.
► general user interrupt
► grayed user interface
► graphical user interface
► graphical utility icon
Question No: 37
Pseudo code is language:
► Algorithm
► independent
► dependent
► Sequence
Question No: 38
You might search the followings or similar thing and might get unpleasant result which might
depress you.
► Stomach condition
► Study
► Teaching
► Skin Condition
Question No: 39
A single algorithm can be represented In -------- way(s).
► Single
► malicious
► Modern
► Many
Question No: 40
The------ in the state of the process must be sufficient to determine uniquely and completely
the action required by each step.
► Date
►instruction
►program
► information
Downloaded by Osman Bey (beyosman1888@gmail.com)
lOMoARcPSD|42727504
Question No: 41
We need ----------- memory to store data permanently.
► Volatile
► DRAM
► RAM
► Non- Volatile
Question No: 42
Which one of the following is true about a process?
► Activity of executing an algorithm
► Activity of executing a program
► abstract representation of machine
► Activity of representing pseudo code
Question No: 43
One of the major uses of the ---- operation is to place zeros in on part of a bit pattern while not
disturbing the other part.
► XOR
► NOR
► AND
► OR
Question No: 44
Which of the following is true about TCP in comparison to UDP?
Question No: 45
In 2`s complement, the maximum positive number is represented by-------
► All 1`s
► A single ‘0’ followed by all 1`s
► A single ‘1’ followed by all ‘0’s
► All ‘0’s
Question No: 46
------------ provides a network the internet connectivity.
► Hub
► Node
► Gateway
► Repeater
Question No: 47
Telnet is used to ------- between two systems.
► Establish a secure remote connection
► Securely share information
► Establish a remote connection
► securely transfer files
Question No: 48
One term could be used for more than one thing For example word “Jaguar” is used in two
meaning such as:
► Car and cat
► car and bus
► Animal and car
► Car and helicopter
Question No: 49
--------------- determine the number of bits to move radix point to either left to right.
► Exponent field
► Significant bit
► Sign bit
► Mantissa field
Question No: 50
Breaking the tasks into number of subtasks compatible with the number of available
processors is called……………
► Interactive processing
► Scaling
► throughput
► load balancing
Question No: 51
----------- is a malware which gathers data about your activates on the system and forward it
to the outsides party without your consent.
Downloaded by Osman Bey (beyosman1888@gmail.com)
lOMoARcPSD|42727504
► Worms
► Spyware
► Virus
► Trojan Horses
Question No: 52
Post test loop structure refer to?
► Test for termination is performed before the body is executed.
► Test for termination is performed as well as the body is executed.
► Test for termination is performed after the body is executed.
► Test for termination is performed with the body is executed.
Question No: 53
Starting with vocabulary words and then giving student a reading passage is an examples of:
► A top- down approach
► A cron-up approach
► A bottom – up approach
► A pop- up approach
Question No: 54
------------- refers to distributed systems that are more loosely coupled than cluster but that
still work together to accomplish large tasks.
► Cloud computing
► parallel computing
► Quantum computing
► Grid Computing
Question No: 55
Capacity of one sector of CD is of ------------ KB.
►2
►4
►1
►3
Question No: 56
A -------- transport layer is used to establish a connection before sending a message
► HTTP
►SMTP
Downloaded by Osman Bey (beyosman1888@gmail.com)
lOMoARcPSD|42727504
► TCP
► UDP
Question No: 57
A sequence of transection in which the user establishes initial contact with a computer
operating system is called ----------
► logout
► process
► boot state
► log in
Question No: 58
Most ------- codes used today are Huffman codes.
► Differential
►Relative
► Frequency- dependent
► Run-length
Question No: 59
--------------- contains the information needed by a browser to the contact the proper sever and
request the desired document.
► TCP
► UDP
► SMTP
► URL
Question No: 60
In black and white images, each pixel is represented as one bit – e.g.0 for black and 1 white. It
is as example of…
► Matrix
► Email
► Facsimile
► searching
When the user needs something to be done by the computer, he/she gives
instructions in theform of _Software to computer Hardware
Downloaded by Osman Bey (beyosman1888@gmail.com)
lOMoARcPSD|42727504
Software, Hardware
Hardware, Software
System Software, Application Software
Graph, Monitor
The structure in which another list starts before the first list is finished is called
.
Multiple List
Nested List PG # 52
Ordered List
Un-ordered List
retains its information when the power of the system is turned off.
RAM
DIMM
ROM PG # 25
SIMM
The name of computer language used by the Defense Department of the United States
is
.
Smalltalk
C
C++
Ada
The Web Pages developed for human as well as computer understanding are called as
.
Static Web Pages
Semantic Web Pages
Dynamic Web Pages
Java Web Pages
Which of the following is NOT a category of Mobile computers?
Laptop
Palmtop
Desktop
Wearable
Hexadecimal number system is based on --------- digits
2
8
12
16
Intranet
Internet connection
URL PG # 18
Browser
There are so many web browsers available with Graphical User Interface these
days. Whichone of the following is the oldest GUI based web browser.
IE
Mozilla
Mosaic Click here for more detail
Opera
By today’s standards, the Mark-I was slow and requiring 3 to 5 seconds for a
multiplicationoperation
True
False
There are NO Standard rules to write the Pseudo Code.
Standard
No standard
Pre-defined
Strict
In flow charts, there is only one entry point in conditions while there is/are 2
exit
points.
1
2
3
4
The memory size of the Altair 8800 was
128 bytes
128 Kilo bytes
256 Kilo bytes
256 bytes
<p></p> is an example of:
Single Tag
Paragraph Tag
Single with Attribute Tag
Single without Attribute Tag
If you are asked to provide an algorithm for a particular problem, then in how
many ways youcan represent the algorithm?
1
2
3 PG # 104
4
Storage Device
Forms can be submitted through get & post methods
INCLUDE, POST
INCLUDE, GET
GET, POST
SEND, POST
_kernel is responsible for all the essential operations like basic house
keeping, taskscheduling, etc. Also contains low-level HW interfaces
Hardware
Device Manager
Kernel
Device Driver
Which of the following is NOT an Application Software. Windows XP
Word Processor
Web Browser
Windows XP
MS Excel
To start an ordered list from 20 instead of 1, the correct option will be .
<OL begin = “20”>
<OL initiate = “20”>
<OL start = „„20”> Click here for more detail
<OL from = “20”>
Floppy Disk
Magnetic Tape
Punched Cards
Hard Disk
Registers
RAM PG # 24
USB Disk
provide the facility of data manipulation through references
instead of theactual values.
Constants
Variables
Data Types
Operators
Relationship among the cells of MS Excel sheet can be created by .
Relationship diagram
Formatting
Formula PG # 221
Test
You cannot close Microsoft Word 2003 by .
Choosing File menu then Exit command
Pressing Alt+F4
Clicking X button on title bar
Choosing Close submenu from File menu
Which of the following is a single tag in HTML?
TH
TD
HR
TR
In developer specification phase, the user requirements are defined in a
more
way.
Structured
Ambiguous
Unstructured
Difficult
How many symbols are used in Binary Number System?
10
2 PG # 39
8
16
Cray-1 was first commercial computer
pg. 0
What is the shortcut key to open the cell format window in MS Excel?
Ctrl + 1
Ctrl + F
Ctrl + 4
Ctrl + Shift + Enter
Choose the correct HTML tag for the largest heading.
<head>
<Heading>
<h1> Click here for more detail
<h6>
To allow a user for multiple selection from a list on a webpage,
the web developer makes useof .
Check box
Text box
Radio button
Text area
Select the voltage combination, not supported by PC’s power supply.
+3.3 and +5 V DC
-12 and +12 V DC
-10 and +10 V DC
-5 and + 5 V D C
Write the name of tag(s) that can be used to select only one option
from multiple choices.
SELECT and LIST
Batch programs
Event-driven programs
Sequential programs
Application programs
A new cell using HTML is added in table row by <TD>..</TD>
<TC>…</TC>
<TR>…</TR>
<TD>…</TD>
<NC>…</NC>
Waterfall is a sequential life-cycle model.
Spiral
Sequential
Circular
Spherical
What will be the result of the following formula in
25
50
75
100
A multi user operating system allows many users to take
advantage of the
computer’s resources, simultaneously
Single user
Multi- user
Single tasking
Multi tasking
A new cell is added in a table row by using tag in html.
<BR>…</BR>
<TR>…. </TR>
<TD> . . . </TD>
<TABLE> . . . </TABLE>
Anti Virus software is a kind of .
Utility Program PG # 61
System Software
Device Driver
Freeware
If there are multiple programs running on my PC having windows XP,
then it refers to:
Multi User
Single User
Device
None of the given choices
It represents the input or output flow chart element.
Process
Input or Output
Decision
Connector
Which of the following number system is used by microprocessor?
Binary
Binary
Decimal
Octal
Hexadecimal
Hexadecimal number system is based on---------- digits
2
8
12
16
Suppose a web developer wants to permit the user to make
multiple selections from the list of5 options on a web page.
Which type of element will he use for this situation?
Check box
Text box
Radio button
Text, area
Which one of the following is not a suitable option when we talk about
JavaScript language?
Object based lalanguag
Markup language PG # 96
Interpreted language
Event driven language
Web is a unique invention by humans in terms that it is:
accessible to only the owners who control it
Punch cards
Vacuum tubes
Transistors
Resistors
The default style of text to represent a hyper link in a web page is .
Red and Italic
Black and Underlined
Green and Bold
Blue and Underlined
.
Client side scripting
Server side scripting PG # 71
Stand-alone scripting
GUI scripting
Today’s fastest computer can do of calculations in a second.
Thousands
Billions
Trillions PG # 21
Millions
When we run a program in a computer, the actual execution of the
program takes place in
.
RAM
ROM
Microprocessor
Hard Disk
Processing speed of a super computer is measured in .
Giga Hertz
Planning
Integration
Very dangerous
Not very bad
Neutral
brought the use of mouse-driven graphical user
interface in computing.
Apple Macintosh
Microsoft
Create
IBM
Anchor tag is used to create:
Address
Hyperlink
Paragraph
Title
What will be the result of the following formula in
Compiler
Concatenate Operator in JavaScript is used to elements.
Subtract
Multiple
Join PG # 271
Add
In html, the text area tag (<textarea>) defines:
A multi-line text input control PG # 92
An input control
Html form for the user input
A group of related options in a selected list
Forms can be submitted through and methods.
Include, Post
Include, Get.
Get, Post
Send , Post
Which one of the following is not an Application Software?
Word Processor
Web Browser
Microsoft Windows
MS Excel
Which of the following is not an Operating System?
DOS
Windows XP
Linux
MS Access PG # 60 & 61
In the context of JavaScript, x in the statement x=x+20; is a(an) .
Constant
Object
Variable PG # 143
Integer
In , up gradation/ repair is possible without switching off
the computer.
Super Computer
Main Frame
Server
Laptop
attribute of FORM tag is used to mention a URL when the form
is being submitted.
Name
Action PG # 71
Method
Submit
N a truth table, we have all the for all the
related for afunction.
Input – Outputs
Outputs – Inputs PG # 44
Process – Inputs
Inputs – Processes
brought the use of mouse-driven graphical user
interface in computing.
Apple Macintosh PG # 16
Microsoft
HP
IBM
Human are better than computers at:
Efficiency
Accuracy
Pattern recognition
None of the given choices
Device
Set of methods
If a computer could pass the Turing test then it would be able to:
think like human beings
do the things faster
win a million dollar prize
store more information
The first Web browser with a GUI was generally available in:
1992
1993
1994
1995
All processes of a microprocessor are processed under the supervision
of
.
Memory Unit
Floating Point Unit
Control Unit
Arithmetic and Logic Unit
Structures, in which another list starts before the first list is finished,
are called:
Multiple Lists
Nested Lists
Ordered Lists
Un-ordered Lists
Notepad is an example of
System Software
Application Software
Device Driver
Kernal
Software development starts from and ends with .
Design, Coding
Concept, Designing
Coding, Testing
Concept, Decommissioning PG # 134