Professional Documents
Culture Documents
Lec 1-2
1. World's first program was written by
a. Alfred Tennyson b. Charles Babbage c. Ada Lovelace *
2. Deep Blue was the name of:
a. Human* b. Computer c.City
3. Analytical Engine was a machine of which type:
a. non-programmable electronic machine b. programmable, mechanical, digital *
c. programmable electromechanical
4. Who wrote the first program for Analytical engine?
a. Babbage b. Lady Ada * c. Haward
5. Which language had been used by the US department of defense.
a. Ada * b. Binary language c. C++
6. Spread sheet is a type of ____________.
a. Business software b. Engineering software c. Productivity software*
7. A _________ translates a high-level language (that is easy to understand for humans) into a language
that the computer can understand.
a. Transistor b. Compiler * c. Device
8. DARPA stands for
a. Defence Automatic Research Project Agency b.Defence Advanced Research Project
Agency* c Direct Automatic Research Private Agency
9. Vacuum tubes were replaced by ____________
a. Punch cards b. Transistors * c.Micro Processors
10. ________ invented at the Imperial University in Tokyo by Yoshiro Nakamats.
a. Optical disc b. Floppy disk*
11. Compared to vacuum tubes, Transistors offer:
a. Better reliability b. Much lower cost c.All of the given choices*
12. What will replace Transistors?
a. Electro-mechanical computing b. Vacuum tube computing c. Quantum computing*
13. If a computer could pass the Turing test then it would be able to:
a. win a million dollar prize b.think but slower than humans c. think like
human beings*
14. The name of very first computer was _______________
a. EDC b. BCD c. ABC*
15. First computer designed for commercial applications was
A. Atanasoff-Berry Computer * B.EDVAC C. UNIVAC 1 UNIVAC 1
16. Atanasoff-Berry Computer is the first computer that used:
a. Octal number system b.Binary number system * c. Decimal number system
17. World’s first large-scale, automatic digital computer was:
a. ENIAC b.Atanasoff-Berry Computer * c. Harvard Mark 1
Lec 3-5
1. The Semantic Web is an idea of ______________
a. John Von Neuman b. Tim Berners-Lee * c. Bill Gates
2. ____________ is a client program that uses HTTP to make requests to Web servers throughout the internet on
behalf of the user.
a. Internet Application b. Web Browser* c. Web Application
3. The first Web browser with a GUI was generally available in:
a. 1993* b. 1994 c. 1992
4. _________ is a related collection of WWW files that includes a beginning file called a homepage.
a. HTTP b. Web page c. Website*
5. Information available on the web is:
a. Mostly Free of any cost * b. Costly c. Totally free
6. ______________ is volatile memory.
a. RAM b. ROM c. Hard Disk
7. _________ are personal computers that are designed to be easily transported and relocated.
a. Servers b. Desktops c. Portables*
8. _________ is the best known builder for supercomputers.
a. Cray Research * b. Microsoft c. Apple
9. Microphone is an input as well as output device. This statement is
a. True b. False*
10. _________ can perform at or near the currently highest operational rate for computers.
a. Microcomputers b. Personal Computers c. Supercomputers*
11. CD stands for:
a. Computer Disc b. Compact Disc* c. Compact Data
12. USB stands for: Universal Serial Bus
13. SCSI stands for:
a. System Common Small Integration b. Small computer system interface* c. Silicon
Computer System Interface
Lec 6-8
Lec 12-14
1. In a HTML Form for file upload input element we use the following value in type attribute:
a. Hidden c. Radio c. File*
2. To display a radio button on the web page, we use ___ tag.
a. RADIOBUTTON b. INPUTBUTTON c. INPUT*
3. When we use, what will happen?
Text will be in normal format Text will not be visible
4. A group of information is called File* Database
5. VisiCalc was the first popular __________ application on PC’s.
Spreadsheet* Presentation Word processor
6. WYSIWYG is:
The abbreviation of "what you see is what you get" The abbreviation of "word you see is what you
get"
7. _________ helps in finding synonyms as well as antonyms in Word Processors
Spelling & Grammar Tables Thesaurus*
8. You need to place University name on top of the every page of 100 pages document and Page number in the
bottom of page. This can be done with the help of __________
Header and Footer* Borders and Shading Bullet and Numbering
9. _________ is also known as System Architecture.
Software Requirement Low level system design Every system design*
10. Heuristics are used because they
Mostly gives good-enough results Are commonly used as rule of thumb
Always give the best results*
Lec 15-17
Lec 18-20
1. Some of the things that JavaScript can do! Choose incorrect option from following
Control the content and appearance Control the appearance of the browser Read – Modify*
2. named collection of properties (data, state) and methods (instructions, behaviour) is called
Relation Entity Object*
3. A vocabulary and set of grammatical rules for instructing a computer to perform specific tasks is called
Programming language* Device driver Software
4. Programs that are typically started from a shell (or automatically via a scheduler) are called
Event-driven programs Sequential programs Batch programs*
5. _________ is a high level language.
Assembly C++* Machine
6. Batch programs do not
Provide event handling* Print or store the results Get input data
7. BASIC stands for:
Basic American Standard Information Code British American Scientific International Commercial
Beginner's All purpose Symbolic Instruction Code*
8. In SW Life cycle Thinking about the future phases generally results in ________and_______
lesser delivery time ; higher quality* risk-full scenarios ; more delivery time
more delivery time ; lesser quality
9. Detailed plan of SW life cycle specifies two things that are the _________
Expected cost and budget Time and cost*
Required resources and expected deliverables
10. Which of the following application are collections of cells?
Excel* PowerPoint Word
QUIZ
11. Which one of the following is ‘built-in’ computer memory containing data that normally can only be read, not
written to
RAM ROM cache memory magnetic memory
12. The MS DOS system came bundled with
UNIVAC 1 Cray 1
13. Which of the following is not an example of DTP (desktop publishing)?
Adobe pagemaker corel ventura ms publisher ms word
14. -------is an example of bit-mapped type of graphics and animation software
MS Visio MS paint corel draw flash
15. Digital computer possess two neutral states------------and -----------
On & off on & on off & off none
16. Which one of these is NOT an example of storage devices?
Floppy b. Hard Disk c. RAM*
17. Which one of these is NOT an example of storage devices?
Tape b. Floppy c. RAM*
18. _________ was known as “mill” in Analytical engine.
Processor* b. Monitor c. Memory
19. The impact of a digit in a number is determined by its ____________
Location* b. Value c. None of above
20. The computer working independently with no connection to any other computer is called:
Standalone * b. Workstation c.Server
21. TCP stands for :
Transmission Control Protocol * b. Transmission Control Practical c. Transfer
Center Protocol
22. VPN stands for:
Virtual Private Network b. Virtual Public Network c.Visual Private Network
23. Email uses _______ protocol.
HTTP b. FTP c. SMTP*
24. Who was the Creator of the Analytical Engine
Charles Babbage* b.Charles Daggles c. Gary Kasparov d. Bruce Sterling
25. Analytical Engine?
A programmable, electronical, digital machine b. A programmable, mechanical, digital machine*
c. A programmable, mechanical, analog machine d. A programmable, electronical, digital machine
26. The father of Computer?
Ada b. Charles Babbage* c. Charles d. Gary Kasparov
27. Deep Blue?
A Supercomputer * b. A Chess Game c. A Personal Computer d. A Mainframe Computer
28. Deep Blue was designed by
IBM* b. Macintosh c. Apple Computers d. Dell
29. Who is called the Mother of Computer?
Ada* b. Charles Babbage c. Charles d. Gary Kasparov
30. Who many chess move can analyze a Deep Blue in three minutes.
300 billion* b. 400 billion c. 200 billion d. 700 billion
31. The instruction written in high-level language are converted into low-level language by the
Operating System b.Compiler* c.Parser d. Router
32. Which software can provide results of mathematical calculations very easily?
Spreadsheets * b.Image processor c.Word processor d.None of these
33. Which of the following is the extension of graphics files?
.doc b. .mdb c. .gif* d. .tmp
34. Command that allows you to remove mistakes
Copy b. Delete c. Cut d. Undo*
35. ----- is readily understood by microprocessors and this language is very difficult to write in for human
programmers.
Machine Language* b.Low Level Language c.High Level Language d.Assembly Language
36. Which of the following command allows you to recover form mistakes in MS Word?
Undo* b. Clear c. Edit d. Break
37. Which of the following is a type of system software?
Device driver* b. Word processor c. Write once read -only- memory d.Anti-Virus
38. Language that is understood by computer hardware is called
High level language b.Machine language* c. Assembly language d.System software
39. The world's first electronic digital computer.
Atanasoff-Berry(ABC)* b:International business machine( IBM) Macintosh(MAC) MARK 1
40. Vacuum Tubes are:
Smaller then transistors Made up of two or more electrodes in a glass metal tube*
Used in IBM PC Invented by Tim Berners lee
41. ARPANET is a:
World’s first network Network protocol* Latest Internet site Internet game
42. Web server:
Is a software to deliver e-mail Is a computer that store and deliver web pages*
Does not allow electronic chatting Does not have a Domain name
43. A Hyperlink is a:
Connection between two computers Connection between two countries on the net
Gateway to the next web page* Gateway between five continents
44. Search engines:
Scan the entire web for the desired information* Search the news groups for the required information
Make the list of images that are available on the net Are built to facilitate the scientists
45. What does internet service provider mean?
46. A software that helps you to connect to internet A company that helps you to connect to internet
A software that allows you to send/receive e-mails A telephone network which helps you to connect to
internet*
47. URL is a/an
Device Component Address* Tool
48. What is internet?
A global network of networks* A Software used to connect to some network
A group of users Any network of more than two computers
49. HTTP is the abbreviation for:
Hyper text transmit protocol Hyper text terminal protocol Hyper Text Transfer Protocol* Hyper
terminal text protocol
50. Semantic web pages
Are also called static web pages Are understood by computers* Are not the extension of today's
web pages Correct the semantics of the web page
51. A unique identifier for the location of a specific Web page is called a
FAQ FTP URL* http://
52. A website
Is a place where we can only read information on the internet Is a collection of related documents on the
internet* Is a place on the net where we can only write information
53. Where is the Internet's central hub and control center located?
Near Washington D.C. Near the Microsoft campus in Redmond, Washington In a top-secret
location Nowhere, the Internet has no central hub*
54. Which of these domains is restricted to qualified organizations?
.com .org* .net .edu
55. The first Web pages were
Strictly hypertext with no multimedia content*
Designed to simulate printed pages using HTML's table tools
The first true multimedia documents to be published on the Internet
Sent via email from Doug Engelbart's office on the Stanford campus
56. The Internet offers different services. Which one listed below is incorrect
Chat room Electronic mail Off line shopping* World Wide Web
57. Ports are:
Input devices Output devices Used to allow I/O devices to communicate with the CPU* Able to
process incoming data
58. Modem is used:
Only to enter data into computer For calculating huge numbers For communication of data
between internet and your computer* To write information on the world wide web
59. What computer hardware is essential for connecting two computers in Local Area Network?
Modem Ethernet card* VGA Internet Connection
60. The input device that reads printed characters, symbols, or graphical images into the computer is the:
Sensors Speech recognition Mouse. Scanner*
61. Computer uses the scanner to input
Voice. Images.* Voice and text. None of these
62. Software is
Something that can be touched Something that cannot be touched*
Something used only as an output device Something used only as an input device
63. Which of the following is called the brain of computer?
Motherboard Slots Processor* Power supply
64. On the motherboard (the) … is the temporary computer memory area in which data can be stored.
expansion slot math co-processor RAM* ROM BIOS
65. The device used in a data communication network to perform the conversion between analogue and digital
signals, is called a …
front end processor. modem.* decoder. multiplexer.
66. When the electrical power is disrupted or cut off, data and programs are lost in/on (the) ...
basic tools. hard disk. memory.* secondary storage.
67. Read Only Memory (ROM)
Is Volatile Is programmable Is mounted on the mother board is Non Voatile*
68. The following code will " < Html >< HEAD > < TITLE > My new Web Page < /Html > "
Display "My new Web Page " As a heading on my Web page
Display "My new Web Page " On the title bar of the browser*
Display "My new Web Page " as a hyper link
Make "My new Web Page " appear in bold letters
69. In an HTML file, it is essential to have
< Head > tag < /Body > tag < Body > tag* None of above
70. Choose the correct HTML tag for the largest heading
< head > < h6 > < h1 >* < heading >
71. What is the correct HTML tag for inserting a line break?
< break / > < lb /> < breakline >
72. Choose the correct HTML tag to make a text bold
< b >* < bold > None Of the Above
73. Choose the correct HTML tag to make a text italic
< italic > < i >* None Of the Above
74. What is the correct HTML for creating a hyperlink?
< a href="http://www. Vulhr.com" > Vulhr.com< /a >*
< a url="http://www. Vulhr.com" > Vulhr.com< /a >
< a >http://www. Vulhr.com< /a >
< a name="http://www. Vulhr.com" > Vulhr.com< /a >
75. How can you create an e-mail link?
< mail href="abc@yahoo.com" > < a href="mailto:abc@yahoo.com" >*
< a href="abc@yahoo.com" > < mail >abc@yahoo.com< /mail >
76. Memory inside a microprocessor is called
RAM ROM Cache* Pre-fetch buffer
77. A hardware device that stores data and programs, executes program instructions, and performs arithmetic/logic
operations is known as the
CPU* Integrated Circuit Main Storage Memory
78. The component of the central processing unit that holds instructions, stores data and keeps results during the
processing is called the:
Arithmetic/Logic unit.* Control unit Main memory Micro processing chip
79. A group of binary digits that a computer manipulate as a unit is called
Byte* Word Bit Hertz
80. The decimal equivalent of binary 1000 is
7 8* 9 10
81. In the AND operation output is true if
All input variables have true state* Some of the input variables have true state
None of the input variables have true state All the input variables have false state
82. Which of the following binary numbers is equivalent to decimal 10
1000 1100 1001 1010*
83. The operation says if any input is on then the output will be on.
OR* NAND NOR AND
84. The operation says if and only if all inputs are on, the output will be on. The output will be off if any of
the inputs are off.
OR NAND NOR AND*
85. simply changes the input to the opposite (0 to 1 or 1 to 0).
Operator NOT* AND OR
86. JavaScript Array can hold elements of ------simultaneously
Single data type multiple data types integers and strings only integers and characters only
87. The process of converting information about 3-D objects into a bit-map that can be displayed on a 2-D
computer display is called
C rendering D Rendering E Renfering none
88. ________________ is a field that uniquely identifies each record stored in a table
Key Primary Key Foreign Key Query
89. The political process is also influenced by the computing by the use of _______________.
Computer discussion forums Newsgroups Mailing-lists All of the given
90. Tribal Flood Network is a _____________
DoS Software Scanning Software Arming Software Network-related Software
91. One of the key responsibility of the ___________is client relationship management
Team Lead Project Manager Developer Chief Executive officer
92. All of the following are properties of Mathematical functions in Java Script EXCEPT
Math.PI Math.E Math.LOG2E Math.2LN
93. CERN releases WWW in:
1992 1993 1994 None of the given choices
94. UTP stands for :
Ultra Twisted Pair Unified Twisted Pair
Unshielded Twisted Pair None of the given choices
95. ________ is the way that Internet domain names are located & translated into IP addresses.
FTP DNS Telnet None of these
96. What is NOT a key factor while designing a website
► Usability ► User-friendly ► Consistency ► Complexity
97. What happens if I start a new list without closing the original one
► An error will be generated ► A nested list will be created
► Previous list will end and a new will start ► Nothing will happen
98. The most upper right pixel of the screen is of ___________ color.
► Any ► Red ► Green ► Blue
99. A single pixel can acquire approximately ___________ color schemes.
► 1 million ► 2 million ► 10 million ► 16 million
100. The idea of Neural Networks field is based upon ______________.
► Human nature ► Human brain ► Human culture ► Human actions
101. Which one of the following is an application for artificial intelligence?
► Robotic ► Web Agent ► Decision Support System ► All
102. Which of the following is a true statement?
► Flat-file storage is better than tabular storage. ► Tabular storage is better than flat-file storage
► Flat-file storage is better than relational storage. ► None of the given options
103. substring(n, m) returns a string containing characters copied from position n to___________.
►m–2 ►m–1 ►m+1 ►m
104. The __________ is the old profession which is being eliminated because of computing.
► Typist ► Bank manager ► Operational manager ► All of the given options
105. The system that manages relational database, is called ______________.
► None ► Database Management System ► Data Management System ► Relational
Database Management System
106. When web server is busy it gives the following message to the user :
► Time out ► Waiting ► Server busy ► None of the given options
107. The group of technologies concerned with the capturing, processing and transmission of
information in the digital electronic form is called _____________
► Telecom Engineering ► Computer Engineering ► Computer Science ► Information
Technology
108. ___ team consists on the sharpest technical minds in the company.
► Architecture ► Business Development ► Configuration Management ► Developer
109. A collection of data organized in such a way that the computer can quickly search for a desired
data item is known as :
► Retrieving ► Database ► Information ► DBMS
110. Microsoft Word is a type of--------------------software
► System ► Freeware ► Shrink-Wrapped ► Custom-built
111. Users __________, how things work.
► Analyze in detail ► Muddle through ► Figure out ► Read in detail
112. Popular schemes used for reducing bytes for storage are:
► RGB and Color mapping ► Color mapping and Dithering ► RGB and Dithering
► RGB, Color mapping and Dithering
113. Hardware malfunctions is related to
► Data updates ► Data integrity ► Data security ► Data accessibility
114. If incorrectly we enter the negative age it is check by
► Limit Integrity ► Type Integrity ► Referential Integrity ► Physical Integrity
115. Which is the user-friendly way of presenting data ?
► Query ► Form ► Report ► All of the given options
116. Currently the Blue Ray DVD can store more than ________ of data.
► 10 GB ► 100 GB ► 50 GB ► 150 GB
117. In JavaScript, a || b is interpreted as
► a is true or b is false ► a is true and b is true ► a is false and b is true
► a is true or b is true or both are true
118. Speakers fall into the hardware category. ► True ► False
119. onBlur event is occurred for a form element when it ____________
► Gets focus► Losts focus ► Some thing is typed in ► onBlur is not an event
120. You can view a 3-D image on a _____________.
► 3-D display ► 2-D display ► On both a & b ► We can not view a 3-D image
121. Module level design and unit testing is the responsibility of _____________.
► Team Lead ► Developer ► Project Manager ► Quality Assurance Expert
122. _______ consists of cells arranged in rows & columns
► Spreadsheets Software ► Word processor ► Presentation Software ► Microsoft Paint Software
123. Forms can be submitted through _______ & _______ methods
► INCLUDE, POST ► INCLUDE, GET► GET, POST ► SEND, POST
124. To display a checkbox on the web page, we use ___ tag
► CHECKBOX ► CHECK► INPUT ► INPUTBOX
125. You can ________ from/to a website containing interactive forms.
► Only read► Only write ► Read and write ► Not read and write
126. There is a battery on the motherboard to:
► Give power to the processor► Save information when computer is off
► Save information when computer is on ► Give power to the motherboard
127. ___ contains the name of the protocol required to access the resource, a domain name that identifies a specific
computer on the internet and a pathname on the computer
► HTML ► HTTP ► URL► WWW
128. WWW stands for:
► Wide World Web ► World Wide Web ► World White Web ► World Web Wide
129. The weaknesses of the computer are:
► Pattern recognition & Storage► Speed & Innovative ideas ► Speed & Storage ► Pattern
recognition & Innovative ideas
130. Floating point unit is also known as _________ unit
► Real ► Integer ► Numeric ► Fractional
131. Programs that reside on Web servers and receive info that a user enters in a form, are known as: ► Server-
Side Scripts ► Client-Side Scripts► Super Scripts ► Form Scripts
132. What will be the result of the following formula in Spreadsheet application ? SUM(A2:A3)
=_________(Assume that A2 = 25 A3 = 75)
► 25 ► 50 ► 75 ► 100
133. ____________ is system software that converts the source code written in high level language into machine
language code.
► Utilities ► Drivers ► Language Translator ► None of the these
134. ________ is a program that executes instructions line by line written in a high-level language.
► Interpreter ► Compiler ► Predictor ► Executor
135. There are_________________ rules to write the Pseudo Code.
► Standard ► No standard ► Strict ► Pre-defined
136. Which one is not the building block of an algorithm?
► Statements ► Sequences ► Repetitions ► Conditionals
137. In flow charts, there is only one entry point in conditions while there is/are__________ exit points. ► 1
►2 ►3 ►4
138. A procedure that usually but not always works or that gives nearly the right answer is called_____________
► Deterministic Algorithm► Heuristic Algorithm ► Greedy Algorithm ► Randomized Algorithm
139. A Modem is a kind of ___
► Input device► Output device ► Storage device► Input and Output device
140. The memory size of the Altair 8800 was
► 128 bytes ► 128 Kilo bytes ► 256 Kilo bytes ► 256 bytes
141. Cray-1 was first commercial _________ computer.
► Super ► Mini ► Micro ► Personal
142. __________ language is very good for writing well-structured and readable programs, but it is not as flexible as
the C programming language
► BASIC ► PASCAL ► JAVA ► FORTRAN
143. A computer program that facilitates the communication between the computer and a peripheral device is
called___________________
► Operating system ► Utilities ► Language Translator ► Device Drives
144. AutoCAD falls in the category of _________________
► Engineering Applications ► Graphics Applications► Scientific Applications► Business Applications
145. Which one of these is NOT an example of embedded computers?
► IMB PC ► Microwave oven ► Refrigerator ► Calculator
146. Supercomputers are used in:
► Weather forecasting ► Aeroplane manufacturing ► Atomic bomb experiments
► All of the given choices
147. In which case Cache Memory is used
► To increase RAM speed► To overcome BUS speed► To overcome CPU speed
► To overcome Speed rate between RAM and CPU
148. A set of stand-alone productivity applications designed to work together known as
► Productivity software suites ► Compiled software► Secure software► Intelligent software
149. File handling in java script is done ___________.
► In more accurate way► In more easy way► Both more easy and in accurate way► Not at all
150. Which one of the following is a valid variable name?
► Break ► Switch ► Catch ► None of the given
151. An algorithm that always takes the best immediate or local solution while finding an answer is
called_____________________
► Deterministic Algorithm ► Non deterministic Algorithm ► Greedy Algorithm ►
Randomized Algorithm
152. Expression format in cell D4 is NOT correct. ► True► False
153. User interface provided by UNIX operating system is:
► Shell / GUI ► Shell ► GUI ► Command line
154. It represents the _____________ flow chart element.
► Flow Line ► Connector ► Off-page connector ► Start or Stop
155. JavaScript is an example of _____________ language.
► Object-based ► Object-oriented ► Machine ► Assembly
156. The set of rules and guidelines a team of developers follow to construct reasonably complex SW systems is
called
► Object Oriented Design► Object Oriented Software► Design Methodology► Programming language
157. Waterfall is a _________ life-cycle model.
► Spiral ► Sequential ► Circular ► Spherical
158. In Spreadsheets, you can create a relationship between two cells by using _____.
► Numbers ► Text ► Formulas ► None of the given choices
159. Fins are used to --------------
► Communicate with microprocessor ► Increase surface area of Fan
► Decrease surface area of Fan► Speed up the Fan.
160. Everything that JavaScript manipulates is treated as:
► Object ► Window ► Text ► Script
161. The ______ is connected to all other modules of the microprocessor.
► Control unit ► Memory unit► Floating Point unit ► Arithmetic and Logic unit
162. Communication protocol is a __________that governs the flow of information over a network
► Set of protocols ► Set of rules ► Device ► Set of methods
163. ______ is the interface in computer that supports transmission of multiple bits at the same time.
► Serial Port ► Parallel Port ► Universal Serial Bus► None
164. _____ was designed as a replacement for typewriter
► Spreadsheet Software ► Word Processor Software► Presentation Software► Database Software
165. Which one of these translates the program once at a time?
► Interpreter ► Compiler ► Operating system ► Translator
166. Ada written a computer programme for ?
► Analytical Engine ► Difference Engine ► Harvard Mark 1 ► Mechanical engine
167. A test proposed to determine if a computer has the ability to think. It is called?
► Turing test ► Turning test ► Intelligence test ► None
168. The most used form tag is the <input> tag. ► True ► False
169. When the user clicks on the "Submit" button, the content of the form is sent to the server. ► True ► False
170. Extensions for saving web page are / are;
► *.html ► *.htm ► *.html and *.htm both are in use ► None of These
171. In spread sheet a cell may contain
► Numbers ► Text ► Formulas ► All of the given
172. Programs where no user interaction found during program execution are called __________.
► Batch programs ► Event-driven programs ► Graphics based programs ► None
173. OO software is all about _____________.
► Behaviors ► Methods ► Properties ► Objects
174. Website design should NOT be __________.
► Unified ► Complex ► Consistent► Predictable
175. Which of the following is NOT an example of Multi-user Operating system
► Windows ► Linux ► DOS ► Solaris
176. According to the heuristic, the number of defects remaining in a system after a given level of tests is
proportional to ___________.
► The number found on very first day. ► The number found during the development
► The number found during the test. ► None of the given options
177. Which one of the following is NOT a component of Rule Based System?
► Rule Compiler ► Rule Interpreter ► Rules Base ► Working Memory
178. In RDBMS, table rows are called __________.
► Field ► Record ► Column ► Query
179. _________ can be used for entering, editing, or viewing data, one record at a time.
► Queries ► Forms ► Reports ► None of the given options
180. Unlike virus, ___________ is a stand-alone program.
► Trojan horse ► Logic bomb ► Worm► Time bomb
181. The key responsibilities of a project manager are _____________.
► Planning and tracking of the project ► Arranging of the appropriate resources
► Client relationship management► All of the given options
182. The key responsibilities of the architect of the project is______________.
► Technology selection ► High-level design ► All of the given options
► makes certain that the implementation remains true to the design
183. _______________ is responsible for day to day operations.
► CEO ► COO ► CMSO ► Developer
184. on Abort , on Error are the _______________ of the image object.
► Event Handler ► Properties ► Methods ► None of the given options
185. The tasks performed to detect the exact location of defect is called______
► Debugging ► Testing► Repairing► Monitoring
186. _____________ routes the packets through the internet to go to their destination.
► Protocol ► TCP► IP► NIC
187. When we buy a software package, we do not really buy it, we just by a license that allows us to use it, the
___________stays with the maker.
► Agreement ► Ownership► Membership► Software
188. To start an ordered list from 20 instead of 1, we will write
► <OL begin = “20">► <OL initiate = “20">► <OL start = “20">► <OL from = “20">
189. To display a multi-line text area on the web page, we use ___ tag
► TEXT► TEXTAREA► INPUT► INPUTAREA
190. The first component of an operating system that runs when a typical computer is turned ON,
► Device Manager► File Manager► Loader► Device Driver
191. Pseudo code is written in
► Complex grammar► Plain English► JAVA► Pseudo language
192. Instead of Full System, one can _____ results from part of a System
► Not achieve ► Mostly achieve► Sometimes achieve► Achieve
193. One can download or upload files to a remote computer using ________ protocol
► HTTP► SMTP► FTP► TELNET
194. Which protocol is used to control other computer from our own computer
► FTP► NNTP► TELNET► None of the given choices
195. Which function returns a randomly selected floating point number between 0 and 1 ?
► floor(x) ► ceil(x) ► random()► round(x)
196. Global variables can make the logic of a web page.
► Difficult to understand► Easier to understand and maintain► Difficult to reuse and maintain► Difficult to
understand, reuse and maintain
197. Mathematical functions in JavaScript are accessed by referring to various methods of the _____________
object.
► Math ► Calculate► Compute ► None of the given options
198. Human are better than computers at
► Efficiency ► Accuracy► Pattern recognition► None of the given choices
199. First computer network was ___________.
► NSFNET ► FIRSTNET► ARPANET► ORPHANET
200. A user may access any item on the web through __________.
► URL► Telnet► POP► SMTP
201. In JavaScript, a variable declaration is
► Optional► Mandatory► Not allowed► None of the given
202. According to a popular heuristic, success is defined by ___________.
► The user ► The builder► Both user and builder► None of the given options
203. To store rounded number of 8.6 in a variable called "r_number", we write
► r_numbers=Maths.rounds(8.6) ► r_number=Math.rounds(8.6)
► r_number=Math.round(8.6) ► r_number=Maths.round(8.6)
204. random() function returns a randomly-selected, floating-point number between
► 0 and 1 ► 0 and -10► 0 and -1 ► 0 and 10
205. Trinoo is a __________ software.
► DoS ► Scanning► Utility► None of the given options
206. Which attribute of the IMG tag tells us about the source of the image ____________.
► source ► path► loc► src
207. The developer report to ___________ in a development team.
► Team Lead ► Project Manager► CEO► IT Manager
208. The effective way not to only write programs but also it works properly and further
209. more to minimize the time and the development cost of the program is called
► Programming Mechanism► None of the given options
► Programming Methodology ► Programming Synchronization
210. Many developers write the _ first and then incrementally convert each line into _________.
► Real code & Pseudo code ► Pseudo code & Real code► Real code & Artificial code ► None
211. Collection of facts & figures is called ____________.
► Information ► Data► Entity► Attribute
212. Using COLSPAN, number of rows of the current cell should extend itself
► Upward ► Downward► Both Upward and Downward► None of the given choices
213. Compound Statement after decision constructs in JavaScript is enclosed with
►() ►[] ► { }; ►{}
214. One can send an email message to a remote computer using _______ protocol
► HTTP► SMTP► FTP► TELNET
215. Writing a response, multiple statements are separated from each other with the help of
► Period ( . ) ► Comma ( , ) ► Colon ( : ) ► Semicolon ( ; )
216. With the passage of time the field of Computing and Telecommunication is
► Diverging ► Converging► Becoming different► Becoming unique
217. When we have to show value as part of a whole picture, which type of chart is used.
► Bar chart ► Pie chart► Line graph► None of the given
218. ______________ Software directly interacts with the user.
► Application software ► System software► Anonymous software► Interactive software
219. In partitioning of program/module, it should be assured that partitioned chunks should be as _________ as
possible.
► Dependent► Independent► Complex► All of the above
220. The structure in which another list starts before the first list is finished is called .
Multiple List Nested ListPG # 52 Ordered List Un-ordered List
221. retains its information when the power of the system is turned off.
RAM DIMM ROM PG # 25 SIMM
222. Represents element(s) of flow chart.
Only start Only stop Both start and stop PG # 105Connector
223. Software development starts from and ends with .
Design, Coding Concept, Designing Coding, Testing Concept, Decommissioning
PG # 134
224. For drawing charts on the basis of mathematical calculations, which of the following software is considered
most efficient and easiest choice?
Spreadsheet Word Processor Database Management System Dreamweaver
225. Hexadecimal number system is based on digits
2 8 12 16
226. Java script interact with user through
Special control Internet explorer Event handlers Java script does not interact with user
227. 228. Which one is correct for JavaScript?
onMouseOver OnMouseOver onmouseover all
228. Users communicate with the computer using a consistent user interface provided by the OS.
► True ► False
229. Web standards are being developed by
► Mozilla► Microsof t► IBM ► World Wide Web Consortium
230. -------are great for showing parts of a whole that are generally expressed in percentages.
► Line Charts► Pie Charts► Bar Charts► None of the options described
231. A diode is a _terminal device
► Three► Two► One► None of above
232. Select the attribute of the <form> tag
► Method► Action► Value► All of above
233. interacts directly with the computer Hardware
► Compiler► Operating system Repeated► Application software► Assembler
234. If type attribute of INPUT tag is set to "reset", then it will:
► Set all fields to their default values Sure► Save all the data
► Set the shape of all the fields► Do nothing, you have to write code for it
235. The world first computer program was written to compute:
► Simple sequence► Multiple sequence► Bernoulli’s sequence page 9
► Increasing sequence
236. The key strengths of computers are
► Speed► Storage► Do not get bored► All of the given choices Sure
237. Which of the following is NOT supported by PC's power supply.
► -12 and +12 V DC► -10 and +10 V DC► -5 and + 5 V DC► All are supported
238. NOWRAP extends of a cell, if necessary, to fit the contents of the cell the in a single line
► Height► Length► Width page 56► Value
239. HTML pages are edited by
► MS Front page► Notepad► Dream weaver► All
240. PowerBuilder falls in the category of .
► Assembly Languages► 4-th Generation Languages► Machine Languages► High-Level
Languages
241. Java script is an.
► Object based language► All of the given page 96
► Interpreted language► Event driven language
242. In java script objects may have properties.
► Single► Several► Multiple► All
243. JavaScript does not support
► User interaction► Graphics► Network operations Page 120
► Both Graphics and Network operations
244. ----refers to the firmware code which is run by an IBM compatible PC when powered on first
► DOS► BIOS page 61► Utility Program► None of these
245. RTOS stands for
► Real Task Operating System► Random Time Operating System
► Rational Time Operating System► Real Time Operating System p a g e 67
246. -------- is an electronic path within a Computer System along which bits are transmitted.
► Port► Slots► Bus ► Modem
247. A microprocessor can be made more powerful by increasing its
► Clock frequency► Word length► both► None of above
248. A British scientist named John A. Fleming made a vacuum tube known today as a diode. Then the diode was
known as a "valve," Is it true? ►true ►false
249. <form> Tags always placed between the <BODY> and </BODY> tags of a Web page
►True ►False
250. For connector the following symbol is used:
►Square ►Rectangle ►Diamond ►Circle Page 105
251. After starting computer, which module of operating system activates first?
►Linker ►Kernel ►Loader ►Device manager
252. "Every minute dies a man, And one and a sixteenth is born" said by?
►Alfred, Lord Tennyson ►Charles Babbage during Video lecture ►Ada, Countess of Lovelace
►Babbage and Lord Tennyson
253. Mainframe Computers are also called
► Enterprise Servers► Personal Servers► Enterprise Managers► Window Servers
254. Which of the following is NOT a category of Mobile Computers?
► Laptop► Palmtop► Desktop sure► Wearable
255. Preliminary exploration of possible solutions, technologies, suppliers is called
► Viability► Feasibility► Specification► Integration
256. Give us the ability to manipulate data through reference instead of actual value.
► Constants► Variables Page 143► Data Types► Operators
257. A tool that helps you to find the synonyms is called .
► Language► Paragraph► Thesaurus► Symbol
258. Web is a unique invention by humans in terms that it is:
► accessible to only the owners who control it
► accessible from particular locations only
► accessible to all humans sure
► accessible to only the educational institutes
259. In this URL http://www.msn.com , identifies the domain name
► http ► www ► msn ► com
260. is simply a fast port that lets you connect computer peripherals and consumer
261. electronics to your computer without restart.
► Freeware► Shareware► Firewire Page 24► Firmware
262. To display a single line text area on the web page, we use tag
► TEXT► TEXTBOX► INPUTBOX► INPUT
263. If an algorithm is syntactically correct, but semantically incorrect then this situation is
► Very good situation ► Very dangerous situation ► Not very bad
► Neutral situation
264. Application developers do not need to know much about the HW, especially the microProcessor, while they are
developing their application.
► True ► False
265. The first spread sheet program was invented by
► Charles Babbage► Dan Bricklin► Paul Graham► John von Neumann
266. Which representation technique of algorithm is more suitable for developer to make actual code
► pseudo code ► flow chart► both a and b► Heuristics
267. ----------is used to terminate all JavaScript statements.
► Colon► Semicolon Lecture 21► Underscore► Apostrophe
268. In java script cookies can be created for future use .
► Easily► No facility at all► This is not possible without Java language
► Cookies are files so java script can not handle it
269. When the microprocessor desires to look at a piece of data, it checks in the
► RAM ► ROM ► hard disk► cache
270. Which of the following hardware component of a computer can also be called as engine?
► Bus► Storage► Memory► Processor
271. The Processor is specially designed for PDA?
► PowerPC► StrongARM Page 24► Crusoe► SPARC
272. There are ways to represent an algorithm.
► 1► 2► 3 Greedy, Deterministic and Randomized. ► 4
273. -----is a particularly good language for processing numerical data, but it does not lend itself very well to large
business programs
► BASIC► PASCAL► JAVA► FORTRAN page 131
274. In spreadsheets, cell address A12 means .
► Row A, Cloumn 12► Row 12, Cloumn A► Row 2,Cloumn A1► Row A1, Cloumn 2
275. The key feature of Scientific/Engineering/Graphics applications is
► Intense calculations► User-friendly► Reliability► Cost-effective
276. Command which saves the selected text before deleting is
► Copy► Delete►Cut► Undo
277. Properties of an object are modified with
► Class► Methods page 142► Structures► Forms
278. Computers are good at
► Speed► Storage► Never bored► All of the given choices
279. The set of instructions that operates various parts of hardware is called shareware.
► True ► False Share ware is the type of soft ware.
280. Which of the following formula is used in spread sheet for addition?
► C6+E6► =C6+E6► 6+6=12► 6+E6
281. Web Pages developed for human as well computer understanding are called as;
► Static Web Pages► Semantic Web Pages► Dynamic Web Pages► Java Web Pages
282. In , the software developer decomposes the problem into subsystems and defines their relationships.
► Detailed Design► Integration Testing► Design page 137► Architecture
283. What is the key feature of computer which is against human nature?
► Can’t get bored. ► Pattern recognition► Repetition► None
284. The first---was invented at Bell Laboratories on December 16, 1947 by William
285. Shockley.
► Transistor page 14► Vacuum Tube► Punch card► Transmitter
286. A diode functions as the electronic version of a _-way valve.
► one ► two► three► four
287. What is name of book from which word algorithm is taken ?
► Algebra and trigonometry► Introduction to algorithms► Research for new horizons►
Algoritmi de numero Indorum Lecture 16
288. Machine language is also called
► Assembly Language Repeated►Binary Language►High Level Language►HTML Language
289. When the user needs something to be done by the computer, he/she gives instructions in the form of
to computer
► Software, Hardware► Hardware, Software► Graph, Monitor
► System Software, Application Software
290. A truth table defines the of a logic function for all possible
► Input – Outputs Lecture 8► Output -- Inputs► Process -- Inputs► Input – Processes
291. Data travels through bus in the form of ---------------------------
► Packets► Bits► Bytes► Word
292. Which of the following number system is used by microprocessor?
► Binary Lecture 8► Decimal► Octal► Hexadecimal
293. Detailed plan, specifying the required resources and expected deliverables, is done in phase.
► Planning► User Requirements► Design►Developer Specification Page 136
294. A combination of word processing and graphic design is
► Corel Draw► Paint► WordPad► Desktop Publishing page 83
295. ASCII WHITE is the fastest Super computer which can perform calculations in one second.
► 1.3 billion► 1.3 trillion► 1.3 million► 1.3 thousand
296. ------is the example of server-side scripts on Unix servers.
► ASP► CGI page 71► VBScript► JavaScript
297. Data was stored and counted mechanically using decimal storage wheels,---rotary dial switches.
► 300,400► 1300,1400► 30100,14100► 3000 , 1400 page 14
298. In x = x + 20, x is called a .
► Constant► String► Variable► Number
299. The transistor is a solid state semiconductor device used for amplification and switching, and has
terminals.
Two three page32 four one
300. This element of Flow Chart is called .
► Process ►Off page connector Page 105► Decision► Connector
301. Choose the correct html format to create a checkbox.
► <checkbox>► <input type=”checkbox”>* ► <check>► <input type=”check”>
302. ---------------is the process of starting or restarting a computer.
►BIOS ►Refreshing ►Booting ►None of given
303. Ada, Countess of Lovelace developed first:
► Computer► Website► Computer Program Lecture 1► Analytical engine
304. Charles Babbage was a/an
► Mathematician Lecture 1► Computer Scientist► Physician► Analyst
427. In spreadsheet, which of the following function is used to solve the equation 3 x 2 x 5 0 ?
3
751. When the packets reach at destination, reassembles them into original message.
► 9 ► 11► 13 ► 5
759. A Special program required to view swf (Shockwave Flash) files in web Browser is called
Visible everywhere on the web page Visible only in the block in which they are declared
Visible only in the main code None of the given choices
764. MATH functions are accessed by referring to various of the Math object
Functions Events Properties Methods
765. Rule of thumb learned through trial & error is called
Heuristic Mistake Common sense Experience
766. Algorithm is a
Definition of a problem Sequence of steps to solve a problem
Understanding of a problem Solving a problem
767. The internet-society is considered under Surveillance because:
While surfing, we are being watched, constantly
Our every click is recorded and analyzed to extract patterns and behaviors
Webcams are becoming common. Providing a cheap way for parents to watch their children's every
move
All of the given
768. Punched cards were replaced by:
Floppy Disk Zip Drives Magnetic storage None of the given choices
769. Because of spending more time on the internet, the distances among the families have been
Increased Expanded Contracted Shortened
770. -----------based on the principles of the logical reasoning ability of humans. Select correct option:
Genetic Algorithms Rule-based Systems*pg 242 Feed-Forward Network None of
these
771. DoS is
Crime Cyber crime Not a crime A software
772. ERP is a type of----------- software .
► Entertainment ► Productivity ► Business ► Scientific
773. What is/are the use/uses of Word processor?
► To write a letter► To write Research paper or report
► To create address labels► All of the given
774. Automatic machines performing various tasks that were previously done by humans, are called
► Robotics (page.no.244) ► Computers► Decision Making Systems
► Autonomous Web Agents
775. Database consisting of two or more related tables, is called
► Flat file database► Object oriented database► Tabular storage database
► Relational database (page.no.263)
776. After the DoS attack in year 2000, Yahoo servers were recovered in
► 1 hour► 2 hours► 3 hours► 4 hours
777. To stop industrial espionage, we use .
► Private network► Encryption► Network sniffer► All (page.no.277)
778. In JavaScript, second element of an array has the index:
► 2► 0► 1*► 3
779. -----occurs when a function calls itself.
► Recursion*► Call by value► Call by reference► Parsing
780. Which of the following is NOT RDBMS software?
► My Sql► MS Excel► Oracle► SQL Server
781. A computer virus is a
► Software that saves the computer from being damaged.
► Application software that helps to make different type of viruses and worms
► Program that spreads itself and destroys other program
► Program that corrects the problems in your computer
782. In JavaScript, what will be the result of the following operation 79%3
► 0► 1► 2► 3
783. The political process is also influenced by the use of .
► Discussion forums► Newsgroups► Mailing lists► All
784. To improve the time for scanning a web page, text should be .
► Centered► Left Aligned► Right Aligned► Staggered
785. In JavaScript, first element of an array has the index:
► 1► -1► 2► None of the given choices
786. In flat-file databases each record was separated by a special character named :
► Horizontal bar► Vertical bar► Text bar► Character bar
787. 74HC163 has two enable input pins which are and
► ENP, ENT► ENI, ENC► ENP, ENC► ENT, ENI
788. Due to working at home, contact with the colleagues is , which may result in quality of work
► Reduced, Poorer► Reduced, Better► Increased, Poorer► Increased, Better
789. What is the 2nd step of DoS attack?
► Race► Arm► Search► Attack
790. The Information technology has three components .
► Telecom Engineering, Network Engineering, Computer Science
► Telecom Engineering, Computer Engineering, Computer Science pg295
► Telecom Engineering, Computer Engineering, Database Engineering
► Telecom Engineering, Computer Engineering, Hardware Engineering
791. From which of the following is NOT a technique through which Security can be improved :
►Private or virtual-private networks► Firewalls► Metal detectors► Virus detectors
792. Navigation should remain .
► Consistent► Conflicting► Contradictory► Unpredictable
793. is a container that holds a value.
► Identifier► Variable► Function► Constant
794. Programs that run on client machine and validate info that a user enters in a form, are known
as:
► Server-Side Scripts► Client-Side Scripts► Super Scripts► Form Scripts
795. are the computers that perform at or near the currently highest operational rate for computers.
► Minicomputers► Microcomputers► Supercomputers► Personal Computers
796. A named collection of properties (data, state) and methods (instruction, behavior) is called
►Array► Function► Variable► Object 202
797. In Heuristics “Common Sense Lessons” are drawn from
► History► Experience► Biography of Scientists► General knowledge
798. Which one is NOT a presentation software?
► MS Access► CA Harvard Graphics► Corel Presentation► Lotus Freelance
799. A stream of large sized emails are sent to an email address for overloading the destination
account, is called .
► DoS Attack► Break-Ins► Mail Bombing► All of the given options
800. Quantum Mechanics is the branch of ; which describes the activity of subatomic particles
► Chemistry► Computer Science► Physics► Biology
801. manages the HW and SW resources ( memory, disk drives etc) of the computer system, often
invisibly.
► Explorer.exe► System Files► Operating System► Application Software
802. Combining the “fuzzy rules" is done by the technique(s).
803. MAX-MAX MAX-MIN MIN-MAX PG # 242 Both MIN-MAX and MAX-MIN
804. A set of software that handle all database related operations of an organization is called
Database management system Database design system
Database access system Content management system
805. Every phase of the project development require reporting on completion. When a developer
completes his/her assigned module, he has to report to the .
Team Lead Project Manager CEO IT Manager
806. LCD display screens provide display.
1 dimensional 2 dimensional PG#305 3 dimensional 4 dimensional
807. A Home page is a part of a .
Terminal Web site PG#18 Browser Protocol
808. Which of the following is not true for JavaScript?----------language
Scripting Case Sensitive Object Based Markup PG#119 and 120
809. In an IP address, there are four set of numbers which are separated by periods.
12-bit 16-bit 32-bit 8-bit PG#210
810. If the calling function is a part of a JavaScript statement then the definition of this function will
must have the Statement.
Break Terminate Return Switch
811. The organizations using the network organizational model have structure.
Simple Complex Flexible Accurate
812. In Relational Database table columns are called .
Records Values Fields Unions
813. refers to DoS attack.
Overburdening of the system Theft of data Corruption of data Modification of data
814. JavaScript’s response against the user-initiated events is called .
Object detection Boolean logic Opacity setting Event handling
815. Complex Software development process requires the developers to follow some specific set of
rules and guidelines which can be termed as
Object Oriented Software Design Methodology PG#131 Programming Language
Object Based Design
816. By studying the history of spreadsheet software, we come to know that was the first
spreadsheet Software.
MS Excel penOfiice.org Calc LibreOfficeCalc VisiCalc PG#83
817. Which of the following cannot be considered as a property of image object?
Hspace Height onLoad PG#286 lowsrc
818. A website resides over
PDA WWW Browser CPU
819. The has considerably changed the way of marketing forever, redirecting it from a mass Focus
to a single person focus
Television Web PG#281 Mobile Radio
820. A software on a user's computer, acting as an interface between the user and internet is called
as a
Browser PowerBuilder Front Page Navigator
821. Software Development Process involves working of different teams but team has its Major
contribution in a project after the designing phase.
QA Architect Development HR
822. Client is the basic entity in software development. It is the responsibility ----of to manage the
client's matters.
Project Manager Team Lead Developer Quality Assurance Engineer
823. Computer display is composed of a regular grid of
Bits bytes sectors pixels PG#235
824. -----is a container that holds a single value.
Array Variable PG#199 Function Set
825. -----tells the capacity of any array in terms of storing values.
Index Length PG#178 Type Name
826. If you want to assign an IP address to your computer, you can use any number from in
each part of IP address.
1 to 255 0 to 255 PG#210 0 to 256 1 to 256
827. select the best characteristic of telnet.
It is used to send email It is used to login remotely PG#211
It is receive to email It is used to read online news
828. provides the facility of searching and downloading the new e-mail messages to an e- mail client.
HTTP POP3 PG#213 TCP FTP
829. which of the following is the instant Message service available on the internet?
HTTP IE AIM PG#235 FTP
830. ---can be used in JavaScript to open multiple popup Windows when a particular web page is
opened.
onAbort onchange onLoad PG#232 onUnload
831. For good presentation and better visibility of text, we should use background color in
each slide.
Light Dark PG#222 Faded Transparent
832. If one operand of “+operator “is a string and the other one is a non string, then JavaScript.
Produce an error message Converts the non string to string
Concatenates the string and non string Performs both conversion and concatenation PG#272
833. JavaScript fixed() function has equivalent HTML tag-set . .
<P>… </P> <U </U> <PRE>………..</PRE> PG#270 <H>… <H/>
834. ------program are those programs in which the flow of the program is determined by the user’s
actions (mouse click, key presses) or message from other programs.
Event called Event processed Event driven Event declared
835. In the early days were used to store data.
Access files Database files Flat files PG#260 Excel files
836. In the context of intelligent systems, softbots is also termed as .
Mobile phone Autonomous web agentPG#244 Any wireless device SIM card
837. Working of any system depends upon its various components. Which component, a Rule Based
system (intelligent system) would not have?
Rule interpreter Rule compiler PG#242 Rulebase Working memory
838. Using a software without the author’s permission is called
Ip spoofing Software privacy PG#276 Mail bombing DoS Attack
839. We know a virus is a combination of two parts, .
Header and payload Header and transmission mechanism
Payload and data Payload and transmission mechanism PG#277
840. For creating 2-d animations, will be the more appropriate choice.
Flash HTML image class Web Browser HTML 2D Class
841. Which attribute of the image tag in HTML is used to mention the source of an image?
Source Path Src PG#285 Loc
842. The task performed to determine the existence of defects in a program is called .
Bug fixing Debugging Testing PG#311 Defect killing
843. routes the packets the through the internet to go to their destination.
Telnet TCP IP pg#317 NIC
844. Which of the following hardware components is the most important for the operations of
database management system?
High resolution video display Printer plotter High speed, large capacity storage media
845. Highest bandwidth of channel can be up to:
Tb/s PG#190 Kb/s Mb/s Gb/s
846. Unlike a program with a syntax error, a program with a error is valid program in the language,
though it does not behave as intended.
Run time Syntax Semantic PG#312 Special
847. In HTML, which tag is used for the highest level heading?
<h5> </h5> <h2> </h2> <h1> </h1> <title> </title>
848. Integrated circuit can be classified into
Analog Digital Both PG#31 None of the above
849. -----has slots to contain the different PCI cards
Memory Bus System Bus Mother Board PG#27 CPU
850. ENIAC was the first computer.
Large-Scale General-Purpose Electronic All of the given choice
851. Attribute/Attributes of the good application software is are:
Easy to install User interface Consistent All of the above PG#85
852. interact directly with the user.
Device drivers System software Application software PG#85 Kernel
853. Which of the following not a flow chart element?
Off-frame connectorPG#105 Input or output Process connector
854. In , a system is designed by fitting together a collection of independent and self- contained
components.
Structured design Component design Object oriented design PG#131 None
855. Linux is type of operating system
Single user Multi user Distributed None of the given
856. Algorithm is a precise sequence of limited number of , steps that terminates in the
form of a solution
Ambiguous, Executable Nondeterministic, Finite Finite, countable Unambiguous,
executable PG#100
857. Decompose the problem into subsystem and define their relationships is done in phase.
User requirementPG#137 Planning Integration testing Detailed design
858. Which attribute/attributes will we use to limit the capacity of text box to 20 characters?
Maxlength=”20” PG#74 Length=”20” Size=”20” All of the above
859. Suppose you are the presenter and you want audience in touch during presentation then what
will you do?
Write long sentences on slides Keep same color for the background and text
Use of videos , animation and sounds Using very small font size
860. Arguments values are passed to the function
By value By reference Both a & b PG#201 None of the given
861. Two or more computers connected together so that they can share information and resources
are termed as:
Computer networksPG#185 Computer protocols Network topologies None
862. Network Organization so that network organization works effectively to meet the business
goals the organization.
Shares knowledge Decentralizes the control of the operation
Shares knowledge and decentralizes the control of the operation PG#281
Shares knowledge and Centralizes the control of the operation
863. provides software tools needed to organize & manipulate the data in a flexible manner.
Data Base DBMS PG#254 Data Mining File system
864. A property that gives the values of Pi is:
PI() Graph. PI Math.PI PG#248 Math.PI()
865. Databases consisting of two or more related tables are called
Databases Relational Databases PG#262 RDBMS Flat-Files
866. Utility software is type of Software
System Application Both a & b None of the given
867. The user’s & the contact’s IM clients are ready to communicate directly, this communication is
called:
Peer-to-peer PG#217 Client-server Peer-to-peer Ad hoc network
868. Events can be captured in the HTML code, and then directed to a JavaScript for an
appropriate response
BODY TAG PG#228 HANDLER FUNCTION EVENT
869. The cyberwarefare is a
Crime War Software Game
870. The message is prepared using:
e-mail clientPG#213 SMTP server POP3 server All of the given choices
871. Which of the following is used to attain something productive as opposed to games or
entertainment software’s?
System software Application PG#61 Programing Productive software
872. Which of the following can NOT be contained in interactive forms?
Text box Check box For loop PG#69 Radio button
873. --------registers can store both data and addresses.
Data Vector General Purpose Registers PG#35 Special purpose Registers
874. Which attribute is used to submit a HTML form to a specified hyper link?
Method PG#71 Action Name None of the given
875. Which one of the following web programing languages is used to do client-side scripting?
ASP Server Side JavaScript PHP VBScript PG#95
876. Cache memory placed on a separate chip from microprocessor.
L1 L2 PG#34 Both None of the above
877. The best strategy used for complex Boolean operation is called . . . . . . .
Brute-force Greedy Algorithm Divide and conquer PG#45 None
878. An HTML document is develop in a plain-text editor called . . . . . .. . .
Nopade Notepad PG#83 Textpad Editor
879. -------is used for amplification, and has three terminals.
Resister Diode Transistor PG#32 Capacitor
880. JavaScript treats everything which it manipulates as .
Object PG#96 Method Window Text
881. Trialware software are used for
Short period PG#63 Long period Life time None of the given
882. If we want to show numbers with list items, then we use
<UL> <OL> PG#53 <DL> None of the given
883. To select multiple options in a list we use control.
Radio button Check box Selection list Ordered list
884. Without , a web site is read only.
Form PG#69 Dialog box Button Scroll Bar
885. Rules and regulations to communication in a network is called:
LAN Protocol PG#185 Hub None of the given choices
886. Scheduling is performed by of operating system
Device driver Kernel PG#67 Application program None
887. Consider the statement: “window. alert(“message”);”
It is syntax Error It will cause a dialog box to be appeared
Syntax is correct, but will compile with a warning
It will cause the “Message” to be copied to memory
888. executes the specified JavaScript code when a window loses focus or a form element loses focus
OnBlur PG#230 onFocus onLoad onUnload
889. Which protocol is used for receiving E-mail message?
FTP POP PG#212 Telnet Protocol SMTP
890. In JavaScript every user-defined function must be written between tag-set
<JAVASCRIPT> </JAVASCRIPT> <SCRIPT> </SCRIPT>
<FUNCTION> </FUNCTION> <CODE> < /CODE >
891. A combination of and is called Desktop Publishing.
Word processing , graphics design PG#88 Word processing , spreadsheets
spreadsheets, graphics design none of the above
892. A user plug in sound card in computer, is required so that the sound card can perform its tasks.
Hardware Device driver Application driver Compiler
893. Boolean variables can only have values
Hexa Decimal Binary PG#43 Both Hexa & Decimal
894. -----performs all the controlling and management activities in a computer.
Hardware Application software MS Word Operating system
895. Assume that we want the text | save| to appear on a button, which attribute of the INPUT tag
will be used to do that?
Write Name Value PG#75 Type
896. JavaScript can be used along with HTML to .
style the Web secure the web page make content interactive color the web page
There are mainly two types of networks according to network access policy namely:
Public & commercial Private & public PG#186 Private & Non- private None
Array variable
Array class
prevent collisions of packets caused by simultaneous transmission between two or more computers.
Security
Protocol PG#190
Authorization
Homogeneous
Heterogeneous PG#180
Private network
Public network
VPN PG#187
Q181: The function which call themselves from their (own) body are called:
o Virtual function
o Abstract function
o Overriding functions
Q184: (a) is the concept embedded in an algorithm (soul!) and (b) is the actual representation of
an algorithm (the body!)
Q185: In a HTML form for file upload input element input element we use the following value in type
attribute:
o Text
o Radio
o Hidden
o File PG#79
Q186: In a HTML form for Hidden INPUT field we use the following value in type attribute:
o Text
o Password
o Hidden PG#74
o Check box
Q190: What was the name of first computer that used |magnetic Tape| for programs storing?
o ENIAC
o EDVAC *
o Harvard Mark 1
o Atanasoff-Berry Computer
Q193: What are the conditions that must be fulfilled in order to use web?
o Computer is ON
o A list of elements
o A collection of elements
Q200: Which variables can make the logic of a web page difficult to understand?
o Global PG#207
o Local
o Protocol
o Firewall PG#191
o Communication channel
as possible.
o Dependent
o Independent
o Complex
o Simple design
o Information layout
o Adaptable design
Q207: Identify the correct statement about function arguments I) A comma-separated list of data II)
Define the interface b/w function and rest of code III) They are used to identify the function IV) They
identify function’s type.
15 PG#31
20
50
o 8
o 4 PG#37
o 16
o 32
o Silicon*
o Conductor
o Insulator
o Metal
Q216: All the ideas of Babbage Analytical engine were included in:
o Atanasoff-Berry Computer
o Harvard Mark 1
o ENIAC
o Pentium
o Numeric
o A URL PG#270
o A text value
o None of above
o Intel 4004
o Intel 8080
o Intel 386
o Pentium
Q220: First computer that could not only manipulate numbers but also text data as well was:
o ENIAC
o EDVAC
o UNIVAC 1
Attanasoff-Berry Computer
Q225: is a technique used create smooth animations or to display one of several images based on the
requirement.
o JavaScript
o Animated Gifs
o Records
o Fields PG#262
o Identifiers
o Data
o E-mail client
o SMTP server
o POP3 server
o Subject-Driven Programs
o Event-Driven Programs
o Structured Programs
o FTP PG#234
o DNS
o Telnet
o None of these
Q233: The pattern in which computer are connected together to from a network is called:
o Network transmission
o Network protocol
Q236: is a network of computer that are lying within the same building or in vicinity.
o LAN PG#187
o WAN
Q243: If you write program using good programing methodology then the overall cost & time of the
program is
o Increased
o Reduced
o Doubled
Q244: Who routes the packets through the internet to get their destination?
o UDP
o TCP
o UCP
o IP PG#209
o Foreign key
o Secondary key
o Special key
Primary Key is a field that uniquely identifies each record stored in a table
o Efficient
o Readable
o Inefficient
Q249: Someday it will be possible to load all the lectures, papers, books and s/w produced by an expert
into an system.
o Information
o Eco
Someday it will be possible to load all the lectures, papers, books and SW produced by an expert into an
intelligent system
Q250: Which one of the following is built- in computer memory containing data that normally can only
be read, not written to?
o RAM
o ROM PG#25
o Cache Memory
o Magnetic Memory
ROM
ROM is "built-in" computer memory containing data that normally can only be read, not written to.
Q251: Which of the following is a computer storage device that saves and retrieves the data when
required?
o ROM
Hard disk
Hard disk is a computer storage device which saves and retrieves the data when Required.
Q252: Which one of the following units can be called as the brain of computer microprocessor?
A control unit can be thought of as a finite state machine. It is called the brain of computer
microprocessor
Q253: Which of the following translate a high level language code into machine understandable code?
o Computer
o Transistor
o Compiler PG#130
o Blue only
By default, when Word formats a hyperlink, the hyperlink appears blue with a blue underline
o ENIAC
o EDVAC
o Attanasoff-Berry Computer
UNIVAC 1 – 1951
UNIVAC-1. The first commercially successful electronic computer, UNIVAC I, was also the first general
purpose computer - designed to handle both numeric and textual information.
o 10
o 9
o 8 PG#42
Byte = 8 bits
Q257: The first programing language designed for the non-technical users, was:
o Visual Basic
o Ada PG#9
o Basic
o Cobol
Wrote a program for computing the Bernoulli’s sequence on the Analytical Engine - world’s 1st
computer program
Q258: If a computer could pass the Turing test then it would be able to :
USB
USB (Universal Serial Bus) is a plug-and-play hardware interface for peripherals such as the keyboard,
mouse, joystick, scanner, printer and modem.
Q260: are set of Rules & Regulation that provides communication in a network.
o Browser
o Protocol
o Internet Explorer
o Hyper Text
Q261: A communication protocol is a that governs the flow of information over a network.
o Set of Methods
o Set of Functions
o Set of rules
o Fixed Registers
o Vector Registers
o Base band
o Broad band
o Bandwidth
Bandwidth
Capacity of a communication channel for carrying data Measured in bits/s (bps), kb/s, Mb/s, Gb/s, Tb/s
Optical fiber channels have the highest (1 Tb/s)
o 1990 PG#197
o 1991
o 1995
o Variable declaration
o Variable definition
defining the scope of a variable. A variable can be either local or global in scope.
Unlike many other popular languages, a JavaScript Array can hold elements of multiple data types,
simultaneously
Q268: Avoid lines type shorter than characters and longer than characters.
o 40,60 PG#175
o 30,60
o 20,30
o None of the given
Avoid lines of type shorter than 40 characters and longer than 60 characters
o LAN PG#190
o WAN
Several protocols are available for various types of networks. Here we discuss two that are popular for
LANs: Ethernet; Token Ring
o Public
o Private PG#186
o Both Public & Private
Private Networks
• Organizations having many computers usually connect them in the form of private networks
Q271: Which of the following keyword is used to jump out of switch statement as soon as a match is
found?
o Default
o Else
o Jump
o Break
Q272: enables users located at far-way locations to easily share information with others located all
over the world.
o Protocol
o Internet PG#196
o Communication channel
Internet
Enables users located at far-way locations to easily share information with others located all over the
world
o Getting results
o Searching
If any of the nodes goes down, the rest of the network is not affected
o SMTP
o FTP PG#185
o TELNET
Q276: There are mainly types of network according to distance between the nodes.
o2 PG#187
o 3
o 4
o 5
Types of Computer Networks according to the distance between nodes LAN: Local Area Network)
o onFocus( ) , count( )
o onBlur( ), sort( )
– reverse( )
– sort( )
Q279: hotWeather =(Temperature = = 40); in the above statement, the variable hotWeather id of type
o number
o string
o Boolean
Q280: Declaring variables ( using the var keyword) within a function makes it:
o Global variable
o Abstract variable
o Parameter
Local Variables
Declaring variables (using the var keyword) within a function, makes them local•They are available only
within the function and hold no meaning outside of it
Q281: is used to form a connection between two separate, but similar networks.
o Bridge PG#187
o Router
o Gateway
Bridge
In a way, it creates an extended LAN by passing information between two or more LANs
o Ring PG#189
o Bus
o Star
Ring
o Mistake
o Common sense
o Experience
Heuristic
Q284: is a special purpose computer that directs the data traffic when several paths are available.
o Bridge
o Router PG#187
o Gateway
Router
A special-purpose computer that directs data traffic when several paths are available
A router examines the destination info in each arriving packet and then routes it through the most
efficient path available
Q285: NCSA stands for:
1972 - The National Center for Supercomputing Apps. (NCSA) develops the telnet application for remote
login, making it easier to connect to a remote computer
At times they even lead to the wrong ones, but mostly to results that are good-enough
Q287: In partitioning of program/module, it should be assured that partitioned chunks should be as
as possible.
o Dependent
o Independent PG#166
o Complex
o UNIVAC1
o Cray 1
o IBM PC Click here for detail
o Altair 8800
o Ring PG#189
o Bus
o Star
Ring
Q290: is a special purpose computer that connects and translates between networks that use different
communication protocols.
o Bridge
o Router
o Gateway PG#187
Gateway
A special-purpose computer that connects and translates between networks that use different
communications protocols
o 1968
o 1969
o 1970
o 1978
Q292: Any variable in JavaScript can hold any type of value, and the that type can change midway
through the program.
o True PG#144
o False
Any variable in JavaScript can hold any type of value, and that type can change midway through the
program.
Q293: How many iterations would this “for” loop runs. For (x=6000;x>0;x=x-1){document. Write(x);}
o 5900
o 6000 PG#164
o 6001
2 . Wireless
o SP
o JSP
o JavaScript
Q296: Which is the protocol that is used to send and receive eMail message over TCP/IP network?
o FTP
o TCP
o telnet protocol
o SMTP PG#213
SMTP: Simple Mail Transfer Protocol
A protocol used to send and receive eMail messages over a TCP/IP network
Q297: Team is responsible for the maintenance, expansion, improvement of the infrastructure
consisting of workstations, networking equipment, software & network security.
o SupportPG#300
o Configuration Management
o Quality Assurance
Support Team
Responsible for the maintenance, expansion, improvement of the infrastructure consisting of:
– Network security
Q298: In case of mode, user starts a program which computer executes with the given data and
produces results without any further intervention from user.
o Batch PG#81
o Interactive
o Time-Sharing
o User
Batch-mode
The user starts the program and the computer processes the provided data and produces results
without any further intervention of from the user
Example: Payroll
Q299: Assume that we want to create a text box which is invisible from the user and should only be used
to provide data to the web server. Which of the following attributes will be used to make invisible?
o Hidden
o Invisible
o Secret
o Hide
o Positional PG#41
o Neutral
o Vertical
o horizontal
o Check box
o Text box
o None of the given
Radio buttons are used when out of many options; just one option is required to be selected. They are
also created using HTML <input> tag but type attribute is set to radio.
Q302: A truth table defines the output of function W.r.t the inputs
o None PG#44
o Input
o Output
A truth table defines the output of a logic function for all possible inputs
Q303: Algorithms is a
o Definition of problem
o Solving a problem
Algorithm
1st Definition:
o Application
o Utility software
Applications talk to devices through the OS and OS talks to and manages devices through Device Drivers
o High level
Machine Language
A system of codes directly understandable by a computer's CPU is termed this CPU's native or machine
language. Although machine code may seem similar to assembly language they are in fact two different
types of languages. Machine code is composed only of the two binary digits 0 and 1.
o Copy
o Paste
o Cut
o Undo PG#225
Allows you to recover from your mistakes Allows you to experiment without risk
Q307: Avoid to ensure readability of web page
o Use of paragraphs
Use sans serif (e.g. Arial, Helvetica, Verdana) typefaces for display on screen Display type intended for
continuous reading at 10 to 14 points
Avoid the overuse of bold and italics Avoid setting type in all caps
o For
o While
o Do-While
o All of the given
o Frame
o Packet PG#186
o Message
Packet
Communications on the Internet is controlled by a set of two protocols: TCP and IP TCP/IP Transmission
Control Protocol/Internet Protocol
o True
o False PG#96
Script:
Is an interpreted language
o Engineering
o Entertainment
o Educational
o scientific
Virtual University Learning Management System (VULMS)
o Task
o Process
o Problem PG#99
Algorithm:
o Operating system
o ERP system
o None of the above
o MS Word
o MS Excel
o MS Paint