Professional Documents
Culture Documents
Hewlett Packard
IBM
Intel
Yoshiro Nakamats
Output
Input
Both Input and Output
Storage
3. If the data type of a variable can be changed during the execution of a program, then the variable
will be ____________.
Logically Typed
Dynamically Typed
Statically Typed
Strictly Typed
4. When our required condition matches with any switch case, ___________ keyword enforces the
program to exit from switch construct.
default
break
jump
stop
5. Without a complete system, one can _____ results from a part of a system.
Not achieve
Achieve maximum
Achieve best
Achieve
onmouseover
OnMouseOver
onMouseOver
onMouseover
8. Suppose you want to upload / download a file to and from your friend’s computer, located
remotely. Which protocol can help you in this case?
HTTP
SMTP
FTP Page #185
TELNET
9. Following are some network devices having different functionalities. Choose the appropriate
device which can be used to control the network traffic.
Repeater
Cable
Connector
Hub Page # 186
10. If you are required to join two Labs of similar type of LAN then which device will be more
suitable to fulfill this requirement?
Router
Bridge
Gateway
Modem
11. _______ tells the capacity of an array in terms of storing values.
Name
Index
Length
Type
0
1
2
3
13. While talking about Event Handling in JavaScript, ________ cannot be considered as an attribute
of an Event Handler.
Function
Identifier
Equal sign
String consisting of JavaScript statements
14. _________ can be used in JavaScript to open multiple popup windows when a particular web
page is opened.
onAbort
onChange
onLoad Page # 232
onUnload
15. Some software are used to display information in the form of a slide show. Select the software
which cannot be used for this purpose.
CA Harvard Graphics
Corel Presentation
MS Power Point
MS Access
16. If you want to make a good presentation then the each slide of your presentation should contain
____________.
Headings only
Phrases, not sentences
Sentences, not phrases
Headings and sentences
17. For good presentation and better visibility of text, we should use ___________ background color
in each slide.
Light
Dark
Faded
Transparent
18. The method substring (n, m) returns a string containing characters copied from position n
to___________.
m-2
m–1 Page # 270
m+1
m
19. There are some primary colors which are the base of other colors. Select which of the following
is not a primary color.
Red
Blue
Yellow Page # 235
Green
20. Suppose you need to make a program using JavaScript which rounds the number 9.25 to the
nearest integer. Which method you will use for this purpose?
Scripting Language
Case Sensitive Language
Object Based Language
Markup Language
22. In Relational Database table columns are called ______.
Records
Values
Fields
Unions
23. In contrast with working in a group, working at home ______ the contact with the colleagues
which may result in _______ quality of work.
Reduces, Poorer
Reduces, Better
Increases, Poorer
Increases, Better
Recursion
Call by value
Error
Parsing
Impersonation
Logical Bomb
Packet Sniffing
IP Spoofing
26. In DoS attack, the attackers scan a computer with a weak security scheme using _________.
Wscan
Mscan
Sscan
Vscan
27. We know a virus is a combination of two parts, _____________.
Visual
Binary file
Text-file Page # 293
Structured
29. The process which leads us to the exact location of defects in a program is termed as _________.
Debugging
Testing
Defect Killing
Bug Fixing
Easy
Readable
Correct
Faster
31. Which of the following hardware component is the most important for the operations of database
management system?
Computers only
Humans only Page # 304
Both Computers and Humans
Graphics only
Information
Data
Entity
Attribute
34. Which one of the following devices acts as the main controller of a computer system?
CPU
RAM
ROM
Hard drive
35. You are asked to pick two things from different types of things like jewelry, mobile phones and
cars. Which algorithm will be best suited in this situation to get maximum benefits?
Deterministic Algorithm
Non Deterministic Algorithm
Greedy Algorithm
Randomized Algorithm
36. If you have to draw some charts on the basis of mathematical calculations then which one of the
software from the following list will be your preference?
Spreadsheet
Word Processor
Database Management System
Dreamweaver
38. The study, related to social implication of computing helps the professionals in a way that
they ____________.
39. When data is needed to present in percentage then ________ charts are used.
Line
Area
Bar
Pie
hspace
height
onLoad
lowsrc
41. If A1=15, B1=35 and C1=11 then what will be the output of the following formula?
=(A1*(C1+B1/2))/100
4.25
42. A good programming methodology leads to a successful project. List down any four features, a
programming methodology must possess to be called as a good programming methodology.
44. Why programmers do not prefer to use global variables in their code? Give two reasons.
Global variables can make the logic of a Web page difficult to understand
Global variables also make the reuse and maintenance of your code much more difficult
45. HTML provides you the facility of including different types of images in your web pages. Does
JavaScript provide us this facility? If yes then how?
46. Many people consider that "Database" and "DBMS" are same terms. Do you agree? Justify your
opinion with example.
A database is any collection of data, it can be words you write on a piece of paper or a
digital file. A DataBase Management System (DBMS) is a piece of software that
manages databases and lets you create, edit and delete databases, their tables and
their data. Examples of a DBMS are MySQL, MS SQL Server, Oracle,
47. Suppose you are a computer designer. There are some Instructions/data that are necessary for
computer running. You have two types of memory i.e. RAM and ROM, so in which memory you
will store these instructions/data. Justify your answer.
48. Suppose you have to make a presentation for your final year project. Enlist all the steps to make
the presentation?
Outline Your Objectives
Gauge Your Audience’s Expertise
Make an Outline
Sequence Your Presentation
Determine What Visuals You Will Need
49. Suppose the database administrator of a bank wants to ensure error and conflict free data entry in
the database. Explain how it can be possible?
50. Write a Pseudo code for the following flowchart
51. Discuss the main reasons for hiring temporary professionals by computer centric organizations
instead of permanent workers. Also describe the benefits, a professional can attain by working as
a temporary worker.
52. There is a complete system that is used for sending and receiving e-mails. What are the
components of that system? Describe each one briefly.