You are on page 1of 10

1. The floppy disk was introduced in the market by ___________.

 Hewlett Packard
 IBM
 Intel
 Yoshiro Nakamats

2. Microphone lies in the category of _________ devices.

 Output
 Input
 Both Input and Output
 Storage

3. If the data type of a variable can be changed during the execution of a program, then the variable
will be ____________.

 Logically Typed
 Dynamically Typed
 Statically Typed
 Strictly Typed

4. When our required condition matches with any switch case, ___________ keyword enforces the
program to exit from switch construct.

 default
 break
 jump
 stop

5. Without a complete system, one can _____ results from a part of a system.

 Not achieve
 Achieve maximum
 Achieve best
 Achieve

6. Which one of the following is the correct code syntax in JavaScript?

 onmouseover
 OnMouseOver
 onMouseOver
 onMouseover

7. ______ was the first popular _______application on PC’s.

 Excel, Word Processing


 VisiCalc, Spreadsheet Page # 221
 Excel, Spreadsheet
 VisiCalc, Word Processing

8. Suppose you want to upload / download a file to and from your friend’s computer, located
remotely. Which protocol can help you in this case?

 HTTP
 SMTP
 FTP Page #185
 TELNET

9. Following are some network devices having different functionalities. Choose the appropriate
device which can be used to control the network traffic.

 Repeater
 Cable
 Connector
 Hub Page # 186

10. If you are required to join two Labs of similar type of LAN then which device will be more
suitable to fulfill this requirement?

 Router
 Bridge
 Gateway
 Modem
11. _______ tells the capacity of an array in terms of storing values.

 Name
 Index
 Length
 Type

12. In JavaScript, what will be the result of 79%3?

 0
 1
 2
 3

13. While talking about Event Handling in JavaScript, ________ cannot be considered as an attribute
of an Event Handler.

 Function
 Identifier
 Equal sign
 String consisting of JavaScript statements

14. _________ can be used in JavaScript to open multiple popup windows when a particular web
page is opened.

 onAbort
 onChange
 onLoad Page # 232
 onUnload

15. Some software are used to display information in the form of a slide show. Select the software
which cannot be used for this purpose.

 CA Harvard Graphics
 Corel Presentation
 MS Power Point
 MS Access

16. If you want to make a good presentation then the each slide of your presentation should contain
____________.

 Headings only
 Phrases, not sentences
 Sentences, not phrases
 Headings and sentences

17. For good presentation and better visibility of text, we should use ___________ background color
in each slide.

 Light
 Dark
 Faded
 Transparent

18. The method substring (n, m) returns a string containing characters copied from position n
to___________.

 m-2
 m–1 Page # 270
 m+1
 m

19. There are some primary colors which are the base of other colors. Select which of the following
is not a primary color.

 Red
 Blue
 Yellow Page # 235
 Green

20. Suppose you need to make a program using JavaScript which rounds the number 9.25 to the
nearest integer. Which method you will use for this purpose?

 Math.round(9.25) Page # 247


 Math.rnd(9.25)
 Round(9.25)
 Mth.round(9.25)

21. Which of the following is not true for JavaScript?

 Scripting Language
 Case Sensitive Language
 Object Based Language
 Markup Language
22. In Relational Database table columns are called ______.

 Records
 Values
 Fields
 Unions

23. In contrast with working in a group, working at home ______ the contact with the colleagues
which may result in _______ quality of work.

 Reduces, Poorer
 Reduces, Better
 Increases, Poorer
 Increases, Better

24. ______ occurs when a function calls itself.

 Recursion
 Call by value
 Error
 Parsing

25. Creating IP packets with fake source IP address is called ________.

 Impersonation
 Logical Bomb
 Packet Sniffing
 IP Spoofing

26. In DoS attack, the attackers scan a computer with a weak security scheme using _________.

 Wscan
 Mscan
 Sscan
 Vscan
27. We know a virus is a combination of two parts, _____________.

 Header and payload


 Payload and data
 Header and Transmission mechanism
 Payload and Transmission mechanism Page # 277

28. _________ storage technique is used in structured vector graphics.

 Visual
 Binary file
 Text-file Page # 293
 Structured

29. The process which leads us to the exact location of defects in a program is termed as _________.

 Debugging
 Testing
 Defect Killing
 Bug Fixing

30. By adding comments, we make the code more _________.

 Easy
 Readable
 Correct
 Faster

31. Which of the following hardware component is the most important for the operations of database
management system?

 High resolution video display


 Printer
 High speed, large capacity storage media
 Plotter
32. Semantic web is designed for ________.

 Computers only
 Humans only Page # 304
 Both Computers and Humans
 Graphics only

33. Collection of facts & figures is called ____________.

 Information
 Data
 Entity
 Attribute

34. Which one of the following devices acts as the main controller of a computer system?

 CPU
 RAM
 ROM
 Hard drive

35. You are asked to pick two things from different types of things like jewelry, mobile phones and
cars. Which algorithm will be best suited in this situation to get maximum benefits?

 Deterministic Algorithm
 Non Deterministic Algorithm
 Greedy Algorithm
 Randomized Algorithm

36. If you have to draw some charts on the basis of mathematical calculations then which one of the
software from the following list will be your preference?

 Spreadsheet
 Word Processor
 Database Management System
 Dreamweaver

37. You cannot close Microsoft Word 2003 by ______________.


 Choosing File menu then Exit command
 Pressing Alt+F4
 Clicking X button on title bar
 Choosing Close submenu from File menu

38. The study, related to social implication of computing helps the professionals in a way that
they ____________.

 They look after themselves


 They practice their profession with great care
 They do their jobs with least interest
 They reduce their work load

39. When data is needed to present in percentage then ________ charts are used.

 Line
 Area
 Bar
 Pie

40. Which of the following cannot be considered as a property of image object?

 hspace
 height
 onLoad
 lowsrc

41. If A1=15, B1=35 and C1=11 then what will be the output of the following formula?
=(A1*(C1+B1/2))/100

4.25

42. A good programming methodology leads to a successful project. List down any four features, a
programming methodology must possess to be called as a good programming methodology.

To understand effective programming practices that result in the development of


correct programs with minimum effort
To become familiar with testing & debugging
43. A method "strike()" is used in JavaScript programs, describe the functionality of this
method.

Notationaly, these functions are accessed by referring to various methods of the


String object
• Moreover, this object also contains the ‘length’ property

44. Why programmers do not prefer to use global variables in their code? Give two reasons.

Global variables can make the logic of a Web page difficult to understand
Global variables also make the reuse and maintenance of your code much more difficult

45. HTML provides you the facility of including different types of images in your web pages. Does
JavaScript provide us this facility? If yes then how?

46. Many people consider that "Database" and "DBMS" are same terms. Do you agree? Justify your
opinion with example.

A database is any collection of data, it can be words you write on a piece of paper or a
digital file. A DataBase Management System (DBMS) is a piece of software that
manages databases and lets you create, edit and delete databases, their tables and
their data. Examples of a DBMS are MySQL, MS SQL Server, Oracle,

47. Suppose you are a computer designer. There are some Instructions/data that are necessary for
computer running. You have two types of memory i.e. RAM and ROM, so in which memory you
will store these instructions/data. Justify your answer.

48. Suppose you have to make a presentation for your final year project. Enlist all the steps to make
the presentation?
Outline Your Objectives
Gauge Your Audience’s Expertise
Make an Outline
Sequence Your Presentation
Determine What Visuals You Will Need

49. Suppose the database administrator of a bank wants to ensure error and conflict free data entry in
the database. Explain how it can be possible?
50. Write a Pseudo code for the following flowchart

51. Discuss the main reasons for hiring temporary professionals by computer centric organizations
instead of permanent workers. Also describe the benefits, a professional can attain by working as
a temporary worker.

52. There is a complete system that is used for sending and receiving e-mails. What are the
components of that system? Describe each one briefly.

You might also like