CS101-FinalTerm MCQs With Reference Solved by Arslan PDF
CS101-FinalTerm MCQs With Reference Solved by Arslan PDF
CS101-FinalTerm MCQs With Reference Solved by Arslan PDF
o MAX-MAX
o MAX-MIN
o MIN-MAX PG # 242
The output of a fuzzy system is computed by using: The MIN-MAX technique for combining fuzzy rules
2. A set of software that handle all database related operations of an organization is called ______________.
3. Every phase of the project development require reporting on completion. When a developer completes his/her
assigned module, he has to report to the_______________.
o Team Lead
o Project Manager
o CEO
o IT Manager
4. LCD display screens provide_____________ display.
o 1 dimensional
o 2 dimensional PG#305
o 3 dimensional
o 4 dimensional
o Terminal
o Browser
o Protocol
o Blank Space
o p
o a
o k
8. Which of the following is not true for JavaScript?
o Scripting Language
9. Which of the following symbol is used in JavaScript to add multiple line comments in a program?
o /
o //
o /* PG#149
o //*
Multi-line comments
/* Author: Bhola
Creation Date: 24 March 2003 */
10. In an IP address, there are four set of numbers which are separated by periods.
o 12-bit
o 16-bit
o 32-bit
o 8-bit PG#210
Four 8-bit numbers separated by periods. Each 8-bit number can be 0 to 255
o Thousands
o Billions
o Trillions
o Millions
12. If the calling function is a part of a JavaScript statement then the definition of this function will must have
the_______ Statement.
o Break
o Terminate
o return
o Switch
13. The organizations using the network organizational model have ______________structure.
o Simple
o Complex
o Flexible
o Accurate
o Records
o Values
o Unions
A relational database organizes data in tables (or relations). A table is made up of rows and columns. A row is also called
a record (or tuple). A column is also called a field (or attribute).
15. To store rounded number of 8.6 in a variable called "r_number", We write ______________.
o r_number=Maths.round(8. 6);
o r_numbers=Maths.rounds(8. 6);
o r_number=Math.rounds(8. 6);
o Theft of data
o Corruption of data
o Modification of data
Denial-of-Service attacks (DoS attacks) are cyber-attacks on organizations and online services. A DoS attack consists of
overburdening or overloading the normal capacity of systems, online services and/or the infrastructure with data traffic. This
disrupts or limits the availability of the online services and related infrastructure for legitimate data traffic
o Object detection
o Boolean logic
o Opacity setting
o DOS
o Windows XP
o Linux
All are operating system but Microsoft Access, also known as Microsoft Office Access, is a database management system.
19. Complex Software development process requires the developers to follow some specific set of rules and
guidelines which can be termed as
o Programming Language
Design Methodology?
The set of (often flexible) rules and guidelines a team of developers follow to construct reasonably complex SW systems
o Easy
o Difficult
o Simple
o Hewlett Packard
o IBM
o Intel
o MS Excel
o penOfiice.org Calc
o LibreOffice Calc
o VisiCalc PG#83
o hspace
o height
o onLoad PG#286
o lowsrc
Image
Properties: name, border, complete, height, width, hspace, vspace, lowsrc, src
o PDA
o WWW
o Browser
o CPU
25. The________________________ has considerably changed the way of marketing forever, redirecting it from a
mass Focus to a single person focus.
o Television
o Web PG#281
o Mobile
o Radio
The Web has changed marketing forever, redirecting it from a mass focus to a single-person focus
26. A software on a user's computer, acting as an interface between the user and internet is called as
a____________.
o Browser
o PowerBuilder
o Front Page
o Navigator
Browser
A browser is an application program that provides a way to look at and interact with all
the information on the World Wide Web.
27. Software Development Process involves working of different teams but _____________team has its Major
contribution in a project after the designing phase.
o QA
o Architect
o Development
o HR
28. Client is the basic entity in software development. It is the responsibility ________________of to manage the
client's matters.
o Project Manager
o Team Lead
o Developer
o System Software
o Application Software
o Device Driver
o Kernal
30. Which of the following is not a peripheral device for a computer?
o USB
o Printer
o Scanner
31. There are some primary colors which are the base of other colors. Select which of the following is not a
primary Color.
o Red
o Blue
o Yellow PG#235
o Green
In a popular scheme – the RGB scheme – each part of the triplet represents the intensity of one of out of three primary colors: red,
green, blue
o Subtract
o Multiply
o Join
o Add
o bits
o bytes
o sectors
o pixels PG#235
Most all computer displays consist of a grid of tiny pixels arranged in a regular grid of rows and columns
34. ______________is a container that holds a single value.
o Array
o Variable PG#199
o Function
o Set
o Punch cards
o Vacuum tubes
o Transistors
o Resistors
o 128 bytes
o 256 bytes
Altair 8800. The price was $375, contained 256 bytes of memory (not 256k),but had no keyboard, no display, and no auxiliary
storage device.
o logic bomb
o Worm
o time bomb
Trojan Horses
• Unlike viruses, they are stand-alone programs
38. _______________wait for some time and then launch a function
o Timeout( )
o setTimeout( ) PG#290
o setTime( )
o setTimeIn( )
o Architect
o Developer
Project Manager
• Responsibilities:
– Planning and tracking of the project
– Arranging of the appropriate resources
– Client relationship management
40. ___________________team is responsible for a project after the specification's stage till the very end.
o Executive
o Architect
o Development PG#296
o HR
Development Team
• The number of development teams has varied between 3-7 at this organization
• Team-size has varied between 3-35
• Large teams are organized as a collection of sub-teams
• Lowest-level team: No more than 7 members
• Responsible for a project from after the specifications stage till the very end
41. Client relationship management is the responsibility of ______________.
o Team Lead
o Developer
Project Manager
• Responsibilities:
– Planning and tracking of the project
– Arranging of the appropriate resources
– Client relationship management
o Event Handler
o Properties PG#286
o Methods
Properties: name, border, complete, height, width, hspace, vspace, lowsrc, src
FINALTERM EXAMINATION
Spring 2013
44. Which of the following is not a type of page margin in MS Word?
o Left
o Right
o Center Click here for detail
o Top
45. Command which saves the selected text before deleting is_________________.
o Copy
o Delete
o Cut
o Undo
Cut out the selected text. (Copy selected text to the clipboard before deleting it.)
46. Select the best option to create and edit the HTML pages.
o 8 bits PG#42
o 10 bits
o 12 bits
o 16 bits
Byte = 8 bits
o Color
o Width
o Name
o Size
49. Which one of the following is the correct code syntax in JavaScript?
o SetTimeout()
o settimeout()
o setTimeout() PG#290
o SettimeOut()
50. is a programming language which was specifically designed to develop business applications.
o BASIC
o FORTRAN
o COBAL Click here for detail
o Perl
COBOL (/ˈkoʊbɒl/) is a compiled computer programming language designed for business use
51. URL is a/an ________
o Device
o Component
o Address
o Tool
A Uniform Resource Locator (URL), commonly informally termed a web address (a term which is not defined identically) is a
reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it.
52. Converts the source code written in high level language into machine language.
o Utilities
o Drivers
o Language Translator PG#59
o System software
Language Translators
Human programmers write programs in a language that is easy to understand for them.
They use language translators to convert that program into machine language. It
converts the human understandable code in uPs understandable code, i.e. a language that
is easy to understand for the uPs
o Index
o Length PG#178
o Type
o Name
The key property of the „Array‟ object is „length‟, i.e the number of elements in an array
54. If you want to assign an IP address to your computer, you can use any number from in each part of
IP address.
o 1 to 255
o 0 to 255 PG#210
o 0 to 256
o 1 to 256
IP Address
A unique identifier for a computer on a TCP/IP network
Format: four 8-bit numbers separated by periods. Each 8-bit number can be 0 to 255
55. select the best characteristic of telnet.
Telnet Protocol
Using Telnet, a user can remotely log on to a computer (connected to the user‟s through a TCP/IP network, e.g. Internet) & have
control over it like a local user, including control over running various programs
56. provides the facility of searching and downloading the new e-mail messages to an e-mail client.
o HTTP
o POP3 PG#213
o TCP
o FTP
eMail client interacts with the POP3 server for discovering and downloading new eMail messages The message is prepared using
the eMail client
57. which of the following is the instant Message service available on the internet?
o HTTP
o IE
o AIM PG#235
o FTP
Instant Messaging:
The IM services available on the Internet (e.g. ICQ, AIM, MSN Messenger, Yahoo! Messenger) allow us to maintain a list of
people (contacts) that we interact with regularly We can send an instant messages to any of the contacts in our list as long as that
contact
is online
58. Which event handler executes the specified JavaScript code when a window / form element loses focus?
o onLoad
o onUnload
o onBlur PG#245
o onFocus
onBlur executes the specified JavaScript code when a window loses focus or a form element loses focus
59. can be used in JavaScript to open multiple popup Windows when a particular web page is opened.
o onAbort
o onchange
o onLoad PG#232
o onUnload
onLoad can be used to open multiple Windows when a particular document is opened
60. For good presentation and better visibility of text, we should use background color in each slide.
o Light
o Dark PG#222
o Faded
o Transparent
Slide Background:
Keep the backgrounds simple. You want a background that shows off your info, not one that makes it illegible Avoid bright
background colors. Light colored text against a dark background works best
61. If one operand of “+operator “is a string and the other one is a non string, then JavaScript.
When one operand is a string, and the other is not, the non-string will first be converted to a string and then the two strings will be
concatenated
o <P>………..</P>
o <U…………..</U>
o <PRE>………..</PRE> PG#270
o <H>……………<H/>
63. There are some primary colors which are the base of other colors. Select which of the following is not a
primary color.
o Red
o Blue
o Yellow PG #235
o Green
In a popular scheme – the RGB scheme – each part of the triplet represents the intensity
of one of out of three primary colors: red, green, blue
64. ______________are those programs in which the flow of the program is determined by the user‟s actions
(mouse click, key presses) or message from other programs.
Event-Driven Programs
Examples: GUIs, microwave, camera The system sends events to the program and the program responds to these as they
arrive. Events can include things a user does - like clicking the mouse - or things that the system itself does - like updating the
clock.
o Access files
o Database files
o Flat files PG#260
o Excel files
o Mobile phone
o Autonomous web agent PG#244
o Any wireless device
o SIM card
67. Working of any system depends upon its various components. Which component, a Rule Based system
(intelligent system) would not have?
o Rule interpreter
o Rule compiler PG#242
o Rulebase
o Working memory
o Ip spoofing
o Software privacy PG#276
o Mail bombing
o DoS Attack
Software Piracy
•Using a piece of SW without the author‟s permission or employing it for uses not allowed by the author is SW piracy
69. In 2000, yahoo servers were attacked by Dos attack, it took… To recover from this attack
o 1 hour
o 2 hour
o 3 hour Click here for detail
o 4 hour
In the year 2000, February 7 when yahoo servers were crashed. The famous internet site was unavailable for
Several hours this affected the business of yahoo considerably. Buy.com, e-bay and CNN were The other giant companies that
were attacked, the very next day after yahoo. The site was completely inaccessible which Incurred huge loss to the company. The
downtime was calculated as three hours for yahoo and The other websites were down for several more hours.
Anatomy of a Virus
• A virus consists of 2 parts:
• Transmission mechanism
• Payload
71. For creating 2-d animations, will be the more appropriate choice.
o Flash
o HTML image class
o Web Browser
o HTML 2D Class
72. Which attribute of the image tag in HTML is used to mention the source of an image?
o Source
o Path
o Src PG#285
o Loc
<IMG> tag
Format: <IMG src=URL, alt=text height=pixels width=pixels
align="bottom|middle|top">
73. The task performed to determine the existence of defects in a program is called .
o Bug fixing
o Debugging
o Testing PG#311
o Defect killing
o 1
o 2
o 3 PG#312
o 4
Types of Errors
• Syntax errors
• Semantic errors
• Run-time errors
Information technology
Telecom Engineering , Computer Engineering , Computer Science
76. routes the packets the through the internet to go to their destination.
o Telnet
o TCP
o IP PG # 317
o NIC
IP routes these packets through the Internet to get them to their destination
77. Which of the following hardware components is the most important for the operations of database
management system?
78. Which one of the following will not be considered as the use of word processor?
o Composing magazines
o Writing memos
o Writing research reports
o Making ledgers
79. Complex software development process requires the developers to follow some specific guidelines which can
be termed as_________.
o Tb/s PG#190
o Kb/s
o Mb/s
o Gb/s
Bandwidth
Capacity of a communication channel for carrying data
Measured in bits/s (bps), kb/s, Mb/s, Gb/s, Tb/s
Optical fiber channels have the highest (1 Tb/s)
81. By the history of spreadsheet software, we come to know that_________ was the first spreadsheet software.
o Ms Excel
o OpenOffice.org Calc
o libreOffice Calc
o VisiCalc PG#83
82. Unlike a program with a syntax error, a program with a __________error is valid program in the language,
though it does not behave as intended.
o Run time
o Syntax
o Semantic click here PG#312 (click here to see semantic is also called logic error )
o Special
Unlike a program with a syntax error, a program with a logic error is a valid program in the language, though it does not behave
as intended. The only clue to the existence of logic errors is the production of wrong solutions.
83. The program which was first computed on world‟s first computer was:
o Simple sequence
o Multiple sequence
o Bernoulli’s sequence PG#9
o Increasing sequence
A program for computing the Bernoulli‟s sequence on the Analytical Engine - world‟s 1st computer program
o WAN
o ARPANET Click here for detail
o Intranet
o LAN
Advanced Research Projects Agency Network (ARPANET) was one of the world's first operational switching networks, the first
network to implement TCP/IP, and the progenitor of what was to become the global Internet.
86. HTML stands for . . .
o Hyper Transfer Markup Language
o Hyper Text Makeup Language
o Hyper Text Markup Language PG#28
o Hyper Transfer Making Language
HTML
Hyper Text Markup Language
89. In HTML, which tag is used for the highest level heading?
o <h5> </h5>
o <h2> </h2>
o <h1> </h1> Click here for detail
o <title> </title>
The h1 element is used to indicate the most important (or highest-level) heading on the page.
Integrated Circuits
Integrated circuits can be classified into analog, digital and mixed signal (both analog and digital on the same chip).
o Easy to install
o User interface
o Consistent
o All of the above PG#85
o Device drivers
o System software
o Application software PG#85
o Kernel
Application software are programs that interact directly with the user for the
performance of a certain type of work
95. Which of the following not a flow chart element?
96. Detail plan of SW life cycle specifies two things that are the _____________
97. In _______, a system is designed by fitting together a collection of independent and self-contained
components.
o Structured design
o Component design
o Object oriented design PG#131
o None of above
Object Oriented Design : The over-all system is put together by fitting together a collection of these components.
98. Core tasks of an OS are:
o Processor management
o User interface
o Storage management
o All of the given PG#65
Core Tasks of an OS
Processor management , Memory management ,Device management
Storage management , Application Interface , User Interface
o Single user
o Multi user
o Distributed
o None of the given
100. Algorithm is a precise sequence of limited number of _______ , __________ steps that terminates in the form
of a solution
o Ambiguous, Executable
o Nondeterministic, Finite
o Finite, countable
o Unambiguous, executable PG#100
A precise sequence of a limited number of unambiguous, executable steps that terminates in the
form of a solution
2011 to 2014 Sessions Daily Base Quizzes
101. Decompose the problem into subsystem and define their relationships is done in _______ phase.
Architecture: Decompose the problem into subsystems and define their relationships
102. Which attribute/attributes will we use to limit the capacity of text box to 20 characters?
o Maxlength=”20” PG#74
o Length=”20”
o Size=”20”
o All of the above
Maxlength=“limitInCharacters”
103. _______ is a type of computer-to-computer messaging.
o TCP
o Telnet
o E-mail PG#213
o FTP
email
Computer-to-computer messaging Inexpensive, and quite quick, but not instant!
104. Suppose you are the presenter and you want audience in touch during presentation then what will you do?
105. Whenever a contact in our list comes online, who informs us through an alert message and by playing a
sound?
o IM server
o IM client PG#215
o Client
o Server
106. One can run program on a remote computer using the ____________ protocol.
o SMTP
o TELENET PG#185
o FTP
o None of the given choices
o By value
o By reference
o Both a & b PG#201
o None of the given
Arguments values are passed to the function by value (some popular languages pass
arguments „by reference‟ as well)
108. __________ Loop is flow control statement that allows code to be executed repeatedly based on a given
Boolean condition.
o For
o Do-While
o If-else
o While Click here for detail
A while loop is a control flow statement that allows code to be executed repeatedly based on a given boolean condition
109. Two or more computers connected together so that they can share information and resources are termed as:
Computer Network
Multiple computers that are connected together to share information and other Resources
110. In _________ TCP\IP protocols became the only set of protocols used on the ARPANET.
o 1973
o 1983 PG#196
o 1972
o None
1983 - The TCP/IP protocols becomes the only set of protocols used on the
ARPANET
This sets a standard
111. In 1983, which protocols became the only set of protocols used on the ARPANET?
o UDP/IP
o TCP/IP PG#196
1983 - The TCP/IP protocols becomes the only set of protocols used on the
ARPANET
This sets a standard
115. Network Organization ____________ so that network organization works effectively to meet the business
goals the organization.
o Shares knowledge
o Decentralizes the control of the operation
o Shares knowledge and decentralizes the control of the operation PG#281
o Shares knowledge and Centralizes the control of the operation
Network Organization
It shares knowledge and decentralizes the control of the operation so that network
works effectively to meet the business goals of the organization
116. Infection propagation and Actual destructive are the components of ___________
o Transmission mechanism
o Payload PG#277
o Worms
o Trojan Horse
Payload
• The part of the virus that generally consists of malicious computer instructions
• The part generally has two further components:
– Infection propagation component:
• This component transfers the virus to other files residing on the computer
– Actual destructive component:
• This component destroys data or performs or other harmful operations
o Time out
o Waiting
o Server Busy
o Server Unavailable
118. _____________ provides software tools needed to organize & manipulate the data in a flexible manner.
o Data Base
o DBMS PG#254
o Data Mining
o File system
A DBMS takes care of the storage, retrieval, and management of large data sets on a
database
It provides SW tools needed to organize & manipulate that data in a flexible manner
o PI()
o Graph. PI
o Math.PI PG#248
o Math.PI()
Properties:
Math.PI
Math.E
Math.LN2
Math.LN10
Math.LOG2E
Math.LOG10E
Math.SQRT2
Math.SQRT1_2
120. There are __________ popular schemes to reduce the number of bytes that are required for storing graphics.
o 4
o 3
o 2 PG#235
o None of these
A number of clever schemes have been invented to reduce the number of bytes that are
required for storing graphics. 2 popular ones:
Color mapping
Dithering
121. Databases consisting of two or more related tables are called _____________
o Databases
o Relational Databases PG#262
o RDBMS
o Flat-Files
Relational Databases
• Databases consisting of two or more related tables are called relational databases
122. COO stands for
Utility software is system software designed to help analyze, configure, optimize or maintain a computer.
125. The user‟s & the contact‟s IM clients are ready to communicate directly, this communication is called:
o Peer-to-peer PG#217
o Client-server
o Peer-to-peer
o Ad hoc network
Now the user’s & the contact’s IM clients are ready to communicate directly (P2P)
126. Events can be captured in the HTML code, and then directed to a JavaScript _______ for an appropriate
response
o Crime
o War
o Software
o Game
129. Which of the following is used to attain something productive as opposed to games or entertainment
software‟s?
o System software
o Application PG#61
o Programing software
o Productive software
130. Programs(s) used for writing, sending, receiving, and displaying E-mail message are:
o SMTP server
o E-mail client PG#213
o POP3 server
o All of the given choices
eMail Clients
Programs used for writing, sending, receiving, and displaying eMail messages
Examples: Outlook, Communicator, Hotmail, YahooMail
o Rows
o Columns
o Both of the given PG#83
o None of the given
Spreadsheet SW (2)
Consist of cells arranged in rows and columns
Each cell may contain numeric values, text or formulas
Automation
Recalculations
Charts
132. What would be the html code for the given display: 1.circle 2.square
o <ol>
<L1> circle</L1>
<L1> square<L1> PG#52
o <ul >
<L1> circle</L1>
<L1> square</L1>
o Text box
o Check box
o For loop PG#69
o Radio button
o True
o False
o Data registers
o Vector Registers
o General Purpose Registers PG#35
o Special purpose Registers
o MS Paint
o MS Word PG#62
o MS Excel
o Corel Draw
MS Word. Individuals use it and so do many large corporations. It is used for writing one-page letters and also to typeset books
137. Digital computers possess two natural states ______ and ________
o On & on
o On & off PG#42
o Off & off
o None
The fundamental building block of a digital computer – the switch – possesses two natural states, ON & OFF.
138. Which of the following are an essential HTML tags required in all web pages.
o <HTML>,<BODY>,<HEADING>
o <HTML>,<HEAD>,<H1>
o <HTML>,<HEAD>,<BODY>
o <HTML>,<HEAD>,<BODY>,<HEADING>
139. Which attribute is used to submit a HTML form to a specified hyper link?
o Method PG#71
o Action
o Name
o None of the given
method: Forms can be submitted through two alternate methods – GET & POST
Shrink-Wrapped SW
SW built in such a way that it is useful for many different users in many different ways.
Example: MS Word.
141. Which one of the following web programing languages is used to do client-side scripting?
o ASP
o Server Side JavaScript
o PHP
o VBScript PG#95
We‟ll use JavaScript to do client-side scripting. However, there are many other languages that can be used for that purpose, e.g.
VBScript
o Output
o Input PG#23
o Storage
o None of the above
JavaScript:
Is an interpreted language
Supports event-driven programming
Is object-based
o L1
o L2 PG#34
o Both
o None of the above
L2, cache memory, which is on a separate chip from the microprocessor but faster to access than regular RAM.
145. The best strategy used for complex Boolean operation is called . . . . . . .
o Brute-force
o Greedy Algorithm
o Divide and conquer PG#45
o None of the above
146. Given the HTML code. <A HREF=”mailto:[email protected]”>[email protected]</A>
My email. Read the code carefully and tell what output browser will generate?
o [email protected] Correct
o [email protected]
o my email [email protected]
o none of the given choices
o Adobe PageMaker
o Corel Ventura
o MS Publisher
o MS Word PG#88
DTP: Requirements
High-end PC with a large-screen monitor
Laser printer
Scanner
DTP SW
Examples:
Adobe PageMaker
QuarkXPress
Corel Ventura
MS Publisher
o Nopade
o Notepad PG#83
o Textpad
o Editor
Web pages can be developed using a simple plain-text editor like the “notepad”, but
more efficient, easy-to-use HTML editors can make the process quicker
o Resister
o Diode
o Transistor PG#32
o Capacitor
The transistor is a solid state semiconductor device used for amplification and
Switching, and has three terminals.
150. ROWSPAN is used to extend the current cell to some
o Columns
o Rows
o Both a & b
o None of the given
ROWSPAN
The number of columns the current cell should extend itself
Example: <TD ROWSPAN = “5”>
151. When the if statement consist more than one statement then enclosing these statement in curly braces is,
o Not required
o Good programing
o Relevant
o Must
o Object PG#96
o Method
o Window
o Text
Object Based?
Everything that JavaScript manipulates, it treats as an object
Trialware
It is similar to shareware but difference is that the SW is usable for a short period only.
When the period is expired, it is no more in use until the license is not purchased. The
trial period may vary according to its developer. This period may range from a week to a
few months.
It can be downloaded from the Internet or alternatively.
154. The process that can be used to solve a problem is termed as the _______
o Use case
o Protocol
o Algorithm PG#99
o Flow Diagram
o
The process that can be used to solve a problem is termed as the “algorithm”
o MS Visio
o MS Paint PG#82
o Corel Draw
o Flash
o <UL>
o <OL> PG#53
o <DL>
o None of the given
o Radio button
o Check box
o Selection list
o Ordered list
158. Without __________, a web site is read only.
o Form PG#69
o Dialog box
o Button
o Scroll Bar
159. Choose the correct html to left-align the content inside a table cell:
o <tdleft>
o <td align = |left|>
o <td valign = |left|>
o <td leftalign>
o LAN
o Protocol PG#185
o Hub
o None of the given choices
Protocol
–Rules governing communications over the network
161. The heuristic| programmers deliver the same number of Line of code| suggest that programmer should use
o 1972
o 1973 PG#197
o 1974
o 1976
1973 - FTP (File Transfer Protocol) is introduced, standardizing the transfer of files
between networked computers
163. Which of the following is True about |pareseFloat(string)| function : I) if the first character cannot be
converted to a number,parseFloat returns NaN. II) It returns the fractional portion of floating point number. III)
Parses the string argument; returns a FP number. IV) None of the given options.
o I and II only
o II and III only
o I and III only PG#204
o IV only
o Cosmetic PG#176
o Fashion
o Animation
o None of the given
Using Motion
Use motion to attract the viewer‟s attention
Avoid the use of motion for “cosmetic” purposes
Success is defined by the user, not the builder
165. A named collection of properties (data, state) & methods (instructions, behavior ) is called
o Object PG#202
o Entity
o Relation
o Template
Object: A named collection of properties (data, state) & methods (instructions, behavior)
166. ________ / / / ____________ / A Parallelogram represents the _______ flow chart element.
o Process
o Input or output PG#105
o Decision
o Connector
o Local
o Global
o Complex
o All of the given
o True PG#83
o False
Word Processors
WYSIWYG (e.g. Word, WordPerfect, Star) or traditional markup (LaTeX)?
169. During one of the international cricket tournaments, one of the teams intentionally lost a match, so that they
could qualify for the next round if they had won that match, some other team would have qualified this is an
example of a ___________
o Greedy algorithm
o Non-greedy algorithm PG#102
o Only text
o Images
o Tables
o All of the given PG#54
Data Cell
(Can contain paragraphs, images, lists,
forms, tables)
171. Which of the following is incorrect for making design elements legible?
172. Function WriteList(heading, words){//body of function} in above definition | WriteList |is the______
o Keyword PG#201
o Function identifier
o Parameter
o Function prototype
173. There are mainly two types of networks according to network access policy namely:
174. In a system having many parts to be designed, one should always do the _______ first.
o Simple part
o Development part
o Quality part
o None of the given PG#166
Arrays in JavaScript
In JavaScript, arrays are implemented in the form of the „Array‟ object
The key property of the „Array‟ object is „length‟, i.e the number of elements in an array.
177. ____________prevent collisions of packets caused by simultaneous transmission between two or more
computers.
o Security
o Protocol PG#190
o Authorization
o None of the given choices
Protocols prevent collisions of packets caused by simultaneous transmission between two or more computers
o Security
o Efficiency
o Lower cost PG#187
o None of the given choices
o Homogeneous
o Heterogeneous PG#180
o Homogeneous and Heterogeneous
o None of the given choices
o Private network
o Public network
o VPN PG#187
o None of the given
VPNs use public telecom infrastructure, maintaining privacy through security procedures
181. The function which call themselves from their (own) body are called:
o Virtual function
o Abstract function
o Overriding functions
o Recursive functions Click here for detail
In computer science, one of the main ways that self-similarity is expressed is through a technique called recursion.
Recursion is found whenever a function calls itself from within the body of its own code.
o Direct proportional
o Not proportional
o Equal
o None of the given
183. According to heuristic, if you can‟t explain it in ___________ minutes, either you don‟t understand it or it
does not work.
o 10
o 5 PG#166
o 2
o 1
If you can‟t explain it in 5 minutes, either you don‟t understand it or it does not work
184. (a) ______ is the concept embedded in an algorithm (soul!) and (b) _______ is the actual representation of
an algorithm (the body!)
o Text
o Radio
o Hidden
o File PG#79
o Text
o Password
o Hidden PG#74
o Check box
Hidden Input
<INPUT
type=“hidden”
name=“fieldName”
value=“value”
>
187. Operating system installed in a cell phone is a type ____________
188. Quantum mechanics is the branch of ___________; which describes the activity of subatomic particles.
o Chemistry
o Computer science
o Physics Click here for detail
o None of the given choices
Quantum Theory, also quantum mechanics, in physics, a theory based on using the concept of the quantum unit to describe the
dynamic properties of subatomic particles and the interactions of matter and radiation.
189. Deep blue was the name of :
o Human
o Computer PG#9
o City
o None of given choices
In 1997 Deep Blue, a supercomputer designed by IBM, beat Gary Kasparov, the World Chess Champion That computer was
exceptionally fast, did not get tired or bored.
190. What was the name of first computer that used |magnetic Tape| for programs storing?
o ENIAC
o EDVAC Click here for detail
o Harvard Mark 1
o Atanasoff-Berry Computer
EDVAC (electronic discrete variable computer) - First computer to use Magnetic Tape. This was a breakthrough as previous
computers had to be re-programmed by re-wiring them whereas EDVAC could have new programs loaded off of the tape.
Proposed by John von Neumann, it was completed in 1952 at the Institute for Advance Study, Princeton, USA.
191. ______________ are personal computers that are designed to be easily transported and relocated
o Desktops
o Portables PG#21
o Servers
o Workstations
Portables
Portable computer is a personal computer that is designed to be easily transported and relocated, but is larger and less convenient
to transport than a notebook computer. The earliest PCs designed for easy transport were called portables.
The Internet is unlike any previous human invention. It is a world-wide resource, Accessible to all of the humankind.
193. What are the conditions that must be fulfilled in order to use web?
o Computer is ON
o Web browser is available
o PC is connected to the Internet
o All of the given
194. Array can be defined as:
196. _____________ converts computer messages to electrical pulses that are suitable for transmission over the
telephone line.
o Modulator PG#187
o Demodulator
o Modulator & Demodulator
o None of the given
Modulator converts computer messages to electrical pulses that are suitable for transmission over the telephone lines
197. The first Web browser with a GUI was generally available in:
o 1992
o 1993
o 1994
o 1995
Global Variables
Visible everywhere on the Web page
o Global PG#207
o Local
o Both Global and Local
o None of the given choices
Global variables can make the logic of a Web page difficult to understand
201. ______________ Loop is flow control statement that allows code to be executed repeatedly based on a given
Boolean condition.
o For
o Do-While
o If-else
o While
o Protocol
o Firewall PG#191
o Communication channel
o None of the given choices
Firewall
A system that that guards a private network, enforcing an access/deny policy to all traffic
going to and coming from the Internet
203. Electrical pulses received over telephone line are converted into message ( comprehensible by the computer )
by using:
o Modulator
o Demodulator PG#187
o Both Modulator and Demodulator
o None of the given choices
Demodulator converts electrical pulses received over telephone lines into messages that
are comprehensible for computers
204. In partitioning program/module, it should be assured that partitioned chunks should be as _______ as
possible.
o Dependent
o Independent
o Complex
o All of the given
205. Which one can lead user to leave your website
o Simple design
o Poor navigation PG#170
o Information layout
o Adaptable design
83% of users have left sites in frustration due to poor navigation, slowness (NetSmart Research)
206. ____________ breaks down the message to be sent over the internet into packets.
o TCP PG#196
o IP
o SMTP
o None of the given
TCP breaks down the message to be sent over the Internet into packets
207. Identify the correct statement about function arguments I) A comma-separated list of data II) Define the
interface b/w function and rest of code III) They are used to identify the function IV) They identify function‟s
type.
Arguments of a Function
A comma-separated list of data
Arguments define the interface between the function and the rest of the Web page
Arguments values are passed to the function by value (some popular languages pass
arguments „by reference‟ as well)
To ensure that a function is defined before it is called up, define all functions in the
HEAD portion of Web pages
o SMTP PG#213
o HTTP
o FTP
o None of the given choices
o 80
o 15 PG#31
o 20
o 50
o 8
o 4 PG#37
o 16
o 32
o ABC PG#14
o BCD
o EDC
o None of the given choices
ABC – 1939
The Atanasoff-Berry Computer was the world's first electronic digital computer. It was built by John Vincent Atanasoff and
Clifford Berry at Iowa State University during 1937- 42.
An integrated circuit, commonly referred to as an IC, is a microscopic array of electronic circuits and components that has been
diffused or implanted onto the surface of a single crystal, or chip, of semiconducting material such as silicon.
213. _______ is a related collection of WWW files that includes a beginning file called homepage.
o HTML
o HTTP
o Web Site PG#18
o Web Page
A Web site is a related collection of World Wide Web (WWW) files that includes a beginning file called a home page.
214. The name of first electronic computer that stored entire program in its memory was:
o ENIAC
o Harvard Mark 1
o EDVAC
o Attanasoff-Berry Computer
o ENIAC
o Harvard Mark 1
o IBM-PC
o Attanasoff-Berry Computer
216. All the ideas of Babbage Analytical engine were included in:
o Atanasoff-Berry Computer
o Harvard Mark 1
o ENIAC
o Pentium
o Numeric
o A URL PG#270
o A text value
o None of above
o Intel 4004
o Intel 8080
o Intel 386
o Pentium
o Magnetic Tape
o Floppy Disk
o Punched Cards PG#13
o None of the given choices
Babbage‟s Analytical Engine - 1833
Mechanical, digital, general-purpose
Was crank-driven
Could store instructions
Could perform mathematical calculations
Had the ability to print
Could punched cards as permanent memory
220. First computer that could not only manipulate numbers but also text data as well was:
o ENIAC
o EDVAC
o UNIVAC 1
o Attanasoff-Berry Computer
ENIAC I (Electrical Numerical Integrator And Calculator). The U.S. military sponsored their research; they needed a calculating
device for writing artillery-firing tables (the settings used for different weapons under varied conditions for target accuracy). John
Mauchly was the chief consultant and J Presper Eckert was the chief engineer. Eckert was a graduate student studying at the
Moore School when he met John Mauchly in 1943. It took the team about one year to design the ENIAC and 18 months and
500,000 tax dollars to build it. The ENIAC contained 17,468 vacuum tubes, along with 70,000 resistors and 10,000 Capacitors.
221. ________ has changed our way of life like no other technology.
o Computational technology
o Computer technology
o Computing technology PG#180
o None of the above
Computing technology has changed our way of life like no other technology
222. Smart editors they can automatically color different parts of statements in different colors e.g. HTML tags in
___________ color.
o Green
o Grey
o Blue PG#315
o None of the above
Automatically color different parts of statements in different colors, e.g. comments in Gray, strings in Green, HTML tags in Blue
223. When the packets reach destination ___________ reassembles them into original message.
o Protocol
o TCP PG#317
o IP
o None of the above
When the packets reach the destination computer, TCP reassembles them into the original message
224. Because of computing, _______ profession(s) is /are being eliminated.
o Typists
o Bank tellers
o Telephone operators
o All of the given PG#281
225. ________ is a technique used create smooth animations or to display one of several images based on the
requirement.
Image Preloading
• The primary use for an Image object is to download an image into the cache before
it is actually needed for display
• This technique can be used to create smooth animations or to display one of several
images based on the requirement
o Project Manager
o CEO PG#298
o Team Lead
o None of the above
Executive Team
• CEO – Chief Executive Officer
227. __________ based on the principles of the logical reasoning ability of humans.
o Genetic Algorithms
o Rule-Based System PG#242
o Feed-Forward Network
o None of these
o Private
o Public PG#186
o Both private and public
o None of the given choices
Public Networks
• All networks that are not private, are … public
• Example: Internet
o Records
o Fields PG#262
o Identifiers
o Data
Table rows are called records; row elements are called fields
o E-mail client
o SMTP server
o POP3 server
o All of the given choices PG#213
o Subject-Driven Programs
o Web Programs PG#321
o Event-Driven Programs
o Structured Programs
JavaScript can be used (along with HTML) to develop interactive content for the Web
232. _________ are used to transferring files between computer on TCP/IP network
o FTP PG#234
o DNS
o Telnet
o None of these
FTP:
Used to transfer files between computers on a TCP/IP network (e.g Internet)
233. The pattern in which computer are connected together to from a network is called:
Network Topologies
The pattern in which computers are connected to form a network
234. ___________ is a branch of computer science concerned with manipulating and enhancing computer
graphics.
o Image Handling
o Image Processing PG#237
o Image Engineering
o None of these
Image Processing:
A branch of computer science concerned with manipulating and enhancing computer graphics
236. ____________ is a network of computer that are lying within the same building or in vicinity.
o LAN PG#187
o WAN
o LAN and WAN
o None of the given choices
LAN
A network of computers located in the same building or a handful of nearby buildings
Examples:
–Computer network at your PVC
–Computer network of a University campus
237. The most common type of Relational database for server is _________
o Access
o Oracle
o MySQL
o Excel
238. The organizations are learning that business can be done in a more effective manner if emphasis is placed
upon _____________.
o Cooperation
o Shared responsibility
o Networking
o All of the given PG#281
The organizations are learning that business can be done in a more effective manner if emphasis is placed upon cooperation,
shared responsibility and networking:
239. The browser breaks down the URL into ______ parts
o 2
o 3 PG#211
o 4
o 5
o LAN
o MAN
o Internet PG#209
o None of above
241. Module level design and unit testing the responsibility of __________
o Team Lead
o Developer PG#298
o Project Manager
o None of the above
Developer
• Responsibilities:
– Module-level design
– Coding
– Unit-testing
242. The important attribute of image tag is __________
o src
o alt
o both “alt” and “src” http://www.w3schools.com/tags/tag_img.asp
o none of the above
The <img> tag has two required attributes: src and alt.
243. If you write program using good programing methodology then the overall cost & time of the program is
______________
o Increased
o Reduced
o Doubled
o None of the above
244. Who routes the packets through the internet to get their destination?
o UDP
o TCP
o UCP
o IP PG#209
IP routes these packets through the Internet to get them to their destination
o Information
o Data Click here for detail
o Entity
o None of the above
Data is a collection of raw facts and figures and statistics related to an object.
Primary Key is a field that uniquely identifies each record stored in a table
o Efficient
o Readable
o Inefficient
o None of the above
249. Someday it will be possible to load all the lectures, papers, books and s/w produced by an expert into an
__________ system.
o Information
o Eco
o Intelligent Click here for detail
o None of the above
Someday it will be possible to load all the lectures, papers, books and SW produced by an expert into an intelligent system
250. Which one of the following is built- in computer memory containing data that normally can only be read, not
written to?
o RAM
o ROM PG#25
o Cache Memory
o Magnetic Memory
ROM
ROM is "built-in" computer memory containing data that normally can only be read, not written to.
251. Which of the following is a computer storage device that saves and retrieves the data when required?
Hard disk
Hard disk is a computer storage device which saves and retrieves the data when Required.
252. Which one of the following units can be called as the brain of computer microprocessor?
A control unit can be thought of as a finite state machine. It is called the brain of computer microprocessor
253. Which of the following translate a high level language code into machine understandable code?
o Computer
o Transistor
o Compiler PG#130
o None of the above
o Blue only
o Back and underlined
o Blue and bold
o Blue and underlined Click here for detail
By default, when Word formats a hyperlink, the hyperlink appears blue with a blue underline
o UNIAC 1 PG#14
o ENIAC
o EDVAC
o Attanasoff-Berry Computer
UNIVAC 1 – 1951
UNIVAC-1. The first commercially successful electronic computer, UNIVAC I, was
also the first general purpose computer - designed to handle both numeric and textual
information.
o 10
o 9
o 8 PG#42
o None of the given choices
Byte = 8 bits
257. The first programing language designed for the non-technical users, was:
o Visual Basic
o Ada PG#9
o Basic
o Cobol
258. If a computer could pass the Turing test then it would be able to :
USB
USB (Universal Serial Bus) is a plug-and-play hardware interface for peripherals such as the keyboard, mouse, joystick, scanner,
printer and modem.
260. ____________ are set of Rules & Regulation that provides communication in a network.
o Browser
o Protocol
o Internet Explorer
o Hyper Text
261. A communication protocol is a _________ that governs the flow of information over a network.
o Set of Methods
o Set of Functions
o Set of rules
o None of the given
262. Registers that hold read-only values are known as . . . . . .
o Base band
o Broad band
o Bandwidth
o None of the given choices
Bandwidth
Capacity of a communication channel for carrying data
Measured in bits/s (bps), kb/s, Mb/s, Gb/s, Tb/s
Optical fiber channels have the highest (1 Tb/s)
o 1990 PG#197
o 1991
o 1995
o None of the given choices
o Variable declaration
o Variable definition
o Variable scope PG#204
o Variable garbage collection
Scope of Variable
Defining the space in which a variable is effective is known as
defining the scope of a variable. A variable can be either local or global in scope.
267. JavaScript Array can hold elements of ________ simultaneously.
268. Avoid lines type shorter than ________ characters and longer than_______ characters.
o 40,60 PG#175
o 30,60
o 20,30
o None of the given
Avoid lines of type shorter than 40 characters and longer than 60 characters
o LAN PG#190
o WAN
o Both LAN and WAN
o None of the given choices
Several protocols are available for various types of networks. Here we discuss two that are popular for LANs: Ethernet; Token
Ring
o Public
o Private PG#186
o Both Public & Private
o None of the given
Private Networks
• Organizations having many computers usually connect them in the form of private Networks Access to these networks is
restricted to authorized computers only
271. Which of the following keyword is used to jump out of switch statement as soon as a match is found?
o Default
o Else
o Jump
o Break
272. ______________ enables users located at far-way locations to easily share information with others located
all over the world.
o Protocol
o Internet PG#196
o Communication channel
o None of the given
Internet
Enables users located at far-way locations to easily share information with others located all over the world
o Getting results
o Searching
o Recovering from errors PG#185
o Reading the information
274. In which topologies, network is not affected if one computer goes down?
o SMTP
o FTP PG#185
o TELNET
o None of the given choices
can download or upload files to a remote computer using the FTP protocol
276. There are mainly _________ types of network according to distance between the nodes.
o 2 PG#187
o 3
o 4
o 5
o onFocus( ) , count( )
o onBlur( ), sort( )
o reverse( ), sort() PG#178
o reverse( ), onclick( )
o number
o string
o Boolean
o None of the given
280. Declaring variables ( using the var keyword) within a function makes it:
Local Variables
Declaring variables (using the var keyword) within a function, makes them local•They are available only within the function and
hold no meaning outside of it
281. ___________ is used to form a connection between two separate, but similar networks.
o Bridge PG#187
o Router
o Gateway
o None of the given choices
o Ring PG#189
o Bus
o Star
o None of the given choices
o Heuristic PG#166
o Mistake
o Common sense
o Experience
284. ___________ is a special purpose computer that directs the data traffic when several paths are available.
o Bridge
o Router PG#187
o Gateway
o None of the given choices
Router
A special-purpose computer that directs data traffic when several paths are available
A router examines the destination info in each arriving packet and then routes it through the most efficient path available
1972 - The National Center for Supercomputing Apps. (NCSA) develops the telnet application for remote login, making it easier
to connect to a remote computer
287. In partitioning of program/module, it should be assured that partitioned chunks should be as ________ as
possible.
o Dependent
o Independent PG#166
o Complex
o All of the above
o UNIVAC1
o Cray 1
o IBM PC Click here for detail
o Altair 8800
o Ring PG#189
o Bus
o Star
o None of the given choices
290. ____________ is a special purpose computer that connects and translates between networks that use
different communication protocols.
o Bridge
o Router
o Gateway PG#187
o None of the given choices
Gateway
A special-purpose computer that connects and translates between networks that use different communications protocols
o 1968
o 1969
o 1970
o 1978
292. Any variable in JavaScript can hold any type of value, and the that type can change midway through the
program.
o True PG#144
o False
o 5900
o 6000 PG#164
o 6001
o None of the given
o SP
o JSP
o JavaScript
o None of the above
296. Which is the protocol that is used to send and receive eMail message over TCP/IP network?
o FTP
o TCP
o telnet protocol
o SMTP PG#213
297. ______________ Team is responsible for the maintenance, expansion, improvement of the infrastructure
consisting of workstations, networking equipment, software & network security.
o Support PG#300
o Configuration Management
o Quality Assurance
o None of the above
Support Team
Responsible for the maintenance, expansion, improvement of the infrastructure
consisting of:
– Workstations, servers, printers
– Networking equipment (router, switch, hub)
– SW (OS, development SW, productivity SW, etc.)
– Network security
298. In case of ______ mode, user starts a program which computer executes with the given data and produces
results without any further intervention from user.
o Batch PG#81
o Interactive
o Time-Sharing
o User
Batch-mode
The user starts the program and the computer processes the provided data and produces
results without any further intervention of from the user
Example: Payroll
299. Assume that we want to create a text box which is invisible from the user and should only be used to provide
data to the web server. Which of the following attributes will be used to make invisible?
o Hidden
o Invisible
o Secret
o Hide
o Positional PG#41
o Neutral
o Vertical
o horizontal
o Check box
o Radio box Click here for detail
o Text box
o None of the given
302. A truth table defines the output of ________ function W.r.t the inputs
o None PG#44
o Input
o Output
o Both input and output
A truth table defines the output of a logic function for all possible inputs
303. Algorithms is a________
o Definition of problem
o Sequence of steps to solve problem PG#320
o Understanding of problem
o Solving a problem
Algorithm
1st Definition:
Sequence of steps that is taken to solve a problem
o Application
o Device driver PG#66
o Utility software
o None of the above
Applications talk to devices through the OS and OS talks to and manages devices
through Device Drivers
o Human
o High level
o Machine Click here for detail also on handout PG#59
o None of the given
Machine Language
A system of codes directly understandable by a computer's CPU is termed this CPU's native or machine language. Although
machine code may seem similar to assembly language they are in fact two different types of languages. Machine code is
composed only of the two binary digits 0 and 1.
o Copy
o Paste
o Cut
o Undo PG#225
o For
o While
o Do-While
o All of the given
o Frame
o Packet PG#186
o Message
o None of the given choices
Packet
• The smallest unit of data transmitted over a computer network
o True
o False PG#96
Script:
Is an interpreted language
Supports event-driven programming
Is object-based
312. VULMS is an example of ____________ software.
o Engineering
o Entertainment
o Educational
o Scientific
o Task
o Process
o Problem PG#99
o All of the given
Algorithm:
Sequence of steps that can be taken to solve a given problem
o Operating system
o Expert system PG#83
o ERP system
o None of the above
o Device driver
o Kernel PG#67
o Application program
o None of the given
Kernel
The heart of the OS
Responsible for all the essential operations like basic house keeping, task scheduling, etc.
Also contains low-level HW interfaces
Size important, as it is memory-resident
317. Consider the statement: “window. alert(“message”);”
o It is syntax Error
o It will cause a dialog box to be appeared
o Syntax is correct, but will compile with a warning
o It will cause the “Message” to be copied to memory
318. The code in the _________ portion is the right choice for developing larger JavaScript‟s
o Body
o At End
o Head PG#245
o separate
The “code in the HEAD portion” is the right choice for developing larger JavaScript
scripts
It makes the code easier to read
It allows the reuse of a function for multiple event handlers
319. In _________ automatic machines perform various tasks that were previously performed by human.
o Fuzzy Logic
o Robotics PG#244
o Rule based system
o None of these
Robotics:Automatic machines that perform various tasks that were previously done by humans
Example:
Pilot-less combat airplanes
Land-mine hunters
Autonomous vacuum-cleaners
Components: Body structure, actuators, power-source, sensors, controller (the AI-based
part)
o e-mail client
o SMTP server PG#213
o POP3 server
o All of the given choices
o 0.90 MB
o 0.75 MB PG#236
o MB
o 0.5 MB
Each value, from 0 to 255, is mapped to a selected RGB color through a table, reducing the size of a 2.25MB graphic to 0.75MB
322. Using ________, a user can remotely log on to a computer (connected to the user through a network, e.g.
internet) & have control over it like a local user, including control over running various programs?
o FTP
o TCP
o Telnet Protocol PG#234
o None of the given choices
Telnet Protocol:
Using Telnet, a user can remotely log on to a computer (connected to the user‟s through
a TCP/IP network, e.g. Internet) & have control over it like a local user, including
control over running various programs
323. _____________ executes the specified JavaScript code when a window loses focus or a form
element loses focus
o OnBlur PG#230
o onFocus
o onLoad
o onUnload
onBlur executes the specified JavaScript code when a window loses focus or a form element loses focus
o FTP
o POP PG#212
o Telnet Protocol
o SMTP
325. A user may access any item on the web through a _____________
o HTTP
o SMPT
o URL PG#211
o None of the these
A user may access any item on the Web through a URL, e.g.
http://www.vu.edu.pk/cs/index.html
326. In JavaScript every user-defined function must be written between _________ tag-set
o <JAVASCRIPT> </JAVASCRIPT>
o <SCRIPT> </SCRIPT>
o <FUNCTION> </FUNCTION>
o <CODE> < /CODE >
327. A combination of _______ and _______ is called Desktop Publishing.
328. HTML document allows including the web programing language code into itself.
o True
o False
o 16
o 8
o 10 PG#39
o none
330. A user plug in sound card in computer, _________ is required so that the sound card can perform its tasks.
o Hardware
o Device driver
o Application driver
o Compiler
Drivers are software‟s which are necessary for a device to function properly, for
example, Sound Card drivers etc
o Tables
o Thesaurus PG#89
o Spelling & Grammar
o Word count
Thesaurus
My favorite tool Helps you find synonyms and, sometimes, antonyms as well
332. Boolean variables can only have __________ values
o Hexa
o Decimal
o Binary PG#43
o Both Hexa & Decimal
333. __________ performs all the controlling and management activities in a computer.
o Hardware
o Application software
o MS Word
o Operating system Click here for detail
334. Assume that we want the text | save| to appear on a button, which attribute of the INPUT tag will be used to
do that?
o Write
o Name
o Value PG#75
o Type
o Menu driven
o Graphical user interface
o Command driven
o None of the given
MS-DOS is inherently a command driven interface but applications running in that environment can provide a GUI interface.
336. Objects are modified with ______ that are associated with that object.
o Properties
o Events
o Methods PG # 130
o Operators
337. The “Ockham‟s Razor,” principle states that when choosing among competing, successful solutions to a
problem; choose the one which is the least ________
o Time Consuming
o Ambiguous
o Complex PG#101
o Restricted
JavaScript can be used (along with HTML) to develop interactive content for the Web
o MS Word
o MS PowerPoint
o MS Excel
o MS Access
Excel is an electronic spreadsheet program that can be used for storing, organizing and manipulating data.
o Ground facts
o Experience
o Practice
o Approximation PG#251