This document summarizes the answers to 37 questions from a computer science exam completed by Qaiser Abbas and receiving 100% correct responses. The questions cover topics such as hashtags, SD cards, binary values, wireless networking protocols, data compression techniques, verification processes, computer memory, programming logic, domain name systems, search functions, HTML tags, and computer hardware components. Qaiser Abbas demonstrated a strong understanding of fundamental computer science concepts by answering all questions correctly.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
131 views
Cs 101 Qa 1
This document summarizes the answers to 37 questions from a computer science exam completed by Qaiser Abbas and receiving 100% correct responses. The questions cover topics such as hashtags, SD cards, binary values, wireless networking protocols, data compression techniques, verification processes, computer memory, programming logic, domain name systems, search functions, HTML tags, and computer hardware components. Qaiser Abbas demonstrated a strong understanding of fundamental computer science concepts by answering all questions correctly.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2
Cs101
100% correct solved questions
By Qaiser Abbas
1. # tag only shows the particular pages related to it.
2. SDs (Secure Digital Memory Cards) Provide up to few GBs of storage. (p56) 3. One bit can contain only one value. 0 or 1 (p46) 4. Which protocol is suitable for wireless star networks? (CSMA/CA), Carrier Sense, Multiple Access with Collision Avoidance 5. Google does not distinguish the capital letters or small letters. This is called case-insensitive (p.32) 6. Which Data Compression Technique is suitable for situation where the long sequence has same value? run- length encoding, (p.73) 7. The information in the state of the process must be sufficient to determine uniquely and completely the actions required by each step. 8. What is the full form of PHP? Personal Home Page 9. UTF-8 Uses 24 to 32 bits. (p.57) 10. The set of task that ensures the software is correctly implements specific function is known as verification. 11. Flash Drive cannot be used in the main memory to store the data. (Page 55) 12. Post test loop Structure refer to the test for termination is performed after the body is executed. 13. A program logic written in an ordinary language illustrating structure similar to computer instructions is known as pseudo code. 14. The process of using DNS to perform a translation is called a DNS lookup. (P.128) 15. Domain name system = (DNS). 16. Which is the correct format to find out a value from any given list? Search ( ) 17. Bits can represent In Chip as : 0. 1 form (p-46) 18. <a> is called the anchor tag in HTML document. P-137 19. If we are interested to see the map of some location, we can use map operator in the following way: map:Location 20. What is the full form of JSP? Java Server Page 21. A Public key is used to Encrypt messages. A private key is used to decrypt messages. 22. If you search on google that “ how can i hack?”. Then nit would be so dangerous. 23. Thr impact of truncation error can be reduced by using longer mantissa field. P.72 24. (a sequence of transactions in which the user establishes initial contact with a computer’s operating system is called login. P.114 25. We need non volatile memory to store data permanently. 26. While structure starts with checking condition. P.165 while (condition): 27. Software Developer is the most demanded job in united states. P.26 28. The “inurl” operator finds all those web pages which contains the mentioned query in the url of the web pages. P.39 29. Binary notation is a way of representing numeric values using only the Digits 0 and 1. 30. Name of the first graphical browser mosaic. 31. when applied to a list with n entries, the sequential search algorithm will interrogate an average of N/2 entries. P 187 32. In a general-purpose computer, a program called the boot loader is permanently stored in the machine’s ROM. P104 33. Using MPEG techniques, video presentations can be successfully relayed over communication paths that provide transfer rates of 40 Mbps. P.77 34. What is a correct expression for finding factorial where f = 1 , i = 1: while (i≤1). f=f*n ; { p-177 handouts main f=f*i ha but i = n} 35. the bit 0 represents the value false and the bit 1 represents the value true p-47 36. Loop, is executed in a repetitive fashion under the direction of some control process. P.173 37.