CS101 Midterm Solved MCQS Subjective
CS101 Midterm Solved MCQS Subjective
COM
vustudypastpapers.com
► Operating system
► Utilities
► Language Translator
► Device Drives
Question No: 5 ( Marks: 1 ) - Please choose one
To start an ordered list from 20 instead of 1, we will write
► <OL begin = "20">
► <OL initiate = "20">
WWW.VUSTUDY.COM
WWW.VUSTUDY.COM
► <OL start = "20">
► <OL from = "20">
Question No: 6 ( Marks: 1 ) - Please choose one
_________ is the best known builder for supercomputers.
► Sun
► Cray Research
► Microsoft
► Apple
Question No: 7 ( Marks: 1 ) - Please choose one
Using COLSPAN, number of rows of the current cell should extend itself
► Upward
► Downward
► Both Upward and Downward
► None of the given choice
Question No: 8 ( Marks: 1 ) - Please choose one
Interactive forms are always placed between ___ tag-set
► TITLE
► HEAD
► BODY
► HTM
Question No: 9 ( Marks: 1 ) - Please choose one
_________ manages the HW and SW resources ( memory, disk drives etc) of the computer
system, often invisibly.
► Explorer.exe
► System Files
► Operating System
► Application Software
Question No: 10 ( Marks: 1 ) - Please choose one
Speakers fall into the hardware category.
► True
► False
Question No: 11 ( Marks: 1 ) - Please choose one
______________ software directly interacts with the hardware.
► Application software
► System software
► Dynamic software
► Distributed software
WWW.VUSTUDY.COM
WWW.VUSTUDY.COM
Question No: 12 ( Marks: 1 ) - Please choose one
In spreadsheet, which of the following function is used to solve the equation ?
► =COUNTIF
► =GoalSeek
► None of the above
► =Sum
Question No: 13 ( Marks: 1 ) - Please choose one
_______ is known as the best feature in word processing.
► Cut
► Copy
► Paste
► Undo
Question No: 14 ( Marks: 1 ) - Please choose one
In java script objects may have___________ properties.
► Single
► Several
► Multiple
► All of the given options
Question No: 15 ( Marks: 1 ) - Please choose one
_________ are great for showing parts of a whole that are generally expressed in percentages.
► Line Charts
► Pie Charts
► Bar Charts
► None of the options described
Question No: 16 ( Marks: 1 ) - Please choose one
Small Computer System Interface is
► Slower and harder to configure then serial and parallel ports
► Faster then USB
► Both first choices
► Slower then USB but Faster then serial and parallel
► Punch cards
WWW.VUSTUDY.COM
WWW.VUSTUDY.COM
► Transistors
► Micro Processors
► Resistors
►2
►8
► 12
► 16
► Special control
► Internet explorer
► Event handlers
WWW.VUSTUDY.COM
WWW.VUSTUDY.COM
Which one is correct for JavaScript?
► onMouseOver
► OnMouseOver
► onmouseover
Programs that reside on Web servers and receive info that a user enters in a form, are known as:
► Server-Side Scripts
► Client-Side Scripts
► Super Scripts
► Form Scripts
► Control unit
WWW.VUSTUDY.COM
WWW.VUSTUDY.COM
► Memory unit
► Weather forecasting
► Aeroplane mnufacturing
WWW.VUSTUDY.COM
WWW.VUSTUDY.COM
► Tape
► RAM
► Floppy
► DVD
► CHECKBOX
► CHECK
► INPUT
► INPUTBOX
Users communicate with the computer using a consistent user interface provided by the OS.
► True
► False
WWW.VUSTUDY.COM
WWW.VUSTUDY.COM
► Behaviors
► Methods
► Properties
► Objects
► Mozilla
► Microsoft
► IBM
_________ are great for showing parts of a whole that are generally expressed in percentages.
► Line Charts
► Pie Charts
► Bar Charts
WWW.VUSTUDY.COM
WWW.VUSTUDY.COM
► None of the options described
► Three
► Two
► One
► None of above
► Method
► Action
► Value
► All of above
Short Questions
Question No: 17 ( Marks: 2 )
Write the major types of softwares with examples?
WWW.VUSTUDY.COM
WWW.VUSTUDY.COM
Software is the set of instructions which guides the computer hardware through their jobs. A
computer is useless without software. We use different software to solve different problems. The
types of software we need depend on the job we want to do.
There are basically two types of software's system software and application software. System
software's are used to help the computer parts work together and also provide support to the
application software. The most common type of system software is operating system.
Application software's are used to improve our work ability. Different application software's and
system software's are used in daily life.
Question No: 18 ( Marks: 2 )
What is the major difference between paragraph <p> and Line Break <BR> tags?
<p> tag is use to Insert paragraph breaks into the text of your HTML document Note that this tag
is special in that it does not require an ending tag.
The <br> tag inserts a single line break. The <br> tag is an empty tag which means that it has no
end tag.
Question No: 19 ( Marks: 2 )
Why PASCAL was designed and what is the problem with PASCAL?
Pascal was originally intended primarily as a teaching language, but it has been more and more
often recommended as a language for serious programming as well, for example, for system
programming tasks and even operating systems.
Question No: 20 ( Marks: 3 )
What are the key requirements of E-commerce Software?
There are more possible approaches depending to the specific context.
The information used for building a software system has more levels:
- Business process level (overall process of the customer business). This is the context where the
future software system will be activated
- Business needs allocated to the software system
- System features that will satisfy those business needs
- System feature details as SRS
WWW.VUSTUDY.COM
WWW.VUSTUDY.COM
delete text: Allows you to erase characters, words, lines, or pages as easily as you can cross them
out on paper.
cut and paste : Allows you to remove (cut) a section of text from one place in a document and
insert (paste) it somewhere else.
copy : Allows you to duplicate a section of text.
page size and margins : Allows you to define various page sizes and margins, and the word
processor will automatically readjust the text so that it fits.
search and replace : Allows you to direct the word processor to search for a particular word or
phrase. You can also direct the word processor to replace one group of characters with another
everywhere that the first group appears.
word wrap : The word processor automatically moves to the next line when you have filled one
line with text, and it will readjust text if you change the margins.
print: Allows you to send a document to a printer to get hardcopy.
file management : Many word processors contain file management capabilities that allow you to
create, delete, move, and search for files.
font specifications: Allows you to change fonts within a document. For example, you can specify
bold, italics, and underlining. Most word processors also let you change the font size and even the
typeface.
footnotes and cross-references: Automates the numbering and placement of footnotes and enables
you to easily cross-reference other sections of the document.
graphics graphics: Allows you to embed illustrations and graphs into a document. Some word
processors let you create the illustrations within the word processor; others let you insert an
illustration produced by a different program.
headers , footers , and page numbering: Allows you to specify customized headers and footers
that the word processor will put at the top and bottom of every page. The word processor
automatically keeps track of page numbers so that the correct number appears on each page.
layout : Allows you to specify different margins within a single document and to specify various
methods for indenting paragraphs.
macros : A macro is a character or word that represents a series of keystrokes. The keystrokes can
represent text or commands. The ability to define macros allows you to save yourself a lot of time
by replacing common combinations of keystrokes.
merges: Allows you to merge text from one file into another file. This is particularly useful for
generating many files that have the same format but different data. Generating mailing labels is
the classic example of using merges.
spell checker : A utility that allows you to check the spelling of words. It will highlight any words
that it does not recognize.
tables of contents and indexes: Allows you to automatically create a table of contents and index
based on special codes that you insert in the document.
thesaurus: A built-in thesaurus that allows you to search for synonyms without leaving the word
processor.
( Marks: 2 )
Explain briefly the different techniques that are used to embed JavaScript code in a web
page?
WWW.VUSTUDY.COM
WWW.VUSTUDY.COM
Answer., Client-side JavaScript code is embedded within HTML documents in a number of
ways:
Between a pair of <script> and </script> tags
From an external file specified by the src attribute of a <script> tag
In an event handler, specified as the value of an HTML attribute such
as onclick or onmouseover
As the body of a URL that uses the special javascript: protocol
The following sections document each of these JavaScript embedding techniques in more detail.
Together, they explain all the ways to include JavaScript in web pages -- that is, they explain the
allowed structure of JavaScript programs on the client side.
( Marks: 2 )
compilation stage during which the whole of the high-level code is translated into
machine instructions in one go. This process can be time-consuming if the program is
long.
The interpreter can immediately execute high-level programs, without waiting for the
completion of the translation process
The choice of which language to use can also depend on the:
-Type of computer the program is to run on,
- Expertise of the programmer
Interpreters: immediate response, but execute code slowly.
Compilers: Takes longer to compile, but super-fast execution.
( Marks: 2 )
WWW.VUSTUDY.COM
WWW.VUSTUDY.COM
microprocessors with 16-bit addressing also led to the first general-purpose microcomputers from
the mid-1970s on.
During the 1960's, computer processors were often constructed out of small and medium-scale
ICs containing from tens to a few hundred transistors. The integration of a whole CPU onto a
single chip greatly reduced the cost of processing power. From these humble beginnings,
continued increases in microprocessor capacity have rendered other forms of computers almost
completely obsolete (see history of computing hardware), with one or more microprocessors used
in everything from the smallest embedded systems and handheld devices to the
largest mainframes and supercomputers.
Since the early 1970s, the increase in capacity of microprocessors has been a consequence of
Moore's Law, which suggests that the complexity of an integrated circuit, with respect to
minimum component cost, doubles every two years
In the late 1990s, and in the high-performance microprocessor segment, heat generation (TDP),
due to switching losses, static current leakage, and other factors, emerged as a leading
developmental constraint
( Marks: 3 )
1.answer formula
=sum(c3:c10) then enter
=(c2+c10Xc6) then enter
( Marks: 5 )
What is software life cycle?
SW Life-Cycle
The sequence of phases a SW goes through from the concept to decommissioning
It is important to think about all those phases before the design work starts
Thinking about the future phases generally results in:
Shorter delivery times
Reduced costs of development
A system of higher quality
A Case in Point
I didn’t discuss with the customer the specs of the HW & OS before developing a
particular e-commerce SW.
I wrote it for the HW/OS that was easily available to me.
Unfortunately that HW/OS combination differed from what was easily available to the
client Result: Huge amount of rework. Higher cost. Delayed delivery. Lower quality.
WWW.VUSTUDY.COM
WWW.VUSTUDY.COM
Therefore, now before designing a SW system, I first write down the installation manual,
and get it OK’d by the customer. I do the same with the Operation & Maintenance
manual as well.
Elaborate greedy algorithm definition with solid example in favour and one counter example?
An algorithm that always takes the best immediate, or local solution while finding an
answer
Greedy algorithms may find the overall or globally optimal solution for some
optimization problems, but may find less-than-optimal solutions for some instances of
other problems
KEY ADVANTAGE: Greedy algorithms are usually faster, since they don't consider the
details of possible alternatives
Greedy Algorithm: Counter Example
During one of the international cricket tournaments, one of the teams intentionally lost a
match, so that they could qualify for the next round
If they had won that particular match, some other team would have qualified
This is an example of a non-greedy algorithm
Greedy Algorithm: Example
A skier skiing downhill on a mountain wants to get to the bottom as quickly as possible
What sort of an algorithm should the skier be using?
The greedy-algorithm approach will be to always have the skies pointed towards the
largest downhill slope (dy/dx), at all times
What is the problem with that approach?
In what situations that will be the best algorithm?
In which situations would it perform poorly?
image: http://api.ning.com/files/-FxrWMrAPziT2j-rSr-AbgyWkWsSK0XKAx3MI-qja0IJ*ZYrbeOOeoko*jKmVNpS-8FFkb9Nyg0IQqudmaMQWf69tNHpJ*qn/1123170671.jpeg?xgip=101%3A0%3A632%3A632%3B%3B&width=48&height=48&crop=1%3A1
image: http://api.ning.com/files/bR8nA-I0SJG6CIZy-G9bFxGXvn7hyT4N02K91fZsBDwSAIVAhU74oiWF5BLjEKrNuuwmyDKushBjV7-opkYm*m2jWzSgMBAS/ddd.png?size=64&crop=1%3A1
WWW.VUSTUDY.COM
WWW.VUSTUDY.COM
Subjective (2, 3 & 5 marks descriptive questions)
Total Questions = 26
Total Marks = 40
Total MCQs of 1 Mark = 20
Short Subjective Question of 2 Marks = 2
Subjective Question of 3 Marks = 2
Subjective Questions of 5 Marks = 2
Q-1 As project manager what are parameters to write feasibility study report? (5 Marks)
Q-2 Name any two languages that can't run w/o interpreter? (LISP, BASIC i wrote) 2 marks
Q-4 What are two ,most important parameters of Algorithim analysis (I wrote time and other is
memory which i Forgot) (5 Marks)
Q-5 Steps for SW developer to make a program for an airline.
Q-6 HTML code 4 writing a text of 40 words and 5 rows.
Total Questions: 26
MCQs: 20
Question # 21: Greedy Algorithm is always right or not, Justify in your own words? (3)
Question # 22: How to block Popup Windows using Java Script? (3)
WWW.VUSTUDY.COM
WWW.VUSTUDY.COM
My Today's Paper
Shared by Izma Khan (VU MIT Student)
Total 26 questions.
Subjective
Question No.1) A company requires a fire alarm (software system) that can generate alerts in case
of emergency like short circuits or fire etc. keeping in view the types of programs, suggest what
kind of program should be developed?
Question No.2) Identify the name of OS component which takes responsibilities of all essential
operations like basic housekeeping, task scheduling, etc.
Question No.3) Write HTML code that generate an input filed with name text, 40 columns and 5
rows?
Q4uestion No.4) Can we use reserved words in a program as objects and variables name? Justify
your answer.
Question No.5) A beginner learner of JavaScript puts very much effort to write the following
piece of code in JavaScript. But despite of so much effort, program contains 5 errors at different
places. You are required to find and write the errors with remarks.
Function throw ()
True= “true”
document.write(True);
10b=15;
WWW.VUSTUDY.COM
WWW.VUSTUDY.COM
Subjective
Q1) Suppose you are a project manager in Zee tec software house you have the responsibility to
prepare the feasibility report? 2 marks
Q2) Highlight the 2 drawbacks of the java script? 2marks
Q3) Suppose a user click a mouse button on an object then some events occur in response against
this action. Which programming technique use for this? 3 marks
Q4) Student A and student B han student B online study karta ha online study k Advantages
btany thy. 3 marks
Q5) How spread sheet id helpful in doing a ‘’what-if’’ analysis in business? Define with
example? 5 marks
Total 26 questions.
Another Today's Paper
Shared by MIT Student
Subjective
1) Role of comments in coding (2marks)
3) A company is receiving complain by its customers that their pop-up window is big, how can
the developers of the website make it small (3marks)
<html>
<head>
<script>
WWW.VUSTUDY.COM
WWW.VUSTUDY.COM
<ol>
(CS101) Introduction to Computing Course Short Notes and short questions answers
Midterm papers
What is a client side script?
It’s a small program that is a part of Webpage and run on the Clients, they interact with the user
to collect information or to accomplish the tasks. When it succeeded to collect the information
they pass the collected information to Server-Side Script.
Advantages:
Reduced Server Load
Reduced Network Traffic
Don’t send incomplete/incorrect/missing data to user’s browser.
Disadvantages:
Don’t work with all Browsers
Scripting may be turn off by user
Increases the complexity of the Webpage.
What is JavaScript?
It’s a programming language and designed to work with browsers developed by Netscape
and designed to develop small program called Client-Side Scripts and that can used in
HTML WebPages. JavaScript is a Case Sensitive language, and it is an interpreted language and
supports Event-Driven programming & it’s also a Object Based.
Some Things That JavaScript Can’t Do:
JavaScript can’t do “Read” “Modify” “Rename” “Delete” “Create”
What Is Object?
It is a named collection of methods and properties.
Types of Object:
There are three types of object
1 JavaScript objects (are part of JavaScript like window, document)
2 Browser objects ( are that objects that contain information about itself)
3 User-defined objects
What Is Method?
WWW.VUSTUDY.COM
WWW.VUSTUDY.COM
Methods are function that are used to manipulate with the Object like (window. close)
Here (window is a Object and close is a Method)
What Is EVENT HANDLERS?
Objects are made up of methods and properties, many object also have event handlers. “Events”
are action that occurs with user interaction with the internet browser.
What Is Programming?
A process in which we tell the computer what needs to be done or what to do.
Types Of Programs:
There are two types of programs
1 Batch Programs
2 Event – Driven Programs
1) Batch Programs:
These program starts automatically via a scheduler like
Initializing the internal data
Reading input data
After reading process that data
After processing print that data
(Important) > No user interaction on those types of programs
2) Event – Driven Programs:
These program starts with user interaction e.g. Microwave Oven, GUIs, Camera
Events that user Does: It’s when user click the mouse button
Things the system itself Does: It’s when system automatically updating the Clock
Loops
Conditions
All Types Of Program Consist Of:
Sequence of instruction
Types Of Programming Languages:
Machine Language (Low Level Programming Language)
Assembly Language
High – level Language (High Level Programming language)
Object Oriented Language
Database Query Language
Procedural Language
Machine Language:
Consist of numbers only & 0s and 1s and this language is not close to human language &
difficult to understand by the computer user. Each type of microprocessor has its own Machine
Language; this is only a language that a computer understands easily without any translation.
WWW.VUSTUDY.COM
WWW.VUSTUDY.COM
Assembly Language:
That type of language that lay between Machine Language and High-Level Language.
High – Level Language:
In High-Level language you write code in English language. This language is user
friendly, because user can understand the code easily e.g. C++, COBOL, V.B, FORTRAN.
Object Oriented Language:
In object oriented language work is done on the object action, this language is better than
Procedural Language e.g. JAVA, C++.
Database Query Language:
In Database Query Language records are kept in tables permanently and each table is
related with each other e.g. now a days SQL is used for this purpose.
Procedural Language:
In Procedural languages program is written in a sequence e.g. COBOL, FORTRAN.
What Is Compiler?
Compiler is a program that translates the whole program from bottom to top or top to
bottom at a time. It tells you all errors in your program at a time and it is faster than an
interpreter.
What Is Interpreter?
Interpreter is also a translator that translates the program line by line. It doesn’t translate
the whole program at a time. It doesn’t tell all errors in your program but it tells you line by line
and it is slow in speed.
What Is Software Life – Cycle?
It is a sequence of phases we can say that it’s a step of new born to death.
Simple Software Life Cycle:
Concept & Feasibility (what needs to be done, what should be in it, has any scope) User
Requirements (what user want in his website, possible solution needed, lose form) Developer
Specification (how much developer make, structured form) Planning (think & plan that how to
make it) Design (comes after reading developer specification)Implementation (design
is complete now it’s time for coding) Integrating & Testing Operation & Maintenance Retirement
What is Variable?
We can say that Variables are the References of DATA like (x < 6) here x is a Variable.
What is Identifiers?
These are the names used by JavaScript to refer to Variable.
What is JavaScript Literals or JavaScript Data Types?
A data or value that appears directly in a statement and it has several types some are
Numbers (e.g. 24, -32000, 9.230)
WWW.VUSTUDY.COM
WWW.VUSTUDY.COM
String (e.g. “”, “Umer”, “Where is She”) should be matching pair or in single or double quotes.
Booleans
Undefined
Types of Operator:
Arithmetic Operators (e.g. +, -, *, /, %, ^)
Comparison Operator (e.g. a= =b, a!=b, a>b, a>=b, a<b, a<=b,)
Logical Operators (e.g. a && b, !a)
What is Array?
Array is an indexed list of elements; we can say that it is container that holds a value
What is a Pseudo Code?
Pseudo Code consists of short, English phrases used to explain specific tasks within a program's
algorithm.
What is Website Navigation?
The interface/controls that Website provide to the user for accessing the various parts of
Website.
What is Computer Network?
Computer network mean where multiple computers are connected together to share
information.
Components of Computer Network:
Computers
Network interface Cards (NIC) (NIC communicate over a network)
Hub (network traffic controller)
Cables (either electrical or optical)
Protocols (rules governing of communication over a network)
What is Hub?
Hub is a device that is used to connect several computers through a network, it has
several ports, and we can say that Hub is a network traffic controller. E.g. any computer on the
network wants to send message to other computer on the same network first send to Hub, now
Hub broadcast it to specific one.
What is Packet?
Packet is a smallest unit of data that is transmitted over a computer network. Any message that is
transferring over the network is broken into small packets and these packets travel independently
and each packet contains the following information:
Sender’s Address
Destination Address
Data
WWW.VUSTUDY.COM
WWW.VUSTUDY.COM
Error Recovery Information
Types of Computer Network According to the Network Access policy:
There are two types of computer networks according to network access policy.
Private Networks
Public Networks
Virtual Private Network
1. Private Networks: -
Organizations have many computers to connect them on the network, they usually
connect those computers via Private Network and these computers are restricted only authorized
computer access them. The purpose of these computers is to exchange the information to other
computers within the organization and to protect from the outsiders.
2. Public Networks: -
All networks that are not private are Public Networks. The communication
equipment used in these networks is generally used by the user.
3. Virtual Private Network
VPN is a secure, private network. VPN is use for public telecom infrastructure,
maintaining privacy through security procedures.
Types of Computer Networks:
There are three types of computer networks.
LAN (Local Area Network)
WAN (Wide Area Network)
MAN (Metropolitan Area Network)
LAN (Local Area Network):
Local area network is digital communication system in which you can connect a large
number of computers in a limited geographical area. Limited geographical area means less than 1
Km across.
WAN (Wide Area Network)
A wide area network is digital communication system; it connects the computer with a
great distance, typically across cities or even countries. E.g. ATM of bank
MAN (Metropolitan Area Network)
MAN is a network that interconnects user with computer resources in geographical area
or region, larger than that covered by a large LAN but the smaller than the area covered by a
WAN.
Connecting LAN to other Network:
There are some devices that connect LAN to other networks, these devices called special
purpose devices.
WWW.VUSTUDY.COM
WWW.VUSTUDY.COM
Routers
Bridges
Gateways
Modems
What is Routers?
Router is special purpose device that control the flow of data or you can say Traffic
Controller and he examines the destination to flow the information on efficient path.
What is Bridges?
Bridge is situated between 2 LAN’s means a separate connection, but similar network and
passes the information through LAN.
What is Gateways?
Gateway is more complex device than Bridge. Gateway is special purpose device that
translate between networks that are using different types of communication protocols.
What is Modem?
Modem is a special purpose device that connects two computers via Telephone line.
Modem stands for modulator or demodulator.
Modulator converts computer messages to electrical pulses (suitable) over a telephone line.
Demodulator converts electrical pulses received over telephone line into messages.
Network Topologies:
There are four types of network topologies.
Star
Ring
Bus
Point-to-Point / Peer-to-Peer
What is Star Topology?
It is designed with each node connected directly to a central network called Hub. Data on star
network passes through the Hub before continuing to its destination. If any of the local
computers fail, the remaining portion of the star network is unaffected. Multiple messages sent
simultaneously on star.
What is Ring Topology?
No server is required. In ring topology, computers are connected on a single circle of cable. It is
more reliable than the star network because communication is not dependent on a single host
computer.
What is Bus Topology?
No server is required for bus topology, in this topology the data or messages sent to one
computer to another computer directly, if any nodes goes down the rest of the network won’t
WWW.VUSTUDY.COM
WWW.VUSTUDY.COM
affected.
What is P2P Topology?
This type of topology is less expensive, have limited connectivity and used to connect
two LANs to form a WAN.
Types of Networking Protocol:
There is two types of networking protocols, these are
Ethernet protocol
Token Ring Protocol
What is Ethernet Protocol?
This type of protocol checks the shared connection before transmitting the message is it
in use or not.
What is Token Ring Protocol?
This protocol passes the special message through network called a Token. When any
computer receives the token has permission to send that packet or token to other one.
Types of Communication Channels:-
Wire (twisted pair, coaxial cable, optical fiber)
Wireless (laser, radio, cellular, satellite)
Key characteristics of these channel is Bandwidth
What is Bandwidth?
Capacity of carrying the data of communication and it is measured in bits e.g. (bps, kb/s,
Mb/s)
What is Internet?
Internet enables to share information with others from all over the world; it is very less
expensive utility and accessible to every humankind. Internet is accessible from every where of
the world and this is fastest growing technology. Internet is for public any one from any where
can access and do anything and intranet is for private, limited access.
What is TCP/IP?
TCP/IP stands for Transmission Control Protocol/Internet Protocol. TCP breaks down the
message to sent over the internet into packets, when message reached to its destination TCP
convert it to its original form.
image: http://api.ning.com/files/-FxrWMrAPziT2j-rSr-AbgyWkWsSK0XKAx3MI-qja0IJ*ZYrbeOOeoko*jKmVNpS-8FFkb9Nyg0IQqudmaMQWf69tNHpJ*qn/1123170671.jpeg?xgip=101%3A0%3A632%3A632%3B%3B&width=48&height=48&crop=1%3A1
image: http://api.ning.com/files/bR8nA-I0SJG6CIZy-G9bFxGXvn7hyT4N02K91fZsBDwSAIVAhU74oiWF5BLjEKrNuuwmyDKushBjV7-opkYm*m2jWzSgMBAS/ddd.png?size=64&crop=1%3A1
WWW.VUSTUDY.COM
WWW.VUSTUDY.COM
WWW.VUSTUDY.COM
WWW.VUSTUDY.COM
OnBlur
onReset
onSubmit
onLoad
onUnload
Anti Aliasing is another technique used for managing the “Staircase” effect.
What is Vector or Object Oriented Graphics?
These graphics are independent in resolution, and are in small size, they can be moved
easily can be starched, duplicated, deleted. E.g. (swf, svg, wmf, ps)
What is Bitmapped or Raster Graphics?
These types of graphics are difficult to move, changing the resolution may cause lose some
pixels and these graphics are heavy in size e.g. gif, jpg, bmp
Popular Formats on Web:
Gif (Graphical Interchange Format)
Jpg (Joint Photographic Experts Group)
Swf (Shockwave Flash)
What is (Artificial) Intelligent System?
AI is a system that designed to perform complex task, and might work like human brain.
What is Neural Networks?
Used to make human brain, original inspiration was brain. Now it is use as computational
tool
What is Fuzzy Logic?
Fuzzy logic is a principles of the approximate reasoning and faculty that human faced
with linguistic ambiguity.
What is In-Line JavaScript Event-Handling?
Event handlers placed in the body portion of a webpage in form of HTML tags it has
three types.
Identifier of the event handler
the equal sign
Statement is enclosed with single or double quotes.
What is Data Integrity?
Integrity refers to maintaining the correctness and consistency of the data. Integrity can
compromised in many ways like (Typing errors, Transmission errors, Bugs, Viruses)
Correctness Free from all errors
Consistency No conflicts among related data
Types of Integrity:
WWW.VUSTUDY.COM
WWW.VUSTUDY.COM
There are four types of integrity
Type Integrity (used to specify the data type e.g. credit card 12 number)
Limit Integrity (used to limiting the data to specified ranges e.g. age of person shouldn’t be -ve)
Referential Integrity (used for reference of data that exist in the database)
Physical Integrity (used for backup)
What is DBMS?
Database Management System is SW that operates a database, DBMS take care of the
storage, retrieval, and the management of the data in large sets on a database. DBMS can add,
delete, modify, make queries and produce reports and also summarize the required contents.
What is Database?
Database is a collection of data that is organized in such a fashion that the computer can quickly
search for desired data. Database consists of a collection of interrelated computer files.
What is Relational Database?
Database consists of two or more related tables called relational databases.
What is Primary Key?
Primary key is a field that uniquely identifies the record, stored in a table.
What is Queries?
Queries are used to view, change, and analyze the data; queries can combine the data of
different tables.
What is Forms?
Forms can be used for entering, editing, or viewing the data.
What is Reports?
Reports are user friendly way of presenting the data and it is very effective tool.
What is Data Mining?
Data mining is process of analyzing large database to identify the patterns.
What is Drones?
Drones are computers with weak security schemes that are used by hackers for DoS attack.
What is meant by DOS Attack?
DOS means Denying of Service.
What is Warfare?
Warfare means to disable the enemy this is the main goal of warfare and that goal can be
achieved by killing off the communication systems of the enemy army.
What is Website Spoofing?
Website spoofing is the act of creating a website, as a hoax, with the intention of misleading
readers that the website has been created by a different person or organization. The objective
may be fraudulent, often associated with Pashing or e-mail spoofing. E.g. (give credit card
WWW.VUSTUDY.COM
WWW.VUSTUDY.COM
number to online shopping Website)
What is Viruses?
Viruses itself has no value they attached with other files to make them useless.
Types of Viruses
Malicious (harmful viruses, can destroy the private data and stop to doing useful work)
Neutral (not harmful viruses, just display an annoying message)
What is semantic Web
Semantic Web’s will be designed for computers to understand meaningfully.
Q
What is the problem with Brute Force Strategy approach?
Solution:-
Doesn’t scale well with the size of the problem
Q
What is software design methodology?
Solution:-
The set of (often flexible) rules and guidelines a team of developers follow to construct
reasonably complex SW systems
Q
Brute Force Strategy approach?
Doesn’t scale well with the size of the problem
Q
What is software design methodology?
The set of (often flexible) rules and guidelines a team of developers follow to construct
SW systems. The set of (often flexible) rules and guidelines a team of developers follow to
construct.
Q
What is the name of HTML tag, that has Href attribute and What is the Purpose of Href?
Solution:-
<A HREF = “action” > label </A>
It is used to to create Links between pages, or we can used it as “mailto” function.
Q3
Write three characteristics of JavaScript.
Solution:-
(1) JavaScript has numerous operators, classified in many categories.
(2) Terminate all JavaScript statements with a semicolon. It is not always necessary, but
Highly recommended.
(3) JavaScript ignores any extra white spaces or line breaks that you put in the code
WWW.VUSTUDY.COM
WWW.VUSTUDY.COM
(4) Although JavaScript allows variable declaration, it does not require it - except in the case
Q
Give reasons why we need semantic web?
Solution:-
Whereas, today’s Web’s content is designed for humans to read; the Semantic Web’s content
will be designed for computers to understand meaningfully. However, the
Semantic Web is not a replacement but an extension of the present Web, in which info is given
well defined meaning
Q
What are the two key features of UNDO command in MS-Excel ?
Solution:-
1. Allows you to recover from your mistakes
2. Allows you to experiment without risk Question No: 27 ( Marks: 1 )
What is the Brute Force Strategy?
Answer: A strategy in which all possible combinations are examined and best among them is
selected. Brute force (also known as brute force cracking) is a trial and error method used by
application programs to decode encrypted data such as passwords or Data Encryption
Standard (DES) keys, through exhaustive effort (using brute force) rather than employing
intellectual strategies.
Question No: 28 ( Marks: 1 )
What is java script?
Answer: JavaScript is an object-oriented scripting language used to enable programmatic
access to objects within both the client application and other applications.
It is primarily used in the form of client-side JavaScript, implemented as an integrated
component of the web browser, allowing the development of enhanced user interfaces and
dynamic websites
Question No: 29 ( Marks: 2 )
How can you explain control unit?
Answer: Control unit is a computerized part of the speech processor. Most of the controls,
such as program, volume and sensitivity, are located on the control unit.
Question No: 30 ( Marks: 3 )
How a designer makes Structured Design? Answer: Structured Design: Materials and member
type, size, and configuration to carry loads
in a safe and serviceable fashion.
In general, structural design implies the engineering of stationary objects such as buildings
and bridges, or objects that may be mobile but have a rigid shape such as ship hulls and aircraft
frames tructural design involves at least five distinct phases of work, project requirements,
WWW.VUSTUDY.COM
WWW.VUSTUDY.COM
materials, structural scheme, analysis, and design It is insufficient in most cases, for the designer
to consider a solution, a design. He should evaluate several alternate designs and choose the best
in the sense of maximizing such technical objectives as efficiency, reliability, and maintainability
while satisfying such design constraints as memory size and response time.
Question No: 31 ( Marks: 5 )
What is Turing machine? Who invented it and also explain how a Turing test is conducted?
Answer: A Turing machine is a theoretical device that manipulates symbols contained on a
strip of tape. Despite its simplicity, a Turing machine can be adapted to simulate the logic of
any computer algorithm, and is particularly useful in explaining the functions of a CPU inside
of a computer. The "Turing" machine was designed by Alan Turing in 1937.
The Turing test is a proposal for a test of a machine's ability to demonstrate intelligence. It
proceeds as follows a human judge engages in a natural language conversation with one
human and one machine, each of which tries to appear human. All participants are placed in
isolated locations. If the judge cannot reliably tell the machine from the human, the machine
is said to have passed the test. In order to test the machine's intelligence rather than its ability
to render words into audio, the conversation is limited to a text-only channel such as a
computer keyboard and screen. If a computer pass the test ,we can say that a machine can think.
Question No: 32 ( Marks: 5 )
What are JavaScript literal and what are its types?
Answer: The raw data that make up the root of data types are called "literals." These are, in
effect, literally what they represent themselves to be. Numbers, strings, and Boolean values
make up the core set of literals in JavaScript. Little mystery exists with literals, but important
differences exist between them. In JavaScript, data types include strings, which are simply
quoted characters, numbers, Boolean, Objects and even a type which has no value at all, Null.
Since JavaScript is a loosely typed language, you don't necessarily need to know what type of
data every value is (although it certainly helps).
Every piece of data in these categories is known as a value. When a value is referred to
outright in a statement, it is called a literal value. For the same reason people are identified by
names as opposed to "human" or "person", literal values can be named in order to make
repeated reference to them practical, efficient and readable. These names are called variables.
Literals can be of several types. Some of them are:
Array Literals
Boolean Literals
Floating-Point Literals
Integers
Object Literals
String Literals
WWW.VUSTUDY.COM
WWW.VUSTUDY.COM
image: http://api.ning.com/files/-FxrWMrAPziT2j-rSr-AbgyWkWsSK0XKAx3MI-qja0IJ*ZYrbeOOeoko*jKmVNpS-8FFkb9Nyg0IQqudmaMQWf69tNHpJ*qn/1123170671.jpeg?xgip=101%3A0%3A632%3A632%3B%3B&width=48&height=48&crop=1%3A1
image: http://api.ning.com/files/bR8nA-I0SJG6CIZy-G9bFxGXvn7hyT4N02K91fZsBDwSAIVAhU74oiWF5BLjEKrNuuwmyDKushBjV7-opkYm*m2jWzSgMBAS/ddd.png?size=64&crop=1%3A1
WWW.VUSTUDY.COM
WWW.VUSTUDY.COM
The processor is the logic of a computer and functions comparably to a human central nervous
system, directing signals from one component to another and enabling everything to happen. A
microprocessor is made from miniaturized transistors and other circuit elements on a single
semiconductor integrated circuit (IC) . These are made up of semiconductor and silicon.
Microprocessors are composed of components which has only two states either 0 or 1. Binary
number system is also composed of these two states. Microprocessor till today only understand
the machine language and machine language is only based on binary number system. Even
today’s 64 bit microprocessors are also based on this technology.
Question No: 32 ( Marks: 5 )
Why do we need an Interactive Form in a webpage?
1. Interactive forms are used to gather user data and interact with the user.
2. Forms can be made interactive with the use of client side scripting and server
side sciprting.
3. In HTML, <FORM> </FORM> tag is used to insert the form in a web page and it
always lie in <BODY></BODY> html tag.
4. without form’s web site is only “READ ONLY”.
5. with the help of forms a user and can search the contents, place order for goods
and services.
6. Forms can be simple or very complex, based on the requirement.
7. forms can contain a single element or many e.g text area, buttons
Question No: 27 ( Marks: 1 )
What is the key feature of batch programs?
Batch files are useful for running a sequence of executables automatically
Question No: 28 ( Marks: 1 )
13. Name two languages which are used for client side scripting?
JAVASCRIPPT /NETSCAPE
What is the purpose of MODEM?
THE PURPOSE OF MODEM IS MODULATE AND DEMODULATE THE ELECTRONIC
ANALOG PULSES OF THE COMPUTER TO PULSES THE PHONE SYSTEM M CAN
HANDEL.
21. Question No: 30 ( Marks: 3 )
What is Home Page of a web site?
The pages of a website can usually be accessed from a simple Uniform
Resource Locator (URL) called the homepage. The URLs of the pages
organize them into a hierarchy, although hyper linking between them
conveys the reader's perceived site structure and guides the reader's
navigation of the sit
WWW.VUSTUDY.COM
WWW.VUSTUDY.COM
34. Question No: 32 (Marks: 5)
What is the difference between Interactive-mode and Batch-mode Application?
Software?
Batch files are useful for running a sequence of executables automatically and are often
used by system administrators to automate tedious processes while interactive mode
applications attract the attention of user this kind of applications cannot execute until
User have interest to execute and complete the process.
Question No: 27 ( Marks: 1 )
What is the key feature of object-oriented design?
ANSWER: The key feature of object-oriented design is that it treats everything as object having
Properties and methods. These objects are separately treated and designed and once designed
it can be used in any other system. So once designed can be used many times.
Question No: 28 ( Marks: 1 )
Write one purpose of using spreadsheets?
ANSWERS: Purpose of spreadsheets is that it can do calculations on data accurately.
Question No: 29 ( Marks: 2 )
List down two advantages of writing Pseudo Code
Answers: The advantages of pseudo code are:
• It is quite similar to human language so easy to understand.
• It is close to real code so easy to write real code from it.
Question No: 30 ( Marks: 3 )
How can we calculate total number of rows in the truth table?
ANSWER: The formula for calculating number of rows in truth table is 2
n
Where n = number of inputs
Question No: 31 ( Marks: 5 )
Differentiate between Vector graphics and Bit-mapped graphics.
ANSWER:
VECTOR GRAPHICS
1. Treat everything as an object
2. Is resolution independent
3. Relatively small size
4. Example: Corel Draw
BIT MAPPED IMAGES
1. Treats everything as a bit map.
2. Resolution dependent
3. Large files
4. Example: Microsoft Paint
WWW.VUSTUDY.COM
WWW.VUSTUDY.COM
Question No: 32 ( Marks: 5 )
Write differences between Shareware and trail ware software.
ANSWER:
SHAREWARE
1. These are shared freely.
2. It is given without payment ahead of
time.
TRIALWARE
1. Software is offered for a trial period.
2. When the period is expired it is no
more in use.
Question No: 31 ( Marks: 1 )
What does TCP/IP stand for?
Transmission Control Protocol
Question No: 32 ( Marks: 1 )
Why there is a need to use primary key in database?
Primary Key is a field that uniquely identifies each record stored in a table
Question No: 33 ( Marks: 2 )
What is image processing ?
Image Processing:
A branch of computer science concerned with manipulating and enhancing computer
graphics
Question No: 34 ( Marks: 2 )
Define testing with respect to programming..
Testing: The tasks performed to determine the existence of defects
Question No: 36 ( Marks: 3 )
What is difference between Design and System Architecture?
A collection of elements which working together produces a result not achieved by the things
alone System Architecture The structure (in terms of components, connections, constraints) of a
product or a process
Question No: 37 ( Marks: 3 )
Write JavaScript code to convert the number 236.2363611111556 into currency format and
JavaScript statement to show output.
a = 236.2363611111556;
b = a.toString( ) ;
decimalPos = b.indexOf( ".", 0 ) ;
c = b.substring( 0, decimalPos + 3 ) ;
document.write( c ) ;
WWW.VUSTUDY.COM
WWW.VUSTUDY.COM
Question No: 39 ( Marks: 5 )
What is a Relational Database? Give the names of any three RDBMS software. (2+3)
Relational Databases
• Databases consisting of two or more related tables are called relational databases
• A typical relational database may have anywhere from 10 to over a thousand tables
• Each column of those tables can contain only a single type of data (contrast this
with spreadsheet columns!)
• Table rows are called records; row elements are called fields
• A relational database stores all its data inside tables, and nowhere else
• All operations on data are done on those tables or those that are generated by table
operations
• Tables, tables, and nothing but tables!
RDBMS
• Relational DBMS software
• Contains facilities for creating, populating, modifying, and querying relational
databases
• Examples:
–Access
–FileMaker Pro
–SQL Server
–Oracle
Question No: 27 ( Marks: 1 )
What is the Brute Force Strategy?
Answer:. A strategy in which all possible combinations are examined and best among them is
selected. Brute force (also known as brute force cracking) is a trial and error method used by
application programs to decode encrypted data such as passwords or Data Encryption Standard
(DES) keys, through exhaustive effort (using brute force) rather than employing intellectual
strategies.
Question No: 28 (Marks: 1)
What is java script?
Answer: JavaScript is an object-oriented scripting language used to enable programmatic access
to objects within both the client application and other applications. It is primarily used in the
form of client-side JavaScript, implemented as an integrated component of the web browser,
allowing the development of enhanced user interfaces and dynamic websites
WWW.VUSTUDY.COM