CS 101 Final Notes
CS 101 Final Notes
23. Which representation technique of algorithm is more suitable for developer to make actual
code_________.
► Pseudo code ► flow chart ► both pseudo code and flow chart ► Heuristics
24. _____________ is used to terminate all JavaScript statements.
► Colon ► Semicolon ► Underscore ►
Apostrophe
25. In java script cookies can be created for future use_____.
► Easily ► No facility at all
► This is not possible without Java language. ► Cookies are files so java script cannot handle it.
26. When the microprocessor desires to look at a piece of data, it checks in the __________ first.
► RAM ► ROM ► hard disk ► cache
27. Using Java Script you can write a character at random location on screen
► By applying random Ch () method ► With the help of String object
► With the help of random character property ► There is no built in approach in Java Script
28. If incorrectly we enter the negative age it is check by
► Limit Integrity ► Type Integrity ► Referential Integrity ► Physical Integrity
29. The Encryption of data is related to
► Data updates ► Data security ► Data integrity ► Data accessibility
30. Which protocol is use to transfer a file over the network?
► UDP ► FTP ► TCP ► OSI
31. One can send an email message to a remote computer using _______ protocol
► HTTP ► SMTP ► FTP ► TELNET
32. In a System having many parts to be designed, one should always do the _____ first
► Hard part ► Simple part ► Development part ► Quality part
33. Flow control constructs in JavaScript includes:
► If-Else ► Loops and If -Else ► Switch and If-Else ► All of the given choices
34. ___ provides a simple, consistent way for applications to interact with the HW without having to know
all the details of the HW
► Explorer.exe ► System Files ► Operating System ►Application Software
35. Machine language is also called
► Assembly Language ► Binary Language ► High Level Language ► HTML Language
36. _________ is the best known builder for supercomputers.
► Sun ► Cray Research ► Microsoft ► Apple
37. The weaknesses of the computer are:
► Pattern recognition & Storage ► Speed & Innovative ideas
► Pattern recognition & Innovative ideas ► Speed & Storage
38. Communication protocol is a __________that governs the flow of information over a network
► Set of methods ► Set of protocols ► Set of rules ► Device
39. _____________ team is responsible for the maintenance, expansion, improvement of the infrastructure
consisting of workstations, networking equipment, software and network security.
► Support ► Configuration Management ► Quality Assurance ► Developer
40. _____________ team consists on the sharpest technical minds in the company.
► Architecture ► Business Development ► Configuration Management ► Developer
41. _______________ is responsible for day to day operations.
► CEO ► COO ► CMSO ► Developer
42. One of the key responsibilities of the ___________ is client relationship management.
► Project Manager ► Team Lead ► Developer ► Quality Assurance
Engineer
43. What is the major problem with flash based website?
► Its two heavy ► cannot be indexed ► Less attractive ► Inaccessible
44. Which of the following is NOT an event handler for image object?
► onAbort ► onError ► onLoad ► onUser
3
45. The organizations are learning that business can be done in a more effective manner if emphasis is
placed upon ___________.
► Cooperation ► Shared responsibility ► Networking ► All of the given options
46. It represents the _____________ flow chart element.
► Flow Line ► Connector ► Off-page connector ► Start or Stop
47. What is NOT a key factor while designing a website?
► Usability ► User-friendly ► Consistency ► Complexity
48. __________% of the users have left websites in frustration due to poor navigation.
► 40 ► 62 ► 83 ► 91
49. In JavaScript, a variable declaration is
► Optional ► Mandatory ► Not allowed ► None of the given
50. A protocol used for receiving email messages is called ____________.
► URL ► Telnet ► POP3 ► SMTP
51. Which is correct?
► onUnload ► onUnLoad ► onUNLOAD ► All of the above
52. Serial arrangement in which things follow logical order or a recurrent pattern, such as statements
executing one by one, is called __________.
► Loop ► Sequence ► Condition ► Array
53. Variables allow us to manipulate data through the ___________.
► Actual Value ► Reference ► Length ► Name
54. Fuzzy logic is based on ____________.
► Ground facts ► Experience ► Practice ► Approximation
55. Word Processor is a _________________
► System Software ► Application Software ► Device ► Utility
56. In the old days, databases did NOT support ____________.
► Number ► Boolean ► Video ► Text
57. In tabular storage, fields placed in a particular row are strongly ___________.
► Independent ► Dependent ► Interrelated ► Inconsistent
58. Due to working at home, lack of interaction may result in ___________ professional growth.
► Slower ► Faster ► Higher ► Improved
59. Distance learning has got a boost due to the ___________.
► Easy communication ► Online interactive contents ► Flexibility ► All of the given options
60. _____________ technique can be used to create smooth animations or to display one of several images
based on the requirement.
► Image downloading ► Image preloading ► Image uploading ► Image post loading
61. The ____________ is becoming the preferred organizational structure for more and more organizations
with the passage of time.
►Tree structured organizational model ► Network paradigm
► Hierarchical structure ► None of the given options
62. The group of technologies concerned with the capturing, processing and transmission of information in
the digital electronic form is called _____________.
► Telecom Engineering ► Computer Engineering
► Computer Science ► Information Technology
63. A large number of networks interconnected physically are called ______
► LAN ► MAN ► Internet ► Network collection
64. TCP stands for ________. ► Transfer Center protocol
► Transmission Control Protocol ► Transmission Center Protocol ► Telephone Center Protocol
65. A collection of data organized in such a way that the computer can quickly search for a desired data
item is known as:
► Retrieving ► Database ► Information ► DBMS
66. ______ is simply a fast port that lets you connect computer peripherals and consumer electronics to
your computer without restart.
► Freeware ► Shareware ► Firewire ► Firmware
4
67. Structures, in which another list starts before the first list is finished, are called:
► Multiple Lists ► Nested Lists ► Ordered Lists ► Un-ordered Lists
68. The key property of the ‘Array’ object in JavaScript is
► Value ► Length ► Name ► All of the given choices
69. Which one is the example of spreadsheet software?
► MS Word ► MS PowerPoint ► MS Excel ► MS Access
70. The Encryption of data is related to
► Data updates ► Data security ► Data integrity ► Data accessibility
71. _____ is the process of analyzing large databases to identify patterns.
► Data normalization ► Data management ► Data Mining ► None of the given
72. Which is the user-friendly way of presenting data?
► Query ► Form ► Report ► All of the given options
73. JavaScript function fixed () has equivalent HTML tag-set ____
►<FIX> ……………</ FIX> ►<F> ……………</ F>
►<PRE> ……………</ PRE> ►<H> ……………</ H>
74. Tags always placed between the <BODY> and </BODY> tags of a Web page.
► True ► False
75. Java script has ----------------- ability to create and draw graphics.
► Limited ► Versatile ► Medium ► Not at all
76. When actions depends upon the values of multiple variables we ll use -----?
►if ►else ►if----else ►none
77. When the exact number of iterations is known use the ----loop?
►for ►if ►while ►none
78. When the number of iteration depends upon a condition being met use the ------ loop
►for ►switch ►while ►none
79. The key property of ‘’array ‘’object is -----------?
►length ►width ►single ►none
80. Two of the key ‘’array ‘’methods are reverse ()-sort()
►true ►false
81. 6-javascript array are -------?
►multiple ►heterogeneous ►homogenous ►none
82. ------multiple computer that are connected together to share information and other resources.
►network ►internets ►compnetworks ►none
83. Comp networks can send an email message to a remote comp using the ---- protocol?
►HTTP ►FTP ►SMTP ►none
84. Comp network can browse documents residing on a remote comp using -------?
►HTTP ►FTP ►SMTP ►none
85. Comp networks can download and upload files to a remote comp using ------?
►HTTP ►FTP ►SMTP ►none
86. Network can run a program on remote comp using the ------------?
►SMTP ►TELNET ►HTTP ►none
87. Components of conventional computer networks are except one?
►VPN ►NIC ►computers ►hub
88. NIC stands for ------------?
►national internet cables ►national interface cards
►network interface cards ►none
89. Cables are either------------?
►electrical ►digital ►optical ►-1 and 2
90. Hub component of comp network is ------------?
►I/O device ►traffic controller ►network traffic controller ►none
91. Optical cables are required by wireless networks
►true ►false
5
185- A user may access any item on the web through __________.
► URL ► Telnet ► POP ► SMTP
186- In JavaScript, a variable declaration is
► Optional ► Mandatory ► Not allowed ► None of the given
187- According to a popular heuristic, success is defined by ___________.
► The user ► The builder ► Both user and builder ► None of the given
options
188- To store rounded number of 8.6 in a variable called "r_number", we write _____________.
► r_numbers=Maths.rounds(8.6) ► r_number=Math.rounds(8.6)
► r_number=Math.round(8.6) ► r_number=Maths.round(8.6)
189- random() function returns a randomly-selected, floating-point number between ____________.
► 0 and 1 ► 0 and 10 ► 0 and -10 ► 0 and -1
190- Trinoo is a __________ software.
► DoS ► Scanning ► Utility ► None of the given options
191- Which attribute of the IMG tag tells us about the source of the image ____________.
► source ► path ► loc ► src
192- The developer report to ___________ in a development team.
► Team Lead ► Project Manager ► CEO ► IT Manager
193 The effective way not to only write programs but also it works properly and further more to
minimize the time and the development cost of the program is called___________________
► Programming Mechanism ► Programming Methodology
► Programming Synchronization ► None of the given options
194- When we buy a software package, we do not really buy it, we just by a license that allows us to use
it, the ___________stays with the maker.
► Agreement ► Ownership ► Membership ► Software
195- Many developers write the _________ first and then incrementally convert each line into
_________. ► Real code & Pseudo code ► Pseudo code & Real code
► Real code & Artificial code ► None of the given options
196- Collection of facts & figures is called ____________.
► Information ► Data ► Entity ► Attribute
197- A collection of data organized in such a way that the computer can quickly search for a desired
data item is known as :
► Retrieving ► Database ► Information ► DBMS
198- Using COLSPAN, number of rows of the current cell should extend itself
► Upward ► Downward ► Both Upward and Downward ► None of the given
choices 199- Compound Statement after decision constructs in JavaScript is enclosed with
►() ►[] ► { }; ►{}
200-Users __________, how things work.
► Analyze in detail ► Muddle through ► Figure out ► Read in detail
201- Writing a response, multiple statements are separated from each other with the help of
► Period ( . ) ► Comma ( , ) ► Colon ( : ) ► Semicolon ( ; )
202 - With the passage of time the field of Computing and Telecommunication is _____________.
► Diverging ► Converging ► Becoming different ► Becoming unique
203- When we have to show value as part of a whole picture, which type of chart is used.
► Bar chart ► Pie chart ► Line graph ► None of the given
204- ______________ software directly interacts with the user.
► Application software ► System software ► Anonymous software ► Interactive software
205- In partitioning of program/module, it should be assured that partitioned chunks should be as
_________ as possible.
► Dependent ► Independent ► Complex ► All of the above
206- The memory size of the Altair 8800 was
► 128 bytes ► 128 Kilo bytes ► 256 Kilo bytes ► 256 bytes
207- A named collection of properties (data, state) and methods (instruction, behavior) is called ______.
10