Avoid __________ to ensure readability of web page
Select correct option:
Overuse of bold and italics
Use of paragraphs
Use of white space
Use of contrast colors
Deep Blue was the name of:
Select correct option:
Human
Computer
City
None of the given choices
Using ____, a user can remotely log on to a computer (connected to the user through a network, e.g. Internet) & have control over it like a local user, including control over running various programs ?
Select correct option:
FTP
TCP
Telnet Protocol
None of the given choices
Telnet Protocol
Using Telnet, a user can remotely log on to a computer (connected to the user’s through a TCP/IP
network, e.g. Internet) & have control over it like a local user, including control over running various programs In contrast, FTP allows file operations only
Typical use: Configuring and testing of a remote Web server
DoS is________ ?
Select correct option:
Crime
Cyber crime
Not a crime
A software
__________ enables users located at far-way locations to easily share information with others located all over the world.
Select correct option:
Protocol
Internet
Communication Channel
None of the given choices
Vacuum tubes were replaced by:
Select correct option:
Transistors
Electrodes
Electric Relays
None of the given choices
Cyber crime can be used to
Select correct option:
Damage a home computer
Bring down a business
Weaken the telecom, financial, or even defense-related systems of a country
All of the given
___ provides a simple, consistent way for applications to interact with the HW without having to know all the details of the HW
► Explorer.exe
► System Files
► Operating System
► Application Software
Communication protocol is a __________that governs the flow of information over a network
► Set of methods
► Set of protocols
► Set of rules
► Device
_____________ team is responsible for the maintenance, expansion , improvement of the infrastructure consisting of workstations, networking equipment, software and network security.
► Support
► Configuration Management
► Quality Assurance
► Developer
_____________ team consists on the sharpest technical minds in the company.
► Architecture
► Business Development
► Configuration Management
► Developer
_______________ is responsible for day to day operations.
► CEO
► COO
► CMSO
► Developer
Using Java Script you can write a character at random location on screen
► By applying randomCh() method
► With the help of String object
► With the help of random character property
► There is no built in approach in Java Script
The transistor is a solid state semiconductor device used for amplification and switching, and has _____ terminals.
► one
► two
► three
► four
Question No: 2 ( M a r k s: 1 ) - Please choose one
Blue Pacific is a name of _____ computer.
► Mini
► Desktop
► Micro
► Super
Question No: 3 ( M a r k s: 1 ) .
Monte Carlo algorithm is an example of
► Randomized algorithm
► Greedy algorithm
► both greedy and randomized
► Heuristics
► one
► two
► three
► four
Question No: 2 ( M a r k s: 1 ) - Please choose one
Blue Pacific is a name of _____ computer.
► Mini
► Desktop
► Micro
► Super
Question No: 3 ( M a r k s: 1 ) .
Monte Carlo algorithm is an example of
► Randomized algorithm
► Greedy algorithm
► both greedy and randomized
► Heuristics
Question No: 4 ( M a r k s: 1 ) .
A set of stand alone productivity applications designed to work together known as __
► Productivity software suites
► Compiled software
► Secure software
► Intelligent software
QUIZ-2
Question # 1 of 10 ( Start time: 05:21:25 PM ) Total M a r k s: 1
Internet is an example of ______________ network.
Select correct option:
Private
Public
Both Private and Public
None of the given choices
Question # 2 of 10 ( Start time: 05:21:53 PM ) Total M a r k s: 1
The name of first commercially available PC was:
Select correct option:
UNIVAC 1
ENIAC
EDVAC
Altair 8800
Question # 3 of 10 ( Start time: 05:22:43 PM ) Total M a r k s: 1
Algorithm is a ____________________
Select correct option:
Definition of a problem
Sequence of steps to solve a problem
Understanding of a problem
Solving a problem
Question # 4 of 10 ( Start time: 05:23:52 PM ) Total M a r k s: 1
A group of information is called __________________
Select correct option:
File
Database
Record
Field
Question # 5 of 10 ( Start time: 05:24:17 PM ) Total M a r k s: 1
___________________ is a branch f computer science concerned with manipulating and enhancing computer graphics.
Select correct option:
Image Handling
Image Processing
Image Engineering
None of these
Question # 6 of 10 ( Start time: 05:25:34 PM ) Total M a r k s: 1
__________has changed our way of life like no other technology.
Select correct option:
Computational technology
Computer technology
Computing technology
None of the Above
Question # 7 of 10 ( Start time: 05:26:27 PM ) Total M a r k s: 1
Sophisticated event handling is not possible with _______________ event handling
Select correct option:
Off-Line
In-Line
Out-Line
Non of the given choices
Question # 8 of 10 ( Start time: 05:27:03 PM ) Total M a r k s: 1
Babbage’s Analytical Engine could store information permanently in:
Select correct option:
Magnetic Tape
Floppy Disk
Punched Cards
None of the given choices
Question # 9 of 10 ( Start time: 05:28:30 PM ) Total M a r k s: 1
There are __________ popular schemes to reduce the number of bytes that are required for storing graphics.
Select correct option:
4
3
2
None of these
A number of clever schemes have been invented to reduce the number of bytes that are required for storing graphics. 2 popular ones:
Color mapping
Dithering
Question # 10 of 10 ( Start time: 05:30:01 PM ) Total M a r k s: 1
The internet-society is considered under Surveillance because:
Select correct option:
While surfing, we are being watched, constantly
Our every click is recorded and analyzed to extract patterns and behaviors
Webcams are becoming common. Providing a cheap way for parents to watch their children's every move
All of the given
Which of the following is incorrect for making design elements legible?
Select correct option:
Elements should be large enough
Elements must contrast sufficiently
Related elements should be visually grouped
Elements should have no visual focus
25.10 Making Display Elements Legible:
1. Designing (arranging) Display Elements
Elements must be large enough to be processed visually
Elements must contrast sufficiently with their backgrounds
Related elements should be visually grouped through the use of space, color, or graphical boundaries
The relative levels of importance among elements in a display should be revealed graphically
Question # 2 of 10 ( Start time: 05:03:37 PM ) Total M a r k s: 1
1. Function is also known as ______________.
Select correct option:
subprogram
procedure
subroutine
All of given
Function:
A group of statements that is put together (or defined) once and then can be used (by reference)
repeatedly on a Web page Also known as subprogram, procedure, subroutine
In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET.
Select correct option:
1973
1983
1972
None of the given choices
E-mail system has ______ component(s)
1983 - The TCP/IP protocols becomes the only set of protocols used on the ARPANET
This sets a standard for all networks, and generates the use of the term Internet as the net of nets
ARPANET splits into two nets to keep military & non-military network sites separate: ARPANET and
MILNET
Select correct option:
E-mail client
SMTP server
POP3 server
All of the given choices
_______ / / /______/ A Parallelogram (Tilted rectangle) represents the ________________ flow chart element.
Select correct option:
Process
Input or Output
Decision
Connector
Punched cards were replaced by:
Select correct option:
Floppy Disk
Zip Drives
Magnetic storage
None of the given choices
Ref:
During the 1960s, the punched card was gradually replaced as the primary means for data storage by magnetic tape, as better, more capable computers became available.
The ________virus may display an annoying, but harmless message
Select correct option:
Malicious
Neutral
Helpful
DoS
The internet communities are ___________.
Select correct option:
Geographical based
Interest based
Country based
Religion based
Question # 1 of 10 ( Start time: 04:51:32 PM ) Total M a r k s: 1
Because of spending more time on the internet, the distances among the families have been _____.
Select correct option:
Increased
Expanded
Contracted
Shortened
Question # 3 of 10 ( Start time: 04:53:30 PM ) Total M a r k s: 1
Autonomous Web Agents are also known as _________________
Select correct option:
Mobile Agents
Softbots
Both "Mobile Agents" & "Softbots"
None of these
A communication protocol is a __________that governs the flow of information over a network.
Select correct option:
Set of Methods
Set of Protocols
Set of rules
None of the given choices
Protocol
–Rules governing communications over the network
By default in a web page Hyper Link for another web page is represented as:
Select correct option:
Blue only
Black and Underlined
Blue and Bold
Blue and Underlined
The organizations are learning that business can be done in a more effective manner if emphasis is placed upon ______________.
Select correct option:
Cooperation
Shared responsibility
Networking
All of the given
Question # 7 of 10 ( Start time: 04:57:19 PM ) Total M a r k s: 1
Monitor is an example of __________devices
Select correct option:
Output
Input
Processing
None of the given choices
The code in the ________ portion is the right choice for developing larger JavaScript scripts
Select correct option:
Body
At End
Head
Separate
____________________ based on the principles of the logical reasoning ability of humans.
Select correct option:
Genetic Algorithms
Rule-based Systems
Feed-Forward Network
None of these
Rulebased Systems (1):
Based on the principles of the logical reasoning ability of humans
The key benefit of VPNs over conventional PNs is:
Select correct option:
Security
Efficiency
Lower Cost
None of the given choices
In __________________ automatic machines perform various tasks that were previously performed by humans.
Select correct option:
Fuzzy Logic
Robotics
Rule based Systems
None of these
QUIZ-3
__________% of the users have left websites in frustration due to poor navigation. ► 40
► 62
► 83
► 91
In JavaScript, a variable declaration is
► Optional
► Mandatory
► Not allowed
► None of the given
A protocol used for receiving email messages is called ____________.
► 62
► 83
► 91
In JavaScript, a variable declaration is
► Optional
► Mandatory
► Not allowed
► None of the given
A protocol used for receiving email messages is called ____________.
► URL
► Telnet
► POP3
► SMTP
which one is correct?
► onUnload
► onUnLoad
► onUNLOAD
► All of the above
Visit This Group:http://solvedmcqs.blogspot.com
► Telnet
► POP3
► SMTP
which one is correct?
► onUnload
► onUnLoad
► onUNLOAD
► All of the above
Visit This Group:http://solvedmcqs.blogspot.com
Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called __________.
► Loop
► Sequence
► Condition
► Array
Variables allow us to manipulate data through the ___________.
► Actual Value
► Reference
► Length
► Name
Fuzzy logic is based on ____________.
► Ground facts
► Experience
► Practice
► Approximation
Word Processor is a _________________
► System Software
► Application Software
► Device
► Utility
In the old days, databases did NOT support ____________.
► Application Software
► Device
► Utility
In the old days, databases did NOT support ____________.
► Number
► Boolean
► Video
► Text
In tabular storage, fields placed in a particular row are strongly ___________.
► Independent
► Dependent
► Interrelated
► Inconsistent
http://solvedmcqs.blogspot.com
Due to working at home, lack of interaction may result in ___________ professional growth.
► Slower
► Faster
► Higher
► Improved
Distance learning has got a boost due to the ___________.
► Easy communication
► Online interactive contents
► Flexibility
► All of the given options
_____________ technique can be used to create smooth animations or to display one of several images based on the requirement.
► Image downloading
► Image preloading
► Image uploading
► Image postloading
► Tree structured organizational model
► Network paradigm
► Hierarchical structure
► None of the given options
The group of technologies concerned with the capturing, processing and transmission of information in the digital electronic form is called
_____________.
► Telecom Engineering
► Computer Engineering
► Computer Science
► Information Technology
A large number of networks interconnected physically is called ______
► LAN
► MAN
► Internet
► Network collection
Visit This Group:http://solvedmcqs.blogspot.com
TCP stands for ________.
► Transfer Center protocol
► Transmission Control Protocol
► Transmission Center Protocol
► Telephone Center Protocol
http://solvedmcqs.blogspot.com
► Transfer Center protocol
► Transmission Control Protocol
► Transmission Center Protocol
► Telephone Center Protocol
http://solvedmcqs.blogspot.com
A collection of data organized in such a way that the computer can quickly search for a desired data item is known as :
► Retrieving
► Database
► Information
► DBMS
______ is simply a fast port that lets you connect computer peripherals and consumer electronics to your computer without restart.
► Freeware
► Shareware
► Firewire
► Firmware
Structures, in which another list starts before the first list is finished, are called:
► Multiple Lists
► Nested Lists
► Ordered Lists
► Un-ordered Lists
The key property of the ‘Array’ object in JavaScript is
► Value
► Length
► Name
► All of the given choices
Which one is the example of spreadsheet software ?
► MS Word
► MS PowerPoint
► MS Excel
► MS Access
Visit This Group:http://solvedmcqs.blogspot.com
The Encryption of data is related to
► Data updates
► Data security ► Data integrity
► Data accessibility
_____ is the process of analyzing large databases to identify patterns.
► Data normalization
► Data management
► Data Mining
► None of the given options
Which is the user-friendly way of presenting data ?
► Query
► Form
► Report
► All of the given options
JavaScript function fixed() has equivalent HTML tag-set ____
► <.FIX>……………</FIX>
► <F>………………..</F>
► <PRE>………….</PRE> ► <H>………………..</H>
http://solvedmcqs.blogspot.com
<form> Tags always placed between the <BODY> and </BODY> tags of a Web page
► True
► False
Java script has ----------------- ability to create and draw graphics.
► Limited
► Versatile
► Medium
► Not at all
QUIZ-4
Which of the following is incorrect for making design elements legible?
Select correct option:
Elements should be large enough
Elements must contrast sufficiently
Related elements should be visually grouped
Elements should have no visual focus
1. Function is also known as ______________.
Select correct option:
subprogram
procedure
subroutine
All of given
In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET.
Select correct option:
1973
1983
1972
None of the given choices
E-mail system has ______ component(s)
Select correct option:
E-mail client
SMTP server
POP3 server
All of the given choices
_______ / / /______/ A Parallelogram (Tilted rectangle) represents the ________________ flow chart element.
Select correct option:
Process
Input or Output
Decision
Connector
If a computer could pass the Turing test then it would be able to:
Select correct option:
win a million dollar prize
think like human begins
think but slower than humans
do the things faster
Punched cards were replaced by:
Select correct option:
Floppy Disk
Zip Drives
Magnetic storage
None of the given choices
The ________virus may display an annoying, but harmless message
Select correct option:
Malicious
Neutral
Helpful
DoS
The name of very first computer was:
Select correct option:
ABC
BCD
EDC
None of the given choices
The internet communities are ___________.
Select correct option:
Geographical based
Interest based
Country based
Religion based
QUIZ-5
An algorithm that always takes the best immediate or local solution while finding an answer is called____.
► Deterministic Algorithm
► Non deterministic Algorithm
► Greedy Algorithm
► Randomized Algorithm
Which of the following command allows you to recover form mistakes in MS Word?
► Clear
► Edit
► Undo
► Break
A ____________ operating system allows many users to take advantage of the computer's resources, simultaneously
► Single user
► Multi- user
► Single tasking
► Multi tasking
Network Interface Card is an __________ device
► Input
► Output
► Input/Output
► Storage
The decimal equivalent of binary 1000 is
► 7
► 8
► 9
► 10
Which of the following is NOT RDBMS software?
► My Sql
► MS Excel
► Oracle
► SQL Server
A computer virus is a
► Software that saves the computer from being damaged.
► Application software that helps to make different type of viruses and worms
► Program that spreads itself and destroys other program
► Program that corrects the problems in your computer
What will be the result of a?
a = Math.abs(-23)
► 23
► -23
► 23.0
► 2.3
A Special program required to view swf (Shockwave Flash) files in web Browser is called
► TFlash
► Vflash
► plug-in
► None of the given options
Using Java Script you can write a character at random location on screen
► By applying randomCh() method
► With the help of String object
► With the help of random character property
► There is no built in approach in Java Script
If incorrectly we enter the negative age it is check by
► Limit Integrity
► Type Integrity
► Referential Integrity
► Physical Integrity
Which protocol is use to transfer a file over the network?
► UDP
► FTP
► TCP
► OSI
One can send an email message to a remote computer using _______ protocol
► HTTP
► SMTP
► FTP
► TELNET
In a System having many parts to be designed, one should always do the _____ first
► Hard part
► Simple part
► Development part
► Quality part
Flow control constructs in JavaScript includes:
► If-Else
► Loops and If -Else
► Switch and If-Else
► All of the given choices
___ provides a simple, consistent way for applications to interact with the HW without having to know all the details of the HW
► Explorer.exe
► System Files
► Operating System
► Application Software
Machine language is also called
► Assembly Language
► Binary Language
► High Level Language
► HTML Language
_________ is the best known builder for supercomputers.
► Sun
► Cray Research
► Microsoft
► Apple
The weaknesses of the computer are:
► Pattern recognition & Storage
► Speed & Innovative ideas
► Pattern recognition & Innovative ideas
► Speed & Storage
Communication protocol is a __________that governs the flow of information over a network
► Set of methods
► Set of protocols
► Set of rules
► Device
_____________ team is responsible for the maintenance, expansion , improvement of the infrastructure consisting of workstations, networking equipment, software and network security.
► Support
► Configuration Management
► Quality Assurance
► Developer
_____________ team consists on the sharpest technical minds in the company.
► Architecture
► Business Development
► Configuration Management
► Developer
_______________ is responsible for day to day operations.
► CEO
► COO
► CMSO
► Developer
One of the key responsibilities of the ___________ is client relationship management.
► Project Manager
► Team Lead
► Developer
► Quality Assurance Engineer
What is the major problem with flash based website?
► Its two heavy
► Cannot be indexed
► Less attractive
► Inaccessible
Which of the following is NOT an event handler for image object?
► onAbort
► onError
► onLoad
► onUser
The organizations are learning that business can be done in a more effective manner if emphasis is placed upon ___________.
► Cooperation
► Shared responsibility
► Networking
► All of the given options
a = Math.abs(-23)
What will be the value of a ?
► 23
► -23
► 23.0
► 2.3
ERP is a type of __________________ .
► Entertainment software
► Productivity software
► Business software
► Scientific software
In Genetic Algorithm the most important thing you should know, is the ___________.
► Procedure
► Recognition of a good solution
► Different techniques
► None of the given options
According to a popular heuristic, success is defined by ___________.
► The user
► The builder
► Both user and builder
► None of the given options
Rule of thumb learned through trial and error is called ___________.
► Design
► Heuristic
► Plan
► Aim
JavaScript Variables are ____________.
► Dynamically Typed
► Statically Typed
► Strong Typed
► None of the given options
Which of the following application are collections of cells?
► Word
► Excel
► PowerPoint
► Outlook Express
The browser breaks down the URL into ________ parts.
► 2
► 3
► 4
► 5
A named collection of properties (data, state) and methods (instruction, behavior) is called ____________.
► Array
► Function
► Variable
► Object
First computer network was ___________.
► NSFNET
► FIRSTNET
► ARPANET
► ORPHANET
In JavaScript, a variable declaration is
► Optional
► Mandatory
► Not allowed
► None of the given
A protocol used for receiving email messages is called ____________.
► Optional
► Mandatory
► Not allowed
► None of the given
A protocol used for receiving email messages is called ____________.
► URL
► Telnet
► POP3
► SMTP
which one is correct?
► onUnload
► onUnLoad
► onUNLOAD
► All of the above
Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called __________.
► Telnet
► POP3
► SMTP
which one is correct?
► onUnload
► onUnLoad
► onUNLOAD
► All of the above
Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called __________.
► Loop
► Sequence
► Condition
► Array
Variables allow us to manipulate data through the ___________.
► Actual Value
► Reference
► Length
► Name
Fuzzy logic is based on ____________.
► Ground facts
► Experience
► Practice
► Approximation
http://solvedmcqs.blogspot.com
Word Processor is a _________________
► System Software
► Application Software
► Device
► Utility
In the old days, databases did NOT support ____________.
► Application Software
► Device
► Utility
In the old days, databases did NOT support ____________.
► Number
► Boolean
► Video
► Text
In tabular storage, fields placed in a particular row are strongly ___________.
► Boolean
► Video
► Text
In tabular storage, fields placed in a particular row are strongly ___________.
► Independent
► Dependent
► Interrelated
► Inconsistent
Due to working at home, lack of interaction may result in ___________ professional growth.
► Slower
► Faster
► Higher
► Improved
Distance learning has got a boost due to the ___________.
► Easy communication
► Online interactive contents
► Flexibility
► All of the given options
_____________ technique can be used to create smooth animations or to display one of several images based on the requirement.
► Image downloading
► Image preloading
► Image uploading
► Image postloading
The ____________ is becoming the preferred organizational structure for more and more organizations with the passage of time.
► Tree structured organizational model
► Network paradigm
► Hierarchical structure
► None of the given options
The group of technologies concerned with the capturing, processing and transmission of information in the digital electronic form is called
_____________.
► Telecom Engineering
► Computer Engineering
► Computer Science
► Information Technology
A large number of networks interconnected physically is called ______
► LAN
► MAN
► Internet
► Network collection
TCP stands for ________.
► Transfer Center protocol
► Transmission Control Protocol
► Transmission Center Protocol
► Telephone Center Protocol
A collection of data organized in such a way that the computer can quickly search for a desired data item is known as :
► Retrieving
► Database
► Information
► DBMS
http://solvedmcqs.blogspot.com
______ is simply a fast port that lets you connect computer peripherals and consumer electronics to your computer without restart.
► Freeware
► Shareware
► Firewire
► Firmware
Structures, in which another list starts before the first list is finished, are called:
► Multiple Lists
► Nested Lists
► Ordered Lists
► Un-ordered Lists
http://solvedmcqs.blogspot.com
The key property of the ‘Array’ object in JavaScript is
► Value
► Length
► Name
► All of the given choices
Which one is the example of spreadsheet software ?
► MS Word
► MS PowerPoint
► MS Excel
► MS Access
The Encryption of data is related to
► Data updates
► Data security
► Data integrity
► Data accessibility
_____ is the process of analyzing large databases to identify patterns.
► Data normalization
► Data management
► Data Mining
► None of the given options
Which is the user-friendly way of presenting data ?
► Query
► Form
► Report
► All of the given options
<form> Tags always placed between the <BODY> and </BODY> tags of a Web page
► True
► False
Java script has ----------------- ability to create and draw graphics.
► Limited
► Versatile
► Medium
► Not at all
Which of the following is incorrect for making design elements legible?
Select correct option:
Elements should be large enough
Elements must contrast sufficiently
Related elements should be visually grouped
Elements should have no visual focus
Function is also known as ______________.
Select correct option:
subprogram
procedure
subroutine
All of given
In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET.
Select correct option:
1973
1983
1972
None of the given choices
E-mail system has ______ component(s)
Select correct option:
E-mail client
SMTP server
POP3 server
All of the given choices
_______ / / /______/ A Parallelogram (Tilted rectangle) represents the ________________ flow chart element.
Select correct option:
Process
Input or Output
Decision
Connector
If a computer could pass the Turing test then it would be able to:
Select correct option:
win a million dollar prize
think like human begins
think but slower than humans
do the things faster
Punched cards were replaced by:
Select correct option:
Floppy Disk
Zip Drives
Magnetic storage
None of the given choices
The ________virus may display an annoying, but harmless message
Select correct option:
Malicious
Neutral
Helpful
DoS
The name of very first computer was:
Select correct option:
ABC
BCD
EDC
None of the given choices
The internet communities are ___________.
Select correct option:
Geographical based
Interest based
Country based
Religion based
which one is correct?
► onUnload
► onUnLoad
► onUNLOAD
► All of the above
Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called __________.
► onUnload
► onUnLoad
► onUNLOAD
► All of the above
Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called __________.
► Loop
► Sequence
► Condition
► Array
Variables allow us to manipulate data through the ___________.
► Actual Value
► Reference
► Length
► Name
Fuzzy logic is based on ____________.
► Ground facts
► Experience
► Practice
► Approximation
Word Processor is a _________________
► System Software
► Application Software
► Device
► Utility
In the old days, databases did NOT support ____________.
► Application Software
► Device
► Utility
In the old days, databases did NOT support ____________.
► Number
► Boolean
► Video
► Text
In tabular storage, fields placed in a particular row are strongly ___________.
► Independent
► Dependent
► Interrelated
► Inconsistent
Due to working at home, lack of interaction may result in ___________ professional growth.
► Slower
► Faster
► Higher
► Improved
Distance learning has got a boost due to the ___________.
► Easy communication
► Online interactive contents
► Flexibility
► All of the given options
_____________ technique can be used to create smooth animations or to display one of several images based on the requirement.
► Image downloading
► Image preloading
► Image uploading
► Image postloading
The ____________ is becoming the preferred organizational structure for more and more organizations with the passage of time.
► Tree structured organizational model
► Network paradigm
► Hierarchical structure
► None of the given options
The group of technologies concerned with the capturing, processing and transmission of information in the digital electronic form is called
_____________.
► Telecom Engineering
► Computer Engineering
► Computer Science
► Information Technology
A large number of networks interconnected physically is called ______
► LAN
► MAN
► Internet
► Network collection
TCP stands for ________.
► Transfer Center protocol
► Transmission Control Protocol
► Transmission Center Protocol
► Telephone Center Protocol
A collection of data organized in such a way that the computer can quickly search for a desired data item is known as :
► Retrieving
► Database
► Information
► DBMS
http://solvedmcqs.blogspot.com
______ is simply a fast port that lets you connect computer peripherals and consumer electronics to your computer without restart.
► Freeware
► Shareware
► Firewire
► Firmware
Structures, in which another list starts before the first list is finished, are called:
► Multiple Lists
► Nested Lists
► Ordered Lists
► Un-ordered Lists
The key property of the ‘Array’ object in JavaScript is
► Value
► Length
► Name
► All of the given choices
Which one is the example of spreadsheet software ?
► MS Word
► MS PowerPoint
► MS Excel
► MS Access
_____ is the process of analyzing large databases to identify patterns.
► Data normalization
► Data management
► Data Mining
► None of the given options
Which is the user-friendly way of presenting data ?
► Query
► Form
► Report
► All of the given options
JavaScript function fixed() has equivalent HTML tag-set ____
► <.FIX>……………</FIX>
► <F>………………..</F>
► <PRE>………….</PRE>
► <H>………………..</H>
<form> Tags always placed between the <BODY> and </BODY> tags of a Web page
► True
► False
Java script has ----------------- ability to create and draw graphics.
► Limited
► Versatile
► Medium
► Not at all
Internet is an example of ______________ network.
Private
Public
Both Private and Public
None of the given choices
The name of first commercially available PC was:
UNIVAC 1
ENIAC
EDVAC
Altair 8800
Algorithm is a ____________________
Definition of a problem
Sequence of steps to solve a problem
Understanding of a problem
Solving a problem
A group of information is called __________________
File
Database
Record
Field
___________________ is a branch of computer science concerned with manipulating and enhancing computer graphics.
Image Handling
Image Processing
Image Engineering
None of these
__________has changed our way of life like no other technology.
Computational technology
Computer technology
Computing technology
None of the Above
Sophisticated event handling is not possible with _______________ event handling
Off-Line
In-Line
Out-Line
Non of the given choices
Babbage’s Analytical Engine could store information permanently in:
Magnetic Tape
Floppy Disk
Punched Cards
None of the given choices
There are __________ popular schemes to reduce the number of bytes that are required for storing graphics.
4
3
2
None of these
The internet-society is considered under Surveillance because:
While surfing, we are being watched, constantly
Our every click is recorded and analyzed to extract patterns and behaviors
Webcams are becoming common. Providing a cheap way for parents to watch their children's every move
All of the given
URL is a/an ________
► Device
► Component
► Address
► Tool
To improve the time for scanning a web page, text should be ___________.
► Centered
► Left Aligned
► Right Aligned
► Staggered
Communications on the internet is controlled by a set of two protocols which are ____________.
► IMAP and SMTP
► FTP and HTTP
► TCP and IP
► TCP and HTTP
FTP stands for __________.
► File transmission protocol
► File transmission path
► File transfer protocol
► Fine transfer path
A named collection of properties (data, state) and methods (instruction, behavior) is called ____________.
► Array
► Function
► Variable
► Object
Anchor tag denoted by <A> is used to create
► Address
► Hyperlink
► Paragraph
► Title
<UL> tag is used to
► underline text
► end the line
► create ordered list
► create unordered list
A user may access any item on the web through __________.
► URL
► Telnet
► POP
► SMTP
The browser breaks down the URL into ________ parts.
► 2
► 3
► 4
► 5
Which one of the following is NOT a primary color?
► Red
► Green
► Yellow
► Blue
According to a popular heuristic, success is defined by ___________.
► The user
► The builder
► Both user and builder
► None of the given options
The idea of Neural Networks field is based upon ______________.
► Human nature
► Human brain
► Human culture
► Human actions
ERP is a type of __________________ .
► Entertainment software
► Productivity software
► Business software
► Scientific software
__________ are those programs in which the flow of the program is determined by the user's actions (mouse clicks, key presses) or messages from other programs.
► Event called programs
► Event processed programs
► Event driven programs
► Event declared programs
Automatic machines performing various tasks that were previously done by humans, are called ____________.
► Robotics
► Computers
► Decision Making Systems
► Autonomous Web Agents
country=”Hello Pakistan”;
document.write(country.charAt(6));
The out put of the above statement is _____________.
► o
► P
► a
► k
The distance among families is ___________ because of spending more time on internet.
► Increased
► Expanded
► Contracted
► Decreased
The software used for the scanning of internet severs, is called __________.
► Wscan
► Mscan
► Sscan
► Vscan
Adding images to html page, we use___________ tag.
► <IMG>
► <IMAGE>
► <PICTURE>
► <PIC>
The group of technologies concerned with the capturing, processing and transmission of information in the digital electronic form is called _____________.
► Telecom Engineering
► Computer Engineering
► Computer Science
► Information Technology
The responsibilities of the Team Lead includes_____________.
► Planning and tracking of the project
► Detailed design
► Professional development of team members
► All of the given options
When the packets reach at destination, __________ reassembles them into original message.
► Protocol
► TCP
► IP
► NIC
Many developers write the _________ first and then incrementally convert each line into _________.
► Real code & Pseudo code
► Pseudo code & Real code
► Real code & Artificial code
► None of the given options
Machine language is also called
► Assembly Language
► Binary Language
► High Level Language
► HTML Language
In JavaScript, second element of an array has the index:
► 2
► 0
► 1
► 3
Each element in an array is given an index, which is an integer value between 0 and one less than the length of the array. The first element has an index of 0, the second element has an index of 1, and so on.
One can download or upload files to a remote computer using ________ protocol.
► HTTP
► SMTP
► FTP
► TELNET
JavaScript ________ support drawing of graphics
► Does
► Does not
► Always
► At times
Which of the following is NOT true about modern computers?
► More powerful
► Smaller in size
► Consume less energy
► Costly
Ada written a computer programme for ?
► Analytical Engine
► Difference Engine
► Harvard Mark 1
► Mechanical engine
A set of stand alone productivity applications designed to work together known as ______________ .
► Productivity software suites
► Compiled software
► Secure software
► Intelligent software
Because of spending more time on the internet, the distances among the families have been _____.
Increased
Expanded
Contracted
Shortened
Sophisticated event handling is not possible with _______________ event handling
Off-Line
In-Line
Out-Line
Non of the given choices
Autonomous Web Agents are also known as _________________
Mobile Agents
Softbots
Both "Mobile Agents" & "Softbots"
None of these
A communication protocol is a __________that governs the flow of information over a network.
Set of Methods
Set of Protocols
Set of rules
None of the given choices
By default in a web page Hyper Link for another web page is represented as:
Blue only
Black and Underlined
Blue and Bold
Blue and Underlined
The organizations are learning that business can be done in a more effective manner if emphasis is placed upon ______________.
Cooperation
Shared responsibility
Networking
All of the given
Monitor is an example of __________devices
Output
Input
Processing
None of the given choices
The code in the ________ portion is the right choice for developing larger JavaScript scripts
Body
At End
Head
Separate
____________________ based on the principles of the logical reasoning ability of humans.
Genetic Algorithms
Rule-based Systems
Feed-Forward Network
None of these
The key benefit of VPNs over conventional PNs is:
Security
Efficiency
Lower Cost
None of the given choices
Post a Comment