Introduction to Computing.


Avoid __________ to ensure readability of web page 
Select correct option: 

Overuse of bold and italics
Use of paragraphs
Use of white space
Use of contrast colors


Deep Blue was the name of: 
Select correct option: 

Human
Computer
City
None of the given choices



Using ____, a user can remotely log on to a computer (connected to the user through a network, e.g. Internet) & have control over it like a local user, including control over running various programs ? 
Select correct option: 

FTP
TCP
Telnet Protocol
None of the given choices







Telnet Protocol


Using Telnet, a user can remotely log on to a computer (connected to the user’s through a TCP/IP
network, e.g. Internet) & have control over it like a local user, including control over running various programs In contrast, FTP allows file operations only
Typical use: Configuring and testing of a remote Web server


DoS is________ ? 
Select correct option: 

Crime
Cyber crime
Not a crime
A software

__________ enables users located at far-way locations to easily share information with others located all over the world. 
Select correct option: 

Protocol
Internet
Communication Channel
None of the given choices


Vacuum tubes were replaced by: 
Select correct option: 

Transistors
Electrodes
Electric Relays
None of the given choices


Cyber crime can be used to 
Select correct option: 

Damage a home computer
Bring down a business
Weaken the telecom, financial, or even defense-related systems of a country
All of the given

___ provides a simple, consistent way for applications to interact with the HW without having to know all the details of the HW
       ► Explorer.exe
       ► System Files
       ► Operating System
       ► Application Software

 Communication protocol is a __________that governs the flow of information over a network
       ► Set of methods
       ► Set of protocols
       ► Set of rules
       ► Device
_____________ team is responsible for the maintenance, expansion , improvement of the infrastructure consisting of workstations, networking equipment, software and network security.
       ► Support
       ► Configuration Management
       ► Quality Assurance
       ► Developer
_____________ team consists on the sharpest technical minds in the company.
       ► Architecture
       ► Business Development
       ► Configuration Management
       ► Developer

 _______________ is responsible for day to day operations.
       ► CEO
       ► COO
       ► CMSO
       ► Developer


 Using Java Script you can write a character at random location on screen
       ► By applying randomCh() method
       ► With the help of String object
       ► With the help of random character property
       ► There is no built in approach in Java Script


 The transistor is a solid state semiconductor device used for amplification and switching, and has _____ terminals.
► one
► two
► three
► four

Question No: 2 ( M a r k s: 1 ) - Please choose one
Blue Pacific is a name of _____ computer.
► Mini
► Desktop
► Micro
► Super

Question No: 3 ( M a r k s: 1 ) .
Monte Carlo algorithm is an example of
► Randomized algorithm

► Greedy algorithm

► both greedy and randomized

► Heuristics 




Question No: 4 ( M a r k s: 1 ) .
A set of stand alone productivity applications designed to work together known as __

► Productivity software suites

► Compiled software

► Secure software

► Intelligent software 

QUIZ-2

Question # 1 of 10 ( Start time: 05:21:25 PM )  Total M a r k s: 1 
Internet is an example of ______________ network. 
Select correct option: 
 Private
Public
Both Private and Public
None of the given choices

Question # 2 of 10 ( Start time: 05:21:53 PM )  Total M a r k s: 1 
The name of first commercially available PC was: 
Select correct option: 

UNIVAC 1
ENIAC
EDVAC
Altair 8800

Question # 3 of 10 ( Start time: 05:22:43 PM )  Total M a r k s: 1 
Algorithm is a ____________________ 
Select correct option: 

Definition of a problem
Sequence of steps to solve a problem
Understanding of a problem
Solving a problem


Question # 4 of 10 ( Start time: 05:23:52 PM )  Total M a r k s: 1 
A group of information is called __________________ 
Select correct option: 

File
Database
Record
Field





Question # 5 of 10 ( Start time: 05:24:17 PM )  Total M a r k s: 1 
___________________ is a branch f computer science concerned with manipulating and enhancing computer graphics. 
Select correct option: 

Image Handling
Image Processing
Image Engineering
None of these
Question # 6 of 10 ( Start time: 05:25:34 PM )  Total M a r k s: 1 
__________has changed our way of life like no other technology. 
Select correct option: 

Computational technology
Computer technology
Computing technology
None of the Above

Question # 7 of 10 ( Start time: 05:26:27 PM )  Total M a r k s: 1 
Sophisticated event handling is not possible with _______________ event handling 
Select correct option: 

Off-Line
In-Line
Out-Line
Non of the given choices

Question # 8 of 10 ( Start time: 05:27:03 PM )  Total M a r k s: 1 
Babbage’s Analytical Engine could store information permanently in: 
Select correct option: 

Magnetic Tape
Floppy Disk
Punched Cards
None of the given choices


Question # 9 of 10 ( Start time: 05:28:30 PM )  Total M a r k s: 1 
There are __________ popular schemes to reduce the number of bytes that are required for storing graphics. 
Select correct option: 

4
2 
None of these 


A number of clever schemes have been invented to reduce the number of bytes that are required for storing graphics. 2 popular ones:
Color mapping
Dithering


Question # 10 of 10 ( Start time: 05:30:01 PM )  Total M a r k s: 1 
The internet-society is considered under Surveillance because: 
Select correct option: 


While surfing, we are being watched, constantly
Our every click is recorded and analyzed to extract patterns and behaviors
Webcams are becoming common. Providing a cheap way for parents to watch their children's every move
All of the given

Which of the following is incorrect for making design elements legible?
Select correct option:
Elements should be large enough
Elements must contrast sufficiently
Related elements should be visually grouped
Elements should have no visual focus



25.10 Making Display Elements Legible:

1. Designing (arranging) Display Elements
Elements must be large enough to be processed visually
Elements must contrast sufficiently with their backgrounds
Related elements should be visually grouped through the use of space, color, or graphical boundaries
The relative levels of importance among elements in a display should be revealed graphically

Question # 2 of 10 ( Start time: 05:03:37 PM ) Total M a r k s: 1
1. Function is also known as ______________.
Select correct option:
subprogram
procedure
subroutine
All of given


Function:
A group of statements that is put together (or defined) once and then can be used (by reference)
repeatedly on a Web page Also known as subprogram, procedure, subroutine



In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET.
Select correct option:
1973
1983
1972
None of the given choices



E-mail system has ______ component(s)
1983 - The TCP/IP protocols becomes the only set of protocols used on the ARPANET
This sets a standard for all networks, and generates the use of the term Internet as the net of nets
ARPANET splits into two nets to keep military & non-military network sites separate: ARPANET and
MILNET

Select correct option:
E-mail client
SMTP server
POP3 server
All of the given choices


  _______ / / /______/ A Parallelogram (Tilted rectangle) represents the ________________ flow chart element.
Select correct option:
Process
Input or Output
Decision
Connector


Punched cards were replaced by:
Select correct option:
Floppy Disk
Zip Drives
Magnetic storage
None of the given choices


Ref:

 During the 1960s, the punched card was gradually replaced as the primary means for data storage by magnetic tape, as better, more capable computers became available.


The ________virus may display an annoying, but harmless message
Select correct option:
Malicious
Neutral
Helpful
DoS

The internet communities are ___________.
Select correct option:
Geographical based
Interest based
Country based
Religion based

Question # 1  of 10 ( Start time: 04:51:32 PM  )  Total M a r k s:  1
Because of spending more time on the internet, the distances among the families have been _____.
Select correct option:
Increased
Expanded
Contracted
Shortened


Question # 3  of 10 ( Start time: 04:53:30 PM  )  Total M a r k s:  1
Autonomous Web Agents are also known as _________________
Select correct option:
Mobile Agents
Softbots
Both "Mobile Agents" & "Softbots"
None of these



A communication protocol is a __________that governs the flow of information over a network.
Select correct option:
Set of Methods
Set of Protocols
Set of rules
None of the given choices
  



Protocol
–Rules governing communications over the network

By default in a web page Hyper Link for another web page is represented as:

Select correct option:
Blue only
Black and Underlined
Blue and Bold
Blue and Underlined

The organizations are learning that business can be done in a more effective manner if emphasis is placed upon ______________.
Select correct option:
Cooperation
Shared responsibility
Networking
All of the given

Question # 7  of 10 ( Start time: 04:57:19 PM  )  Total M a r k s:  1
Monitor is an example of __________devices
Select correct option:
Output
Input
Processing
None of the given choices

The code in the ________ portion is the right choice for developing larger JavaScript scripts
Select correct option:
Body
At End
Head
Separate
____________________ based on the principles of the logical reasoning ability of humans.
Select correct option:
Genetic Algorithms
Rule-based Systems
Feed-Forward Network
None of these


Rulebased Systems (1):
Based on the principles of the logical reasoning ability of humans



The key benefit of VPNs over conventional PNs is:
Select correct option:
Security
Efficiency
Lower Cost
None of the given choices
In __________________ automatic machines perform various tasks that were previously performed by humans.
Select correct option:
Fuzzy Logic
Robotics
Rule based Systems
None of these







QUIZ-3

__________% of the users have left websites in frustration due to poor navigation. ► 40
 ► 62
► 83
► 91

In JavaScript, a variable declaration is
 
► Optional
► Mandatory
► Not allowed
► None of the given

A protocol used for receiving email messages is called ____________.
► URL
► Telnet
► POP3
► SMTP

which one is correct?
 
► onUnload

► onUnLoad
Your browser may not support display of this image.
► onUNLOAD

► All of the above
 Visit This Group:
http://solvedmcqs.blogspot.com


Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called __________. 




► Loop
► Sequence
► Condition
► Array 

Variables allow us to manipulate data through the ___________. 




► 
Actual Value
► Reference
► Length
► Name

Fuzzy logic is based on ____________. 




► Ground facts
► Experience
► Practice
► Approximation

Word Processor is a _________________



► System Software
► Application Software
► Device
► Utility

In the old days, databases did NOT support ____________. 




► 
Number
► Boolean
► Video
► Text

In tabular storage, fields placed in a particular row are strongly ___________. 



► 
Independent
► Dependent
► Interrelated
► Inconsistent
 
http://solvedmcqs.blogspot.com

Due to working at home, lack of interaction may result in ___________ professional growth. 




► Slower
Your browser may not support display of this image.► Faster
► Higher
► Improved

Distance learning has got a boost due to the ___________.
► 
Easy communication
► Online interactive contents
► Flexibility
► All of the given options

_____________ technique can be used to create smooth animations or to display one of several images based on the requirement. 




► 
Image downloading
► Image preloading
► Image uploading
► Image postloading





► 
Tree structured organizational model
► Network paradigm
► Hierarchical structure
► None of the given options

The group of technologies concerned with the capturing, processing and transmission of information in the digital electronic form is called



_____________. 




► Telecom Engineering
► Computer Engineering
► Computer Science
► Information Technology

A large number of networks interconnected physically is called ______ 




► 
LAN
► MAN
► Internet
► Network collection
  






TCP stands for ________.

► 
Transfer Center protocol
► Transmission Control Protocol
► Transmission Center Protocol
► Telephone Center Protocol
 
http://solvedmcqs.blogspot.com

A collection of data organized in such a way that the computer can quickly search for a desired data item is known as :
► 
Retrieving
► Database
► Information
Your browser may not support display of this image.► DBMS

______ is simply a fast port that lets you connect computer peripherals and consumer electronics to your computer without restart. 




► 
Freeware
► Shareware
► Firewire
► Firmware

Structures, in which another list starts before the first list is finished, are called: 




► Multiple Lists
► Nested Lists
► Ordered Lists
► Un-ordered Lists

The key property of the ‘Array’ object in JavaScript is 




► 
Value
► Length
► Name
► All of the given choices

Which one is the example of spreadsheet software ? 




► MS Word
► MS PowerPoint
► MS Excel
► MS Access
  







The Encryption of data is related to 




► 
Data updates
► Data security ► Data integrity
► Data accessibility

_____ is the process of analyzing large databases to identify patterns. 




► 
Data normalization
► Data management
► Data Mining
► None of the given options

Which is the user-friendly way of presenting data ? 




► 
Query
► Form
► Report
Your browser may not support display of this image.► All of the given options

JavaScript function fixed() has equivalent HTML tag-set ____ 



► <.FIX>……………</FIX>
► <F>………………..</F>
► <PRE>………….</PRE> ► <H>………………..</H>
 
http://solvedmcqs.blogspot.com

<form> Tags always placed between the <BODY> and </BODY> tags of a Web page 



► True
► False 

Java script has ----------------- ability to create and draw graphics.
 
► Limited
► Versatile
► Medium
 ► Not at all 



QUIZ-4

 Which of the following is incorrect for making design elements legible?

Select correct option:


Elements should be large enough
Elements must contrast sufficiently
Related elements should be visually grouped

Elements should have no visual focus



1. Function is also known as ______________.

Select correct option:



subprogram
procedure
subroutine
All of given



In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET.


Select correct option:
1973

1983
1972
None of the given choices





E-mail system has ______ component(s)

Select correct option:
E-mail client
SMTP server
POP3 server

All of the given choices



_______ / / /______/ A Parallelogram (Tilted rectangle) represents the ________________ flow chart element.

Select correct option:
Process

Input or Output
Decision
Connector

 If a computer could pass the Turing test then it would be able to:

Select correct option:


win a million dollar prize

think like human begins
think but slower than humans
do the things faster



Punched cards were replaced by:

Select correct option:


Floppy Disk
Zip Drives
Magnetic storage
None of the given choices





The ________virus may display an annoying, but harmless message

Select correct option:


Malicious

Neutral
Helpful
DoS



The name of very first computer was:

Select correct option:
ABC
BCD
EDC
None of the given choices


The internet communities are ___________.

Select correct option:


Geographical based
Interest based
Country based
Religion based


QUIZ-5


An algorithm that always takes the best immediate or local solution while finding an answer is called____.



►   Deterministic Algorithm
►   Non deterministic Algorithm
►   Greedy Algorithm
►   Randomized Algorithm



Which of the following command allows you to recover form mistakes in MS Word?



►   Clear
              ►   Edit
►   Undo
►   Break





A ____________ operating system allows many users to take advantage of the computer's resources, simultaneously

          ►   Single user
►   Multi- user
►   Single tasking
►   Multi tasking



Network Interface Card is an __________ device
►   Input
►   Output
►   Input/Output
►   Storage



The decimal equivalent of binary 1000 is
►   7
►   8
►   9
►   10


Which of the following is NOT RDBMS software?

►   My Sql
►   MS Excel
►   Oracle
►   SQL Server



A computer virus is a
►   Software that saves the computer from being damaged.
►   Application software that helps to make different type of viruses and worms
►   Program that spreads itself and destroys other program
►   Program that corrects the problems in your computer










What will be the result of a?


a = Math.abs(-23)



► 23
► -23
► 23.0
► 2.3


A Special program required to view swf (Shockwave Flash) files in web Browser is called





 ►   TFlash


►   Vflash


►   plug-in


►   None of the given options



 Using Java Script you can write a character at random location on screen

       ► By applying randomCh() method
       ► With the help of String object
       ► With the help of random character property
       ► There is no built in approach in Java Script
   


 If incorrectly we enter the negative age it is check by

       ► Limit Integrity
       ► Type Integrity
       ► Referential Integrity
       ► Physical Integrity
   


  Which protocol is use to transfer a file over the network?



       ► UDP
       ► FTP
       ► TCP
       ► OSI
   


 One can send an email message to a remote computer using _______ protocol

       ► HTTP
       ► SMTP
       ► FTP
       ► TELNET


 In a System having many parts to be designed, one should always do the _____ first

       ► Hard part
       ► Simple part
       ► Development part
       ► Quality part
   


 Flow control constructs in JavaScript includes:



       ► If-Else
       ► Loops and If -Else
       ► Switch and If-Else
       ► All of the given choices
   


 ___ provides a simple, consistent way for applications to interact with the HW without having to know all the details of the HW



       ► Explorer.exe
       ► System Files
       ► Operating System
       ► Application Software
   


 Machine language is also called



       ► Assembly Language
       ► Binary Language
       ► High Level Language
       ► HTML Language
   


 _________ is the best known builder for supercomputers.



       ► Sun
       ► Cray Research
       ► Microsoft
       ► Apple


 The weaknesses of the computer are:



       ► Pattern recognition & Storage
       ► Speed & Innovative ideas


       ► Pattern recognition & Innovative ideas
       ► Speed & Storage
   


 Communication protocol is a __________that governs the flow of information over a network

       ► Set of methods
       ► Set of protocols
       ► Set of rules
       ► Device
   


 _____________ team is responsible for the maintenance, expansion , improvement of the infrastructure consisting of workstations, networking equipment, software and network security.

       ► Support
       ► Configuration Management
       ► Quality Assurance
       ► Developer


 _____________ team consists on the sharpest technical minds in the company.



       ► Architecture
       ► Business Development
       ► Configuration Management
       ► Developer
   


 _______________ is responsible for day to day operations.



       ► CEO
       ► COO
       ► CMSO
       ► Developer


 One of the key responsibilities of the ___________ is client relationship management.



       ► Project Manager
       ► Team Lead
       ► Developer
       ► Quality Assurance Engineer
   


 What is the major problem with flash based website?

       ► Its two heavy
       ► Cannot be indexed
       ► Less attractive
       ► Inaccessible
   


 Which of the following is NOT an event handler for image object?



       ► onAbort
       ► onError
       ► onLoad
       ► onUser
   


 The organizations are learning that business can be done in a more effective manner if emphasis is placed upon ___________.

       ► Cooperation
       ► Shared responsibility
       ► Networking
       ► All of the given options





a = Math.abs(-23)


What will be the value of a ?



       ► 23
       ► -23
       ► 23.0
       ► 2.3
   


 ERP is a type of __________________ .
       ► Entertainment software
       ► Productivity software
       ► Business software
       ► Scientific software
   


In Genetic Algorithm the most important thing you should know, is the ___________.

       ► Procedure
       ► Recognition of a good solution
       ► Different techniques
       ► None of the given options
   


 According to a popular heuristic, success is defined by ___________.



       ► The user
       ► The builder
       ► Both user and builder
       ► None of the given options


 Rule of thumb learned through trial and error is called ___________.



       ► Design
       ► Heuristic
       ► Plan
       ► Aim
   


 JavaScript Variables are ____________.





       ► Dynamically Typed
       ► Statically Typed
       ► Strong Typed
       ► None of the given options
   


 Which of the following application are collections of cells?

       ► Word
       ► Excel
       ► PowerPoint
       ► Outlook Express


 The browser breaks down the URL into ________ parts.

       ► 2
       ► 3
       ► 4
       ► 5
   


 A named collection of properties (data, state) and methods (instruction, behavior) is called ____________.



       ► Array
       ► Function
       ► Variable
       ► Object
   


 First computer network was ___________.



       ► NSFNET
       ► FIRSTNET
       ► ARPANET
       ► ORPHANET
   
 In JavaScript, a variable declaration is
 
► Optional
► Mandatory
► Not allowed
► None of the given

A protocol used for receiving email messages is called ____________.


► URL
► Telnet
► POP3
► SMTP

which one is correct?
 
► onUnload


► onUnLoad
Your browser may not support display of this image.
► onUNLOAD

► All of the above


Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called __________. 



► Loop

► Sequence
► Condition
► Array 

Variables allow us to manipulate data through the ___________. 



► 
Actual Value

► Reference
► Length
► Name

Fuzzy logic is based on ____________. 

► Ground facts
► Experience
► Practice
► Approximation
  
http://solvedmcqs.blogspot.com
 
Word Processor is a _________________



► System Software
► Application Software
► Device
► Utility

In the old days, databases did NOT support ____________. 

► Number
► Boolean
► Video
► Text

In tabular storage, fields placed in a particular row are strongly ___________. 




► 
Independent

► Dependent
► Interrelated
► Inconsistent

Due to working at home, lack of interaction may result in ___________ professional growth. 



► Slower

Your browser may not support display of this image.► Faster
► Higher
► Improved

Distance learning has got a boost due to the ___________.
► 
Easy communication

► Online interactive contents
► Flexibility
► All of the given options

_____________ technique can be used to create smooth animations or to display one of several images based on the requirement. 



► 
Image downloading

► Image preloading
► Image uploading
► Image postloading

The ____________ is becoming the preferred organizational structure for more and more organizations with the passage of time.



► 
Tree structured organizational model

► Network paradigm
► Hierarchical structure
► None of the given options

The group of technologies concerned with the capturing, processing and transmission of information in the digital electronic form is called


_____________. 



► Telecom Engineering

► Computer Engineering
► Computer Science
► Information Technology

A large number of networks interconnected physically is called ______ 

► 
LAN
► MAN
► Internet
► Network collection

TCP stands for ________.

► 
Transfer Center protocol
► Transmission Control Protocol
► Transmission Center Protocol
► Telephone Center Protocol

A collection of data organized in such a way that the computer can quickly search for a desired data item is known as :
► 
Retrieving
► Database
► Information
Your browser may not support display of this image.► DBMS
 
http://solvedmcqs.blogspot.com


______ is simply a fast port that lets you connect computer peripherals and consumer electronics to your computer without restart. 



► 
Freeware

► Shareware
► Firewire
► Firmware

Structures, in which another list starts before the first list is finished, are called: 

► Multiple Lists
► Nested Lists
► Ordered Lists
► Un-ordered Lists
  
http://solvedmcqs.blogspot.com

The key property of the ‘Array’ object in JavaScript is 




► 
Value

► Length
► Name
► All of the given choices

Which one is the example of spreadsheet software ? 



► MS Word

► MS PowerPoint
► MS Excel
► MS Access

The Encryption of data is related to 



► 
Data updates

► Data security
► Data integrity
► Data accessibility

_____ is the process of analyzing large databases to identify patterns. 



► 
Data normalization

► Data management
► Data Mining
► None of the given options

Which is the user-friendly way of presenting data ? 

► 
Query
► Form
► Report
Your browser may not support display of this image.► All of the given options

<form> Tags always placed between the <BODY> and </BODY> tags of a Web page 

► True
► False 

Java script has ----------------- ability to create and draw graphics.
 
► Limited
► Versatile
► Medium
 ► Not at all 



 Which of the following is incorrect for making design elements legible?

Select correct option:



Elements should be large enough


Elements must contrast sufficiently


Related elements should be visually grouped

Elements should have no visual focus



 Function is also known as ______________.

Select correct option:


subprogram

procedure


subroutine


All of given




In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET.



Select correct option:


1973

1983

1972


None of the given choices




E-mail system has ______ component(s)

Select correct option:




E-mail client


SMTP server


POP3 server

All of the given choices



_______ / / /______/ A Parallelogram (Tilted rectangle) represents the ________________ flow chart element.

Select correct option:

Process

Input or Output

Decision


Connector


 If a computer could pass the Turing test then it would be able to:

Select correct option:

win a million dollar prize

think like human begins

think but slower than humans


do the things faster




Punched cards were replaced by:

Select correct option:



Floppy Disk


Zip Drives

Magnetic storage

None of the given choices





The ________virus may display an annoying, but harmless message

Select correct option:



Malicious

Neutral

Helpful


DoS




The name of very first computer was:

Select correct option:




ABC


BCD


EDC

None of the given choices




The internet communities are ___________.

Select correct option:



Geographical based

Interest based

Country based


Religion based





which one is correct?
 
► onUnload

► onUnLoad
Your browser may not support display of this image.
► onUNLOAD

► All of the above


Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called __________. 


► Loop
► Sequence
► Condition
► Array 

Variables allow us to manipulate data through the ___________. 


► 
Actual Value
► Reference
► Length
► Name

Fuzzy logic is based on ____________. 


► Ground facts
► Experience
► Practice
► Approximation

Word Processor is a _________________

► System Software
► Application Software
► Device
► Utility

In the old days, databases did NOT support ____________. 


► 
Number
► Boolean
► Video
► Text

In tabular storage, fields placed in a particular row are strongly ___________. 


► 
Independent
► Dependent
► Interrelated
► Inconsistent

Due to working at home, lack of interaction may result in ___________ professional growth. 


► Slower
Your browser may not support display of this image.► Faster
► Higher
► Improved

Distance learning has got a boost due to the ___________.
► 
Easy communication
► Online interactive contents
► Flexibility
► All of the given options

_____________ technique can be used to create smooth animations or to display one of several images based on the requirement. 


► 
Image downloading
► Image preloading
► Image uploading
► Image postloading

The ____________ is becoming the preferred organizational structure for more and more organizations with the passage of time.


► 
Tree structured organizational model
► Network paradigm
► Hierarchical structure
► None of the given options

The group of technologies concerned with the capturing, processing and transmission of information in the digital electronic form is called

_____________. 


► Telecom Engineering
► Computer Engineering
► Computer Science
► Information Technology

A large number of networks interconnected physically is called ______ 

► 
LAN
► MAN
► Internet
► Network collection

TCP stands for ________.

► 
Transfer Center protocol
► Transmission Control Protocol
► Transmission Center Protocol
► Telephone Center Protocol

A collection of data organized in such a way that the computer can quickly search for a desired data item is known as :
► 
Retrieving
► Database
► Information
Your browser may not support display of this image.► DBMS
 



 http://solvedmcqs.blogspot.com

 
______ is simply a fast port that lets you connect computer peripherals and consumer electronics to your computer without restart. 




► 
Freeware

► Shareware
► Firewire
► Firmware

Structures, in which another list starts before the first list is finished, are called: 



► Multiple Lists

► Nested Lists
► Ordered Lists
► Un-ordered Lists

The key property of the ‘Array’ object in JavaScript is 



► 
Value

► Length
► Name
► All of the given choices

Which one is the example of spreadsheet software ? 



► MS Word

► MS PowerPoint
► MS Excel
► MS Access
 



_____ is the process of analyzing large databases to identify patterns. 



► 
Data normalization

► Data management
► Data Mining
► None of the given options

Which is the user-friendly way of presenting data ? 



► 
Query

► Form
► Report
Your browser may not support display of this image.► All of the given options

JavaScript function fixed() has equivalent HTML tag-set ____ 



► <.FIX>……………</FIX>

► <F>………………..</F>
► <PRE>………….</PRE>
► <H>………………..</H>

<form> Tags always placed between the <BODY> and </BODY> tags of a Web page 

► True
► False 

Java script has ----------------- ability to create and draw graphics.
 
► Limited
► Versatile
► Medium
 ► Not at all


Internet is an example of ______________ network. 







Private


Public


Both Private and Public




None of the given choices









The name of first commercially available PC was: 





UNIVAC 1


ENIAC




EDVAC




Altair 8800









Algorithm is a ____________________ 







Definition of a problem


Sequence of steps to solve a problem


Understanding of a problem




Solving a problem







A group of information is called __________________ 







File




Database


Record


Field









___________________ is a branch of computer science concerned with manipulating and enhancing computer graphics. 







Image Handling


Image Processing


Image Engineering




None of these









__________has changed our way of life like no other technology. 







Computational technology


Computer technology


Computing technology




None of the Above









Sophisticated event handling is not possible with _______________ event handling 







Off-Line


In-Line


Out-Line




Non of the given choices







Babbage’s Analytical Engine could store information permanently in: 





Magnetic Tape




Floppy Disk


Punched Cards


None of the given choices









There are __________ popular schemes to reduce the number of bytes that are required for storing graphics. 







4








2 




None of these 









The internet-society is considered under Surveillance because: 







While surfing, we are being watched, constantly




Our every click is recorded and analyzed to extract patterns and behaviors




Webcams are becoming common. Providing a cheap way for parents to watch their children's every move




All of the given







  




URL is a/an ________


       ► Device




       ► Component




       ► Address


       ► Tool




   




To improve the time for scanning a web page, text should be ___________.


       ► Centered




       ► Left Aligned




       ► Right Aligned




       ► Staggered







Communications on the internet is controlled by a set of two protocols which are ____________.


       ► IMAP and SMTP









       ► FTP and HTTP









       ► TCP and IP







       ► TCP and HTTP









FTP stands for __________.


       ► File transmission protocol




       ► File transmission path




       ► File transfer protocol


       ► Fine transfer path




   




A named collection of properties (data, state) and methods (instruction, behavior) is called ____________.


       ► Array




       ► Function




       ► Variable




       ► Object


   




Anchor tag denoted by <A> is used to create 


       ► Address




       ► Hyperlink




       ► Paragraph


       ► Title




   




<UL> tag is used to


       ► underline text




       ► end the line




       ► create ordered list




       ► create unordered list


   




A user may access any item on the web through __________.


       ► URL


       ► Telnet




       ► POP




       ► SMTP




   




The browser breaks down the URL into ________ parts.


       ► 2




       ► 3


       ► 4




       ► 5




   




Which one of the following is NOT a primary color?


       ► Red




       ► Green




       ► Yellow


       ► Blue




   




According to a popular heuristic, success is defined by ___________.


       ► The user


       ► The builder




       ► Both user and builder




       ► None of the given options




   




The idea of Neural Networks field is based upon ______________.


       ► Human nature




       ► Human brain


       ► Human culture




       ► Human actions




   


ERP is a type of __________________ .
       ► Entertainment software
       ► Productivity software
       ► Business software
       ► Scientific software


   




__________ are those programs in which the flow of the program is determined by the user's actions (mouse clicks, key presses) or messages from other programs.





       ► Event called programs




       ► Event processed programs




       ► Event driven programs


       ► Event declared programs




   




Automatic machines performing various tasks that were previously done by humans, are called ____________.







       ► Robotics


       ► Computers




       ► Decision Making Systems




       ► Autonomous Web Agents




   




country=”Hello Pakistan”;


document.write(country.charAt(6));





The out put of the above statement is _____________.


       ► o




       ► P


       ► a




       ► k




   




The distance among families is ___________ because of spending more time on internet.







       ► Increased


       ► Expanded




       ► Contracted




       ► Decreased




   


The software used for the scanning of internet severs, is called __________.







       ► Wscan




       ► Mscan




       ► Sscan


       ► Vscan




    




Adding images to html page, we use___________ tag.







       ► <IMG>


       ► <IMAGE>




       ► <PICTURE>




       ► <PIC>




   




The group of technologies concerned with the capturing, processing and transmission of information in the digital electronic form is called _____________.







       ► Telecom Engineering




       ► Computer Engineering




       ► Computer Science




       ► Information Technology


   




The responsibilities of the Team Lead includes_____________.







       ► Planning and tracking of the project




       ► Detailed design




       ► Professional development of team members




       ► All of the given options


   




When the packets reach at destination, __________ reassembles them into original message.







       ► Protocol




       ► TCP


       ► IP




       ► NIC




   




Many developers write the _________ first and then incrementally convert each line into _________.







       ► Real code & Pseudo code


       ► Pseudo code & Real code


       ► Real code & Artificial code




       ► None of the given options




   


Machine language is also called







       ► Assembly Language




       ► Binary Language




       ► High Level Language


       ► HTML Language




   




In JavaScript, second element of an array has the index:







       ► 2




       ► 0




       ► 1


       ► 3




    Each element in an array is given an index, which is an integer value between 0 and one less than the length of the array. The first element has an index of 0, the second element has an index of 1, and so on.







One can download or upload files to a remote computer using ________ protocol.





       ► HTTP




       ► SMTP




       ► FTP


       ► TELNET




   




JavaScript ________ support drawing of graphics





       ► Does




       ► Does not


       ► Always




       ► At times




 Which of the following is NOT true about modern computers?





       ► More powerful




       ► Smaller in size




       ► Consume less energy




       ► Costly


   




Ada written a computer programme for ?







       ► Analytical Engine









       ► Difference Engine







       ► Harvard Mark 1







       ► Mechanical engine







   


A set of stand alone productivity applications designed to work together known as ______________ .





       ► Productivity software suites







       ► Compiled software









       ► Secure software









       ► Intelligent software




Because of spending more time on the internet, the distances among the families have been _____.





Increased


Expanded




Contracted




Shortened









Sophisticated event handling is not possible with _______________ event handling







Off-Line


In-Line


Out-Line




Non of the given choices




Autonomous Web Agents are also known as _________________







Mobile Agents




Softbots


Both "Mobile Agents" & "Softbots"


None of these









A communication protocol is a __________that governs the flow of information over a network.









Set of Methods




Set of Protocols


Set of rules


None of the given choices









By default in a web page Hyper Link for another web page is represented as:





Blue only




Black and Underlined




Blue and Bold


Blue and Underlined







The organizations are learning that business can be done in a more effective manner if emphasis is placed upon ______________.







Cooperation




Shared responsibility




Networking


All of the given







Monitor is an example of __________devices
Output


Input




Processing




None of the given choices









The code in the ________ portion is the right choice for developing larger JavaScript scripts







Body




At End


Head


Separate









____________________ based on the principles of the logical reasoning ability of humans.







Genetic Algorithms


Rule-based Systems


Feed-Forward Network




None of these









The key benefit of VPNs over conventional PNs is:







Security




Efficiency


Lower Cost
None of the given choices




Post a Comment

Previous Post Next Post