FINALTERM EXAMINATION
Spring 2010
CS101- Introduction to Computing (Session - 3)
Ref No: 1344120
Time: 90 min
Marks: 58
Student Info | |
StudentID: | |
Center: | OPKST |
ExamDate: | 07 Aug 2010 |
For Teacher's Use Only |
Q No. | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | Total |
Marks | | | | | | | | | |
Q No. | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | |
Marks | | | | | | | | | |
Q No. | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | |
Marks | | | | | | | | | |
Q No. | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | |
Marks | | | | | | | | | |
Q No. | 33 | 34 | 35 | 36 | | | | | |
Marks | | | | | | | | | |
Question No: 1 ( Marks: 1 ) - Please choose one
Analytical Engine is ------------------
► An electrical machine
► A digital machine
► An analog machine
► A special purpose machine
Question No: 2 ( Marks: 1 ) - Please choose one
__________% of the users have left websites in frustration due to poor navigation.
► 40
► 62
► 83
► 91
Question No: 3 ( Marks: 1 ) - Please choose one
__________ breaks down the message to be sent over the internet into packets.
► FTP
► HTTP
► TCP
► IP
Question No: 4 ( Marks: 1 ) - Please choose one
The first spread sheet was called as_____________.
► Excel
► PowerPoint
► Word
► VisiCalc
Question No: 5 ( Marks: 1 ) - Please choose one
Which is correct?
► onUnload
► onUnLoad
► onUNLOAD
► All of the above
Question No: 6 ( Marks: 1 ) - Please choose one
Variables allow us to manipulate data through the ___________.
► Actual Value
► Reference
► Length
► Name
Question No: 7 ( Marks: 1 ) - Please choose one
We use ___________ to stop Break-Ins.
► Scanners
► Intrusion detectors
► Utilities
► None of the given options
Question No: 8 ( Marks: 1 ) - Please choose one
Which attribute of the IMG tag tells us about the source of the image ____________.
► source
► path
► loc
► src
Question No: 9 ( Marks: 1 ) - Please choose one
The developer report to ___________ in a development team.
► Team Lead
► Project Manager
► CEO
► IT Manager
Question No: 10 ( Marks: 1 ) - Please choose one
The key responsibilities of the architect of the project is______________.
► Technology selection
► High-level design
► Makes certain that the implementation remains true to the design
► All of the given options
Question No: 11 ( Marks: 1 ) - Please choose one
Using smart editors they can automatically color different parts of statements in different colors e.g. HTML tags in ____________ color.
► Green
► Grey
► Blue
► None of the given options
Question No: 12 ( Marks: 1 ) - Please choose one
_______ is responsible for all the essential operations like basic house keeping, task scheduling, etc. Also contains low-level HW interfaces
► Hardware
► Device Manager
► Kernel
► Device Driver
Question No: 13 ( Marks: 1 ) - Please choose one
Randomized algorithms are often ________ than deterministic algorithms for the same problem.
► Simpler and more slow
► Simpler and more efficient
► Complex and more efficient
► Complex and more slow
Question No: 14 ( Marks: 1 ) - Please choose one
Compound Statement after decision constructs in JavaScript is enclosed with
► ( )
► [ ]
► { };
► { }
Question No: 15 ( Marks: 1 ) - Please choose one
The key property of the ‘Array’ object in JavaScript is
► Value
► Length
► Name
► All of the given choices
Question No: 16 ( Marks: 1 ) - Please choose one
Which protocol is used to send email ?
► FTP
► SMTP
► TELNET
► All of the given choices
Question No: 17 ( Marks: 1 ) - Please choose one
Following is highest level of heading tag in list given below.
► H3
► H4
► H5
► H2
Question No: 18 ( Marks: 1 ) - Please choose one
Blue Pacific is a name of ______ computer.
► Mini
► Desktop
► Micro
► Super
Question No: 19 ( Marks: 1 ) - Please choose one
__________ correctness is easier to check as compared with __________
► Syntactic, Semantic
► Semantically, Syntactically
► Systematically, Semantically
► None of the given options
Question No: 20 ( Marks: 1 ) - Please choose one
__________ refers maintaining the correctness and consistency of data
► Security
► Integrity
► Reliability
► None of the given
Question No: 21 ( Marks: 1 ) - Please choose one
Which of the following keyword is used to jump out of switch statement as soon as the match is found?
► Default
► Else
► Jump
► Break
Question No: 22 ( Marks: 1 ) - Please choose one
How much parameters does POW () function have?
► 2
► 1
► 3
Question No: 23 ( Marks: 1 ) - Please choose one
How many types the string methods have?
► 1
► 2
► 3
Question No: 24 ( Marks: 1 ) - Please choose one
The output of document.write( "2" + Math.PI ) ; is__________.
► 23.141592653589793
► 3.146
► 2.3141592653589793
► None of them
Question No: 25 ( Marks: 1 ) - Please choose one
POP, IMAP and SMTP are related to one of the following service/services?
► Electronic Mail
► Instant Messaging
► Both a and b
► None of above
Question No: 26 ( Marks: 1 ) - Please choose one
_______ is designed for 2D-Animation .
► Flash Animation
► HTML image class
► Web Browser
► HTML 2D class
Question No: 27 ( Marks: 2 )
Define the term 3D Rendering
Question No: 28 ( Marks: 2 )
What is an intelligent system?
Question No: 29 ( Marks: 2 )
Define testing with respect to programming..
It is basically the detecting the problem.
Question No: 30 ( Marks: 2 )
What is a compiler? Write its one benifit over interpreter.
Translate high level instructions into the machine language. Comiled program run faster than the interpret program. Super fast execution!
Question No: 31 ( Marks: 3 )
Who is a Computing Professional?
Question No: 32 ( Marks: 3 )
What are Trojan Horses ?
A program that neither replicates nor copies itself, but performs some illicit activity when it is run. It stays in the computer doing its damage or allows somebody from a remote site to take control of the computer.
A common example can be a fake music or picture file in a e-mail attachment.
The file name itself is normally misleading to entice you to open it. When the file is opened the trojan horse can do all sorts of things, from erasing files to changing your desktop, or installing a keystroke logger that can monitor every key you type and report back to a hacker.
Question No: 33 ( Marks: 3 )
What is ICMP?
Internet control message protocol:
Internet Control Message Protocol (ICMP) is an error reporting and diagnostic utility and is considered a required part of any IP implementation.
ICMPs are used by routers, intermediary devices, or hosts to communicate updates or error information to other routers, intermediary devices, or hosts.
Question No: 34 ( Marks: 5 )
What is ARPANET and who developed it?
Question No: 35 ( Marks: 5 )
Write down the advantages of Natural Language Processing.
Natural Language processing (NLP) is a field of computer science and linguistics concerned with the interactions between computers and human (natural) languages. [1] In theory, natural-language processing is a very attractive method of human-computer interaction. Natural-language understanding is sometimes referred to as an AI-complete problem, because natural-language recognition seems to require extensive knowledge about the outside world and the ability to manipulate it.NLP has significant overlap with the field of computational linguistics, and is often considered a sub-field of artificial intelligence.
Question No: 36 ( Marks: 5 )
Draw hierarchy of the people in the small project?
No comments:
Post a Comment