FINALTERM EXAMINATION
Spring 2010
CS101- Introduction to Computing (Session - 3)
Ref No: 1344120
Time: 90 min
Marks: 58
Student Info | |
StudentID: | |
Center: | OPKST |
ExamDate: | 07 Aug 2010 |
For Teacher's Use Only |
Q No. | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | Total |
Marks | | | | | | | | | |
Q No. | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | |
Marks | | | | | | | | | |
Q No. | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | |
Marks | | | | | | | | | |
Q No. | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | |
Marks | | | | | | | | | |
Q No. | 33 | 34 | 35 | 36 | | | | | |
Marks | | | | | | | | | |
Question No: 1 ( Marks: 1 ) - Please choose one

► An electrical machine
► A digital machine
► An analog machine
► A special purpose machine
Question No: 2 ( Marks: 1 ) - Please choose one

► 40
► 62
► 83
► 91
Question No: 3 ( Marks: 1 ) - Please choose one

► FTP
► HTTP
► TCP
► IP
Question No: 4 ( Marks: 1 ) - Please choose one

► Excel
► PowerPoint
► Word
► VisiCalc
Question No: 5 ( Marks: 1 ) - Please choose one

► onUnload
► onUnLoad
► onUNLOAD
► All of the above
Question No: 6 ( Marks: 1 ) - Please choose one

► Actual Value
► Reference
► Length
► Name
Question No: 7 ( Marks: 1 ) - Please choose one

► Scanners
► Intrusion detectors
► Utilities
► None of the given options
Question No: 8 ( Marks: 1 ) - Please choose one

► source
► path
► loc
► src
Question No: 9 ( Marks: 1 ) - Please choose one

► Team Lead
► Project Manager
► CEO
► IT Manager
Question No: 10 ( Marks: 1 ) - Please choose one

► Technology selection
► High-level design
► Makes certain that the implementation remains true to the design
► All of the given options
Question No: 11 ( Marks: 1 ) - Please choose one

► Green
► Grey
► Blue
► None of the given options
Question No: 12 ( Marks: 1 ) - Please choose one

► Hardware
► Device Manager
► Kernel
► Device Driver
Question No: 13 ( Marks: 1 ) - Please choose one

► Simpler and more slow
► Simpler and more efficient
► Complex and more efficient
► Complex and more slow
Question No: 14 ( Marks: 1 ) - Please choose one

► ( )
► [ ]
► { };
► { }
Question No: 15 ( Marks: 1 ) - Please choose one

► Value
► Length
► Name
► All of the given choices
Question No: 16 ( Marks: 1 ) - Please choose one

► FTP
► SMTP
► TELNET
► All of the given choices
Question No: 17 ( Marks: 1 ) - Please choose one

► H3
► H4
► H5
► H2
Question No: 18 ( Marks: 1 ) - Please choose one

► Mini
► Desktop
► Micro
► Super
Question No: 19 ( Marks: 1 ) - Please choose one

► Syntactic, Semantic
► Semantically, Syntactically
► Systematically, Semantically
► None of the given options
Question No: 20 ( Marks: 1 ) - Please choose one

► Security
► Integrity
► Reliability
► None of the given
Question No: 21 ( Marks: 1 ) - Please choose one

► Default
► Else
► Jump
► Break
Question No: 22 ( Marks: 1 ) - Please choose one

► 2
► 1
► 3
Question No: 23 ( Marks: 1 ) - Please choose one

► 1
► 2
► 3
Question No: 24 ( Marks: 1 ) - Please choose one

► 23.141592653589793
► 3.146
► 2.3141592653589793
► None of them
Question No: 25 ( Marks: 1 ) - Please choose one

► Electronic Mail
► Instant Messaging
► Both a and b
► None of above
Question No: 26 ( Marks: 1 ) - Please choose one

► Flash Animation
► HTML image class
► Web Browser
► HTML 2D class
Question No: 27 ( Marks: 2 )

Question No: 28 ( Marks: 2 )

Question No: 29 ( Marks: 2 )

It is basically the detecting the problem.
Question No: 30 ( Marks: 2 )

Translate high level instructions into the machine language. Comiled program run faster than the interpret program. Super fast execution!
Question No: 31 ( Marks: 3 )

Question No: 32 ( Marks: 3 )

A program that neither replicates nor copies itself, but performs some illicit activity when it is run. It stays in the computer doing its damage or allows somebody from a remote site to take control of the computer.
A common example can be a fake music or picture file in a e-mail attachment.
The file name itself is normally misleading to entice you to open it. When the file is opened the trojan horse can do all sorts of things, from erasing files to changing your desktop, or installing a keystroke logger that can monitor every key you type and report back to a hacker.
Question No: 33 ( Marks: 3 )

Internet control message protocol:
Internet Control Message Protocol (ICMP) is an error reporting and diagnostic utility and is considered a required part of any IP implementation.
ICMPs are used by routers, intermediary devices, or hosts to communicate updates or error information to other routers, intermediary devices, or hosts.
Question No: 34 ( Marks: 5 )

Question No: 35 ( Marks: 5 )

NLP has significant overlap with the field of computational linguistics, and is often considered a sub-field of artificial intelligence.
Question No: 36 ( Marks: 5 )

No comments:
Post a Comment