Header Ads Widget

Responsive Advertisement

Ticker

6/recent/ticker-posts

CS101 Final term Paper 2010 - Introduction to Computing - s4e

  Home > Old Papers > CS101 Papers > CS101 Final term Paper 2010 - Introduction to Computing - s4e


Time: 90 min
 
Marks = M = 58


CS101 - Introduction to Computing - Q.No. 1      ( M - 1 ) .
 
In a good presentation each slide should contain____________.
       Heading
       Phrases not sentences
       Sentences not phrases
       Heading, sentences not phrases



CS101 - Introduction to Computing - Q.No. 2      ( M - 1 ) .
 
Which one of the following is not an event handler's attribute?
       Function
       Identifier
       Equal sign
       String consisting of JavaScript statements




CS101 - Introduction to Computing - Q.No. 3      ( M - 1 ) .
 
According to the heuristic, the number of defects remaining in a system after a given level of tests is proportional to ___________.
       The number found on very first day.
       The number found during the development.
       The number found during the test.
       None of the given options.



CS101 - Introduction to Computing - Q.No. 4      ( M - 1 ) .
 
Which one is the best option for designing a Medical Expert System?
       Rule Based System
       Genetic Algorithm
       Fuzzy Logic
       Neural Network



CS101 - Introduction to Computing - Q.No. 5      ( M - 1 ) .
 
A combination of word processing and graphic design is
       Corel Draw
       Desktop Publishing
       Paint
       WordPad


 
CS101 - Introduction to Computing - Q.No. 6      ( M - 1 ) .
 
A microprocessor can be made more powerful by increasing its ________
       Clock frequency
       Word length
       Clock frequency and Word length
       None of above



CS101 - Introduction to Computing - Q.No. 7      ( M - 1 ) .
 
Security can also be improved through _____________.
       Encryption
       Typing errors
       Transmission errors
       Hardware malfunctions



CS101 - Introduction to Computing - Q.No. 8      ( M - 1 ) .
 
______________ is a field that uniquely identifies each record stored in a table.
       Composite Key
       Primary key
       Foreign key
       None of the given options


 
CS101 - Introduction to Computing - Q.No. 9      ( M - 1 ) .
 
There are _________ types of errors.
       2
       3
       4
       5



CS101 - Introduction to Computing - Q.No. 10      ( M - 1 ) .
 
______ is simply a fast port that lets you connect computer peripherals and consumer electronics to your computer without restart.
       Freeware
       Shareware
       Firewire
       Firmware



CS101 - Introduction to Computing - Q.No. 11      ( M - 1 ) .
 
___ provides a simple, consistent way for applications to interact with the HW without having to know all the details of the HW
       Explorer.exe
       System Files
       Operating System
       Application Software



CS101 - Introduction to Computing - Q.No. 12      ( M - 1 ) .
 
One can browse documents residing on a remote computer using ________ protocol.
       HTTP
       SMTP
       FTP
       TELNET



CS101 - Introduction to Computing - Q.No. 13      ( M - 1 ) .
 
Which event handler executes the specified JavaScript code when a window/form element loses focus ?
       onBlur
       onLoad
       onUnload
       onFocus




CS101 - Introduction to Computing - Q.No. 14      ( M - 1 ) .
 
Which event handler executes the specified JavaScript code when a window/form element receives focus ?
       onBlur
       onLoad
       onUnload
       onFocus



CS101 - Introduction to Computing - Q.No. 15      ( M - 1 ) .
 
_____________ loop is a flow control statement that allows code to be executed repeatedly based on a given Boolean condition.
       For
       Do-While
       If-else
       While



CS101 - Introduction to Computing - Q.No. 16      ( M - 1 ) .
   

ABCD
4ABC00365=c4=c4

 
 
Expression format in cell D4 is NOT correct.
       True
       False



CS101 - Introduction to Computing - Q.No. 17      ( M - 1 ) .
 
for(var i=1; i<=2;i=i+1)                                           
{
document.write( "Sorted Words:" + "
" )

}
Which of the following shall be the output of above code:
       Sorted Words: Sorted Words:
       Sorted Words:
Sorted Words:

              Sorted Words: “

       Sorted Words: “

       Sorted Words:

Sorted Words:


 
CS101 - Introduction to Computing - Q.No. 18      ( M - 1 ) .
 
Data integrity, in Database management system is necessary because it:
       Refers to provide insecurity to the data
       Refers to provide security to the data
       Refers to maintaining the correctness of data
       Refers to maintaining the consistency of the data



CS101 - Introduction to Computing - Q.No. 19      ( M - 1 ) .
 
Which of the following formula is used in spreadsheet for addition?
       C6+E6
       =C6+E6
       6+6=12
       6+E6



CS101 - Introduction to Computing - Q.No. 20      ( M - 1 ) .
 
Which of the following keyword is used to jump out of switch statement as soon as the match is found?
       Default
       Else
       Jump
       Break



CS101 - Introduction to Computing - Q.No. 21      ( M - 1 ) .
 
How many types the string methods have?
       1
       2
       3



CS101 - Introduction to Computing - Q.No. 22      ( M - 1 ) .
 
Which Internet Service is comparatively Slow but Inexpensive and Fast.
       E-mail
       Instant Messaging
       Web
       None of the given




CS101 - Introduction to Computing - Q.No. 23      ( M - 1 ) .
 
Semantic web is ________ .
       The extension of web
       Designed for both human beings and computers
       The extension of web and Designed for both human beings and computers
       None of the given



CS101 - Introduction to Computing - Q.No. 24      ( M - 1 ) .
 
Coding is the responsibility of ________________
       Software designer
       Software developer
       Project manager
       None of given



CS101 - Introduction to Computing - Q.No. 25      ( M - 1 ) .
 
Run time error occurs when ___________ .
       The complier compiles the programs
       The compiler ends the execution of the program
       The compiler start running the program
       The compiler finds a semantic error



CS101 - Introduction to Computing - Q.No. 26      ( M - 1 ) .
 
Heuristics are ________ .
       Intelligent systems
       Always ends with the solution of the problem
       Both of the given
       None of the given



CS101 - Introduction to Computing - Q.No. 27      ( M - 2 )
 
What are application softwares? List down the names of three application softwares.
Definition: Application Software are that software then can interact directory with the user for performance of respective type of work.
Following are the types of Application Softwares:-
·        AutoCAD and Corel Draw
·        Business Software
·        Productivity SW
·        Games Software
 

 
CS101 - Introduction to Computing - Q.No. 28      ( M - 2 )
 
Why Local variable is preferred over Global variable ?
In my point of view Global variable has some advantage with Local variables is preferred due to the following reasons:-
When we declare any global variable in web page then in case of error and logic it’s very difficult to see on which line this variable is used and what’s his value if we have more than 2000 lines and all the functions in web page using that Global Variable so Global variables can make the logic of a Web page difficult to understand.
As we know we can use Global variable everywhere so Global variables also make the reuse and maintenance of your code much more complex.
CS101 - Introduction to Computing - Q.No. 29      ( M - 2 )
 
In JavaScript, what is event handling? What are the two types of events
In java script we can capture events on do some operation on the basis of that particular event. For example we want to load some data on web page then with the help of event handling we can do this operation by using onLoad event.
We can put Event handlers in the body of web page and also in attributes of HTML. From the attribute we can call any JavaScript function that will do his operation and come back. Now we can also interact with server side with the help of AJAX in JavaScript function.
In-Line Event Handling
We can place event handlers in the BODY part and also in HTML attributes the event handlers attributes consist of 3 parts the event handler, equal sign and a string of JavaScript statement enclosed in quotes (single or double). And one more thing these should be put in one line without newline due to this sophisticated event handling is not possible with in-line event handling.
CS101 - Introduction to Computing - Q.No. 30      ( M - 2 )
 
What is Structured Vector Graphics ?
This is a plug-in that is required to view swf (flash) files in the web browser
CS101 - Introduction to Computing - Q.No. 31      ( M - 3 )
 
What kind of new jobs are created because of computing?And which old professions are being eliminated?
Due to computing where people are getting benefits from automated systems on the other hand the people that are with KHATA system or Manual system and they don’t know about computers are eliminated due to this reason and people take place of many people. We can see in the offices where before computer if there are four person required now only one person is required for example with the help of database we can store more than thousand of information and only one person is managing the whole data that is DBA. In the old system many people are writing the data in registers and then its also very difficult to find the specific record.
Now we can see companies are hiring:-
Data Entry Operators
System Engineers
Software Developer
DBA etc.

 
 
CS101 - Introduction to Computing - Q.No. 32      ( M - 3 )
 
What are Logic- or Time-Bombs ?
It execute the payload when predetermined event occurs
For example use type particular phrase and particular data is reached.
CS101 - Introduction to Computing - Q.No. 33      ( M - 3 )
 
What do you mean by FTP or File Transfer Protocol?
This protocol is used to upload the files on remote computers. This is used to transfer files between computer on TCP/IP network e.g. internet and now a day’s many software are available for uploading files using FTP like Mozila FTP, cute FTP etc.
CS101 - Introduction to Computing - Q.No. 34      ( M - 5 )
 
Why should we, as computing professionals, be interested in studying the social implications of our creations?
If we see our life then we can judge computing technology is changing our life fast if we compare with other technology.
We should highlight the mistakes and successes of the past. We should learn then and select future direction accordingly. Computers are keep becoming more and more powerful and gaining more autonomy.
Powerful Global Corporation.
The network Organization
CS101 - Introduction to Computing - Q.No. 35      ( M - 5 )
 
How DoS attack is a cyber crime? For what cyber crime can be used?
DoS is the crime but of a new type. A new type for policing system is required to tackle such crimes.
Cyber Crime can be used to Damage a home computer, Bring down the Business, Weaken the financial and defense system of country.
CS101 - Introduction to Computing - Q.No. 36      ( M - 5 )
 
What are the key characteristics of internet? Write the names of any five.

Post a Comment

0 Comments