Subscribe to the Largest Online Community of Students of virtual university of Pakistan

vuZs is a forum where students of Virtual University of Pakistan enlighten themselves. A place for the student to interact, exchange ideas in order to discuss issues, studying strategies, quality of education and above all Old papers ,Quizzes, assignments and related stuff is also provided on vuZs page. :::| Official Website: www.vuzs.info >

Translate

Monday, February 15, 2010

CS101 Solved MCQ from 1st Quiz





Solved by vuZs Solution Team
Mehreen Humayun<sheroo_79@yahoo.com>


A____________________ is the process of analyzing large databases to identify patterns


Data Mining

Data Normalization

Data Redundancy

Data Manipulation
onFocus executes the specified JavaScript code when ___________

a window receives focus

a form element receives input focus

a window receives focus or when a form element receives input focus

None of the Given.
CERN releases WWW in:
1992
1993
1994
None of the given choices
Communications on the internet is controlled by a set of two protocols, named :

HTTP & SMTP

FTP & TELNET

TCP & IP

None of the given choices
One of the disadvantages of working at home is________________

Family life may be happier because of living at home.

Family life may suffer as well, as some never turn off, and keep on working through out the day, evening and night

Family life may become happier because he can give more time to his family.

There is no disadvantage of working at home.
The greatest, shared resource of information created by humankind is:

Web

Dictionary

Vocabulary

Glossary
http://groups.google.com/group/vuZs
There are _____________ types communication channels.

2

3

4

5
The Cyberwarefare is a ______

Crime

War

Software

Game
In the statement "PopUp("Message")" :

"PopUp" is the function Name, "Message" is the argument

"Message" is function identifier

Syntax Error: functions cannot be called in this way

Error: function is undefined
RGB scheme stands for _________________________________.

Red Grey Blue

Red Green Brown

Red Green Blue

Red Green Black
_____________ is the part of the virus that generally consists of malicious computer instructions

Off load

Payload

Loader

Transmitter
Unlike viruses, __________________ are stand-alone programs

Trojan horses

Logic- or time-bombs

Worms

None of the given
Voice over IP has _____ modes


2

3

4

5
We use __________ to stop Break-Ins.

Scanners

Intrusion detectors

Firewalls

Intrusion detectors and Firewalls
Which one can lead user to leave your website?

Simple design

Poor navigation

Information layout

Adaptable design
_____________________ are the subcategories of AI

Expert Systems

Robotics

Natural Language Processing

All of the above
With the Help of FTP we can:


List, change, create folders on a remote computer

Upload and download files

Transferring Web content from the developer's PC to the Web server

All of the given choices
Which protocol is used for receiving E-mail messages?

FTP

POP

Telnet Protocol

SMTP
The organizations are learning that business can be done in a more effective manner if emphasis is placed upon ______________.

Cooperation

Shared responsibility

Networking

All of the given
___ is used to transfer files between computers on a TCP/IP network
FTP
POP
Telnet Protocol
SMTP
Which of the following is True about "pareseFloat(String)" function: I) If the first character cannot be converted to a number, parseFloat returns NaN. II) it returns the fractional portion of floating point number. III) Parses the string argument; returns a FP number. IV) Non of given options.

I and II Only

II and III Only

I and III Only

IV Only
Event-driven programs can ____________________ events.

capture

respond

capture and respond

None of the Given.
Which of the statements is NOT true about "Color Usage Guidelines" for developing a presentation?

Use color sparingly to to highlight a point, but don't get carried away

Do not use colors like yellow or red for background except where needed.

Do not use colors like green, blue and such like colors except where needed.

None of given options
_________________ Type of databases management systems are supporting Terabytes of Data

Personal

Desktop

Enterprise

Single-user
Because of the ever-decreasing costs of verbal, text, video communications; the distances have _________

Increased

Expanded

Contracted

Lengthened
The structure of the networked organization is _________.

Simple

Flexible

Complex

All of the given
A CAD drawing consist of many geometric shapes like straight lines , arc , tc and therefore is stored in a ___________ format.

Scalar

Vector

Both a & b
____ is a type of computer-to-computer messaging.

TCP

Telnet

E-mail

FTP

None of these
RDBMS stands for ________________________________

Relative Data Base Management System

Relational Data Base Management System

Recursive Data Base Management System

Responsible Data Base Management System
Using Color Mapping scheme only a limited number of color called _____________ are allowed.

Reserved

Pointers

Platelet

None of these
Using _________ topology, adding new nodes is difficult.

Ring

Bus

Star

None of the given choices
Problems with old presentation methods was (transparencies and projectors etc):

They were costly

Electronic transmission, in some cases, was not easy

Presentation some times gets ambiguous

All of given options
ARPANET splits into two nets to keep military & non-military network sites separate, named :


ARPANET & MILNET

MICRONET & MILNET

PICONET & ARPANET

None of the given choices
Arguments values are passed to the function _________

by value

by reference

Both a & b

Non of the Given.
__________________ is a field that uniquely identifies each record stored in a table.

Primary Key

Foreign Key

Secondary key

Special Key
The IP address consists of _____ bits

64

32

16

128
Credit Card Fraud can be minimized by using _________________

single credit card numbers

multiple-use credit card numbers

single-use credit card numbers

Firewalls
hotWeather = (Temperature == 40); in the above statement, the variable hotWeather is of type

Number

String

Boolean

None of the given
NCSA stands for :

National Center for Supercomputing Applications

National Center for Supreme Applications

National Center for Super Authority

None of the given choices
Self-replicating SW that eludes detection and is designed to attach itself to other files is called _____________.

Trojans

Viruses

Sniffers

Operating System
SVG stands for _________________________________________.

Structured Vector Graphics

Software Vector Graphics

Structured Visual Graphics

None of these
Viruses move from one computer to another with the __________ and spring into action when the _____________ is executed or opened

Host – Host

Host – Client

Client – Host

Client – Client
http://groups.google.com/group/vuZs
____________________ is a layered structure consisting of a number of homogenous and simple processing elements.

Genetic Algorithms

Rule-based Systems

Feed-Forward Network

None of these
A property that gives the value of Pi is:

PI()

Graph.PI

Math.PI

Math.PI()
The smallest image forming element on a computer display is called ____________.

Resolution

Pixel

Grey area

None of these
SMTP stands for _______________________________________.

Simple Mail Transfer Protocol

Simple Mail Transparent Protocol

Simple Mail Transfer Paradigm

None of these
________________ network allows data to be sent directly from one computer to another.

Ring

Bus

Star

None of the given choices
Viruses attach themselves to other computer programs or data files, are known as____

Trojans

Guests

Hosts

Spies
Avoid __________ to ensure readability of web page

Overuse of bold and italics

Use of paragraphs

Use of white space

Use of contrast colors
STP stands for :

Shielded Twisted Pair

Silver Twisted Pair

Single Twisted Pair

None of the given choices
In ______, the spies of one business monitors the network traffic of their competitors.

Industrial intelligence

Industrial Espionage

Industrial spying

Industrial surveillance
Color mapping scheme reducing the size of 2.25 MB graphic to _________ MB.

0.90 MB

0.75 MB

1.00 MB

None of these
The functions which call themselves from their (own) body are called:

Virtual functions

Abstract functions

Overriding functions

Recursive functions
Browser sends '_________' request to web server to access a file.

SET

GET

TRANSFER

All of the given choices
vuzs

The internet communities are ___________.

Geographical based

Interest based

Country based

Religion based
Infection propagation and Actual destructive are the components of _______________

Transmission mechanism

Payload

Worms

Trojan Horse