Avoid __________ to ensure readability of web page
Overuse of bold and italics
Use of paragraphs
Use of white space
Use of contrast colors

Deep Blue was the name of:
Human
Computer
City
None of the given choices

Using ____, a user can remotely log on to a computer (connected to the user through a network, e.g. Internet) & have control over it like a local user, including control over running various programs ?
FTP
TCP


Telnet Protocol
None of the given choices

Telnet Protocol
Using Telnet, a user can remotely log on to a computer (connected to the user’s through a TCP/IP
network, e.g. Internet) & have control over it like a local user, including control over running various programs In contrast, FTP allows file operations only

Typical use: Configuring and testing of a remote Web server
DoS is________ ?
Crime
Cyber crime
Not a crime
A software
__________ enables users located at far-way locations to easily share information with others located all over the world.
Protocol
Internet
Communication Channel
None of the given choices

Vacuum tubes were replaced by:
Transistors
Electrodes
Electric Relays
None of the given choices

Cyber crime can be used to
Damage a home computer
Bring down a business
Weaken the telecom, financial, or even defense-related systems of a country
All of the given

___ provides a simple, consistent way for applications to interact with the HW without having to know all the details of the HW
Explorer.exe
System Files
Operating System
Application Software

Communication protocol is a __________that governs the flow of information over a network
Set of methods
Set of protocols
Set of rules
Device

_____________ team is responsible for the maintenance, expansion , improvement of the infrastructure consisting of workstations, networking equipment, software and network security.
Support
Configuration Management
Quality Assurance
Developer
_____________ team consists on the sharpest technical minds in the company.
Architecture
Business Development
Configuration Management
Developer

_______________ is responsible for day to day operations.
CEO
COO
CMSO
Developer

Using Java Script you can write a character at random location on screen
By applying randomCh() method
With the help of String object
With the help of random character property
There is no built in approach in Java Script

The transistor is a solid state semiconductor device used for amplification and switching, and has _____ terminals.
one
two
three
four

Blue Pacific is a name of _____ computer.
Mini
Desktop
Micro
Super

Monte Carlo algorithm is an example of
Randomized algorithm
Greedy algorithm
both greedy and randomized
Heuristics

A set of stand alone productivity applications designed to work together known as __
Productivity software suites
Compiled software
Secure software
Intelligent software





Question # 1 of 15
Which of the following is used to attain something productive as opposed to games or entertainment softwares?
System software
Application software
Programming software
Productivity software

Question # 2 of 15
Altair 8800 was based on _____ processor
Inter 4004
Intel 8080
Intel 386
Pentium

Question # 3 of 15
Which one of the following is “built-in” computer memory containing data that normally can only be read , not written to?
RAM
ROM 000
Cache Memory
Magnetic Memory

Question # 4 of 15
This principle called the “Ockham’s Razor,” states when choosing among competing, successful solutions to a problem; choose the one which is the least ________
Time Consuming
Ambiguous
Complex 000
Restricted

Question # 5 of 15
By default in a web page Hyper Link for another web page is represented as:
Blue only
Black and Underlined
Blue and Bold
Blue and Underlined

Question # 6 of 15
(a) _____ is the concept embedded in an algorithm (the soul!) and (b)________ is the actual representation of an algorithm (the body!)
(a) Semantics (b) Syntax 000
(a) Syntax (b) Semantics
(a)Code (b) Logic
(a) Sequence (b) Flow Chart

Question # 7 of 15
_____ is an application program that provides a way to look at and interact with all the information on the World Wide Web.
URL
Browser 000
HTML
HTTP

Question # 8 of 15
First computer designed for commercial applications was:
UNIVAC 1
ENIAC
EDVAC
Attanasoff-Berry Computer

Question # 9 of 15
Which one of the following is a really fast port that lets you connect computer peripherals and consumer electronics to your computer without the need to restart?
Freeware
Shareware
Fire wire 000
Firmware

Question # 10 of 15

In which of the following operating systems the availability of sufficient and separate resources is ensured for various users simultaneously:
Single-User
 Multi-User
Batch type
Desktop

Question # 11 of 15
Compared to vacuum tubes, Transistors offer:
Much smaller size
Better reliability
Much lower cost
All of the given choices

Question # 12 of 15
What was the name of first commercial supercomputer?
UNIVAC 1
EDVAC
Cray 1
Altair 8800

Question # 13 of 15
Which one of the following register types stores SIMD instructions?
General Registers
Vector Registers
Data Registers
Address Registers

Question # 14 of 15
A data cell of a table contain
only text
images
tables
all of the given

Question # 15 of 15
Grace Hopper of US Navy develops the very first_______compiler
Low-level Language
High-level language
Both high and low level language
None of the given choices



Question # 1 of 15
Babbage’s Analytical Engine could store information permanently in:
Magnetic Tape
Floppy Disk
Punched Cards
None of the given choices

Question # 2 of 15
1 byte consists of _______ bits.
10
9
8
None of the given choices

Question # 3 of 15
The name of very first computer was:
ABC
BCD
EDC
None of the given choices

Question # 4 of 15
Quantum Mechanics is the branch of _______ ; which describes the activity of subatomic particles.
Chemistry
Computer Science
Physics
None of the given choices

Question # 5 of 15
First computer designed for commercial applications was:
UNIVAC 1
ENIAC
EDVAC
Attanasoff-Berry Computer

Question # 6 of 15
Greedy algorithms are usually faster, since they don't consider the details of possible alternatives
True
False

Question # 7 of 15
Intel 8088 took ______ cycles to execute.
80
15
20
50

Question # 8 of 15
Algorithm is a ____________________
Definition of a problem
Sequence of steps to solve a problem
Understanding of a problem
Solving a problem

Question # 9 of 15
Pseudo Code, Structured flow charts and Actual code are used for representing Algorithms.
True
False

Question # 10 of 15
Byte is a combination of……………
8 bits
16 bits
32 bits
4 bits

Question # 11 of 15
___________ software sits on top of __________ software for performing user tasks.
System, Application
System, Productivity
Application, System
System, Programming

Question # 12 of 15
A 1.5 G. HZ Microprocessor approximately contains:
30 Million Transistors
25 Million Transistors
10 Million Transistors
50 Million Transistors

Question # 13 of 15
Linux and Mac are examples of :
Uni processor OS
Multi processor OS

Question # 14 of 15
JavaScript can be used along with HTML to __________________.
style the Web
secure the web page
make content interactive
color the web page

Question # 15 of 15
________ are personal computers that are designed to be easily transported and relocated
Desktops
Portables
Servers
Workstations

Post a Comment

Don't Forget To Join My FB Group VU Vicky
THANK YOU :)

Previous Post Next Post