Avoid __________ to
ensure readability of web page

Overuse of bold and
italics

Use of paragraphs
Use of white space
Use of contrast colors

Deep Blue was the name of:
Human
Computer
City
None of the given choices

Using ____, a user can remotely log on to a computer (connected to the user
through a network, e.g. Internet) & have control over it like a local user,
including control over running various programs ?

FTP
TCP


Telnet Protocol
None of the given choices

Telnet Protocol
Using Telnet, a user can
remotely log on to a computer (connected to the user’s through a TCP/IP

network, e.g. Internet)
& have control over it like a local user, including control over running
various programs In contrast, FTP allows file operations onl
y

Typical use: Configuring and testing of a remote Web server
DoS is________ ?
Crime
Cyber crime
Not a crime
A software
__________ enables users located at far-way locations to easily share
information with others located all over the world.

Protocol
Internet
Communication Channel
None of the given choices

Vacuum tubes were replaced by:
Transistors
Electrodes
Electric Relays
None of the given choices

Cyber crime can be used to
Damage a home computer
Bring down a business
Weaken the telecom, financial, or even
defense-related systems of a country

All of the given

___ provides a simple, consistent way for applications to interact with the
HW without having to know all the details of the HW

Explorer.exe
System Files
Operating System
Application Software

Communication protocol is a __________that governs the flow of information
over a network

Set of methods
Set of protocols
Set of rules
Device

_____________ team is responsible for the maintenance, expansion ,
improvement of the infrastructure consisting of workstations, networking
equipment, software and network security.

Support
Configuration Management
Quality Assurance
Developer
_____________ team consists on the sharpest technical minds in the company.
Architecture
Business Development
Configuration Management
Developer

_______________ is responsible for day to day operations.
CEO
COO
CMSO
Developer

Using Java Script you can write a character at random location on screen
By applying randomCh() method
With the help of String object
With the help of random character property
There is no built in approach in Java Script

The transistor is a solid state semiconductor device used for amplification
and switching, and has _____ terminals.

one
two
three
four

Blue Pacific is a name of _____ computer.
Mini
Desktop
Micro
Super

Monte Carlo algorithm is an example of
Randomized algorithm
Greedy algorithm
both greedy and randomized
Heuristics

A set of stand alone productivity applications designed to work together
known as __

Productivity software suites
Compiled software
Secure software
Intelligent software

Question # 1 of 15
Which of the following is used to attain something productive as opposed to
games or entertainment softwares?

System software
Application software
Programming software
Productivity software

Question # 2 of 15
Altair 8800 was based on _____ processor
Inter 4004
Intel 8080
Intel 386
Pentium

Question # 3 of 15
Which one of the following is “built-in” computer memory containing data
that normally can only be read , not written to?

RAM
ROM 000
Cache Memory
Magnetic Memory

Question # 4 of 15
This principle called the “Ockham’s Razor,” states when choosing among
competing, successful solutions to a problem; choose the one which is the least
________

Time Consuming
Ambiguous
Complex 000
Restricted

Question # 5 of 15
By default in a web page Hyper Link for another web page is represented as:
Blue only
Black and Underlined
Blue and Bold
Blue and Underlined

Question # 6 of 15
(a) _____ is the concept embedded in an algorithm (the soul!) and
(b)________ is the actual representation of an algorithm (the body!)

(a) Semantics (b) Syntax 000
(a) Syntax (b) Semantics
(a)Code (b) Logic
(a) Sequence (b) Flow Chart

Question # 7 of 15
_____ is an application program that provides a way to look at and interact
with all the information on the World Wide Web.

URL
Browser 000
HTML
HTTP

Question # 8 of 15
First computer designed for commercial applications was:
UNIVAC 1
ENIAC
EDVAC
Attanasoff-Berry Computer

Question # 9 of 15
Which one of the following is a really fast port that lets you connect
computer peripherals and consumer electronics to your computer without the need
to restart?

Freeware
Shareware
Fire wire 000
Firmware

Question # 10 of 15

In which of the following operating systems the availability of sufficient and
separate resources is ensured for various users simultaneously:
Single-User
 Multi-User
Batch type
Desktop

Question # 11 of 15
Compared to vacuum tubes, Transistors offer:
Much smaller size
Better reliability
Much lower cost
All of the given choices

Question # 12 of 15
What was the name of first commercial supercomputer?
UNIVAC 1
EDVAC
Cray 1
Altair 8800

Question # 13 of 15
Which one of the following register types stores SIMD instructions?
General Registers
Vector Registers
Data Registers
Address Registers

Question # 14 of 15
A data cell of a table contain
only text
images
tables
all of the given

Question # 15 of 15
Grace Hopper of US Navy develops the very first_______compiler
Low-level Language
High-level language
Both high and low level language
None of the given choices



Question # 1 of 15
Babbage’s Analytical Engine could store information permanently in:
Magnetic Tape
Floppy Disk
Punched Cards
None of the given choices

Question # 2 of 15
1 byte consists of _______ bits.
10
9
8
None of the given choices

Question # 3 of 15
The name of very first computer was:
ABC
BCD
EDC
None of the given choices

Question # 4 of 15
Quantum Mechanics is the branch of _______ ; which describes the activity of
subatomic particles.

Chemistry
Computer Science
Physics
None of the given choices

Question # 5 of 15
First computer designed for commercial applications was:
UNIVAC 1
ENIAC
EDVAC
Attanasoff-Berry Computer

Question # 6 of 15
Greedy algorithms are usually faster, since they don’t consider the details
of possible alternatives

True
False

Question # 7 of 15
Intel 8088 took ______ cycles to execute.
80
15
20
50

Question # 8 of 15
Algorithm is a ____________________
Definition of a problem
Sequence of steps to solve a problem
Understanding of a problem
Solving a problem

Question # 9 of 15
Pseudo Code, Structured flow charts and Actual code are used for
representing Algorithms.

True
False

Question # 10 of 15
Byte is a combination of……………
8 bits
16 bits
32 bits
4 bits

Question # 11 of 15
___________ software sits on top of __________ software for performing user
tasks.

System, Application
System, Productivity
Application, System
System, Programming

Question # 12 of 15
A 1.5 G. HZ Microprocessor approximately contains:
30 Million Transistors
25 Million Transistors
10 Million Transistors
50 Million Transistors

Question # 13 of 15
Linux and Mac are examples of :
Uni processor OS
Multi processor OS

Question # 14 of 15
JavaScript can be used along with HTML to __________________.
style the Web
secure the web page
make content interactive
color the web page

Question # 15 of 15
________ are personal computers that are designed to be easily transported
and relocated

Desktops
Portables
Servers
Workstations

Facebook
Twitter
LinkedIn
WhatsApp

Leave a Reply

Your email address will not be published. Required fields are marked *