Question # 1 of 10
Total M - 1
Internet is an example
of ______________ network.
Select correct
option:
Private
Public
Both Private and
Public
None of the given
choices
Question # 2 of 10
Total M - 1
The name of first
commercially available PC was:
UNIVAC
1
ENIAC
EDVAC
Altair 8800
Question # 3 of 10
Total M - 1
Algorithm is a
____________________
Definition of a
problem
Sequence
of steps to solve a problem
Understanding of a
problem
Solving a problem
Question # 4 of 10
Total M - 1
A group of information
is called __________________
File
Database
Record
Field
Question # 5 of 10 ( Start time: 05:24:17 PM
) Total M - 1
___________________ is
a branch f computer science concerned with manipulating and enhancing computer
graphics.
Image Handling
Image
Processing
Image Engineering
None of these
Question # 6 of 10
Total M - 1
__________has changed
our way of life like no other technology.
Computational
technology
Computer
technology
Computing technology
None of the Above
Question # 7 of 10
Total M - 1
Sophisticated event
handling is not possible with _______________ event handling
Off-Line
In-Line
Out-Line
Non of the given
choices
Question # 8 of 10
Total M - 1
Babbage’s Analytical
Engine could store information permanently in:
Magnetic Tape
Floppy Disk
Punched
Cards
None of the given
choices
Question # 9 of 10
Total M - 1
There are __________
popular schemes to reduce the number of bytes that are required for storing
graphics.
4
3
2
None of these
A number of clever
schemes have been invented to reduce the number of bytes that are required for
storing graphics. 2 popular ones:
Color mapping
Dithering
Question # 10 of 10 (
Start time: 05:30:01 PM ) Total M - 1
The internet-society
is considered under Surveillance because:
While surfing, we are
being watched, constantly
Our every click is
recorded and analyzed to extract patterns and behaviors
Webcams are becoming
common. Providing a cheap way for parents to watch their children's every move
All
of the given
Which of the following
is incorrect for making design elements legible?
Elements should be
large enough
Elements must contrast
sufficiently
Related elements
should be visually grouped
Elements
should have no visual focus
25.10 Making Display
Elements Legible:
1. Designing
(arranging) Display Elements
Elements must be large
enough to be processed visually
Elements must contrast
sufficiently with their backgrounds
Related elements
should be visually grouped through the use of space, color, or graphical
boundaries
The relative levels of
importance among elements in a display should be revealed graphically
Question # 2 of 10
Total M - 1
1. Function is also
known as ______________.
Select correct option:
subprogram
procedure
subroutine
All
of given
Function:
A group of statements
that is put together (or defined) once and then can be used (by reference)
repeatedly on a Web
page Also known as subprogram, procedure, subroutine
In _____________
TCP\IP protocols became the only set of protocols used on the ARPANET.
Select correct option:
1973
1983
1972
None of the given
choices
E-mail system has
______ component(s)
Select correct option:
E-mail client
SMTP server
POP3 server
All
of the given choices
A Parallelogram
(Tilted rectangle) represents the ________________ flow chart element.
Select correct option:
Process
Input
or Output
Decision
Connector
Punched cards were
replaced by:
Floppy Disk
Zip Drives
Magnetic
storage
None of the given
choices
Ref:
http://en.wikipedia.org/wiki/Punched_card
During the
1960s, the punched card was gradually replaced as the primary means for data storage by magnetic tape, as better, more capable computers became
available.
The ________virus may
display an annoying, but harmless message
Select correct option:
Malicious
Neutral
Helpful
DoS
The internet
communities are ___________.
Select correct option:
Geographical based
Interest
based
Country based
Religion based
Question #
1 of 10 Total M - 1
Because of spending
more time on the internet, the distances among the families have been _____.
Select correct option:
Increased
Expanded
Contracted
Shortened
Question #
3 of 10 Total M - 1
Autonomous Web Agents
are also known as _________________
Select correct option:
Mobile Agents
Softbots
Both
"Mobile Agents" & "Softbots"
None of these
A communication
protocol is a __________that governs the flow of information over a network.
Select correct option:
Set of Methods
Set of Protocols
Set
of rules
None of the given
choices
Protocol
–Rules governing
communications over the network
By default in a web
page Hyper Link for another web page is represented as:
Blue only
Black and Underlined
Blue and Bold
Blue
and Underlined
The organizations are
learning that business can be done in a more effective manner if emphasis is
placed upon ______________.
Select correct option:
Cooperation
Shared responsibility
Networking
All
of the given
Question #
7 of 10 Total M - 1
Monitor is an example
of __________devices
Select correct option:
Output
Input
Processing
None of the given
choices
The code in the
________ portion is the right choice for developing larger JavaScript scripts
Select correct option:
Body
At End
Head
Separate
____________________
based on the principles of the logical reasoning ability of humans.
Select correct option:
Genetic Algorithms
Rule-based
Systems
Feed-Forward Network
None of these
Rulebased Systems (1):
Based on the
principles of the logical reasoning ability of humans
The key benefit of
VPNs over conventional PNs is:
Security
Efficiency
Lower Cost
None of the given
choices
In __________________
automatic machines perform various tasks that were previously performed by
humans.
Select correct option:
Fuzzy Logic
Robotics
Rule based Systems
None of these
Post a Comment
Don't Forget To Join My FB Group VU Vicky
THANK YOU :)