An
algorithm that always takes the best immediate or local solution while finding
an answer is called____.
Deterministic Algorithm
Non deterministic Algorithm
Greedy Algorithm
Randomized Algorithm
Deterministic Algorithm
Non deterministic Algorithm
Greedy Algorithm
Randomized Algorithm
Which
of the following command allows you to recover form mistakes in MS Word?
Clear
Edit
Undo
Break
Edit
Undo
Break
A ____________ operating
system allows many users to take advantage of the computer's resources, simultaneously
Single
user
Multi- user
Single tasking
Multi tasking
Network Interface Card
is an __________ device
Input
Output
Input/Output
Storage
The decimal equivalent of
binary 1000 is
7
8
9
10
Which of the following is NOT RDBMS
software?
My Sql
MS Excel
Oracle
SQL Server
MS Excel
Oracle
SQL Server
A computer virus is a
Software that saves the computer from being damaged.
Application software that helps to make
different type of viruses and worms
Program that spreads itself and destroys other
program
Program that corrects the problems in your computer
What will be the result of a?
a = Math.abs(-23)
23
-23
23.0
2.3
A
Special program required to view swf (Shockwave Flash) files in web Browser is
called
TFlash
Vflash
plug-in
None of the given
options
Using Java
Script you can write a character at random location on screen
By applying randomCh() method
With the help of String object
With the help of random character property
There is no built in approach in Java
Script
If incorrectly
we enter the negative age it is check by
Limit Integrity
Type Integrity
Referential Integrity
Physical Integrity
Which
protocol is use to transfer a file over the network?
UDP
FTP
TCP
OSI
One can send an
email message to a remote computer using _______ protocol
HTTP
SMTP
FTP
TELNET
In a System
having many parts to be designed, one should always do the _____ first
Hard part
Simple part
Development part
Quality part
Flow control
constructs in JavaScript includes:
If-Else
Loops and If -Else
Switch and If-Else
All of the given choices
___ provides a
simple, consistent way for applications to interact with the HW without having
to know all the details of the HW
Explorer.exe
System Files
Operating System
Application Software
Machine language
is also called
Assembly Language
Binary Language
High Level Language
HTML Language
_________ is the
best known builder for supercomputers.
Sun
Cray Research
Microsoft
Apple
The weaknesses
of the computer are:
Pattern recognition & Storage
Speed & Innovative ideas
Pattern recognition & Innovative ideas
Speed & Storage
Communication
protocol is a __________that governs the flow of information over a network
Set of methods
Set of protocols
Set of rules
Device
_____________
team is responsible for the maintenance, expansion , improvement of the
infrastructure consisting of workstations, networking equipment, software and
network security.
Support
Configuration Management
Quality Assurance
Developer
_____________
team consists on the sharpest technical minds in the company.
Architecture
Business Development
Configuration Management
Developer
_______________
is responsible for day to day operations.
CEO
COO
CMSO
Developer
One of the key
responsibilities of the ___________ is client relationship management.
Project Manager
Team Lead
Developer
Quality Assurance Engineer
What is the
major problem with flash based website?
Its two heavy
Cannot be indexed
Less attractive
Inaccessible
Which of the
following is NOT an event handler for image object?
onAbort
onError
onLoad
onUser
The
organizations are learning that business can be done in a more effective manner
if emphasis is placed upon ___________.
Cooperation
Shared responsibility
Networking
All of the given options
a = Math.abs(-23)
What will be the value
of a ?
23
-23
23.0
2.3
ERP is a type of __________________ .
Entertainment software
Productivity software
Business software
Scientific software
In Genetic Algorithm
the most important thing you should know, is the ___________.
Procedure
Recognition of a good solution
Different techniques
None of the given options
According to a
popular heuristic, success is defined by ___________.
The user
The builder
Both user and builder
None of the given options
Rule of thumb
learned through trial and error is called ___________.
Design
Heuristic
Plan
Aim
JavaScript
Variables are ____________.
Dynamically Typed
Statically Typed
Strong Typed
None of the given options
Which of the
following application are collections of cells?
Word
Excel
PowerPoint
Outlook Express
The browser
breaks down the URL into ________ parts.
2
3
4
5
A named
collection of properties (data, state) and methods (instruction, behavior) is
called ____________.
Array
Function
Variable
Object
First computer
network was ___________.
NSFNET
FIRSTNET
ARPANET
ORPHANET
In JavaScript, a variable declaration is
Optional
Mandatory
Not allowed
None of the given
A protocol used for receiving email messages is called ____________.
URL
Telnet
POP3
SMTP
which one is correct?
onUnload
onUnLoad
onUNLOAD
All of the above
Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called __________.
Telnet
POP3
SMTP
which one is correct?
onUnload
onUnLoad
onUNLOAD
All of the above
Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called __________.
Loop
Sequence
Condition
Array
Variables allow us to manipulate data through the ___________.
Actual Value
Reference
Length
Name
Fuzzy logic is based on ____________.
Ground facts
Experience
Practice
Approximation
Word Processor is a _________________
System Software
Application Software
Device
Utility
In the old days, databases did NOT support ____________.
Application Software
Device
Utility
In the old days, databases did NOT support ____________.
Number
Boolean
Video
Text
In tabular storage, fields placed in a particular row are strongly ___________.
Boolean
Video
Text
In tabular storage, fields placed in a particular row are strongly ___________.
Independent
Dependent
Interrelated
Inconsistent
Due to working at home, lack of interaction may result in ___________ professional growth.
Slower
Faster
Higher
Improved
Distance learning has got a boost due to the ___________.
Easy communication
Online interactive contents
Flexibility
All of the given options
_____________ technique can be used to create smooth animations or to display one of several images based on the requirement.
Image downloading
Image preloading
Image uploading
Image postloading
The ____________ is becoming the preferred organizational structure for more and more organizations with the passage of time.
Tree structured organizational model
Network paradigm
Hierarchical structure
None of the given options
The group of technologies concerned with the capturing, processing and transmission of information in the digital electronic form is called
_____________.
Telecom Engineering
Computer Engineering
Computer Science
Information Technology
A large number of networks interconnected physically is called ______
LAN
MAN
Internet
Network collection
TCP stands for ________.
Transfer Center protocol
Transmission Control Protocol
Transmission Center Protocol
Telephone Center Protocol
A collection of data organized in such a way that the computer can quickly search for a desired data item is known as :
Retrieving
Database
Information
DBMS
______ is simply a fast port that lets you connect computer peripherals and consumer electronics to your computer without restart.
Freeware
Shareware
Firewire
Firmware
Structures, in which another list starts before the first list is finished, are called:
Multiple Lists
Nested Lists
Ordered Lists
Un-ordered Lists
The key property of the ‘Array’ object in JavaScript is
Value
Length
Name
All of the given choices
Which one is the example of spreadsheet software ?
MS Word
MS PowerPoint
MS Excel
MS Access
The Encryption of data is related to
Data updates
Data security
Data integrity
Data accessibility
_____ is the process of analyzing large databases to identify patterns.
Data normalization
Data management
Data Mining
None of the given options
Which is the user-friendly way of presenting data ?
Query
Form
Report
All of the given options
<form> Tags always placed between the <BODY> and </BODY> tags of a Web page
True
False
Java script has ----------------- ability to create and draw graphics.
Limited
Versatile
Medium
Not at all
Which of the
following is incorrect for making design elements legible?
Select correct option:
Elements should be
large enough
Elements must contrast
sufficiently
Related elements
should be visually grouped
Elements
should have no visual focus
Function is also
known as ______________.
Select correct option:
subprogram
procedure
subroutine
All of given
In _____________
TCP\IP protocols became the only set of protocols used on the ARPANET.
Select correct option:
1973
1983
1972
None of the given
choices
E-mail system has
______ component(s)
Select correct option:
E-mail client
SMTP server
POP3 server
All
of the given choices
_______ / / /______/ A
Parallelogram (Tilted rectangle) represents the ________________ flow chart
element.
Select correct option:
Process
Input
or Output
Decision
Connector
If a computer
could pass the Turing test then it would be able to:
Select correct option:
win a million dollar
prize
think
like human begins
think but slower than
humans
do the things faster
Punched cards were
replaced by:
Select correct option:
Floppy Disk
Zip Drives
Magnetic
storage
None of the given
choices
vuzs
The ________virus may
display an annoying, but harmless message
Select correct option:
Malicious
Neutral
Helpful
DoS
The name of very first
computer was:
Select correct option:
ABC
BCD
EDC
None
of the given choices
The internet
communities are ___________.
Select correct option:
Geographical based
Interest
based
Country based
Religion based
which one is
correct?
onUnload
onUnLoad
onUNLOAD
All of the above
Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called __________.
onUnload
onUnLoad
onUNLOAD
All of the above
Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called __________.
Loop
Sequence
Condition
Array
Variables allow us to manipulate data through the ___________.
Actual Value
Reference
Length
Name
Fuzzy logic is based on ____________.
Ground facts
Experience
Practice
Approximation
Word Processor is a _________________
System Software
Application Software
Device
Utility
In the old days, databases did NOT support ____________.
Application Software
Device
Utility
In the old days, databases did NOT support ____________.
Number
Boolean
Video
Text
In tabular storage, fields placed in a particular row are strongly ___________.
Independent
Dependent
Interrelated
Inconsistent
Due to working at home, lack of interaction may result in ___________ professional growth.
Slower
Faster
Higher
Improved
Distance learning has got a boost due to the ___________.
Easy communication
Online interactive contents
Flexibility
All of the given options
_____________ technique can be used to create smooth animations or to display one of several images based on the requirement.
Image downloading
Image preloading
Image uploading
Image postloading
The ____________ is becoming the preferred organizational structure for more and more organizations with the passage of time.
Tree structured organizational model
Network paradigm
Hierarchical structure
None of the given options
The group of technologies concerned with the capturing, processing and transmission of information in the digital electronic form is called
_____________.
Telecom Engineering
Computer Engineering
Computer Science
Information Technology
A large number of networks interconnected physically is called ______
LAN
MAN
Internet
Network collection
TCP stands for ________.
Transfer Center protocol
Transmission Control Protocol
Transmission Center Protocol
Telephone Center Protocol
A collection of data organized in such a way that the computer can quickly search for a desired data item is known as :
Retrieving
Database
Information
DBMS
______ is simply a fast port that lets you connect computer peripherals and consumer electronics to your computer without restart.
Freeware
Shareware
Firewire
Firmware
Structures, in which another list starts before the first list is finished, are called:
Firewire
Firmware
Structures, in which another list starts before the first list is finished, are called:
Multiple Lists
Nested Lists
Ordered Lists
Un-ordered Lists
The key property of the ‘Array’ object in JavaScript is
Value
Length
Name
All of the given choices
Which one is the example of spreadsheet software ?
MS Word
MS PowerPoint
MS Excel
MS Access
_____ is the process of analyzing large databases to identify patterns.
Data normalization
Data management
Data Mining
None of the given options
Which is the user-friendly way of presenting data ?
Query
Form
Report
All of the given options
JavaScript function fixed() has equivalent HTML tag-set ____
<.FIX>……………</FIX>
<F>………………..</F>
<PRE>………….</PRE>
<H>………………..</H>
<form> Tags always placed between the <BODY> and </BODY> tags of a Web page
True
False
Java script has ----------------- ability to create and draw graphics.
Limited
Versatile
Medium
Not at all
Internet is an example
of ______________ network.
Private
Public
Both Private and
Public
None of the given
choices
The name of first
commercially available PC was:
UNIVAC
1
ENIAC
EDVAC
Altair 8800
Algorithm is a
____________________
Definition of a
problem
Sequence
of steps to solve a problem
Understanding of a
problem
Solving a problem
A group of information
is called __________________
File
Database
Record
Field
___________________ is
a branch of computer science concerned with manipulating and enhancing computer
graphics.
Image Handling
Image
Processing
Image Engineering
None of these
__________has changed
our way of life like no other technology.
Computational
technology
Computer
technology
Computing technology
None of the Above
Sophisticated event
handling is not possible with _______________ event handling
Off-Line
In-Line
Out-Line
Non of the given
choices
Babbage’s Analytical
Engine could store information permanently in:
Magnetic Tape
Floppy Disk
Punched
Cards
None of the given
choices
There are __________
popular schemes to reduce the number of bytes that are required for storing
graphics.
4
3
2
None of these
The internet-society
is considered under Surveillance because:
While surfing, we are
being watched, constantly
Our every click is
recorded and analyzed to extract patterns and behaviors
Webcams are becoming
common. Providing a cheap way for parents to watch their children's every move
All
of the given
URL is a/an ________
Device
Component
Address
Tool
To improve the time
for scanning a web page, text should be ___________.
Centered
Left Aligned
Right Aligned
Staggered
Communications on the
internet is controlled by a set of two protocols which are ____________.
IMAP and SMTP
FTP and HTTP
TCP and IP
TCP and HTTP
FTP stands for
__________.
File transmission protocol
File transmission path
File transfer protocol
Fine transfer path
A named collection of
properties (data, state) and methods (instruction, behavior) is called
____________.
Array
Function
Variable
Object
Anchor tag denoted by
<A> is used to create
Address
Hyperlink
Paragraph
Title
<UL> tag is used
to
underline text
end the line
create ordered list
create unordered list
A user may access any
item on the web through __________.
URL
Telnet
POP
SMTP
The browser breaks
down the URL into ________ parts.
2
3
4
5
Which one of the
following is NOT a primary color?
Red
Green
Yellow
Blue
According to a popular
heuristic, success is defined by ___________.
The user
The builder
Both user and builder
None of the given options
The idea of Neural
Networks field is based upon ______________.
Human nature
Human brain
Human culture
Human actions
ERP is a type of __________________ .
Entertainment software
Productivity software
Business software
Scientific software
__________ are those
programs in which the flow of the program is determined by the user's actions
(mouse clicks, key presses) or messages from other programs.
Event called programs
Event processed programs
Event driven programs
Event declared programs
Automatic machines
performing various tasks that were previously done by humans, are called
____________.
Robotics
Computers
Decision Making Systems
Autonomous Web Agents
country=”Hello Pakistan”;
document.write(country.charAt(6));
The out put of the
above statement is _____________.
o
P
a
k
The distance among
families is ___________ because of spending more time on internet.
Increased
Expanded
Contracted
Decreased
The software used for
the scanning of internet severs, is called __________.
Wscan
Mscan
Sscan
Vscan
Adding images to html
page, we use___________ tag.
<IMG>
<IMAGE>
<PICTURE>
<PIC>
The group of
technologies concerned with the capturing, processing and transmission of
information in the digital electronic form is called _____________.
Telecom Engineering
Computer Engineering
Computer Science
Information Technology
The responsibilities
of the Team Lead includes_____________.
Planning and tracking of the project
Detailed design
Professional development of team members
All of the given options
When the packets reach
at destination, __________ reassembles them into original message.
Protocol
TCP
IP
NIC
Many developers write
the _________ first and then incrementally convert each line into _________.
Real
code & Pseudo code
Pseudo code & Real code
Real code & Artificial code
None of the given options
Machine language is
also called
Assembly Language
Binary Language
High Level Language
HTML Language
In JavaScript, second
element of an array has the index:
2
0
1
3
Each element in an array is given an index, which is an integer value between 0
and one less than the length of the array. The first element has an index of 0,
the second element has an index of 1, and so on.
One can download or
upload files to a remote computer using ________ protocol.
HTTP
SMTP
FTP
TELNET
JavaScript ________
support drawing of graphics
Does
Does not
Always
At times
Which of the
following is NOT true about modern computers?
More powerful
Smaller in size
Consume less energy
Costly
Ada written a computer programme for ?
Analytical Engine
Difference
Engine
Harvard
Mark 1
Mechanical
engine
A set of stand alone
productivity applications designed to work together known as ______________ .
Productivity software suite
Compiled software
Secure software
Intelligent software
Because of spending
more time on the internet, the distances among the families have been _____.
Increased
Expanded
Contracted
Shortened
Sophisticated event
handling is not possible with _______________ event handling
Off-Line
In-Line
Out-Line
Non of the given
choices
Autonomous Web Agents
are also known as _________________
Mobile Agents
Softbots
Both
"Mobile Agents" & "Softbots"
None of these
A communication
protocol is a __________that governs the flow of information over a network.
Set of Methods
Set of Protocols
Set
of rules
None of the given
choices
By default in a web
page Hyper Link for another web page is represented as:
Blue only
Black and Underlined
Blue and Bold
Blue
and Underlined
The organizations are
learning that business can be done in a more effective manner if emphasis is
placed upon ______________.
Cooperation
Shared responsibility
Networking
All
of the given
Monitor is an example
of __________devices
Output
Input
Processing
None of the given
choices
The code in the
________ portion is the right choice for developing larger JavaScript scripts
Body
At End
Head
Separate
____________________
based on the principles of the logical reasoning ability of humans.
Genetic Algorithms
Rule-based
Systems
Feed-Forward Network
None of these
The key benefit of
VPNs over conventional PNs is:
Security
Efficiency
Lower
Cost
None of the given
choices
Post a Comment
Don't Forget To Join My FB Group VU Vicky
THANK YOU :)