An algorithm that always takes the best immediate or local solution while finding an answer is called____.
Deterministic Algorithm
Non deterministic Algorithm
Greedy Algorithm
Randomized Algorithm
 

Which of the following command allows you to recover form mistakes in MS Word?
Clear
Description: http://c.statcounter.com/5369472/0/31a72d6d/1/
Edit
Undo
Break
A ____________ operating system allows many users to take advantage of the computer's resources, simultaneously

          Single user
Multi- user
Single tasking
Multi tasking
 
Network Interface Card is an __________ device
Input
Output
Input/Output
Storage

 The decimal equivalent of binary 1000 is
7
8
9
10
  

Which of the following is NOT RDBMS software?
 My Sql
MS Excel
Oracle
SQL Server
A computer virus is a
Software that saves the computer from being damaged.
Application software that helps to make different type of viruses and worms
Program that spreads itself and destroys other program
Program that corrects the problems in your computer






What will be the result of a?

a = Math.abs(-23)


 23
 -23
 23.0
 2.3
   

A Special program required to view swf (Shockwave Flash) files in web Browser is called



 TFlash

Vflash

plug-in

None of the given options


 Using Java Script you can write a character at random location on screen

       By applying randomCh() method
       With the help of String object
       With the help of random character property
        There is no built in approach in Java Script
   

 If incorrectly we enter the negative age it is check by

        Limit Integrity
       Type Integrity
       Referential Integrity
       Physical Integrity
   

  Which protocol is use to transfer a file over the network?


       UDP
        FTP
       TCP
       OSI
   

 One can send an email message to a remote computer using _______ protocol

       HTTP
       SMTP
       FTP
        TELNET
    

 In a System having many parts to be designed, one should always do the _____ first

        Hard part
       Simple part
       Development part
       Quality part
   

 Flow control constructs in JavaScript includes:


       If-Else
       Loops and If -Else
        Switch and If-Else
        All of the given choices
   

 ___ provides a simple, consistent way for applications to interact with the HW without having to know all the details of the HW


       Explorer.exe
       System Files
        Operating System
       Application Software
   

 Machine language is also called


       Assembly Language
       Binary Language
        High Level Language
       HTML Language
   

 _________ is the best known builder for supercomputers.


       Sun
        Cray Research
        Microsoft
       Apple
    

 The weaknesses of the computer are:


       Pattern recognition & Storage
       Speed & Innovative ideas

        Pattern recognition & Innovative ideas
       Speed & Storage
   

 Communication protocol is a __________that governs the flow of information over a network

       Set of methods
       Set of protocols
        Set of rules
       Device
   

 _____________ team is responsible for the maintenance, expansion , improvement of the infrastructure consisting of workstations, networking equipment, software and network security.

        Support
       Configuration Management
       Quality Assurance
       Developer
    

 _____________ team consists on the sharpest technical minds in the company.


        Architecture
       Business Development
       Configuration Management
       Developer
   

 _______________ is responsible for day to day operations.


       CEO
        COO
       CMSO
       Developer
     

 One of the key responsibilities of the ___________ is client relationship management.


        Project Manager
       Team Lead
       Developer
       Quality Assurance Engineer
   

 What is the major problem with flash based website?

        Its two heavy
        Cannot be indexed
       Less attractive
       Inaccessible
   

 Which of the following is NOT an event handler for image object?


       onAbort
       onError
       onLoad
        onUser
   

 The organizations are learning that business can be done in a more effective manner if emphasis is placed upon ___________.

       Cooperation
       Shared responsibility
       Networking
        All of the given options



a = Math.abs(-23)

What will be the value of a ?


        23
        -23
       23.0
       2.3
   

 ERP is a type of __________________ .
       Entertainment software
       Productivity software
        Business software
       Scientific software
   

In Genetic Algorithm the most important thing you should know, is the ___________.

       Procedure
        Recognition of a good solution
       Different techniques
       None of the given options
   

 According to a popular heuristic, success is defined by ___________.


        The user
       The builder
       Both user and builder
       None of the given options
    

 Rule of thumb learned through trial and error is called ___________.


       Design
        Heuristic
       Plan
       Aim
   

 JavaScript Variables are ____________.



       Dynamically Typed
       Statically Typed
       Strong Typed
       None of the given options
   

 Which of the following application are collections of cells?

       Word
        Excel
       PowerPoint
       Outlook Express
    

 The browser breaks down the URL into ________ parts.

       2
        3
       4
       5
   

 A named collection of properties (data, state) and methods (instruction, behavior) is called ____________.


       Array
       Function
       Variable
        Object
   

 First computer network was ___________.


       NSFNET
       FIRSTNET
        ARPANET
       ORPHANET
   

In JavaScript, a variable declaration is

 Optional
Mandatory
Not allowed
None of the given

A protocol used for receiving email messages is called ____________. 

URL
Telnet
 POP3
SMTP

which one is correct?

 onUnload

onUnLoad

onUNLOAD

All of the above


Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called __________. 


 Loop
 Sequence
Condition
Array 

Variables allow us to manipulate data through the ___________. 


 
Actual Value
 Reference
Length
Name

Fuzzy logic is based on ____________. 

Ground facts
Experience
Practice
 Approximation
  
 

Word Processor is a _________________ 


System Software
 Application Software
Device
Utility

In the old days, databases did NOT support ____________. 
 
 Number
Boolean
 Video
Text

In tabular storage, fields placed in a particular row are strongly ___________. 



 
Independent
Dependent
 Interrelated
Inconsistent

Due to working at home, lack of interaction may result in ___________ professional growth. 


 Slower
 Faster
Higher
Improved

Distance learning has got a boost due to the ___________.
 
Easy communication
Online interactive contents
Flexibility
 All of the given options

_____________ technique can be used to create smooth animations or to display one of several images based on the requirement. 


 
Image downloading
 Image preloading
Image uploading
Image postloading

The ____________ is becoming the preferred organizational structure for more and more organizations with the passage of time.


 
Tree structured organizational model
 Network paradigm
Hierarchical structure
None of the given options

The group of technologies concerned with the capturing, processing and transmission of information in the digital electronic form is called

_____________. 


Telecom Engineering
Computer Engineering
Computer Science
 Information Technology

A large number of networks interconnected physically is called ______ 

 
LAN
MAN
 Internet
Network collection

TCP stands for ________.

 
Transfer Center protocol
 Transmission Control Protocol
Transmission Center Protocol
Telephone Center Protocol

A collection of data organized in such a way that the computer can quickly search for a desired data item is known as :
 
Retrieving
 Database
Information
 DBMS
 
 

______ is simply a fast port that lets you connect computer peripherals and consumer electronics to your computer without restart. 


 
Freeware
Shareware
 Firewire
Firmware

Structures, in which another list starts before the first list is finished, are called: 

Multiple Lists
Nested Lists
Ordered Lists
Un-ordered Lists
  
 

The key property of the ‘Array’ object in JavaScript is 



 
Value
 Length
Name
All of the given choices

Which one is the example of spreadsheet software ? 


MS Word
MS PowerPoint
 MS Excel
MS Access

The Encryption of data is related to 


 
Data updates
Data security
Data integrity
Data accessibility

_____ is the process of analyzing large databases to identify patterns. 


 
Data normalization
Data management
 Data Mining
None of the given options

Which is the user-friendly way of presenting data ? 

 
Query
Form
 Report
 All of the given options

<form> Tags always placed between the <BODY> and </BODY> tags of a Web page 

 True
False 

Java script has ----------------- ability to create and draw graphics.

Limited
Versatile
Medium
  Not at all 


 Which of the following is incorrect for making design elements legible?

Select correct option:



Elements should be large enough


Elements must contrast sufficiently


Related elements should be visually grouped

Elements should have no visual focus



 Function is also known as ______________.

Select correct option:


subprogram

procedure


subroutine


All of given




In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET.



Select correct option:


1973

1983

1972


None of the given choices




E-mail system has ______ component(s)

Select correct option:




E-mail client


SMTP server


POP3 server

All of the given choices



_______ / / /______/ A Parallelogram (Tilted rectangle) represents the ________________ flow chart element.

Select correct option:

Process

Input or Output

Decision


Connector


 If a computer could pass the Turing test then it would be able to:

Select correct option:
   

win a million dollar prize

think like human begins

think but slower than humans


do the things faster




Punched cards were replaced by:

Select correct option:



Floppy Disk


Zip Drives

Magnetic storage

None of the given choices




vuzs

The ________virus may display an annoying, but harmless message

Select correct option:



Malicious

Neutral

Helpful


DoS




The name of very first computer was:

Select correct option:




ABC


BCD


EDC

None of the given choices




The internet communities are ___________.

Select correct option:



Geographical based

Interest based

Country based


Religion based





which one is correct?

 onUnload

onUnLoad

onUNLOAD

All of the above


Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called __________. 


 Loop
 Sequence
Condition
Array 

Variables allow us to manipulate data through the ___________. 


 
Actual Value
 Reference
Length
Name

Fuzzy logic is based on ____________. 


Ground facts
Experience
Practice
 Approximation

Word Processor is a _________________ 

System Software
 Application Software
Device
Utility

In the old days, databases did NOT support ____________. 


 
Number
Boolean
 Video
Text

In tabular storage, fields placed in a particular row are strongly ___________. 


 
Independent
Dependent
 Interrelated
Inconsistent

Due to working at home, lack of interaction may result in ___________ professional growth. 


 Slower
 Faster
Higher
Improved

Distance learning has got a boost due to the ___________.
 
Easy communication
Online interactive contents
Flexibility
 All of the given options

_____________ technique can be used to create smooth animations or to display one of several images based on the requirement. 


 
Image downloading
 Image preloading
Image uploading
Image postloading

The ____________ is becoming the preferred organizational structure for more and more organizations with the passage of time.


 
Tree structured organizational model
 Network paradigm
Hierarchical structure
None of the given options

The group of technologies concerned with the capturing, processing and transmission of information in the digital electronic form is called

_____________. 


Telecom Engineering
Computer Engineering
Computer Science
 Information Technology

A large number of networks interconnected physically is called ______ 

 
LAN
MAN
 Internet
Network collection

TCP stands for ________.

 
Transfer Center protocol
 Transmission Control Protocol
Transmission Center Protocol
Telephone Center Protocol

A collection of data organized in such a way that the computer can quickly search for a desired data item is known as :
 
Retrieving
 Database
Information
 DBMS 
  

______ is simply a fast port that lets you connect computer peripherals and consumer electronics to your computer without restart. 
 Freeware 
Shareware
 Firewire
Firmware

Structures, in which another list starts before the first list is finished, are called: 


Multiple Lists
Nested Lists
Ordered Lists
Un-ordered Lists

The key property of the ‘Array’ object in JavaScript is 


 
Value
 Length
Name
All of the given choices

Which one is the example of spreadsheet software ? 


MS Word
MS PowerPoint
 MS Excel
MS Access
 


_____ is the process of analyzing large databases to identify patterns. 


 
Data normalization
Data management
 Data Mining
None of the given options

Which is the user-friendly way of presenting data ? 


 
Query
Form
 Report
 All of the given options

JavaScript function fixed() has equivalent HTML tag-set ____ 


<.FIX>……………</FIX>
<F>………………..</F>
<PRE>………….</PRE>
<H>………………..</H>

<form> Tags always placed between the <BODY> and </BODY> tags of a Web page 

 True
False 

Java script has ----------------- ability to create and draw graphics.

Limited
Versatile
Medium
  Not at all 

Internet is an example of ______________ network. 




Private

Public

Both Private and Public


None of the given choices





The name of first commercially available PC was: 



UNIVAC 1

ENIAC 

EDVAC 

Altair 8800





Algorithm is a ____________________ 




Definition of a problem

Sequence of steps to solve a problem

Understanding of a problem


Solving a problem




A group of information is called __________________ 




File


Database

Record

Field





___________________ is a branch of computer science concerned with manipulating and enhancing computer graphics. 




Image Handling

Image Processing

Image Engineering


None of these





__________has changed our way of life like no other technology. 




Computational technology

Computer technology

Computing technology


None of the Above





Sophisticated event handling is not possible with _______________ event handling 




Off-Line

In-Line

Out-Line


Non of the given choices




Babbage’s Analytical Engine could store information permanently in: 



Magnetic Tape


Floppy Disk

Punched Cards

None of the given choices





There are __________ popular schemes to reduce the number of bytes that are required for storing graphics. 




4




2 


None of these 





The internet-society is considered under Surveillance because: 




While surfing, we are being watched, constantly


Our every click is recorded and analyzed to extract patterns and behaviors


Webcams are becoming common. Providing a cheap way for parents to watch their children's every move


All of the given




  


URL is a/an ________

       Device


       Component


        Address

       Tool


   


To improve the time for scanning a web page, text should be ___________.

       Centered


       Left Aligned


       Right Aligned


       Staggered




Communications on the internet is controlled by a set of two protocols which are ____________.

       IMAP and SMTP





       FTP and HTTP





        TCP and IP




       TCP and HTTP




     

FTP stands for __________.

       File transmission protocol


       File transmission path


        File transfer protocol

       Fine transfer path


   


A named collection of properties (data, state) and methods (instruction, behavior) is called ____________.

       Array


       Function


       Variable


        Object

   


Anchor tag denoted by <A> is used to create 

       Address


       Hyperlink


        Paragraph

       Title


   


<UL> tag is used to

       underline text


       end the line


       create ordered list


        create unordered list

   


A user may access any item on the web through __________.

        URL

       Telnet


       POP


       SMTP


   


The browser breaks down the URL into ________ parts.

       2


        3

       4


       5


   


Which one of the following is NOT a primary color?

        Red


       Green


        Yellow

       Blue


   


According to a popular heuristic, success is defined by ___________.

        The user

       The builder


       Both user and builder


       None of the given options


   


The idea of Neural Networks field is based upon ______________.

       Human nature


        Human brain

       Human culture


       Human actions


   

ERP is a type of __________________ .
       Entertainment software
       Productivity software
        Business software
       Scientific software

   


__________ are those programs in which the flow of the program is determined by the user's actions (mouse clicks, key presses) or messages from other programs.



       Event called programs


       Event processed programs


        Event driven programs

       Event declared programs


   


Automatic machines performing various tasks that were previously done by humans, are called ____________.




        Robotics

       Computers


       Decision Making Systems


       Autonomous Web Agents


   


country=”Hello Pakistan”;

document.write(country.charAt(6));



The out put of the above statement is _____________.

       o


        P

       a


       k


   


The distance among families is ___________ because of spending more time on internet.




        Increased

       Expanded


       Contracted


       Decreased


   

The software used for the scanning of internet severs, is called __________.




       Wscan


       Mscan


        Sscan

       Vscan


    


Adding images to html page, we use___________ tag.




        <IMG>

       <IMAGE>


       <PICTURE>


       <PIC>


   


The group of technologies concerned with the capturing, processing and transmission of information in the digital electronic form is called _____________.




       Telecom Engineering


       Computer Engineering


       Computer Science


        Information Technology

   


The responsibilities of the Team Lead includes_____________.




       Planning and tracking of the project


       Detailed design


       Professional development of team members


        All of the given options

   


When the packets reach at destination, __________ reassembles them into original message.




       Protocol


        TCP

       IP


       NIC


   


Many developers write the _________ first and then incrementally convert each line into _________.




        Real code & Pseudo code

        Pseudo code & Real code

       Real code & Artificial code


       None of the given options


   

Machine language is also called




       Assembly Language


       Binary Language


        High Level Language

       HTML Language


   


In JavaScript, second element of an array has the index:




       2


       0


        1

       3


    Each element in an array is given an index, which is an integer value between 0 and one less than the length of the array. The first element has an index of 0, the second element has an index of 1, and so on.




One can download or upload files to a remote computer using ________ protocol.



       HTTP


       SMTP


        FTP

       TELNET


   


JavaScript ________ support drawing of graphics



       Does


        Does not

       Always


       At times


 Which of the following is NOT true about modern computers?



       More powerful


       Smaller in size


       Consume less energy


        Costly

   


Ada written a computer programme for ?




        Analytical Engine
        Difference Engine
        Harvard Mark 1
        Mechanical engine
   

A set of stand alone productivity applications designed to work together known as ______________ .



        Productivity software suite
       Compiled software
       Secure software
       Intelligent software


Because of spending more time on the internet, the distances among the families have been _____.



Increased
Expanded
Contracted
Shortened


Sophisticated event handling is not possible with _______________ event handling

Off-Line

In-Line

Out-Line


Non of the given choices

   

Autonomous Web Agents are also known as _________________
Mobile Agents 
Softbots 
Both "Mobile Agents" & "Softbots" 
None of these
 
A communication protocol is a __________that governs the flow of information over a network.
Set of Methods 
Set of Protocols 
Set of rules 
None of the given choices
 
By default in a web page Hyper Link for another web page is represented as:
Blue only 
Black and Underlined 
Blue and Bold 
Blue and Underlined

The organizations are learning that business can be done in a more effective manner if emphasis is placed upon ______________.
Cooperation 
Shared responsibility 
Networking 
All of the given
Monitor is an example of __________devices
Output
Input  
Processing 
None of the given choices

The code in the ________ portion is the right choice for developing larger JavaScript scripts
Body 
At End 
Head 
Separate
____________________ based on the principles of the logical reasoning ability of humans.

Genetic Algorithms 
Rule-based Systems 
Feed-Forward Network
None of these
 
The key benefit of VPNs over conventional PNs is:
Security 
Efficiency 
Lower Cost
None of the given choices

Post a Comment

Don't Forget To Join My FB Group VU Vicky
THANK YOU :)

Previous Post Next Post