onFocus executes the specified JavaScript code when ___________
            a window receives focus
            a form element receives input focus
            a window receives focus or when a form element receives input focus
            None of the Given.

CERN releases WWW in:
1992
1993
1994
None of the given choices

Communications on the internet is controlled by a set of two protocols, named :
            HTTP & SMTP
            FTP & TELNET

            TCP & IP
            None of the given choices
One of the disadvantages of working at home is________________
            Family life may be happier because of living at home.
            Family life may suffer as well, as some never turn off, and keep on working through out the day, evening and night
            Family life may become happier because he can give more time to his family.
            There is no disadvantage of working at home.

The greatest, shared resource of information created by humankind is:
            Web
            Dictionary
            Vocabulary
            Glossary



There are _____________ types communication channels.
            2
            3
            4
            5

The Cyberwarefare is a ______
            Crime
            War
            Software
            Game

In the statement “PopUp(“Message”)” :
            “PopUp” is the function Name, “Message” is the argument
            “Message” is function identifier
            Syntax Error: functions cannot be called in this way
            Error: function is undefined

RGB scheme stands for _________________________________.
            Red Grey Blue
            Red Green Brown
            Red Green Blue
            Red Green Black

_____________ is the part of the virus that generally consists of malicious computer instructions
            Off load
            Payload
            Loader
            Transmitter

Unlike viruses, __________________ are stand-alone programs
            Trojan horses
            Logic- or time-bombs
            Worms
            None of the given

Voice over IP has _____ modes

            2
            3
            4
            5

We use __________ to stop Break-Ins.
            Scanners
            Intrusion detectors
            Firewalls
            Intrusion detectors and Firewalls

Which one can lead user to leave your website?
            Simple design
            Poor navigation
            Information layout
            Adaptable design

_____________________ are the subcategories of AI
            Expert Systems
            Robotics
            Natural Language Processing
            All of the above

With the Help of FTP we can:

            List, change, create folders on a remote computer
            Upload and download files
            Transferring Web content from the developer’s PC to the Web server
            All of the given choices

Which protocol is used for receiving E-mail messages?
            FTP
            POP
            Telnet Protocol
            SMTP

The organizations are learning that business can be done in a more effective manner if emphasis is placed upon ______________.
            Cooperation
            Shared responsibility
            Networking
            All of the given

___ is used to transfer files between computers on a TCP/IP network
FTP
POP
Telnet Protocol
SMTP

 
Which of the following is True about “pareseFloat(String)” function: I) If the first character cannot be converted to a number, parseFloat returns NaN. II) it returns the fractional portion of floating point number. III) Parses the string argument; returns a FP number. IV) Non of given options.
            I and II Only
            II and III Only
            I and III Only
            IV Only

Event-driven programs can ____________________ events.
            capture
            respond
            capture and respond
            None of the Given.

Which of the statements is NOT true about “Color Usage Guidelines” for developing a presentation?
            Use color sparingly to to highlight a point, but don't get carried away
            Do not use colors like yellow or red for background except where needed.
            Do not use colors like green, blue and such like colors except where needed.
            None of given options

_________________ Type of databases management systems are supporting Terabytes of Data
            Personal
            Desktop
            Enterprise
            Single-user

Because of the ever-decreasing costs of verbal, text, video communications; the distances have _________
            Increased
            Expanded
            Contracted
            Lengthened

The structure of the networked organization is _________.
            Simple
            Flexible
            Complex
            All of the given

A CAD drawing consist of many geometric shapes like straight lines , arc , tc and therefore is stored in a ___________ format.
            Scalar
            Vector
            Both a & b
____ is a type of computer-to-computer messaging.
            TCP
            Telnet
            E-mail
            FTP


            None of these

RDBMS stands for ________________________________
            Relative Data Base Management System
            Relational Data Base Management System
            Recursive Data Base Management System
            Responsible Data Base Management System

Using Color Mapping scheme only a limited number of color called _____________ are allowed.
            Reserved
            Pointers
            Platelet
            None of these

Using _________ topology, adding new nodes is difficult.
            Ring
            Bus
            Star
            None of the given choices

Problems with old presentation methods was (transparencies and projectors etc):
            They were costly
            Electronic transmission, in some cases, was not easy
            Presentation some times gets ambiguous
            All of given options

ARPANET splits into two nets to keep military & non-military network sites separate, named :

            ARPANET & MILNET
            MICRONET & MILNET
            PICONET & ARPANET
            None of the given choices

Arguments values are passed to the function _________
            by value
            by reference
            Both a & b
            Non of the Given.

__________________ is a field that uniquely identifies each record stored in a table.
            Primary Key
            Foreign Key
            Secondary key
            Special Key

The IP address consists of _____ bits
            64
            32
            16
            128

Credit Card Fraud can be minimized by using _________________
            single credit card numbers
            multiple-use credit card numbers
            single-use credit card numbers
            Firewalls

hotWeather = (Temperature == 40); in the above statement, the variable hotWeather is of type
            Number
            String
            Boolean
            None of the given



NCSA stands for :
            NationalCenter for Supercomputing Applications
            NationalCenter for Supreme Applications
            NationalCenter for Super Authority
            None of the given choices

Self-replicating SW that eludes detection and is designed to attach itself to other files is called _____________.
            Trojans
            Viruses
            Sniffers
            Operating System

SVG stands for _________________________________________.
            Structured Vector Graphics
            Software Vector Graphics
            Structured Visual Graphics
            None of these

Viruses move from one computer to another with the __________ and spring into action when the _____________ is executed or opened
            Host – Host
            Host – Client
            Client – Host
            Client – Client



____________________ is a layered structure consisting of a number of homogenous and simple processing elements.
            Genetic Algorithms
            Rule-based Systems
            Feed-Forward Network
            None of these

A property that gives the value of Pi is:
            PI()
            Graph.PI
            Math.PI
            Math.PI()

The smallest image forming element on a computer display is called ____________.
            Resolution
            Pixel
            Grey area
            None of these

SMTP stands for _______________________________________.
            Simple Mail Transfer Protocol
            Simple Mail Transparent Protocol
            Simple Mail Transfer Paradigm
            None of these

________________ network allows data to be sent directly from one computer to another.
            Ring
            Bus
            Star
            None of the given choices

Viruses attach themselves to other computer programs or data files, are known as____
            Trojans
            Guests
            Hosts
            Spies
 Avoid __________ to ensure readability of web page

            Overuse of bold and italics
            Use of paragraphs
            Use of white space
            Use of contrast colors

STP stands for :
            Shielded Twisted Pair
            Silver Twisted Pair
            Single Twisted Pair
            None of the given choices

In ______, the spies of one business monitors the network traffic of their competitors.
            Industrial intelligence
            Industrial Espionage
            Industrial spying
            Industrial surveillance

Color mapping scheme reducing the size of 2.25 MB graphic to _________ MB.
            0.90 MB
            0.75 MB
            1.00 MB
            None of these

The functions which call themselves from their (own) body are called:
            Virtual functions
            Abstract functions
            Overriding functions
            Recursive functions

Browser sends ‘_________’ request to web server to access a file.
            SET
            GET
            TRANSFER
            All of the given choices
 
The internet communities are ___________.

            Geographical based
            Interest based
            Country based
            Religion based

Infection propagation and Actual destructive are the components of _______________
            Transmission mechanism
            Payload
            Worms
            Trojan Horse

Post a Comment

Don't Forget To Join My FB Group VU Vicky
THANK YOU :)

Previous Post Next Post