onFocus executes the
specified JavaScript code when ___________
a window receives focus
a form element receives input focus
a window receives focus or when a form element receives input focus
None of the Given.
CERN releases WWW in:
1992
1993
1994
None of the given
choices
Communications on the
internet is controlled by a set of two protocols, named :
HTTP & SMTP
FTP & TELNET
TCP & IP
None of the given choices
One of the
disadvantages of working at home is________________
Family life may be happier because of living at home.
Family life may suffer as well, as some never turn off, and keep on working through out the day, evening and night
Family life may suffer as well, as some never turn off, and keep on working through out the day, evening and night
Family life may become happier because he can give more time to his family.
There is no disadvantage of working at home.
The greatest, shared
resource of information created by humankind is:
Web
Dictionary
Vocabulary
Glossary
There are
_____________ types communication channels.
2
3
4
5
The Cyberwarefare is a
______
Crime
War
Software
Game
In the statement
“PopUp(“Message”)” :
“PopUp” is the function Name, “Message” is the
argument
“Message” is function identifier
Syntax Error: functions cannot be called in this way
Error: function is undefined
RGB scheme stands for
_________________________________.
Red Grey Blue
Red Green Brown
Red Green Blue
Red Green Black
_____________ is the
part of the virus that generally consists of malicious computer instructions
Off load
Payload
Loader
Transmitter
Unlike viruses,
__________________ are stand-alone programs
Trojan horses
Logic- or time-bombs
Worms
None of the given
Voice over IP has
_____ modes
2
3
4
5
We use __________ to
stop Break-Ins.
Scanners
Intrusion detectors
Firewalls
Intrusion detectors and Firewalls
Which one can lead
user to leave your website?
Simple design
Poor navigation
Information layout
Adaptable design
_____________________
are the subcategories of AI
Expert Systems
Robotics
Natural Language Processing
All of the above
With the Help of FTP
we can:
List, change, create folders on a remote computer
Upload and download files
Transferring Web content from the developer’s PC to the Web server
All of the given choices
Which protocol is used
for receiving E-mail messages?
FTP
POP
Telnet Protocol
SMTP
The organizations are
learning that business can be done in a more effective manner if emphasis is
placed upon ______________.
Cooperation
Shared responsibility
Networking
All of the given
___ is used to
transfer files between computers on a TCP/IP network
FTP
POP
Telnet Protocol
SMTP
Which of the following
is True about “pareseFloat(String)” function: I) If the first character cannot
be converted to a number, parseFloat returns NaN. II) it returns the
fractional portion of floating point number. III) Parses the string argument; returns
a FP number. IV) Non of given options.
I and II Only
II and III Only
I and III Only
IV Only
Event-driven programs
can ____________________ events.
capture
respond
capture and respond
None of the Given.
Which of the
statements is NOT true about “Color Usage Guidelines” for developing a
presentation?
Use color sparingly to to highlight a point, but don't get carried away
Do not use colors like yellow or red for background except where needed.
Do not use colors like green, blue and such like
colors except where needed.
None of given options
_________________ Type
of databases management systems are supporting Terabytes of Data
Personal
Desktop
Enterprise
Single-user
Because of the
ever-decreasing costs of verbal, text, video communications; the distances have
_________
Increased
Expanded
Contracted
Lengthened
The structure of the
networked organization is _________.
Simple
Flexible
Complex
All of the given
A CAD drawing consist
of many geometric shapes like straight lines , arc , tc and therefore is stored
in a ___________ format.
Scalar
Vector
Both a & b
____ is a type of
computer-to-computer messaging.
TCP
Telnet
E-mail
FTP
None of these
RDBMS stands for
________________________________
Relative Data Base Management System
Relational Data Base Management System
Recursive Data Base Management System
Responsible Data Base Management System
Using Color Mapping
scheme only a limited number of color called _____________ are allowed.
Reserved
Pointers
Platelet
None of these
Using _________
topology, adding new nodes is difficult.
Ring
Bus
Star
None of the given choices
Problems with old
presentation methods was (transparencies and projectors etc):
They were costly
Electronic transmission, in some cases, was not easy
Presentation some times gets ambiguous
All of given options
ARPANET splits into
two nets to keep military & non-military network sites separate, named :
ARPANET & MILNET
MICRONET & MILNET
PICONET & ARPANET
None of the given choices
Arguments values are
passed to the function _________
by value
by reference
Both a & b
Non of the Given.
__________________ is
a field that uniquely identifies each record stored in a table.
Primary Key
Foreign Key
Secondary key
Special Key
The IP address
consists of _____ bits
64
32
16
128
Credit Card Fraud can
be minimized by using _________________
single credit card numbers
multiple-use credit card numbers
single-use credit card numbers
Firewalls
hotWeather =
(Temperature == 40); in the above statement, the variable hotWeather is of type
Number
String
Boolean
None of the given
NCSA stands for :
NationalCenter for Supercomputing Applications
NationalCenter for
Supreme Applications
NationalCenter for
Super Authority
None of the given choices
Self-replicating SW
that eludes detection and is designed to attach itself to other files is called
_____________.
Trojans
Viruses
Sniffers
Operating System
SVG stands for
_________________________________________.
Structured Vector Graphics
Software Vector Graphics
Structured Visual Graphics
None of these
Viruses move from one
computer to another with the __________ and spring into action when the
_____________ is executed or opened
Host – Host
Host – Client
Client – Host
Client – Client
____________________
is a layered structure consisting of a number of homogenous and simple
processing elements.
Genetic Algorithms
Rule-based Systems
Feed-Forward Network
None of these
A property that gives
the value of Pi is:
PI()
Graph.PI
Math.PI
Math.PI()
The smallest image
forming element on a computer display is called ____________.
Resolution
Pixel
Grey area
None of these
SMTP stands for
_______________________________________.
Simple Mail Transfer Protocol
Simple Mail Transparent Protocol
Simple Mail Transfer Paradigm
None of these
________________
network allows data to be sent directly from one computer to another.
Ring
Bus
Star
None of the given choices
Viruses attach
themselves to other computer programs or data files, are known as____
Trojans
Guests
Hosts
Spies
Avoid __________ to ensure readability of web
page
Overuse of bold and italics
Use of paragraphs
Use of white space
Use of contrast colors
STP stands for :
Shielded Twisted Pair
Silver Twisted Pair
Single Twisted Pair
None of the given choices
In ______, the spies
of one business monitors the network traffic of their competitors.
Industrial intelligence
Industrial Espionage
Industrial spying
Industrial surveillance
Color mapping scheme
reducing the size of 2.25 MB graphic to _________ MB.
0.90 MB
0.75 MB
1.00 MB
None of these
The functions which
call themselves from their (own) body are called:
Virtual functions
Abstract functions
Overriding functions
Recursive functions
Browser sends
‘_________’ request to web server to access a file.
SET
GET
TRANSFER
All of the given choices
The internet communities are ___________.
Geographical based
Interest based
Country based
Religion based
Infection propagation
and Actual destructive are the components of _______________
Transmission mechanism
Payload
Worms
Trojan Horse
Post a Comment
Don't Forget To Join My FB Group VU Vicky
THANK YOU :)