We are Permanently Move to vupk.net Please Join us there.

CS101 Final term Paper Solved 2010 - 4

FINALTERM  EXAMINATION
Spring 2010
CS101- Introduction to Computing

Time: 90 min
 
Marks = M = 58

CS101 - Introduction to Computing - Q.No. 1      ( M - 1 ) http://vuzs.net
 
In a good presentation each slide should contain____________.
       Heading
       Phrases not sentences
       Sentences not phrases
       Heading, sentences not phrases

CS101 - Introduction to Computing - Q.No. 2      ( M - 1 ) http://vuzs.net
 
Which one of the following is not an event handler's attribute?
       Function
       Identifier
       Equal sign
       String consisting of JavaScript statements

CS101 - Introduction to Computing - Q.No. 3      ( M - 1 ) http://vuzs.net
 
According to the heuristic, the number of defects remaining in a system after a given level of tests is proportional to ___________.
       The number found on very first day.
       The number found during the development.
       The number found during the test.
       None of the given options.

CS101 - Introduction to Computing - Q.No. 4      ( M - 1 ) http://vuzs.net
 
Which one is the best option for designing a Medical Expert System?
       Rule Based System
       Genetic Algorithm
       Fuzzy Logic
       Neural Network

CS101 - Introduction to Computing - Q.No. 5      ( M - 1 ) http://vuzs.net
 
A combination of word processing and graphic design is
       Corel Draw
       Desktop Publishing
       Paint
       WordPad

CS101 - Introduction to Computing - Q.No. 6      ( M - 1 ) http://vuzs.net
 
A microprocessor can be made more powerful by increasing its ________
       Clock frequency
       Word length
       Clock frequency and Word length
       None of above

CS101 - Introduction to Computing - Q.No. 7      ( M - 1 ) http://vuzs.net
 
Security can also be improved through _____________.
       Encryption
       Typing errors
       Transmission errors
       Hardware malfunctions

CS101 - Introduction to Computing - Q.No. 8      ( M - 1 ) http://vuzs.net
 
______________ is a field that uniquely identifies each record stored in a table.
       Composite Key
       Primary key
       Foreign key
       None of the given options

CS101 - Introduction to Computing - Q.No. 9      ( M - 1 ) http://vuzs.net
 
There are _________ types of errors.
       2
       3
       4
       5

CS101 - Introduction to Computing - Q.No. 10      ( M - 1 ) http://vuzs.net
 
______ is simply a fast port that lets you connect computer peripherals and consumer electronics to your computer without restart.
       Freeware
       Shareware
       Firewire
       Firmware

CS101 - Introduction to Computing - Q.No. 11      ( M - 1 ) http://vuzs.net
 
___ provides a simple, consistent way for applications to interact with the HW without having to know all the details of the HW
       Explorer.exe
       System Files
       Operating System
       Application Software

CS101 - Introduction to Computing - Q.No. 12      ( M - 1 ) http://vuzs.net
 
One can browse documents residing on a remote computer using ________ protocol.
       HTTP
       SMTP
       FTP
       TELNET

CS101 - Introduction to Computing - Q.No. 13      ( M - 1 ) http://vuzs.net
 
Which event handler executes the specified JavaScript code when a window/form element loses focus ?
       onBlur
       onLoad
       onUnload
       onFocus

CS101 - Introduction to Computing - Q.No. 14      ( M - 1 ) http://vuzs.net
 
Which event handler executes the specified JavaScript code when a window/form element receives focus ?
       onBlur
       onLoad
       onUnload
       onFocus

CS101 - Introduction to Computing - Q.No. 15      ( M - 1 ) http://vuzs.net
 
_____________ loop is a flow control statement that allows code to be executed repeatedly based on a given Boolean condition.
       For
       Do-While
       If-else
       While

CS101 - Introduction to Computing - Q.No. 16      ( M - 1 ) http://vuzs.net
   
A B C D
4 ABC003 65 =c4=c4
 

Expression format in cell D4 is NOT correct.
       True
       False

CS101 - Introduction to Computing - Q.No. 17      ( M - 1 ) http://vuzs.net
 
for(var i=1; i<=2;i=i+1)                                           
{
document.write( "Sorted Words:" + "
" )

}
Which of the following shall be the output of above code:
       Sorted Words: Sorted Words:
       Sorted Words:
Sorted Words:

              Sorted Words: “

       Sorted Words: “

       Sorted Words:

CS101 - Introduction to Computing - Q.No. 18      ( M - 1 ) http://vuzs.net
 
Data integrity, in Database management system is necessary because it:
       Refers to provide insecurity to the data
       Refers to provide security to the data
       Refers to maintaining the correctness of data
       Refers to maintaining the consistency of the data

CS101 - Introduction to Computing - Q.No. 19      ( M - 1 ) http://vuzs.net
 
Which of the following formula is used in spreadsheet for addition?
       C6+E6
       =C6+E6
       6+6=12
       6+E6

CS101 - Introduction to Computing - Q.No. 20      ( M - 1 ) http://vuzs.net
 
Which of the following keyword is used to jump out of switch statement as soon as the match is found?
       Default
       Else
       Jump
       Break

CS101 - Introduction to Computing - Q.No. 21      ( M - 1 ) http://vuzs.net
 
How many types the string methods have?
       1
       2
       3

CS101 - Introduction to Computing - Q.No. 22      ( M - 1 ) http://vuzs.net
 
Which Internet Service is comparatively Slow but Inexpensive and Fast.
       E-mail
       Instant Messaging
       Web
       None of the given

CS101 - Introduction to Computing - Q.No. 23      ( M - 1 ) http://vuzs.net
 
Semantic web is ________ .
       The extension of web
       Designed for both human beings and computers
       The extension of web and Designed for both human beings and computers
       None of the given

CS101 - Introduction to Computing - Q.No. 24      ( M - 1 ) http://vuzs.net
 
Coding is the responsibility of ________________
       Software designer
       Software developer
       Project manager
       None of given

CS101 - Introduction to Computing - Q.No. 25      ( M - 1 ) http://vuzs.net
 
Run time error occurs when ___________ .
       The complier compiles the programs
       The compiler ends the execution of the program
       The compiler start running the program
       The compiler finds a semantic error

CS101 - Introduction to Computing - Q.No. 26      ( M - 1 ) http://vuzs.net
 
Heuristics are ________ .
       Intelligent systems
       Always ends with the solution of the problem
       Both of the given
       None of the given

CS101 - Introduction to Computing - Q.No. 27      ( M - 2 )
 
What are application softwares? List down the names of three application softwares.
Definition: Application Software are that software then can interact directory with the user for performance of respective type of work.
Following are the types of Application Softwares:-
·        AutoCAD and Corel Draw
·        Business Software
·        Productivity SW
·        Games Software
 
CS101 - Introduction to Computing - Q.No. 28      ( M - 2 )
 
Why Local variable is preferred over Global variable ?
In my point of view Global variable has some advantage with Local variables is preferred due to the following reasons:-
When we declare any global variable in web page then in case of error and logic it’s very difficult to see on which line this variable is used and what’s his value if we have more than 2000 lines and all the functions in web page using that Global Variable so Global variables can make the logic of a Web page difficult to understand.
As we know we can use Global variable everywhere so Global variables also make the reuse and maintenance of your code much more complex.
CS101 - Introduction to Computing - Q.No. 29      ( M - 2 )
 
In JavaScript, what is event handling? What are the two types of events
In java script we can capture events on do some operation on the basis of that particular event. For example we want to load some data on web page then with the help of event handling we can do this operation by using onLoad event.
We can put Event handlers in the body of web page and also in attributes of HTML. From the attribute we can call any JavaScript function that will do his operation and come back. Now we can also interact with server side with the help of AJAX in JavaScript function.
In-Line Event Handling
We can place event handlers in the BODY part and also in HTML attributes the event handlers attributes consist of 3 parts the event handler, equal sign and a string of JavaScript statement enclosed in quotes (single or double). And one more thing these should be put in one line without newline due to this sophisticated event handling is not possible with in-line event handling.
CS101 - Introduction to Computing - Q.No. 30      ( M - 2 )
 
What is Structured Vector Graphics ?
This is a plug-in that is required to view swf (flash) files in the web browser
CS101 - Introduction to Computing - Q.No. 31      ( M - 3 )
 
What kind of new jobs are created because of computing?And which old professions are being eliminated?
Due to computing where people are getting benefits from automated systems on the other hand the people that are with KHATA system or Manual system and they don’t know about computers are eliminated due to this reason and people take place of many people. We can see in the offices where before computer if there are four person required now only one person is required for example with the help of database we can store more than thousand of information and only one person is managing the whole data that is DBA. In the old system many people are writing the data in registers and then its also very difficult to find the specific record.
Now we can see companies are hiring:-
Data Entry Operators
System Engineers
Software Developer
DBA etc.

CS101 - Introduction to Computing - Q.No. 32      ( M - 3 )
 
What are Logic- or Time-Bombs ?
It execute the payload when predetermined event occurs
For example use type particular phrase and particular data is reached.
CS101 - Introduction to Computing - Q.No. 33      ( M - 3 )
 
What do you mean by FTP or File Transfer Protocol?
This protocol is used to upload the files on remote computers. This is used to transfer files between computer on TCP/IP network e.g. internet and now a day’s many software are available for uploading files using FTP like Mozila FTP, cute FTP etc.
CS101 - Introduction to Computing - Q.No. 34      ( M - 5 )
 
Why should we, as computing professionals, be interested in studying the social implications of our creations?
If we see our life then we can judge computing technology is changing our life fast if we compare with other technology.
We should highlight the mistakes and successes of the past. We should learn then and select future direction accordingly. Computers are keep becoming more and more powerful and gaining more autonomy.
Powerful Global Corporation.
The network Organization
CS101 - Introduction to Computing - Q.No. 35      ( M - 5 )
 
How DoS attack is a cyber crime? For what cyber crime can be used?
DoS is the crime but of a new type. A new type for policing system is required to tackle such crimes.
Cyber Crime can be used to Damage a home computer, Bring down the Business, Weaken the financial and defense system of country.

 
CS101 - Introduction to Computing - Q.No. 36      ( M - 5 )
 
What are the key characteristics of internet? Write the names of any five.

0 comments:

Post a Comment