Sponsored Links


Results 1 to 1 of 1

Thread: CS101 Introduction to Computing Solve Mid Term Papers Fall Semester 2012

  1. #1
    Administrator Vuhelper's Avatar
    Join Date
    Apr 2011
    Posts
    8,835

    18 CS101 Introduction to Computing Solve Mid Term Papers Fall Semester 2012

    Sponsored Links





    CS101 Introduction to Computing Solve Mid Term Papers Fall Semester 2012

    Sponsored Links


    CS101 Introduction to Computing Course Short Notes and short questions answers For Midterm paper
    What is a client side script?
    It’s a small program that is a part of Webpage and run on the Clients, they interact with the user to collect information Or to accomplish the tasks. When it succeeded to collect the information they pass the collected information to Server-Side Script.
    Advantages:
    • Reduced Server Load
    • Reduced Network Traffic
    • Don’t send incomplete/incorrect/missing data to user’s browser.
    Disadvantages:
    • Don’t work with all Browsers
    • Scripting may be turn off by user
    • Increases the complexity of the Webpage.
    What is JavaScript?
    It’s a programming language and designed to work with browsers developed by Netscape and designed to develop small program called Client-Side Scripts and that can used in HTML WebPages. JavaScript is a Case Sensitive language, and it is an interpreted language and supports Event-Driven programming & it’s also a Object Based.
    Some Things That JavaScript Can’t Do:
    JavaScript can’t do “Read” “Modify” “Rename” “Delete” “Create”
    What Is Object?
    It is a named collection of methods and properties.
    Types of Object:
    There are three types of object
    1 JavaScript objects ( are part of JavaScript like window, document)
    2 Browser objects ( are that objects that contain information about itself)
    3 User-defined objects
    What Is Method?
    Methods are function that are used to manipulate with the Object like (window. close)
    Here (window is a Object and close is a Method)
    What Is EVENT HANDLERS?
    Objects are made up of methods and properties, many object also have event handlers. “Events” are action that occurs with user interaction with the internet browser.
    What Is Programming?
    A process in which we tell the computer what needs to be done or what to do.
    Types Of Programs:
    There are two types of programs
    1 Batch Programs
    2 Event – Driven Programs
    1) Batch Programs:
    These program starts automatically via a scheduler like
    • Initializing the internal data
    • Reading input data
    • After reading process that data
    • After processing print that data
    (Important) > No user interaction on those types of programs
    2) Event – Driven Programs:
    These program starts with user interaction e.g. Microwave Oven, GUIs, Camera
    Events that user Does: It’s when user click the mouse button
    Things the system itself Does: It’s when system automatically updating the Clock
    • Loops

    • Conditions

    All Types Of Program Consist Of:
    • Sequence of instruction
    Types Of Programming Languages:
    • Machine Language (Low Level Programming Language)
    • Assembly Language
    • High – level Language (High Level Programming language)
    • Object Oriented Language
    • Database Query Language
    • Procedural Language
    Machine Language:
    Consist of numbers only & 0s and 1s and this language is not close to human language & difficult to understand by the computer user. Each type of microprocessor has its own Machine Language; this is only a language that a computer understands easily without any translation.
    Assembly Language:
    That type of language that lay between Machine Language and High-Level Language.
    High – Level Language:
    In High-Level language you write code in English language. This language is user friendly, because user can understand the code easily e.g. C++, COBOL, V.B, FORTRAN.
    Object Oriented Language:
    In object oriented language work is done on the object action, this language is better than Procedural Language e.g. JAVA, C++.
    Database Query Language:
    In Database Query Language records are kept in tables permanently and each table is related with each other e.g. now a days SQL is used for this purpose.
    Procedural Language:
    In Procedural languages program is written in a sequence e.g. COBOL, FORTRAN.
    What Is Compiler?
    Compiler is a program that translates the whole program from bottom to top or top to bottom at a time. It tells you all errors in your program at a time and it is faster than an interpreter.
    What Is Interpreter?
    Interpreter is also a translator that translates the program line by line. It doesn’t translate the whole program at a time. It doesn’t tell all errors in your program but it tells you line by line and it is slow in speed.
    What Is Software Life – Cycle?
    It is a sequence of phases we can say that it’s a step of new born to death.
    Simple Software Life Cycle:
    Concept & Feasibility (what needs to be done, what should be in it, has any scope)

    User Requirements (what user want in his website, possible solution needed, lose form)

    Developer Specification (how much developer make, structured form)



    Planning (think & plan that how to make it)

    Design (comes after reading developer specification)

    Implementation (design is complete now it’s time for coding)



    Integrating & Testing



    Operation & Maintenance

    Retirement

    What is Variable?
    We can say that Variables are the References of DATA like (x < 6) here x is a Variable.
    What is Identifiers?
    These are the names used by JavaScript to refer to Variable.
    What is JavaScript Literals or JavaScript Data Types?
    A data or value that appears directly in a statement and it has several types some are
    • Numbers (e.g. 24, -32000, 9.230)
    • String (e.g. “”, “Umer”, “Where is She”) should be matching pair or in single or double quotes.
    • Booleans
    • Undefined
    Types of Operator:
    1. Arithmetic Operators (e.g. +, -, *, /, %, ^)
    2. Comparison Operator (e.g. a= =b, a!=b, a>b, a>=b, a<b, a<=b,)
    3. Logical Operators (e.g. a && b, !a)
    What is Array?
    Array is an indexed list of elements; we can say that it is container that holds a value
    What is a Pseudo Code?
    Pseudo Code consists of short, English phrases used to explain specific tasks within a program's algorithm.
    What is Website Navigation?
    The interface/controls that Website provide to the user for accessing the various parts of Website.
    What is Computer Network?
    Computer network mean where multiple computers are connected together to share information.
    Components of Computer Network:
    1. Computers
    2. Network interface Cards (NIC) (NIC communicate over a network)
    3. Hub (network traffic controller)
    4. Cables (either electrical or optical)
    5. Protocols (rules governing of communication over a network)
    What is Hub?
    Hub is a device that is used to connect several computers through a network, it has several ports, and we can say that Hub is a network traffic controller. E.g. any computer on the network wants to send message to other computer on the same network first send to Hub, now Hub broadcast it to specific one.
    What is Packet?
    Packet is a smallest unit of data that is transmitted over a computer network. Any message that is transferring over the network is broken into small packets and these packets travel independently and each packet contains the following information:
    • Sender’s Address
    • Destination Address
    • Data
    • Error Recovery Information
    Types of Computer Network According to the Network Access policy:
    There are two types of computer networks according to network access policy.
    1. Private Networks
    2. Public Networks
    3. Virtual Private Network
    1. Private Networks: -
    Organizations have many computers to connect them on the network, they usually connect those computers via Private Network and these computers are restricted only authorized computer access them. The purpose of these computers is to exchange the information to other computers within the organization and to protect from the outsiders.
    2. Public Networks: -
    All networks that are not Private, are Public Networks. The communication equipment used in these networks is generally used by the user.
    3. Virtual Private Network
    VPN is a secure, private network. VPN is use for public telecom infrastructure, maintaining privacy through security procedures.
    Types of Computer Networks:
    There are three types of computer networks.
    1. LAN (Local Area Network)
    2. WAN (Wide Area Network)
    3. MAN (Metropolitan Area Network)
    LAN (Local Area Network):
    Local area network is digital communication system in which you can connect a large number of computers in a limited geographical area. Limited geographical area means less than 1 Km across.
    WAN (Wide Area Network)
    A wide area network is digital communication system; it connects the computer with a great distance, typically across cities or even countries. E.g. ATM of bank
    MAN (Metropolitan Area Network)
    MAN is a network that interconnects user with computer resources in geographical area or region, larger than that covered by a large LAN but the smaller than the area covered by a WAN.
    Connecting LAN to other Network:
    There are some devices that connect LAN to other networks, these devices called special purpose devices.
    • Routers
    • Bridges
    • Gateways
    • Modems
    What is Routers?
    Router is special purpose device that control the flow of data or you can say Traffic Controller and he examines the destination to flow the information on efficient path.
    What is Bridges?
    Bridge is situated between 2 LAN’s means a separate connection, but similar network and passes the information through LAN.
    What is Gateways?
    Gateway is more complex device than Bridge. Gateway is special purpose device that translate between networks that are using different types of communication protocols.
    What is Modem?
    Modem is a special purpose device that connects two computers via Telephone line. Modem stands for modulator or demodulator.
    Modulator converts computer messages to electrical pulses (suitable) over a telephone line.
    Demodulator converts electrical pulses received over telephone line into messages.
    Network Topologies:
    There are four types of network topologies.
    • Star
    • Ring
    • Bus
    • Point-to-Point / Peer-to-Peer
    What is Star Topology?
    It is designed with each node connected directly to a central network called Hub. Data on star network passes through the Hub before continuing to its destination. If any of the local computers fail, the remaining portion of the star network is unaffected. Multiple messages sent simultaneously on star.


    What is Ring Topology?
    No server is required. In ring topology, computers are connected on a single circle of cable. It is more reliable than the star network because communication is not dependent on a single host computer.
    What is Bus Topology?
    No server is required for bus topology, in this topology the data or messages sent to one computer to another computer directly, if any nodes goes down the rest of the network won’t affected.
    What is P2P Topology?
    This type of topology is less expensive, have limited connectivity and used to connect two LANs to form a WAN.
    Types of Networking Protocol:
    There is two types of networking protocols, these are
    • Ethernet protocol
    • Token Ring Protocol
    What is Ethernet Protocol?
    This type of protocol checks the shared connection before transmitting the message is it in use or not.
    What is Token Ring Protocol?
    This protocol passes the special message through network called a Token. When any computer receives the token has permission to send that packet or token to other one.
    Types of Communication Channels:-
    • Wire (twisted pair, coaxial cable, optical fiber)
    • Wireless (laser, radio, cellular, satellite)
    Key characteristics of these channel is Bandwidth
    What is Bandwidth?
    Capacity of carrying the data of communication and it is measured in bits e.g. (bps, kb/s, Mb/s)
    What is Internet?
    Internet enables to share information with others from all over the world; it is very less expensive utility and accessible to every humankind. Internet is accessible from every where of the world and this is fastest growing technology. Internet is for public any one from any where can access and do any thing and intranet is for private, limited access.
    What is TCP/IP?
    TCP/IP stands for Transmission Control Protocol/Internet Protocol. TCP breaks down the message to sent over the internet into packets, when message reached to its destination TCP convert it to its original form.
    Tools that are Available on the Internet:
    • Electronic mail (POP, SMTP) Post Office Protocol, Simple Mail Transfer Protocol
    • Instant messaging (MSN, YAHOO, ICQ, AOL)
    • Remote login (Telnet)
    • File transfer protocol (FTP)
    • Network news (nntp) Network News Transfer Protocol
    • World Wide Web (Hyper Text Transfer Protocol) www, http
    • VOIP (Voice over Internet Protocol)
    What is DNS?
    Domain Name System is the way where Internet domain names are located & translated into IP addresses and they get updated continuously.
    What is SMTP?
    Simple mail transfer protocol is a protocol used to send or receive email messages over a TCP/IP.
    What is POP3?
    Post office protocol is used for receiving email messages.
    What is VOIP?
    Voice over IP is tool, in this we can delivered the voice to one device to another using IP.

    Event Handling Functions:

    • OnClick
    • onDblClick
    • onMouseOver
    • onMouseDown
    • onFocus
    • OnBlur
    • onReset
    • onSubmit
    • onLoad
    • onUnload









    What is Pixel?
    Pixel is a smallest image displays on a computer screen. Computer has the ability the change the color of individual pixel.
    What is Dithering?
    In this scheme, pixels are used to simulate a color that is not present in the platelet.
    What is Aliasing?
    Computer screen consist of square-ish pixels & when we draw a single line, they don’t show the single line show pixels in staircase this is aliasing. Aliasing can be managed by reducing the size of pixel.
    What is Anti – Aliasing?
    Anti Aliasing is another technique used for managing the “Staircase” effect.
    What is Vector or Object Oriented Graphics?
    These graphics are independent in resolution, and are in small size, they can be moved easily can be starched, duplicated, deleted. E.g. (swf, svg, wmf, ps)
    What is Bitmapped or Raster Graphics?
    These types of graphics are difficult to move, changing the resolution may cause lose some pixels and these graphics are heavy in size e.g. gif, jpg, bmp
    Popular Formats on Web:
    • Gif (Graphical Interchange Format)
    • Jpg (Joint Photographic Experts Group)
    • Swf (Shockwave Flash)
    What is (Artificial) Intelligent System?
    AI is a system that designed to perform complex task, and might work like human brain.
    What is Neural Networks?
    Used to make human brain, original inspiration was brain. Now it is use as computational tool
    What is Fuzzy Logic?
    Fuzzy logic is a principles of the approximate reasoning and faculty that human faced with linguistic ambiguity.
    What is In-Line JavaScript Event-Handling?
    Event handlers placed in the body portion of a webpage in form of HTML tags it has three types.
    1. Identifier of the event handler
    2. the equal sign
    3. Statement is enclosed with single or double quotes.
    What is Data Integrity?
    Integrity refers to maintaining the correctness and consistency of the data. Integrity can compromised in many ways like (Typing errors, Transmission errors, Bugs, Viruses)
    Correctness Free from all errors
    Consistency No conflicts among related data
    Types of Integrity:
    There are four types of integrity
    1. Type Integrity (used to specify the data type e.g. credit card 12 number)
    2. Limit Integrity (used to limiting the data to specified ranges e.g. age of person shouldn’t be -ve)
    3. Referential Integrity (used for reference of data that exist in the database)
    4. Physical Integrity (used for backup)

    What is DBMS?
    Database Management System is SW that operates a database, DBMS take care of the storage, retrieval, and the management of the data in large sets on a database. DBMS can add, delete, modify, make queries and produce reports and also summarize the required contents.
    What is Database?
    Database is a collection of data that is organized in such a fashion that the computer can quickly search for desired data. Database consists of a collection of interrelated computer files.

    What is Relational Database?
    Database consists of two or more related tables called relational databases.
    What is Primary Key?
    Primary key is a field that uniquely identifies the record, stored in a table.
    What is Queries?
    Queries are used to view, change, and analyze the data; queries can combine the data of different tables.
    What is Forms?
    Forms can be used for entering, editing, or viewing the data.
    What is Reports?
    Reports are user friendly way of presenting the data and it is very effective tool.
    What is Data Mining?
    Data mining is process of analyzing large database to identify the patterns.
    What is Drones?
    Drones are computers with weak security schemes that are used by hackers for DoS attack.
    What is meant by DOS Attack?
    DOS means Denying of Service.
    What is Warfare?
    Warfare means to disable the enemy this is the main goal of warfare and that goal can be achieved by killing off the communication systems of the enemy army.
    What is Website Spoofing?
    Website spoofing is the act of creating a website, as a hoax, with the intention of misleading readers that the website has been created by a different person or organization. The objective may be fraudulent, often associated with Pishing or e-mail spoofing. E.g. (give credit card number to online shopping Website)
    What is Viruses?
    Viruses itself has no value they attached with other files to make them useless.
    Types of Viruses?
    • Malicious (harmful viruses, can destroy the private data and stop to doing useful work)
    • Neutral (not harmful viruses, just display an annoying message)
    What is semantic Web?
    Semantic Web’s will be designed for computers to understand meaningfully.

    Attached Files Attached Files

  2. Sponsored Links

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. CS101 Introduction to Computing Solve Mid Term Papers December 2012-2013
    By education2012 in forum Mid Term & Final Term Papers
    Replies: 0
    Last Post: 12-14-2012, 05:04 PM
  2. CS101 Introduction to Computing Solve Mid Term paper Fall Semester 2012
    By Vuhelper in forum Mid Term & Final Term Papers
    Replies: 0
    Last Post: 11-27-2012, 03:47 PM
  3. CS101 Introduction to Computing Solve Final Term Papers Fall Semester 2012
    By Vuhelper in forum Mid Term & Final Term Papers
    Replies: 0
    Last Post: 11-23-2012, 05:11 PM
  4. CS101 Introduction to Computing Solve Final Term Papers Fall Semester 2012
    By Vuhelper in forum Mid Term & Final Term Papers
    Replies: 0
    Last Post: 11-23-2012, 04:54 PM
  5. CS101 Introduction to Computing Solve Paper Fall Semester 2012
    By Vuhelper in forum Mid Term & Final Term Papers
    Replies: 0
    Last Post: 11-23-2012, 04:45 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
-: Vuhelp Disclaimer :-
None of the files shown here are hosted or transmitted by this server. The links are provided solely by this site's users. The administrator's or staff of Vuhelp.net cannot be held responsible for what its users post, or any other actions of its users. You may not use this site to distribute or download any material when you do not have the legal rights to do so. It is your own responsibility to adhere to these terms. If you have any doubts about legality of content or you have any suspicions, feel free to contact us.
Online Education | JhelumSoft