CS101 Online Quizs
2010-02-03 11:29:36
Which of the following is incorrect for making design elements legible?
Select correct option:
- Elements should be large enough
- Elements must contrast sufficiently
- Related elements should be visually grouped
- Elements should have no visual focus
1. Function is also known as ______________.
Select correct option:
- subprogram
- procedure
- subroutine
- All of given
In _____________ TCPIP protocols became the only set of protocols used on the ARPANET.
Select correct option:
- 1973
- 1983
- 1972
- None of the given choices
E-mail system has ______ component(s)
Select correct option:
- E-mail client
- SMTP server
- POP3 server
- All of the given choices
A Parallelogram (Tilted rectangle) represents the ________________ flow chart element.
Select correct option:
- Process
- Input or Output
- Decision
- Connector
If a computer could pass the Turing test then it would be able to:
Select correct option:
- win a million dollar prize
- think like human begins
- think but slower than humans
- do the things faster
Punched cards were replaced by:
Select correct option:
- Floppy Disk
- Zip Drives
- Magnetic storage
- None of the given choices
The ________virus may display an annoying, but harmless message
Select correct option:
- Malicious
- Neutral
- Helpful
- DoS
The name of very first computer was:
Select correct option:
- ABC
- BCD
- EDC
- None of the given choices
The internet communities are ___________.
Select correct option:
- Geographical based
- Interest based
- Country based
- Religion based
2010-02-03 11:34:06
Global variables are:
- Visible everywhere on the web page
- Visible only in the block in which they are declared
- Visible only in the main code
- None of the given choices
Infection propagation and Actual destructive are the components of _______________
- Transmission mechanism
- Payload
- Worms
- Trojan Horse
If a computer could pass the Turing test then it would be able to:
- win a million dollar prize
- think like human begins
- think but slower than humans
- do the things faster
__________ is a special purpose computer that connects and translates between network that use different communication protocols.
- Bridge
- Router
- Gateway
- None of the given choices
The solution of the Mail Bombing is ________
- Filtering
- Do not accept emails
- eMail filtering
- There in no solution for it
The name of very first computer was:
ABC
BCD
EDC
None of the given choices
MATH functions are accessed by referring to various ______________of the Math object
- Functions
- Events
- Properties
- Methods
The color of each pixel is generally represented in the form of a __________.
- Duplet
- Triplet
- Both a & b
- None of these
Rule of thumb learned through trial & error is called
- Heuristic
- Mistake
- Common sense
- Experience
SCSI stands for:
- Small Computer System Interface
- System Common Small Integration
- Silicon Computer System Interface
- None of the given choices
2010-02-03 11:44:06
Internet is an example of ______________ network.
- Private
- Public
- Both Private and Public
- None of the given choices
The name of first commercially available PC was:
- UNIVAC 1
- ENIAC
- EDVAC
- Altair 8800
Algorithm is a ____________________
- Definition of a problem
- Sequence of steps to solve a problem
- Understanding of a problem
- Solving a problem
A group of information is called __________________
- File
- Database
- Record
- Field
___________________ is a branch f computer science concerned with manipulating and enhancing computer graphics.
- Image Handling
- Image Processing
- Image Engineering
- None of these
__________has changed our way of life like no other technology.
- Computational technology
- Computer technology
- Computing technology
- None of the Above
Sophisticated event handling is not possible with _______________ event handling
- Off-Line
- In-Line
- Out-Line
- Non of the given choices
Babbage’s Analytical Engine could store information permanently in:
- Magnetic Tape
- Floppy Disk
- Punched Cards
- None of the given choices
There are __________ popular schemes to reduce the number of bytes that are required for storing graphics.
- 4
- 3
- 2
- None of these
The internet-society is considered under Surveillance because:
- While surfing, we are being watched, constantly
- Our every click is recorded and analyzed to extract patterns and behaviors
- Webcams are becoming common. Providing a cheap way for parents to watch their children's every move
- All of the given
2010-02-03 11:48:29
Avoid __________ to ensure readability of web page
- Overuse of bold and italics
- Use of paragraphs
- Use of white space
- Use of contrast colors
Deep Blue was the name of:
- Human
- Computer
- City
- None of the given choices
Using ____, a user can remotely log on to a computer (connected to the user through a network, e.g. Internet) & have control over it like a local user, including control over running various programs ?
- FTP
- TCP
- Telnet Protocol
- None of the given choices
DoS is________ ?
- Crime
- Cyber crime
- Not a crime
- A software
__________ enables users located at far-way locations to easily share information with others located all over the world.
- Protocol
- Internet
- Communication Channel
- None of the given choices
Vacuum tubes were replaced by:
- Transistors
- Electrodes
- Electric Relays
- None of the given choices
Cyber crime can be used to
- Damage a home computer
- Bring down a business
- Weaken the telecom, financial, or even defense-related systems of a country
- All of the given
___ provides a simple, consistent way for applications to interact with the HW without having to know all the details of the HW
- Explorer.exe
- System Files
- Operating System
- Application Software
Communication protocol is a __________that governs the flow of information over a network
- Set of methods
- Set of protocols
- Set of rules
- Device
_____________ team is responsible for the maintenance, expansion , improvement of the infrastructure consisting of workstations, networking equipment, software and network security.
- Support
- Configuration Management
- Quality Assurance
- Developer
_____________ team consists on the sharpest technical minds in the company.
- Architecture
- Business Development
- Configuration Management
- Developer
_______________ is responsible for day to day operations.
- CEO
- COO
- CMSO
- Developer
Using Java Script you can write a character at random location on screen
- By applying randomCh method
- With the help of String object
- With the help of random character property
- There is no built in approach in Java Script
The transistor is a solid state semiconductor device used for amplification and switching, and has _____ terminals.
- one
- two
- three
- four
Blue Pacific is a name of _____ computer.
- Mini
- Desktop
- Micro
- Super
Monte Carlo algorithm is an example of
- Randomized algorithm
- Greedy algorithm
- both greedy and randomized
- Heuristics
A set of stand alone productivity applications designed to work together known as __
- Productivity software suites
- Compiled software
- Secure software
- Intelligent software