click to generate your own textclick to generate your own textclick to generate your own textclick to generate your own textclick to generate your own textclick to generate your own textclick to generate your own text

Tuesday 28 June 2011

CS101 Current Quiz

CS101 Current Quiz

Question # 1 of 10 ( Start time: 10:33:47 AM ) Total Marks: 1

The E-mail client sends message to:

Select correct option:

e-mail client

SMTP server

The eMail client sends it to the SMTP server

PAGE 213



POP3 server

All of the given choices



Question # 2 of 10 ( Start time: 10:34:15 AM ) Total Marks: 1

Which of the following keyword is used to jump out of switch statement as soon as a match is found?

Select correct option:

default

else


And then apply that solution


If the solution woks as desired, fine; else we go back to step 2


jump

break



Question # 3 of 10 ( Start time: 10:35:10 AM ) Total Marks: 1

A ***** of information is called __________________

Select correct option:

File

Database

Record


Each ***** of info – called a record - in that file was separated by a special character;


vertical bar ‘|’ was a popular option


Field



Question # 4 of 10 ( Start time: 10:35:34 AM ) Total Marks: 1

Events can be captured in the HTML code, and then directed to a JavaScript __________for an appropriate response

Select correct option:

BODY TAG

HANDLER

FUNCTION



Alternatively, events can be captured in the HTML code, and then directed to a
JavaScript function for an appropriate response

"function"



EVENT





Question # 5 of 10 ( Start time: 10:36:30 AM ) Total Marks: 1

_____________ is the part of the virus that generally consists of malicious computer instructions

Select correct option:

Off load

Payload

Ref


Payload


• The part of the virus that generally consists of malicious computer instructions






Loader

Transmitter



Question # 6 of 10 ( Start time: 10:37:04 AM ) Total Marks: 1

Because of web, people are shifting from mass marketing to _________________

Select correct option:

Direct marketing

Personal marketing


The Web has changed marketing forever, redirecting it from a mass focus to a


single-person focus


Internet marketing

All of the given



Question # 7 of 10 ( Start time: 10:37:42 AM ) Total Marks: 1

FTP was introduced in:

Select correct option:

1972

1973

1973 - FTP (File Transfer Protocol) is introduced, standardizing the transfer of files

between networked computers

1974

1976



Question # 8 of 10 ( Start time: 10:38:04 AM ) Total Marks: 1

_____________ loop is a flow control statement that allows code to be executed repeatedly based on a given Boolean condition.

Select correct option:

For

Do-While

If-else


JavaScript Flow Control Structures


• if … else

• switch


While



Question # 9 of 10 ( Start time: 10:38:39 AM ) Total Marks: 1

_______________ is a system that guards a private network.

Select correct option:

Protocol

Firewall


Firewall


A system that that guards a private network, enforcing an access/deny policy to all traffic

going to and coming from the Internet


Communication channel

None of the given choices



Question # 10 of 10 ( Start time: 10:39:13 AM ) Total Marks: 1

The ____________ virus may destroy or broadcast private data.

Select correct option:

Malicious

Malicious

– The type that grabs most headlines

– May destroy or broadcast private data

Neutral

Helpful

DoS

Which of the following is incorrect for making design elements legible?
Select correct option:



1. Function is also known as ______________.
Select correct option:


In _____________ TCPIP protocols became the only set of protocols used on the ARPANET.
Select correct option:



E-mail system has ______ component(s)
Select correct option:



A Parallelogram (Tilted rectangle) represents the ________________ flow chart element.
Select correct option:

If a computer could pass the Turing test then it would be able to:
Select correct option:



Punched cards were replaced by:
Select correct option:


The ________virus may display an annoying, but harmless message
Select correct option:

The name of very first computer was:
Select correct option:



The internet communities are ___________.
Select correct option:



Global variables are:

Infection propagation and Actual destructive are the components of _______________

If a computer could pass the Turing test then it would be able to:

__________ is a special purpose computer that connects and translates between network that use different communication protocols.
The solution of the Mail Bombing is ________

The name of very first computer was:

ABC
BCD
EDC
None of the given choices

MATH functions are accessed by referring to various ______________of the Math object

The color of each pixel is generally represented in the form of a __________.

Rule of thumb learned through trial & error is called

SCSI stands for:


Internet is an example of ______________ network.

The name of first commercially available PC was:


Algorithm is a ____________________

A group of information is called __________________


___________________ is a branch f computer science concerned with manipulating and enhancing computer graphics.

__________has changed our way of life like no other technology.

Sophisticated event handling is not possible with _______________ event handling

Babbage’s Analytical Engine could store information permanently in:


There are __________ popular schemes to reduce the number of bytes that are required for storing graphics.

The internet-society is considered under Surveillance because:


Avoid __________ to ensure readability of web page


Deep Blue was the name of:

Using ____, a user can remotely log on to a computer (connected to the user through a network, e.g. Internet) & have control over it like a local user, including control over running various programs ?

DoS is________ ?



__________ enables users located at far-way locations to easily share information with others located all over the world.

Vacuum tubes were replaced by:


Cyber crime can be used to

___ provides a simple, consistent way for applications to interact with the HW without having to know all the details of the HW

Communication protocol is a __________that governs the flow of information over a network

_____________ team is responsible for the maintenance, expansion , improvement of the infrastructure consisting of workstations, networking equipment, software and network security.

_____________ team consists on the sharpest technical minds in the company.

_______________ is responsible for day to day operations.

Using Java Script you can write a character at random location on screen

The transistor is a solid state semiconductor device used for amplification and switching, and has _____ terminals.


Blue Pacific is a name of _____ computer.


Monte Carlo algorithm is an example of

A set of stand alone productivity applications designed to work together known as __

No comments:

Post a Comment