CS101 Current Quiz
Question # 1 of 10 ( Start time: 10:33:47 AM ) Total Marks: 1
The E-mail client sends message to:
Select correct option:
e-mail client
SMTP server
The eMail client sends it to the SMTP server
PAGE 213
POP3 server
All of the given choices
Question # 2 of 10 ( Start time: 10:34:15 AM ) Total Marks: 1
Which of the following keyword is used to jump out of switch statement as soon as a match is found?
Select correct option:
default
else
And then apply that solution
If the solution woks as desired, fine; else we go back to step 2
jump
break
Question # 3 of 10 ( Start time: 10:35:10 AM ) Total Marks: 1
A ***** of information is called __________________
Select correct option:
File
Database
Record
Each ***** of info – called a record - in that file was separated by a special character;
vertical bar ‘|’ was a popular option
Field
Question # 4 of 10 ( Start time: 10:35:34 AM ) Total Marks: 1
Events can be captured in the HTML code, and then directed to a JavaScript __________for an appropriate response
Select correct option:
BODY TAG
HANDLER
FUNCTION
Alternatively, events can be captured in the HTML code, and then directed to a
JavaScript function for an appropriate response
"function"
EVENT
Question # 5 of 10 ( Start time: 10:36:30 AM ) Total Marks: 1
_____________ is the part of the virus that generally consists of malicious computer instructions
Select correct option:
Off load
Payload
Ref
Payload
• The part of the virus that generally consists of malicious computer instructions
Loader
Transmitter
Question # 6 of 10 ( Start time: 10:37:04 AM ) Total Marks: 1
Because of web, people are shifting from mass marketing to _________________
Select correct option:
Direct marketing
Personal marketing
The Web has changed marketing forever, redirecting it from a mass focus to a
single-person focus
Internet marketing
All of the given
Question # 7 of 10 ( Start time: 10:37:42 AM ) Total Marks: 1
FTP was introduced in:
Select correct option:
1972
1973
1973 - FTP (File Transfer Protocol) is introduced, standardizing the transfer of files
between networked computers
1974
1976
Question # 8 of 10 ( Start time: 10:38:04 AM ) Total Marks: 1
_____________ loop is a flow control statement that allows code to be executed repeatedly based on a given Boolean condition.
Select correct option:
For
Do-While
If-else
JavaScript Flow Control Structures
• if … else
• switch
While
Question # 9 of 10 ( Start time: 10:38:39 AM ) Total Marks: 1
_______________ is a system that guards a private network.
Select correct option:
Protocol
Firewall
Firewall
A system that that guards a private network, enforcing an access/deny policy to all traffic
going to and coming from the Internet
Communication channel
None of the given choices
Question # 10 of 10 ( Start time: 10:39:13 AM ) Total Marks: 1
The ____________ virus may destroy or broadcast private data.
Select correct option:
Malicious
Malicious
– The type that grabs most headlines
– May destroy or broadcast private data
Neutral
Helpful
DoS
The E-mail client sends message to:
Select correct option:
e-mail client
SMTP server
The eMail client sends it to the SMTP server
PAGE 213
POP3 server
All of the given choices
Question # 2 of 10 ( Start time: 10:34:15 AM ) Total Marks: 1
Which of the following keyword is used to jump out of switch statement as soon as a match is found?
Select correct option:
default
else
And then apply that solution
If the solution woks as desired, fine; else we go back to step 2
jump
break
Question # 3 of 10 ( Start time: 10:35:10 AM ) Total Marks: 1
A ***** of information is called __________________
Select correct option:
File
Database
Record
Each ***** of info – called a record - in that file was separated by a special character;
vertical bar ‘|’ was a popular option
Field
Question # 4 of 10 ( Start time: 10:35:34 AM ) Total Marks: 1
Events can be captured in the HTML code, and then directed to a JavaScript __________for an appropriate response
Select correct option:
BODY TAG
HANDLER
FUNCTION
Alternatively, events can be captured in the HTML code, and then directed to a
JavaScript function for an appropriate response
"function"
EVENT
Question # 5 of 10 ( Start time: 10:36:30 AM ) Total Marks: 1
_____________ is the part of the virus that generally consists of malicious computer instructions
Select correct option:
Off load
Payload
Ref
Payload
• The part of the virus that generally consists of malicious computer instructions
Loader
Transmitter
Question # 6 of 10 ( Start time: 10:37:04 AM ) Total Marks: 1
Because of web, people are shifting from mass marketing to _________________
Select correct option:
Direct marketing
Personal marketing
The Web has changed marketing forever, redirecting it from a mass focus to a
single-person focus
Internet marketing
All of the given
Question # 7 of 10 ( Start time: 10:37:42 AM ) Total Marks: 1
FTP was introduced in:
Select correct option:
1972
1973
1973 - FTP (File Transfer Protocol) is introduced, standardizing the transfer of files
between networked computers
1974
1976
Question # 8 of 10 ( Start time: 10:38:04 AM ) Total Marks: 1
_____________ loop is a flow control statement that allows code to be executed repeatedly based on a given Boolean condition.
Select correct option:
For
Do-While
If-else
JavaScript Flow Control Structures
• if … else
• switch
While
Question # 9 of 10 ( Start time: 10:38:39 AM ) Total Marks: 1
_______________ is a system that guards a private network.
Select correct option:
Protocol
Firewall
Firewall
A system that that guards a private network, enforcing an access/deny policy to all traffic
going to and coming from the Internet
Communication channel
None of the given choices
Question # 10 of 10 ( Start time: 10:39:13 AM ) Total Marks: 1
The ____________ virus may destroy or broadcast private data.
Select correct option:
Malicious
Malicious
– The type that grabs most headlines
– May destroy or broadcast private data
Neutral
Helpful
DoS
Which of the following is incorrect for making design elements legible?
Select correct option:
Select correct option:
1. Function is also known as ______________.
Select correct option:
In _____________ TCPIP protocols became the only set of protocols used on the ARPANET.
Select correct option:
E-mail system has ______ component(s)
Select correct option:
A Parallelogram (Tilted rectangle) represents the ________________ flow chart element.
Select correct option:
If a computer could pass the Turing test then it would be able to:
Select correct option:
Punched cards were replaced by:
Select correct option:
The ________virus may display an annoying, but harmless message
Select correct option:
The name of very first computer was:
Select correct option:
The internet communities are ___________.
Select correct option:
Global variables are:
Infection propagation and Actual destructive are the components of _______________
If a computer could pass the Turing test then it would be able to:
__________ is a special purpose computer that connects and translates between network that use different communication protocols.
The solution of the Mail Bombing is ________
The name of very first computer was:
ABC
BCD
EDC
None of the given choices
MATH functions are accessed by referring to various ______________of the Math object
The color of each pixel is generally represented in the form of a __________.
Rule of thumb learned through trial & error is called
SCSI stands for:
Internet is an example of ______________ network.
The name of first commercially available PC was:
Algorithm is a ____________________
A group of information is called __________________
___________________ is a branch f computer science concerned with manipulating and enhancing computer graphics.
__________has changed our way of life like no other technology.
Sophisticated event handling is not possible with _______________ event handling
Babbage’s Analytical Engine could store information permanently in:
There are __________ popular schemes to reduce the number of bytes that are required for storing graphics.
The internet-society is considered under Surveillance because:
Avoid __________ to ensure readability of web page
Deep Blue was the name of:
Using ____, a user can remotely log on to a computer (connected to the user through a network, e.g. Internet) & have control over it like a local user, including control over running various programs ?
DoS is________ ?
__________ enables users located at far-way locations to easily share information with others located all over the world.
Vacuum tubes were replaced by:
Cyber crime can be used to
___ provides a simple, consistent way for applications to interact with the HW without having to know all the details of the HW
Communication protocol is a __________that governs the flow of information over a network
_____________ team is responsible for the maintenance, expansion , improvement of the infrastructure consisting of workstations, networking equipment, software and network security.
_____________ team consists on the sharpest technical minds in the company.
_______________ is responsible for day to day operations.
Using Java Script you can write a character at random location on screen
The transistor is a solid state semiconductor device used for amplification and switching, and has _____ terminals.
Blue Pacific is a name of _____ computer.
A set of stand alone productivity applications designed to work together known as __
No comments:
Post a Comment