In the name of ALLAH, the most beneficient, the most merciful

Introduction to Computing (CS101)

Multiple Choice Questions (MCQs)

Objective Questions

  1. ________ was known as “mill” in Analytical engine.

    1. Memory
    2. Processor
    3. Monitor
    4. Mouse
  2. The microprocessors that do not have a separate unit to handle floating point data are ________.

    1. Not able to handle floating point operations
    2. Slower than other microprocessors
    3. Costly than other microprocessors
    4. Not invented yet
  3. A program designed to activate an alarm after every two hours is the example of ________.

    1. Batch Program
    2. Event Driven Program
    3. Time Program
    4. Real Time Program
  4. ________ is a related collection of WWW files that includes a beginning file called a homepage.

    1. HTML
    2. Website
    3. HTTP
    4. Web page
  5. To display a radio button on the web page, we use ________ tag.

    1. INPUTBUTTON
    2. INPUT
    3. RADIOBUTTON
    4. RADIO
  6. If we apply the Bubble Sort algorithm on an array of 4 elements, then what will be the number of caomparisons in the first pass?

    1. 5
    2. 4
    3. 3
    4. 2
  7. ________ is generally measured in terms of the number of steps required to execute an algorithm.

    1. Space
    2. Time
    3. Memory and time
    4. Bandwidth
  8. ________ breaks down the message, to be sent over the internet, into packets.

    1. Protocol
    2. TCP
    3. IP
    4. NIC
  9. VoIP stands for ________.

    1. Video over Internet Protocol
    2. Visual on Internet Protocol
    3. Voice over Internet Protocol
    4. None of the given
  10. Yahoo Server was recovered, from DoS attack, within ________.

    1. 12 hours
    2. 3 hours
    3. 24 hours
    4. 3 days
  11. An algorithm developed to deal with a particular situation is giving the desired results but taking long execution time. It will be called as ________.

    1. Monte Carlo algorithm
    2. Greedy algorithm
    3. Deterministic algorithm
    4. Heuristics
  12. We can change the background color in HTML, using ________ attribute of .

    1. background
    2. bgcolor
    3. backcolor
    4. backgroundcolor
  13. Which of the following is not a peripheral device for a computer?

    1. USB
    2. Printer
    3. Scanner
    4. Power Supply Unit
  14. Which one of these is NOT an example of storage devices?

    1. CD
    2. Floppy
    3. Hard Disk
    4. RAM
  15. The default style of text to represent a hyperlink in a webpage is ________.

    1. Red and Italic
    2. Black and Underlined
    3. Green and Bold
    4. Blue and Underlined
  16. A data value that appears directly in a statement is known as ________.

    1. Numeric Literals
    2. String Literals
    3. JavaScript Literals
    4. None of the given
  17. ________ is the example of Shrink-wrapped software.

    1. PIA information system
    2. WinZip trial pack
    3. Linux
    4. MS Word
  18. ________ is a field that uniquely identifies each record stored in a table.

    1. Primary Key
    2. Foreign Key
    3. Secondary key
    4. Special Key
  19. The ________ has changed marketing forever, redirecting it from a mass focus to a single person focus.

    1. Web
    2. Television
    3. Mobile
    4. Radio
  20. Just like JavaScript, ________ was used for writing script.

    1. FORTRAN
    2. QBasic
    3. Perl
    4. JAVA
  21. ________ computers have low power consumption processors.

    1. Personal
    2. Laptop
    3. Super
    4. Main Frame
  22. A named collection of properties (data, state) and methods (instructions, behaviour) is called ________.

    1. Object
    2. Entity
    3. Relation
    4. Template
  23. Microprocessor are made up of semiconductor material called ________.

    1. Aluminum
    2. Copper
    3. Silicon dioxide
    4. Silicon
  24. Usually there is only a single hard drive in a computer but you can insert ________ hard drives in a modern PC.

    1. Only One
    2. Only Two
    3. Only Three
    4. More than three
  25. If you have to draw some charts on the basis of mathematical calculations then which one of the software from the following list will be your preference?

    1. Spreadsheet
    2. Word Processor
    3. Database Management System
    4. Dreamweaver
  26. The Semantic Web is an idea of ________.

    1. John Von Neuman
    2. Ada
    3. Bill Gates
    4. Tim Berners-Lee
  27. ________ operator is used to assign values to JavaScript variables.

    1. Comparison
    2. Binary
    3. Assignment
    4. Logical
  28. Algorithm gives us:

    1. Definition of a problem
    2. Sequence of steps to solve a problem
    3. Proper understanding of a problem
    4. Solution to a problem
  29. Processing speed of a super computer is measured in ________.

    1. Giga Hertz
    2. Millions of instructions per second
    3. Trillions of floating point instructions per second
    4. Mega bytes
  30. In C/C++, ________ are the doors through which data can enter and come out of a program.

    1. Streams
    2. Fields
    3. Variables
    4. Header files
  31. Which of the following is/are the parts of Operating system components?

    1. GUI
    2. Device Manager
    3. Shell
    4. All of the given
  32. Information available on the web is:

    1. Mostly Free of any cost
    2. Costly
    3. Totally free
    4. Not accessible at all
  33. Analytical Engine was a machine of which type:

    1. non-programmable electronic machine
    2. programmable electromechanical
    3. programmable, mechanical, digital
    4. programmable but non-digital
  34. Identify the correct statements about function arguments
    I) A comma-separated list of data
    II) Define the interface b/w function and rest of code
    III) They are used to identify the function
    IV) They Identify function’s type

    1. I and II Only
    2. II and III Only
    3. III and IV Only
    4. I, II and III Only
  35. Command which saves the selected text before deleting is ________.

    1. Copy
    2. Delete
    3. Cut
    4. Undo
  36. Select the variable name which is invalid in JavaScript:

    1. while
    2. sum
    3. _sum
    4. cs_101
  37. The function write() takes ________ as parameter(s).

    1. String of pointer type
    2. String of variable lengths, no. of bytes to be read and flags
    3. Pointer array of characters and a delimiter
    4. String and no. of bytes to be written
  38. Today's fastest computer can do ________ of calculations in a second.

    1. Thousands
    2. Billions
    3. Trillions
    4. Millions
  39. Users look for ________ solution.

    1. Optimal
    2. First good enough
    3. Good
    4. Best
  40. Choose the correct html format to create a checkbox.

    1. <checkbox>
    2. <input type="checkbox">
    3. <check>
    4. <input type="check">
  41. What will happen if I start a new list without closing the original one?

    1. An error will be generated
    2. A nested list will be created
    3. Previous list will end and a new will start
    4. Nothing will happen
  42. Register is a kind of ________ memory.

    1. Fast
    2. Super fast
    3. Slow
    4. Very slow
  43. In the evolution of computing, ________ paid its major contribution by introducing PCs.

    1. Microsoft
    2. Apple Macintosh
    3. IBM
    4. HP
  44. Computers can do ________ what we tell them to do.

    1. More than
    2. Less than
    3. Exactly
    4. Similar
  45. Base address is the memory address of ________ element of an array.

    1. 1st
    2. 2nd
    3. 3rd
    4. 4th
  46. The impact of a digit in a number is determined by its ________.

    1. Value
    2. Location
    3. Length
    4. None of the given
  47. Which of the follwing computer can be considered as a portable computer?

    1. PC
    2. Mainframe
    3. PDA
    4. Supercomputer
  48. A virus consists of two parts:

    1. Computer and internet
    2. Transmission mechanism and Internet
    3. Transmission mechanism and Payload
    4. Internet access and Payload
  49. ________ is a client program that uses HTTP to make requests to Web servers throughout the internet on behalf of the user.

    1. Web Application
    2. Web Browser
    3. Internet Application
    4. HTML
  50. The tasks performed to determine the existence of defects is called ________.

    1. Debugging
    2. Testing
    3. Repairing
    4. Coding
  51. DARPA stands for:

    1. Defence Advanced Research Project Agency
    2. Direct Automatic Research Private Agency
    3. Defence Automatic Research Project Agency
    4. None of the given
  52. Planning and tracking of the project is the responsibility of the ________.

    1. Project Manager
    2. Architect
    3. Developer
    4. Chief Executive Officer
  53. Which computer category is widely used in our daily life?

    1. Super Computer
    2. Main Frame
    3. Personal Computer
    4. Laptop
  54. Sequence of steps that is taken to solve a problem is called ________.

    1. Algorithm
    2. Operating System
    3. Application software
    4. None of the given
  55. For writing a letter we can use ________ .

    1. MS Paint
    2. MS Word
    3. MS Excel
    4. Corel Draw
  56. World's first program was written by ________.

    1. Charles Babbage
    2. Alfred Tennyson
    3. Ada Lovelace
    4. Bernoulli
  57. The name of very first computer was ________.

    1. ABC
    2. BCD
    3. EDC
    4. None of the given
  58. Users ________, how things work.

    1. Analyze in detail
    2. Muddle through
    3. Figure out
    4. Read in detail
  59. ________ images enhanced to impart the illusion of depth.

    1. Parallel
    2. Diagonal
    3. Flat
    4. None of the given
  60. A new cell is added in a table row by using ________ tag in html.

    1. <BR> . . . </BR>
    2. <TR> . . . </TR>
    3. <TD> . . . </TD>
    4. <TABLE> . . . </TABLE>
  61. USB stands for:

    1. Uniform System Bill
    2. Universal System Bus
    3. Universal Serial Bus
    4. Unified Sequential Bus
  62. Video card has its own ________ and processor.

    1. Network Card
    2. Memory
    3. Serial Port
    4. Power Supply
  63. The effect of paragraph tag (<P> </P>) in a webpage, is that it:

    1. Brings the cursor to the next line
    2. Brings back the cursor to the previous line
    3. Brings the cursor to the next after next line
    4. Keeps the cursor in the same line
  64. <UL> tag is used to

    1. underline text
    2. end the line
    3. create ordered list
    4. create unordered list
  65. BASIC stands for:

    1. Basic American Standard Information Code
    2. Beginner's All purpose Symbolic Instruction Code
    3. Brother and Sisters In Christ
    4. British American Scientific International Commercial
  66. Which of the following keyword is used to jump out of switch statement as soon as match is found?

    1. default
    2. else
    3. jump
    4. break
  67. Function definition enclosed in a ________.

    1. pair of curly braces
    2. Pair of parenthesis
    3. Pair of Brackets
    4. All of the given
  68. The communication line between the CPU, memory and peripherals is called as

    1. RAM
    2. BUS
    3. FPU
    4. ALU
  69. Null character is used to indicate the ________ of string.

    1. Start
    2. End
    3. Begin
    4. Middle
  70. Which operator is used to complement the given value?

    1. OR
    2. NOR
    3. AND
    4. NOT
  71. Autonomous Web Agents are also known as ________.

    1. Mobile Agents
    2. Softbots
    3. Both "Mobile Agents" & "Softbots"
    4. None of the given
  72. Which of the following device can be used to control network traffic?

    1. Cable
    2. Connector
    3. Hub
    4. Repeater
  73. Using only Html we can create ________.

    1. Dynamic web pages
    2. Static web pages
    3. Both Static and Dynamic pages
    4. None of the given
  74. ________ returns a string containing characters copied from positions n to m-1

    1. charAT(n)
    2. substring (m)
    3. substring(n,m)
    4. None of the given
  75. Color mapping scheme reducing the size of 2.25 MB graphic to ________ MB.

    1. 0.90 MB
    2. 0.75 MB
    3. 1.00 MB
    4. None of the given
  76. Punched cards were invented first time for the purpose of ________.

    1. Calculations
    2. Entering Patterns in Textile Looms
    3. Storing Data
    4. Playing Cards
  77. All structure elements are ________ by default.

    1. Public
    2. Protected
    3. Private
    4. Public and Private
  78. ________ can be used for entering, editing or viewing data, one record at a time

    1. Forms
    2. Reports
    3. Queries
    4. Tables
  79. World’s first large-scale, automatic digital computer was:

    1. Atanasoff-Berry Computer
    2. Harvard Mark 1
    3. ENIAC
    4. IBM-PC
  80. If we use <INPUT type="password"> in HTML, what will happen?

    1. Text will not be visible
    2. Text will be in normal format
    3. Text will be in **** format
    4. Text will be in #### format
  81. To start an ordered list from 20 instead of 1, the correct option will be ________.

    1. <OL begin="20">
    2. <OL initiate="20">
    3. <OL start="20">
    4. <OL from="20">
  82. ________ is a high level language.

    1. Machine
    2. Assembly
    3. C++
    4. None of the given
  83. Batch programs do not ________.

    1. Print or store the results
    2. Get input data
    3. Execute programs without the interference of user
    4. Provide event handling
  84. ________ is correct format to access a string Method.

    1. methodName.string( )
    2. string.methodName( )
    3. methodName().string
    4. string ().methodName
  85. If someone wants to develop a web page then which one of the software from the following list will be his/her preference?

    1. Spreadsheet
    2. Word processor
    3. MS Outlook
    4. Dreamweaver
  86. Randomized algorithms are often ________ than deterministic algorithms for the same problem.

    1. Simpler and more slow
    2. Simpler and more efficient
    3. Complex and more efficient
    4. Complex and more slow
  87. Email uses ________ protocol.

    1. SMTP
    2. HTTP
    3. FTP
    4. None of the given
  88. TCP stands for:

    1. Transmission Control Practical
    2. Transmission Control Protocol
    3. Transfer Center Protocol
    4. None of the given
  89. Which function returns a randomly selected floating point number between 0 and 1?

    1. floor(x)
    2. ceil(x)
    3. random()
    4. round(x)
  90. Specifying the space in which a variable will be effective is called:

    1. Variable declaration
    2. Variable definition
    3. Variable Scope
    4. Variable garbage collection
  91. Internet Enables:

    1. attractively-priced workers located in Pakistan to provide services to overseas clients
    2. users to easily share information with others located all over the world
    3. users to easily, inexpensively communicate with others remote users
    4. All of the given
  92. WYSIWYG is:

    1. Software
    2. The abbreviation of "what you see is what you get"
    3. A Network company in Japan
    4. The abbreviation of "word you see is what you get"
  93. ROWSPAN is used to extend the current cell to some ________.

    1. columns
    2. rows
    3. columns & rows
    4. None of the given
  94. The computer working independently with no connection to any other computer is called :

    1. Standalone
    2. Workstation
    3. Server
    4. None of the given
  95. ________ are harmless in the sense that they only make copies of themselves on the infected computer

    1. Trojan horses
    2. Logic- or time-bombs
    3. Worms
    4. Viruses
  96. Browser is a ________ used for browsing.

    1. Component
    2. Tool
    3. Device
    4. None of the given
  97. Electrical pulses received over telephone line are converted into messages (comprehensible by the computer) by using:

    1. Modulator
    2. Demodulator
    3. Both Modulator and Demodulator
    4. None of the given
  98. The “Ockham’s Razor,” principle states that when choosing among competing, successful solutions to a problem; choose the one which is the least ________.

    1. Time Consuming
    2. Ambiguous
    3. Complex
    4. Restricted
  99. 1 byte consists of ________ bits.

    1. 10
    2. 9
    3. 8
    4. None of the given
  100. CERN releases WWW in:

    1. 1992
    2. 1993
    3. 1994
    4. None of the given
  101. The first Web browser with a GUI was generally available in:

    1. 1992
    2. 1993
    3. 1994
    4. 1995
  102. If there are multiple programs running on my PC having windows XP, then it refers to:

    1. Multi User
    2. Single User
    3. Single User, Multitasking
    4. Multi User, Multiprocessing
  103. Computer loses accuracy for a task after doing that task for:

    1. One millions of times
    2. One billions of times
    3. One trillions of times
    4. Computer never loses accuracy
  104. Today’s computers are based on the technology of ________.

    1. Punch cards
    2. Vacuum tubes
    3. Transistors
    4. Resistors
  105. When the packets reach the destination computer, Who reassembles them into the original message?

    1. UDP
    2. TCP
    3. UCP
    4. IP
  106. Atanasoff-Berry Computer is the first computer that used:

    1. Binary number system
    2. Octal number system
    3. Decimal number system
    4. Hexadecimal number system
  107. A developer analyses the user's requirements, performs further investigation, and produces unambigious specifications in ________ step.

    1. Planning
    2. User Requirements
    3. Designing
    4. Developer Specifications
  108. There are ________ types of errors.

    1. 2
    2. 3
    3. 4
    4. 5
  109. Which one is correct?

    1. <HEAD> </HEAD>
    2. <HEAD> <END>
    3. <HEAD> </END>
    4. <HEAD> <\HEAD>
  110. Bit-map images compresses using the ________ algorithm.

    1. LZV
    2. LZW
    3. LZE
    4. None of the given
  111. JavaScript consider every thing as:

    1. Control
    2. Window
    3. Object
    4. Statement
  112. ________ is the best known builder for supercomputers.

    1. Sun
    2. Cray Research
    3. Microsoft
    4. Apple
  113. Which one of these is NOT an example of storage devices?

    1. Tape
    2. RAM
    3. Floppy
    4. DVD
  114. ________ maintains index of names and location of the files.

    1. File Folder
    2. File manager
    3. File system
    4. Operating system
  115. CD stands for:

    1. Computer Disc
    2. Computer Data
    3. Compact Disc
    4. Compact Data
  116. In Analysis of Algorithms ________ generally measured in terms of the number of steps required to execute an algorithm

    1. Bandwidth
    2. Time
    3. Memory
    4. Logic functions
  117. For computers, ________ number system is natural.

    1. Decimal
    2. Octal
    3. Binary
    4. Hexadecimal
  118. If a user is using CGI script on a UNIX server, then the script type is called ________.

    1. Client side scripting
    2. Server side scripting
    3. Stand-alone scripting
    4. GUI scripting
  119. When we use <INPUT type=“password”>, what will happen?

    1. Text will not be visible
    2. Text will be in normal format
    3. Text will be in **** format
    4. Text will be in #### format
  120. If a computer could pass the Turing test then it would be able to:

    1. win a million dollar prize
    2. think like human beings
    3. think but slower than humans
    4. do the things faster
  121. A vocabulary and set of grammatical rules for instructing a computer to perform specific tasks is called

    1. Software
    2. Programming language
    3. Device driver
    4. Interpreter
  122. ________ helps in finding synonyms as well as antonyms in Word Processors

    1. Tables
    2. Thesaurus
    3. Spelling & Grammar
    4. Word Count
  123. SCSI stands for:

    1. Small computer system interface
    2. System Common Small Integration
    3. Silicon Computer System Interface
    4. None of the given
  124. Structures, in which another list starts before the first list is finished, are called:

    1. Multiple Lists
    2. Nested Lists
    3. Ordered Lists
    4. Un-ordered Lists
  125. Web is a unique invention by humans in terms that it is:

    1. accessible to only the owners who control it
    2. accessible from particular locations only
    3. accessible to all humans
    4. accessible to only the educational institutes
  126. We need ________ for memory management in computer.

    1. Software
    2. Hardware
    3. Operating System
    4. Application Software
  127. Array can be defined as:

    1. An indexed list of elements
    2. A list of elements
    3. A collection of elements
    4. None of the given
  128. When we run a program in a computer, the actual execution of the program takes place in ________.

    1. RAM
    2. ROM
    3. Microprocessor
    4. Hard Disk
  129. Suppose a web developer wants to permit the user to make multiple selections from the list of 5 options on a web page. Which type of element will he use for this situation?

    1. Check box
    2. Text box
    3. Radio button
    4. Text area
  130. To iterate each element of an array, the best know structure for iteration is:

    1. While loop structure
    2. If-else structure
    3. Switch statements
    4. For loop structure
  131. ________ translates the High level language program, one statement at time.

    1. Interpreter
    2. Compiler
    3. Utility program
    4. Anti virus software
  132. Anti Virus software is a kind of ________.

    1. Utility Program
    2. System Software
    3. Device Driver
    4. Freeware
  133. ________ invented at the Imperial University in Tokyo by Yoshiro Nakamats.

    1. Hard drive
    2. Flash drive
    3. Floppy disk
    4. Optical disc
  134. ________ is / are more suitable technique(s) for a developer to use in order to construct the actual code of a software.

    1. Pseudo code
    2. Flow chart
    3. Algorithm
    4. Heuristics
  135. represents the ________ element of flow chart.

    1. Process
    2. Input
    3. Display
    4. Connector
  136. ________ is also known as System Architecture.

    1. High level system design
    2. Low level system design
    3. Every system design
    4. Software Requirement
  137. ________ addresses are difficult to recognize and remember for humans.

    1. TCP
    2. IP
    3. SMTP
    4. None of the given
  138. Deep Blue was the name of:

    1. Human
    2. Computer
    3. City
    4. None of the given
  139. 1 byte consists of ________ bits.

    1. 8
    2. 10
    3. 12
    4. 16
  140. ________ can perform at or near the currently highest operational rate for computers.

    1. Microcomputers
    2. Supercomputers
    3. Personal Computers
    4. Mini Computers
  141. The ________ virus may destroy or broadcast private data.

    1. Malicious
    2. Neutral
    3. Helpful
    4. DoS
  142. The internet communities are ________.

    1. Geographical based
    2. Interest based
    3. Country based
    4. Religion based
  143. Detailed plan of SW life cycle specifies two things that are the ________.

    1. Required resources and expected cost
    2. Expected cost and budget
    3. Required resources and expected deliverables
    4. Time and cost
  144. There are ________ tags in html.

    1. Only Single
    2. Only Paired
    3. Single and Paired
    4. Multiple
  145. A group of information is called

    1. File
    2. Database
    3. Record
    4. Field
  146. Architecture design is ________ design.

    1. Dependant
    2. Low Level
    3. High Level
    4. Secondary
  147. To make a text bold in html, the ________ tag is used.

    1. <BR> </BR>
    2. <BOLD> </BOLD>
    3. <B> </B>
    4. <BODY> </BODY>
  148. Files can be downloaded or uploaded using ________ protocol.

    1. SMTP
    2. FTP
    3. TELNET
    4. None of the given
  149. ________ mode allows us to add data or change data anywhere in the file.

    1. ios::ate
    2. ios::app
    3. ios::binary
    4. ios::edit
  150. ________ is used to transfer files between computers on a TCP/IP network.

    1. TCP
    2. FTP
    3. Telnet Protocol
    4. All of the given
  151. There are ________ & ________ popular schemes to reduce the number of bytes that are required for storing graphics.

    1. Contrast & Color Control
    2. Dithering & Color Mapping
    3. Matching & Non-Matching
    4. None of the given
  152. ________ is the essential property of every JavaScript object.

    1. Color
    2. Width
    3. Name
    4. Size
  153. Which of the following manages the HW and SW resources of the computer system?

    1. Hardware
    2. System Software
    3. Operating system
    4. Graphics Software
  154. VPN stands for:

    1. Virtual Public Network
    2. Virtual Private Network
    3. Visual Private Network
    4. Virtual Personal Network
  155. ________ is a special purpose computer that directs the data traffic when several paths are available.

    1. Bridge
    2. Router
    3. Gateway
    4. None of the given
  156. Which of the following application is collections of cells?

    1. Word
    2. Excel
    3. PowerPoint
    4. Outlook Express
  157. First computer designed for commercial applications was ________.

    1. UNIVAC 1
    2. ENIAC
    3. EDVAC
    4. Atanasoff-Berry Computer
  158. Smallest unit of storage is:

    1. Bit
    2. Byte
    3. Mega Byte
    4. None of the given
  159. Vacuum tubes were replaced by ________.

    1. Punch cards
    2. Transistors
    3. Micro Processors
    4. Resistors
  160. One can download or upload files to a remote computer using ________ protocol.

    1. HTTP
    2. SMTP
    3. FTP
    4. TELNET
  161. ________ is in Executive team.

    1. Project Manager
    2. CEO
    3. Team Lead
    4. Developer
  162. ________ based communication allows business entities to coordinate the activities of their globally spread units with greater accuracy.

    1. Intranet
    2. Internet
    3. Home
    4. LAN
  163. In Spreadsheets, you can create relationship between two cells by using ________.

    1. Text
    2. Formulas
    3. Numbers
    4. None of the given
  164. In MS Excel \( \sum \) sign represents:

    1. The AutoCorrect button
    2. The AutoFormat button
    3. The AutoSum button
    4. The conditional formatting button
  165. HTTP stands for:

    1. Hyper Text Transparent Protocol
    2. Hyper Terminal Transfer Provider
    3. Hyper Text Transfer Procedure
    4. Hyper Text Transfer Protocol
  166. Mixed-case capitalization of event handlers (e.g. onClick) is ________ for JavaScript event handlers defined in HTML code

    1. a Defined Rule
    2. a Requirement
    3. a Convention
    4. Necessary
  167. The computer working independently with no connection to any other computer is called:

    1. Standalone
    2. Workstation
    3. Server
    4. None of the given
  168. Who wrote the first program for Analytical engine?

    1. Babbage
    2. Lady Ada
    3. Haward
    4. Bernoulli
  169. Which one of the following is not a suitable option when we talk about JavaScript language?

    1. Object based language
    2. Markup language
    3. Interpreted language
    4. Event driven language
  170. ________ are personal computers that are designed to be easily transported and relocated.

    1. Desktops
    2. Portables
    3. Servers
    4. Workstations
  171. The code in the ________ portion is the right choice for developing larger JavaScript scripts.

    1. Body
    2. At End
    3. Head
    4. Separate
  172. Disk operating system is ________ operating system

    1. Menu driven
    2. Graphical user interface
    3. Command driven
    4. None of the given
  173. ________ is a type of computer-to-computer messaging.

    1. TCP
    2. Telnet
    3. E-mail
    4. FTP
  174. Spread sheet is a type of ________.

    1. Productivity software
    2. Engineering software
    3. Mathematical software
    4. Business software
  175. A ________ translates a high-level language (that is easy to understand for humans) into a language that the computer can understand.

    1. Computer
    2. Transistor
    3. Compiler
    4. Device
  176. Heuristics are used because they ________.

    1. Always give the best results
    2. Mostly gives good-enough results
    3. Don’t give wrong results
    4. Are commonly used as rule of thumb
  177. Web is a unique invention by humans in terms of it is:

    1. accessible to all humans
    2. accessible to only the educational institutes
    3. accessible to only the qwners who control it
    4. accessible from particular locations only
  178. Microphone is an input as well as output device. This statement is:

    1. True
    2. False
    3. Meaningless
  179. Programs that are typically started from a shell (or automatically via a scheduler) are called ________.

    1. Batch programs
    2. Event-driven programs
    3. Sequential programs
    4. Application programs
  180. Compared to vacuum tubes, Transistors offer:

    1. Much smaller size
    2. Better reliability
    3. Much lower cost
    4. All of the given
  181. ________ is a programming language which was specifically designed to develop business applications.

    1. BASIC
    2. FORTRAN
    3. COBOL
    4. Perl
  182. Software development starts from ________ and ends with ________.

    1. Design, Coding
    2. Concept, Designing
    3. Coding, Testing
    4. Concept, Decommissioning
  183. Which language had been used by the US department of defense?

    1. Java script
    2. Binary language
    3. C++
    4. Ada
  184. In SW Life cycle Thinking about the future phases generally results in ________ and ________.

    1. lesser delivery time ; higher quality
    2. more delivery time ; lesser quality
    3. risk-full scenarios ; more delivery time
    4. lesser quality ; more cost
  185. In a HTML Form for file upload input element we use the following value in type attribute:

    1. Text
    2. Radio
    3. Hidden
    4. File
  186. You need to place University name on top of the every page of 100 pages document and Page number in the bottom of page. This can be done with the help of ________.

    1. Reference initials
    2. Bullet and Numbering
    3. Borders and Shading
    4. Header and Footer
  187. Computer directly understand the ________ language

    1. human
    2. high level
    3. machine
    4. None of the given
  188. You are asked to pick two things from different types of things like jewelry, mobile phones and cars. Which algorithm will be best suited in this situation to get maximum benefits?

    1. Deterministic Algorithm
    2. Non Deterministic Algorithm
    3. Greedy Algorithm
    4. Randomized Algorithm
  189. RDBMS stands for:

    1. Relative Data Base Management System
    2. Relational Data Base Management System
    3. Recursive Data Base Management System
    4. Responsible Data Base Management System
  190. ________ returns a randomly selected, floating point number between 0 and 1.

    1. Math.random
    2. random
    3. random()
    4. None of the given
  191. ________ is volatile memory.

    1. RAM
    2. ROM
    3. Hard Disk
    4. CD ROM
  192. UNIVAC contained ________ vacuum tubes and was able to process ________ instructions per second.

    1. 5000, 5000
    2. 19000, 5000
    3. 5000, 2000
    4. 19000, 2000
  193. Battery on the motherboard of a computer is used to ________.

    1. Give power to the processor
    2. Save time and BIOS information, when computer is off
    3. Turn on the CPU lights
    4. Increase the processor speed
  194. You cannot close Microsoft Word 2003 by ________.

    1. Choosing File menu then Exit command
    2. Pressing Alt+F4
    3. Clicking X button on title bar
    4. Choosing Close submenu from File menu
  195. A software that allows an operating system to interact with a hardware device is called ________.

    1. Compiler
    2. Linker
    3. Driver
    4. Kernel
  196. Hardware malfunctions is related to ________.

    1. Data updates
    2. Data integrity
    3. Data security
    4. Data accessibility
  197. When the logical operator AND (&&) combines two expressions exp1 and exp2 then the result will be true only ________.

    1. When both exp1 and exp2 are true
    2. When both exp1 and exp2 are false
    3. When exp1 is true and exp2 is false
    4. When exp1 is false and exp2 is true
  198. We use ________ to stop Break-Ins.

    1. Scanners
    2. Intrusion detectors
    3. Firewalls
    4. Intrusion detectors and Firewalls
  199. Which of the following symbol is used in JavaScript to add multiple line comments in a program?

    1. /
    2. //
    3. /*
    4. //*
  200. Some of the things that JavaScript can do! Choose incorrect option from following:

    1. Control the appearance of the browser
    2. Read – Modify
    3. Control the content and appearance
    4. Interact with the user through event handlers
  201. What will replace Transistors?

    1. Electro-mechanical computing
    2. Vacuum tube computing
    3. Quantum computing
    4. Nothing can replace Transistors
  202. VisiCalc was the first popular ________ application on PC’s.

    1. Spreadsheet
    2. Word processor
    3. Presentation
    4. Database
  203. A string consisting of JavaScript statements enclosed in double or single ________.

    1. LINES
    2. EVENTS
    3. TAG’s
    4. QUOTES