Best Website To Help Vu Students

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 11

http://vujannat.ning.

com
Best Website To Help Vu Students

FINALTERM EXAMINATION
Fall 2009
CS101- Introduction to Computing (Session - 4)
Ref No: 1115886
Time: 120 min
Marks: 75
Student Info
StudentID: BC090403561

Center: OPKSTa

ExamDate: 3/2/2010 12:00:00 AM

For Teacher's Use Only


Q 1 2 3 4 5 6 7 8 Total
No.
Marks

Q No. 9 10 11 12 13 14 15 16

Marks

Q No. 17 18 19 20 21 22 23 24

Marks

Q No. 25 26 27 28 29 30 31 32

Marks

Q No. 33 34 35 36 37 38 39 40

Marks

Q No. 41

Marks

http://vujannat.ning.com
Best Website To Help Vu Students
http://vujannat.ning.com
Best Website To Help Vu Students

Question No: 1 ( Marks: 1 ) - Please choose one

Which of the following is NOT a category of Mobile Computers?


► Laptop
► Palmtop
► Desktop
► Wearable

Question No: 2 ( Marks: 1 ) - Please choose one

TCP stands for ___________.


► Total communication protocol
► Transmission control protocol
► Transfer control protocol
► Transfer collection protocol

Question No: 3 ( Marks: 1 ) - Please choose one

A named collection of properties (data, state) and methods (instruction, behavior) is


called ____________.
► Array
► Function
► Variable
► Object

Question No: 4 ( Marks: 1 ) - Please choose one

A _________ is a meaningful, easy-to-remember ‘label’ for an IP address.


► TCP address
► Domain name
► Network name
► VoIP

Question No: 5 ( Marks: 1 ) - Please choose one

Serial arrangement in which things follow logical order or a recurrent pattern, such as
statements executing one by one, is called __________.
► Loop
► Sequence
► Condition
► Array

Question No: 6 ( Marks: 1 ) - Please choose one

http://vujannat.ning.com
Best Website To Help Vu Students
http://vujannat.ning.com
Best Website To Help Vu Students

Which one of the following is NOT a component of Rule Based System?


► Rule Compiler
► Rule Interpreter
► Rules Base
► Working Memory

Question No: 7 ( Marks: 1 ) - Please choose one

AutoCAD falls in the category of _________________

► Engineering Applications

► Graphics Applications

► Scientific Applications

► Business Applications

Question No: 8 ( Marks: 1 ) - Please choose one

Programs that run on client machine and validate info that a user enters in a form, are
known as:
► Server-Side Scripts

► Client-Side Scripts

► Super Scripts

► Form Scripts

Question No: 9 ( Marks: 1 ) - Please choose one

All the hardware components of the Computer system are installed on-------------.

► Microprocessor
► Motherboard
► Monitor
► Memory

Question No: 10 ( Marks: 1 ) - Please choose one


http://vujannat.ning.com
Best Website To Help Vu Students
http://vujannat.ning.com
Best Website To Help Vu Students

In RDBMS, table rows are called __________.


► Field
► Record
► Column
► Query

Question No: 11 ( Marks: 1 ) - Please choose one

The distance among families is ___________ because of spending more time on internet.
► Increased
► Expanded
► Contracted
► Decreased

Question No: 12 ( Marks: 1 ) - Please choose one

Tribal flood network is a ___________ software.


► DoS
► Scanning
► Utility
► None of the given options

Question No: 13 ( Marks: 1 ) - Please choose one

To stop industrial espionage, we use__________.


► Private network
► Encryption
► Network sniffer
► All of the given options

Question No: 14 ( Marks: 1 ) - Please choose one

The responsibilities of the Team Lead includes_____________.


► Planning and tracking of the project
► Detailed design
► Professional development of team members
► All of the given options

Question No: 15 ( Marks: 1 ) - Please choose one

Client relationship management is the responsibility of _____________.


► Team Lead
► Project Manager
► Developer
http://vujannat.ning.com
Best Website To Help Vu Students
http://vujannat.ning.com
Best Website To Help Vu Students

► Quality Assurance Expert

Question No: 16 ( Marks: 1 ) - Please choose one

_______________ is responsible for day to day operations.


► CEO
► COO
► CMSO
► Developer

Question No: 17 ( Marks: 1 ) - Please choose one

There are _________ types of errors.


►2
►3
►4
►5

Question No: 18 ( Marks: 1 ) - Please choose one

Sequence of steps that is taken to solve a problem is called _______.

► Algorithm
► Operating System
► Application software
► None of the given options

Question No: 19 ( Marks: 1 ) - Please choose one

Supercomputers are used in:


► Weather forecasting
► Aeroplane mnufacturing
► Atomic bomb experiments
► All of the given choices

Question No: 20 ( Marks: 1 ) - Please choose one

Which is NOT true for JavaScript variable name ?


► Student
► Roll_no_1111
► For
► _schedule

Question No: 21 ( Marks: 1 ) - Please choose one

http://vujannat.ning.com
Best Website To Help Vu Students
http://vujannat.ning.com
Best Website To Help Vu Students

In JavaScript, first element of an array has the index:


►1
► -1
►2
► None of the given choices

Question No: 22 ( Marks: 1 ) - Please choose one

One can browse documents residing on a remote computer using ________ protocol.
► HTTP
► SMTP
► FTP
► TELNET

Question No: 23 ( Marks: 1 ) - Please choose one

One can run a program on a remote computer using ________ protocol.


► HTTP
► SMTP
► FTP
► TELNET

Question No: 24 ( Marks: 1 ) - Please choose one

There are _________ ways of calling functions.


► One
► Two
► Three
► Four

Question No: 25 ( Marks: 1 ) - Please choose one

Which protocol is use to transfer a file over the network ?


► UDP
► FTP
► TCP
► OSI

Question No: 26 ( Marks: 1 ) - Please choose one

_____ is the process of analyzing large databases to identify patterns.


► Data normalization
► Data management
► Data Mining
► None of the given options
http://vujannat.ning.com
Best Website To Help Vu Students
http://vujannat.ning.com
Best Website To Help Vu Students

Question No: 27 ( Marks: 1 ) - Please choose one

The first spread sheet program was invented by


► Charles Babbage
► Dan Bricklin
► Paul Graham
► John von Neumann

Question No: 28 ( Marks: 1 ) - Please choose one

Web Pages developed for human as well computer understanding are called as;
► Static Web Pages
► Semantic Web Pages
► Dynamic Web Pages
► Java Web Pages

Question No: 29 ( Marks: 1 ) - Please choose one

From which of the following is NOT a technique through which Security can be
improved :
► Private or virtual-private networks
► Firewalls
► Metal detectors
► Virus detectors

Question No: 30 ( Marks: 1 ) - Please choose one

In JavaScript: In order to display the text on browser Grade A, which of following


statement is True.

► documentwrite( "Grade A")


► document.write( "Grade A");
► document.write( "Grade” && A");
► document.write( "Grade” && “A");

Question No: 31 ( Marks: 1 )

SMTP stands for what?


Ans: Simple Mail Transfer Protocol

Question No: 32 ( Marks: 1 )

What is an IP address?
Ans: A unique identifier for a computer on a TCP/IP network is called IP address.
http://vujannat.ning.com
Best Website To Help Vu Students
http://vujannat.ning.com
Best Website To Help Vu Students

Question No: 33 ( Marks: 2 )

What is spreadsheet? List any two jobs that it can do.


Ans: A spreadsheet- VisiCalc- was the first popular application on PC’s.
Electronic replacement for ledgers.
Used for automating engineering, scientific, but in majority of cases, business
calculations.

Question No: 34 ( Marks: 2 )

Define the key weakness of the web?


Ans: The Web (as it currently exists) was designed for humans to read, not for computers
to understand and manipulate meaningfully.
Computers face great problems in dealing with the current text- and graphics-based
content of the Web.
Question No: 35 ( Marks: 3 )

What are the Sub categories of Artificial Intelligence? Briefly explain any two.
Ans: Many times are based on a branch of computer science called “artificial
intelligence” Category of SW is designed to help business managers in making effective
decisions in complex situations based on the analysis of the relevant data
Following two Sub categories of Artificial Intelligence are:
Productivity Software:
Most popular category in terms of licenses sold
Common features
Ability to simplify, automate everyday business tasks
Word Processors:
Probably the most popular productivity app
Initially designed as a replacement for the typewriter
Automation

Question No: 36 ( Marks: 3 )

What are Logic- or Time-Bombs ?


Ans: It executes its payload when a predetermined event occurs
Example events:
A particular word or phrase is typed.
A particular date or time is reached.
Question No: 37 ( Marks: 3 )

Diffentiate Local and Global Variables.


Ans: Local or Function-level Variable
Effective only in the function in which they are declared
Global Variables
http://vujannat.ning.com
Best Website To Help Vu Students
http://vujannat.ning.com
Best Website To Help Vu Students

Visible everywhere on the Web page


Question No: 38 ( Marks: 5 )

How global corporations are becoming more powerful?


Ans: Internet-based communication is allowing business entities to coordinate the
activities of their globally-spread units with greater accuracy The knowledge gained by
one unit becomes available to all others very quickly All this has made these business
entities very powerful, even more powerful than many nation-states.
Question No: 39 ( Marks: 5 )

In a System having many parts to be designed, what type of part one should always do
first? Describe briefly.
Ans: A system has many parts to be designed like hard part, simple part, quality part,
development part in all the system the hard part should be designed first because hard
part is necessary before all parts.

Question No: 40 ( Marks: 10 )

What are the phases of the DoS attack? Explain each phase in detail.
Ans: The DoS SW is not custom SW, and can be downloaded from the Internet.
Therefore, it is difficult to track the person who launched the attack by analyzing that
SW.
Three Phases of the DoS
1. Search
2. Arm
3. Attack
Neutralizing the Attack
The engineers responsible for monitoring the traffic on the Yahoo Web sites quickly
identified the key characteristics of the packets originating from those drones
Then they setup filters that blocked all those packets
BTW, the same type of attack brought down the CNN, Buy, eBay, Amazon Websites the
very next day of the Yahoo attack
How to stop DoS attacks from taking place?
Design SW that monitors incoming packets, and on noticing a sudden increase in the
number of similar packets, blocks them
Convince system administrators all over the world to secure their servers in such a way
that they cannot be used as drones
Cyber crime can be used to:
Damage a home computer
Bring down a business
Weaken the telecom, financial, or even defense-related systems of a country
Mail Bombing
A stream of large-sized emails are sent to an address, overloading the destination
account.

http://vujannat.ning.com
Best Website To Help Vu Students
http://vujannat.ning.com
Best Website To Help Vu Students

This can potentially shut-down a poorly-designed email system or tie up the telecom
channel for long periods
Defense: email filtering
Break-Ins
Hackers are always trying to break-in into Internet-connected computers to steal info or
plant malicious programs
Defense:
– Firewalls
– Intrusion detectors
– Other effective security policies
Credit Card Fraud
A thief somehow breaks into an ecommerce server and gets hold of credit numbers and
related info
The thief then uses that info to order stuff on the Internet
Alternatively, the thief may auction the credit card info on certain Web sites setupjust for
that purpose
Defense: Use single-use credit card numbers for your Internet transactions
Software Piracy
Using a piece of SW without the author’s permission or employing it for uses not allowed
by the author is SW piracy
Defense: Various authentication schemes. They, however, are seldom used as they
generally annoy the genuine users
Industrial Espionage
Spies of one business monitoring the network traffic of their competitors
They are generally looking for info for future products, marketing strategies, and even
financial info
Defense: Private networks, encryption, network sniffers
Question No: 41 ( Marks: 10 )

Write HTML and JavaScript code for the requirements shown in the diagram below.
When ConvertoUpperCase button is pressed, the entered text is converted to upper case
and result is displayed in the result text box. Similarly, when ConvertoLowerCase button
is pressed, the entered text is converted to lower case and result is displayed in the result
text box.

http://vujannat.ning.com
Best Website To Help Vu Students
http://vujannat.ning.com
Best Website To Help Vu Students

<html>
<head>
<script type="text/javascript">
function askupp
{
var x= prompt("Paste your uppercase text in here to be translated into
Uppercase","ANYTHING")
if (x!==null && x=="")
{
document.write(x.toUpperrCase());
}
}
function ask low
{
var y= prompt("Paste your lowercase text in here to be translated into lower
case","anything")
if (y!==null && x=="")
{
document.write(x.toLow

http://vujannat.ning.com
Best Website To Help Vu Students

You might also like