VU Assist - CS101 Past Papers
VU Assist - CS101 Past Papers
VU Assist - CS101 Past Papers
Special control
Internet explorer
Event handlers
Java script does not interact with user
A unique identifier for a computer on TCP/IP network is called
Net address
IP address
TCP address
Network address
onLoad event is occurred when the form is ___________
Loaded
Unloaded
A button is pressed.
Nothing happens.
Which of the followings is NOT a Relational DBMS software.
Access
FrontPage
FileMaker Pro
SQL Server
country=”Hello Pakistan”;
document.write(country.length);
Page 1 of 11
For more papers, go on to VUAssist.blogspot.com
The output of the above statement is _____.
12
13
14
15
When’+’ operator is used with string operands, it _____________ both strings.
Adds
Subtracts
Concatenates
Compares
Due to working at home, lack of interaction may result in ___________
professional growth.
Slower
Faster
Higher
Improved
_______ has great PR skills.
Architect
Team Lead
Project Manager
Chief Executive Officer
________ breaks down the message, to be sent over the internet, into packets.
Page 2 of 11
For more papers, go on to VUAssist.blogspot.com
Protocol
TCP
IP
NIC
When the packets reach at destination, __________ reassembles them into
original message.
Protocol
TCP
IP
NIC
Many developers write the _________ first and then incrementally convert each
line into _______.
Real code & Pseudo code
Pseudo code & Real code
Real code & Artificial code
None of the given options
If a computer could pass the Turing test then it would be able to:
think like human beings
do the things faster
win a million dollar prize
store more information
Information available on the web is
Page 3 of 11
For more papers, go on to VUAssist.blogspot.com
mostly free of cost
costly
very cheap
of no use
When we buy a software package, we do not really buy it, we just by a license
that allows us to use it, the ___________stays with the maker.
Agreement
Ownership
Membership
Software
Now a days, users communicate with the computer using a consistent ________
provided by the Operating System.
Command
In-line interface
Application Interface
User Interface Protocol
Users look for ________ solution.
Optimal
First good enough
Good
Best
Which protocol is used to send email?
Page 4 of 11
For more papers, go on to VUAssist.blogspot.com
FTP
SMTP
TELNET
All of the given choices
There are _________ ways of calling functions.
One
Two
Three
Four
In TCPIP communication fragmentation is responsibility of
TCP
IP
Both TCP and IP
Internet
Those Systems are “Intelligent System” that mimics some aspects of
Software deployment
Human thought
Speaking power
Computing
_____ is the process of analyzing large databases to identify patterns.
Data normalization
Data management Data Mining
Page 5 of 11
For more papers, go on to VUAssist.blogspot.com
None of the given options
<form> Tags always placed between the <BODY> and </BODY> tags of a Web
page
True
False
The ____ has changed marketing forever, redirecting it from a mass focus to a
single person focus.
Web
Television
Mobile
Radio
Page 6 of 11
For more papers, go on to VUAssist.blogspot.com
____ loop is a flow control statement that allows code to be executed
repeatedly based on a given Boolean condition.
For
Do-While
If-else
While
Global variables can make the logic of a web page.
Difficult to understand
Easier to understand and maintain
Difficult to reuse and maintain
Difficult to understand, reuse and maintain
A unique identifier for a computer on TCP/IP network is called ____________.
Net address
IP address
TCP address
Network address
Which one is NOT a presentation software?
MS Access
CA Harvard Graphics
Corel Presentation
Lotus Freelance
Command that allows you to recover form mistakes is called _______.
Page 7 of 11
For more papers, go on to VUAssist.blogspot.com
Clear
Edit
Undo
Break
Team Lead
Project Manager
CEO
IT Manager
The tasks performed to determine the existence of defects is called _______
Debugging
Testing
Page 9 of 11
For more papers, go on to VUAssist.blogspot.com
Repairing
Coding
When we buy a software package, we do not really buy it, we just by a license
that allows us to use it, the ___________stays with the maker.
Agreement
Ownership
Membership
Software
Processed data is called ________.
Information
Data
Entity
Attribute
Questions:
1. Define the key weakness of the web?
2. How can you define a consistent web design? Why is it needed?
3. Briefly mention any three problems in old modes of presentation
Development
4. How many types of errors can be found during a program developement?
List them.
Page 10 of 11
For more papers, go on to VUAssist.blogspot.com
5. How many members are in the Process Team? What are the
responsibilities of the Process Team?
6. What is the difference between Database and Database Management
System (DBMS)?
7. How many members should be in the Executive Team? What are the
responsibilities and profile of the members in the Executive Team?
Page 11 of 11
For more papers, go on to VUAssist.blogspot.com