Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

VU Assist - CS101 Past Papers

Download as pdf or txt
Download as pdf or txt
You are on page 1of 11

Java script interact with user through______________

 Special control
 Internet explorer
 Event handlers
 Java script does not interact with user
A unique identifier for a computer on TCP/IP network is called
 Net address
 IP address
 TCP address
 Network address
onLoad event is occurred when the form is ___________
 Loaded
 Unloaded
 A button is pressed.
 Nothing happens.
Which of the followings is NOT a Relational DBMS software.
 Access
 FrontPage
 FileMaker Pro
 SQL Server
country=”Hello Pakistan”;
document.write(country.length);

Page 1 of 11
For more papers, go on to VUAssist.blogspot.com
The output of the above statement is _____.
 12
 13
 14
 15
When’+’ operator is used with string operands, it _____________ both strings.
 Adds
 Subtracts
 Concatenates
 Compares
Due to working at home, lack of interaction may result in ___________
professional growth.
 Slower
 Faster
 Higher
 Improved
_______ has great PR skills.
 Architect
 Team Lead
 Project Manager
 Chief Executive Officer
________ breaks down the message, to be sent over the internet, into packets.

Page 2 of 11
For more papers, go on to VUAssist.blogspot.com
 Protocol
 TCP
 IP
 NIC
When the packets reach at destination, __________ reassembles them into
original message.
 Protocol
 TCP
 IP
 NIC
Many developers write the _________ first and then incrementally convert each
line into _______.
 Real code & Pseudo code
 Pseudo code & Real code
 Real code & Artificial code
 None of the given options
If a computer could pass the Turing test then it would be able to:
 think like human beings
 do the things faster
 win a million dollar prize
 store more information
Information available on the web is

Page 3 of 11
For more papers, go on to VUAssist.blogspot.com
 mostly free of cost
 costly
 very cheap
 of no use
When we buy a software package, we do not really buy it, we just by a license
that allows us to use it, the ___________stays with the maker.
 Agreement
 Ownership
 Membership
 Software
Now a days, users communicate with the computer using a consistent ________
provided by the Operating System.
 Command
 In-line interface
 Application Interface
 User Interface Protocol
Users look for ________ solution.
 Optimal
 First good enough
 Good
 Best
Which protocol is used to send email?

Page 4 of 11
For more papers, go on to VUAssist.blogspot.com
 FTP
 SMTP
 TELNET
 All of the given choices
There are _________ ways of calling functions.
 One
 Two
 Three
 Four
In TCPIP communication fragmentation is responsibility of
 TCP
 IP
 Both TCP and IP
 Internet
Those Systems are “Intelligent System” that mimics some aspects of
 Software deployment
 Human thought
 Speaking power
 Computing
_____ is the process of analyzing large databases to identify patterns.
 Data normalization
 Data management Data Mining

Page 5 of 11
For more papers, go on to VUAssist.blogspot.com
 None of the given options
<form> Tags always placed between the <BODY> and </BODY> tags of a Web
page
 True
 False
The ____ has changed marketing forever, redirecting it from a mass focus to a
single person focus.
 Web
 Television
 Mobile
 Radio

Which function returns integer nearest to x?


 random()
 exp(x)
 log(x)
 round(x)
Hardware malfunctions is related to
 Data updates
 Data integrity
 Data security
 Data accessibility

Page 6 of 11
For more papers, go on to VUAssist.blogspot.com
____ loop is a flow control statement that allows code to be executed
repeatedly based on a given Boolean condition.
 For
 Do-While
 If-else
 While
Global variables can make the logic of a web page.
 Difficult to understand
 Easier to understand and maintain
 Difficult to reuse and maintain
 Difficult to understand, reuse and maintain
A unique identifier for a computer on TCP/IP network is called ____________.
 Net address
 IP address
 TCP address
 Network address
Which one is NOT a presentation software?
 MS Access
 CA Harvard Graphics
 Corel Presentation
 Lotus Freelance
Command that allows you to recover form mistakes is called _______.

Page 7 of 11
For more papers, go on to VUAssist.blogspot.com
 Clear
 Edit
 Undo
 Break

Which one is correct?


 <HEAD> </HEAD>
 <HEAD> <END>
 <HEAD> </END>
 <HEAD> <\HEAD>
By default in a web page Hyper Link for another web page is represented as
_______________ .
 Blue only
 Black and Underlined
 Blue and Bold
 Blue and Underlined
________ can be used for entering, editing, or viewing data, one record at a
time.
 Queries
 Forms
 Reports
 None of the given options
______________ is a field that uniquely identifies each record stored in a table.
Page 8 of 11
For more papers, go on to VUAssist.blogspot.com
 Composite Key
 Primary key
 Foreign key
 None of the given options
What is the 2nd step of DoS attack?
 Race
 Arm
 Search
 Attack
Spies of one business monitoring the network traffic of their competitors’ __.
 Industrial Intelligence
 Industrial Espionage
 Industrial Spying
 Industrial Surveillance

The developer report to ___________ in a development team.

 Team Lead
 Project Manager
 CEO
 IT Manager
The tasks performed to determine the existence of defects is called _______
 Debugging
 Testing
Page 9 of 11
For more papers, go on to VUAssist.blogspot.com
 Repairing
 Coding
When we buy a software package, we do not really buy it, we just by a license
that allows us to use it, the ___________stays with the maker.
 Agreement
 Ownership
 Membership
 Software
Processed data is called ________.
 Information
 Data
 Entity
 Attribute

Questions:
1. Define the key weakness of the web?
2. How can you define a consistent web design? Why is it needed?
3. Briefly mention any three problems in old modes of presentation
Development
4. How many types of errors can be found during a program developement?
List them.

Page 10 of 11
For more papers, go on to VUAssist.blogspot.com
5. How many members are in the Process Team? What are the
responsibilities of the Process Team?
6. What is the difference between Database and Database Management
System (DBMS)?
7. How many members should be in the Executive Team? What are the
responsibilities and profile of the members in the Executive Team?

Page 11 of 11
For more papers, go on to VUAssist.blogspot.com

You might also like