Home
|
Quiz
|
Videos
|
Links
|
Download
|
Books
|
#
|
Quiz
|
A
|
B
|
C
|
D
|
Ans
|
1
|
An algorithm that always takes the best immediate or local solution
while finding an answer is called ________
|
Deterministic Algorithm
|
Non deterministic Algorithm
|
Greedy Algorithm
|
Randomized Algorithm
|
C
|
2
|
Which of the following command allows
you to recover form mistakes in MS Word?
|
Clear
|
Edit
|
Undo
|
Break
|
C
|
3
|
________ operating system allows many users to take advantage of the
computer's resources, simultaneously
|
Single user
|
Multi- user
|
Single tasking
|
Multi tasking
|
B
|
4
|
Network Interface Card is an ________ device
|
Input
|
Output
|
Input/Output
|
Storage
|
C
|
5
|
The decimal equivalent of binary 1000 is ________
|
7
|
8
|
9
|
10
|
B
|
6
|
Which of the following is NOT RDBMS software?
|
My Sql
|
MS Excel
|
Oracle
|
SQL Server
|
B
|
7
|
A computer virus is a ________
|
Software that saves the computer from being damaged.
|
Application software that helps to make different type of viruses and
worms
|
Program that spreads itself and destroys other program
|
Program that corrects the problems in your computer
|
C
|
8
|
What will be the result of a? a = Math.abs(-23)
|
23
|
-23
|
23.0
|
2.3
|
A
|
9
|
A Special program required to view swf (Shockwave Flash) files in web
Browser is called ________
|
TFlash
|
Vflash
|
plug-in
|
None of the given options
|
C
|
10
|
Using Java Script you can write a character at random location on
screen
|
By applying randomCh() method
|
With the help of String object
|
With the help of random character property
|
There is no built in approach in Java Script
|
D
|
11
|
If incorrectly we enter the negative age it is check by
|
Limit Integrity
|
Type Integrity
|
Referential Integrity
|
Physical Integrity
|
A
|
12
|
Which protocol is use to transfer a file over the network?
|
UDP
|
FTP
|
TCP
|
OSI
|
B
|
13
|
One can send an email message to a remote computer using ________
protocol
|
HTTP
|
SMTP
|
FTP
|
TELNET
|
D
|
14
|
In a System having many parts to be designed, one should always do the
_____ first
|
Hard part
|
Simple part
|
Development part
|
Quality part
|
A
|
15
|
Flow control constructs in JavaScript
includes:
|
If-Else
|
Loops and If –Else
|
Switch and If-Else
|
All of the given choices
|
C
|
16
|
________ provides a simple, consistent
way for applications to interact with the HW without having to know all the
details of the HW
|
Explorer.exe
|
System Files
|
Operating System
|
Application Software
|
C
|
17
|
Machine language is also called
|
Assembly Language
|
Binary Language
|
High Level Language
|
HTML Language
|
B
|
18
|
________ is the best known builder for
supercomputers.
|
Sun
|
Cray Research
|
Microsoft
|
Apple
|
B
|
19
|
The weaknesses of the computer are:
|
Pattern recognition & Storage
|
Speed & Innovative ideas
|
Pattern recognition & Innovative
ideas
|
Speed & Storage
|
C
|
20
|
Communication protocol is a ________
that governs the flow of information over a network
|
Set of methods
|
Set of protocols
|
Set of rules
|
Device
|
C
|
21
|
________ Team is responsible for the
maintenance, expansion, improvement of the infrastructure consisting of
workstations, networking equipment, software and network security.
|
Support
|
Configuration Management
|
Quality Assurance
|
Developer
|
A
|
22
|
_________ team consists on the sharpest
technical minds in the company.
|
Architecture
|
Business Development
|
Configuration Management
|
Developer
|
A
|
23
|
_________ is responsible for day to day
operations.
|
CEO
|
COO
|
CMSO
|
Developer
|
B
|
24
|
One of the key responsibilities of the ________
is client relationship management.
|
Project Manager
|
Team Lead
|
Developer
|
Quality Assurance Engineer
|
A
|
25
|
What is the major problem with flash
based website?
|
Its two heavy
|
Cannot be indexed
|
Less attractive
|
Inaccessible
|
A
|
#
|
QUIZ
|
|||||
26
|
Which of the following is NOT an event handler for
image object?
|
onAbort
|
onError
|
onLoad
|
onUser
|
D
|
27
|
The organizations are learning that business can be
done in a more effective manner if emphasis is placed upon ___________.
|
Cooperation
|
Shared responsibility
|
Networking
|
All of the given options
|
D
|
28
|
ERP is a type of ________
|
Entertainment software
|
Productivity software
|
Business software
|
Scientific software
|
C
|
29
|
In Genetic Algorithm the most important thing you
should know, is the ___________.
|
Procedure
|
Recognition of a good solution
|
Different techniques
|
None of the given options
|
B
|
30
|
According to a popular heuristic, success is defined by
___________.
|
The user
|
The builder
|
Both user and builder
|
None of the given options
|
A
|
31
|
Rule of thumb learned through trial and error is called
___________.
|
Design
|
Heuristic
|
Plan
|
Aim
|
B
|
32
|
JavaScript Variables are _________
|
Dynamically Typed
|
Statically Typed
|
Strong Typed
|
None of the given options
|
A
|
33
|
Which of the following application are collections of
cells?
|
Word
|
Excel
|
PowerPoint
|
Outlook Express
|
B
|
34
|
The browser breaks down the URL into ________ parts.
|
2
|
3
|
4
|
5
|
B
|
35
|
A named collection of properties (data, state) and
methods (instruction, behavior) is called ____________.
|
Array
|
Function
|
Variable
|
Object
|
D
|
36
|
First computer network was __________
|
NSFNET
|
FIRSTNET
|
ARPANET
|
ORPHANET
|
C
|
37
|
In JavaScript, a variable declaration is
|
Optional
|
Mandatory
|
Not allowed
|
None of the given
|
A
|
38
|
A protocol used for receiving email messages is called
__________
|
URL
|
Telnet
|
POP3
|
SMTP
|
C
|
39
|
Which one is correct?
|
onUnload
|
onUnLoad
|
onUNLOAD
|
All of the above
|
A
|
40
|
Serial arrangement in which things follow logical
order or a recurrent pattern, such as statements executing one by
one, is called __________.
|
Loop
|
Sequence
|
Condition
|
Array
|
B
|
41
|
Variables allow us to manipulate data through the
__________
|
Actual Value
|
Reference
|
Length
|
Name
|
B
|
42
|
Fuzzy logic is based on __________
|
Ground facts
|
Experience
|
Practice
|
Approximation
|
C
|
43
|
Word Processor is a __________
|
System Software
|
Application Software
|
Device
|
Utility
|
B
|
44
|
In the old days, databases did NOT support _________
|
Number
|
Boolean
|
Video
|
Text
|
C
|
45
|
In tabular storage, fields placed in a particular row
are strongly ___________.
|
Independent
|
Dependent
|
Interrelated
|
Inconsistent
|
C
|
46
|
Due to working at home, lack of interaction may result
in ___________ professional growth.
|
Slower
|
Faster
|
Higher
|
Improved
|
A
|
47
|
Distance learning has got a boost due to the _________
|
Easy communication
|
Online interactive contents
|
Flexibility
|
All of the given options
|
D
|
48
|
__________ technique can be used to create smooth
animations or to display one of several images based on the requirement.
|
Image downloading
|
Image preloading
|
Image uploading
|
Image postloading
|
B
|
49
|
The __________ is becoming the preferred organizational
structure for more and more organizations with the passage of time.
|
Tree structured organizational model
|
Network paradigm
|
Hierarchical structure
|
None of the given options
|
B
|
50
|
The group of technologies concerned with the capturing,
processing and transmission of information in the digital electronic form is
called__________
|
Telecom Engineering
|
Computer Engineering
|
Computer Science
|
Information Technology
|
D
|
#
|
Quiz
|
A
|
B
|
C
|
D
|
ANS
|
51
|
A large number of networks interconnected physically is
called ________
|
LAN
|
MAN
|
Internet
|
Network collection
|
C
|
52
|
TCP stands for ________
|
Transfer Center protocol
|
Transmission Control Protocol
|
Transmission Center Protocol
|
Telephone Center Protocol
|
B
|
53
|
A collection of data organized in such a way that the
computer can quickly search for a desired data item is known as:
|
Retrieving
|
Database
|
Information
|
DBMS
|
B
|
54
|
________ is simply a fast port that lets you connect
computer peripherals and consumer electronics to your computer without
restart.
|
Freeware
|
Shareware
|
Firewire
|
Firmware
|
C
|
55
|
Structures, in which another list starts before the
first list is finished, are called:
|
Multiple Lists
|
Nested Lists
|
Ordered Lists
|
Un-ordered Lists
|
B
|
56
|
The key property of the ‘Array’ object in JavaScript is
|
Value
|
Length
|
Name
|
All of the given choices
|
B
|
57
|
Which one is the example of spreadsheet software ?
|
MS Word
|
MS PowerPoint
|
MS Excel
|
MS Access
|
C
|
58
|
The Encryption of data is related to
|
Data updates
|
Data security
|
Data integrity
|
Data accessibility
|
B
|
59
|
_____ is the process of analyzing large databases to
identify patterns.
|
Data normalization
|
Data management
|
Data Mining
|
None of the given options
|
C
|
60
|
Which is the user-friendly way of presenting data ?
|
Query
|
Form
|
Report
|
All of the given options
|
C
|
61
|
form Tags always placed between the BODY and /BODY tags
of a Web page
|
True
|
False
|
A
|
||
62
|
Java script has ________ ability to create and draw
graphics
|
Limited
|
Versatile
|
Medium
|
Not at all
|
D
|
63
|
Which of the following is incorrect for making design
elements legible?
|
Elements should be large enough
|
Elements must contrast sufficiently
|
Related elements should be visually grouped
|
Elements should have no visual focus
|
D
|
64
|
Function is also known as _________
|
subprogram
|
procedure
|
subroutine
|
All of given
|
A
|
65
|
In ________ TCP\IP protocols became the only set of
protocols used on the ARPANET.
|
1973
|
1983
|
1972
|
None of the given choices
|
B
|
66
|
E-mail system has ________ component(s)
|
E-mail client
|
SMTP server
|
POP3 server
|
All of the given choices
|
D
|
67
|
_______ / / /______/ A Parallelogram (Tilted rectangle)
represents the ________________ flow chart element.
|
Process
|
Input or Output
|
Decision
|
Connector
|
B
|
68
|
If a computer could pass the Turing test then it would
be able to:
|
win a million dollar prize
|
think like human begins
|
think but slower than humans
|
do the things faster
|
B
|
69
|
Punched cards were replaced by:
|
Floppy Disk
|
Zip Drives
|
Magnetic storage
|
None of the given choices
|
C
|
70
|
The ________virus may display an annoying, but harmless
message
|
Malicious
|
Neutral
|
Helpful
|
DoS
|
B
|
71
|
The name of very first computer was:
|
ABC
|
BCD
|
EDC
|
None of the given choices
|
D
|
72
|
The internet communities are __________
|
Geographical based
|
Interest based
|
Country based
|
Religion based
|
B
|
73
|
Internet is an example of __________ network.
|
Private
|
Public
|
Both Private and Public
|
None of the given choices
|
B
|
74
|
The name of first commercially available PC was:
|
UNIVAC 1
|
ENIAC
|
EDVAC
|
Altair 8800
|
A
|
75
|
Algorithm is a ___________
|
Definition of a problem
|
Sequence of steps to solve a problem
|
Understanding of a problem
|
Solving a problem
|
B
|
76
|
A group of
information is called __________
|
File
|
Database
|
Record
|
Field
|
C
|
77
|
__________
is a branch of computer science concerned with manipulating and enhancing
computer graphics.
|
Image
Handling
|
Image
Processing
|
Image
Engineering
|
None of these
|
B
|
78
|
__________has
changed our way of life like no other technology.
|
Computational
technology
|
Computer
technology
|
Computing
technology
|
None of the
Above
|
B
|
79
|
Sophisticated
event handling is not possible with __________ event handling
|
Off-Line
|
In-Line
|
Out-Line
|
Non of the
given choices
|
B
|
80
|
Babbage’s
Analytical Engine could store information permanently in:
|
Magnetic Tape
|
Floppy Disk
|
Punched Cards
|
None of the
given choices
|
C
|
81
|
There are
__________ popular schemes to reduce the number of bytes that are required
for storing graphics.
|
4
|
3
|
2
|
None of the
given choices
|
C
|
82
|
The
internet-society is considered under Surveillance because:
|
While
surfing, we are being watched, constantly
|
Our every
click is recorded and analyzed to extract patterns and behaviors
|
Webcams are
becoming common. Providing a cheap way for parents to watch their children's
every move
|
All of the
given
|
D
|
83
|
URL is
a/an ________
|
Device
|
Component
|
Address
|
Tool
|
C
|
84
|
To improve
the time for scanning a web page, text should be __________
|
Centered
|
Left Aligned
|
Right Aligned
|
Staggered
|
B
|
85
|
Communications
on the internet is controlled by a set of two protocols which are ___________
|
IMAP and SMTP
|
FTP and HTTP
|
TCP and IP
|
TCP and HTTP
|
C
|
86
|
UL tag is
used to
|
underline
text
|
end the line
|
create
ordered list
|
create
unordered list
|
D
|
87
|
A user may
access any item on the web through __________
|
URL
|
Telnet
|
POP
|
SMTP
|
A
|
88
|
Which one
of the following is NOT a primary color?
|
Red
|
Green
|
Yellow
|
Blue
|
C
|
89
|
The idea
of Neural Networks field is based upon ___________
|
Human nature
|
Human brain
|
Human culture
|
Human actions
|
B
|
90
|
__________
are those programs in which the flow of the program is determined by the
user's actions (mouse clicks, key presses) or messages from other programs
|
Event called
programs
|
Event
processed programs
|
Event driven
programs
|
Event
declared programs
|
C
|
91
|
Automatic
machines performing various tasks thatwere previously done by humans, are
called ____________.
|
Robotics
|
Computers
|
Decision
Making Systems
|
Autonomous
Web Agents
|
A
|
92
|
country=”Hello
Pakistan”; document.write(country.charAt(6)); The out put of the above
statement is _____________.
|
o
|
p
|
a
|
k
|
B
|
93
|
The
distance among families is ___________ because of spending more time on internet.
|
Increased
|
Expanded
|
Contracted
|
Decreased
|
A
|
94
|
The
software used for the scanning of internet severs, is called __________.
|
Wscan
|
Mscan
|
Sscan
|
Vscan
|
C
|
95
|
Adding
images to html page, we use___________ tag
|
IMG
|
IMAGE
|
PICTURE
|
PIC
|
A
|
96
|
The
responsibilities of the Team Lead includes_____________
|
Planning and
tracking of the project
|
Detailed
design
|
Professional
development of team members
|
All of the
given options
|
D
|
97
|
When the
packets reach at destination, __________ reassembles them into original
message.
|
Protocol
|
TCP
|
IP
|
NIC
|
B
|
98
|
Many
developers write the _________ first and then incrementally convert each line
into _________.
|
Real code
& Pseudo code
|
Pseudo code
& Real code
|
Real code
& Artificial code
|
None of the
given options
|
B
|
99
|
Machine
language is also called
|
Assembly
Language
|
Binary
Language
|
High Level
Language
|
HTML Language
|
B
|
100
|
In
JavaScript, second element of an array has the index:
|
2
|
0
|
1
|
3
|
C
|
101
|
One can
download or upload files to a remote computer using ________ protocol.
|
HTTP
|
SMTP
|
FTP
|
TELNET
|
C
|
102
|
JavaScript
________ support drawing of graphics
|
Does
|
Does not
|
Always
|
At times
|
B
|
103
|
Which of
the following is NOT true about modern computers?
|
More powerful
|
Smaller in
size
|
Consume less
energy
|
Costly
|
D
|
104
|
Ada
written a computer programme for ?
|
Analytical
Engine
|
Difference
Engine
|
Harvard Mark
1
|
Mechanical
engine
|
A
|
105
|
A set of
stand alone productivity applications designed to work together known as
______________ .
|
Productivity
software suites
|
Compiled
software
|
Secure
software
|
Intelligent
software
|
A
|
106
|
Autonomous
Web Agents are also known as _________
|
Mobile Agents
|
Softbots
|
Both
"Mobile Agents" & "Softbots"
|
None of these
|
C
|
107
|
By default
in a web page Hyper Link for another web page is represented as:
|
Blue only
|
Black and
Underlined
|
Blue and Bold
|
Blue and
Underlined
|
D
|
108
|
The
organizations are learning that business can be done in a more effective
manner if emphasis is placed upon __________
|
Cooperation
|
Shared
responsibility
|
Networking
|
All of the
given
|
D
|
109
|
Monitor is
an example of __________devices
|
Output
|
Input
|
Processing
|
None of the
given choices
|
A
|
110
|
The code
in the ________ portion is the right choice for developing larger JavaScript
scripts
|
Body
|
At End
|
Head
|
Separate
|
C
|
111
|
_________
based on the principles of the logical reasoning ability of humans.
|
Genetic
Algorithms
|
Rule-based
Systems
|
Feed-Forward
Network
|
None of these
|
B
|
112
|
The key
benefit of VPNs over conventional PNs is:
|
Security
|
Efficiency
|
Lower Cost
|
None of the
given choices
|
C
|
113
|
In a good
presentation each slide should contain__________
|
Heading
|
Phrases not
sentences
|
Sentences not
phrases
|
Heading,
sentences not phrases
|
A
|
114
|
A single
pixel can acquire approximately ________ color schemes.
|
1 million
|
2 million
|
10 million
|
16 million
|
D
|
115
|
Which of
the following is NOT a Loop statement?
|
For
|
While
|
Switch
|
Do-While
|
C
|
116
|
Which one
of the following is NOT a component of Rule Based System?
|
Rule Compiler
|
Rule
Interpreter
|
Rules Base
|
Working
Memory
|
A
|
117
|
Spread
sheet is a type of _________
|
Productivity
software
|
Engineering
software
|
Mathematical
software
|
Business
software
|
A
|
118
|
A
combination of word processing and graphic design is
|
Corel Draw
|
Desktop
Publishing
|
Paint
|
WordPad
|
B
|
119
|
To store
rounded number of 8.6 in a variable called "r_number", we write
|
r_numbers=Maths.rounds(8.6)
|
r_number=Math.rounds(8.6)
|
r_number=Math.round(8.6)
|
r_number=Maths.round(8.6)
|
C
|
120
|
Which of
the following is a true statement?
|
Flat-file
storage is better than tabular storage.
|
Tabular
storage is better than flat-file storage.
|
Flat-file
storage is better than relational storage.
|
None of the
given options
|
B
|
121
|
The
political process is also influenced by the use of __________
|
Discussion
forums
|
Newsgroups
|
Mailing lists
|
All of the
given options
|
D
|
122
|
The system
that manages relational database, is called ______________.
|
None of the
given options
|
Database
Management System
|
Data
Management System
|
Relational
Database Management System
|
D
|
123
|
_________
DBMS supports data in terabytes.
|
Personal
|
Desktop
|
Enterprise
|
Single-user
|
C
|
124
|
Trinoo is
a __________ software.
|
DoS
|
Scanning
|
Utility
|
None of the
given options
|
A
|
125
|
Currently
the BlueRay DVD can store more than ________ of data.
|
10 GB
|
50 GB
|
100 GB
|
150 GB
|
B
|