A multiple-choice questionnaire consists of closed questions, with a choice to be made from several predefined answers. For blogs, it offers ease of use and the option to guide participants.
Friday, November 20, 2020
When the hop-count field reaches zero and the destination has not been reached, a error message is sent
In error reporting the encapsulated ICMP packet goes to .
- A router
- The sender
- The receiver
- Any of the above
Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is the subnet address?
- 201.14.78.65
- 201.14.78.64
- 201.14.78.12
- 201.14.78.32
In _ routing, the destination address is a network address in the routing table.
- Default
- Next-hop
- Host-specific
- Network-specific
On a network that uses NAT, initiates the communication.
- The router
- An internal host
- An external host
- (1) or (3)
In which type of switching do all the packets of a message follow the same channels of a path?
- Message switching
- Datagram packet
switching
- Virtual circuit
packet switching
- None of them
In __ routing, the mask and destination addresses are both 0.0.0.0 in the routing table.
- Default
- Next-hop
- Network-specific
- Host-specific
Given the IP address 18.250.31.14 and the subnet mask 255.240.0.0, what is the subnet address?
- 18.0.0.14
- 18.9.0.14
- 18.31.0.14
- 18.240.0.0
Given the IP address 180.25.21.172 and the subnet mask 255.255.192.0, what is the subnet address?
- 180.0.0.0
- 180.25.0.0
- 180.25.8.0
- 180.25.21.0
In ___ routing, the full IP address of a destination is given in the routing table.
- Default
- Next-hop
- Host-specific
- Network-specific
Thursday, November 12, 2020
The impact of a digit in a number is determined by its ____________
- Value
- Location
- Length
- None of above
_________ is also known as System Architecture
- High level
system design
- Low level
system design
- Every system
design
- Software
Requirement
The computer working independently with no connection to any other computer is called
- Standalone
- Workstation
- Server
- None of the
given choices
In Spreadsheets, you can create relationship between two cells by using _____.
- Text
- Formulas
- Numbers
- None of the given
VPN stands for
- Virtual Public
Network
- Virtual Private
Network
- Visual Private
Network
- Virtual Personal
Network
Spread sheet is a type of ____________
- Productivity
software
- Engineering
software
- Mathematical
software
- Business
software
DARPA stands for
- Defence
Advanced Research Project Agency
- Direct
Automatic Research Private Agency
- Defence
Automatic Research Project Agency
- None of the
given choices
Atanasoff-Berry Computer is the first computer that used
- Binary number
system
- Octal number
system
- Decimal number
system
- Hexadecimal number
system
World’s first large-scale, automatic digital computer was
- Atanasoff-Berry
Computer
- Harvard Mark 1
- ENIAC
- IBM-PC
If a computer could pass the Turing test then it would be able to
- win a million
dollar prize
- think like
human beings
- think but
slower than humans
- do the things
faster
What will replace Transistors?
- Electro-mechanical computing
- Vacuum tube
computing
- Quantum
computing
- Nothing can
replace Transistors
________ invented at the Imperial University in Tokyo by Yoshiro Nakamats
- Hard drive
- Flash drive
- Floppy disk
- Optical disc
Compared to vacuum tubes, Transistors offer
- Much smaller
size
- Better
reliability
- Much lower cost
- All of the
given choices
____________ is a client program that uses HTTP to make requests to Web servers throughout the internet on behalf of the user
- Web Application
- Web Browser
- Internet
Application
- HTML
HTTP stands for
- Hyper Text
Transparent Protocol
- Hyper Terminal
Transfer Provider
- Hyper Text
Transfer Procedure
- Hyper Text
Transfer Protocol
__________ can perform at or near the currently highest operational rate for computers
- Microcomputers
- Supercomputers
- Personal
Computers
- Mini Computers
SCSI stands for
- Small computer
system interface
- System Common
Small Integration
- Silicon
Computer System Interface
- None of the given
choices
_________ are personal computers that are designed to be easily transported and relocated.
- Desktops
- Portables
- Servers
- Workstations
Microphone is an input as well as output device. This statement is
- True
- False
- Meaningless
- None of above
Today’s computers are based on the technology of ___________
- Punch cards
- Vacuum tubes
- Transistors
- Resistors
Structures, in which another list starts before the first list is finished, are called
- Multiple Lists
- Nested Lists
- Ordered Lists
- Un-ordered
Lists
____________ translates the High level language program, one statement at time.
- Interpreter
- Compiler
- Utility program
- Anti virus
software
Which of the following manages the HW and SW resources of the computer system?
- Hardware
- System Software
- Operating system
- Graphics Software
__________ is the example of Shrink-wrapped software
- PIA information
system
- WinZip trial
pack
- Linux
- MS Word
Which of the following is/are the parts of Operating system components?
- GUI
- Device Manager
- Shell
- All of these
We need _____________ for memory management in computer.
- Software
- Hardware
- Operating
System
- Application
Software
__________ maintains index of names and location of the files.
- File Folder
- File manager
- File system
- Operating
system
When we use , what will happen?
- Text will not
be visible
- Text will be in
normal format
- Text will be in
**** format
- Text will be in
#### format
VisiCalc was the first popular __________ application on PC’s.
- Spreadsheet
- Word processor
- Presentation
- Database
WYSIWYG is
- Software
- The
abbreviation of "what you see is what you get"
- A Network
company in Japan
- The abbreviation
of "word you see is what you get"
Using only Html we can create ______________.
- Dynamic web
pages
- Static web
pages
- Both Static and
Dynamic pages
- None of these
We can change the background color in HTML, using __________ attribute of
- background
- bgcolor
- backcolor
- backgroundcolor
Algorithm gives us
- Definition of a
problem
- Sequence of
steps to solve a problem
- Proper
understanding of a problem
- Solution to a problem
In Analysis of Algorithms ________ generally measured in terms of the number of steps required to execute an algorithm
- Bandwidth
- Time
- Memory
- Logic functions
Sequence of steps that is taken to solve a problem is called _______
- Algorithm
- Operating
System
- Application
software
- None of the above
Randomized algorithms are often ________ than deterministic algorithms for the same problem.
- Simpler and
more slow
- Simpler and
more efficient
- Complex and
more efficient
- Complex and
more slow
Batch programs do not
- Print or store
the results
- Get input data
- Execute
programs without the interference of the user
- Provide event
handling
BASIC stands for
- Basic American
Standard Information Code
- Beginner's All
purpose Symbolic Instruction Code
- Brother and
Sisters In Christ
- British American
Scientific International Commercial
Wednesday, November 11, 2020
Programs that are typically started from a shell (or automatically via a scheduler) are called
- Batch programs
- Event-driven
programs
- Sequential
programs
- Application
programs
A vocabulary and set of grammatical rules for instructing a computer to perform specific tasks is called
- Software
- Programming
language
- Device driver
- Interpreter
Electrical pulses received over telephone line are converted into messages (comprehensible by the computer) by using
- Modulator
- Demodulator
- Both Modulator
and Demodulator
- None of the given
choices
Files can be downloaded or uploaded using _______________ protocol.
- SMTP
- FTP
- TELNET
- None of the
given choices
TCP stands for:
- Transmission
Control Practical
- Transmission
Control Protocol
- Transfer Center
Protocol
- None of the
given choices
Specifying the space in which a variable will be effective is called
- Variable
declaration
- Variable
definition
- Variable Scope
- Variable
garbage collection
Identify the correct statements about function arguments
I) A comma-separated list of data
II) Define the interface
b/w function and rest of code
III) They are used to
identify the function
IV) They Identify
function’s type
- I and II Only
- II and III Only
- III and IV Only
- I, II and III
Only
____________ is used to transfer files between computers on a TCP/IP network
- TCP
- FTP
- Telnet Protocol
- All of the
given choices
VoIP stands for _______
- Video over
Internet Protocol
- Visual on
Internet Protocol
- Voice over
Internet Protocol
- None of these
Mixed-case capitalization of event handlers (e.g. onClick) is _________ for JavaScript event handlers defined in HTML code
- a Defined Rule
- a Requirement
Introduction to Computing (CS101)
- a Convention
- Necessary
Thursday, November 5, 2020
There are __________ & __________ popular schemes to reduce the number of bytes that are required for storing graphics.
- Contrast &
Color Control Introduction to Computing (CS101)
- Dithering &
Color Mapping
- Matching &
Non-Matching
- None of these
Color mapping scheme reducing the size of 2.25 MB graphic to_______ MB.
- 0.90 MB
- 0.75 MB
- 1.00 MB
- None of these
Autonomous Web Agents are also known as _____________.
- Mobile Agents
- Softbots
- Both
"Mobile Agents" & "Softbots"
- None of these
__________ returns a randomly selected, floating point number between 0 and 1.
- Math.random
- random
- random()
- None of the
given
RDBMS stands for
- Relative Data
Base Management System
- Relational Data
Base Management System
- Recursive Data
Base Management System
- Responsible Data
Base Management System
_________ returns a string containing characters copied from positions n to m-1
- charAT(n)
- substring (m)
- substring(n,m)
- None of the
given
Wednesday, November 4, 2020
Planning and tracking of the project is the responsibility of the_______________
- Project Manager
- Architect
- Developer
- Chief Executive
Officer
Subscribe to:
Posts (Atom)
A datagram is fragmented into three smaller datagrams. Which of the following is true?
The offset field is the same for all three datagrams. The more fragment bit is set to 0 for all three datagrams. The do not fragment bit is ...
-
Simpler and more slow Simpler and more efficient Complex and more efficient Complex and more slow
-
Contrast & Color Control Introduction to Computing (CS101) Dithering & Color Mapping Matching & Non-Matching None of these