Friday, November 20, 2020

When the hop-count field reaches zero and the destination has not been reached, a error message is sent

  1. Redirection
  2. Time-exceeded
  3. Parameter-problem
  4. Destination-unreachable

In error reporting the encapsulated ICMP packet goes to .

  1. A router
  2. The sender
  3. The receiver
  4. Any of the above

Given the IP address 201.14.78.65 and the subnet mask 255.255.255.224, what is the subnet address?

  1. 201.14.78.65
  2. 201.14.78.64
  3. 201.14.78.12
  4. 201.14.78.32

In _ routing, the destination address is a network address in the routing table.

  1. Default
  2. Next-hop
  3. Host-specific
  4. Network-specific

Identify the class of IP address 4.5.6.7.

  1. Class C
  2. Class B
  3. Class D
  4. Class A

A subnet mask in class C can have 1s with the remaining bits 0s.

  1. Eight
  2. Ten
  3. Twelve
  4. Twenty-five

On a network that uses NAT, initiates the communication.

  1. The router
  2. An internal host
  3. An external host
  4. (1) or (3)

Is a client-server program that provides an IP address, subnet mask, IP address of a router, and IP address of a name server to a computer.

  1. ISP
  2. NAT
  3. CIDR
  4. DHCP

In which type of switching do all the packets of a message follow the same channels of a path?

  1. Message switching
  2. Datagram packet switching
  3. Virtual circuit packet switching
  4. None of them

A subnet mask in class A has fourteen 1s. How many subnets does it define?

  1. 16
  2. 32
  3. 64
  4. 128

In __ routing, the mask and destination addresses are both 0.0.0.0 in the routing table.

  1. Default
  2. Next-hop
  3. Network-specific
  4. Host-specific

On a network that uses NAT, the router can use global address(es).

  1. Two
  2. Three
  3. A pool of
  4. None of them

A subnet mask in class B can have _ _1s with the remaining bits 0s.

  1. Three
  2. Nine
  3. Fourteen
  4. Seventeen

Given the IP address 18.250.31.14 and the subnet mask 255.240.0.0, what is the subnet address?

  1. 18.0.0.14
  2. 18.9.0.14
  3. 18.31.0.14
  4. 18.240.0.0

Given the IP address 180.25.21.172 and the subnet mask 255.255.192.0, what is the subnet address?

  1. 180.0.0.0
  2. 180.25.0.0
  3. 180.25.8.0
  4. 180.25.21.0

A subnet mask in class C has twenty-five 1s. How many subnets does it define?

  1. 0
  2. 2
  3. 4
  4. 8

In ___ routing, the full IP address of a destination is given in the routing table.

  1. Default
  2. Next-hop
  3. Host-specific
  4. Network-specific

A subnet mask in class B has nineteen 1s. How many subnets does it define?

  1. 8
  2. 16
  3. 32
  4. 64

Class _ has the greatest number of hosts per given network address

  1. A
  2. B
  3. C
  4. D

A subnet mask in class A can have 1s with the remaining bits 0s

  1. Three
  2. Nine
  3. Ten
  4. Thirty-three

Thursday, November 12, 2020

Which one of these is NOT an example of storage devices?

  1. Tape
  2. RAM
  3. Floppy
  4. DVD 

_________ was known as “mill” in Analytical engine

  1. Memory
  2. Processor
  3. Monitor
  4. Mouse

The impact of a digit in a number is determined by its ____________

  1. Value
  2. Location
  3. Length
  4. None of above

Which one of these is NOT an example of storage devices?

  1. CD
  2. Floppy
  3. Hard Disk
  4. RAM

_________ is also known as System Architecture

  1. High level system design
  2. Low level system design
  3. Every system design
  4. Software Requirement

The computer working independently with no connection to any other computer is called

  1. Standalone
  2. Workstation
  3. Server
  4. None of the given choices

Browser is a _____________ used for browsing

  1. Component
  2. Tool
  3. None of these
  4. Device

In Spreadsheets, you can create relationship between two cells by using _____.

  1. Text
  2. Formulas
  3. Numbers
  4. None of the given

Email uses _______ protocol.

  1. SMTP
  2. HTTP
  3. FTP
  4. None of the given

VPN stands for

  1. Virtual Public Network
  2. Virtual Private Network
  3. Visual Private Network
  4. Virtual Personal Network

World's first program was written by

  1. Charles Babbage
  2. Alfred Tennyson
  3. Ada Lovelace
  4. Bernoulli

Spread sheet is a type of ____________

  1. Productivity software
  2. Engineering software
  3. Mathematical software
  4. Business software

A _________ translates a high-level language (that is easy to understand for humans) into a language that the computer can understand.

  1. Computer
  2. Transistor
  3. Compiler
  4. Device

CERN releases WWW in

  1. 1992
  2. 1993
  3. 1994
  4. None of the given choices

DARPA stands for

  1. Defence Advanced Research Project Agency
  2. Direct Automatic Research Private Agency
  3. Defence Automatic Research Project Agency
  4. None of the given choices

Atanasoff-Berry Computer is the first computer that used

  1. Binary number system
  2. Octal number system
  3. Decimal number system
  4. Hexadecimal number system

First computer designed for commercial applications was

  1. UNIVAC 1
  2. ENIAC
  3. EDVAC
  4. Atanasoff-Berry Computer

World’s first large-scale, automatic digital computer was

  1. Atanasoff-Berry Computer
  2. Harvard Mark 1
  3. ENIAC
  4. IBM-PC

The name of very first computer was _______________

  1. ABC
  2. BCD
  3. EDC
  4. None of the given choices

If a computer could pass the Turing test then it would be able to

  1. win a million dollar prize
  2. think like human beings
  3. think but slower than humans
  4. do the things faster

What will replace Transistors?

  1. Electro-mechanical computing 
  2. Vacuum tube computing
  3. Quantum computing
  4. Nothing can replace Transistors

Vacuum tubes were replaced by ____________

  1. Punch cards
  2. Transistors
  3. Micro Processors
  4. Resistors

________ invented at the Imperial University in Tokyo by Yoshiro Nakamats

  1. Hard drive
  2. Flash drive
  3. Floppy disk
  4. Optical disc

Compared to vacuum tubes, Transistors offer

  1. Much smaller size
  2. Better reliability
  3. Much lower cost
  4. All of the given choices

____________ is a client program that uses HTTP to make requests to Web servers throughout the internet on behalf of the user

  1. Web Application
  2. Web Browser
  3. Internet Application
  4. HTML

HTTP stands for

  1. Hyper Text Transparent Protocol
  2. Hyper Terminal Transfer Provider
  3. Hyper Text Transfer Procedure
  4. Hyper Text Transfer Protocol

The Semantic Web is an idea of ______________

  1. John Von Neuman
  2. Ada
  3. Bill Gates
  4. Tim Berners-Lee

The first Web browser with a GUI was generally available in

  1. 1992
  2. 1993
  3. 1994
  4. 1995

_________ is a related collection of WWW files that includes a beginning file called a homepage.

  1. HTML
  2. Website
  3. HTTP
  4. Web page

Volatile memory is

  1. RAM
  2. ROM
  3. Hard Disk
  4. CD ROM

What is the best known builder for supercomputers.

  1. Sun
  2. Cray Research
  3. Microsoft
  4. Apple

CD stands for

  1. Computer Disc
  2. Computer Data
  3. Compact Disc
  4. Compact Data

__________ can perform at or near the currently highest operational rate for computers

  1. Microcomputers
  2. Supercomputers
  3. Personal Computers
  4. Mini Computers

USB stands for

  1. Uniform System Bill 
  2. Universal System Bus
  3. Universal Serial Bus 
  4. Unified Sequential Bus

SCSI stands for

  1. Small computer system interface
  2. System Common Small Integration
  3. Silicon Computer System Interface
  4. None of the given choices

_________ are personal computers that are designed to be easily transported and relocated.

  1. Desktops
  2. Portables
  3. Servers
  4. Workstations

Microphone is an input as well as output device. This statement is

  1. True
  2. False
  3. Meaningless
  4. None of above

Which one is correct?

  1. <HEAD> </HEAD>
  2. <HEAD> <END>
  3. <HEAD> </END>
  4. <HEAD> <\HEAD>

Microprocessor are made up of semiconductor material called

  1. Aluminum
  2. Copper
  3. Silicon dioxide
  4. Silicon

Register is a kind of _________ memory.

  1. Fast
  2. Super fast
  3. Slow
  4. Very slow

Today’s computers are based on the technology of ___________

  1. Punch cards
  2. Vacuum tubes
  3. Transistors
  4. Resistors

1 byte consists of ____________ bits.

  1. 8
  2. 10
  3. 12
  4. 16

The < UL > tag is used to

  1. underline text
  2. end the line
  3. create ordered list
  4. create unordered list

Structures, in which another list starts before the first list is finished, are called

  1. Multiple Lists
  2. Nested Lists
  3. Ordered Lists
  4. Un-ordered Lists

____________ translates the High level language program, one statement at time.

  1. Interpreter
  2. Compiler
  3. Utility program
  4. Anti virus software

Which of the following manages the HW and SW resources of the computer system?

  1. Hardware
  2. System Software
  3. Operating system
  4. Graphics Software

__________ is the example of Shrink-wrapped software

  1. PIA information system
  2. WinZip trial pack
  3. Linux
  4. MS Word

Which of the following is/are the parts of Operating system components?

  1. GUI
  2. Device Manager
  3. Shell
  4. All of these

We need _____________ for memory management in computer.

  1. Software
  2. Hardware
  3. Operating System
  4. Application Software

__________ maintains index of names and location of the files.

  1. File Folder
  2. File manager
  3. File system
  4. Operating system

When we use , what will happen?

  1. Text will not be visible
  2. Text will be in normal format
  3. Text will be in **** format
  4. Text will be in #### format

To display a radio button on the web page, we use ___ tag

  1. INPUTBUTTON
  2. INPUT
  3. RADIOBUTTON
  4. RADIO

A group of information is called

  1. File
  2. Database
  3. Record
  4. Field

VisiCalc was the first popular __________ application on PC’s.

  1. Spreadsheet
  2. Word processor
  3. Presentation
  4. Database

WYSIWYG is

  1. Software
  2. The abbreviation of "what you see is what you get"
  3. A Network company in Japan
  4. The abbreviation of "word you see is what you get"

Using only Html we can create ______________.

  1. Dynamic web pages
  2. Static web pages
  3. Both Static and Dynamic pages
  4. None of these

The code in the _____________ portion is the right choice for developing larger JavaScript scripts.

  1. Body
  2. At End
  3. Head
  4. Separate

We can change the background color in HTML, using __________ attribute of

  1. background
  2. bgcolor
  3. backcolor
  4. backgroundcolor

JavaScript consider every thing as

  1. Control
  2. Window
  3. Object
  4. Statement

Algorithm gives us

  1. Definition of a problem
  2. Sequence of steps to solve a problem
  3. Proper understanding of a problem
  4. Solution to a problem

___________ is generally measured in terms of the number of steps required to execute an algorithm.

  1. Space
  2. Time
  3. Memory and time
  4. Bandwidth

In Analysis of Algorithms ________ generally measured in terms of the number of steps required to execute an algorithm

  1. Bandwidth
  2. Time
  3. Memory
  4. Logic functions

Sequence of steps that is taken to solve a problem is called _______

  1. Algorithm
  2. Operating System
  3. Application software
  4. None of the above

Randomized algorithms are often ________ than deterministic algorithms for the same problem.

  1. Simpler and more slow
  2. Simpler and more efficient
  3. Complex and more efficient
  4. Complex and more slow

A named collection of properties (data, state) and methods (instructions, behaviour) is called __________

  1. Object
  2. Entity
  3. Relation
  4. Template

Batch programs do not

  1. Print or store the results
  2. Get input data
  3. Execute programs without the interference of the user
  4. Provide event handling

BASIC stands for

  1. Basic American Standard Information Code
  2. Beginner's All purpose Symbolic Instruction Code
  3. Brother and Sisters In Christ
  4. British American Scientific International Commercial 

Wednesday, November 11, 2020

Programs that are typically started from a shell (or automatically via a scheduler) are called

  1. Batch programs
  2. Event-driven programs
  3. Sequential programs
  4. Application programs 

A vocabulary and set of grammatical rules for instructing a computer to perform specific tasks is called

  1. Software
  2. Programming language
  3. Device driver
  4. Interpreter

Which of the following application is collections of cells?

  1. Word
  2. Excel
  3. PowerPoint
  4. Outlook Express

Which of the following keyword is used to jump out of switch statement as soon as match is found?

  1. default
  2. else
  3. jump
  4. break

Users __________, how things work.

  1. Analyze in detail
  2. Muddle through
  3. Figure out
  4. Read in detail

Users look for ________ solution.

  1. Optimal
  2. First good enough
  3. Good
  4. Best

One can download or upload files to a remote computer using ________ protocol.

  1. HTTP
  2. SMTP
  3. FTP
  4. TELNET

Which of the following device can be used to control network traffic?

  1. Cable
  2. Connector
  3. Hub 
  4. Repeater

Electrical pulses received over telephone line are converted into messages (comprehensible by the computer) by using

  1. Modulator
  2. Demodulator
  3. Both Modulator and Demodulator
  4. None of the given choices

Files can be downloaded or uploaded using _______________ protocol.

  1. SMTP
  2. FTP
  3. TELNET
  4. None of the given choices

TCP stands for:

  1. Transmission Control Practical
  2. Transmission Control Protocol
  3. Transfer Center Protocol
  4. None of the given choices

When the packets reach the destination computer, Who reassembles them into the original message?

  1. UDP
  2. TCP 
  3. UCP
  4. IP

____________ breaks down the message, to be sent over the internet, into packets

  1. Protocol
  2. TCP
  3. IP
  4. NIC

Specifying the space in which a variable will be effective is called

  1. Variable declaration
  2. Variable definition
  3. Variable Scope
  4. Variable garbage collection

Identify the correct statements about function arguments

I) A comma-separated list of data 

II) Define the interface b/w function and rest of code 

III) They are used to identify the function 

IV) They Identify function’s type 


  1. I and II Only
  2. II and III Only
  3. III and IV Only
  4. I, II and III Only

__________ addresses are difficult to recognize and remember for humans

  1. TCP
  2. IP
  3. SMTP
  4. None of these

____________ is used to transfer files between computers on a TCP/IP network

  1. TCP
  2. FTP
  3. Telnet Protocol
  4. All of the given choices

________ is a type of computer-to-computer messaging

  1. TCP
  2. Telnet
  3. E-mail
  4. FTP

VoIP stands for _______

  1. Video over Internet Protocol
  2. Visual on Internet Protocol
  3. Voice over Internet Protocol
  4. None of these

Mixed-case capitalization of event handlers (e.g. onClick) is _________ for JavaScript event handlers defined in HTML code

  1. a Defined Rule
  2. a Requirement Introduction to Computing (CS101)
  3. a Convention
  4. Necessary

Thursday, November 5, 2020

A string consisting of JavaScript statements enclosed in double or single ____________

  1. LINES
  2. EVENTS
  3. TAG’s
  4. QUOTES 

Bit-map images compresses using the __________ algorithm.

  1. LZV
  2. LZW
  3. LZE
  4. None of these

_________ images enhanced to impart the illusion of depth.

  1. Parallel
  2. Diagonal
  3. Flat
  4. None of these

There are __________ & __________ popular schemes to reduce the number of bytes that are required for storing graphics.

  1. Contrast & Color Control Introduction to Computing (CS101)
  2. Dithering & Color Mapping
  3. Matching & Non-Matching
  4. None of these

Color mapping scheme reducing the size of 2.25 MB graphic to_______ MB.

  1. 0.90 MB
  2. 0.75 MB
  3. 1.00 MB
  4. None of these

Autonomous Web Agents are also known as _____________.

  1. Mobile Agents
  2. Softbots
  3. Both "Mobile Agents" & "Softbots"
  4. None of these

__________ returns a randomly selected, floating point number between 0 and 1.

  1. Math.random
  2. random
  3. random()
  4. None of the given

Which function returns a randomly selected floating point number between 0 and 1?

  1. floor(x)
  2. ceil(x)
  3. random()
  4. round(x)

Hardware malfunctions is related to

  1. Data updates
  2. Data integrity
  3. Data security
  4. Data accessibility

RDBMS stands for

  1. Relative Data Base Management System
  2. Relational Data Base Management System
  3. Recursive Data Base Management System
  4. Responsible Data Base Management System

__________ can be used for entering, editing or viewing data, one record at a time.

  1. Forms
  2. Reports
  3. Queries
  4. Tables

____________ is a field that uniquely that uniquely identifies each record stored in a table.

  1. Key
  2. Primary Key
  3. Foreign key
  4. Query

_________ returns a string containing characters copied from positions n to m-1

  1. charAT(n)
  2. substring (m)
  3. substring(n,m)
  4. None of the given

_______________ based communication allows business entities to coordinate the activities of their globally spread units with greater accuracy.

  1. Intranet
  2. Internet
  3. Home
  4. LAN

The __________has changed marketing forever, redirecting it from a mass focus to a single person focus

  1. Web
  2. Television
  3. Mobile
  4. Radio

A datagram is fragmented into three smaller datagrams. Which of the following is true?

The offset field is the same for all three datagrams. The more fragment bit is set to 0 for all three datagrams. The do not fragment bit is ...