CS101 Solved MCQs 2014

Education, CS101 Solved MCQs 2014, Solved MCQs 2014, CS101 MCQs 2014, CS101 Multiple choice question 2014, CS101 new book MCQs 2014, CS101 important MCQs 2014, CS101 imp MCQs 2014, CS101 2014 Solved MCQs, 
CS101 solved mcqs,CS101 solved quiz,online vu solved quiz,CS101 introduction to computing solved assignment 2014,2014 solved vu quizz,CS101 solved feb march

CS101 Solved MCQs March 2014,Introduction to Computing

CS101 Introduction to Computing Multiple choice Questions

cs101 solved mcqs,CS101 solved quiz,online vu solved quiz,CS101 introduction to computing solved assignment 2014,2014 solved vu quizz,CS101 solved feb march
Question # 1 of 10  Total M – 1
Internet is an example of ______________ network. 
Select correct option:
Private
Public
Both Private and Public
None of the given choices
CS101 Solved MCQs 2014
Question # 2 of 10  Total M – 1
The name of first commercially available PC was: 
UNIVAC 1
ENIAC
EDVAC
Altair 8800

Question # 3 of 10  Total M – 1
Algorithm is a ____________________ 
Definition of a problem
Sequence of steps to solve a problem
Understanding of a problem
Solving a problem


Question # 4 of 10  Total M – 1
A group of information is called __________________ 
File
Database
Record
Field

Question # 5 of 10 ( Start time: 05:24:17 PM )  Total M – 1
___________________ is a branch f computer science concerned with manipulating and enhancing computer graphics. 
Image Handling
Image Processing
Image Engineering
None of these
Question # 6 of 10  Total M – 1
__________has changed our way of life like no other technology. 
Computational technology
Computer technology
Computing technology
None of the Above

Question # 7 of 10 Total M – 1
Sophisticated event handling is not possible with _______________ event handling 
Off-Line
In-Line
Out-Line
Non of the given choices

Question # 8 of 10 Total M – 1
Babbage’s Analytical Engine could store information permanently in: 
Magnetic Tape
Floppy Disk
Punched Cards
None of the given choices
Question # 9 of 10   Total M – 1
There are __________ popular schemes to reduce the number of bytes that are required for storing graphics. 

4
3
None of these

A number of clever schemes have been invented to reduce the number of bytes that are required for storing graphics. 2 popular ones:
Color mapping
Dithering
Question # 10 of 10 ( Start time: 05:30:01 PM )  Total M – 1
The internet-society is considered under Surveillance because: 
While surfing, we are being watched, constantly
Our every click is recorded and analyzed to extract patterns and behaviors
Webcams are becoming common. Providing a cheap way for parents to watch their children’s every move
All of the given

Which of the following is incorrect for making design elements legible?
Elements should be large enough
Elements must contrast sufficiently
Related elements should be visually grouped
Elements should have no visual focus

25.10 Making Display Elements Legible:

1. Designing (arranging) Display Elements
Elements must be large enough to be processed visually
Elements must contrast sufficiently with their backgrounds
Related elements should be visually grouped through the use of space, color, or graphical boundaries
The relative levels of importance among elements in a display should be revealed graphically

Question # 2 of 10  Total M – 1
1. Function is also known as ______________.
Select correct option:
subprogram
procedure
subroutine
All of given

Function:
A group of statements that is put together (or defined) once and then can be used (by reference)
repeatedly on a Web page Also known as subprogram, procedure, subroutine

In _____________ TCP\IP protocols became the only set of protocols used on the ARPANET.
Select correct option:
1973
1983
1972
None of the given choices

E-mail system has ______ component(s)
Select correct option:
E-mail client
SMTP server
POP3 server
All of the given choices
A Parallelogram (Tilted rectangle) represents the ________________ flow chart element.
Select correct option:
Process
Input or Output
Decision
Connector


Punched cards were replaced by:

Floppy Disk
Zip Drives
Magnetic storage
None of the given choices



During the 1960s, the punched card was gradually replaced as the primary means for data storage by magnetic tape, as better, more capable computers became available.
The ________virus may display an annoying, but harmless message
Select correct option:
Malicious
Neutral
Helpful
DoS

The internet communities are ___________.
Select correct option:
Geographical based
Interest based
Country based
Religion based

Question # 1  of 10  Total M -  1
Because of spending more time on the internet, the distances among the families have been _____.
Select correct option:
Increased
Expanded
Contracted
Shortened


Question # 3  of 10  Total M -  1
Autonomous Web Agents are also known as _________________
Select correct option:
Mobile Agents
Softbots
Both “Mobile Agents” & “Softbots”
None of these

A communication protocol is a __________that governs the flow of information over a network.
Select correct option:
Set of Methods
Set of Protocols
Set of rules
None of the given choices

Protocol
–Rules governing communications over the network

By default in a web page Hyper Link for another web page is represented as:
Blue only
Black and Underlined
Blue and Bold
Blue and Underlined

The organizations are learning that business can be done in a more effective manner if emphasis is placed upon ______________.
Select correct option:
Cooperation
Shared responsibility
Networking
All of the given

Question # 7  of 10 Total M -  1
Monitor is an example of __________devices
Select correct option:
Output
Input
Processing
None of the given choices

The code in the ________ portion is the right choice for developing larger JavaScript scripts
Select correct option:
Body
At End
Head
Separate
____________________ based on the principles of the logical reasoning ability of humans.
Select correct option:
Genetic Algorithms
Rule-based Systems
Feed-Forward Network
None of these


Rulebased Systems (1):
Based on the principles of the logical reasoning ability of humans

The key benefit of VPNs over conventional PNs is:
Security
Efficiency
Lower Cost
None of the given choices
In __________________ automatic machines perform various tasks that were previously performed by humans.
Select correct option:
Fuzzy Logic
Robotics
Rule based Systems
None of these

About Unknown

Hi there! I am Hung Duy and I am a true enthusiast in the areas of SEO and web design. In my personal life I spend time on photography, mountain climbing, snorkeling and dirt bike riding.
«
Next
Newer Post
»
Previous
Older Post

No comments:

Leave a Reply

.