42340216-fall-2009-finalterm-opkst-cs101-bc090403561

Upload: fahad-nabeel

Post on 14-Apr-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/27/2019 42340216-Fall-2009-FinalTerm-OPKST-CS101-Bc090403561

    1/18

    h ttp ://vu j anna t.n i n g .comBest Website To Help Vu Students

    h ttp ://vuj anna t.n i n g .comBest Website To Help Vu Students

    http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/
  • 7/27/2019 42340216-Fall-2009-FinalTerm-OPKST-CS101-Bc090403561

    2/18

    h ttp ://vu j anna t.n i n g .comBest Website To Help Vu Students

    Question No: 1 ( Marks: 1 ) - Please choose one

    Which of the following is NOT a category of MobileComputers?

    Laptop Palmtop Desktop Wearable

    Question No: 2 ( Marks: 1 ) - Please choose one

    TCP stands for .

    Total communication protocol Transmission control protocol Transfer control protocol Transfer collection protocol

    Question No: 3 ( Marks: 1 ) - Please choose one

    A named collection of properties (data, state) and

    methods (instruction, behavior) is called

    . Array Function Variable Object

    Question No: 4 ( Marks: 1 ) - Please choose one

    A is a meaningful, easy-to-remember label for

    an IP address. TCP address Domain nameNetwork name VoIP

    h ttp ://vuj anna t.n i n g .comBest Website To Help Vu Students

    http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/
  • 7/27/2019 42340216-Fall-2009-FinalTerm-OPKST-CS101-Bc090403561

    3/18

    h ttp ://vu j anna t.n i n g .comBest Website To Help Vu Students

    Question No: 5 ( Marks: 1 ) - Please choose one

    Serial arrangement in which things follow logical order

    or a recurrent pattern, such as statements executing one

    by one, is called . Loop Sequence Condition Array

    Question No: 6 ( Marks: 1 ) - Please choose one

    Which one of the following is NOT a component of Rule

    Based System? Rule Compiler Rule Interpreter Rules Base Working Memory

    h ttp ://vuj anna t.n i n g .comBest Website To Help Vu Students

    http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/
  • 7/27/2019 42340216-Fall-2009-FinalTerm-OPKST-CS101-Bc090403561

    4/18

    h ttp ://vu j anna t.n i n g .comBest Website To Help Vu Students

    Question No: 7 ( Marks: 1 ) - Please choose one

    AutoCAD falls in the category of

    Engineering Applications

    Graphics Applications

    Scientific Applications

    Business Applications

    Question No: 8 ( Marks: 1 ) - Please choose one

    Programs that run on client machine and validate info

    that a user enters in a form, are known as:

    Server-Side Scripts

    Client-Side Scripts

    Super Scripts

    Form Scripts

    Question No: 9 ( Marks: 1 ) - Please choose one

    All the hardware components of the Computer system are

    installed on-------------. Microprocessor Motherboard Monitor

    h ttp ://vuj anna t.n i n g .comBest Website To Help Vu Students

    http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/
  • 7/27/2019 42340216-Fall-2009-FinalTerm-OPKST-CS101-Bc090403561

    5/18

    h ttp ://vu j anna t.n i n g .comBest Website To Help Vu Students

    Memory

    Question No: 10 ( Marks: 1 ) - Please chooseone

    In RDBMS, table rows are called .

    Field Record Column Query

    Question No: 12 ( Marks: 1 ) - Please choose

    oneTribal flood network is a software.

    DoS Scanning UtilityNone of the given options

    Question No: 13 ( Marks: 1 ) - Please chooseone

    To stop industrial espionage, we use . Private network EncryptionNetwork sniffer All of the given options

    Question No: 14 ( Marks: 1 ) - Please chooseone

    The responsibilities of the Team Lead includes.

    Planning and tracking of the project Detailed design

    h ttp ://vuj anna t.n i n g .comBest Website To Help Vu Students

    http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/
  • 7/27/2019 42340216-Fall-2009-FinalTerm-OPKST-CS101-Bc090403561

    6/18

    h ttp ://vu j anna t.n i n g .comBest Website To Help Vu Students

    Professional development of team members All of the given options

    Question No: 15 ( Marks: 1 ) - Please choose

    oneClient relationship management is the responsibility of

    . Team Lead Project Manager Developer Quality Assurance Expert

    Question No: 16 ( Marks: 1 ) - Please chooseone

    is responsible for day to day operations.

    CEO COO CMSO Developer

    Question No: 17 ( Marks: 1 ) - Please chooseone

    There are types of errors. 2 3 4

    h ttp ://vuj anna t.n i n g .comBest Website To Help Vu Students

    http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/
  • 7/27/2019 42340216-Fall-2009-FinalTerm-OPKST-CS101-Bc090403561

    7/18

    h ttp ://vu j anna t.n i n g .comBest Website To Help Vu Students

    5

    Question No: 18 ( Marks: 1 ) - Please chooseone

    Sequence of steps that is taken to solve a problem is called.

    Algorithm Operating System Application softwareNone of the given options

    Question No: 20 ( Marks: 1 ) - Please chooseone

    Which is NOT true for JavaScript variable name ?

    Student Roll_no_1111 For_schedule

    Question No: 21 ( Marks: 1 ) - Please chooseone

    In JavaScript, first element of an array has the index: 1 -1 2None of the given choices

    Question No: 22 ( Marks: 1 ) - Please chooseone

    One can browse documents residing on a remote computer

    h ttp ://vuj anna t.n i n g .comBest Website To Help Vu Students

    http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/
  • 7/27/2019 42340216-Fall-2009-FinalTerm-OPKST-CS101-Bc090403561

    8/18

    h ttp ://vu j anna t.n i n g .comBest Website To Help Vu Students

    using protocol.

    HTTP SMTP FTP TELNET

    Question No: 23 ( Marks: 1 ) - Please chooseone

    One can run a program on a remote computer using

    protocol. HTTP SMTP

    FTP TELNET

    h ttp ://vuj anna t.n i n g .comBest Website To Help Vu Students

    http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/
  • 7/27/2019 42340216-Fall-2009-FinalTerm-OPKST-CS101-Bc090403561

    9/18

    h ttp ://vu j anna t.n i n g .comBest Website To Help Vu Students

    Question No: 24 ( Marks: 1 ) - Please choose one

    There are ways of calling functions. One Three

    Four

    -Which protocol is use to transfer a file over the network ?

    UDP FTP

    TCP OSI

    Question No: 26 ( Marks: 1 ) - Please choose one

    is the process of analyzing large databases to identify

    patterns. Data normalization Data management

    Data MiningNone of the given options

    Question No: 27 ( Marks: 1 ) - Please choose one

    The first spread sheet program was invented by

    Charles Babbage Dan Bricklin Paul Graham John von Neumann

    Question No: 29 ( Marks: 1 ) - Please choose one

    From which of the following is NOT a technique

    h ttp ://vuj anna t.n i n g .comBest Website To Help Vu Students

    http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/
  • 7/27/2019 42340216-Fall-2009-FinalTerm-OPKST-CS101-Bc090403561

    10/18

    h ttp ://vu j anna t.n i n g .comBest Website To Help Vu Students

    through which Security can be improved :

    Private or virtual-private networks Firewalls Metal detectors Virus detectors

    h ttp ://vuj anna t.n i n g .comBest Website To Help Vu Students

    http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/
  • 7/27/2019 42340216-Fall-2009-FinalTerm-OPKST-CS101-Bc090403561

    11/18

    h ttp ://vu j anna t.n i n g .comBest Website To Help Vu Students

    Question No: 30 ( Marks: 1 ) - Please chooseone

    In JavaScript: In order to display the text on browserGrade A, which of following statement is True.

    documentwrite( "Grade A") document.write( "Grade A"); document.write( "Grade && A"); document.write( "Grade && A");

    Question No: 31 ( Marks: 1 )SMTP stands for what?

    Ans: Simple Mail Transfer Protocol

    Question No: 32 ( Marks: 1 )

    What is an IP address?

    Ans: A unique identifier for a computer on a TCP/IP

    network is called IP address.

    Question No: 33 ( Marks: 2 )

    What is spreadsheet? List any two jobs that it can do.

    Ans: A spreadsheet- VisiCalc- was the first

    popular application on PCs. Electronic

    replacement for ledgers.

    Used for automating engineering, scientific, but in

    majority of cases, business calculations.

    Question No: 35 ( Marks: 3 )What are the Sub categories of Artificial Intelligence?

    Briefly explain any two. Ans: Many times are based on a

    h ttp ://vuj anna t.n i n g .comBest Website To Help Vu Students

    http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/
  • 7/27/2019 42340216-Fall-2009-FinalTerm-OPKST-CS101-Bc090403561

    12/18

    h ttp ://vu j anna t.n i n g .comBest Website To Help Vu Students

    branch of computer science called artificial intelligence

    Category of SW is designed to help business managers in

    making effective decisions in complex situations based on

    the analysis of the relevant dataFollowing two Sub categories of Artificial Intelligence are:

    Productivity Software:

    Most popular category in terms of licenses sold

    Common features

    Ability to simplify, automate everyday business tasks

    Word Processors:

    Probably the most popular productivity app

    Initially designed as a replacement for the typewriter

    Automation

    h ttp ://vuj anna t.n i n g .comBest Website To Help Vu Students

    http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/
  • 7/27/2019 42340216-Fall-2009-FinalTerm-OPKST-CS101-Bc090403561

    13/18

    h ttp ://vu j anna t.n i n g .comBest Website To Help Vu Students

    Question No: 36 ( Marks: 3 )

    What are Logic- or Time-Bombs ?Ans: It executes its payload when a predetermined eventoccursExample events:

    A particular word or phrase

    is typed. A particular date or

    time is reached. Question

    No: 37 ( Marks: 3 )

    Diffentiate Local andGlobal Variables. Ans:Local or Function-level

    VariableEffective only in the function in which they are declaredGlobal Variables

    Visible everywhere on the Web page

    Question No: 38 ( Marks: 5 )

    How global corporations are becoming more powerful?Ans: Internet-based communication is allowing business

    entities to coordinate the activities of their globally-spread

    units with greater accuracy The knowledge gained by one

    unit becomes available to all others very quickly All this

    has made these business entities very powerful, even

    more powerful than many nation-states.

    Question No: 39 ( Marks: 5 )In a System having many parts to be designed, what typeof part one should always do first? Describe briefly.

    Ans: A system has many parts to be designed like hard

    h ttp ://vuj anna t.n i n g .comBest Website To Help Vu Students

    http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/
  • 7/27/2019 42340216-Fall-2009-FinalTerm-OPKST-CS101-Bc090403561

    14/18

    h ttp ://vu j anna t.n i n g .comBest Website To Help Vu Students

    part, simple part, quality part, development part in all the

    system the hard part should be designed first because

    hard part is necessary before all parts.

    Question No: 40 ( Marks: 10 )

    What are the phases of the DoS attack? Explain each phase

    in detail.

    Ans: The DoS SW is not custom SW, and can be

    downloaded from the Internet. Therefore, it is difficult to

    track the person who launched the attack by analyzing

    that SW.

    Three Phases of the DoS1. Search

    2. Arm

    3. Attack

    Neutralizing the Attack

    The engineers responsible for monitoring the traffic on

    the Yahoo Web sites quickly identified the key

    characteristics of the packets originating from thosedrones

    Then they setup filters that blocked all those packets

    BTW, the same type of attack brought down the CNN,

    Buy, eBay, Amazon Websites the very next day of the

    Yahoo attack

    How to stop DoS attacks from taking place?

    Design SW that monitors incoming packets, and on

    noticing a sudden increase in the number of similar

    packets, blocks them

    h ttp ://vuj anna t.n i n g .comBest Website To Help Vu Students

    http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/
  • 7/27/2019 42340216-Fall-2009-FinalTerm-OPKST-CS101-Bc090403561

    15/18

    h ttp ://vu j anna t.n i n g .comBest Website To Help Vu Students

    Convince system administrators all over the world to

    secure their servers in such a way that they cannot be

    used as dronesCyber crime can

    be used to:

    Damage a home

    computer Bring

    down a business

    Weaken the telecom, financial, or even defense-related

    systems of a countryMail Bombing

    A stream of large-sized emails are sent to an address,

    overloading the destination account.

    This can potentially shut-down a poorly-designed email

    system or tie up the telecom channel for long periods

    Defense: email filtering

    Break-Ins

    Hackers are always trying to break-in into Internet-

    connected computers to steal info or plant malicious

    programs

    Defense:

    Firewalls

    Intrusion detectors

    Other effective security policies

    Credit Card FraudA thief somehow breaks into an ecommerce server and

    gets hold of credit numbers and related info

    The thief then uses that info to order stuff on the Internet

    h ttp ://vuj anna t.n i n g .comBest Website To Help Vu Students

    http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/
  • 7/27/2019 42340216-Fall-2009-FinalTerm-OPKST-CS101-Bc090403561

    16/18

    h ttp ://vu j anna t.n i n g .comBest Website To Help Vu Students

    Alternatively, the thief may auction the credit card info on

    certain Web sites setupjust for that purpose

    Defense: Use single-use credit card numbers for your

    Internet transactionsSoftware Piracy

    Using a piece of SW without the authors permission or

    employing it for uses not allowed by the author is SW

    piracy

    Defense: Various authentication schemes. They,

    however, are seldom used as they generally annoy the

    genuine users

    Industrial Espionage

    Spies of one business monitoring the network traffic of their

    competitors

    They are generally looking for info for future products,

    marketing strategies, and even financial info

    Defense: Private networks, encryption, network sniffers

    Question No: 41 ( Marks: 10 )

    Write HTML and JavaScript code for the requirementsshown in the diagram below. When ConvertoUpperCase

    button is pressed, the entered text is converted to upper

    case and result is displayed in the result text box. Similarly,

    when ConvertoLowerCase button is pressed, the entered

    text is converted to lower case and result is displayed in the

    result text box.

    h ttp ://vuj anna t.n i n g .comBest Website To Help Vu Students

    http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/
  • 7/27/2019 42340216-Fall-2009-FinalTerm-OPKST-CS101-Bc090403561

    17/18

    h ttp ://vujanna t.n in g .com

    Best Website ToHelp Vu Students

    h ttp ://vuj anna t.n i n g .comBest Website To Help Vu Students

    http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/
  • 7/27/2019 42340216-Fall-2009-FinalTerm-OPKST-CS101-Bc090403561

    18/18

    function askupp

    {

    var x= prompt("Paste your uppercase text in here to be

    translated into

    Uppercase","ANYTHING")

    if (x!==null && x=="")

    {

    document.write(x.toUpperrCase());

    }

    }

    function ask low

    {

    var y= prompt("Paste your lowercase text in here

    to be translated into lower case","anything")

    if (y!==null && x==""){

    document.write(x.toLow

    h ttp ://vuj anna t.n i n g .comBest Website To Help Vu Students