-
7/27/2019 42340216-Fall-2009-FinalTerm-OPKST-CS101-Bc090403561
1/18
h ttp ://vu j anna t.n i n g .comBest Website To Help Vu Students
h ttp ://vuj anna t.n i n g .comBest Website To Help Vu Students
http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/ -
7/27/2019 42340216-Fall-2009-FinalTerm-OPKST-CS101-Bc090403561
2/18
h ttp ://vu j anna t.n i n g .comBest Website To Help Vu Students
Question No: 1 ( Marks: 1 ) - Please choose one
Which of the following is NOT a category of MobileComputers?
Laptop Palmtop Desktop Wearable
Question No: 2 ( Marks: 1 ) - Please choose one
TCP stands for .
Total communication protocol Transmission control protocol Transfer control protocol Transfer collection protocol
Question No: 3 ( Marks: 1 ) - Please choose one
A named collection of properties (data, state) and
methods (instruction, behavior) is called
. Array Function Variable Object
Question No: 4 ( Marks: 1 ) - Please choose one
A is a meaningful, easy-to-remember label for
an IP address. TCP address Domain nameNetwork name VoIP
h ttp ://vuj anna t.n i n g .comBest Website To Help Vu Students
http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/ -
7/27/2019 42340216-Fall-2009-FinalTerm-OPKST-CS101-Bc090403561
3/18
h ttp ://vu j anna t.n i n g .comBest Website To Help Vu Students
Question No: 5 ( Marks: 1 ) - Please choose one
Serial arrangement in which things follow logical order
or a recurrent pattern, such as statements executing one
by one, is called . Loop Sequence Condition Array
Question No: 6 ( Marks: 1 ) - Please choose one
Which one of the following is NOT a component of Rule
Based System? Rule Compiler Rule Interpreter Rules Base Working Memory
h ttp ://vuj anna t.n i n g .comBest Website To Help Vu Students
http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/ -
7/27/2019 42340216-Fall-2009-FinalTerm-OPKST-CS101-Bc090403561
4/18
h ttp ://vu j anna t.n i n g .comBest Website To Help Vu Students
Question No: 7 ( Marks: 1 ) - Please choose one
AutoCAD falls in the category of
Engineering Applications
Graphics Applications
Scientific Applications
Business Applications
Question No: 8 ( Marks: 1 ) - Please choose one
Programs that run on client machine and validate info
that a user enters in a form, are known as:
Server-Side Scripts
Client-Side Scripts
Super Scripts
Form Scripts
Question No: 9 ( Marks: 1 ) - Please choose one
All the hardware components of the Computer system are
installed on-------------. Microprocessor Motherboard Monitor
h ttp ://vuj anna t.n i n g .comBest Website To Help Vu Students
http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/ -
7/27/2019 42340216-Fall-2009-FinalTerm-OPKST-CS101-Bc090403561
5/18
h ttp ://vu j anna t.n i n g .comBest Website To Help Vu Students
Memory
Question No: 10 ( Marks: 1 ) - Please chooseone
In RDBMS, table rows are called .
Field Record Column Query
Question No: 12 ( Marks: 1 ) - Please choose
oneTribal flood network is a software.
DoS Scanning UtilityNone of the given options
Question No: 13 ( Marks: 1 ) - Please chooseone
To stop industrial espionage, we use . Private network EncryptionNetwork sniffer All of the given options
Question No: 14 ( Marks: 1 ) - Please chooseone
The responsibilities of the Team Lead includes.
Planning and tracking of the project Detailed design
h ttp ://vuj anna t.n i n g .comBest Website To Help Vu Students
http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/ -
7/27/2019 42340216-Fall-2009-FinalTerm-OPKST-CS101-Bc090403561
6/18
h ttp ://vu j anna t.n i n g .comBest Website To Help Vu Students
Professional development of team members All of the given options
Question No: 15 ( Marks: 1 ) - Please choose
oneClient relationship management is the responsibility of
. Team Lead Project Manager Developer Quality Assurance Expert
Question No: 16 ( Marks: 1 ) - Please chooseone
is responsible for day to day operations.
CEO COO CMSO Developer
Question No: 17 ( Marks: 1 ) - Please chooseone
There are types of errors. 2 3 4
h ttp ://vuj anna t.n i n g .comBest Website To Help Vu Students
http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/ -
7/27/2019 42340216-Fall-2009-FinalTerm-OPKST-CS101-Bc090403561
7/18
h ttp ://vu j anna t.n i n g .comBest Website To Help Vu Students
5
Question No: 18 ( Marks: 1 ) - Please chooseone
Sequence of steps that is taken to solve a problem is called.
Algorithm Operating System Application softwareNone of the given options
Question No: 20 ( Marks: 1 ) - Please chooseone
Which is NOT true for JavaScript variable name ?
Student Roll_no_1111 For_schedule
Question No: 21 ( Marks: 1 ) - Please chooseone
In JavaScript, first element of an array has the index: 1 -1 2None of the given choices
Question No: 22 ( Marks: 1 ) - Please chooseone
One can browse documents residing on a remote computer
h ttp ://vuj anna t.n i n g .comBest Website To Help Vu Students
http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/ -
7/27/2019 42340216-Fall-2009-FinalTerm-OPKST-CS101-Bc090403561
8/18
h ttp ://vu j anna t.n i n g .comBest Website To Help Vu Students
using protocol.
HTTP SMTP FTP TELNET
Question No: 23 ( Marks: 1 ) - Please chooseone
One can run a program on a remote computer using
protocol. HTTP SMTP
FTP TELNET
h ttp ://vuj anna t.n i n g .comBest Website To Help Vu Students
http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/ -
7/27/2019 42340216-Fall-2009-FinalTerm-OPKST-CS101-Bc090403561
9/18
h ttp ://vu j anna t.n i n g .comBest Website To Help Vu Students
Question No: 24 ( Marks: 1 ) - Please choose one
There are ways of calling functions. One Three
Four
-Which protocol is use to transfer a file over the network ?
UDP FTP
TCP OSI
Question No: 26 ( Marks: 1 ) - Please choose one
is the process of analyzing large databases to identify
patterns. Data normalization Data management
Data MiningNone of the given options
Question No: 27 ( Marks: 1 ) - Please choose one
The first spread sheet program was invented by
Charles Babbage Dan Bricklin Paul Graham John von Neumann
Question No: 29 ( Marks: 1 ) - Please choose one
From which of the following is NOT a technique
h ttp ://vuj anna t.n i n g .comBest Website To Help Vu Students
http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/ -
7/27/2019 42340216-Fall-2009-FinalTerm-OPKST-CS101-Bc090403561
10/18
h ttp ://vu j anna t.n i n g .comBest Website To Help Vu Students
through which Security can be improved :
Private or virtual-private networks Firewalls Metal detectors Virus detectors
h ttp ://vuj anna t.n i n g .comBest Website To Help Vu Students
http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/ -
7/27/2019 42340216-Fall-2009-FinalTerm-OPKST-CS101-Bc090403561
11/18
h ttp ://vu j anna t.n i n g .comBest Website To Help Vu Students
Question No: 30 ( Marks: 1 ) - Please chooseone
In JavaScript: In order to display the text on browserGrade A, which of following statement is True.
documentwrite( "Grade A") document.write( "Grade A"); document.write( "Grade && A"); document.write( "Grade && A");
Question No: 31 ( Marks: 1 )SMTP stands for what?
Ans: Simple Mail Transfer Protocol
Question No: 32 ( Marks: 1 )
What is an IP address?
Ans: A unique identifier for a computer on a TCP/IP
network is called IP address.
Question No: 33 ( Marks: 2 )
What is spreadsheet? List any two jobs that it can do.
Ans: A spreadsheet- VisiCalc- was the first
popular application on PCs. Electronic
replacement for ledgers.
Used for automating engineering, scientific, but in
majority of cases, business calculations.
Question No: 35 ( Marks: 3 )What are the Sub categories of Artificial Intelligence?
Briefly explain any two. Ans: Many times are based on a
h ttp ://vuj anna t.n i n g .comBest Website To Help Vu Students
http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/ -
7/27/2019 42340216-Fall-2009-FinalTerm-OPKST-CS101-Bc090403561
12/18
h ttp ://vu j anna t.n i n g .comBest Website To Help Vu Students
branch of computer science called artificial intelligence
Category of SW is designed to help business managers in
making effective decisions in complex situations based on
the analysis of the relevant dataFollowing two Sub categories of Artificial Intelligence are:
Productivity Software:
Most popular category in terms of licenses sold
Common features
Ability to simplify, automate everyday business tasks
Word Processors:
Probably the most popular productivity app
Initially designed as a replacement for the typewriter
Automation
h ttp ://vuj anna t.n i n g .comBest Website To Help Vu Students
http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/ -
7/27/2019 42340216-Fall-2009-FinalTerm-OPKST-CS101-Bc090403561
13/18
h ttp ://vu j anna t.n i n g .comBest Website To Help Vu Students
Question No: 36 ( Marks: 3 )
What are Logic- or Time-Bombs ?Ans: It executes its payload when a predetermined eventoccursExample events:
A particular word or phrase
is typed. A particular date or
time is reached. Question
No: 37 ( Marks: 3 )
Diffentiate Local andGlobal Variables. Ans:Local or Function-level
VariableEffective only in the function in which they are declaredGlobal Variables
Visible everywhere on the Web page
Question No: 38 ( Marks: 5 )
How global corporations are becoming more powerful?Ans: Internet-based communication is allowing business
entities to coordinate the activities of their globally-spread
units with greater accuracy The knowledge gained by one
unit becomes available to all others very quickly All this
has made these business entities very powerful, even
more powerful than many nation-states.
Question No: 39 ( Marks: 5 )In a System having many parts to be designed, what typeof part one should always do first? Describe briefly.
Ans: A system has many parts to be designed like hard
h ttp ://vuj anna t.n i n g .comBest Website To Help Vu Students
http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/ -
7/27/2019 42340216-Fall-2009-FinalTerm-OPKST-CS101-Bc090403561
14/18
h ttp ://vu j anna t.n i n g .comBest Website To Help Vu Students
part, simple part, quality part, development part in all the
system the hard part should be designed first because
hard part is necessary before all parts.
Question No: 40 ( Marks: 10 )
What are the phases of the DoS attack? Explain each phase
in detail.
Ans: The DoS SW is not custom SW, and can be
downloaded from the Internet. Therefore, it is difficult to
track the person who launched the attack by analyzing
that SW.
Three Phases of the DoS1. Search
2. Arm
3. Attack
Neutralizing the Attack
The engineers responsible for monitoring the traffic on
the Yahoo Web sites quickly identified the key
characteristics of the packets originating from thosedrones
Then they setup filters that blocked all those packets
BTW, the same type of attack brought down the CNN,
Buy, eBay, Amazon Websites the very next day of the
Yahoo attack
How to stop DoS attacks from taking place?
Design SW that monitors incoming packets, and on
noticing a sudden increase in the number of similar
packets, blocks them
h ttp ://vuj anna t.n i n g .comBest Website To Help Vu Students
http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/ -
7/27/2019 42340216-Fall-2009-FinalTerm-OPKST-CS101-Bc090403561
15/18
h ttp ://vu j anna t.n i n g .comBest Website To Help Vu Students
Convince system administrators all over the world to
secure their servers in such a way that they cannot be
used as dronesCyber crime can
be used to:
Damage a home
computer Bring
down a business
Weaken the telecom, financial, or even defense-related
systems of a countryMail Bombing
A stream of large-sized emails are sent to an address,
overloading the destination account.
This can potentially shut-down a poorly-designed email
system or tie up the telecom channel for long periods
Defense: email filtering
Break-Ins
Hackers are always trying to break-in into Internet-
connected computers to steal info or plant malicious
programs
Defense:
Firewalls
Intrusion detectors
Other effective security policies
Credit Card FraudA thief somehow breaks into an ecommerce server and
gets hold of credit numbers and related info
The thief then uses that info to order stuff on the Internet
h ttp ://vuj anna t.n i n g .comBest Website To Help Vu Students
http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/ -
7/27/2019 42340216-Fall-2009-FinalTerm-OPKST-CS101-Bc090403561
16/18
h ttp ://vu j anna t.n i n g .comBest Website To Help Vu Students
Alternatively, the thief may auction the credit card info on
certain Web sites setupjust for that purpose
Defense: Use single-use credit card numbers for your
Internet transactionsSoftware Piracy
Using a piece of SW without the authors permission or
employing it for uses not allowed by the author is SW
piracy
Defense: Various authentication schemes. They,
however, are seldom used as they generally annoy the
genuine users
Industrial Espionage
Spies of one business monitoring the network traffic of their
competitors
They are generally looking for info for future products,
marketing strategies, and even financial info
Defense: Private networks, encryption, network sniffers
Question No: 41 ( Marks: 10 )
Write HTML and JavaScript code for the requirementsshown in the diagram below. When ConvertoUpperCase
button is pressed, the entered text is converted to upper
case and result is displayed in the result text box. Similarly,
when ConvertoLowerCase button is pressed, the entered
text is converted to lower case and result is displayed in the
result text box.
h ttp ://vuj anna t.n i n g .comBest Website To Help Vu Students
http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/ -
7/27/2019 42340216-Fall-2009-FinalTerm-OPKST-CS101-Bc090403561
17/18
h ttp ://vujanna t.n in g .com
Best Website ToHelp Vu Students
h ttp ://vuj anna t.n i n g .comBest Website To Help Vu Students
http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/http://vujannat.ning.com/ -
7/27/2019 42340216-Fall-2009-FinalTerm-OPKST-CS101-Bc090403561
18/18
function askupp
{
var x= prompt("Paste your uppercase text in here to be
translated into
Uppercase","ANYTHING")
if (x!==null && x=="")
{
document.write(x.toUpperrCase());
}
}
function ask low
{
var y= prompt("Paste your lowercase text in here
to be translated into lower case","anything")
if (y!==null && x==""){
document.write(x.toLow
h ttp ://vuj anna t.n i n g .comBest Website To Help Vu Students