Pages

Sunday, August 22, 2010

For LATEST solved Papers (Spring 2010)


Dear students,

Thanks to visit us.

You may visit the following link for latest current SOLVED papers, VUsolutions team daily update that (dedicated to current papers) blog:



Best of luck..

VUsolutions HelpDesk..

CS101-6-solved

A____________________ is the process of analyzing large databases to identify patterns

Data Mining

Data Normalization

Data Redundancy

Data Manipulation

onFocus executes the specified JavaScript code when ___________

a window receives focus

a form element receives input focus

a window receives focus or when a form element receives input focus

None of the Given.

CERN releases WWW in:

1992

1993

1994

None of the given choices

Communications on the internet is controlled by a set of two protocols, named :

HTTP & SMTP

FTP & TELNET

TCP & IP

None of the given choices

One of the disadvantages of working at home is________________

Family life may be happier because of living at home.

Family life may suffer as well, as some never turn off, and keep on working through out the day, evening and night

Family life may become happier because he can give more time to his family.

There is no disadvantage of working at home.

The greatest, shared resource of information created by humankind is:

Web

Dictionary

Vocabulary

Glossary

http://groups.google.com/group/vuZs

There are _____________ types communication channels.

2

3

4

5

The Cyberwarefare is a ______

Crime

War

Software

Game

In the statement “PopUp(“Message”)” :

PopUp” is the function Name, “Message” is the argument

“Message” is function identifier

Syntax Error: functions cannot be called in this way

Error: function is undefined

RGB scheme stands for _________________________________.

Red Grey Blue

Red Green Brown

Red Green Blue

Red Green Black

_____________ is the part of the virus that generally consists of malicious computer instructions

Off load

Payload

Loader

Transmitter

Unlike viruses, __________________ are stand-alone programs

Trojan horses

Logic- or time-bombs

Worms

None of the given

Voice over IP has _____ modes

2

3

4

5

We use __________ to stop Break-Ins.

Scanners

Intrusion detectors

Firewalls

Intrusion detectors and Firewalls

Which one can lead user to leave your website?

Simple design

Poor navigation

Information layout

Adaptable design

_____________________ are the subcategories of AI

Expert Systems

Robotics

Natural Language Processing

All of the above

With the Help of FTP we can:

List, change, create folders on a remote computer

Upload and download files

Transferring Web content from the developer’s PC to the Web server

All of the given choices

Which protocol is used for receiving E-mail messages?

FTP

POP

Telnet Protocol

SMTP

The organizations are learning that business can be done in a more effective manner if emphasis is placed upon ______________.

Cooperation

Shared responsibility

Networking

All of the given

___ is used to transfer files between computers on a TCP/IP network

FTP

POP

Telnet Protocol

SMTP

http://groups.google.com/group/vuZs

Which of the following is True about “pareseFloat(String)” function: I) If the first character cannot be converted to a number, parseFloat returns NaN. II) it returns the fractional portion of floating point number. III) Parses the string argument; returns a FP number. IV) Non of given options.

I and II Only

II and III Only

I and III Only

IV Only

Event-driven programs can ____________________ events.

capture

respond

capture and respond

None of the Given.

Which of the statements is NOT true about “Color Usage Guidelines” for developing a presentation?

Use color sparingly to to highlight a point, but don't get carried away

Do not use colors like yellow or red for background except where needed.

Do not use colors like green, blue and such like colors except where needed.

None of given options

_________________ Type of databases management systems are supporting Terabytes of Data

Personal

Desktop

Enterprise

Single-user

Because of the ever-decreasing costs of verbal, text, video communications; the distances have _________

Increased

Expanded

Contracted

Lengthened

The structure of the networked organization is _________.

Simple

Flexible

Complex

All of the given

A CAD drawing consist of many geometric shapes like straight lines , arc , tc and therefore is stored in a ___________ format.

Scalar

Vector

Both a & b

____ is a type of computer-to-computer messaging.

TCP

Telnet

E-mail

FTP

None of these

RDBMS stands for ________________________________

Relative Data Base Management System

Relational Data Base Management System

Recursive Data Base Management System

Responsible Data Base Management System

Using Color Mapping scheme only a limited number of color called _____________ are allowed.

Reserved

Pointers

Platelet

None of these

Using _________ topology, adding new nodes is difficult.

Ring

Bus

Star

None of the given choices

Problems with old presentation methods was (transparencies and projectors etc):

They were costly

Electronic transmission, in some cases, was not easy

Presentation some times gets ambiguous

All of given options

ARPANET splits into two nets to keep military & non-military network sites separate, named :

ARPANET & MILNET

MICRONET & MILNET

PICONET & ARPANET

None of the given choices

Arguments values are passed to the function _________

by value

by reference

Both a & b

Non of the Given.

__________________ is a field that uniquely identifies each record stored in a table.

Primary Key

Foreign Key

Secondary key

Special Key

The IP address consists of _____ bits

64

32

16

128

Credit Card Fraud can be minimized by using _________________

single credit card numbers

multiple-use credit card numbers

single-use credit card numbers

Firewalls

hotWeather = (Temperature == 40); in the above statement, the variable hotWeather is of type

Number

String

Boolean

None of the given

NCSA stands for :

NationalCenter for Supercomputing Applications

NationalCenter for Supreme Applications

NationalCenter for Super Authority

None of the given choices

Self-replicating SW that eludes detection and is designed to attach itself to other files is called _____________.

Trojans

Viruses

Sniffers

Operating System

SVG stands for _________________________________________.

Structured Vector Graphics

Software Vector Graphics

Structured Visual Graphics

None of these

Viruses move from one computer to another with the __________ and spring into action when the _____________ is executed or opened

Host – Host

Host – Client

Client – Host

Client – Client

http://groups.google.com/group/vuZs

____________________ is a layered structure consisting of a number of homogenous and simple processing elements.

Genetic Algorithms

Rule-based Systems

Feed-Forward Network

None of these

A property that gives the value of Pi is:

PI()

Graph.PI

Math.PI

Math.PI()

The smallest image forming element on a computer display is called ____________.

Resolution

Pixel

Grey area

None of these

SMTP stands for _______________________________________.

Simple Mail Transfer Protocol

Simple Mail Transparent Protocol

Simple Mail Transfer Paradigm

None of these

________________ network allows data to be sent directly from one computer to another.

Ring

Bus

Star

None of the given choices

Viruses attach themselves to other computer programs or data files, are known as____

Trojans

Guests

Hosts

Spies

Avoid __________ to ensure readability of web page

Overuse of bold and italics

Use of paragraphs

Use of white space

Use of contrast colors

STP stands for :

Shielded Twisted Pair

Silver Twisted Pair

Single Twisted Pair

None of the given choices

In ______, the spies of one business monitors the network traffic of their competitors.

Industrial intelligence

Industrial Espionage

Industrial spying

Industrial surveillance

Color mapping scheme reducing the size of 2.25 MB graphic to _________ MB.

0.90 MB

0.75 MB

1.00 MB

None of these

The functions which call themselves from their (own) body are called:

Virtual functions

Abstract functions

Overriding functions

Recursive functions

Browser sends ‘_________’ request to web server to access a file.

SET

GET

TRANSFER

All of the given choices

vuzs

The internet communities are ___________.

Geographical based

Interest based

Country based

Religion based

Infection propagation and Actual destructive are the components of _______________

Transmission mechanism

Payload

Worms

Trojan Horse

Is this blog is useful for you?

Powered by Blogger.