A____________________ is the process of analyzing large databases to identify patterns
Data Mining
Data Normalization
Data Redundancy
Data Manipulation
onFocus executes the specified JavaScript code when ___________
a window receives focus
a form element receives input focus
a window receives focus or when a form element receives input focus
None of the Given.
CERN releases WWW in:
1992
1993
1994
None of the given choices
Communications on the internet is controlled by a set of two protocols, named :
HTTP & SMTP
FTP & TELNET
TCP & IP
None of the given choices
One of the disadvantages of working at home is________________
Family life may be happier because of living at home.
Family life may suffer as well, as some never turn off, and keep on working through out the day, evening and night
Family life may become happier because he can give more time to his family.
There is no disadvantage of working at home.
The greatest, shared resource of information created by humankind is:
Web
Dictionary
Vocabulary
Glossary
http://groups.google.com/group/vuZs
There are _____________ types communication channels.
2
3
4
5
The Cyberwarefare is a ______
Crime
War
Software
Game
In the statement “PopUp(“Message”)” :
“PopUp” is the function Name, “Message” is the argument
“Message” is function identifier
Syntax Error: functions cannot be called in this way
Error: function is undefined
RGB scheme stands for _________________________________.
Red Grey Blue
Red Green Brown
Red Green Blue
Red Green Black
_____________ is the part of the virus that generally consists of malicious computer instructions
Off load
Payload
Loader
Transmitter
Unlike viruses, __________________ are stand-alone programs
Trojan horses
Logic- or time-bombs
Worms
None of the given
Voice over IP has _____ modes
2
3
4
5
We use __________ to stop Break-Ins.
Scanners
Intrusion detectors
Firewalls
Intrusion detectors and Firewalls
Which one can lead user to leave your website?
Simple design
Poor navigation
Information layout
Adaptable design
_____________________ are the subcategories of AI
Expert Systems
Robotics
Natural Language Processing
All of the above
With the Help of FTP we can:
List, change, create folders on a remote computer
Upload and download files
Transferring Web content from the developer’s PC to the Web server
All of the given choices
Which protocol is used for receiving E-mail messages?
FTP
POP
Telnet Protocol
SMTP
The organizations are learning that business can be done in a more effective manner if emphasis is placed upon ______________.
Cooperation
Shared responsibility
Networking
All of the given
___ is used to transfer files between computers on a TCP/IP network
FTP
POP
Telnet Protocol
SMTP
http://groups.google.com/group/vuZs
Which of the following is True about “pareseFloat(String)” function: I) If the first character cannot be converted to a number, parseFloat returns NaN. II) it returns the fractional portion of floating point number. III) Parses the string argument; returns a FP number. IV) Non of given options.
I and II Only
II and III Only
I and III Only
IV Only
Event-driven programs can ____________________ events.
capture
respond
capture and respond
None of the Given.
Which of the statements is NOT true about “Color Usage Guidelines” for developing a presentation?
Use color sparingly to to highlight a point, but don't get carried away
Do not use colors like yellow or red for background except where needed.
Do not use colors like green, blue and such like colors except where needed.
None of given options
_________________ Type of databases management systems are supporting Terabytes of Data
Personal
Desktop
Enterprise
Single-user
Because of the ever-decreasing costs of verbal, text, video communications; the distances have _________
Increased
Expanded
Contracted
Lengthened
The structure of the networked organization is _________.
Simple
Flexible
Complex
All of the given
A CAD drawing consist of many geometric shapes like straight lines , arc , tc and therefore is stored in a ___________ format.
Scalar
Vector
Both a & b
____ is a type of computer-to-computer messaging.
TCP
Telnet
FTP
None of these
RDBMS stands for ________________________________
Relative Data Base Management System
Relational Data Base Management System
Recursive Data Base Management System
Responsible Data Base Management System
Using Color Mapping scheme only a limited number of color called _____________ are allowed.
Reserved
Pointers
Platelet
None of these
Using _________ topology, adding new nodes is difficult.
Ring
Bus
Star
None of the given choices
Problems with old presentation methods was (transparencies and projectors etc):
They were costly
Electronic transmission, in some cases, was not easy
Presentation some times gets ambiguous
All of given options
ARPANET splits into two nets to keep military & non-military network sites separate, named :
ARPANET & MILNET
MICRONET & MILNET
PICONET & ARPANET
None of the given choices
Arguments values are passed to the function _________
by value
by reference
Both a & b
Non of the Given.
__________________ is a field that uniquely identifies each record stored in a table.
Primary Key
Foreign Key
Secondary key
Special Key
The IP address consists of _____ bits
64
32
16
128
Credit Card Fraud can be minimized by using _________________
single credit card numbers
multiple-use credit card numbers
single-use credit card numbers
Firewalls
hotWeather = (Temperature == 40); in the above statement, the variable hotWeather is of type
Number
String
Boolean
None of the given
NCSA stands for :
NationalCenter for Supercomputing Applications
NationalCenter for Supreme Applications
NationalCenter for Super Authority
None of the given choices
Self-replicating SW that eludes detection and is designed to attach itself to other files is called _____________.
Trojans
Viruses
Sniffers
Operating System
SVG stands for _________________________________________.
Structured Vector Graphics
Software Vector Graphics
Structured Visual Graphics
None of these
Viruses move from one computer to another with the __________ and spring into action when the _____________ is executed or opened
Host – Host
Host – Client
Client – Host
Client – Client
http://groups.google.com/group/vuZs
____________________ is a layered structure consisting of a number of homogenous and simple processing elements.
Genetic Algorithms
Rule-based Systems
Feed-Forward Network
None of these
A property that gives the value of Pi is:
PI()
Graph.PI
Math.PI
Math.PI()
The smallest image forming element on a computer display is called ____________.
Resolution
Pixel
Grey area
None of these
SMTP stands for _______________________________________.
Simple Mail Transfer Protocol
Simple Mail Transparent Protocol
Simple Mail Transfer Paradigm
None of these
________________ network allows data to be sent directly from one computer to another.
Ring
Bus
Star
None of the given choices
Viruses attach themselves to other computer programs or data files, are known as____
Trojans
Guests
Hosts
Spies
Avoid __________ to ensure readability of web page
Overuse of bold and italics
Use of paragraphs
Use of white space
Use of contrast colors
STP stands for :
Shielded Twisted Pair
Silver Twisted Pair
Single Twisted Pair
None of the given choices
In ______, the spies of one business monitors the network traffic of their competitors.
Industrial intelligence
Industrial Espionage
Industrial spying
Industrial surveillance
Color mapping scheme reducing the size of 2.25 MB graphic to _________ MB.
0.90 MB
0.75 MB
1.00 MB
None of these
The functions which call themselves from their (own) body are called:
Virtual functions
Abstract functions
Overriding functions
Recursive functions
Browser sends ‘_________’ request to web server to access a file.
SET
GET
TRANSFER
All of the given choices
vuzs
The internet communities are ___________.
Geographical based
Interest based
Country based
Religion based
Infection propagation and Actual destructive are the components of _______________
Transmission mechanism
Payload
Worms
Trojan Horse
0 comments:
Post a Comment