Vous êtes sur la page 1sur 18

http://vujannat.ning.

com Best Website To Help Vu Students

http://vujannat.ning.com Best Website To Help Vu Students

http://vujannat.ning.com Best Website To Help Vu Students

Question No: 1 ( Marks: 1 ) - Please choose one Which of the following is NOT a category of Mobile Computers? Laptop Palmtop Desktop Wearable Question No: 2 ( Marks: 1 ) - Please choose one TCP stands for . Total communication protocol Transmission control protocol Transfer control protocol Transfer collection protocol Question No: 3 ( Marks: 1 ) - Please choose one A named collection of properties (data, state) and methods (instruction, behavior) is called . Array Function Variable Object Question No: 4 ( Marks: 1 ) - Please choose one A is a meaningful, easy-to-remember label for an IP address. TCP address Domain name Network name VoIP
http://vujannat.ning.com Best Website To Help Vu Students

http://vujannat.ning.com Best Website To Help Vu Students

Question No: 5 ( Marks: 1 ) - Please choose one Serial arrangement in which things follow logical order or a recurrent pattern, such as statements executing one by one, is called . Loop Sequence Condition Array Question No: 6 ( Marks: 1 ) - Please choose one Which one of the following is NOT a component of Rule Based System? Rule Compiler Rule Interpreter Rules Base Working Memory

http://vujannat.ning.com Best Website To Help Vu Students

http://vujannat.ning.com Best Website To Help Vu Students

Question No: 7

( Marks: 1 )

- Please choose one

AutoCAD falls in the category of Engineering Applications Graphics Applications Scientific Applications Business Applications Question No: 8 ( Marks: 1 ) - Please choose one Programs that run on client machine and validate info that a user enters in a form, are known as: Server-Side Scripts Client-Side Scripts Super Scripts Form Scripts Question No: 9 ( Marks: 1 ) - Please choose one All the hardware components of the Computer system are installed on-------------. Microprocessor Motherboard Monitor
http://vujannat.ning.com Best Website To Help Vu Students

http://vujannat.ning.com Best Website To Help Vu Students

Memory Question No: 10 ( Marks: 1 ) one In RDBMS, table rows are called Field Record Column Query Question No: 12 ( Marks: 1 ) one Tribal flood network is a DoS Scanning Utility None of the given options - Please choose .

- Please choose software.

Question No: 13 ( Marks: 1 ) - Please choose one To stop industrial espionage, we use . Private network Encryption Network sniffer All of the given options Question No: 14 ( Marks: 1 ) - Please choose one The responsibilities of the Team Lead includes . Planning and tracking of the project Detailed design
http://vujannat.ning.com Best Website To Help Vu Students

http://vujannat.ning.com Best Website To Help Vu Students

Professional development of team members All of the given options Question No: 15 ( Marks: 1 ) - Please choose one Client relationship management is the responsibility of . Team Lead Project Manager Developer Quality Assurance Expert Question No: 16 ( Marks: 1 ) - Please choose one is responsible for day to day operations. CEO COO CMSO Developer Question No: 17 ( Marks: 1 ) - Please choose one There are types of errors. 2 3 4

http://vujannat.ning.com Best Website To Help Vu Students

http://vujannat.ning.com Best Website To Help Vu Students

5 Question No: 18 one ( Marks: 1 ) - Please choose

Sequence of steps that is taken to solve a problem is called . Algorithm Operating System Application software None of the given options Question No: 20 ( Marks: 1 ) - Please choose one Which is NOT true for JavaScript variable name ? Student Roll_no_1111 For _schedule Question No: 21 ( Marks: 1 ) - Please choose one In JavaScript, first element of an array has the index: 1 -1 2 None of the given choices Question No: 22 ( Marks: 1 ) - Please choose one One can browse documents residing on a remote computer
http://vujannat.ning.com Best Website To Help Vu Students

http://vujannat.ning.com Best Website To Help Vu Students

using protocol. HTTP SMTP FTP TELNET Question No: 23 ( Marks: 1 ) - Please choose one One can run a program on a remote computer using protocol. HTTP SMTP FTP TELNET

http://vujannat.ning.com Best Website To Help Vu Students

http://vujannat.ning.com Best Website To Help Vu Students

Question No: 24 ( Marks: 1 ) - Please choose one There are ways of calling functions. One Two Three Four Question ( Mark - Please choose one Which protocol is use to transfer a file over the network ? UDP FTP TCP OSI Question No: 26 ( Marks: 1 ) - Please choose one is the process of analyzing large databases to identify patterns. Data normalization Data management Data Mining None of the given options Question No: 27 ( Marks: 1 ) - Please choose one The first spread sheet program was invented by Charles Babbage Dan Bricklin Paul Graham John von Neumann Question No: 29 ( Marks: 1 ) - Please choose one From which of the following is NOT a technique
http://vujannat.ning.com Best Website To Help Vu Students

http://vujannat.ning.com Best Website To Help Vu Students

through which Security can be improved : Private or virtual-private networks Firewalls Metal detectors Virus detectors

http://vujannat.ning.com Best Website To Help Vu Students

http://vujannat.ning.com Best Website To Help Vu Students

Question No: 30 ( Marks: 1 ) - Please choose one In JavaScript: In order to display the text on browser Grade A, which of following statement is True. documentwrite( "Grade A") document.write( "Grade A"); document.write( "Grade && A"); document.write( "Grade && A"); Question No: 31 ( Marks: 1 ) SMTP stands for what? Ans: Simple Mail Transfer Protocol Question No: 32 ( Marks: 1 ) What is an IP address? Ans: A unique identifier for a computer on a TCP/IP network is called IP address. Question No: 33 ( Marks: 2 ) What is spreadsheet? List any two jobs that it can do. Ans: A spreadsheet- VisiCalc- was the first popular application on PCs. Electronic replacement for ledgers. Used for automating engineering, scientific, but in majority of cases, business calculations. Question No: 35 ( Marks: 3 ) What are the Sub categories of Artificial Intelligence? Briefly explain any two. Ans: Many times are based on a
http://vujannat.ning.com Best Website To Help Vu Students

http://vujannat.ning.com Best Website To Help Vu Students

branch of computer science called artificial intelligence Category of SW is designed to help business managers in making effective decisions in complex situations based on the analysis of the relevant data Following two Sub categories of Artificial Intelligence are: Productivity Software: Most popular category in terms of licenses sold Common features Ability to simplify, automate everyday business tasks Word Processors: Probably the most popular productivity app Initially designed as a replacement for the typewriter Automation

http://vujannat.ning.com Best Website To Help Vu Students

http://vujannat.ning.com Best Website To Help Vu Students

Question No: 36 ( Marks: 3 ) What are Logic- or Time-Bombs ? Ans: It executes its payload when a predetermined event occurs Example events: A particular word or phrase is typed. A particular date or time is reached. Question No: 37 ( Marks: 3 ) Diffentiate Local and Global Variables. Ans: Local or Function-level Variable Effective only in the function in which they are declared Global Variables Visible everywhere on the Web page Question No: 38 ( Marks: 5 ) How global corporations are becoming more powerful? Ans: Internet-based communication is allowing business entities to coordinate the activities of their globally-spread units with greater accuracy The knowledge gained by one unit becomes available to all others very quickly All this has made these business entities very powerful, even more powerful than many nation-states. Question No: 39 ( Marks: 5 ) In a System having many parts to be designed, what type of part one should always do first? Describe briefly. Ans: A system has many parts to be designed like hard
http://vujannat.ning.com Best Website To Help Vu Students

http://vujannat.ning.com Best Website To Help Vu Students

part, simple part, quality part, development part in all the system the hard part should be designed first because hard part is necessary before all parts. Question No: 40 ( Marks: 10 ) What are the phases of the DoS attack? Explain each phase in detail. Ans: The DoS SW is not custom SW, and can be downloaded from the Internet. Therefore, it is difficult to track the person who launched the attack by analyzing that SW. Three Phases of the DoS 1. Search 2. Arm 3. Attack Neutralizing the Attack The engineers responsible for monitoring the traffic on the Yahoo Web sites quickly identified the key characteristics of the packets originating from those drones Then they setup filters that blocked all those packets BTW, the same type of attack brought down the CNN, Buy, eBay, Amazon Websites the very next day of the Yahoo attack How to stop DoS attacks from taking place? Design SW that monitors incoming packets, and on noticing a sudden increase in the number of similar packets, blocks them
http://vujannat.ning.com Best Website To Help Vu Students

http://vujannat.ning.com Best Website To Help Vu Students

Convince system administrators all over the world to secure their servers in such a way that they cannot be used as drones Cyber crime can be used to: Damage a home computer Bring down a business Weaken the telecom, financial, or even defense-related systems of a country Mail Bombing A stream of large-sized emails are sent to an address, overloading the destination account. This can potentially shut-down a poorly-designed email system or tie up the telecom channel for long periods Defense: email filtering Break-Ins Hackers are always trying to break-in into Internetconnected computers to steal info or plant malicious programs Defense: Firewalls Intrusion detectors Other effective security policies Credit Card Fraud A thief somehow breaks into an ecommerce server and gets hold of credit numbers and related info The thief then uses that info to order stuff on the Internet
http://vujannat.ning.com Best Website To Help Vu Students

http://vujannat.ning.com Best Website To Help Vu Students

Alternatively, the thief may auction the credit card info on certain Web sites setupjust for that purpose Defense: Use single-use credit card numbers for your Internet transactions Software Piracy Using a piece of SW without the authors permission or employing it for uses not allowed by the author is SW piracy Defense: Various authentication schemes. They, however, are seldom used as they generally annoy the genuine users Industrial Espionage Spies of one business monitoring the network traffic of their competitors They are generally looking for info for future products, marketing strategies, and even financial info Defense: Private networks, encryption, network sniffers Question No: 41 ( Marks: 10 ) Write HTML and JavaScript code for the requirements shown in the diagram below. When ConvertoUpperCase button is pressed, the entered text is converted to upper case and result is displayed in the result text box. Similarly, when ConvertoLowerCase button is pressed, the entered text is converted to lower case and result is displayed in the result text box.

http://vujannat.ning.com Best Website To Help Vu Students

http://vuj annat.ni ng.com Best Website To Help Vu Students

http://vujannat.ning.com Best Website To Help Vu Students

<htm l> <head> <script type="text/javascript"> function askupp { var x= prompt("Paste your uppercase text in here to be translated into Uppercase","ANYTHING") if (x!==null && x=="") { document.write(x.toUpperrCase()); } } function ask low { var y= prompt("Paste your lowercase text in here to be translated into lower case","anything") if (y!==null && x=="") { document.write(x.toLow

http://vujannat.ning.com Best Website To Help Vu Students

Vous aimerez peut-être aussi