Education In Pakistan

Papers, Notes, Books & Help For Students

UPDATED EDUCATIONAL NEWS INTERVIEW HELP FOR ALL JOBS ONLINE BOOKS SCHOLARSHIPS AVAILABLE INTERNSHIP JOBS

Tag: past papers Spring 2010

VU CS201- Introduction to Programming FINALTERM solved unsolved past papers Spring 2010

VU CS201- Introduction To Programming FINALTERM Solved Unsolved Past Papers Spring 2010

FINALTERM EXAMINATION

CS201 – Introduction to programming

Final Term Spring 2010

Solved by vuZs Team

zubair hussain This e-mail address is being protected from spambots. You need JavaScript enab

 

 

Operator overloading can be performed through__________________.

       Classes

       Functions

 

       Operators

       Reference

 

 

Question No: 2      ( Marks: 1 ) – Please choose one

When a value is referred by a normal variable then it is known as,

       Direct Reference

       Indirect Reference

       Partial Reference

       Proper Reference

When a value is referred by a normal variable is known as direct reference

Question No: 3      ( Marks: 1 ) – Please choose one

Which of the following function is used to increase the size of already allocated memory chunk?

 

       malloc

 

       calloc

       realloc

       free

Question No: 4      ( Marks: 1 ) – Please choose one

Which of the following is NOT a preprocessor directive?

       #error

       #define

       #line

       ► #ndefine

 

list of preprocessors

• #include • #include “filename” • #define • #undef • #ifdef • #ifndef • #if • #else • #elif • #endif • #error • #line • #pragma • #assert

 

Question No: 5      ( Marks: 1 ) – Please choose one

The stream objects cin and cout are included in which header file?

       iostream.h

       fstream.h

       istream.h

       ostream.h
http://vuzs.net/

Question No: 6      ( Marks: 1 ) – Please choose one

Overloaded delete operator function takes the same parameter as an argument returned by new operator function.

       True

       False

The same pointer that is returned by the new operator, is passed as an argument to the delete operator. These rules apply to both, if operators (new and delete) are overloaded as member or non-member operators (as global operators).

 

Question No: 7      ( Marks: 1 ) – Please choose one

When an array of object is created dynamically then there is no way to provide parameterized constructors for array of objects.

       True

 

       False

if we are allocating an array of objects, there is no way to pass arguments to objects’ constructors. Therefore it is required that the objects that are stored in such an array have a no-argument constructor.

 

Question No: 8      ( Marks: 1 ) – Please choose one

C is widely known as development language of _______ operating system.

       Linux

       Windows

       Unix

   Mac OS

In the start C became widely known as the development language of the UNIX operating system, and the UNIX operating system was written by using this C language. The C language is so powerful that the compiler of C and other various operating systems are written in C.
http://vuzs.ne

Question No: 9      ( Marks: 1 ) – Please choose one

Computer can understand only machine language code.

       True

 

       False

Question No: 10      ( Marks: 1 ) – Please choose one

We can not define a function as a friend of a Template class.

       True

       False

 

Class templates can have friends. A class or class template, function, or function template can be a friend to a template class. Friends can also be specializations of a class template or function template, but not partial specializations.

 

Question No: 11      ( Marks: 1 ) – Please choose one

What will be the value of ‘a’ and ‘b’ after executing the following statements?

a = 3;

b = a++;

       3, 4

       4, 4

       3, 3

       4, 3

 

 

Question No: 12      ( Marks: 1 ) – Please choose one

Consider the following code segment. What will be the output of following code?

int addValue (int *a){

int b = (*a) + 2;

return b ;

}

main () {

int x =6 ;

cout <<  x << “,” ;

cout << addValue(&x) << “,” ;

cout <<  x ;

}

http://vuzs.ne

       ► 6,8,6

 

       6,6,8

       6,8,8

       6,6,6

http://vuzs.net/

 

Question No: 13      ( Marks: 1 ) – Please choose one

_______ is used to trace the logic of the program and correct the logical errors.

       Compiler

       Editor

       Linker

       Debugger

 

 

Question No: 14      ( Marks: 1 ) – Please choose one

new and delete are _____ whereas malloc and free are _____.

       Functions, operators

       Classes, operators

       Operators, functions

       Operators, classes

Hence, we can call new and delete operators, P# 342
we have allocated a memory space for our use by malloc function. P# 285
Question No: 15      ( Marks: 1 ) – Please choose one

Like member functions, ______ can also access the private data members of a class.

       Non-member functions

       Friend functions

       Any function outside class

       None of the given options

Question No: 16      ( Marks: 1 ) – Please choose one

Which situation would require the use of a non-member overloaded operator?

       The overloaded operator is an Assignment operator.

http://vuzs.ne

       ► The left most operand is an object of a class.

 

       The left operand is built-in data type.

       The operator returns a reference.


When an operator function is implemented as a non-member function, the left-most operand may be an object of the operator’s class, an object of a different class, or a built-in type

Question No: 17      ( Marks: 1 ) – Please choose one

The stream insertion and stream extraction operators are already overloaded for ______.

       User-defined data types

       Built-in data types

       User-defined and built-in data types

       None of the given options

Question No: 18      ( Marks: 1 ) – Please choose one

If we define an identifier with the statement #define PI 3.1415926 then during the execution of the program the value of PI __________.

       can not be replaced

       None of the given options

       Remain constant.

       can be changed by some operation

 

 

Question No: 19      ( Marks: 1 ) – Please choose one vuzs

Assignment operator is ————————-associative.

right

       left

       binary

       unary

You can assign values to several variables in a single statement. For example, the following code sets the contents of apples and oranges to the same value:

apples = oranges = 10;

The assignment operator is right associative, so this statement executes by first storing the value 10 in oranges and then storing the value in oranges in apples, so it is effectively

apples = (oranges = 10);


http://vuzs.net/

Question No: 20      ( Marks: 1 ) – Please choose one

When ever dynamic memory allocation is made in C/C++, it is freed_____________.

       Explicitly

       Implicitly

       Both explicitly and implicitly

       None of the given options

Question No: 21      ( Marks: 1 ) – Please choose one

The appropriate data type to store the number of rows and colums of the matrix is____________.

       float

       int

       char

       none of the given options.

 

Question No: 22      ( Marks: 1 ) – Please choose one

Which of the following function do NOT initialize the chunk of memory to all zero?

       calloc() function

        Both malloc() and calloc()

       None of the above

       malloc() function


The malloc function differs from calloc in the way that the space allocated by malloc is not initialized and contains any values initially.

Question No: 23      ( Marks: 1 ) – Please choose one

The function free() returns back the allocated memory got thorough calloc and malloc to _____ .

       stack

       heap

       stack and heap

       None of the given options

http://vuzs.ne

 

Question No: 24      ( Marks: 1 ) – Please choose one

width() is member function of _____________

       cin object

       cout object

       Both cin and cout object

       None of the given option

 

 

Question No: 25      ( Marks: 1 ) – Please choose one

 

Templates are not type safe.

► true

       false

 

Templates are type-safe. This is because the types that templates act upon are known at compile time, so the compiler can perform type checking before errors occur.

Question No: 26      ( Marks: 1 ) – Please choose one

A Matrix can be composed of ints, floats or doubles as their elements. Best way is to handle this , _______________

       Write a separate class to handle each

       Use templates

       Use strings to store all types

       None of the given options

A Matrix can be composed of ints, floats or doubles as their elements. Instead of handling these data types separately, we can write Matrix class as a template class and write code once for all native data types. While writing this template class, the better approach to write will be, to go with a simple data type (e.g. double) first to write a Matrix class and then extend it to a template class later.

 

Question No: 27      ( Marks: 2 )

Give the general syntax of class template.

template

class myclass { —} ;

http://vuzs.ne

Question No: 28      ( Marks: 2 )

What is a truth Table?

There are some areas where the decision structures become very complicated. Sometimes, we find it difficult to evaluate a complicated logical expression. Sometimes the logic becomes extremely complicated so that even writing it as a simple syntax statement in any language. It becomes complicated to determine what will be evaluated in what way. We know the concept of truth table. The truth tables are very important. These are still a tool available for analyzing logical expressions. We will read logic design in future, which is actually to do with chips and gates. How we put these things together.

 http://vuzs.net/

 

Question No: 29      ( Marks: 2 )

 

What will be the output of following code, if user input a number 123?

int input ;

cin >> oct >> input;

cout << hex << input ;

 

53

Rational: it will take 123 as octal and print it in hex form which is 53.

 

Question No: 30      ( Marks: 2 )

What is principle of friendship in the context of functions and classes?

Class can declare a friend function and someone from outside the class cannot declare itself friend of a class.

A friend function can access the private variables of class just like a member function

 

Question No: 31      ( Marks: 3 )

What are the limitations of the friendship relation between classes?

Class can declare a friend class from inside and someone from outside the class cannot declare itself friend of a class.

 

Question No: 32      ( Marks: 3 )

Suppose an object of class A is declared as data member of class B.

(i) The constructor of which class will be called first? a

(ii) The destructor of which class will be called first?b

 

Question No: 33      ( Marks: 3 )

Define static variable. Also explain life time of static variable?

When you declare a static variable (native data type or object) inside a function, it is created and initialized only once during the lifetime of the program

 

Question No: 34      ( Marks: 5 )

Write a program which defines three variables of type double which store three different values including decimal points, using setprecision manipulators to print all these values with different number of digits after the decimal number.

#include

#include

main () {

double a = 12.12345;

double b = 13.123456;

double c = 14.1234567;

cout << setprecision (5) << a << endl;

cout << setprecision (2) << a << endl;

cout << setprecision (3) << a << endl;

}

Question No: 35      ( Marks: 5 )

Let we have a class,

class String

{

private:

char  buf[25];

};

Write code for assignment (=) operator function which assign one String object to other object. Your code should also avoid self assignment

 

Answer:

void String::operator = ( const String &other )

{ int length ;

length = other.length();

delete buf;

buf = new char [length + 1];

strcpy( buf, other.buf ); }

 

Question No: 36      ( Marks: 5 )

Read the given below code and explain what task is being performed by this function

Matrix :: Matrix ( int row , int col )

{

numRows = row ;

numCols = col ;

elements = new ( double * ) [ numRows ] ;

for ( int  i = 0 ; i < numRows ; i ++ )

{

elements [ i ] = new double [ numCols ] ;

for ( int j = 0 ; j < numCols ; j ++ )

elements [ i ] [ j ] = 0.0 ;

}

}

Hint : This function belong to a matrix class, having

Number of Rows = numRows

Number of Columns = numCols

 

VU CS201- Introduction To Programming FINALTERM Solved Unsolved Past Papers Spring 2010

VU CS101- Introduction to Computing (Session – 3) FINALTERM solved unsolved past papers Spring 2010

VU CS101- Introduction To Computing FINALTERM Solved Unsolved Past Papers Spring 2010

FINALTERM EXAMINATION

Spring 2010

CS101- Introduction to Computing (Session – 3)

 

 

Question No: 1 ( Marks: 1 ) – Please choose one

Analytical Engine is ——————

► An electrical machine

► A digital machine

► An analog machine

► A special purpose machine

Question No: 2 ( Marks: 1 ) – Please choose one

__________% of the users have left websites in frustration due to poor navigation.

► 40

► 62

► 83

► 91

Question No: 3 ( Marks: 1 ) – Please choose one

__________ breaks down the message to be sent over the internet into packets.

► FTP

► HTTP

► TCP

► IP

Question No: 4 ( Marks: 1 ) – Please choose one

The first spread sheet was called as_____________.

► Excel

► PowerPoint

► Word

► VisiCalc

Question No: 5 ( Marks: 1 ) – Please choose one

Which is correct?

► onUnload

► onUnLoad

► onUNLOAD

► All of the above

Question No: 6 ( Marks: 1 ) – Please choose one

Variables allow us to manipulate data through the ___________.

► Actual Value

► Reference

► Length

► Name

Question No: 7 ( Marks: 1 ) – Please choose one

We use ___________ to stop Break-Ins.

► Scanners

► Intrusion detectors

► Utilities

► None of the given options

Question No: 8 ( Marks: 1 ) – Please choose one

Which attribute of the IMG tag tells us about the source of the image ____________.

► source

► path

► loc

► src

Question No: 9 ( Marks: 1 ) – Please choose one

The developer report to ___________ in a development team.

► Team Lead

► Project Manager

► CEO

► IT Manager

Question No: 10 ( Marks: 1 ) – Please choose one

The key responsibilities of the architect of the project is______________.

► Technology selection

► High-level design

► Makes certain that the implementation remains true to the design

► All of the given options

Question No: 11 ( Marks: 1 ) – Please choose one

Using smart editors they can automatically color different parts of statements in

different colors e.g. HTML tags in ____________ color.

► Green

► Grey

► Blue

► None of the given options

Question No: 12 ( Marks: 1 ) – Please choose one

_______ is responsible for all the essential operations like basic house keeping, task

scheduling, etc. Also contains low-level HW interfaces

► Hardware

► Device Manager

► Kernel

► Device Driver

Question No: 13 ( Marks: 1 ) – Please choose one

Randomized algorithms are often ________ than deterministic algorithms for the same

problem.

► Simpler and more slow

► Simpler and more efficient

► Complex and more efficient

► Complex and more slow

Question No: 14 ( Marks: 1 ) – Please choose one

Compound Statement after decision constructs in JavaScript is enclosed with

► ( )

► [ ]

► { };

► { }

Question No: 15 ( Marks: 1 ) – Please choose one

The key property of the ‘Array’ object in JavaScript is

► Value

► Length

► Name

► All of the given choices

Question No: 16 ( Marks: 1 ) – Please choose one

Which protocol is used to send email ?

► FTP

► SMTP

► TELNET

► All of the given choices

Question No: 17 ( Marks: 1 ) – Please choose one

Following is highest level of heading tag in list given below.

► H3

► H4

► H5

► H2

Question No: 18 ( Marks: 1 ) – Please choose one

Blue Pacific is a name of ______ computer.

► Mini

► Desktop

► Micro

► Super

Question No: 19 ( Marks: 1 ) – Please choose one

__________ correctness is easier to check as compared with __________

► Syntactic, Semantic

► Semantically, Syntactically

► Systematically, Semantically

► None of the given options

Question No: 20 ( Marks: 1 ) – Please choose one

__________ refers maintaining the correctness and consistency of data

► Security

► Integrity

► Reliability

► None of the given

Question No: 21 ( Marks: 1 ) – Please choose one

Which of the following keyword is used to jump out of switch statement as soon as

the match is found?

► Default

► Else

► Jump

► Break

Question No: 22 ( Marks: 1 ) – Please choose one

How much parameters does POW () function have?

► 2

► 1

► 3

Question No: 23 ( Marks: 1 ) – Please choose one

How many types the string methods have?

► 1

► 2

► 3

Question No: 24 ( Marks: 1 ) – Please choose one

The output of document.write( “2” + Math.PI ) ; is__________.

► 23.141592653589793

► 3.146

► 2.3141592653589793

► None of them

Question No: 25 ( Marks: 1 ) – Please choose one

POP, IMAP and SMTP are related to one of the following service/services?

► Electronic Mail

► Instant Messaging

► Both a and b

► None of above

Question No: 26 ( Marks: 1 ) – Please choose one

_______ is designed for 2D-Animation .

► Flash Animation

► HTML image class

► Web Browser

► HTML 2D class

Question No: 27 ( Marks: 2 )

Define the term 3D Rendering

The process of converting information about 3-D objects into a bit-map that can be

Displayed on a 2-D computer display

Question No: 28 ( Marks: 2 )

What is an intelligent system?

An intelligent system is a dynamic system that utilises computational intelligence (CI) to

analyse interconnections between causes, drivers and effects, so as to model, predict and

control their dynamic interactions in a holistic manner

Question No: 29 ( Marks: 2 )

Define testing with respect to programming..

Question No: 30 ( Marks: 2 )

What is a compiler? Write its one benifit over interpreter.

Compiler translates the program written in a HLL in one go. The translated code is

then used by the uP whenever the program needs to be run

Interpreter translates the HLL program one statement at time. It reads a single

statement, translates it into machine language and passes that machine language code to

The uP and then translates the next statement, and so on

Question No: 31 ( Marks: 3 )

Who is a Computing Professional?

Professionals involved in the development and/or maintenance of SW and/or

computer HW

Computer scientists, software engineers, computer engineers, and some of the

telecom engineers are generally classified as computing professionals

Question No: 32 ( Marks: 3 )

What are Trojan Horses ?

Unlike viruses, they are stand-alone programs

The look like what they are not

They appear to be something interesting and harmless (e.g. a game) but when they

are executed, destruction results

Question No: 33 ( Marks: 3 )

What is ICMP?

Question No: 34 ( Marks: 5 )

What is ARPANET and who developed it?

Question No: 35 ( Marks: 5 )

Write down the advantages of Natural Language Processing.

Question No: 36 ( Marks: 5 )

Draw hierarchy of the people in the small project?

Question No: 28 ( Marks: 2 )

Why Local variable is preferred over Global variable ?

In my point of view Global variable has some advantage with Local variables is preferred

due to the following reasons:-

When we declare any global variable in web page then in case of error and logic it’s very

difficult to see on which line this variable is used and what’s his value if we have more

than 2000 lines and all the functions in web page using that Global Variable so Global

variables can make the logic of a Web page difficult to understand.

As we know we can use Global variable everywhere so Global variables also make the

reuse and maintenance of your code much more complex.

Question No: 29 ( Marks: 2 )

In JavaScript, what is event handling? What are the two types of events?

In java script we can capture events on do some operation on the basis of that particular

event. For example we want to load some data on web page then with the help of event

handling we can do this operation by using onLoad event.

We can put Event handlers in the body of web page and also in attributes of HTML.

From the attribute we can call any JavaScript function that will do his operation and

come back. Now we can also interact with server side with the help of AJAX in

JavaScript function.

In-Line Event Handling

We can place event handlers in the BODY part and also in HTML attributes the event

handlers attributes consist of 3 parts the event handler, equal sign and a string of

JavaScript statement enclosed in quotes (single or double). And one more thing these

should be put in one line without newline due to this sophisticated event handling is not

possible with in-line event handling.

Question No: 30 ( Marks: 2 )

What is Structured Vector Graphics ?

This is a plug-in that is required to view swf (flash) files in the web browser

Question No: 31 ( Marks: 3 )

What kind of new jobs are created because of computing? And which old professions are

being eliminated?

Due to computing where people are getting benefits from automated systems on the other

hand the people that are with KHATA system or Manual system and they don’t know

about computers are eliminated due to this reason and people take place of many people.

We can see in the offices where before computer if there are four person required now

only one person is required for example with the help of database we can store more than

thousand of information and only one person is managing the whole data that is DBA. In

the old system many people are writing the data in registers and then its also very

difficult to find the specific record.

Now we can see companies are hiring:-

Data Entry Operators

System Engineers

Software Developer

DBA etc.

Question No: 32 ( Marks: 3 )

What are Logic- or Time-Bombs ?

It execute the payload when predetermined event occurs

For example use type particular phrase and particular data is reached.

Question No: 33 ( Marks: 3 )

What do you mean by FTP or File Transfer Protocol?

This protocol is used to upload the files on remote computers. This is used to transfer

files between computer on TCP/IP network e.g. internet and now a day’s many software

are available for uploading files using FTP like Mozila FTP, cute FTP etc.

Question No: 34 ( Marks: 5 )

Why should we, as computing professionals, be interested in studying the social

implications of our creations?

If we see our life then we can judge computing technology is changing our life fast if we

compare with other technology.

We should highlight the mistakes and successes of the past. We should learn then and

select future direction accordingly. Computers are keep becoming more and more

powerful and gaining more autonomy.

Powerful Global Corporation.

The network Organization

Question No: 35 ( Marks: 5 )

How DoS attack is a cyber crime? For what cyber crime can be used?

DoS is the crime but of a new type. A new type for policing system is required to

tackle such crimes.

Cyber Crime can be used to Damage a home computer, Bring down the Business,

Weaken the financial and defense system of country.

Question No: 36 ( Marks: 5 )

What are the key characteristics of internet? Write the names of any five.

Question No: 27 ( Marks: 2 )

What is a function? Give one example.

Answer:

Function is a reusable code (group of statement) that is executed when the function is

called. It is also known as sub-program. Function is normally defined in the head section

of the code.

Question No: 28 ( Marks: 2 )

What is an intelligent system?

Answer:

Intelligent systems are the programs developed to perform complicated jobs that reflect

human brain and thoughts. If the algorithms are too much complex or can not be solved

instantly then we can use such systems. Therefore the well intelligent system not only

performs well but it has the capability to rectify any errors by himself if it occurs within

his domain.

The examples of intelligent systems are Robotics, Business Intelligence …etc.

Question No: 29 ( Marks: 2 )

What is meant by semantic error ?

Answer:

It is an error which a developer encounters when a statement is executed but it was not

intended by him (the developer). Such errors are very difficult to locate during testing.

Mostly these occur during abnormal circumstances. It may be referred as the logical

error.

Question No: 30 ( Marks: 2 )

What is best algorithm?

Answer:

Greedy algorithm is the best algorithm as it is n algorithm that always takes the best

immediate, or local solution while finding an answer.

Question No: 31 ( Marks: 3 )

How can we include images in a web page using HTML and Java script?

Answer:

Images can be included in HTML by employing <IMG> tag, below is the format of

<IMG>

<IMG src=URL, alt=text height=pixels width=pixels align=”bottom|middle|top”>

Question No: 32 ( Marks: 3 )

What are the Sub categories of Artificial Intelligence? Briefly explain any two.

Answer:

1. Robotics

These are the machines which are computer programmed and perform work which was

previously done by humans. They can be found in the manufacturing industry, the

military, space exploration and medical applications.

2. Expert Systems

These systems are designed to replace an expert. The medical expert system is an

example of such system which can replace a Doctor/medical expert.

Question No: 33 ( Marks: 3 )

What are the steps of working of TCP and IP protocols in internet transmission?

Answer:

TCP divide messages in to many packets (capsulation) and sent these messages over the

internet and IP route these messages on the internet to the correct destination and upon

reaching the messages on its destination the messages are encapsulated.

Question No: 34 ( Marks: 5 )

What is ARPANET and who developed it?

Answer:

ARPANET stands for Advanced Research Projects. The initial purpose was to

communicate with and share computer resources among mainly scientific users at the

connected institutions. In the beginning it was connected four universities and enabled

scientists to share resources.

It was headed by Dr. J.C.R. Licklider.

Question No: 35 ( Marks: 5 )

Define professional ethics and its benefits with an example?

Question No: 36 ( Marks: 5 )

Write JavaScript code for the following:

Make a function compareWithTen(value)

Compare the function argument with ‘10’ and display a message whether the value is less

than, equal to or greater than 10.

Final TERM EXAMINATION

Spring 2010

CS101- Introduction to Computing (Session – 2)

Note: MCQs in Blue are the sure answers and Yellow highlighted are Quarantined

Question No: 1 ( Marks: 1 ) – Please choose one

__________ breaks down the message to be sent over the internet into packets.

► FTP

► HTTP

► TCP (page.no.317)

► IP

Question No: 2 ( Marks: 1 ) – Please choose one

A protocol used for receiving email messages is called ____________.

► URL

► Telnet

► POP3 (page.no.213)

► SMTP

Question No: 3 ( Marks: 1 ) – Please choose one

Aliasing problem can be managed by ____________the size of pixels.

► Reducing (page.no.236)

► Increasing

► Gaining

► Modifying

Question No: 4 ( Marks: 1 ) – Please choose one

Variables allow us to manipulate data through the ___________.

► Actual Value

► Reference (page.no.143)

► Length

► Name

Question No: 5 ( Marks: 1 ) – Please choose one

The __________ reserved word allows a determined action to be taken if the first

condition is false.

► For

► While

► Else

► Switch

Question No: 6 ( Marks: 1 ) – Please choose one

ERP is a type of __________________ .

► Entertainment software

► Productivity software

► Business software

► Scientific software

Question No: 7 ( Marks: 1 ) – Please choose one

What is/are the use/uses of Word processor?

► To write a letter

► To write Research paper or report

► To create address labels

► All of the given

Question No: 8 ( Marks: 1 ) – Please choose one

Command that allows you to recover form mistakes is called __________.

► Clear

► Edit

► Undo

► Break

Question No: 9 ( Marks: 1 ) – Please choose one

Automatic machines performing various tasks that were previously done by humans, are

called ____________.

► Robotics (page.no.244)

► Computers

► Decision Making Systems

► Autonomous Web Agents

Question No: 10 ( Marks: 1 ) – Please choose one

The ______ is connected to all other modules of the microprocessor.

► Control unit

► Memory unit

► Floating Point unit

► Arithmetic and Logic unit

Question No: 11 ( Marks: 1 ) – Please choose one

Database consisting of two or more related tables, is called _____________.

► Flat file database

► Object oriented database

► Tabular storage database

► Relational database (page.no.263)

Question No: 12 ( Marks: 1 ) – Please choose one

_________ can be used for entering, editing, or viewing data, one record at a time.

► Queries

► Forms (page.no.263)

► Reports

► None of the given option

Question No: 13 ( Marks: 1 ) – Please choose one

Distance learning has got a boost due to the ___________.

► Easy communication

► Online interactive contents

► Flexibility

► All of the given options

Question No: 14 ( Marks: 1 ) – Please choose one

____________ DBMS supports data in terabytes.

► Personal

► Desktop

► Enterprise

► Single-user

Question No: 15 ( Marks: 1 ) – Please choose one

After the DoS attack in year 2000, Yahoo servers were recovered in __________.

► 1 hour

► 2 hours

► 3 hours

► 4 hours

Question No: 16 ( Marks: 1 ) – Please choose one

When web server is busy it gives the following message to the user :

► Time out

► Waiting

► Server busy

► None of the given options

Question No: 17 ( Marks: 1 ) – Please choose one

To stop industrial espionage, we use__________.

► Private network

► Encryption

► Network sniffer

► All of the given options (page.no.277)

Question No: 18 ( Marks: 1 ) – Please choose one

_______________ based communication allows business entities to coordinate the

activities of their globally spread units with greater accuracy.

► Intranet

► Internet

► Home

► LAN

Question No: 19 ( Marks: 1 ) – Please choose one

onAbort , onError are the _______________ of the image object.

► Event Handler (page.no.286)

► Properties

► Methods

► None of the given options

Question No: 20 ( Marks: 1 ) – Please choose one

Processed data is called ________.

► Information

► Data

► Entity

► Attribute

Question No: 21 ( Marks: 1 ) – Please choose one

______ is a client program that uses HTTP to make requests to Web servers throughout

the internet on behalf of the user.

► Web Application

► Web Browser (page.no.18)

► Internet Application

► HTML

Question No: 22 ( Marks: 1 ) – Please choose one

_______ consists of cells arranged in rows & columns

► Spreadsheets Software

► Word processor

► Presentation Software

► Microsoft Paint Software

Question No: 23 ( Marks: 1 ) – Please choose one

Flow control constructs in JavaScript includes:

► If-Else

► Loops and If -Else

► Switch and If-Else

► All of the given choices

Question No: 24 ( Marks: 1 ) – Please choose one

Which is NOT true for JavaScript variable name ?

► Student

► Roll_no_1111

► For

► _schedule

Question No: 25 ( Marks: 1 ) – Please choose one

In JavaScript, second element of an array has the index:

► 2

► 0

► 1

► 3

JavaScript Array Basics

5 May 2008 … In this tutorial you learn what a JavaScript array is, … The first

element hasan index of 0, the second element has an index of 1, …

www.elated.com/articles/javascript-array-basics/ – Cached – Similar –

Question No: 26 ( Marks: 1 ) – Please choose one

Which protocol is used to control other computer from our own computer ?

► FTP

► NNTP

► TELNET (page.no.211)

► None of the given choices

Question No: 27 ( Marks: 1 ) – Please choose one

______ occurs when a function calls itself.

► Recursion

► Call by value

► Call by reference

► Parsing

Recursion – Wikipedia, the free encyclopedia

The function calls itself recursively on a smaller version of the input (n – 1) and

multiplies the result of the recursive call by n, until reaching the …

en.wikipedia.org/wiki/Recursion – Cached – Similar –

Question No: 28 ( Marks: 1 ) – Please choose one

Which function returns a randomly selected floating point number between 0 and 1 ?

► floor(x)

► ceil(x)

► random()

► round(x)

Question No: 29 ( Marks: 1 ) – Please choose one

Using Java Script you can write a character at random location on screen

► By applying randomCh() method

► With the help of String object

► With the help of random character property

► There is no built in approach in Java Script

Question No: 30 ( Marks: 1 ) – Please choose one

The most used form tag is the <input> tag.

► True

► False

Question No: 31 ( Marks: 1 )

What are the elements of website design? Any one

Question No: 32 ( Marks: 1 )

What kind of information can be stored in a database ?

Question No: 33 ( Marks: 2 )

What is meant by universal access of internet services ?

Question No: 34 ( Marks: 2 )

What is the database?

Question No: 35 ( Marks: 3 )

The event handler attribute consists of three parts. Write about each of them.

Question No: 36 ( Marks: 3 )

What is difference between Design and System Architecture?

Question No: 37 ( Marks: 3 )

What are Trojan Horses ?

Question No: 38 ( Marks: 5 )

Differentiate between For and While loop by writing the syntax of both loops.

Question No: 39 ( Marks: 5 )

Suppose we have a big project. Draw hierarchy of the people involved in the project?

Question No: 40 ( Marks: 10 )

Write down output for the following JavaScript code.

a) <script type=”text/javascript”>

document.write(Math.sqrt(25)); // output ?

</script>

b) <script type=”text/javascript”>

document.write(Math.pow(5, 3)); // output ?

</script>

c) <script type=”text/javascript”>

document.write(Math.min(5, 3)); // output ?

</script>

d) <script type=”text/javascript”>

document.write(Math.max(5, 3)); // output ?

</script>

e) <script type=”text/javascript”>

document.write(Math.floor(9.87)); // output ?

</script>

Question No: 41 ( Marks: 10 )

Is tabular data storage better than flat file data storage? Justify your answer.

FINALTERM EXAMINATION

Fall 2010

CS101- Introduction to Computing (Session – 2)

ExamDate: 2/25/2010 12:00:00 AM

Question No: 1 ( Marks: 1 ) – Please choose one

The memory size of the Altair 8800 was

► 128 bytes

► 128 Kilo bytes

► 256 Kilo bytes

256 bytes

Question No: 2 ( Marks: 1 ) – Please choose one

A named collection of properties (data, state) and methods (instruction, behavior) is

called ____________.

► Array

► Function

► Variable

Object

Question No: 3 ( Marks: 1 ) – Please choose one

JavaScript Variables are ____________.

Dynamically Typed

► Statically Typed

► Strong Typed

► None of the given options

Question No: 4 ( Marks: 1 ) – Please choose one

Serial arrangement in which things follow logical order or a recurrent pattern, such as

statements executing one by one, is called __________.

► Loop

► Sequence

► Condition

Array

Question No: 5 ( Marks: 1 ) – Please choose one

Rule of thumb learned through trial and error is called ___________.

► Design

Heuristic

► Plan

► Aim

Question No: 6 ( Marks: 1 ) – Please choose one

According to heuristic, if you can’t explain it in ____________ minutes, either you don’t

understand it or it does not work.

► 10

► 2

5

► 4

Question No: 7 ( Marks: 1 ) – Please choose one

To store rounded number of 8.6 in a variable called “r_number”, we write

_____________.

► r_numbers=Maths.rounds(8.6)

► r_number=Math.rounds(8.6)

r_number=Math.round(8.6)

► r_number=Maths.round(8.6)

Question No: 8 ( Marks: 1 ) – Please choose one

Using only HTML we can create

► Dynamic web pages

Static web pages

► Both Static and Dynamic pages

► None of these

Question No: 9 ( Marks: 1 ) – Please choose one

__________ function returns the largest integer that is less than or equal to x.

round(x)

► floor

► ceil

► abs(x)

Question No: 10 ( Marks: 1 ) – Please choose one

Due to working at home, contact with the colleagues is __________, which may result in

__________ quality of work

► Reduced, Poorer

► Reduced, Better

► Increased, Poorer

Increased, Better

Question No: 11 ( Marks: 1 ) – Please choose one

The distance among families is ___________ because of spending more time on internet.

Increased

► Expanded

► Contracted

► Decreased

Question No: 12 ( Marks: 1 ) – Please choose one

When web server is busy it gives the following message to the user :

► Time out

► Waiting

Server busy

► None of the given options

Question No: 13 ( Marks: 1 ) – Please choose one

____________ is designed for detecting viruses and inoculating.

Antivirus

► Utility

► Trojan

► None of the given choices

Question No: 14 ( Marks: 1 ) – Please choose one

The ____________ is becoming the preferred organizational structure for more and more

organizations with the passage of time.

► Tree structured organizational model

Network paradigm

► Hierarchical structure

► None of the given options

Question No: 15 ( Marks: 1 ) – Please choose one

Planning and tracking of the project is the responsibility of the___________.

Project Manager

► Architect

► Developer

► Chief Executive Officer

Question No: 16 ( Marks: 1 ) – Please choose one

The responsibilities of the Team Lead includes_____________.

Planning and tracking of the project

► Detailed design

► Professional development of team members

► All of the given options

Question No: 17 ( Marks: 1 ) – Please choose one

_____________ team is responsible for a project after the specification’s stage till the

very end.

► Executive

► Architect

Development

► HR

Question No: 18 ( Marks: 1 ) – Please choose one

There are _________ types of errors.

► 2

3

► 4

► 5

Question No: 19 ( Marks: 1 ) – Please choose one

________ are the computers that perform at or near the currently highest operational rate

for computers.

► Minicomputers

► Microcomputers

Supercomputers

► Personal Computers

Question No: 20 ( Marks: 1 ) – Please choose one

Which one of these is NOT an example of storage devices?

► Tape

RAM

► Floppy

► DVD

Question No: 21 ( Marks: 1 ) – Please choose one

Forms can be submitted by using __________ different methods

2

► 3

► 4

► 5

Question No: 22 ( Marks: 1 ) – Please choose one

Which is NOT true for JavaScript variable name ?

► Student

► Roll_no_1111

► For

_schedule

Question No: 23 ( Marks: 1 ) – Please choose one

One can browse documents residing on a remote computer using ________ protocol.

HTTP

► SMTP

► FTP

► TELNET

Question No: 24 ( Marks: 1 ) – Please choose one

Which one is the example of spreadsheet software ?

► MS Word

► MS PowerPoint

MS Excel

► MS Access

Question No: 25 ( Marks: 1 ) – Please choose one

User can remotely log on to a computer and can have a control over it like a local user

using

► TelNet Protocol

TelNet Protocol and connected to the user through TCP/IP network

► TelNet protocol and FTP

► TCP/IP and FTP

Question No: 26 ( Marks: 1 ) – Please choose one

Hardware malfunctions is related to

► Data updates

► Data integrity

► Data security

Data accessibility

Question No: 27 ( Marks: 1 ) – Please choose one

PowerBuilder falls in the category of ______________.

► Assembly Languages

► 4-th Generation Languages

► Machine Languages

High-Level Languages

Question No: 28 ( Marks: 1 ) – Please choose one

Backbone is also called as ________.

vBNS

► BNS

► vHBNS

► HBNS

Question No: 29 ( Marks: 1 ) – Please choose one

Global variables can make the logic of a web page.

Difficult to understand

► Easier to understand and maintain

► Difficult to reuse and maintain

► Difficult to understand, reuse and maintain

Question No: 30 ( Marks: 1 ) – Please choose one

In JavaScript: In order to display the text on browser Grade A, which of following

statement is True.

► documentwrite( “Grade A”)

document.write( “Grade A”);

► document.write( “Grade” && A”);

► document.write( “Grade” && “A”);

Question No: 31 ( Marks: 1 )

What is bandwidth?

Bandwidth is a capacity of communication channel of carrying data.

Question No: 32 ( Marks: 1 )

What is “My Personal Agent”?

A computer programe that work automatically and have voice interface

Question No: 33 ( Marks: 2 )

For what purposes FTP is used in networks ?

To download or upload files / data to a remote computer

Question No: 34 ( Marks: 2 )

How can you define a readable program?

A program that is easy to read & understand also easy to maintain and enhance.

Question No: 35 ( Marks: 3 )

What is the preferred organizational structure for the organization?

The Network Organization: It is becoming the preferred organizational structure.

Question No: 36 ( Marks: 3 )

How can you define a consistent web design? Why is it needed?

A consistent web design is Easy understandable, not with heavy graphics, easy

navigation. It is needed because most of the website views leave the site because of poor

navigation and not easy to understand, text and design is not clear etc.

Question No: 37 ( Marks: 3 )

Elaborate Vector or Object oriented graphics with atleast one example.

Vector treats everything that is drawn as object, they are resolution in dependent and

relatively small file size. For example swg, svg, wmf.

Question No: 38 ( Marks: 5 )

What are the advantages of multimedia presentations? Write any five.

Multimedia presentation is a great tool for effective communication:

Advantages:

1. Easy to make last minute change

2. More attractive

3. Can include animation, videos etc.

4. Better presentation easy to understandable for participants comparing to manual

presentation.

5. Undo feature

Question No: 39 ( Marks: 5 )

Can a human doctor be replaced by an Expert System? Give reasons to support your

answer.

Expert System is a computer system which simulates the knowledge and expertise of a

human expert. Yes, a human doctor can be replaced by an Expert System. Following are

the reasons to support my answer:

1. A large database of knowledge can be added to and kept up to date, it can store

more knowledge than a person.

2. The Expert System cannot FORGET or get facts wrong.

3. It survives forever. There is no loss of knowledge as there is when a doctor

retires.

4. The Expert System can access specialist knowledge that a doctor may not have.

Question No: 40 ( Marks: 10 )

Explain the following issues of Data Management? (3+4+3)

1. Data entry

2. Data updates

3. Data security

DATA ENTRY:

There is new data entered every day.

New customers are added every day.

Some of the data entry requires the manual entry into computer system

New data entry needs to be entered correctly

DATA UPDATES:

Old titles must be removed regularly

Data changes every time

Prices change

Transportation / shipping cost changes

Customer personal data changes

Schemes changing, new offers

Every new entry needs to be entered correctly

DATA SECURITY:

All data in the system is very critical to its operation, the security of the customer’s

personal data is most important. Most of the hackers are always trying for that type of

information specially Credit Card Numbers.

This problem can be managed by using proper security arrangements and mechanisms

that provides access to only authorized entities. System Security can be improved

through, encryption, firewalls and updated Antivirus Softwares

Question No: 41 ( Marks: 10 )

Write a note on the followings

a. Image Preloading process

b. Animated Gifs

IMAGE PRELOADING PROCESS:

The primary use of image preloading process is to download the image into the cache

before it is actually needed to display.

PROCESS:

1. An example of the image object is shaped using the NEW keyword

2. The src property of this instance is set equal to the filename of the image to be

pre-loaded

3. This step starts the down-loading of the image into the cache without actually

displaying

4. When a pre-loaded image is required to be displayed, the src property of the

displayed image is set to the src property of pre fetched image

ANIMATE GIFS:

We can save 16 gif images of the previous example in a single file in the form of an

animated gif, and then used it in a regular <IMG> tag to display a moving image.

However, JavaScript provide better control over the sequencing and the gap between the

individual images.

VU CS101- Introduction To Computing FINALTERM Solved Unsolved Past Papers Spring 2010

VU CS001- Computer Proficiency License FINALTERM solved unsolved past papers Spring 2010

VU CS001- Computer Proficiency License FINALTERM Solved Unsolved Past Papers Spring 2010

FINALTERM EXAMINATION

Spring 2010

CS001- VU-Computer Proficiency License

 

Question No: 1 (Marks: 1) – Please choose one

There are three types of data found in a spreadsheet.

Data, words, numbers

Equations, data, numbers

words, numbers, labels

ünumbers, formulas, labels

 

Question No: 2 (Marks: 1) – Please choose one

A constant is another name for this type of data:

ünumber

Equation

Formula

Description

 

Question No: 3 (Marks: 1) – Please choose one

Which is an absolute address?

ü$C$4

10700 – 105 Ave

C4

None of these

 

Question No: 4 (Marks: 1) – Please choose one

What program do you use to create a spreadsheet?

Word

üExcel

Access

PowerPoint

 

Question No: 5 (Marks: 1) – Please choose one

Which button on the standard toolbar gives you quick access to the Sum, Average, Count, Min, and Max functions?

ü AutoSum

Insert Function

AutoFill

Paste

 

Question No: 6 (Marks: 1) – Please choose one

What do you use to create a chart?

ü Chart Wizard

Pie Wizard

Excel Wizard

Data Wizard

 

Question No: 7 (Marks: 1) – Please choose one

Which type of chart shows the pattern or relationships between sets of data points?

Line

ü Pie

Area

XY (Scatter)

 

Question No: 8 (Marks: 1) – Please choose one

On an Excel sheet the active cell is indicated by ____.

A dark wide border

A dotted border

A blinking border

üAll of these

 

Question No: 9 (Marks: 1) – Please choose one

A user wishes to remove a spreadsheet from a workbook. Which is the correct sequence of events that will do this?

Go to FILE – SAVE AS – SAVE AS TYPE – Excel 4.0 Work Sheet

üRight click on the spreadsheet tab and select DELETE

Right click on the spreadsheet and select INSERT – ENTIRE COLUMN

None of these

 

Question No: 10 (Marks: 1) – Please choose one

The World Wide Web (WWW) is…

üa part of the Internet

The internet

Not a part of the Internet

All of these

 

Question No: 11 (Marks: 1) – Please choose one

Uniform Resource Locator (URL) is

The same as Search Engines

üthe addresses of specific documents and resources on the WWW

Never more than 11 characters long

All of these

 

Question No: 12 (Marks: 1) – Please choose one

The ____ standard defines how data transmits across telephone lines or other means.

TCP/IP

EDI (Electronic Data Interchange)

Electronic funds transfer (EFT)

üEthernet

 

Question No: 13 (Marks: 1) – Please choose one

A(n) ____ line typically costs $1,000 or more per month.

ISDN

T3

ATM

üT1

 

Question No: 14 (Marks: 1) – Please choose one

A ____ is a Web site that uses encryption techniques to secure its data.

üdigital certificate

secure HTTP (S-HTTP)

Wallet program

Secure site

 

Question No: 15 (Marks: 1) – Please choose one

The process of converting readable data into unreadable characters to prevent unauthorized use is called ____

Normalization

Decryption

Validation

üencryption

 

Question No: 16 (Marks: 1) – Please choose one

_______repeats the last command or actions, if possible in excel.

F1

F2

F3

üF4

 

Question No: 17 (Marks: 1) – Please choose one

Which of the following is primary storage?

Hard disk

Floppy disk

ü RAM

Optical disk

 

Question No: 18 (Marks: 1) – Please choose one

The device used to store data is called

Input device

Out put device

None of these

üStorage device

 

Question No: 19 (Marks: 1) – Please choose one

Which of the following is intangible?

ü Software

Hard disk

Optical disk

Computer Mouse

 

Question No: 20 (Marks: 1) – Please choose one

Tab key is a

Non-typing key

ü Typing key

Toggle key

Application key

 

Question No: 21 (Marks: 1) – Please choose one

What is the keyboard shortcut (button or buttons to be pressed) for creating a Chart from the selected cells?

F3

F4

üF5

F6

 

Question No: 22 (Marks: 1) – Please choose one

In Word which of the following shortcut key combination, Inserts link

Ctrl + P

Ctrl + F

Ctrl + I

üCtrl + K

 

Question No: 23 (Marks: 1) – Please choose one

In Word which of the following shortcut key combination, decreases selected font -1pts if 12pt or lower, if above 12 decreases font by +2pt.

üCtrl + Shift + <

► Ctrl + Shift + >

► Ctrl +]

► Ctrl + [

 

Question No: 24 (Marks: 1) – Please choose one

Which will select all the cells in a document?

Clicking three times with the right mouse button in the spreadsheet

Using the Edit – Select All menu item

üPressing CTRL + A on the keyboard

None of these

 

Question No: 25 (Marks: 1) – Please choose one

___________ will insert a new worksheet.

üALT+SHIFT+F1

ALT+SHIFT+F2

ALT+SHIFT+F3

None of these

 

Question No: 26 (Marks: 1) – Please choose one

E-mail stands for

üelectronic mail

The print out from a fax machine

a letter printed from a computer

All of these

 

Question No: 27 (Marks: 2)

What is the difference between closing and exiting?

Solution:

Closing removes the particular part of the program if it is used on the main screen or window. On the other hand, exit means to close the files and applications.

 

Question No: 28 (Marks: 2)

How we can print more than one slide per page in PowerPoint?

 

Question No: 29 (Marks: 2)

How we can Bookmark a Web page?

Solution:

To Bookmark a Web page in internet explorer select the “Bookmarks” options and clicking “Save” in the drop down menu. Save, edit or add a bookmark to a web browser to find a site quickly on the Internet. It is located in the location bar of the internet explorer.

 

Question No: 30 (Marks: 2)

Define standard and status bars.

Solution:

Standard Bar:

A standard bar contains icons for functions such as file management, printing, editing, formatting and calculating. It is located just below the menu bar in an application window.

Status Bar:

A horizontal line of information displayed at the bottom of an application window. It reports information about the current status of the program or the data contents in the window.

 

Question No: 31 (Marks: 3)

Here is the data for the sales of Apples for year 2007, using excel apply the formula to calculate the Harmonic Mean of sales using HARMEAN function

(Statistics Category) and give the result in the answer area,

Peaches
January
February
March
April
May
June
July
August
September
October
November
December

 

Question No: 32 (Marks: 3)

Describe the function of the following short cut keys in PowerPoint:

Description Column B
To redo an action that has just been undone CTRL+Y
It creates a new presentation window CTRL+N
This is to open a search browser to open a saved file in the computer CTRL+O

 

Question No: 33 (Marks: 3)

How we can change the Web browser Home Page/Start page?

 

Question No: 34 (Marks: 5)

a. What is electronic mailing? Give its basic concept and usage.

Electronic mail, also written as E-mail, is an electronic transmission of messages, letters and documents. It includes point to point services in which text file, that is, sent or received can be edited. The basic concept of E-mail is to send and receive messages as quickly as possible with the addition of sounds, graphics, links and etc, which can never be possible through the old postage system as that took long and also has to go through countries borders.

E-mail typically is used for conversations that are not urgent and for dialogues that are expected to continue over a period of time. The structure of e-mail eliminates interruptions associated with telephone conversations or electronic pagers. It also permits asynchronous communication, which can benefit both the sender and the recipient in our busy society.

b. What are Computer Viruses?

Solution:

A computer virus is a computer program that can copy itself and infect a computer. The term “virus” is also commonly but mistakenly used to refer to other types of malware, including but not limited to ad ware and spy ware programs that do not have the reproductive ability. Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.

Example: Trojan horses.

 

Question No: 35 (Marks: 5)

What is slide layout? Is there any way to change the default layout of the slide? If yes, then explain in your own words.

Solution:

The slide layout in PowerPoint is the arrangement of all the items that make up your slide, such as title, graphics or text boxes. Yes we can change the default layout.

To modify the layout, first you will need to go into the view tab and then click on the slide master button. Then click on the first slide, and changes that you make to this slide will be used by the other layout slides shown below the slide master. Use all of the tools on the tab to set the dimensions, theme and background styles for your slides.

When you have finished this, click in the title text box and use the tools in the drawing tools format tab and the home tab in order to modify the style of your text. Next click on the contents text box and change the styles for the different levels of text.

 

Question No: 36 (Marks: 5)

How we can modify column widths and row heights?

Solution:

By placing the mouse on the edge of the grid of the column or row, the pointer will change its shape and drag the pointer then to adjust its width.

 

VU CS001- Computer Proficiency License FINALTERM Solved Unsolved Past Papers Spring 2010

Education In Pakistan © 2016