Question No: 19
|
(
Marks: 1 )
|
-
Please choose one
|
If an algorithm is syntactically correct, but
semantically incorrect then this situation is
► Very good situation
► Very dangerous situation
► Not very bad
► Neutral situation
Question
No: 20 ( Marks: 1 ) - Please choose one
Users
communicate with the computer using a consistent user interface provided by the
OS.
► True
|
►
False
|
|
|
Question
No: 21
|
(
Marks: 1 )
|
- Please choose one
|
|
Application developers do
not need to know much about the HW, especially the microProcessor, while they
are developing their application.
► True
|
► False
|
|
|
|
|
|
Question
No: 22
|
(
Marks: 1 )
|
-
Please choose one
|
|
|||
The
first spread sheet program was invented by
|
|
|||||
►
Charles Babbage
|
►
Dan Bricklin
|
►
Paul Graham
|
► John von Neumann
|
|||
Question
No: 23
|
(
Marks: 1 )
|
-
Please choose one
|
|
|||
Which representation technique of algorithm is more
suitable for developer to make actual code___________.
► pseudo code ►
flow chart ► both pseudo code and flow
chart ► Heuristics
Question No: 24
|
(
Marks: 1 )
|
-
Please choose one
|
||
_____________
is used to terminate all JavaScript statements.
|
||||
► Colon
|
► Semicolon
|
► Underscore
|
► Apostrophe
|
|
Question No: 25
|
( Marks: 1 )
|
|
-
Please choose one
|
|
In java
script cookies can be created for future use_____.
► Easily
► No facility at all
► This is not possible without Java
language.
► Cookies are files so java
script can not handle it.
Question
No: 26 ( Marks: 1 ) - Please choose one
When the microprocessor desires to look at a
piece of data, it checks in the __________
first. ► RAM ► ROM ► hard
disk ► cache
Question No: 1
( Marks: 1 ) - Please choose one
Using Java Script you can write a character at
random location on screen
► By
applying randomCh() method
► With
the help of String object
► With
the help of random character property
► There
is no built in approach in Java Script
Question No: 2
|
( Marks: 1 )
|
- Please choose one
|
|
||||||
If incorrectly we enter the negative age it is check
by
|
|
||||||||
► Limit Integrity
|
► Type Integrity ► Referential Integrity ►
Physical Integrity
|
||||||||
Question No: 3
|
( Marks: 1 )
|
- Please choose one
|
|
||||||
The Encryption of data is related to
|
|
|
|
|
|
||||
► Data updates
|
|
► Data security
|
► Data integrity
|
► Data
accessibility
|
|||||
Question No: 4
|
( Marks: 1 )
|
- Please choose one
|
|
||||||
Which
protocol is use to transfer a file over the network ?
|
|
||||||||
► UDP
|
►
FTP
|
► TCP
|
► OSI
|
|
|||||
Question No: 5
|
( Marks: 1 )
|
- Please choose one
|
|
||||||
One
can send an email message to a remote computer using _______ protocol
|
|||||||||
► HTTP
|
► SMTP
|
► FTP
|
► TELNET
|
|
|||||
Question No: 6
|
( Marks: 1 )
|
- Please choose one
|
|
||||||
In a System having
many parts to be designed, one should always do the _____ first
|
|||||||||
► Hard part
|
► Simple part
|
► Development part
|
► Quality part
|
||||||
Question No: 7
|
( Marks: 1 )
|
- Please choose one
|
|
||||||
Flow
control constructs in JavaScript includes:
|
|
||||||||
► If-Else ►
Loops and If -Else ► Switch and If-Else ► All of the given choices
|
|||||||||
Question No: 8
|
( Marks: 1 )
|
- Please choose one
|
|
|
|
||||
___ provides a simple,
consistent way for applications to interact with the HW without having to know
all the details of the HW
► Explorer.exe ► System
Files
|
► Operating System
|
Application Software
|
||||
Question No: 9
|
( Marks: 1 )
|
- Please choose one
|
|
|
||
Machine language is also called
|
|
|
|
|
||
► Assembly Language ► Binary Language ► High Level Language ► HTML Language
|
||||||
Question No: 10
|
( Marks: 1 )
|
- Please choose one
|
|
|
||
_________
is the best known builder for supercomputers.
|
|
|||||
► Sun
|
► Cray Research
|
► Microsoft
|
► Apple
|
No comments:
Post a Comment