Today paper of CS101.The question which i have remebered? Total 52 questions.
Mcq's=40 each mcq carry 1mark.
Short questions= 2 and 3marks
Long question=5marks each
Q:Diffrentiate b/w TCP/IP in terms os sending and receiving e-mails?
Q: Write six string examples of HTML wrapped?
Q:Professionals or organizations are using ethical behaviour but some professionals or organizations are not.Give two examples of unethical behavior of pfrofessional or organizationals?
Q:Why custom based is too expensive then public based?this is not the complete question but this i have remembered/.
Q:There are malicious virus which are harmfull for games.Tell the names of tehse viruses and discuss how they harmful?not completequestion.
and there are some questions from HTML and javascript.There were a table and we have to write the HTML code.
Another paper..............
Q:Diffrentiate b/w TCP/IP in terms os sending and receiving e-mails?
TCP break down the message into packets and IP routs these packetes thorugh internet to the recieving destination and then the TCP of recieving message computer again convert it into computer readable form.
Q: Write six string examples of HTML wrapped?
big()
small()
fontsize(n)
sub()
sup()
bold(), italics(), strike()
link(URL)
Q:Professionals or organizations are using ethical behaviour but some professionals or organizations are not.Give two examples of unethical behavior of professional or organizationals?
Illegal use.
Trade secrets.
Page 301.
Q:Why custom based is too expensive then public based?this is not the complete question but this i have remembered/.
I thnk costom based software is too expensive because its develope for a person or company or shop. the software is designed acording to all requirements of that company or shop.
Q:There are malicious virus which are harmfull for games.Tell the names of tehse viruses and discuss how they harmful?not completequestion.
Another paper...................
Today Final Term Paper Fall 2012
On 21 Feb 2013
Total Questions: 52
Total Marks: 80
Total MCQs: 40 (Each of 1 Mark)
Total Short Questions: 4 (Each of 2 Mark)
Total Short Questions: 4 (Each of 3 Mark)
Total Long Questions: 4 (Each of 5 Mark)
1. Discuss main reasons for hiring temporary professionals by computer organizations instead of permanent workers. (5)
2. HTML code for List. (5)
3. Discuss the function arguments with java script code example. (5)
4. Write javascript code "compare with (value)" which compare value 10 and display alert. (5)
5. Suggest any 5 security measures organization can ensure the security of data.
6. Suppose as a tester you asked to test a webpage designed by "user login". Write any three test case you implement to test the webpage. (3)
7. Write any three problems a user face in odd modes of presentation. (3)
8. Ordered list HTML code. (3)
9. How many exit and entry points are there in conditional statement. (2)
10. Which protocol enables a user to login to a computer remotely. (2)
Another paper....................
Today's solved subjective paper....
q1 2 marks
is it possible to run an application in the private memory space of another application?
Ans:
No, Application can neither run into the private memory space of another app, nor be run into by another application .Different types of memory (e.g. main, cache) in the system must be used properly, so that each app can run most effectively .
q2 marks 2
if we categorize the networks in termos of the distance they cover, then what will be the types of network? just write the names
Ans:
LAN: local area network
WAN: wide area network
MAN: metropolitan area network
q3 maris 2
how animation of images is easy through javascript?
Ans:
Images in JavaScript can be manipulated in many ways using the built-in object,
Image.Properties: name, border, complete, height, width, hspace, vspace, lowsrc, src
• Methods: None
• Event handlers: onAbort, onError, onLoad, etc.
These all easy statements and command helps in javascript to animate any image .
q4 marks 2
each of javascript method has different functionality. Discuss the functionality of tostring() method.
Ans:
The 'toString' Method assigns Explicit conversion to a string
EXAMPLE:
Convert 100.553478 into a currency format
a = 100.553478 ;
b = a.toString( ) ;
decimalPos = b.indexOf( ".", 0 ) ;
c = b.substring( 0, decimalPos + 3 ) ;
document.write( c ) ;
q5 marks 3
how can we reduce the heat effect for processor?
Ans:
A component designed to lower the temperature of an electronic device by dissipating heat into the surrounding air. All modern CPUs require a heat sink. Some also require a fan. A heat sink without a fan is called a passive heat sink; a heat sink with a fan is called an active heat sink.
q6 marks 3
suppose A& B are two java script based programs intending to solve the same problem. List any three differences between the program A and the program B assuming that only the program A is coded using the "Function" approach.
q 7 marks 3
Artificial intelligence is a wide field which can be further categorized into sub categories. you are required to briefly discribe its any three sub-categories.
Ans
a)Neural networks: original inspiration was human brainemphasis now
usefulness as a computational tool
1) Genetic Algorithms : based on darwins evolutionary principle
GA requires the ability to recognize a good solution but not howto get to that
solution
2) rulebased systems
b) the right techniques
Examples:
In medical: Artificial intelligence, Expert System for Chest Pain Diagnosis.
In industry: Artificial intelligence ,Expert System for Automobile Troubleshooting
In space: Artificial intelligence, tele-robots.
q 8 marks 3
A program is reviewed for finding and removing errors before it is handed over to its clients. Discuss the two main approaches of finding and removing errors from a program.
Ans:
A program is reviewed for finding and removing errors before it is handed over to its clients. the two main approaches of finding and removing errors from a program are as follows,
Testing: The tasks performed to determine the existence of defects
Debugging: The tasks performed to detect the exact location of defects
q 9 mars 5
explain how does the process of instant messaging from one computer to another cmputer take place?
Ans:
User launches the IM client
IM client finds the IM server & logs in
It sends communication info (IP address, etc) to the IM server
IM server finds user's contacts & sends him/her the communication info
for the ones online
IM server also tells the contacts that the user is online; sends his/her
communication info to them
Now the user's & the contact's IM clients are ready to communicate
directly (P2P)
Once the IM server provides the communication info to the user and his/her contact's IM client, the two are able to communicate with each other without the IM server's Assistance.
q 10 marks 5
the appropriateness of a technique of technology can be determined by considering some aspects related to that technique of technology . enlist any five aspects which may be considered while selecting an AI technique.
Ans:
if 2 techniques produce solutions of a similar quality, matching the right technique
to a problem can save on time & resources
Characteristics of an optimal technique:
The solution contains all of the required information
The solution meets all other necessary criteria
The solution uses all of the available (useful) knowledge
How do we determine the suitability of a particular AI technique for a given task. We
look at the task's requirements and then see which technique fulfils those requirements
more completely – the one which does, is the one we use!
q 11 5 marks
write HTML code for the following output
I have a bike :
i have a car:
i have an airplane:
Ans:
<HTML>
<HEAD>
<TITLE> cs101 final exam</TITLE>
</HEAD>
<BODY>
<UL>
<LI> I have a bike:</LI>
<LI> i have a car:</LI>
<LI> i have an airplane:</LI>
</UL>
</BODY>
</HTML>
q 12 marks 5
how marketing strategies are being changed with the progress in the field of computer and also describe how new marketing strategies are being implemented.
Making and using a marketing strategyhas a strong positive impact on profitability. The Web has changed marketing forever, redirecting it from a mass focus to a
single-person focus.one of the best sating about bussines is "Want more Business – Knock on more Doors".and for this purpose net provide us the best solutions. The vast quantity of online information and resources should always be utilized intelligently; One of the few exceptions to this premise is when someone discovers a great "Low Cost" product or service, and is able to market it efficiently and effectively using the internet.
Some effective marketing strategies are:
Perfect Website Title
Search engine optimization.
Business Directory Management
TV COMMERCIALS OR RADIO ADVERTISING
Another paper...................
total 52 questions;
40 mcq's
1- define animated GIF images? 2 marks
2-what will be the title of web page in given code? 2 marks
3-which DBMS technique presenets data in a user friendly way? 2 marks
4-why programmers dont use global variabels? 2 marks
5- how can we say that intranet is a smaller version of internet? 3 marks
6-mention three responsibities of project meneger? 3 marks
7-mention three sub categories of AI ? 3 marks
8-explain aspects of web desighn which play an important role in providing the relevent stuff from a web site in min time? 3 marks
9-give an example to create a cell space of 10 pixels b/w each cell of an HTML tabel. explain the example 5 marks
10-write down 4 properties, one method and two event handler of java script's built in image object. 5 marks
11-java script function can be used as an argument. write a java script code example for the function argument and discuss the function argument in example code? 5 marks
12-there are some popular computer programms which behave like a virus . mention the name of any two of them with their working? 5 marks
--
Regards
Ghazala Jabbar
MBA (HR)
-
You received this message because you are subscribed to the Google Groups "Pak Youth" group.
To post to this group, send email to pak-youth@googlegroups.com.
To unsubscribe from this group, send email to pak-youth+unsubscribe@googlegroups.com.
For more options, visit this group at http://groups.google.com/group/pak-youth?hl=en.
---
You received this message because you are subscribed to the Google Groups "Pak Youth" group.
To unsubscribe from this group and stop receiving emails from it, send an email to pak-youth+unsubscribe@googlegroups.com.
To post to this group, send email to pak-youth@googlegroups.com.
Visit this group at http://groups.google.com/group/pak-youth?hl=en.
For more options, visit https://groups.google.com/groups/opt_out.
No comments:
Post a Comment