Question # 1 of 10 ( Start time: 10:33:47 AM ) Total Marks: 1
The E-mail client sends message to:
Select correct option:
e-mail client
SMTP server
The eMail client sends it to the SMTP server
PAGE 213
POP3 server
All of the given choices
Question # 2 of 10 ( Start time: 10:34:15 AM ) Total Marks: 1
Which of the following keyword is used to jump out of switch statement as soon as a match is found?
Select correct option:
default
else
And then apply that solution
If the solution woks as desired, fine; else we go back to step 2
jump
break
Question # 3 of 10 ( Start time: 10:35:10 AM ) Total Marks: 1
A ***** of information is called __________________
Select correct option:
File
Database
Record
Each ***** of info – called a record - in that file was separated by a special character;
vertical bar ‘|’ was a popular option
Field
Question # 4 of 10 ( Start time: 10:35:34 AM ) Total Marks: 1
Events can be captured in the HTML code, and then directed to a JavaScript __________for an appropriate response
Select correct option:
BODY TAG
HANDLER
FUNCTION
Alternatively, events can be captured in the HTML code, and then directed to a
JavaScript function for an appropriate response
"function"
EVENT
Question # 5 of 10 ( Start time: 10:36:30 AM ) Total Marks: 1
_____________ is the part of the virus that generally consists of malicious computer instructions
Select correct option:
Off load
Payload
Ref
Payload
• The part of the virus that generally consists of malicious computer instructions
Loader
Transmitter
Question # 6 of 10 ( Start time: 10:37:04 AM ) Total Marks: 1
Because of web, people are shifting from mass marketing to _________________
Select correct option:
Direct marketing
Personal marketing
The Web has changed marketing forever, redirecting it from a mass focus to a
single-person focus
Internet marketing
All of the given
Question # 7 of 10 ( Start time: 10:37:42 AM ) Total Marks: 1
FTP was introduced in:
Select correct option:
1972
1973
1973 - FTP (File Transfer Protocol) is introduced, standardizing the transfer of files
between networked computers
1974
1976
Question # 8 of 10 ( Start time: 10:38:04 AM ) Total Marks: 1
_____________ loop is a flow control statement that allows code to be executed repeatedly based on a given Boolean condition.
Select correct option:
For
Do-While
If-else
JavaScript Flow Control Structures
• if … else
• switch
While
Question # 9 of 10 ( Start time: 10:38:39 AM ) Total Marks: 1
_______________ is a system that guards a private network.
Select correct option:
Protocol
Firewall
Firewall
A system that that guards a private network, enforcing an access/deny policy to all traffic
going to and coming from the Internet
Communication channel
None of the given choices
Question # 10 of 10 ( Start time: 10:39:13 AM ) Total Marks: 1
The ____________ virus may destroy or broadcast private data.
Select correct option:
Malicious
Malicious
– The type that grabs most headlines
– May destroy or broadcast private data
Neutral
Helpful
DoS
The E-mail client sends message to:
Select correct option:
e-mail client
SMTP server
The eMail client sends it to the SMTP server
PAGE 213
POP3 server
All of the given choices
Question # 2 of 10 ( Start time: 10:34:15 AM ) Total Marks: 1
Which of the following keyword is used to jump out of switch statement as soon as a match is found?
Select correct option:
default
else
And then apply that solution
If the solution woks as desired, fine; else we go back to step 2
jump
break
Question # 3 of 10 ( Start time: 10:35:10 AM ) Total Marks: 1
A ***** of information is called __________________
Select correct option:
File
Database
Record
Each ***** of info – called a record - in that file was separated by a special character;
vertical bar ‘|’ was a popular option
Field
Question # 4 of 10 ( Start time: 10:35:34 AM ) Total Marks: 1
Events can be captured in the HTML code, and then directed to a JavaScript __________for an appropriate response
Select correct option:
BODY TAG
HANDLER
FUNCTION
Alternatively, events can be captured in the HTML code, and then directed to a
JavaScript function for an appropriate response
"function"
EVENT
Question # 5 of 10 ( Start time: 10:36:30 AM ) Total Marks: 1
_____________ is the part of the virus that generally consists of malicious computer instructions
Select correct option:
Off load
Payload
Ref
Payload
• The part of the virus that generally consists of malicious computer instructions
Loader
Transmitter
Question # 6 of 10 ( Start time: 10:37:04 AM ) Total Marks: 1
Because of web, people are shifting from mass marketing to _________________
Select correct option:
Direct marketing
Personal marketing
The Web has changed marketing forever, redirecting it from a mass focus to a
single-person focus
Internet marketing
All of the given
Question # 7 of 10 ( Start time: 10:37:42 AM ) Total Marks: 1
FTP was introduced in:
Select correct option:
1972
1973
1973 - FTP (File Transfer Protocol) is introduced, standardizing the transfer of files
between networked computers
1974
1976
Question # 8 of 10 ( Start time: 10:38:04 AM ) Total Marks: 1
_____________ loop is a flow control statement that allows code to be executed repeatedly based on a given Boolean condition.
Select correct option:
For
Do-While
If-else
JavaScript Flow Control Structures
• if … else
• switch
While
Question # 9 of 10 ( Start time: 10:38:39 AM ) Total Marks: 1
_______________ is a system that guards a private network.
Select correct option:
Protocol
Firewall
Firewall
A system that that guards a private network, enforcing an access/deny policy to all traffic
going to and coming from the Internet
Communication channel
None of the given choices
Question # 10 of 10 ( Start time: 10:39:13 AM ) Total Marks: 1
The ____________ virus may destroy or broadcast private data.
Select correct option:
Malicious
Malicious
– The type that grabs most headlines
– May destroy or broadcast private data
Neutral
Helpful
DoS
Which of the following is incorrect for making design elements legible?
Select correct option:
Select correct option:
1. Function is also known as ______________.
Select correct option:
In _____________ TCPIP protocols became the only set of protocols used on the ARPANET.
Select correct option:
E-mail system has ______ component(s)
Select correct option:
A Parallelogram (Tilted rectangle) represents the ________________ flow chart element.
Select correct option:
If a computer could pass the Turing test then it would be able to:
Select correct option:
Punched cards were replaced by:
Select correct option:
The ________virus may display an annoying, but harmless message
Select correct option:
The name of very first computer was:
Select correct option:
The internet communities are ___________.
Select correct option:
Global variables are:
Infection propagation and Actual destructive are the components of _______________
If a computer could pass the Turing test then it would be able to:
__________ is a special purpose computer that connects and translates between network that use different communication protocols.
The solution of the Mail Bombing is ________
The name of very first computer was:
ABC
BCD
EDC
None of the given choices
MATH functions are accessed by referring to various ______________of the Math object
The color of each pixel is generally represented in the form of a __________.
Rule of thumb learned through trial & error is called
SCSI stands for:
Internet is an example of ______________ network.
The name of first commercially available PC was:
Algorithm is a ____________________
A group of information is called __________________
___________________ is a branch f computer science concerned with manipulating and enhancing computer graphics.
__________has changed our way of life like no other technology.
Sophisticated event handling is not possible with _______________ event handling
Babbage’s Analytical Engine could store information permanently in:
There are __________ popular schemes to reduce the number of bytes that are required for storing graphics.
The internet-society is considered under Surveillance because:
Avoid __________ to ensure readability of web page
Deep Blue was the name of:
Using ____, a user can remotely log on to a computer (connected to the user through a network, e.g. Internet) & have control over it like a local user, including control over running various programs ?
DoS is________ ?
__________ enables users located at far-way locations to easily share information with others located all over the world.
Vacuum tubes were replaced by:
Cyber crime can be used to
___ provides a simple, consistent way for applications to interact with the HW without having to know all the details of the HW
Communication protocol is a __________that governs the flow of information over a network
_____________ team is responsible for the maintenance, expansion , improvement of the infrastructure consisting of workstations, networking equipment, software and network security.
_____________ team consists on the sharpest technical minds in the company.
_______________ is responsible for day to day operations.
Using Java Script you can write a character at random location on screen
The transistor is a solid state semiconductor device used for amplification and switching, and has _____ terminals.
Blue Pacific is a name of _____ computer.
A set of stand alone productivity applications designed to work together known as __
Please do make changes in these assignment otherwise every one who copy this assignment as it is will awarded zero marks
NOTE: - These Assignments OR Quiz are just for idea, so kindly don't copy it, after viewing it make your own. Thanks We always try our best to upload 100% correct solution BUT it is requested that you kindly review it before submission, please BEST OF LUCK, Thanks to those students those send me Assignments and quizzes. If you have any Assignment and quiz kindly send at fascobuk@gmail.com
No comments:
Post a Comment