CS101- Introduction to Computing Old Papers

CS101- Introduction to Computing





1. Write a note on other virus like programs (10)
Answer:
Other Virus-Like Programs
•           There are other computer programs that are similar to viruses in some ways but different in some
others
•           Three types:
–          Trojan horses
–          Logic- or time-bombs
–          Worms

Trojan Horses
•           Unlike viruses, they are stand-alone programs
•           The look like what they are not
•           They appear to be something interesting and harmless (e.g. a game) but when they are executed,
destruction results

Logic- or Time-Bombs
•           It executes its payload when a predetermined event occurs
•           Example events:
•           A particular word or phrase is typed
–          A particular date or time is reached

Worms
•           Harmless in the sense that they only make copies of themselves on the infected computer
•           Harmful in the sense that it can use up available computer resources (i.e. memory, storage,
processing), making it slow or even completely useless

Designing, writing, or propagating malicious code or participating in any of the fore-mentioned activities
can result in criminal prosecution, which in turn, may lead to jail terms and fines!

2. What is holographic storage? (2 marks)
Answer: Holographic storage:
  Holographic data storage is a potential replacement technology in the area of
high-capacity data storage currently dominated by magnetic and conventional optical data
storage.

3. What is semantic web and how is it different from normal web? (2
marks)
Answer:
Symantec Web:
The Semantic Web is the future generation in WWW technology.  It envisages
information from diverse sources being easily combined and used in profoundly different
and more powerful ways.
4. Write the types of computer networks? (2 marks)
Answer:
Types of Computer Networks according to the network access policy
•           Private
•           Public

5. What are structured vector graphics? (3 marks)
Answer:
Structured Vector Graphics
•           New format; may become more popular than Flash
•           Plug-in required
•           Text-file storage; search engine friendly
6. What is in line java script event handling? (5 marks)
Answer:
In-Line JavaScript Event Handling:
Event handlers are placed in the BODY portion of a Web page as attributes of HTML
Tags
The event handler attribute consists of 3 parts:
The identifier of the event handler
The equal sign
A string consisting of JavaScript statements enclosed in double or single quotes
Multiple JavaScript statements (separated by semicolons) can be placed in that string, but
All have to fit in a single line; no new line characters are allowed in that string
Due to this limitation, sophisticated event handling is not possible with in-line event
Handling


Ppaer#2 CS101 (Solved)

1. Define the term 3D Rendering? (2 marks)
Answer:
3D Rendering:   The process of converting information about 3D objects into a bit map that can be
displayed on a 2D computer display
Computationally, very expensive!
Steps:
Draw the wire-frame (skeleton, made with thin lines)
Fill with colors, textures, patterns
Add lighting effects (reflections shadows)
2. What is an intelligent system? (2 marks)
Answer:
Intelligent system:
  SW programs or SW/HW systems designed to perform complex tasks employing
strategies that mimic some aspect of human thought.
3. What is a compiler? Write its one benefit over interpreter? (5 marks)        
Answer:
Compiler:
  Compiler translates the program written in a HLL in one go. The translated code
is then used by the up whenever the program needs to be run.  
 To run a program you've written, e.g. in JAVA, it must first be translated into machine
code so the computer can read it. This is what compilers and interpreters do.
However, compilers convert the code all at once, save it, and then run it; whereas
interpreters translate the code one line at a time, as it is run.
Interpreters tend to result in faster translating of code so they are used mostly for
debugging. This is because if you used a compiler, you'd have to re-compile your entire
project every time you changed one little thing.
4. Who is a computing professional? (3 marks)
Answer:
Computing professional
• Computer scientists, software engineers, computer engineers, and some of the
Telecom engineers are generally classified as computing professionals
5. What are Trojan Horses? (3 marks)
Answer:
Trojan Horses
•           Unlike viruses, they are stand-alone programs
•           The look like what they are not
•           They appear to be something interesting and harmless (e.g. a game) but when they are executed,
destruction results
6. What is ICMP? (3 marks)
Answer:
  ICMP stands for Internet Control Message Protocol.
7. What is ARPANET and who developed it? (5 marks)
Answer:
The Advanced Research Projects Agency Network (ARPANET), was the world's first
operational packet switching network and the core network of a set that came to compose
the global Internet. The network was created by a small research team at the
Massachusetts Institute of Technology and the Defense Advanced Research Projects Agency (DARPA) of the United States Department of Defense. The packet switching of
the ARPANET was based on designs by Lawrence Roberts of the Lincoln Laboratory.
8. Write down the advantages of Natural Language Processing. (5 marks)
Answer:
If your question is more specifically about prolog vs the more commonly seen OO
languages I would argue that you're really comparing apples to oranges - the "advantage"
(such as it is) is just a different way of thinking about the world, and sometimes changing
the way you ask a question provides a better tool for solving a problem.
 

CS101 Final Paper#3 (Solved)

1. What is meant by universal access of internet services?    (2 marks)
Answer:
Universal access of internet services means same functionality to every one.
2. How can we include images in a web page using HTML and Java
script?
(3 marks)
Answer:
Images in HTML
It is quite straight forward to include gif and jpg images in an HTML webpage using the
<IMG> tag.
Format:    <IMG  src=URL, alt=text  height=pixels  width=pixels
align="bottom/middle/top">

Images in Java script
Images in java script can be manipulated in many ways using the built in object image.
Properties: name,border,complete,height,width,hspace,bspace,lowsrc,src
Methods: none
Event handler: on Abort, on error, on load etc.
3. Define Primary key and Queries? (3 marks)
Answer:
Primary Key
Primary key is a field that uniquely identifies each record stored in a table.

Queries
Queries are used to view, change, and analyze data. They can be used to combine data
from different table and extract the exact data that is desired.
4. What is a compound condition? Give example. (3 marks)
Answer:
Compound condition is putting multiple statements at places where java script expects
only one for those situations. This is done simply by enclosing any numbers of statements
within curly braces, for example
 {If ((day == "Sunday") // (day == "Saturday")) (Bhola = "cool";
Mood = "great";
Clothing = "casual";}
5. Differentiate between For and While loop by writing the syntax of both
loops.
(5 marks)
Answer:
The only difference between FOR loop and WHILE loop is the syntax for defining them.
There is no performance difference at all.

Syntax of both loops
For( x = 99 ; x < 6000 : x = x + 1)
{ document . write (x) :}

While (tanks full == false )
{ tank = tank + bucket : }
Document. write ("tank is full now");
6. Can a human doctor be replaced by an Expert System? Give reasons to
support your answer. (5 marks)
Answer:
Yes, a human doctor can be replaced by an expert system because systems that, in some
limited sense, can replace an expert. Expert system can act as intelligent assistant to
human experts or serve as a resource to people who may not have access to expert. And
also the purpose of all application (expert system) is not to replace our human experts but
to make their knowledge and experience more widely available.
7. How education is changed because of advancements in the field of
computing? (10 marks)
Answer:
1.  Distance learning has received a boost due to the low price of internet and the
availability of web based interactive content.
2.  Physical location is less of a hindrance now.
3.  It has also become possible for students to interact with other students as well as
teachers situated along distance from them.
4.  Students enrolled in distance education programs have more control over what
they want to learn, how and when they want to learn.
5.  The lack of face to face interaction and immediate questions and answers reduce
the amount of knowledge that can be transferred from the teacher to the students.
6.  Computer based distance education may be the only source of high quality
education for many, especially those in remote locations.
7.  Distance education is the best mode of education and convenient, which has
become more effective with the augmentation of computer based learning.  8.  Distance learning is also world most important education system by which we can
study at home and manage or get our study materials online.
9.  Also Distance learning allows us to refer online quizzes, assignments timely.
10.  By this field of computing one can get billions of knowledge by searching
through internet.

CS101 Paper#4 (solved)

1. What does NIC stand for? (1 mark)
Answer:
  NIC stands for National Identity Card.
2. Name any  software which can be used to make a presentation. (1 mark)
Answer:
  Presentation Development SW is used to make a presentation.
3. How does a JavaScript array are heterogeneous? (2 marks)
Answer:
  JavaScript Arrays are Heterogeneous
Unlike many other popular languages, a JavaScript Array can hold elements of multiple
Data types, simultaneously
a = new Array (9);
b = new Array (13);
b [ 0 ] = 23.7 ;
b [1 ] = “Bhola Continental Hotel” ;
Introduction to Computing –CS101 VU
© Copyright Virtual University of Pakistan
181
b [ 2 ] = a ;

4. What is the database? (2 marks)
Answer:
  Database:
A collection of data organized in such a fashion that the computer can quickly search for
a desired data item
All data items in it are generally related to each other and share a single domain
They allow for easy manipulation of the data
They are designed for easy modification & reorganization of the information they
contain
They generally consist of a collection of interrelated computer files.
5. Differentiate between LAN and WAN with one example of each. (3
marks)
Answer:

LAN  WAN
A network of computers located in the  A network in which computers are same building or a handful of nearby
buildings.
separated by great distances, typically
across cities or
even continents
May consist of several interconnected
LANs
Example: Computer network at your PVC  Example: The network connecting the
ATM of a bank located in various cities

6. What are Trojan Horses? (3 marks)
Answer:
Trojan Horses
•           Unlike viruses, they are stand-alone programs
•           The look like what they are not
•           They appear to be something interesting and harmless (e.g. a game) but when
they are executed, destruction results

7. What do you mean by FTP or File Transfer Protocol? (3 marks)
Answer:
File Transfer Protocol (FTP), a standard Internet protocol, is the simplest way to
exchange files between computers on the Internet. Like the Hypertext Transfer Protocol
(HTTP), which transfers displayable Web pages and related files, and the Simple Mail
Transfer Protocol (SMTP), which transfers e-mail, FTP is an application protocol that
uses the Internet's TCP/IP protocols. FTP is commonly used to transfer Web page files
from their creator to the computer that acts as their server for everyone on the Internet.
It's also commonly used to download programs and other files to your computer from
other servers.
8. What are the responsibilities and profile of a Team Lead? (5 marks)
Answer:
Team Lead
• Responsibilities:
– Planning and tracking of the project
– Detailed design
– Professional development of team members
– In case of small teams, development activities
• Profile:
– 5+ years of development experience
– Excellent interpersonal skills
– Good planning skills
– Good design skills

9. Is tabular data storage better than flat file data storage?
Answer:
  Yes tabular data storage is better than flat file data storage
 
 CS101 Paper#5 (Solved)

1. What are Local or Function-level Variables? (1 MARK)
Answer:
 
  In computer science, a local variable is a variable that is given local scope. Such
a variable is accessible only from the function or block in which it is declared. In
programming languages with only two levels of visibility, local variables are contrasted
with global variables, on the other hand, many ALGOL-derived languages allow any
number of levels of nested functions with private variables, functions, constants and types
hidden within them.
2. What is a function? Give one example. (2 marks)
Answer:
  User Define Functions are used to define its own T-Sql
Function which can have 0 or more input parameters and
Returns a single scalar data value type or table data type.
We have three type of UDF:-

1. Scalar user defined function
2. Inline table valued Function
3. Multiple table valued function

3.  What is the Data Normalization? Also define its goal. (2 marks)
Answer:
  Data normalization is to sort out complex data into simple form. It uses to
simplify the complex information to make it more user-friendly.

4. What is the preferred organizational structure for the organization? (3
marks)
Answer:
  Preferred Organizational Structure for organization is hierarchal. Where there is
different departments interconnected with each other and are been divided according to
the functions they perform.

5. Differentiate Local and Global Variables. (3 marks)
Answer:
  Local variables are the variables have limited scope while global have bigger
scope
Local variables are not accessed by others while global is accessible to every one
Local variable used by single user while global variable can be used by different users at
time from all around.

6. Elaborate Vector or Object oriented graphics with at least one example.
(3 marks) Answer:
             Object Oriented Graphics are the graphics which are generally oriented towards
the objects and have good quality to portray objects these graphics are object oriented and
use in animation, games and movies as well.

7. How DoS attack is a cyber crime? For what cyber crime can be used? (5
marks)
Answer:
  DoS stands for Decline of Service and it is a cyber crime as it jams and in some
cases shut down the targeted computer by sending too much unnecessary data packets to
it which ultimately exceeds the normal processing eventually results the computer or
server to stuck and unable to provide services to others. It can be used to destroy the fame
and diminishing of no of users requesting information and services from that particular
server or computer.

CS101 Paper#6 (Solved)

1. What are the elements of website design? Any one (1 mark)
Answer:
Elements of webdesign: There are in 3 elements of web design and below are there
names:
1.  Navigation scheme
2.  Overall look and feel
3.  Layout of information

2. What kind of information can be stored in a database ?(2 marks)
Answer:
 Numbers, Booleans, text
 Sounds
 Images
 Video
3. Why hub is used in networks? (2 marks)
Answer:
HUB: Hub is networking component which can be used to connect the networks
and it can also be used to extend the size of networks.
Simply it can be explained as a common connection point for devices in a network.
It contains multiple ports like 8port, 16 port , 23 port hubs

4. Write names of the DoS attack’s phases? (2 marks)
Answer:
DoS (Denail of service): DoS attach has in total 3 phases and below they are
listed:
1.  Search
2.  Arm 3.  Attack

5. What do you mean by FTP or File Transfer Protocol? (3 marks)
Answer:
FTP: File transfer protocol was first introduced in 1973; it standardized the
transfer of files between computers on a TCP/IP network (e.g internet).
It can download or upload files to a remote computer using the FTP protocol Operations
performed using FTP:

1.  List, change, create folders on a remote computer
2.  Upload and download files

Usage: Transferring Web content from the developer’s PC to the Web server

6. How many types of errors can be found during a program development?
List them. (3 marks)
Answer:
1.  Syntax errors
2.  Semantic errors
3.  Run-time errors
7. Why the number of temporary workers is on the rise? Discuss main
reasons? (5 marks)
Answer:
     Temporary workers:
Temporary workers are those workers which a company can hire to perform a certain task
with in a defined time period.
Temporary workers are mostly consultants which move organization to organization to
perform assigned workers.

Reasons:
1.  Now-a-days; whole world is suffering from financial crisis, most of the
companies have frozen there hiring, just in case they need a resource they are
looking for a temporary worker for a specified time span to perform a specialized
task and they just pay him for that period of time.
2.  Temporary workers are mostly consultants which have expertise in a certain field
and they are considered specialists in that field.
3.  Employer doesn’t need to train the temporary worker.
8. Define network organization? What are important features of network
organization? (4+6)
Answer:
  Network Organization :
Network organization is an interfirm organization that is characterized by organic or
informal social systems. A company or group of companies that has a minimum of formal structures and relies instead on the formation and dissolution of teams to meet
specific objectives..

Features of Network Organization:
1.  The organizations are learning that business can be done in a more effective
manner if emphasis is placed upon cooperation, shared responsibility and
networking:
 Within the organization
 And also with their customers and suppliers
2.  Changes according to the demand of the times
3.  Works effectively to meet the business goals of the organization
4.  Everyone has a feeling that he/she is playing a major role in the organization
which eventually gives a feel of ownership and because of that employee can put
his best effort to accomplish a task.

CS101 Paper#7 (Solved)


1. What is bandwidth? (1 mark)
Answer:
Bandwidth  is a capacity of communication channel of carrying data.

2. What is “My Personal Agent”? (1 mark)
Answer:
A computer programe that work automatically and have voice interface
   
3. For what purposes FTP is used in networks ? (2 marks)
Answer:
To download or upload files / data to a remote computer
   
4. How can you define a readable program? (2 marks)
Answer:
A program that is easy to read & understand also easy to maintain and enhance.
   
5. What is the preferred organizational structure for the organization? (2
marks)
Answer:
The Network Organization: It is becoming the preferred organizational structure.
6.  can you define a consistent web design? Why is it needed? (3 marks)
Answer:
A consistent web design is Easy understandable, not with heavy graphics, easy
navigation. It is needed because most of the website views leave the site because of poor
navigation and not easy to understand, text and design is not clear etc. 7. Elaborate Vector or Object oriented graphics with atleast one example.
(3 marks)
Answer:
         
Vector treats everything that is drawn as object, they are resolution in dependent and
relatively small file size. For example swg, svg, wmf.

8. What are the advantages of multimedia presentations? Write any five. (5
marks)
Answer:
Multimedia presentation is a great tool for effective communication:
Advantages:
1.  Easy to make last minute change
2.  More attractive
3.  Can include animation, videos etc.
4.  Better presentation easy to understandable for participants comparing to manual
presentation.
5.  Undo feature
9. Can a human doctor be replaced by an Expert System? Give reasons to
support your answer. (5 marks)
Answer:
Expert System is a computer system which simulates the knowledge and expertise of
a human expert. Yes, a human doctor can be replaced by an Expert System. Following
are the reasons to support my answer:
1.  A large database of knowledge can be added to and  kept up to date, it can store
more knowledge than a person.
2.  The Expert System cannot FORGET or get facts wrong.
3.  It survives forever. There is no loss of knowledge as there is when a doctor
retires.
4.  The Expert System can access specialist knowledge that a doctor may not have.
10. Explain the following issues of Data Management? (3+4+3)
Answer:
1.  Data entry
2.  Data updates
3.  Data security
 DATA ENTRY:
There is new data entered  every day.
New customers are added every day.
Some of the data entry requires the manual entry into computer system
New data entry needs to be entered correctly

DATA UPDATES:
Old titles must be removed regularly
Data changes every time
Prices change
Transportation / shipping cost changes
Customer personal data changes
Schemes changing, new offers
Every new entry needs to be entered correctly

DATA SECURITY:
All data in the system is very critical to its operation, the security of the customer’s
personal data is most important. Most of the hackers are always trying for that type of
information specially Credit Card Numbers.
This problem can be managed by using proper security arrangements and mechanisms
that provides access to only authorized entities. System Security can be improved
through, encryption, firewalls and updated Antivirus Softwares

11. Write a note on the followings (10 marks)

a.  Image Preloading process
b.  Animated Gifs
Answer:

IMAGE PRELOADING PROCESS:

The primary use of image preloading process is to download the image into the cache
before it is actually needed to display.

PROCESS:
1.  An example of the image object is shaped using the NEW keyword
2.  The src property of this instance is set equal to the filename of the image to be
pre-loaded
3.  This step starts the down-loading of the image into the cache without actually
displaying
4.  When a pre-loaded image is required to be displayed, the src property of the
displayed image is set to the src property of pre fetched image


ANIMATE GIFS:
 We can save 16 gif images of the previous example in a single file in the form of an
animated gif, and then used it in a regular <IMG> tag to display a moving image.
However, JavaScript provide better control over the sequencing and the gap between the
individual images.

CS101 Paper#8 (Solved)

1. SMTP stands for what? (1 mark)
Answer:
  SMTP, Simple Mail Transfer Protocol (internet email).
2. What are the types of computer network according to the distance
between nodes?
(5 mark)
Answer:
 
Types of Computer Networks according to the distance between nodes
LAN: Local Area Network)
WAN: Wide Area Network)

LAN
A network of computers located in the same building or a handful of nearby buildings
Examples:
–Computer network at your PVC
–Computer network of a University campus

WAN
A network in which computers are separated by great distances, typically across cities or
even continents
May consist of several interconnected LANs
Example:
–The network connecting the ATM of a bank located in various cities
–A network connecting the local and oversea offices of a SW house
–Internet
3. What is the difference between Internet and Intranet? (2 marks)
Answer:
  There's one major distinction between an intranet and the Internet: The Internet is
an open, public space, while an intranet is designed to be a private space. An intranet may
be accessible from the Internet, but as a rule it's protected by a password and accessible
only to employees or other authorized users.
4. List any five issues of Data Management. (5 marks)
Answer:
-  Low leverage of data assets
-  Decentralized Data Management
-  Data Security -  Audit ability
-  Inefficient use of Resources
5. What does TCP/IP stand for? (1 mark)
Answer:
  TCP/IP stands for Transmission Control Protocol/Internet Protocol, which is a set
of networking protocols that allows two or more computers to communicate.

CS101 Paper#9 (Solved)

1. In programming, what is an object? (1 mark)
Answer:
It is a named collection of properties and methods.

2. What kind of information can be stored in a database? (1 mark)
Answer:
It can store numbers, boleans, sound, video, images etc.

3. Define the key weakness of the web? (2 marks)
Answer:
Initially web was designed only for humans to read not for computers to understand it.
4. How can we define a Pixel? (3 marks)
Answer:
It is the smallest element of image which is spread with regular array on display
and each element consist of particular color.
5. How marketing strategies are changed with the progress in computing?
How new marketing strategies are implemented? (5 marks)
Answer:
Marketing Strategy Changes with the new requirements of the modern era and the
applications of the business. The web has changed marketing strategy from a mass focus
to single person focus. We collected data and analyze accordingly to find out the
behavior of the market and end users. In new marketing more advertising is being done
through email and web and get feedback.

6. Write a brief note on each of the following. (10 marks)
 FTP
 Telnet
 Instant messaging
 VOIP
Answer:
  FTP: File Transfer Protocol: This protocol is used to upload and download
the files on remote computers.
 Telnet:  FTP allows file operations only while Telnet can log on to a computer of other
users through TCP/IP network and use like a local user, it help in testing of remote web
server.

Instant Messaging: This is the service of messaging provided on the internet like MSN
messenger, Yahoo messenger, through which we interact people randomly whenever
required.

VOIP: Voice over IP, It is used to transmit the voice from one IP to another IP, In which
voice is first broken down and then transmitted over a network.

7. What are Commonsense Guidelines to avoid viruses? Discuss about
Antivirus as well. (10 marks)
Answer:
Commonsense Guidelines to avoid viruses are as follows:
1.  Do not open attachment of unwanted emails.
2.  Don’t used copied/pirated Software
3.  Regularly place data somewhere as backup
4.  Use Registered and Trusted Software only.
5.  Install Antivirus in the system
6.  Update your Windows and software with the passage of time.
7.  Scan before using any external device with your system as USB Device.
Antivirus:
This is the software design for preventing your system from harmful effects and maintain
the speed of computer. This software is available on the CD’s and DVD’s. These
software continuously monitor the systems and aware when any harmful virus is detected
and asked for the further operations. Some automatically remove the viruses from the
system.

CS101 Paper#10 (Solved)


1. What is bandwidth? (1 mark)
Answer:
 Bandwidth  is a capacity of communication channel of carrying data.

2. What is “My Personal Agent”? (1 mark)
Answer:
A computer program that work automatically and have voice interface
   
3. For what purposes FTP is used in networks ? (1 mark)
Answer:
To download or upload files / data to a remote computer
     4. How can you define a readable program? (2 marks)
Answer:
A program that is easy to read & understand also easy to maintain and enhance.
   
5. What is the preferred organizational structure for the organization? (2
marks)
Answer:
The Network Organization: It is becoming the preferred organizational structure.
   
6. How can you define a consistent web design? Why is it needed? (3
marks)
Answer:
A consistent web design is Easy understandable, not with heavy graphics, easy
navigation. It is needed because most of the website views leave the site because of poor
navigation and not easy to understand, text and design is not clear etc.
 
7. Elaborate Vector or Object oriented graphics with atleast one example.
(3 marks)
Answer:
            Vector treats everything that is drawn as object, they are resolution in dependent
and relatively small file size. For example swg, svg, wmf.
   
8. What are the advantages of multimedia presentations? Write any five. (5
marks)
Answer:
Multimedia presentation is a great tool for effective communication:
Advantages:
6.  Easy to make last minute change
7.  More attractive
8.  Can include animation, videos etc.
9.  Better presentation easy to understandable for participants comparing to manual
presentation.
10. Undo feature
   
9. Can a human doctor be replaced by an Expert System? Give reasons to
support your answer. (5 marks) Answer:

Expert System is a computer system which simulates the knowledge and expertise of a
human expert. Yes, a human doctor can be replaced by an Expert System. Following are
the reasons to support my answer:
A large database of knowledge can be added to and kept up to date; it can store more
knowledge than a person.
The Expert System cannot FORGET or get facts wrong.
It survives forever. There is no loss of knowledge as there is when a doctor retires.
The Expert System can access specialist knowledge that a doctor may not have.


10. Explain the following issues of Data Management? (3+4+3)

Data entry
Data updates
Data security
Answer:

DATA ENTRY:
There is new data entered  every day.
New customers are added every day.
Some of the data entry requires the manual entry into computer system
New data entry needs to be entered correctly

DATA UPDATES:
Old titles must be removed regularly
Data changes every time
Prices change
Transportation / shipping cost changes
Customer personal data changes
Schemes changing, new offers
Every new entry needs to be entered correctly

DATA SECURITY:
All data in the system is very critical to its operation, the security of the customer’s
personal data is most important. Most of the hackers are always trying for that type of
information specially Credit Card Numbers.
This problem can be managed by using proper security arrangements and mechanisms
that provides access to only authorized entities. System Security can be improved
through, encryption, firewalls and updated Antivirus Softwares


CS101 Paper#11 (Solved)
 
1. Write a note on the followings (10 marks)

c.  Image Preloading process
d.  Animated Gifs
Answer:

IMAGE PRELOADING PROCESS:

The primary use of image preloading process is to download the image into the cache
before it is actually needed to display.

PROCESS:
1.  An example of the image object is shaped using the NEW keyword
2.  The src property of this instance is set equal to the filename of the image to be
pre-loaded
3.  This step starts the down-loading of the image into the cache without actually
displaying
4.  When a pre-loaded image is required to be displayed, the src property of the
displayed image is set to the src property of pre fetched image


ANIMATE GIFS:

We can save 16 gif images of the previous example in a single file in the form of an
animated gif, and then used it in a regular <IMG> tag to display a moving image.
However, JavaScript provide better control over the sequencing and the gap between the
individual images.


2. What are application software? List down the names of three
application software (3 marks)
Answer:

Definition: Application Software are that software then can interact directory with the
user for performance of respective type of work.

Following are the types of Application Soft wares:-

 AutoCAD and Corel Draw
 Business Software
 Productivity SW
 Games Software

3. Why Local variable is preferred over Global variable? (5 marks) Answer:
In my point of view Global variable has some advantage with Local variables is
preferred due to the following reasons:-

When we declare any global variable in web page then in case of error and logic it’s very
difficult to see on which line this variable is used and what’s his value if we have more
than 2000 lines and all the functions in web page using that Global Variable so Global
variables can make the logic of a Web page difficult to understand.

As we know we can use Global variable everywhere so Global variables also make the
reuse and maintenance of your code much more complex.


4. In JavaScript, what is event handling? What are the two types of
events? (5 marks)
Answer:
In java script we can capture events on do some operation on the basis of that
particular event. For example we want to load some data on web page then with the help
of event handling we can do this operation by using onLoad event.
We can put Event handlers in the body of web page and also in attributes of HTML.
From the attribute we can call any JavaScript function that will do his operation and
come back. Now we can also interact with server side with the help of AJAX in
JavaScript function.

In-Line Event Handling

We can place event handlers in the BODY part and also in HTML attributes the event
handlers attributes consist of 3 parts the event handler, equal sign and a string of
JavaScript statement enclosed in quotes (single or double). And one more thing these
should be put in one line without newline due to this sophisticated event handling is not
possible with in-line event handling.


5. What is Structured Vector Graphics? (2 marks)
Answer:
This is a plug-in that is required to view swf (flash) files in the web browser

6. What kind of new jobs are created because of computing? And which
old professions are being eliminated? (3 marks)
Answer:
Due to computing where people are getting benefits from automated systems on
the other hand the people that are with KHATA system or Manual system and they don’t
know about computers are eliminated due to this reason and people take place of many
people. We can see in the offices where before computer if there are four person required
now only one person is required for example with the help of database we can store more than thousand of information and only one person is managing the whole data that is
DBA. In the old system many people are writing the data in registers and then its also
very difficult to find the specific record.

Now we can see companies are hiring:-

Data Entry Operators
System Engineers
Software Developer
DBA etc.


7. What are Logic- or Time-Bombs? (3 marks)

Answer:
It execute the payload when predetermined event occurs
For example use type particular phrase and particular data is reached.

8. What do you mean by FTP or File Transfer Protocol? (3 marks)

Answer:
This protocol is used to upload the files on remote computers. This is used to
transfer files between computer on TCP/IP network e.g. internet and now a day’s many
software are available for uploading files using FTP like Mozila FTP, cute FTP etc.

9. Why should we, as computing professionals, be interested in studying
the social implications of our creations? (3 marks)

Answer:
If we see our life then we can judge computing technology is changing our life
fast if we compare with other technology.

We should highlight the mistakes and successes of the past. We should learn then and
select future direction accordingly. Computers are keep becoming more and more
powerful and gaining more autonomy.

10.How DoS attack is a cyber crime? For what cyber crime can be used?
(3 marks)
Answer:
DoS is the crime but of a new type. A new type for policing system is required to
tackle such crimes.

Cyber Crime can be used to Damage a home computer, Bring down the Business,
Weaken the financial and defense system of country.
 In programming, what is an object ?
Answer: It is a named collection of properties and methods.
 
CS101 Paper#12 (Solved

1. What kind of information can be stored in a database ? (1 mark)
Answer:
It can stored numbers, Booleans, sound, video, images etc.
   
2. Define the key weakness of the web? (2 marks)
Answer:
Initially web was designed only for humans to read not for computers to
understand it.
   
3. How many iterations would this ‘for’ loop run for? (2 marks)
for ( x = 50 ; x < 0 ; x = x - 1 ) {
document.write ( x ) ;
}
Answer:
50 iterations

4. How can we define a Pixel? (2 marks)
Answer:
It is the smallest element of image which is spread with regular array on display
and each element consist of particular color.
   
5. How marketing strategies are changed with the progress in computing?
How new marketing strategies are implemented? (5 marks)
Answer:
Marketing Strategy Changes with the new requirements of the modern era and the
applications of the business. The web has changed marketing strategy from a mass focus
to single person focus. We collected data and analyze accordingly to find out the
behavior of the market and end users. In new marketing more advertising is being done
through email and web and get feedback.

6. Write a brief note on each of the following. (10 marks)
 FTP
 Telnet
 Instant messaging
 VoIP
Answer:
FTP: File Transfer Protocol: This protocol is used to upload and download the files on
remote computers.
Telnet:  FTP allows file operations only while Telnet can log on to a computer of other
users through TCP/IP network and use like a local user, it help in testing of remote web
server.

Instant Messaging: This is the service of messaging provided on the internet like MSN
messenger, Yahoo messenger, through which we interact people randomly whenever
required.

VoIP: Voice over IP, It is used to transmit the voice from one IP to another IP, In which
voice is first broken down and then transmitted over a network.

7. What are Commonsense Guidelines to avoid viruses? Discuss about
Antivirus as well. (10 marks)

Answer:

Commonsense Guidelines to avoid viruses are as follows:
8.  Do not open attachment of unwanted emails.
9.  Don’t used copied/pirated Soft wares
10. Regularly place data somewhere as backup
11. Use Registered and Trusted Soft wares only.
12. Install Antivirus in the system
13. Update your Windows and software with the passage of time.
14. Scan before using any external device with your system as USB Device.
Antivirus:
This is the software design for preventing your system from harmful effects and maintain
the speed of computer. These soft wares are available on the CD’s and DVD’s. These soft
wares continuously monitor the systems and aware when any harmful virus is detected
and asked for the further operations. Some automatically remove the viruses from the
system.
CS101 Paper#13 (Solved

1. What is the out put of the following JavaScript code ? (1 mark)
             name=”Ali Akbar”;
             document.write(name.charAt(4))  ;

Answer:
A
2. What does WAN stand for? (2 marks)

Answer:
Wide Area Network – A network in which computers are separated by great
distances typically across cities or even continents.
     3. Why hub is used in networks? (2 marks)

Answer:
The network traffic controller – components of convential computer networks.
Hub is used to connect the different computers in the network i.e. to the server.
   
4. What is output of the following JavaScript code? (2 marks)
      Str=”Virtual University of Pakistan”;
       document.write(str.substring(5,str.length))  ;
   
5. Explain how many ways businesses monitor their employees? (3 marks)
Answer:
Systems are available that monitor or most every key stroke that an employee
makes on computer. Systems are available that read and sensor all incoming and outgoing
email. It is quite straight forward to monitor where you surf and when.

6. Diffentiate Local and Global Variables. (3 marks)
Answer:
Local or function level variable effective only in the function in which they are
declared while globale variables visible everywhere on the webpage. Declaration
variables using the var keyword within a function makes them local. They are available
only within the function and hold no meaning outside of vs global.
   
7. Elaborate Vector or Object oriented graphics with at least one example.
(3 marks)
Answer:
            Treats everything that is drawn an object. Objects retain their identity after their
drawn. These objects can later be easily moved stretched duplicated deleted etc are
resolution independent relatively small size. e. g. swf, wmf,

8. Why should we, as computing professionals, be interested in studying
the social implications of our creations? (5 marks)
Answer:
This is imp. Because of keeping the track of money wise while implementation
actually and see the results. This fits with the organization or no. to check there is any
side effects morally or no. we have to be very careful while creation of any system., error
free, data loose recovery. Etc.
9. Write responsibilities of the followings (5 marks)

 
1.  Developer

a)  Module level design.
b)  Coding c)  Unit testing

 

2.  Executive Team

a) Responsible for the day to day operations.
b) All the decision related issues.
c) Policy making and changing etc.

e.g. In this usually CEO and CMSO involves


1. He is responsible for the day to day operation and great organizational skills.


3.  Support Team

The support team is responsible for the complete operations such as arrangement for
performing any kind of task from the starts to the end. Fully project handling and
performing etc. In case of any maintenance they are the responsible for commencing the
job and making sure to complete.
CS101 Paper#14 (Solved



1. What is a function? Give one example. (2 marks)
Answer:
Function  is  a  reusable  code  (group  of  statement)  that  is  executed  when  the
function  is called.  It  is also known as sub-program. Function  is normally defined  in  the
head section of the code.

2. What is an intelligent system? (2 marks)
Answer:
Intelligent systems are  the programs developed  to perform complicated  jobs  that
reflect human brain and thoughts.  If the algorithms are too much complex or can not be
solved instantly then we can use such systems. Therefore the well intelligent system not
only performs well but  it has  the capability  to  rectify any errors by himself  if  it occurs
within  his  domain.  The  examples  of  intelligent  systems  are  Robotics,  Business
Intelligence …etc.



3. What is meant by semantic error? (3 marks)
Answer: It is an error which a developer encounters when a statement is executed but it
was not intended by him (the developer). Such errors are very difficult to locate during
testing. Mostly these occur during abnormal circumstances. It may be referred as the
logical error.
 
4. What is best algorithm? (3 marks)
Answer:
Greedy algorithm is the best algorithm as it is n algorithm that always takes the
best immediate or local solution while finding an answer.

5. How can we include images in a web page using HTML and Java
script? (3 marks)
Answer:
Images can be included in HTML by employing <IMG> tag, below is the format
of  <IMG>

<IMG src=URL, alt=text height=pixels width=pixels align="bottom|middle|top">

6. What are the Sub categories of Artificial Intelligence? Briefly explain
any two. (3 marks)
Answer:
1. Robotics

These are  the machines which are computer programmed and perform work which was
previously  done  by  humans.  They  can  be  found  in  the  manufacturing  industry,  the
military, space exploration and medical applications.

2. Expert Systems

These systems are designed to replace an expert. The medical expert system is an
example of such system which can replace a Doctor/medical expert.

7. What are the steps of working of TCP and IP protocols in internet
transmission? (3 marks)
Answer:
TCP divide messages in to many packets (capsulation) and sent these messages
over the internet and IP route these messages on the internet to the correct destination and
upon reaching the messages on its destination the messages are encapsulated.
8. What is ARPANET and who developed it?(5 marks)
Answer:
ARPANET  stands  for Advanced Research  Projects.  The  initial  purpose was  to
communicate with  and  share  computer  resources  among mainly  scientific  users  at  the
connected  institutions.  In  the  beginning  it was  connected  four  universities  and  enabled
scientists to share resources.
It was headed by Dr. J.C.R. Licklider.
CS101 Paper#14 (Solved


1. For what purposes FTP is used in networks? (2 marks)
Answer:
 FTP is a service of internet. FTP was to transfer files between computers on
ECP/IP network e.g.:-simple commands allows the user to list, creators on a remote
computer upload or downloads .Typical we transferring web content from the developers
PC to the web servers.
2.What is the Data Normalization? Also define its goal.(2 marks)
Answer:
 It is to sort complex data into simple from. It uses to simplify the complex
information to make it more users friendly.  
3.Define the key weakness of the web?(3marks)
Answer:
A Web was designed for humans to read, not for computers to understand and
manipulate meaningfully. As, computers language is different from human language,
computer face great problems in dealing with the current text and graphics-based contact
of the web.
4.What kind of new jobs are created because of computing? And which old
professions are being eliminated? (3 marks)
Answer:
 Due to computing where people are getting benefits from automated system on
the other hand the people that are with KHATA system or manual system and they do not
now anything about computer are eliminated due to  reasons before computer 4 people
required in a office and now only 1 person required and in old system many people are
writing the data in a registers and then its abosvery difficult to find the specific record but
with the help of database we can store more than 1000 of information and only one
person is managing the whole data that is DBA.
 5.What is the difference between Internet and Intranet ? (5 marks)
 Answer:

 Intranet and internet   are 2 domains that are very a like but often segregated in order to
maintain security. Internet is where I am having exam now it provides access to the rest
of digital world e.g:- world wide web .Intranet is a small varsim of this used by
companies and is normally local, e.g:- only the people who work those have access to the
information being shared on its seriver.There is one major distination between an intranet
and the internet the internet is an open, public places while intranet is in only in pravite
places.
6.Differentiate between on Load and on Unload(3 marks)
Answer:  On load executes the specified JavaScript code when a new document is loaded
into windows.  
 ON Unload executes he specified JavaScript code when a user exits a document.
7. Mention any five applications of Artificial Intelligent System.(3 marks)
Answer:
 1)Medical Diagnosis 2)Robots 3) Games 4) Business intelligence 5)Image Recognition.  

8 What is an IP address? (1 mark)
Answer:
  Every machine on the Internet has a unique identifying number, called an IP
Address. A typical IP address looks like this:
 216.27.61.137
9 What is internet? (2 marks)
Answer:
  The Internet, sometimes called simply "the Net," is a worldwide system of
computer networks - a network of networks in which users at any one computer can, if
they have permission, get information from any other computer (and sometimes talk
directly to users at other computers).
10Define semantic web with respect to the present web? (2 marks)
Answer:
  In the Semantic Web data itself becomes part of the Web and is able to be
processed independently of application, platform, or domain. This is in contrast to the
World Wide Web as we know it today, which contains virtually boundless information in
the form of documents. We can use computers to search for these documents, but they
still have to be read and interpreted by humans before any useful information can be
extrapolated.


 CS101 Solved Subjective Questions from Old papers


Question No: 31 (Marks: 1)
What is heuristic?
Heuristic is a procedure that usually, but not always, works or that gives nearly the right
answer.
Question No: 32 (Marks: 1)
In programming, what is an object?
Object is a named collection of properties (data, state) & methods (instructions, behavior).
Question No: 33 (Marks: 2)  What is spreadsheet? List any two jobs that it can do.
A spreadsheet is a grid that organizes data into columns and rows. Spreadsheets make it easy
to display information, and people can insert formulas to work with the data.
Electronic replacement for ledgers
Charts
Financial-forecasting.
1 Question No: 34 (Marks: 2)
In JavaScript, what is event handling? What are the two types of events?
In JavaScript capturing events  and  responding  to  them  is event handling. The system sends
events to the program and the program responds to them as they arrive.
1. Events can include things a user does - like clicking the mouse.
2. Events that the system itself does - like updating the clock.
Question No: 35 ( Marks: 3 )
Explain how many ways businesses monitor their employees?
• Systems are available that monitor almost every key stroke that an employee makes on a
computer.
• Systems are available that read and censor all incoming and outgoing eMail.
• It is quite straight forward to monitor where you surf the web.
Question No: 36 ( Marks: 3 )
What is difference between Design and System Architecture?
System  architecture  is  the conceptual design  that defines  the  structure and/or behavior of a
system. Whereas designs it as an independent, self-contained system.

2 Question No: 37 ( Marks: 3 )
What are the Sub categories of Artificial Intelligence? Briefly explain any two.
1. Expert systems:
Expert system is that system which is in some limited sense, can replace an expert.
2. Robotics:
Robotics is an automatic machine that performs various tasks that were previously done by
humans.
Question No: 38 ( Marks: 5 )
How many ways are there to call a function in a program? Explain with example.
Two Ways of Calling Functions:
Functions do not run automatically. When the page loads, each function waits quietly until it
is told to run.
1. A function calls appearing as a complete statement:
function popUp( message ) {
window.alert( message ) ;
}
popUp( “Warning!” ) ;
3 2. A function calls appearing as part of a statement. Definitions of such functions
include a ‘return’ statement:
function add( a, b ) {
c = a + b ;
return c ;
}
sum = add( 2, 4 ) ;
document.write( sum ) ;
Question No: 39 ( Marks: 5 )
Elaborate the ‘+ ’ operator and its constraints with the help of examples.
The + Operator Used on Strings. The + operator can also be used to add string variables or
text values together. To add two or more string variables together, use the + operator.
Example:
txt1="What a very";
txt2="nice day";
txt3=txt1+txt2;
Now txt3 will be having this value "What a very nice day".
txt3=txt1+txt2; this statement due to + sign.
4 Question No: 40 ( Marks: 10 )
Write a JavaScript program having two functions sum and mean.
The web page will ask the user to enter five values to be added.
After taking input it will calculate the sum and mean of those values by calling sum and
mean functions.
Question No: 41 ( Marks: 10 )
Define the following terms.
Object
Object is a named collection of properties (data, state) & methods (instructions, behavior).
Event Handler
An event handler  is a command which calls a function when an event happens, such as  the
user clicking a button.
Local Variable
Declaring variables  (using  the var keyword) within  a  function makes  them  local. They  are
available only within the function and hold no meaning outside of it.
Scope of Variable
Defining  the  space  in  which  a  variable  is  effective  is  known  as  defining  the  scope  of  a
variable. A variable can be either local or global in scope.
Array
Array is an indexed list of elements.5  Question No: 27 ( Marks: 1 ) What BIOS stands for?
BIOS stand for Basic input/output system.

Question No: 28 ( Marks: 1 ) List down the Analytical Engine's components name (any
two) Input
Memory
Processor
Output. Question No: 29 ( Marks: 2 ) Why uploading a web page is important? Describe
in 2 – 3 lines.
By only uploading webpage we could place our information so that other can reach up to
what we have loaded. Upload means make available our data or information for the world
web browsers. Question No: 30 ( Marks: 3 ) What is the difference between
microprocessors and microcontrollers? Give one example of both. The microprocessor is
electronic equipment which can perform several functions and also processing of data and
information present in a computer, while microcontroller can only perform one function for
that its design. Example: Microprocessor: Pentium 4 & Personal Computer. Microcontroller:
Electrical device, washing machines, microwave ovens, telephones etc.
Question No: 31 ( Marks: 5 ) Differentiate uni-Processor OS from Multi-Processor OS.
Uni-processor OS’es is designed to schedule tasks on a single uP only whereas Multi-
processor OS’es can control computers having multiple uPs, at times 1000’s of them.
6 Question No: 32 (Marks: 5) Why do we call JavaScript an Object-based Language?
JavaScript shares many similarities with object-oriented languages, and therefore is called an
object-based language.
Question No: 31 (Marks: 1)
When does recursion occur?
Question No: 32 (Marks: 1)
What are the types of computer network according to the distance between nodes?
There are two types of networks.
1. LAN (Local Area Network)
2. WAN (Wide Area Network)
Question No: 33 (Marks: 2)
What is meant by semantic error?
Occur when  a  statement  executes  and  has  an  effect  not  intended  by  the  programmer  and
Often times occur only in unusual & infrequent circumstances.
Question No: 34 (Marks: 2)
List down the names of two array methods available in JavaScript.
1. sort( ) [sorts elements in alphabetical order].
2. reverse( ) [Reverses the order of elements].
 Question No: 35 ( Marks: 3 )
How can you define a consistent web design? Why is it needed?
A consistent good designed website is generated for general public that allows users to attain
what  they  want  as  quickly  as  possible  without  spending  much  effort.  A  consistent  good
design is needed to assists the user in recovering from errors.
Question No: 36 ( Marks: 3 )
How can we include images in a web page using HTML and Java script?
Image in HTML
<IMG src=URL, alt=text height=pixels width=pixels align="bottom|middle|top">
Image in Javascript
Images in JavaScript can be manipulated in many ways using the built-in object Image.
Additional properties to HTML are hspace, vspace & lowsrc.
Example: It can be used by many handlers like, onAbort, onLoad & onError
Question No: 37 ( Marks: 3 )
The event handler attribute consists of three parts. Write about each of them.
1. The identifier of the event handler.
2. The equal sign.
3. A string consisting of JavaScript statements enclosed in double or single quotes.
 Question No: 38 (Marks: 5 )
What is a packet in the network environment? What kind of information does it
contain?
A packet is the smallest unit of data  transmitted over a computer network. It’s a message to
be transferred over the network is broken up into small packets by the sending computer.
Each packet contains the following info:
–Sender's address
–Destination address
–Data
–Error-recovery info.

Author

Written by Admin

Aliquam molestie ligula vitae nunc lobortis dictum varius tellus porttitor. Suspendisse vehicula diam a ligula malesuada a pellentesque turpis facilisis. Vestibulum a urna elit. Nulla bibendum dolor suscipit tortor euismod eu laoreet odio facilisis.

0 comments: