CS101-introduction-to-computing-past-solved-paper-final-term
CS101-introduction-to-computing-past-solved-paper-final-term
Ada lovelace, whose real name was ada king,countess of lovelace and first daughter to
the poet lord Byron,is widely considered to be the world first computer programmer, at
least in the theoretical sense. As a young women, lovelace befriended with the Charles
babbage who wrote plans for the analytical engine a clock work counting machine
Credit card fraud happens when someone- a fraudestr or theif- uses your stolen credit
card or information from that credit card to make unauthorized purchases in your name
or taken out cash advances using your account. Credit card can be avoid using data
mining technique outlier analysis.
Pseudocode is an informal way of programming description that does not require any
strict programming language syntax or underlying technology consideration.it is used
for creating an outline or a rough draft of a program
8. What is MS access?
• Syntactic analysis
MUHAMMAD IMRAN 1
• Semantic analysis
• Contextual analysis
11. Name two popular method algorithm base design?
Insert ribbon has illustration box which is used to insert images and videos.
In object oriented paradigm,a software is viewed as collection of units which are called
objects
15. How environment effected when heavy metal computers are thrown away?
Difference Between File and Database is that a data file is a collection of related
records stored on a storage medium such as a hard disk or optical disc. While
a database is a collection of data organized in a manner that allows access, retrieval,
and use of that data.
Content filtering, in the most general sense, involves using a program to prevent
access to certain items, which may be
harmful if opened or accessed. The most common items to filter are executable, emails
or websites.
19. Practice on excel and make spreadsheet of student marks?(also learn the
formulas )
• Stack
• queue
21. to draw custom textbox in the text group and write the procedural
steps?(L.Q)
22. a table of 8 students with 3 subject column. And find out the number of
students obtained 88 marks in ITC subject by excel formulaand also give
output and lowest marks obtained in physics by excel formula and write the
output?(L.Q)
int main()
{
int l,w,perimeter,area;
cout<<"Length : ";
cin>>l;
cout<<"Width : ";
cin>>w;
area=l*w;
perimeter=2*(l+w);
cout<<"Area of Rectangle : "<<area<<endl;
cout<<"Perimeter of Rectangle : "<<perimeter
Types:
• Residential services
• Mobile services
• Phone-based services
• Software based services
• Business services
• Clouds-hosted VoIP services
25. Make excel table?
The main difference between high level language and low level language is that,
Programmers can easily understand or interpret or compile the high level language in
MUHAMMAD IMRAN 3
comparison of machine. On the other hand, Machine can easily understand the low
level language in comparison of human beings
Registers are the part of CPU and they contain data storage cells(similar to main
meory cell) which are used for temporary storage of information within CPU
Array declaration syntax is very simple. The syntax is the same as for a normal
variable declaration except the variable name should be followed by subscripts to
specify the size of each dimension of the array. ... where VariableType is a Modelica
type like Real or Integer , varName is the name of the variable
32. Write project of all teachers from teachers then students has greater than
100?
A stack is a list in which entries are inserted and removed only at the head. An
example is a stack of books
where physical restrictions dictate that all additions and deletions occur at the top
MUHAMMAD IMRAN 4
Internet is usefull in many fields of life it is used to share information to all around the
world.it is used in medical fields and many more
39. C++ ?
Alignment (left, right, centered, or justified), adjust Line Spacing within a paragraph,
and adjust spacing before and after
paragraphs, along with working with paragraph Indentation as shown in figure 151.
This is also the area where you can
add bullet lists, number lists, or outlines form to a documents. The Dialog expander
arrow will open the Paragraph dialog window.
Another software testing methodology, called basis path testing, is to develop a set of
test data that insures that each
MUHAMMAD IMRAN 5
Techniques based on the Pareto principle and basis path testing rely on knowledge of
the internal composition of the
software being tested. They therefore fall within the category called glass-box testing,
meaning that the software tester is
aware of the interior structure of the software and uses this knowledge when designing
the test.
An example of black-box testing is the technique, called boundary value analysis, that
consists of identifying ranges of
data, called equivalence classes, over which the software should perform in a similar
manner and then testing the software
Another methodology that falls within the black-box category is beta testing in which a
preliminary version of the software
is given to a segment of the intended audience with the goal of learning how the
software performs in real-life situations
before the final version of the product is solidified and released to the market.
Another methodology that falls within the black-box category is beta testing in which a
preliminary version of the software
is given to a segment of the intended audience with the goal of learning how the
software performs in real-life situations
before the final version of the product is solidified and released to the market.
systems, known as CASE tools, which include project planning systems (to assist in
cost estimation, project scheduling,
and personnel allocation), project management systems (to assist in monitoring the
progress of the development project),
the development of prototypes), interface design systems (to assist in the development
of GUIs), and programming systems
There is another type of control structure known as loop. The loop control structure
iterates a set of instructions based on
Consider the following example, we are interested to print the counting from 1 to 5.
One way of doing this is as follows:
cout<<”4”; cout<<”5”;
53. Which optical disc is used to store movie and which is used to store
research projects?
54. Which stage of SDLC involves debugging and gives conformation that our
computer is compatible with SRS?
Test phase
Opcodes, source operand reference, result operand reference and next instruction
reference.
MUHAMMAD IMRAN 7
Fetch
Decode
Execute
67. Short cut key interpreter difference matching column goal design insert,
69. Queue?
=if(J3>33,”pass”,”fail”)
MUHAMMAD IMRAN 9
BLOCK elements always start after a new line and the content is displayed in the next
line in browser.
Inline elements are usually displayed on the browser without starting a new line
Example:<b>,<td>,<a>,<img>
MUHAMMAD IMRAN 10
Denial of service attack is an attack meant to shut down a machine or network, making
it inaccessible to its intended users.DOS attacks accomplish this by flooding the target
with traffic, or sending it information that triggers a crash
143.
MUHAMMAD IMRAN 11