0% found this document useful (0 votes)
44 views

CS101-introduction-to-computing-past-solved-paper-final-term

most important CS101 past papers

Uploaded by

waseemhafiz265
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views

CS101-introduction-to-computing-past-solved-paper-final-term

most important CS101 past papers

Uploaded by

waseemhafiz265
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

lOMoARcPSD|51231286

CS101 Introduction to Computing PAST Solved Paper Final


TERM
Computer science (Virtual University of Pakistan)

Scan to open on Studocu

Studocu is not sponsored or endorsed by any college or university


Downloaded by Hafiz Waseem ([email protected])
lOMoARcPSD|51231286

MUHAMMAD IMRAN CS101-Introduction-to-Computing


PAST SOLVED PAPER Final term
vulmshelp.com
1. World first computer program?

Ada lovelace, whose real name was ada king,countess of lovelace and first daughter to
the poet lord Byron,is widely considered to be the world first computer programmer, at
least in the theoretical sense. As a young women, lovelace befriended with the Charles
babbage who wrote plans for the analytical engine a clock work counting machine

2. Credit card fraud?

Credit card fraud happens when someone- a fraudestr or theif- uses your stolen credit
card or information from that credit card to make unauthorized purchases in your name
or taken out cash advances using your account. Credit card can be avoid using data
mining technique outlier analysis.

3. What types of letters are used during designing a website program?

4. Valid and invalid event handlers?

5. Primitive data types?


• Integers
• Float
• Character
• Boolean
6. What are the uses of pseudocode area?

Pseudocode is an informal way of programming description that does not require any
strict programming language syntax or underlying technology consideration.it is used
for creating an outline or a rough draft of a program

7. B629 hexadecimal convert into binary?

8. What is MS access?

A database is a shared collection of logically related data that is stored to meet


requirements of different users of an organization.

9. Steps to understand general images?

The task of understanding general images is usually approached as a two-step


process: (1) image processing, which refers to identifying characteristics of the
image, and (2) image analysis, which refers to the process of understanding what
these characteristics mean.

10. Types of analysis for NLP?

Neuro- linguistic programming or natural language processing. It deal with linguistic


that humans evolve different language

• Syntactic analysis
MUHAMMAD IMRAN 1

Downloaded by Hafiz Waseem ([email protected])


lOMoARcPSD|51231286

• Semantic analysis
• Contextual analysis
11. Name two popular method algorithm base design?

C++, Java .C# etc.

12. Which ribbon is used on MS word for images and videos?

Insert ribbon has illustration box which is used to insert images and videos.

13. Can spam act?


• Don’t use false or misleading header information
• Don’t use descriptive subject lines
• Identify the message as an ad
• Tell recipient where you are located
• Honor opts outs requests promptly
• Monitor what other are doing on your behalf
14. What is collection of unit and function of unit?

In object oriented paradigm,a software is viewed as collection of units which are called
objects

15. How environment effected when heavy metal computers are thrown away?

Difference Between File and Database is that a data file is a collection of related
records stored on a storage medium such as a hard disk or optical disc. While
a database is a collection of data organized in a manner that allows access, retrieval,
and use of that data.

16. Difference between file base and data base?

17. What is amchine independent language?name two ?

Programming language such as C++, fortran,or pascal that enable a programmer to


wrote program that are more or less independent of a particular type of computer.
Such languages are considered as high level language because they are closer to
human language and further from machine language.

18. Two uses of content filtering?

Content filtering, in the most general sense, involves using a program to prevent
access to certain items, which may be

harmful if opened or accessed. The most common items to filter are executable, emails
or websites.

19. Practice on excel and make spreadsheet of student marks?(also learn the
formulas )

20. Define list and its types?

List is a collection whose entries are arranged sequentially

Two types of list:


MUHAMMAD IMRAN 2

Downloaded by Hafiz Waseem ([email protected])


lOMoARcPSD|51231286

• Stack
• queue
21. to draw custom textbox in the text group and write the procedural
steps?(L.Q)

22. a table of 8 students with 3 subject column. And find out the number of
students obtained 88 marks in ITC subject by excel formulaand also give
output and lowest marks obtained in physics by excel formula and write the
output?(L.Q)

23. write the pseudocode for a perimeter and area of a rectangle?


include <iostream>
#include<stdlib.h>
using namespace std;

int main()
{
int l,w,perimeter,area;
cout<<"Length : ";
cin>>l;
cout<<"Width : ";
cin>>w;
area=l*w;
perimeter=2*(l+w);
cout<<"Area of Rectangle : "<<area<<endl;
cout<<"Perimeter of Rectangle : "<<perimeter

24. Write full form of VoIP and write their types?

Voice over internet protocol

Types:

• Residential services
• Mobile services
• Phone-based services
• Software based services
• Business services
• Clouds-hosted VoIP services
25. Make excel table?

26. Difference between high level and low level language?

The main difference between high level language and low level language is that,
Programmers can easily understand or interpret or compile the high level language in

MUHAMMAD IMRAN 3

Downloaded by Hafiz Waseem ([email protected])


lOMoARcPSD|51231286

comparison of machine. On the other hand, Machine can easily understand the low
level language in comparison of human beings

27. What is register and its uses?

Registers are the part of CPU and they contain data storage cells(similar to main
meory cell) which are used for temporary storage of information within CPU

28. How to define syntax of array?

Array declaration syntax is very simple. The syntax is the same as for a normal
variable declaration except the variable name should be followed by subscripts to
specify the size of each dimension of the array. ... where VariableType is a Modelica
type like Real or Integer , varName is the name of the variable

29. What are parts of insert ribbon on MS word?

Pages, table, illustration,links,header and footer, text,symbols

30. Formula of sum to add row 3and address of containing cell 6?

31. Geometric characteristics?

Another approach to problem of character recognition is based on matching the


geometric characteristics rather than the exact appearance of the symbols.in such
case the digit 1 might be characterized as a single vertical line, 2 might be an open
curved line joined with a horizontal straight line across the bottom. And so on..

32. Write project of all teachers from teachers then students has greater than
100?

33. What is Trojan horses virus?

Trojan horseware is a type of malware that is often disguised as legitimate software.


Trojan can be employed by cyber-theives and hackers trying to gain access to user
system

34. Style is predefined in MS word can we cutomise own style in MS word?>

35. Match column A to B and write in C

36. Arithmetic operation on data?

37. Use of stack?

A stack is a list in which entries are inserted and removed only at the head. An
example is a stack of books

where physical restrictions dictate that all additions and deletions occur at the top
MUHAMMAD IMRAN 4

Downloaded by Hafiz Waseem ([email protected])


lOMoARcPSD|51231286

38. Use of internet?

Internet is usefull in many fields of life it is used to share information to all around the
world.it is used in medical fields and many more

39. C++ ?

C++ is a proframming language. , C++ is

associated with the C++ Standard Template Library,

40. Paragraph insert option in MS word?

The paragraph group allows you to change Paragraph

Alignment (left, right, centered, or justified), adjust Line Spacing within a paragraph,
and adjust spacing before and after

paragraphs, along with working with paragraph Indentation as shown in figure 151.
This is also the area where you can

add bullet lists, number lists, or outlines form to a documents. The Dialog expander
arrow will open the Paragraph dialog window.

41. Array consists of multiple rows and column?

42. Join of two relation produce on relation.

43. Rows are also called tuple

44. Wild card use sign for?

Wild card use * sign for searching

45. What is tree?

A tree is a collection whose entries have a hierarchical organization similar to that of


an organization chart of a typical
company (Figure 105). The president is represented at the top, with lines branching
down to the vice presidents, who are
followed by regional managers, and so on.
46. Basis path testing?

Another software testing methodology, called basis path testing, is to develop a set of
test data that insures that each

instruction in the software is executed at least once

47. Glass box testing?

MUHAMMAD IMRAN 5

Downloaded by Hafiz Waseem ([email protected])


lOMoARcPSD|51231286

Techniques based on the Pareto principle and basis path testing rely on knowledge of
the internal composition of the

software being tested. They therefore fall within the category called glass-box testing,
meaning that the software tester is

aware of the interior structure of the software and uses this knowledge when designing
the test.

48. Boundry value analysis?

An example of black-box testing is the technique, called boundary value analysis, that
consists of identifying ranges of

data, called equivalence classes, over which the software should perform in a similar
manner and then testing the software

on data close to the edge of those ranges.

49. Beta testing ?

Another methodology that falls within the black-box category is beta testing in which a
preliminary version of the software

is given to a segment of the intended audience with the goal of learning how the
software performs in real-life situations

before the final version of the product is solidified and released to the market.

50. Alpha testing?

Another methodology that falls within the black-box category is beta testing in which a
preliminary version of the software

is given to a segment of the intended audience with the goal of learning how the
software performs in real-life situations

before the final version of the product is solidified and released to the market.

(Similar testing performed at the developer’s site is called alpha testing.)

51. Case tool?

. CASE has led to the development of a variety of computerized

systems, known as CASE tools, which include project planning systems (to assist in
cost estimation, project scheduling,

and personnel allocation), project management systems (to assist in monitoring the
progress of the development project),

documentation tools (to assist in writing and organizing documentation), prototyping


and simulation systems (to assist in

the development of prototypes), interface design systems (to assist in the development
of GUIs), and programming systems

(to assist in writing and debugging programs).


MUHAMMAD IMRAN 6

Downloaded by Hafiz Waseem ([email protected])


lOMoARcPSD|51231286

52. Control structure loop

There is another type of control structure known as loop. The loop control structure
iterates a set of instructions based on

the provided condition.

Consider the following example, we are interested to print the counting from 1 to 5.
One way of doing this is as follows:

cout<<”1”; cout<<”2”; cout<<”3”;

cout<<”4”; cout<<”5”;

53. Which optical disc is used to store movie and which is used to store
research projects?

54. Which stage of SDLC involves debugging and gives conformation that our
computer is compatible with SRS?

Test phase

55. Names of three machine instructions?

Opcodes, source operand reference, result operand reference and next instruction
reference.

56. Two points on which NLP statement depends?

Theoretical analysis and engineering analysis

57. Purpose of external data tab on MS access?

58. Effect of computer science on environment?

59. Binary conversion?

60. Purpose of dreamweaver software?


Adobe Dreamweaver CC is a web design and an Integrated Development
Environment (IDE) application that is used to develop and design websites.
Software genre: Integrated development enviro...
License: Proprietary software
Developer: Adobe, Macromedia

61. Multiple thread programming?

MUHAMMAD IMRAN 7

Downloaded by Hafiz Waseem ([email protected])


lOMoARcPSD|51231286

In computer architecture, multithreading is the ability of a central processing unit (CPU)


(or a single core in a multi-core processor) to provide multiple threads of execution
concurrently, supported by the operating system.

62. Steps in machine cycle?

Fetch

Decode

Execute

63. List of attacks that prevent websites?

A firewall is your first line of defense against DDoS attacks.

64. Ways by which America waste paper?

65. Http.edu.ilm.shakespear.html(explain this link parts http,edu,


shakespear,html)

66. Short key word of soft program ?

67. Short cut key interpreter difference matching column goal design insert,

68. Imperative declarative difference?

69. Queue?

70. Formula of count if function?

=if(J3>33,”pass”,”fail”)

71. Evaluation process of determining software product all conditions is


called?
72. System software consists of 2 category operating ____
73. Data privacy is also called__________
74. Software consists of______
75. Symbol (( is the __________operator
76. An array is __________block of data
77. Information privacy risk include__________
78. Redo use by ____option in computer tab.
79. SQL stand for_______
80. Page group option is______
MUHAMMAD IMRAN 8

Downloaded by Hafiz Waseem ([email protected])


lOMoARcPSD|51231286

81. The fourth group of home ribbon is______


82. The transition point is applied between slides of power point text wew copy
temporarily store in____
83. Mass storage have________data type.
84. Pepper robot in Belgian hospital work as a_______
85. Output of =count65`71`89`(A2:A8) is_____
86. Which of the following block element ofHTML _______-
87. _________--encoding use especially as a word press
88. Following option is relational operator
89. Relational operators cannot be used in________
90. Multiple thread programming?
91. Parts of home ribbon?
92. Name of organization system screaming?
93. Full form of LIFO and FIFO?

LIFO(last in – first out) and FIFO( first in- first out)

94. Excel formulas for median maximum and highest?


95. What is SQL in which process it is used?
96. Give two priority of area of P1?
97. GUI abbreviation?
98. Two tables related to MS Excel and MS word?
99. Operating system?
100. Column matching of file manager,dispatchetc?
101. Table of 8 by using C++ language
102. Gramm leach billy act?
103. Three forms of shell?
104. Drop cap from MS Word?
105. Content at the top of every page of document ?
106. Content at the bottom of every page of document?
107. Obstacles?
108. Objects?
109. Variable?
110. Data structure?
111. Array?
112. Arithmetic operator?
113. Relational operator?
114. Requirement analysis?
115. Software engineering?
116. Waterfall model?
117. Software engineering methodology?
118. SLC?
119. Prototyping?
120. Coupling and cohesion?
121. Pareto principle?
122. Documentation type?
123. Copyright and patent law?
124. Node ? types
125. Pointer?

MUHAMMAD IMRAN 9

Downloaded by Hafiz Waseem ([email protected])


lOMoARcPSD|51231286

126. Data base?


127. Schema , sub schema?
128. Information hiding?
129. Design pattern?>
130. Software quality?
131. SQA?
132. Testing?
133. Interaction?
134. Drawbacks of matching geometrical sequence?two examples
135. What is block and inline element in HTML?

BLOCK elements always start after a new line and the content is displayed in the next
line in browser.

Example:<h1>,<p>,<ul>,<table>(will be use in coming section)

Inline elements are usually displayed on the browser without starting a new line

Example:<b>,<td>,<a>,<img>

136. Two points on which NLP statement depends?


137. Describe the events from 1997when database abuse discourage by public
opinion?
138. Abbreviation of PI and EPIC?

PI(privacy international) and EPIC( electronic privacy information center)

139. What is secure version of HTTP?

Hypertext transfer protocol secure(HTTPS) is the secure version of HTTPwhich is the


primary protocol used to send data between a web browser and a wwebsite. HTTP is
encrypted in order to increase security of data transfer.

140. Difference between threads and process?

Process means a program is in execution whereas thread means a segment of a


process.a process is not lightweight, whereas threads are lightweight.a process is
mostly isolated whereas a thread share memory.process does not share data and
thread share data with each other

141. What is stack?


A stack is a list in which entries re inserted and removed only at the head.the tail
of stack is called its bottom or base .inserting a new entry is called pushing an
entry. removing an entry from the top is called popping an entry.note that the last
entry placed on a stack will always be the first entry removed--an observation
that leads to a stack being known as last in first out(LiFO)

142. DOS attack steps?

MUHAMMAD IMRAN 10

Downloaded by Hafiz Waseem ([email protected])


lOMoARcPSD|51231286

Denial of service attack is an attack meant to shut down a machine or network, making
it inaccessible to its intended users.DOS attacks accomplish this by flooding the target
with traffic, or sending it information that triggers a crash

143.

144. (Graphs in module 112,113,114, for mcqs)

MUHAMMAD IMRAN 11

Downloaded by Hafiz Waseem ([email protected])

You might also like