Skip to main content

CS101 Quiz No.2 Shared by Hina Ghumam, Spring 2014



Question # 1 of 10 ( Start time: 08:41:10 PM )
Total Marks: 1
Which attribute/attributes will we use to limit the capacity of a text box to 20 characters?
Select correct option:





Question # 2 of 10 ( Start time: 08:42:24 PM )
Total Marks: 1
Assume that we want to create a text box which is invisible from the user and should only be used to provide data to the web server. Which of the following attribute will be used to make it invisible?
Select correct option:




Question # 3 of 10 ( Start time: 08:43:34 PM )
Total Marks: 1
___________ feature allows you to recover from your mistakes.
Select correct option:




Question # 4 of 10 ( Start time: 08:43:57 PM )
Total Marks: 1
____________ converts human readable instructions into machine readable instructions.
Select correct option:





Question # 5 of 10 ( Start time: 08:45:11 PM )
Total Marks: 1
Algorithm is a precise sequence of a limited number of ___________ , ___________steps that terminates in the form of a solution
Select correct option:




Question # 6 of 10 ( Start time: 08:46:26 PM )
Total Marks: 1
To select a single option from multiple options we use __________ control.
Select correct option:




Question # 7 of 10 ( Start time: 08:47:23 PM )
Total Marks: 1
In which of the following operating systems the availability of sufficient and separate resources is ensured for various users simultaneously:
Select correct option:






Top of Form
Question # 8 of 10 ( Start time: 08:48:45 PM )
Total Marks: 1
_____________ helps in finding synonyms as well as antonyms in Word Processors
Select correct option:




Top of Form


Question # 9 of 10 ( Start time: 08:49:37 PM )
Total Marks: 1
Greedy algorithms are usually faster, since they don't consider the details of possible alternatives
Select correct option:




Top of Form

Question # 10 of 10 ( Start time: 08:50:45 PM )
Total Marks: 1
Which one of the following Operating Systems has highest security ?
Select correct option:



Comments

Popular posts from this blog

CS614 Quiz No.4 Shared by Princess (solved), Spring 2014

  “What means What”. The phrase refers to: Select correct option:  Meta data  External data Transformed data Internal representations Question # 2 of 10 Which of the following is NOT one of the activities of “Maintenance and Growth” phase in Kimball’s DWH development approach? Select correct option: Education Technical Education Program Support  Interface Deployment                 Question # 3 of 10 Horizontally wide data means: Select correct option: Dataset has large no. of attributes Dataset has large no. of records Dataset has attribute skews Dataset has partitioning skews                 Question # 4 of 10 Which of the following is NOT one of the top-10 mistakes that should be avoided during DWH development? Select correct option: Not interacting directly with end user Not being an accommodating person Isolating IT support people from business users Training the users with dummy data and considering it success             

CS502 Quiz No.4 File 3

There is relationship between number of back edges and number of cycles in DFS Select correct option: Both are equal. Cycles are half of back edges.   Cycles are one fourth of back edges. There is no relationship between back edges and number of cycles .         (Correct) In strong components algorithm, the form of graph is used in which all the vertices of original graph G have been reversed in direction. Select correct option: True                 (Correct)   False In Kruskal's algorithm, the next edge is added to viable set A, if its adding does not induce a/an __________ . Select correct option: Vertex Edge   Cycle               (Correct)   Tree For undirected graph, there is no distinction between forward and back edges. Select correct option: True                 (Correct)   False You have an adjacency list for G, what is the time complexity to compute Graph transpose G^T ? Select correct option: (V+E)             (Corre

CS301 Quiz No.2 Shared by Tayyeba

Binary search algorithm can not be applied to ____ Select correct option: sorted linked list sorted binary trees        ok sorted linear array pointer array During in-order traversal using recursive calls, if we found a node is NULL. It means this node will satisfy following condition. Select correct option: It will not have left child        ok It will not have right child It will not have both left and right children None of given options Identify the data structure which allows deletions at both ends of the list but insertion at only one end. Select correct option: Input-restricted deque Output-restricted deque Priority queues        ok A BST generated from the data in ascending order is ____________. Select correct option: Linear Nonlinear Balanced        ok Un sorted In a program a reference variable, say x, can be declared as Select correct option: int &x ;        ok int *x ; int x ; None of the given options he depth of a complete bina