COMPUTER SCIENCE
QUESTIONS BASED ON 1 MARKS
FOR EXAM.
1. Answer the following
a. Name the protocol which transfers encrypted data instead
of plain.
b. What is inner loop?
c. What is WinSCP?
d. What is SMTP?
a.
e. What is called recursive function?
f. It is a communication protocol that is primarily use for
establishing communication between computer over computer network? What is it
called?
f. A network device that crates a wireless network.
g. Protocol design for addressing packets.
h. It is an exit control loop.
i. It is used for repeated execution of a set of statement
in a program.
j. A sequence of characters that refers to a wireless local
area network.
k. Processing and converting
information or data into a code.
l. it is a library function that
returns the length of the string.
m. it is used for repeated
execution of a set of statements in a program. Loop
n. it is an exit control loop. do
while.
o. it is a numerical label that is assigned to network
devices to identify them uniquely. IP address
p. it is a set of well- established
rules that determine how two computer communicate or transfer data between
them. Protocol
q. it is a process of converting information or data into a code, to prevent unauthorized access. Encryption.
2. Fill in the blanks
a. The tag used to draw a horizontal
line across the web page. <HR> tag
b. tag indicates the beginning
and end of the HTML document. <HTML> tag
c. The collection of similar data
items. ARRAY
d. Attribute used only <OL>
START or REVERSED
e. The network that offers a
network range of 10m from the central device.PAN
f. tag use to define the style
for a single HTML page. Internal CSS
g. It is a unique identifier assigned
to NIC. MAC Address
h. Protocol designed for receiving
incoming E-Mail. POP
i. the length of IPV4 is 36 bits.
j. Base address is address of the
first element of an array.
k. A string
is defined as an array of characters.
l. The index of the first element
in an array is 0 by default.
m. the string.h header file
supports many library function for performing operations on string.
2. Choose the correct options:
a. Which is one of the following is not a rule for naming a
table in MySQL.
i) A table name cannot have more than 30 characters.
ii) A table name should begin with alphabets.
iii) Reserved words are not allowed
iv) The special character underscore is not allowed.
b. The condition in the do-while loop is evaluated.
i) After the execution of statements.
ii) Before the execution of statements.
iii) Both (i) and (ii) are true.
iv) None of these
c. The length of IPV6 is
i) 32 bits
ii) 4 bit
iii) 64 bits
iv) 128 bits
d. IP address can be automatically assigned if the network
is connected with
i) Access point
ii) Mail Serve
iii) Web Server
iv) DHCP server
e. Which element contain definition.
i) <dl>
ii) <dd>
iii) <dt>
iv) <ul>
f. The command
used to display the table structure is
i) DISPLAY
ii) STRUCTURE
iii) DESCRIBE
iv) UPDATE
g. __ tag is used to create textbox, radio button and checkbox
on the web page
i) <OPTION>
ii) <INPUT>
iii) Both of these
iv) None of these
h. Which loop is guaranteed to execute at least one time.
i) For
ii) While
iii) do while
iv) None of these
h. which is the command used to verify the connectivity
between two computers?
i) ping
ii) ipconfig
iii) arp
iv) hostname
k. which is the largest type of computer network?
i) PAN
ii) LAN
iii) MAN
iv) WAN
Table of Content
0 Comments