CS101 Introduction to Computing Course Midterm Short Notes and short questions answers

What is a client side script?
It’s a small program that is a part of Webpage and run on the Clients, they interact with the user
to collect information or to accomplish the tasks. When it succeeded to collect the information
they pass the collected information to Server-Side Script.
Reduced Server Load
Reduced Network Traffic
Don’t send incomplete/incorrect/missing data to user’s browser.
Disadvantages:
Don’t work with all Browsers
Scripting may be turn off by user
Increases the complexity of the Webpage.
What is JavaScript?
It’s a programming language and designed to work with browsers developed by Netscape
and designed to develop small program called Client-Side Scripts and that can used in
HTML WebPages. JavaScript is a Case Sensitive language, and it is an interpreted language and
supports Event-Driven programming & it’s also a Object Based.
Some Things That JavaScript Can’t Do:
JavaScript can’t do “Read” “Modify” “Rename” “Delete” “Create”
What Is Object?
It is a named collection of methods and properties.
Types of Object:
There are three types of object
1 JavaScript objects (are part of JavaScript like window, document)
2 Browser objects ( are that objects that contain information about itself)
3 User-defined objects
What Is Method?
Methods are function that are used to manipulate with the Object like (window. close)
Here (window is a Object and close is a Method)
What Is EVENT HANDLERS?
Objects are made up of methods and properties, many object also have event handlers. “Events”
are action that occurs with user interaction with the internet browser.
What Is Programming?
A process in which we tell the computer what needs to be done or what to do.
Types Of Programs:
There are two types of programs
1 Batch Programs
2 Event – Driven Programs
1) Batch Programs:
These program starts automatically via a scheduler like
Initializing the internal data
Reading input data
After reading process that data
After processing print that data
(Important) > No user interaction on those types of programs
2) Event – Driven Programs:
These program starts with user interaction e.g. Microwave Oven, GUIs, Camera
Events that user Does: It’s when user click the mouse button
Things the system itself Does: It’s when system automatically updating the Clock
Loops
Conditions
All Types Of Program Consist Of:
Sequence of instruction
Types Of Programming Languages:
Machine Language (Low Level Programming Language)
Assembly Language
High – level Language (High Level Programming language)
Object Oriented Language
Database Query Language
Procedural Language
Machine Language:
Consist of numbers only & 0s and 1s and this language is not close to human language &
difficult to understand by the computer user. Each type of microprocessor has its own Machine
Language; this is only a language that a computer understands easily without any translation.
Assembly Language:
That type of language that lay between Machine Language and High-Level Language.
In High-Level language you write code in English language. This language is user
friendly, because user can understand the code easily e.g. C++, COBOL, V.B, FORTRAN.
Object Oriented Language:
In object oriented language work is done on the object action, this language is better than
Procedural Language e.g. JAVA, C++.
Database Query Language:
In Database Query Language records are kept in tables permanently and each table is
related with each other e.g. now a days SQL is used for this purpose.
Procedural Language:
In Procedural languages program is written in a sequence e.g. COBOL, FORTRAN.
What Is Compiler?
Compiler is a program that translates the whole program from bottom to top or top to
bottom at a time. It tells you all errors in your program at a time and it is faster than an
interpreter.
What Is Interpreter?
Interpreter is also a translator that translates the program line by line. It doesn’t translate
the whole program at a time. It doesn’t tell all errors in your program but it tells you line by line
and it is slow in speed.
What Is Software Life – Cycle?
It is a sequence of phases we can say that it’s a step of new born to death.
Simple Software Life Cycle:
Concept & Feasibility (what needs to be done, what should be in it, has any scope) User
Requirements (what user want in his website, possible solution needed, lose form) Developer
Specification (how much developer make, structured form) Planning (think & plan that how to
make it) Design (comes after reading developer specification)Implementation (design
is complete now it’s time for coding) Integrating & Testing Operation & Maintenance Retirement
What is Variable?
We can say that Variables are the References of DATA like (x < 6) here x is a Variable.
What is Identifiers?
These are the names used by JavaScript to refer to Variable.
What is JavaScript Literals or JavaScript Data Types?
A data or value that appears directly in a statement and it has several types some are
Numbers (e.g. 24, -32000, 9.230)
String (e.g. “”, “Umer”, “Where is She”) should be matching pair or in single or double quotes.
Booleans
Undefined
Types of Operator:
Arithmetic Operators (e.g. +, -, *, /, %, ^)
Comparison Operator (e.g. a= =b, a!=b, a>b, a>=b, a<b, a<=b,)
Logical Operators (e.g. a && b, !a)
What is Array?
Array is an indexed list of elements; we can say that it is container that holds a value
What is a Pseudo Code?
Pseudo Code consists of short, English phrases used to explain specific tasks within a program's
algorithm.
What is Website Navigation?
The interface/controls that Website provide to the user for accessing the various parts of
Website.
What is Computer Network?
Computer network mean where multiple computers are connected together to share
information.
Components of Computer Network:
Computers
Network interface Cards (NIC) (NIC communicate over a network)
Hub (network traffic controller)
Cables (either electrical or optical)
Protocols (rules governing of communication over a network)
What is Hub?
Hub is a device that is used to connect several computers through a network, it has
several ports, and we can say that Hub is a network traffic controller. E.g. any computer on the
network wants to send message to other computer on the same network first send to Hub, now
Hub broadcast it to specific one.
What is Packet?
Packet is a smallest unit of data that is transmitted over a computer network. Any message that is
transferring over the network is broken into small packets and these packets travel independently
and each packet contains the following information:
Sender’s Address
Destination Address
Error Recovery Information
Types of Computer Network According to the Network Access policy:
There are two types of computer networks according to network access policy.
Private Networks
Public Networks
Virtual Private Network
1. Private Networks: -
Organizations have many computers to connect them on the network, they usually
connect those computers via Private Network and these computers are restricted only authorized
computer access them. The purpose of these computers is to exchange the information to other
computers within the organization and to protect from the outsiders.
2. Public Networks: -
All networks that are not private are Public Networks. The communication
equipment used in these networks is generally used by the user.
3. Virtual Private Network
VPN is a secure, private network. VPN is use for public telecom infrastructure,
maintaining privacy through security procedures.
Types of Computer Networks:
There are three types of computer networks.
LAN (Local Area Network)
WAN (Wide Area Network)
MAN (Metropolitan Area Network)
LAN (Local Area Network):
Local area network is digital communication system in which you can connect a large
number of computers in a limited geographical area. Limited geographical area means less than 1
Km across.
A wide area network is digital communication system; it connects the computer with a
great distance, typically across cities or even countries. E.g. ATM of bank
MAN (Metropolitan Area Network)
MAN is a network that interconnects user with computer resources in geographical area
or region, larger than that covered by a large LAN but the smaller than the area covered by a
WAN.
Connecting LAN to other Network:
There are some devices that connect LAN to other networks, these devices called special
purpose devices.
Routers
Bridges
Gateways
Modems
What is Routers?
Router is special purpose device that control the flow of data or you can say Traffic
Controller and he examines the destination to flow the information on efficient path.
What is Bridges?
Bridge is situated between 2 LAN’s means a separate connection, but similar network and
passes the information through LAN.
What is Gateways?
Gateway is more complex device than Bridge. Gateway is special purpose device that
translate between networks that are using different types of communication protocols.
What is Modem?
Modem is a special purpose device that connects two computers via Telephone line.
Modem stands for modulator or demodulator.
Modulator converts computer messages to electrical pulses (suitable) over a telephone line.
Demodulator converts electrical pulses received over telephone line into messages.
Network Topologies:
There are four types of network topologies.
Star
Ring
Bus
Point-to-Point / Peer-to-Peer
It is designed with each node connected directly to a central network called Hub. Data on star
network passes through the Hub before continuing to its destination. If any of the local
computers fail, the remaining portion of the star network is unaffected. Multiple messages sent
simultaneously on star.
What is Ring Topology?
No server is required. In ring topology, computers are connected on a single circle of cable. It is
more reliable than the star network because communication is not dependent on a single host
computer.
What is Bus Topology?
No server is required for bus topology, in this topology the data or messages sent to one
computer to another computer directly, if any nodes goes down the rest of the network won’t
affected.
What is P2P Topology?
This type of topology is less expensive, have limited connectivity and used to connect
two LANs to form a WAN.
Types of Networking Protocol:
There is two types of networking protocols, these are
Ethernet protocol
Token Ring Protocol
What is Ethernet Protocol?
This type of protocol checks the shared connection before transmitting the message is it
in use or not.
What is Token Ring Protocol?
This protocol passes the special message through network called a Token. When any
computer receives the token has permission to send that packet or token to other one.
Types of Communication Channels:-
Wire (twisted pair, coaxial cable, optical fiber)
Wireless (laser, radio, cellular, satellite)
Key characteristics of these channel is Bandwidth
What is Bandwidth?
Capacity of carrying the data of communication and it is measured in bits e.g. (bps, kb/s,
Mb/s)
What is Internet?
Internet enables to share information with others from all over the world; it is very less
expensive utility and accessible to every humankind. Internet is accessible from every where of
the world and this is fastest growing technology. Internet is for public any one from any where
can access and do anything and intranet is for private, limited access.
What is TCP/IP?
TCP/IP stands for Transmission Control Protocol/Internet Protocol. TCP breaks down the
message to sent over the internet into packets, when message reached to its destination TCP
convert it to its original form.


Tools that are Available on the Internet:
Electronic mail (POP, SMTP) Post Office Protocol, Simple Mail Transfer Protocol
Instant messaging (MSN, YAHOO, ICQ, AOL)
Remote login (Telnet)
File transfer protocol (FTP)
Network news (nntp) Network News Transfer Protocol
World Wide Web (Hyper Text Transfer Protocol) www, http
VOIP (Voice over Internet Protocol)
What is DNS?
Domain Name System is the way where Internet domain names are located & translated
into IP addresses and they get updated continuously.
What is SMTP?
Simple mail transfer protocol is a protocol used to send or receive email messages over a
TCP/IP.
What is POP3?
Post office protocol is used for receiving email messages.
What is VOIP?
Voice over IP is tool, in this we can delivered the voice to one device to another using IP.
Event Handling Functions:
What is Pixel?
Pixel is a smallest image displays on a computer screen. Computer has the ability the change the
color of individual pixel.
What is Dithering?
In this scheme, pixels are used to simulate a color that is not present in the platelet.
What is Aliasing?
Computer screen consist of square-ish pixels & when we draw a single line, they don’t
show the single line show pixels in staircase this is aliasing. Aliasing can be managed by
reducing the size of pixel.
What is Anti – Aliasing?
OnClick
onDblClick
onMouseOver
onMouseDown
onFocus
OnBlur
onReset
onSubmit
onLoad
onUnload
Anti Aliasing is another technique used for managing the “Staircase” effect.
What is Vector or Object Oriented Graphics?
These graphics are independent in resolution, and are in small size, they can be moved
easily can be starched, duplicated, deleted. E.g. (swf, svg, wmf, ps)
What is Bitmapped or Raster Graphics?
These types of graphics are difficult to move, changing the resolution may cause lose some
pixels and these graphics are heavy in size e.g. gif, jpg, bmp
Popular Formats on Web:
Gif (Graphical Interchange Format)
Jpg (Joint Photographic Experts Group)
Swf (Shockwave Flash)
What is (Artificial) Intelligent System?
AI is a system that designed to perform complex task, and might work like human brain.
What is Neural Networks?
Used to make human brain, original inspiration was brain. Now it is use as computational
tool
What is Fuzzy Logic?
Fuzzy logic is a principles of the approximate reasoning and faculty that human faced
with linguistic ambiguity.
What is In-Line JavaScript Event-Handling?
Event handlers placed in the body portion of a webpage in form of HTML tags it has
three types.
Identifier of the event handler
the equal sign
Statement is enclosed with single or double quotes.
What is Data Integrity?
Integrity refers to maintaining the correctness and consistency of the data. Integrity can
compromised in many ways like (Typing errors, Transmission errors, Bugs, Viruses)
Correctness Free from all errors
Consistency No conflicts among related data
Types of Integrity:
There are four types of integrity
Type Integrity (used to specify the data type e.g. credit card 12 number)
Limit Integrity (used to limiting the data to specified ranges e.g. age of person shouldn’t be -ve)
Referential Integrity (used for reference of data that exist in the database)
Physical Integrity (used for backup)
What is DBMS?
Database Management System is SW that operates a database, DBMS take care of the
storage, retrieval, and the management of the data in large sets on a database. DBMS can add,
delete, modify, make queries and produce reports and also summarize the required contents.
Database is a collection of data that is organized in such a fashion that the computer can quickly
search for desired data. Database consists of a collection of interrelated computer files.
What is Relational Database?
Database consists of two or more related tables called relational databases.
What is Primary Key?
Primary key is a field that uniquely identifies the record, stored in a table.
What is Queries?
Queries are used to view, change, and analyze the data; queries can combine the data of
different tables.
What is Forms?
Forms can be used for entering, editing, or viewing the data.
What is Reports?
Reports are user friendly way of presenting the data and it is very effective tool.
What is Data Mining?
Data mining is process of analyzing large database to identify the patterns.
What is Drones?
Drones are computers with weak security schemes that are used by hackers for DoS attack.
What is meant by DOS Attack?
DOS means Denying of Service.
What is Warfare?
Warfare means to disable the enemy this is the main goal of warfare and that goal can be
achieved by killing off the communication systems of the enemy army.
What is Website Spoofing?
Website spoofing is the act of creating a website, as a hoax, with the intention of misleading
readers that the website has been created by a different person or organization. The objective
may be fraudulent, often associated with Pashing or e-mail spoofing. E.g. (give credit card
number to online shopping Website)
What is Viruses?
Viruses itself has no value they attached with other files to make them useless.
Types of Viruses
Malicious (harmful viruses, can destroy the private data and stop to doing useful work)
Neutral (not harmful viruses, just display an annoying message)
What is semantic Web
Semantic Web’s will be designed for computers to understand meaningfully.
Q
What is the problem with Brute Force Strategy approach?
Solution:-
Doesn’t scale well with the size of the problem
Q
What is software design methodology?
Solution:-
The set of (often flexible) rules and guidelines a team of developers follow to construct
reasonably complex SW systems
Q
Brute Force Strategy approach?
Doesn’t scale well with the size of the problem
Q
What is software design methodology?
The set of (often flexible) rules and guidelines a team of developers follow to construct
SW systems. The set of (often flexible) rules and guidelines a team of developers follow to
construct.
Q
What is the name of HTML tag, that has Href attribute and What is the Purpose of Href?
Solution:-
<A HREF = “action” > label </A>
It is used to to create Links between pages, or we can used it as “mailto” function.
Q3
Write three characteristics of JavaScript.
(1) JavaScript has numerous operators, classified in many categories.
(2) Terminate all JavaScript statements with a semicolon. It is not always necessary, but
Highly recommended.
(3) JavaScript ignores any extra white spaces or line breaks that you put in the code
(4) Although JavaScript allows variable declaration, it does not require it - except in the case
Q
Give reasons why we need semantic web?
Solution:-
Whereas, today’s Web’s content is designed for humans to read; the Semantic Web’s content
will be designed for computers to understand meaningfully. However, the
Semantic Web is not a replacement but an extension of the present Web, in which info is given
well defined meaning
Q
What are the two key features of UNDO command in MS-Excel ?
Solution:-
1. Allows you to recover from your mistakes
2. Allows you to experiment without risk Question No: 27 ( Marks: 1 )
What is the Brute Force Strategy?
Answer: A strategy in which all possible combinations are examined and best among them is
selected. Brute force (also known as brute force cracking) is a trial and error method used by
application programs to decode encrypted data such as passwords or Data Encryption
Standard (DES) keys, through exhaustive effort (using brute force) rather than employing
intellectual strategies.
Question No: 28 ( Marks: 1 )
What is java script?
Answer: JavaScript is an object-oriented scripting language used to enable programmatic
access to objects within both the client application and other applications.
It is primarily used in the form of client-side JavaScript, implemented as an integrated
component of the web browser, allowing the development of enhanced user interfaces and
dynamic websites
Question No: 29 ( Marks: 2 )
How can you explain control unit?
Answer: Control unit is a computerized part of the speech processor. Most of the controls,
such as program, volume and sensitivity, are located on the control unit.
Question No: 30 ( Marks: 3 )
How a designer makes Structured Design? Answer: Structured Design: Materials and member
type, size, and configuration to carry loads
in a safe and serviceable fashion.
In general, structural design implies the engineering of stationary objects such as buildings
and bridges, or objects that may be mobile but have a rigid shape such as ship hulls and aircraft
frames tructural design involves at least five distinct phases of work, project requirements,
materials, structural scheme, analysis, and design It is insufficient in most cases, for the designer
to consider a solution, a design. He should evaluate several alternate designs and choose the best
in the sense of maximizing such technical objectives as efficiency, reliability, and maintainability
while satisfying such design constraints as memory size and response time.
Question No: 31 ( Marks: 5 )
What is Turing machine? Who invented it and also explain how a Turing test is conducted?
Answer: A Turing machine is a theoretical device that manipulates symbols contained on a
strip of tape. Despite its simplicity, a Turing machine can be adapted to simulate the logic of
any computer algorithm, and is particularly useful in explaining the functions of a CPU inside
of a computer. The "Turing" machine was designed by Alan Turing in 1937.
The Turing test is a proposal for a test of a machine's ability to demonstrate intelligence. It
proceeds as follows a human judge engages in a natural language conversation with one
human and one machine, each of which tries to appear human. All participants are placed in
isolated locations. If the judge cannot reliably tell the machine from the human, the machine
is said to have passed the test. In order to test the machine's intelligence rather than its ability
to render words into audio, the conversation is limited to a text-only channel such as a
computer keyboard and screen. If a computer pass the test ,we can say that a machine can think.
Question No: 32 ( Marks: 5 )
What are JavaScript literal and what are its types?
Answer: The raw data that make up the root of data types are called "literals." These are, in
effect, literally what they represent themselves to be. Numbers, strings, and Boolean values
make up the core set of literals in JavaScript. Little mystery exists with literals, but important
differences exist between them. In JavaScript, data types include strings, which are simply
quoted characters, numbers, Boolean, Objects and even a type which has no value at all, Null.
Since JavaScript is a loosely typed language, you don't necessarily need to know what type of
data every value is (although it certainly helps).
Every piece of data in these categories is known as a value. When a value is referred to
outright in a statement, it is called a literal value. For the same reason people are identified by
names as opposed to "human" or "person", literal values can be named in order to make
repeated reference to them practical, efficient and readable. These names are called variables.
Literals can be of several types. Some of them are:
Array Literals
Boolean Literals
Floating-Point Literals
Integers
Object Literals
String Literals


Define URL
URL(Uniform resource locator)
URL (Uniform Resource Locator, previously Universal Resource Locator) - is the
address of a file (resource) accessible on the Internet. The type of file or
resource depends on the Internet application protocol.
Examples of URLs: http://vu.edu.pk
Question No: 28 ( Marks: 1 )
What is Randomized Algorithm?
Randomized Algorithm:
Any algorithm whose behavior is not only determined by the input, but also values produced by
a random number generator These algorithms are often simpler and more efficient than
deterministic algorithms for the same problem. And because of their simplicity they are easier to
analyze which is the most important thing in the decision making of an algorithm.
Question No: 29 ( Marks: 2 )
What was the name of first super computer. When it was introduced?
CRAY1 is the first computer and it was introduced in 1973
Question No: 30 ( Marks: 3 )
How a designer makes Structured Design?
Structured Design is known as a Top-down design.
The designed first conceives about the High level design and then further
designs the details of the high level design components and it goes on and on.
Making small changes in the functionality of the systems sometimes leads to
major re-design exercise. Structured design separates the functionality from
programs data and that’s why program’s designed by this methodology are
difficult to maintain.
Question No: 31 ( Marks: 5 )
Why microprocessor uses the binary number system and not the decimal or any
other number system?
The processor is the logic of a computer and functions comparably to a human central nervous
system, directing signals from one component to another and enabling everything to happen. A
microprocessor is made from miniaturized transistors and other circuit elements on a single
semiconductor integrated circuit (IC) . These are made up of semiconductor and silicon.
Microprocessors are composed of components which has only two states either 0 or 1. Binary
number system is also composed of these two states. Microprocessor till today only understand
the machine language and machine language is only based on binary number system. Even
today’s 64 bit microprocessors are also based on this technology.
Question No: 32 ( Marks: 5 )
Why do we need an Interactive Form in a webpage?
1. Interactive forms are used to gather user data and interact with the user.
2. Forms can be made interactive with the use of client side scripting and server
side sciprting.
3. In HTML, <FORM> </FORM> tag is used to insert the form in a web page and it
always lie in <BODY></BODY> html tag.
4. without form’s web site is only “READ ONLY”.
5. with the help of forms a user and can search the contents, place order for goods
and services.
6. Forms can be simple or very complex, based on the requirement.
7. forms can contain a single element or many e.g text area, buttons
Question No: 27 ( Marks: 1 )
What is the key feature of batch programs?
Batch files are useful for running a sequence of executables automatically
Question No: 28 ( Marks: 1 )
13. Name two languages which are used for client side scripting?
JAVASCRIPPT /NETSCAPE
What is the purpose of MODEM?
THE PURPOSE OF MODEM IS MODULATE AND DEMODULATE THE ELECTRONIC
ANALOG PULSES OF THE COMPUTER TO PULSES THE PHONE SYSTEM M CAN HANDEL.
21. Question No: 30 ( Marks: 3 )
What is Home Page of a web site?
The pages of a website can usually be accessed from a simple Uniform
Resource Locator (URL) called the homepage. The URLs of the pages
organize them into a hierarchy, although hyper linking between them
conveys the reader's perceived site structure and guides the reader's
navigation of the sit
34. Question No: 32 (Marks: 5)
What is the difference between Interactive-mode and Batch-mode Application?
Software?
Batch files are useful for running a sequence of executables automatically and are often
used by system administrators to automate tedious processes while interactive mode
applications attract the attention of user this kind of applications cannot execute until
User have interest to execute and complete the process.
Question No: 27 ( Marks: 1 )
What is the key feature of object-oriented design?
ANSWER: The key feature of object-oriented design is that it treats everything as object having
Properties and methods. These objects are separately treated and designed and once designed
it can be used in any other system. So once designed can be used many times.
Question No: 28 ( Marks: 1 )
Write one purpose of using spreadsheets?
ANSWERS: Purpose of spreadsheets is that it can do calculations on data accurately.
Question No: 29 ( Marks: 2 )
List down two advantages of writing Pseudo Code
Answers: The advantages of pseudo code are:
• It is quite similar to human language so easy to understand.
• It is close to real code so easy to write real code from it.
Question No: 30 ( Marks: 3 )
How can we calculate total number of rows in the truth table?
ANSWER: The formula for calculating number of rows in truth table is 2
n
Where n = number of inputs
Question No: 31 ( Marks: 5 )
Differentiate between Vector graphics and Bit-mapped graphics.
ANSWER:
VECTOR GRAPHICS
1. Treat everything as an object
2. Is resolution independent
3. Relatively small size
4. Example: Corel Draw
BIT MAPPED IMAGES
1. Treats everything as a bit map.
2. Resolution dependent
3. Large files
4. Example: Microsoft Paint
Question No: 32 ( Marks: 5 )
Write differences between Shareware and trail ware software.
ANSWER:
SHAREWARE
1. These are shared freely.
2. It is given without payment ahead of
time.
TRIALWARE
1. Software is offered for a trial period.
2. When the period is expired it is no
more in use.
Question No: 31 ( Marks: 1 )
What does TCP/IP stand for?
Transmission Control Protocol
Question No: 32 ( Marks: 1 )
Why there is a need to use primary key in database?
Primary Key is a field that uniquely identifies each record stored in a table
Question No: 33 ( Marks: 2 )
What is image processing ?
Image Processing:
A branch of computer science concerned with manipulating and enhancing computer
graphics
Question No: 34 ( Marks: 2 )
Define testing with respect to programming..
Testing: The tasks performed to determine the existence of defects
Question No: 36 ( Marks: 3 )
What is difference between Design and System Architecture?
A collection of elements which working together produces a result not achieved by the things
alone System Architecture The structure (in terms of components, connections, constraints) of a
product or a process
Question No: 37 ( Marks: 3 )
Write JavaScript code to convert the number 236.2363611111556 into currency format and
JavaScript statement to show output.
a = 236.2363611111556;
b = a.toString( ) ;
decimalPos = b.indexOf( ".", 0 ) ;
c = b.substring( 0, decimalPos + 3 ) ;
document.write( c ) ;
Question No: 39 ( Marks: 5 )
What is a Relational Database? Give the names of any three RDBMS software. (2+3)
Relational Databases
• Databases consisting of two or more related tables are called relational databases
• A typical relational database may have anywhere from 10 to over a thousand tables
• Each column of those tables can contain only a single type of data (contrast this
with spreadsheet columns!)
• Table rows are called records; row elements are called fields
• A relational database stores all its data inside tables, and nowhere else
• All operations on data are done on those tables or those that are generated by table
operations
• Tables, tables, and nothing but tables!
RDBMS
• Relational DBMS software
• Contains facilities for creating, populating, modifying, and querying relational
databases
• Examples:
–Access
–FileMaker Pro
–SQL Server
–Oracle
Question No: 27 ( Marks: 1 )
What is the Brute Force Strategy?
Answer:. A strategy in which all possible combinations are examined and best among them is
selected. Brute force (also known as brute force cracking) is a trial and error method used by
application programs to decode encrypted data such as passwords or Data Encryption Standard
(DES) keys, through exhaustive effort (using brute force) rather than employing intellectual
strategies.
Question No: 28 (Marks: 1)
What is java script?
Answer: JavaScript is an object-oriented scripting language used to enable programmatic access
to objects within both the client application and other applications. It is primarily used in the
form of client-side JavaScript, implemented as an integrated component of the web browser,
allowing the development of enhanced user interfaces and dynamic websites

Post a Comment

Previous Post Next Post