1. Write a note on other virus like programs (10)
Answer:
Other Virus-Like Programs
• There are other computer programs that are similar to viruses in some ways but different in some
others
• Three types:
– Trojan horses
– Logic- or time-bombs
– Worms
Trojan Horses
• Unlike viruses, they are stand-alone programs
• The look like what they are not
• They appear to be something interesting and harmless (e.g. a game) but when they are executed,
destruction results
Logic- or Time-Bombs
• It executes its payload when a predetermined event occurs
• Example events:
• A particular word or phrase is typed
– A particular date or time is reached
Worms
• Harmless in the sense that they only make copies of themselves on the infected computer
• Harmful in the sense that it can use up available computer resources (i.e. memory, storage,
processing), making it slow or even completely useless
Designing, writing, or propagating malicious code or participating in any of the fore-mentioned activities
can result in criminal prosecution, which in turn, may lead to jail terms and fines!
2. What is holographic storage? (2 marks)
Answer:
Holographic storage:
Holographic data storage is a potential replacement technology in the area of
high-capacity data storage currently dominated by magnetic and conventional optical data
storage.
3. What is semantic web and how is it different from normal web? (2
marks)
Answer:
Symantec Web:
The Semantic Web is the future generation in WWW technology. It envisages
information from diverse sources being easily combined and used in profoundly different
and more powerful ways.
4. Write the types of computer networks? (2 marks)
Answer:
Types of Computer Networks according to the network access policy
• Private
• Public
5. What are structured vector graphics? (3 marks)
Answer:
Structured Vector Graphics
• New format; may become more popular than Flash
• Plug-in required
• Text-file storage; search engine friendly
6. What is in line java script event handling? (5 marks)
Answer:
In-Line JavaScript Event Handling:
Event handlers are placed in the BODY portion of a Web page as attributes of HTML
Tags
The event handler attribute consists of 3 parts:
The identifier of the event handler
The equal sign
A string consisting of JavaScript statements enclosed in double or single quotes
Multiple JavaScript statements (separated by semicolons) can be placed in that string, but
All have to fit in a single line; no new line characters are allowed in that string
Due to this limitation, sophisticated event handling is not possible with in-line event
Handling
Ppaer#2 CS101 (Solved)
1. Define the term 3D Rendering? (2 marks)
Answer:
3D Rendering:
The process of converting information about 3D objects into a bit map that can be
displayed on a 2D computer display
Computationally, very expensive!
Steps:
Draw the wire-frame (skeleton, made with thin lines)
Fill with colors, textures, patterns
Add lighting effects (reflections shadows)
2. What is an intelligent system? (2 marks)
Answer:
Intelligent system:
SW programs or SW/HW systems designed to perform complex tasks employing
strategies that mimic some aspect of human thought.
3. What is a compiler? Write its one benefit over interpreter? (5 marks)
Answer:
Compiler:
Compiler translates the program written in a HLL in one go. The translated code
is then used by the up whenever the program needs to be run.
To run a program you've written, e.g. in JAVA, it must first be translated into machine
code so the computer can read it. This is what compilers and interpreters do.
However, compilers convert the code all at once, save it, and then run it; whereas
interpreters translate the code one line at a time, as it is run.
Interpreters tend to result in faster translating of code so they are used mostly for
debugging. This is because if you used a compiler, you'd have to re-compile your entire
project every time you changed one little thing.
4. Who is a computing professional? (3 marks)
Answer:
Computing professional
• Computer scientists, software engineers, computer engineers, and some of the
Telecom engineers are generally classified as computing professionals.
Download Complete file Click here to download
Answer:
Other Virus-Like Programs
• There are other computer programs that are similar to viruses in some ways but different in some
others
• Three types:
– Trojan horses
– Logic- or time-bombs
– Worms
Trojan Horses
• Unlike viruses, they are stand-alone programs
• The look like what they are not
• They appear to be something interesting and harmless (e.g. a game) but when they are executed,
destruction results
Logic- or Time-Bombs
• It executes its payload when a predetermined event occurs
• Example events:
• A particular word or phrase is typed
– A particular date or time is reached
Worms
• Harmless in the sense that they only make copies of themselves on the infected computer
• Harmful in the sense that it can use up available computer resources (i.e. memory, storage,
processing), making it slow or even completely useless
Designing, writing, or propagating malicious code or participating in any of the fore-mentioned activities
can result in criminal prosecution, which in turn, may lead to jail terms and fines!
2. What is holographic storage? (2 marks)
Answer:
Holographic storage:
Holographic data storage is a potential replacement technology in the area of
high-capacity data storage currently dominated by magnetic and conventional optical data
storage.
3. What is semantic web and how is it different from normal web? (2
marks)
Answer:
Symantec Web:
The Semantic Web is the future generation in WWW technology. It envisages
information from diverse sources being easily combined and used in profoundly different
and more powerful ways.
4. Write the types of computer networks? (2 marks)
Answer:
Types of Computer Networks according to the network access policy
• Private
• Public
5. What are structured vector graphics? (3 marks)
Answer:
Structured Vector Graphics
• New format; may become more popular than Flash
• Plug-in required
• Text-file storage; search engine friendly
6. What is in line java script event handling? (5 marks)
Answer:
In-Line JavaScript Event Handling:
Event handlers are placed in the BODY portion of a Web page as attributes of HTML
Tags
The event handler attribute consists of 3 parts:
The identifier of the event handler
The equal sign
A string consisting of JavaScript statements enclosed in double or single quotes
Multiple JavaScript statements (separated by semicolons) can be placed in that string, but
All have to fit in a single line; no new line characters are allowed in that string
Due to this limitation, sophisticated event handling is not possible with in-line event
Handling
Ppaer#2 CS101 (Solved)
1. Define the term 3D Rendering? (2 marks)
Answer:
3D Rendering:
The process of converting information about 3D objects into a bit map that can be
displayed on a 2D computer display
Computationally, very expensive!
Steps:
Draw the wire-frame (skeleton, made with thin lines)
Fill with colors, textures, patterns
Add lighting effects (reflections shadows)
2. What is an intelligent system? (2 marks)
Answer:
Intelligent system:
SW programs or SW/HW systems designed to perform complex tasks employing
strategies that mimic some aspect of human thought.
3. What is a compiler? Write its one benefit over interpreter? (5 marks)
Answer:
Compiler:
Compiler translates the program written in a HLL in one go. The translated code
is then used by the up whenever the program needs to be run.
To run a program you've written, e.g. in JAVA, it must first be translated into machine
code so the computer can read it. This is what compilers and interpreters do.
However, compilers convert the code all at once, save it, and then run it; whereas
interpreters translate the code one line at a time, as it is run.
Interpreters tend to result in faster translating of code so they are used mostly for
debugging. This is because if you used a compiler, you'd have to re-compile your entire
project every time you changed one little thing.
4. Who is a computing professional? (3 marks)
Answer:
Computing professional
• Computer scientists, software engineers, computer engineers, and some of the
Telecom engineers are generally classified as computing professionals.
Download Complete file Click here to download
0 comments:
Post a Comment