Band Baja Baraat - HD Full Hindi Movie part 15
Monday, February 28, 2011
Naina Thag lain ge.wmv
Patiala House Part 1 HQ Hindi Movie Akshay Kumar
Uploaded by findyaar. - Classic TV and last night's shows, online.
India unveils $30 tablet PC (Android) - India's iPad
Super Bowl 2011 Halftime Show - Black Eyed Peas [HQ]
maa baap ko dekh kar bacha darr gaya hai
Saturday, February 26, 2011
Beutifull Sidra in bhakkar with Shaher YAr
Wednesday, February 23, 2011
Aref Ghafouri-Yetenek sizsiniz Turkiye yari final
Tuesday, February 22, 2011
"Rocketeer" - Far East Movement (ft. Jake Bruene)
Monday, February 21, 2011
Pitbull - I Know You Want Me (Calle Ocho) OFFICIAL VIDEO
Sunday, February 20, 2011
Loading...
Pulp & Paper News Service Breaking news for the global pulp & paper industry -- try it freewww.risiinfo.comFree Downloadable Videos Download The Most Viewed End Time Free Bible Prophecy Videos Online!www.WorldsLastChance.com/VideosÖztaş Packaging Paper packaging, paper bag, and twisted handle paper bag producer.www.oztasambalaj.com.tr
Britney Spears - Hold It Against Me
Saturday, February 19, 2011
LADY GAGA - Born This Way (Cover)
Friday, February 18, 2011
Diddy - Dirty Money - I Hate That You Love Me
Thursday, February 17, 2011
WWE Raw 2/14/11 The Rock Returns Part 2/2
Wednesday, February 16, 2011
Funny Videos/ Creative Ads Collection Part 4
Tuesday, February 15, 2011
X-Men: First Class - Official Trailer
Saturday, February 12, 2011
My today CS101 Paper Feb. 2011 final term.
Friday, February 11, 2011
My today CS101 Paper Feb. 2011 final term.
total Qs...52
MCQs....40
short Qs,....12
what is database??? (2)
what is trojan horse??? (3)
flow chart is a form of algorithem....explain???? (2)
what is program methodology>??? (2)
3D rendering??? (2)
what do u mean by FTP???? (3)
user requirements in software lifestyle??? (3)
who is computer professional??? (3)
what are ordered lists??? give codes with tabular representation??? (5)
duty n profit for an architect?? (5)
function argguments??? (5)
aik java ki coding ka tha,,,,, (5)...[wo yaad nahi]
my todays cs101 paper
what is URL?
what are the qualities of a presentation?
what is FTP?
what is IT its fields?
difference between database and DBMS?
whats the function of print preview?
g ye mera paper hai :
WHy we use javascript?
write names of phases of DoS attack.
Errors occur in developing program? write names
in which situation we use inline event handling?
what are the properties , method and event handling of image java script?
write names of 5 key characteristics of internet?
A ⊕ B = A'.B' + A'.B wrong or right? prove it by truth table..
why we use string function in javascript?
What is the mistake in the following coding
student=new array(10)
Local and global variable?
baki yad nahi
Write the names of DOS attack. 2Marks
Write html format to include GIF and JPG images in webpage 2Marks
Differentiate between <td> and <tr> tags 2 Marks
Who array are implemented in java script 2 Marks
Who we can define pixel 3 marks
What is the preferred organizational structure for the organization 3Marks
Differentiate between onFocus and onBlur 3 Marks
What are three basic components of system softwere 3 Marks
Advantages and disadvantages of client-side scripting 5Marks
Briefly describe for layout of presentation 5Marks
Who many members are there in business development team? briefly describe the responsibilities and profile of their 5Marks
Explain the function of ‘+’ operator with the help of example 5 Marks
Why we use string functions in JavaScript?
Explain function arguments with the help of an example?
Write the steps to sort an un-sorted list.
Discuss any two situations which show non-ethical behavior?
. Define the anchor tag with the help of example.
What are Trojan Horses ?
What Is the resturction to use in line in a function
Define anchor tag
Write down three advantages of using Functions in a program.
In JavaScript, what is event handling? What are the two types of events?
What is the mistake in the following coding
Student=new array(10)
Aik bhool gaya Question....... 40 Mcqs thae ... 12 S.Q
MCQs....40
short Qs,....12
what is database??? (2)
what is trojan horse??? (3)
flow chart is a form of algorithem....explain???? (2)
what is program methodology>??? (2)
3D rendering??? (2)
what do u mean by FTP???? (3)
user requirements in software lifestyle??? (3)
who is computer professional??? (3)
what are ordered lists??? give codes with tabular representation??? (5)
duty n profit for an architect?? (5)
function argguments??? (5)
aik java ki coding ka tha,,,,, (5)...[wo yaad nahi]
my todays cs101 paper
what is URL?
what are the qualities of a presentation?
what is FTP?
what is IT its fields?
difference between database and DBMS?
whats the function of print preview?
g ye mera paper hai :
WHy we use javascript?
write names of phases of DoS attack.
Errors occur in developing program? write names
in which situation we use inline event handling?
what are the properties , method and event handling of image java script?
write names of 5 key characteristics of internet?
A ⊕ B = A'.B' + A'.B wrong or right? prove it by truth table..
why we use string function in javascript?
What is the mistake in the following coding
student=new array(10)
Local and global variable?
baki yad nahi
Write the names of DOS attack. 2Marks
Write html format to include GIF and JPG images in webpage 2Marks
Differentiate between <td> and <tr> tags 2 Marks
Who array are implemented in java script 2 Marks
Who we can define pixel 3 marks
What is the preferred organizational structure for the organization 3Marks
Differentiate between onFocus and onBlur 3 Marks
What are three basic components of system softwere 3 Marks
Advantages and disadvantages of client-side scripting 5Marks
Briefly describe for layout of presentation 5Marks
Who many members are there in business development team? briefly describe the responsibilities and profile of their 5Marks
Explain the function of ‘+’ operator with the help of example 5 Marks
Why we use string functions in JavaScript?
Explain function arguments with the help of an example?
Write the steps to sort an un-sorted list.
Discuss any two situations which show non-ethical behavior?
. Define the anchor tag with the help of example.
What are Trojan Horses ?
What Is the resturction to use in line in a function
Define anchor tag
Write down three advantages of using Functions in a program.
In JavaScript, what is event handling? What are the two types of events?
What is the mistake in the following coding
Student=new array(10)
Aik bhool gaya Question....... 40 Mcqs thae ... 12 S.Q
most of the MCQ's are from past papers. Please read all the past solved MCQ's and you will 40 out of 40 for sure.
what is event handler explain. write two types of event handler
What is programming methodology
What is computer screen, explain
what is Turing Machine? explain how its works
Explain why global variable is better than local variable (question was something like that)
What is Relational Database, give two example of RDBMS
Write down the five advantages of multimedia presentation
there was one question regarding teamload, I guess it was like write down the responsibilities of teamload
don't remember the rest.
Best of luck for your papers
what is event handler explain. write two types of event handler
What is programming methodology
What is computer screen, explain
what is Turing Machine? explain how its works
Explain why global variable is better than local variable (question was something like that)
What is Relational Database, give two example of RDBMS
Write down the five advantages of multimedia presentation
there was one question regarding teamload, I guess it was like write down the responsibilities of teamload
don't remember the rest.
Best of luck for your papers
Why we use string functions in JavaScript?
Explain function arguments with the help of an example?
Write the steps to sort an un-sorted list.
Discuss any two situations which show non-ethical behavior?
. Define the anchor tag with the help of example.
What are Trojan Horses ?
What Is the resturction to use in line in a function
Define anchor tag
Write down three advantages of using Functions in a program.
In JavaScript, what is event handling? What are the two types of events?
What is the mistake in the following coding
Student=new array(10)
Aik bhool gaya Question....... 40 Mcqs thae ... 12 S.Q
Explain function arguments with the help of an example?
Write the steps to sort an un-sorted list.
Discuss any two situations which show non-ethical behavior?
. Define the anchor tag with the help of example.
What are Trojan Horses ?
What Is the resturction to use in line in a function
Define anchor tag
Write down three advantages of using Functions in a program.
In JavaScript, what is event handling? What are the two types of events?
What is the mistake in the following coding
Student=new array(10)
Aik bhool gaya Question....... 40 Mcqs thae ... 12 S.Q
...............
Another Paper:
ths z my tioday papr of cs101 11.02.2011......10.30am
The mcqz were of 40 marks and he long n short mixed question were of 40 marks. Total paper was of 80 marks and timing of my paper was 2 hours means 120 minutes.
I don't remember all the questions but those which I know I m going to share with you dear fellows.
1. What is an intelligent system? (2 marks)
2. What is spread sheet? Write two jobs of spread sheet? (3 marks)
3. What are the arguments of a function? Explain with an example? (5 marks)
4. What are Trojan horses? (3 marks)
5. What are semantic errors? (2 marks)
6. If you are going to work on a big project then make a heuristic chart for this? (5 marks)
7. Write the names of the errors that are found during developing a program? (2 marks)
8. Write the properties of u useful web? (5 marks)
9. What do you mean by FTP? (2 marks)
The mcqz were of 40 marks and he long n short mixed question were of 40 marks. Total paper was of 80 marks and timing of my paper was 2 hours means 120 minutes.
I don't remember all the questions but those which I know I m going to share with you dear fellows.
1. What is an intelligent system? (2 marks)
2. What is spread sheet? Write two jobs of spread sheet? (3 marks)
3. What are the arguments of a function? Explain with an example? (5 marks)
4. What are Trojan horses? (3 marks)
5. What are semantic errors? (2 marks)
6. If you are going to work on a big project then make a heuristic chart for this? (5 marks)
7. Write the names of the errors that are found during developing a program? (2 marks)
8. Write the properties of u useful web? (5 marks)
9. What do you mean by FTP? (2 marks)
.................
Another Paper:
Write the names of DOS attack. 2Marks
Write html format to include GIF and JPG images in webpage 2Marks
Differentiate between <td> and <tr> tags 2 Marks
Who array are implemented in java script 2 Marks
Who we can define pixel 3 marks
What is the preferred organizational structure for the organization 3Marks
Differentiate between onFocus and onBlur 3 Marks
What are three basic components of system softwere 3 Marks
Advantages and disadvantages of client-side scripting 5Marks
Briefly describe for layout of presentation 5Marks
Who many members are there in business development team? briefly describe the responsibilities and profile of their 5Marks
Explain the function of '+' operator with the help of example 5 Marks
Write html format to include GIF and JPG images in webpage 2Marks
Differentiate between <td> and <tr> tags 2 Marks
Who array are implemented in java script 2 Marks
Who we can define pixel 3 marks
What is the preferred organizational structure for the organization 3Marks
Differentiate between onFocus and onBlur 3 Marks
What are three basic components of system softwere 3 Marks
Advantages and disadvantages of client-side scripting 5Marks
Briefly describe for layout of presentation 5Marks
Who many members are there in business development team? briefly describe the responsibilities and profile of their 5Marks
Explain the function of '+' operator with the help of example 5 Marks
...............
Another Paper:
1. What is a software? Give one example. (2)
2. Write names of DoS attack phases. (2)
3. Why we need Arrays in javascript? (2)
4. Event handeler attribute consists of three steps. Write about each of them. (3)
5. What is meaning of abr. AFU and ALU, whats difference between them? (3)
6. What is dilemma of computing? (5)
7. What steps involve in working of TCP/IP protocol in internet transmission? (5)
8. Write steps to sort an unsorted list. (5)
9. Definefunction, Write atleast three advantages of function.(5)
2. Write names of DoS attack phases. (2)
3. Why we need Arrays in javascript? (2)
4. Event handeler attribute consists of three steps. Write about each of them. (3)
5. What is meaning of abr. AFU and ALU, whats difference between them? (3)
6. What is dilemma of computing? (5)
7. What steps involve in working of TCP/IP protocol in internet transmission? (5)
8. Write steps to sort an unsorted list. (5)
9. Definefunction, Write atleast three advantages of function.(5)
total Qs...52
MCQs....40
short Qs,....12
what is database??? (2)
what is trojan horse??? (3)
flow chart is a form of algorithem....explain???? (2)
what is program methodology>??? (2)
3D rendering??? (2)
what do u mean by FTP???? (3)
user requirements in software lifestyle??? (3)
who is computer professional??? (3)
what are ordered lists??? give codes with tabular representation??? (5)
duty n profit for an architect?? (5)
function argguments??? (5)
aik java ki coding ka tha,,,,, (5)...[wo yaad nahi]
MCQs....40
short Qs,....12
what is database??? (2)
what is trojan horse??? (3)
flow chart is a form of algorithem....explain???? (2)
what is program methodology>??? (2)
3D rendering??? (2)
what do u mean by FTP???? (3)
user requirements in software lifestyle??? (3)
who is computer professional??? (3)
what are ordered lists??? give codes with tabular representation??? (5)
duty n profit for an architect?? (5)
function argguments??? (5)
aik java ki coding ka tha,,,,, (5)...[wo yaad nahi]
The mcqz were of 40 marks and he long n short mixed question were of 40 marks. Total paper was of 80 marks and timing of my paper was 2 hours means 120 minutes.
I don’t remember all the questions but those which I know I m going to share with you dear fellows.
1. What is an intelligent system? (2 marks)
2. What is spread sheet? Write two jobs of spread sheet? (3 marks)
3. What are the arguments of a function? Explain with an example? (5 marks)
4. What are Trojan horses? (3 marks)
5. What are semantic errors? (2 marks)
6. If you are going to work on a big project then make a heuristic chart for this? (5 marks)
7. Write the names of the errors that are found during developing a program? (2 marks)
8. Write the properties of u useful web? (5 marks)
9. What do you mean by FTP? (2 marks)
-------------------------------------------
- What is an intelligent system? (2 marks)
- What is spread sheet? Write two jobs of spread sheet? (3 marks)
- What are the arguments of a function? Explain with an example? (5 marks)
- What are Trojan horses? (3 marks)
- What are semantic errors? (2 marks)
- If you are going to work on a big project then make a heuristic chart for this? (5 marks)
- Write the names of the errors that are found during developing a program? (2 marks)
- Write the properties of u useful web? (5 marks)
- What do you mean by FTP? (2 marks)
* *
*Total 52 Question:*
*40 MCQ’s*
*12 Subjective.*
* *
*7 remember me so I write down & left I forget*
* *
* *
*What is database? 2 *
* *
*What is Good Programming Methodology? 2*
* *
*Difference global variable is better than local variable? 3*
* *
*Difference Logic- or time-bombs 3*
* *
*Use of Simple Mail Transfer Protocol? 3*
* *
*who is computer professional 3***
* *
*Difference between ALU & FLU 5*
* *
*Why the trend of short term working, Explain? 5*
Question # 1 of 10 (
Start time: 01:58:03 AM )
Total Marks: 1
In a System having many parts to be designed, one should always do the _____ first.
Select correct option:
Simple part
Development part
Quality part
None of the given
What step\steps is\are not correct in following sorting algorithm? Step 1 Repeat the following steps while the list is sorted: Step 2 Start with the first object in the list Step 3 Swap it with the one next to it if they are in the correct order Step 4 Repeat the same with the next to the first object Step 5 Keep on repeating until you reach the last object in the list
Select correct option:
Step 1
Step 3 and Step 2
Step 4
Step 1 and Step 3
Question # 3 of 10 (
Start time: 02:00:06 AM )
Total Marks: 1
In programming Software methodology ____________ is also called top down design.
Select correct option:
Object oriented design
Structured design
Flow Chart design
Use case design
Question # 4 of 10 (
Start time: 02:00:41 AM )
Total Marks: 1
Good navigation should be invisible until it is
Select correct option:
Clicked
Browsed
Wanted
Searched
Objects are modified with ______ that are associated with that object – e.g. a resize a Window with resizeTo(150, 200)
Select correct option:
Properties
Events
Methods
All of the above
Question # 6 of 10 (
Start time: 02:03:39 AM )
Total Marks: 1
A data value that appears directly in a statement is known as _________
Select correct option:
Numeric Literals
String Literals
JavaScript Literals
None of the given
Question # 7 of 10 (
Start time: 02:05:00 AM )
Total Marks: 1
______ are names used by JavaScript to refer to variables.
Select correct option:
Identifiers
Constants
Objects
None of the given
Question # 8 of 10 (
Start time: 02:05:51 AM )
Total Marks: 1
A ________ and set of ____________ for instructing a computer to perform a specific task is called programming Language.
Select correct option:
Vocabulary, grammatical rules
Sequence, related
Vocabulary, Instructions
All of above
Question # 9 of 10 (
Start time: 02:06:43 AM )
Total Marks: 1
Detailed plan of SW life cycle specifies two things that are the ____________
Select correct option:
Required resources and expected cost
Expected cost and budget
Required resources and expected deliverables
Time and cost
Question # 10 of 10 (
Start time: 02:07:30 AM )
Total Marks: 1
In Analysis of Algorithms ________ generally measured in terms of the number of steps required to execute an algorithm
Select correct option:
Bandwidth
Time
Memory
Logic functions
Question # 1 of 10 ( Start time: 04:51:38 PM ) Total Marks: 1
Which of the following keyword is used to jump out of switch statement as soon as a match is found?
Select correct option:
default
else
jump
break
Question # 2 of 10 ( Start time: 04:53:01 PM ) Total Marks: 1
Algorithm is a ____________________
Select correct option:
Definition of a problem
Sequence of steps to solve a problem
Understanding of a problem
Solving a problem
Question # 3 of 10 ( Start time: 04:54:09 PM ) Total Marks: 1
Which one of the following is NOT considered as element of website design?
Select correct option:
Overall look and feel
Navigation structure
Web page structure
Information layout
Question # 4 of 10 ( Start time: 04:55:17 PM ) Total Marks: 1
Decompose the problem into subsystems and define their relationships is done in __________ phase
Select correct option:
User requirement
Planning
Integration testing
None of above
Question # 5 of 10 ( Start time: 04:56:47 PM ) Total Marks: 1
During one of the international cricket tournaments, one of the teams intentionally lost a match, so that they could qualify for the next round If they had won that particular match, some other team would have qualified This is an example of a _________________
Select correct option:
Greedy algorithm
Non-greedy algorithm
Question # 6 of 10 ( Start time: 04:57:45 PM ) Total Marks: 1
All problems can be solved by must employing all of the following building blocks Sequences Conditionals Loops
Select correct option:
True
False
Question # 7 of 10 ( Start time: 04:58:58 PM ) Total Marks: 1
In SW life cycle Developer analyses users requirement, performs further investigation, and produces ___________specifications
Select correct option:
Ambiguous
Unambiguous
Final
Initial
Question # 8 of 10 ( Start time: 05:00:22 PM ) Total Marks: 1
Rule of thumb learned through trial and error is called ___________.
Select correct option:
Aim
Plan
Heuristic
Design
Question # 9 of 10 ( Start time: 05:01:00 PM ) Total Marks: 1
In JavaScript operators operate on _________
Select correct option:
Constants
Variables
Operands
None of the given
Question # 10 of 10 ( Start time: 05:01:34 PM ) Total Marks: 1
Let the decimal number be an integer x, x > 0 Let the binary equivalent be an empty string y Repeat while x > 0 { Determine the quotient & remainder of x ÷ 2 y = CONCATENATE( remainder, y ) x = quotient } Print y Stop Above is an example of ____________
Select correct option:
Actual Code
Pseudo Code
Flow Chart
None of the above
Question # 1 of 10 ( Start time: 04:51:38 PM ) Total Marks: 1
Which of the following keyword is used to jump out of switch statement as soon as a match is found?
Select correct option:
default
else
jump
break
Question # 2 of 10 ( Start time: 04:53:01 PM ) Total Marks: 1
Algorithm is a ____________________
Select correct option:
Definition of a problem
Sequence of steps to solve a problem
Understanding of a problem
Solving a problem
Question # 3 of 10 ( Start time: 04:54:09 PM ) Total Marks: 1
Which one of the following is NOT considered as element of website design?
Select correct option:
Overall look and feel
Navigation structure
Web page structure
Information layout
Question # 4 of 10 ( Start time: 04:55:17 PM ) Total Marks: 1
Decompose the problem into subsystems and define their relationships is done in __________ phase
Select correct option:
User requirement
Planning
Integration testing
None of above
Question # 5 of 10 ( Start time: 04:56:47 PM ) Total Marks: 1
During one of the international cricket tournaments, one of the teams intentionally lost a match, so that they could qualify for the next round If they had won that particular match, some other team would have qualified This is an example of a _________________
Select correct option:
Greedy algorithm
Non-greedy algorithm
Question # 6 of 10 ( Start time: 04:57:45 PM ) Total Marks: 1
All problems can be solved by must employing all of the following building blocks Sequences Conditionals Loops
Select correct option:
True
False
Question # 7 of 10 ( Start time: 04:58:58 PM ) Total Marks: 1
In SW life cycle Developer analyses users requirement, performs further investigation, and produces ___________specifications
Select correct option:
Ambiguous
Unambiguous
Final
Initial
Question # 8 of 10 ( Start time: 05:00:22 PM ) Total Marks: 1
Rule of thumb learned through trial and error is called ___________.
Select correct option:
Aim
Plan
Heuristic
Design
Question # 9 of 10 ( Start time: 05:01:00 PM ) Total Marks: 1
In JavaScript operators operate on _________
Select correct option:
Constants
Variables
Operands
None of the given
Question # 10 of 10 ( Start time: 05:01:34 PM ) Total Marks: 1
Let the decimal number be an integer x, x > 0 Let the binary equivalent be an empty string y Repeat while x > 0 { Determine the quotient & remainder of x ÷ 2 y = CONCATENATE( remainder, y ) x = quotient } Print y Stop Above is an example of ____________
Select correct option:
Actual Code
Pseudo Code
Flow Chart
None of the above
Question # 1 of 10 ( Start time: 03:41:34 PM ) Total Marks: 1
In spreadsheets, cell address B10 means _______.
Select correct option:
Row B, Cloumn 10
Row 10, Cloumn B
Row 1,Cloumn B10
Row B1, Cloumn 1
Question # 2 of 10 ( Start time: 03:42:32 PM ) Total Marks: 1
In Algorithms semantic correctness is easier to check as compared with Syntactic
Select correct option:
True
False
Question # 3 of 10 ( Start time: 03:43:50 PM ) Total Marks: 1
Greedy algorithms are usually faster, since they don't consider the details of possible alternatives
Select correct option:
True
False
Question # 4 of 10 ( Start time: 03:45:03 PM ) Total Marks: 1
The process that can be used to solve a problem is termed as the ______________
Select correct option:
Use Case
Protocol
Algorithm
Flow Diagram
Question # 5 of 10 ( Start time: 03:45:47 PM ) Total Marks: 1
_______ give us the ability to manipulate data through reference instead of actual value.
Select correct option:
Constants
Variables
Both of the given
None of the given
Question # 6 of 10 ( Start time: 03:46:35 PM ) Total Marks: 1
All problems can be solved by must employing all of the following building blocks Sequences Conditionals Loops
Select correct option:
True
False
Question # 7 of 10 ( Start time: 03:47:48 PM ) Total Marks: 1
Which of the following is incorrect for making design elements legible?
Select correct option:
Elements should be large enough
Elements must contrast sufficiently
Related elements should be visually grouped
Elements should have no visual focus
Question # 8 of 10 ( Start time: 03:49:16 PM ) Total Marks: 1
Objects are modified with ______ that are associated with that object – e.g. a resize a Window with resizeTo(150, 200)
Select correct option:
Properties
Events
Methods
All of the above
Question # 9 of 10 ( Start time: 03:49:55 PM ) Total Marks: 1
Small programs that are a part of the Web page and run on the user’s (client’s) computer are called ______
Select correct option:
Client side Scripts
Server Side Scri
Question # 10 of 10 ( Start time: 03:50:21 PM ) Total Marks: 1
What step\steps is\are not correct in following sorting algorithm? Step 1 Repeat the following steps while the list is sorted: Step 2 Start with the first object in the list Step 3 Swap it with the one next to it if they are in the correct order Step 4 Repeat the same with the next to the first object Step 5 Keep on repeating until you reach the last object in the list
Select correct option:
Step 1
Step 3 and Step 2
Step 4
Step 1 and Step 3
Question # 1 of 10 ( Start time: 04:11:58 PM ) Total Marks: 1
A strategy in which all possible combinations are examined and the best among them is Selected is called _________ Strategy
Select correct option:
Heuristic
Deterministic
Randomization
Brute Force
Question # 2 of 10 ( Start time: 04:12:28 PM ) Total Marks: 1
Which of the following is incorrect for making design elements legible?
Select correct option:
Elements should be large enough
Elements must contrast sufficiently
Related elements should be visually grouped
Elements should have no visual focus
Question # 3 of 10 ( Start time: 04:13:41 PM ) Total Marks: 1
Heuristics are used because they
Select correct option:
Always give the best results
Mostly gives good-enough results
Don’t give wrong results
Are commonly used as rule of thumb
Question # 4 of 10 ( Start time: 04:14:42 PM ) Total Marks: 1
No user interaction with the computer while the program is running, these type of programs are called _________
Select correct option:
Non User Programs
Interactive Programs
Event-Driven Programs
Batch Programs
Question # 5 of 10 ( Start time: 04:15:56 PM ) Total Marks: 1
According to a popular heuristic, success is defined by ___________.
Select correct option:
The user
The builder
Both user and builder
None of the given options
Question # 6 of 10 ( Start time: 04:17:30 PM ) Total Marks: 1
Objects are modified with ______ that are associated with that object – e.g. a resize a Window with resizeTo(150, 200)
Select correct option:
Properties
Events
Methods
All of the above
Question # 7 of 10 ( Start time: 04:18:11 PM ) Total Marks: 1
Rule of thumb learned through trial and error is called ___________.
Select correct option:
Aim
Plan
Heuristic
Design
Question # 8 of 10 ( Start time: 04:18:44 PM ) Total Marks: 1
___________ Contains information not about the contents of the display, but the browser itself.
Select correct option:
JavaScript Objects
User-defined Objects
Browser Objects
None of the given
Question # 9 of 10 ( Start time: 04:19:58 PM ) Total Marks: 1
Good design should assist the user in
Select correct option:
Getting results
Searching
Recovering from errors
Reading the information
Question # 10 of 10 ( Start time: 04:20:49 PM ) Total Marks: 1
The heuristic “Programmers deliver the same number of Line of Code” suggests that programmer should use ___________ .
Select correct option:
The lowest level language
The middle level language
The highest level language
Any programming language
Question # 1 of 10 ( Start time: 04:23:09 PM ) Total Marks: 1
In Goal Seek there will be _____ boxes to fill in.
Select correct option:
One
Two
Three
Four
Question # 2 of 10 ( Start time: 04:23:31 PM ) Total Marks: 1
______ are names used by JavaScript to refer to variables.
Select correct option:
Identifiers
Constants
Objects
None of the given
Question # 3 of 10 ( Start time: 04:24:03 PM ) Total Marks: 1
The __________ reserved word allows a determined action to be taken if the first condition is false.
Select correct option:
Switch
Else
While
For
Question # 4 of 10 ( Start time: 04:25:15 PM ) Total Marks: 1
_____________ loop is a flow control statement that allows code to be executed repeatedly based on a given Boolean condition.
Select correct option:
For
Do-While
If-else
While
Question # 5 of 10 ( Start time: 04:26:27 PM ) Total Marks: 1
Heuristics are used because they
Select correct option:
Always give the best results
Mostly gives good-enough results
Don’t give wrong results
Are commonly used as rule of thumb
Question # 6 of 10 ( Start time: 04:27:07 PM ) Total Marks: 1
In partitioning of program/module, it should be assured that partitioned chunks should be as _________ as possible.
Select correct option:
Dependent
Independent
Complex
All of the given
Question # 7 of 10 ( Start time: 04:28:00 PM ) Total Marks: 1
_______ / / /______/ A Parallelogram (Tilted rectangle) represents the ________________ flow chart element.
Select correct option:
Process
Input or Output
Decision
Connector
Question # 8 of 10 ( Start time: 04:28:45 PM ) Total Marks: 1
Avoid lines of type shorter than ____ characters and longer than ____ characters.
Select correct option:
40,60
30,60
20,30
None of the given
Question # 9 of 10 ( Start time: 04:29:09 PM ) Total Marks: 1
How many iterations would this "for" loop runs. for ( x = 6000 ; x > 0 ; x = x - 1 ) { document.write ( x ) ; }
Select correct option:
5900
6000
6001
None of the given
Question # 10 of 10 ( Start time: 04:30:08 PM ) Total Marks: 1
Rule of thumb learned through trial and error is called ___________.
Select correct option:
Aim
Plan
Heuristic
Design
Question # 1 of 10 ( Start time: 01:58:03 AM ) Total Marks: 1
In a System having many parts to be designed, one should always do the _____ first.
Select correct option:
Simple part
Development part
Quality part
None of the given
What step\steps is\are not correct in following sorting algorithm? Step 1 Repeat the following steps while the list is sorted: Step 2 Start with the first object in the list Step 3 Swap it with the one next to it if they are in the correct order Step 4 Repeat the same with the next to the first object Step 5 Keep on repeating until you reach the last object in the list
Select correct option:
Step 1
Step 3 and Step 2
Step 4
Step 1 and Step 3
Question # 3 of 10 ( Start time: 02:00:06 AM ) Total Marks: 1
In programming Software methodology ____________ is also called top down design.
Select correct option:
Object oriented design
Structured design
Flow Chart design
Use case design
Question # 4 of 10 ( Start time: 02:00:41 AM ) Total Marks: 1
Good navigation should be invisible until it is
Select correct option:
Clicked
Browsed
Wanted
Searched
Objects are modified with ______ that are associated with that object – e.g. a resize a Window with resizeTo(150, 200)
Select correct option:
Properties
Events
Methods
All of the above
Question # 6 of 10 ( Start time: 02:03:39 AM ) Total Marks: 1
A data value that appears directly in a statement is known as _________
Select correct option:
Numeric Literals
String Literals
JavaScript Literals
None of the given
Question # 7 of 10 ( Start time: 02:05:00 AM ) Total Marks: 1
______ are names used by JavaScript to refer to variables.
Select correct option:
Identifiers
Constants
Objects
None of the given
Question # 8 of 10 ( Start time: 02:05:51 AM ) Total Marks: 1
A ________ and set of ____________ for instructing a computer to perform a specific task is called programming Language.
Select correct option:
Vocabulary, grammatical rules
Sequence, related
Vocabulary, Instructions
All of above
Question # 9 of 10 ( Start time: 02:06:43 AM ) Total Marks: 1
Detailed plan of SW life cycle specifies two things that are the ____________
Select correct option:
Required resources and expected cost
Expected cost and budget
Required resources and expected deliverables
Time and cost
Question # 10 of 10 ( Start time: 02:07:30 AM ) Total Marks: 1
In Analysis of Algorithms ________ generally measured in terms of the number of steps required to execute an algorithm
Select correct option:
Bandwidth
Time
Memory
Logic functions
Zombie Love Song - (Your Favorite Martian music video)
pakistnai officer dabangg
Thursday, February 10, 2011
.Pakistani dabangg
2 dabangg2.amir khan.
2 dabangg2.amir khan.
Fanny.bmp
Wednesday, February 9, 2011
The question first: how do i stop this virus infecting my computer? (I mean other than installing an anti-virus program. I'm looking for a solution that involves setting registry keys, applying patches, etc).
The details:
We all know about those common autorun.inf viruses. You plug in the USB thumbdrive, autorun.inf executes, launches the virus, and infects the PC. All without the user having to double click on the virus to "install it". The solution is also clear, apply the patches, turn off autorun and autoplay.
I've recently encountered another virus. You insert the USB thumbdrive, the computer gets infected. Even when the patches has been applied, and autorun and autoplay has been turned off. The weirdest thing of all is, there is in fact no autorun.inf on the root of the infected USB drive. Instead, they contain these files
__d__.lnk
__e__.lnk
__f__.lnk
__g__.lnk
__h__.lnk
__i__.lnk
__j__.lnk
fanny.bmp
The last one has the System and Hidden attribute (+S +H) turned on, but not the others. Once the computer is infected, windows explorer don't see this files anymore. But they're still there, just use attrib or dir from the cmd.exe command prompt.
Put in the usb drive, start up windows explorer, look at the directory listing, and a minute later, your computer is infected. It's easy to tell which computer is infected. Just look for mscorwin.dll in c:\windows\system32 (it's +s +h). If anyone wants to try it, the virus is attached, just unzip and copy to the root of your usb drive. It goes without saying, be careful. (I have not explored how to remove the virus. I just restore a backup copy of drive c:).
How is this virus launching and infecting the computer? Via the plug and play service? What's the significance of all those *.lnk files?
attrib -h -r -s c:\awda2.exe
attrib -h -r -s c:\ravmon.exe
attrib -h -r -s c:\autorun.inf
attrib -h -r -s c:\ntde1ect.com
attrib -h -r -s c:\svichossst.exe
attrib -h -r -s c:\svichosst.exe
attrib -h -r -s c:\windows\svchost.exe
attrib -h -r -s c:\windows\svichosst.exe
attrib -h -r -s c:\windows\system32\svichossst.exe
attrib -h -r -s c:\windows\system32\svichosst.exe
attrib -h -r -s c:\windows\system32\avpo.exe
attrib -h -r -s c:\windows\Rvhost.exe
attrib -h -r -s c:\windows\system32\Rvhost.exe
attrib -h -r -s c:\windows\svichossst.exe
attrib -h -r -s c:\xo8wr9.exe
attrib -h -r -s c:\1dg.exe
attrib -h -r -s c:\v.exe
attrib -h -r -s c:\tel.exe
attrib -h -r -s c:\__d__.lnk
attrib -h -r -s c:\__e__.lnk
attrib -h -r -s c:\__f__.lnk
attrib -h -r -s c:\__g__.lnk
attrib -h -r -s c:\__h__.lnk
attrib -h -r -s c:\__i__.lnk
attrib -h -r -s c:\__j__.lnk
attrib -h -r -s c:\__k__.lnk
attrib -h -r -s c:\Windows\System32\__d__.lnk
attrib -h -r -s c:\Windows\System32\__e__.lnk
attrib -h -r -s c:\Windows\System32\__f__.lnk
attrib -h -r -s c:\Windows\System32\__g__.lnk
attrib -h -r -s c:\Windows\System32\__h__.lnk
attrib -h -r -s c:\Windows\System32\__i__.lnk
attrib -h -r -s c:\Windows\System32\__j__.lnk
attrib -h -r -s c:\Windows\System32\__k__.lnk
attrib -h -r -s c:\fanny.bmp
attrib -h -r -s d:\svichosst.exe
attrib -h -r -s d:\xo8wr9.exe
attrib -h -r -s d:\awda2.exe
attrib -h -r -s d:\ravmon.exe
attrib -h -r -s d:\autorun.inf
attrib -h -r -s d:\ntde1ect.com
attrib -h -r -s d:\svchost.exe
attrib -h -r -s d:\svichossst.exe
attrib -h -r -s d:\1dg.exe
attrib -h -r -s d:\v.exe
attrib -h -r -s d:\tel.exe
attrib -h -r -s d:\__d__.lnk
attrib -h -r -s d:\__e__.lnk
attrib -h -r -s d:\__f__.lnk
attrib -h -r -s d:\__g__.lnk
attrib -h -r -s d:\__h__.lnk
attrib -h -r -s d:\__i__.lnk
attrib -h -r -s d:\__j__.lnk
attrib -h -r -s d:\__k__.lnk
attrib -h -r -s d:\fanny.bmp
attrib -h -r -s e:\svichosst.exe
attrib -h -r -s e:\xo8wr9.exe
attrib -h -r -s e:\awda2.exe
attrib -h -r -s e:\ravmon.exe
attrib -h -r -s e:\autorun.inf
attrib -h -r -s e:\ntde1ect.com
attrib -h -r -s e:\svichossst.exe
attrib -h -r -s e:\1dg.exe
attrib -h -r -s e:\v.exe
attrib -h -r -s e:\tel.exe
attrib -h -r -s e:\__d__.lnk
attrib -h -r -s e:\__e__.lnk
attrib -h -r -s e:\__f__.lnk
attrib -h -r -s e:\__g__.lnk
attrib -h -r -s e:\__h__.lnk
attrib -h -r -s e:\__i__.lnk
attrib -h -r -s e:\__j__.lnk
attrib -h -r -s e:\__k__.lnk
attrib -h -r -s e:\fanny.bmp
attrib -h -r -s f:\svichosst.exe
attrib -h -r -s f:\xo8wr9.exe
attrib -h -r -s f:\awda2.exe
attrib -h -r -s f:\ravmon.exe
attrib -h -r -s f:\autorun.inf
attrib -h -r -s f:\ntde1ect.com
attrib -h -r -s f:\svichossst.exe
attrib -h -r -s f:\1dg.exe
attrib -h -r -s f:\v.exe
attrib -h -r -s f:\tel.exe
attrib -h -r -s f:\__d__.lnk
attrib -h -r -s f:\__e__.lnk
attrib -h -r -s f:\__f__.lnk
attrib -h -r -s f:\__g__.lnk
attrib -h -r -s f:\__h__.lnk
attrib -h -r -s f:\__i__.lnk
attrib -h -r -s f:\__j__.lnk
attrib -h -r -s f:\__k__.lnk
attrib -h -r -s f:\fanny.bmp
attrib -h -r -s g:\svichosst.exe
attrib -h -r -s g:\xo8wr9.exe
attrib -h -r -s g:\awda2.exe
attrib -h -r -s g:\ravmon.exe
attrib -h -r -s g:\autorun.inf
attrib -h -r -s g:\ntde1ect.com
attrib -h -r -s g:\svichossst.exe
attrib -h -r -s g:\1dg.exe
attrib -h -r -s g:\v.exe
attrib -h -r -s g:\tel.exe
attrib -h -r -s f:\__d__.lnk
attrib -h -r -s g:\__e__.lnk
attrib -h -r -s g:\__f__.lnk
attrib -h -r -s g:\__g__.lnk
attrib -h -r -s g:\__h__.lnk
attrib -h -r -s g:\__i__.lnk
attrib -h -r -s g:\__j__.lnk
attrib -h -r -s g:\__k__.lnk
attrib -h -r -s g:\fanny.bmp
attrib -h -r -s h:\svichosst.exe
attrib -h -r -s h:\xo8wr9.exe
attrib -h -r -s h:\awda2.exe
attrib -h -r -s h:\svichossst.exe
attrib -h -r -s h:\ravmon.exe
attrib -h -r -s h:\autorun.inf
attrib -h -r -s h:\ntde1ect.com
attrib -h -r -s h:\1dg.exe
attrib -h -r -s h:\v.exe
attrib -h -r -s h:\tel.exe
attrib -h -r -s f:\__d__.lnk
attrib -h -r -s h:\__e__.lnk
attrib -h -r -s h:\__f__.lnk
attrib -h -r -s h:\__g__.lnk
attrib -h -r -s h:\__h__.lnk
attrib -h -r -s h:\__i__.lnk
attrib -h -r -s h:\__j__.lnk
attrib -h -r -s h:\__k__.lnk
attrib -h -r -s h:\fanny.bmp
attrib -h -r -s i:\svichosst.exe
attrib -h -r -s i:\xo8wr9.exe
attrib -h -r -s i:\awda2.exe
attrib -h -r -s i:\ravmon.exe
attrib -h -r -s i:\autorun.inf
attrib -h -r -s i:\ntde1ect.com
attrib -h -r -s i:\svichossst.exe
attrib -h -r -s i:\1dg.exe
attrib -h -r -s i:\v.exe
attrib -h -r -s i:\tel.exe
attrib -h -r -s i:\__d__.lnk
attrib -h -r -s i:\__e__.lnk
attrib -h -r -s i:\__f__.lnk
attrib -h -r -s i:\__g__.lnk
attrib -h -r -s i:\__h__.lnk
attrib -h -r -s i:\__i__.lnk
attrib -h -r -s i:\__j__.lnk
attrib -h -r -s i:\__k__.lnk
attrib -h -r -s i:\fanny.bmp
attrib -h -r -s j:\svichosst.exe
attrib -h -r -s j:\xo8wr9.exe
attrib -h -r -s j:\awda2.exe
attrib -h -r -s j:\ravmon.exe
attrib -h -r -s j:\autorun.inf
attrib -h -r -s j:\ntde1ect.com
attrib -h -r -s j:\svichossst.exe
attrib -h -r -s j:\1dg.exe
attrib -h -r -s j:\v.exe
attrib -h -r -s j:\tel.exe
attrib -h -r -s j:\__d__.lnk
attrib -h -r -s j:\__e__.lnk
attrib -h -r -s j:\__f__.lnk
attrib -h -r -s j:\__g__.lnk
attrib -h -r -s j:\__h__.lnk
attrib -h -r -s j:\__i__.lnk
attrib -h -r -s j:\__j__.lnk
attrib -h -r -s j:\__k__.lnk
attrib -h -r -s j:\fanny.bmp
attrib -h -r -s k:\svichosst.exe
attrib -h -r -s k:\xo8wr9.exe
attrib -h -r -s k:\awda2.exe
attrib -h -r -s k:\ravmon.exe
attrib -h -r -s k:\autorun.inf
attrib -h -r -s k:\ntde1ect.com
attrib -h -r -s k:\svichossst.exe
attrib -h -r -s k:\1dg.exe
attrib -h -r -s k:\v.exe
attrib -h -r -s k:\tel.exe
attrib -h -r -s k:\__d__.lnk
attrib -h -r -s k:\__e__.lnk
attrib -h -r -s k:\__f__.lnk
attrib -h -r -s k:\__g__.lnk
attrib -h -r -s k:\__h__.lnk
attrib -h -r -s k:\__i__.lnk
attrib -h -r -s k:\__j__.lnk
attrib -h -r -s k:\__k__.lnk
attrib -h -r -s k:\fanny.bmp
del c:\xo8wr9.exe
del c:\awda2.exe
del c:\ravmon.exe
del c:\windows\mdm.exe
del c:\autorun.inf
del c:\ntde1ect.com
del c:\svichossst.exe
del c:\windows\Rvhost.exe
del c:\windows\system32\Rvhost.exe
del c:\windows\svichosst.exe
del c:\windows\svichossst.exe
del c:\windows\system32\svichosst.exe
del c:\windows\system32\svichossst.exe
del c:\windows\system32\avpo.exe
del c:\windows\svchost.exe
del c:\windows\system32\svchost.exe
del c:\1dg.exe
del c:\v.exe
del c:\tel.exe
del c:\__d__.lnk
del c:\__e__.lnk
del c:\__f__.lnk
del c:\__g__.lnk
del c:\__h__.lnk
del c:\__i__.lnk
del c:\__j__.lnk
del c:\__k__.lnk
del c:\fanny.bmp
del c:\tel.exe
del c:\Windows\System32\__d__.lnk
del c:\Windows\System32\__e__.lnk
del c:\Windows\System32\__f__.lnk
del c:\Windows\System32\__g__.lnk
del c:\Windows\System32\__h__.lnk
del c:\Windows\System32\__i__.lnk
del c:\Windows\System32\__j__.lnk
del c:\Windows\System32\__k__.lnk
del d:\xo8wr9.exe
del d:\awda2.exe
del d:\windows\mdm.exe
del d:\windows\svchost.exe
del d:\ravmon.exe
del d:\autorun.inf
del d:\ntde1ect.com
del d:\svichossst.exe
del d:\svichosst.exe
del d:\1dg.exe
del d:\v.exe
del d:\tel.exe
del d:\__d__.lnk
del d:\__e__.lnk
del d:\__f__.lnk
del d:\__g__.lnk
del d:\__h__.lnk
del d:\__i__.lnk
del d:\__j__.lnk
del d:\__k__.lnk
del d:\fanny.bmp
del e:\svichosst.exe
del e:\xo8wr9.exe
del e:\awda2.exe
del e:\ravmon.exe
del e:\autorun.inf
del e:\ntde1ect.com
del e:\svichossst.exe
del e:\1dg.exe
del e:\v.exe
del e:\tel.exe
del e:\__d__.lnk
del e:\__e__.lnk
del e:\__f__.lnk
del e:\__g__.lnk
del e:\__h__.lnk
del e:\__i__.lnk
del e:\__j__.lnk
del e:\__k__.lnk
del e:\fanny.bmp
del f:\svichosst.exe
del f:\xo8wr9.exe
del f:\awda2.exe
del f:\ravmon.exe
del f:\autorun.inf
del f:\ntde1ect.com
del f:\svichossst.exe
del f:\1dg.exe
del f:\v.exe
del f:\tel.exe
del f:\__d__.lnk
del f:\__e__.lnk
del f:\__f__.lnk
del f:\__g__.lnk
del f:\__h__.lnk
del f:\__i__.lnk
del f:\__j__.lnk
del f:\__k__.lnk
del f:\fanny.bmp
del g:\svichosst.exe
del g:\xo8wr9.exe
del g:\awda2.exe
del g:\ravmon.exe
del g:\autorun.inf
del g:\ntde1ect.com
del g:\svichossst.exe
del g:\1dg.exe
del g:\v.exe
del g:\tel.exe
del g:\__d__.lnk
del g:\__e__.lnk
del g:\__f__.lnk
del g:\__g__.lnk
del g:\__h__.lnk
del g:\__i__.lnk
del g:\__j__.lnk
del g:\__k__.lnk
del g:\fanny.bmp
del h:\svichosst.exe
del h:\xo8wr9.exe
del h:\awda2.exe
del h:\ravmon.exe
del h:\autorun.inf
del h:\ntde1ect.com
del h:\svichossst.exe
del h:\1dg.exe
del h:\v.exe
del h:\tel.exe
del h:\__d__.lnk
del h:\__e__.lnk
del h:\__f__.lnk
del h:\__g__.lnk
del h:\__h__.lnk
del h:\__i__.lnk
del h:\__j__.lnk
del h:\__k__.lnk
del h:\fanny.bmp
del i:\svichosst.exe
del i:\xo8wr9.exe
del i:\awda2.exe
del i:\ravmon.exe
del i:\autorun.inf
del i:\ntde1ect.com
del i:\svichossst.exe
del i:\1dg.exe
del i:\v.exe
del i:\tel.exe
del i:\__d__.lnk
del i:\__e__.lnk
del i:\__f__.lnk
del i:\__g__.lnk
del i:\__h__.lnk
del i:\__i__.lnk
del i:\__j__.lnk
del i:\__k__.lnk
del i:\fanny.bmp
del j:\svichosst.exe
del j:\xo8wr9.exe
del j:\awda2.exe
del j:\ravmon.exe
del j:\autorun.inf
del j:\ntde1ect.com
del j:\svichossst.exe
del j:\1dg.exe
del j:\v.exe
del j:\tel.exe
del j:\__d__.lnk
del j:\__e__.lnk
del j:\__f__.lnk
del j:\__g__.lnk
del j:\__h__.lnk
del j:\__i__.lnk
del j:\__j__.lnk
del j:\__k__.lnk
del j:\fanny.bmp
del k:\svichosst.exe
del k:\xo8wr9.exe
del k:\awda2.exe
del k:\ravmon.exe
del k:\autorun.inf
del k:\ntde1ect.com
del k:\svichossst.exe
del k:\1dg.exe
del k:\v.exe
del k:\tel.exe
del k:\__d__.lnk
del k:\__e__.lnk
del k:\__f__.lnk
del k:\__g__.lnk
del k:\__h__.lnk
del k:\__i__.lnk
del k:\__j__.lnk
del k:\__k__.lnk
del k:\fanny.bmp
If you understand then its okay otherwise comment me i will tell you
The details:
We all know about those common autorun.inf viruses. You plug in the USB thumbdrive, autorun.inf executes, launches the virus, and infects the PC. All without the user having to double click on the virus to "install it". The solution is also clear, apply the patches, turn off autorun and autoplay.
I've recently encountered another virus. You insert the USB thumbdrive, the computer gets infected. Even when the patches has been applied, and autorun and autoplay has been turned off. The weirdest thing of all is, there is in fact no autorun.inf on the root of the infected USB drive. Instead, they contain these files
__d__.lnk
__e__.lnk
__f__.lnk
__g__.lnk
__h__.lnk
__i__.lnk
__j__.lnk
fanny.bmp
The last one has the System and Hidden attribute (+S +H) turned on, but not the others. Once the computer is infected, windows explorer don't see this files anymore. But they're still there, just use attrib or dir from the cmd.exe command prompt.
Put in the usb drive, start up windows explorer, look at the directory listing, and a minute later, your computer is infected. It's easy to tell which computer is infected. Just look for mscorwin.dll in c:\windows\system32 (it's +s +h). If anyone wants to try it, the virus is attached, just unzip and copy to the root of your usb drive. It goes without saying, be careful. (I have not explored how to remove the virus. I just restore a backup copy of drive c:).
How is this virus launching and infecting the computer? Via the plug and play service? What's the significance of all those *.lnk files?
attrib -h -r -s c:\awda2.exe
attrib -h -r -s c:\ravmon.exe
attrib -h -r -s c:\autorun.inf
attrib -h -r -s c:\ntde1ect.com
attrib -h -r -s c:\svichossst.exe
attrib -h -r -s c:\svichosst.exe
attrib -h -r -s c:\windows\svchost.exe
attrib -h -r -s c:\windows\svichosst.exe
attrib -h -r -s c:\windows\system32\svichossst.exe
attrib -h -r -s c:\windows\system32\svichosst.exe
attrib -h -r -s c:\windows\system32\avpo.exe
attrib -h -r -s c:\windows\Rvhost.exe
attrib -h -r -s c:\windows\system32\Rvhost.exe
attrib -h -r -s c:\windows\svichossst.exe
attrib -h -r -s c:\xo8wr9.exe
attrib -h -r -s c:\1dg.exe
attrib -h -r -s c:\v.exe
attrib -h -r -s c:\tel.exe
attrib -h -r -s c:\__d__.lnk
attrib -h -r -s c:\__e__.lnk
attrib -h -r -s c:\__f__.lnk
attrib -h -r -s c:\__g__.lnk
attrib -h -r -s c:\__h__.lnk
attrib -h -r -s c:\__i__.lnk
attrib -h -r -s c:\__j__.lnk
attrib -h -r -s c:\__k__.lnk
attrib -h -r -s c:\Windows\System32\__d__.lnk
attrib -h -r -s c:\Windows\System32\__e__.lnk
attrib -h -r -s c:\Windows\System32\__f__.lnk
attrib -h -r -s c:\Windows\System32\__g__.lnk
attrib -h -r -s c:\Windows\System32\__h__.lnk
attrib -h -r -s c:\Windows\System32\__i__.lnk
attrib -h -r -s c:\Windows\System32\__j__.lnk
attrib -h -r -s c:\Windows\System32\__k__.lnk
attrib -h -r -s c:\fanny.bmp
attrib -h -r -s d:\svichosst.exe
attrib -h -r -s d:\xo8wr9.exe
attrib -h -r -s d:\awda2.exe
attrib -h -r -s d:\ravmon.exe
attrib -h -r -s d:\autorun.inf
attrib -h -r -s d:\ntde1ect.com
attrib -h -r -s d:\svchost.exe
attrib -h -r -s d:\svichossst.exe
attrib -h -r -s d:\1dg.exe
attrib -h -r -s d:\v.exe
attrib -h -r -s d:\tel.exe
attrib -h -r -s d:\__d__.lnk
attrib -h -r -s d:\__e__.lnk
attrib -h -r -s d:\__f__.lnk
attrib -h -r -s d:\__g__.lnk
attrib -h -r -s d:\__h__.lnk
attrib -h -r -s d:\__i__.lnk
attrib -h -r -s d:\__j__.lnk
attrib -h -r -s d:\__k__.lnk
attrib -h -r -s d:\fanny.bmp
attrib -h -r -s e:\svichosst.exe
attrib -h -r -s e:\xo8wr9.exe
attrib -h -r -s e:\awda2.exe
attrib -h -r -s e:\ravmon.exe
attrib -h -r -s e:\autorun.inf
attrib -h -r -s e:\ntde1ect.com
attrib -h -r -s e:\svichossst.exe
attrib -h -r -s e:\1dg.exe
attrib -h -r -s e:\v.exe
attrib -h -r -s e:\tel.exe
attrib -h -r -s e:\__d__.lnk
attrib -h -r -s e:\__e__.lnk
attrib -h -r -s e:\__f__.lnk
attrib -h -r -s e:\__g__.lnk
attrib -h -r -s e:\__h__.lnk
attrib -h -r -s e:\__i__.lnk
attrib -h -r -s e:\__j__.lnk
attrib -h -r -s e:\__k__.lnk
attrib -h -r -s e:\fanny.bmp
attrib -h -r -s f:\svichosst.exe
attrib -h -r -s f:\xo8wr9.exe
attrib -h -r -s f:\awda2.exe
attrib -h -r -s f:\ravmon.exe
attrib -h -r -s f:\autorun.inf
attrib -h -r -s f:\ntde1ect.com
attrib -h -r -s f:\svichossst.exe
attrib -h -r -s f:\1dg.exe
attrib -h -r -s f:\v.exe
attrib -h -r -s f:\tel.exe
attrib -h -r -s f:\__d__.lnk
attrib -h -r -s f:\__e__.lnk
attrib -h -r -s f:\__f__.lnk
attrib -h -r -s f:\__g__.lnk
attrib -h -r -s f:\__h__.lnk
attrib -h -r -s f:\__i__.lnk
attrib -h -r -s f:\__j__.lnk
attrib -h -r -s f:\__k__.lnk
attrib -h -r -s f:\fanny.bmp
attrib -h -r -s g:\svichosst.exe
attrib -h -r -s g:\xo8wr9.exe
attrib -h -r -s g:\awda2.exe
attrib -h -r -s g:\ravmon.exe
attrib -h -r -s g:\autorun.inf
attrib -h -r -s g:\ntde1ect.com
attrib -h -r -s g:\svichossst.exe
attrib -h -r -s g:\1dg.exe
attrib -h -r -s g:\v.exe
attrib -h -r -s g:\tel.exe
attrib -h -r -s f:\__d__.lnk
attrib -h -r -s g:\__e__.lnk
attrib -h -r -s g:\__f__.lnk
attrib -h -r -s g:\__g__.lnk
attrib -h -r -s g:\__h__.lnk
attrib -h -r -s g:\__i__.lnk
attrib -h -r -s g:\__j__.lnk
attrib -h -r -s g:\__k__.lnk
attrib -h -r -s g:\fanny.bmp
attrib -h -r -s h:\svichosst.exe
attrib -h -r -s h:\xo8wr9.exe
attrib -h -r -s h:\awda2.exe
attrib -h -r -s h:\svichossst.exe
attrib -h -r -s h:\ravmon.exe
attrib -h -r -s h:\autorun.inf
attrib -h -r -s h:\ntde1ect.com
attrib -h -r -s h:\1dg.exe
attrib -h -r -s h:\v.exe
attrib -h -r -s h:\tel.exe
attrib -h -r -s f:\__d__.lnk
attrib -h -r -s h:\__e__.lnk
attrib -h -r -s h:\__f__.lnk
attrib -h -r -s h:\__g__.lnk
attrib -h -r -s h:\__h__.lnk
attrib -h -r -s h:\__i__.lnk
attrib -h -r -s h:\__j__.lnk
attrib -h -r -s h:\__k__.lnk
attrib -h -r -s h:\fanny.bmp
attrib -h -r -s i:\svichosst.exe
attrib -h -r -s i:\xo8wr9.exe
attrib -h -r -s i:\awda2.exe
attrib -h -r -s i:\ravmon.exe
attrib -h -r -s i:\autorun.inf
attrib -h -r -s i:\ntde1ect.com
attrib -h -r -s i:\svichossst.exe
attrib -h -r -s i:\1dg.exe
attrib -h -r -s i:\v.exe
attrib -h -r -s i:\tel.exe
attrib -h -r -s i:\__d__.lnk
attrib -h -r -s i:\__e__.lnk
attrib -h -r -s i:\__f__.lnk
attrib -h -r -s i:\__g__.lnk
attrib -h -r -s i:\__h__.lnk
attrib -h -r -s i:\__i__.lnk
attrib -h -r -s i:\__j__.lnk
attrib -h -r -s i:\__k__.lnk
attrib -h -r -s i:\fanny.bmp
attrib -h -r -s j:\svichosst.exe
attrib -h -r -s j:\xo8wr9.exe
attrib -h -r -s j:\awda2.exe
attrib -h -r -s j:\ravmon.exe
attrib -h -r -s j:\autorun.inf
attrib -h -r -s j:\ntde1ect.com
attrib -h -r -s j:\svichossst.exe
attrib -h -r -s j:\1dg.exe
attrib -h -r -s j:\v.exe
attrib -h -r -s j:\tel.exe
attrib -h -r -s j:\__d__.lnk
attrib -h -r -s j:\__e__.lnk
attrib -h -r -s j:\__f__.lnk
attrib -h -r -s j:\__g__.lnk
attrib -h -r -s j:\__h__.lnk
attrib -h -r -s j:\__i__.lnk
attrib -h -r -s j:\__j__.lnk
attrib -h -r -s j:\__k__.lnk
attrib -h -r -s j:\fanny.bmp
attrib -h -r -s k:\svichosst.exe
attrib -h -r -s k:\xo8wr9.exe
attrib -h -r -s k:\awda2.exe
attrib -h -r -s k:\ravmon.exe
attrib -h -r -s k:\autorun.inf
attrib -h -r -s k:\ntde1ect.com
attrib -h -r -s k:\svichossst.exe
attrib -h -r -s k:\1dg.exe
attrib -h -r -s k:\v.exe
attrib -h -r -s k:\tel.exe
attrib -h -r -s k:\__d__.lnk
attrib -h -r -s k:\__e__.lnk
attrib -h -r -s k:\__f__.lnk
attrib -h -r -s k:\__g__.lnk
attrib -h -r -s k:\__h__.lnk
attrib -h -r -s k:\__i__.lnk
attrib -h -r -s k:\__j__.lnk
attrib -h -r -s k:\__k__.lnk
attrib -h -r -s k:\fanny.bmp
del c:\xo8wr9.exe
del c:\awda2.exe
del c:\ravmon.exe
del c:\windows\mdm.exe
del c:\autorun.inf
del c:\ntde1ect.com
del c:\svichossst.exe
del c:\windows\Rvhost.exe
del c:\windows\system32\Rvhost.exe
del c:\windows\svichosst.exe
del c:\windows\svichossst.exe
del c:\windows\system32\svichosst.exe
del c:\windows\system32\svichossst.exe
del c:\windows\system32\avpo.exe
del c:\windows\svchost.exe
del c:\windows\system32\svchost.exe
del c:\1dg.exe
del c:\v.exe
del c:\tel.exe
del c:\__d__.lnk
del c:\__e__.lnk
del c:\__f__.lnk
del c:\__g__.lnk
del c:\__h__.lnk
del c:\__i__.lnk
del c:\__j__.lnk
del c:\__k__.lnk
del c:\fanny.bmp
del c:\tel.exe
del c:\Windows\System32\__d__.lnk
del c:\Windows\System32\__e__.lnk
del c:\Windows\System32\__f__.lnk
del c:\Windows\System32\__g__.lnk
del c:\Windows\System32\__h__.lnk
del c:\Windows\System32\__i__.lnk
del c:\Windows\System32\__j__.lnk
del c:\Windows\System32\__k__.lnk
del d:\xo8wr9.exe
del d:\awda2.exe
del d:\windows\mdm.exe
del d:\windows\svchost.exe
del d:\ravmon.exe
del d:\autorun.inf
del d:\ntde1ect.com
del d:\svichossst.exe
del d:\svichosst.exe
del d:\1dg.exe
del d:\v.exe
del d:\tel.exe
del d:\__d__.lnk
del d:\__e__.lnk
del d:\__f__.lnk
del d:\__g__.lnk
del d:\__h__.lnk
del d:\__i__.lnk
del d:\__j__.lnk
del d:\__k__.lnk
del d:\fanny.bmp
del e:\svichosst.exe
del e:\xo8wr9.exe
del e:\awda2.exe
del e:\ravmon.exe
del e:\autorun.inf
del e:\ntde1ect.com
del e:\svichossst.exe
del e:\1dg.exe
del e:\v.exe
del e:\tel.exe
del e:\__d__.lnk
del e:\__e__.lnk
del e:\__f__.lnk
del e:\__g__.lnk
del e:\__h__.lnk
del e:\__i__.lnk
del e:\__j__.lnk
del e:\__k__.lnk
del e:\fanny.bmp
del f:\svichosst.exe
del f:\xo8wr9.exe
del f:\awda2.exe
del f:\ravmon.exe
del f:\autorun.inf
del f:\ntde1ect.com
del f:\svichossst.exe
del f:\1dg.exe
del f:\v.exe
del f:\tel.exe
del f:\__d__.lnk
del f:\__e__.lnk
del f:\__f__.lnk
del f:\__g__.lnk
del f:\__h__.lnk
del f:\__i__.lnk
del f:\__j__.lnk
del f:\__k__.lnk
del f:\fanny.bmp
del g:\svichosst.exe
del g:\xo8wr9.exe
del g:\awda2.exe
del g:\ravmon.exe
del g:\autorun.inf
del g:\ntde1ect.com
del g:\svichossst.exe
del g:\1dg.exe
del g:\v.exe
del g:\tel.exe
del g:\__d__.lnk
del g:\__e__.lnk
del g:\__f__.lnk
del g:\__g__.lnk
del g:\__h__.lnk
del g:\__i__.lnk
del g:\__j__.lnk
del g:\__k__.lnk
del g:\fanny.bmp
del h:\svichosst.exe
del h:\xo8wr9.exe
del h:\awda2.exe
del h:\ravmon.exe
del h:\autorun.inf
del h:\ntde1ect.com
del h:\svichossst.exe
del h:\1dg.exe
del h:\v.exe
del h:\tel.exe
del h:\__d__.lnk
del h:\__e__.lnk
del h:\__f__.lnk
del h:\__g__.lnk
del h:\__h__.lnk
del h:\__i__.lnk
del h:\__j__.lnk
del h:\__k__.lnk
del h:\fanny.bmp
del i:\svichosst.exe
del i:\xo8wr9.exe
del i:\awda2.exe
del i:\ravmon.exe
del i:\autorun.inf
del i:\ntde1ect.com
del i:\svichossst.exe
del i:\1dg.exe
del i:\v.exe
del i:\tel.exe
del i:\__d__.lnk
del i:\__e__.lnk
del i:\__f__.lnk
del i:\__g__.lnk
del i:\__h__.lnk
del i:\__i__.lnk
del i:\__j__.lnk
del i:\__k__.lnk
del i:\fanny.bmp
del j:\svichosst.exe
del j:\xo8wr9.exe
del j:\awda2.exe
del j:\ravmon.exe
del j:\autorun.inf
del j:\ntde1ect.com
del j:\svichossst.exe
del j:\1dg.exe
del j:\v.exe
del j:\tel.exe
del j:\__d__.lnk
del j:\__e__.lnk
del j:\__f__.lnk
del j:\__g__.lnk
del j:\__h__.lnk
del j:\__i__.lnk
del j:\__j__.lnk
del j:\__k__.lnk
del j:\fanny.bmp
del k:\svichosst.exe
del k:\xo8wr9.exe
del k:\awda2.exe
del k:\ravmon.exe
del k:\autorun.inf
del k:\ntde1ect.com
del k:\svichossst.exe
del k:\1dg.exe
del k:\v.exe
del k:\tel.exe
del k:\__d__.lnk
del k:\__e__.lnk
del k:\__f__.lnk
del k:\__g__.lnk
del k:\__h__.lnk
del k:\__i__.lnk
del k:\__j__.lnk
del k:\__k__.lnk
del k:\fanny.bmp
If you understand then its okay otherwise comment me i will tell you
Eid Mubarak-Song-Tumko Na Bhool Paayenge HD 1080p
2011 Super Bowl XLV Halftime Show
Tuesday, February 8, 2011
Shiblee college darama.flv
Sunday, February 6, 2011
Usher - OMG ft. will.i.am
Saturday, February 5, 2011
★ Americas Funniest Home Videos LOVE Special part 279
Jaaneman Chupke Chupke - Muskaan
Friday, February 4, 2011
Nicolae Guta & Don Genove & Mr Juve Bum bum sexy
Thursday, February 3, 2011
Ayesha takia | hot body show | Bollywood | Girl | Sexy
mehndi night performance at sankalp n shefali's wedding
Subscribe to:
Posts (Atom)