Spread the love/100 108 Aiou Workshop 5403| Test 6 1 / 100 1) C was developed in the year:1972 a) 1973 b) 1971 c) 1972 d) 1970 2 / 100 2) What does the # sign indicate in an instruction of C language? a) Instruction for compiler b) Instruction for user c) Instruction for linker d) None 3 / 100 3) A type of language in which instructions are written in binary form is called: a) None b) High level language c) Machine language d) Assembly language 4 / 100 4) The process of linking library files with object cod is known as: a) Executing b) Linking c) Compiler d) Saving 5 / 100 5) Turbo C++ can compile a) Turbo C Programs only b) Turbo C++ Programs only c) C programs only d) C and C++ programs 6 / 100 6) The processing of running an executable file is known as a) Debugging b) Compiling c) executing d) Saving 7 / 100 7) The statements written by the programmer are called: a) None b) Source code c) Object code d) Syntax 8 / 100 8) Which file contains the program after translation into machine language a) Object file b) Source file c) None d) exe file 9 / 100 9) The [ascetic] militant Chinese have gone straight to the roots of the problems. a) secular b) professional c) religious d) trained 10 / 100 10) C was designed to write program for: a) Unix operating system b) OS/2 operating system c) Windows operating system d) Solaris operating system 11 / 100 11) Which of the following one is not a virus? a) Trojan Horse b) Reflof c) MCAfee d) Logic Bomb 12 / 100 12) which header file contains information about standard input/ output functions? a) None b) stdio.h c) Both a and b d) math.h 13 / 100 13) The expression in define directive: a) Cannot be assigned a value b) Can only be changed at the end of the program c) Can not be changed but can be redefined d) Cannot be changed 14 / 100 14) Which of the following reason causes the syntax error a) Missing any of the delimiters b) All c) Missing statement terminator d) using a variable without declaration 15 / 100 15) which of the following header file contains information about common mathematical functions? a) conio.h b) stdio.h c) None d) math.h 16 / 100 16) The extension of object file is: a) .c b) .obj c) .h d) .exe 17 / 100 17) computer programs are also known as: a) Procedure b) None c) Software d) Hardware 18 / 100 18) Who is responsible of security of online data? a) LAN Administrator b) Organization obtaining the data c) User d) Internet Service provider 19 / 100 19) The output of the compiler is called: a) Linked code b) Source code c) Library code d) Object code 20 / 100 20) Trojan Horse is a type of: a) Software b) Horse c) Antivirus d) Virus 21 / 100 21) Which of the following is an authentication methodology? a) Biometrics b) Access cards c) PIN d) Piracy 22 / 100 22) The basic structure of C program consists of: a) All b) Program body c) Preprocessor Directive d) main() function 23 / 100 23) The expression may be: a) All b) string c) Constant d) arithmetic expression 24 / 100 24) The process of identifying and removing errors in the programs is called: a) Executing b) Processing c) None d) debugging 25 / 100 25) A statement that starts with a # is called a: a) Keyword b) Comment c) Preprocessor directive d) None 26 / 100 26) A spelling error (e.g. typing intt instead of int) is an example of: a) Run-time error b) None c) Syntax error d) Logic error 27 / 100 27) What does the following code print on screen? printf(‘hello’); a) None b) hello c) Hello d) HELLO 28 / 100 28) Header files in C contain: a) Compiler commands b) Library functions c) Operators for files d) Header information of C programs 29 / 100 29) How a virus reaches from one computer to another? a) Exchange of display screen b) Data is exchanged between computers c) Exchange of keyboard d) Exchange of printer 30 / 100 30) main is a a) Comment b) Compiler directive c) Function d) Expression 31 / 100 31) The extension of the header file is: a) .c b) .CPP c) .txt d) .h 32 / 100 32) The extension of an executable file is: a) .xls b) .exe c) .ext d) .doc 33 / 100 33) A set of rules that must be followed to develop a program is called: a) Bug b) Preprocessor c) Debug d) Syntax 34 / 100 34) Which of the following is computer virus? a) Reflof b) All of these c) Logic Bomb d) Chernobyl 35 / 100 35) Which of the following is the most damaging loss to a company? a) Loss of printouts b) Loss of hardware c) Loss of data d) Loss of software 36 / 100 36) An assembly language uses: a) English Words b) None c) Mnemonic Codes d) Binary Digit 37 / 100 37) Division by zero (e.g. 2/ 0) is an example a) None b) Run-time error c) Run-time error d) Logic error 38 / 100 38) Which of the following is not an antivirus program? a) Redlof b) Norton c) Avast d) McAfee 39 / 100 39) Compiled programs typically, execute faster because: a) Compiled programs are read and executed a line at a time b) Compiled programs do not require any data c) Compiled programs are already in a machine-readable form. d) None of the above 40 / 100 40) The right to use the software on the computer is called: a) Software piracy b) Site License c) Software copyright d) Intellectual property right 41 / 100 41) Types of translators are: a) Compilers b) All c) None d) Assemblers 42 / 100 42) The process of converting source code into object code,is knows as: a) Saving b) Executing c) Compiling d) Linking 43 / 100 43) B was developed in the year: a) 1992-1996 b) 1972-1988 c) 1965-1975 d) 1969-70 44 / 100 44) which of the following language Is ideal to write business application a) PASCAL b) None c) BASIC d) COBOL 45 / 100 45) For every opening brace in a C program, there must be a: a) None b) Closing brace c) Comma d) Colon 46 / 100 46) The right of a person to keep his personal information away from others is called: a) Secrecy b) Right c) Privacy d) Private 47 / 100 47) The restricted access to the server computer room is a form of: a) User security b) Logical security c) Enterprise security d) Physical security 48 / 100 48) Another name for antivirus is: a) DES b) Logic Bomb c) Vaccine d) Trojan horse 49 / 100 49) A virus that replicates itself is called: a) Bug b) Vaccine c) Bomb d) Worm 50 / 100 50) The programmer usually enters source code into a computer using a) Debugger b) Linker c) Compiler d) Text editor 51 / 100 51) Making illegal copies of copyrighted software is called: a) Software piracy b) Software hacking c) Software distribution d) Software Browsing 52 / 100 52) Which of the following components is used to convert first.c to first.exe? a) compiler & header b) header & linker c) compiler & linker d) None 53 / 100 53) The “.exe” file is produced by:. a) interpreter b) linker c) Loader d) Compiler 54 / 100 54) Which of the following is harmful for computers? a) Antivirus b) Freeware c) Shareware d) Virus 55 / 100 55) Computer programs are also known ac a) Software b) Firmware c) Hardware d) None 56 / 100 56) The virus which deletes MS Office files and disk partition information is called: a) Book sector b) Logic Bomb c) Chernobyl d) Trojan horse 57 / 100 57) A program that interferes with the normal working of a computer is called: a) Freeware b) Antivirus c) Virus d) Bateria 58 / 100 58) Which of the following does not contain machine language code? a) Object module b) Source module c) None d) Library module 59 / 100 59) Which of the following is a compiler directive? a) main ( ) b) All c) #include d) Using namespace std; 60 / 100 60) which of the following header a) stdio.h b) None c) conio.h d) math.h 61 / 100 61) Machine language: a) All of these b) is the language in which programs were first written. c) None d) is the only language understood by the computer. 62 / 100 62) Which of the following language provided the basis for the development C a) Pascal b) C++ c) Java d) B 63 / 100 63) void occupy how many bytes in memory? a) 0 b) 1 c) 3 d) 2 64 / 100 64) Which of the following is the native language of computer? a) DOS b) Pascal c) None d) Machine language 65 / 100 65) C is a: a) Machine Language b) Assembly language c) Low-level language d) High level language 66 / 100 66) Who developed C? a) Dennis Ritchie b) Al- Khuwarizmi c) Charles Babbage d) Von-Neumann 67 / 100 67) Software that is available free for a limited period is called: a) Freeware b) Shareware c) vertical d) Groupware 68 / 100 68) The secrets word or number used for protection is called: a) Biometric data b) Passwords c) Backup d) Private words 69 / 100 69) stdio.h is part of: a) Comment section b) Compiler c) C standard library d) main function 70 / 100 70) Processor directives are command for a) Language Processor b) Loader c) Microprocessor d) C preprocessor 71 / 100 71) Choose the program that translates and executes one line of source code at a time. a) interpreter b) compiler c) None d) Assembler 72 / 100 72) Which of the following is not a biometric technique: a) Badge b) Retina c) Palm print d) Face 73 / 100 73) Security protection for personal computers includes: a) Internal components b) All of these c) Software d) Locks and cables 74 / 100 74) Which malicious program is activated when a specific set of conditions are met? a) Logic bomb b) Virus c) Trojan horse d) Worm 75 / 100 75) McAfee is an example of: a) Antivirus b) Hacker c) Virus d) Worm 76 / 100 76) The extension of C source program is: a) .c b) .h c) .obj d) .exe 77 / 100 77) C statements end with a: a) Period b) semicolon c) semicolon d) None 78 / 100 78) This is a complete instruction that causes the computer to perform some action: a) Line b) Statement c) Keyword d) None 79 / 100 79) Which of the following media can be used for backup? a) Tape Device b) All c) Zip Disk d) Floppy Diskette 80 / 100 80) Debug is the process of: a) Identifying Errors b) Identifying and removing errors c) Creating bugs in program d) Removing Errors 81 / 100 81) A program’s syntax errors is detected by: a) Debugger b) Loader c) Compiler d) Linker 82 / 100 82) Most computer crime are committed by: a) Highly paid computer consultant b) International spies c) Hackers d) Computer operators 83 / 100 83) A special program that can detect and remove viruses from computer is called: a) Anti-Virus b) Virus c) Groupware d) Custom 84 / 100 84) Which of the following is NOT an example of a program bug? a) Syntax error b) Run-time error c) Logic error d) Operator error 85 / 100 85) The lowest level of programming language is: a) None b) Pascal c) Java d) Assembly Language 86 / 100 86) which Program that translates assembly language code to machine code a) Debugger b) Converter c) Translator d) Assembler 87 / 100 87) Which of the following is NOT a high level language? a) None b) BASIC c) FORTRAN d) Assembly language 88 / 100 88) Which of the following symbol is used to denote a pre-processor statement? a) $ b) # c) @ d) % 89 / 100 89) Which of the following key is used to load a program it memory to run? a) ALT+F5 b) CTRL+F9 c) CTRL+S d) ALT+F9 90 / 100 90) conio stands for: a) Character input output b) Complex input output c) Console input output d) Common input output 91 / 100 91) Which of the following is a biometric technique for person identification? a) Password b) Access card c) PIN d) Fingerprint 92 / 100 92) Which of the following key is used to compile a program a) ALT+F5 b) CTRL+S c) ALT+F9 d) CTRL+F9 93 / 100 93) A set of illegal instructions inserted into a legitimate computer program is called: a) Worm b) Trojan horse c) Bomb d) Trapdoor 94 / 100 94) An IDE stands for: a) Input data error b) Input Desktop environment c) Internal disk error d) Integrated Development Environment 95 / 100 95) Another name for free software is: a) Shareware b) Encrypted software c) Public domain software d) Copy protected software 96 / 100 96) stdio stands for: a) Simple input output b) String input-output c) Standard input output d) Symbolic input output 97 / 100 97) The name of header file is written between: a) <> b) ( ) c) {} 98 / 100 98) An additional or spare copy of data stored on storage media is call: a) Backup of data b) Copying of Data c) Additional data d) Moving of Data 99 / 100 99) Writing programs in machine language is: a) Both a and c b) Less time-consuming c) None d) Less tedious 100 / 100 100) Which of the following key is used to save a file? a) F3 b) F5 c) F2 d) F9 Your score is LinkedIn Facebook Twitter VKontakte Post Views: 419 Post navigation Aiou Workshop 5403| Test 5 Aiou Workshop 5403| Full Test