Spread the love/100 108 Aiou Workshop 5403| Test 6 1 / 100 1) A special program that can detect and remove viruses from computer is called: a) Virus b) Groupware c) Anti-Virus d) Custom 2 / 100 2) Which of the following is the most damaging loss to a company? a) Loss of hardware b) Loss of software c) Loss of printouts d) Loss of data 3 / 100 3) Computer virus is simply a: a) A disease b) Type of bacteria c) Set of computer instructions or code d) Hardware component 4 / 100 4) Which of the following language requires no translator to execute the program? a) Assembly language b) Machine language c) C d) C++ 5 / 100 5) Most computer crime are committed by: a) International spies b) Hackers c) Computer operators d) Highly paid computer consultant 6 / 100 6) The [ascetic] militant Chinese have gone straight to the roots of the problems. a) secular b) religious c) professional d) trained 7 / 100 7) The extension of an executable file is: a) .ext b) .doc c) .exe d) .xls 8 / 100 8) C was designed to write program for: a) OS/2 operating system b) Solaris operating system c) Windows operating system d) Unix operating system 9 / 100 9) conio stands for: a) Console input output b) Character input output c) Complex input output d) Common input output 10 / 100 10) The virus which deletes MS Office files and disk partition information is called: a) Logic Bomb b) Chernobyl c) Book sector d) Trojan horse 11 / 100 11) The secrets word or number used for protection is called: a) Biometric data b) Passwords c) Private words d) Backup 12 / 100 12) which Program that translates assembly language code to machine code a) Converter b) Assembler c) Translator d) Debugger 13 / 100 13) Security protection for personal computers includes: a) Software b) All of these c) Internal components d) Locks and cables 14 / 100 14) computer programs are also known as: a) Procedure b) Software c) None d) Hardware 15 / 100 15) Which of the following syntax is used to include header file? a) #include b) # include "name of the header file" c) Both a or b d) None of these 16 / 100 16) Making illegal copies of copyrighted software is called: a) Software hacking b) Software Browsing c) Software distribution d) Software piracy 17 / 100 17) FormatC is an example of: a) Boot sector b) Trojan horse c) Logic Bomb d) Chernobal 18 / 100 18) B was developed in the year: a) 1992-1996 b) 1969-70 c) 1965-1975 d) 1972-1988 19 / 100 19) Which of the following key is used to compile a program a) CTRL+S b) CTRL+F9 c) ALT+F5 d) ALT+F9 20 / 100 20) What does the # sign indicate in an instruction of C language? a) Instruction for compiler b) None c) Instruction for user d) Instruction for linker 21 / 100 21) Which of the following is a compiler directive? a) All b) #include c) main ( ) d) Using namespace std; 22 / 100 22) Another name for free software is: a) Public domain software b) Shareware c) Encrypted software d) Copy protected software 23 / 100 23) The right to use the software on the computer is called: a) Software copyright b) Site License c) Software piracy d) Intellectual property right 24 / 100 24) Which malicious program is activated when a specific set of conditions are met? a) Virus b) Logic bomb c) Trojan horse d) Worm 25 / 100 25) The “.exe” file is produced by:. a) Compiler b) interpreter c) Loader d) linker 26 / 100 26) A type of error that occurs when an instruction violates the rules programs is called: a) Runtime error b) Program error c) None d) Syntax error 27 / 100 27) The output of the compiler is called: a) Source code b) Linked code c) Object code d) Library code 28 / 100 28) Trojan Horse is a type of: a) Antivirus b) Software c) Horse d) Virus 29 / 100 29) Writing programs in machine language is: a) Both a and c b) Less time-consuming c) None d) Less tedious 30 / 100 30) A program’s syntax errors is detected by: a) Linker b) Compiler c) Debugger d) Loader 31 / 100 31) The lowest level of programming language is: a) Java b) None c) Pascal d) Assembly Language 32 / 100 32) Which of the following is not an antivirus program? a) McAfee b) Norton c) Avast d) Redlof 33 / 100 33) The statements written by the programmer are called: a) Source code b) None c) Object code d) Syntax 34 / 100 34) An additional or spare copy of data stored on storage media is call: a) Backup of data b) Moving of Data c) Copying of Data d) Additional data 35 / 100 35) A type of language in which instructions are written in binary form is called: a) Machine language b) None c) Assembly language d) High level language 36 / 100 36) The right of a person to keep his personal information away from others is called: a) Right b) Secrecy c) Privacy d) Private 37 / 100 37) Which of the following is harmful for computers? a) Shareware b) Freeware c) Virus d) Antivirus 38 / 100 38) C is a: a) High level language b) Assembly language c) Machine Language d) Low-level language 39 / 100 39) Processor directives are command for a) Loader b) Language Processor c) Microprocessor d) C preprocessor 40 / 100 40) which header file contains information about standard input/ output functions? a) stdio.h b) None c) math.h d) Both a and b 41 / 100 41) which of the following language Is ideal to write business application a) COBOL b) PASCAL c) None d) BASIC 42 / 100 42) which of the following header a) math.h b) conio.h c) stdio.h d) None 43 / 100 43) This is a complete instruction that causes the computer to perform some action: a) Line b) Keyword c) None d) Statement 44 / 100 44) Choose the program that translates and executes one line of source code at a time. a) interpreter b) compiler c) Assembler d) None 45 / 100 45) A virus that replicates itself is called: a) Bomb b) Worm c) Vaccine d) Bug 46 / 100 46) A statement that starts with a # is called a: a) Comment b) None c) Keyword d) Preprocessor directive 47 / 100 47) For every opening brace in a C program, there must be a: a) Comma b) None c) Closing brace d) Colon 48 / 100 48) An assembly language uses: a) Binary Digit b) None c) English Words d) Mnemonic Codes 49 / 100 49) Which of the following is the native language of computer? a) None b) DOS c) Pascal d) Machine language 50 / 100 50) The extension of object file is: a) .h b) .c c) .exe d) .obj 51 / 100 51) Which of the following is not a biometric technique: a) Palm print b) Retina c) Badge d) Face 52 / 100 52) stdio stands for: a) Standard input output b) String input-output c) Simple input output d) Symbolic input output 53 / 100 53) Which of the following one is not a virus? a) Reflof b) MCAfee c) Trojan Horse d) Logic Bomb 54 / 100 54) Which of the following language provided the basis for the development C a) B b) Pascal c) C++ d) Java 55 / 100 55) The process of linking library files with object cod is known as: a) Compiler b) Saving c) Linking d) Executing 56 / 100 56) Which of the following is computer virus? a) Logic Bomb b) Chernobyl c) All of these d) Reflof 57 / 100 57) The basic structure of C program consists of: a) main() function b) All c) Preprocessor Directive d) Program body 58 / 100 58) Machine language: a) All of these b) is the language in which programs were first written. c) None d) is the only language understood by the computer. 59 / 100 59) Division by zero (e.g. 2/ 0) is an example a) Run-time error b) Run-time error c) None d) Logic error 60 / 100 60) Software that is available free for a limited period is called: a) Freeware b) Shareware c) vertical d) Groupware 61 / 100 61) The process of identifying and removing errors in the programs is called: a) None b) debugging c) Executing d) Processing 62 / 100 62) The programmer usually enters source code into a computer using a) Text editor b) Linker c) Debugger d) Compiler 63 / 100 63) Biometric data a) Word related to a job or hobby b) Name of a partner or spouse c) Combination of letters, numbers and symbols d) Name of a partner or spouse 64 / 100 64) Which of the following symbol is used to denote a pre-processor statement? a) % b) $ c) # d) @ 65 / 100 65) Protecting computers and the information they contain against unwanted access is called: a) Audit control b) Computer monitoring c) Electronic policing d) Computer security 66 / 100 66) Header files in C contain: a) Compiler commands b) Header information of C programs c) Operators for files d) Library functions 67 / 100 67) A set of rules that must be followed to develop a program is called: a) Preprocessor b) Syntax c) Bug d) Debug 68 / 100 68) Which of the following reason causes the syntax error a) All b) Missing any of the delimiters c) using a variable without declaration d) Missing statement terminator 69 / 100 69) void occupy how many bytes in memory? a) 3 b) 2 c) 1 d) 0 70 / 100 70) Which of the following is not cause of virus? a) E-mail b) Logic bomb c) Networks d) Pirated software 71 / 100 71) Which of the following components is used to convert first.c to first.exe? a) compiler & header b) None c) header & linker d) compiler & linker 72 / 100 72) Which term is commonly used to refer to software or program errors: a) Short circuit b) Bug c) Crash d) Down 73 / 100 73) Which of the following does not contain machine language code? a) Source module b) Library module c) Object module d) None 74 / 100 74) Which of the following media can be used for backup? a) Floppy Diskette b) All c) Tape Device d) Zip Disk 75 / 100 75) The process of converting source code into object code,is knows as: a) Compiling b) Linking c) Executing d) Saving 76 / 100 76) Who is responsible of security of online data? a) LAN Administrator b) Organization obtaining the data c) User d) Internet Service provider 77 / 100 77) C was developed in the year:1972 a) 1971 b) 1973 c) 1972 d) 1970 78 / 100 78) The expression may be: a) string b) arithmetic expression c) All d) Constant 79 / 100 79) McAfee is an example of: a) Worm b) Antivirus c) Hacker d) Virus 80 / 100 80) The restricted access to the server computer room is a form of: a) Enterprise security b) User security c) Logical security d) Physical security 81 / 100 81) Which of the following errors are NOT detected by compiler? a) Both a and b b) None c) Syntax error d) Logical error 82 / 100 82) The extension of C source program is: a) .exe b) .h c) .c d) .obj 83 / 100 83) Turbo C++ can compile a) C and C++ programs b) C programs only c) Turbo C++ Programs only d) Turbo C Programs only 84 / 100 84) stdio.h is part of: a) Comment section b) main function c) Compiler d) C standard library 85 / 100 85) C programs are divided into units called: a) Functions b) Section c) Syntax d) debug 86 / 100 86) Which of the following is NOT an example of a program bug? a) Logic error b) Syntax error c) Run-time error d) Operator error 87 / 100 87) The processing of running an executable file is known as a) Compiling b) executing c) Debugging d) Saving 88 / 100 88) What does the following code print on screen? printf(‘hello’); a) HELLO b) Hello c) hello d) None 89 / 100 89) How a virus reaches from one computer to another? a) Exchange of keyboard b) Exchange of display screen c) Data is exchanged between computers d) Exchange of printer 90 / 100 90) A person who gains illegal access to a computer system is called: a) Hacker b) Authorized person c) Computer operator d) Network controller 91 / 100 91) The name of header file is written between: a) ( ) b) {} c) <> 92 / 100 92) Which of the following is a biometric technique for person identification? a) Access card b) Password c) Fingerprint d) PIN 93 / 100 93) main is a a) Function b) Expression c) Comment d) Compiler directive 94 / 100 94) An IDE typically consists of: a) Text editor b) Debugger c) All d) Compiler 95 / 100 95) A well-defined set of instructions given to the computer is called: a) None b) Hardware c) Bug d) Software 96 / 100 96) A spelling error (e.g. typing intt instead of int) is an example of: a) Run-time error b) Logic error c) Syntax error d) None 97 / 100 97) Which of the following is NOT a high level language? a) BASIC b) FORTRAN c) None d) Assembly language 98 / 100 98) Another name for antivirus is: a) Logic Bomb b) Trojan horse c) Vaccine d) DES 99 / 100 99) which of the following header file contains information about common mathematical functions? a) stdio.h b) None c) math.h d) conio.h 100 / 100 100) which one of the following translates source code to object code as a whole a) Assembler b) None c) Interpreter d) Compiler Your score is LinkedIn Facebook Twitter VKontakte Post Views: 602 Post navigation Aiou Workshop 5403| Test 5 Aiou Workshop 5403| Full Test