March 31, 2026

Aiou Workshop 5403| Full Test

By | Published | No Comments
Spread the love
/90
95

Aiou Workshop 5403| Full Test

1 / 90

1) The bottem most layer of the OSI is called:

2 / 90

2) IBM stands for:

3 / 90

3) The companies that use networks can save time and money because network allow users to share:

4 / 90

4) which of the following language Is ideal to write business application

5 / 90

5) The step that performs the actions given in the instructions is called:

6 / 90

6) An important characteristic of RAM is that it is.

7 / 90

7) Many networks include a central computer called:

8 / 90

8) The music and speech.represent:

9 / 90

9) All of the following are elements of data communication system EXCEPT:

10 / 90

10) Which of the following is a search engine?

11 / 90

11) http://www.microsoft.com is an example of:

12 / 90

12) Which of the following is an email client?

13 / 90

13) 1 Terabyte (TB) =____ bytes :

14 / 90

14) Software that is developed specifically for the company’s own use is called :

15 / 90

15) The types.of signals can be:

16 / 90

16) Each set of bit pattern is called:

17 / 90

17) All of the following may be stored in registers EXCEPT:

18 / 90

18) The right of a person to keep his personal information away from others is called:

19 / 90

19) RAM usually has ______ types

20 / 90

20) Which of the following can be used to launch the word Art

21 / 90

21) The modern revolution in information technology can be termed as :

22 / 90

22) The time taken by a data signal to reach to moon and then back to earth was about:

23 / 90

23) A device that is used to connect two computers using telephone line is called:

24 / 90

24) The process of producing multiple copies of a document is called:

25 / 90

25) The type of reader commonly used to read bank checks is a (n).

26 / 90

26) The layer that defines the formats the data uses as it in transmitted on the communication line

27 / 90

27) The processing of running an executable file is known as

28 / 90

28) The size of EAX register can be up to:

29 / 90

29) The most commonly used LAN protocol is:

30 / 90

30) Biometric data

31 / 90

31) A set collection of a large number of computers all over the world connected to one another is

32 / 90

32) Tables allow the text to be displayed in:

33 / 90

33) Which of the following media can be used for backup?

34 / 90

34) Was a wide area network connecting a small number of users.

35 / 90

35) Exhaustive data gathering is done during :

36 / 90

36) The external devices connected to a computer system are known as:

37 / 90

37) Expansion cards are inserted into:

38 / 90

38) Computer is a combination of :

39 / 90

39) A port on the computer may be connected to:

40 / 90

40) The [ascetic] militant Chinese have gone straight to the roots of the problems.

41 / 90

41) FTP facility is used to:

42 / 90

42) EBCDIC is a

43 / 90

43) When starting Word, the name of the default document is:

44 / 90

44) .The conversation over a walkie-talkie radio is-an example of:

45 / 90

45) Websites are hosted on___________computers on the Internet.

46 / 90

46) Software that is available free for a limited period is called:

47 / 90

47) The technology of long-distance communication is known as:

48 / 90

48) DARPA stands for:

49 / 90

49) Many banks provide the facility of:

50 / 90

50) Textbox can be created by selecting _________option from the menu bar:

51 / 90

51) Which of the following is an authentication methodology?

52 / 90

52) Microsoft Windows version 3.1 is a

53 / 90

53) Which of the following is not a type of bus in computer?

54 / 90

54) Which kind of signal is mostly required by telephone lines?

55 / 90

55) DNS stands for:

56 / 90

56) Step by Step instruction that run the computer are called :

57 / 90

57) The hardware component that permanently holds data and program is called :

58 / 90

58) Which of the following is not a Secondary storage device :

59 / 90

59) Internet surfing is an example of:

60 / 90

60) The output of the compiler is called:

61 / 90

61) The layer is used to control how a bit-streams of data is sent and received over physical medium

62 / 90

62) A program’s syntax errors are detected by:

63 / 90

63) Which of the following key is used to load a program it memory to run?

64 / 90

64) Which of the following cannot be set using the Format command?

65 / 90

65) A small image that represents a program, instruction, or file is called:

66 / 90

66) The smallest unit of information in the computer is :

67 / 90

67) Which of the following is used to surf Internet?

68 / 90

68) The expression may be:

69 / 90

69) 1 MB is approximately :

70 / 90

70) In star topology, the central device is called:

71 / 90

71) A telephone conversation is’an example of:.

72 / 90

72) Which type of network covers a small area?

73 / 90

73) The order of stack is:

74 / 90

74) Which is NOT a LAN protocol?

75 / 90

75) Additional data and program not being used by CPU are stored in :

76 / 90

76) Which type of flat-panel computer screen provides the highest-quality image?

77 / 90

77) Division by zero (e.g. 2/ 0) is an example

78 / 90

78) A____is a computer that provides services to other computers of the network.

79 / 90

79) The_________layer is the layer closest to the transmission medium

80 / 90

80) The brain of the computer that executes the instructions is called:

81 / 90

81) The process of moving up or down in a word processing document is called:

82 / 90

82) A gigabyte is equal to :

83 / 90

83) The type of conversion in which individual components of the new system are used one by one is :

84 / 90

84) Each computer on a network is called a:

85 / 90

85) Which of the following one is not a virus?

86 / 90

86) The extension of MS-Word file is:

87 / 90

87) BIT stand for :

88 / 90

88) The process of touching an object with mouse pointer is called:

89 / 90

89) Another name for email program is:

90 / 90

90) How many characters of data does a byte usually represent :