May 12, 2026

Aiou Workshop 5403| Full Test

By | Published | No Comments
Spread the love
/90
95

Aiou Workshop 5403| Full Test

1 / 90

1) The key that is used to delete a character to the left of the cursor is:

2 / 90

2) Which one is faster

3 / 90

3) The hardware device that temporarily holds data and program is called :

4 / 90

4) The network architecture that allows every computer to act as client as well as a server is:

5 / 90

5) An IP address consists of:

6 / 90

6) This is a complete instruction that causes the computer to perform some action:

7 / 90

7) Which of the following is NOT a category of network?

8 / 90

8) How many orientation types are available in Word?

9 / 90

9) A discussion group to exchange information like science and computer is called:

10 / 90

10) The process of moving up or down in a word processing document is called:

11 / 90

11) Which of the following key is used to load a program it memory to run?

12 / 90

12) A printer is needed to:

13 / 90

13) Choose the program that translates and executes one line of source code at a time.

14 / 90

14) A computer network must contain at least number of computers:

15 / 90

15) Tables are used to display:

16 / 90

16) NIC allows direct connection to:

17 / 90

17) Computer based weather forecasting depends on accurate collection of data from:

18 / 90

18) Which of the following is used for static RAM technology?

19 / 90

19) What binary bits are used to encode digital data?

20 / 90

20) A computer main function is to :

21 / 90

21) The process of linking library files with object cod is known as:

22 / 90

22) Which of the following is not included in document management system?

23 / 90

23) A port on the computer may be connected to:

24 / 90

24) Electronic commerce (e-commerce) is the process of:

25 / 90

25) Which of the following cannot be set using the Format command?

26 / 90

26) CBT software is used in:

27 / 90

27) The restricted access to the server computer room is a form of:

28 / 90

28) FDDI is a __________network.

29 / 90

29) Which of the following is ranked from smallest to largest :

30 / 90

30) EAX, EBX, ECX and EDX are:

31 / 90

31) Making illegal copies of copyrighted software is called:

32 / 90

32) Memory space in a computer is used to:

33 / 90

33) ______is used to product attractive documents using photos, artwork and graphics:

34 / 90

34) A spelling error (e.g. typing intt instead of int) is an example of:

35 / 90

35) Two dissimilar networks can be connected by a:

36 / 90

36) Which protocol works on the concepts of ring topology and a token?

37 / 90

37) Which of the following components is used to convert first.c to first.exe?

38 / 90

38) VCR stands for:

39 / 90

39) Which of the following is an example Internet Protocol?

40 / 90

40) A computer program that converts an entire program into machine language at one time is called:

41 / 90

41) Which of the following is not cause of virus?

42 / 90

42) In _________topology, the entire network goes down if the backbone cable fails

43 / 90

43) The layer is used to control how a bit-streams of data is sent and received over physical medium

44 / 90

44) All of the following are elements of data communication system EXCEPT:

45 / 90

45) The protocol used to send graphic and sound files as e-mail attachments is:

46 / 90

46) Writing programs in machine language is:

47 / 90

47) Machine language:

48 / 90

48) How many types of addressing scheme are used on the Internet?

49 / 90

49) The_________layer is the layer closest to the transmission medium

50 / 90

50) Which of the following does not contain machine language code?

51 / 90

51) Which of the following is an internet protocol?

52 / 90

52) The time taken by a data signal to reach to moon and then back to earth was about:

53 / 90

53) Which of the following is a signal?

54 / 90

54) The height of wave within a given period of time is known as:

55 / 90

55) Protecting computers and the information they contain against unwanted access is called:

56 / 90

56) Digital signals are commonly known as:

57 / 90

57) Which type of diagram shows how information flows through a system :

58 / 90

58) Cache memory works between:

59 / 90

59) OSI stands for:

60 / 90

60) The process of identifying and removing errors in the programs is called:

61 / 90

61) Header and footer option can be used from which menu?

62 / 90

62) The most commonly used LAN protocol is:

63 / 90

63) 50.This type of transmission is sometimes called start/stop transmission

64 / 90

64) Cabling on a linear bus topology can be extended using which of following?

65 / 90

65) Layer that is responsible for transferring frames is

66 / 90

66) Which of the following is used to access programs installed on computer?

67 / 90

67) The virus which deletes MS Office files and disk partition information is called:

68 / 90

68) LAN stands for:

69 / 90

69) The extension of the header file is:

70 / 90

70) A tiny handle in the middle of the keyboard is called:

71 / 90

71) A bit can represent how many different values :

72 / 90

72) The’transmission in which data can be received and. sent simultaneously is called:

73 / 90

73) The set of rules to exchange data in a communications network is called:

74 / 90

74) An IDE stands for:

75 / 90

75) Data can be erased using ultraviolet rays written on:

76 / 90

76) Most computer crime are committed by:

77 / 90

77) BCD stands for:

78 / 90

78) The devices that are automatically detected by Windows are called:

79 / 90

79) The medium in which signals travel through a cable or wire is called:

80 / 90

80) Frequency is measured in:

81 / 90

81) GUI stands for:

82 / 90

82) Which of the following is not a Secondary storage device :

83 / 90

83) What layer of OSI models performs data compression?

84 / 90

84) URL stands for:

85 / 90

85) De Jure means

86 / 90

86) The font that does not display little lines at the top and bottom of character is:

87 / 90

87) Another name for antivirus is:

88 / 90

88) Which of the following is not a machine instruction?

89 / 90

89) Which of the following is the insulation on a fiber-optic cable?

90 / 90

90) Who owns the Internet?