Express Pakistan
provide latest news and update
Aiou Workshop 5403| Full Test
1 / 90
1) The bottem most layer of the OSI is called:
2 / 90
2) IBM stands for:
3 / 90
3) The companies that use networks can save time and money because network allow users to share:
4 / 90
4) which of the following language Is ideal to write business application
5 / 90
5) The step that performs the actions given in the instructions is called:
6 / 90
6) An important characteristic of RAM is that it is.
7 / 90
7) Many networks include a central computer called:
8 / 90
8) The music and speech.represent:
9 / 90
9) All of the following are elements of data communication system EXCEPT:
10 / 90
10) Which of the following is a search engine?
11 / 90
11) http://www.microsoft.com is an example of:
12 / 90
12) Which of the following is an email client?
13 / 90
13) 1 Terabyte (TB) =____ bytes :
14 / 90
14) Software that is developed specifically for the company’s own use is called :
15 / 90
15) The types.of signals can be:
16 / 90
16) Each set of bit pattern is called:
17 / 90
17) All of the following may be stored in registers EXCEPT:
18 / 90
18) The right of a person to keep his personal information away from others is called:
19 / 90
19) RAM usually has ______ types
20 / 90
20) Which of the following can be used to launch the word Art
21 / 90
21) The modern revolution in information technology can be termed as :
22 / 90
22) The time taken by a data signal to reach to moon and then back to earth was about:
23 / 90
23) A device that is used to connect two computers using telephone line is called:
24 / 90
24) The process of producing multiple copies of a document is called:
25 / 90
25) The type of reader commonly used to read bank checks is a (n).
26 / 90
26) The layer that defines the formats the data uses as it in transmitted on the communication line
27 / 90
27) The processing of running an executable file is known as
28 / 90
28) The size of EAX register can be up to:
29 / 90
29) The most commonly used LAN protocol is:
30 / 90
30) Biometric data
31 / 90
31) A set collection of a large number of computers all over the world connected to one another is
32 / 90
32) Tables allow the text to be displayed in:
33 / 90
33) Which of the following media can be used for backup?
34 / 90
34) Was a wide area network connecting a small number of users.
35 / 90
35) Exhaustive data gathering is done during :
36 / 90
36) The external devices connected to a computer system are known as:
37 / 90
37) Expansion cards are inserted into:
38 / 90
38) Computer is a combination of :
39 / 90
39) A port on the computer may be connected to:
40 / 90
40) The [ascetic] militant Chinese have gone straight to the roots of the problems.
41 / 90
41) FTP facility is used to:
42 / 90
42) EBCDIC is a
43 / 90
43) When starting Word, the name of the default document is:
44 / 90
44) .The conversation over a walkie-talkie radio is-an example of:
45 / 90
45) Websites are hosted on___________computers on the Internet.
46 / 90
46) Software that is available free for a limited period is called:
47 / 90
47) The technology of long-distance communication is known as:
48 / 90
48) DARPA stands for:
49 / 90
49) Many banks provide the facility of:
50 / 90
50) Textbox can be created by selecting _________option from the menu bar:
51 / 90
51) Which of the following is an authentication methodology?
52 / 90
52) Microsoft Windows version 3.1 is a
53 / 90
53) Which of the following is not a type of bus in computer?
54 / 90
54) Which kind of signal is mostly required by telephone lines?
55 / 90
55) DNS stands for:
56 / 90
56) Step by Step instruction that run the computer are called :
57 / 90
57) The hardware component that permanently holds data and program is called :
58 / 90
58) Which of the following is not a Secondary storage device :
59 / 90
59) Internet surfing is an example of:
60 / 90
60) The output of the compiler is called:
61 / 90
61) The layer is used to control how a bit-streams of data is sent and received over physical medium
62 / 90
62) A program’s syntax errors are detected by:
63 / 90
63) Which of the following key is used to load a program it memory to run?
64 / 90
64) Which of the following cannot be set using the Format command?
65 / 90
65) A small image that represents a program, instruction, or file is called:
66 / 90
66) The smallest unit of information in the computer is :
67 / 90
67) Which of the following is used to surf Internet?
68 / 90
68) The expression may be:
69 / 90
69) 1 MB is approximately :
70 / 90
70) In star topology, the central device is called:
71 / 90
71) A telephone conversation is’an example of:.
72 / 90
72) Which type of network covers a small area?
73 / 90
73) The order of stack is:
74 / 90
74) Which is NOT a LAN protocol?
75 / 90
75) Additional data and program not being used by CPU are stored in :
76 / 90
76) Which type of flat-panel computer screen provides the highest-quality image?
77 / 90
77) Division by zero (e.g. 2/ 0) is an example
78 / 90
78) A____is a computer that provides services to other computers of the network.
79 / 90
79) The_________layer is the layer closest to the transmission medium
80 / 90
80) The brain of the computer that executes the instructions is called:
81 / 90
81) The process of moving up or down in a word processing document is called:
82 / 90
82) A gigabyte is equal to :
83 / 90
83) The type of conversion in which individual components of the new system are used one by one is :
84 / 90
84) Each computer on a network is called a:
85 / 90
85) Which of the following one is not a virus?
86 / 90
86) The extension of MS-Word file is:
87 / 90
87) BIT stand for :
88 / 90
88) The process of touching an object with mouse pointer is called:
89 / 90
89) Another name for email program is:
90 / 90
90) How many characters of data does a byte usually represent :
Your score is