Express Pakistan
provide latest news and update
Aiou Workshop 5403| Full Test
1 / 90
1) URL stands for:
2 / 90
2) The secrets word or number used for protection is called:
3 / 90
3) The key that is used to delete a character to the left of the cursor is:
4 / 90
4) Which type of data consists of words,sentences and paragraphs?
5 / 90
5) Cabling on a linear bus topology can be extended using which of following?
6 / 90
6) Which of the following is an internet protocol?
7 / 90
7) Two dissimilar networks can be connected by a:
8 / 90
8) The most familiar input device for computer is :
9 / 90
9) An unwanted message sent through e-mail is called:
10 / 90
10) The chart,graph,pictures and freehand drawing are examples of:
11 / 90
11) The address of instruction being executed is contained within:
12 / 90
12) Which mode replace, the existing text?
13 / 90
13) The [ascetic] militant Chinese have gone straight to the roots of the problems.
14 / 90
14) An important property of fiber optic cable is:
15 / 90
15) The key that is used to delete a character to the right of the cursor is.
16 / 90
16) An IP address consists of:
17 / 90
17) Which of the following is NOT an example of System software :
18 / 90
18) The font that display little lines at the top and bottom of characters is called
19 / 90
19) Which of the following is NOT an input device?
20 / 90
20) The benefits of CAD include:
21 / 90
21) E-mail stands for:
22 / 90
22) Which of the following key is used to compile a program
23 / 90
23) The most commonly used LAN protocol is:
24 / 90
24) What type of device translates data into a form that we can understand?
25 / 90
25) NIC allows direct connection to:
26 / 90
26) How many characters of data does a byte usually represent :
27 / 90
27) Which file contains the program after translation into machine language
28 / 90
28) The output can be:
29 / 90
29) Computer transmit data in the form of codes.
30 / 90
30) Windows operating system can be used to:
31 / 90
31) A modem allows computers to access other computers through following types of connection
32 / 90
32) An important characteristic of RAM is that it is.
33 / 90
33) How many characters ASCII 8-bit code can represent?
34 / 90
34) Checking a computer program for errors is called:
35 / 90
35) An IP address is normally expressed as four octets separated with:
36 / 90
36) Web pages are connected to one another using:
37 / 90
37) One or more computers connected to a hub is called:
38 / 90
38) The Computing and Communication technologies are combined together for :
39 / 90
39) In WAN, the communication software that allows a personal computer to appear as terminal is call
40 / 90
40) Which of the following is not a type of page margin?
41 / 90
41) void occupy how many bytes in memory?
42 / 90
42) The height of wave within a given period of time is known as:
43 / 90
43) The number of bits a computer can process at one time is sometimes called :
44 / 90
44) A standard keyboard used in PC has how many keys :
45 / 90
45) Which of the following is not a type of register?
46 / 90
46) ISDN stands for:
47 / 90
47) Which of the following contains permanent IP address?
48 / 90
48) MICR stands for:
49 / 90
49) The font that does not display little lines at the top and bottom of character is:
50 / 90
50) The process of automatic office tasks using computer-is called:
51 / 90
51) The computers in wide geographical area can be efficiently connected by:
52 / 90
52) Which of the following are considered as resource?
53 / 90
53) Memory consists of:
54 / 90
54) main is a
55 / 90
55) Printers and monitors are common forms of :
56 / 90
56) Which of the following is not a:data communication mode?
57 / 90
57) Which of the following is not a type of user interface?
58 / 90
58) Which communication technique can transmit the data over long distance?
59 / 90
59) Which software is used to solve every day personal or business tasks?
60 / 90
60) Every webpage has unique address on the World Wide Web known as:
61 / 90
61) Transferring information from computer to Internet is called:
62 / 90
62) Which of the following is the most damaging loss to a company?
63 / 90
63) The process of converting analog to digital signal is known as:
64 / 90
64) Which of the following is an impact printer :
65 / 90
65) CPU includes all of the following components EXCEPT
66 / 90
66) Which of the following can be used to launch the word Art
67 / 90
67) Which of the following method is used in data gathering step of Systems Analysis :
68 / 90
68) In the Web address, http://www.microsoft.com, http is:
69 / 90
69) Another word for pointer :
70 / 90
70) FTP stands for
71 / 90
71) GUI stands for:
72 / 90
72) Which modem is used to transmit data signals through air instead of cable?
73 / 90
73) A collection of millions of computers connected to one another is called
74 / 90
74) Which is a correct association between hardware device and component type :
75 / 90
75) The extension of C source program is:
76 / 90
76) Which of following protocols are properly researched, designed and finally published as a standard?
77 / 90
77) Specifications on how the system willsatisfy its requirements are created during :
78 / 90
78) The resolution of a monitor depends on:
79 / 90
79) How many pairs of computers can simultaneously communicate on Ethernet LAN?
80 / 90
80) Bps is short for:
81 / 90
81) Which of the following is not an example of e-commerce?
82 / 90
82) Making illegal copies of copyrighted software is called:
83 / 90
83) Which of the following is determined by video display adapters:
84 / 90
84) Which of the following is valid Website Address?
85 / 90
85) Which of the following contains the administrative tools?
86 / 90
86) RAM stands for
87 / 90
87) Cache memory is:
88 / 90
88) The process of studying an existing system to determine how it works is called :
89 / 90
89) VGA is :
90 / 90
90) What command is used to move selected text to another part of a document?
Your score is