Express Pakistan
provide latest news and update
Aiou Workshop 5403| Full Test
1 / 90
1) The key that is used to delete a character to the left of the cursor is:
2 / 90
2) Which one is faster
3 / 90
3) The hardware device that temporarily holds data and program is called :
4 / 90
4) The network architecture that allows every computer to act as client as well as a server is:
5 / 90
5) An IP address consists of:
6 / 90
6) This is a complete instruction that causes the computer to perform some action:
7 / 90
7) Which of the following is NOT a category of network?
8 / 90
8) How many orientation types are available in Word?
9 / 90
9) A discussion group to exchange information like science and computer is called:
10 / 90
10) The process of moving up or down in a word processing document is called:
11 / 90
11) Which of the following key is used to load a program it memory to run?
12 / 90
12) A printer is needed to:
13 / 90
13) Choose the program that translates and executes one line of source code at a time.
14 / 90
14) A computer network must contain at least number of computers:
15 / 90
15) Tables are used to display:
16 / 90
16) NIC allows direct connection to:
17 / 90
17) Computer based weather forecasting depends on accurate collection of data from:
18 / 90
18) Which of the following is used for static RAM technology?
19 / 90
19) What binary bits are used to encode digital data?
20 / 90
20) A computer main function is to :
21 / 90
21) The process of linking library files with object cod is known as:
22 / 90
22) Which of the following is not included in document management system?
23 / 90
23) A port on the computer may be connected to:
24 / 90
24) Electronic commerce (e-commerce) is the process of:
25 / 90
25) Which of the following cannot be set using the Format command?
26 / 90
26) CBT software is used in:
27 / 90
27) The restricted access to the server computer room is a form of:
28 / 90
28) FDDI is a __________network.
29 / 90
29) Which of the following is ranked from smallest to largest :
30 / 90
30) EAX, EBX, ECX and EDX are:
31 / 90
31) Making illegal copies of copyrighted software is called:
32 / 90
32) Memory space in a computer is used to:
33 / 90
33) ______is used to product attractive documents using photos, artwork and graphics:
34 / 90
34) A spelling error (e.g. typing intt instead of int) is an example of:
35 / 90
35) Two dissimilar networks can be connected by a:
36 / 90
36) Which protocol works on the concepts of ring topology and a token?
37 / 90
37) Which of the following components is used to convert first.c to first.exe?
38 / 90
38) VCR stands for:
39 / 90
39) Which of the following is an example Internet Protocol?
40 / 90
40) A computer program that converts an entire program into machine language at one time is called:
41 / 90
41) Which of the following is not cause of virus?
42 / 90
42) In _________topology, the entire network goes down if the backbone cable fails
43 / 90
43) The layer is used to control how a bit-streams of data is sent and received over physical medium
44 / 90
44) All of the following are elements of data communication system EXCEPT:
45 / 90
45) The protocol used to send graphic and sound files as e-mail attachments is:
46 / 90
46) Writing programs in machine language is:
47 / 90
47) Machine language:
48 / 90
48) How many types of addressing scheme are used on the Internet?
49 / 90
49) The_________layer is the layer closest to the transmission medium
50 / 90
50) Which of the following does not contain machine language code?
51 / 90
51) Which of the following is an internet protocol?
52 / 90
52) The time taken by a data signal to reach to moon and then back to earth was about:
53 / 90
53) Which of the following is a signal?
54 / 90
54) The height of wave within a given period of time is known as:
55 / 90
55) Protecting computers and the information they contain against unwanted access is called:
56 / 90
56) Digital signals are commonly known as:
57 / 90
57) Which type of diagram shows how information flows through a system :
58 / 90
58) Cache memory works between:
59 / 90
59) OSI stands for:
60 / 90
60) The process of identifying and removing errors in the programs is called:
61 / 90
61) Header and footer option can be used from which menu?
62 / 90
62) The most commonly used LAN protocol is:
63 / 90
63) 50.This type of transmission is sometimes called start/stop transmission
64 / 90
64) Cabling on a linear bus topology can be extended using which of following?
65 / 90
65) Layer that is responsible for transferring frames is
66 / 90
66) Which of the following is used to access programs installed on computer?
67 / 90
67) The virus which deletes MS Office files and disk partition information is called:
68 / 90
68) LAN stands for:
69 / 90
69) The extension of the header file is:
70 / 90
70) A tiny handle in the middle of the keyboard is called:
71 / 90
71) A bit can represent how many different values :
72 / 90
72) The’transmission in which data can be received and. sent simultaneously is called:
73 / 90
73) The set of rules to exchange data in a communications network is called:
74 / 90
74) An IDE stands for:
75 / 90
75) Data can be erased using ultraviolet rays written on:
76 / 90
76) Most computer crime are committed by:
77 / 90
77) BCD stands for:
78 / 90
78) The devices that are automatically detected by Windows are called:
79 / 90
79) The medium in which signals travel through a cable or wire is called:
80 / 90
80) Frequency is measured in:
81 / 90
81) GUI stands for:
82 / 90
82) Which of the following is not a Secondary storage device :
83 / 90
83) What layer of OSI models performs data compression?
84 / 90
84) URL stands for:
85 / 90
85) De Jure means
86 / 90
86) The font that does not display little lines at the top and bottom of character is:
87 / 90
87) Another name for antivirus is:
88 / 90
88) Which of the following is not a machine instruction?
89 / 90
89) Which of the following is the insulation on a fiber-optic cable?
90 / 90
90) Who owns the Internet?
Your score is