May 22, 2026

Aiou Workshop 5403| Full Test

By | Published | No Comments
Spread the love
/90
95

Aiou Workshop 5403| Full Test

1 / 90

1) Unicode uses:

2 / 90

2) Which of the following is not part of a URL?

3 / 90

3) Which of the following keys is used to cancel an operation :

4 / 90

4) The memory cells are logically organized into group of:

5 / 90

5) The process of modifying information system to meet changing needs is called :

6 / 90

6) The font that display little lines at the top and bottom of characters is called

7 / 90

7) A device that is used to connect two computers using telephone line is called:

8 / 90

8) How may types of graphic cards are available in market?

9 / 90

9) Which kind of signal is mostly required by telephone lines?

10 / 90

10) The communication channels can be divided into_categories:

11 / 90

11) The extension of C source program is:

12 / 90

12) A combination of both client/server and peer-to-peer network is_______network

13 / 90

13) Which of the following technologies is used in flat-panel display screens?

14 / 90

14) What percent of personal computer in the world have word processor installed?

15 / 90

15) ISP stands for:

16 / 90

16) Which of the following contains the administrative tools?

17 / 90

17) Which of the following is used to edit text in a document?

18 / 90

18) An unwanted message sent through e-mail is called:

19 / 90

19) Microsoft Windows version 3.1 is a

20 / 90

20) The internal transfer of binary data in a computer uses mode.

21 / 90

21) A LAN is a combination of:

22 / 90

22) The difference between ROM and RAM is:

23 / 90

23) The layer that provides services that directly support user application:

24 / 90

24) The time taken by a data signal to reach to moon and then back to earth was about:

25 / 90

25) The ability of an operating system to control the activities of multiple programs at the same time?

26 / 90

26) A program’s syntax errors are detected by:

27 / 90

27) Which of the following feature is used to reverse the changes made to a document?

28 / 90

28) Which of the following is the most damaging loss to a company?

29 / 90

29) Which of the following keyboard shortcuts is used to change the case?

30 / 90

30) The services on the Internet include

31 / 90

31) Typically, data transfer rate in LAN are of the order of:

32 / 90

32) The meaning of the value of a bit is :

33 / 90

33) Which multiplexing technique shifts each signal to a different carrier frequency?

34 / 90

34) Entering and editing text can be done most efficiently using a:

35 / 90

35) GUI stands for:

36 / 90

36) The communication across WAN occurs using:

37 / 90

37) The term that define, the size and style of a typeface is :

38 / 90

38) Which of the following key is used to load a program it memory to run?

39 / 90

39) The expression may be:

40 / 90

40) Which of the following is NOT an example of a program bug?

41 / 90

41) Websites are hosted on___________computers on the Internet.

42 / 90

42) Which of the following is NOT an input device?

43 / 90

43) LCD stand for :

44 / 90

44) Another name for email program is:

45 / 90

45) A LAN protocol in which all computers and devices on the network pass a special signal known as:

46 / 90

46) Which of the following is not a type of ROM:

47 / 90

47) The benefits of CAD include:

48 / 90

48) GB is approximately :

49 / 90

49) All of the following are guided communications media EXCEPT:

50 / 90

50) Which transmission allows data to travel in one direction at a time?

51 / 90

51) Software that controls computing resources is called :

52 / 90

52) The step that performs the actions given in the instructions is called:

53 / 90

53) Route determination can be identified by:

54 / 90

54) Which memory retains its contents without constant electronic refreshment:

55 / 90

55) Which of the following is used to find information on the World Wide Web?

56 / 90

56) Which computer memory is used to store programs and data being processed by the

57 / 90

57) 1 Gigabyte (GB) =____ bytes :

58 / 90

58) The process of transferring a file from remote computer to local computer on network is called

59 / 90

59) Testing all program components together is called :

60 / 90

60) Hardware is best described as :

61 / 90

61) The height of wave within a given period of time is known as:

62 / 90

62) A computer network must contain at least number of computers:

63 / 90

63) The layer that is concerned with addressing and routing is called:

64 / 90

64) Which register has special role in division and multiplication?

65 / 90

65) A special program that can detect and remove viruses from computer is called:

66 / 90

66) An important characteristic of RAM is that it is.

67 / 90

67) Which of the following is computer virus?

68 / 90

68) Which of the following reason causes the syntax error

69 / 90

69) The frame rate is a factor in which of the following outputs?

70 / 90

70) The arithmetic/logic unit performs the following

71 / 90

71) Which device translates data into a form that the computer understands :

72 / 90

72) What binary bits are used to encode digital data?

73 / 90

73) All of the following may be stored in registers EXCEPT:

74 / 90

74) Which of the following language provided the basis for the development C

75 / 90

75) CBT stands for:

76 / 90

76) DARPA stands for:

77 / 90

77) Which of the following is a web browser?

78 / 90

78) A bit can represent how many different values :

79 / 90

79) Printed images can be converted into digital from using:

80 / 90

80) Was a wide area network connecting a small number of users.

81 / 90

81) EAX, EBX, ECX and EDX are:

82 / 90

82) Which modem is used to transmit data signals through air instead of cable?

83 / 90

83) The font that does not display little lines at the top and bottom of character is:

84 / 90

84) What type of printer forms images one character at a time as print head moves across the paper :

85 / 90

85) The smallest unit of information in the computer is :

86 / 90

86) _____function key is used for help.

87 / 90

87) The protocol used to send graphic and sound files as e-mail attachments is:

88 / 90

88) The extension of an executable file is:

89 / 90

89) OSI reference model has:

90 / 90

90) Who owns the Internet?