October 19, 2025

Aiou Workshop 5403| Full Test

By | Published | No Comments
Spread the love
/90
95

Aiou Workshop 5403| Full Test

1 / 90

1) Copying data from Internet to computer is called:

2 / 90

2) Defacto means:

3 / 90

3) C programs are divided into units called:

4 / 90

4) Which component handles the processor communication with its peripheral,

5 / 90

5) Sending and receiving messages electronically is known as

6 / 90

6) Which is the most common LAN topology?

7 / 90

7) The area in which text is entered, manipulated and viewed is called:

8 / 90

8) Which of the following is used to find information on the World Wide Web?

9 / 90

9) BCD stands for:

10 / 90

10) Which of the following is used to manage files and folders?

11 / 90

11) Another name for antivirus is:

12 / 90

12) Full-duplex communication is made. possible by the.devices known as:

13 / 90

13) This is a complete instruction that causes the computer to perform some action:

14 / 90

14) The number of frequencies that can fit on a link at one time is called:

15 / 90

15) Which software is used to solve every day personal or business tasks?

16 / 90

16) There are ___________type of General purpose register:

17 / 90

17) The bus used to connect the CPU to memory on the system board is called:

18 / 90

18) Additional data and program not being used by CPU are stored in :

19 / 90

19) Which transmission allows data to travel in one direction at a time?

20 / 90

20) Which is the most secure type of transmission medium?

21 / 90

21) Which of the following one is not a virus?

22 / 90

22) The size of the file that can be attached to an email depends on:

23 / 90

23) Which of the following technique uses modulation?

24 / 90

24) The communication channels can be divided into_categories:

25 / 90

25) Websites are hosted on___________computers on the Internet.

26 / 90

26) The Computing and Communication technologies are combined together for :

27 / 90

27) The layer is used to control how a bit-streams of data is sent and received over physical medium

28 / 90

28) All of the following are elements of data communication system EXCEPT:

29 / 90

29) The extension of C source program is:

30 / 90

30) In the e-mail address me@pu.edu, the world “me” is:

31 / 90

31) Another name for email program is:

32 / 90

32) The devices that are automatically detected by Windows are called:

33 / 90

33) The height of wave within a given period of time is known as:

34 / 90

34) The brain of the computer that executes the instructions is called:

35 / 90

35) Step by Step instruction that run the computer are called :

36 / 90

36) _________ is an automatic programmable machine.

37 / 90

37) ROM stands for:

38 / 90

38) How many characters of data does a byte usually represent :

39 / 90

39) The electron beams are swept across a coating of____to display output on CRT screen:

40 / 90

40) A set of documents stored on computer permanently connected with Internet is:

41 / 90

41) Which of the following transmission media is used in LAN?

42 / 90

42) Which of the following viruses executes when starting the computer?

43 / 90

43) The right of a person to keep his personal information away from others is called:

44 / 90

44) Which of the following is a governing body to approve the network standards?

45 / 90

45) How many pairs of computers can simultaneously communicate on Ethernet LAN?

46 / 90

46) The standard protocol for the Internet is:

47 / 90

47) C was developed in the year:1972

48 / 90

48) The layer lies between the network layer and the application layer

49 / 90

49) stdio stands for:

50 / 90

50) The hardware device that temporarily holds data and program is called :

51 / 90

51) A person who gains illegal access to a computer system is called:

52 / 90

52) Which of the following reason causes the syntax error

53 / 90

53) The conversation over a walkie-talkie radio is-an example of:

54 / 90

54) A computer program that converts an entire program into machine language at one time is called:

55 / 90

55) Computer transmit data in the form of codes.

56 / 90

56) Windows 2000 is a:

57 / 90

57) Which of the following cannot be set using the Format command?

58 / 90

58) A major category of software is :

59 / 90

59) The extension of MS-Word file is:

60 / 90

60) EAX, EBX, ECX and EDX are:

61 / 90

61) The order of stack is:

62 / 90

62) XGA supports colors up to:

63 / 90

63) The arithmetic/logic unit can perform

64 / 90

64) Electronic commerce (e-commerce) is the process of:

65 / 90

65) The number of bits a computer can process at one time is sometimes called :

66 / 90

66) Which memory retains its contents without constant electronic refreshment:

67 / 90

67) Memory space in a computer is used to:

68 / 90

68) Web pages are written in which type of language?

69 / 90

69) The benefits of using computers are:

70 / 90

70) Which of the following task is related to Preliminary investigation :

71 / 90

71) Laser printer is an example of:

72 / 90

72) A type of communication that sends that uses a clock to control timing of bits being sent is called:

73 / 90

73) Which one is faster

74 / 90

74) Which of the following is general type of input devices :

75 / 90

75) Which of the following is used for personal identification?

76 / 90

76) Which of the following is the entering point in Windows?

77 / 90

77) DPI stand for :

78 / 90

78) NIC allows direct connection to:

79 / 90

79) Which key removes the character to the left of the cursor :

80 / 90

80) Making illegal copies of copyrighted software is called:

81 / 90

81) The layer that is in between of session and application layer is

82 / 90

82) GB is approximately :

83 / 90

83) A port on the computer may be connected to:

84 / 90

84) The physical layout of a network is known as:

85 / 90

85) Which LAN access method resolves the contention between two or more nodes by collision detection

86 / 90

86) All of the following may be stored in registers EXCEPT:

87 / 90

87) The extension of the header file is:

88 / 90

88) Which of the following is a biometric technique for person identification?

89 / 90

89) A telephone conversation is’an example of:.

90 / 90

90) Types of translators are: