Express Pakistan
provide latest news and update
Aiou Workshop 5403| Full Test
1 / 90
1) Copying data from Internet to computer is called:
2 / 90
2) Defacto means:
3 / 90
3) C programs are divided into units called:
4 / 90
4) Which component handles the processor communication with its peripheral,
5 / 90
5) Sending and receiving messages electronically is known as
6 / 90
6) Which is the most common LAN topology?
7 / 90
7) The area in which text is entered, manipulated and viewed is called:
8 / 90
8) Which of the following is used to find information on the World Wide Web?
9 / 90
9) BCD stands for:
10 / 90
10) Which of the following is used to manage files and folders?
11 / 90
11) Another name for antivirus is:
12 / 90
12) Full-duplex communication is made. possible by the.devices known as:
13 / 90
13) This is a complete instruction that causes the computer to perform some action:
14 / 90
14) The number of frequencies that can fit on a link at one time is called:
15 / 90
15) Which software is used to solve every day personal or business tasks?
16 / 90
16) There are ___________type of General purpose register:
17 / 90
17) The bus used to connect the CPU to memory on the system board is called:
18 / 90
18) Additional data and program not being used by CPU are stored in :
19 / 90
19) Which transmission allows data to travel in one direction at a time?
20 / 90
20) Which is the most secure type of transmission medium?
21 / 90
21) Which of the following one is not a virus?
22 / 90
22) The size of the file that can be attached to an email depends on:
23 / 90
23) Which of the following technique uses modulation?
24 / 90
24) The communication channels can be divided into_categories:
25 / 90
25) Websites are hosted on___________computers on the Internet.
26 / 90
26) The Computing and Communication technologies are combined together for :
27 / 90
27) The layer is used to control how a bit-streams of data is sent and received over physical medium
28 / 90
28) All of the following are elements of data communication system EXCEPT:
29 / 90
29) The extension of C source program is:
30 / 90
30) In the e-mail address me@pu.edu, the world “me” is:
31 / 90
31) Another name for email program is:
32 / 90
32) The devices that are automatically detected by Windows are called:
33 / 90
33) The height of wave within a given period of time is known as:
34 / 90
34) The brain of the computer that executes the instructions is called:
35 / 90
35) Step by Step instruction that run the computer are called :
36 / 90
36) _________ is an automatic programmable machine.
37 / 90
37) ROM stands for:
38 / 90
38) How many characters of data does a byte usually represent :
39 / 90
39) The electron beams are swept across a coating of____to display output on CRT screen:
40 / 90
40) A set of documents stored on computer permanently connected with Internet is:
41 / 90
41) Which of the following transmission media is used in LAN?
42 / 90
42) Which of the following viruses executes when starting the computer?
43 / 90
43) The right of a person to keep his personal information away from others is called:
44 / 90
44) Which of the following is a governing body to approve the network standards?
45 / 90
45) How many pairs of computers can simultaneously communicate on Ethernet LAN?
46 / 90
46) The standard protocol for the Internet is:
47 / 90
47) C was developed in the year:1972
48 / 90
48) The layer lies between the network layer and the application layer
49 / 90
49) stdio stands for:
50 / 90
50) The hardware device that temporarily holds data and program is called :
51 / 90
51) A person who gains illegal access to a computer system is called:
52 / 90
52) Which of the following reason causes the syntax error
53 / 90
53) The conversation over a walkie-talkie radio is-an example of:
54 / 90
54) A computer program that converts an entire program into machine language at one time is called:
55 / 90
55) Computer transmit data in the form of codes.
56 / 90
56) Windows 2000 is a:
57 / 90
57) Which of the following cannot be set using the Format command?
58 / 90
58) A major category of software is :
59 / 90
59) The extension of MS-Word file is:
60 / 90
60) EAX, EBX, ECX and EDX are:
61 / 90
61) The order of stack is:
62 / 90
62) XGA supports colors up to:
63 / 90
63) The arithmetic/logic unit can perform
64 / 90
64) Electronic commerce (e-commerce) is the process of:
65 / 90
65) The number of bits a computer can process at one time is sometimes called :
66 / 90
66) Which memory retains its contents without constant electronic refreshment:
67 / 90
67) Memory space in a computer is used to:
68 / 90
68) Web pages are written in which type of language?
69 / 90
69) The benefits of using computers are:
70 / 90
70) Which of the following task is related to Preliminary investigation :
71 / 90
71) Laser printer is an example of:
72 / 90
72) A type of communication that sends that uses a clock to control timing of bits being sent is called:
73 / 90
73) Which one is faster
74 / 90
74) Which of the following is general type of input devices :
75 / 90
75) Which of the following is used for personal identification?
76 / 90
76) Which of the following is the entering point in Windows?
77 / 90
77) DPI stand for :
78 / 90
78) NIC allows direct connection to:
79 / 90
79) Which key removes the character to the left of the cursor :
80 / 90
80) Making illegal copies of copyrighted software is called:
81 / 90
81) The layer that is in between of session and application layer is
82 / 90
82) GB is approximately :
83 / 90
83) A port on the computer may be connected to:
84 / 90
84) The physical layout of a network is known as:
85 / 90
85) Which LAN access method resolves the contention between two or more nodes by collision detection
86 / 90
86) All of the following may be stored in registers EXCEPT:
87 / 90
87) The extension of the header file is:
88 / 90
88) Which of the following is a biometric technique for person identification?
89 / 90
89) A telephone conversation is’an example of:.
90 / 90
90) Types of translators are:
Your score is