Express Pakistan
provide latest news and update
Aiou Workshop 5403| Full Test
1 / 90
1) Which LAN access method resolves the contention between two or more nodes by collision detection
2 / 90
2) Making illegal copies of copyrighted software is called:
3 / 90
3) All of the following are top-level domains EXCEPT:
4 / 90
4) Which of the following is the largest unit of data :
5 / 90
5) CU stands for:
6 / 90
6) The interface used by Windows is called
7 / 90
7) Which device translates data into a form that the computer understands :
8 / 90
8) How a virus reaches from one computer to another?
9 / 90
9) CPU includes all of the following components EXCEPT
10 / 90
10) Which of the following is not a biometric technique:
11 / 90
11) Which of the following components is used to convert first.c to first.exe?
12 / 90
12) The electron beam scanning is a characteristic of:
13 / 90
13) The keyboard format that is most commonly used is the :
14 / 90
14) Additional data and program not being used by CPU are stored in :
15 / 90
15) Which of the following is a protocol
16 / 90
16) Windows operating system can be used to:
17 / 90
17) Which of the following keyboard shortcuts is used to change the case?
18 / 90
18) How many pairs of computers can simultaneously communicate on Ethernet LAN?
19 / 90
19) Ctrl + Alt + Del is:
20 / 90
20) Which of the following code can represent up to 65,536 symbols?
21 / 90
21) All of the following are properties of a monitor expect:
22 / 90
22) The output of printer is called:
23 / 90
23) Multiple choice examination answer sheet can be evaluated automatically using :
24 / 90
24) Protecting computers and the information they contain against unwanted access is called:
25 / 90
25) A type of language in which instructions are written in binary form is called:
26 / 90
26) The layer lies between the network layer and the application layer
27 / 90
27) Which malicious program is activated when a specific set of conditions are met?
28 / 90
28) Another name for antivirus is:
29 / 90
29) The extension of the header file is:
30 / 90
30) The step that performs the actions given in the instructions is called:
31 / 90
31) TB is approximately :
32 / 90
32) Unicode uses:
33 / 90
33) Word processing programs are used to create:
34 / 90
34) Each set of bit pattern is called:
35 / 90
35) Which of the following is NOT an input device?
36 / 90
36) Which of the following is an example of a font weight?
37 / 90
37) The frame rate is a factor in which of the following outputs?
38 / 90
38) Computers derive its basic strength from:
39 / 90
39) CAT stands for:
40 / 90
40) Which of the following is NOT an example of System software :
41 / 90
41) A set of illegal instructions inserted into a legitimate computer program is called:
42 / 90
42) .The conversation over a walkie-talkie radio is-an example of:
43 / 90
43) The output of the compiler is called:
44 / 90
44) The music and speech.represent:
45 / 90
45) A LAN is a combination of:
46 / 90
46) One or more computers connected to a hub is called:
47 / 90
47) Which of the following is used to access programs installed on computer?
48 / 90
48) Which memory is used to speed up the computer processing?
49 / 90
49) All of the following are text alignment options in MS Word except:
50 / 90
50) 1 Terabyte (TB) =____ bytes :
51 / 90
51) Which memory retains its contents without constant electronic refreshment:
52 / 90
52) Which protocol works on the concepts of ring topology and a token?
53 / 90
53) The speed of laser printer is measured in :
54 / 90
54) main is a
55 / 90
55) A type of communication that sends data using flow control to synchronize data between sender
56 / 90
56) ALU has _______ units:
57 / 90
57) Add New Hardware option is available in:
58 / 90
58) For every opening brace in a C program, there must be a:
59 / 90
59) Most modem word processors allow users to control the formats of:
60 / 90
60) The letters NT in Windows NT stands for:
61 / 90
61) The process of touching an object with mouse pointer is called:
62 / 90
62) Which key removes the character to the left of the cursor :
63 / 90
63) Microsoft Windows version 3.1 is a
64 / 90
64) CBT software is used in:
65 / 90
65) Which of the following is a mouse event?
66 / 90
66) VGA is :
67 / 90
67) FormatC is an example of:
68 / 90
68) which component of CPU interacts with primary memory?
69 / 90
69) Font effects include:
70 / 90
70) Sending and receiving messages electronically is known as
71 / 90
71) A domain name is the text version of:
72 / 90
72) Which of the following is popular full-featured word processor?
73 / 90
73) Header files in C contain:
74 / 90
74) stdio stands for:
75 / 90
75) A special program that can detect and remove viruses from computer is called:
76 / 90
76) Interface used by DOS is called:
77 / 90
77) Which of the following keys is used to delete characters in a document?
78 / 90
78) The bus used to connect the CPU to memory on the system board is called:
79 / 90
79) void occupy how many bytes in memory?
80 / 90
80) .Which transmission type transmits data one character at a time
81 / 90
81) Which of the following is related to business?
82 / 90
82) The amount of vertical space between the lines of text is determined by:
83 / 90
83) ISDN stands for:
84 / 90
84) A program that interferes with the normal working of a computer is called:
85 / 90
85) E ARPA stands for:
86 / 90
86) OSI stands for:
87 / 90
87) The resolution of a monitor depends on:
88 / 90
88) How many bits are carried by one line of data bus?
89 / 90
89) Which network covers a large area:
90 / 90
90) The secrets word or number used for protection is called:
Your score is