Spread the love
/90
95

Aiou Workshop 5403| Full Test

1 / 90

1) The binary number 0 and 1 is represented by a :

2 / 90

2) Which of the following is not part of a URL?

3 / 90

3) An unwanted message sent through e-mail is called:

4 / 90

4) A tool that is used to generate form letters is called:

5 / 90

5) XGA supports colors up to:

6 / 90

6) Which of the following is a protocol

7 / 90

7) Which of the following is valid Website Address?

8 / 90

8) Who owns the Internet?

9 / 90

9) Which protocol works on the concepts of ring topology and a token?

10 / 90

10) Which of the following is not a machine instruction?

11 / 90

11) How a virus reaches from one computer to another?

12 / 90

12) The chart,graph,pictures and freehand drawing are examples of:

13 / 90

13) Select unguided media from the following:

14 / 90

14) The types.of signals can be:

15 / 90

15) Which component handles the processor communication with its peripheral,

16 / 90

16) Data shown on display unit or played through audio is called:

17 / 90

17) The typical fiber optic cable consists of very narrow strand of glass called:

18 / 90

18) The area in which text is entered, manipulated and viewed is called:

19 / 90

19) The layer is used to control how a bit-streams of data is sent and received over physical medium

20 / 90

20) System analysis produces which of the following results :

21 / 90

21) The companies that use networks can save time and money because network allow users to share:

22 / 90

22) Each computer on a network is called a:

23 / 90

23) A LAN is a combination of:

24 / 90

24) CBT software is used in:

25 / 90

25) MAN stands for:

26 / 90

26) Which key removes the character to the left of the cursor :

27 / 90

27) The extension of MS-Word file is:

28 / 90

28) The process of modifying information system to meet changing needs is called :

29 / 90

29) The speed of laser printer is measured in :

30 / 90

30) Mistakes that cause a running program to produce incorrect results are called:

31 / 90

31) The fly-by-wire system is used in:

32 / 90

32) The process of training personnel to use the new systems is done during :

33 / 90

33) Computers derive its basic strength from:

34 / 90

34) A network that covers a large geographic distance such as a country is called a:

35 / 90

35) Which of the following is not a:data communication mode?

36 / 90

36) The arithmetic/logic unit performs the following

37 / 90

37) Which of the following is not included in document management system?

38 / 90

38) The process of transferring data electronically from one place to another is caled

39 / 90

39) DNS stands for:

40 / 90

40) The size of EAX register can be up to:

41 / 90

41) The format of an email address is:

42 / 90

42) Which of the following is NOT a benefit of computer networks?

43 / 90

43) The most widely used web protocol is:

44 / 90

44) The CPU is housed in a single chip called:

45 / 90

45) Exhaustive data gathering is done during :

46 / 90

46) The process of storing the programs and data in memory is called.

47 / 90

47) Which of the following is used to edit text in a document?

48 / 90

48) The normal orientation for printing is:

49 / 90

49) Which of the following one is not a virus?

50 / 90

50) The term that define, the size and style of a typeface is :

51 / 90

51) The restricted access to the server computer room is a form of:

52 / 90

52) In WAN, the communication software that allows a personal computer to appear as terminal is call

53 / 90

53) Pictures can be added to the document by selecting ________ option from menu bar

54 / 90

54) A major category of software is :

55 / 90

55) A device used for optical-character recognition is a:

56 / 90

56) Which of the following key is used to save a file?

57 / 90

57) The output of the compiler is called:

58 / 90

58) Pressing Ins key will:

59 / 90

59) All of the following may be stored in registers EXCEPT:

60 / 90

60) A type of language in which instructions are written in binary form is called:

61 / 90

61) The hardware device that temporarily holds data and program is called :

62 / 90

62) IBM stands for:

63 / 90

63) The statements written by the programmer are called:

64 / 90

64) In the Web address, http://www.microsoft.com, http is:

65 / 90

65) Checking a computer program for errors is called:

66 / 90

66) Which of the following errors are NOT detected by compiler?

67 / 90

67) The key that is used to delete a character to the left of the cursor is:

68 / 90

68) The size of the characters to be printed is measured in.

69 / 90

69) OSI reference model has:

70 / 90

70) which of the following header file contains information about common mathematical functions?

71 / 90

71) Which of the following is related to business?

72 / 90

72) The name of header file is written between:

73 / 90

73) Which device uses light to determine the location of pencil marks on sheets?

74 / 90

74) The data moves between the internal components of the computer using:

75 / 90

75) Which register holds the address of next instruction to be fetched for execution?

76 / 90

76) Which of the following is a search engine?

77 / 90

77) Windows 2000 is a:

78 / 90

78) Transmission media are usually categorized as_

79 / 90

79) The most commonly used LAN protocol is:

80 / 90

80) Which of the following media can be used for backup?

81 / 90

81) Full-duplex communication is made. possible by the.devices known as:

82 / 90

82) Which of the following memories allows simultaneous read and write operations?

83 / 90

83) Many banks provide the facility of:

84 / 90

84) The advantage of an LCD monitor is that it is:

85 / 90

85) Which of the following is an example of a font weight?

86 / 90

86) What is the difference between hardware and software?

87 / 90

87) The internal transfer of binary data in a computer uses mode.

88 / 90

88) The direction of paper in printing is referred to as

89 / 90

89) The process of linking library files with object cod is known as:

90 / 90

90) The name of the document is displayed: