April 24, 2026

Aiou Workshop 5403| Full Test

By | Published | No Comments
Spread the love
/90
95

Aiou Workshop 5403| Full Test

1 / 90

1) Which LAN access method resolves the contention between two or more nodes by collision detection

2 / 90

2) Making illegal copies of copyrighted software is called:

3 / 90

3) All of the following are top-level domains EXCEPT:

4 / 90

4) Which of the following is the largest unit of data :

5 / 90

5) CU stands for:

6 / 90

6) The interface used by Windows is called

7 / 90

7) Which device translates data into a form that the computer understands :

8 / 90

8) How a virus reaches from one computer to another?

9 / 90

9) CPU includes all of the following components EXCEPT

10 / 90

10) Which of the following is not a biometric technique:

11 / 90

11) Which of the following components is used to convert first.c to first.exe?

12 / 90

12) The electron beam scanning is a characteristic of:

13 / 90

13) The keyboard format that is most commonly used is the :

14 / 90

14) Additional data and program not being used by CPU are stored in :

15 / 90

15) Which of the following is a protocol

16 / 90

16) Windows operating system can be used to:

17 / 90

17) Which of the following keyboard shortcuts is used to change the case?

18 / 90

18) How many pairs of computers can simultaneously communicate on Ethernet LAN?

19 / 90

19) Ctrl + Alt + Del is:

20 / 90

20) Which of the following code can represent up to 65,536 symbols?

21 / 90

21) All of the following are properties of a monitor expect:

22 / 90

22) The output of printer is called:

23 / 90

23) Multiple choice examination answer sheet can be evaluated automatically using :

24 / 90

24) Protecting computers and the information they contain against unwanted access is called:

25 / 90

25) A type of language in which instructions are written in binary form is called:

26 / 90

26) The layer lies between the network layer and the application layer

27 / 90

27) Which malicious program is activated when a specific set of conditions are met?

28 / 90

28) Another name for antivirus is:

29 / 90

29) The extension of the header file is:

30 / 90

30) The step that performs the actions given in the instructions is called:

31 / 90

31) TB is approximately :

32 / 90

32) Unicode uses:

33 / 90

33) Word processing programs are used to create:

34 / 90

34) Each set of bit pattern is called:

35 / 90

35) Which of the following is NOT an input device?

36 / 90

36) Which of the following is an example of a font weight?

37 / 90

37) The frame rate is a factor in which of the following outputs?

38 / 90

38) Computers derive its basic strength from:

39 / 90

39) CAT stands for:

40 / 90

40) Which of the following is NOT an example of System software :

41 / 90

41) A set of illegal instructions inserted into a legitimate computer program is called:

42 / 90

42) .The conversation over a walkie-talkie radio is-an example of:

43 / 90

43) The output of the compiler is called:

44 / 90

44) The music and speech.represent:

45 / 90

45) A LAN is a combination of:

46 / 90

46) One or more computers connected to a hub is called:

47 / 90

47) Which of the following is used to access programs installed on computer?

48 / 90

48) Which memory is used to speed up the computer processing?

49 / 90

49) All of the following are text alignment options in MS Word except:

50 / 90

50) 1 Terabyte (TB) =____ bytes :

51 / 90

51) Which memory retains its contents without constant electronic refreshment:

52 / 90

52) Which protocol works on the concepts of ring topology and a token?

53 / 90

53) The speed of laser printer is measured in :

54 / 90

54) main is a

55 / 90

55) A type of communication that sends data using flow control to synchronize data between sender

56 / 90

56) ALU has _______ units:

57 / 90

57) Add New Hardware option is available in:

58 / 90

58) For every opening brace in a C program, there must be a:

59 / 90

59) Most modem word processors allow users to control the formats of:

60 / 90

60) The letters NT in Windows NT stands for:

61 / 90

61) The process of touching an object with mouse pointer is called:

62 / 90

62) Which key removes the character to the left of the cursor :

63 / 90

63) Microsoft Windows version 3.1 is a

64 / 90

64) CBT software is used in:

65 / 90

65) Which of the following is a mouse event?

66 / 90

66) VGA is :

67 / 90

67) FormatC is an example of:

68 / 90

68) which component of CPU interacts with primary memory?

69 / 90

69) Font effects include:

70 / 90

70) Sending and receiving messages electronically is known as

71 / 90

71) A domain name is the text version of:

72 / 90

72) Which of the following is popular full-featured word processor?

73 / 90

73) Header files in C contain:

74 / 90

74) stdio stands for:

75 / 90

75) A special program that can detect and remove viruses from computer is called:

76 / 90

76) Interface used by DOS is called:

77 / 90

77) Which of the following keys is used to delete characters in a document?

78 / 90

78) The bus used to connect the CPU to memory on the system board is called:

79 / 90

79) void occupy how many bytes in memory?

80 / 90

80) .Which transmission type transmits data one character at a time

81 / 90

81) Which of the following is related to business?

82 / 90

82) The amount of vertical space between the lines of text is determined by:

83 / 90

83) ISDN stands for:

84 / 90

84) A program that interferes with the normal working of a computer is called:

85 / 90

85) E ARPA stands for:

86 / 90

86) OSI stands for:

87 / 90

87) The resolution of a monitor depends on:

88 / 90

88) How many bits are carried by one line of data bus?

89 / 90

89) Which network covers a large area:

90 / 90

90) The secrets word or number used for protection is called: