Spread the love
/90
95

Aiou Workshop 5403| Full Test

1 / 90

1) Step by Step instruction that run the computer are called :

2 / 90

2) Turbo C++ can compile

3 / 90

3) Which of the following symbol is used to denote a pre-processor statement?

4 / 90

4) Specifications on how the system willsatisfy its requirements are created during :

5 / 90

5) The size of EAX register can be up to:

6 / 90

6) The [ascetic] militant Chinese have gone straight to the roots of the problems.

7 / 90

7) Which of the following device is used to get soft copy output?

8 / 90

8) code is 7-bit or.8-bit code.

9 / 90

9) How many devices can exist between a sending and receiving host?

10 / 90

10) Two dissimilar networks can be connected by a:

11 / 90

11) which of the following header

12 / 90

12) ________ is used to control all the parts of a manufacturing process.

13 / 90

13) The boards used to connect additional devices to the computer are connected to the motherboard thr

14 / 90

14) A bus with 64 lines can carry ______of data:

15 / 90

15) A program that interferes with the normal working of a computer is called:

16 / 90

16) All of the following are top-level domains EXCEPT:

17 / 90

17) Header and footer option can be used from which menu?

18 / 90

18) Bitmap graphics are:

19 / 90

19) A type of communication that sends data using flow control to synchronize data between sender

20 / 90

20) 1 Gigabyte (GB) =____ bytes :

21 / 90

21) Pixel is short for

22 / 90

22) The speed of laser printer is measured in :

23 / 90

23) Which of the following is popular full-featured word processor?

24 / 90

24) The diameter of fiber optical cable is:

25 / 90

25) Which problem occurs when two workstations on shared Ethernet try to access LAN at the same time

26 / 90

26) CPU provides enabling signal through:

27 / 90

27) The basic structure of C program consists of:

28 / 90

28) Which of the following is not an example of e-commerce?

29 / 90

29) An IP address is normally expressed as four octets separated with:

30 / 90

30) A collection of related web pages is called:

31 / 90

31) A word processor can be used to:

32 / 90

32) The type of conversion in which a subset of users migrate to new system while others continue to use

33 / 90

33) Which of the following is not a biometric technique:

34 / 90

34) Computers derive its basic strength from:

35 / 90

35) Which LAN access method resolves the contention between two or more nodes by collision detection

36 / 90

36) Machine language:

37 / 90

37) How many characters of data does a byte usually represent :

38 / 90

38) A feature commonly available with word processors is:

39 / 90

39) The brain of the computer that executes the instructions is called:

40 / 90

40) Header files in C contain:

41 / 90

41) The difference between ROM and RAM is:

42 / 90

42) The expression in define directive:

43 / 90

43) Most computer crime are committed by:

44 / 90

44) A person who gains illegal access to a computer system is called:

45 / 90

45) One or more computers connected to a hub is called:

46 / 90

46) A binary signal can be send using :

47 / 90

47) ISDN stands for:

48 / 90

48) The dots that compose the image of a digital photograph are called:

49 / 90

49) A bus with 32 lines can carry ______ bytes of data.

50 / 90

50) C is a:

51 / 90

51) Computer based weather forecasting depends on accurate collection of data from:

52 / 90

52) Which of the following is an example Internet Protocol?

53 / 90

53) The top most layer of the OSI is called:

54 / 90

54) A characteristic of ROM is that it is:

55 / 90

55) Tables allow the text to be displayed in:

56 / 90

56) Most data .transmitted over telephone lines uses:.

57 / 90

57) TB is approximately :

58 / 90

58) Data is transmitted block by block in: .

59 / 90

59) Which of the following is used to access programs installed on computer?

60 / 90

60) XGA supports the resolution up to:

61 / 90

61) The second layer of OSI model is

62 / 90

62) An operating system is a:

63 / 90

63) How many orientation types are available in Word?

64 / 90

64) ______is used to product attractive documents using photos, artwork and graphics:

65 / 90

65) Expansion cards are inserted into:

66 / 90

66) Software that is developed specifically for the company’s own use is called :

67 / 90

67) C programs are divided into units called:

68 / 90

68) Another name for email program is:

69 / 90

69) The process of studying an existing system to determine how it works is called :

70 / 90

70) Which of the following transmission media is used in LAN?

71 / 90

71) Which printer should be used on mainframes for high-volume report printing :

72 / 90

72) Transmission that is used without timing signal is called:

73 / 90

73) The electronic circuit that executes Computer instruction is called a(n) :

74 / 90

74) Data link layer lies between the physical layer and the_______layer

75 / 90

75) Clipboard stores:

76 / 90

76) A type of IF address that does not change frequently is known as?

77 / 90

77) Which of the following is NOT a benefit of computer networks?

78 / 90

78) The name of the document is displayed:

79 / 90

79) Was a wide area network connecting a small number of users.

80 / 90

80) XGA supports colors up to:

81 / 90

81) The lowest resolution for color graphics display is:

82 / 90

82) Which software is used to search and view web pages?

83 / 90

83) Which of the following code can represent up to 65,536 symbols?

84 / 90

84) People on LAN can share:

85 / 90

85) Which of the following coding schemes uses 4-bit code?

86 / 90

86) Trojan Horse is a type of:

87 / 90

87) conio stands for:

88 / 90

88) An important property of fiber optic cable is:

89 / 90

89) Many banks provide the facility of:

90 / 90

90) Which of the following tasks is not part of the systems analyst role :