Spread the love
/90
95

Aiou Workshop 5403| Full Test

1 / 90

1) Which of the following technique uses modulation?

2 / 90

2) The type of conversion in which both new and old systems operate together for a period of time is :

3 / 90

3) RAM stands for

4 / 90

4) Which is the most secure type of transmission medium?

5 / 90

5) Data can be erased using ultraviolet rays written on:

6 / 90

6) Which multiplexing technique shifts each signal to a different carrier frequency?

7 / 90

7) What type of device translates data into a form that we can understand?

8 / 90

8) For every opening brace in a C program, there must be a:

9 / 90

9) The modern revolution in information technology can be termed as :

10 / 90

10) A network that covers a limited geographic distance such as an office is called:

11 / 90

11) The output can be:

12 / 90

12) The diameter of fiber optical cable is:

13 / 90

13) Which of the following is not a biometric technique:

14 / 90

14) The type of reader commonly used to read bank checks is a (n).

15 / 90

15) Which of the following is not a:data communication mode?

16 / 90

16) Physical path that connects the source and receiver is known as:

17 / 90

17) Information technology is a combination of :

18 / 90

18) .Which transmission type transmits data one character at a time

19 / 90

19) How many characters of data does a byte usually represent :

20 / 90

20) The address of instruction being executed is contained within:

21 / 90

21) Which communication technique can transmit the data over long distance?

22 / 90

22) DNS stands for:

23 / 90

23) The type of conversion in which a subset of users migrate to new system while others continue to use

24 / 90

24) Who developed C?

25 / 90

25) The devices use to enter data or instruction in a computer include :

26 / 90

26) Which software is used to solve every day personal or business tasks?

27 / 90

27) How many characters of data does a byte usually represent :

28 / 90

28) A tiny handle in the middle of the keyboard is called:

29 / 90

29) main is a

30 / 90

30) MICR stands for:

31 / 90

31) Computer transmit data in the form of codes.

32 / 90

32) The expression may be:

33 / 90

33) Who owns the Internet?

34 / 90

34) Which of the following is a keyboard event?

35 / 90

35) All of the following are properties of a monitor expect:

36 / 90

36) A person who gains illegal access to a computer system is called:

37 / 90

37) What type of printer forms images one character at a time as print head moves across the paper :

38 / 90

38) BCD stands for:

39 / 90

39) Computer programs are also known ac

40 / 90

40) How many characters ASCII 8-bit code can represent?

41 / 90

41) The feature of Word use to change fonts color, size, style is called

42 / 90

42) Digital signal represents a sequence of values.

43 / 90

43) A font is described by its:

44 / 90

44) Which transmission allows data to travel in one direction at a time?

45 / 90

45) Which protocol works on the concepts of ring topology and a token?

46 / 90

46) TCP/IP stands for

47 / 90

47) Windows 2000 is a:

48 / 90

48) Most applications of robotics are in which area?

49 / 90

49) An additional or spare copy of data stored on storage media is call:

50 / 90

50) A type of communication that sends that uses a clock to control timing of bits being sent is called:

51 / 90

51) A feature commonly available with word processors is:

52 / 90

52) The amount of vertical space between the lines of text is determined by:

53 / 90

53) The files can exist in folders but folders cannot exist in:

54 / 90

54) scorn, .edu and .goy- are examples of:

55 / 90

55) Which LAN access method resolves the contention between two or more nodes by collision detection

56 / 90

56) ASCII code was.developed by:

57 / 90

57) The output of the compiler is called:

58 / 90

58) DARPA stands for:

59 / 90

59) which header file contains information about standard input/ output functions?

60 / 90

60) De Jure means

61 / 90

61) What command is used to move selected text to another part of a document?

62 / 90

62) Times New Roman is an example of a:

63 / 90

63) TB stand for :

64 / 90

64) Which of the following is NOT a type of protocol?

65 / 90

65) The process of converting source code into object code,is knows as:

66 / 90

66) Which of the following is harmful for computers?

67 / 90

67) An identifiable location in memory where data are kept is called:

68 / 90

68) The step that translates instruction into individual commands is called:

69 / 90

69) The term that define, the size and style of a typeface is :

70 / 90

70) CPU consists of the following parts:

71 / 90

71) Which type of network covers a small area?

72 / 90

72) The brain of the computer that executes the instructions is called:

73 / 90

73) How many devices can exist between a sending and receiving host?

74 / 90

74) The difference between ROM and RAM is:

75 / 90

75) People on LAN can share:

76 / 90

76) Which term is commonly used to refer to software or program errors:

77 / 90

77) The direction of paper in printing is referred to as

78 / 90

78) An advantage of synchronous over asynchronous transmission is:

79 / 90

79) The central processing unit:

80 / 90

80) Project 802 defines standard for which layers of the OSI model:

81 / 90

81) The electron beams are swept across a coating of____to display output on CRT screen:

82 / 90

82) Which is a correct association between hardware device and action :

83 / 90

83) Which of the following coding schemes uses 4-bit code?

84 / 90

84) The term that refers to all input,output,and Secondary storage devices is :

85 / 90

85) Which one look like credit card that contains thin microprocessor and memory embedded in it:

86 / 90

86) The name of screen clarity:

87 / 90

87) Which component is used to connect different parts of computer together?

88 / 90

88) Which of the following is a type of plotter :

89 / 90

89) A collection of raw facts and figure is called:

90 / 90

90) Modem stands for: