Site icon Express Pakistan

Aiou Workshop 5403| Full Test

Spread the love
/90
95

Aiou Workshop 5403| Full Test

1 / 90

1) Which technology is used to read data on cheques?

2 / 90

2) CU stands for:

3 / 90

3) The devices that are automatically detected by Windows are called:

4 / 90

4) The speed of laser printer is measured in :

5 / 90

5) which of the following language Is ideal to write business application

6 / 90

6) How may types of graphic cards are available in market?

7 / 90

7) How many characters of data does a byte usually represent :

8 / 90

8) Step by Step instruction that run the computer are called :

9 / 90

9) Which of the following is NOT an example of a program bug?

10 / 90

10) The extension of object file is:

11 / 90

11) Clipboard stores:

12 / 90

12) Application software is available in many forms except :

13 / 90

13) The process of automatic office tasks using computer-is called:

14 / 90

14) The term that refers to all input,output,and Secondary storage devices is :

15 / 90

15) Which of the following keys is used to cancel an operation :

16 / 90

16) Another name for email program is:

17 / 90

17) What does the following code print on screen? printf(‘hello’);

18 / 90

18) In a typical LAN, each computer on the network is connected through:

19 / 90

19) 50.This type of transmission is sometimes called start/stop transmission

20 / 90

20) Computer at home can be used for:

21 / 90

21) The bottem most layer of the OSI is called:

22 / 90

22) OSI model was created by:

23 / 90

23) Which of the following is a mouse event?

24 / 90

24) All of the following may be stored in registers EXCEPT:

25 / 90

25) CPU consists of the following parts:

26 / 90

26) Satellite transmission stations that can both send and receive messages are called:

27 / 90

27) The layer lies between the network layer and the application layer

28 / 90

28) Data shown on display unit or played through audio is called:

29 / 90

29) Which register has special role in division and multiplication?

30 / 90

30) CPU provides enabling signal through:

31 / 90

31) How many characters of data does a byte usually represent :

32 / 90

32) .The conversation over a walkie-talkie radio is-an example of:

33 / 90

33) Which of the following errors are NOT detected by compiler?

34 / 90

34) A LAN is a combination of:

35 / 90

35) The benefits of using computers are:

36 / 90

36) An operating system is a:

37 / 90

37) All of the following are top-level domains EXCEPT:

38 / 90

38) Which LAN access method resolves the contention between two or more nodes by collision detection

39 / 90

39) The process of converting analog to digital signal is known as:

40 / 90

40) Which of the following is NOT a network topology?

41 / 90

41) Which of the following can be used to launch the word Art

42 / 90

42) How many types of network standard are there

43 / 90

43) How many characters ASCII 7-bit code can represent?

44 / 90

44) The communication across WAN occurs using:

45 / 90

45) The diameter of fiber optical cable is:

46 / 90

46) Which menu is used to insert page numbers in the document?

47 / 90

47) A LAN protocol in which all computers and devices on the network pass a special signal known as:

48 / 90

48) A network that transmits data over citywide distance faster than LAN is:

49 / 90

49) The type of reader commonly used to read bank checks is a (n).

50 / 90

50) Which of the following acts as an interface between the user and the hardware?

51 / 90

51) The_________layer is the layer closest to the transmission medium

52 / 90

52) A type of language in which instructions are written in binary form is called:

53 / 90

53) Mobile phone(Cellular) systems often use:

54 / 90

54) The process of modifying information system to meet changing needs is called :

55 / 90

55) The height of wave within a given period of time is known as:

56 / 90

56) The standard protocol for the Internet is:

57 / 90

57) Which of the following is the insulation on a fiber-optic cable?

58 / 90

58) BCD stands for:

59 / 90

59) The process of converting source code into object code,is knows as:

60 / 90

60) The virus which deletes MS Office files and disk partition information is called:

61 / 90

61) Which of the following is not a:data communication mode?

62 / 90

62) 1 MB is approximately :

63 / 90

63) Which key removes the character to the left of the cursor :

64 / 90

64) LAN does not use:

65 / 90

65) The electron beam scanning is a characteristic of:

66 / 90

66) Monitors differ in:

67 / 90

67) The most commonly used LAN protocol is:

68 / 90

68) Software that is developed specifically for the company’s own use is called :

69 / 90

69) Which of the following is used to manage files and folders?

70 / 90

70) Which of the following is not a type of ROM:

71 / 90

71) A program’s syntax errors are detected by:

72 / 90

72) Indention in MS Word is used to:

73 / 90

73) How many bits are carried by one line of data bus?

74 / 90

74) Textbox can be created by selecting _________option from the menu bar:

75 / 90

75) Printers and monitors are common forms of :

76 / 90

76) The’transmission in which data can be received and. sent simultaneously is called:

77 / 90

77) The four numbers in an IP address are called::

78 / 90

78) Which of the following coding schemes primarily.used by IBM?

79 / 90

79) In star topology, the central device is called:

80 / 90

80) The topology used for a small number of computers is called:

81 / 90

81) Processor directives are command for

82 / 90

82) The shape of the insertion point symbol is:

83 / 90

83) Who developed C?

84 / 90

84) The Computing and Communication technologies are combined together for :

85 / 90

85) Which of the following is a search engine?

86 / 90

86) Terminators are used in______ topology:

87 / 90

87) Windows 2000 is a:

88 / 90

88) The number of times a wave repeats during a specific time interval is called

89 / 90

89) Which of the following is the first phase of SDLC :

90 / 90

90) The step that translates instruction into individual commands is called:

Exit mobile version