Aiou Workshop 5403| Full Test admin 4 years ago Spread the love /90 95 Aiou Workshop 5403| Full Test 1 / 90 1) Which technology is used to read data on cheques? a) MICR b) OCR c) CAT d) OMR 2 / 90 2) CU stands for: a) Cache unit b) Control unit c) Computer Program d) Computer Utility 3 / 90 3) The devices that are automatically detected by Windows are called: a) Installed devices b) Serial Devices c) Automatic Devices d) Plug and Play devices 4 / 90 4) The speed of laser printer is measured in : a) Words per min b) Character per sec c) Page per min d) Lines per min 5 / 90 5) which of the following language Is ideal to write business application a) BASIC b) PASCAL c) None d) COBOL 6 / 90 6) How may types of graphic cards are available in market? a) 5 b) 4 c) 3 d) 2 7 / 90 7) How many characters of data does a byte usually represent : a) 1 b) 3 c) 2 d) 4 8 / 90 8) Step by Step instruction that run the computer are called : a) Software b) Hardware c) Procedure d) Calculating 9 / 90 9) Which of the following is NOT an example of a program bug? a) Operator error b) Run-time error c) Logic error d) Syntax error 10 / 90 10) The extension of object file is: a) .c b) .obj c) .exe d) .h 11 / 90 11) Clipboard stores: a) Entered text b) Repeated text c) Deleted text d) Copied text 12 / 90 12) Application software is available in many forms except : a) Scientific software b) Commercial software c) Financial software d) Device drivers 13 / 90 13) The process of automatic office tasks using computer-is called: a) Data management b) Office automation c) Reprographics d) Office support 14 / 90 14) The term that refers to all input,output,and Secondary storage devices is : a) Central b) Attached c) Network d) Peripheral 15 / 90 15) Which of the following keys is used to cancel an operation : a) Esc b) Del c) Enter d) Pause 16 / 90 16) Another name for email program is: a) Mail server b) Web client c) Internet Explorer d) Email client 17 / 90 17) What does the following code print on screen? printf(‘hello’); a) hello b) None c) Hello d) HELLO 18 / 90 18) In a typical LAN, each computer on the network is connected through: a) Cables b) Microwaves c) Satellite d) Phone 19 / 90 19) 50.This type of transmission is sometimes called start/stop transmission a) Isochronous b) Synchronous c) .Asynchronous d) Parallel 20 / 90 20) Computer at home can be used for: a) Keeping records b) Watching movies c) All d) Making budgets 21 / 90 21) The bottem most layer of the OSI is called: a) Physical b) transport c) Presentation d) Session 22 / 90 22) OSI model was created by: a) IBM b) ANSI c) ISO d) NESPAK 23 / 90 23) Which of the following is a mouse event? a) Double click b) All c) Right click d) Click 24 / 90 24) All of the following may be stored in registers EXCEPT: a) Data b) CPU instruction set c) Program instructions d) Memory addresses 25 / 90 25) CPU consists of the following parts: a) Operating system and application b) Control Unit and ALU c) Operating system and ALU d) CU and Main Memory 26 / 90 26) Satellite transmission stations that can both send and receive messages are called: a) Earth stations b) Mars stations c) Moon stations d) Jupiter stations 27 / 90 27) The layer lies between the network layer and the application layer a) Session layer b) physical layer c) Presentation layer d) Transport layer 28 / 90 28) Data shown on display unit or played through audio is called: a) Shared copy b) Hard copy c) Soft copy d) Photocopy 29 / 90 29) Which register has special role in division and multiplication? a) BX b) AX c) DX d) CX 30 / 90 30) CPU provides enabling signal through: a) Data Bus b) Control Bus c) Main Bus d) Address Bus 31 / 90 31) How many characters of data does a byte usually represent : a) Terabyte b) Megabyte c) Kilobyte d) Gigabyte 32 / 90 32) .The conversation over a walkie-talkie radio is-an example of: a) Simplex transmission b) Full-duplex transmission c) Half-duplex transmission. d) Duplex transmission 33 / 90 33) Which of the following errors are NOT detected by compiler? a) None b) Both a and b c) Logical error d) Syntax error 34 / 90 34) A LAN is a combination of: a) ALL b) LAN software c) LAN cables d) Network card 35 / 90 35) The benefits of using computers are: a) Storage b) Reliable c) Speed d) All 36 / 90 36) An operating system is a: a) System software b) System utility c) Software package d) Application software 37 / 90 37) All of the following are top-level domains EXCEPT: a) .edu b) .org c) .bus d) .gov 38 / 90 38) Which LAN access method resolves the contention between two or more nodes by collision detection a) CSMA/CD b) CSMA/CR c) CSMA/DR d) CSMA/CS 39 / 90 39) The process of converting analog to digital signal is known as: a) Data sequencing b) Modulation c) Merging d) Demodulation 40 / 90 40) Which of the following is NOT a network topology? a) Band b) Tree c) Bus d) Star 41 / 90 41) Which of the following can be used to launch the word Art a) Drawing toolbar b) Standard toolbar c) status bar d) Ruler 42 / 90 42) How many types of network standard are there a) 2 b) 16 c) 4 d) 8 43 / 90 43) How many characters ASCII 7-bit code can represent? a) 364 b) 500 c) 256 d) 128 44 / 90 44) The communication across WAN occurs using: a) Satellite links b) Microwaves c) Telephone Line d) Any 45 / 90 45) The diameter of fiber optical cable is: a) 62.5 m b) 62.5 microns c) 62.5 mm d) 62.5 cm 46 / 90 46) Which menu is used to insert page numbers in the document? a) Window b) Insert c) Format d) File 47 / 90 47) A LAN protocol in which all computers and devices on the network pass a special signal known as: a) Token b) Ethernet c) ARCnet d) TCP/IP 48 / 90 48) A network that transmits data over citywide distance faster than LAN is: a) WAN b) NAN c) LAN d) MAN 49 / 90 49) The type of reader commonly used to read bank checks is a (n). a) Bank check reader b) Bar.code reader c) Optical-mark reader d) Magnetic-ink character reader 50 / 90 50) Which of the following acts as an interface between the user and the hardware? a) Operating system b) Language processor c) Utility program d) MS Word 51 / 90 51) The_________layer is the layer closest to the transmission medium a) Presentation b) Physical c) transport d) Session 52 / 90 52) A type of language in which instructions are written in binary form is called: a) None b) Machine language c) High level language d) Assembly language 53 / 90 53) Mobile phone(Cellular) systems often use: a) WAN b) MAN c) LAN d) NAN 54 / 90 54) The process of modifying information system to meet changing needs is called : a) System maintenance b) System management c) System modification d) System upkeep 55 / 90 55) The height of wave within a given period of time is known as: a) Frequency b) Phase c) Amplitude d) Pulse 56 / 90 56) The standard protocol for the Internet is: a) TCP b) IP protocol c) TCP/IP d) IP address 57 / 90 57) Which of the following is the insulation on a fiber-optic cable? a) Cladding b) Sheathing c) . Braiding d) Housing 58 / 90 58) BCD stands for: a) Bidirectional coded decimal b) Binary coded decimal c) Byte coded decimal d) Base coded decimal 59 / 90 59) The process of converting source code into object code,is knows as: a) Executing b) Compiling c) Linking d) Saving 60 / 90 60) The virus which deletes MS Office files and disk partition information is called: a) Book sector b) Chernobyl c) Logic Bomb d) Trojan horse 61 / 90 61) Which of the following is not a:data communication mode? a) Half-duplex b) Simplex Half-duplex c) Auto. d) Full-duplex. 62 / 90 62) 1 MB is approximately : a) 1024KB b) 100KB c) 1024bytes d) 1KB 63 / 90 63) Which key removes the character to the left of the cursor : a) Esc b) Backspace c) Alt d) Delete 64 / 90 64) LAN does not use: a) Telephone line b) Twisted pair c) Fiber optic d) Coaxial cable 65 / 90 65) The electron beam scanning is a characteristic of: a) Liquid crystal display b) Cathode ray tubes c) Flat panel monitors d) Laser printers 66 / 90 66) Monitors differ in: a) Resolution b) Size c) All d) Standard 67 / 90 67) The most commonly used LAN protocol is: a) Ethernet b) Token Ring c) WiMax d) ARCnet 68 / 90 68) Software that is developed specifically for the company’s own use is called : a) Custom software b) System software c) Package software d) Device drivers 69 / 90 69) Which of the following is used to manage files and folders? a) Control Panel b) Windows Explorer c) Internet Explorer d) Window Accessories 70 / 90 70) Which of the following is not a type of ROM: a) EEPROM b) EPROM c) FPROM d) PROM 71 / 90 71) A program’s syntax errors are detected by: a) Device System b) Device operator c) Device linking d) Device Driver 72 / 90 72) Indention in MS Word is used to: a) Change line spacing b) Change the paragraph color c) Make the text readable d) Apply border around text 73 / 90 73) How many bits are carried by one line of data bus? a) 2 b) 4 c) 1 d) 3 74 / 90 74) Textbox can be created by selecting _________option from the menu bar: a) Insert-TextBox b) Go-TextBox c) Enter-TextBox d) Input-TextBox 75 / 90 75) Printers and monitors are common forms of : a) Input devices b) Output devices c) Storage devices d) Processing devices 76 / 90 76) The’transmission in which data can be received and. sent simultaneously is called: a) Duplex b) Half-duplex c) Full-duplex d) Simplex 77 / 90 77) The four numbers in an IP address are called:: a) Codec b) Octal c) Octets d) Bytes 78 / 90 78) Which of the following coding schemes primarily.used by IBM? a) Unicode b) BCD c) ASCII d) EBCDIC 79 / 90 79) In star topology, the central device is called: a) Node b) links c) Hub d) Medium 80 / 90 80) The topology used for a small number of computers is called: a) Ring b) Tree c) Mesh d) Bus 81 / 90 81) Processor directives are command for a) Loader b) Microprocessor c) Language Processor d) C preprocessor 82 / 90 82) The shape of the insertion point symbol is: a) Horizontal line b) Vertical line c) Circle d) Arrow 83 / 90 83) Who developed C? a) Al- Khuwarizmi b) Charles Babbage c) Von-Neumann d) Dennis Ritchie 84 / 90 84) The Computing and Communication technologies are combined together for : a) Data sequencing b) Data routing c) Searching data d) Data communication 85 / 90 85) Which of the following is a search engine? a) Google b) Microsoft c) Internet explorer d) MIME 86 / 90 86) Terminators are used in______ topology: a) Mesh b) Bus c) Star d) Tree 87 / 90 87) Windows 2000 is a: a) Multiuser operating system b) Multiprocessing operating system c) All d) Multitasking operating system 88 / 90 88) The number of times a wave repeats during a specific time interval is called a) Phase b) Frequency c) Amplitude d) Frequency 89 / 90 89) Which of the following is the first phase of SDLC : a) Design b) Coding c) Analysis d) Preliminary investigation 90 / 90 90) The step that translates instruction into individual commands is called: a) Get b) Execute c) Fetch d) Decode Your score is LinkedIn Facebook Twitter VKontakte {{#message}}{{{message}}}{{/message}}{{^message}}Your submission failed. The server responded with {{status_text}} (code {{status_code}}). Please contact the developer of this form processor to improve this message. Learn More{{/message}}{{#message}}{{{message}}}{{/message}}{{^message}}It appears your submission was successful. Even though the server responded OK, it is possible the submission was not processed. Please contact the developer of this form processor to improve this message. Learn More{{/message}}Submitting…