Aiou Workshop 5403| Full Test admin 3 years ago Spread the love /90 95 Aiou Workshop 5403| Full Test 1 / 90 1) Which kind of signal is mostly required by telephone lines? a) High b) Analog c) Digital d) Low 2 / 90 2) Testing of a program components is called : a) Isolation testing b) Unit testing c) Pilot testing d) System testing 3 / 90 3) Which of the following is not a type of user interface? a) System interface b) Command-line c) System interface and Design interface d) Design interface 4 / 90 4) Which key removes the character to the left of the cursor : a) Alt b) Delete c) Esc d) Backspace 5 / 90 5) The set of rules to exchange data in a communications network is called: a) Token b) Method c) Procedure d) Protocol 6 / 90 6) The process of converting analog to digital signal is known as: a) Modulation b) Merging c) Data sequencing d) Demodulation 7 / 90 7) The programmer usually enters source code into a computer using a) Linker b) Debugger c) Compiler d) Text editor 8 / 90 8) void occupy how many bytes in memory? a) 0 b) 1 c) 2 d) 3 9 / 90 9) TB is approximately : a) 1000KB b) 1024MB c) 1024GB d) 100MB 10 / 90 10) ASCII code was.developed by: a) Full-duplex b) ANSI.. c) Simplex transmission d) Duplex 11 / 90 11) SUPARCO department gives information about: a) Weather b) Airline c) Chatting d) ROBOT 12 / 90 12) Which memory is used to speed up the computer processing? a) ROM b) Cache c) RAM d) BIOS 13 / 90 13) 1 MB is approximately : a) 100KB b) 1024bytes c) 1024KB d) 1KB 14 / 90 14) Memory consists of: a) Cells b) none of these c) ports d) Data communication 15 / 90 15) Types of translators are: a) Compilers b) Assemblers c) All d) None 16 / 90 16) A computer program that converts an entire program into machine language at one time is called: a) Simulator b) Interpreter c) Commander d) Compiler 17 / 90 17) In the e-mail address me@pu.edu, the world “me” is: a) User name b) Client computer c) Password d) Server name. 18 / 90 18) Which multiplexing technique shifts each signal to a different carrier frequency? a) FDM b) DFM c) TTD d) TDM 19 / 90 19) For every opening brace in a C program, there must be a: a) Comma b) None c) Closing brace d) Colon 20 / 90 20) The top most layer of the OSI is called: a) Application b) Presentation c) transport d) Session 21 / 90 21) An assembly language uses: a) English Words b) None c) Mnemonic Codes d) Binary Digit 22 / 90 22) Which of the following does not contain machine language code? a) Library module b) None c) Object module d) Source module 23 / 90 23) Cache memory is: a) Smaller than RAM b) Faster than RAM c) Slower than RAM & Smaller than RAM d) Slower than RAM 24 / 90 24) Which of the following is not a biometric technique: a) Retina b) Badge c) Face d) Palm print 25 / 90 25) A file that is sent along with an email is known as: a) Folder b) Attachment c) Document d) Header 26 / 90 26) How many characters ASCII 7-bit code can represent? a) 364 b) 500 c) 256 d) 128 27 / 90 27) In star topology, the central device is called: a) links b) Hub c) Medium d) Node 28 / 90 28) People on LAN can share: a) disk driver b) ALL c) printer d) modem 29 / 90 29) GB is approximately : a) 1024MB b) 1000KB c) 100KB d) 100MB 30 / 90 30) The topology used for a small number of computers is called: a) Bus b) Mesh c) Ring d) Tree 31 / 90 31) Header and footer option can be used from which menu? a) Insert b) View c) Edit d) Tools 32 / 90 32) What percent of personal computer in the world have word processor installed? a) 10% b) 80% c) 90% d) 50% 33 / 90 33) An important property of fiber optic cable is: a) Noise b) Radiation c) Degradation d) Refraction 34 / 90 34) The hardware component that permanently holds data and program is called : a) Secondary storage b) Primary storage c) Output d) CPU 35 / 90 35) Which of the following is communications device a) Router b) Ethernet c) UTP d) USB 36 / 90 36) A set collection of a large number of computers all over world connected to one another is called a) Interlink b) Group c) Collection d) Internet 37 / 90 37) The layer is used to control how a bit-streams of data is sent and received over physical medium a) Session layer b) Physical layer c) Presentation layer d) transport layer 38 / 90 38) The binary number 0 and 1 is represented by a : a) Bit b) Character c) Byte d) Word 39 / 90 39) Hypertext document is also called: a) Email server b) Hyperlink c) Web page d) Website 40 / 90 40) Which one is faster a) Register b) ROM c) Cache d) RAM 41 / 90 41) Which of the following is an authentication methodology? a) Piracy b) PIN c) Biometrics d) Access cards 42 / 90 42) A network that transmits data over citywide distance faster than LAN is: a) NAN b) WAN c) LAN d) MAN 43 / 90 43) Which printer is characterized by melting wax-based ink into ordinary paper : a) Laser b) Thermal c) Inkjet d) Dot-Matrix 44 / 90 44) MICR stand for : a) Magnetic Ink Character Reader b) Magic Ink Character Reader c) Magnetic Ink Character Reader d) Magic Ink Character Recorder 45 / 90 45) Which of the following coding schemes uses 4-bit code? a) ASCII. b) Unicode c) BCD d) EBCDIC 46 / 90 46) What is the protocol in the URL “http://www.Microsoft.com”? a) Microsoft b) www c) http d) corn 47 / 90 47) The statements written by the programmer are called: a) Object code b) Syntax c) None d) Source code 48 / 90 48) A pixel might be displayed as: a) Black b) All c) Blue d) White 49 / 90 49) A translator is best described as: a) System software b) Package software c) Application software d) Hardware 50 / 90 50) Which of the following is used in Word to temporary hold information? a) CRAMS b) Desktop c) Clipboard d) ROM 51 / 90 51) The tool used to find a similar or alternative word in a document is called: a) Finder b) Thesaurus c) Dictionary d) Style 52 / 90 52) The extension of an executable file is: a) .doc b) .xls c) .ext d) .exe 53 / 90 53) CU stands for: a) Cache unit b) Control unit c) Computer Utility d) Computer Program 54 / 90 54) Which is the most secure type of transmission medium? a) Twisted-wire pair b) Fiber-optic cable c) Microwave d) .Coaxial cable 55 / 90 55) Two dissimilar networks can be connected by a: a) Gateway b) a and b c) Bus d) Bridge 56 / 90 56) A set of illegal instructions inserted into a legitimate computer program is called: a) Worm b) Trapdoor c) Trojan horse d) Bomb 57 / 90 57) Which of the following contains the administrative tools? a) Start button b) Control panel c) Recycle Bin d) Internet Explorer 58 / 90 58) The interface used by Windows is called a) Prompt interface b) Menu-driven interface c) Graphical User interface d) Command line interface 59 / 90 59) The_________layer is the layer closest to the transmission medium a) transport b) Presentation c) Session d) Physical 60 / 90 60) A network that covers a large geographic distance such as a country is called a: a) MAN b) PAN c) LAN d) WAN 61 / 90 61) Which network covers a large area: a) WAN b) LAN c) NAN d) MAN 62 / 90 62) The process of moving up or down in a word processing document is called: a) Pull-down b) Scrolling c) Word wrap d) Line movement 63 / 90 63) which of the following header file contains information about common mathematical functions? a) conio.h b) None c) math.h d) stdio.h 64 / 90 64) A network that covers a limited geographic distance such as an office is called: a) TAN b) WAN c) MAN d) LAN 65 / 90 65) All of the following are properties of a monitor expect: a) Resolution b) Speed c) Size d) Color 66 / 90 66) The circuit board that connects the monitor to computer is called: a) Monitor link b) Network adapter c) Monitor adapter d) Video adapter 67 / 90 67) The benefits of CAD include: a) All b) Speed & flexibility of c) Accuracy d) Repeatability 68 / 90 68) Which of the following is valid Website Address? a) %VW . hello b) www.it.com c) it4.com d) ww.hello.com 69 / 90 69) This is a complete instruction that causes the computer to perform some action: a) Statement b) Line c) Keyword d) None 70 / 90 70) Computer is a combination of : a) Knowledge b) software c) hardware d) Both a and b 71 / 90 71) Font effects include: a) Strikethrough b) Shadow c) All d) Outline 72 / 90 72) Software that is developed specifically for the company’s own use is called : a) Custom software b) System software c) Package software d) Device drivers 73 / 90 73) The normal orientation for printing is: a) Vertical b) Landscape c) Horizontal d) Portrait 74 / 90 74) An IP address is normally expressed as four octets separated with: a) Dotted hex number b) Dotted octal number c) Dotted binary number d) Dotted decimal number 75 / 90 75) Testing all program components together is called : a) Group testing b) Composite testing c) Volume testing d) System testing 76 / 90 76) Layer that is responsible for transferring frames is a) Data link layer b) Presentation layer c) transport layer d) Session layer 77 / 90 77) A special program that can detect and remove viruses from computer is called: a) Anti-Virus b) Virus c) Custom d) Groupware 78 / 90 78) Which of the following technologies is used in flat-panel display screens? a) EL b) All c) Gas-plasma d) LCD 79 / 90 79) Which of the following is not an output device : a) Speaker b) Scanner c) Printer d) Monitor 80 / 90 80) How many bits are carried by one line of data bus? a) 1 b) 3 c) 4 d) 2 81 / 90 81) Writing programs in machine language is: a) Less tedious b) Both a and c c) None d) Less time-consuming 82 / 90 82) Making illegal copies of copyrighted software is called: a) Software hacking b) Software distribution c) Software Browsing d) Software piracy 83 / 90 83) Data is transmitted block by block in: . a) Asynchronous transmission b) Synchronous transmission c) Isochronous transmission d) Analog transmission 84 / 90 84) How may types of graphic cards are available in market? a) 2 b) 3 c) 4 d) 5 85 / 90 85) A computer network must contain at least number of computers: a) Three b) Four c) Two d) One 86 / 90 86) The central processing unit: a) Does arithmetic and logic operations b) All of the these c) Interprets and executes instructions d) Communicates with other parts of the computer system 87 / 90 87) Data can be erased using ultraviolet rays written on: a) RAM b) EPROM c) EPROM d) EEPROM 88 / 90 88) Caps lock is a : a) Modifier key b) Window keys c) Toggle key d) Cursor control key 89 / 90 89) C statements end with a: a) semicolon b) Period c) None d) semicolon 90 / 90 90) Web pages are connected to one another using: a) Hyperlinks b) Multimedia c) Interlink d) HTTP Your score is LinkedIn Facebook Twitter VKontakte {{#message}}{{{message}}}{{/message}}{{^message}}Your submission failed. The server responded with {{status_text}} (code {{status_code}}). Please contact the developer of this form processor to improve this message. Learn More{{/message}}{{#message}}{{{message}}}{{/message}}{{^message}}It appears your submission was successful. Even though the server responded OK, it is possible the submission was not processed. Please contact the developer of this form processor to improve this message. Learn More{{/message}}Submitting…