Express Pakistan
provide latest news and update
Aiou Workshop 5403| Full Test
1 / 90
1) Which of the following is used to find information on the World Wide Web?
2 / 90
2) Which is a correct association between hardware device and action :
3 / 90
3) The number of times a wave repeats during a specific time interval is called
4 / 90
4) The devices use to enter data or instruction in a computer include :
5 / 90
5) The frame rate is a factor in which of the following outputs?
6 / 90
6) Writing programs in machine language is:
7 / 90
7) The hardware component that permanently holds data and program is called :
8 / 90
8) A collection of millions of computers connected to one another is called
9 / 90
9) The ability of an operating system to control the activities of multiple programs at the same time?
10 / 90
10) Which of the following is a protocol
11 / 90
11) B was developed in the year:
12 / 90
12) Another word for pointer :
13 / 90
13) A type of language in which instructions are written in binary form is called:
14 / 90
14) A network that transmits data over citywide distance faster than LAN is:
15 / 90
15) The programmer usually enters source code into a computer using
16 / 90
16) Which of the following is not cause of virus?
17 / 90
17) The process of moving up or down in a word processing document is called:
18 / 90
18) Multimedia can include the use of :
19 / 90
19) Two types of display devices are____displays.
20 / 90
20) A bus line consists of:
21 / 90
21) Which of the following is NOT an example of System software :
22 / 90
22) Who owns the Internet?
23 / 90
23) All of the following are examples of pointing devices EXCEPT :
24 / 90
24) How many types of addressing scheme are used on the Internet?
25 / 90
25) Types of translators are:
26 / 90
26) CBT stands for:
27 / 90
27) Types of translators are:
28 / 90
28) The layer that defines the formats the data uses as it in transmitted on the communication line
29 / 90
29) A common type of diagram in most project management software is :
30 / 90
30) Which of the following is used for personal identification?
31 / 90
31) How many types of Language tntmlator are there?
32 / 90
32) The central processing unit:
33 / 90
33) Which communications medium requires line-of-sight?
34 / 90
34) Which of the following is NOT a benefit of computer networks?
35 / 90
35) Cache memory works between:
36 / 90
36) Security protection for personal computers includes:
37 / 90
37) What is the protocol in the URL “http://www.Microsoft.com”?
38 / 90
38) EAX, EBX, ECX and EDX are:
39 / 90
39) http://www.microsoft.com is an example of:
40 / 90
40) The operation of arithmetic and logic unit is directed by:
41 / 90
41) _________ is an automatic programmable machine.
42 / 90
42) ROM stands for:
43 / 90
43) The name of the document is displayed:
44 / 90
44) Which protocol works on the concepts of ring topology and a token?
45 / 90
45) 50.This type of transmission is sometimes called start/stop transmission
46 / 90
46) Which of the following is not a type of register?
47 / 90
47) The medium in which signals travel through a cable or wire is called:
48 / 90
48) Which of the following is not a type of page margin?
49 / 90
49) The process of converting analog to digital signal is known as:
50 / 90
50) FTP facility is used to:
51 / 90
51) Which of the following is an email client?
52 / 90
52) News server use_____ protocol to transfer articles among them.
53 / 90
53) Which of the following is a keyboard event?
54 / 90
54) The number of bits a computer can process at one time is sometimes called :
55 / 90
55) Ethernet, Token bus and Token Ring have been defined by:
56 / 90
56) A LAN protocol in which all computers and devices on the network pass a special signal known as:
57 / 90
57) Which of the following is not a Secondary storage device :
58 / 90
58) The process of studying an existing system to determine how it works is called :
59 / 90
59) Which malicious program is activated when a specific set of conditions are met?
60 / 90
60) Setting the boundaries or scope of the problem is done during :
61 / 90
61) A program that interferes with the normal working of a computer is called:
62 / 90
62) The’transmission in which data can be received and. sent simultaneously is called:
63 / 90
63) BIOS stand for:
64 / 90
64) All of the following are text alignment options in MS Word except:
65 / 90
65) Which device translates data into a form that the computer understands :
66 / 90
66) The [ascetic] militant Chinese have gone straight to the roots of the problems.
67 / 90
67) Full-duplex communication is made. possible by the.devices known as:
68 / 90
68) Biometric data
69 / 90
69) Which function key is used for checking spelling and grammar in Word?
70 / 90
70) Which network covers a large area:
71 / 90
71) Which of the following is an example of a font weight?
72 / 90
72) Was a wide area network connecting a small number of users.
73 / 90
73) Compiled programs typically, execute faster because:
74 / 90
74) A printer is needed to:
75 / 90
75) What is another term for unguided media?
76 / 90
76) Which key removes the character to the left of the cursor :
77 / 90
77) Windows 2000 is a:
78 / 90
78) Which is NOT a LAN protocol?
79 / 90
79) Which of the following media can be used for backup?
80 / 90
80) which of the following language Is ideal to write business application
81 / 90
81) What type of printer forms images one character at a time as print head moves across the paper :
82 / 90
82) The process of linking library files with object cod is known as:
83 / 90
83) Data is transmitted block by block in: .
84 / 90
84) The USA Defense Department initiated theInternet in:
85 / 90
85) The type of conversion in which a subset of users migrate to new system while others continue to use
86 / 90
86) Software that controls computing resources is called :
87 / 90
87) Most data .transmitted over telephone lines uses:.
88 / 90
88) The temporary storage area within CPU is called:
89 / 90
89) What type of network is the Internet?
90 / 90
90) Specifications on how the system willsatisfy its requirements are created during :
Your score is