March 21, 2026

Aiou Workshop 5403| Full Test

By | Published | No Comments
Spread the love
/90
95

Aiou Workshop 5403| Full Test

1 / 90

1) Which of the following is used to find information on the World Wide Web?

2 / 90

2) Which is a correct association between hardware device and action :

3 / 90

3) The number of times a wave repeats during a specific time interval is called

4 / 90

4) The devices use to enter data or instruction in a computer include :

5 / 90

5) The frame rate is a factor in which of the following outputs?

6 / 90

6) Writing programs in machine language is:

7 / 90

7) The hardware component that permanently holds data and program is called :

8 / 90

8) A collection of millions of computers connected to one another is called

9 / 90

9) The ability of an operating system to control the activities of multiple programs at the same time?

10 / 90

10) Which of the following is a protocol

11 / 90

11) B was developed in the year:

12 / 90

12) Another word for pointer :

13 / 90

13) A type of language in which instructions are written in binary form is called:

14 / 90

14) A network that transmits data over citywide distance faster than LAN is:

15 / 90

15) The programmer usually enters source code into a computer using

16 / 90

16) Which of the following is not cause of virus?

17 / 90

17) The process of moving up or down in a word processing document is called:

18 / 90

18) Multimedia can include the use of :

19 / 90

19) Two types of display devices are____displays.

20 / 90

20) A bus line consists of:

21 / 90

21) Which of the following is NOT an example of System software :

22 / 90

22) Who owns the Internet?

23 / 90

23) All of the following are examples of pointing devices EXCEPT :

24 / 90

24) How many types of addressing scheme are used on the Internet?

25 / 90

25) Types of translators are:

26 / 90

26) CBT stands for:

27 / 90

27) Types of translators are:

28 / 90

28) The layer that defines the formats the data uses as it in transmitted on the communication line

29 / 90

29) A common type of diagram in most project management software is :

30 / 90

30) Which of the following is used for personal identification?

31 / 90

31) How many types of Language tntmlator are there?

32 / 90

32) The central processing unit:

33 / 90

33) Which communications medium requires line-of-sight?

34 / 90

34) Which of the following is NOT a benefit of computer networks?

35 / 90

35) Cache memory works between:

36 / 90

36) Security protection for personal computers includes:

37 / 90

37) What is the protocol in the URL “http://www.Microsoft.com”?

38 / 90

38) EAX, EBX, ECX and EDX are:

39 / 90

39) http://www.microsoft.com is an example of:

40 / 90

40) The operation of arithmetic and logic unit is directed by:

41 / 90

41) _________ is an automatic programmable machine.

42 / 90

42) ROM stands for:

43 / 90

43) The name of the document is displayed:

44 / 90

44) Which protocol works on the concepts of ring topology and a token?

45 / 90

45) 50.This type of transmission is sometimes called start/stop transmission

46 / 90

46) Which of the following is not a type of register?

47 / 90

47) The medium in which signals travel through a cable or wire is called:

48 / 90

48) Which of the following is not a type of page margin?

49 / 90

49) The process of converting analog to digital signal is known as:

50 / 90

50) FTP facility is used to:

51 / 90

51) Which of the following is an email client?

52 / 90

52) News server use_____ protocol to transfer articles among them.

53 / 90

53) Which of the following is a keyboard event?

54 / 90

54) The number of bits a computer can process at one time is sometimes called :

55 / 90

55) Ethernet, Token bus and Token Ring have been defined by:

56 / 90

56) A LAN protocol in which all computers and devices on the network pass a special signal known as:

57 / 90

57) Which of the following is not a Secondary storage device :

58 / 90

58) The process of studying an existing system to determine how it works is called :

59 / 90

59) Which malicious program is activated when a specific set of conditions are met?

60 / 90

60) Setting the boundaries or scope of the problem is done during :

61 / 90

61) A program that interferes with the normal working of a computer is called:

62 / 90

62) The’transmission in which data can be received and. sent simultaneously is called:

63 / 90

63) BIOS stand for:

64 / 90

64) All of the following are text alignment options in MS Word except:

65 / 90

65) Which device translates data into a form that the computer understands :

66 / 90

66) The [ascetic] militant Chinese have gone straight to the roots of the problems.

67 / 90

67) Full-duplex communication is made. possible by the.devices known as:

68 / 90

68) Biometric data

69 / 90

69) Which function key is used for checking spelling and grammar in Word?

70 / 90

70) Which network covers a large area:

71 / 90

71) Which of the following is an example of a font weight?

72 / 90

72) Was a wide area network connecting a small number of users.

73 / 90

73) Compiled programs typically, execute faster because:

74 / 90

74) A printer is needed to:

75 / 90

75) What is another term for unguided media?

76 / 90

76) Which key removes the character to the left of the cursor :

77 / 90

77) Windows 2000 is a:

78 / 90

78) Which is NOT a LAN protocol?

79 / 90

79) Which of the following media can be used for backup?

80 / 90

80) which of the following language Is ideal to write business application

81 / 90

81) What type of printer forms images one character at a time as print head moves across the paper :

82 / 90

82) The process of linking library files with object cod is known as:

83 / 90

83) Data is transmitted block by block in: .

84 / 90

84) The USA Defense Department initiated theInternet in:

85 / 90

85) The type of conversion in which a subset of users migrate to new system while others continue to use

86 / 90

86) Software that controls computing resources is called :

87 / 90

87) Most data .transmitted over telephone lines uses:.

88 / 90

88) The temporary storage area within CPU is called:

89 / 90

89) What type of network is the Internet?

90 / 90

90) Specifications on how the system willsatisfy its requirements are created during :