Aiou Workshop 5403| Full Test admin 4 years ago Spread the love /90 95 Aiou Workshop 5403| Full Test 1 / 90 1) The ability of an operating system to control the activities of multiple programs at the same time? a) Multi-paging b) Multitasking c) Multi-processing d) Multi-operating 2 / 90 2) The speed of laser printer is measured in : a) Words per min b) Character per sec c) Page per min d) Lines per min 3 / 90 3) which Program that translates assembly language code to machine code a) Translator b) Assembler c) Debugger d) Converter 4 / 90 4) System analysis produces which of the following results : a) Requirements definition b) Design constraints c) Review of existing system d) All 5 / 90 5) Which is the most common LAN topology? a) Tree b) Bus c) Star d) Mesh 6 / 90 6) A type of error that occurs when an instruction violates the rules programs is called: a) Program error b) Runtime error c) Syntax error d) None 7 / 90 7) What does the following code print on screen? printf(‘hello’); a) Hello b) None c) HELLO d) hello 8 / 90 8) The process of studying an existing system to determine how it works is called : a) Computer programming b) Systems analysis c) Systems design d) User requirements testing 9 / 90 9) The extension of C source program is: a) .h b) .obj c) .exe d) .c 10 / 90 10) Which of the following can severally affect the quality of satellite transmission? a) Mountains b) Bad weather c) Moon d) Light rays 11 / 90 11) Data link layer lies between the physical layer and the_______layer a) Presentation b) Network c) Session d) Transport 12 / 90 12) OMR stand for : a) Optimum mark reader b) Optical mark radiation c) Optical map reader d) Optical mark reader 13 / 90 13) The resolution of a monitor depends on: a) Number of pixels displayed b) Number of bits representing a pixel c) All d) Dot pitch of the monitor 14 / 90 14) Another name for email program is: a) Mail server b) Internet Explorer c) Email client d) Web client 15 / 90 15) Bitmap graphics are: a) Curve drawing b) Line drawing c) Painted pictures d) Solid drawing 16 / 90 16) What happens first when CPU executes an instruction? a) Decode instruction b) Instruction fetch c) Execute instruction d) All 17 / 90 17) The standard protocol for the Internet is: a) TCP b) IP address c) IP protocol d) TCP/IP 18 / 90 18) CPU consists of the following parts: a) Control Unit and ALU b) CU and Main Memory c) Operating system and application d) Operating system and ALU 19 / 90 19) Which of the following converts digital signals to analog and analog to digital? a) . Multiplexer b) Repeater c) Modem d) . Codec 20 / 90 20) code is 7-bit or.8-bit code. a) BCD: b) EBCDIC c) Unicode d) ASCII 21 / 90 21) Which of the following is an example of packaged software : a) MS excel b) MS word c) All d) MS power point 22 / 90 22) Which of the following is not a biometric technique: a) Badge b) Face c) Palm print d) Retina 23 / 90 23) The type of conversion in which individual components of the new system are used one by one is : a) Parallel b) Phased c) Direct d) Pilot 24 / 90 24) The benefits of using computers are: a) Reliable b) All c) Speed d) Storage 25 / 90 25) The number of bits a computer can process at one time is sometimes called : a) Bit size b) Crunch capacity c) Word size d) Bit strength 26 / 90 26) Division by zero (e.g. 2/ 0) is an example a) Run-time error b) None c) Run-time error d) Logic error 27 / 90 27) Which is the most secure type of transmission medium? a) Twisted-wire pair b) Fiber-optic cable c) .Coaxial cable d) Microwave 28 / 90 28) 1 Megabyte (MB) =__ bytes : a) 2×30 b) 2×40 c) 2×10 d) 2×20 29 / 90 29) The number of frequencies that can fit on a link at one time is called: a) Modulation b) Demodulation c) Codec d) Bandwidth 30 / 90 30) Which of the following device is used to get soft copy output? a) Printer b) Plotter c) Monitor d) Scanner 31 / 90 31) A set of illegal instructions inserted into a legitimate computer program is called: a) Trapdoor b) Worm c) Trojan horse d) Bomb 32 / 90 32) The area in which text is entered, manipulated and viewed is called: a) Document window b) Window c) Documentation area d) Text area 33 / 90 33) The keyboard format that is most commonly used is the : a) TWRITER b) SPLITER c) DVORAK d) QWERTY 34 / 90 34) The format of an email address is: a) User name# DNS Address b) User name$DNS.com c) User name& DNS Address. d) User name@ DNS Address 35 / 90 35) How many types of network standard are there a) 4 b) 2 c) 16 d) 8 36 / 90 36) A bit can represent how many different values : a) 5 b) 3 c) 2 d) 1 37 / 90 37) A word processor can: a) insert text b) Find and replace text c) Copy text d) All 38 / 90 38) Which of the following is used to manage files and folders? a) Control Panel b) Window Accessories c) Internet Explorer d) Windows Explorer 39 / 90 39) The network architecture that allows every computer to act as client as well as a server is: a) Server System b) Client/Server c) peer-to-peer d) Host system 40 / 90 40) Which technology recognizes printed characters and allows user to edit as text: a) Optical-character recognition (OCR) b) Optical-mark recognition (OMR) c) Bar-code recognition (BRC) d) Magnetic-ink character recognition 41 / 90 41) Which portion of the URL is the domain name? a) :// b) http c) microsoft.com d) www 42 / 90 42) Which of the following is related to business? a) Stock exchanges b) Banks c) All d) Marketing 43 / 90 43) The hardware device that temporarily holds data and program is called : a) Primary storage b) Output c) Secondary storage d) CPU 44 / 90 44) Which transmission allows data to travel in one direction at a time? a) .Half Duplex transmission b) Full Duplex transmission c) Simplex transmission.. d) Duplex transmission 45 / 90 45) Which register is used for arithmetic and data operations? a) CX b) BX c) AX d) DX 46 / 90 46) Which of the following consists of two insulated copper wires twisted together? a) Submarine b) Twisted-pair wire c) Coaxial cables d) Fiber optic 47 / 90 47) E-mail stands for: a) Elective-mail b) Electric-mail c) Electronic-mail d) Elaborated-mail 48 / 90 48) Which of the following does not contain machine language code? a) Library module b) Object module c) None d) Source module 49 / 90 49) The message sent on a ____ network can take any of several possible paths from source to destination a) Star b) Tree c) Mesh d) Ring 50 / 90 50) Which LAN access method resolves the contention between two or more nodes by collision detection a) CSMA/CS b) CSMA/CR c) CSMA/CD d) CSMA/DR 51 / 90 51) An IDE stands for: a) Input Desktop environment b) Integrated Development Environment c) Input data error d) Internal disk error 52 / 90 52) Which is a correct association between hardware device and action : a) Scanner-processing b) CD-ROM-output c) Keyboard-connectivity d) CPU-data manipulation 53 / 90 53) What is another term for guided media? a) Wireless b) Radiated c) Bounded d) Infrared 54 / 90 54) The expression may be: a) All b) arithmetic expression c) string d) Constant 55 / 90 55) RAM usually has ______ types a) 5 b) 3 c) 2 d) 4 56 / 90 56) The typical fiber optic cable consists of very narrow strand of glass called: a) Core b) Sheet c) Base d) Cladding 57 / 90 57) Security protection for personal computers includes: a) Locks and cables b) All of these c) Internal components d) Software 58 / 90 58) Websites are hosted on___________computers on the Internet. a) Browser b) Server c) Client d) Service provider 59 / 90 59) A translator is best described as: a) Package software b) Hardware c) System software d) Application software 60 / 90 60) The memory cells are logically organized into group of: a) 5bits b) 12 bits c) 8 bits d) 24 bits 61 / 90 61) Most data .transmitted over telephone lines uses:. a) Direct transmission b) Parallel transmission c) Sequential transmission d) Serial transmission 62 / 90 62) BIT stand for : a) Binary digit b) Byte digit c) Bit digit d) Base digit 63 / 90 63) Typically, data transfer rate in LAN are of the order of: a) Bits per second b) Megabit persecond c) Terabit per second d) KiloBIt per second 64 / 90 64) MS-DOS operating system is a: a) All b) Single tasking c) Single user d) Command line Interface 65 / 90 65) Which of the following language requires no translator to execute the program? a) C b) Assembly language c) C++ d) Machine language 66 / 90 66) Which of the following is a keyboard event? a) Key down b) Key drag c) Key up and Key down d) Key up 67 / 90 67) Who owns the Internet? a) United Nations b) Pak Telecom c) U.S. Government d) None 68 / 90 68) EEPROM stand for a) Easily Erasable Programmable Read Only Memory b) Electronically Erasable Programmable Read Only Memory c) Electrically Erasable Programmable Read Only Memory d) Electrically Enriched Programmable Read Only Memory 69 / 90 69) Biometric data a) Word related to a job or hobby b) Combination of letters, numbers and symbols c) Name of a partner or spouse d) Name of a partner or spouse 70 / 90 70) Was a wide area network connecting a small number of users. a) ARPANET b) ISP c) ARPA d) Internet 71 / 90 71) Which of the following is an authentication methodology? a) Access cards b) Biometrics c) PIN d) Piracy 72 / 90 72) The types of files that can be attached to an e-mail message include: a) Spreadsheets b) All c) Text d) Graphics 73 / 90 73) Which of the following media can be used for backup? a) Zip Disk b) Tape Device c) Floppy Diskette d) All 74 / 90 74) CPU is an example of : a) Hardware b) Program c) Software d) Language 75 / 90 75) Which operating system provides only a command-line user interface? a) Linux b) Mac OS c) Windows d) DOS 76 / 90 76) A gigabyte is equal to : a) 1024 megabytes b) 1024×1024 megabytes c) One thousand kilobytes d) One million megabytes 77 / 90 77) Which component is used to connect different parts of computer together? a) control unit b) main memory c) Power supply d) Bus Interconnection 78 / 90 78) Which register has special role in division and multiplication? a) BX b) CX c) DX d) AX 79 / 90 79) Which of the following is computer virus? a) All of these b) Chernobyl c) Reflof d) Logic Bomb 80 / 90 80) What type of printer forms images one character at a time as print head moves across the paper : a) Laser printer b) Dot-Matrix printer c) Line printer d) Inkjet printer 81 / 90 81) Which of the following is not considered to be a peripheral device? a) CPU b) Disk drive c) Keyboard d) Monitor 82 / 90 82) Turbo C++ can compile a) Turbo C Programs only b) C programs only c) C and C++ programs d) Turbo C++ Programs only 83 / 90 83) An important property of fiber optic cable is: a) Radiation b) Degradation c) Noise d) Refraction 84 / 90 84) Which of the following is general type of input devices : a) Source data-entery devices b) All c) Pointing devices d) Keyboard 85 / 90 85) Frequency is measured in: a) Amps b) Bps. c) Seconds d) Hertz 86 / 90 86) Which method is used to collect information from many people in organization : a) Questionnaires b) Observation c) Interview d) Sampling 87 / 90 87) Which register holds base location of all executable instructions in the program? a) SS b) CS c) DS d) ES 88 / 90 88) The extension of MS-Word file is: a) xls b) doc c) jpg d) wrd 89 / 90 89) The step that performs the actions given in the instructions is called: a) Decode b) Execute c) Calculate d) Fetch 90 / 90 90) Which file contains the program after translation into machine language a) Object file b) None c) exe file d) Source file Your score is LinkedIn Facebook Twitter VKontakte {{#message}}{{{message}}}{{/message}}{{^message}}Your submission failed. The server responded with {{status_text}} (code {{status_code}}). Please contact the developer of this form processor to improve this message. Learn More{{/message}}{{#message}}{{{message}}}{{/message}}{{^message}}It appears your submission was successful. Even though the server responded OK, it is possible the submission was not processed. Please contact the developer of this form processor to improve this message. Learn More{{/message}}Submitting…