Aiou Workshop 5403| Full Test admin 4 years ago Spread the love /90 95 Aiou Workshop 5403| Full Test 1 / 90 1) Another name for antivirus is: a) Vaccine b) DES c) Trojan horse d) Logic Bomb 2 / 90 2) The standard protocol for the Internet is: a) TCP b) IP address c) IP protocol d) TCP/IP 3 / 90 3) Which of the following is NOT a high level language? a) Assembly language b) None c) BASIC d) FORTRAN 4 / 90 4) LAN stands for: a) Land Area Network b) Land Area Node c) Local Area Network d) Linked Area Network 5 / 90 5) Which printer is characterized by melting wax-based ink into ordinary paper : a) Inkjet b) Dot-Matrix c) Thermal d) Laser 6 / 90 6) A lab with twenty computers and a laser printer is an example_____ of area network a) Line b) Local c) Little d) Limited 7 / 90 7) Which of the following one is not a virus? a) Logic Bomb b) Trojan Horse c) Reflof d) MCAfee 8 / 90 8) Which of the following is a search engine? a) Microsoft b) Internet explorer c) Google d) MIME 9 / 90 9) The output of the compiler is called: a) Source code b) Linked code c) Object code d) The program 10 / 90 10) Which of the following is computer virus? a) Logic Bomb b) Chernobyl c) All of these d) Reflof 11 / 90 11) Which term is commonly used to refer to software or program errors: a) Bug b) Short circuit c) Crash d) Down 12 / 90 12) A set of rules that must be followed to develop a program is called: a) Syntax b) Bug c) Preprocessor d) Debug 13 / 90 13) 1 Gigabyte (GB) =____ bytes : a) 2×40 b) 2×30 c) 2×10 d) 2×20 14 / 90 14) Division by zero (e.g. 2/ 0) is an example a) None b) Logic error c) Run-time error d) Run-time error 15 / 90 15) FTP stands for a) File Transfer Protocol b) Finding Tale Path c) File Transfer Principle d) Finis Transfer Protocol 16 / 90 16) The layer that provides services that directly support user application: a) Session layer b) transport layer c) Application layer d) Presentation layer 17 / 90 17) The Computing and Communication technologies are combined together for : a) Data routing b) Searching data c) Data communication d) Data sequencing 18 / 90 18) Select unguided media from the following: a) Satellite b) Coaxial c) Twisted pair d) Fiber optic 19 / 90 19) The process of converting a digital signal to an analog signal is called: a) Modulation b) Conversion c) Demodulation d) Merging 20 / 90 20) Which of the following protocol is used to access web pages on Word Wide Web? a) Gopher b) HTML c) HTTP d) Ethernet 21 / 90 21) The message sent on a ____ network can take any of several possible paths from source to destination a) Tree b) Mesh c) Ring d) Star 22 / 90 22) The frame rate is a factor in which of the following outputs? a) Audio b) Graphics c) Video d) Text 23 / 90 23) The process of linking library files with object cod is known as: a) Linking b) Executing c) Compiler d) Saving 24 / 90 24) Which of the following symbol is used to denote a pre-processor statement? a) # b) % c) @ d) $ 25 / 90 25) DFD stand for : a) Data Definition Diagram b) Digital Flow Diagram c) Data Flow Diagram d) Data Flow Design 26 / 90 26) The electron beams are swept across a coating of____to display output on CRT screen: a) Phosphor b) Silicon c) Metal oxide d) Aluminum 27 / 90 27) The layer is used to control how a bit-streams of data is sent and received over physical medium a) Session layer b) transport layer c) Physical layer d) Presentation layer 28 / 90 28) Who owns the Internet? a) None b) United Nations c) Pak Telecom d) U.S. Government 29 / 90 29) Which of the following is used to find information on the World Wide Web? a) Web server b) Website c) Search engine d) Web Browser 30 / 90 30) Which component of CPU decides the operations to be performed by the CPU? a) Control unit b) Register c) None d) ALU 31 / 90 31) Sound,light and radio waves are examples of a) Digital b) Green c) Pulse d) Analog 32 / 90 32) How many orientation types are available in Word? a) Five b) Two c) One d) Four 33 / 90 33) Making illegal copies of copyrighted software is called: a) Software distribution b) Software piracy c) Software hacking d) Software Browsing 34 / 90 34) Which type of modem can be added to the system unit through expansion slot? a) All b) External c) Wireless d) Internal 35 / 90 35) ROM stands for: a) Readily available memory b) Random only memory c) Recursive only memory d) Read only Memory 36 / 90 36) Times New Roman is an example of a: a) Sans serif font b) Three-dimensional font c) Boldface font d) Serif font 37 / 90 37) Specifications on how the system willsatisfy its requirements are created during : a) Development b) Analysis c) Implementation d) Design 38 / 90 38) CAL stands for: a) Computer Assisted Learning b) Computer Affected Learning c) Computer Aided Learning d) Computer Added Learning 39 / 90 39) _____function key is used for help. a) F7 b) F1 c) F3 d) F2 40 / 90 40) Microsoft Windows version 3.1 is a a) Menu b) Icon c) GUI on top of DOS d) Full operating system 41 / 90 41) Software can be removed/installed through: a) Debugger b) Linker c) Control Panel d) Installer 42 / 90 42) A graphics tablet is commonly activated by. a) Stylus b) Joystick c) Finger d) Trackball 43 / 90 43) All of the following are text alignment options in MS Word except: a) Center b) Top c) Right d) Left 44 / 90 44) A tool that is used to generate form letters is called: a) Mail merge b) Grammar Ready c) Letter writer d) Mail Ready 45 / 90 45) Data can be erased using ultraviolet rays written on: a) RAM b) PROM c) EPROM d) EEPROM 46 / 90 46) A set of illegal instructions inserted into a legitimate computer program is called: a) Trojan horse b) Bomb c) Worm d) Trapdoor 47 / 90 47) The process of studying an existing system to determine how it works is called : a) User requirements testing b) Systems analysis c) Computer programming d) Systems design 48 / 90 48) Many banks provide the facility of: a) CAM b) ATM c) CAD d) CBT 49 / 90 49) Which of the following language requires no translator to execute the program? a) C b) Assembly language c) C++ d) Machine language 50 / 90 50) EBCDIC is a a) 7-bit b) 8-bit c) .6-bit d) 4-bit 51 / 90 51) Testing all program components together is called : a) System testing b) Group testing c) Composite testing d) Volume testing 52 / 90 52) Route determination can be identified by: a) Network layer b) Presentation layer c) Session layer d) transport layer 53 / 90 53) MB stand for : a) Mechanical Base b) Mega Bit c) Mega Byte d) Magnetic Base 54 / 90 54) Which of the following is the most damaging loss to a company? a) Loss of software b) Loss of hardware c) Loss of data d) Loss of printouts 55 / 90 55) Which of the following method is used in data gathering step of Systems Analysis : a) Questionnaires b) All c) Interview d) Sampling 56 / 90 56) The “.exe” file is produced by:. a) interpreter b) Compiler c) Loader d) linker 57 / 90 57) Which of the following reason causes the syntax error a) All b) Missing any of the delimiters c) Missing statement terminator d) using a variable without declaration 58 / 90 58) 1 MB is approximately : a) 1024bytes b) 1KB c) 1024KB d) 100KB 59 / 90 59) The normal orientation for printing is: a) Vertical b) Horizontal c) Portrait d) Landscape 60 / 90 60) An example of a pointing device used with portable computers is: a) Trackball b) Pointing stick c) Touchpad d) All 61 / 90 61) The font that display little lines at the top and bottom of characters is called a) French b) Sent c) Sans-serif d) Decorated 62 / 90 62) How may types of graphic cards are available in market? a) 2 b) 4 c) 3 d) 5 63 / 90 63) CPU provides enabling signal through: a) Control Bus b) Main Bus c) Address Bus d) Data Bus 64 / 90 64) Which type of interface uses icons, windows and menus to carry out commands? a) Command line b) Design interface c) Graphical user d) System interface 65 / 90 65) Two types of display devices are____displays. a) Impact and non-impact b) Stylus and puck c) Flat-panel and CRT d) Inkjet and Laser 66 / 90 66) The conversation over a walkie-talkie radio is-an example of: a) Half-duplex transmission b) Full-duplex transmission c) .Duplex transmission d) Simplex transmission: 67 / 90 67) The operation of arithmetic and logic unit is directed by: a) Control unit b) ALU itself c) Processor d) Memory Unit 68 / 90 68) Terminators are used in______ topology: a) Bus b) Star c) Tree d) Mesh 69 / 90 69) Which multiplexing technique shifts each signal to a different carrier frequency? a) FDM b) TTD c) DFM d) TDM 70 / 90 70) The maximum zoom of MS-Word document is: a) 500% b) 100% c) 400% d) 200% 71 / 90 71) The medium in which signals travel through a cable or wire is called: a) Guided media b) Unguided media c) Local media d) International medias 72 / 90 72) How many characters can Unicode represcnt? a) 15,000 b) 65,536 c) 10,000 d) 500 73 / 90 73) How many types of addressing scheme are used on the Internet? a) 3 b) 5 c) 2 d) 8 74 / 90 74) The statements written by the programmer are called: a) Source code b) Object code c) None d) Syntax 75 / 90 75) What is the difference between hardware and software? a) Hardware is reliable but software is unreliable b) Hardware is tangible but software is intangible c) Hardware is metal but software is plastic d) Hardware is permanent but software is temporary 76 / 90 76) Which of the following syntax is used to include header file? a) # include "name of the header file" b) Both a or b c) None of these d) #include 77 / 90 77) Bitmap graphics are: a) Curve drawing b) Line drawing c) Solid drawing d) Painted pictures 78 / 90 78) Additional data and program not being used by CPU are stored in : a) CPU b) Secondary storage c) Input devices d) Output devices 79 / 90 79) The right of a person to keep his personal information away from others is called: a) Secrecy b) Right c) Privacy d) Private 80 / 90 80) Types of translators are: a) Compilers b) Interpreters c) All d) Assemblers 81 / 90 81) The arithmetic/logic unit performs the following a) Perform arithmetic functions b) Perform arithmetic functions & Perform logical comparisons c) Perform logical comparisons d) Control computer operations 82 / 90 82) Trojan Horse is a type of: a) Horse b) Software c) Antivirus d) Virus 83 / 90 83) Which of the following device is used to get hardcopy output? a) Monitor b) Speaker c) Keyboard d) Printer & Plotter 84 / 90 84) In star topology, the central device is called: a) Medium b) Node c) links d) Hub 85 / 90 85) Which of the following is mostly used on different products in the market? a) OMR b) MICR c) UPC d) OCR 86 / 90 86) which of the following language Is ideal to write business application a) PASCAL b) COBOL c) None d) BASIC 87 / 90 87) A____is a computer that provides services to other computers of the network. a) Client b) DNS c) Host d) Web browser 88 / 90 88) Which of the following is an example Internet Protocol? a) MAC b) Ethernet c) ARCnet d) TCP/IP 89 / 90 89) The expression may be: a) All b) Constant c) arithmetic expression d) string 90 / 90 90) Television and radio broadcasts are examples of: a) .Duplex transmission b) Full-duplex transmission c) Half-duplex transmission d) Simplex transmission Your score is LinkedIn Facebook Twitter VKontakte {{#message}}{{{message}}}{{/message}}{{^message}}Your submission failed. The server responded with {{status_text}} (code {{status_code}}). Please contact the developer of this form processor to improve this message. Learn More{{/message}}{{#message}}{{{message}}}{{/message}}{{^message}}It appears your submission was successful. Even though the server responded OK, it is possible the submission was not processed. Please contact the developer of this form processor to improve this message. Learn More{{/message}}Submitting…