Site icon Express Pakistan

Aiou Workshop 5403| Full Test

Spread the love
/90
95

Aiou Workshop 5403| Full Test

1 / 90

1) The restricted access to the server computer room is a form of:

2 / 90

2) How many devices can exist between a sending and receiving host?

3 / 90

3) which one of the following translates source code to object code as a whole

4 / 90

4) The command used to move text from one document to another is:

5 / 90

5) The basic structure of C program consists of:

6 / 90

6) Which of the following consists of thin glass to transmit beams of light?

7 / 90

7) The ways of entering data in computer and presenting information generated by the system are called:

8 / 90

8) The primary difference between a LAN and a WAN is:

9 / 90

9) Application software is available in many forms except :

10 / 90

10) Each computer on a network is called a:

11 / 90

11) .Which transmission type transmits data one character at a time

12 / 90

12) Which of the following devices uses parallel transmission?

13 / 90

13) A binary signal can be send using :

14 / 90

14) Which key removes the character to the left of the cursor :

15 / 90

15) The standard protocol for the Internet is:

16 / 90

16) Which of the following is faster printer :

17 / 90

17) Which type of network covers a small area?

18 / 90

18) An important property of fiber optic cable is:

19 / 90

19) Terminal is a:

20 / 90

20) Add New Hardware option is available in:

21 / 90

21) The name of screen clarity:

22 / 90

22) A network that covers a limited geographic distance such as an office is called:

23 / 90

23) The name of header file is written between:

24 / 90

24) Data is transmitted block by block in: .

25 / 90

25) Which of the following is an impact printer :

26 / 90

26) CPU stands for :

27 / 90

27) Computer transmit data in the form of codes.

28 / 90

28) Which register is used for arithmetic and data operations?

29 / 90

29) The hardware component that permanently holds data and program is called :

30 / 90

30) Step by Step instruction that run the computer are called :

31 / 90

31) The size of EAX register can be up to:

32 / 90

32) A set of documents stored on computer permanently connected with Internet is:

33 / 90

33) Which LAN access method resolves the contention between two or more nodes by collision detection

34 / 90

34) Route determination can be identified by:

35 / 90

35) Which of the following is not an antivirus program?

36 / 90

36) De Jure means

37 / 90

37) The extension of an executable file is:

38 / 90

38) EBCDIC is a

39 / 90

39) A computer network must contain at least number of computers:

40 / 90

40) Additional data and program not being used by CPU are stored in :

41 / 90

41) Security protection for personal computers includes:

42 / 90

42) Which of the following cables consists of a single core of solid copper?

43 / 90

43) A gigabyte is equal to :

44 / 90

44) Turbo C++ can compile

45 / 90

45) The benefits of using computers are:

46 / 90

46) There are ___________type of General purpose register:

47 / 90

47) Most computer crime are committed by:

48 / 90

48) What percent of personal computer in the world have word processor installed?

49 / 90

49) VCR stands for:

50 / 90

50) A word processor can:

51 / 90

51) EAX, EBX, ECX and EDX are:

52 / 90

52) Which of the following topologies uses routers?

53 / 90

53) Pressing and releasing the left mouse button quickly is called:

54 / 90

54) All of the following are text alignment options in MS Word except:

55 / 90

55) A list of documents waiting to be printed on printer is called:

56 / 90

56) Which device is used to capture video using standard analog camcorder or VCR:

57 / 90

57) The chart,graph,pictures and freehand drawing are examples of:

58 / 90

58) In WAN, the communication software that allows a personal computer to appear as terminal is call

59 / 90

59) The hardware device that temporarily holds data and program is called :

60 / 90

60) Which of the following is used to get voice output:

61 / 90

61) Most data .transmitted over telephone lines uses:.

62 / 90

62) Which operating system provides only a command-line user interface?

63 / 90

63) A discussion group to exchange information like science and computer is called:

64 / 90

64) An advantage of synchronous over asynchronous transmission is:

65 / 90

65) A disadvantage of the laser printer is that :

66 / 90

66) Which medium transmits voice and data via air as high-frequency radio waves?

67 / 90

67) Multiple choice examination answer sheet can be evaluated automatically using :

68 / 90

68) Two types of display devices are____displays.

69 / 90

69) EEPROM chips:

70 / 90

70) Which of the following protocol is used to access web pages on Word Wide Web?

71 / 90

71) Which of the following is not a type of user interface?

72 / 90

72) Which of the following is used to edit text in a document?

73 / 90

73) The microphone converts the sound into:

74 / 90

74) The network that connects different campuses of a college in city is an example of:

75 / 90

75) The arithmetic/logic unit can perform

76 / 90

76) Which of the following code can represent up to 65,536 symbols?

77 / 90

77) A major category of software is :

78 / 90

78) Which of the following is an authentication methodology?

79 / 90

79) which component of CPU interacts with primary memory?

80 / 90

80) How many modes of data communication are available?

81 / 90

81) Which software is used to solve every day personal or business tasks?

82 / 90

82) Which of the following are considered as resource?

83 / 90

83) A type of error that occurs when an instruction violates the rules programs is called:

84 / 90

84) A collection of documents stored on computes permanently connected with Internet around the worl

85 / 90

85) A 32-bit bus is _________ than a 16-bit bus.

86 / 90

86) The output of the compiler is called:

87 / 90

87) Which modem is used to transmit data signals through air instead of cable?

88 / 90

88) Which of the following is mostly used on different products in the market?

89 / 90

89) Which of the following viruses executes when starting the computer?

90 / 90

90) Computer at home can be used for:

Exit mobile version