Aiou Workshop 5403| Full Test admin 4 years ago Spread the love /90 95 Aiou Workshop 5403| Full Test 1 / 90 1) The restricted access to the server computer room is a form of: a) User security b) Logical security c) Enterprise security d) Physical security 2 / 90 2) How many devices can exist between a sending and receiving host? a) 1 b) 10 c) Any. d) 2 3 / 90 3) which one of the following translates source code to object code as a whole a) Assembler b) None c) Compiler d) Interpreter 4 / 90 4) The command used to move text from one document to another is: a) Edit b) Cut-and-Paste c) Format d) Replace 5 / 90 5) The basic structure of C program consists of: a) Preprocessor Directive b) Program body c) main() function d) All 6 / 90 6) Which of the following consists of thin glass to transmit beams of light? a) Fiber-optic cable b) Microwave c) Twisted pair d) Coaxial cable 7 / 90 7) The ways of entering data in computer and presenting information generated by the system are called: a) Input /output b) Processing c) Storage /retrieval d) Data generated 8 / 90 8) The primary difference between a LAN and a WAN is: a) The number of software programs available b) The variety of hardware devices c) Distance d) The number of hardware devices 9 / 90 9) Application software is available in many forms except : a) Commercial software b) Device drivers c) Scientific software d) Financial software 10 / 90 10) Each computer on a network is called a: a) Node b) Code c) Link d) Mode 11 / 90 11) .Which transmission type transmits data one character at a time a) Parallel: b) Ethernet. c) Asynchronous d) Synchronous 12 / 90 12) Which of the following devices uses parallel transmission? a) .Keyboard b) All c) Mouse d) Printer 13 / 90 13) A binary signal can be send using : a) Two bit b) One bit c) Four bit d) Three bit 14 / 90 14) Which key removes the character to the left of the cursor : a) Delete b) Esc c) Alt d) Backspace 15 / 90 15) The standard protocol for the Internet is: a) IP protocol b) TCP/IP c) IP address d) TCP 16 / 90 16) Which of the following is faster printer : a) Inkjet b) Dot-Matrix c) Daisy wheel d) Laser 17 / 90 17) Which type of network covers a small area? a) WAN b) LAN c) NAN d) MAN 18 / 90 18) An important property of fiber optic cable is: a) Radiation b) Noise c) Refraction d) Degradation 19 / 90 19) Terminal is a: a) Device to give power to computer b) The last instruction in a program c) Any input/output device d) Point where data leaves the computer 20 / 90 20) Add New Hardware option is available in: a) Control panel b) Task bar c) Status bar d) Main menu 21 / 90 21) The name of screen clarity: a) Density b) Resolution c) Pixel d) Picture quality 22 / 90 22) A network that covers a limited geographic distance such as an office is called: a) LAN b) MAN c) TAN d) WAN 23 / 90 23) The name of header file is written between: a) <> b) ( ) c) {} 24 / 90 24) Data is transmitted block by block in: . a) Analog transmission b) Synchronous transmission c) Asynchronous transmission d) Isochronous transmission 25 / 90 25) Which of the following is an impact printer : a) Line printer b) Daisy wheel printer c) Dot-Matrix printer d) All 26 / 90 26) CPU stands for : a) Central processing unit b) Central programming unit c) Central product unit d) Computing program usage 27 / 90 27) Computer transmit data in the form of codes. a) Analog b) None c) Decimal d) Binary 28 / 90 28) Which register is used for arithmetic and data operations? a) DX b) BX c) AX d) CX 29 / 90 29) The hardware component that permanently holds data and program is called : a) CPU b) Primary storage c) Secondary storage d) Output 30 / 90 30) Step by Step instruction that run the computer are called : a) Calculating b) Hardware c) Procedure d) Software 31 / 90 31) The size of EAX register can be up to: a) 4 KB b) 8 bytes c) 4 bit d) 4 bytes 32 / 90 32) A set of documents stored on computer permanently connected with Internet is: a) WWW b) Telnet c) LAN d) FTP 33 / 90 33) Which LAN access method resolves the contention between two or more nodes by collision detection a) CSMA/CS b) CSMA/CD c) CSMA/CR d) CSMA/DR 34 / 90 34) Route determination can be identified by: a) transport layer b) Session layer c) Presentation layer d) Network layer 35 / 90 35) Which of the following is not an antivirus program? a) Avast b) Norton c) Redlof d) McAfee 36 / 90 36) De Jure means a) By chance b) By fact c) By law d) By luck 37 / 90 37) The extension of an executable file is: a) .ext b) .doc c) .exe d) .xls 38 / 90 38) EBCDIC is a a) 8-bit b) 7-bit c) 4-bit d) .6-bit 39 / 90 39) A computer network must contain at least number of computers: a) One b) Four c) Three d) Two 40 / 90 40) Additional data and program not being used by CPU are stored in : a) Input devices b) Secondary storage c) CPU d) Output devices 41 / 90 41) Security protection for personal computers includes: a) Locks and cables b) Software c) Internal components d) All of these 42 / 90 42) Which of the following cables consists of a single core of solid copper? a) Unicode b) Coaxial c) Medium d) Digital 43 / 90 43) A gigabyte is equal to : a) One thousand kilobytes b) 1024 megabytes c) 1024×1024 megabytes d) One million megabytes 44 / 90 44) Turbo C++ can compile a) Turbo C++ Programs only b) C and C++ programs c) Turbo C Programs only d) C programs only 45 / 90 45) The benefits of using computers are: a) All b) Speed c) Reliable d) Storage 46 / 90 46) There are ___________type of General purpose register: a) Two b) Four c) Three d) Eight 47 / 90 47) Most computer crime are committed by: a) International spies b) Hackers c) Computer operators d) Highly paid computer consultant 48 / 90 48) What percent of personal computer in the world have word processor installed? a) 10% b) 90% c) 50% d) 80% 49 / 90 49) VCR stands for: a) Visual Control Response b) Virtual Control Room c) Voltage Controlled Timer d) Video Cassette Recorder 50 / 90 50) A word processor can: a) Copy text b) All c) Find and replace text d) insert text 51 / 90 51) EAX, EBX, ECX and EDX are: a) General-purpose registers b) Special purpose register c) Memory buffer register d) Address registers 52 / 90 52) Which of the following topologies uses routers? a) bus b) star c) Mesh d) Tree 53 / 90 53) Pressing and releasing the left mouse button quickly is called: a) Pointing b) Clicking c) Dragging d) Dropping 54 / 90 54) All of the following are text alignment options in MS Word except: a) Top b) Right c) Center d) Left 55 / 90 55) A list of documents waiting to be printed on printer is called: a) Print line b) Print list c) Print stack d) Print queue 56 / 90 56) Which device is used to capture video using standard analog camcorder or VCR: a) Video digitizer b) Image recorder c) Video captures card d) Digital camcorder 57 / 90 57) The chart,graph,pictures and freehand drawing are examples of: a) Image data b) Numeric data c) Text data d) Audio data 58 / 90 58) In WAN, the communication software that allows a personal computer to appear as terminal is call a) Teleconferencing software b) Electronic mail software c) Terminal emulation software d) Bulletin board system 59 / 90 59) The hardware device that temporarily holds data and program is called : a) Secondary storage b) CPU c) Output d) Primary storage 60 / 90 60) Which of the following is used to get voice output: a) Printer b) Speaker c) plotter d) Microphone 61 / 90 61) Most data .transmitted over telephone lines uses:. a) Serial transmission b) Direct transmission c) Sequential transmission d) Parallel transmission 62 / 90 62) Which operating system provides only a command-line user interface? a) Mac OS b) DOS c) Windows d) Linux 63 / 90 63) A discussion group to exchange information like science and computer is called: a) Newsgroup b) E-Commerce c) Chatting d) FTP 64 / 90 64) An advantage of synchronous over asynchronous transmission is: a) Two-way b) Simplicity c) Error checking d) Speed 65 / 90 65) A disadvantage of the laser printer is that : a) Its output is of a lower quality b) It is very slow c) It is quieter than impact printer d) None 66 / 90 66) Which medium transmits voice and data via air as high-frequency radio waves? a) Microwave b) Fiber-optic cable c) Twisted pair d) Coaxial cable 67 / 90 67) Multiple choice examination answer sheet can be evaluated automatically using : a) OMR b) Magnetic Stripe c) MICR d) OCR 68 / 90 68) Two types of display devices are____displays. a) Stylus and puck b) Inkjet and Laser c) Impact and non-impact d) Flat-panel and CRT 69 / 90 69) EEPROM chips: a) Can be reprogrammed electronically b) Cannot be reprogrammed c) none of these d) Can be reprogrammed by ultraviolet light 70 / 90 70) Which of the following protocol is used to access web pages on Word Wide Web? a) Ethernet b) HTML c) HTTP d) Gopher 71 / 90 71) Which of the following is not a type of user interface? a) Command-line b) System interface and Design interface c) Design interface d) System interface 72 / 90 72) Which of the following is used to edit text in a document? a) Delete key b) Cut and paste c) all d) Backspace key 73 / 90 73) The microphone converts the sound into: a) Software b) Computer file c) Mechanical signals d) Electrical signal 74 / 90 74) The network that connects different campuses of a college in city is an example of: a) WAN b) MAN c) NAN d) LAN 75 / 90 75) The arithmetic/logic unit can perform a) subtraction b) Addition c) Multiplication d) All 76 / 90 76) Which of the following code can represent up to 65,536 symbols? a) ASCII b) BCD c) EBCDIC d) Unicode 77 / 90 77) A major category of software is : a) Application and system b) System and development c) Application and design d) System and design 78 / 90 78) Which of the following is an authentication methodology? a) Biometrics b) Access cards c) Piracy d) PIN 79 / 90 79) which component of CPU interacts with primary memory? a) SAB b) BUS c) Control unit d) ALU 80 / 90 80) How many modes of data communication are available? a) 4 b) 3. c) .2 d) 3. 81 / 90 81) Which software is used to solve every day personal or business tasks? a) Application software b) Operating system c) Device drives d) System software 82 / 90 82) Which of the following are considered as resource? a) Processor b) Memory c) Processor and Memory d) User 83 / 90 83) A type of error that occurs when an instruction violates the rules programs is called: a) Syntax error b) None c) Runtime error d) Program error 84 / 90 84) A collection of documents stored on computes permanently connected with Internet around the worl a) WWW b) Telnet c) Email d) FTP 85 / 90 85) A 32-bit bus is _________ than a 16-bit bus. a) a and b b) Faster c) Longer d) Wider 86 / 90 86) The output of the compiler is called: a) Library code b) Object code c) Linked code d) Source code 87 / 90 87) Which modem is used to transmit data signals through air instead of cable? a) All b) Wireless c) External d) Internal 88 / 90 88) Which of the following is mostly used on different products in the market? a) UPC b) OMR c) MICR d) OCR 89 / 90 89) Which of the following viruses executes when starting the computer? a) Salami shaving b) Macro c) File infector d) Boot sector 90 / 90 90) Computer at home can be used for: a) All b) Making budgets c) Keeping records d) Watching movies Your score is LinkedIn Facebook Twitter VKontakte {{#message}}{{{message}}}{{/message}}{{^message}}Your submission failed. The server responded with {{status_text}} (code {{status_code}}). Please contact the developer of this form processor to improve this message. Learn More{{/message}}{{#message}}{{{message}}}{{/message}}{{^message}}It appears your submission was successful. Even though the server responded OK, it is possible the submission was not processed. Please contact the developer of this form processor to improve this message. Learn More{{/message}}Submitting…