Aiou Workshop 5403| Full Test admin 4 years ago Spread the love /90 95 Aiou Workshop 5403| Full Test 1 / 90 1) Satellite transmission stations that can both send and receive messages are called: a) Earth stations b) Jupiter stations c) Moon stations d) Mars stations 2 / 90 2) How many characters ASCII 8-bit code can represent? a) 128 b) 364 c) 500 d) 256 3 / 90 3) A combination of both client/server and peer-to-peer network is_______network a) Mixed b) Merged c) Hybrid d) Dedicated 4 / 90 4) FTP facility is used to: a) Check PC b) Connect to internet c) File Transfer d) Transfer protocol 5 / 90 5) Which register is used for arithmetic and data operations? a) CX b) DX c) BX d) AX 6 / 90 6) The name of the document is displayed: a) Scrollbar b) Menu bar c) Title Bar d) Status Bar 7 / 90 7) Who developed C? a) Charles Babbage b) Von-Neumann c) Dennis Ritchie d) Al- Khuwarizmi 8 / 90 8) RAM stands for a) . Read and more memory b) Readily available memory c) Random access memory d) Remember all memory 9 / 90 9) The fly-by-wire system is used in: a) Car b) Education field c) Airline d) Medical field 10 / 90 10) Debug is the process of: a) Identifying and removing errors b) Removing Errors c) Creating bugs in program d) Identifying Errors 11 / 90 11) The standard protocol for the Internet is: a) IP protocol b) TCP c) TCP/IP d) IP address 12 / 90 12) Which component of CPU decides the operations to be performed by the CPU? a) ALU b) Control unit c) None d) Register 13 / 90 13) Defacto means: a) By law b) By nature c) By fact d) By luck 14 / 90 14) Tables allow the text to be displayed in: a) Graphic file b) Row cell c) Rows and columns d) Newspaper-type columns 15 / 90 15) Arrow keys are also called : a) Function keys b) Cursor control key c) Modifier key d) Toggle key 16 / 90 16) Data processing is also known as : a) Knowledge b) Merging c) Computing d) Procedure 17 / 90 17) Which of the following is an example of a font style? a) Helvetica b) All c) Bold d) 12 pt 18 / 90 18) The output of the compiler is called: a) Object code b) Source code c) Linked code d) The program 19 / 90 19) Which of the following is communications device a) Router b) Ethernet c) UTP d) USB 20 / 90 20) Full-duplex communication is made. possible by the.devices known as: a) Modem b) .Mouse c) ..Keyboard. d) Multiplexer: 21 / 90 21) The extension of the header file is: a) .h b) .CPP c) .c d) .txt 22 / 90 22) FTP stands for a) File Transfer Principle b) File Transfer Protocol c) Finis Transfer Protocol d) Finding Tale Path 23 / 90 23) The higher resolution means: a) Greater number of pixels b) Bigger picture c) Larger pixel size d) More accurate voice recogination 24 / 90 24) Which of the following syntax is used to include header file? a) # include "name of the header file" b) None of these c) Both a or b d) #include 25 / 90 25) Application software is available in many forms except : a) Scientific software b) Device drivers c) Commercial software d) Financial software 26 / 90 26) Memory consists of: a) ports b) none of these c) Cells d) Data communication 27 / 90 27) Printers and monitors are common forms of : a) Storage devices b) Processing devices c) Output devices d) Input devices 28 / 90 28) Specifications on how the system willsatisfy its requirements are created during : a) Design b) Implementation c) Development d) Analysis 29 / 90 29) In_______a node listens to bus for specified time and waits until node has completed transmission a) CSMA/CR b) CSMA/CS c) CSMA/CD d) CSMA/DR 30 / 90 30) Computer virus is simply a: a) Hardware component b) A disease c) Type of bacteria d) Set of computer instructions or code 31 / 90 31) 1 Megabyte (MB) =__ bytes : a) 2×30 b) 2×10 c) 2×40 d) 2×20 32 / 90 32) A set of documents stored on computer permanently connected with Internet is: a) WWW b) FTP c) LAN d) Telnet 33 / 90 33) The direction of paper in printing is referred to as a) Page position b) Directionnel position c) Orientation d) Page style 34 / 90 34) All of the following are properties of a monitor expect: a) Resolution b) Color c) Speed d) Size 35 / 90 35) ___________allow the processor to communicate with peripheral devices. a) System bus b) Expansion bus c) Memory bus d) Processor bus 36 / 90 36) The system that translates an IP address into an human-readable name is called: a) Domain name system b) Domain numbering system c) IP system d) Domain 37 / 90 37) Windows was developed by: a) Hewlett b) Sun System c) Microsoft d) ANSI 38 / 90 38) Which type of modem can be added to the system unit through expansion slot? a) External b) All c) Internal d) Wireless 39 / 90 39) A spelling error (e.g. typing intt instead of int) is an example of: a) Run-time error b) Syntax error c) Logic error d) None 40 / 90 40) Electronic banking is also known as: a) Offline banking b) Interactive banking c) Cyber banking d) Global banking 41 / 90 41) The hardware component that permanently holds data and program is called : a) Output b) CPU c) Secondary storage d) Primary storage 42 / 90 42) C programs are divided into units called: a) Section b) Functions c) Syntax d) debug 43 / 90 43) How may types of graphic cards are available in market? a) 4 b) 2 c) 5 d) 3 44 / 90 44) A common type of diagram in most project management software is : a) Gantt chart b) Data flow diagram c) CASE tool d) System flowchart 45 / 90 45) Which component is used to connect different parts of computer together? a) Bus Interconnection b) control unit c) Power supply d) main memory 46 / 90 46) The process of touching an object with mouse pointer is called: a) Hovering b) Pointing c) Pausing d) Dropping 47 / 90 47) GB is approximately : a) 100MB b) 1000KB c) 1024MB d) 100KB 48 / 90 48) How many types of Language tntmlator are there? a) 2 b) 4 c) 1 d) 3 49 / 90 49) ASCII code was.developed by: a) Full-duplex b) Duplex c) Simplex transmission d) ANSI.. 50 / 90 50) A feature commonly available with word processors is: a) Automatic footnoting b) Multicolumn tables c) Spell checker d) All 51 / 90 51) An unwanted message sent through e-mail is called: a) Attachment b) Junk c) Hoax d) Virus 52 / 90 52) ALU has _______ units: a) 2 b) 3 c) 4 d) 5 53 / 90 53) A gigabyte is equal to : a) One million megabytes b) 1024 megabytes c) 1024×1024 megabytes d) One thousand kilobytes 54 / 90 54) The format of an email address is: a) User name@ DNS Address b) User name# DNS Address c) User name$DNS.com d) User name& DNS Address. 55 / 90 55) Which of the following components is used to convert first.c to first.exe? a) compiler & header b) compiler & linker c) None d) header & linker 56 / 90 56) NIC allows direct connection to: a) Printer b) Moniter c) Modem d) Network 57 / 90 57) Which of the following media can be used for backup? a) All b) Floppy Diskette c) Tape Device d) Zip Disk 58 / 90 58) A translator is best described as: a) Package software b) System software c) Hardware d) Application software 59 / 90 59) Which of the following is determined by video display adapters: a) Resolution b) Speed with which image appear on screen c) All d) Number of colors 60 / 90 60) Which key removes the character to the right of the cursor : a) Esc b) Alt c) Backspace d) Delete 61 / 90 61) Which of the following task is related to Preliminary investigation : a) System specifications b) System scope c) Feasibility study d) All 62 / 90 62) A network that places all nodes on a single cable is called: a) Mesh b) Tree c) none of these d) Bus 63 / 90 63) Which of the following is an internet protocol? a) ARCnet b) Ethernet c) TCP/IP d) Token Ring 64 / 90 64) Which of the following can be used to launch the word Art a) Standard toolbar b) status bar c) Ruler d) Drawing toolbar 65 / 90 65) The most familiar input device for computer is : a) Scanner b) Monitor c) Keyboard d) Graphics tablet 66 / 90 66) Which of the following memories allows simultaneous read and write operations? a) RAM b) EPROM c) ROM d) EEPROM 67 / 90 67) scorn, .edu and .goy- are examples of: a) Email b) Protocol c) Top level domain d) Tag 68 / 90 68) Clipboard stores: a) Entered text b) Deleted text c) Copied text d) Repeated text 69 / 90 69) Which of the following services is provided by the operating system? a) All of these b) Hardware Management c) User interface d) File-system Management 70 / 90 70) The most commonly used LAN protocol is: a) Ethernet b) Token Ring c) WiMax d) ARCnet 71 / 90 71) Which of the following tasks is not part of the systems analyst role : a) Programming b) Communication c) Planning d) Coordination 72 / 90 72) Which of the following are considered as resource? a) Processor and Memory b) User c) Processor d) Memory 73 / 90 73) The layer that provides services that directly support user application: a) Presentation layer b) Application layer c) Session layer d) transport layer 74 / 90 74) Which of the following can be used instead of mouse if desk space is limited : a) Scanner b) Keyboard c) Mouse d) Pointing stick &Trackball 75 / 90 75) Digital signals are commonly known as: a) Band b) Narrowband c) Broadband d) Baseband 76 / 90 76) A set collection of a large number of computers all over the world connected to one another is a) Interlink b) Internet 77 / 90 77) The interface used by Windows is called a) Prompt interface b) Graphical User interface c) Menu-driven interface d) Command line interface 78 / 90 78) A program’s syntax errors is detected by: a) Loader b) Linker c) Debugger d) Compiler 79 / 90 79) Indention in MS Word is used to: a) Change the paragraph color b) Change line spacing c) Make the text readable d) Apply border around text 80 / 90 80) The time taken by a data signal to reach to moon and then back to earth was about: a) 2 minutes b) 2-second c) 2 ms d) 2 hours 81 / 90 81) The ability of an operating system to control the activities of multiple programs at the same time? a) Multi-processing b) Multitasking c) Multi-operating d) Multi-paging 82 / 90 82) The second layer of OSI model is a) Data link layer b) transport layer c) Session layer d) Presentation layer 83 / 90 83) Transmission media are usually categorized as_ a) Good and bad b) Guided or unguided c) Fixed or unfixed d) Baseband and broadband 84 / 90 84) The benefits of CAD include: a) Accuracy b) Repeatability c) Speed & flexibility of d) All 85 / 90 85) Font effects include: a) Shadow b) Strikethrough c) Outline d) All 86 / 90 86) DSL stands for a) Distance Server Line b) Digital subscriber Line c) Digital Subscriber Link d) Domain System Line 87 / 90 87) The data moves between the internal components of the computer using: a) Bus b) Cable c) Connector d) Link 88 / 90 88) A program’s syntax errors are detected by: a) Device linking b) Device Driver c) Device operator d) Device System 89 / 90 89) The restricted access to the server computer room is a form of: a) Logical security b) Physical security c) User security d) Enterprise security 90 / 90 90) A file that is sent along with an email is known as: a) Document b) Attachment c) Header d) Folder Your score is LinkedIn Facebook Twitter VKontakte {{#message}}{{{message}}}{{/message}}{{^message}}Your submission failed. The server responded with {{status_text}} (code {{status_code}}). Please contact the developer of this form processor to improve this message. Learn More{{/message}}{{#message}}{{{message}}}{{/message}}{{^message}}It appears your submission was successful. Even though the server responded OK, it is possible the submission was not processed. Please contact the developer of this form processor to improve this message. Learn More{{/message}}Submitting…