Site icon Express Pakistan

Aiou Workshop 5403| Full Test

Spread the love
/90
95

Aiou Workshop 5403| Full Test

1 / 90

1) Which malicious program is activated when a specific set of conditions are met?

2 / 90

2) Which is a correct association between hardware device and component type :

3 / 90

3) Which memory is used to speed up the computer processing?

4 / 90

4) OMR stand for :

5 / 90

5) Which of the following is not a type of ROM:

6 / 90

6) Which of the following is a signal?

7 / 90

7) Which communications medium requires line-of-sight?

8 / 90

8) The step that performs the actions given in the instructions is called:

9 / 90

9) A program that interferes with the normal working of a computer is called:

10 / 90

10) The extension of an executable file is:

11 / 90

11) The resolution of a monitor depends on:

12 / 90

12) Which of the following is the fastest communication mode

13 / 90

13) code is 7-bit or.8-bit code.

14 / 90

14) The data moves between the internal components of the computer using:

15 / 90

15) The dots that compose the image of a digital photograph are called:

16 / 90

16) Which of the following language provided the basis for the development C

17 / 90

17) The lowest level of programming language is:

18 / 90

18) The process of transferring data electronically from one place to another is caled

19 / 90

19) Which of the following protocol is used to access web pages on Word Wide Web?

20 / 90

20) The term that refers to all input,output,and Secondary storage devices is :

21 / 90

21) A well-defined set of instructions given to the computer is called:

22 / 90

22) The frame rate is a factor in which of the following outputs?

23 / 90

23) Which type of memory is nonvolatile and cannot be changed by the user?

24 / 90

24) Biometric data

25 / 90

25) All of the following are properties of a monitor expect:

26 / 90

26) Which of the following key is used to save a file?

27 / 90

27) A small image that represents a program, instruction, or file is called:

28 / 90

28) The devices use to enter data or instruction in a computer include :

29 / 90

29) The name of the document is displayed:

30 / 90

30) The individual images that make up a video are called:

31 / 90

31) The benefits of CAD include:

32 / 90

32) Which component is used to connect different parts of computer together?

33 / 90

33) Which of the following is not a type of printer?

34 / 90

34) The most commonly used LAN protocol is:

35 / 90

35) The benefits of using computers are:

36 / 90

36) The expression may be:

37 / 90

37) Which of the following is determined by video display adapters:

38 / 90

38) A collection of related web pages is called:

39 / 90

39) OSI reference model has:

40 / 90

40) A collection of documents stored on computes permanently connected with Internet around the worl

41 / 90

41) Which of the following is used to surf Internet?

42 / 90

42) A 32-bit bus is _________ than a 16-bit bus.

43 / 90

43) Which of the following coding schemes uses 4-bit code?

44 / 90

44) Data shown on display unit or played through audio is called:

45 / 90

45) Which scanner takes many X-rays around the body?

46 / 90

46) Sound,light and radio waves are examples of

47 / 90

47) The “.exe” file is produced by:.

48 / 90

48) How may types of graphic cards are available in market?

49 / 90

49) Transmission that is used without timing signal is called:

50 / 90

50) What type of printer forms images one character at a time as print head moves across the paper :

51 / 90

51) Types of translators are:

52 / 90

52) The idea of storing a program in memory was given by:

53 / 90

53) Which medium transmits voice and data via air as high-frequency radio waves?

54 / 90

54) Which is a correct association between hardware device and action :

55 / 90

55) Checking a computer program for errors is called:

56 / 90

56) Another name for main memory is :

57 / 90

57) Which of the following transmission media is used in LAN?

58 / 90

58) Which of the following is used to find information on the World Wide Web?

59 / 90

59) A file that is sent along with an email is known as:

60 / 90

60) McAfee is an example of:

61 / 90

61) The font that does not display little lines at the top and bottom of character is:

62 / 90

62) Each set of bit pattern is called:

63 / 90

63) Which type of network covers a small area?

64 / 90

64) Electronic banking is also known as:

65 / 90

65) conio stands for:

66 / 90

66) The order of stack is:

67 / 90

67) The number of bits a computer can process at one time is sometimes called :

68 / 90

68) LAN does not use:

69 / 90

69) Which of the following is not a type of user interface?

70 / 90

70) Which of the following keys is used to cancel an operation :

71 / 90

71) Which of the following technologies is used in flat-panel display screens?

72 / 90

72) A type of error that occurs when an instruction violates the rules programs is called:

73 / 90

73) Which of the following is the first phase of SDLC :

74 / 90

74) The process of modifying information system to meet changing needs is called :

75 / 90

75) Which of the following consists of two insulated copper wires twisted together?

76 / 90

76) A collection of computers connected together to share resources and informal called:

77 / 90

77) Which modem is used to transmit data signals through air instead of cable?

78 / 90

78) The process of converting source code into object code,is knows as:

79 / 90

79) SUPARCO department gives information about:

80 / 90

80) In the OSI model, encryption and decryption are functions of the________?

81 / 90

81) In the e-mail address me@pu.edu, the world “me” is:

82 / 90

82) Defacto means:

83 / 90

83) Analog signal is measured in:

84 / 90

84) The command used to move text from one document to another is:

85 / 90

85) How many characters ASCII 8-bit code can represent?

86 / 90

86) The programmer usually enters source code into a computer using

87 / 90

87) All of the following are elements of data communication system EXCEPT:

88 / 90

88) Information technology is a combination of :

89 / 90

89) How many types of network standard are there

90 / 90

90) 1 Terabyte (TB) =____ bytes :

Exit mobile version