Spread the love/100 108 Aiou Workshop 5403| Test 6 1 / 100 1) A program that interferes with the normal working of a computer is called: a) Freeware b) Bateria c) Virus d) Antivirus 2 / 100 2) Computer programs are also known ac a) None b) Firmware c) Software d) Hardware 3 / 100 3) Most computer crime are committed by: a) International spies b) Computer operators c) Hackers d) Highly paid computer consultant 4 / 100 4) which of the following header file contains information about common mathematical functions? a) stdio.h b) conio.h c) None d) math.h 5 / 100 5) The secrets word or number used for protection is called: a) Backup b) Biometric data c) Private words d) Passwords 6 / 100 6) Which of the following errors are NOT detected by compiler? a) Logical error b) None c) Both a and b d) Syntax error 7 / 100 7) Which of the following syntax is used to include header file? a) None of these b) #include c) # include "name of the header file" d) Both a or b 8 / 100 8) C was developed in the year:1972 a) 1970 b) 1973 c) 1971 d) 1972 9 / 100 9) C was designed to write program for: a) Solaris operating system b) Windows operating system c) OS/2 operating system d) Unix operating system 10 / 100 10) The expression in define directive: a) Can not be changed but can be redefined b) Can only be changed at the end of the program c) Cannot be assigned a value d) Cannot be changed 11 / 100 11) Header files in C contain: a) Library functions b) Compiler commands c) Operators for files d) Header information of C programs 12 / 100 12) The lowest level of programming language is: a) Assembly Language b) Java c) Pascal d) None 13 / 100 13) Which malicious program is activated when a specific set of conditions are met? a) Virus b) Logic bomb c) Worm d) Trojan horse 14 / 100 14) Which of the following is computer virus? a) Logic Bomb b) Chernobyl c) Reflof d) All of these 15 / 100 15) An assembly language uses: a) English Words b) None c) Binary Digit d) Mnemonic Codes 16 / 100 16) Which term is commonly used to refer to software or program errors: a) Bug b) Down c) Crash d) Short circuit 17 / 100 17) Which of the following is NOT a high level language? a) BASIC b) None c) Assembly language d) FORTRAN 18 / 100 18) Who developed C? a) Von-Neumann b) Charles Babbage c) Al- Khuwarizmi d) Dennis Ritchie 19 / 100 19) A program’s syntax errors is detected by: a) Compiler b) Debugger c) Linker d) Loader 20 / 100 20) McAfee is an example of: a) Hacker b) Worm c) Antivirus d) Virus 21 / 100 21) Which of the following components is used to convert first.c to first.exe? a) compiler & linker b) compiler & header c) None d) header & linker 22 / 100 22) The “.exe” file is produced by:. a) Loader b) interpreter c) Compiler d) linker 23 / 100 23) Debug is the process of: a) Identifying Errors b) Removing Errors c) Creating bugs in program d) Identifying and removing errors 24 / 100 24) Which of the following language provided the basis for the development C a) C++ b) Pascal c) Java d) B 25 / 100 25) Which of the following key is used to save a file? a) F5 b) F2 c) F3 d) F9 26 / 100 26) Trojan Horse is a type of: a) Virus b) Software c) Horse d) Antivirus 27 / 100 27) A spelling error (e.g. typing intt instead of int) is an example of: a) Syntax error b) Logic error c) None d) Run-time error 28 / 100 28) What does the following code print on screen? printf(‘hello’); a) hello b) HELLO c) Hello d) None 29 / 100 29) main is a a) Comment b) Function c) Compiler directive d) Expression 30 / 100 30) stdio.h is part of: a) Comment section b) C standard library c) main function d) Compiler 31 / 100 31) Which of the following symbol is used to denote a pre-processor statement? a) # b) @ c) % d) $ 32 / 100 32) Which of the following reason causes the syntax error a) All b) Missing any of the delimiters c) using a variable without declaration d) Missing statement terminator 33 / 100 33) Writing programs in machine language is: a) Less time-consuming b) None c) Less tedious d) Both a and c 34 / 100 34) This is a complete instruction that causes the computer to perform some action: a) None b) Keyword c) Statement d) Line 35 / 100 35) Which of the following media can be used for backup? a) Zip Disk b) All c) Floppy Diskette d) Tape Device 36 / 100 36) Which of the following is the most damaging loss to a company? a) Loss of data b) Loss of software c) Loss of hardware d) Loss of printouts 37 / 100 37) Which of the following key is used to load a program it memory to run? a) ALT+F9 b) CTRL+S c) ALT+F5 d) CTRL+F9 38 / 100 38) which Program that translates assembly language code to machine code a) Converter b) Debugger c) Translator d) Assembler 39 / 100 39) A special program that can detect and remove viruses from computer is called: a) Anti-Virus b) Custom c) Groupware d) Virus 40 / 100 40) Which of the following one is not a virus? a) Reflof b) Trojan Horse c) Logic Bomb d) MCAfee 41 / 100 41) An IDE typically consists of: a) Debugger b) Text editor c) All d) Compiler 42 / 100 42) Choose the program that translates and executes one line of source code at a time. a) None b) interpreter c) compiler d) Assembler 43 / 100 43) which of the following header a) math.h b) stdio.h c) None d) conio.h 44 / 100 44) conio stands for: a) Complex input output b) Console input output c) Common input output d) Character input output 45 / 100 45) For every opening brace in a C program, there must be a: a) Colon b) None c) Closing brace d) Comma 46 / 100 46) Making illegal copies of copyrighted software is called: a) Software distribution b) Software Browsing c) Software piracy d) Software hacking 47 / 100 47) FormatC is an example of: a) Trojan horse b) Boot sector c) Chernobal d) Logic Bomb 48 / 100 48) The process of identifying and removing errors in the programs is called: a) debugging b) Processing c) None d) Executing 49 / 100 49) The extension of C source program is: a) .obj b) .c c) .exe d) .h 50 / 100 50) B was developed in the year: a) 1969-70 b) 1972-1988 c) 1965-1975 d) 1992-1996 51 / 100 51) A statement that starts with a # is called a: a) Keyword b) Comment c) Preprocessor directive d) None 52 / 100 52) The right to use the software on the computer is called: a) Site License b) Intellectual property right c) Software piracy d) Software copyright 53 / 100 53) Division by zero (e.g. 2/ 0) is an example a) Run-time error b) Run-time error c) None d) Logic error 54 / 100 54) Types of translators are: a) Assemblers b) None c) All d) Compilers 55 / 100 55) The right of a person to keep his personal information away from others is called: a) Secrecy b) Right c) Private d) Privacy 56 / 100 56) Computer virus is simply a: a) Hardware component b) Type of bacteria c) A disease d) Set of computer instructions or code 57 / 100 57) The output of the compiler is called: a) Object code b) Library code c) Linked code d) Source code 58 / 100 58) Which of the following key is used to compile a program a) CTRL+S b) ALT+F5 c) ALT+F9 d) CTRL+F9 59 / 100 59) Another name for free software is: a) Copy protected software b) Encrypted software c) Public domain software d) Shareware 60 / 100 60) A virus that replicates itself is called: a) Worm b) Bug c) Bomb d) Vaccine 61 / 100 61) A type of error that occurs when an instruction violates the rules programs is called: a) Runtime error b) None c) Syntax error d) Program error 62 / 100 62) A well-defined set of instructions given to the computer is called: a) Bug b) None c) Software d) Hardware 63 / 100 63) The process of converting source code into object code,is knows as: a) Executing b) Compiling c) Saving d) Linking 64 / 100 64) Which of the following is an authentication methodology? a) Access cards b) Piracy c) Biometrics d) PIN 65 / 100 65) A person who gains illegal access to a computer system is called: a) Authorized person b) Hacker c) Network controller d) Computer operator 66 / 100 66) The expression may be: a) Constant b) string c) All d) arithmetic expression 67 / 100 67) which header file contains information about standard input/ output functions? a) math.h b) Both a and b c) None d) stdio.h 68 / 100 68) Protecting computers and the information they contain against unwanted access is called: a) Computer monitoring b) Audit control c) Computer security d) Electronic policing 69 / 100 69) Another name for antivirus is: a) Trojan horse b) Vaccine c) Logic Bomb d) DES 70 / 100 70) Which of the following viruses executes when starting the computer? a) Boot sector b) Macro c) File infector d) Salami shaving 71 / 100 71) The process of linking library files with object cod is known as: a) Linking b) Compiler c) Saving d) Executing 72 / 100 72) Biometric data a) Name of a partner or spouse b) Word related to a job or hobby c) Name of a partner or spouse d) Combination of letters, numbers and symbols 73 / 100 73) Which file contains the program after translation into machine language a) None b) Object file c) Source file d) exe file 74 / 100 74) Machine language: a) is the only language understood by the computer. b) None c) All of these d) is the language in which programs were first written. 75 / 100 75) Security protection for personal computers includes: a) Internal components b) All of these c) Locks and cables d) Software 76 / 100 76) The name of header file is written between: a) <> b) {} c) ( ) 77 / 100 77) which one of the following translates source code to object code as a whole a) None b) Compiler c) Assembler d) Interpreter 78 / 100 78) Processor directives are command for a) Loader b) C preprocessor c) Microprocessor d) Language Processor 79 / 100 79) Turbo C++ can compile a) Turbo C++ Programs only b) C and C++ programs c) Turbo C Programs only d) C programs only 80 / 100 80) which of the following language Is ideal to write business application a) COBOL b) BASIC c) PASCAL d) None 81 / 100 81) A set of illegal instructions inserted into a legitimate computer program is called: a) Trojan horse b) Worm c) Bomb d) Trapdoor 82 / 100 82) Which of the following is harmful for computers? a) Antivirus b) Shareware c) Freeware d) Virus 83 / 100 83) Which of the following is the native language of computer? a) Machine language b) None c) Pascal d) DOS 84 / 100 84) The virus which deletes MS Office files and disk partition information is called: a) Logic Bomb b) Chernobyl c) Trojan horse d) Book sector 85 / 100 85) stdio stands for: a) String input-output b) Simple input output c) Symbolic input output d) Standard input output 86 / 100 86) The extension of object file is: a) .c b) .h c) .exe d) .obj 87 / 100 87) Which of the following is not an antivirus program? a) Norton b) Redlof c) Avast d) McAfee 88 / 100 88) The restricted access to the server computer room is a form of: a) Logical security b) Physical security c) User security d) Enterprise security 89 / 100 89) Which of the following does not contain machine language code? a) Source module b) Object module c) Library module d) None 90 / 100 90) C programs are divided into units called: a) Functions b) Syntax c) debug d) Section 91 / 100 91) Which of the following is not cause of virus? a) Networks b) Pirated software c) Logic bomb d) E-mail 92 / 100 92) Software that is available free for a limited period is called: a) Shareware b) Freeware c) Groupware d) vertical 93 / 100 93) void occupy how many bytes in memory? a) 0 b) 1 c) 2 d) 3 94 / 100 94) computer programs are also known as: a) Software b) Hardware c) Procedure d) None 95 / 100 95) Which of the following language requires no translator to execute the program? a) Machine language b) C++ c) Assembly language d) C 96 / 100 96) An IDE stands for: a) Input data error b) Input Desktop environment c) Integrated Development Environment d) Internal disk error 97 / 100 97) The programmer usually enters source code into a computer using a) Compiler b) Linker c) Text editor d) Debugger 98 / 100 98) Which of the following is a biometric technique for person identification? a) PIN b) Password c) Access card d) Fingerprint 99 / 100 99) How a virus reaches from one computer to another? a) Exchange of printer b) Exchange of display screen c) Data is exchanged between computers d) Exchange of keyboard 100 / 100 100) C statements end with a: a) semicolon b) Period c) semicolon d) None Your score is LinkedIn Facebook Twitter VKontakte Post Views: 622 Post navigation Aiou Workshop 5403| Test 5 Aiou Workshop 5403| Full Test