Spread the love/100 108 Aiou Workshop 5403| Test 6 1 / 100 1) Mistakes that cause a running program to produce incorrect results are called: a) Logic error b) None c) Syntax error d) Program error 2 / 100 2) Choose the program that translates and executes one line of source code at a time. a) Assembler b) None c) compiler d) interpreter 3 / 100 3) The process of linking library files with object cod is known as: a) Compiler b) Linking c) Executing d) Saving 4 / 100 4) Which of the following is a biometric technique for person identification? a) Password b) PIN c) Access card d) Fingerprint 5 / 100 5) Which of the following one is not a virus? a) Reflof b) Logic Bomb c) Trojan Horse d) MCAfee 6 / 100 6) Which of the following is NOT a high level language? a) Assembly language b) FORTRAN c) None d) BASIC 7 / 100 7) A set of rules that must be followed to develop a program is called: a) Bug b) Syntax c) Preprocessor d) Debug 8 / 100 8) A set of illegal instructions inserted into a legitimate computer program is called: a) Trapdoor b) Worm c) Trojan horse d) Bomb 9 / 100 9) A virus that replicates itself is called: a) Worm b) Bomb c) Bug d) Vaccine 10 / 100 10) The lowest level of programming language is: a) None b) Pascal c) Java d) Assembly Language 11 / 100 11) Which of the following is not an antivirus program? a) Avast b) Redlof c) Norton d) McAfee 12 / 100 12) The secrets word or number used for protection is called: a) Passwords b) Biometric data c) Private words d) Backup 13 / 100 13) The “.exe” file is produced by:. a) interpreter b) Loader c) Compiler d) linker 14 / 100 14) Biometric data a) Name of a partner or spouse b) Combination of letters, numbers and symbols c) Word related to a job or hobby d) Name of a partner or spouse 15 / 100 15) Which term is commonly used to refer to software or program errors: a) Short circuit b) Down c) Crash d) Bug 16 / 100 16) Turbo C++ can compile a) C and C++ programs b) C programs only c) Turbo C++ Programs only d) Turbo C Programs only 17 / 100 17) Which of the following is the native language of computer? a) DOS b) Machine language c) Pascal d) None 18 / 100 18) Which of the following is the most damaging loss to a company? a) Loss of software b) Loss of printouts c) Loss of data d) Loss of hardware 19 / 100 19) Which of the following language requires no translator to execute the program? a) Assembly language b) C++ c) C d) Machine language 20 / 100 20) Which of the following syntax is used to include header file? a) # include "name of the header file" b) None of these c) Both a or b d) #include 21 / 100 21) For every opening brace in a C program, there must be a: a) Comma b) Colon c) Closing brace d) None 22 / 100 22) The name of header file is written between: a) <> b) ( ) c) {} 23 / 100 23) A spelling error (e.g. typing intt instead of int) is an example of: a) Syntax error b) Logic error c) Run-time error d) None 24 / 100 24) The extension of an executable file is: a) .xls b) .ext c) .exe d) .doc 25 / 100 25) The expression may be: a) string b) Constant c) All d) arithmetic expression 26 / 100 26) stdio stands for: a) Standard input output b) String input-output c) Simple input output d) Symbolic input output 27 / 100 27) Which of the following key is used to compile a program a) ALT+F9 b) ALT+F5 c) CTRL+F9 d) CTRL+S 28 / 100 28) conio stands for: a) Console input output b) Character input output c) Complex input output d) Common input output 29 / 100 29) The expression in define directive: a) Cannot be changed b) Can only be changed at the end of the program c) Cannot be assigned a value d) Can not be changed but can be redefined 30 / 100 30) which of the following header file contains information about common mathematical functions? a) stdio.h b) math.h c) conio.h d) None 31 / 100 31) Software that is available free for a limited period is called: a) Groupware b) Freeware c) vertical d) Shareware 32 / 100 32) C was developed in the year:1972 a) 1970 b) 1971 c) 1973 d) 1972 33 / 100 33) The right to use the software on the computer is called: a) Software copyright b) Intellectual property right c) Software piracy d) Site License 34 / 100 34) The output of the compiler is called: a) Object code b) Source code c) Library code d) Linked code 35 / 100 35) Which of the following is NOT an example of a program bug? a) Operator error b) Run-time error c) Logic error d) Syntax error 36 / 100 36) Protecting computers and the information they contain against unwanted access is called: a) Electronic policing b) Computer security c) Audit control d) Computer monitoring 37 / 100 37) Computer programs are also known ac a) Hardware b) None c) Firmware d) Software 38 / 100 38) Computer virus is simply a: a) Type of bacteria b) A disease c) Hardware component d) Set of computer instructions or code 39 / 100 39) The process of converting source code into object code,is knows as: a) Saving b) Linking c) Executing d) Compiling 40 / 100 40) An IDE stands for: a) Internal disk error b) Integrated Development Environment c) Input data error d) Input Desktop environment 41 / 100 41) Which of the following key is used to save a file? a) F5 b) F2 c) F3 d) F9 42 / 100 42) Which of the following viruses executes when starting the computer? a) File infector b) Salami shaving c) Boot sector d) Macro 43 / 100 43) Compiled programs typically, execute faster because: a) Compiled programs are already in a machine-readable form. b) Compiled programs are read and executed a line at a time c) Compiled programs do not require any data d) None of the above 44 / 100 44) An IDE typically consists of: a) All b) Compiler c) Text editor d) Debugger 45 / 100 45) The extension of the header file is: a) .h b) .txt c) .CPP d) .c 46 / 100 46) Which file contains the program after translation into machine language a) Object file b) exe file c) Source file d) None 47 / 100 47) A program that interferes with the normal working of a computer is called: a) Virus b) Antivirus c) Bateria d) Freeware 48 / 100 48) The statements written by the programmer are called: a) Object code b) None c) Syntax d) Source code 49 / 100 49) Processor directives are command for a) Language Processor b) Microprocessor c) C preprocessor d) Loader 50 / 100 50) stdio.h is part of: a) main function b) Compiler c) C standard library d) Comment section 51 / 100 51) Machine language: a) is the only language understood by the computer. b) All of these c) is the language in which programs were first written. d) None 52 / 100 52) Which of the following is not cause of virus? a) E-mail b) Pirated software c) Logic bomb d) Networks 53 / 100 53) Which of the following errors are NOT detected by compiler? a) None b) Both a and b c) Logical error d) Syntax error 54 / 100 54) A statement that starts with a # is called a: a) Keyword b) Preprocessor directive c) Comment d) None 55 / 100 55) which of the following language Is ideal to write business application a) PASCAL b) COBOL c) None d) BASIC 56 / 100 56) The right of a person to keep his personal information away from others is called: a) Privacy b) Right c) Private d) Secrecy 57 / 100 57) Which malicious program is activated when a specific set of conditions are met? a) Logic bomb b) Trojan horse c) Virus d) Worm 58 / 100 58) The restricted access to the server computer room is a form of: a) Enterprise security b) Logical security c) Physical security d) User security 59 / 100 59) Which of the following is computer virus? a) All of these b) Logic Bomb c) Reflof d) Chernobyl 60 / 100 60) This is a complete instruction that causes the computer to perform some action: a) Keyword b) None c) Statement d) Line 61 / 100 61) Most computer crime are committed by: a) Computer operators b) Hackers c) Highly paid computer consultant d) International spies 62 / 100 62) Which of the following media can be used for backup? a) Floppy Diskette b) Tape Device c) All d) Zip Disk 63 / 100 63) Which of the following does not contain machine language code? a) Library module b) Source module c) None d) Object module 64 / 100 64) C statements end with a: a) Period b) semicolon c) None d) semicolon 65 / 100 65) A program’s syntax errors is detected by: a) Compiler b) Debugger c) Loader d) Linker 66 / 100 66) Which of the following components is used to convert first.c to first.exe? a) None b) header & linker c) compiler & header d) compiler & linker 67 / 100 67) The extension of object file is: a) .exe b) .c c) .h d) .obj 68 / 100 68) What does the following code print on screen? printf(‘hello’); a) HELLO b) None c) hello d) Hello 69 / 100 69) The basic structure of C program consists of: a) Preprocessor Directive b) Program body c) main() function d) All 70 / 100 70) Who developed C? a) Charles Babbage b) Al- Khuwarizmi c) Von-Neumann d) Dennis Ritchie 71 / 100 71) Which of the following symbol is used to denote a pre-processor statement? a) # b) @ c) % d) $ 72 / 100 72) B was developed in the year: a) 1972-1988 b) 1969-70 c) 1992-1996 d) 1965-1975 73 / 100 73) Types of translators are: a) Compilers b) Assemblers c) All d) None 74 / 100 74) Which of the following language provided the basis for the development C a) C++ b) Pascal c) Java d) B 75 / 100 75) Which of the following key is used to load a program it memory to run? a) CTRL+F9 b) CTRL+S c) ALT+F5 d) ALT+F9 76 / 100 76) The processing of running an executable file is known as a) Debugging b) Compiling c) executing d) Saving 77 / 100 77) Trojan Horse is a type of: a) Virus b) Software c) Horse d) Antivirus 78 / 100 78) Writing programs in machine language is: a) Less time-consuming b) Both a and c c) None d) Less tedious 79 / 100 79) Security protection for personal computers includes: a) Locks and cables b) Software c) All of these d) Internal components 80 / 100 80) computer programs are also known as: a) Software b) Hardware c) Procedure d) None 81 / 100 81) C programs are divided into units called: a) Section b) Syntax c) Functions d) debug 82 / 100 82) Which of the following is harmful for computers? a) Freeware b) Virus c) Antivirus d) Shareware 83 / 100 83) Another name for free software is: a) Copy protected software b) Encrypted software c) Public domain software d) Shareware 84 / 100 84) McAfee is an example of: a) Virus b) Hacker c) Antivirus d) Worm 85 / 100 85) An additional or spare copy of data stored on storage media is call: a) Backup of data b) Moving of Data c) Copying of Data d) Additional data 86 / 100 86) FormatC is an example of: a) Trojan horse b) Chernobal c) Logic Bomb d) Boot sector 87 / 100 87) Header files in C contain: a) Library functions b) Operators for files c) Compiler commands d) Header information of C programs 88 / 100 88) which of the following header a) conio.h b) None c) stdio.h d) math.h 89 / 100 89) The process of identifying and removing errors in the programs is called: a) Executing b) debugging c) Processing d) None 90 / 100 90) A type of error that occurs when an instruction violates the rules programs is called: a) Syntax error b) None c) Runtime error d) Program error 91 / 100 91) The extension of C source program is: a) .exe b) .h c) .obj d) .c 92 / 100 92) A special program that can detect and remove viruses from computer is called: a) Custom b) Virus c) Groupware d) Anti-Virus 93 / 100 93) Which of the following is a compiler directive? a) #include b) main ( ) c) All d) Using namespace std; 94 / 100 94) The programmer usually enters source code into a computer using a) Debugger b) Text editor c) Compiler d) Linker 95 / 100 95) Which of the following is an authentication methodology? a) Access cards b) Piracy c) PIN d) Biometrics 96 / 100 96) C was designed to write program for: a) Solaris operating system b) OS/2 operating system c) Windows operating system d) Unix operating system 97 / 100 97) Which of the following reason causes the syntax error a) All b) Missing any of the delimiters c) using a variable without declaration d) Missing statement terminator 98 / 100 98) A type of language in which instructions are written in binary form is called: a) Machine language b) None c) Assembly language d) High level language 99 / 100 99) How a virus reaches from one computer to another? a) Exchange of keyboard b) Exchange of printer c) Exchange of display screen d) Data is exchanged between computers 100 / 100 100) which Program that translates assembly language code to machine code a) Converter b) Assembler c) Translator d) Debugger Your score is LinkedIn Facebook Twitter VKontakte Post Views: 593 Post navigation Aiou Workshop 5403| Test 5 Aiou Workshop 5403| Full Test