Spread the love/100 108 Aiou Workshop 5403| Test 6 1 / 100 1) Which of the following syntax is used to include header file? a) #include b) None of these c) # include "name of the header file" d) Both a or b 2 / 100 2) What does the # sign indicate in an instruction of C language? a) Instruction for user b) None c) Instruction for linker d) Instruction for compiler 3 / 100 3) C was designed to write program for: a) OS/2 operating system b) Windows operating system c) Solaris operating system d) Unix operating system 4 / 100 4) Software that is available free for a limited period is called: a) Shareware b) Groupware c) Freeware d) vertical 5 / 100 5) Which of the following is NOT a high level language? a) FORTRAN b) Assembly language c) None d) BASIC 6 / 100 6) The name of header file is written between: a) {} b) ( ) c) <> 7 / 100 7) A well-defined set of instructions given to the computer is called: a) Hardware b) Software c) None d) Bug 8 / 100 8) Processor directives are command for a) Microprocessor b) Language Processor c) C preprocessor d) Loader 9 / 100 9) A set of rules that must be followed to develop a program is called: a) Bug b) Preprocessor c) Debug d) Syntax 10 / 100 10) C programs are divided into units called: a) debug b) Syntax c) Functions d) Section 11 / 100 11) Which of the following is the native language of computer? a) DOS b) None c) Machine language d) Pascal 12 / 100 12) Who is responsible of security of online data? a) User b) Organization obtaining the data c) LAN Administrator d) Internet Service provider 13 / 100 13) The extension of object file is: a) .h b) .exe c) .obj d) .c 14 / 100 14) conio stands for: a) Character input output b) Console input output c) Complex input output d) Common input output 15 / 100 15) stdio stands for: a) Standard input output b) String input-output c) Simple input output d) Symbolic input output 16 / 100 16) Which of the following is a compiler directive? a) Using namespace std; b) #include c) main ( ) d) All 17 / 100 17) The expression may be: a) arithmetic expression b) All c) string d) Constant 18 / 100 18) Another name for free software is: a) Public domain software b) Copy protected software c) Shareware d) Encrypted software 19 / 100 19) stdio.h is part of: a) Compiler b) Comment section c) C standard library d) main function 20 / 100 20) The process of identifying and removing errors in the programs is called: a) debugging b) Executing c) None d) Processing 21 / 100 21) which of the following language Is ideal to write business application a) BASIC b) None c) COBOL d) PASCAL 22 / 100 22) The basic structure of C program consists of: a) main() function b) Program body c) All d) Preprocessor Directive 23 / 100 23) Division by zero (e.g. 2/ 0) is an example a) Logic error b) Run-time error c) None d) Run-time error 24 / 100 24) Which of the following is not an antivirus program? a) Avast b) Redlof c) McAfee d) Norton 25 / 100 25) Debug is the process of: a) Identifying and removing errors b) Creating bugs in program c) Removing Errors d) Identifying Errors 26 / 100 26) A type of error that occurs when an instruction violates the rules programs is called: a) Program error b) None c) Syntax error d) Runtime error 27 / 100 27) A person who gains illegal access to a computer system is called: a) Authorized person b) Computer operator c) Network controller d) Hacker 28 / 100 28) FormatC is an example of: a) Trojan horse b) Chernobal c) Boot sector d) Logic Bomb 29 / 100 29) Which malicious program is activated when a specific set of conditions are met? a) Logic bomb b) Trojan horse c) Virus d) Worm 30 / 100 30) The right of a person to keep his personal information away from others is called: a) Right b) Secrecy c) Privacy d) Private 31 / 100 31) which of the following header a) stdio.h b) conio.h c) None d) math.h 32 / 100 32) An IDE typically consists of: a) Debugger b) Compiler c) Text editor d) All 33 / 100 33) How a virus reaches from one computer to another? a) Exchange of display screen b) Exchange of printer c) Data is exchanged between computers d) Exchange of keyboard 34 / 100 34) Making illegal copies of copyrighted software is called: a) Software hacking b) Software piracy c) Software Browsing d) Software distribution 35 / 100 35) main is a a) Function b) Expression c) Compiler directive d) Comment 36 / 100 36) A spelling error (e.g. typing intt instead of int) is an example of: a) Logic error b) Syntax error c) None d) Run-time error 37 / 100 37) A program’s syntax errors is detected by: a) Linker b) Compiler c) Loader d) Debugger 38 / 100 38) A virus that replicates itself is called: a) Vaccine b) Bug c) Bomb d) Worm 39 / 100 39) An additional or spare copy of data stored on storage media is call: a) Copying of Data b) Backup of data c) Additional data d) Moving of Data 40 / 100 40) The extension of an executable file is: a) .doc b) .ext c) .exe d) .xls 41 / 100 41) The output of the compiler is called: a) Source code b) Object code c) Library code d) Linked code 42 / 100 42) An assembly language uses: a) English Words b) Binary Digit c) Mnemonic Codes d) None 43 / 100 43) Which of the following is a biometric technique for person identification? a) Fingerprint b) Password c) PIN d) Access card 44 / 100 44) B was developed in the year: a) 1965-1975 b) 1972-1988 c) 1969-70 d) 1992-1996 45 / 100 45) which header file contains information about standard input/ output functions? a) stdio.h b) math.h c) None d) Both a and b 46 / 100 46) The extension of the header file is: a) .CPP b) .h c) .txt d) .c 47 / 100 47) Which of the following reason causes the syntax error a) All b) using a variable without declaration c) Missing any of the delimiters d) Missing statement terminator 48 / 100 48) McAfee is an example of: a) Antivirus b) Virus c) Worm d) Hacker 49 / 100 49) which Program that translates assembly language code to machine code a) Debugger b) Assembler c) Translator d) Converter 50 / 100 50) A statement that starts with a # is called a: a) Comment b) Keyword c) Preprocessor directive d) None 51 / 100 51) Which of the following key is used to compile a program a) CTRL+F9 b) CTRL+S c) ALT+F5 d) ALT+F9 52 / 100 52) Which of the following viruses executes when starting the computer? a) Salami shaving b) Boot sector c) File infector d) Macro 53 / 100 53) Header files in C contain: a) Compiler commands b) Library functions c) Header information of C programs d) Operators for files 54 / 100 54) Which of the following language provided the basis for the development C a) Java b) C++ c) B d) Pascal 55 / 100 55) Which of the following is harmful for computers? a) Antivirus b) Freeware c) Shareware d) Virus 56 / 100 56) Which term is commonly used to refer to software or program errors: a) Short circuit b) Down c) Crash d) Bug 57 / 100 57) This is a complete instruction that causes the computer to perform some action: a) Keyword b) Line c) None d) Statement 58 / 100 58) which of the following header file contains information about common mathematical functions? a) None b) stdio.h c) math.h d) conio.h 59 / 100 59) A program that interferes with the normal working of a computer is called: a) Bateria b) Antivirus c) Virus d) Freeware 60 / 100 60) The lowest level of programming language is: a) Pascal b) Java c) Assembly Language d) None 61 / 100 61) Most computer crime are committed by: a) Highly paid computer consultant b) Computer operators c) Hackers d) International spies 62 / 100 62) Which of the following errors are NOT detected by compiler? a) Both a and b b) Logical error c) Syntax error d) None 63 / 100 63) Which of the following is NOT an example of a program bug? a) Operator error b) Syntax error c) Logic error d) Run-time error 64 / 100 64) Which of the following one is not a virus? a) MCAfee b) Trojan Horse c) Reflof d) Logic Bomb 65 / 100 65) Which of the following language requires no translator to execute the program? a) C b) Assembly language c) Machine language d) C++ 66 / 100 66) A special program that can detect and remove viruses from computer is called: a) Custom b) Groupware c) Virus d) Anti-Virus 67 / 100 67) The statements written by the programmer are called: a) Syntax b) Source code c) Object code d) None 68 / 100 68) Which of the following is the most damaging loss to a company? a) Loss of printouts b) Loss of data c) Loss of hardware d) Loss of software 69 / 100 69) Protecting computers and the information they contain against unwanted access is called: a) Electronic policing b) Computer monitoring c) Audit control d) Computer security 70 / 100 70) Who developed C? a) Dennis Ritchie b) Von-Neumann c) Charles Babbage d) Al- Khuwarizmi 71 / 100 71) Which of the following media can be used for backup? a) All b) Zip Disk c) Floppy Diskette d) Tape Device 72 / 100 72) void occupy how many bytes in memory? a) 3 b) 1 c) 0 d) 2 73 / 100 73) Which of the following does not contain machine language code? a) Source module b) Object module c) Library module d) None 74 / 100 74) The right to use the software on the computer is called: a) Software copyright b) Software piracy c) Intellectual property right d) Site License 75 / 100 75) An IDE stands for: a) Input data error b) Input Desktop environment c) Internal disk error d) Integrated Development Environment 76 / 100 76) which one of the following translates source code to object code as a whole a) Compiler b) None c) Assembler d) Interpreter 77 / 100 77) Types of translators are: a) All b) Assemblers c) Compilers d) None 78 / 100 78) The [ascetic] militant Chinese have gone straight to the roots of the problems. a) professional b) trained c) secular d) religious 79 / 100 79) For every opening brace in a C program, there must be a: a) Comma b) None c) Closing brace d) Colon 80 / 100 80) C statements end with a: a) semicolon b) Period c) semicolon d) None 81 / 100 81) A type of language in which instructions are written in binary form is called: a) High level language b) None c) Assembly language d) Machine language 82 / 100 82) Choose the program that translates and executes one line of source code at a time. a) compiler b) Assembler c) None d) interpreter 83 / 100 83) Which of the following key is used to load a program it memory to run? a) CTRL+S b) ALT+F5 c) ALT+F9 d) CTRL+F9 84 / 100 84) Which of the following components is used to convert first.c to first.exe? a) compiler & linker b) compiler & header c) header & linker d) None 85 / 100 85) The extension of C source program is: a) .exe b) .c c) .obj d) .h 86 / 100 86) C is a: a) Low-level language b) High level language c) Assembly language d) Machine Language 87 / 100 87) Machine language: a) is the language in which programs were first written. b) is the only language understood by the computer. c) All of these d) None 88 / 100 88) The restricted access to the server computer room is a form of: a) User security b) Enterprise security c) Logical security d) Physical security 89 / 100 89) The “.exe” file is produced by:. a) linker b) Loader c) Compiler d) interpreter 90 / 100 90) Writing programs in machine language is: a) None b) Less tedious c) Both a and c d) Less time-consuming 91 / 100 91) The process of converting source code into object code,is knows as: a) Saving b) Linking c) Compiling d) Executing 92 / 100 92) The virus which deletes MS Office files and disk partition information is called: a) Logic Bomb b) Trojan horse c) Book sector d) Chernobyl 93 / 100 93) Trojan Horse is a type of: a) Software b) Horse c) Antivirus d) Virus 94 / 100 94) Security protection for personal computers includes: a) Software b) All of these c) Internal components d) Locks and cables 95 / 100 95) Compiled programs typically, execute faster because: a) None of the above b) Compiled programs are read and executed a line at a time c) Compiled programs do not require any data d) Compiled programs are already in a machine-readable form. 96 / 100 96) The process of linking library files with object cod is known as: a) Compiler b) Executing c) Saving d) Linking 97 / 100 97) Which of the following is not cause of virus? a) E-mail b) Networks c) Pirated software d) Logic bomb 98 / 100 98) Which of the following symbol is used to denote a pre-processor statement? a) $ b) @ c) # d) % 99 / 100 99) Computer virus is simply a: a) Set of computer instructions or code b) Type of bacteria c) Hardware component d) A disease 100 / 100 100) The expression in define directive: a) Can not be changed but can be redefined b) Can only be changed at the end of the program c) Cannot be assigned a value d) Cannot be changed Your score is LinkedIn Facebook Twitter VKontakte Post Views: 520 Post navigation Aiou Workshop 5403| Test 5 Aiou Workshop 5403| Full Test