Spread the love/100 108 Aiou Workshop 5403| Test 6 1 / 100 1) Choose the program that translates and executes one line of source code at a time. a) Assembler b) interpreter c) compiler d) None 2 / 100 2) C was designed to write program for: a) OS/2 operating system b) Solaris operating system c) Windows operating system d) Unix operating system 3 / 100 3) which Program that translates assembly language code to machine code a) Assembler b) Debugger c) Converter d) Translator 4 / 100 4) Protecting computers and the information they contain against unwanted access is called: a) Computer monitoring b) Audit control c) Computer security d) Electronic policing 5 / 100 5) Which of the following is computer virus? a) Chernobyl b) Logic Bomb c) Reflof d) All of these 6 / 100 6) Which of the following language provided the basis for the development C a) Pascal b) B c) C++ d) Java 7 / 100 7) Which of the following key is used to load a program it memory to run? a) ALT+F9 b) CTRL+F9 c) CTRL+S d) ALT+F5 8 / 100 8) FormatC is an example of: a) Trojan horse b) Boot sector c) Logic Bomb d) Chernobal 9 / 100 9) Another name for free software is: a) Public domain software b) Copy protected software c) Encrypted software d) Shareware 10 / 100 10) Compiled programs typically, execute faster because: a) None of the above b) Compiled programs do not require any data c) Compiled programs are read and executed a line at a time d) Compiled programs are already in a machine-readable form. 11 / 100 11) Machine language: a) is the only language understood by the computer. b) None c) All of these d) is the language in which programs were first written. 12 / 100 12) The process of converting source code into object code,is knows as: a) Compiling b) Saving c) Linking d) Executing 13 / 100 13) stdio stands for: a) String input-output b) Standard input output c) Simple input output d) Symbolic input output 14 / 100 14) Computer programs are also known ac a) Software b) Firmware c) None d) Hardware 15 / 100 15) which of the following header a) stdio.h b) conio.h c) math.h d) None 16 / 100 16) Mistakes that cause a running program to produce incorrect results are called: a) Logic error b) Syntax error c) None d) Program error 17 / 100 17) main is a a) Function b) Expression c) Comment d) Compiler directive 18 / 100 18) An IDE typically consists of: a) Debugger b) Compiler c) All d) Text editor 19 / 100 19) Who developed C? a) Al- Khuwarizmi b) Charles Babbage c) Von-Neumann d) Dennis Ritchie 20 / 100 20) Which of the following viruses executes when starting the computer? a) Salami shaving b) Boot sector c) File infector d) Macro 21 / 100 21) Computer virus is simply a: a) Hardware component b) Set of computer instructions or code c) Type of bacteria d) A disease 22 / 100 22) Which of the following is NOT an example of a program bug? a) Syntax error b) Logic error c) Operator error d) Run-time error 23 / 100 23) Which of the following is NOT a high level language? a) None b) FORTRAN c) Assembly language d) BASIC 24 / 100 24) The basic structure of C program consists of: a) Preprocessor Directive b) main() function c) All d) Program body 25 / 100 25) which one of the following translates source code to object code as a whole a) Interpreter b) Compiler c) Assembler d) None 26 / 100 26) The extension of the header file is: a) .txt b) .CPP c) .h d) .c 27 / 100 27) computer programs are also known as: a) Software b) None c) Procedure d) Hardware 28 / 100 28) The extension of object file is: a) .obj b) .h c) .c d) .exe 29 / 100 29) A program that interferes with the normal working of a computer is called: a) Antivirus b) Bateria c) Virus d) Freeware 30 / 100 30) This is a complete instruction that causes the computer to perform some action: a) Statement b) Keyword c) None d) Line 31 / 100 31) Which of the following is not a biometric technique: a) Palm print b) Face c) Badge d) Retina 32 / 100 32) Which of the following components is used to convert first.c to first.exe? a) compiler & header b) None c) compiler & linker d) header & linker 33 / 100 33) A virus that replicates itself is called: a) Worm b) Vaccine c) Bug d) Bomb 34 / 100 34) McAfee is an example of: a) Hacker b) Virus c) Antivirus d) Worm 35 / 100 35) The name of header file is written between: a) <> b) {} c) ( ) 36 / 100 36) A type of language in which instructions are written in binary form is called: a) Assembly language b) None c) High level language d) Machine language 37 / 100 37) Which term is commonly used to refer to software or program errors: a) Down b) Crash c) Short circuit d) Bug 38 / 100 38) Which of the following is the native language of computer? a) Machine language b) DOS c) None d) Pascal 39 / 100 39) C was developed in the year:1972 a) 1971 b) 1970 c) 1972 d) 1973 40 / 100 40) The processing of running an executable file is known as a) Compiling b) executing c) Debugging d) Saving 41 / 100 41) B was developed in the year: a) 1992-1996 b) 1969-70 c) 1972-1988 d) 1965-1975 42 / 100 42) Which of the following is the most damaging loss to a company? a) Loss of data b) Loss of software c) Loss of printouts d) Loss of hardware 43 / 100 43) Software that is available free for a limited period is called: a) vertical b) Shareware c) Groupware d) Freeware 44 / 100 44) A program’s syntax errors is detected by: a) Compiler b) Linker c) Debugger d) Loader 45 / 100 45) Processor directives are command for a) C preprocessor b) Loader c) Language Processor d) Microprocessor 46 / 100 46) For every opening brace in a C program, there must be a: a) Colon b) Comma c) None d) Closing brace 47 / 100 47) The right to use the software on the computer is called: a) Software piracy b) Site License c) Intellectual property right d) Software copyright 48 / 100 48) which of the following language Is ideal to write business application a) None b) BASIC c) PASCAL d) COBOL 49 / 100 49) The virus which deletes MS Office files and disk partition information is called: a) Chernobyl b) Logic Bomb c) Book sector d) Trojan horse 50 / 100 50) Which of the following is harmful for computers? a) Freeware b) Antivirus c) Virus d) Shareware 51 / 100 51) Which of the following reason causes the syntax error a) All b) Missing any of the delimiters c) Missing statement terminator d) using a variable without declaration 52 / 100 52) The extension of C source program is: a) .obj b) .exe c) .c d) .h 53 / 100 53) stdio.h is part of: a) Comment section b) Compiler c) C standard library d) main function 54 / 100 54) The output of the compiler is called: a) Library code b) Source code c) Object code d) Linked code 55 / 100 55) The expression in define directive: a) Cannot be changed b) Can only be changed at the end of the program c) Can not be changed but can be redefined d) Cannot be assigned a value 56 / 100 56) Writing programs in machine language is: a) Both a and c b) None c) Less tedious d) Less time-consuming 57 / 100 57) C statements end with a: a) semicolon b) Period c) semicolon d) None 58 / 100 58) Debug is the process of: a) Removing Errors b) Creating bugs in program c) Identifying and removing errors d) Identifying Errors 59 / 100 59) Trojan Horse is a type of: a) Horse b) Software c) Virus d) Antivirus 60 / 100 60) How a virus reaches from one computer to another? a) Data is exchanged between computers b) Exchange of keyboard c) Exchange of printer d) Exchange of display screen 61 / 100 61) Which of the following is a compiler directive? a) #include b) Using namespace std; c) All d) main ( ) 62 / 100 62) The process of linking library files with object cod is known as: a) Saving b) Compiler c) Linking d) Executing 63 / 100 63) The process of identifying and removing errors in the programs is called: a) None b) Processing c) debugging d) Executing 64 / 100 64) Making illegal copies of copyrighted software is called: a) Software Browsing b) Software distribution c) Software hacking d) Software piracy 65 / 100 65) which header file contains information about standard input/ output functions? a) None b) math.h c) Both a and b d) stdio.h 66 / 100 66) An additional or spare copy of data stored on storage media is call: a) Moving of Data b) Additional data c) Backup of data d) Copying of Data 67 / 100 67) Which of the following media can be used for backup? a) All b) Tape Device c) Zip Disk d) Floppy Diskette 68 / 100 68) The right of a person to keep his personal information away from others is called: a) Secrecy b) Right c) Private d) Privacy 69 / 100 69) void occupy how many bytes in memory? a) 0 b) 2 c) 1 d) 3 70 / 100 70) The lowest level of programming language is: a) Assembly Language b) None c) Pascal d) Java 71 / 100 71) Which of the following one is not a virus? a) MCAfee b) Logic Bomb c) Reflof d) Trojan Horse 72 / 100 72) A type of error that occurs when an instruction violates the rules programs is called: a) Program error b) None c) Runtime error d) Syntax error 73 / 100 73) An IDE stands for: a) Input data error b) Integrated Development Environment c) Internal disk error d) Input Desktop environment 74 / 100 74) The “.exe” file is produced by:. a) Loader b) Compiler c) linker d) interpreter 75 / 100 75) Which of the following errors are NOT detected by compiler? a) Both a and b b) Syntax error c) Logical error d) None 76 / 100 76) Which malicious program is activated when a specific set of conditions are met? a) Trojan horse b) Virus c) Logic bomb d) Worm 77 / 100 77) Which of the following is not an antivirus program? a) Redlof b) Norton c) Avast d) McAfee 78 / 100 78) Division by zero (e.g. 2/ 0) is an example a) Logic error b) None c) Run-time error d) Run-time error 79 / 100 79) Security protection for personal computers includes: a) Internal components b) Locks and cables c) Software d) All of these 80 / 100 80) conio stands for: a) Common input output b) Complex input output c) Console input output d) Character input output 81 / 100 81) Which of the following language requires no translator to execute the program? a) Machine language b) C c) Assembly language d) C++ 82 / 100 82) which of the following header file contains information about common mathematical functions? a) stdio.h b) None c) conio.h d) math.h 83 / 100 83) Turbo C++ can compile a) Turbo C Programs only b) C programs only c) C and C++ programs d) Turbo C++ Programs only 84 / 100 84) The expression may be: a) string b) Constant c) All d) arithmetic expression 85 / 100 85) A person who gains illegal access to a computer system is called: a) Authorized person b) Computer operator c) Network controller d) Hacker 86 / 100 86) Types of translators are: a) Compilers b) None c) All d) Assemblers 87 / 100 87) An assembly language uses: a) Mnemonic Codes b) None c) English Words d) Binary Digit 88 / 100 88) Which of the following is not cause of virus? a) Logic bomb b) E-mail c) Networks d) Pirated software 89 / 100 89) Header files in C contain: a) Library functions b) Header information of C programs c) Operators for files d) Compiler commands 90 / 100 90) Which of the following syntax is used to include header file? a) #include b) Both a or b c) # include "name of the header file" d) None of these 91 / 100 91) A set of rules that must be followed to develop a program is called: a) Bug b) Syntax c) Preprocessor d) Debug 92 / 100 92) The programmer usually enters source code into a computer using a) Linker b) Text editor c) Debugger d) Compiler 93 / 100 93) Another name for antivirus is: a) DES b) Logic Bomb c) Vaccine d) Trojan horse 94 / 100 94) A statement that starts with a # is called a: a) Keyword b) Comment c) Preprocessor directive d) None 95 / 100 95) A spelling error (e.g. typing intt instead of int) is an example of: a) Logic error b) Run-time error c) None d) Syntax error 96 / 100 96) A set of illegal instructions inserted into a legitimate computer program is called: a) Bomb b) Trapdoor c) Worm d) Trojan horse 97 / 100 97) The secrets word or number used for protection is called: a) Passwords b) Biometric data c) Private words d) Backup 98 / 100 98) Which of the following key is used to compile a program a) CTRL+F9 b) CTRL+S c) ALT+F9 d) ALT+F5 99 / 100 99) The statements written by the programmer are called: a) Source code b) None c) Syntax d) Object code 100 / 100 100) The extension of an executable file is: a) .xls b) .doc c) .ext d) .exe Your score is LinkedIn Facebook Twitter VKontakte Post Views: 454 Post navigation Aiou Workshop 5403| Test 5 Aiou Workshop 5403| Full Test