Spread the love/100 108 Aiou Workshop 5403| Test 6 1 / 100 1) B was developed in the year: a) 1965-1975 b) 1972-1988 c) 1969-70 d) 1992-1996 2 / 100 2) A type of error that occurs when an instruction violates the rules programs is called: a) Syntax error b) Runtime error c) Program error d) None 3 / 100 3) Which of the following components is used to convert first.c to first.exe? a) header & linker b) compiler & header c) None d) compiler & linker 4 / 100 4) Compiled programs typically, execute faster because: a) None of the above b) Compiled programs do not require any data c) Compiled programs are already in a machine-readable form. d) Compiled programs are read and executed a line at a time 5 / 100 5) A program’s syntax errors is detected by: a) Linker b) Compiler c) Loader d) Debugger 6 / 100 6) Which of the following viruses executes when starting the computer? a) Boot sector b) Salami shaving c) File infector d) Macro 7 / 100 7) Who is responsible of security of online data? a) LAN Administrator b) Internet Service provider c) User d) Organization obtaining the data 8 / 100 8) The extension of an executable file is: a) .doc b) .exe c) .ext d) .xls 9 / 100 9) A type of language in which instructions are written in binary form is called: a) Machine language b) Assembly language c) High level language d) None 10 / 100 10) How a virus reaches from one computer to another? a) Exchange of printer b) Exchange of display screen c) Data is exchanged between computers d) Exchange of keyboard 11 / 100 11) This is a complete instruction that causes the computer to perform some action: a) Line b) Keyword c) None d) Statement 12 / 100 12) computer programs are also known as: a) Hardware b) Software c) Procedure d) None 13 / 100 13) The expression may be: a) string b) Constant c) arithmetic expression d) All 14 / 100 14) C statements end with a: a) semicolon b) semicolon c) None d) Period 15 / 100 15) Software that is available free for a limited period is called: a) vertical b) Shareware c) Freeware d) Groupware 16 / 100 16) Mistakes that cause a running program to produce incorrect results are called: a) Program error b) Logic error c) None d) Syntax error 17 / 100 17) Which of the following language provided the basis for the development C a) Pascal b) C++ c) Java d) B 18 / 100 18) Debug is the process of: a) Identifying and removing errors b) Creating bugs in program c) Identifying Errors d) Removing Errors 19 / 100 19) The right to use the software on the computer is called: a) Intellectual property right b) Site License c) Software piracy d) Software copyright 20 / 100 20) The process of converting source code into object code,is knows as: a) Compiling b) Linking c) Executing d) Saving 21 / 100 21) Which of the following media can be used for backup? a) Floppy Diskette b) All c) Zip Disk d) Tape Device 22 / 100 22) Which of the following is NOT a high level language? a) FORTRAN b) None c) BASIC d) Assembly language 23 / 100 23) Which of the following is the native language of computer? a) None b) Machine language c) Pascal d) DOS 24 / 100 24) A statement that starts with a # is called a: a) None b) Comment c) Preprocessor directive d) Keyword 25 / 100 25) Turbo C++ can compile a) Turbo C Programs only b) C and C++ programs c) C programs only d) Turbo C++ Programs only 26 / 100 26) C is a: a) High level language b) Machine Language c) Assembly language d) Low-level language 27 / 100 27) Types of translators are: a) All b) Compilers c) Assemblers d) None 28 / 100 28) which of the following language Is ideal to write business application a) None b) PASCAL c) COBOL d) BASIC 29 / 100 29) void occupy how many bytes in memory? a) 0 b) 1 c) 3 d) 2 30 / 100 30) which of the following header a) stdio.h b) conio.h c) None d) math.h 31 / 100 31) A special program that can detect and remove viruses from computer is called: a) Virus b) Groupware c) Anti-Virus d) Custom 32 / 100 32) Which of the following does not contain machine language code? a) Library module b) Source module c) Object module d) None 33 / 100 33) Which of the following is a biometric technique for person identification? a) PIN b) Access card c) Fingerprint d) Password 34 / 100 34) which Program that translates assembly language code to machine code a) Assembler b) Converter c) Translator d) Debugger 35 / 100 35) Who developed C? a) Charles Babbage b) Dennis Ritchie c) Al- Khuwarizmi d) Von-Neumann 36 / 100 36) An IDE typically consists of: a) All b) Text editor c) Compiler d) Debugger 37 / 100 37) C programs are divided into units called: a) Section b) Functions c) Syntax d) debug 38 / 100 38) The “.exe” file is produced by:. a) Loader b) linker c) Compiler d) interpreter 39 / 100 39) What does the # sign indicate in an instruction of C language? a) None b) Instruction for linker c) Instruction for user d) Instruction for compiler 40 / 100 40) The extension of C source program is: a) .obj b) .c c) .h d) .exe 41 / 100 41) Which of the following is a compiler directive? a) main ( ) b) Using namespace std; c) All d) #include 42 / 100 42) An IDE stands for: a) Input data error b) Integrated Development Environment c) Internal disk error d) Input Desktop environment 43 / 100 43) Another name for antivirus is: a) DES b) Logic Bomb c) Vaccine d) Trojan horse 44 / 100 44) FormatC is an example of: a) Chernobal b) Logic Bomb c) Trojan horse d) Boot sector 45 / 100 45) The process of identifying and removing errors in the programs is called: a) Executing b) None c) Processing d) debugging 46 / 100 46) Which of the following symbol is used to denote a pre-processor statement? a) $ b) % c) @ d) # 47 / 100 47) The process of linking library files with object cod is known as: a) Compiler b) Saving c) Linking d) Executing 48 / 100 48) The output of the compiler is called: a) Library code b) Object code c) Source code d) Linked code 49 / 100 49) The processing of running an executable file is known as a) Debugging b) executing c) Compiling d) Saving 50 / 100 50) A spelling error (e.g. typing intt instead of int) is an example of: a) Syntax error b) Run-time error c) Logic error d) None 51 / 100 51) An assembly language uses: a) English Words b) None c) Binary Digit d) Mnemonic Codes 52 / 100 52) stdio.h is part of: a) main function b) Compiler c) Comment section d) C standard library 53 / 100 53) McAfee is an example of: a) Worm b) Virus c) Hacker d) Antivirus 54 / 100 54) Which of the following is not cause of virus? a) E-mail b) Pirated software c) Logic bomb d) Networks 55 / 100 55) The virus which deletes MS Office files and disk partition information is called: a) Book sector b) Trojan horse c) Chernobyl d) Logic Bomb 56 / 100 56) C was developed in the year:1972 a) 1971 b) 1972 c) 1970 d) 1973 57 / 100 57) For every opening brace in a C program, there must be a: a) None b) Comma c) Closing brace d) Colon 58 / 100 58) Which of the following key is used to save a file? a) F3 b) F2 c) F9 d) F5 59 / 100 59) A program that interferes with the normal working of a computer is called: a) Bateria b) Antivirus c) Virus d) Freeware 60 / 100 60) Which of the following key is used to compile a program a) ALT+F5 b) CTRL+F9 c) CTRL+S d) ALT+F9 61 / 100 61) Which file contains the program after translation into machine language a) exe file b) Object file c) None d) Source file 62 / 100 62) The statements written by the programmer are called: a) Syntax b) None c) Object code d) Source code 63 / 100 63) Computer virus is simply a: a) Hardware component b) Set of computer instructions or code c) A disease d) Type of bacteria 64 / 100 64) which of the following header file contains information about common mathematical functions? a) conio.h b) stdio.h c) math.h d) None 65 / 100 65) Choose the program that translates and executes one line of source code at a time. a) compiler b) Assembler c) None d) interpreter 66 / 100 66) Which of the following errors are NOT detected by compiler? a) Syntax error b) None c) Both a and b d) Logical error 67 / 100 67) Division by zero (e.g. 2/ 0) is an example a) None b) Run-time error c) Run-time error d) Logic error 68 / 100 68) Which of the following syntax is used to include header file? a) #include b) None of these c) # include "name of the header file" d) Both a or b 69 / 100 69) Header files in C contain: a) Header information of C programs b) Compiler commands c) Operators for files d) Library functions 70 / 100 70) Security protection for personal computers includes: a) Locks and cables b) Internal components c) All of these d) Software 71 / 100 71) The basic structure of C program consists of: a) All b) Preprocessor Directive c) Program body d) main() function 72 / 100 72) The programmer usually enters source code into a computer using a) Linker b) Text editor c) Debugger d) Compiler 73 / 100 73) A set of illegal instructions inserted into a legitimate computer program is called: a) Trapdoor b) Bomb c) Worm d) Trojan horse 74 / 100 74) A well-defined set of instructions given to the computer is called: a) Software b) Bug c) None d) Hardware 75 / 100 75) The extension of object file is: a) .exe b) .h c) .c d) .obj 76 / 100 76) Trojan Horse is a type of: a) Software b) Antivirus c) Virus d) Horse 77 / 100 77) Machine language: a) is the language in which programs were first written. b) is the only language understood by the computer. c) None d) All of these 78 / 100 78) Most computer crime are committed by: a) Computer operators b) International spies c) Highly paid computer consultant d) Hackers 79 / 100 79) The expression in define directive: a) Cannot be assigned a value b) Can only be changed at the end of the program c) Cannot be changed d) Can not be changed but can be redefined 80 / 100 80) Which of the following is an authentication methodology? a) Access cards b) Biometrics c) PIN d) Piracy 81 / 100 81) What does the following code print on screen? printf(‘hello’); a) Hello b) HELLO c) None d) hello 82 / 100 82) Processor directives are command for a) Language Processor b) C preprocessor c) Microprocessor d) Loader 83 / 100 83) Which of the following is the most damaging loss to a company? a) Loss of printouts b) Loss of software c) Loss of data d) Loss of hardware 84 / 100 84) stdio stands for: a) String input-output b) Simple input output c) Standard input output d) Symbolic input output 85 / 100 85) Which of the following one is not a virus? a) Reflof b) MCAfee c) Trojan Horse d) Logic Bomb 86 / 100 86) Which of the following is computer virus? a) All of these b) Reflof c) Logic Bomb d) Chernobyl 87 / 100 87) The secrets word or number used for protection is called: a) Passwords b) Backup c) Private words d) Biometric data 88 / 100 88) The extension of the header file is: a) .h b) .CPP c) .txt d) .c 89 / 100 89) Which of the following is not an antivirus program? a) Norton b) Redlof c) McAfee d) Avast 90 / 100 90) Which malicious program is activated when a specific set of conditions are met? a) Worm b) Logic bomb c) Virus d) Trojan horse 91 / 100 91) Which of the following is not a biometric technique: a) Palm print b) Face c) Retina d) Badge 92 / 100 92) Computer programs are also known ac a) None b) Software c) Firmware d) Hardware 93 / 100 93) which header file contains information about standard input/ output functions? a) None b) Both a and b c) stdio.h d) math.h 94 / 100 94) Biometric data a) Word related to a job or hobby b) Name of a partner or spouse c) Combination of letters, numbers and symbols d) Name of a partner or spouse 95 / 100 95) C was designed to write program for: a) Solaris operating system b) OS/2 operating system c) Windows operating system d) Unix operating system 96 / 100 96) A virus that replicates itself is called: a) Bomb b) Vaccine c) Bug d) Worm 97 / 100 97) Which of the following key is used to load a program it memory to run? a) ALT+F9 b) ALT+F5 c) CTRL+S d) CTRL+F9 98 / 100 98) Making illegal copies of copyrighted software is called: a) Software hacking b) Software distribution c) Software Browsing d) Software piracy 99 / 100 99) Which of the following is NOT an example of a program bug? a) Operator error b) Syntax error c) Run-time error d) Logic error 100 / 100 100) Protecting computers and the information they contain against unwanted access is called: a) Electronic policing b) Audit control c) Computer monitoring d) Computer security Your score is LinkedIn Facebook Twitter VKontakte Post Views: 354 Post navigation Aiou Workshop 5403| Test 5 Aiou Workshop 5403| Full Test