/100 108 Aiou Workshop 5403| Test 6 1 / 100 1) A statement that starts with a # is called a: a) Comment b) Preprocessor directive c) Keyword d) None 2 / 100 2) Software that is available free for a limited period is called: a) Shareware b) Freeware c) Groupware d) vertical 3 / 100 3) The lowest level of programming language is: a) Java b) Pascal c) None d) Assembly Language 4 / 100 4) An additional or spare copy of data stored on storage media is call: a) Backup of data b) Copying of Data c) Additional data d) Moving of Data 5 / 100 5) An IDE typically consists of: a) All b) Compiler c) Debugger d) Text editor 6 / 100 6) Making illegal copies of copyrighted software is called: a) Software distribution b) Software hacking c) Software piracy d) Software Browsing 7 / 100 7) stdio.h is part of: a) C standard library b) Compiler c) Comment section d) main function 8 / 100 8) The extension of the header file is: a) .c b) .h c) .CPP d) .txt 9 / 100 9) Which of the following key is used to save a file? a) F2 b) F5 c) F3 d) F9 10 / 100 10) Which of the following is NOT an example of a program bug? a) Run-time error b) Logic error c) Syntax error d) Operator error 11 / 100 11) void occupy how many bytes in memory? a) 3 b) 0 c) 1 d) 2 12 / 100 12) Choose the program that translates and executes one line of source code at a time. a) Assembler b) interpreter c) None d) compiler 13 / 100 13) main is a a) Expression b) Compiler directive c) Comment d) Function 14 / 100 14) Security protection for personal computers includes: a) Internal components b) All of these c) Locks and cables d) Software 15 / 100 15) Which of the following is harmful for computers? a) Virus b) Shareware c) Freeware d) Antivirus 16 / 100 16) FormatC is an example of: a) Chernobal b) Boot sector c) Trojan horse d) Logic Bomb 17 / 100 17) Which of the following is the most damaging loss to a company? a) Loss of data b) Loss of hardware c) Loss of printouts d) Loss of software 18 / 100 18) Who developed C? a) Dennis Ritchie b) Al- Khuwarizmi c) Charles Babbage d) Von-Neumann 19 / 100 19) Which of the following language requires no translator to execute the program? a) Machine language b) C c) Assembly language d) C++ 20 / 100 20) A program’s syntax errors is detected by: a) Debugger b) Loader c) Compiler d) Linker 21 / 100 21) Types of translators are: a) None b) Assemblers c) All d) Compilers 22 / 100 22) which of the following header file contains information about common mathematical functions? a) stdio.h b) conio.h c) math.h d) None 23 / 100 23) Which of the following is a compiler directive? a) #include b) Using namespace std; c) All d) main ( ) 24 / 100 24) The statements written by the programmer are called: a) Object code b) None c) Syntax d) Source code 25 / 100 25) Which of the following is the native language of computer? a) DOS b) Pascal c) None d) Machine language 26 / 100 26) Another name for antivirus is: a) Logic Bomb b) DES c) Trojan horse d) Vaccine 27 / 100 27) Processor directives are command for a) Loader b) Language Processor c) C preprocessor d) Microprocessor 28 / 100 28) The right to use the software on the computer is called: a) Software piracy b) Software copyright c) Intellectual property right d) Site License 29 / 100 29) Compiled programs typically, execute faster because: a) None of the above b) Compiled programs are already in a machine-readable form. c) Compiled programs do not require any data d) Compiled programs are read and executed a line at a time 30 / 100 30) Which of the following symbol is used to denote a pre-processor statement? a) # b) @ c) % d) $ 31 / 100 31) A person who gains illegal access to a computer system is called: a) Computer operator b) Hacker c) Network controller d) Authorized person 32 / 100 32) McAfee is an example of: a) Hacker b) Worm c) Antivirus d) Virus 33 / 100 33) C was developed in the year:1972 a) 1970 b) 1971 c) 1972 d) 1973 34 / 100 34) which Program that translates assembly language code to machine code a) Assembler b) Translator c) Converter d) Debugger 35 / 100 35) which of the following language Is ideal to write business application a) PASCAL b) BASIC c) COBOL d) None 36 / 100 36) A spelling error (e.g. typing intt instead of int) is an example of: a) None b) Syntax error c) Run-time error d) Logic error 37 / 100 37) The right of a person to keep his personal information away from others is called: a) Private b) Secrecy c) Right d) Privacy 38 / 100 38) Biometric data a) Combination of letters, numbers and symbols b) Name of a partner or spouse c) Name of a partner or spouse d) Word related to a job or hobby 39 / 100 39) How a virus reaches from one computer to another? a) Exchange of printer b) Exchange of keyboard c) Data is exchanged between computers d) Exchange of display screen 40 / 100 40) The name of header file is written between: a) <> b) ( ) c) {} 41 / 100 41) An IDE stands for: a) Input data error b) Internal disk error c) Integrated Development Environment d) Input Desktop environment 42 / 100 42) C is a: a) Low-level language b) Machine Language c) Assembly language d) High level language 43 / 100 43) Computer virus is simply a: a) Hardware component b) A disease c) Type of bacteria d) Set of computer instructions or code 44 / 100 44) The process of identifying and removing errors in the programs is called: a) Executing b) debugging c) None d) Processing 45 / 100 45) Which of the following one is not a virus? a) Reflof b) Logic Bomb c) Trojan Horse d) MCAfee 46 / 100 46) A type of error that occurs when an instruction violates the rules programs is called: a) None b) Runtime error c) Syntax error d) Program error 47 / 100 47) Trojan Horse is a type of: a) Antivirus b) Virus c) Horse d) Software 48 / 100 48) The output of the compiler is called: a) Source code b) Library code c) Linked code d) Object code 49 / 100 49) conio stands for: a) Character input output b) Console input output c) Complex input output d) Common input output 50 / 100 50) The process of linking library files with object cod is known as: a) Saving b) Executing c) Linking d) Compiler 51 / 100 51) Another name for free software is: a) Copy protected software b) Shareware c) Encrypted software d) Public domain software 52 / 100 52) Which of the following is not an antivirus program? a) Norton b) Redlof c) McAfee d) Avast 53 / 100 53) The [ascetic] militant Chinese have gone straight to the roots of the problems. a) trained b) professional c) secular d) religious 54 / 100 54) For every opening brace in a C program, there must be a: a) Comma b) None c) Closing brace d) Colon 55 / 100 55) A virus that replicates itself is called: a) Vaccine b) Bomb c) Bug d) Worm 56 / 100 56) An assembly language uses: a) Mnemonic Codes b) Binary Digit c) None d) English Words 57 / 100 57) The expression may be: a) arithmetic expression b) All c) string d) Constant 58 / 100 58) which of the following header a) math.h b) stdio.h c) conio.h d) None 59 / 100 59) The extension of C source program is: a) .c b) .exe c) .obj d) .h 60 / 100 60) The extension of an executable file is: a) .doc b) .exe c) .ext d) .xls 61 / 100 61) Which of the following is a biometric technique for person identification? a) PIN b) Password c) Fingerprint d) Access card 62 / 100 62) C programs are divided into units called: a) Section b) Functions c) debug d) Syntax 63 / 100 63) Division by zero (e.g. 2/ 0) is an example a) Run-time error b) Run-time error c) None d) Logic error 64 / 100 64) A special program that can detect and remove viruses from computer is called: a) Custom b) Groupware c) Virus d) Anti-Virus 65 / 100 65) The virus which deletes MS Office files and disk partition information is called: a) Book sector b) Trojan horse c) Chernobyl d) Logic Bomb 66 / 100 66) Which of the following key is used to compile a program a) CTRL+F9 b) ALT+F5 c) CTRL+S d) ALT+F9 67 / 100 67) stdio stands for: a) Standard input output b) String input-output c) Symbolic input output d) Simple input output 68 / 100 68) Which of the following is NOT a high level language? a) FORTRAN b) BASIC c) Assembly language d) None 69 / 100 69) Which of the following errors are NOT detected by compiler? a) Logical error b) Both a and b c) Syntax error d) None 70 / 100 70) Machine language: a) All of these b) None c) is the language in which programs were first written. d) is the only language understood by the computer. 71 / 100 71) Which of the following key is used to load a program it memory to run? a) ALT+F5 b) CTRL+F9 c) ALT+F9 d) CTRL+S 72 / 100 72) What does the following code print on screen? printf(‘hello’); a) Hello b) None c) hello d) HELLO 73 / 100 73) A type of language in which instructions are written in binary form is called: a) None b) Assembly language c) High level language d) Machine language 74 / 100 74) C was designed to write program for: a) Windows operating system b) OS/2 operating system c) Unix operating system d) Solaris operating system 75 / 100 75) A program that interferes with the normal working of a computer is called: a) Bateria b) Freeware c) Virus d) Antivirus 76 / 100 76) Which of the following media can be used for backup? a) Floppy Diskette b) All c) Tape Device d) Zip Disk 77 / 100 77) which one of the following translates source code to object code as a whole a) Assembler b) Interpreter c) None d) Compiler 78 / 100 78) Computer programs are also known ac a) Software b) None c) Firmware d) Hardware 79 / 100 79) This is a complete instruction that causes the computer to perform some action: a) Statement b) None c) Keyword d) Line 80 / 100 80) computer programs are also known as: a) Software b) Hardware c) None d) Procedure 81 / 100 81) Debug is the process of: a) Removing Errors b) Identifying and removing errors c) Identifying Errors d) Creating bugs in program 82 / 100 82) The restricted access to the server computer room is a form of: a) Enterprise security b) Logical security c) User security d) Physical security 83 / 100 83) The secrets word or number used for protection is called: a) Biometric data b) Passwords c) Backup d) Private words 84 / 100 84) A well-defined set of instructions given to the computer is called: a) Hardware b) Bug c) None d) Software 85 / 100 85) The programmer usually enters source code into a computer using a) Debugger b) Linker c) Text editor d) Compiler 86 / 100 86) Mistakes that cause a running program to produce incorrect results are called: a) None b) Syntax error c) Program error d) Logic error 87 / 100 87) A set of illegal instructions inserted into a legitimate computer program is called: a) Worm b) Trojan horse c) Bomb d) Trapdoor 88 / 100 88) Which of the following reason causes the syntax error a) using a variable without declaration b) Missing any of the delimiters c) Missing statement terminator d) All 89 / 100 89) Which of the following viruses executes when starting the computer? a) Macro b) File infector c) Salami shaving d) Boot sector 90 / 100 90) A set of rules that must be followed to develop a program is called: a) Syntax b) Debug c) Bug d) Preprocessor 91 / 100 91) Which of the following language provided the basis for the development C a) Java b) B c) C++ d) Pascal 92 / 100 92) Which malicious program is activated when a specific set of conditions are met? a) Logic bomb b) Worm c) Trojan horse d) Virus 93 / 100 93) C statements end with a: a) None b) Period c) semicolon d) semicolon 94 / 100 94) Writing programs in machine language is: a) Less time-consuming b) None c) Both a and c d) Less tedious 95 / 100 95) Which of the following syntax is used to include header file? a) None of these b) # include "name of the header file" c) #include d) Both a or b 96 / 100 96) Which of the following is not a biometric technique: a) Palm print b) Face c) Retina d) Badge 97 / 100 97) The extension of object file is: a) .c b) .h c) .obj d) .exe 98 / 100 98) Protecting computers and the information they contain against unwanted access is called: a) Electronic policing b) Computer security c) Computer monitoring d) Audit control 99 / 100 99) B was developed in the year: a) 1972-1988 b) 1992-1996 c) 1969-70 d) 1965-1975 100 / 100 100) Which of the following components is used to convert first.c to first.exe? a) header & linker b) compiler & linker c) compiler & header d) None Your score is LinkedIn Facebook Twitter VKontakte Post Views: 210 Post navigation Aiou Workshop 5403| Test 5 Aiou Workshop 5403| Full Test
HabibaMansoor
User ID: 0000509558
City: MZD
That is so good amazing