Spread the love/100 108 Aiou Workshop 5403| Test 6 1 / 100 1) Which file contains the program after translation into machine language a) Object file b) Source file c) exe file d) None 2 / 100 2) The right of a person to keep his personal information away from others is called: a) Secrecy b) Right c) Private d) Privacy 3 / 100 3) Computer virus is simply a: a) Type of bacteria b) Hardware component c) Set of computer instructions or code d) A disease 4 / 100 4) A virus that replicates itself is called: a) Bug b) Worm c) Vaccine d) Bomb 5 / 100 5) What does the # sign indicate in an instruction of C language? a) None b) Instruction for linker c) Instruction for user d) Instruction for compiler 6 / 100 6) A type of error that occurs when an instruction violates the rules programs is called: a) None b) Runtime error c) Syntax error d) Program error 7 / 100 7) Which of the following language provided the basis for the development C a) Pascal b) Java c) C++ d) B 8 / 100 8) The processing of running an executable file is known as a) Compiling b) executing c) Debugging d) Saving 9 / 100 9) main is a a) Expression b) Comment c) Function d) Compiler directive 10 / 100 10) Which of the following symbol is used to denote a pre-processor statement? a) @ b) $ c) % d) # 11 / 100 11) C was designed to write program for: a) Unix operating system b) Windows operating system c) OS/2 operating system d) Solaris operating system 12 / 100 12) For every opening brace in a C program, there must be a: a) None b) Comma c) Closing brace d) Colon 13 / 100 13) Which of the following is not cause of virus? a) Pirated software b) Networks c) Logic bomb d) E-mail 14 / 100 14) void occupy how many bytes in memory? a) 0 b) 1 c) 2 d) 3 15 / 100 15) The extension of C source program is: a) .h b) .obj c) .exe d) .c 16 / 100 16) Mistakes that cause a running program to produce incorrect results are called: a) Program error b) Syntax error c) Logic error d) None 17 / 100 17) computer programs are also known as: a) Procedure b) Hardware c) Software d) None 18 / 100 18) Which of the following is not a biometric technique: a) Badge b) Face c) Palm print d) Retina 19 / 100 19) Machine language: a) All of these b) None c) is the only language understood by the computer. d) is the language in which programs were first written. 20 / 100 20) A program’s syntax errors is detected by: a) Compiler b) Linker c) Debugger d) Loader 21 / 100 21) which Program that translates assembly language code to machine code a) Debugger b) Translator c) Converter d) Assembler 22 / 100 22) The lowest level of programming language is: a) Assembly Language b) None c) Pascal d) Java 23 / 100 23) Which of the following language requires no translator to execute the program? a) Machine language b) C++ c) C d) Assembly language 24 / 100 24) This is a complete instruction that causes the computer to perform some action: a) None b) Line c) Keyword d) Statement 25 / 100 25) Debug is the process of: a) Identifying Errors b) Removing Errors c) Identifying and removing errors d) Creating bugs in program 26 / 100 26) Which of the following does not contain machine language code? a) None b) Library module c) Source module d) Object module 27 / 100 27) Which of the following one is not a virus? a) Trojan Horse b) MCAfee c) Logic Bomb d) Reflof 28 / 100 28) The name of header file is written between: a) {} b) <> c) ( ) 29 / 100 29) Which of the following syntax is used to include header file? a) Both a or b b) # include "name of the header file" c) #include d) None of these 30 / 100 30) The “.exe” file is produced by:. a) Loader b) Compiler c) interpreter d) linker 31 / 100 31) Which of the following is an authentication methodology? a) Access cards b) PIN c) Piracy d) Biometrics 32 / 100 32) A well-defined set of instructions given to the computer is called: a) Bug b) Hardware c) None d) Software 33 / 100 33) Types of translators are: a) None b) All c) Assemblers d) Compilers 34 / 100 34) The [ascetic] militant Chinese have gone straight to the roots of the problems. a) secular b) professional c) trained d) religious 35 / 100 35) What does the following code print on screen? printf(‘hello’); a) Hello b) hello c) None d) HELLO 36 / 100 36) A spelling error (e.g. typing intt instead of int) is an example of: a) Logic error b) Run-time error c) Syntax error d) None 37 / 100 37) A program that interferes with the normal working of a computer is called: a) Virus b) Bateria c) Freeware d) Antivirus 38 / 100 38) Protecting computers and the information they contain against unwanted access is called: a) Computer monitoring b) Audit control c) Computer security d) Electronic policing 39 / 100 39) The process of identifying and removing errors in the programs is called: a) None b) debugging c) Executing d) Processing 40 / 100 40) Choose the program that translates and executes one line of source code at a time. a) None b) Assembler c) compiler d) interpreter 41 / 100 41) Division by zero (e.g. 2/ 0) is an example a) Run-time error b) None c) Run-time error d) Logic error 42 / 100 42) The restricted access to the server computer room is a form of: a) Enterprise security b) Physical security c) Logical security d) User security 43 / 100 43) The extension of the header file is: a) .CPP b) .c c) .txt d) .h 44 / 100 44) Which of the following is computer virus? a) All of these b) Chernobyl c) Reflof d) Logic Bomb 45 / 100 45) A person who gains illegal access to a computer system is called: a) Network controller b) Hacker c) Computer operator d) Authorized person 46 / 100 46) The right to use the software on the computer is called: a) Site License b) Intellectual property right c) Software copyright d) Software piracy 47 / 100 47) Making illegal copies of copyrighted software is called: a) Software hacking b) Software piracy c) Software Browsing d) Software distribution 48 / 100 48) Which of the following key is used to compile a program a) CTRL+S b) ALT+F9 c) ALT+F5 d) CTRL+F9 49 / 100 49) The extension of an executable file is: a) .ext b) .xls c) .exe d) .doc 50 / 100 50) An assembly language uses: a) English Words b) None c) Mnemonic Codes d) Binary Digit 51 / 100 51) The programmer usually enters source code into a computer using a) Compiler b) Debugger c) Text editor d) Linker 52 / 100 52) which of the following language Is ideal to write business application a) None b) COBOL c) BASIC d) PASCAL 53 / 100 53) Which of the following components is used to convert first.c to first.exe? a) compiler & linker b) None c) compiler & header d) header & linker 54 / 100 54) Who developed C? a) Dennis Ritchie b) Charles Babbage c) Al- Khuwarizmi d) Von-Neumann 55 / 100 55) stdio.h is part of: a) main function b) Comment section c) C standard library d) Compiler 56 / 100 56) The expression in define directive: a) Can only be changed at the end of the program b) Cannot be assigned a value c) Can not be changed but can be redefined d) Cannot be changed 57 / 100 57) C is a: a) High level language b) Assembly language c) Low-level language d) Machine Language 58 / 100 58) Header files in C contain: a) Compiler commands b) Header information of C programs c) Library functions d) Operators for files 59 / 100 59) Processor directives are command for a) C preprocessor b) Microprocessor c) Loader d) Language Processor 60 / 100 60) The basic structure of C program consists of: a) Preprocessor Directive b) main() function c) Program body d) All 61 / 100 61) The secrets word or number used for protection is called: a) Private words b) Biometric data c) Backup d) Passwords 62 / 100 62) C programs are divided into units called: a) Syntax b) Functions c) Section d) debug 63 / 100 63) Turbo C++ can compile a) Turbo C Programs only b) C and C++ programs c) Turbo C++ Programs only d) C programs only 64 / 100 64) A type of language in which instructions are written in binary form is called: a) Assembly language b) None c) Machine language d) High level language 65 / 100 65) Which of the following media can be used for backup? a) Floppy Diskette b) Tape Device c) All d) Zip Disk 66 / 100 66) Which of the following key is used to load a program it memory to run? a) ALT+F5 b) ALT+F9 c) CTRL+S d) CTRL+F9 67 / 100 67) Which of the following is the most damaging loss to a company? a) Loss of hardware b) Loss of printouts c) Loss of data d) Loss of software 68 / 100 68) which header file contains information about standard input/ output functions? a) math.h b) stdio.h c) Both a and b d) None 69 / 100 69) Biometric data a) Name of a partner or spouse b) Name of a partner or spouse c) Combination of letters, numbers and symbols d) Word related to a job or hobby 70 / 100 70) Compiled programs typically, execute faster because: a) None of the above b) Compiled programs are already in a machine-readable form. c) Compiled programs do not require any data d) Compiled programs are read and executed a line at a time 71 / 100 71) which of the following header file contains information about common mathematical functions? a) stdio.h b) conio.h c) None d) math.h 72 / 100 72) Trojan Horse is a type of: a) Virus b) Software c) Horse d) Antivirus 73 / 100 73) stdio stands for: a) Symbolic input output b) String input-output c) Standard input output d) Simple input output 74 / 100 74) The output of the compiler is called: a) Object code b) Linked code c) Source code d) Library code 75 / 100 75) Which of the following is NOT a high level language? a) Assembly language b) FORTRAN c) None d) BASIC 76 / 100 76) Which of the following is not an antivirus program? a) McAfee b) Redlof c) Norton d) Avast 77 / 100 77) An IDE typically consists of: a) Debugger b) Compiler c) All d) Text editor 78 / 100 78) An additional or spare copy of data stored on storage media is call: a) Backup of data b) Copying of Data c) Additional data d) Moving of Data 79 / 100 79) The process of linking library files with object cod is known as: a) Compiler b) Executing c) Linking d) Saving 80 / 100 80) C was developed in the year:1972 a) 1973 b) 1970 c) 1972 d) 1971 81 / 100 81) Which of the following is a biometric technique for person identification? a) Access card b) Password c) Fingerprint d) PIN 82 / 100 82) Which of the following is NOT an example of a program bug? a) Logic error b) Syntax error c) Operator error d) Run-time error 83 / 100 83) Another name for free software is: a) Encrypted software b) Public domain software c) Shareware d) Copy protected software 84 / 100 84) C statements end with a: a) semicolon b) None c) Period d) semicolon 85 / 100 85) Computer programs are also known ac a) None b) Hardware c) Software d) Firmware 86 / 100 86) McAfee is an example of: a) Virus b) Antivirus c) Hacker d) Worm 87 / 100 87) conio stands for: a) Common input output b) Console input output c) Complex input output d) Character input output 88 / 100 88) A special program that can detect and remove viruses from computer is called: a) Custom b) Virus c) Anti-Virus d) Groupware 89 / 100 89) B was developed in the year: a) 1965-1975 b) 1972-1988 c) 1992-1996 d) 1969-70 90 / 100 90) Which term is commonly used to refer to software or program errors: a) Bug b) Short circuit c) Down d) Crash 91 / 100 91) which one of the following translates source code to object code as a whole a) None b) Compiler c) Interpreter d) Assembler 92 / 100 92) Which of the following reason causes the syntax error a) All b) Missing statement terminator c) Missing any of the delimiters d) using a variable without declaration 93 / 100 93) The extension of object file is: a) .h b) .c c) .exe d) .obj 94 / 100 94) Which of the following is harmful for computers? a) Shareware b) Antivirus c) Freeware d) Virus 95 / 100 95) The statements written by the programmer are called: a) Source code b) Object code c) Syntax d) None 96 / 100 96) Which of the following is the native language of computer? a) Machine language b) Pascal c) None d) DOS 97 / 100 97) The expression may be: a) arithmetic expression b) string c) All d) Constant 98 / 100 98) Which of the following is a compiler directive? a) Using namespace std; b) #include c) main ( ) d) All 99 / 100 99) Software that is available free for a limited period is called: a) Freeware b) vertical c) Groupware d) Shareware 100 / 100 100) FormatC is an example of: a) Boot sector b) Logic Bomb c) Chernobal d) Trojan horse Your score is LinkedIn Facebook Twitter VKontakte Post Views: 600 Post navigation Aiou Workshop 5403| Test 5 Aiou Workshop 5403| Full Test