/100 0 Aiou Workshop 5403| Test 6 1 / 100 1) Which of the following is the native language of computer? a) None b) Machine language c) Pascal d) DOS 2 / 100 2) Which of the following is not a biometric technique: a) Badge b) Retina c) Palm print d) Face 3 / 100 3) Computer programs are also known ac a) Hardware b) Firmware c) Software d) None 4 / 100 4) What does the following code print on screen? printf(‘hello’); a) None b) Hello c) HELLO d) hello 5 / 100 5) Who is responsible of security of online data? a) Organization obtaining the data b) LAN Administrator c) User d) Internet Service provider 6 / 100 6) void occupy how many bytes in memory? a) 0 b) 3 c) 1 d) 2 7 / 100 7) B was developed in the year: a) 1965-1975 b) 1992-1996 c) 1969-70 d) 1972-1988 8 / 100 8) Which of the following is the most damaging loss to a company? a) Loss of printouts b) Loss of hardware c) Loss of software d) Loss of data 9 / 100 9) Turbo C++ can compile a) Turbo C Programs only b) C and C++ programs c) C programs only d) Turbo C++ Programs only 10 / 100 10) Security protection for personal computers includes: a) Internal components b) All of these c) Locks and cables d) Software 11 / 100 11) Writing programs in machine language is: a) Less time-consuming b) None c) Both a and c d) Less tedious 12 / 100 12) The statements written by the programmer are called: a) Object code b) None c) Source code d) Syntax 13 / 100 13) Which of the following is a biometric technique for person identification? a) Fingerprint b) PIN c) Access card d) Password 14 / 100 14) The right to use the software on the computer is called: a) Intellectual property right b) Software piracy c) Site License d) Software copyright 15 / 100 15) The secrets word or number used for protection is called: a) Biometric data b) Private words c) Passwords d) Backup 16 / 100 16) Choose the program that translates and executes one line of source code at a time. a) None b) compiler c) Assembler d) interpreter 17 / 100 17) The lowest level of programming language is: a) Assembly Language b) None c) Java d) Pascal 18 / 100 18) Which of the following is not an antivirus program? a) Redlof b) Norton c) McAfee d) Avast 19 / 100 19) The process of linking library files with object cod is known as: a) Linking b) Executing c) Saving d) Compiler 20 / 100 20) which of the following header a) stdio.h b) math.h c) conio.h d) None 21 / 100 21) For every opening brace in a C program, there must be a: a) Colon b) None c) Closing brace d) Comma 22 / 100 22) Another name for free software is: a) Encrypted software b) Shareware c) Public domain software d) Copy protected software 23 / 100 23) How a virus reaches from one computer to another? a) Data is exchanged between computers b) Exchange of keyboard c) Exchange of display screen d) Exchange of printer 24 / 100 24) The programmer usually enters source code into a computer using a) Linker b) Compiler c) Debugger d) Text editor 25 / 100 25) computer programs are also known as: a) Software b) Hardware c) Procedure d) None 26 / 100 26) The restricted access to the server computer room is a form of: a) Logical security b) User security c) Physical security d) Enterprise security 27 / 100 27) Which term is commonly used to refer to software or program errors: a) Down b) Crash c) Bug d) Short circuit 28 / 100 28) main is a a) Function b) Comment c) Compiler directive d) Expression 29 / 100 29) Division by zero (e.g. 2/ 0) is an example a) None b) Run-time error c) Logic error d) Run-time error 30 / 100 30) A well-defined set of instructions given to the computer is called: a) Hardware b) Software c) None d) Bug 31 / 100 31) Which of the following reason causes the syntax error a) Missing any of the delimiters b) All c) using a variable without declaration d) Missing statement terminator 32 / 100 32) An additional or spare copy of data stored on storage media is call: a) Additional data b) Moving of Data c) Copying of Data d) Backup of data 33 / 100 33) C was designed to write program for: a) OS/2 operating system b) Unix operating system c) Windows operating system d) Solaris operating system 34 / 100 34) What does the # sign indicate in an instruction of C language? a) None b) Instruction for compiler c) Instruction for linker d) Instruction for user 35 / 100 35) Which of the following components is used to convert first.c to first.exe? a) compiler & linker b) compiler & header c) header & linker d) None 36 / 100 36) The extension of the header file is: a) .CPP b) .h c) .txt d) .c 37 / 100 37) stdio.h is part of: a) C standard library b) main function c) Compiler d) Comment section 38 / 100 38) Which of the following is NOT an example of a program bug? a) Syntax error b) Logic error c) Operator error d) Run-time error 39 / 100 39) which one of the following translates source code to object code as a whole a) Interpreter b) Compiler c) None d) Assembler 40 / 100 40) Another name for antivirus is: a) DES b) Vaccine c) Trojan horse d) Logic Bomb 41 / 100 41) The right of a person to keep his personal information away from others is called: a) Secrecy b) Right c) Private d) Privacy 42 / 100 42) Computer virus is simply a: a) Hardware component b) Set of computer instructions or code c) Type of bacteria d) A disease 43 / 100 43) Which of the following language requires no translator to execute the program? a) C b) Machine language c) Assembly language d) C++ 44 / 100 44) Who developed C? a) Charles Babbage b) Al- Khuwarizmi c) Dennis Ritchie d) Von-Neumann 45 / 100 45) Software that is available free for a limited period is called: a) vertical b) Groupware c) Freeware d) Shareware 46 / 100 46) A type of language in which instructions are written in binary form is called: a) Machine language b) None c) High level language d) Assembly language 47 / 100 47) The basic structure of C program consists of: a) All b) Preprocessor Directive c) main() function d) Program body 48 / 100 48) A person who gains illegal access to a computer system is called: a) Network controller b) Computer operator c) Authorized person d) Hacker 49 / 100 49) A special program that can detect and remove viruses from computer is called: a) Groupware b) Custom c) Virus d) Anti-Virus 50 / 100 50) Mistakes that cause a running program to produce incorrect results are called: a) None b) Syntax error c) Logic error d) Program error 51 / 100 51) Which of the following syntax is used to include header file? a) #include b) None of these c) # include "name of the header file" d) Both a or b 52 / 100 52) Which of the following errors are NOT detected by compiler? a) None b) Syntax error c) Logical error d) Both a and b 53 / 100 53) An assembly language uses: a) None b) Mnemonic Codes c) English Words d) Binary Digit 54 / 100 54) Debug is the process of: a) Identifying and removing errors b) Creating bugs in program c) Removing Errors d) Identifying Errors 55 / 100 55) Which of the following is harmful for computers? a) Shareware b) Antivirus c) Freeware d) Virus 56 / 100 56) stdio stands for: a) Standard input output b) Simple input output c) Symbolic input output d) String input-output 57 / 100 57) Which of the following key is used to save a file? a) F3 b) F2 c) F9 d) F5 58 / 100 58) which of the following language Is ideal to write business application a) BASIC b) PASCAL c) None d) COBOL 59 / 100 59) The name of header file is written between: a) ( ) b) {} c) <> 60 / 100 60) Which malicious program is activated when a specific set of conditions are met? a) Virus b) Trojan horse c) Worm d) Logic bomb 61 / 100 61) A program’s syntax errors is detected by: a) Compiler b) Loader c) Linker d) Debugger 62 / 100 62) Which of the following language provided the basis for the development C a) Java b) Pascal c) C++ d) B 63 / 100 63) The virus which deletes MS Office files and disk partition information is called: a) Book sector b) Trojan horse c) Logic Bomb d) Chernobyl 64 / 100 64) Which of the following key is used to load a program it memory to run? a) ALT+F9 b) CTRL+S c) ALT+F5 d) CTRL+F9 65 / 100 65) Which of the following is computer virus? a) Logic Bomb b) All of these c) Chernobyl d) Reflof 66 / 100 66) Which file contains the program after translation into machine language a) exe file b) Object file c) None d) Source file 67 / 100 67) The [ascetic] militant Chinese have gone straight to the roots of the problems. a) trained b) secular c) professional d) religious 68 / 100 68) Types of translators are: a) Assemblers b) Compilers c) All d) None 69 / 100 69) An IDE typically consists of: a) All b) Debugger c) Compiler d) Text editor 70 / 100 70) Making illegal copies of copyrighted software is called: a) Software piracy b) Software distribution c) Software Browsing d) Software hacking 71 / 100 71) Processor directives are command for a) Loader b) Language Processor c) Microprocessor d) C preprocessor 72 / 100 72) The output of the compiler is called: a) Object code b) Source code c) Library code d) Linked code 73 / 100 73) Header files in C contain: a) Operators for files b) Compiler commands c) Header information of C programs d) Library functions 74 / 100 74) C is a: a) Low-level language b) High level language c) Assembly language d) Machine Language 75 / 100 75) An IDE stands for: a) Internal disk error b) Input data error c) Input Desktop environment d) Integrated Development Environment 76 / 100 76) conio stands for: a) Character input output b) Complex input output c) Console input output d) Common input output 77 / 100 77) Which of the following is an authentication methodology? a) Piracy b) Access cards c) Biometrics d) PIN 78 / 100 78) A set of rules that must be followed to develop a program is called: a) Syntax b) Bug c) Debug d) Preprocessor 79 / 100 79) The extension of C source program is: a) .c b) .exe c) .h d) .obj 80 / 100 80) Most computer crime are committed by: a) Highly paid computer consultant b) Hackers c) International spies d) Computer operators 81 / 100 81) Compiled programs typically, execute faster because: a) None of the above b) Compiled programs do not require any data c) Compiled programs are already in a machine-readable form. d) Compiled programs are read and executed a line at a time 82 / 100 82) C programs are divided into units called: a) debug b) Syntax c) Functions d) Section 83 / 100 83) Which of the following does not contain machine language code? a) None b) Library module c) Object module d) Source module 84 / 100 84) Which of the following viruses executes when starting the computer? a) Salami shaving b) Boot sector c) Macro d) File infector 85 / 100 85) Which of the following is NOT a high level language? a) Assembly language b) None c) FORTRAN d) BASIC 86 / 100 86) A virus that replicates itself is called: a) Vaccine b) Bug c) Worm d) Bomb 87 / 100 87) The process of converting source code into object code,is knows as: a) Saving b) Linking c) Executing d) Compiling 88 / 100 88) The extension of object file is: a) .obj b) .h c) .c d) .exe 89 / 100 89) A statement that starts with a # is called a: a) Keyword b) None c) Preprocessor directive d) Comment 90 / 100 90) Which of the following media can be used for backup? a) Floppy Diskette b) All c) Tape Device d) Zip Disk 91 / 100 91) A type of error that occurs when an instruction violates the rules programs is called: a) Syntax error b) None c) Runtime error d) Program error 92 / 100 92) A spelling error (e.g. typing intt instead of int) is an example of: a) None b) Syntax error c) Run-time error d) Logic error 93 / 100 93) The expression in define directive: a) Can only be changed at the end of the program b) Can not be changed but can be redefined c) Cannot be changed d) Cannot be assigned a value 94 / 100 94) Which of the following one is not a virus? a) Trojan Horse b) Reflof c) Logic Bomb d) MCAfee 95 / 100 95) Which of the following symbol is used to denote a pre-processor statement? a) @ b) % c) # d) $ 96 / 100 96) McAfee is an example of: a) Virus b) Antivirus c) Hacker d) Worm 97 / 100 97) A set of illegal instructions inserted into a legitimate computer program is called: a) Worm b) Trojan horse c) Trapdoor d) Bomb 98 / 100 98) C statements end with a: a) semicolon b) None c) Period d) semicolon 99 / 100 99) FormatC is an example of: a) Boot sector b) Chernobal c) Logic Bomb d) Trojan horse 100 / 100 100) Machine language: a) None b) is the only language understood by the computer. c) is the language in which programs were first written. d) All of these Your score is LinkedIn Facebook Twitter VKontakte Post Views: 23 Post navigation Aiou Workshop 5403| Test 5 Aiou Workshop 5403| Full Test