Spread the love/100 108 Aiou Workshop 5403| Test 6 1 / 100 1) void occupy how many bytes in memory? a) 1 b) 2 c) 3 d) 0 2 / 100 2) Types of translators are: a) All b) Assemblers c) Compilers d) None 3 / 100 3) A person who gains illegal access to a computer system is called: a) Network controller b) Computer operator c) Authorized person d) Hacker 4 / 100 4) Which of the following is an authentication methodology? a) PIN b) Piracy c) Access cards d) Biometrics 5 / 100 5) computer programs are also known as: a) Hardware b) Procedure c) Software d) None 6 / 100 6) which of the following header a) math.h b) None c) conio.h d) stdio.h 7 / 100 7) which header file contains information about standard input/ output functions? a) stdio.h b) Both a and b c) math.h d) None 8 / 100 8) The [ascetic] militant Chinese have gone straight to the roots of the problems. a) trained b) professional c) religious d) secular 9 / 100 9) The extension of C source program is: a) .h b) .exe c) .c d) .obj 10 / 100 10) Which of the following key is used to load a program it memory to run? a) CTRL+F9 b) ALT+F5 c) ALT+F9 d) CTRL+S 11 / 100 11) C was designed to write program for: a) Windows operating system b) Unix operating system c) Solaris operating system d) OS/2 operating system 12 / 100 12) Which of the following language provided the basis for the development C a) B b) Pascal c) C++ d) Java 13 / 100 13) This is a complete instruction that causes the computer to perform some action: a) Statement b) Keyword c) None d) Line 14 / 100 14) Which of the following syntax is used to include header file? a) Both a or b b) # include "name of the header file" c) #include d) None of these 15 / 100 15) The extension of object file is: a) .obj b) .h c) .c d) .exe 16 / 100 16) A set of rules that must be followed to develop a program is called: a) Syntax b) Preprocessor c) Debug d) Bug 17 / 100 17) Most computer crime are committed by: a) Hackers b) International spies c) Highly paid computer consultant d) Computer operators 18 / 100 18) The extension of an executable file is: a) .xls b) .exe c) .doc d) .ext 19 / 100 19) Another name for antivirus is: a) Vaccine b) Logic Bomb c) DES d) Trojan horse 20 / 100 20) For every opening brace in a C program, there must be a: a) Comma b) None c) Colon d) Closing brace 21 / 100 21) The name of header file is written between: a) <> b) ( ) c) {} 22 / 100 22) Turbo C++ can compile a) Turbo C Programs only b) C and C++ programs c) C programs only d) Turbo C++ Programs only 23 / 100 23) A set of illegal instructions inserted into a legitimate computer program is called: a) Trojan horse b) Worm c) Bomb d) Trapdoor 24 / 100 24) The virus which deletes MS Office files and disk partition information is called: a) Book sector b) Trojan horse c) Chernobyl d) Logic Bomb 25 / 100 25) The processing of running an executable file is known as a) executing b) Saving c) Compiling d) Debugging 26 / 100 26) Software that is available free for a limited period is called: a) Freeware b) Shareware c) vertical d) Groupware 27 / 100 27) The process of identifying and removing errors in the programs is called: a) None b) Processing c) debugging d) Executing 28 / 100 28) An assembly language uses: a) Mnemonic Codes b) English Words c) None d) Binary Digit 29 / 100 29) conio stands for: a) Common input output b) Complex input output c) Console input output d) Character input output 30 / 100 30) The expression may be: a) arithmetic expression b) All c) Constant d) string 31 / 100 31) Protecting computers and the information they contain against unwanted access is called: a) Audit control b) Computer monitoring c) Computer security d) Electronic policing 32 / 100 32) Computer virus is simply a: a) A disease b) Set of computer instructions or code c) Type of bacteria d) Hardware component 33 / 100 33) The basic structure of C program consists of: a) Program body b) All c) main() function d) Preprocessor Directive 34 / 100 34) Which of the following is NOT an example of a program bug? a) Syntax error b) Run-time error c) Operator error d) Logic error 35 / 100 35) The “.exe” file is produced by:. a) Compiler b) Loader c) linker d) interpreter 36 / 100 36) Choose the program that translates and executes one line of source code at a time. a) Assembler b) interpreter c) None d) compiler 37 / 100 37) Writing programs in machine language is: a) Less time-consuming b) Both a and c c) Less tedious d) None 38 / 100 38) A program that interferes with the normal working of a computer is called: a) Freeware b) Virus c) Bateria d) Antivirus 39 / 100 39) Which of the following key is used to compile a program a) CTRL+S b) ALT+F9 c) CTRL+F9 d) ALT+F5 40 / 100 40) Another name for free software is: a) Copy protected software b) Shareware c) Encrypted software d) Public domain software 41 / 100 41) A well-defined set of instructions given to the computer is called: a) Software b) None c) Bug d) Hardware 42 / 100 42) Which of the following viruses executes when starting the computer? a) Salami shaving b) Boot sector c) Macro d) File infector 43 / 100 43) Debug is the process of: a) Identifying Errors b) Identifying and removing errors c) Removing Errors d) Creating bugs in program 44 / 100 44) which Program that translates assembly language code to machine code a) Converter b) Assembler c) Debugger d) Translator 45 / 100 45) Which of the following is the native language of computer? a) DOS b) Machine language c) Pascal d) None 46 / 100 46) The lowest level of programming language is: a) Java b) Pascal c) None d) Assembly Language 47 / 100 47) Which file contains the program after translation into machine language a) Source file b) Object file c) exe file d) None 48 / 100 48) Which of the following is computer virus? a) Reflof b) Chernobyl c) All of these d) Logic Bomb 49 / 100 49) A type of language in which instructions are written in binary form is called: a) None b) Assembly language c) Machine language d) High level language 50 / 100 50) An additional or spare copy of data stored on storage media is call: a) Copying of Data b) Additional data c) Backup of data d) Moving of Data 51 / 100 51) Header files in C contain: a) Library functions b) Operators for files c) Compiler commands d) Header information of C programs 52 / 100 52) C programs are divided into units called: a) debug b) Section c) Syntax d) Functions 53 / 100 53) Which of the following is a compiler directive? a) All b) #include c) main ( ) d) Using namespace std; 54 / 100 54) Which of the following is a biometric technique for person identification? a) Access card b) Password c) Fingerprint d) PIN 55 / 100 55) How a virus reaches from one computer to another? a) Exchange of keyboard b) Data is exchanged between computers c) Exchange of display screen d) Exchange of printer 56 / 100 56) The restricted access to the server computer room is a form of: a) User security b) Physical security c) Enterprise security d) Logical security 57 / 100 57) Trojan Horse is a type of: a) Virus b) Software c) Antivirus d) Horse 58 / 100 58) Security protection for personal computers includes: a) Locks and cables b) Software c) All of these d) Internal components 59 / 100 59) C is a: a) Machine Language b) Low-level language c) Assembly language d) High level language 60 / 100 60) The extension of the header file is: a) .txt b) .c c) .h d) .CPP 61 / 100 61) Which malicious program is activated when a specific set of conditions are met? a) Worm b) Virus c) Trojan horse d) Logic bomb 62 / 100 62) A statement that starts with a # is called a: a) None b) Comment c) Preprocessor directive d) Keyword 63 / 100 63) Which of the following is not an antivirus program? a) Avast b) Redlof c) McAfee d) Norton 64 / 100 64) A special program that can detect and remove viruses from computer is called: a) Virus b) Anti-Virus c) Custom d) Groupware 65 / 100 65) Which of the following is not a biometric technique: a) Badge b) Palm print c) Face d) Retina 66 / 100 66) The process of converting source code into object code,is knows as: a) Executing b) Linking c) Compiling d) Saving 67 / 100 67) An IDE stands for: a) Internal disk error b) Integrated Development Environment c) Input Desktop environment d) Input data error 68 / 100 68) Computer programs are also known ac a) None b) Firmware c) Hardware d) Software 69 / 100 69) Which term is commonly used to refer to software or program errors: a) Down b) Crash c) Bug d) Short circuit 70 / 100 70) What does the # sign indicate in an instruction of C language? a) None b) Instruction for user c) Instruction for linker d) Instruction for compiler 71 / 100 71) The programmer usually enters source code into a computer using a) Linker b) Debugger c) Text editor d) Compiler 72 / 100 72) A program’s syntax errors is detected by: a) Debugger b) Linker c) Compiler d) Loader 73 / 100 73) What does the following code print on screen? printf(‘hello’); a) HELLO b) None c) Hello d) hello 74 / 100 74) C statements end with a: a) None b) Period c) semicolon d) semicolon 75 / 100 75) Compiled programs typically, execute faster because: a) Compiled programs are read and executed a line at a time b) None of the above c) Compiled programs are already in a machine-readable form. d) Compiled programs do not require any data 76 / 100 76) main is a a) Comment b) Expression c) Compiler directive d) Function 77 / 100 77) C was developed in the year:1972 a) 1972 b) 1973 c) 1970 d) 1971 78 / 100 78) Which of the following is the most damaging loss to a company? a) Loss of hardware b) Loss of printouts c) Loss of data d) Loss of software 79 / 100 79) Who developed C? a) Dennis Ritchie b) Von-Neumann c) Charles Babbage d) Al- Khuwarizmi 80 / 100 80) Biometric data a) Name of a partner or spouse b) Combination of letters, numbers and symbols c) Word related to a job or hobby d) Name of a partner or spouse 81 / 100 81) stdio.h is part of: a) Compiler b) main function c) Comment section d) C standard library 82 / 100 82) Which of the following components is used to convert first.c to first.exe? a) compiler & linker b) compiler & header c) None d) header & linker 83 / 100 83) which of the following header file contains information about common mathematical functions? a) None b) conio.h c) math.h d) stdio.h 84 / 100 84) Which of the following does not contain machine language code? a) None b) Library module c) Source module d) Object module 85 / 100 85) A spelling error (e.g. typing intt instead of int) is an example of: a) Syntax error b) None c) Run-time error d) Logic error 86 / 100 86) Who is responsible of security of online data? a) Internet Service provider b) User c) Organization obtaining the data d) LAN Administrator 87 / 100 87) The statements written by the programmer are called: a) None b) Syntax c) Object code d) Source code 88 / 100 88) Processor directives are command for a) Language Processor b) C preprocessor c) Microprocessor d) Loader 89 / 100 89) The process of linking library files with object cod is known as: a) Saving b) Executing c) Compiler d) Linking 90 / 100 90) Which of the following key is used to save a file? a) F3 b) F5 c) F9 d) F2 91 / 100 91) Which of the following is not cause of virus? a) Networks b) E-mail c) Logic bomb d) Pirated software 92 / 100 92) Which of the following symbol is used to denote a pre-processor statement? a) % b) $ c) # d) @ 93 / 100 93) The right of a person to keep his personal information away from others is called: a) Privacy b) Right c) Private d) Secrecy 94 / 100 94) Mistakes that cause a running program to produce incorrect results are called: a) Program error b) None c) Syntax error d) Logic error 95 / 100 95) Which of the following is NOT a high level language? a) FORTRAN b) Assembly language c) None d) BASIC 96 / 100 96) Making illegal copies of copyrighted software is called: a) Software Browsing b) Software distribution c) Software piracy d) Software hacking 97 / 100 97) McAfee is an example of: a) Hacker b) Antivirus c) Worm d) Virus 98 / 100 98) FormatC is an example of: a) Chernobal b) Boot sector c) Logic Bomb d) Trojan horse 99 / 100 99) The secrets word or number used for protection is called: a) Passwords b) Private words c) Biometric data d) Backup 100 / 100 100) Division by zero (e.g. 2/ 0) is an example a) None b) Logic error c) Run-time error d) Run-time error Your score is LinkedIn Facebook Twitter VKontakte Post Views: 425 Post navigation Aiou Workshop 5403| Test 5 Aiou Workshop 5403| Full Test