Spread the love/100 108 Aiou Workshop 5403| Test 6 1 / 100 1) The extension of an executable file is: a) .xls b) .ext c) .doc d) .exe 2 / 100 2) The process of linking library files with object cod is known as: a) Compiler b) Linking c) Saving d) Executing 3 / 100 3) Processor directives are command for a) Loader b) Language Processor c) Microprocessor d) C preprocessor 4 / 100 4) The expression in define directive: a) Can only be changed at the end of the program b) Cannot be changed c) Can not be changed but can be redefined d) Cannot be assigned a value 5 / 100 5) The right to use the software on the computer is called: a) Software copyright b) Intellectual property right c) Software piracy d) Site License 6 / 100 6) which Program that translates assembly language code to machine code a) Debugger b) Converter c) Assembler d) Translator 7 / 100 7) A set of rules that must be followed to develop a program is called: a) Bug b) Syntax c) Preprocessor d) Debug 8 / 100 8) conio stands for: a) Common input output b) Console input output c) Complex input output d) Character input output 9 / 100 9) What does the following code print on screen? printf(‘hello’); a) None b) Hello c) HELLO d) hello 10 / 100 10) Which of the following components is used to convert first.c to first.exe? a) compiler & header b) header & linker c) None d) compiler & linker 11 / 100 11) FormatC is an example of: a) Trojan horse b) Chernobal c) Logic Bomb d) Boot sector 12 / 100 12) void occupy how many bytes in memory? a) 2 b) 1 c) 0 d) 3 13 / 100 13) Who is responsible of security of online data? a) User b) Organization obtaining the data c) LAN Administrator d) Internet Service provider 14 / 100 14) B was developed in the year: a) 1965-1975 b) 1972-1988 c) 1992-1996 d) 1969-70 15 / 100 15) Making illegal copies of copyrighted software is called: a) Software Browsing b) Software piracy c) Software hacking d) Software distribution 16 / 100 16) Which of the following one is not a virus? a) Trojan Horse b) Logic Bomb c) MCAfee d) Reflof 17 / 100 17) Debug is the process of: a) Identifying Errors b) Removing Errors c) Creating bugs in program d) Identifying and removing errors 18 / 100 18) Another name for free software is: a) Shareware b) Public domain software c) Copy protected software d) Encrypted software 19 / 100 19) Which of the following is a compiler directive? a) Using namespace std; b) main ( ) c) #include d) All 20 / 100 20) Which of the following is an authentication methodology? a) Biometrics b) Access cards c) PIN d) Piracy 21 / 100 21) which header file contains information about standard input/ output functions? a) stdio.h b) Both a and b c) math.h d) None 22 / 100 22) C statements end with a: a) semicolon b) None c) Period d) semicolon 23 / 100 23) Which of the following is harmful for computers? a) Freeware b) Virus c) Antivirus d) Shareware 24 / 100 24) An IDE typically consists of: a) All b) Text editor c) Compiler d) Debugger 25 / 100 25) Types of translators are: a) Assemblers b) All c) Compilers d) None 26 / 100 26) Which file contains the program after translation into machine language a) exe file b) None c) Source file d) Object file 27 / 100 27) Which of the following is not an antivirus program? a) Norton b) Redlof c) Avast d) McAfee 28 / 100 28) The statements written by the programmer are called: a) Source code b) Syntax c) Object code d) None 29 / 100 29) Which of the following media can be used for backup? a) Zip Disk b) Floppy Diskette c) All d) Tape Device 30 / 100 30) Which of the following symbol is used to denote a pre-processor statement? a) $ b) @ c) % d) # 31 / 100 31) A set of illegal instructions inserted into a legitimate computer program is called: a) Trojan horse b) Bomb c) Worm d) Trapdoor 32 / 100 32) The output of the compiler is called: a) Object code b) Source code c) Linked code d) Library code 33 / 100 33) Which of the following is a biometric technique for person identification? a) Fingerprint b) Password c) PIN d) Access card 34 / 100 34) A well-defined set of instructions given to the computer is called: a) None b) Bug c) Hardware d) Software 35 / 100 35) The secrets word or number used for protection is called: a) Backup b) Biometric data c) Private words d) Passwords 36 / 100 36) Another name for antivirus is: a) Vaccine b) Trojan horse c) DES d) Logic Bomb 37 / 100 37) computer programs are also known as: a) None b) Procedure c) Software d) Hardware 38 / 100 38) An additional or spare copy of data stored on storage media is call: a) Additional data b) Moving of Data c) Backup of data d) Copying of Data 39 / 100 39) Which term is commonly used to refer to software or program errors: a) Crash b) Bug c) Short circuit d) Down 40 / 100 40) The right of a person to keep his personal information away from others is called: a) Right b) Secrecy c) Privacy d) Private 41 / 100 41) A type of language in which instructions are written in binary form is called: a) High level language b) None c) Assembly language d) Machine language 42 / 100 42) Which of the following key is used to save a file? a) F5 b) F9 c) F3 d) F2 43 / 100 43) The processing of running an executable file is known as a) Debugging b) Saving c) executing d) Compiling 44 / 100 44) which of the following language Is ideal to write business application a) BASIC b) None c) PASCAL d) COBOL 45 / 100 45) The “.exe” file is produced by:. a) interpreter b) linker c) Loader d) Compiler 46 / 100 46) Header files in C contain: a) Library functions b) Header information of C programs c) Operators for files d) Compiler commands 47 / 100 47) Which of the following reason causes the syntax error a) Missing any of the delimiters b) using a variable without declaration c) Missing statement terminator d) All 48 / 100 48) which of the following header file contains information about common mathematical functions? a) stdio.h b) conio.h c) math.h d) None 49 / 100 49) Computer virus is simply a: a) Hardware component b) A disease c) Set of computer instructions or code d) Type of bacteria 50 / 100 50) stdio stands for: a) Simple input output b) String input-output c) Standard input output d) Symbolic input output 51 / 100 51) C programs are divided into units called: a) Section b) Functions c) Syntax d) debug 52 / 100 52) which of the following header a) None b) math.h c) conio.h d) stdio.h 53 / 100 53) Which of the following errors are NOT detected by compiler? a) Both a and b b) Syntax error c) None d) Logical error 54 / 100 54) Turbo C++ can compile a) Turbo C Programs only b) Turbo C++ Programs only c) C programs only d) C and C++ programs 55 / 100 55) The basic structure of C program consists of: a) Program body b) Preprocessor Directive c) All d) main() function 56 / 100 56) The extension of C source program is: a) .h b) .c c) .exe d) .obj 57 / 100 57) Protecting computers and the information they contain against unwanted access is called: a) Audit control b) Computer security c) Electronic policing d) Computer monitoring 58 / 100 58) A spelling error (e.g. typing intt instead of int) is an example of: a) Logic error b) Syntax error c) Run-time error d) None 59 / 100 59) Which of the following is not a biometric technique: a) Retina b) Face c) Badge d) Palm print 60 / 100 60) The extension of the header file is: a) .c b) .txt c) .h d) .CPP 61 / 100 61) How a virus reaches from one computer to another? a) Exchange of display screen b) Exchange of keyboard c) Exchange of printer d) Data is exchanged between computers 62 / 100 62) Software that is available free for a limited period is called: a) vertical b) Groupware c) Shareware d) Freeware 63 / 100 63) What does the # sign indicate in an instruction of C language? a) Instruction for linker b) Instruction for user c) Instruction for compiler d) None 64 / 100 64) Biometric data a) Name of a partner or spouse b) Combination of letters, numbers and symbols c) Word related to a job or hobby d) Name of a partner or spouse 65 / 100 65) Which of the following is not cause of virus? a) Networks b) Pirated software c) Logic bomb d) E-mail 66 / 100 66) Which of the following viruses executes when starting the computer? a) File infector b) Salami shaving c) Boot sector d) Macro 67 / 100 67) The programmer usually enters source code into a computer using a) Compiler b) Text editor c) Linker d) Debugger 68 / 100 68) The process of identifying and removing errors in the programs is called: a) debugging b) None c) Processing d) Executing 69 / 100 69) Mistakes that cause a running program to produce incorrect results are called: a) Logic error b) Syntax error c) None d) Program error 70 / 100 70) C was designed to write program for: a) Windows operating system b) Solaris operating system c) OS/2 operating system d) Unix operating system 71 / 100 71) The virus which deletes MS Office files and disk partition information is called: a) Logic Bomb b) Book sector c) Chernobyl d) Trojan horse 72 / 100 72) Who developed C? a) Al- Khuwarizmi b) Charles Babbage c) Dennis Ritchie d) Von-Neumann 73 / 100 73) main is a a) Function b) Compiler directive c) Comment d) Expression 74 / 100 74) Which of the following is computer virus? a) Reflof b) All of these c) Logic Bomb d) Chernobyl 75 / 100 75) Writing programs in machine language is: a) Both a and c b) Less time-consuming c) Less tedious d) None 76 / 100 76) A program’s syntax errors is detected by: a) Compiler b) Loader c) Linker d) Debugger 77 / 100 77) Computer programs are also known ac a) Software b) Firmware c) Hardware d) None 78 / 100 78) Which of the following is NOT an example of a program bug? a) Run-time error b) Syntax error c) Operator error d) Logic error 79 / 100 79) Compiled programs typically, execute faster because: a) Compiled programs are already in a machine-readable form. b) None of the above c) Compiled programs are read and executed a line at a time d) Compiled programs do not require any data 80 / 100 80) Which of the following key is used to load a program it memory to run? a) CTRL+S b) ALT+F5 c) ALT+F9 d) CTRL+F9 81 / 100 81) C is a: a) Assembly language b) High level language c) Low-level language d) Machine Language 82 / 100 82) Security protection for personal computers includes: a) Internal components b) Software c) Locks and cables d) All of these 83 / 100 83) This is a complete instruction that causes the computer to perform some action: a) Keyword b) Line c) Statement d) None 84 / 100 84) A special program that can detect and remove viruses from computer is called: a) Groupware b) Anti-Virus c) Virus d) Custom 85 / 100 85) A program that interferes with the normal working of a computer is called: a) Freeware b) Virus c) Bateria d) Antivirus 86 / 100 86) Which of the following key is used to compile a program a) CTRL+S b) ALT+F5 c) CTRL+F9 d) ALT+F9 87 / 100 87) Choose the program that translates and executes one line of source code at a time. a) compiler b) None c) Assembler d) interpreter 88 / 100 88) For every opening brace in a C program, there must be a: a) Comma b) Closing brace c) Colon d) None 89 / 100 89) stdio.h is part of: a) Compiler b) main function c) Comment section d) C standard library 90 / 100 90) An assembly language uses: a) English Words b) None c) Binary Digit d) Mnemonic Codes 91 / 100 91) A type of error that occurs when an instruction violates the rules programs is called: a) Syntax error b) None c) Runtime error d) Program error 92 / 100 92) An IDE stands for: a) Input Desktop environment b) Input data error c) Internal disk error d) Integrated Development Environment 93 / 100 93) The name of header file is written between: a) {} b) <> c) ( ) 94 / 100 94) Which of the following language requires no translator to execute the program? a) Assembly language b) C c) C++ d) Machine language 95 / 100 95) McAfee is an example of: a) Antivirus b) Virus c) Hacker d) Worm 96 / 100 96) Most computer crime are committed by: a) Highly paid computer consultant b) Hackers c) Computer operators d) International spies 97 / 100 97) The extension of object file is: a) .h b) .exe c) .obj d) .c 98 / 100 98) A statement that starts with a # is called a: a) Keyword b) Preprocessor directive c) Comment d) None 99 / 100 99) The process of converting source code into object code,is knows as: a) Compiling b) Linking c) Saving d) Executing 100 / 100 100) Which of the following syntax is used to include header file? a) Both a or b b) None of these c) #include d) # include "name of the header file" Your score is LinkedIn Facebook Twitter VKontakte Post Views: 313 Post navigation Aiou Workshop 5403| Test 5 Aiou Workshop 5403| Full Test