Spread the love/100 108 Aiou Workshop 5403| Test 6 1 / 100 1) The [ascetic] militant Chinese have gone straight to the roots of the problems. a) secular b) professional c) religious d) trained 2 / 100 2) Biometric data a) Combination of letters, numbers and symbols b) Name of a partner or spouse c) Word related to a job or hobby d) Name of a partner or spouse 3 / 100 3) The name of header file is written between: a) ( ) b) <> c) {} 4 / 100 4) The statements written by the programmer are called: a) Object code b) Source code c) None d) Syntax 5 / 100 5) The secrets word or number used for protection is called: a) Biometric data b) Private words c) Passwords d) Backup 6 / 100 6) The lowest level of programming language is: a) Java b) Assembly Language c) Pascal d) None 7 / 100 7) The restricted access to the server computer room is a form of: a) Enterprise security b) Physical security c) User security d) Logical security 8 / 100 8) How a virus reaches from one computer to another? a) Exchange of keyboard b) Exchange of display screen c) Data is exchanged between computers d) Exchange of printer 9 / 100 9) which of the following header file contains information about common mathematical functions? a) None b) math.h c) conio.h d) stdio.h 10 / 100 10) Which of the following reason causes the syntax error a) using a variable without declaration b) All c) Missing statement terminator d) Missing any of the delimiters 11 / 100 11) Which of the following media can be used for backup? a) Zip Disk b) Tape Device c) All d) Floppy Diskette 12 / 100 12) Making illegal copies of copyrighted software is called: a) Software hacking b) Software piracy c) Software distribution d) Software Browsing 13 / 100 13) computer programs are also known as: a) Procedure b) None c) Software d) Hardware 14 / 100 14) C was developed in the year:1972 a) 1970 b) 1971 c) 1972 d) 1973 15 / 100 15) The extension of an executable file is: a) .doc b) .xls c) .exe d) .ext 16 / 100 16) Which of the following is harmful for computers? a) Virus b) Shareware c) Antivirus d) Freeware 17 / 100 17) Which malicious program is activated when a specific set of conditions are met? a) Virus b) Worm c) Logic bomb d) Trojan horse 18 / 100 18) which Program that translates assembly language code to machine code a) Translator b) Debugger c) Assembler d) Converter 19 / 100 19) Which of the following language requires no translator to execute the program? a) Assembly language b) C++ c) Machine language d) C 20 / 100 20) A special program that can detect and remove viruses from computer is called: a) Groupware b) Custom c) Anti-Virus d) Virus 21 / 100 21) A well-defined set of instructions given to the computer is called: a) Hardware b) Software c) None d) Bug 22 / 100 22) C programs are divided into units called: a) Syntax b) debug c) Functions d) Section 23 / 100 23) Trojan Horse is a type of: a) Software b) Antivirus c) Virus d) Horse 24 / 100 24) Which of the following is an authentication methodology? a) Access cards b) PIN c) Piracy d) Biometrics 25 / 100 25) Protecting computers and the information they contain against unwanted access is called: a) Electronic policing b) Computer security c) Audit control d) Computer monitoring 26 / 100 26) Choose the program that translates and executes one line of source code at a time. a) None b) compiler c) interpreter d) Assembler 27 / 100 27) An assembly language uses: a) Binary Digit b) Mnemonic Codes c) None d) English Words 28 / 100 28) This is a complete instruction that causes the computer to perform some action: a) None b) Statement c) Keyword d) Line 29 / 100 29) Which of the following is not cause of virus? a) Logic bomb b) Pirated software c) E-mail d) Networks 30 / 100 30) Division by zero (e.g. 2/ 0) is an example a) Run-time error b) Run-time error c) Logic error d) None 31 / 100 31) Another name for antivirus is: a) Logic Bomb b) DES c) Vaccine d) Trojan horse 32 / 100 32) Which of the following key is used to compile a program a) ALT+F5 b) CTRL+S c) ALT+F9 d) CTRL+F9 33 / 100 33) Another name for free software is: a) Copy protected software b) Shareware c) Public domain software d) Encrypted software 34 / 100 34) Machine language: a) None b) is the only language understood by the computer. c) All of these d) is the language in which programs were first written. 35 / 100 35) A statement that starts with a # is called a: a) Comment b) None c) Keyword d) Preprocessor directive 36 / 100 36) An additional or spare copy of data stored on storage media is call: a) Copying of Data b) Backup of data c) Moving of Data d) Additional data 37 / 100 37) Software that is available free for a limited period is called: a) Groupware b) vertical c) Shareware d) Freeware 38 / 100 38) A virus that replicates itself is called: a) Vaccine b) Worm c) Bug d) Bomb 39 / 100 39) C was designed to write program for: a) Solaris operating system b) Unix operating system c) Windows operating system d) OS/2 operating system 40 / 100 40) The right of a person to keep his personal information away from others is called: a) Right b) Secrecy c) Privacy d) Private 41 / 100 41) Which of the following errors are NOT detected by compiler? a) Syntax error b) Logical error c) None d) Both a and b 42 / 100 42) The extension of object file is: a) .obj b) .exe c) .c d) .h 43 / 100 43) A set of illegal instructions inserted into a legitimate computer program is called: a) Trojan horse b) Trapdoor c) Worm d) Bomb 44 / 100 44) A spelling error (e.g. typing intt instead of int) is an example of: a) Run-time error b) Syntax error c) Logic error d) None 45 / 100 45) The “.exe” file is produced by:. a) Compiler b) linker c) Loader d) interpreter 46 / 100 46) A set of rules that must be followed to develop a program is called: a) Syntax b) Preprocessor c) Debug d) Bug 47 / 100 47) A type of error that occurs when an instruction violates the rules programs is called: a) Program error b) Syntax error c) Runtime error d) None 48 / 100 48) Mistakes that cause a running program to produce incorrect results are called: a) Logic error b) Program error c) None d) Syntax error 49 / 100 49) An IDE typically consists of: a) Text editor b) Compiler c) All d) Debugger 50 / 100 50) which of the following language Is ideal to write business application a) BASIC b) PASCAL c) COBOL d) None 51 / 100 51) Which term is commonly used to refer to software or program errors: a) Bug b) Short circuit c) Crash d) Down 52 / 100 52) Processor directives are command for a) C preprocessor b) Loader c) Language Processor d) Microprocessor 53 / 100 53) The processing of running an executable file is known as a) executing b) Debugging c) Saving d) Compiling 54 / 100 54) Who is responsible of security of online data? a) User b) Internet Service provider c) Organization obtaining the data d) LAN Administrator 55 / 100 55) Which of the following is computer virus? a) Logic Bomb b) Reflof c) Chernobyl d) All of these 56 / 100 56) void occupy how many bytes in memory? a) 1 b) 2 c) 3 d) 0 57 / 100 57) Which of the following is not a biometric technique: a) Retina b) Badge c) Face d) Palm print 58 / 100 58) Which of the following does not contain machine language code? a) Object module b) Library module c) None d) Source module 59 / 100 59) The process of converting source code into object code,is knows as: a) Linking b) Compiling c) Saving d) Executing 60 / 100 60) Which of the following is the most damaging loss to a company? a) Loss of software b) Loss of data c) Loss of hardware d) Loss of printouts 61 / 100 61) Which file contains the program after translation into machine language a) Object file b) None c) exe file d) Source file 62 / 100 62) Computer programs are also known ac a) Software b) Hardware c) Firmware d) None 63 / 100 63) Most computer crime are committed by: a) Highly paid computer consultant b) Hackers c) International spies d) Computer operators 64 / 100 64) FormatC is an example of: a) Trojan horse b) Logic Bomb c) Chernobal d) Boot sector 65 / 100 65) Which of the following key is used to save a file? a) F9 b) F5 c) F2 d) F3 66 / 100 66) Which of the following is not an antivirus program? a) Redlof b) Norton c) Avast d) McAfee 67 / 100 67) The expression may be: a) All b) Constant c) arithmetic expression d) string 68 / 100 68) conio stands for: a) Common input output b) Complex input output c) Character input output d) Console input output 69 / 100 69) Which of the following is NOT a high level language? a) FORTRAN b) None c) Assembly language d) BASIC 70 / 100 70) B was developed in the year: a) 1965-1975 b) 1969-70 c) 1992-1996 d) 1972-1988 71 / 100 71) Which of the following is the native language of computer? a) Machine language b) DOS c) Pascal d) None 72 / 100 72) The basic structure of C program consists of: a) Program body b) All c) main() function d) Preprocessor Directive 73 / 100 73) stdio stands for: a) String input-output b) Standard input output c) Simple input output d) Symbolic input output 74 / 100 74) What does the following code print on screen? printf(‘hello’); a) None b) hello c) Hello d) HELLO 75 / 100 75) Which of the following language provided the basis for the development C a) Java b) B c) Pascal d) C++ 76 / 100 76) which one of the following translates source code to object code as a whole a) Interpreter b) Compiler c) Assembler d) None 77 / 100 77) Who developed C? a) Von-Neumann b) Dennis Ritchie c) Charles Babbage d) Al- Khuwarizmi 78 / 100 78) A program that interferes with the normal working of a computer is called: a) Antivirus b) Freeware c) Bateria d) Virus 79 / 100 79) The programmer usually enters source code into a computer using a) Text editor b) Linker c) Compiler d) Debugger 80 / 100 80) Header files in C contain: a) Operators for files b) Header information of C programs c) Compiler commands d) Library functions 81 / 100 81) Which of the following viruses executes when starting the computer? a) File infector b) Macro c) Salami shaving d) Boot sector 82 / 100 82) The virus which deletes MS Office files and disk partition information is called: a) Book sector b) Chernobyl c) Logic Bomb d) Trojan horse 83 / 100 83) Which of the following is NOT an example of a program bug? a) Run-time error b) Logic error c) Syntax error d) Operator error 84 / 100 84) Which of the following symbol is used to denote a pre-processor statement? a) # b) @ c) % d) $ 85 / 100 85) Which of the following components is used to convert first.c to first.exe? a) None b) compiler & header c) header & linker d) compiler & linker 86 / 100 86) The expression in define directive: a) Can only be changed at the end of the program b) Cannot be assigned a value c) Cannot be changed d) Can not be changed but can be redefined 87 / 100 87) The extension of the header file is: a) .txt b) .h c) .c d) .CPP 88 / 100 88) McAfee is an example of: a) Antivirus b) Worm c) Virus d) Hacker 89 / 100 89) Computer virus is simply a: a) Hardware component b) Set of computer instructions or code c) Type of bacteria d) A disease 90 / 100 90) stdio.h is part of: a) Compiler b) Comment section c) main function d) C standard library 91 / 100 91) Security protection for personal computers includes: a) Software b) All of these c) Locks and cables d) Internal components 92 / 100 92) which of the following header a) math.h b) stdio.h c) None d) conio.h 93 / 100 93) The extension of C source program is: a) .c b) .h c) .exe d) .obj 94 / 100 94) The output of the compiler is called: a) Object code b) Source code c) Linked code d) Library code 95 / 100 95) Which of the following is a biometric technique for person identification? a) Access card b) Fingerprint c) PIN d) Password 96 / 100 96) C statements end with a: a) semicolon b) semicolon c) None d) Period 97 / 100 97) Turbo C++ can compile a) Turbo C++ Programs only b) C and C++ programs c) Turbo C Programs only d) C programs only 98 / 100 98) The process of identifying and removing errors in the programs is called: a) Processing b) Executing c) debugging d) None 99 / 100 99) The process of linking library files with object cod is known as: a) Saving b) Linking c) Compiler d) Executing 100 / 100 100) main is a a) Expression b) Function c) Comment d) Compiler directive Your score is LinkedIn Facebook Twitter VKontakte Post Views: 590 Post navigation Aiou Workshop 5403| Test 5 Aiou Workshop 5403| Full Test