Aiou Workshop 5403| Test 6 admin 4 years ago Spread the love /100 108 Aiou Workshop 5403| Test 6 1 / 100 1) Writing programs in machine language is: a) Less time-consuming b) Less tedious c) None d) Both a and c 2 / 100 2) Making illegal copies of copyrighted software is called: a) Software distribution b) Software Browsing c) Software hacking d) Software piracy 3 / 100 3) Which of the following key is used to compile a program a) CTRL+S b) ALT+F9 c) CTRL+F9 d) ALT+F5 4 / 100 4) Software that is available free for a limited period is called: a) Freeware b) vertical c) Shareware d) Groupware 5 / 100 5) This is a complete instruction that causes the computer to perform some action: a) None b) Line c) Keyword d) Statement 6 / 100 6) which one of the following translates source code to object code as a whole a) Assembler b) Interpreter c) Compiler d) None 7 / 100 7) Protecting computers and the information they contain against unwanted access is called: a) Computer monitoring b) Computer security c) Audit control d) Electronic policing 8 / 100 8) computer programs are also known as: a) Hardware b) None c) Software d) Procedure 9 / 100 9) Which of the following is NOT an example of a program bug? a) Syntax error b) Operator error c) Run-time error d) Logic error 10 / 100 10) Which of the following language requires no translator to execute the program? a) Machine language b) C++ c) Assembly language d) C 11 / 100 11) Which of the following errors are NOT detected by compiler? a) Syntax error b) None c) Logical error d) Both a and b 12 / 100 12) Which file contains the program after translation into machine language a) Object file b) None c) exe file d) Source file 13 / 100 13) C was designed to write program for: a) Windows operating system b) Solaris operating system c) OS/2 operating system d) Unix operating system 14 / 100 14) Which of the following language provided the basis for the development C a) B b) Pascal c) C++ d) Java 15 / 100 15) A special program that can detect and remove viruses from computer is called: a) Virus b) Groupware c) Custom d) Anti-Virus 16 / 100 16) Compiled programs typically, execute faster because: a) Compiled programs are read and executed a line at a time b) Compiled programs do not require any data c) None of the above d) Compiled programs are already in a machine-readable form. 17 / 100 17) A set of illegal instructions inserted into a legitimate computer program is called: a) Trapdoor b) Trojan horse c) Bomb d) Worm 18 / 100 18) The extension of C source program is: a) .obj b) .h c) .exe d) .c 19 / 100 19) conio stands for: a) Character input output b) Complex input output c) Common input output d) Console input output 20 / 100 20) The extension of an executable file is: a) .doc b) .ext c) .xls d) .exe 21 / 100 21) Which term is commonly used to refer to software or program errors: a) Down b) Crash c) Short circuit d) Bug 22 / 100 22) The process of identifying and removing errors in the programs is called: a) Executing b) Processing c) debugging d) None 23 / 100 23) How a virus reaches from one computer to another? a) Exchange of printer b) Exchange of keyboard c) Exchange of display screen d) Data is exchanged between computers 24 / 100 24) An additional or spare copy of data stored on storage media is call: a) Copying of Data b) Additional data c) Moving of Data d) Backup of data 25 / 100 25) McAfee is an example of: a) Antivirus b) Virus c) Hacker d) Worm 26 / 100 26) The extension of object file is: a) .exe b) .h c) .obj d) .c 27 / 100 27) The “.exe” file is produced by:. a) Loader b) linker c) interpreter d) Compiler 28 / 100 28) The restricted access to the server computer room is a form of: a) User security b) Physical security c) Logical security d) Enterprise security 29 / 100 29) Which of the following is not cause of virus? a) E-mail b) Pirated software c) Networks d) Logic bomb 30 / 100 30) The right to use the software on the computer is called: a) Software piracy b) Site License c) Intellectual property right d) Software copyright 31 / 100 31) A type of language in which instructions are written in binary form is called: a) Assembly language b) Machine language c) None d) High level language 32 / 100 32) The name of header file is written between: a) {} b) ( ) c) <> 33 / 100 33) The right of a person to keep his personal information away from others is called: a) Right b) Secrecy c) Private d) Privacy 34 / 100 34) Which of the following one is not a virus? a) Trojan Horse b) Logic Bomb c) MCAfee d) Reflof 35 / 100 35) Processor directives are command for a) Language Processor b) Microprocessor c) Loader d) C preprocessor 36 / 100 36) Which of the following is an authentication methodology? a) Biometrics b) Access cards c) Piracy d) PIN 37 / 100 37) The output of the compiler is called: a) Object code b) Linked code c) Library code d) Source code 38 / 100 38) Which of the following key is used to save a file? a) F5 b) F2 c) F3 d) F9 39 / 100 39) A program that interferes with the normal working of a computer is called: a) Bateria b) Freeware c) Antivirus d) Virus 40 / 100 40) Types of translators are: a) All b) None c) Compilers d) Assemblers 41 / 100 41) Which of the following is harmful for computers? a) Virus b) Freeware c) Antivirus d) Shareware 42 / 100 42) The process of converting source code into object code,is knows as: a) Compiling b) Executing c) Saving d) Linking 43 / 100 43) Mistakes that cause a running program to produce incorrect results are called: a) Logic error b) Program error c) Syntax error d) None 44 / 100 44) Division by zero (e.g. 2/ 0) is an example a) Run-time error b) None c) Logic error d) Run-time error 45 / 100 45) Which of the following symbol is used to denote a pre-processor statement? a) @ b) # c) % d) $ 46 / 100 46) Which of the following reason causes the syntax error a) All b) Missing statement terminator c) using a variable without declaration d) Missing any of the delimiters 47 / 100 47) A person who gains illegal access to a computer system is called: a) Network controller b) Computer operator c) Hacker d) Authorized person 48 / 100 48) Machine language: a) is the language in which programs were first written. b) None c) is the only language understood by the computer. d) All of these 49 / 100 49) Which of the following is NOT a high level language? a) None b) Assembly language c) FORTRAN d) BASIC 50 / 100 50) C programs are divided into units called: a) Section b) Syntax c) Functions d) debug 51 / 100 51) Another name for free software is: a) Encrypted software b) Shareware c) Copy protected software d) Public domain software 52 / 100 52) The [ascetic] militant Chinese have gone straight to the roots of the problems. a) secular b) professional c) religious d) trained 53 / 100 53) The process of linking library files with object cod is known as: a) Saving b) Linking c) Compiler d) Executing 54 / 100 54) which of the following language Is ideal to write business application a) COBOL b) BASIC c) None d) PASCAL 55 / 100 55) Who is responsible of security of online data? a) Internet Service provider b) User c) LAN Administrator d) Organization obtaining the data 56 / 100 56) A virus that replicates itself is called: a) Vaccine b) Worm c) Bug d) Bomb 57 / 100 57) The statements written by the programmer are called: a) Object code b) Syntax c) Source code d) None 58 / 100 58) Biometric data a) Name of a partner or spouse b) Word related to a job or hobby c) Name of a partner or spouse d) Combination of letters, numbers and symbols 59 / 100 59) A set of rules that must be followed to develop a program is called: a) Preprocessor b) Syntax c) Bug d) Debug 60 / 100 60) Which of the following does not contain machine language code? a) Source module b) Library module c) None d) Object module 61 / 100 61) What does the # sign indicate in an instruction of C language? a) Instruction for compiler b) None c) Instruction for linker d) Instruction for user 62 / 100 62) which header file contains information about standard input/ output functions? a) stdio.h b) None c) math.h d) Both a and b 63 / 100 63) The processing of running an executable file is known as a) Compiling b) executing c) Saving d) Debugging 64 / 100 64) A statement that starts with a # is called a: a) Preprocessor directive b) None c) Keyword d) Comment 65 / 100 65) which Program that translates assembly language code to machine code a) Debugger b) Assembler c) Converter d) Translator 66 / 100 66) An IDE stands for: a) Integrated Development Environment b) Internal disk error c) Input data error d) Input Desktop environment 67 / 100 67) void occupy how many bytes in memory? a) 2 b) 3 c) 0 d) 1 68 / 100 68) Security protection for personal computers includes: a) Software b) Locks and cables c) Internal components d) All of these 69 / 100 69) Most computer crime are committed by: a) Computer operators b) International spies c) Hackers d) Highly paid computer consultant 70 / 100 70) The basic structure of C program consists of: a) Preprocessor Directive b) All c) Program body d) main() function 71 / 100 71) The programmer usually enters source code into a computer using a) Compiler b) Linker c) Text editor d) Debugger 72 / 100 72) Which of the following key is used to load a program it memory to run? a) ALT+F5 b) CTRL+F9 c) ALT+F9 d) CTRL+S 73 / 100 73) C is a: a) High level language b) Machine Language c) Low-level language d) Assembly language 74 / 100 74) Turbo C++ can compile a) C programs only b) C and C++ programs c) Turbo C++ Programs only d) Turbo C Programs only 75 / 100 75) A program’s syntax errors is detected by: a) Compiler b) Loader c) Linker d) Debugger 76 / 100 76) Which of the following is not an antivirus program? a) Avast b) Norton c) Redlof d) McAfee 77 / 100 77) What does the following code print on screen? printf(‘hello’); a) HELLO b) hello c) None d) Hello 78 / 100 78) Which of the following is not a biometric technique: a) Badge b) Retina c) Palm print d) Face 79 / 100 79) Computer virus is simply a: a) A disease b) Hardware component c) Set of computer instructions or code d) Type of bacteria 80 / 100 80) Who developed C? a) Von-Neumann b) Dennis Ritchie c) Charles Babbage d) Al- Khuwarizmi 81 / 100 81) Which of the following is a biometric technique for person identification? a) PIN b) Password c) Access card d) Fingerprint 82 / 100 82) C was developed in the year:1972 a) 1970 b) 1971 c) 1972 d) 1973 83 / 100 83) stdio.h is part of: a) main function b) C standard library c) Comment section d) Compiler 84 / 100 84) stdio stands for: a) Simple input output b) String input-output c) Standard input output d) Symbolic input output 85 / 100 85) Which malicious program is activated when a specific set of conditions are met? a) Trojan horse b) Logic bomb c) Virus d) Worm 86 / 100 86) A well-defined set of instructions given to the computer is called: a) Bug b) Software c) None d) Hardware 87 / 100 87) The expression in define directive: a) Can only be changed at the end of the program b) Cannot be changed c) Can not be changed but can be redefined d) Cannot be assigned a value 88 / 100 88) Which of the following is the most damaging loss to a company? a) Loss of printouts b) Loss of software c) Loss of data d) Loss of hardware 89 / 100 89) B was developed in the year: a) 1969-70 b) 1992-1996 c) 1965-1975 d) 1972-1988 90 / 100 90) main is a a) Compiler directive b) Expression c) Comment d) Function 91 / 100 91) FormatC is an example of: a) Trojan horse b) Logic Bomb c) Boot sector d) Chernobal 92 / 100 92) An IDE typically consists of: a) Compiler b) Debugger c) Text editor d) All 93 / 100 93) Which of the following is the native language of computer? a) DOS b) None c) Pascal d) Machine language 94 / 100 94) Which of the following syntax is used to include header file? a) Both a or b b) #include c) None of these d) # include "name of the header file" 95 / 100 95) Debug is the process of: a) Removing Errors b) Creating bugs in program c) Identifying Errors d) Identifying and removing errors 96 / 100 96) Computer programs are also known ac a) Software b) None c) Hardware d) Firmware 97 / 100 97) A spelling error (e.g. typing intt instead of int) is an example of: a) Syntax error b) Logic error c) Run-time error d) None 98 / 100 98) The extension of the header file is: a) .CPP b) .c c) .txt d) .h 99 / 100 99) Trojan Horse is a type of: a) Software b) Horse c) Antivirus d) Virus 100 / 100 100) A type of error that occurs when an instruction violates the rules programs is called: a) Program error b) Runtime error c) Syntax error d) None Your score is LinkedIn Facebook Twitter VKontakte {{#message}}{{{message}}}{{/message}}{{^message}}Your submission failed. The server responded with {{status_text}} (code {{status_code}}). Please contact the developer of this form processor to improve this message. Learn More{{/message}}{{#message}}{{{message}}}{{/message}}{{^message}}It appears your submission was successful. Even though the server responded OK, it is possible the submission was not processed. Please contact the developer of this form processor to improve this message. Learn More{{/message}}Submitting…