Aiou Workshop 5403| Test 6 admin 4 years ago Spread the love /100 108 Aiou Workshop 5403| Test 6 1 / 100 1) The right to use the software on the computer is called: a) Site License b) Intellectual property right c) Software piracy d) Software copyright 2 / 100 2) Which of the following is not cause of virus? a) E-mail b) Logic bomb c) Networks d) Pirated software 3 / 100 3) An assembly language uses: a) Mnemonic Codes b) None c) English Words d) Binary Digit 4 / 100 4) Header files in C contain: a) Compiler commands b) Header information of C programs c) Library functions d) Operators for files 5 / 100 5) The expression in define directive: a) Can only be changed at the end of the program b) Cannot be assigned a value c) Can not be changed but can be redefined d) Cannot be changed 6 / 100 6) A statement that starts with a # is called a: a) Keyword b) None c) Comment d) Preprocessor directive 7 / 100 7) Which of the following does not contain machine language code? a) Source module b) None c) Library module d) Object module 8 / 100 8) Most computer crime are committed by: a) Highly paid computer consultant b) Hackers c) International spies d) Computer operators 9 / 100 9) Which of the following key is used to load a program it memory to run? a) ALT+F5 b) CTRL+F9 c) ALT+F9 d) CTRL+S 10 / 100 10) Who is responsible of security of online data? a) User b) Internet Service provider c) Organization obtaining the data d) LAN Administrator 11 / 100 11) An additional or spare copy of data stored on storage media is call: a) Copying of Data b) Backup of data c) Moving of Data d) Additional data 12 / 100 12) The output of the compiler is called: a) Source code b) Object code c) Library code d) Linked code 13 / 100 13) Computer virus is simply a: a) A disease b) Set of computer instructions or code c) Hardware component d) Type of bacteria 14 / 100 14) Which of the following language provided the basis for the development C a) B b) C++ c) Pascal d) Java 15 / 100 15) Compiled programs typically, execute faster because: a) None of the above b) Compiled programs are already in a machine-readable form. c) Compiled programs are read and executed a line at a time d) Compiled programs do not require any data 16 / 100 16) which Program that translates assembly language code to machine code a) Translator b) Debugger c) Converter d) Assembler 17 / 100 17) A virus that replicates itself is called: a) Vaccine b) Bomb c) Worm d) Bug 18 / 100 18) The expression may be: a) All b) Constant c) string d) arithmetic expression 19 / 100 19) Security protection for personal computers includes: a) Internal components b) Software c) Locks and cables d) All of these 20 / 100 20) Making illegal copies of copyrighted software is called: a) Software Browsing b) Software piracy c) Software hacking d) Software distribution 21 / 100 21) Processor directives are command for a) C preprocessor b) Microprocessor c) Loader d) Language Processor 22 / 100 22) A well-defined set of instructions given to the computer is called: a) None b) Hardware c) Bug d) Software 23 / 100 23) Which file contains the program after translation into machine language a) exe file b) Object file c) None d) Source file 24 / 100 24) The extension of the header file is: a) .txt b) .CPP c) .h d) .c 25 / 100 25) A program that interferes with the normal working of a computer is called: a) Antivirus b) Virus c) Freeware d) Bateria 26 / 100 26) The right of a person to keep his personal information away from others is called: a) Private b) Secrecy c) Right d) Privacy 27 / 100 27) This is a complete instruction that causes the computer to perform some action: a) Keyword b) Line c) Statement d) None 28 / 100 28) C statements end with a: a) semicolon b) Period c) semicolon d) None 29 / 100 29) Mistakes that cause a running program to produce incorrect results are called: a) Program error b) Syntax error c) Logic error d) None 30 / 100 30) Which of the following key is used to save a file? a) F3 b) F9 c) F5 d) F2 31 / 100 31) What does the following code print on screen? printf(‘hello’); a) hello b) Hello c) HELLO d) None 32 / 100 32) The process of converting source code into object code,is knows as: a) Compiling b) Executing c) Saving d) Linking 33 / 100 33) The restricted access to the server computer room is a form of: a) Logical security b) Physical security c) User security d) Enterprise security 34 / 100 34) Which of the following is not an antivirus program? a) Norton b) McAfee c) Redlof d) Avast 35 / 100 35) The [ascetic] militant Chinese have gone straight to the roots of the problems. a) religious b) trained c) professional d) secular 36 / 100 36) Which of the following is harmful for computers? a) Shareware b) Freeware c) Antivirus d) Virus 37 / 100 37) Protecting computers and the information they contain against unwanted access is called: a) Computer monitoring b) Electronic policing c) Computer security d) Audit control 38 / 100 38) A set of rules that must be followed to develop a program is called: a) Preprocessor b) Debug c) Syntax d) Bug 39 / 100 39) Which of the following is computer virus? a) All of these b) Reflof c) Logic Bomb d) Chernobyl 40 / 100 40) which of the following header a) None b) math.h c) stdio.h d) conio.h 41 / 100 41) Which of the following viruses executes when starting the computer? a) File infector b) Salami shaving c) Macro d) Boot sector 42 / 100 42) Which of the following key is used to compile a program a) ALT+F5 b) ALT+F9 c) CTRL+S d) CTRL+F9 43 / 100 43) Which of the following is the native language of computer? a) Machine language b) Pascal c) None d) DOS 44 / 100 44) Turbo C++ can compile a) C programs only b) C and C++ programs c) Turbo C Programs only d) Turbo C++ Programs only 45 / 100 45) A set of illegal instructions inserted into a legitimate computer program is called: a) Trojan horse b) Bomb c) Trapdoor d) Worm 46 / 100 46) stdio stands for: a) Standard input output b) Symbolic input output c) Simple input output d) String input-output 47 / 100 47) Another name for antivirus is: a) Vaccine b) Logic Bomb c) DES d) Trojan horse 48 / 100 48) C programs are divided into units called: a) Section b) Functions c) Syntax d) debug 49 / 100 49) A special program that can detect and remove viruses from computer is called: a) Groupware b) Anti-Virus c) Virus d) Custom 50 / 100 50) which of the following header file contains information about common mathematical functions? a) stdio.h b) conio.h c) None d) math.h 51 / 100 51) The lowest level of programming language is: a) None b) Assembly Language c) Pascal d) Java 52 / 100 52) Biometric data a) Combination of letters, numbers and symbols b) Name of a partner or spouse c) Name of a partner or spouse d) Word related to a job or hobby 53 / 100 53) Another name for free software is: a) Encrypted software b) Shareware c) Copy protected software d) Public domain software 54 / 100 54) For every opening brace in a C program, there must be a: a) Colon b) Comma c) None d) Closing brace 55 / 100 55) The basic structure of C program consists of: a) Program body b) All c) Preprocessor Directive d) main() function 56 / 100 56) A program’s syntax errors is detected by: a) Loader b) Debugger c) Compiler d) Linker 57 / 100 57) A spelling error (e.g. typing intt instead of int) is an example of: a) None b) Run-time error c) Logic error d) Syntax error 58 / 100 58) Which malicious program is activated when a specific set of conditions are met? a) Trojan horse b) Worm c) Virus d) Logic bomb 59 / 100 59) which one of the following translates source code to object code as a whole a) Assembler b) None c) Interpreter d) Compiler 60 / 100 60) Which of the following reason causes the syntax error a) Missing any of the delimiters b) using a variable without declaration c) Missing statement terminator d) All 61 / 100 61) which of the following language Is ideal to write business application a) PASCAL b) None c) COBOL d) BASIC 62 / 100 62) The “.exe” file is produced by:. a) Compiler b) interpreter c) linker d) Loader 63 / 100 63) Who developed C? a) Al- Khuwarizmi b) Von-Neumann c) Charles Babbage d) Dennis Ritchie 64 / 100 64) Choose the program that translates and executes one line of source code at a time. a) None b) compiler c) Assembler d) interpreter 65 / 100 65) The process of linking library files with object cod is known as: a) Saving b) Executing c) Compiler d) Linking 66 / 100 66) A person who gains illegal access to a computer system is called: a) Hacker b) Authorized person c) Computer operator d) Network controller 67 / 100 67) Computer programs are also known ac a) Firmware b) Software c) None d) Hardware 68 / 100 68) The name of header file is written between: a) ( ) b) <> c) {} 69 / 100 69) An IDE typically consists of: a) Text editor b) Debugger c) Compiler d) All 70 / 100 70) computer programs are also known as: a) Hardware b) Procedure c) Software d) None 71 / 100 71) Software that is available free for a limited period is called: a) Shareware b) Groupware c) vertical d) Freeware 72 / 100 72) Debug is the process of: a) Identifying and removing errors b) Creating bugs in program c) Removing Errors d) Identifying Errors 73 / 100 73) Writing programs in machine language is: a) Less tedious b) None c) Less time-consuming d) Both a and c 74 / 100 74) The extension of C source program is: a) .obj b) .c c) .exe d) .h 75 / 100 75) The extension of object file is: a) .c b) .exe c) .h d) .obj 76 / 100 76) conio stands for: a) Complex input output b) Common input output c) Console input output d) Character input output 77 / 100 77) The programmer usually enters source code into a computer using a) Text editor b) Linker c) Compiler d) Debugger 78 / 100 78) The virus which deletes MS Office files and disk partition information is called: a) Trojan horse b) Logic Bomb c) Book sector d) Chernobyl 79 / 100 79) Which of the following is NOT a high level language? a) BASIC b) FORTRAN c) None d) Assembly language 80 / 100 80) McAfee is an example of: a) Hacker b) Worm c) Virus d) Antivirus 81 / 100 81) Which of the following symbol is used to denote a pre-processor statement? a) # b) $ c) @ d) % 82 / 100 82) Machine language: a) is the only language understood by the computer. b) None c) All of these d) is the language in which programs were first written. 83 / 100 83) What does the # sign indicate in an instruction of C language? a) None b) Instruction for user c) Instruction for linker d) Instruction for compiler 84 / 100 84) Types of translators are: a) All b) Compilers c) None d) Assemblers 85 / 100 85) The secrets word or number used for protection is called: a) Backup b) Biometric data c) Passwords d) Private words 86 / 100 86) The processing of running an executable file is known as a) Debugging b) executing c) Saving d) Compiling 87 / 100 87) How a virus reaches from one computer to another? a) Exchange of printer b) Data is exchanged between computers c) Exchange of display screen d) Exchange of keyboard 88 / 100 88) A type of error that occurs when an instruction violates the rules programs is called: a) Runtime error b) Syntax error c) Program error d) None 89 / 100 89) B was developed in the year: a) 1992-1996 b) 1965-1975 c) 1972-1988 d) 1969-70 90 / 100 90) Which of the following syntax is used to include header file? a) #include b) Both a or b c) # include "name of the header file" d) None of these 91 / 100 91) C was developed in the year:1972 a) 1973 b) 1970 c) 1972 d) 1971 92 / 100 92) The extension of an executable file is: a) .xls b) .ext c) .exe d) .doc 93 / 100 93) Which of the following components is used to convert first.c to first.exe? a) compiler & header b) compiler & linker c) header & linker d) None 94 / 100 94) Which of the following is a biometric technique for person identification? a) Password b) PIN c) Access card d) Fingerprint 95 / 100 95) A type of language in which instructions are written in binary form is called: a) High level language b) Machine language c) None d) Assembly language 96 / 100 96) Which of the following media can be used for backup? a) Tape Device b) Zip Disk c) Floppy Diskette d) All 97 / 100 97) stdio.h is part of: a) C standard library b) Comment section c) main function d) Compiler 98 / 100 98) The process of identifying and removing errors in the programs is called: a) debugging b) Executing c) None d) Processing 99 / 100 99) Division by zero (e.g. 2/ 0) is an example a) Logic error b) None c) Run-time error d) Run-time error 100 / 100 100) which header file contains information about standard input/ output functions? a) None b) math.h c) stdio.h d) Both a and b Your score is LinkedIn Facebook Twitter VKontakte {{#message}}{{{message}}}{{/message}}{{^message}}Your submission failed. The server responded with {{status_text}} (code {{status_code}}). Please contact the developer of this form processor to improve this message. Learn More{{/message}}{{#message}}{{{message}}}{{/message}}{{^message}}It appears your submission was successful. Even though the server responded OK, it is possible the submission was not processed. Please contact the developer of this form processor to improve this message. Learn More{{/message}}Submitting…