Aiou Workshop 5403| Test 6 admin 4 years ago Spread the love /100 108 Aiou Workshop 5403| Test 6 1 / 100 1) The process of converting source code into object code,is knows as: a) Executing b) Linking c) Saving d) Compiling 2 / 100 2) which Program that translates assembly language code to machine code a) Debugger b) Assembler c) Translator d) Converter 3 / 100 3) The virus which deletes MS Office files and disk partition information is called: a) Logic Bomb b) Chernobyl c) Book sector d) Trojan horse 4 / 100 4) Which of the following is harmful for computers? a) Freeware b) Shareware c) Antivirus d) Virus 5 / 100 5) Another name for antivirus is: a) Logic Bomb b) DES c) Trojan horse d) Vaccine 6 / 100 6) Compiled programs typically, execute faster because: a) Compiled programs do not require any data b) None of the above c) Compiled programs are read and executed a line at a time d) Compiled programs are already in a machine-readable form. 7 / 100 7) void occupy how many bytes in memory? a) 3 b) 0 c) 1 d) 2 8 / 100 8) Which of the following language provided the basis for the development C a) C++ b) Pascal c) Java d) B 9 / 100 9) Which of the following is the native language of computer? a) Machine language b) DOS c) None d) Pascal 10 / 100 10) A program’s syntax errors is detected by: a) Debugger b) Linker c) Compiler d) Loader 11 / 100 11) Who developed C? a) Dennis Ritchie b) Charles Babbage c) Von-Neumann d) Al- Khuwarizmi 12 / 100 12) The process of linking library files with object cod is known as: a) Executing b) Saving c) Compiler d) Linking 13 / 100 13) C was developed in the year:1972 a) 1971 b) 1973 c) 1972 d) 1970 14 / 100 14) Which file contains the program after translation into machine language a) None b) Source file c) Object file d) exe file 15 / 100 15) Processor directives are command for a) Loader b) Language Processor c) C preprocessor d) Microprocessor 16 / 100 16) Which of the following is the most damaging loss to a company? a) Loss of software b) Loss of data c) Loss of printouts d) Loss of hardware 17 / 100 17) A type of error that occurs when an instruction violates the rules programs is called: a) Syntax error b) None c) Runtime error d) Program error 18 / 100 18) Which of the following is a compiler directive? a) main ( ) b) Using namespace std; c) #include d) All 19 / 100 19) Debug is the process of: a) Creating bugs in program b) Removing Errors c) Identifying Errors d) Identifying and removing errors 20 / 100 20) Which term is commonly used to refer to software or program errors: a) Short circuit b) Bug c) Down d) Crash 21 / 100 21) A statement that starts with a # is called a: a) Preprocessor directive b) None c) Keyword d) Comment 22 / 100 22) Division by zero (e.g. 2/ 0) is an example a) Logic error b) Run-time error c) None d) Run-time error 23 / 100 23) A virus that replicates itself is called: a) Vaccine b) Bomb c) Worm d) Bug 24 / 100 24) An IDE stands for: a) Input Desktop environment b) Integrated Development Environment c) Internal disk error d) Input data error 25 / 100 25) An additional or spare copy of data stored on storage media is call: a) Backup of data b) Copying of Data c) Additional data d) Moving of Data 26 / 100 26) C is a: a) Low-level language b) Assembly language c) Machine Language d) High level language 27 / 100 27) B was developed in the year: a) 1992-1996 b) 1965-1975 c) 1969-70 d) 1972-1988 28 / 100 28) Which of the following viruses executes when starting the computer? a) File infector b) Boot sector c) Salami shaving d) Macro 29 / 100 29) Trojan Horse is a type of: a) Virus b) Software c) Antivirus d) Horse 30 / 100 30) computer programs are also known as: a) Software b) None c) Procedure d) Hardware 31 / 100 31) The processing of running an executable file is known as a) executing b) Debugging c) Saving d) Compiling 32 / 100 32) McAfee is an example of: a) Worm b) Antivirus c) Virus d) Hacker 33 / 100 33) Who is responsible of security of online data? a) Organization obtaining the data b) LAN Administrator c) User d) Internet Service provider 34 / 100 34) Which malicious program is activated when a specific set of conditions are met? a) Virus b) Trojan horse c) Logic bomb d) Worm 35 / 100 35) Which of the following key is used to compile a program a) ALT+F9 b) ALT+F5 c) CTRL+F9 d) CTRL+S 36 / 100 36) Writing programs in machine language is: a) None b) Less tedious c) Both a and c d) Less time-consuming 37 / 100 37) The extension of the header file is: a) .h b) .c c) .CPP d) .txt 38 / 100 38) A program that interferes with the normal working of a computer is called: a) Freeware b) Bateria c) Antivirus d) Virus 39 / 100 39) The secrets word or number used for protection is called: a) Biometric data b) Backup c) Private words d) Passwords 40 / 100 40) A set of rules that must be followed to develop a program is called: a) Preprocessor b) Debug c) Bug d) Syntax 41 / 100 41) Which of the following language requires no translator to execute the program? a) Assembly language b) C++ c) Machine language d) C 42 / 100 42) A set of illegal instructions inserted into a legitimate computer program is called: a) Trapdoor b) Worm c) Bomb d) Trojan horse 43 / 100 43) Which of the following key is used to load a program it memory to run? a) ALT+F9 b) CTRL+F9 c) CTRL+S d) ALT+F5 44 / 100 44) Which of the following is NOT an example of a program bug? a) Run-time error b) Logic error c) Operator error d) Syntax error 45 / 100 45) which one of the following translates source code to object code as a whole a) Interpreter b) Compiler c) None d) Assembler 46 / 100 46) Which of the following does not contain machine language code? a) Library module b) Source module c) None d) Object module 47 / 100 47) Software that is available free for a limited period is called: a) Shareware b) Freeware c) Groupware d) vertical 48 / 100 48) For every opening brace in a C program, there must be a: a) None b) Colon c) Comma d) Closing brace 49 / 100 49) Another name for free software is: a) Shareware b) Public domain software c) Copy protected software d) Encrypted software 50 / 100 50) What does the following code print on screen? printf(‘hello’); a) None b) HELLO c) Hello d) hello 51 / 100 51) Which of the following is computer virus? a) Logic Bomb b) Chernobyl c) Reflof d) All of these 52 / 100 52) The basic structure of C program consists of: a) Preprocessor Directive b) main() function c) Program body d) All 53 / 100 53) Turbo C++ can compile a) Turbo C Programs only b) Turbo C++ Programs only c) C and C++ programs d) C programs only 54 / 100 54) conio stands for: a) Common input output b) Console input output c) Character input output d) Complex input output 55 / 100 55) The lowest level of programming language is: a) Assembly Language b) Pascal c) Java d) None 56 / 100 56) which of the following language Is ideal to write business application a) None b) BASIC c) COBOL d) PASCAL 57 / 100 57) Which of the following media can be used for backup? a) Tape Device b) All c) Zip Disk d) Floppy Diskette 58 / 100 58) The expression may be: a) string b) Constant c) arithmetic expression d) All 59 / 100 59) Types of translators are: a) None b) All c) Compilers d) Assemblers 60 / 100 60) A well-defined set of instructions given to the computer is called: a) Software b) Bug c) None d) Hardware 61 / 100 61) Which of the following is a biometric technique for person identification? a) Password b) Access card c) PIN d) Fingerprint 62 / 100 62) The extension of C source program is: a) .c b) .h c) .exe d) .obj 63 / 100 63) The expression in define directive: a) Can not be changed but can be redefined b) Can only be changed at the end of the program c) Cannot be assigned a value d) Cannot be changed 64 / 100 64) The right to use the software on the computer is called: a) Intellectual property right b) Software piracy c) Software copyright d) Site License 65 / 100 65) Header files in C contain: a) Header information of C programs b) Operators for files c) Compiler commands d) Library functions 66 / 100 66) Which of the following is an authentication methodology? a) Biometrics b) Piracy c) PIN d) Access cards 67 / 100 67) FormatC is an example of: a) Trojan horse b) Logic Bomb c) Chernobal d) Boot sector 68 / 100 68) An assembly language uses: a) English Words b) Binary Digit c) Mnemonic Codes d) None 69 / 100 69) stdio stands for: a) Symbolic input output b) String input-output c) Standard input output d) Simple input output 70 / 100 70) The process of identifying and removing errors in the programs is called: a) Processing b) Executing c) debugging d) None 71 / 100 71) The right of a person to keep his personal information away from others is called: a) Privacy b) Right c) Private d) Secrecy 72 / 100 72) Most computer crime are committed by: a) International spies b) Hackers c) Computer operators d) Highly paid computer consultant 73 / 100 73) The statements written by the programmer are called: a) Object code b) None c) Source code d) Syntax 74 / 100 74) Computer programs are also known ac a) None b) Firmware c) Hardware d) Software 75 / 100 75) Choose the program that translates and executes one line of source code at a time. a) interpreter b) compiler c) Assembler d) None 76 / 100 76) How a virus reaches from one computer to another? a) Exchange of printer b) Exchange of keyboard c) Exchange of display screen d) Data is exchanged between computers 77 / 100 77) The extension of an executable file is: a) .doc b) .xls c) .ext d) .exe 78 / 100 78) The “.exe” file is produced by:. a) interpreter b) Loader c) linker d) Compiler 79 / 100 79) Security protection for personal computers includes: a) All of these b) Software c) Internal components d) Locks and cables 80 / 100 80) Which of the following is NOT a high level language? a) FORTRAN b) Assembly language c) None d) BASIC 81 / 100 81) A type of language in which instructions are written in binary form is called: a) Assembly language b) Machine language c) High level language d) None 82 / 100 82) Which of the following one is not a virus? a) Trojan Horse b) MCAfee c) Logic Bomb d) Reflof 83 / 100 83) The programmer usually enters source code into a computer using a) Text editor b) Linker c) Debugger d) Compiler 84 / 100 84) An IDE typically consists of: a) All b) Compiler c) Debugger d) Text editor 85 / 100 85) Which of the following syntax is used to include header file? a) None of these b) # include "name of the header file" c) #include d) Both a or b 86 / 100 86) Which of the following is not a biometric technique: a) Face b) Badge c) Retina d) Palm print 87 / 100 87) This is a complete instruction that causes the computer to perform some action: a) None b) Line c) Statement d) Keyword 88 / 100 88) which of the following header a) conio.h b) math.h c) None d) stdio.h 89 / 100 89) Mistakes that cause a running program to produce incorrect results are called: a) Program error b) None c) Logic error d) Syntax error 90 / 100 90) A special program that can detect and remove viruses from computer is called: a) Custom b) Virus c) Anti-Virus d) Groupware 91 / 100 91) The output of the compiler is called: a) Library code b) Object code c) Source code d) Linked code 92 / 100 92) Which of the following reason causes the syntax error a) All b) Missing any of the delimiters c) Missing statement terminator d) using a variable without declaration 93 / 100 93) The restricted access to the server computer room is a form of: a) Physical security b) Enterprise security c) Logical security d) User security 94 / 100 94) C was designed to write program for: a) Solaris operating system b) Unix operating system c) OS/2 operating system d) Windows operating system 95 / 100 95) which header file contains information about standard input/ output functions? a) stdio.h b) math.h c) Both a and b d) None 96 / 100 96) main is a a) Expression b) Comment c) Compiler directive d) Function 97 / 100 97) C statements end with a: a) semicolon b) semicolon c) None d) Period 98 / 100 98) Which of the following errors are NOT detected by compiler? a) None b) Both a and b c) Logical error d) Syntax error 99 / 100 99) A spelling error (e.g. typing intt instead of int) is an example of: a) Logic error b) Run-time error c) None d) Syntax error 100 / 100 100) Making illegal copies of copyrighted software is called: a) Software piracy b) Software hacking c) Software Browsing d) Software distribution Your score is LinkedIn Facebook Twitter VKontakte {{#message}}{{{message}}}{{/message}}{{^message}}Your submission failed. The server responded with {{status_text}} (code {{status_code}}). Please contact the developer of this form processor to improve this message. Learn More{{/message}}{{#message}}{{{message}}}{{/message}}{{^message}}It appears your submission was successful. Even though the server responded OK, it is possible the submission was not processed. Please contact the developer of this form processor to improve this message. Learn More{{/message}}Submitting…