Aiou Workshop 5403| Test 6 admin 4 years ago Spread the love /100 108 Aiou Workshop 5403| Test 6 1 / 100 1) Which of the following media can be used for backup? a) Floppy Diskette b) All c) Tape Device d) Zip Disk 2 / 100 2) Software that is available free for a limited period is called: a) vertical b) Shareware c) Freeware d) Groupware 3 / 100 3) Which of the following key is used to compile a program a) ALT+F5 b) ALT+F9 c) CTRL+F9 d) CTRL+S 4 / 100 4) The processing of running an executable file is known as a) Debugging b) executing c) Saving d) Compiling 5 / 100 5) Biometric data a) Name of a partner or spouse b) Combination of letters, numbers and symbols c) Name of a partner or spouse d) Word related to a job or hobby 6 / 100 6) Which malicious program is activated when a specific set of conditions are met? a) Worm b) Virus c) Logic bomb d) Trojan horse 7 / 100 7) An IDE typically consists of: a) Compiler b) Text editor c) Debugger d) All 8 / 100 8) The [ascetic] militant Chinese have gone straight to the roots of the problems. a) religious b) secular c) professional d) trained 9 / 100 9) Which of the following language provided the basis for the development C a) B b) C++ c) Pascal d) Java 10 / 100 10) Machine language: a) All of these b) None c) is the only language understood by the computer. d) is the language in which programs were first written. 11 / 100 11) Debug is the process of: a) Creating bugs in program b) Removing Errors c) Identifying and removing errors d) Identifying Errors 12 / 100 12) Which of the following syntax is used to include header file? a) # include "name of the header file" b) Both a or b c) #include d) None of these 13 / 100 13) Which of the following components is used to convert first.c to first.exe? a) header & linker b) compiler & header c) compiler & linker d) None 14 / 100 14) B was developed in the year: a) 1972-1988 b) 1965-1975 c) 1969-70 d) 1992-1996 15 / 100 15) Which of the following symbol is used to denote a pre-processor statement? a) @ b) # c) % d) $ 16 / 100 16) Making illegal copies of copyrighted software is called: a) Software distribution b) Software Browsing c) Software piracy d) Software hacking 17 / 100 17) Types of translators are: a) Compilers b) All c) Assemblers d) None 18 / 100 18) The extension of the header file is: a) .h b) .CPP c) .txt d) .c 19 / 100 19) stdio stands for: a) Symbolic input output b) Simple input output c) String input-output d) Standard input output 20 / 100 20) A well-defined set of instructions given to the computer is called: a) None b) Software c) Bug d) Hardware 21 / 100 21) The virus which deletes MS Office files and disk partition information is called: a) Chernobyl b) Logic Bomb c) Trojan horse d) Book sector 22 / 100 22) Which of the following is computer virus? a) All of these b) Chernobyl c) Reflof d) Logic Bomb 23 / 100 23) An assembly language uses: a) Mnemonic Codes b) English Words c) Binary Digit d) None 24 / 100 24) Trojan Horse is a type of: a) Antivirus b) Software c) Virus d) Horse 25 / 100 25) C programs are divided into units called: a) Section b) Functions c) debug d) Syntax 26 / 100 26) Another name for free software is: a) Encrypted software b) Shareware c) Copy protected software d) Public domain software 27 / 100 27) What does the following code print on screen? printf(‘hello’); a) None b) HELLO c) Hello d) hello 28 / 100 28) McAfee is an example of: a) Antivirus b) Worm c) Virus d) Hacker 29 / 100 29) The process of identifying and removing errors in the programs is called: a) debugging b) None c) Processing d) Executing 30 / 100 30) A program’s syntax errors is detected by: a) Linker b) Loader c) Compiler d) Debugger 31 / 100 31) void occupy how many bytes in memory? a) 3 b) 1 c) 2 d) 0 32 / 100 32) How a virus reaches from one computer to another? a) Exchange of printer b) Exchange of keyboard c) Data is exchanged between computers d) Exchange of display screen 33 / 100 33) Which of the following is NOT an example of a program bug? a) Logic error b) Operator error c) Syntax error d) Run-time error 34 / 100 34) Another name for antivirus is: a) Logic Bomb b) Vaccine c) Trojan horse d) DES 35 / 100 35) Computer virus is simply a: a) A disease b) Set of computer instructions or code c) Type of bacteria d) Hardware component 36 / 100 36) Which of the following key is used to save a file? a) F5 b) F3 c) F2 d) F9 37 / 100 37) The name of header file is written between: a) ( ) b) <> c) {} 38 / 100 38) Which of the following is not cause of virus? a) Logic bomb b) Pirated software c) E-mail d) Networks 39 / 100 39) A spelling error (e.g. typing intt instead of int) is an example of: a) Logic error b) None c) Run-time error d) Syntax error 40 / 100 40) C was developed in the year:1972 a) 1972 b) 1973 c) 1970 d) 1971 41 / 100 41) A set of illegal instructions inserted into a legitimate computer program is called: a) Trapdoor b) Worm c) Bomb d) Trojan horse 42 / 100 42) The programmer usually enters source code into a computer using a) Debugger b) Compiler c) Linker d) Text editor 43 / 100 43) Division by zero (e.g. 2/ 0) is an example a) Run-time error b) None c) Run-time error d) Logic error 44 / 100 44) C was designed to write program for: a) Solaris operating system b) OS/2 operating system c) Unix operating system d) Windows operating system 45 / 100 45) The statements written by the programmer are called: a) None b) Syntax c) Object code d) Source code 46 / 100 46) The extension of C source program is: a) .obj b) .c c) .exe d) .h 47 / 100 47) The extension of object file is: a) .c b) .exe c) .obj d) .h 48 / 100 48) stdio.h is part of: a) main function b) Compiler c) C standard library d) Comment section 49 / 100 49) A program that interferes with the normal working of a computer is called: a) Freeware b) Antivirus c) Bateria d) Virus 50 / 100 50) Who is responsible of security of online data? a) LAN Administrator b) User c) Internet Service provider d) Organization obtaining the data 51 / 100 51) Which of the following is a compiler directive? a) main ( ) b) #include c) All d) Using namespace std; 52 / 100 52) The extension of an executable file is: a) .xls b) .doc c) .exe d) .ext 53 / 100 53) The expression may be: a) Constant b) All c) string d) arithmetic expression 54 / 100 54) The process of linking library files with object cod is known as: a) Executing b) Compiler c) Saving d) Linking 55 / 100 55) which of the following language Is ideal to write business application a) None b) COBOL c) BASIC d) PASCAL 56 / 100 56) Which file contains the program after translation into machine language a) Object file b) exe file c) None d) Source file 57 / 100 57) Writing programs in machine language is: a) None b) Both a and c c) Less time-consuming d) Less tedious 58 / 100 58) which header file contains information about standard input/ output functions? a) None b) Both a and b c) math.h d) stdio.h 59 / 100 59) Which of the following language requires no translator to execute the program? a) Machine language b) C c) C++ d) Assembly language 60 / 100 60) Who developed C? a) Charles Babbage b) Al- Khuwarizmi c) Von-Neumann d) Dennis Ritchie 61 / 100 61) A person who gains illegal access to a computer system is called: a) Computer operator b) Authorized person c) Hacker d) Network controller 62 / 100 62) A type of language in which instructions are written in binary form is called: a) High level language b) None c) Assembly language d) Machine language 63 / 100 63) A type of error that occurs when an instruction violates the rules programs is called: a) Runtime error b) None c) Syntax error d) Program error 64 / 100 64) conio stands for: a) Complex input output b) Console input output c) Character input output d) Common input output 65 / 100 65) Which of the following is not a biometric technique: a) Badge b) Face c) Retina d) Palm print 66 / 100 66) Computer programs are also known ac a) None b) Hardware c) Software d) Firmware 67 / 100 67) The restricted access to the server computer room is a form of: a) Logical security b) Enterprise security c) User security d) Physical security 68 / 100 68) Which of the following is the most damaging loss to a company? a) Loss of data b) Loss of software c) Loss of hardware d) Loss of printouts 69 / 100 69) Which of the following is NOT a high level language? a) Assembly language b) FORTRAN c) None d) BASIC 70 / 100 70) Which of the following key is used to load a program it memory to run? a) CTRL+F9 b) CTRL+S c) ALT+F9 d) ALT+F5 71 / 100 71) The right to use the software on the computer is called: a) Software piracy b) Intellectual property right c) Site License d) Software copyright 72 / 100 72) Which of the following one is not a virus? a) Trojan Horse b) MCAfee c) Logic Bomb d) Reflof 73 / 100 73) Which of the following does not contain machine language code? a) Library module b) Object module c) Source module d) None 74 / 100 74) Which term is commonly used to refer to software or program errors: a) Short circuit b) Bug c) Down d) Crash 75 / 100 75) Which of the following is an authentication methodology? a) PIN b) Piracy c) Access cards d) Biometrics 76 / 100 76) For every opening brace in a C program, there must be a: a) None b) Comma c) Colon d) Closing brace 77 / 100 77) Header files in C contain: a) Library functions b) Operators for files c) Compiler commands d) Header information of C programs 78 / 100 78) An IDE stands for: a) Internal disk error b) Input Desktop environment c) Input data error d) Integrated Development Environment 79 / 100 79) Which of the following is a biometric technique for person identification? a) PIN b) Access card c) Password d) Fingerprint 80 / 100 80) Choose the program that translates and executes one line of source code at a time. a) None b) compiler c) Assembler d) interpreter 81 / 100 81) Which of the following errors are NOT detected by compiler? a) None b) Syntax error c) Logical error d) Both a and b 82 / 100 82) C statements end with a: a) semicolon b) semicolon c) Period d) None 83 / 100 83) Which of the following is harmful for computers? a) Freeware b) Antivirus c) Shareware d) Virus 84 / 100 84) What does the # sign indicate in an instruction of C language? a) Instruction for linker b) Instruction for compiler c) Instruction for user d) None 85 / 100 85) The secrets word or number used for protection is called: a) Passwords b) Biometric data c) Private words d) Backup 86 / 100 86) The process of converting source code into object code,is knows as: a) Saving b) Linking c) Executing d) Compiling 87 / 100 87) Compiled programs typically, execute faster because: a) Compiled programs do not require any data b) None of the above c) Compiled programs are read and executed a line at a time d) Compiled programs are already in a machine-readable form. 88 / 100 88) The right of a person to keep his personal information away from others is called: a) Secrecy b) Privacy c) Right d) Private 89 / 100 89) A virus that replicates itself is called: a) Bomb b) Bug c) Worm d) Vaccine 90 / 100 90) A special program that can detect and remove viruses from computer is called: a) Groupware b) Anti-Virus c) Virus d) Custom 91 / 100 91) This is a complete instruction that causes the computer to perform some action: a) Keyword b) Statement c) Line d) None 92 / 100 92) Protecting computers and the information they contain against unwanted access is called: a) Computer security b) Electronic policing c) Computer monitoring d) Audit control 93 / 100 93) Which of the following reason causes the syntax error a) using a variable without declaration b) Missing any of the delimiters c) All d) Missing statement terminator 94 / 100 94) Mistakes that cause a running program to produce incorrect results are called: a) Syntax error b) Logic error c) None d) Program error 95 / 100 95) The expression in define directive: a) Can only be changed at the end of the program b) Cannot be changed c) Can not be changed but can be redefined d) Cannot be assigned a value 96 / 100 96) The basic structure of C program consists of: a) Program body b) Preprocessor Directive c) main() function d) All 97 / 100 97) A statement that starts with a # is called a: a) None b) Comment c) Preprocessor directive d) Keyword 98 / 100 98) Which of the following is not an antivirus program? a) McAfee b) Norton c) Redlof d) Avast 99 / 100 99) Processor directives are command for a) Microprocessor b) Loader c) C preprocessor d) Language Processor 100 / 100 100) An additional or spare copy of data stored on storage media is call: a) Moving of Data b) Backup of data c) Additional data d) Copying of Data Your score is LinkedIn Facebook Twitter VKontakte {{#message}}{{{message}}}{{/message}}{{^message}}Your submission failed. The server responded with {{status_text}} (code {{status_code}}). Please contact the developer of this form processor to improve this message. Learn More{{/message}}{{#message}}{{{message}}}{{/message}}{{^message}}It appears your submission was successful. Even though the server responded OK, it is possible the submission was not processed. Please contact the developer of this form processor to improve this message. Learn More{{/message}}Submitting…