Aiou Workshop 5403| Test 6 admin 3 years ago Spread the love /100 108 Aiou Workshop 5403| Test 6 1 / 100 1) An assembly language uses: a) None b) English Words c) Binary Digit d) Mnemonic Codes 2 / 100 2) An IDE stands for: a) Integrated Development Environment b) Input Desktop environment c) Internal disk error d) Input data error 3 / 100 3) C statements end with a: a) None b) semicolon c) semicolon d) Period 4 / 100 4) Which of the following key is used to compile a program a) ALT+F9 b) CTRL+S c) ALT+F5 d) CTRL+F9 5 / 100 5) C programs are divided into units called: a) debug b) Syntax c) Functions d) Section 6 / 100 6) A special program that can detect and remove viruses from computer is called: a) Groupware b) Custom c) Anti-Virus d) Virus 7 / 100 7) The right to use the software on the computer is called: a) Site License b) Software copyright c) Intellectual property right d) Software piracy 8 / 100 8) Making illegal copies of copyrighted software is called: a) Software piracy b) Software distribution c) Software Browsing d) Software hacking 9 / 100 9) computer programs are also known as: a) Procedure b) None c) Software d) Hardware 10 / 100 10) Which of the following errors are NOT detected by compiler? a) Logical error b) None c) Both a and b d) Syntax error 11 / 100 11) Which of the following is harmful for computers? a) Antivirus b) Freeware c) Virus d) Shareware 12 / 100 12) Machine language: a) is the language in which programs were first written. b) is the only language understood by the computer. c) None d) All of these 13 / 100 13) The extension of an executable file is: a) .doc b) .xls c) .exe d) .ext 14 / 100 14) Which of the following is computer virus? a) All of these b) Reflof c) Logic Bomb d) Chernobyl 15 / 100 15) Who is responsible of security of online data? a) Organization obtaining the data b) User c) Internet Service provider d) LAN Administrator 16 / 100 16) The expression in define directive: a) Cannot be assigned a value b) Cannot be changed c) Can not be changed but can be redefined d) Can only be changed at the end of the program 17 / 100 17) A statement that starts with a # is called a: a) Keyword b) Preprocessor directive c) None d) Comment 18 / 100 18) Computer programs are also known ac a) Software b) Firmware c) None d) Hardware 19 / 100 19) An additional or spare copy of data stored on storage media is call: a) Copying of Data b) Additional data c) Moving of Data d) Backup of data 20 / 100 20) An IDE typically consists of: a) Debugger b) Compiler c) All d) Text editor 21 / 100 21) Which of the following reason causes the syntax error a) Missing any of the delimiters b) using a variable without declaration c) All d) Missing statement terminator 22 / 100 22) C was developed in the year:1972 a) 1972 b) 1971 c) 1970 d) 1973 23 / 100 23) A set of rules that must be followed to develop a program is called: a) Syntax b) Bug c) Debug d) Preprocessor 24 / 100 24) C was designed to write program for: a) OS/2 operating system b) Unix operating system c) Solaris operating system d) Windows operating system 25 / 100 25) The lowest level of programming language is: a) Pascal b) Java c) Assembly Language d) None 26 / 100 26) The name of header file is written between: a) ( ) b) <> c) {} 27 / 100 27) Which of the following is a compiler directive? a) #include b) Using namespace std; c) All d) main ( ) 28 / 100 28) Most computer crime are committed by: a) Hackers b) Highly paid computer consultant c) International spies d) Computer operators 29 / 100 29) Which of the following is not cause of virus? a) Pirated software b) E-mail c) Logic bomb d) Networks 30 / 100 30) The right of a person to keep his personal information away from others is called: a) Secrecy b) Privacy c) Private d) Right 31 / 100 31) Which of the following is the most damaging loss to a company? a) Loss of printouts b) Loss of software c) Loss of data d) Loss of hardware 32 / 100 32) The expression may be: a) All b) Constant c) string d) arithmetic expression 33 / 100 33) Which of the following key is used to load a program it memory to run? a) ALT+F9 b) CTRL+F9 c) ALT+F5 d) CTRL+S 34 / 100 34) The secrets word or number used for protection is called: a) Backup b) Biometric data c) Passwords d) Private words 35 / 100 35) A type of language in which instructions are written in binary form is called: a) Machine language b) None c) Assembly language d) High level language 36 / 100 36) The [ascetic] militant Chinese have gone straight to the roots of the problems. a) religious b) secular c) professional d) trained 37 / 100 37) Which of the following does not contain machine language code? a) None b) Object module c) Source module d) Library module 38 / 100 38) The extension of C source program is: a) .exe b) .h c) .c d) .obj 39 / 100 39) which header file contains information about standard input/ output functions? a) stdio.h b) None c) math.h d) Both a and b 40 / 100 40) What does the following code print on screen? printf(‘hello’); a) Hello b) HELLO c) None d) hello 41 / 100 41) void occupy how many bytes in memory? a) 3 b) 0 c) 2 d) 1 42 / 100 42) A set of illegal instructions inserted into a legitimate computer program is called: a) Bomb b) Trapdoor c) Trojan horse d) Worm 43 / 100 43) The extension of the header file is: a) .c b) .h c) .txt d) .CPP 44 / 100 44) Which of the following viruses executes when starting the computer? a) Salami shaving b) Macro c) File infector d) Boot sector 45 / 100 45) The restricted access to the server computer room is a form of: a) User security b) Logical security c) Physical security d) Enterprise security 46 / 100 46) Which of the following one is not a virus? a) Logic Bomb b) MCAfee c) Trojan Horse d) Reflof 47 / 100 47) The virus which deletes MS Office files and disk partition information is called: a) Trojan horse b) Logic Bomb c) Book sector d) Chernobyl 48 / 100 48) Protecting computers and the information they contain against unwanted access is called: a) Computer security b) Electronic policing c) Computer monitoring d) Audit control 49 / 100 49) The extension of object file is: a) .c b) .exe c) .h d) .obj 50 / 100 50) Software that is available free for a limited period is called: a) Shareware b) vertical c) Groupware d) Freeware 51 / 100 51) Which of the following components is used to convert first.c to first.exe? a) header & linker b) None c) compiler & header d) compiler & linker 52 / 100 52) For every opening brace in a C program, there must be a: a) Colon b) Comma c) Closing brace d) None 53 / 100 53) Header files in C contain: a) Library functions b) Operators for files c) Compiler commands d) Header information of C programs 54 / 100 54) The programmer usually enters source code into a computer using a) Debugger b) Text editor c) Compiler d) Linker 55 / 100 55) Which of the following is NOT an example of a program bug? a) Syntax error b) Operator error c) Run-time error d) Logic error 56 / 100 56) Which of the following is the native language of computer? a) Machine language b) DOS c) Pascal d) None 57 / 100 57) What does the # sign indicate in an instruction of C language? a) Instruction for user b) None c) Instruction for linker d) Instruction for compiler 58 / 100 58) B was developed in the year: a) 1992-1996 b) 1972-1988 c) 1965-1975 d) 1969-70 59 / 100 59) A person who gains illegal access to a computer system is called: a) Network controller b) Computer operator c) Hacker d) Authorized person 60 / 100 60) A virus that replicates itself is called: a) Bomb b) Worm c) Vaccine d) Bug 61 / 100 61) Computer virus is simply a: a) Set of computer instructions or code b) Type of bacteria c) Hardware component d) A disease 62 / 100 62) The statements written by the programmer are called: a) Source code b) None c) Object code d) Syntax 63 / 100 63) Division by zero (e.g. 2/ 0) is an example a) Run-time error b) Run-time error c) Logic error d) None 64 / 100 64) The output of the compiler is called: a) Source code b) Linked code c) Object code d) Library code 65 / 100 65) Which of the following symbol is used to denote a pre-processor statement? a) % b) # c) $ d) @ 66 / 100 66) conio stands for: a) Common input output b) Complex input output c) Character input output d) Console input output 67 / 100 67) Types of translators are: a) All b) None c) Assemblers d) Compilers 68 / 100 68) A spelling error (e.g. typing intt instead of int) is an example of: a) Syntax error b) Logic error c) None d) Run-time error 69 / 100 69) Another name for antivirus is: a) Trojan horse b) Vaccine c) Logic Bomb d) DES 70 / 100 70) Debug is the process of: a) Identifying Errors b) Removing Errors c) Identifying and removing errors d) Creating bugs in program 71 / 100 71) The process of identifying and removing errors in the programs is called: a) Processing b) debugging c) None d) Executing 72 / 100 72) Which of the following is an authentication methodology? a) Piracy b) Access cards c) Biometrics d) PIN 73 / 100 73) Which of the following language provided the basis for the development C a) C++ b) Java c) Pascal d) B 74 / 100 74) How a virus reaches from one computer to another? a) Data is exchanged between computers b) Exchange of display screen c) Exchange of printer d) Exchange of keyboard 75 / 100 75) Which of the following is NOT a high level language? a) BASIC b) Assembly language c) None d) FORTRAN 76 / 100 76) FormatC is an example of: a) Chernobal b) Trojan horse c) Boot sector d) Logic Bomb 77 / 100 77) Processor directives are command for a) C preprocessor b) Loader c) Language Processor d) Microprocessor 78 / 100 78) McAfee is an example of: a) Worm b) Virus c) Antivirus d) Hacker 79 / 100 79) Which of the following is not a biometric technique: a) Retina b) Badge c) Palm print d) Face 80 / 100 80) Which of the following media can be used for backup? a) All b) Tape Device c) Floppy Diskette d) Zip Disk 81 / 100 81) stdio.h is part of: a) main function b) Comment section c) Compiler d) C standard library 82 / 100 82) Security protection for personal computers includes: a) All of these b) Software c) Internal components d) Locks and cables 83 / 100 83) Mistakes that cause a running program to produce incorrect results are called: a) Program error b) Syntax error c) None d) Logic error 84 / 100 84) A program that interferes with the normal working of a computer is called: a) Bateria b) Virus c) Freeware d) Antivirus 85 / 100 85) Writing programs in machine language is: a) None b) Both a and c c) Less time-consuming d) Less tedious 86 / 100 86) Which of the following is not an antivirus program? a) Redlof b) Norton c) Avast d) McAfee 87 / 100 87) The processing of running an executable file is known as a) executing b) Compiling c) Saving d) Debugging 88 / 100 88) C is a: a) Low-level language b) High level language c) Machine Language d) Assembly language 89 / 100 89) This is a complete instruction that causes the computer to perform some action: a) Line b) Statement c) Keyword d) None 90 / 100 90) Biometric data a) Name of a partner or spouse b) Word related to a job or hobby c) Name of a partner or spouse d) Combination of letters, numbers and symbols 91 / 100 91) Trojan Horse is a type of: a) Antivirus b) Software c) Virus d) Horse 92 / 100 92) The “.exe” file is produced by:. a) Compiler b) Loader c) linker d) interpreter 93 / 100 93) Another name for free software is: a) Copy protected software b) Shareware c) Public domain software d) Encrypted software 94 / 100 94) A type of error that occurs when an instruction violates the rules programs is called: a) Runtime error b) None c) Program error d) Syntax error 95 / 100 95) which of the following language Is ideal to write business application a) PASCAL b) None c) BASIC d) COBOL 96 / 100 96) main is a a) Function b) Compiler directive c) Expression d) Comment 97 / 100 97) A program’s syntax errors is detected by: a) Debugger b) Loader c) Compiler d) Linker 98 / 100 98) Which file contains the program after translation into machine language a) Object file b) None c) exe file d) Source file 99 / 100 99) Which malicious program is activated when a specific set of conditions are met? a) Virus b) Worm c) Logic bomb d) Trojan horse 100 / 100 100) which one of the following translates source code to object code as a whole a) Interpreter b) Assembler c) Compiler d) None Your score is LinkedIn Facebook Twitter VKontakte {{#message}}{{{message}}}{{/message}}{{^message}}Your submission failed. The server responded with {{status_text}} (code {{status_code}}). Please contact the developer of this form processor to improve this message. Learn More{{/message}}{{#message}}{{{message}}}{{/message}}{{^message}}It appears your submission was successful. Even though the server responded OK, it is possible the submission was not processed. Please contact the developer of this form processor to improve this message. Learn More{{/message}}Submitting…