Spread the love/100 108 Aiou Workshop 5403| Test 6 1 / 100 1) A well-defined set of instructions given to the computer is called: a) Bug b) None c) Hardware d) Software 2 / 100 2) FormatC is an example of: a) Boot sector b) Logic Bomb c) Trojan horse d) Chernobal 3 / 100 3) A spelling error (e.g. typing intt instead of int) is an example of: a) Run-time error b) Syntax error c) None d) Logic error 4 / 100 4) C was developed in the year:1972 a) 1970 b) 1972 c) 1973 d) 1971 5 / 100 5) Which of the following is NOT an example of a program bug? a) Logic error b) Operator error c) Run-time error d) Syntax error 6 / 100 6) The extension of object file is: a) .exe b) .c c) .h d) .obj 7 / 100 7) An assembly language uses: a) Mnemonic Codes b) Binary Digit c) English Words d) None 8 / 100 8) Types of translators are: a) Compilers b) All c) Assemblers d) None 9 / 100 9) C programs are divided into units called: a) Syntax b) Functions c) Section d) debug 10 / 100 10) Which of the following language provided the basis for the development C a) B b) Java c) C++ d) Pascal 11 / 100 11) Which of the following is the native language of computer? a) Pascal b) DOS c) None d) Machine language 12 / 100 12) An IDE stands for: a) Integrated Development Environment b) Input data error c) Input Desktop environment d) Internal disk error 13 / 100 13) Choose the program that translates and executes one line of source code at a time. a) interpreter b) Assembler c) None d) compiler 14 / 100 14) Which of the following is harmful for computers? a) Shareware b) Virus c) Antivirus d) Freeware 15 / 100 15) C was designed to write program for: a) Solaris operating system b) OS/2 operating system c) Windows operating system d) Unix operating system 16 / 100 16) Machine language: a) is the language in which programs were first written. b) is the only language understood by the computer. c) All of these d) None 17 / 100 17) Which of the following is an authentication methodology? a) Access cards b) PIN c) Biometrics d) Piracy 18 / 100 18) A virus that replicates itself is called: a) Worm b) Bomb c) Bug d) Vaccine 19 / 100 19) Which of the following syntax is used to include header file? a) #include b) None of these c) Both a or b d) # include "name of the header file" 20 / 100 20) Which of the following components is used to convert first.c to first.exe? a) None b) header & linker c) compiler & linker d) compiler & header 21 / 100 21) The process of converting source code into object code,is knows as: a) Linking b) Compiling c) Saving d) Executing 22 / 100 22) A type of language in which instructions are written in binary form is called: a) None b) High level language c) Machine language d) Assembly language 23 / 100 23) The processing of running an executable file is known as a) Debugging b) Compiling c) executing d) Saving 24 / 100 24) Which of the following is the most damaging loss to a company? a) Loss of hardware b) Loss of software c) Loss of printouts d) Loss of data 25 / 100 25) An additional or spare copy of data stored on storage media is call: a) Copying of Data b) Moving of Data c) Additional data d) Backup of data 26 / 100 26) Which of the following is not a biometric technique: a) Palm print b) Retina c) Face d) Badge 27 / 100 27) What does the # sign indicate in an instruction of C language? a) Instruction for compiler b) Instruction for linker c) Instruction for user d) None 28 / 100 28) A set of rules that must be followed to develop a program is called: a) Preprocessor b) Debug c) Bug d) Syntax 29 / 100 29) Security protection for personal computers includes: a) Locks and cables b) Software c) All of these d) Internal components 30 / 100 30) Which of the following is not cause of virus? a) Logic bomb b) E-mail c) Networks d) Pirated software 31 / 100 31) Making illegal copies of copyrighted software is called: a) Software Browsing b) Software hacking c) Software piracy d) Software distribution 32 / 100 32) A type of error that occurs when an instruction violates the rules programs is called: a) Program error b) Runtime error c) None d) Syntax error 33 / 100 33) The process of linking library files with object cod is known as: a) Compiler b) Executing c) Saving d) Linking 34 / 100 34) which of the following header file contains information about common mathematical functions? a) stdio.h b) conio.h c) None d) math.h 35 / 100 35) Which of the following does not contain machine language code? a) Source module b) Library module c) None d) Object module 36 / 100 36) The basic structure of C program consists of: a) Preprocessor Directive b) Program body c) All d) main() function 37 / 100 37) The programmer usually enters source code into a computer using a) Compiler b) Text editor c) Linker d) Debugger 38 / 100 38) Computer programs are also known ac a) Firmware b) Hardware c) None d) Software 39 / 100 39) Which of the following language requires no translator to execute the program? a) Machine language b) C++ c) Assembly language d) C 40 / 100 40) Another name for antivirus is: a) Trojan horse b) DES c) Vaccine d) Logic Bomb 41 / 100 41) Which of the following key is used to save a file? a) F2 b) F3 c) F9 d) F5 42 / 100 42) Turbo C++ can compile a) Turbo C Programs only b) C and C++ programs c) Turbo C++ Programs only d) C programs only 43 / 100 43) Which of the following one is not a virus? a) Logic Bomb b) Reflof c) MCAfee d) Trojan Horse 44 / 100 44) Processor directives are command for a) Loader b) Language Processor c) Microprocessor d) C preprocessor 45 / 100 45) The restricted access to the server computer room is a form of: a) Logical security b) Physical security c) Enterprise security d) User security 46 / 100 46) Which of the following media can be used for backup? a) Zip Disk b) Floppy Diskette c) Tape Device d) All 47 / 100 47) Compiled programs typically, execute faster because: a) Compiled programs are already in a machine-readable form. b) Compiled programs are read and executed a line at a time c) None of the above d) Compiled programs do not require any data 48 / 100 48) For every opening brace in a C program, there must be a: a) Comma b) None c) Closing brace d) Colon 49 / 100 49) The secrets word or number used for protection is called: a) Passwords b) Backup c) Biometric data d) Private words 50 / 100 50) which Program that translates assembly language code to machine code a) Assembler b) Translator c) Debugger d) Converter 51 / 100 51) A set of illegal instructions inserted into a legitimate computer program is called: a) Bomb b) Worm c) Trojan horse d) Trapdoor 52 / 100 52) stdio.h is part of: a) C standard library b) Compiler c) main function d) Comment section 53 / 100 53) which one of the following translates source code to object code as a whole a) Assembler b) Compiler c) Interpreter d) None 54 / 100 54) which of the following header a) None b) math.h c) stdio.h d) conio.h 55 / 100 55) Biometric data a) Combination of letters, numbers and symbols b) Name of a partner or spouse c) Word related to a job or hobby d) Name of a partner or spouse 56 / 100 56) McAfee is an example of: a) Worm b) Antivirus c) Hacker d) Virus 57 / 100 57) The output of the compiler is called: a) Library code b) Linked code c) Object code d) Source code 58 / 100 58) Computer virus is simply a: a) Set of computer instructions or code b) Type of bacteria c) Hardware component d) A disease 59 / 100 59) Mistakes that cause a running program to produce incorrect results are called: a) Program error b) Logic error c) None d) Syntax error 60 / 100 60) computer programs are also known as: a) Software b) Hardware c) Procedure d) None 61 / 100 61) Which of the following errors are NOT detected by compiler? a) Syntax error b) Both a and b c) Logical error d) None 62 / 100 62) The extension of an executable file is: a) .ext b) .exe c) .xls d) .doc 63 / 100 63) Division by zero (e.g. 2/ 0) is an example a) Run-time error b) Logic error c) None d) Run-time error 64 / 100 64) conio stands for: a) Character input output b) Common input output c) Complex input output d) Console input output 65 / 100 65) Writing programs in machine language is: a) Both a and c b) None c) Less time-consuming d) Less tedious 66 / 100 66) The extension of C source program is: a) .exe b) .obj c) .c d) .h 67 / 100 67) What does the following code print on screen? printf(‘hello’); a) None b) hello c) HELLO d) Hello 68 / 100 68) C is a: a) Machine Language b) Low-level language c) High level language d) Assembly language 69 / 100 69) Who developed C? a) Al- Khuwarizmi b) Charles Babbage c) Dennis Ritchie d) Von-Neumann 70 / 100 70) stdio stands for: a) Simple input output b) Symbolic input output c) Standard input output d) String input-output 71 / 100 71) The process of identifying and removing errors in the programs is called: a) Executing b) Processing c) debugging d) None 72 / 100 72) Which term is commonly used to refer to software or program errors: a) Down b) Crash c) Bug d) Short circuit 73 / 100 73) main is a a) Expression b) Compiler directive c) Comment d) Function 74 / 100 74) Most computer crime are committed by: a) Highly paid computer consultant b) Computer operators c) International spies d) Hackers 75 / 100 75) How a virus reaches from one computer to another? a) Exchange of display screen b) Exchange of keyboard c) Exchange of printer d) Data is exchanged between computers 76 / 100 76) Which of the following reason causes the syntax error a) using a variable without declaration b) Missing any of the delimiters c) Missing statement terminator d) All 77 / 100 77) void occupy how many bytes in memory? a) 3 b) 2 c) 0 d) 1 78 / 100 78) Protecting computers and the information they contain against unwanted access is called: a) Audit control b) Computer security c) Electronic policing d) Computer monitoring 79 / 100 79) The extension of the header file is: a) .CPP b) .txt c) .h d) .c 80 / 100 80) A special program that can detect and remove viruses from computer is called: a) Custom b) Anti-Virus c) Groupware d) Virus 81 / 100 81) which header file contains information about standard input/ output functions? a) math.h b) stdio.h c) Both a and b d) None 82 / 100 82) Which of the following is NOT a high level language? a) BASIC b) Assembly language c) None d) FORTRAN 83 / 100 83) Which of the following viruses executes when starting the computer? a) Boot sector b) File infector c) Salami shaving d) Macro 84 / 100 84) which of the following language Is ideal to write business application a) BASIC b) PASCAL c) None d) COBOL 85 / 100 85) Another name for free software is: a) Shareware b) Encrypted software c) Copy protected software d) Public domain software 86 / 100 86) Which malicious program is activated when a specific set of conditions are met? a) Worm b) Virus c) Logic bomb d) Trojan horse 87 / 100 87) C statements end with a: a) Period b) semicolon c) None d) semicolon 88 / 100 88) The right of a person to keep his personal information away from others is called: a) Privacy b) Secrecy c) Right d) Private 89 / 100 89) The statements written by the programmer are called: a) Source code b) Syntax c) None d) Object code 90 / 100 90) A program’s syntax errors is detected by: a) Linker b) Loader c) Debugger d) Compiler 91 / 100 91) The expression in define directive: a) Cannot be changed b) Cannot be assigned a value c) Can not be changed but can be redefined d) Can only be changed at the end of the program 92 / 100 92) Software that is available free for a limited period is called: a) Shareware b) Groupware c) vertical d) Freeware 93 / 100 93) Trojan Horse is a type of: a) Horse b) Antivirus c) Software d) Virus 94 / 100 94) The name of header file is written between: a) {} b) <> c) ( ) 95 / 100 95) The virus which deletes MS Office files and disk partition information is called: a) Logic Bomb b) Book sector c) Trojan horse d) Chernobyl 96 / 100 96) Which file contains the program after translation into machine language a) Source file b) Object file c) None d) exe file 97 / 100 97) Which of the following key is used to load a program it memory to run? a) CTRL+F9 b) ALT+F5 c) CTRL+S d) ALT+F9 98 / 100 98) Which of the following key is used to compile a program a) ALT+F5 b) CTRL+S c) CTRL+F9 d) ALT+F9 99 / 100 99) Header files in C contain: a) Header information of C programs b) Library functions c) Compiler commands d) Operators for files 100 / 100 100) A statement that starts with a # is called a: a) Preprocessor directive b) Comment c) None d) Keyword Your score is LinkedIn Facebook Twitter VKontakte Post Views: 601 Post navigation Aiou Workshop 5403| Test 5 Aiou Workshop 5403| Full Test