Spread the love/100 108 Aiou Workshop 5403| Test 6 1 / 100 1) which one of the following translates source code to object code as a whole a) Interpreter b) Compiler c) Assembler d) None 2 / 100 2) The programmer usually enters source code into a computer using a) Linker b) Debugger c) Text editor d) Compiler 3 / 100 3) A program’s syntax errors is detected by: a) Debugger b) Loader c) Compiler d) Linker 4 / 100 4) which of the following header file contains information about common mathematical functions? a) None b) stdio.h c) conio.h d) math.h 5 / 100 5) How a virus reaches from one computer to another? a) Exchange of display screen b) Exchange of printer c) Data is exchanged between computers d) Exchange of keyboard 6 / 100 6) A set of rules that must be followed to develop a program is called: a) Preprocessor b) Debug c) Bug d) Syntax 7 / 100 7) Machine language: a) None b) All of these c) is the language in which programs were first written. d) is the only language understood by the computer. 8 / 100 8) Writing programs in machine language is: a) Less time-consuming b) Both a and c c) None d) Less tedious 9 / 100 9) Which file contains the program after translation into machine language a) None b) Source file c) exe file d) Object file 10 / 100 10) An IDE stands for: a) Integrated Development Environment b) Input data error c) Input Desktop environment d) Internal disk error 11 / 100 11) Making illegal copies of copyrighted software is called: a) Software piracy b) Software Browsing c) Software hacking d) Software distribution 12 / 100 12) Most computer crime are committed by: a) Computer operators b) Highly paid computer consultant c) Hackers d) International spies 13 / 100 13) A special program that can detect and remove viruses from computer is called: a) Groupware b) Custom c) Virus d) Anti-Virus 14 / 100 14) The process of identifying and removing errors in the programs is called: a) None b) Executing c) debugging d) Processing 15 / 100 15) The extension of an executable file is: a) .exe b) .ext c) .xls d) .doc 16 / 100 16) Header files in C contain: a) Header information of C programs b) Compiler commands c) Library functions d) Operators for files 17 / 100 17) Which of the following symbol is used to denote a pre-processor statement? a) # b) $ c) % d) @ 18 / 100 18) main is a a) Expression b) Comment c) Function d) Compiler directive 19 / 100 19) Security protection for personal computers includes: a) Internal components b) Software c) Locks and cables d) All of these 20 / 100 20) The virus which deletes MS Office files and disk partition information is called: a) Trojan horse b) Book sector c) Chernobyl d) Logic Bomb 21 / 100 21) The statements written by the programmer are called: a) None b) Syntax c) Source code d) Object code 22 / 100 22) stdio stands for: a) Simple input output b) Symbolic input output c) Standard input output d) String input-output 23 / 100 23) Another name for antivirus is: a) DES b) Logic Bomb c) Vaccine d) Trojan horse 24 / 100 24) Choose the program that translates and executes one line of source code at a time. a) compiler b) None c) Assembler d) interpreter 25 / 100 25) The name of header file is written between: a) {} b) <> c) ( ) 26 / 100 26) Which of the following is the most damaging loss to a company? a) Loss of printouts b) Loss of software c) Loss of data d) Loss of hardware 27 / 100 27) What does the # sign indicate in an instruction of C language? a) None b) Instruction for user c) Instruction for compiler d) Instruction for linker 28 / 100 28) Turbo C++ can compile a) Turbo C++ Programs only b) C programs only c) Turbo C Programs only d) C and C++ programs 29 / 100 29) Which malicious program is activated when a specific set of conditions are met? a) Virus b) Worm c) Logic bomb d) Trojan horse 30 / 100 30) The basic structure of C program consists of: a) main() function b) All c) Preprocessor Directive d) Program body 31 / 100 31) Who developed C? a) Von-Neumann b) Charles Babbage c) Al- Khuwarizmi d) Dennis Ritchie 32 / 100 32) which of the following header a) None b) conio.h c) stdio.h d) math.h 33 / 100 33) The [ascetic] militant Chinese have gone straight to the roots of the problems. a) professional b) trained c) secular d) religious 34 / 100 34) The expression may be: a) Constant b) string c) All d) arithmetic expression 35 / 100 35) Compiled programs typically, execute faster because: a) None of the above b) Compiled programs do not require any data c) Compiled programs are already in a machine-readable form. d) Compiled programs are read and executed a line at a time 36 / 100 36) Which of the following is not a biometric technique: a) Face b) Badge c) Palm print d) Retina 37 / 100 37) B was developed in the year: a) 1965-1975 b) 1992-1996 c) 1969-70 d) 1972-1988 38 / 100 38) C programs are divided into units called: a) Section b) debug c) Syntax d) Functions 39 / 100 39) stdio.h is part of: a) Comment section b) C standard library c) Compiler d) main function 40 / 100 40) Which of the following key is used to load a program it memory to run? a) ALT+F5 b) ALT+F9 c) CTRL+S d) CTRL+F9 41 / 100 41) Which of the following is a compiler directive? a) All b) main ( ) c) Using namespace std; d) #include 42 / 100 42) The extension of C source program is: a) .exe b) .c c) .h d) .obj 43 / 100 43) Biometric data a) Combination of letters, numbers and symbols b) Name of a partner or spouse c) Name of a partner or spouse d) Word related to a job or hobby 44 / 100 44) A program that interferes with the normal working of a computer is called: a) Bateria b) Antivirus c) Freeware d) Virus 45 / 100 45) FormatC is an example of: a) Chernobal b) Boot sector c) Trojan horse d) Logic Bomb 46 / 100 46) This is a complete instruction that causes the computer to perform some action: a) Keyword b) Statement c) None d) Line 47 / 100 47) which Program that translates assembly language code to machine code a) Converter b) Assembler c) Debugger d) Translator 48 / 100 48) An assembly language uses: a) English Words b) Binary Digit c) None d) Mnemonic Codes 49 / 100 49) The right to use the software on the computer is called: a) Software piracy b) Software copyright c) Intellectual property right d) Site License 50 / 100 50) The process of converting source code into object code,is knows as: a) Compiling b) Linking c) Executing d) Saving 51 / 100 51) computer programs are also known as: a) Procedure b) Software c) Hardware d) None 52 / 100 52) Which of the following key is used to save a file? a) F9 b) F3 c) F5 d) F2 53 / 100 53) which header file contains information about standard input/ output functions? a) stdio.h b) Both a and b c) math.h d) None 54 / 100 54) Which of the following viruses executes when starting the computer? a) Boot sector b) File infector c) Macro d) Salami shaving 55 / 100 55) conio stands for: a) Character input output b) Common input output c) Complex input output d) Console input output 56 / 100 56) The right of a person to keep his personal information away from others is called: a) Privacy b) Right c) Private d) Secrecy 57 / 100 57) Protecting computers and the information they contain against unwanted access is called: a) Computer security b) Electronic policing c) Audit control d) Computer monitoring 58 / 100 58) Types of translators are: a) All b) Assemblers c) None d) Compilers 59 / 100 59) C was designed to write program for: a) Solaris operating system b) OS/2 operating system c) Windows operating system d) Unix operating system 60 / 100 60) For every opening brace in a C program, there must be a: a) Colon b) None c) Closing brace d) Comma 61 / 100 61) Which term is commonly used to refer to software or program errors: a) Down b) Short circuit c) Crash d) Bug 62 / 100 62) The extension of object file is: a) .exe b) .obj c) .h d) .c 63 / 100 63) Debug is the process of: a) Identifying Errors b) Creating bugs in program c) Identifying and removing errors d) Removing Errors 64 / 100 64) Another name for free software is: a) Copy protected software b) Encrypted software c) Public domain software d) Shareware 65 / 100 65) The secrets word or number used for protection is called: a) Passwords b) Private words c) Backup d) Biometric data 66 / 100 66) Which of the following media can be used for backup? a) Tape Device b) Zip Disk c) All d) Floppy Diskette 67 / 100 67) Which of the following is harmful for computers? a) Virus b) Shareware c) Antivirus d) Freeware 68 / 100 68) Processor directives are command for a) C preprocessor b) Loader c) Language Processor d) Microprocessor 69 / 100 69) Computer programs are also known ac a) None b) Hardware c) Software d) Firmware 70 / 100 70) Which of the following is computer virus? a) Reflof b) Chernobyl c) All of these d) Logic Bomb 71 / 100 71) Which of the following one is not a virus? a) Reflof b) MCAfee c) Trojan Horse d) Logic Bomb 72 / 100 72) Which of the following is NOT a high level language? a) None b) BASIC c) FORTRAN d) Assembly language 73 / 100 73) void occupy how many bytes in memory? a) 3 b) 1 c) 0 d) 2 74 / 100 74) Which of the following reason causes the syntax error a) Missing statement terminator b) Missing any of the delimiters c) using a variable without declaration d) All 75 / 100 75) A statement that starts with a # is called a: a) Keyword b) Preprocessor directive c) Comment d) None 76 / 100 76) An additional or spare copy of data stored on storage media is call: a) Moving of Data b) Backup of data c) Copying of Data d) Additional data 77 / 100 77) McAfee is an example of: a) Worm b) Virus c) Hacker d) Antivirus 78 / 100 78) A virus that replicates itself is called: a) Bug b) Bomb c) Vaccine d) Worm 79 / 100 79) Division by zero (e.g. 2/ 0) is an example a) Logic error b) Run-time error c) Run-time error d) None 80 / 100 80) A spelling error (e.g. typing intt instead of int) is an example of: a) Syntax error b) Logic error c) Run-time error d) None 81 / 100 81) Which of the following is NOT an example of a program bug? a) Operator error b) Syntax error c) Logic error d) Run-time error 82 / 100 82) A person who gains illegal access to a computer system is called: a) Network controller b) Hacker c) Computer operator d) Authorized person 83 / 100 83) The process of linking library files with object cod is known as: a) Linking b) Compiler c) Executing d) Saving 84 / 100 84) A set of illegal instructions inserted into a legitimate computer program is called: a) Trojan horse b) Worm c) Trapdoor d) Bomb 85 / 100 85) Which of the following is a biometric technique for person identification? a) Fingerprint b) PIN c) Password d) Access card 86 / 100 86) Which of the following is the native language of computer? a) None b) Pascal c) DOS d) Machine language 87 / 100 87) Mistakes that cause a running program to produce incorrect results are called: a) Logic error b) Syntax error c) None d) Program error 88 / 100 88) C is a: a) Assembly language b) High level language c) Machine Language d) Low-level language 89 / 100 89) A type of error that occurs when an instruction violates the rules programs is called: a) Program error b) Runtime error c) None d) Syntax error 90 / 100 90) Which of the following is not cause of virus? a) Networks b) E-mail c) Pirated software d) Logic bomb 91 / 100 91) Which of the following syntax is used to include header file? a) Both a or b b) None of these c) #include d) # include "name of the header file" 92 / 100 92) A type of language in which instructions are written in binary form is called: a) Assembly language b) High level language c) Machine language d) None 93 / 100 93) Which of the following is not an antivirus program? a) Norton b) Redlof c) McAfee d) Avast 94 / 100 94) Which of the following does not contain machine language code? a) Library module b) Source module c) Object module d) None 95 / 100 95) The lowest level of programming language is: a) Java b) None c) Assembly Language d) Pascal 96 / 100 96) The “.exe” file is produced by:. a) Compiler b) Loader c) linker d) interpreter 97 / 100 97) Trojan Horse is a type of: a) Horse b) Virus c) Antivirus d) Software 98 / 100 98) Computer virus is simply a: a) A disease b) Hardware component c) Type of bacteria d) Set of computer instructions or code 99 / 100 99) The processing of running an executable file is known as a) executing b) Debugging c) Compiling d) Saving 100 / 100 100) Who is responsible of security of online data? a) Internet Service provider b) Organization obtaining the data c) User d) LAN Administrator Your score is LinkedIn Facebook Twitter VKontakte Post Views: 599 Post navigation Aiou Workshop 5403| Test 5 Aiou Workshop 5403| Full Test