Spread the love/100 108 Aiou Workshop 5403| Test 6 1 / 100 1) Computer virus is simply a: a) A disease b) Type of bacteria c) Set of computer instructions or code d) Hardware component 2 / 100 2) main is a a) Compiler directive b) Comment c) Expression d) Function 3 / 100 3) A statement that starts with a # is called a: a) Keyword b) Preprocessor directive c) Comment d) None 4 / 100 4) Which of the following viruses executes when starting the computer? a) File infector b) Salami shaving c) Boot sector d) Macro 5 / 100 5) which of the following language Is ideal to write business application a) COBOL b) BASIC c) PASCAL d) None 6 / 100 6) A type of language in which instructions are written in binary form is called: a) Machine language b) Assembly language c) None d) High level language 7 / 100 7) Which of the following errors are NOT detected by compiler? a) Logical error b) Both a and b c) None d) Syntax error 8 / 100 8) which Program that translates assembly language code to machine code a) Debugger b) Assembler c) Translator d) Converter 9 / 100 9) The extension of an executable file is: a) .ext b) .xls c) .doc d) .exe 10 / 100 10) Which of the following is a biometric technique for person identification? a) PIN b) Fingerprint c) Access card d) Password 11 / 100 11) Which of the following components is used to convert first.c to first.exe? a) compiler & header b) None c) header & linker d) compiler & linker 12 / 100 12) Software that is available free for a limited period is called: a) Groupware b) Freeware c) vertical d) Shareware 13 / 100 13) Which of the following is an authentication methodology? a) PIN b) Piracy c) Access cards d) Biometrics 14 / 100 14) Which of the following is harmful for computers? a) Shareware b) Virus c) Antivirus d) Freeware 15 / 100 15) Choose the program that translates and executes one line of source code at a time. a) compiler b) Assembler c) None d) interpreter 16 / 100 16) For every opening brace in a C program, there must be a: a) Closing brace b) Colon c) None d) Comma 17 / 100 17) Making illegal copies of copyrighted software is called: a) Software hacking b) Software distribution c) Software piracy d) Software Browsing 18 / 100 18) Which of the following reason causes the syntax error a) Missing statement terminator b) Missing any of the delimiters c) All d) using a variable without declaration 19 / 100 19) A set of illegal instructions inserted into a legitimate computer program is called: a) Trapdoor b) Bomb c) Trojan horse d) Worm 20 / 100 20) An assembly language uses: a) Mnemonic Codes b) Binary Digit c) English Words d) None 21 / 100 21) Which of the following syntax is used to include header file? a) #include b) None of these c) Both a or b d) # include "name of the header file" 22 / 100 22) The secrets word or number used for protection is called: a) Backup b) Passwords c) Biometric data d) Private words 23 / 100 23) FormatC is an example of: a) Boot sector b) Chernobal c) Logic Bomb d) Trojan horse 24 / 100 24) What does the following code print on screen? printf(‘hello’); a) hello b) None c) HELLO d) Hello 25 / 100 25) Machine language: a) is the language in which programs were first written. b) is the only language understood by the computer. c) All of these d) None 26 / 100 26) A set of rules that must be followed to develop a program is called: a) Debug b) Bug c) Preprocessor d) Syntax 27 / 100 27) Which term is commonly used to refer to software or program errors: a) Short circuit b) Crash c) Down d) Bug 28 / 100 28) B was developed in the year: a) 1972-1988 b) 1965-1975 c) 1992-1996 d) 1969-70 29 / 100 29) Types of translators are: a) None b) All c) Assemblers d) Compilers 30 / 100 30) An additional or spare copy of data stored on storage media is call: a) Backup of data b) Additional data c) Copying of Data d) Moving of Data 31 / 100 31) C was designed to write program for: a) Unix operating system b) Windows operating system c) Solaris operating system d) OS/2 operating system 32 / 100 32) The programmer usually enters source code into a computer using a) Compiler b) Debugger c) Linker d) Text editor 33 / 100 33) Which of the following key is used to save a file? a) F3 b) F5 c) F2 d) F9 34 / 100 34) How a virus reaches from one computer to another? a) Exchange of printer b) Exchange of keyboard c) Data is exchanged between computers d) Exchange of display screen 35 / 100 35) A spelling error (e.g. typing intt instead of int) is an example of: a) Run-time error b) Syntax error c) None d) Logic error 36 / 100 36) An IDE stands for: a) Integrated Development Environment b) Internal disk error c) Input data error d) Input Desktop environment 37 / 100 37) The process of identifying and removing errors in the programs is called: a) None b) Processing c) debugging d) Executing 38 / 100 38) void occupy how many bytes in memory? a) 1 b) 2 c) 0 d) 3 39 / 100 39) Which of the following symbol is used to denote a pre-processor statement? a) % b) $ c) @ d) # 40 / 100 40) The [ascetic] militant Chinese have gone straight to the roots of the problems. a) secular b) religious c) trained d) professional 41 / 100 41) Trojan Horse is a type of: a) Virus b) Horse c) Software d) Antivirus 42 / 100 42) A person who gains illegal access to a computer system is called: a) Network controller b) Hacker c) Computer operator d) Authorized person 43 / 100 43) The right to use the software on the computer is called: a) Software copyright b) Site License c) Intellectual property right d) Software piracy 44 / 100 44) A type of error that occurs when an instruction violates the rules programs is called: a) Syntax error b) Runtime error c) None d) Program error 45 / 100 45) stdio stands for: a) Symbolic input output b) Standard input output c) String input-output d) Simple input output 46 / 100 46) Which of the following is computer virus? a) Reflof b) Chernobyl c) Logic Bomb d) All of these 47 / 100 47) Header files in C contain: a) Library functions b) Compiler commands c) Header information of C programs d) Operators for files 48 / 100 48) The expression may be: a) string b) arithmetic expression c) All d) Constant 49 / 100 49) Which of the following does not contain machine language code? a) Source module b) None c) Object module d) Library module 50 / 100 50) An IDE typically consists of: a) Text editor b) All c) Compiler d) Debugger 51 / 100 51) The output of the compiler is called: a) Source code b) Linked code c) Library code d) Object code 52 / 100 52) This is a complete instruction that causes the computer to perform some action: a) Statement b) Line c) Keyword d) None 53 / 100 53) A program’s syntax errors is detected by: a) Compiler b) Debugger c) Linker d) Loader 54 / 100 54) which one of the following translates source code to object code as a whole a) Assembler b) Interpreter c) None d) Compiler 55 / 100 55) Debug is the process of: a) Removing Errors b) Identifying Errors c) Identifying and removing errors d) Creating bugs in program 56 / 100 56) Which of the following is NOT an example of a program bug? a) Operator error b) Syntax error c) Logic error d) Run-time error 57 / 100 57) Division by zero (e.g. 2/ 0) is an example a) None b) Logic error c) Run-time error d) Run-time error 58 / 100 58) Which of the following key is used to compile a program a) ALT+F5 b) ALT+F9 c) CTRL+F9 d) CTRL+S 59 / 100 59) Which of the following is not a biometric technique: a) Retina b) Face c) Palm print d) Badge 60 / 100 60) Which file contains the program after translation into machine language a) exe file b) Source file c) Object file d) None 61 / 100 61) Writing programs in machine language is: a) Less time-consuming b) Both a and c c) None d) Less tedious 62 / 100 62) C statements end with a: a) Period b) semicolon c) None d) semicolon 63 / 100 63) Which of the following key is used to load a program it memory to run? a) CTRL+F9 b) CTRL+S c) ALT+F9 d) ALT+F5 64 / 100 64) The extension of C source program is: a) .h b) .c c) .obj d) .exe 65 / 100 65) C programs are divided into units called: a) Functions b) Syntax c) debug d) Section 66 / 100 66) Computer programs are also known ac a) Firmware b) None c) Software d) Hardware 67 / 100 67) Compiled programs typically, execute faster because: a) Compiled programs do not require any data b) Compiled programs are already in a machine-readable form. c) Compiled programs are read and executed a line at a time d) None of the above 68 / 100 68) A well-defined set of instructions given to the computer is called: a) Software b) Bug c) Hardware d) None 69 / 100 69) Which of the following is NOT a high level language? a) BASIC b) None c) FORTRAN d) Assembly language 70 / 100 70) The lowest level of programming language is: a) None b) Java c) Assembly Language d) Pascal 71 / 100 71) The basic structure of C program consists of: a) Preprocessor Directive b) main() function c) All d) Program body 72 / 100 72) McAfee is an example of: a) Antivirus b) Worm c) Hacker d) Virus 73 / 100 73) Which of the following is a compiler directive? a) #include b) All c) main ( ) d) Using namespace std; 74 / 100 74) C is a: a) Low-level language b) Assembly language c) Machine Language d) High level language 75 / 100 75) Which of the following is not cause of virus? a) Networks b) Pirated software c) E-mail d) Logic bomb 76 / 100 76) A special program that can detect and remove viruses from computer is called: a) Virus b) Custom c) Groupware d) Anti-Virus 77 / 100 77) Which malicious program is activated when a specific set of conditions are met? a) Trojan horse b) Logic bomb c) Worm d) Virus 78 / 100 78) Which of the following language provided the basis for the development C a) C++ b) Pascal c) B d) Java 79 / 100 79) Who developed C? a) Dennis Ritchie b) Al- Khuwarizmi c) Charles Babbage d) Von-Neumann 80 / 100 80) conio stands for: a) Complex input output b) Common input output c) Character input output d) Console input output 81 / 100 81) which header file contains information about standard input/ output functions? a) Both a and b b) stdio.h c) math.h d) None 82 / 100 82) The statements written by the programmer are called: a) None b) Syntax c) Source code d) Object code 83 / 100 83) which of the following header a) math.h b) stdio.h c) conio.h d) None 84 / 100 84) The expression in define directive: a) Cannot be changed b) Cannot be assigned a value c) Can only be changed at the end of the program d) Can not be changed but can be redefined 85 / 100 85) The virus which deletes MS Office files and disk partition information is called: a) Book sector b) Trojan horse c) Logic Bomb d) Chernobyl 86 / 100 86) Which of the following is the most damaging loss to a company? a) Loss of data b) Loss of hardware c) Loss of software d) Loss of printouts 87 / 100 87) Processor directives are command for a) C preprocessor b) Language Processor c) Microprocessor d) Loader 88 / 100 88) Which of the following media can be used for backup? a) Zip Disk b) All c) Floppy Diskette d) Tape Device 89 / 100 89) Turbo C++ can compile a) C programs only b) Turbo C++ Programs only c) Turbo C Programs only d) C and C++ programs 90 / 100 90) A virus that replicates itself is called: a) Bug b) Worm c) Vaccine d) Bomb 91 / 100 91) Mistakes that cause a running program to produce incorrect results are called: a) Logic error b) Syntax error c) None d) Program error 92 / 100 92) Which of the following language requires no translator to execute the program? a) Assembly language b) C++ c) C d) Machine language 93 / 100 93) A program that interferes with the normal working of a computer is called: a) Bateria b) Virus c) Freeware d) Antivirus 94 / 100 94) The “.exe” file is produced by:. a) Compiler b) linker c) interpreter d) Loader 95 / 100 95) which of the following header file contains information about common mathematical functions? a) stdio.h b) conio.h c) None d) math.h 96 / 100 96) stdio.h is part of: a) Compiler b) main function c) C standard library d) Comment section 97 / 100 97) Most computer crime are committed by: a) Computer operators b) Hackers c) International spies d) Highly paid computer consultant 98 / 100 98) The restricted access to the server computer room is a form of: a) User security b) Logical security c) Physical security d) Enterprise security 99 / 100 99) Security protection for personal computers includes: a) All of these b) Internal components c) Locks and cables d) Software 100 / 100 100) Which of the following is the native language of computer? a) Machine language b) DOS c) None d) Pascal Your score is LinkedIn Facebook Twitter VKontakte Post Views: 568 Post navigation Aiou Workshop 5403| Test 5 Aiou Workshop 5403| Full Test