Aiou Workshop 5403| Test 6 admin 3 years ago Spread the love /100 108 Aiou Workshop 5403| Test 6 1 / 100 1) Which of the following is harmful for computers? a) Antivirus b) Freeware c) Virus d) Shareware 2 / 100 2) How a virus reaches from one computer to another? a) Exchange of keyboard b) Exchange of printer c) Exchange of display screen d) Data is exchanged between computers 3 / 100 3) Most computer crime are committed by: a) International spies b) Highly paid computer consultant c) Computer operators d) Hackers 4 / 100 4) which of the following header a) None b) stdio.h c) conio.h d) math.h 5 / 100 5) The process of converting source code into object code,is knows as: a) Executing b) Saving c) Compiling d) Linking 6 / 100 6) void occupy how many bytes in memory? a) 1 b) 0 c) 3 d) 2 7 / 100 7) Another name for free software is: a) Encrypted software b) Shareware c) Public domain software d) Copy protected software 8 / 100 8) which one of the following translates source code to object code as a whole a) Assembler b) Compiler c) None d) Interpreter 9 / 100 9) A type of language in which instructions are written in binary form is called: a) None b) High level language c) Assembly language d) Machine language 10 / 100 10) which of the following language Is ideal to write business application a) PASCAL b) BASIC c) COBOL d) None 11 / 100 11) The expression may be: a) All b) arithmetic expression c) string d) Constant 12 / 100 12) Which of the following is the native language of computer? a) DOS b) Pascal c) None d) Machine language 13 / 100 13) Which of the following reason causes the syntax error a) Missing statement terminator b) All c) using a variable without declaration d) Missing any of the delimiters 14 / 100 14) What does the following code print on screen? printf(‘hello’); a) HELLO b) hello c) Hello d) None 15 / 100 15) Which of the following does not contain machine language code? a) Library module b) Source module c) Object module d) None 16 / 100 16) Processor directives are command for a) C preprocessor b) Loader c) Language Processor d) Microprocessor 17 / 100 17) The lowest level of programming language is: a) Pascal b) Java c) Assembly Language d) None 18 / 100 18) Which of the following components is used to convert first.c to first.exe? a) compiler & header b) header & linker c) None d) compiler & linker 19 / 100 19) The name of header file is written between: a) ( ) b) {} c) <> 20 / 100 20) The expression in define directive: a) Can not be changed but can be redefined b) Can only be changed at the end of the program c) Cannot be changed d) Cannot be assigned a value 21 / 100 21) The virus which deletes MS Office files and disk partition information is called: a) Book sector b) Logic Bomb c) Chernobyl d) Trojan horse 22 / 100 22) which header file contains information about standard input/ output functions? a) Both a and b b) None c) stdio.h d) math.h 23 / 100 23) Mistakes that cause a running program to produce incorrect results are called: a) Syntax error b) Logic error c) None d) Program error 24 / 100 24) Which of the following errors are NOT detected by compiler? a) Syntax error b) Both a and b c) Logical error d) None 25 / 100 25) Compiled programs typically, execute faster because: a) Compiled programs are read and executed a line at a time b) Compiled programs do not require any data c) Compiled programs are already in a machine-readable form. d) None of the above 26 / 100 26) The basic structure of C program consists of: a) Preprocessor Directive b) Program body c) All d) main() function 27 / 100 27) Who is responsible of security of online data? a) LAN Administrator b) Internet Service provider c) Organization obtaining the data d) User 28 / 100 28) The restricted access to the server computer room is a form of: a) Logical security b) User security c) Physical security d) Enterprise security 29 / 100 29) main is a a) Expression b) Comment c) Compiler directive d) Function 30 / 100 30) C is a: a) Machine Language b) High level language c) Assembly language d) Low-level language 31 / 100 31) Software that is available free for a limited period is called: a) Groupware b) Freeware c) Shareware d) vertical 32 / 100 32) The extension of an executable file is: a) .doc b) .xls c) .exe d) .ext 33 / 100 33) Turbo C++ can compile a) C and C++ programs b) Turbo C++ Programs only c) Turbo C Programs only d) C programs only 34 / 100 34) Trojan Horse is a type of: a) Antivirus b) Horse c) Software d) Virus 35 / 100 35) Choose the program that translates and executes one line of source code at a time. a) Assembler b) interpreter c) None d) compiler 36 / 100 36) Another name for antivirus is: a) Logic Bomb b) DES c) Trojan horse d) Vaccine 37 / 100 37) Which malicious program is activated when a specific set of conditions are met? a) Worm b) Trojan horse c) Logic bomb d) Virus 38 / 100 38) Which of the following key is used to load a program it memory to run? a) CTRL+S b) ALT+F5 c) CTRL+F9 d) ALT+F9 39 / 100 39) Which of the following is not cause of virus? a) Pirated software b) E-mail c) Networks d) Logic bomb 40 / 100 40) C programs are divided into units called: a) Section b) Functions c) debug d) Syntax 41 / 100 41) McAfee is an example of: a) Virus b) Worm c) Hacker d) Antivirus 42 / 100 42) An additional or spare copy of data stored on storage media is call: a) Additional data b) Moving of Data c) Copying of Data d) Backup of data 43 / 100 43) Which of the following is not a biometric technique: a) Palm print b) Face c) Retina d) Badge 44 / 100 44) The processing of running an executable file is known as a) Compiling b) Saving c) Debugging d) executing 45 / 100 45) The secrets word or number used for protection is called: a) Biometric data b) Passwords c) Backup d) Private words 46 / 100 46) Which of the following is not an antivirus program? a) Avast b) Redlof c) McAfee d) Norton 47 / 100 47) computer programs are also known as: a) Hardware b) Software c) None d) Procedure 48 / 100 48) The [ascetic] militant Chinese have gone straight to the roots of the problems. a) trained b) professional c) secular d) religious 49 / 100 49) The right of a person to keep his personal information away from others is called: a) Secrecy b) Right c) Private d) Privacy 50 / 100 50) C was developed in the year:1972 a) 1972 b) 1973 c) 1971 d) 1970 51 / 100 51) Which of the following is the most damaging loss to a company? a) Loss of printouts b) Loss of software c) Loss of data d) Loss of hardware 52 / 100 52) An IDE stands for: a) Input Desktop environment b) Input data error c) Internal disk error d) Integrated Development Environment 53 / 100 53) An IDE typically consists of: a) Text editor b) Compiler c) Debugger d) All 54 / 100 54) which of the following header file contains information about common mathematical functions? a) None b) stdio.h c) math.h d) conio.h 55 / 100 55) stdio stands for: a) Simple input output b) Symbolic input output c) String input-output d) Standard input output 56 / 100 56) A set of rules that must be followed to develop a program is called: a) Bug b) Preprocessor c) Syntax d) Debug 57 / 100 57) Machine language: a) None b) is the language in which programs were first written. c) All of these d) is the only language understood by the computer. 58 / 100 58) The programmer usually enters source code into a computer using a) Linker b) Debugger c) Text editor d) Compiler 59 / 100 59) Writing programs in machine language is: a) Less time-consuming b) None c) Less tedious d) Both a and c 60 / 100 60) This is a complete instruction that causes the computer to perform some action: a) Statement b) None c) Keyword d) Line 61 / 100 61) Which of the following language requires no translator to execute the program? a) C b) Assembly language c) Machine language d) C++ 62 / 100 62) Header files in C contain: a) Library functions b) Compiler commands c) Operators for files d) Header information of C programs 63 / 100 63) Computer programs are also known ac a) None b) Hardware c) Firmware d) Software 64 / 100 64) Which of the following one is not a virus? a) MCAfee b) Logic Bomb c) Trojan Horse d) Reflof 65 / 100 65) A type of error that occurs when an instruction violates the rules programs is called: a) Syntax error b) Runtime error c) Program error d) None 66 / 100 66) A program’s syntax errors is detected by: a) Compiler b) Debugger c) Loader d) Linker 67 / 100 67) The right to use the software on the computer is called: a) Site License b) Software piracy c) Intellectual property right d) Software copyright 68 / 100 68) A statement that starts with a # is called a: a) Keyword b) Preprocessor directive c) Comment d) None 69 / 100 69) Which of the following key is used to compile a program a) ALT+F5 b) CTRL+S c) ALT+F9 d) CTRL+F9 70 / 100 70) Computer virus is simply a: a) Hardware component b) Type of bacteria c) A disease d) Set of computer instructions or code 71 / 100 71) Which of the following key is used to save a file? a) F2 b) F3 c) F9 d) F5 72 / 100 72) Which file contains the program after translation into machine language a) exe file b) None c) Source file d) Object file 73 / 100 73) FormatC is an example of: a) Boot sector b) Logic Bomb c) Chernobal d) Trojan horse 74 / 100 74) C was designed to write program for: a) Unix operating system b) Solaris operating system c) Windows operating system d) OS/2 operating system 75 / 100 75) What does the # sign indicate in an instruction of C language? a) Instruction for compiler b) None c) Instruction for linker d) Instruction for user 76 / 100 76) A set of illegal instructions inserted into a legitimate computer program is called: a) Trapdoor b) Bomb c) Trojan horse d) Worm 77 / 100 77) Making illegal copies of copyrighted software is called: a) Software Browsing b) Software distribution c) Software piracy d) Software hacking 78 / 100 78) Which of the following is a biometric technique for person identification? a) Access card b) Password c) Fingerprint d) PIN 79 / 100 79) Biometric data a) Word related to a job or hobby b) Name of a partner or spouse c) Name of a partner or spouse d) Combination of letters, numbers and symbols 80 / 100 80) A virus that replicates itself is called: a) Vaccine b) Worm c) Bomb d) Bug 81 / 100 81) stdio.h is part of: a) Comment section b) main function c) Compiler d) C standard library 82 / 100 82) which Program that translates assembly language code to machine code a) Converter b) Assembler c) Debugger d) Translator 83 / 100 83) The process of identifying and removing errors in the programs is called: a) Processing b) None c) Executing d) debugging 84 / 100 84) The output of the compiler is called: a) Library code b) Linked code c) Object code d) Source code 85 / 100 85) conio stands for: a) Complex input output b) Character input output c) Common input output d) Console input output 86 / 100 86) The “.exe” file is produced by:. a) linker b) Compiler c) Loader d) interpreter 87 / 100 87) A spelling error (e.g. typing intt instead of int) is an example of: a) Logic error b) None c) Run-time error d) Syntax error 88 / 100 88) A program that interferes with the normal working of a computer is called: a) Bateria b) Freeware c) Antivirus d) Virus 89 / 100 89) For every opening brace in a C program, there must be a: a) Comma b) Closing brace c) Colon d) None 90 / 100 90) C statements end with a: a) semicolon b) semicolon c) Period d) None 91 / 100 91) Security protection for personal computers includes: a) Software b) Locks and cables c) Internal components d) All of these 92 / 100 92) The extension of C source program is: a) .c b) .obj c) .h d) .exe 93 / 100 93) Which of the following syntax is used to include header file? a) #include b) Both a or b c) # include "name of the header file" d) None of these 94 / 100 94) The statements written by the programmer are called: a) None b) Syntax c) Object code d) Source code 95 / 100 95) Division by zero (e.g. 2/ 0) is an example a) Logic error b) None c) Run-time error d) Run-time error 96 / 100 96) Debug is the process of: a) Identifying and removing errors b) Creating bugs in program c) Removing Errors d) Identifying Errors 97 / 100 97) Which of the following is computer virus? a) Reflof b) Chernobyl c) All of these d) Logic Bomb 98 / 100 98) The extension of object file is: a) .obj b) .h c) .c d) .exe 99 / 100 99) Which of the following symbol is used to denote a pre-processor statement? a) % b) @ c) $ d) # 100 / 100 100) Which of the following is an authentication methodology? a) Access cards b) PIN c) Biometrics d) Piracy Your score is LinkedIn Facebook Twitter VKontakte {{#message}}{{{message}}}{{/message}}{{^message}}Your submission failed. The server responded with {{status_text}} (code {{status_code}}). Please contact the developer of this form processor to improve this message. Learn More{{/message}}{{#message}}{{{message}}}{{/message}}{{^message}}It appears your submission was successful. Even though the server responded OK, it is possible the submission was not processed. Please contact the developer of this form processor to improve this message. Learn More{{/message}}Submitting…