Aiou Workshop 5403| Test 6 admin 4 years ago Spread the love /100 108 Aiou Workshop 5403| Test 6 1 / 100 1) What does the # sign indicate in an instruction of C language? a) Instruction for linker b) Instruction for compiler c) None d) Instruction for user 2 / 100 2) Which of the following key is used to load a program it memory to run? a) CTRL+S b) ALT+F9 c) CTRL+F9 d) ALT+F5 3 / 100 3) which Program that translates assembly language code to machine code a) Converter b) Translator c) Debugger d) Assembler 4 / 100 4) Choose the program that translates and executes one line of source code at a time. a) Assembler b) compiler c) interpreter d) None 5 / 100 5) Division by zero (e.g. 2/ 0) is an example a) Run-time error b) Logic error c) Run-time error d) None 6 / 100 6) This is a complete instruction that causes the computer to perform some action: a) None b) Keyword c) Statement d) Line 7 / 100 7) stdio stands for: a) String input-output b) Symbolic input output c) Simple input output d) Standard input output 8 / 100 8) C programs are divided into units called: a) Syntax b) Functions c) debug d) Section 9 / 100 9) Which file contains the program after translation into machine language a) exe file b) Object file c) Source file d) None 10 / 100 10) which of the following language Is ideal to write business application a) PASCAL b) COBOL c) None d) BASIC 11 / 100 11) Which of the following is the most damaging loss to a company? a) Loss of hardware b) Loss of printouts c) Loss of software d) Loss of data 12 / 100 12) Which of the following key is used to compile a program a) ALT+F5 b) CTRL+S c) ALT+F9 d) CTRL+F9 13 / 100 13) The expression in define directive: a) Cannot be assigned a value b) Can only be changed at the end of the program c) Cannot be changed d) Can not be changed but can be redefined 14 / 100 14) An IDE typically consists of: a) Debugger b) Compiler c) Text editor d) All 15 / 100 15) Which of the following is a biometric technique for person identification? a) Fingerprint b) Password c) Access card d) PIN 16 / 100 16) Which of the following viruses executes when starting the computer? a) Macro b) File infector c) Salami shaving d) Boot sector 17 / 100 17) Which of the following is not a biometric technique: a) Palm print b) Face c) Badge d) Retina 18 / 100 18) The restricted access to the server computer room is a form of: a) Logical security b) User security c) Physical security d) Enterprise security 19 / 100 19) Making illegal copies of copyrighted software is called: a) Software distribution b) Software hacking c) Software Browsing d) Software piracy 20 / 100 20) A type of error that occurs when an instruction violates the rules programs is called: a) Program error b) None c) Syntax error d) Runtime error 21 / 100 21) Which malicious program is activated when a specific set of conditions are met? a) Worm b) Logic bomb c) Trojan horse d) Virus 22 / 100 22) The expression may be: a) string b) Constant c) All d) arithmetic expression 23 / 100 23) Header files in C contain: a) Header information of C programs b) Library functions c) Operators for files d) Compiler commands 24 / 100 24) Which of the following does not contain machine language code? a) None b) Source module c) Library module d) Object module 25 / 100 25) Which of the following is not an antivirus program? a) Redlof b) McAfee c) Avast d) Norton 26 / 100 26) For every opening brace in a C program, there must be a: a) None b) Comma c) Colon d) Closing brace 27 / 100 27) The right of a person to keep his personal information away from others is called: a) Private b) Right c) Secrecy d) Privacy 28 / 100 28) The extension of an executable file is: a) .doc b) .xls c) .ext d) .exe 29 / 100 29) Which of the following reason causes the syntax error a) All b) Missing any of the delimiters c) Missing statement terminator d) using a variable without declaration 30 / 100 30) The processing of running an executable file is known as a) Compiling b) Debugging c) executing d) Saving 31 / 100 31) Who developed C? a) Charles Babbage b) Dennis Ritchie c) Von-Neumann d) Al- Khuwarizmi 32 / 100 32) C was designed to write program for: a) OS/2 operating system b) Solaris operating system c) Unix operating system d) Windows operating system 33 / 100 33) The [ascetic] militant Chinese have gone straight to the roots of the problems. a) religious b) trained c) professional d) secular 34 / 100 34) Which of the following one is not a virus? a) Reflof b) Trojan Horse c) Logic Bomb d) MCAfee 35 / 100 35) which header file contains information about standard input/ output functions? a) math.h b) Both a and b c) None d) stdio.h 36 / 100 36) Which of the following is NOT a high level language? a) None b) Assembly language c) BASIC d) FORTRAN 37 / 100 37) Which of the following is NOT an example of a program bug? a) Operator error b) Logic error c) Syntax error d) Run-time error 38 / 100 38) An additional or spare copy of data stored on storage media is call: a) Moving of Data b) Backup of data c) Additional data d) Copying of Data 39 / 100 39) Which of the following is a compiler directive? a) main ( ) b) All c) Using namespace std; d) #include 40 / 100 40) B was developed in the year: a) 1992-1996 b) 1969-70 c) 1972-1988 d) 1965-1975 41 / 100 41) The process of identifying and removing errors in the programs is called: a) Executing b) Processing c) debugging d) None 42 / 100 42) The extension of object file is: a) .exe b) .h c) .c d) .obj 43 / 100 43) A statement that starts with a # is called a: a) None b) Comment c) Preprocessor directive d) Keyword 44 / 100 44) Which of the following is the native language of computer? a) Pascal b) None c) DOS d) Machine language 45 / 100 45) Which of the following language requires no translator to execute the program? a) C b) Machine language c) C++ d) Assembly language 46 / 100 46) The process of converting source code into object code,is knows as: a) Compiling b) Linking c) Executing d) Saving 47 / 100 47) Which of the following symbol is used to denote a pre-processor statement? a) @ b) # c) % d) $ 48 / 100 48) Who is responsible of security of online data? a) User b) Internet Service provider c) LAN Administrator d) Organization obtaining the data 49 / 100 49) main is a a) Comment b) Function c) Compiler directive d) Expression 50 / 100 50) An assembly language uses: a) Binary Digit b) None c) Mnemonic Codes d) English Words 51 / 100 51) Which term is commonly used to refer to software or program errors: a) Crash b) Down c) Short circuit d) Bug 52 / 100 52) The name of header file is written between: a) <> b) {} c) ( ) 53 / 100 53) stdio.h is part of: a) C standard library b) Comment section c) main function d) Compiler 54 / 100 54) The basic structure of C program consists of: a) All b) main() function c) Preprocessor Directive d) Program body 55 / 100 55) McAfee is an example of: a) Antivirus b) Worm c) Hacker d) Virus 56 / 100 56) Which of the following media can be used for backup? a) Tape Device b) Floppy Diskette c) All d) Zip Disk 57 / 100 57) which one of the following translates source code to object code as a whole a) Compiler b) Interpreter c) None d) Assembler 58 / 100 58) Which of the following language provided the basis for the development C a) C++ b) Java c) B d) Pascal 59 / 100 59) A program’s syntax errors is detected by: a) Linker b) Compiler c) Debugger d) Loader 60 / 100 60) Biometric data a) Name of a partner or spouse b) Name of a partner or spouse c) Combination of letters, numbers and symbols d) Word related to a job or hobby 61 / 100 61) Machine language: a) is the language in which programs were first written. b) is the only language understood by the computer. c) All of these d) None 62 / 100 62) Writing programs in machine language is: a) Less time-consuming b) None c) Both a and c d) Less tedious 63 / 100 63) A type of language in which instructions are written in binary form is called: a) High level language b) None c) Assembly language d) Machine language 64 / 100 64) The extension of the header file is: a) .CPP b) .c c) .h d) .txt 65 / 100 65) Which of the following is not cause of virus? a) Pirated software b) E-mail c) Networks d) Logic bomb 66 / 100 66) The extension of C source program is: a) .obj b) .h c) .exe d) .c 67 / 100 67) How a virus reaches from one computer to another? a) Exchange of display screen b) Data is exchanged between computers c) Exchange of printer d) Exchange of keyboard 68 / 100 68) A person who gains illegal access to a computer system is called: a) Network controller b) Computer operator c) Authorized person d) Hacker 69 / 100 69) void occupy how many bytes in memory? a) 3 b) 2 c) 0 d) 1 70 / 100 70) The lowest level of programming language is: a) Pascal b) Assembly Language c) Java d) None 71 / 100 71) Most computer crime are committed by: a) Hackers b) Highly paid computer consultant c) International spies d) Computer operators 72 / 100 72) Computer virus is simply a: a) Hardware component b) A disease c) Set of computer instructions or code d) Type of bacteria 73 / 100 73) conio stands for: a) Complex input output b) Common input output c) Character input output d) Console input output 74 / 100 74) Processor directives are command for a) Loader b) C preprocessor c) Language Processor d) Microprocessor 75 / 100 75) Which of the following is computer virus? a) All of these b) Logic Bomb c) Chernobyl d) Reflof 76 / 100 76) Which of the following key is used to save a file? a) F9 b) F2 c) F5 d) F3 77 / 100 77) A spelling error (e.g. typing intt instead of int) is an example of: a) None b) Logic error c) Run-time error d) Syntax error 78 / 100 78) The “.exe” file is produced by:. a) linker b) interpreter c) Compiler d) Loader 79 / 100 79) C was developed in the year:1972 a) 1972 b) 1971 c) 1970 d) 1973 80 / 100 80) FormatC is an example of: a) Trojan horse b) Boot sector c) Logic Bomb d) Chernobal 81 / 100 81) A set of rules that must be followed to develop a program is called: a) Syntax b) Debug c) Bug d) Preprocessor 82 / 100 82) C statements end with a: a) semicolon b) None c) Period d) semicolon 83 / 100 83) Which of the following components is used to convert first.c to first.exe? a) compiler & linker b) None c) compiler & header d) header & linker 84 / 100 84) Security protection for personal computers includes: a) Software b) All of these c) Locks and cables d) Internal components 85 / 100 85) computer programs are also known as: a) None b) Software c) Hardware d) Procedure 86 / 100 86) Which of the following is harmful for computers? a) Freeware b) Shareware c) Antivirus d) Virus 87 / 100 87) The process of linking library files with object cod is known as: a) Linking b) Compiler c) Saving d) Executing 88 / 100 88) Compiled programs typically, execute faster because: a) Compiled programs are read and executed a line at a time b) None of the above c) Compiled programs are already in a machine-readable form. d) Compiled programs do not require any data 89 / 100 89) Trojan Horse is a type of: a) Software b) Antivirus c) Virus d) Horse 90 / 100 90) C is a: a) High level language b) Low-level language c) Assembly language d) Machine Language 91 / 100 91) Debug is the process of: a) Identifying Errors b) Identifying and removing errors c) Removing Errors d) Creating bugs in program 92 / 100 92) A virus that replicates itself is called: a) Vaccine b) Bomb c) Worm d) Bug 93 / 100 93) The output of the compiler is called: a) Library code b) Source code c) Object code d) Linked code 94 / 100 94) An IDE stands for: a) Internal disk error b) Input data error c) Input Desktop environment d) Integrated Development Environment 95 / 100 95) Which of the following errors are NOT detected by compiler? a) None b) Logical error c) Syntax error d) Both a and b 96 / 100 96) A well-defined set of instructions given to the computer is called: a) None b) Hardware c) Software d) Bug 97 / 100 97) Mistakes that cause a running program to produce incorrect results are called: a) Program error b) Syntax error c) Logic error d) None 98 / 100 98) Software that is available free for a limited period is called: a) Groupware b) Shareware c) Freeware d) vertical 99 / 100 99) The virus which deletes MS Office files and disk partition information is called: a) Chernobyl b) Book sector c) Logic Bomb d) Trojan horse 100 / 100 100) The programmer usually enters source code into a computer using a) Debugger b) Text editor c) Linker d) Compiler Your score is LinkedIn Facebook Twitter VKontakte {{#message}}{{{message}}}{{/message}}{{^message}}Your submission failed. The server responded with {{status_text}} (code {{status_code}}). Please contact the developer of this form processor to improve this message. Learn More{{/message}}{{#message}}{{{message}}}{{/message}}{{^message}}It appears your submission was successful. Even though the server responded OK, it is possible the submission was not processed. Please contact the developer of this form processor to improve this message. Learn More{{/message}}Submitting…