Aiou Workshop 5403| Test 6 admin 3 years ago Spread the love /100 108 Aiou Workshop 5403| Test 6 1 / 100 1) An additional or spare copy of data stored on storage media is call: a) Copying of Data b) Backup of data c) Additional data d) Moving of Data 2 / 100 2) Which malicious program is activated when a specific set of conditions are met? a) Virus b) Trojan horse c) Worm d) Logic bomb 3 / 100 3) The right of a person to keep his personal information away from others is called: a) Private b) Right c) Secrecy d) Privacy 4 / 100 4) An assembly language uses: a) None b) English Words c) Mnemonic Codes d) Binary Digit 5 / 100 5) A special program that can detect and remove viruses from computer is called: a) Custom b) Anti-Virus c) Groupware d) Virus 6 / 100 6) FormatC is an example of: a) Trojan horse b) Logic Bomb c) Boot sector d) Chernobal 7 / 100 7) The processing of running an executable file is known as a) executing b) Debugging c) Compiling d) Saving 8 / 100 8) B was developed in the year: a) 1972-1988 b) 1992-1996 c) 1965-1975 d) 1969-70 9 / 100 9) computer programs are also known as: a) Hardware b) None c) Procedure d) Software 10 / 100 10) Which of the following is computer virus? a) Chernobyl b) Logic Bomb c) Reflof d) All of these 11 / 100 11) Which of the following reason causes the syntax error a) using a variable without declaration b) Missing any of the delimiters c) All d) Missing statement terminator 12 / 100 12) The statements written by the programmer are called: a) Object code b) Syntax c) Source code d) None 13 / 100 13) The process of linking library files with object cod is known as: a) Saving b) Executing c) Linking d) Compiler 14 / 100 14) The [ascetic] militant Chinese have gone straight to the roots of the problems. a) trained b) secular c) religious d) professional 15 / 100 15) The expression may be: a) string b) Constant c) All d) arithmetic expression 16 / 100 16) Which of the following is the native language of computer? a) Pascal b) Machine language c) None d) DOS 17 / 100 17) The basic structure of C program consists of: a) main() function b) All c) Program body d) Preprocessor Directive 18 / 100 18) main is a a) Expression b) Function c) Comment d) Compiler directive 19 / 100 19) What does the following code print on screen? printf(‘hello’); a) None b) HELLO c) hello d) Hello 20 / 100 20) A spelling error (e.g. typing intt instead of int) is an example of: a) Logic error b) Syntax error c) Run-time error d) None 21 / 100 21) Which of the following media can be used for backup? a) Zip Disk b) All c) Tape Device d) Floppy Diskette 22 / 100 22) The lowest level of programming language is: a) Java b) Pascal c) None d) Assembly Language 23 / 100 23) The extension of C source program is: a) .obj b) .exe c) .h d) .c 24 / 100 24) Software that is available free for a limited period is called: a) Groupware b) Shareware c) vertical d) Freeware 25 / 100 25) Which of the following components is used to convert first.c to first.exe? a) header & linker b) None c) compiler & header d) compiler & linker 26 / 100 26) The expression in define directive: a) Cannot be changed b) Cannot be assigned a value c) Can only be changed at the end of the program d) Can not be changed but can be redefined 27 / 100 27) Which term is commonly used to refer to software or program errors: a) Short circuit b) Crash c) Down d) Bug 28 / 100 28) Debug is the process of: a) Identifying Errors b) Removing Errors c) Creating bugs in program d) Identifying and removing errors 29 / 100 29) Protecting computers and the information they contain against unwanted access is called: a) Computer monitoring b) Electronic policing c) Audit control d) Computer security 30 / 100 30) A program that interferes with the normal working of a computer is called: a) Virus b) Antivirus c) Bateria d) Freeware 31 / 100 31) Machine language: a) is the language in which programs were first written. b) All of these c) None d) is the only language understood by the computer. 32 / 100 32) The process of identifying and removing errors in the programs is called: a) Processing b) Executing c) debugging d) None 33 / 100 33) The restricted access to the server computer room is a form of: a) Logical security b) Enterprise security c) User security d) Physical security 34 / 100 34) C is a: a) Assembly language b) Machine Language c) Low-level language d) High level language 35 / 100 35) Division by zero (e.g. 2/ 0) is an example a) Logic error b) Run-time error c) None d) Run-time error 36 / 100 36) A program’s syntax errors is detected by: a) Compiler b) Loader c) Linker d) Debugger 37 / 100 37) This is a complete instruction that causes the computer to perform some action: a) Line b) Statement c) None d) Keyword 38 / 100 38) which Program that translates assembly language code to machine code a) Converter b) Assembler c) Translator d) Debugger 39 / 100 39) Types of translators are: a) None b) Compilers c) All d) Assemblers 40 / 100 40) The output of the compiler is called: a) Source code b) Linked code c) Object code d) Library code 41 / 100 41) Which of the following language requires no translator to execute the program? a) Assembly language b) C c) C++ d) Machine language 42 / 100 42) Computer programs are also known ac a) Firmware b) Software c) None d) Hardware 43 / 100 43) The right to use the software on the computer is called: a) Software piracy b) Intellectual property right c) Software copyright d) Site License 44 / 100 44) Which of the following key is used to compile a program a) ALT+F9 b) CTRL+S c) CTRL+F9 d) ALT+F5 45 / 100 45) Header files in C contain: a) Compiler commands b) Library functions c) Operators for files d) Header information of C programs 46 / 100 46) Which of the following errors are NOT detected by compiler? a) Logical error b) None c) Syntax error d) Both a and b 47 / 100 47) The extension of the header file is: a) .txt b) .c c) .CPP d) .h 48 / 100 48) A type of error that occurs when an instruction violates the rules programs is called: a) Runtime error b) None c) Program error d) Syntax error 49 / 100 49) Making illegal copies of copyrighted software is called: a) Software hacking b) Software piracy c) Software distribution d) Software Browsing 50 / 100 50) Choose the program that translates and executes one line of source code at a time. a) None b) compiler c) Assembler d) interpreter 51 / 100 51) The extension of an executable file is: a) .doc b) .exe c) .xls d) .ext 52 / 100 52) The extension of object file is: a) .obj b) .c c) .h d) .exe 53 / 100 53) Security protection for personal computers includes: a) All of these b) Internal components c) Locks and cables d) Software 54 / 100 54) C programs are divided into units called: a) Syntax b) Section c) Functions d) debug 55 / 100 55) A set of rules that must be followed to develop a program is called: a) Bug b) Syntax c) Preprocessor d) Debug 56 / 100 56) The “.exe” file is produced by:. a) Compiler b) interpreter c) linker d) Loader 57 / 100 57) A set of illegal instructions inserted into a legitimate computer program is called: a) Trojan horse b) Bomb c) Trapdoor d) Worm 58 / 100 58) Which of the following is a compiler directive? a) Using namespace std; b) #include c) main ( ) d) All 59 / 100 59) which one of the following translates source code to object code as a whole a) None b) Interpreter c) Assembler d) Compiler 60 / 100 60) An IDE typically consists of: a) All b) Text editor c) Debugger d) Compiler 61 / 100 61) Mistakes that cause a running program to produce incorrect results are called: a) None b) Syntax error c) Program error d) Logic error 62 / 100 62) which header file contains information about standard input/ output functions? a) math.h b) None c) stdio.h d) Both a and b 63 / 100 63) which of the following header file contains information about common mathematical functions? a) conio.h b) None c) math.h d) stdio.h 64 / 100 64) Another name for antivirus is: a) Vaccine b) Trojan horse c) Logic Bomb d) DES 65 / 100 65) Biometric data a) Combination of letters, numbers and symbols b) Name of a partner or spouse c) Name of a partner or spouse d) Word related to a job or hobby 66 / 100 66) For every opening brace in a C program, there must be a: a) Colon b) Comma c) None d) Closing brace 67 / 100 67) Which file contains the program after translation into machine language a) Object file b) None c) Source file d) exe file 68 / 100 68) A person who gains illegal access to a computer system is called: a) Hacker b) Computer operator c) Network controller d) Authorized person 69 / 100 69) void occupy how many bytes in memory? a) 3 b) 1 c) 0 d) 2 70 / 100 70) Which of the following viruses executes when starting the computer? a) Boot sector b) Salami shaving c) Macro d) File infector 71 / 100 71) Compiled programs typically, execute faster because: a) Compiled programs are read and executed a line at a time b) Compiled programs do not require any data c) None of the above d) Compiled programs are already in a machine-readable form. 72 / 100 72) Which of the following is not cause of virus? a) Networks b) E-mail c) Logic bomb d) Pirated software 73 / 100 73) Most computer crime are committed by: a) Computer operators b) Highly paid computer consultant c) International spies d) Hackers 74 / 100 74) which of the following language Is ideal to write business application a) COBOL b) None c) BASIC d) PASCAL 75 / 100 75) The virus which deletes MS Office files and disk partition information is called: a) Chernobyl b) Book sector c) Logic Bomb d) Trojan horse 76 / 100 76) Which of the following is NOT an example of a program bug? a) Operator error b) Syntax error c) Logic error d) Run-time error 77 / 100 77) Which of the following is NOT a high level language? a) FORTRAN b) None c) Assembly language d) BASIC 78 / 100 78) C statements end with a: a) None b) semicolon c) semicolon d) Period 79 / 100 79) The programmer usually enters source code into a computer using a) Compiler b) Debugger c) Text editor d) Linker 80 / 100 80) Processor directives are command for a) Microprocessor b) C preprocessor c) Language Processor d) Loader 81 / 100 81) C was developed in the year:1972 a) 1971 b) 1973 c) 1970 d) 1972 82 / 100 82) Which of the following key is used to load a program it memory to run? a) ALT+F5 b) ALT+F9 c) CTRL+F9 d) CTRL+S 83 / 100 83) A type of language in which instructions are written in binary form is called: a) Machine language b) Assembly language c) High level language d) None 84 / 100 84) Which of the following is the most damaging loss to a company? a) Loss of software b) Loss of hardware c) Loss of printouts d) Loss of data 85 / 100 85) The name of header file is written between: a) {} b) <> c) ( ) 86 / 100 86) Who developed C? a) Von-Neumann b) Dennis Ritchie c) Charles Babbage d) Al- Khuwarizmi 87 / 100 87) which of the following header a) conio.h b) math.h c) stdio.h d) None 88 / 100 88) Computer virus is simply a: a) A disease b) Hardware component c) Set of computer instructions or code d) Type of bacteria 89 / 100 89) Trojan Horse is a type of: a) Software b) Antivirus c) Horse d) Virus 90 / 100 90) Which of the following is not a biometric technique: a) Palm print b) Face c) Badge d) Retina 91 / 100 91) Which of the following is a biometric technique for person identification? a) Fingerprint b) Access card c) PIN d) Password 92 / 100 92) stdio.h is part of: a) C standard library b) Compiler c) Comment section d) main function 93 / 100 93) McAfee is an example of: a) Antivirus b) Worm c) Virus d) Hacker 94 / 100 94) Writing programs in machine language is: a) None b) Both a and c c) Less time-consuming d) Less tedious 95 / 100 95) The secrets word or number used for protection is called: a) Backup b) Biometric data c) Private words d) Passwords 96 / 100 96) C was designed to write program for: a) Unix operating system b) Solaris operating system c) OS/2 operating system d) Windows operating system 97 / 100 97) A statement that starts with a # is called a: a) Preprocessor directive b) None c) Comment d) Keyword 98 / 100 98) A well-defined set of instructions given to the computer is called: a) Software b) Bug c) Hardware d) None 99 / 100 99) Which of the following is harmful for computers? a) Shareware b) Antivirus c) Freeware d) Virus 100 / 100 100) An IDE stands for: a) Internal disk error b) Integrated Development Environment c) Input data error d) Input Desktop environment Your score is LinkedIn Facebook Twitter VKontakte {{#message}}{{{message}}}{{/message}}{{^message}}Your submission failed. The server responded with {{status_text}} (code {{status_code}}). Please contact the developer of this form processor to improve this message. Learn More{{/message}}{{#message}}{{{message}}}{{/message}}{{^message}}It appears your submission was successful. Even though the server responded OK, it is possible the submission was not processed. Please contact the developer of this form processor to improve this message. Learn More{{/message}}Submitting…