GAT Subject Computer Science Online MCQs With Answers

image
image
image

GAT Subject Computer Science Online MCQs

Sr. # Questions Answers Choice
1 The microphone converts the sound into. Mechanical signals Electrical signals Computer file Software
2 Smallest unit of memory is Byte Bits Character Word
3 The name for the screen clarity is. Resolution Discrete Pixel LCD
4 A computer derives its basic strength from. Speed Accuracy Memory All of above
5 Software program designed to be managed, rather than manipulated by the user, are called. Icons knowledge workers Enablers Agents
6 May experts predict that the most important enhancement to the user interface of the future will be. A new menu structure. Talk writers Knowledge A new type of pointing device.
7 Broadband fiber optic cables can simultaneously transmit. Telephone cells and television signals Two way computer communications Software and firmware a and b
8 Computer scientist still have not. Developed tools that will allow programmers to quickly produce error free software. Gotten anywhere past the theory of virtual reality Developed the first intelligent agent Had any real success with speech recognition
9 The information infrastructure of computers and networks can be compared with. The railroads of the nineteenth century The airline industry Our modern highway system All of the above
10 Researchers today are developing RISC processors and parallel processing in a quest for. Smaller computers A society that only uses embedded computer Speed Agents
11 Flat-Panel displays and solid state storage devices are. Rapidly improving because of intensive industry research Ideal that aren't expected to become products. Futuristics devices only seen on Star Trek a and c.
12 Research is bringing down the cost of solid state semiconductor storage , which me. the cost computers will rise. Rewritable cards will probably replace most disks and ROM Storage capacity will become fixed We will conserve our store of silicon.
13 If the experts are right, we can expect the price - to - performance ratio of hardware. To double every year or two for several years. To go down every year or two for several years To stay the same for a while None of the abvoe
14 Which of the following is decreasing as computer technology progresses. Hardware reliability Efficiency Speed Hardware cost.
15 The Acronym SILK represents. The name of a new desktop computer with futuristic capabilities. One researcher's vision of the themes emerging in user interface technology The minimum qualifications of a software agent. A new type of multimedia software application
16 What is liable to be the biggest obstracte to the advancement of computer technology in the next few years? Keeping hardware costs down. Finding new tasks for computers to do. Increasing the speed of software. Designing reliable software .
17 A computer product becomes so entrenched that humans use it without conscious though. The product has failed and will no longer sell It will soon be replaced. The product has succeeded enough to move into the fourth phase of any information technology or media. The product will never be replaced by new inventions.
18 According to Alan Kay's for rules for predicting the future, how long does it take for new technology to go from the research lab to the market place? About six months About three years About ten years About a generation
19 Alan Kay says we can predict the future by recognizing the four phases of any technology or media. Hardware, software, people finance, Hardware, software, service, way of lime People , machines, service, finance. Hardware, program, people , ideas
20 Which of the following is not a logical prediction for the future? Computers will be smaller and lighter. Computer will be less expensive Computer are not going to get any faster, we've reached a limit already Computer will be easier to use.
21 According to Alan Kay of Apple Computer, what is the best way to predict the future. Invent it Look at the major research tabs. Project current trends into the future. Figure out what made past products successful.
22 A complex system that can assume complete responsibility for a task without human input is called an. Independent weapons system Autonomous system Generated system Smart weapon system.
23 For many who understand computers, the biggest issue of concern related to autonomous military system is. The unpredictability of the enemy The these systems might not react quickly enough to an attack Software reliability Hardware capacity
24 One problem with high-tech weapons is that. they have become too large to store securely they reduce the amount of time people have to make life and death decisions. When people try to control them manually, they are unpredictable There is no problem with high tech weapons.
25 Selling information about people is. Always against the law in the UNited States. Highly unethical in a capitalist society A contradiction of terms information can't sold An increasingly important aspect of modern business
26 Why do many companies use call-back security systems, in which the computer calls the user on the phone before allowing access. To identify user by voice recognition A check phone lines for modern taps To prevent unauthorized use stolen passwords Actually, call back systems are outdated.
27 Will are the two inherent characteristics computers have that most leave them open to attack or operating error? A computer is difficult to hide/hardware is portable. Every computer network is easily accessible/files are easy to copy A computer will do exactly what it's programmed to do a computer can do only what what it's programmed to do. Computers are so programmable that they don't have any inherent characteristics.
28 Why are computer crimes so hard to detect? Disk can easily be creased to get rid of the evidence. Someone can steal information and leave the original behind. Most computer crimes are committed by insiders. All of these make computer crimes hard to detect
29 One way a database manager might be able to see if an intruder has been on the system is by using. A encryption device Audit control software A copy protection scheme A password
30 What is the most common computer crime of these listed below? Extortion of bank funds IRS database sabotage Putting people on junk mailing lists Software piracy
31 A virus program is usually hidden in. The operating system only An application program only The disk drive The operating system of application programs
32 A program that performs a useful task and at the same, time, carries out some secret destructive act, is known as a. Sabotage Trojan horse Worm Logic bomb
33 What is the standard method of allowing only known and authorized users on a multi user computer system. Identification by fingerprints. Passwords and or login name Expert systems voice recognition
34 The purpose of intellectual property law is to. Allow the creator to make money Justly reward mental labor Encourage innovation All of the above
35 Information . Is a marketable commodity Can be stolen while leaving the original behind Should be free, according to the original hacker ethic . All of the above
36 Copyright are issued by the Federal Government to protect. The pricing of software Intellectual property Textbooks only The author's identity
37 The problem of protecting the privacy in computer systems is aggravated by the increased use of. Command line user interfaces Work stations New CPU hardware. Network
38 The most common from of computer crime is. Stealing hardware Theft of money, goods, information, and computer resources Spying on other people in the network Writing viruses.
39 Most computer crimes are committed by. Hackers International spies Highly trained computer consultants Company insiders who have no extraordinary technical ingenuity
40 According to the FBI, the average computer crime is worth. About the same as a car theft Left than most other crime because information is free For more than most other crime the FBI doesn't know because computer crime to a relatively new type of crime.
41 Nobody knows the true extent of computer crime because. Many computer crimes are never detected Companies often do not report computer crime because they are afraid of bad publicity. a and b None of the above.
42 Computer crime is likely to continue to grow unless. Electronic bulletin board operators are held responsible for information others post on their BBS. Corporations and government agencies recognize the importance of security with their walls. Law-enforcement agencies stop worrying about corporate insiders and, instead, increase their efforts to arrest teenage hackers. We decide that freedom of the press does not apply to on-line magazines.
43 People are currently using smart cards. To pay highway tolls As keys to access sensitive data on computers as food stump All of the above
44 Three major issue that have an impact on the success of successes of educational technology. Money, teacher training, motivation of students. Money, teacher training, restructuring of schools. Geographical location of school,parental communitment, student interest. IQ of the students teacher interest, student involvemnt.
45 Why would computer programs that teach reading sills be a good idea in adult literacy education? Most teachers refuse to work with adults Adults adapt to computers more quickly than children to. Illiterate adults know that the computer will not think they are stupid all of these All of these
46 The form of computer assisted instruction known as drill and practice. Helps students lern to think in ways that aren't possible otherwise Does Not help students learn to think, but helps students memorize facts and skills Doesn't help students learn to think better or to memorize facts and sills, in fact, it's nearly worthless Allow students to program computers with easy-to understand languages.
47 When it comes to educational simulations, people believe. that children learn best through exploration and invention. that games are no way to spend classroom time That simulations are no substitute for reality People believe all of these thing about educational simulations, whether they are true or not.
48 A disabled student uses a computer and modem to earn a college degree without leaving home. This is an example of. Visualization Distance learning CAD/CAM Virtual reality
49 Smart cards. Have a microprocessor and memory in them Are currently only used for checking and credit card services. a and b None of these
50 Which of the following will be technologies in the home the the future. Fiber optics will allow cable companies to do narrowcasting like "the surfing channel" CD-ROM will allow software companies to make interactive movies like surfing in your garage. Virtual reality software will allow you to explore a surfer's home All of the above
51 The programming language LOGO Tells a turtle to draw graphics on a screen I sued to teach young children programming and problem solving skills A and b Neither a nor b and true
52 Which of the following is a major benefit of drill and practice computer assisted instructions Students who use CAI develop their social skills There is immediate feedback for the student All strudents can learn at the same, fixed pace none of the above. None of the above
53 Instructional software is often referred to as Eduware Courseware Firmware School ware
54 Computer class rooms. Improve memorization skills, but provide no help with learning analytical skills Decrease school budgets by replacing teachers. Allow students to work at their own pace Improve student analytical sills, but provide no help with creative work
55 A disabled student uses a computer and modem to earn a college degree without leaving home. This is an example of Visualization Distance learning CAD/CAM Virtual reality
56 Smart cards Have a microprocessor and memory in them Are currently only used for checking and credit card services a and b None of these
57 Instructional software is often referred to as. Eduware Courseware Firmware School ware
58 Which of the following is not used in educational software? Simulation Drill and practice Hypermedia All of these are used
59 What is a major problem of using computer in education? The students can't work at their own pace Creativity is eliminated by computers The lack of teacher training The students must work without a teacher
60 The main advantage of computer assisted instruction (CAI) is It's inexpensive It can replace out of date textbooks It exposes students todifferentuser interfaces It allow individuals to learn at their own pace
61 Steve Wozniak and Steve Job major contribution to the world of computers was. popularizing the personal computer Developing the BASIC language Introducing the concept of computer assisted instruction Founding Microsoft
62 A management information system (MIS) can be used by. Only top -level managers in the company Only mid - level managers in the company Only low level managers in the company Only MIS can be used by all levels of management
63 Offices that are set up so workers can commute to a location near their home are called. Regional work centers Portable computer centers BEHEMOTHS Modem stations
64 Some analysis suggest that telecommuting will become more popular with managers and workers when. Worker ae forced to telecommute Managers finally give up the idea of controlling workers Multimedia teleconferencing system become affordable Automobiles become outdated
65 Document imaging system include. Scanners Magnetic and optical storage disk drives Fax machines All of the above
66 Document imaging systems include Scanners Magnetic and optical storage disk drives Fax machines All of the above
67 In the paperless office of the future, it is predicated that. Magnetic archives will replace fill cabinets Electronic communication will replace memos and letters Information utilities will replace newspapers All of the above
68 Computer supported cooperative work is possible if. Groupware and telecommunications are available Workers have close proximity Workers live in the same time zone for interactivity to take place None of these CSCW is a futuristic ideal that, for the most part, hasn't been acknowledged
69 Electronic sweatshope Are increasingly located across nadonal border May soon decline in number because of improvements in automated input technology Both a and b Neither a nor b
70 One common problem with computer monitoring is that workers who are monitored may Develop carpal tunnel syndrome Assume that if it's not being counted, it's not important enough to do Require ongoing training Come in contact with computer viruses
Download This Set