1 |
One reason computers have difficulty processing natural language is because of the. |
Limited vocabulary of natural languages
Lack of subsets of natural languages
Large vocabulary of natural languages
Fact the natural languages have no syntax
|
2 |
The computer"therapist" ELIZA is an example of what branch of artificial intelligence? |
Natural language programming
Robotics
Automatic programming
Searching
|
3 |
Much early AI work focused on game like checkers and chess because. |
They are easy to represent in the computer's digital memory
They have clearly defined rules
The goals of the game are unmistakable
All of the abvoe
|
4 |
What is the turing test? |
A spreadsheet cross -check
A test for machine cognition
A database selection rule
A test for electronics reliability
|
5 |
1268 + 4258 = |
253<sub>8</sub>
353<sub>8</sub>
453<sub>8</sub>
553<sub>8</sub>
|
6 |
Which one of the following commands checks the validity of a disk and reports the total space, number of files,etc. |
CHECK
CHECKDISK
CHKDISK
CHKDSK
|
7 |
Which one of the following commands displays the volume label and serial number if they exist |
VOL
VOLU
VALUM
VOLUME
|
8 |
Which one of the following commands deletes all files and subdirectories in a directory? |
DELL
DELETE
DELL TREE
None of these
|
9 |
The following command duplicates the contents of one disk another. |
BACKUP
COPY
DELL
DISKCOPY
|
10 |
The following command is used is DOS for copying one of more files to another location. |
BACKUP
SAVE
COPY
None of these
|
11 |
Corel Daaw is a/an |
Word processor
Operating system
Graphics/drawing software
None of these
|
12 |
UNIX is a /an |
word processor
Operating system
Botha a and b
None of these
|
13 |
Excel is a/an |
Word processor
Operating system
Spreadsheet
None of these
|
14 |
Window is a product of. |
AT & T
Corel
Microsoft
None of thes
|
15 |
MS-DOS is a product of |
AT & T
Corel
Microsoft
None of these
|
16 |
MS-DOS is a/an |
Word processor
Operating system
both a and b
None of these
|
17 |
A data coding scheme that is the American standard is. |
ASCII
KB
SIMM
Gigabyte
|
18 |
A memory chip has 1 K bytes of memory. What is the highest available memory address in the octal system. |
1023
1777
7777
None of these
|
19 |
In one were to allow 6 bits per symbol, then following number of different symbols could be encoded. |
64
128
32
16
|
20 |
In one were to allow 6 bits per symbol, then following number of different symbols could be encoded. |
16
32
64
128
|
21 |
Octal number system used the digits 0 to 7. The equivalent of Octal 130 in decimal system is. |
88
82
86
81
|
22 |
Two complement of 1011.01 is |
0100.10
0100.11
1011.10
0100.01
|
23 |
One complement of 1011.010 is |
0100.101
0100.101
1011.101
0100.010
|
24 |
The number 10000 would appear just immediately after |
FFFF (hex)
1111 (binary)
7777 (octal)
All of above
|
25 |
The number A9/d in Hexadecimal system is equivalent to which number in binary system. |
10101011101
101010011101
101110011101
101010011111
|
26 |
The number A9D in Hexadecimal system is equivalent to which number in octal system. |
5235
5335
5135
5233
|
27 |
The number A9D in Hexadecimal system in equivalent to which number in decimal system. |
2727
3648
2717
3717
|
28 |
The number ABC in Hexadecimal system is equivalent to which number in decimal system. |
2740
1748
2748
3748
|
29 |
Tje binary number 101000101011 is equal to the hexadecimal number. |
A2D
C2D
A2B
B2C
|
30 |
The binary number 10101011 is equal to the hexadecimal number |
AD
CD
AB
BC
|
31 |
The binary number 10011101 is equal to hexadecimal number |
9E
9F
9D
FF
|
32 |
Octal number system uses the digit 0 to 7. The equivalent of Octal 126 in decimal system is. |
80
82
84
86
|
33 |
Binary number 10101101 is equivalent in decimal form to. |
170
171
173
174
|
34 |
Four digit binary number 1011 is represented in the decimal system by. |
13
11
9
7
|
35 |
Four digit binary number 1011 is represented in the decimal system by. |
7
9
11
13
|
36 |
9710 (decimal) in octal number system is equivalent to. |
136<sub>8</sub>
140<sub>8</sub>
139<sub>8</sub>
141<sub>8</sub>
|
37 |
1258(octal) in decimal equivalent is equal to. |
85<sub>10</sub>
83<sub>10</sub>
84<sub>10</sub>
86<sub>10</sub>
|
38 |
The digit used for hexadecimal number system are. |
A trough Z
1 through 16
0 through 15
0 through and A through F
|
39 |
The main advantage of hexadecimal number is the case of conversion from hexadecimal to. |
ASCII code
Binary
Octal
Decimal
|
40 |
The hexadecimal number system is widely used in analyzing and programming in. |
Analog computer
Binary computer
micro computer
decimal computer
|
41 |
Base 8 is often used in computing because |
There are 8 bit in a byte
Calculations become casier by using base 8
Electronic circuits can be made economically
It can represent long string of binary I's in a more compact form.
|
42 |
A letter, number, or a special character is represented by a |
kilobyte
Megabyte
byte
bit
|
43 |
A letter, number, or a special character is represented by a |
bit
kilobyte
Megabyte
byte
|
44 |
Data items are generally classified into which type of codes |
Numeric
Alphanumeric
Character
All of the above
|
45 |
Data is represented on a computer by means of a two-state on/off system called. |
The otcal system
The binary system
A word
ROM
|
46 |
An approach to increae speed is |
CISC
Parallel processing
Serial processing
CMOS
|
47 |
Equal to, less than, and greater than are examples of. |
Logical operations
Location
Subtraction
Arithmetic operation
|
48 |
A program whose sabotage depends on certain condition is called a. |
bug
worm
Vaccine
bomb
|
49 |
A virust that replicates itself is called a. |
bug
worm
Vaccine
bomb
|
50 |
Another name for an antivirus. |
Vaccine
Worm
Trojan horse
DES
|
51 |
Another name for an antivirus: |
Vaccine
Worm
Trojan Horse
DES
|
52 |
The secret words or numbers to be typed in on a keyboard before any activity can take place are called. |
Biometric data
Data encryptions
Passwords
Private words
|
53 |
Security protection for personal computers includes |
Internal components
Lock and cable
Soft ware
all of these
|
54 |
To be computer literate, it is not necessary for you to know. |
How to program a computer
How to use a computer
What computer can and can't do
How to repair a computer
|
55 |
Word processing electronic filling and electronic mail are part of . |
Office automation
Electronic typewriter
Electronic industry
None of the above
|
56 |
Booting is a process in which |
User programs are bought in memory
I/O files are collected and organized on disk
A portion of the operating system is loaded into memory
None of the above
|
57 |
A program written when the programmer is employed by an organization is owned by |
The programmer
no one
The organization
The state
|
58 |
An empty shell in which a company may embedded chip to signal its wearer's location. |
hot site
Cold site
Restoration site
Hard ware
|
59 |
A clip-on identification card with an embedded chip to signal its wearer's location. |
Antivirus
Active badge
Site license
Consortium
|
60 |
One form of build in software protection for data is. |
Secured waste
applicant screeining
User profile
Auditor checks
|
61 |
A device that prevents electrical problems from affecting data files. |
site license
trojan horse
hot site
surge protector
|
62 |
The weakest link in any computer system is the |
People in it
Hardware
Password
Software
|
63 |
Secured waste, auditor cheeks, and applicant screening all aid |
data security
built in software protection
License protection
piracy detection
|
64 |
Authorization to make multiple software copies is called. |
Plggybacking
Site licensing
Savenging
Copy protection
|
65 |
Software piracy include |
badge theft
Copyrighting
Program duplication
Data alternation
|
66 |
In anticipation of physical destruction, every computer organization should have a. |
Biometrics scheme
Disaster recovery plan
DES
Set of active badges
|
67 |
The key factor in a computer installation that has met with disaster is the. |
Equipment replacement
Loss of hardware
Insurance coverage
Loss of processing ability
|
68 |
The "what you are" criterion for computer system access involves. |
a badge
biometrics
a pass word
a magnetized card
|
69 |
Computer crime are usually |
Easy to detect
Prosecuted
blue collar crimes
Discovered accidentally
|
70 |
One safeguard against theft or alteration of data is the use of . |
DES
Identical passwords
The trojan Horse
Data diddling
|