GAT Subject Computer Science Online MCQs With Answers

image
image
image

GAT Subject Computer Science Online MCQs

Sr. # Questions Answers Choice
1 One reason computers have difficulty processing natural language is because of the. Limited vocabulary of natural languages Lack of subsets of natural languages Large vocabulary of natural languages Fact the natural languages have no syntax
2 The computer"therapist" ELIZA is an example of what branch of artificial intelligence? Natural language programming Robotics Automatic programming Searching
3 Much early AI work focused on game like checkers and chess because. They are easy to represent in the computer's digital memory They have clearly defined rules The goals of the game are unmistakable All of the abvoe
4 What is the turing test? A spreadsheet cross -check A test for machine cognition A database selection rule A test for electronics reliability
5 1268 + 4258 = 253<sub>8</sub> 353<sub>8</sub> 453<sub>8</sub> 553<sub>8</sub>
6 Which one of the following commands checks the validity of a disk and reports the total space, number of files,etc. CHECK CHECKDISK CHKDISK CHKDSK
7 Which one of the following commands displays the volume label and serial number if they exist VOL VOLU VALUM VOLUME
8 Which one of the following commands deletes all files and subdirectories in a directory? DELL DELETE DELL TREE None of these
9 The following command duplicates the contents of one disk another. BACKUP COPY DELL DISKCOPY
10 The following command is used is DOS for copying one of more files to another location. BACKUP SAVE COPY None of these
11 Corel Daaw is a/an Word processor Operating system Graphics/drawing software None of these
12 UNIX is a /an word processor Operating system Botha a and b None of these
13 Excel is a/an Word processor Operating system Spreadsheet None of these
14 Window is a product of. AT &amp; T Corel Microsoft None of thes
15 MS-DOS is a product of AT &amp; T Corel Microsoft None of these
16 MS-DOS is a/an Word processor Operating system both a and b None of these
17 A data coding scheme that is the American standard is. ASCII KB SIMM Gigabyte
18 A memory chip has 1 K bytes of memory. What is the highest available memory address in the octal system. 1023 1777 7777 None of these
19 In one were to allow 6 bits per symbol, then following number of different symbols could be encoded. 64 128 32 16
20 In one were to allow 6 bits per symbol, then following number of different symbols could be encoded. 16 32 64 128
21 Octal number system used the digits 0 to 7. The equivalent of Octal 130 in decimal system is. 88 82 86 81
22 Two complement of 1011.01 is 0100.10 0100.11 1011.10 0100.01
23 One complement of 1011.010 is 0100.101 0100.101 1011.101 0100.010
24 The number 10000 would appear just immediately after FFFF (hex) 1111 (binary) 7777 (octal) All of above
25 The number A9/d in Hexadecimal system is equivalent to which number in binary system. 10101011101 101010011101 101110011101 101010011111
26 The number A9D in Hexadecimal system is equivalent to which number in octal system. 5235 5335 5135 5233
27 The number A9D in Hexadecimal system in equivalent to which number in decimal system. 2727 3648 2717 3717
28 The number ABC in Hexadecimal system is equivalent to which number in decimal system. 2740 1748 2748 3748
29 Tje binary number 101000101011 is equal to the hexadecimal number. A2D C2D A2B B2C
30 The binary number 10101011 is equal to the hexadecimal number AD CD AB BC
31 The binary number 10011101 is equal to hexadecimal number 9E 9F 9D FF
32 Octal number system uses the digit 0 to 7. The equivalent of Octal 126 in decimal system is. 80 82 84 86
33 Binary number 10101101 is equivalent in decimal form to. 170 171 173 174
34 Four digit binary number 1011 is represented in the decimal system by. 13 11 9 7
35 Four digit binary number 1011 is represented in the decimal system by. 7 9 11 13
36 9710 (decimal) in octal number system is equivalent to. 136<sub>8</sub> 140<sub>8</sub> 139<sub>8</sub> 141<sub>8</sub>
37 1258(octal) in decimal equivalent is equal to. 85<sub>10</sub> 83<sub>10</sub> 84<sub>10</sub> 86<sub>10</sub>
38 The digit used for hexadecimal number system are. A trough Z 1 through 16 0 through 15 0 through and A through F
39 The main advantage of hexadecimal number is the case of conversion from hexadecimal to. ASCII code Binary Octal Decimal
40 The hexadecimal number system is widely used in analyzing and programming in. Analog computer Binary computer micro computer decimal computer
41 Base 8 is often used in computing because There are 8 bit in a byte Calculations become casier by using base 8 Electronic circuits can be made economically It can represent long string of binary I's in a more compact form.
42 A letter, number, or a special character is represented by a kilobyte Megabyte byte bit
43 A letter, number, or a special character is represented by a bit kilobyte Megabyte byte
44 Data items are generally classified into which type of codes Numeric Alphanumeric Character All of the above
45 Data is represented on a computer by means of a two-state on/off system called. The otcal system The binary system A word ROM
46 An approach to increae speed is CISC Parallel processing Serial processing CMOS
47 Equal to, less than, and greater than are examples of. Logical operations Location Subtraction Arithmetic operation
48 A program whose sabotage depends on certain condition is called a. bug worm Vaccine bomb
49 A virust that replicates itself is called a. bug worm Vaccine bomb
50 Another name for an antivirus. Vaccine Worm Trojan horse DES
51 Another name for an antivirus: Vaccine Worm Trojan Horse DES
52 The secret words or numbers to be typed in on a keyboard before any activity can take place are called. Biometric data Data encryptions Passwords Private words
53 Security protection for personal computers includes Internal components Lock and cable Soft ware all of these
54 To be computer literate, it is not necessary for you to know. How to program a computer How to use a computer What computer can and can't do How to repair a computer
55 Word processing electronic filling and electronic mail are part of . Office automation Electronic typewriter Electronic industry None of the above
56 Booting is a process in which User programs are bought in memory I/O files are collected and organized on disk A portion of the operating system is loaded into memory None of the above
57 A program written when the programmer is employed by an organization is owned by The programmer no one The organization The state
58 An empty shell in which a company may embedded chip to signal its wearer's location. hot site Cold site Restoration site Hard ware
59 A clip-on identification card with an embedded chip to signal its wearer's location. Antivirus Active badge Site license Consortium
60 One form of build in software protection for data is. Secured waste applicant screeining User profile Auditor checks
61 A device that prevents electrical problems from affecting data files. site license trojan horse hot site surge protector
62 The weakest link in any computer system is the People in it Hardware Password Software
63 Secured waste, auditor cheeks, and applicant screening all aid data security built in software protection License protection piracy detection
64 Authorization to make multiple software copies is called. Plggybacking Site licensing Savenging Copy protection
65 Software piracy include badge theft Copyrighting Program duplication Data alternation
66 In anticipation of physical destruction, every computer organization should have a. Biometrics scheme Disaster recovery plan DES Set of active badges
67 The key factor in a computer installation that has met with disaster is the. Equipment replacement Loss of hardware Insurance coverage Loss of processing ability
68 The "what you are" criterion for computer system access involves. a badge biometrics a pass word a magnetized card
69 Computer crime are usually Easy to detect Prosecuted blue collar crimes Discovered accidentally
70 One safeguard against theft or alteration of data is the use of . DES Identical passwords The trojan Horse Data diddling
Download This Set