More Classes
5th Class
6th Class
7th Class
8th Class
9th Class
10th Class
11th Class
12th Class
NAT I
NAT II
CSS
IQ
General Knowledge
MDCAT
ECAT
GAT General
GAT Subject
Other Links
Go to Home
Online Tests
GAT Subject Computer Science Online MCQs MCQs With Answers
Question # 1
Which one of the following is the main component of DBMS?
Choose an answer
Database program
IDE
GUI
Application Program
Previous
Skip
Next
Question # 2
Which one of the following is a graphical shell?
Choose an answer
UNIX
Page
GUI
Utility program
Previous
Skip
Next
Question # 3
A terminal program which allows a personal computer to function as a terminal is called an
Choose an answer
UNIX
Modem
Utility
Emulator
Previous
Skip
Next
Question # 4
Prewritten standard file handling programs are called.
Choose an answer
Pull down menus
Pages
Supervisors
Utilites
Previous
Skip
Next
Question # 5
Which of the following is associated with second generation computers.
Choose an answer
Transistors
Magnetic core memory
High level procedural language
All of above
Previous
Skip
Next
Question # 6
The most commonly used output device today is a.
Choose an answer
CRT monitor
Keyboard
Mouse
Card punch
Previous
Skip
Next
Question # 7
Cabling on a linear bus topology can be extended using which of the following.
Choose an answer
Terminator
Barrel connector
Network adapter card
Medium attachement unit
Previous
Skip
Next
Question # 8
A program that performs a useful task and at the same, time, carries out some secret destructive act, is known as a.
Choose an answer
Sabotage
Trojan horse
Worm
Logic bomb
Previous
Skip
Next
Question # 9
A virus that replicates itself is called is
Choose an answer
Bug
Worm
Viccine
Bomb
Previous
Skip
Next
Question # 10
Data is represented on a computer by means of a two-state on/off system called.
Choose an answer
The otcal system
The binary system
A word
ROM
Previous
Skip
Next
Question # 11
Control unit is the part of
Choose an answer
ALU
CBT
CPU
None of these
Previous
Skip
Next
Question # 12
Hollerith's Tabulating Machine Company eventually became _________
Choose an answer
IBM
AT 7 T
APPLE
General Electric
Previous
Skip
Next
Question # 13
A disabled student uses a computer and modem to earn a college degree without leaving home. This is an example of.
Choose an answer
Visualization
Distance learning
CAD/CAM
Virtual reality
Previous
Skip
Next
Question # 14
How many types or layouts of forms are available in MS-Access.
Choose an answer
2
4
5
8
Previous
Skip
Next
Question # 15
Pick out the wrong statement about modern computer systems.
Choose an answer
These are simple and easy to take care of
Even beginners, untrained persons can safely handle them
They requre a highly disciplined approach
It is important to understand the proper handling of each element and proper overall procedures must be followed
Previous
Skip
Next
Question # 16
Which of the following is the example of sequential circuit
Choose an answer
flip-flop
Counter
Shift register
Accumulator
Previous
Skip
Next
Question # 17
The following are all programming languages except for.
Choose an answer
FORTRAN
C
Pascal
MS-DOS
Previous
Skip
Next
Question # 18
Who Invented the modem?
Choose an answer
IBM
DEC
AT & T information system, USA
Apple computers Inc.
Previous
Skip
Next
Question # 19
The computer"therapist" ELIZA is an example of what branch of artificial intelligence?
Choose an answer
Natural language programming
Robotics
Automatic programming
Searching
Previous
Skip
Next
Question # 20
A control structure used to make logical decision is the
Choose an answer
Sequence control structure
Selection control structure
Repetition control structire
a and b
Previous
Skip
Next
Question # 21
The transfer of encoded information from one location to another by a communication channel is called.
Choose an answer
Data processing
Data distribution
Data communication
Data encryption
Previous
Skip
Next
Question # 22
To be computer literate, it is not necessary for you to know.
Choose an answer
How to program a computer
How to use a computer
What computer can and can't do
How to repair a computer
Previous
Skip
Next
Question # 23
The entire computer system is coordinated by.
Choose an answer
The ALU
The accumulator
The control unit
Arithmetic operators
Previous
Skip
Next
Question # 24
The memory area for programs with highest priority.
Choose an answer
Frames
Foreground
Page table
Dafault drive
Previous
Skip
Next
Question # 25
The main advantage of hexadecimal number is the case of conversion from hexadecimal to.
Choose an answer
ASCII code
Binary
Octal
Decimal
Previous
Skip
Next
Question # 26
Which command is used to create a new database file?
Choose an answer
Ctrl+C
Ctrl+V
Ctrl+D
Ctrl + N
Previous
Skip
Next
Question # 27
A program that, after being initially loaded into the computer by a boot program, manages all the other programs in a computer is called.
Choose an answer
Application softwere
Function software
Controlling software
Operating system
Previous
Skip
Next
Question # 28
The benefits of using a database include all but one of the following.
Choose an answer
Easier to retrieve information quickly and flexibly
Easy to organize infomation
Easy to print and distribute information
Easy to protect privacy of data
Previous
Skip
Next
Question # 29
During the development of a program, drawing a flowchart is a means. to
Choose an answer
Plan to solution
Code the program
Define the problem
Analyze the problem
Previous
Skip
Next
Question # 30
Assuming 8 bit of data, 1 bit for parity, 1 start bit and 2 stop bits, the number of characters that 1200 BPS communication line can transmit is.
Choose an answer
10 CPS
100 CPS
12 CPS
120 CPS
Previous
Skip
Next
Question # 31
The weakest link in any computer system is the
Choose an answer
People in it
Hardware
Password
Software
Previous
Skip
Next
Question # 32
First generation computers were characterized by the use of the .
Choose an answer
Microprocessor
Vacuum tube
Transistor
Integrated circuit
Previous
Skip
Next
Question # 33
The most common from of computer crime is.
Choose an answer
Stealing hardware
Theft of money, goods, information, and computer resources
Spying on other people in the network
Writing viruses.
Previous
Skip
Next
Question # 34
The shortest period of time is a.
Choose an answer
Milli second
Nano second
Picosecond
Microsecond
Previous
Skip
Next
Question # 35
A floppy disk is a __________ generation computer invention.
Choose an answer
1st
2nd
3rd
4th
Previous
Skip
Next
Question # 36
Computer crime is likely to continue to grow unless.
Choose an answer
Electronic bulletin board operators are held responsible for information others post on their BBS.
Corporations and government agencies recognize the importance of security with their walls.
Law-enforcement agencies stop worrying about corporate insiders and, instead, increase their efforts to arrest teenage hackers.
We decide that freedom of the press does not apply to on-line magazines.
Previous
Skip
Next
Question # 37
A storage of binary digits treated as a unit is called.
Choose an answer
bit
Byte
word
character
Previous
Skip
Next
Question # 38
Document imaging systems include
Choose an answer
Scanners
Magnetic and optical storage disk drives
Fax machines
All of the above
Previous
Skip
Next
Question # 39
In 1945 Arthur C, Clarke predicated that satellites would.
Choose an answer
Replace many telephone cables
Replace radio towere
Allows electronic signals to be beamed oceans
All of the above
Previous
Skip
Next
Question # 40
The decimal numbering system uses___________ digits
Choose an answer
Two
Eight
Nine
Ten
Previous
Skip
Next
Question # 41
The software that allows the user to manipulate photographs and other higher resolution images is called.
Choose an answer
Analog camera
CAD
FAX
Digital image processing software
Previous
Skip
Next
Question # 42
The cell containing the cursor in a spread sheet is called an.
Choose an answer
Active cell
Console
Formula bar
Heading
Previous
Skip
Next
Question # 43
The kind of interview where all questions are planned in advance is called.
Choose an answer
Preplanned
Structured
Observation
Unstructured
Previous
Skip
Next
Question # 44
One reason computers have difficulty processing natural language is because of the.
Choose an answer
Limited vocabulary of natural languages
Lack of subsets of natural languages
Large vocabulary of natural languages
Fact the natural languages have no syntax
Previous
Skip
Next
Question # 45
Which one of these forms of storage does not retain information when the machine's power is turned off?
Choose an answer
RAM
ROM
Floppy disk
Har disk
Previous
Skip
Next
Question # 46
Octal number system used the digits 0 to 7. The equivalent of Octal 130 in decimal system is.
Choose an answer
88
82
86
81
Previous
Skip
Next
Question # 47
A program that can identify unnecessary words and wordy phrases in called.
Choose an answer
Indexing program
Grammar/Style program
From letter program
Thesaurus program
Previous
Skip
Next
Question # 48
The faster type of ADC is.
Choose an answer
Time intervel
Parallel
Closed loop
Successive
Previous
Skip
Next
Question # 49
A word processor can be used to.
Choose an answer
Write text
Edit text
Print text
All of above
Previous
Skip
Next
Question # 50
A program written when the programmer is employed by an organization is owned by
Choose an answer
The programmer
no one
The organization
The state
Previous
Skip
Next
Question # 51
Every cell in a spreadsheet gird has a unique ___ made up of a row number and a column letter.
Choose an answer
Apex
Address
Intersection
Location
Previous
Skip
Next
Question # 52
Charles Babbage set out to create a device that could carry out any calculation to twenty digits of accuracy called a.
Choose an answer
Computer
Analytical engine
Calculator
Mainframe
Previous
Skip
Next
Question # 53
Computer follows a simple rule called GIGO,GIGO stand for
Choose an answer
Good input, good output
Great instructions, great output
Garbage in , garbage out
Gated input, gated output
Previous
Skip
Next
Question # 54
An address location holds ___________ data item at a time.
Choose an answer
one
new
word
discrete
Previous
Skip
Next
Question # 55
The process of identifying objects and shapes in a photograph, drawing, or video is called.
Choose an answer
Optical Character recognition
Image analysis
Robotics
Synthesis
Previous
Skip
Next
Question # 56
One way a database manager might be able to see if an intruder has been on the system is by using.
Choose an answer
A encryption device
Audit control software
A copy protection scheme
A password
Previous
Skip
Next
Question # 57
The highest level language are called.
Choose an answer
4 GLs
High level
Assembly
Natural
Previous
Skip
Next
Question # 58
Smart cards
Choose an answer
Have a microprocessor and memory in them
Are currently only used for checking and credit card services
a and b
None of these
Previous
Skip
Next
Question # 59
The digit used for hexadecimal number system are.
Choose an answer
A trough Z
1 through 16
0 through 15
0 through and A through F
Previous
Skip
Next
Question # 60
One form of build in software protection for data is.
Choose an answer
Secured waste
applicant screeining
User profile
Auditor checks
Previous
Skip
Next
Question # 61
Types of software that can be freely distributed without violating copyright laws are called.
Choose an answer
Shereware
Public domain
Copy protected
a and b
Previous
Skip
Next
Question # 62
Rearranging data is a new sequence is known as.
Choose an answer
Up dating
Batching
Sorting
Summarising
Previous
Skip
Next
Question # 63
Three major issue that have an impact on the success of successes of educational technology.
Choose an answer
Money, teacher training, motivation of students.
Money, teacher training, restructuring of schools.
Geographical location of school,parental communitment, student interest.
IQ of the students teacher interest, student involvemnt.
Previous
Skip
Next
Question # 64
A computer derives its basic strength from.
Choose an answer
Speed
Accuracy
Memory
All of above
Previous
Skip
Next
Question # 65
A computer product becomes so entrenched that humans use it without conscious though.
Choose an answer
The product has failed and will no longer sell
It will soon be replaced.
The product has succeeded enough to move into the fourth phase of any information technology or media.
The product will never be replaced by new inventions.
Previous
Skip
Next
Question # 66
Offices that are set up so workers can commute to a location near their home are called.
Choose an answer
Regional work centers
Portable computer centers
BEHEMOTHS
Modem stations
Previous
Skip
Next
Question # 67
The main advantage of computer assisted instruction (CAI) is
Choose an answer
It's inexpensive
It can replace out of date textbooks
It exposes students todifferentuser interfaces
It allow individuals to learn at their own pace
Previous
Skip
Next
Question # 68
Most computers have two separate memory caches L1 cache, located on the _____________ and L2 cache, located between the CPU and DRAM.
Choose an answer
RAM
ROM
CPU
EEPROM
Previous
Skip
Next
Question # 69
DROP TABLE statement is used for.
Choose an answer
Deleting record
Inserting record
Deleting table
Retirieving records
Previous
Skip
Next
Question # 70
A driver is.
Choose an answer
Hardware
A peripheral device
A card
Software
Previous
Skip
Next
Question # 71
Four digit binary number 1011 is represented in the decimal system by.
Choose an answer
7
9
11
13
Previous
Skip
Next
Back