More Classes
5th Class
6th Class
7th Class
8th Class
9th Class
10th Class
11th Class
12th Class
NAT I
NAT II
CSS
IQ
General Knowledge
MDCAT
ECAT
GAT General
GAT Subject
Other Links
Go to Home
Online Tests
GAT Subject Computer Science Online MCQs MCQs With Answers
Question # 1
The basic operation performed by a computer is.
Choose an answer
Arithmetic operations
Logic operations
Storage and retrieval operations
All of above
Previous
Skip
Next
Question # 2
According to the FBI, the average computer crime is worth.
Choose an answer
About the same as a car theft
Left than most other crime because information is free
For more than most other crime
the FBI doesn't know because computer crime to a relatively new type of crime.
Previous
Skip
Next
Question # 3
The result of a formula in a cell
Choose an answer
Label
range
Value
Displayed value
Previous
Skip
Next
Question # 4
The highest level language are called.
Choose an answer
4 GLs
High level
Assembly
Natural
Previous
Skip
Next
Question # 5
Text information in a cell.
Choose an answer
Label
formula
value
cell address
Previous
Skip
Next
Question # 6
One or more computers connected to a hub computer is a.
Choose an answer
Ring network
node
Star network
Information utility
Previous
Skip
Next
Question # 7
Scheduling deadlines and milestones can be shown on a
Choose an answer
System survey
Decision table
Prototype
Gantt chart
Previous
Skip
Next
Question # 8
Which of the following is true about macros?
Choose an answer
Macros are essential for word processing
Macros are most useful for creative rather than repetitive tasks
Macros can reduce the likelihood of errors
Macros are a specialized form of simulation
Previous
Skip
Next
Question # 9
The following are all programming languages except for.
Choose an answer
FORTRAN
C
Pascal
MS-DOS
Previous
Skip
Next
Question # 10
Which of the following is a word processor?
Choose an answer
Adobe Acrobat
Photo express
MS-Words
MS-Excel
Previous
Skip
Next
Question # 11
Computer crime are usually
Choose an answer
Easy to detect
Prosecuted
blue collar crimes
Discovered accidentally
Previous
Skip
Next
Question # 12
A group of characters that are treated as a single entity.
Choose an answer
bit
byte
word
address
Previous
Skip
Next
Question # 13
In computer terminology,the term wetware stand for .
Choose an answer
Artificial intelligence
Any organic intelligence
Molecular biology
Molecular scale computer
Previous
Skip
Next
Question # 14
Software that sotes a picture, not as a collection of dots, but as a collection of lines and shapes is called ________ software.
Choose an answer
Painting
Drawing
Modeling
Dragging
Previous
Skip
Next
Question # 15
A computer is capable of performing almost any task, provided that it cab be
Choose an answer
Coded
Memorized
Analyzed
Reduced to a series of logical steps.
Previous
Skip
Next
Question # 16
Which of the following statement concerning touch screens is false?
Choose an answer
they respond when the user points or touches different screen regions
They are effective when users are unfamiliar with computers.
They are used in public places, such as libraries and airports
they are particularly popular with artists and designers.
Previous
Skip
Next
Question # 17
Comments in the program itself are part of.
Choose an answer
Compiling
Translating
Linking
Documenting
Previous
Skip
Next
Question # 18
You're ready to telecommunicate with your PC to what kinds of systems can you connect?
Choose an answer
Time sharing systems
Electronic bulletin boards
Electronic mail services
All of tha above
Previous
Skip
Next
Question # 19
A virus program is usually hidden in.
Choose an answer
The operating system only
An application program only
The disk drive
The operating system of application programs
Previous
Skip
Next
Question # 20
The analog computer deals directly with.
Choose an answer
Number of pulses
Measured values of continuous physical magnitudes
Signal in the form of 0 or 1
Signal in discrete values from 0 to 9
Previous
Skip
Next
Question # 21
The sequence of instruction telling the machine to perform a particular sequence of operation is called.
Choose an answer
Program
Hardware
Algorithm
Debugging
Previous
Skip
Next
Question # 22
Program written to cause computers to function in a desired way are called.
Choose an answer
Hard ware
Instruction
Software
Algorithm
Previous
Skip
Next
Question # 23
A computer programmer
Choose an answer
Enters data into computer
Does total planning and thinking for a computer
Changes flow charts into instructions
Provide solutions to compled problems.
Previous
Skip
Next
Question # 24
A computer can be defined as an electronic device that can
Choose an answer
Carry out arithmetic operation
Carry out logical operation
Do complicated calculation
Accept and process data by implementing sequentially a set of stored instructions.
Previous
Skip
Next
Question # 25
Ragged right means the right margin is set to be
Choose an answer
Uneven
even
Variable
wide
Previous
Skip
Next
Question # 26
A temporary lincup of print requests waiting to be printed on a printer.
Choose an answer
Print request
Print queue
Print Waiting
None of the abvoe
Previous
Skip
Next
Question # 27
Which one of the following is extension of header file?
Choose an answer
.CPP
.DOC
.h
.inp
Previous
Skip
Next
Question # 28
The out put of a sequential circuit depends upon.
Choose an answer
Percent input
Past inputs
Botha a and b
None of a and b
Previous
Skip
Next
Question # 29
Arranging classified data in a predetermined sequence to facilitate processing is called.
Choose an answer
Storing
Sorting
Processing
Classifying
Previous
Skip
Next
Question # 30
Copyright are issued by the Federal Government to protect.
Choose an answer
The pricing of software
Intellectual property
Textbooks only
The author's identity
Previous
Skip
Next
Question # 31
What is the turing test?
Choose an answer
A spreadsheet cross -check
A test for machine cognition
A database selection rule
A test for electronics reliability
Previous
Skip
Next
Question # 32
The preliminary investigation of a systems project is also called.
Choose an answer
Analysis survey
System design
Feasibility study
Evaluation
Previous
Skip
Next
Question # 33
Broadband fiber optic cables can simultaneously transmit.
Choose an answer
Telephone cells and television signals
Two way computer communications
Software and firmware
a and b
Previous
Skip
Next
Question # 34
Steps wise refinement is similar to.
Choose an answer
The process of developing a table of contents
The development of an outline of a paper
Writing an abstract after writing a paper
Writing an introduction to a paper
Previous
Skip
Next
Question # 35
A terminal program which allows a personal computer to function as a terminal is called an
Choose an answer
UNIX
Modem
Utility
Emulator
Previous
Skip
Next
Question # 36
Computer ENIAC was built in:
Choose an answer
1935
1939
1941
1945
Previous
Skip
Next
Question # 37
A spell checker that cheeks every word as it is typed and beeps or flashes each time a word is typed incorrectly is called an.
Choose an answer
Idea processor
Interactive spelling checker
Batch spelling checker
Believability index
Previous
Skip
Next
Question # 38
Second generation computers belong to.
Choose an answer
1956-1963
1945-1956
1964-1971
1971 - Present
Previous
Skip
Next
Question # 39
The earliest file management systems that required users to accumulate transaction and feed them into computers in large groups used.
Choose an answer
Transaction processing
Interactive processing
Decentralized processing
Batch processing
Previous
Skip
Next
Question # 40
The native language of a computer is called __________ language.
Choose an answer
Machine
Assembler
Pascal
COBOL
Previous
Skip
Next
Question # 41
Which of the following is an acronym for a computer department.
Choose an answer
MIS
PDA
CPU
LAN
Previous
Skip
Next
Question # 42
The entire new system is used by a portion of the users.
Choose an answer
Direct conversion
Pilot conversion
File conversion
Parallel conversion
Previous
Skip
Next
Question # 43
The program that contains instructions to operate a device is called.
Choose an answer
Device driver
Device linking
Device operator
Device system
Previous
Skip
Next
Question # 44
The world today is experiencing the _________ revolution
Choose an answer
Technology
Agricultural
Information
Industrial
Previous
Skip
Next
Question # 45
Security protection for personal computers include.
Choose an answer
Internal components
Locks and cables
Software
All of these
Previous
Skip
Next
Question # 46
The computer"therapist" ELIZA is an example of what branch of artificial intelligence?
Choose an answer
Natural language programming
Robotics
Automatic programming
Searching
Previous
Skip
Next
Question # 47
Assuming 8 bit of data, 1 bit for parity, 1 start bit and 2 stop bits, the number of characters that 1200 BPS communication line can transmit is.
Choose an answer
10 CPS
100 CPS
12 CPS
120 CPS
Previous
Skip
Next
Question # 48
Steve Wozniak and Steve Job major contribution to the world of computers was.
Choose an answer
popularizing the personal computer
Developing the BASIC language
Introducing the concept of computer assisted instruction
Founding Microsoft
Previous
Skip
Next
Question # 49
The principles of the relational data base systems were introduced by.
Choose an answer
Dr. James
Dr. Thompson
Dr. E.F. simon
Dr. E.F.Codd
Previous
Skip
Next
Question # 50
The evolution of computer software can be summarized as the following sequence of developments
Choose an answer
Natural language, algorithm and electronic mail
Algorithm natural language and programming language
Machine language, assembly language, and high level langauge
Instructions , assembly language and MS work
Previous
Skip
Next
Question # 51
Cubiling on a linear bus topology can be extended using which of the following.
Choose an answer
Terminator
Barrel connector
Network adapter card
Medium attachment.
Previous
Skip
Next
Question # 52
Octal number system uses the digit 0 to 7. The equivalent of Octal 126 in decimal system is.
Choose an answer
80
82
84
86
Previous
Skip
Next
Question # 53
Computer performs following operation on data.
Choose an answer
Storage/retrieval
Calculation
Logic/comparison
All of the above
Previous
Skip
Next
Question # 54
Information transformations are performed by the
Choose an answer
Central processing unit
Input devices
Out put devices
File description
Previous
Skip
Next
Question # 55
The primary limitation of audio digitizers is that
Choose an answer
The require artificial intelligence software to be correctly interpreted
They cannot store input in memory
there is not software currently available to perform needed functions
They cannot capture music
Previous
Skip
Next
Question # 56
The entire computer system is coordinated by.
Choose an answer
The ALU
The accumulator
The control unit
Arithmetic operators
Previous
Skip
Next
Question # 57
Pick up the correct statement
Choose an answer
Most mainframe sare 48 -bit machines
Thousands of super computer are currently being built
Supercomputers are usually designed to process accounting applications
Mainframes my have multiprocessor components that permit several tasks to be processed at the same instant is time.
Previous
Skip
Next
Question # 58
The people who will have contact with the system, such as employees and customers, are
Choose an answer
Programmers
System analysis
User
Client
Previous
Skip
Next
Question # 59
An English-like language that one can use as a program design tool is.
Choose an answer
BASIC
Pseudocode
PL/I
Pascal
Previous
Skip
Next
Question # 60
Computer user who are not computer procfessionals are sometimes called.
Choose an answer
Librarians
Peripheral users
Information officers
End users
Previous
Skip
Next
Question # 61
A data base files is a collection of which of.
Choose an answer
Cells
Records
Keys
Name and address
Previous
Skip
Next
Question # 62
The number 7F00 in Hexadecimal when multiplied by 61 is.
Choose an answer
7F16
167F00
7F006
None of these
Previous
Skip
Next
Question # 63
Some analysis suggest that telecommuting will become more popular with managers and workers when.
Choose an answer
Worker ae forced to telecommute
Managers finally give up the idea of controlling workers
Multimedia teleconferencing system become affordable
Automobiles become outdated
Previous
Skip
Next
Question # 64
Which of the following is associated with second generation computers.
Choose an answer
Transistors
Magnetic core memory
High level procedural language
All of above
Previous
Skip
Next
Question # 65
Which of the following keyboard shortcut is used to change the case?
Choose an answer
Ctrl + F3
Shift + F3
Alt + F3
Ctrl+Shift +F3
Previous
Skip
Next
Question # 66
Which of the following does not provide a graphical user interface.
Choose an answer
OS/2
MS-DOS
Macintosh
Windows NT work station
Previous
Skip
Next
Question # 67
Which of the following can be used to launch Word Art?
Choose an answer
Status bar
Ruler
Standard tool bar
Drawing tool bar
Previous
Skip
Next
Question # 68
An analog computer can be worked directly with
Choose an answer
Magnetic tapes
Punched card
Magnetic disk
None of the above
Previous
Skip
Next
Question # 69
When all access and processing is done in one location, a computer system is said to be
Choose an answer
Networked
Distributed
Contralized
Linked
Previous
Skip
Next
Question # 70
Most computer crimes are committed by.
Choose an answer
Hackers
International spies
Highly trained computer consultants
Company insiders who have no extraordinary technical ingenuity
Previous
Skip
Next
Back