More Classes
5th Class
6th Class
7th Class
8th Class
9th Class
10th Class
11th Class
12th Class
NAT I
NAT II
CSS
IQ
General Knowledge
MDCAT
ECAT
GAT General
GAT Subject
Other Links
Go to Home
Online Tests
GAT Subject Computer Science Online MCQs MCQs With Answers
Question # 1
What is query
Choose an answer
Question or inquiry
Answer
Command
Form
Previous
Skip
Next
Question # 2
Which of the following is an acronym for a computer department.
Choose an answer
MIS
PDA
CPU
LAN
Previous
Skip
Next
Question # 3
Which component is responsible for comparing the contents of two pieces of data?
Choose an answer
ALU
Control Unit
Memory
None
Previous
Skip
Next
Question # 4
K Represents.
Choose an answer
100010
210
102410
10002
Previous
Skip
Next
Question # 5
WAN stand for
Choose an answer
World area network
Wide Area network
Westran Area network
Wilson Ara network
Previous
Skip
Next
Question # 6
The leading software manufacturer is
Choose an answer
Apple
IBM
MITS
Microsoft
Previous
Skip
Next
Question # 7
Integrated circuits are housed in .
Choose an answer
Vacuum tubes
Transistors
Software
Silicon chips
Previous
Skip
Next
Question # 8
Productivity tools that help computer users solve problems are called.
Choose an answer
Systems software programs
Translator program
Application program
None of above
Previous
Skip
Next
Question # 9
Programming and testing are elements of
Choose an answer
systems analysis
System development
systems design
Implementation
Previous
Skip
Next
Question # 10
A built in number that identifies a location in storage.
Choose an answer
Character
word
byte
address
Previous
Skip
Next
Question # 11
One common problem with computer monitoring is that workers who are monitored may
Choose an answer
Develop carpal tunnel syndrome
Assume that if it's not being counted, it's not important enough to do
Require ongoing training
Come in contact with computer viruses
Previous
Skip
Next
Question # 12
A complex system that can assume complete responsibility for a task without human input is called an.
Choose an answer
Independent weapons system
Autonomous system
Generated system
Smart weapon system.
Previous
Skip
Next
Question # 13
Catagories of database system are
Choose an answer
4
7
6
9
Previous
Skip
Next
Question # 14
A disabled student uses a computer and modem to earn a college degree without leaving home. This is an example of
Choose an answer
Visualization
Distance learning
CAD/CAM
Virtual reality
Previous
Skip
Next
Question # 15
Computer supported cooperative work is possible if.
Choose an answer
Groupware and telecommunications are available
Workers have close proximity
Workers live in the same time zone for interactivity to take place
None of these CSCW is a futuristic ideal that, for the most part, hasn't been acknowledged
Previous
Skip
Next
Question # 16
For creating and editing legal documents which application package would be most useful.
Choose an answer
Spreadsheet
Word processing
Graphics
Communication
Previous
Skip
Next
Question # 17
Main memory of personal computer is called.
Choose an answer
PROM
ROM
EPROM
RAM
Previous
Skip
Next
Question # 18
Which of the following most accurately describe the hierarchical organization of a database.
Choose an answer
Characters, files, records, bits.
Files, fields, records
Fields, records, files
Database are organized hierarchically
Previous
Skip
Next
Question # 19
Software program designed to be managed, rather than manipulated by the user, are called.
Choose an answer
Icons
knowledge workers
Enablers
Agents
Previous
Skip
Next
Question # 20
A network type in which all computers have equal status.
Choose an answer
Communication links
peer to peer
WAN
direct connect
Previous
Skip
Next
Question # 21
A Computer devices its basic strength from
Choose an answer
Speed
Accuracy
Memory
All of the above
Previous
Skip
Next
Question # 22
Violations of the rules of grammar of a programming language are called.
Choose an answer
Syntax errors
Programming errors
Translator errors
Logic errors
Previous
Skip
Next
Question # 23
The signals produced by a computer or terminal to be sent over phone lines must be converted to.
Choose an answer
modems
analog signals
digital signals
microwaves
Previous
Skip
Next
Question # 24
10 -point Helvetica, 10-point Times, 10-point Avant Grade, and 10-point Zapf chancery are all examples of.
Choose an answer
serifs
text justifications
fonts
pixels
Previous
Skip
Next
Question # 25
Most computer crimes are committed by.
Choose an answer
Hackers
International spies
Highly trained computer consultants
Company insiders who have no extraordinary technical ingenuity
Previous
Skip
Next
Question # 26
Assembly languages, or symbolic languages , use
Choose an answer
Binary code
Abbreviations for instructions
Numbers
English words
Previous
Skip
Next
Question # 27
To open a version of a document means to copy it back from.
Choose an answer
Printed copy
floppy disk into the computer's memory
Hard disk into the computer's memory
Either b or c
Previous
Skip
Next
Question # 28
The operation of arithmetic logic unit is directed by.
Choose an answer
the ALU Itself
Program
Control Unit
Memory unit
Previous
Skip
Next
Question # 29
The main characteristic of fifth generation computers is.
Choose an answer
Artificial intelligence.
Windows operation
All of the above
None of these
Previous
Skip
Next
Question # 30
Which of the following would work to keep a class gradebook that automatically upgrades totals when grades are entered?
Choose an answer
Word processor
Spread sheet
MS-DOS
None of these
Previous
Skip
Next
Question # 31
A computer program written in a high level language is called a.
Choose an answer
Source program
Object program
Machine language program
None of these
Previous
Skip
Next
Question # 32
One of the more computers connected to a hub computer is.
Choose an answer
Ring network
Node
Information utility
Star network
Previous
Skip
Next
Question # 33
Which one of the following commands deletes all files and subdirectories in a directory?
Choose an answer
DELL
DELETE
DELL TREE
None of these
Previous
Skip
Next
Question # 34
The person who fills the role of change agent is the
Choose an answer
System user
System analyst
Administrator
client
Previous
Skip
Next
Question # 35
Storage of 1 K means that it has following number of storage location.
Choose an answer
1000
964
1024
1032
Previous
Skip
Next
Question # 36
Electronic banking.
Choose an answer
Token ring
Mosale
EFT
BBS
Previous
Skip
Next
Question # 37
You want to produce personalized form letters, so you sue the ____ capability of the word processor.
Choose an answer
Sort
Mail merge
Style and grammar checker
Desktop publishing
Previous
Skip
Next
Question # 38
PDP-5,PDP-9,IBM-360 series and IBM-370 series belong to the
Choose an answer
First generation computers
Second generation computers
Third generation computers
Fourth generation computers
Previous
Skip
Next
Question # 39
BCD code is.
Choose an answer
4 bits code
5 bits code
6 bits code
8 bits code
Previous
Skip
Next
Question # 40
One problem with high-tech weapons is that.
Choose an answer
they have become too large to store securely
they reduce the amount of time people have to make life and death decisions.
When people try to control them manually, they are unpredictable
There is no problem with high tech weapons.
Previous
Skip
Next
Question # 41
Which of the following topologies is passive?
Choose an answer
Star topology
Ring topology
Bus topology
Hybrid topology
Previous
Skip
Next
Back