More Classes
5th Class
6th Class
7th Class
8th Class
9th Class
10th Class
11th Class
12th Class
NAT I
NAT II
CSS
IQ
General Knowledge
MDCAT
ECAT
GAT General
GAT Subject
Other Links
Go to Home
Online Tests
GAT Subject Computer Science Online MCQs MCQs With Answers
Question # 1
A large, room sized computer is referred to as an
Choose an answer
Microcomputer
Main frame
Embedded comptuer
Workstation
Previous
Skip
Next
Question # 2
Which of the following is an acronym for a computer department.
Choose an answer
MIS
PDA
CPU
LAN
Previous
Skip
Next
Question # 3
Which of the following components is the "brain" of the computer
Choose an answer
Memory
CPU
Input
Output
Previous
Skip
Next
Question # 4
An approach to increae speed is
Choose an answer
CISC
Parallel processing
Serial processing
CMOS
Previous
Skip
Next
Question # 5
Hashing , to get an address, is the process of applying a formula to a .
Choose an answer
Key
Record
File
Character
Previous
Skip
Next
Question # 6
IBM's System/360 family of computers was introduced during the .
Choose an answer
1950s
Third generation
Second generation
1990s
Previous
Skip
Next
Question # 7
A set of software tools for automated design is called.
Choose an answer
Prototypes
Data flow diagrams
CASE
Ganit clrarts
Previous
Skip
Next
Question # 8
Real time computing is possible because of the following number of storage locations.
Choose an answer
Storage capability
High speed
Accuracy
Versatility
Previous
Skip
Next
Question # 9
The process of converting from analog to digital is called.
Choose an answer
Modulation
Line switching
Telecommuting
Demodulation
Previous
Skip
Next
Question # 10
One complement of 1011.010 is
Choose an answer
0100.101
0100.101
1011.101
0100.010
Previous
Skip
Next
Question # 11
The people who will have contact with the system, such as employers and customers, are.
Choose an answer
Progmmers
Users
Client
System analysis
Previous
Skip
Next
Question # 12
A computer derives its basic strength from.
Choose an answer
Speed
Accuracy
Memory
All of above
Previous
Skip
Next
Question # 13
Screen displays for video games and embellished photographic images involve the use of.
Choose an answer
Bitmapped image editing
Object oriented drawing
Illustration software
One of these
Previous
Skip
Next
Question # 14
The operation of arithmetic logic unit is directed by.
Choose an answer
the ALU Itself
Program
Control Unit
Memory unit
Previous
Skip
Next
Question # 15
Temporary storage areas within the CPU are called.
Choose an answer
ROMs
Registers
Accumulators
Addresses
Previous
Skip
Next
Question # 16
The memory area for programs with highest priority.
Choose an answer
Frames
Foreground
Page table
Dafault drive
Previous
Skip
Next
Question # 17
Information transformations are performed by the
Choose an answer
Central processing unit
Input devices
Out put devices
File description
Previous
Skip
Next
Question # 18
_________ are the computers designed for complex scientific job.
Choose an answer
Mainframe computers
Mini computers
Micro computer
Super computers
Previous
Skip
Next
Question # 19
Monochrome graphics programs are efficient and easy to learn but limited in their ability to produce.
Choose an answer
Realistic images
Simulated shades of gray
One bit graphics
Single colors
Previous
Skip
Next
Question # 20
An automated factory is more efficient than a traditional factory because.
Choose an answer
Integration of planning and manufacturing is tighter
Materials and machines spend less time sitting idle
Wast in facilities, raw material and labor is reduced
All of the above
Previous
Skip
Next
Question # 21
The arrangement in which most of the processing is done by the server.
Choose an answer
Simplex transmission
Electronic data interchange
File server
Client/Server
Previous
Skip
Next
Question # 22
Present day of computers in research labs can.
Choose an answer
Recognize some forms of natural language input
Create artistic drawings
Learn
All of the above
Previous
Skip
Next
Question # 23
Offices that are set up so workers can commute to a location near their home are called.
Choose an answer
Regional work centers
Portable computer centers
BEHEMOTHS
Modem stations
Previous
Skip
Next
Question # 24
The result of a formula in a cell
Choose an answer
Label
range
Value
Displayed value
Previous
Skip
Next
Question # 25
What is the standard method of allowing only known and authorized users on a multi user computer system.
Choose an answer
Identification by fingerprints.
Passwords and or login name
Expert systems
voice recognition
Previous
Skip
Next
Question # 26
The largest mainframe database are referred to as.
Choose an answer
Distributed
Centralized
Real time
time managers
Previous
Skip
Next
Question # 27
One of the more computers connected to a hub computer is.
Choose an answer
Ring network
Node
Information utility
Star network
Previous
Skip
Next
Question # 28
Logical security for on line systems is achieved primarily by_ and authorization codes.
Choose an answer
MIS
Passwords
Tactical
None of the abvoe
Previous
Skip
Next
Question # 29
A chart of positions and departments within an organization .
Choose an answer
A data flow diagram
A project management report
An organization chart
A Gantt chart
Previous
Skip
Next
Question # 30
Productivity tools that help computer users solve problems are called.
Choose an answer
Systems software programs
Translator program
Application program
None of above
Previous
Skip
Next
Question # 31
May experts predict that the most important enhancement to the user interface of the future will be.
Choose an answer
A new menu structure.
Talk writers
Knowledge
A new type of pointing device.
Previous
Skip
Next
Question # 32
Data and program not being used by computr are stored in.
Choose an answer
Secondary storage
Cache
Primary storage
Printer
Previous
Skip
Next
Question # 33
Retaining data for future reference is called.
Choose an answer
Sorting
Storing
Memorizing
Outputting
Previous
Skip
Next
Question # 34
Smart cards.
Choose an answer
Have a microprocessor and memory in them
Are currently only used for checking and credit card services.
a and b
None of these
Previous
Skip
Next
Question # 35
Security protection for personal computers includes
Choose an answer
Internal components
Lock and cable
Soft ware
all of these
Previous
Skip
Next
Question # 36
The active cell.
Choose an answer
Current cell
Formula
Range
Cell address
Previous
Skip
Next
Question # 37
The complex set of electrical circuitry that executes program instructions is called the.
Choose an answer
Register
CPU
Accumulator
Bus line
Previous
Skip
Next
Question # 38
Broadband fiber optic cables can simultaneously transmit.
Choose an answer
Telephone cells and television signals
Two way computer communications
Software and firmware
a and b
Previous
Skip
Next
Question # 39
The set of choice on the screen is called an
Choose an answer
Menu
Editor
Reverse video
Template
Previous
Skip
Next
Question # 40
Which of the following is not used in educational software?
Choose an answer
Simulation
Drill and practice
Hypermedia
All of these are used
Previous
Skip
Next
Question # 41
A set of rules for the exchange of data between a terminal and a computer or between two computers is called.
Choose an answer
Modems
Protocol
bps
Transmissons
Previous
Skip
Next
Question # 42
The computer program consists of mainly the following number of parts.
Choose an answer
2
3
4
5
Previous
Skip
Next
Question # 43
One form of build in software protection for data is.
Choose an answer
Secured waste
applicant screeining
User profile
Auditor checks
Previous
Skip
Next
Question # 44
The ENIAC, using ABC principles was designed by.
Choose an answer
Charles Babbage
Bell Laboratories
John V. Atanasoff
Mauchly and Echert
Previous
Skip
Next
Question # 45
What is the maximum length of variable name in C language?
Choose an answer
20
31
250
253
Previous
Skip
Next
Question # 46
During E-time the ALU
Choose an answer
Examines the instruction
Enters the instruction
Executes the instruction
Elicits the instruction
Previous
Skip
Next
Question # 47
____________ operating systems are used to control machinery scientific instruments and industrial systems.
Choose an answer
Batch
Single User
Real time
All of the above
Previous
Skip
Next
Question # 48
Storing records one after another in a file in an ascending or descending order determined by the record keyis called.
Choose an answer
Sequential processing
Serial processing
Batch processing
All of the above
Previous
Skip
Next
Question # 49
A cross between a computer language and plain English is called.
Choose an answer
COBOL
Assembler
Algorithm
Pseudocode
Previous
Skip
Next
Question # 50
Second generation computers belong to.
Choose an answer
1956-1963
1945-1956
1964-1971
1971 - Present
Previous
Skip
Next
Question # 51
What is the best definition of hypermedia?
Choose an answer
It is the processing of data at high speed
It is the use fo animation to illustrate a subject
It links huge amounts of data in virtually any pattern
It is the use of satellites to ransfer data
Previous
Skip
Next
Question # 52
The device are used by a person or other system to communicate with a computer are called.
Choose an answer
Communication devices
I/O devices
message devices
All of the above
Previous
Skip
Next
Question # 53
Which of the following is associated with optics.
Choose an answer
Winchester
RAM
CD ROM
None of these
Previous
Skip
Next
Question # 54
Historically , the first computers were used for.
Choose an answer
Text processing
Data storage
Simulation and modelling
Arithmetic calculations
Previous
Skip
Next
Question # 55
In EBCDIC coded each character is denoted by.
Choose an answer
3 bits
4 bits
5 bits
8 bits
Previous
Skip
Next
Question # 56
An example of a high level language is.
Choose an answer
DOS
An algorithm
FORTRAN
An assembler
Previous
Skip
Next
Question # 57
DROP TABLE statement is used for.
Choose an answer
Deleting record
Inserting record
Deleting table
Retirieving records
Previous
Skip
Next
Question # 58
Management of an operating system is handled by
Choose an answer
By interpreter
The supervisor program
Utility program
The CPU
Previous
Skip
Next
Question # 59
A computer is capable of performing almost any task, provided that it can be.
Choose an answer
Coded
Memorized
Analyzed
Reduced to a series of logical steps
Previous
Skip
Next
Question # 60
Base 8 is often used in computing because
Choose an answer
There are 8 bit in a byte
Calculations become casier by using base 8
Electronic circuits can be made economically
It can represent long string of binary I's in a more compact form.
Previous
Skip
Next
Question # 61
Who Invented the modem?
Choose an answer
IBM
DEC
AT & T information system, USA
Apple computers Inc.
Previous
Skip
Next
Question # 62
Violations of the rules of grammar of a programming language are called.
Choose an answer
Syntax errors
Programming errors
Translator errors
Logic errors
Previous
Skip
Next
Question # 63
Which key is used for moving cursor to next field of table?
Choose an answer
Ctrl
Alt
Tab
Spacebar
Previous
Skip
Next
Question # 64
A spell checker that cheeks every word as it is typed and beeps or flashes each time a word is typed incorrectly is called an.
Choose an answer
Idea processor
Interactive spelling checker
Batch spelling checker
Believability index
Previous
Skip
Next
Question # 65
Which of the following can be used to launch Word Art?
Choose an answer
Status bar
Ruler
Standard tool bar
Drawing tool bar
Previous
Skip
Next
Question # 66
The following are all programming languages except for.
Choose an answer
FORTRAN
C
Pascal
MS-DOS
Previous
Skip
Next
Question # 67
The programming language that was designed to encourage programmers to write structured program was.
Choose an answer
PASCAL
COBOL
BASIC
FORTRAN
Previous
Skip
Next
Question # 68
Rearranging of data in a sequence is called.
Choose an answer
updating
Editing
Batching
Sorting
Previous
Skip
Next
Question # 69
The number of bits devoted to each pixel in a bitmapped graphics program is referred to as.
Choose an answer
Pixel depth
Resolution
Pixel strength
Density
Previous
Skip
Next
Question # 70
The language small talk is.
Choose an answer
Procedural oriented
Document oriented
Problem oriented
Object oriented
Previous
Skip
Next
Question # 71
In C language , how many types of loop statements are available.
Choose an answer
2
3
6
9
Previous
Skip
Next
Back