Computer Science :: All Aptitude Test ::

1.How may standard levels of interrupts are provided on the 8-bit ISA bus (XT-class computer)?
A. 4
B. 8
C. 12
D. 4

2.IRQ6 is typically reserved for:
A. The floppy
B. The keyboard controller
C. LPT2
D. The floppy

3.WRAM is used on a
A. modem
B. video card
C. motherboard
D. modem

4.You are testing the resistance in Ohms of a fuse on a 2 amp systems. If the fuse is good, the meter should read?
A. 2
B. 5
C. 0
D. 2

5.To prevent the computer from overheating you should?
A. Remove the slot cover from the back
B. Keep the computer cover closed
C. Remove the CPU fan
D. Remove the slot cover from the back

6.How many devices does USB support?
A. 127
B. 125
C. 100
D. 127

7.Which type of system hoard is the MOST likely candidate for processor upgrading if you want maximum performance and future compatibility?
A. ML
B. PCI
C. ISA
D. ML

8.Which of the following is(are) true of the EDP auditors?
A. they should have computer expertise
B. they will be replaced by traditional auditors in the near future
C. two of the above
D. they should have computer expertise

9.Controls of data communication deal with
A. the communication channel
B. the computer
C. terminals
D. the communication channel

10.A lockbox service is used for
A. depositing cash when bank is closed
B. paying bank customer bills automatically
C. storing papers in a bank vault
D. depositing cash when bank is closed

11.Critical path of the PERT chart is:
A. path which takes the longest time to complete the project
B. the shortest path
C. both of the above
D. path which takes the longest time to complete the project

12.Inventory is also referred to as:
A. stock
B. warehouse capacity
C. materials
D. stock

13.An EOQ formula is an example of a(n)
A. optimizing model
B. static model
C. deterministic model
D. optimizing model

14._____ are knowledge based system to which present rules are applied to solve a particular problem.
A. ES
B. AI
C. KBS
D. ES

15.The _____ is a business-oriented data-processing association which publishes a monthly journal, Data Management.
A. DPMA
B. CDP
C. CISA
D. DPMA

16.The computer can potentially be used to monitor most of our actions, thus robbing us of _____
A. tapping
B. privacy
C. back log
D. tapping

17.A systems theory of organization sees the firm as a
A. network of resource flows
B. system transforming inputs into outputs
C. physical system managed by a manager using a conceptual system
D. network of resource flows

18.A financial modeling package for a PC is similar to a spreadsheet package, but it can handle larger data files than a spreadsheet, and it has a built-in _____ seeking function.
A. aim
B. target
C. goal
D. aim

19._____ means that the manager spends his or her time dealing with exceptions or those situations which are out of control
A. relevant
B. management by exception
C. predictive reports
D. relevant

20._____ decisions are those decisions for which policy standards or guidelines are already established.
A. programmable
B. control
C. predictive reports
D. programmable

21._____ is the use of a model in an attempt to identify and/or reflect the behaviour of a real person, process, or system.
A. master
B. decision
C. plan
D. master

22.One of the three most common types of payment systems is the
A. pinion fund transaction system
B. travel expense reimbursement system
C. accounts payable system
D. pinion fund transaction system

23.Which of the following is not an important principle for evaluating the raw data for decision-making:
A. selection
B. pattern
C. everage
D. selection

24.The analysis and design of application systems are the responsibility of a _____
A. Computer Operator
B. Programmer
C. System Analyst
D. Computer Operator

25.The model curriculum for information-system education suggested by the _____ has a more theoretical and conceptual basis, whereas the model by the _____ is more practical and applied in nature.
A. AI, ES
B. KBS, AI
C. ACM, DPMA
D. AI, ES

26._____ decisions concern the execution of specific tasks to assure that they are. carried out efficiently and effectively.
A. tactical
B. strategic
C. operational
D. tactical

27.The DBA is
A. a person
B. a computer Device
C. a communication technique
D. a person

28.Error reports are an example of:
A. scheduled reports
B. demand reports
C. exception reports
D. scheduled reports

29.A constraint that does not, affect the feasible solution region is known as
A. redundant constraint
B. unbounded solution
C. slack variable
D. redundant constraint

30.The product structure file is also called the
A. item master file
B. bill of materials file
C. operations file
D. item master file


Date to Date Current Affairs 2022

PakMCQs.net

Quick Links

GAT Subject



   Computer Science    English Mcqs    Agriculture    

Engineering



   Computer Science    Civil Engineering    

Technical



   Networking    Electronics    Database    

Past Papers



   Model Papers    FPSC Papers