Computer Sciences Practice Test 1


Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations




PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

925

Computer Practice Test 1

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

17. Which is not an antivirus program?

2 / 100

3. A virus can destroy: (

3 / 100

19. What is the most common computer crime of these listed below?

4 / 100

15. Security Protection for personal computer include:

5 / 100

14. Which of service of Internet is used to transfer files:

6 / 100

3. The globe has become a global village, due to:

7 / 100

4. When DARPA established a small computer network?

8 / 100

16. The computers on the Internet that contain the web sites are called:

9 / 100

15. FTP stands for:

10 / 100

I. A LAN is a combination of:

11 / 100

3. Central computer in the network is called:

12 / 100

10. Which network model consists of many clients and one or more central computers?

13 / 100

4. The larger computer to which the terminal or PC is attached is called:

14 / 100

The software used for workgroup computing is called:

15 / 100

FDD1 is a:

16 / 100

is used to identify records of a relation uniquely:

17 / 100

14. A key that consists of two or more than two attributes of a table is called

18 / 100

19. serves as a bridge between end users and database administrator:

19 / 100

7. A tuple in a table is also known as

20 / 100

20. The last statement of each case in switch statement must be a:

21 / 100

2. Which of the following operator is used as decision making statement

22 / 100

10. structures is a selection structure:

23 / 100

12. is not decision-making statement:

24 / 100

6. The selection statement is also known as:

25 / 100

3. Debug is the process of:

26 / 100

18. The program written in assembly language is translated to the machine code with the help of translator program called:

27 / 100

8. The programming language that are very close to machine code are called:

28 / 100

II. The bar that shows the total pages of document, position of cursor etc. is called:

29 / 100

13. shows the margins, position of tabs, and indents etc:

30 / 100

9. The bar that displays the name of program and the name of documents is called:

31 / 100

7. features of word processor allows to specify margins of the documents:

32 / 100

is not a feature of simple word processor or text editor:

33 / 100

16. keys of keyboard in conjunction with arrow keys is used for selecting text:

34 / 100

a spreadsheet:

35 / 100

4. The actual working area in Microsoft Excel is:

36 / 100

3. Which of the following is true about a function call?

37 / 100

0. Which of the following looks for the prototype of functions used in a program:

38 / 100

13. The printf() is a:

39 / 100

RAM is a:

40 / 100

12. Which is a storage device?

41 / 100

The fly-by-wire system is used in:

42 / 100

4. CAL stands for

43 / 100

is not relevant to office automation:

44 / 100

10. A word processor can be used to

45 / 100

16. The charts, graphs and pictures are examples of:

46 / 100

14. The height of wave within a given period of time is called:

47 / 100

10. The relationship between the entities is represented graphically by using:

48 / 100

19. represents entity:

49 / 100

3. is called the preliminary investigation of the required database:

50 / 100

I. Which of the following keys does not hold uniqueness property

51 / 100

15. In E-R diagram, an oval shape is used to represent a(n):

52 / 100

20. is not related to an entity:

53 / 100

6. Database development process involve mapping of conceptual data model into

54 / 100

2. Which of the following is a valid character constant?

55 / 100

4. When the result of the computation of two very small numbers is too small to be represented, this phenomenon is called:

56 / 100

is not a valid variable

57 / 100

How many keywords are in C?

58 / 100

19. The words used to write the statements of a program are called

59 / 100

5. The predefined words of the programming language that are used for special purposes in the source program are called:

60 / 100

20. elements of program in not token:

61 / 100

11. is an example of packaged software:

62 / 100

The processed data is called:

63 / 100

15. An inkjet printer is an example of a(n):

64 / 100

The name for the screen clarity:

65 / 100

is category software:

66 / 100

19. is the default data e in MS-Access:

67 / 100

14. views can be used to add, edit, and delete records to and from the table:

68 / 100

12. The data in table is entered in:

69 / 100

The data in table is entered in

70 / 100

9. As in design view, you can move from field to field in the table window in datasheet view using button.

71 / 100

1. A form that contains the sub form is called

72 / 100

19. If there are small fmite number of values for a certain field on a form which object will be suitable

73 / 100

8. Which of the following is used to retrieve data from one or more tables of database and to present it to the user in a formatted way.

74 / 100

12. Form with in a form is called

75 / 100

4. A form is an object of

76 / 100

9. Tables are the 1 of our database in Microsoft Access

77 / 100

14. Semicolon is placed at the end of condition in:

78 / 100

8. In while loop, the loop control variable always initialized

79 / 100

12. The while loop is also called: (a) conditional loop (b) (c) counter loop (d)
while Both (b) and (c)
wend loop Attribute

80 / 100

17. Which of the following refers to the correctness and consistency of data?

81 / 100

8. represents an object:

82 / 100

16. A set of related files that represent a unit of data is called

83 / 100

19. The escape sequence to insert horizontal tab is

84 / 100

20. Which of the following format specifier is used for string type data?

85 / 100

18. is used with format specifier to display output left-justified:

86 / 100

11. The escape sequence for carriage return is

87 / 100

17. If a relation is in INF and the key consists of a single attributes then the relation is called.

88 / 100

12. Data integrity is another form of data

89 / 100

10. The process of converting complex data structure into simple and stable data structure is called: a –

90 / 100

14. A foreign key constraint is also called

91 / 100

3. The constraint states that in a relation no primary key value can have a null value.

92 / 100

16. A relation is in second normal form if and only if:

93 / 100

The actual data of Is stored in:

94 / 100

18. is the fundamental property of relational database:

95 / 100

12. In a table each row represents

96 / 100

I. A database consists of various components called the

97 / 100

Which of the following mode open only an existing file for both reading and writing?

98 / 100

10. A logical interface to a file is called

99 / 100

15. There are types of streams

100 / 100

1. A file is stored in

Your score is

The average score is 59%

0%

,

EID SALE! FLAT 60% OFF

Protected

Open chat
Salam
Can we help you?