Computer Sciences Practice Test 1

Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations




PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

978

Computer Practice Test 1

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

5. A data file a stored in:

2 / 100

14. If programs get input data from data file and also send output into data file. It is called:

3 / 100

18. In binary stream bytes have correspondence

4 / 100

12. function is used to read a single character from a file at a time:

5 / 100

2. Which of the following function is used to write a string to a file?

6 / 100

18. If the value of a non-key attribute can be obtained simply by knowing the values of another non-key attribute, the relation is not in: (

7 / 100

7. problems occurs when two different names are used for the same information?

8 / 100

1. In 3NF, which form of dependency is removed? (

9 / 100

20. A process of analyzing the dependencies of attributes with in entities is called

10 / 100

4. The actual working area in Microsoft Excel is:

11 / 100

16. Which of the following is an absolute address?

12 / 100

5. A cell at third column and 15 rows has a cell address:

13 / 100

20. If the custom format is If it, it N N then the number 23349 will be displayed as:

14 / 100

II. A cell of worksheet, which is not active is called:

15 / 100

1. Which of the following is a spreadsheet 2.

16 / 100

12. cell addresses is correct:

17 / 100

14. The 0.0000000001 is displayed in default column width as:

18 / 100

14. format specifiers is used for integer type data:

19 / 100

8. The functions used for input and output are stored in header file:

20 / 100

6. How many variables can be used in one printf() function?

21 / 100

15. format specifiers is used for float type data:

22 / 100

1. A form that contains the sub form is called

23 / 100

11. Which form layout displays multiple records at a time?

24 / 100

12. Form with in a form is called

25 / 100

19. If there are small fmite number of values for a certain field on a form which object will be suitable

26 / 100

18. The form which contains the subform is known as:

27 / 100

12. Relational operators are used to

28 / 100

2. Which of the following is a valid character constant?

29 / 100

3. Which of the data type offers the highest precision?

30 / 100

18. a b is equivalent to

31 / 100

is used to identify records of a relation uniquely:

32 / 100

7. A tuple in a table is also known as

33 / 100

10. The column of relation is known as

34 / 100

15. An attribute is also known as:

35 / 100

13. A table must have:

36 / 100

A table is also known as: (

37 / 100

19. What will be the output of (7 > 8) ?printf(“ABC”):printf(“XYZ”);

38 / 100

5. control structures executes program statements one after another:

39 / 100

18. Which operator in C language is called ternary operator?

40 / 100

2. Which of the following operator is used as decision making statement

41 / 100

7. Another name of conditional operator is

42 / 100

6. The selection statement is also known as:

43 / 100

13. Which of the following operators is used as decision-making statement?

44 / 100

is a collection of related data organized in rows and columns:

45 / 100

I. A database consists of various components called the

46 / 100

19. is a statement that extracts specific information database.

47 / 100

The actual data of Is stored in:

48 / 100

7. Microsoft Access saves the database with the extension
a) .mdb c) .madb

49 / 100

4. MS-Access is a:

50 / 100

FDD1 is a:

51 / 100

10. Which network model consists of many clients and one or more central computers?

52 / 100

14. The media Access Control Sub-layer resides in which layer:

53 / 100

6. What layer of OSI does data compression:

54 / 100

10. Which component of CPU is responsible for performing arithmetic and logical operations on numeric data?

55 / 100

7. virus is activated on the basis of a logical condition:

56 / 100

3. A virus can destroy: (

57 / 100

19. What is the most common computer crime of these listed below?

58 / 100

15. Security Protection for personal computer include:

59 / 100

17. A technique for physically arranging the records of a file on secondary storage device is called

60 / 100

8. tools in involved to the Data Analysis:

61 / 100

12. What indicates the connection between entites

62 / 100

6. Database development process involve mapping of conceptual data model into

63 / 100

20. Computer based weather forecasting depends on accurate collection of data from

64 / 100

15. Typically, and ATM can be used to

65 / 100

5. Ctrl + Alt + Del is

66 / 100

17. Windows explorer is used to

67 / 100

15. involves the processing on multiple processors in a computer:

68 / 100

3. The loop which never ends is called:

69 / 100

17. The of for loop executed only once in the first iteration

70 / 100

9. In while loop, the increment / decrement statement are placed

71 / 100

19. structure is used when programmer does not know is advance the number of repetition of loop?

72 / 100

15. The do-while loop ends with a

73 / 100

19. Font size is measure in:

74 / 100

7. features of word processor allows to specify margins of the documents:

75 / 100

14. The insertion point in the document is also called:

76 / 100

6. features of word processor allows to insert text from one file into another file:

77 / 100

13. shows the margins, position of tabs, and indents etc:

78 / 100

2. is most commonly used word processing package:

79 / 100

16. keys of keyboard in conjunction with arrow keys is used for selecting text:

80 / 100

II. The bar that shows the total pages of document, position of cursor etc. is called:

81 / 100

17. The bold text specifies the: (

82 / 100

19. coding schemes uses 4 bit code:

83 / 100

2. Data communication requires only a:

84 / 100

15. Which type of data consists of words, sentences, and paragraphs?

85 / 100

10. BIT stands for

86 / 100

14. Which of service of Internet is used to transfer files:

87 / 100

Who owns the Internet?

88 / 100

15. Preprocessor directives are commands for

89 / 100

2. Turbo C-H- can compile

90 / 100

18. The program written in assembly language is translated to the machine code with the help of translator program called:

91 / 100

12. A program written in language runs directly on the computer.

92 / 100

4. A set of instruction given to the computer is called:

93 / 100

20. languages is different for different computers:

94 / 100

10. is an example of system software:

95 / 100

11. is an example of packaged software:

96 / 100

16. A set of related files that represent a unit of data is called

97 / 100

9. As in design view, you can move from field to field in the table window in datasheet view using button.

98 / 100

5. The functions that are defined by programmer are called:

99 / 100

15. The last statement of the body of the fimction is:

100 / 100

8. A function:

Your score is

The average score is 59%

0%

BIG SALE! FLAT 50% OFF

Protected