Computer Sciences Practice Test 1

Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations




PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

978

Computer Practice Test 1

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

15. Preprocessor directives are commands for

2 / 100

14. C was designed to write programs for

3 / 100

C is a:

4 / 100

language is known as fundamental computer language:

5 / 100

8. The programming language that are very close to machine code are called:

6 / 100

5. The computer program is written in:

7 / 100

19. The instructions written in machine language are in the form of:

8 / 100

12. is not decision-making statement:

9 / 100

9. Which of the following is an optional part in switch statement?

10 / 100

5. control structures executes program statements one after another:

11 / 100

14. Which of service of Internet is used to transfer files:

12 / 100

II. Which of the following protocol is used to access web pages on World Wide Web?

13 / 100

16. The computers on the Internet that contain the web sites are called:

14 / 100

17. The process of launching web pages is called:

15 / 100

10. A logical interface to a file is called

16 / 100

17. In text stream characters have correspondence

17 / 100

13. function is used as formatted output file function:

18 / 100

Which of the following mode open only an existing file for both reading and writing?

19 / 100

19. In text file, data is stored in:

20 / 100

15. There are types of streams

21 / 100

12. is cause of virus:

22 / 100

5. Most common crimes are committed by:

23 / 100

18. Format C is an example of:

24 / 100

15. Security Protection for personal computer include:

25 / 100

8. Format C is an example of virus:

26 / 100

13. Types of software that can be freely distributed without violating copyright laws are called:

27 / 100

17. A technique for physically arranging the records of a file on secondary storage device is called

28 / 100

4. In activities, the possible inputs for the database are collected:

29 / 100

is the ingredient of data modeling:

30 / 100

4. When the result of the computation of two very small numbers is too small to be represented, this phenomenon is called:

31 / 100

11. Which of the operator has lowest presidence

32 / 100

17. The logical not (!) operator is denoted as:

33 / 100

14. Which of the following characters cannot be used as first character of a variable name?

34 / 100

2. The rule that a record from a table cannot be deleted if its associated record exists in a related table is called rule

35 / 100

11. How may table view are available in MS-Access?

36 / 100

12. The data in table is entered in:

37 / 100

8. Which of the following buttons of Find and Replace dialog box is clicked to start he search process?

38 / 100

20. coding schemes is used by IBM:

39 / 100

9. The electromagnetic or light waves representing data are called:

40 / 100

8. The is the physical path over which a message travels:

41 / 100

A device used for optical character recognition is a:

42 / 100

18. The data and program are stored permanently on the:

43 / 100

The name for the screen clarity:

44 / 100

10. is an example of system software:

45 / 100

20. Which of the following format specifier is used for string type data?

46 / 100

13. What will be the output of printf(“%d”,’a’);

47 / 100

0. The format specifier %u is used for:

48 / 100

19. The escape sequence to insert horizontal tab is

49 / 100

20. The predefined functions that are part of the programming language and can be used for different purposes are called:

50 / 100

8. A function:

51 / 100

I I. The name of actual and formal parameters:

52 / 100

15. The last statement of the body of the fimction is:

53 / 100

3. Which of the following is true about a function call?

54 / 100

7. A function is called with the reference of its:

55 / 100

17. In a C program two functions can have:

56 / 100

18. The name of actual and formal parameters:

57 / 100

0. Which of the following looks for the prototype of functions used in a program:

58 / 100

9. The actual values are passed to the function in:

59 / 100

13. In a table each column represents

60 / 100

8. A record is a complete set of

61 / 100

17. A place where we can see all the tables and their relationship

62 / 100

I. A database consists of various components called the

63 / 100

5. The process of sharing information among various members of workgroup through computer network is called:

64 / 100

19. Which one represents the shape of network?

65 / 100

1. Insert command is used to insert.

66 / 100

9. Tables are the 1 of our database in Microsoft Access

67 / 100

10. How many are the layouts of Form in MS-Access?

68 / 100

14. The different design elements placed on form are called

69 / 100

20. In addition to navigate records can be used for

70 / 100

5. Forms are designed for:

71 / 100

10. A word processor can be used to

72 / 100

The fly-by-wire system is used in:

73 / 100

16. Modern computer can perform calculations or process at high speed

74 / 100

19. CAT stands for

75 / 100

17. Computer at home can be used for:

76 / 100

17. If a relation is in INF and the key consists of a single attributes then the relation is called.

77 / 100

4. In 3NF, a non-key attribute must not depend on a(n)

78 / 100

1. In 3NF, which form of dependency is removed? (

79 / 100

15. In which of the following normal forms, any repeating group from the table is removed?

80 / 100

6. The component of computer that stores data and program while these are being executed is called:

81 / 100

RAM is a:

82 / 100

2. A set of instructions that run the computer arc:

83 / 100

10. Which component of CPU is responsible for performing arithmetic and logical operations on numeric data?

84 / 100

organizes and controls the hardware and software:

85 / 100

An Operating System is a

86 / 100

16. is the entering point in Windows:

87 / 100

3. Which of the following type of file require largest processing time?

88 / 100

5. SQL is a(n)

89 / 100

18. Which of the following database model has the shape like and organizational chart?

90 / 100

17. Which of the following refers to the correctness and consistency of data?

91 / 100

12. The while loop is also called: (a) conditional loop (b) (c) counter loop (d)
while Both (b) and (c)
wend loop Attribute

92 / 100

1. How many types of loop structur are in C?

93 / 100

6. features of word processor allows to insert text from one file into another file:

94 / 100

3. A word processor includes the process of

95 / 100

15. How many typing modes are provided by word processor?

96 / 100

9. The bar that displays the name of program and the name of documents is called:

97 / 100

13. represents a label:

98 / 100

20. If the custom format is If it, it N N then the number 23349 will be displayed as:

99 / 100

9. is not a feature of spreadsheet program:

100 / 100

18. The default number format assigned to a cell is the:

Your score is

The average score is 59%

0%

BIG SALE! FLAT 50% OFF

Protected