Computer Sciences Practice Test 1

Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations




PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

978

Computer Practice Test 1

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

11. is used to create data view

2 / 100

10. The column of relation is known as

3 / 100

represents an entity

4 / 100

3. Anything in the real world that has a set of different attributes or properties is called:

5 / 100

1. Insert command is used to insert.

6 / 100

15. An attribute is also known as:

7 / 100

9. Computer at home can be used

8 / 100

20. Computer based weather forecasting depends on accurate collection of data from

9 / 100

4. CAL stands for

10 / 100

4. The actual working area in Microsoft Excel is:

11 / 100

6. A collection of related worksheets is called:

12 / 100

17. Each number format consists of part:

13 / 100

16. Which of the following is an absolute address?

14 / 100

14. The 0.0000000001 is displayed in default column width as:

15 / 100

16. is the entering point in Windows:

16 / 100

is most necessary to interact with the computer:

17 / 100

10. What type of operating system MS-DOS is?

18 / 100

20. By default, Windows save the documents created in MS-Word in the folder:

19 / 100

organizes and controls the hardware and software:

20 / 100

15. In C, the maximum length of variable name is:

21 / 100

19. The words used to write the statements of a program are called

22 / 100

is not a valid variable

23 / 100

17. The logical not (!) operator is denoted as:

24 / 100

How many keywords are in C?

25 / 100

14. Which of the following characters cannot be used as first character of a variable name?

26 / 100

18. is the fundamental property of relational database:

27 / 100

14. A query is a more flexible way of

28 / 100

For the input of image data:

29 / 100

18. The data and program are stored permanently on the:

30 / 100

CPU stands for:

31 / 100

Data processing is also called:

32 / 100

13. is not an application software:

33 / 100

17. A Form within another form is called:

34 / 100

2. How many basic layouts of forms are here in Microsoft Access.

35 / 100

10. How many are the layouts of Form in MS-Access?

36 / 100

1. A form that contains the sub form is called

37 / 100

7. How many types of addressing schemes?

38 / 100

12. Which of the following forma specifier is used for character type data

39 / 100

18. is used with format specifier to display output left-justified:

40 / 100

3. function is used to display output on screen:

41 / 100

19. The escape sequence to insert horizontal tab is

42 / 100

14. Semicolon is placed at the end of condition in:

43 / 100

6. Which one is not a loop structure

44 / 100

13. The body of loop comes before the test condition in:

45 / 100

6. In a relational database, a single piece of information is called:

46 / 100

8. Which of the following buttons of Find and Replace dialog box is clicked to start he search process?

47 / 100

2. The rule that a record from a table cannot be deleted if its associated record exists in a related table is called rule

48 / 100

13. The structure of table is designed in:

49 / 100

20. is th efault field size of Text data type in MS-Access:

50 / 100

3. On successfully closing a file , the fclose( ) returns:

51 / 100

2. Which of the following function is used to write a string to a file?

52 / 100

13. function is used as formatted output file function:

53 / 100

20. is true about a stream:

54 / 100

18. In binary stream bytes have correspondence

55 / 100

15. In which of the following normal forms, any repeating group from the table is removed?

56 / 100

17. If a relation is in INF and the key consists of a single attributes then the relation is called.

57 / 100

5. Different attributes in two different tables having same name are referred to as (

58 / 100

14. A foreign key constraint is also called

59 / 100

19. A process in which it is being ensured that attributes are stored from where they belong

60 / 100

I I. The name of actual and formal parameters:

61 / 100

15. The last statement of the body of the fimction is:

62 / 100

18. The name of actual and formal parameters:

63 / 100

6. What layer of OSI does data compression:

64 / 100

21. One or more computers connected to a hub is a:

65 / 100

5. The process of sharing information among various members of workgroup through computer network is called:

66 / 100

22. All nodes are connected to a single cable in a:

67 / 100

Which one is dedicated server?

68 / 100

. Which of the following is a word processor (

69 / 100

17. The bold text specifies the: (

70 / 100

5. During text entering process into document. the cursor automatically shifts to the next line when it reaches to the right margin. This feature of word processor is called:

71 / 100

2. is most commonly used word processing package:

72 / 100

16. keys of keyboard in conjunction with arrow keys is used for selecting text:

73 / 100

12. Which of the following can be used to launch the WordArt?

74 / 100

2. An entity related to itself in an ERD model refers to

75 / 100

17. A technique for physically arranging the records of a file on secondary storage device is called

76 / 100

20. is not related to an entity:

77 / 100

I. Which of the following keys does not hold uniqueness property

78 / 100

9. The process to identify the data objects and the relationships between them is:

79 / 100

In E-R diagram, a rectangular box is used to represent a(n):

80 / 100

5. control structures executes program statements one after another:

81 / 100

4. Which one is a control structure?

82 / 100

19. What will be the output of (7 > 8) ?printf(“ABC”):printf(“XYZ”);

83 / 100

8. The programming language that are very close to machine code are called:

84 / 100

2. Turbo C-H- can compile

85 / 100

5. The computer program is written in:

86 / 100

17. .exe file is produced by the:

87 / 100

12. A program written in language runs directly on the computer.

88 / 100

9. The manipulated and processed data is called:

89 / 100

9. The electromagnetic or light waves representing data are called:

90 / 100

20. coding schemes is used by IBM:

91 / 100

16. The charts, graphs and pictures are examples of:

92 / 100

18. Format C is an example of:

93 / 100

14. Another name for antivirus is:

94 / 100

16. A secret word or number to be typed by a keyboard before an activity can take place are called:

95 / 100

6. viruses infects the first sector of disk:

96 / 100

RAM is a:

97 / 100

4. Which one is the brain of computer?

98 / 100

18. CPU is an example of:

99 / 100

1. Data and programs that are not being use by computer are stored in:

100 / 100

The address of instruction under

Your score is

The average score is 59%

0%

BIG SALE! FLAT 50% OFF

Protected