Computer Sciences Practice Test 1

Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations




PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

954

Computer Practice Test 1

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

6. viruses infects the first sector of disk:

2 / 100

8. Format C is an example of virus:

3 / 100

16. A secret word or number to be typed by a keyboard before an activity can take place are called:

4 / 100

17. If a relation is in INF and the key consists of a single attributes then the relation is called.

5 / 100

6. Referential integrity is applied on

6 / 100

15. In which of the following normal forms, any repeating group from the table is removed?

7 / 100

8. problems occurs when same name is used for two different attributes:

8 / 100

18. If the value of a non-key attribute can be obtained simply by knowing the values of another non-key attribute, the relation is not in: (

9 / 100

7. A auto form displays one record at a time.

10 / 100

9. Tables are the 1 of our database in Microsoft Access

11 / 100

6. The forms are the end of our database in Microsoft Access

12 / 100

1. A form that contains the sub form is called

13 / 100

11. Which form layout displays multiple records at a time?

14 / 100

14. The different design elements placed on form are called

15 / 100

12. Form with in a form is called

16 / 100

10. A series of actions that are performed on raw data achieve the required objective and results are called:

17 / 100

9. The manipulated and processed data is called:

18 / 100

. Which of the following is a word processor (

19 / 100

12. In which network model all computers have equal status?

20 / 100

22. All nodes are connected to a single cable in a:

21 / 100

7. Cabling on a linear bus topology can be extended using which of following:

22 / 100

18. is a governing body that approve the network standard:

23 / 100

3. Central computer in the network is called:

24 / 100

20. Which one is not a network topology?

25 / 100

20. languages is different for different computers:

26 / 100

5. The computer program is written in:

27 / 100

19. The instructions written in machine language are in the form of:

28 / 100

4. A set of instruction given to the computer is called:

29 / 100

4. Which one is the brain of computer?

30 / 100

9. The program that contains instructions to operate a device is called:

31 / 100

15. is the component of CPU:

32 / 100

7. A function is called with the reference of its:

33 / 100

7. A variable whose value controls the number of iterations is known as

34 / 100

12. The while loop is also called: (a) conditional loop (b) (c) counter loop (d)
while Both (b) and (c)
wend loop Attribute

35 / 100

14. Semicolon is placed at the end of condition in:

36 / 100

15. The do-while loop ends with a

37 / 100

1. Insert command is used to insert.

38 / 100

17. SQL is used for

39 / 100

16. is known as control key:

40 / 100

11. is used to create data view

41 / 100

The data in table is entered in

42 / 100

12. The data in table is entered in:

43 / 100

4. The actual data of database is stored in:

44 / 100

I. CBT stand for

45 / 100

4. CAL stands for

46 / 100

3. device is used in banks to read cheque of customer:

47 / 100

2. The escape sequence for backslash is:

48 / 100

4. The printf() function is used to display:

49 / 100

7 . is control suing in the statement prinf(“Result = %d”,r);:

50 / 100

1. The function getch() is defined in:

51 / 100

3. function is used to display output on screen:

52 / 100

0. The format specifier %u is used for:

53 / 100

9. is used for flag:

54 / 100

17. How many digits are printed to the right of the decimal point in real number?

55 / 100

8. In a worksheet, a bold rectangle border indicates (n):

56 / 100

5. A cell at third column and 15 rows has a cell address:

57 / 100

15. menus contains the ‘Cells’ command:

58 / 100

a spreadsheet:

59 / 100

18. The default number format assigned to a cell is the:

60 / 100

20. If the custom format is If it, it N N then the number 23349 will be displayed as:

61 / 100

14. The 0.0000000001 is displayed in default column width as:

62 / 100

9. is not a feature of spreadsheet program:

63 / 100

II. A cell of worksheet, which is not active is called:

64 / 100

16. Which of the following is an absolute address?

65 / 100

15. An inkjet printer is an example of a(n):

66 / 100

The name for the screen clarity:

67 / 100

18. Web pages are linked together using?

68 / 100

7. How many types of addressing schemes?

69 / 100

20. protocol is used by news services:

70 / 100

10. If “Yahoo.com” is a domain name, then what will be the top level domain?

71 / 100

15. FTP stands for:

72 / 100

13. services is provided by Internet:

73 / 100

9. Which of the following is an optional part in switch statement?

74 / 100

18. Which operator in C language is called ternary operator?

75 / 100

7. Another name of conditional operator is

76 / 100

17. The conditional operator takes expression.

77 / 100

13. Which of the following operators is used as decision-making statement?

78 / 100

18. is the fundamental property of relational database:

79 / 100

7. Microsoft Access saves the database with the extension
a) .mdb c) .madb

80 / 100

16. Using you can create tables, forms, reports and queries in very short time

81 / 100

17. A place where we can see all the tables and their relationship

82 / 100

13. In a table each column represents

83 / 100

to automate repeated tasks — are used

84 / 100

12. In a table each row represents

85 / 100

6. is element MS-Access application window:

86 / 100

14. Which of the following characters cannot be used as first character of a variable name?

87 / 100

A quantity whose value cannot change during execution of

88 / 100

13. is valid variable name

89 / 100

12. Relational operators are used to

90 / 100

14. If programs get input data from data file and also send output into data file. It is called:

91 / 100

10. A logical interface to a file is called

92 / 100

20. is not related to an entity:

93 / 100

3. is called the preliminary investigation of the required database:

94 / 100

17. A technique for physically arranging the records of a file on secondary storage device is called

95 / 100

In E-R diagram, a rectangular box is used to represent a(n):

96 / 100

15. involves the processing on multiple processors in a computer:

97 / 100

18. acts as file manager for Windows: (

98 / 100

5. Ctrl + Alt + Del is

99 / 100

19. coding schemes uses 4 bit code:

100 / 100

7. A device that receives messages is called:

Your score is

The average score is 59%

0%

BIG SALE! FLAT 50% OFF

Protected

Open chat
Salam
Can we help you?