Computer Sciences Practice Test 1

Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations




PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

978

Computer Practice Test 1

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

6. A collection of raw facts and figures is called:

2 / 100

12. Light, sound, and radio waves are examples of:

3 / 100

7. A device that receives messages is called:

4 / 100

Microwave transmission, coaxial cables and fiber optic are examples of:

5 / 100

16. The charts, graphs and pictures are examples of:

6 / 100

20. coding schemes is used by IBM:

7 / 100

The data in table is entered in

8 / 100

8. Which of the following buttons of Find and Replace dialog box is clicked to start he search process?

9 / 100

4. The actual data of database is stored in:

10 / 100

15. FTP stands for:

11 / 100

2. A collection of millions of computers interlink to one another is called:

12 / 100

19. represents URL address:

13 / 100

12. Which one represents the top level domain?

14 / 100

4. When DARPA established a small computer network?

15 / 100

8. specifies the correct format of IP address:

16 / 100

7. A tuple in a table is also known as

17 / 100

9. The rows of a table or relation are known as:

18 / 100

10. The column of relation is known as

19 / 100

14. A key that consists of two or more than two attributes of a table is called

20 / 100

2. The foreign key is found in

21 / 100

2. is a loop statement:

22 / 100

11. The body of I comes er the test condition in:

23 / 100

16. The loop will execute at least even the condition is false

24 / 100

4. loop structures are available in C language:

25 / 100

19. structure is used when programmer does not know is advance the number of repetition of loop?

26 / 100

14. Semicolon is placed at the end of condition in:

27 / 100

6. Which one is not a loop structure

28 / 100

10. structure executes the body of loop at least once:

29 / 100

18. is related to loop structures:

30 / 100

is the ingredient of data modeling:

31 / 100

8. tools in involved to the Data Analysis:

32 / 100

18. An index may be created on

33 / 100

16. Each of the following is a form layout except.

34 / 100

6. The forms are the end of our database in Microsoft Access

35 / 100

20. In addition to navigate records can be used for

36 / 100

9. Tables are the 1 of our database in Microsoft Access

37 / 100

5. Forms are designed for:

38 / 100

3. Debug is the process of:

39 / 100

20. languages is different for different computers:

40 / 100

2. Turbo C-H- can compile

41 / 100

8. The programming language that are very close to machine code are called:

42 / 100

19. The instructions written in machine language are in the form of:

43 / 100

12. A program written in language runs directly on the computer.

44 / 100

3. is the most popular and powerful DBMS:

45 / 100

6. is element MS-Access application window:

46 / 100

5. represents of wizard of DBMS:

47 / 100

16. Using you can create tables, forms, reports and queries in very short time

48 / 100

scanners is used in hospitals:

49 / 100

15. Typically, and ATM can be used to

50 / 100

16. Modern computer can perform calculations or process at high speed

51 / 100

Collection of raw facts and figures is called:

52 / 100

is secondary storage device:

53 / 100

8. GUI stands for:

54 / 100

13. is based on the NT technology:

55 / 100

is an example of command line operating system:

56 / 100

7. virus is activated on the basis of a logical condition:

57 / 100

8. Format C is an example of virus:

58 / 100

11. is an anti-virus program:

59 / 100

14. Another name for antivirus is:

60 / 100

15. Security Protection for personal computer include:

61 / 100

0. The format specifier %u is used for:

62 / 100

5. is not used in control or format string in a prindo function:

63 / 100

15. format specifiers is used for float type data:

64 / 100

22. All nodes are connected to a single cable in a:

65 / 100

14. The media Access Control Sub-layer resides in which layer:

66 / 100

FDD1 is a:

67 / 100

21. One or more computers connected to a hub is a:

68 / 100

20. Which one is not a network topology?

69 / 100

15. is the component of CPU:

70 / 100

6. The component of computer that stores data and program while these are being executed is called:

71 / 100

18. A common font size used in business documents is:

72 / 100

13. shows the margins, position of tabs, and indents etc:

73 / 100

5. During text entering process into document. the cursor automatically shifts to the next line when it reaches to the right margin. This feature of word processor is called:

74 / 100

3. A word processor includes the process of

75 / 100

15. How many typing modes are provided by word processor?

76 / 100

14. If programs get input data from data file and also send output into data file. It is called:

77 / 100

1. A file is stored in

78 / 100

Which of the following mode open only an existing file for both reading and writing?

79 / 100

12. is not decision-making statement:

80 / 100

13. Which of the following operators is used as decision-making statement?

81 / 100

14. is used for making two-way decision:

82 / 100

2. Which of the following operator is used as decision making statement

83 / 100

2. Global variables are created in

84 / 100

17. In a C program two functions can have:

85 / 100

6. Mother name for built-in function is:

86 / 100

15. The last statement of the body of the fimction is:

87 / 100

14. The actual body of the function is defined in:

88 / 100

12. Formal arguments are also called

89 / 100

18. The name of actual and formal parameters:

90 / 100

7. A function is called with the reference of its:

91 / 100

17. Each number format consists of part:

92 / 100

20. If the custom format is If it, it N N then the number 23349 will be displayed as:

93 / 100

7. The currently selected cell where data can be entered or edited is called:

94 / 100

3. The constraint states that in a relation no primary key value can have a null value.

95 / 100

4. In 3NF, a non-key attribute must not depend on a(n)

96 / 100

19. A process in which it is being ensured that attributes are stored from where they belong

97 / 100

18. If the value of a non-key attribute can be obtained simply by knowing the values of another non-key attribute, the relation is not in: (

98 / 100

17. If a relation is in INF and the key consists of a single attributes then the relation is called.

99 / 100

13. Integrity is concerned with the (

100 / 100

10. The process of converting complex data structure into simple and stable data structure is called: a –

Your score is

The average score is 59%

0%

BIG SALE! FLAT 50% OFF

Protected