Computer Sciences Practice Test 1

Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations




PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

978

Computer Practice Test 1

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

5. Most common crimes are committed by:

2 / 100

11. is an anti-virus program:

3 / 100

19. What is the most common computer crime of these listed below?

4 / 100

12. is cause of virus:

5 / 100

4. Viruses are transferred from one computer to another due to:

6 / 100

represents an entity

7 / 100

17. SQL is used for

8 / 100

1. Insert command is used to insert.

9 / 100

11. is used to create data view

10 / 100

7. A tuple in a table is also known as

11 / 100

A table is also known as: (

12 / 100

6. A table is also known as

13 / 100

6. Which one is not a loop structure

14 / 100

1. How many types of loop structur are in C?

15 / 100

11. The body of I comes er the test condition in:

16 / 100

20. Loop with in a loop is called

17 / 100

17. The of for loop executed only once in the first iteration

18 / 100

2. A collection of millions of computers interlink to one another is called:

19 / 100

Who owns the Internet?

20 / 100

17. The process of launching web pages is called:

21 / 100

II. Which of the following protocol is used to access web pages on World Wide Web?

22 / 100

9. Computer at home can be used

23 / 100

9. The manipulated and processed data is called:

24 / 100

20. The process of arranging data in a proper order is called:

25 / 100

4. Which of the following may be a temporary file?

26 / 100

For the input of image data:

27 / 100

The processed data is called:

28 / 100

CPU stands for:

29 / 100

Another word for pointer:

30 / 100

The computing and communication technologies arc combined together for

31 / 100

An electronic device that accepts, processes data and products information is called: (a) Input device (b) Computer (c) Output devices (d) Operating system

32 / 100

11. is an example of packaged software:

33 / 100

12. is not an example of packaged software:

34 / 100

5. Different attributes in two different tables having same name are referred to as (

35 / 100

14. A foreign key constraint is also called

36 / 100

8. problems occurs when same name is used for two different attributes:

37 / 100

4. In 3NF, a non-key attribute must not depend on a(n)

38 / 100

12. Data integrity is another form of data

39 / 100

12. Form with in a form is called

40 / 100

13. A form with multiple tabs and each tab consisting a page of information

41 / 100

14. The different design elements placed on form are called

42 / 100

2. How many basic layouts of forms are here in Microsoft Access.

43 / 100

11. The escape sequence for carriage return is

44 / 100

1. The function getch() is defined in:

45 / 100

0. The format specifier %u is used for:

46 / 100

13. What will be the output of printf(“%d”,’a’);

47 / 100

5. The process of sharing information among various members of workgroup through computer network is called:

48 / 100

7. Cabling on a linear bus topology can be extended using which of following:

49 / 100

13. standards were properly researched, designed and finally published as a standard:

50 / 100

17. Which one is an example of De-Facto standard?

51 / 100

15. In C, the maximum length of variable name is:

52 / 100

How many keywords are in C?

53 / 100

A quantity whose value cannot change during execution of

54 / 100

6. A collection of related worksheets is called:

55 / 100

20. If the custom format is If it, it N N then the number 23349 will be displayed as:

56 / 100

II. A cell of worksheet, which is not active is called:

57 / 100

15. Preprocessor directives are commands for

58 / 100

13. The symbols used to write instructions in assembly language are called:

59 / 100

19. The instructions written in machine language are in the form of:

60 / 100

5. represents of wizard of DBMS:

61 / 100

2. Which of the following object is used to retrieve data from database and present in a formatted way?

62 / 100

4. MS-Access is a:

63 / 100

is a collection of related data organized in rows and columns:

64 / 100

14. The actual body of the function is defined in:

65 / 100

I I. The name of actual and formal parameters:

66 / 100

6. Mother name for built-in function is:

67 / 100

16. A built-in function:

68 / 100

19. In C-language, subprograms are referred to as:

69 / 100

7. A function is called with the reference of its:

70 / 100

4. The predefined functions that are part of C-language are called: (

71 / 100

4. An array subscript should be a) int c) double

72 / 100

5. A data file a stored in:

73 / 100

7.function is used to write a string to a file:

74 / 100

17. In text stream characters have correspondence

75 / 100

9. The electromagnetic or light waves representing data are called:

76 / 100

16. The charts, graphs and pictures are examples of:

77 / 100

2. Data communication requires only a:

78 / 100

5. Ctrl + Alt + Del is

79 / 100

17. Windows explorer is used to

80 / 100

13. Which component of computer coordinates all activities in the computer?

81 / 100

17. The cells of memory are logically organized into group of

82 / 100

8. A computer drives its basic strength from:

83 / 100

RAM is a:

84 / 100

I I. CPU is an example of:

85 / 100

18. CPU is an example of:

86 / 100

1. Data and programs that are not being use by computer are stored in:

87 / 100

14. The insertion point in the document is also called:

88 / 100

16. keys of keyboard in conjunction with arrow keys is used for selecting text:

89 / 100

II. The bar that shows the total pages of document, position of cursor etc. is called:

90 / 100

15. How many typing modes are provided by word processor?

91 / 100

. Which of the following is a word processor (

92 / 100

18. is not an example of data type in MS-Access:

93 / 100

4. The actual data of database is stored in:

94 / 100

17. The maximum length of text type field is:

95 / 100

11. How may table view are available in MS-Access?

96 / 100

9. The process to identify the data objects and the relationships between them is:

97 / 100

2. An entity related to itself in an ERD model refers to

98 / 100

16. In E-R diagram, a diamond shape is used to represent a(n):

99 / 100

18. An index may be created on

100 / 100

17. A technique for physically arranging the records of a file on secondary storage device is called

Your score is

The average score is 59%

0%

BIG SALE! FLAT 50% OFF

Protected