Computer Sciences Practice Test 1

Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations




PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

978

Computer Practice Test 1

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

16. standards were developed without any formal planning:

2 / 100

14. The media Access Control Sub-layer resides in which layer:

3 / 100

I. A LAN is a combination of:

4 / 100

13. standards were properly researched, designed and finally published as a standard:

5 / 100

17. Which one is an example of De-Facto standard?

6 / 100

5. The process of sharing information among various members of workgroup through computer network is called:

7 / 100

14. The insertion point in the document is also called:

8 / 100

8. In MS Word, the data that is being copied or moved is

9 / 100

is not a feature of simple word processor or text editor:

10 / 100

2. is most commonly used word processing package:

11 / 100

II. The bar that shows the total pages of document, position of cursor etc. is called:

12 / 100

9. In while loop, the increment / decrement statement are placed

13 / 100

10. structure executes the body of loop at least once:

14 / 100

2. is a loop statement:

15 / 100

6. Which one is not a loop structure

16 / 100

14. Semicolon is placed at the end of condition in:

17 / 100

8. In while loop, the loop control variable always initialized

18 / 100

16. A secret word or number to be typed by a keyboard before an activity can take place are called:

19 / 100

12. is cause of virus:

20 / 100

15. Security Protection for personal computer include:

21 / 100

The computing and communication technologies arc combined together for

22 / 100

For the input of image data:

23 / 100

12. is not an example of packaged software:

24 / 100

Collection of raw facts and figures is called:

25 / 100

20. is not secondary storage device:

26 / 100

is secondary storage device:

27 / 100

6. In a relational database, a single piece of information is called:

28 / 100

3. The fundamental concept of relational database is:

29 / 100

5. is the object of MS-Access database file:

30 / 100

12. The data in table is entered in:

31 / 100

8. problems occurs when same name is used for two different attributes:

32 / 100

6. Referential integrity is applied on

33 / 100

14. A foreign key constraint is also called

34 / 100

17. .exe file is produced by the:

35 / 100

14. C was designed to write programs for

36 / 100

10. The computer understands the instructions only in:

37 / 100

19. represents entity:

38 / 100

6. Database development process involve mapping of conceptual data model into

39 / 100

is the ingredient of data modeling:

40 / 100

7. In ERD model, the relationship between two entities is represented by a

41 / 100

12. What indicates the connection between entites

42 / 100

15. In E-R diagram, an oval shape is used to represent a(n):

43 / 100

5. In activities, the cost factors are taken into consideration:

44 / 100

14. Which component of computer is responsible for comparison of two numbers?

45 / 100

I I. CPU is an example of:

46 / 100

6. The component of computer that stores data and program while these are being executed is called:

47 / 100

3. The idea of stored program was given by:

48 / 100

19. serves as a bridge between end users and database administrator:

49 / 100

9. The rows of a table or relation are known as:

50 / 100

2. The foreign key is found in

51 / 100

13. A table must have:

52 / 100

10. structures is a selection structure:

53 / 100

9. Which of the following is an optional part in switch statement?

54 / 100

8. To store data for future use it must be stored on

55 / 100

13. function is used as formatted output file function:

56 / 100

3. On successfully closing a file , the fclose( ) returns:

57 / 100

1. A file is stored in

58 / 100

4. A form is an object of

59 / 100

3. objects is not used to enter data into database:

60 / 100

16. Each of the following is a form layout except.

61 / 100

5. is not used in control or format string in a prindo function:

62 / 100

16. The %x is a format specifier for:

63 / 100

19. The escape sequence to insert horizontal tab is

64 / 100

2. Which of the following is a valid character constant?

65 / 100

13. is valid variable name

66 / 100

9. is not a feature of spreadsheet program:

67 / 100

8. In a worksheet, a bold rectangle border indicates (n):

68 / 100

12. cell addresses is correct:

69 / 100

a spreadsheet:

70 / 100

6. A collection of related worksheets is called:

71 / 100

7. How many types of addressing schemes?

72 / 100

10. If “Yahoo.com” is a domain name, then what will be the top level domain?

73 / 100

18. Web pages are linked together using?

74 / 100

15. FTP stands for:

75 / 100

A computer can be linked to the Internet through

76 / 100

II. Which of the following protocol is used to access web pages on World Wide Web?

77 / 100

12. In a school the record of cricket and hockey team organized into two groups is referred as

78 / 100

4. Which of the following may be a temporary file?

79 / 100

3. device is used in banks to read cheque of customer:

80 / 100

devices is used in departmental store:

81 / 100

8. GUI stands for:

82 / 100

organizes and controls the hardware and software:

83 / 100

An Operating System is a

84 / 100

13. is based on the NT technology:

85 / 100

5. Ctrl + Alt + Del is

86 / 100

10. What type of operating system MS-DOS is?

87 / 100

18. is the fundamental property of relational database:

88 / 100

6. is element MS-Access application window:

89 / 100

14. A query is a more flexible way of

90 / 100

15. A step by step procedure to perform a task easily available in a software is called

91 / 100

4. MS-Access is a:

92 / 100

to automate repeated tasks — are used

93 / 100

12. In a table each row represents

94 / 100

7. A function is called with the reference of its:

95 / 100

I I. The name of actual and formal parameters:

96 / 100

9. The actual values are passed to the function in:

97 / 100

15. The last statement of the body of the fimction is:

98 / 100

20. The predefined functions that are part of the programming language and can be used for different purposes are called:

99 / 100

9. The electromagnetic or light waves representing data are called:

100 / 100

19. coding schemes uses 4 bit code:

Your score is

The average score is 59%

0%

BIG SALE! FLAT 50% OFF

Protected