Computer Sciences Practice Test 2




Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

360

Computer Practice Test 2

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

12. Relational operators are used to

2 / 100

is not a valid variable

3 / 100

18. a b is equivalent to

4 / 100

5. The predefined words of the programming language that are used for special purposes in the source program are called:

5 / 100

20. is not secondary storage device:

6 / 100

16. CPU is also referred to as:

7 / 100

18. The data and program are stored permanently on the:

8 / 100

11. As compared to command line operating system, a GUI operating system is:

9 / 100

17. Windows explorer is used to

10 / 100

20. By default, Windows save the documents created in MS-Word in the folder:

11 / 100

10. What type of operating system MS-DOS is?

12 / 100

14. The capability of an operating system to load multiple program into memory at a time and to perform two or more processes concurrently, is called:

13 / 100

15. involves the processing on multiple processors in a computer:

14 / 100

14. A set of related fields that represent a unit of data is called

15 / 100

9. The manipulated and processed data is called:

16 / 100

8. represents an object:

17 / 100

7. Which of the following is not related to data manipulation?

18 / 100

2. Global variables are created in

19 / 100

8. A function:

20 / 100

12. Formal arguments are also called

21 / 100

18. The form which contains the subform is known as:

22 / 100

4. A form is an object of

23 / 100

6. The forms are the end of our database in Microsoft Access

24 / 100

7. A auto form displays one record at a time.

25 / 100

is a collection of related data organized in rows and columns:

26 / 100

14. A query is a more flexible way of

27 / 100

4. Which one is the brain of computer?

28 / 100

I I. CPU is an example of:

29 / 100

17. The cells of memory are logically organized into group of

30 / 100

10. The computer understands the instructions only in:

31 / 100

5. The computer program is written in:

32 / 100

14. C was designed to write programs for

33 / 100

9. is not a low-level language:

34 / 100

6. The programming languages that are close to human language are called:

35 / 100

7. is not a high level language:

36 / 100

scanners is used in hospitals:

37 / 100

I. CBT stand for

38 / 100

12. The while loop is also called: (a) conditional loop (b) (c) counter loop (d)
while Both (b) and (c)
wend loop Attribute

39 / 100

9. In while loop, the increment / decrement statement are placed

40 / 100

13. The body of loop comes before the test condition in:

41 / 100

14. Semicolon is placed at the end of condition in:

42 / 100

10. The process of converting complex data structure into simple and stable data structure is called: a –

43 / 100

18. If the value of a non-key attribute can be obtained simply by knowing the values of another non-key attribute, the relation is not in: (

44 / 100

1. In 3NF, which form of dependency is removed? (

45 / 100

6. Referential integrity is applied on

46 / 100

17. If a relation is in INF and the key consists of a single attributes then the relation is called.

47 / 100

13. Integrity is concerned with the (

48 / 100

13. What will be the output of printf(“%d”,’a’);

49 / 100

4. The printf() function is used to display:

50 / 100

17. A technique for physically arranging the records of a file on secondary storage device is called

51 / 100

19. represents entity:

52 / 100

18. An index may be created on

53 / 100

20. is not related to an entity:

54 / 100

10. The relationship between the entities is represented graphically by using:

55 / 100

I. Which of the following keys does not hold uniqueness property

56 / 100

7. A tuple in a table is also known as

57 / 100

2. The foreign key is found in

58 / 100

20. is responsible for designing, coordinating and monitoring the database system: (

59 / 100

13. A table must have:

60 / 100

9. The bar that displays the name of program and the name of documents is called:

61 / 100

14. The insertion point in the document is also called:

62 / 100

II. The bar that shows the total pages of document, position of cursor etc. is called:

63 / 100

6. features of word processor allows to insert text from one file into another file:

64 / 100

12. Which of the following can be used to launch the WordArt?

65 / 100

16. The charts, graphs and pictures are examples of:

66 / 100

17. The music and speech represent the: (a) Image data (b) Audio data (c) Video data (d) Text data

67 / 100

6. is not component of data communication:

68 / 100

8. The is the physical path over which a message travels:

69 / 100

20. coding schemes is used by IBM:

70 / 100

19. coding schemes uses 4 bit code:

71 / 100

4. The larger computer to which the terminal or PC is attached is called:

72 / 100

5. The process of sharing information among various members of workgroup through computer network is called:

73 / 100

9. Which of the following is an optional part in switch statement?

74 / 100

II. Which of the following protocol is used to access web pages on World Wide Web?

75 / 100

Who owns the Internet?

76 / 100

15. FTP stands for:

77 / 100

9. Software to use the Internet:

78 / 100

4. When DARPA established a small computer network?

79 / 100

18. Web pages are linked together using?

80 / 100

12. Which one represents the top level domain?

81 / 100

17. The process of launching web pages is called:

82 / 100

The data in table is entered in

83 / 100

4. The actual data of database is stored in:

84 / 100

13. Types of software that can be freely distributed without violating copyright laws are called:

85 / 100

8. Format C is an example of virus:

86 / 100

2. A virus is just a:

87 / 100

15. Security Protection for personal computer include:

88 / 100

20. media is used for backup:

89 / 100

19. What is the most common computer crime of these listed below?

90 / 100

14. Another name for antivirus is:

91 / 100

13. represents a label:

92 / 100

16. Which of the following is an absolute address?

93 / 100

II. A cell of worksheet, which is not active is called:

94 / 100

17. Each number format consists of part:

95 / 100

20. is true about a stream:

96 / 100

15. There are types of streams

97 / 100

9. A collection of related records is called

98 / 100

1. A file is stored in

99 / 100

Which of the following mode open only an existing file for both reading and writing?

100 / 100

19. In text file, data is stored in:

Your score is

The average score is 61%

0%

BIG SALE! FLAT 50% OFF

Protected