Computer Sciences Practice Test 2




Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

360

Computer Practice Test 2

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

19. In text file, data is stored in:

2 / 100

4. An array subscript should be a) int c) double

3 / 100

Which of the following mode open only an existing file for both reading and writing?

4 / 100

11. The escape sequence for carriage return is

5 / 100

19. The escape sequence to insert horizontal tab is

6 / 100

8. The functions used for input and output are stored in header file:

7 / 100

7 . is control suing in the statement prinf(“Result = %d”,r);:

8 / 100

11. The body of I comes er the test condition in:

9 / 100

3. The loop which never ends is called:

10 / 100

19. structure is used when programmer does not know is advance the number of repetition of loop?

11 / 100

18. is related to loop structures:

12 / 100

15. FTP stands for:

13 / 100

2. A collection of millions of computers interlink to one another is called:

14 / 100

18. Web pages are linked together using?

15 / 100

II. Which of the following protocol is used to access web pages on World Wide Web?

16 / 100

A computer can be linked to the Internet through

17 / 100

13. services is provided by Internet:

18 / 100

6. is a high speed communication line:

19 / 100

2. A set of instructions that run the computer arc:

20 / 100

16. CPU includes all of the following components except?

21 / 100

9. The program that contains instructions to operate a device is called:

22 / 100

RAM is a:

23 / 100

6. The component of computer that stores data and program while these are being executed is called:

24 / 100

19. serves as a bridge between end users and database administrator:

25 / 100

11. is used to create data view

26 / 100

14. The height of wave within a given period of time is called:

27 / 100

19. coding schemes uses 4 bit code:

28 / 100

10. BIT stands for

29 / 100

I I. Communication between a computer and a keyboard involves transmission:

30 / 100

8. represents an object:

31 / 100

19. represents entity:

32 / 100

3. is called the preliminary investigation of the required database:

33 / 100

4. In activities, the possible inputs for the database are collected:

34 / 100

I I. In hybrid distribution which kind of fragments are stored at only one site

35 / 100

12. What indicates the connection between entites

36 / 100

3. The intersection of a row and column form a:

37 / 100

19. If the custom format is 00000 then the number 420 will be displayed as:

38 / 100

10. The actual working area in Microsoft Excel is

39 / 100

13. represents a label:

40 / 100

a spreadsheet:

41 / 100

4. The actual working area in Microsoft Excel is:

42 / 100

20. The predefined functions that are part of the programming language and can be used for different purposes are called:

43 / 100

9. The actual values are passed to the function in:

44 / 100

19. In C-language, subprograms are referred to as:

45 / 100

13. The printf() is a:

46 / 100

5. The functions that are defined by programmer are called:

47 / 100

7. A function is called with the reference of its:

48 / 100

17. In a C program two functions can have:

49 / 100

I I. The name of actual and formal parameters:

50 / 100

10. The computer understands the instructions only in:

51 / 100

8. The programming language that are very close to machine code are called:

52 / 100

17. .exe file is produced by the:

53 / 100

14. C was designed to write programs for

54 / 100

12. In which network model all computers have equal status?

55 / 100

21. One or more computers connected to a hub is a:

56 / 100

The software used for workgroup computing is called:

57 / 100

3. Central computer in the network is called:

58 / 100

3. The fundamental concept of relational database is:

59 / 100

15. The relationship between countries and their capitals is an example of relationships.

60 / 100

16. menus in MS-Access contains commands that can be used to switch between table views?

61 / 100

9. As in design view, you can move from field to field in the table window in datasheet view using button.

62 / 100

6. In a relational database, a single piece of information is called:

63 / 100

1. A virus program usually hidden in:

64 / 100

13. Types of software that can be freely distributed without violating copyright laws are called:

65 / 100

17. Which is not an antivirus program?

66 / 100

16. Each of the following is a form layout except.

67 / 100

2. How many basic layouts of forms are here in Microsoft Access.

68 / 100

4. A form is an object of

69 / 100

13. A form with multiple tabs and each tab consisting a page of information

70 / 100

3. How many basic control structures are there?

71 / 100

4. Which one is a control structure?

72 / 100

12. is not decision-making statement:

73 / 100

5. control structures executes program statements one after another:

74 / 100

12. In a table each row represents

75 / 100

2. Which of the following object is used to retrieve data from database and present in a formatted way?

76 / 100

19. is a statement that extracts specific information database.

77 / 100

I. A database consists of various components called the

78 / 100

18. If the value of a non-key attribute can be obtained simply by knowing the values of another non-key attribute, the relation is not in: (

79 / 100

12. Data integrity is another form of data

80 / 100

17. If a relation is in INF and the key consists of a single attributes then the relation is called.

81 / 100

13. Integrity is concerned with the (

82 / 100

2. How many types of data integrity are there?

83 / 100

8. problems occurs when same name is used for two different attributes:

84 / 100

An Operating System is a

85 / 100

5. Ctrl + Alt + Del is

86 / 100

Data processing is also called:

87 / 100

The name for the screen clarity:

88 / 100

12. is not an example of packaged software:

89 / 100

15. An inkjet printer is an example of a(n):

90 / 100

How many keywords are in C?

91 / 100

. A quantity whose value may change during execution of program is called:

92 / 100

9. Computer at home can be used

93 / 100

scanners is used in hospitals:

94 / 100

is not related to business:

95 / 100

15. Typically, and ATM can be used to

96 / 100

20. Computer based weather forecasting depends on accurate collection of data from

97 / 100

10. A word processor can be used to

98 / 100

6. The benefit of CAD may be summed up as

99 / 100

2. is most commonly used word processing package:

100 / 100

17. The bold text specifies the: (

Your score is

The average score is 61%

0%

BIG SALE! FLAT 50% OFF

Protected