Computer Sciences Practice Test 2




Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

359

Computer Practice Test 2

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

9. The program that contains instructions to operate a device is called:

2 / 100

7. is not a high level language:

3 / 100

5. The computer program is written in:

4 / 100

20. languages is different for different computers:

5 / 100

19. structure is used when programmer does not know is advance the number of repetition of loop?

6 / 100

17. The of for loop executed only once in the first iteration

7 / 100

10. structure executes the body of loop at least once:

8 / 100

7. A variable whose value controls the number of iterations is known as

9 / 100

CPU stands for:

10 / 100

Another word for pointer:

11 / 100

The computing and communication technologies arc combined together for

12 / 100

21. One or more computers connected to a hub is a:

13 / 100

4. The larger computer to which the terminal or PC is attached is called:

14 / 100

FDD1 is a:

15 / 100

5. The process of sharing information among various members of workgroup through computer network is called:

16 / 100

18. is used with format specifier to display output left-justified:

17 / 100

2. The escape sequence for backslash is:

18 / 100

19. The escape sequence to insert horizontal tab is

19 / 100

9. Software to use the Internet:

20 / 100

6. is a high speed communication line:

21 / 100

4. When DARPA established a small computer network?

22 / 100

8. specifies the correct format of IP address:

23 / 100

II. Which of the following protocol is used to access web pages on World Wide Web?

24 / 100

19. represents URL address:

25 / 100

1. A file is stored in

26 / 100

II. A stream is associated with a file using and operaton

27 / 100

3. On successfully closing a file , the fclose( ) returns:

28 / 100

7.function is used to write a string to a file:

29 / 100

10. A logical interface to a file is called

30 / 100

Which of the following mode open only an existing file for both reading and writing?

31 / 100

9. A collection of related records is called

32 / 100

20. media is used for backup:

33 / 100

13. Types of software that can be freely distributed without violating copyright laws are called:

34 / 100

12. is cause of virus:

35 / 100

9. Software that is used to detect and remove the viruses from the computer is called:

36 / 100

15. Security Protection for personal computer include:

37 / 100

19. What is the most common computer crime of these listed below?

38 / 100

16. A secret word or number to be typed by a keyboard before an activity can take place are called:

39 / 100

17. If a relation is in INF and the key consists of a single attributes then the relation is called.

40 / 100

15. In which of the following normal forms, any repeating group from the table is removed?

41 / 100

19. A process in which it is being ensured that attributes are stored from where they belong

42 / 100

5. Different attributes in two different tables having same name are referred to as (

43 / 100

4. In 3NF, a non-key attribute must not depend on a(n)

44 / 100

9. problems occurs when same information is stored in two different ways:

45 / 100

11. A functional dependency between two or more non-key attributes in a relation is called

46 / 100

20. The predefined functions that are part of the programming language and can be used for different purposes are called:

47 / 100

I I. The name of actual and formal parameters:

48 / 100

14. The actual body of the function is defined in:

49 / 100

18. The name of actual and formal parameters:

50 / 100

0. Which of the following looks for the prototype of functions used in a program:

51 / 100

20. In addition to navigate records can be used for

52 / 100

11. Which form layout displays multiple records at a time?

53 / 100

2. How many basic layouts of forms are here in Microsoft Access.

54 / 100

A quantity whose value cannot change during execution of

55 / 100

16. C is a strongly typed language, this means that:

56 / 100

15. In C, the maximum length of variable name is:

57 / 100

1. Variables are created in

58 / 100

17. The logical not (!) operator is denoted as:

59 / 100

1. Insert command is used to insert.

60 / 100

16. is known as control key:

61 / 100

7. A tuple in a table is also known as

62 / 100

3. Anything in the real world that has a set of different attributes or properties is called:

63 / 100

13. The benefit of CAD may be summed up as:

64 / 100

17. Computer at home can be used for:

65 / 100

The fly-by-wire system is used in:

66 / 100

is not related to business:

67 / 100

3. The fundamental concept of relational database is:

68 / 100

20. is th efault field size of Text data type in MS-Access:

69 / 100

13. The structure of table is designed in:

70 / 100

17. The maximum length of text type field is:

71 / 100

19. is the default data e in MS-Access:

72 / 100

3. The intersection of a row and column form a:

73 / 100

II. A cell of worksheet, which is not active is called:

74 / 100

15. menus contains the ‘Cells’ command:

75 / 100

17. Windows explorer is used to

76 / 100

14. The capability of an operating system to load multiple program into memory at a time and to perform two or more processes concurrently, is called:

77 / 100

8. GUI stands for:

78 / 100

10. The relationship between the entities is represented graphically by using:

79 / 100

I I. In hybrid distribution which kind of fragments are stored at only one site

80 / 100

8. tools in involved to the Data Analysis:

81 / 100

2. An entity related to itself in an ERD model refers to

82 / 100

17. A technique for physically arranging the records of a file on secondary storage device is called

83 / 100

is the ingredient of data modeling:

84 / 100

16. In E-R diagram, a diamond shape is used to represent a(n):

85 / 100

13. A set of related characters that represent a unit of data is called

86 / 100

6. A collection of raw facts and figures is called:

87 / 100

16. A set of related files that represent a unit of data is called

88 / 100

I I. Communication between a computer and a keyboard involves transmission:

89 / 100

20. coding schemes is used by IBM:

90 / 100

14. The height of wave within a given period of time is called:

91 / 100

is a collection of related data organized in rows and columns:

92 / 100

The actual data of Is stored in:

93 / 100

to automate repeated tasks — are used

94 / 100

6. is element MS-Access application window:

95 / 100

19. Font size is measure in:

96 / 100

17. The bold text specifies the: (

97 / 100

18. A common font size used in business documents is:

98 / 100

. Which of the following is a word processor (

99 / 100

12. Which of the following can be used to launch the WordArt?

100 / 100

1. Which of the following is not a decision making statement

Your score is

The average score is 61%

0%

BIG SALE! FLAT 50% OFF

Protected