Computer Sciences Practice Test 2




Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

360

Computer Practice Test 2

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

2. Which of the following is a valid character constant?

2 / 100

17. The logical not (!) operator is denoted as:

3 / 100

14. Which of the following characters cannot be used as first character of a variable name?

4 / 100

How many keywords are in C?

5 / 100

19. The words used to write the statements of a program are called

6 / 100

15. In C, the maximum length of variable name is:

7 / 100

19. The escape sequence to insert horizontal tab is

8 / 100

0. The format specifier %u is used for:

9 / 100

1. The function getch() is defined in:

10 / 100

6. How many variables can be used in one printf() function?

11 / 100

18. is used with format specifier to display output left-justified:

12 / 100

7. A variable whose value controls the number of iterations is known as

13 / 100

17. The of for loop executed only once in the first iteration

14 / 100

14. Semicolon is placed at the end of condition in:

15 / 100

6. Which one is not a loop structure

16 / 100

18. is related to loop structures:

17 / 100

15. The do-while loop ends with a

18 / 100

21. One or more computers connected to a hub is a:

19 / 100

I. A LAN is a combination of:

20 / 100

12. In which network model all computers have equal status?

21 / 100

20. Which one is not a network topology?

22 / 100

Which one is dedicated server?

23 / 100

3. Central computer in the network is called:

24 / 100

14. The media Access Control Sub-layer resides in which layer:

25 / 100

20. is not secondary storage device:

26 / 100

Data processing is also called:

27 / 100

2. The foreign key is found in

28 / 100

7. A tuple in a table is also known as

29 / 100

13. A table must have:

30 / 100

16. is the entering point in Windows:

31 / 100

14. The capability of an operating system to load multiple program into memory at a time and to perform two or more processes concurrently, is called:

32 / 100

13. is based on the NT technology:

33 / 100

19. represents URL address:

34 / 100

7. How many types of addressing schemes?

35 / 100

A computer can be linked to the Internet through

36 / 100

4. A set of instruction given to the computer is called:

37 / 100

3. Debug is the process of:

38 / 100

language is known as fundamental computer language:

39 / 100

6. The programming languages that are close to human language are called:

40 / 100

8. The programming language that are very close to machine code are called:

41 / 100

14. C was designed to write programs for

42 / 100

16. Which of the following requires no translator to execute the program?

43 / 100

14. views can be used to add, edit, and delete records to and from the table:

44 / 100

4. The actual data of database is stored in:

45 / 100

16. A relation is in second normal form if and only if:

46 / 100

5. Different attributes in two different tables having same name are referred to as (

47 / 100

8. problems occurs when same name is used for two different attributes:

48 / 100

12. Data integrity is another form of data

49 / 100

20. A process of analyzing the dependencies of attributes with in entities is called

50 / 100

19. If the custom format is 00000 then the number 420 will be displayed as:

51 / 100

20. If the custom format is If it, it N N then the number 23349 will be displayed as:

52 / 100

6. is element MS-Access application window:

53 / 100

17. A place where we can see all the tables and their relationship

54 / 100

19. is a statement that extracts specific information database.

55 / 100

8. A record is a complete set of

56 / 100

13. In a table each column represents

57 / 100

13. The printf() is a:

58 / 100

2. Global variables are created in

59 / 100

5. The functions that are defined by programmer are called:

60 / 100

8. A function:

61 / 100

15. The last statement of the body of the fimction is:

62 / 100

3. Which of the following is true about a function call?

63 / 100

12. function is used to read a single character from a file at a time:

64 / 100

15. There are types of streams

65 / 100

1. A file is stored in

66 / 100

17. In text stream characters have correspondence

67 / 100

20. media is used for backup:

68 / 100

1. A virus program usually hidden in:

69 / 100

Q2. Select the correct option I. Which of the following represents a collection of concepts that arc used to describe the structure of a database?

70 / 100

19. In a college, organizing the record of Science and Arts students into two groups, this activity is referred to as

71 / 100

12. In a school the record of cricket and hockey team organized into two groups is referred as

72 / 100

7. Which of the following is not related to data manipulation?

73 / 100

18. Which of the following database model has the shape like and organizational chart?

74 / 100

14. A set of related fields that represent a unit of data is called

75 / 100

2. is most commonly used word processing package:

76 / 100

7. features of word processor allows to specify margins of the documents:

77 / 100

19. Font size is measure in:

78 / 100

. Which of the following is a word processor (

79 / 100

10. The bar that contains the group of commands is called:

80 / 100

8. In MS Word, the data that is being copied or moved is

81 / 100

In E-R diagram, a rectangular box is used to represent a(n):

82 / 100

19. represents entity:

83 / 100

I I. In hybrid distribution which kind of fragments are stored at only one site

84 / 100

5. In activities, the cost factors are taken into consideration:

85 / 100

8. A computer drives its basic strength from:

86 / 100

The address of instruction under

87 / 100

6. The component of computer that stores data and program while these are being executed is called:

88 / 100

I I. CPU is an example of:

89 / 100

2. Which of the following operator is used as decision making statement

90 / 100

12. is not decision-making statement:

91 / 100

13. Which of the following operators is used as decision-making statement?

92 / 100

20. The last statement of each case in switch statement must be a:

93 / 100

18. data type represents actions and movements:

94 / 100

17. The music and speech represent the: (a) Image data (b) Audio data (c) Video data (d) Text data

95 / 100

I I. Communication between a computer and a keyboard involves transmission:

96 / 100

14. The different design elements placed on form are called

97 / 100

19. If there are small fmite number of values for a certain field on a form which object will be suitable

98 / 100

12. Form with in a form is called

99 / 100

4. A form is an object of

100 / 100

The fly-by-wire system is used in:

Your score is

The average score is 61%

0%

BIG SALE! FLAT 50% OFF

Protected