Computer Sciences Practice Test 2




Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

360

Computer Practice Test 2

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

5. Forms are designed for:

2 / 100

14. The different design elements placed on form are called

3 / 100

8. Which of the following is used to retrieve data from one or more tables of database and to present it to the user in a formatted way.

4 / 100

7. A auto form displays one record at a time.

5 / 100

11. Which form layout displays multiple records at a time?

6 / 100

9. Tables are the 1 of our database in Microsoft Access

7 / 100

13. services is provided by Internet:

8 / 100

7. How many types of addressing schemes?

9 / 100

8. specifies the correct format of IP address:

10 / 100

5. represents of wizard of DBMS:

11 / 100

8. A record is a complete set of

12 / 100

to automate repeated tasks — are used

13 / 100

is a collection of related data organized in rows and columns:

14 / 100

15. A set of related records that represent a unit of data is called

15 / 100

Q2. Select the correct option I. Which of the following represents a collection of concepts that arc used to describe the structure of a database?

16 / 100

8. represents an object:

17 / 100

16. A set of related files that represent a unit of data is called

18 / 100

7. Which of the following is not related to data manipulation?

19 / 100

14. The media Access Control Sub-layer resides in which layer:

20 / 100

I. A LAN is a combination of:

21 / 100

FDD1 is a:

22 / 100

6. What layer of OSI does data compression:

23 / 100

12. Which is a storage device?

24 / 100

10. Which component of CPU is responsible for performing arithmetic and logical operations on numeric data?

25 / 100

15. is the component of CPU:

26 / 100

17. The cells of memory are logically organized into group of

27 / 100

2. A set of instructions that run the computer arc:

28 / 100

4. Which one is the brain of computer?

29 / 100

5. Which component of a computer decodes and executes program consuvetions?

30 / 100

14. The 0.0000000001 is displayed in default column width as:

31 / 100

7. The currently selected cell where data can be entered or edited is called:

32 / 100

6. A collection of related worksheets is called:

33 / 100

17. Each number format consists of part:

34 / 100

15. Typically, and ATM can be used to

35 / 100

scanners is used in hospitals:

36 / 100

9. is not a low-level language:

37 / 100

7. is not a high level language:

38 / 100

18. The program written in assembly language is translated to the machine code with the help of translator program called:

39 / 100

17. SQL is used for

40 / 100

19. serves as a bridge between end users and database administrator:

41 / 100

3. Anything in the real world that has a set of different attributes or properties is called:

42 / 100

A table is also known as: (

43 / 100

9. The rows of a table or relation are known as:

44 / 100

16. A built-in function:

45 / 100

11. The escape sequence for carriage return is

46 / 100

14. format specifiers is used for integer type data:

47 / 100

9. is used for flag:

48 / 100

0. The format specifier %u is used for:

49 / 100

The data in table is entered in

50 / 100

11. How may table view are available in MS-Access?

51 / 100

10. The number of records (or row) in a table or relation is called:

52 / 100

6. In a relational database, a single piece of information is called:

53 / 100

3. The fundamental concept of relational database is:

54 / 100

13. The structure of table is designed in:

55 / 100

4. When the result of the computation of two very small numbers is too small to be represented, this phenomenon is called:

56 / 100

3. Which of the data type offers the highest precision?

57 / 100

1. Variables are created in

58 / 100

16. keys of keyboard in conjunction with arrow keys is used for selecting text:

59 / 100

17. The bold text specifies the: (

60 / 100

3. A word processor includes the process of

61 / 100

2. is most commonly used word processing package:

62 / 100

9. The bar that displays the name of program and the name of documents is called:

63 / 100

12. Which of the following can be used to launch the WordArt?

64 / 100

5. During text entering process into document. the cursor automatically shifts to the next line when it reaches to the right margin. This feature of word processor is called:

65 / 100

9. Which of the following is an optional part in switch statement?

66 / 100

14. is used for making two-way decision:

67 / 100

1. Which of the following is not a decision making statement

68 / 100

3. How many basic control structures are there?

69 / 100

18. Which operator in C language is called ternary operator?

70 / 100

17. In text stream characters have correspondence

71 / 100

3. On successfully closing a file , the fclose( ) returns:

72 / 100

5. A data file a stored in:

73 / 100

13. function is used as formatted output file function:

74 / 100

20. is true about a stream:

75 / 100

A device used for optical character recognition is a:

76 / 100

CPU stands for:

77 / 100

For the input of image data:

78 / 100

10. is an example of system software:

79 / 100

The name for the screen clarity:

80 / 100

17. Windows explorer is used to

81 / 100

An Operating System is a

82 / 100

The infonnation that is to be transferred from one location to another is called:

83 / 100

Microwave transmission, coaxial cables and fiber optic are examples of:

84 / 100

20. coding schemes is used by IBM:

85 / 100

5. is component of data communication:

86 / 100

7. A device that receives messages is called:

87 / 100

3. The process of transferring data from one location to another is called:

88 / 100

9. problems occurs when same information is stored in two different ways:

89 / 100

6. Referential integrity is applied on

90 / 100

9. In while loop, the increment / decrement statement are placed

91 / 100

8. In while loop, the loop control variable always initialized

92 / 100

1. How many types of loop structur are in C?

93 / 100

16. The loop will execute at least even the condition is false

94 / 100

19. structure is used when programmer does not know is advance the number of repetition of loop?

95 / 100

15. Security Protection for personal computer include:

96 / 100

13. Types of software that can be freely distributed without violating copyright laws are called:

97 / 100

16. A secret word or number to be typed by a keyboard before an activity can take place are called:

98 / 100

2. A virus is just a:

99 / 100

9. The process to identify the data objects and the relationships between them is:

100 / 100

6. Database development process involve mapping of conceptual data model into

Your score is

The average score is 61%

0%

BIG SALE! FLAT 50% OFF

Protected