Computer Sciences Practice Test 2




Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

360

Computer Practice Test 2

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

1. A form that contains the sub form is called

2 / 100

7. A auto form displays one record at a time.

3 / 100

19. If there are small fmite number of values for a certain field on a form which object will be suitable

4 / 100

8. Which of the following is used to retrieve data from one or more tables of database and to present it to the user in a formatted way.

5 / 100

18. An index may be created on

6 / 100

is the ingredient of data modeling:

7 / 100

I. Which of the following keys does not hold uniqueness property

8 / 100

8. tools in involved to the Data Analysis:

9 / 100

15. In E-R diagram, an oval shape is used to represent a(n):

10 / 100

15. involves the processing on multiple processors in a computer:

11 / 100

11. As compared to command line operating system, a GUI operating system is:

12 / 100

18. acts as file manager for Windows: (

13 / 100

19. contains the files and folders that are deleted from the hard disk:

14 / 100

17. .exe file is produced by the:

15 / 100

7. is not a high level language:

16 / 100

9. is not a low-level language:

17 / 100

13. The symbols used to write instructions in assembly language are called:

18 / 100

16. Which of the following requires no translator to execute the program?

19 / 100

6. The programming languages that are close to human language are called:

20 / 100

9. Software that is used to detect and remove the viruses from the computer is called:

21 / 100

2. A virus is just a:

22 / 100

11. is an anti-virus program:

23 / 100

20. The process of arranging data in a proper order is called:

24 / 100

16. A set of related files that represent a unit of data is called

25 / 100

15. A set of related records that represent a unit of data is called

26 / 100

3. Which of the following type of file require largest processing time?

27 / 100

2. Which of the following data model is more flexible?

28 / 100

13. A set of related characters that represent a unit of data is called

29 / 100

19. The escape sequence to insert horizontal tab is

30 / 100

13. What will be the output of printf(“%d”,’a’);

31 / 100

12. Which of the following forma specifier is used for character type data

32 / 100

7 . is control suing in the statement prinf(“Result = %d”,r);:

33 / 100

20. Which of the following format specifier is used for string type data?

34 / 100

5. is not used in control or format string in a prindo function:

35 / 100

6. How many variables can be used in one printf() function?

36 / 100

The computing and communication technologies arc combined together for

37 / 100

CPU stands for:

38 / 100

Data processing is also called:

39 / 100

Collection of raw facts and figures is called:

40 / 100

is category software:

41 / 100

The name for the screen clarity:

42 / 100

7. A function is called with the reference of its:

43 / 100

3. Which of the following is true about a function call?

44 / 100

0. Which of the following looks for the prototype of functions used in a program:

45 / 100

5. The functions that are defined by programmer are called:

46 / 100

10. structures is a selection structure:

47 / 100

5. control structures executes program statements one after another:

48 / 100

8. Which of the following keywords is not used in switch statement?

49 / 100

18. Which operator in C language is called ternary operator?

50 / 100

15. is not used for making two-way decision:

51 / 100

16. The conditional operator is an alternative of:

52 / 100

10. The actual working area in Microsoft Excel is

53 / 100

9. is not a feature of spreadsheet program:

54 / 100

20. If the custom format is If it, it N N then the number 23349 will be displayed as:

55 / 100

14. The insertion point in the document is also called:

56 / 100

13. shows the margins, position of tabs, and indents etc:

57 / 100

8. In MS Word, the data that is being copied or moved is

58 / 100

19. Font size is measure in:

59 / 100

is not a feature of simple word processor or text editor:

60 / 100

2. A collection of computers connected together is called:

61 / 100

5. The process of sharing information among various members of workgroup through computer network is called:

62 / 100

7. Cabling on a linear bus topology can be extended using which of following:

63 / 100

3. Central computer in the network is called:

64 / 100

The software used for workgroup computing is called:

65 / 100

The data in table is entered in

66 / 100

12. The data in table is entered in:

67 / 100

8. Which of the following buttons of Find and Replace dialog box is clicked to start he search process?

68 / 100

3. On successfully closing a file , the fclose( ) returns:

69 / 100

12. function is used to read a single character from a file at a time:

70 / 100

20. is true about a stream:

71 / 100

8. To store data for future use it must be stored on

72 / 100

2. Which of the following function is used to write a string to a file?

73 / 100

4. An array subscript should be a) int c) double

74 / 100

15. There are types of streams

75 / 100

3. The constraint states that in a relation no primary key value can have a null value.

76 / 100

10. The process of converting complex data structure into simple and stable data structure is called: a –

77 / 100

11. A functional dependency between two or more non-key attributes in a relation is called

78 / 100

12. Data integrity is another form of data

79 / 100

5. Different attributes in two different tables having same name are referred to as (

80 / 100

14. A foreign key constraint is also called

81 / 100

is not related to business:

82 / 100

devices is used in departmental store:

83 / 100

16. The loop will execute at least even the condition is false

84 / 100

9. In while loop, the increment / decrement statement are placed

85 / 100

1. How many types of loop structur are in C?

86 / 100

10. structure executes the body of loop at least once:

87 / 100

17. The of for loop executed only once in the first iteration

88 / 100

RAM is a:

89 / 100

3. The idea of stored program was given by:

90 / 100

15. is the component of CPU:

91 / 100

4. When the result of the computation of two very small numbers is too small to be represented, this phenomenon is called:

92 / 100

12. Relational operators are used to

93 / 100

II. Which of the following protocol is used to access web pages on World Wide Web?

94 / 100

8. specifies the correct format of IP address:

95 / 100

12. Which one represents the top level domain?

96 / 100

18. Which of the following is responsible for designing the database system.

97 / 100

3. Anything in the real world that has a set of different attributes or properties is called:

98 / 100

16. is known as control key:

99 / 100

represents an entity

100 / 100

is used to identify records of a relation uniquely:

Your score is

The average score is 61%

0%

BIG SALE! FLAT 50% OFF

Protected