Computer Sciences Practice Test 2





Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

339

Computer Practice Test 2

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

11. is used to create data view

2 / 100

18. Which of the following is responsible for designing the database system.

3 / 100

16. is known as control key:

4 / 100

18. An index may be created on

5 / 100

15. In E-R diagram, an oval shape is used to represent a(n):

6 / 100

16. In E-R diagram, a diamond shape is used to represent a(n):

7 / 100

12. What indicates the connection between entites

8 / 100

6. Database development process involve mapping of conceptual data model into

9 / 100

15. involves the processing on multiple processors in a computer:

10 / 100

5. Ctrl + Alt + Del is

11 / 100

5. A cell at third column and 15 rows has a cell address:

12 / 100

15. menus contains the ‘Cells’ command:

13 / 100

19. If the custom format is 00000 then the number 420 will be displayed as:

14 / 100

The actual data of Is stored in:

15 / 100

13. In a table each column represents

16 / 100

is a collection of related data organized in rows and columns:

17 / 100

3. is the most popular and powerful DBMS:

18 / 100

12. In a table each row represents

19 / 100

14. A query is a more flexible way of

20 / 100

13. services is provided by Internet:

21 / 100

18. Web pages are linked together using?

22 / 100

17. The process of launching web pages is called:

23 / 100

4. Which one is the brain of computer?

24 / 100

3. The idea of stored program was given by:

25 / 100

The address of instruction under

26 / 100

9. The program that contains instructions to operate a device is called:

27 / 100

16. CPU includes all of the following components except?

28 / 100

1. Data and programs that are not being use by computer are stored in:

29 / 100

7. Cabling on a linear bus topology can be extended using which of following:

30 / 100

4. The larger computer to which the terminal or PC is attached is called:

31 / 100

16. standards were developed without any formal planning:

32 / 100

Which one is dedicated server?

33 / 100

10. Which network model consists of many clients and one or more central computers?

34 / 100

17. Which one is an example of De-Facto standard?

35 / 100

5. The process of sharing information among various members of workgroup through computer network is called:

36 / 100

18. a b is equivalent to

37 / 100

How many keywords are in C?

38 / 100

4. When the result of the computation of two very small numbers is too small to be represented, this phenomenon is called:

39 / 100

13. is valid variable name

40 / 100

14. Which of the following characters cannot be used as first character of a variable name?

41 / 100

A quantity whose value cannot change during execution of

42 / 100

5. A data file a stored in:

43 / 100

1. A file is stored in

44 / 100

4. An array subscript should be a) int c) double

45 / 100

15. The do-while loop ends with a

46 / 100

4. loop structures are available in C language:

47 / 100

13. The body of loop comes before the test condition in:

48 / 100

20. In addition to navigate records can be used for

49 / 100

Q2. Select the correct option I. Which of the following represents a collection of concepts that arc used to describe the structure of a database?

50 / 100

4. Which of the following may be a temporary file?

51 / 100

1. A virus program usually hidden in:

52 / 100

14. Another name for antivirus is:

53 / 100

16. A secret word or number to be typed by a keyboard before an activity can take place are called:

54 / 100

9. is not a low-level language:

55 / 100

15. Preprocessor directives are commands for

56 / 100

18. The program written in assembly language is translated to the machine code with the help of translator program called:

57 / 100

7. is not a high level language:

58 / 100

6. features of word processor allows to insert text from one file into another file:

59 / 100

19. Font size is measure in:

60 / 100

15. How many typing modes are provided by word processor?

61 / 100

2. is most commonly used word processing package:

62 / 100

20. A group of sentences is called: (

63 / 100

16. keys of keyboard in conjunction with arrow keys is used for selecting text:

64 / 100

12. Formal arguments are also called

65 / 100

I I. The name of actual and formal parameters:

66 / 100

5. The functions that are defined by programmer are called:

67 / 100

15. The last statement of the body of the fimction is:

68 / 100

15. Which type of data consists of words, sentences, and paragraphs?

69 / 100

12. Light, sound, and radio waves are examples of:

70 / 100

16. The charts, graphs and pictures are examples of:

71 / 100

18. data type represents actions and movements:

72 / 100

is not related to business:

73 / 100

The fly-by-wire system is used in:

74 / 100

is not related to document management system:

75 / 100

18. If the value of a non-key attribute can be obtained simply by knowing the values of another non-key attribute, the relation is not in: (

76 / 100

10. The process of converting complex data structure into simple and stable data structure is called: a –

77 / 100

5. Different attributes in two different tables having same name are referred to as (

78 / 100

11. A functional dependency between two or more non-key attributes in a relation is called

79 / 100

8. problems occurs when same name is used for two different attributes:

80 / 100

9. problems occurs when same information is stored in two different ways:

81 / 100

5. control structures executes program statements one after another:

82 / 100

15. is not used for making two-way decision:

83 / 100

8. Which of the following keywords is not used in switch statement?

84 / 100

12. is not decision-making statement:

85 / 100

4. Which one is a control structure?

86 / 100

18. Which operator in C language is called ternary operator?

87 / 100

16. The %x is a format specifier for:

88 / 100

9. is used for flag:

89 / 100

8. The functions used for input and output are stored in header file:

90 / 100

20. Which of the following format specifier is used for string type data?

91 / 100

A device used for optical character recognition is a:

92 / 100

11. is an example of packaged software:

93 / 100

12. is not an example of packaged software:

94 / 100

20. is not secondary storage device:

95 / 100

12. The data in table is entered in:

96 / 100

13. The structure of table is designed in:

97 / 100

4. The actual data of database is stored in:

98 / 100

16. menus in MS-Access contains commands that can be used to switch between table views?

99 / 100

The data in table is entered in

100 / 100

15. The relationship between countries and their capitals is an example of relationships.

Your score is

The average score is 61%

0%

,

Protected

Open chat
Salam
Can we help you?