Computer Sciences Practice Test 2




Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

360

Computer Practice Test 2

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

8. In while loop, the loop control variable always initialized

2 / 100

5. is called counter loop:

3 / 100

16. The loop will execute at least even the condition is false

4 / 100

4. loop structures are available in C language:

5 / 100

2. is a loop statement:

6 / 100

The computing and communication technologies arc combined together for

7 / 100

A device used for optical character recognition is a:

8 / 100

15. An inkjet printer is an example of a(n):

9 / 100

is secondary storage device:

10 / 100

12. is not an example of packaged software:

11 / 100

Collection of raw facts and figures is called:

12 / 100

The processed data is called:

13 / 100

is category software:

14 / 100

20. By default, Windows save the documents created in MS-Word in the folder:

15 / 100

18. acts as file manager for Windows: (

16 / 100

13. is based on the NT technology:

17 / 100

9. A collection of related records is called

18 / 100

13. function is used as formatted output file function:

19 / 100

1. A file is stored in

20 / 100

Which of the following mode open only an existing file for both reading and writing?

21 / 100

15. There are types of streams

22 / 100

20. In addition to navigate records can be used for

23 / 100

15. Which is not an example of a control element placed on the form

24 / 100

3. objects is not used to enter data into database:

25 / 100

18. A Word processor can be used to:

26 / 100

9. Computer at home can be used

27 / 100

I. CBT stand for

28 / 100

3. device is used in banks to read cheque of customer:

29 / 100

19. serves as a bridge between end users and database administrator:

30 / 100

3. Anything in the real world that has a set of different attributes or properties is called:

31 / 100

10. The column of relation is known as

32 / 100

18. data type represents actions and movements:

33 / 100

The infonnation that is to be transferred from one location to another is called:

34 / 100

7. A device that receives messages is called:

35 / 100

3. The process of transferring data from one location to another is called:

36 / 100

16. The charts, graphs and pictures are examples of:

37 / 100

II. A cell of worksheet, which is not active is called:

38 / 100

3. The intersection of a row and column form a:

39 / 100

1. A virus program usually hidden in:

40 / 100

4. Viruses are transferred from one computer to another due to:

41 / 100

14. Another name for antivirus is:

42 / 100

12. is cause of virus:

43 / 100

I I. CPU is an example of:

44 / 100

3. The idea of stored program was given by:

45 / 100

18. CPU is an example of:

46 / 100

15. The last statement of the body of the fimction is:

47 / 100

6. Mother name for built-in function is:

48 / 100

18. The name of actual and formal parameters:

49 / 100

18. An index may be created on

50 / 100

I. Which of the following keys does not hold uniqueness property

51 / 100

6. Database development process involve mapping of conceptual data model into

52 / 100

14. A set of related fields that represent a unit of data is called

53 / 100

12. In a school the record of cricket and hockey team organized into two groups is referred as

54 / 100

16. A set of related files that represent a unit of data is called

55 / 100

15. A set of related records that represent a unit of data is called

56 / 100

8. represents an object:

57 / 100

14. The media Access Control Sub-layer resides in which layer:

58 / 100

Which one is dedicated server?

59 / 100

The data in table is entered in

60 / 100

17. The bold text specifies the: (

61 / 100

9. The bar that displays the name of program and the name of documents is called:

62 / 100

15. How many typing modes are provided by word processor?

63 / 100

is not a feature of simple word processor or text editor:

64 / 100

2. Turbo C-H- can compile

65 / 100

4. A set of instruction given to the computer is called:

66 / 100

20. languages is different for different computers:

67 / 100

C is a:

68 / 100

14. C was designed to write programs for

69 / 100

12. A program written in language runs directly on the computer.

70 / 100

6. The programming languages that are close to human language are called:

71 / 100

17. .exe file is produced by the:

72 / 100

14. Which of the following characters cannot be used as first character of a variable name?

73 / 100

3. Which of the data type offers the highest precision?

74 / 100

20. elements of program in not token:

75 / 100

15. In C, the maximum length of variable name is:

76 / 100

1. Variables are created in

77 / 100

How many keywords are in C?

78 / 100

. A quantity whose value may change during execution of program is called:

79 / 100

5. The predefined words of the programming language that are used for special purposes in the source program are called:

80 / 100

3. is the most popular and powerful DBMS:

81 / 100

19. is a statement that extracts specific information database.

82 / 100

18. is the fundamental property of relational database:

83 / 100

12. is not decision-making statement:

84 / 100

3. How many basic control structures are there?

85 / 100

9. Which of the following is an optional part in switch statement?

86 / 100

14. is used for making two-way decision:

87 / 100

8. Which of the following keywords is not used in switch statement?

88 / 100

2. A collection of millions of computers interlink to one another is called:

89 / 100

10. If “Yahoo.com” is a domain name, then what will be the top level domain?

90 / 100

9. Software to use the Internet:

91 / 100

7. How many types of addressing schemes?

92 / 100

A computer can be linked to the Internet through

93 / 100

6. is a high speed communication line:

94 / 100

14. format specifiers is used for integer type data:

95 / 100

11. The escape sequence for carriage return is

96 / 100

9. is used for flag:

97 / 100

20. Which of the following format specifier is used for string type data?

98 / 100

14. A foreign key constraint is also called

99 / 100

13. Integrity is concerned with the (

100 / 100

20. A process of analyzing the dependencies of attributes with in entities is called

Your score is

The average score is 61%

0%

BIG SALE! FLAT 50% OFF

Protected