Computer Sciences Practice Test 2




Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

360

Computer Practice Test 2

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

16. A built-in function:

2 / 100

8. specifies the correct format of IP address:

3 / 100

4. When DARPA established a small computer network?

4 / 100

17. The of for loop executed only once in the first iteration

5 / 100

18. is related to loop structures:

6 / 100

10. structure executes the body of loop at least once:

7 / 100

8. In while loop, the loop control variable always initialized

8 / 100

7. A variable whose value controls the number of iterations is known as

9 / 100

2. Data communication requires only a:

10 / 100

18. data type represents actions and movements:

11 / 100

16. The charts, graphs and pictures are examples of:

12 / 100

10. The number of records (or row) in a table or relation is called:

13 / 100

13. The structure of table is designed in:

14 / 100

15. The relationship between countries and their capitals is an example of relationships.

15 / 100

20. Which one is not a network topology?

16 / 100

18. is a governing body that approve the network standard:

17 / 100

16. standards were developed without any formal planning:

18 / 100

The software used for workgroup computing is called:

19 / 100

7. Cabling on a linear bus topology can be extended using which of following:

20 / 100

9. The bar that displays the name of program and the name of documents is called:

21 / 100

17. The bold text specifies the: (

22 / 100

12. Which of the following can be used to launch the WordArt?

23 / 100

5. During text entering process into document. the cursor automatically shifts to the next line when it reaches to the right margin. This feature of word processor is called:

24 / 100

16. keys of keyboard in conjunction with arrow keys is used for selecting text:

25 / 100

The actual data of Is stored in:

26 / 100

8. A record is a complete set of

27 / 100

4. MS-Access is a:

28 / 100

19. is a statement that extracts specific information database.

29 / 100

to automate repeated tasks — are used

30 / 100

18. is the fundamental property of relational database:

31 / 100

9. The process to identify the data objects and the relationships between them is:

32 / 100

16. In E-R diagram, a diamond shape is used to represent a(n):

33 / 100

15. In E-R diagram, an oval shape is used to represent a(n):

34 / 100

6. Database development process involve mapping of conceptual data model into

35 / 100

8. tools in involved to the Data Analysis:

36 / 100

3. is called the preliminary investigation of the required database:

37 / 100

1. Insert command is used to insert.

38 / 100

is used to identify records of a relation uniquely:

39 / 100

15. An attribute is also known as:

40 / 100

19. serves as a bridge between end users and database administrator:

41 / 100

8. The columns of a relation correspond to:

42 / 100

20. is responsible for designing, coordinating and monitoring the database system: (

43 / 100

II. A stream is associated with a file using and operaton

44 / 100

9. A collection of related records is called

45 / 100

19. In text file, data is stored in:

46 / 100

7.function is used to write a string to a file:

47 / 100

20. is true about a stream:

48 / 100

4. An array subscript should be a) int c) double

49 / 100

4. Viruses are transferred from one computer to another due to:

50 / 100

17. Which is not an antivirus program?

51 / 100

2. A virus is just a:

52 / 100

9. Software that is used to detect and remove the viruses from the computer is called:

53 / 100

9. Tables are the 1 of our database in Microsoft Access

54 / 100

19. If there are small fmite number of values for a certain field on a form which object will be suitable

55 / 100

8. A computer drives its basic strength from:

56 / 100

RAM is a:

57 / 100

12. Which is a storage device?

58 / 100

4. Which one is the brain of computer?

59 / 100

9. problems occurs when same information is stored in two different ways:

60 / 100

4. In 3NF, a non-key attribute must not depend on a(n)

61 / 100

3. The constraint states that in a relation no primary key value can have a null value.

62 / 100

20. A process of analyzing the dependencies of attributes with in entities is called

63 / 100

12. Data integrity is another form of data

64 / 100

17. If a relation is in INF and the key consists of a single attributes then the relation is called.

65 / 100

3. device is used in banks to read cheque of customer:

66 / 100

18. A Word processor can be used to:

67 / 100

scanners is used in hospitals:

68 / 100

is not related to document management system:

69 / 100

4. CAL stands for

70 / 100

19. contains the files and folders that are deleted from the hard disk:

71 / 100

20. By default, Windows save the documents created in MS-Word in the folder:

72 / 100

17. Which of the following refers to the correctness and consistency of data?

73 / 100

In activity data is collected and recorded:

74 / 100

6. A collection of raw facts and figures is called:

75 / 100

16. A set of related files that represent a unit of data is called

76 / 100

7. Which of the following is not related to data manipulation?

77 / 100

A device used for optical character recognition is a:

78 / 100

is category software:

79 / 100

10. is an example of system software:

80 / 100

15. An inkjet printer is an example of a(n):

81 / 100

13. is not an application software:

82 / 100

5. The predefined words of the programming language that are used for special purposes in the source program are called:

83 / 100

How many keywords are in C?

84 / 100

20. elements of program in not token:

85 / 100

18. The program written in assembly language is translated to the machine code with the help of translator program called:

86 / 100

20. languages is different for different computers:

87 / 100

2. Turbo C-H- can compile

88 / 100

13. The symbols used to write instructions in assembly language are called:

89 / 100

12. A program written in language runs directly on the computer.

90 / 100

9. is not a feature of spreadsheet program:

91 / 100

10. The actual working area in Microsoft Excel is

92 / 100

a spreadsheet:

93 / 100

13. represents a label:

94 / 100

15. menus contains the ‘Cells’ command:

95 / 100

7. The currently selected cell where data can be entered or edited is called:

96 / 100

16. The conditional operator is an alternative of:

97 / 100

14. is used for making two-way decision:

98 / 100

3. How many basic control structures are there?

99 / 100

7. Another name of conditional operator is

100 / 100

10. structures is a selection structure:

Your score is

The average score is 61%

0%

BIG SALE! FLAT 50% OFF

Protected