Computer Sciences Practice Test 3




Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

172

Computer Practice Test 3

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

5. is called counter loop:

2 / 100

10. structure executes the body of loop at least once:

3 / 100

2. Which of the following function is used to write a string to a file?

4 / 100

9. A collection of related records is called

5 / 100

13. function is used as formatted output file function:

6 / 100

20. The last statement of each case in switch statement must be a:

7 / 100

8. Which of the following keywords is not used in switch statement?

8 / 100

18. Which operator in C language is called ternary operator?

9 / 100

13. Which of the following operators is used as decision-making statement?

10 / 100

11. selection structures is the simplest form of decision making structure:

11 / 100

16. menus in MS-Access contains commands that can be used to switch between table views?

12 / 100

20. is th efault field size of Text data type in MS-Access:

13 / 100

8. Which of the following buttons of Find and Replace dialog box is clicked to start he search process?

14 / 100

10. What type of operating system MS-DOS is?

15 / 100

is an example of command line operating system:

16 / 100

20. By default, Windows save the documents created in MS-Word in the folder:

17 / 100

is most necessary to interact with the computer:

18 / 100

18. acts as file manager for Windows: (

19 / 100

15. An inkjet printer is an example of a(n):

20 / 100

The processed data is called:

21 / 100

11. is an example of packaged software:

22 / 100

10. The column of relation is known as

23 / 100

15. An attribute is also known as:

24 / 100

9. The rows of a table or relation are known as:

25 / 100

represents an entity

26 / 100

A table is also known as: (

27 / 100

15. In E-R diagram, an oval shape is used to represent a(n):

28 / 100

4. In activities, the possible inputs for the database are collected:

29 / 100

9. The process to identify the data objects and the relationships between them is:

30 / 100

12. What indicates the connection between entites

31 / 100

is the ingredient of data modeling:

32 / 100

18. An index may be created on

33 / 100

3. objects is not used to enter data into database:

34 / 100

13. A form with multiple tabs and each tab consisting a page of information

35 / 100

15. Which is not an example of a control element placed on the form

36 / 100

8. Which of the following is used to retrieve data from one or more tables of database and to present it to the user in a formatted way.

37 / 100

14. The different design elements placed on form are called

38 / 100

3. is the most popular and powerful DBMS:

39 / 100

13. In a table each column represents

40 / 100

6. A collection of related worksheets is called:

41 / 100

10. The actual working area in Microsoft Excel is

42 / 100

18. The default number format assigned to a cell is the:

43 / 100

7. virus is activated on the basis of a logical condition:

44 / 100

10. is not an anti-virus program:

45 / 100

13. Types of software that can be freely distributed without violating copyright laws are called:

46 / 100

8. Format C is an example of virus:

47 / 100

18. Format C is an example of:

48 / 100

17. The music and speech represent the: (a) Image data (b) Audio data (c) Video data (d) Text data

49 / 100

19. coding schemes uses 4 bit code:

50 / 100

6. is not component of data communication:

51 / 100

14. The media Access Control Sub-layer resides in which layer:

52 / 100

12. In which network model all computers have equal status?

53 / 100

10. Which network model consists of many clients and one or more central computers?

54 / 100

19. Which one represents the shape of network?

55 / 100

10. The computer understands the instructions only in:

56 / 100

12. A program written in language runs directly on the computer.

57 / 100

13. The symbols used to write instructions in assembly language are called:

58 / 100

20. languages is different for different computers:

59 / 100

19. The instructions written in machine language are in the form of:

60 / 100

17. .exe file is produced by the:

61 / 100

6. features of word processor allows to insert text from one file into another file:

62 / 100

10. The bar that contains the group of commands is called:

63 / 100

9. The bar that displays the name of program and the name of documents is called:

64 / 100

5. During text entering process into document. the cursor automatically shifts to the next line when it reaches to the right margin. This feature of word processor is called:

65 / 100

12. Which of the following can be used to launch the WordArt?

66 / 100

18. Which of the following database model has the shape like and organizational chart?

67 / 100

20. The process of arranging data in a proper order is called:

68 / 100

4. Which of the following may be a temporary file?

69 / 100

Q2. Select the correct option I. Which of the following represents a collection of concepts that arc used to describe the structure of a database?

70 / 100

3. Which of the following type of file require largest processing time?

71 / 100

How many keywords are in C?

72 / 100

11. Which of the operator has lowest presidence

73 / 100

is not a valid variable

74 / 100

19. The words used to write the statements of a program are called

75 / 100

6. Mother name for built-in function is:

76 / 100

14. format specifiers is used for integer type data:

77 / 100

16. The %x is a format specifier for:

78 / 100

18. is used with format specifier to display output left-justified:

79 / 100

11. The escape sequence for carriage return is

80 / 100

0. The format specifier %u is used for:

81 / 100

12. Data integrity is another form of data

82 / 100

4. In 3NF, a non-key attribute must not depend on a(n)

83 / 100

8. problems occurs when same name is used for two different attributes:

84 / 100

11. A functional dependency between two or more non-key attributes in a relation is called

85 / 100

14. A foreign key constraint is also called

86 / 100

7. problems occurs when two different names are used for the same information?

87 / 100

1. In 3NF, which form of dependency is removed? (

88 / 100

15. In which of the following normal forms, any repeating group from the table is removed?

89 / 100

15. Typically, and ATM can be used to

90 / 100

4. CAL stands for

91 / 100

is not related to business:

92 / 100

19. CAT stands for

93 / 100

12. Which one represents the top level domain?

94 / 100

20. protocol is used by news services:

95 / 100

7. How many types of addressing schemes?

96 / 100

II. Which of the following protocol is used to access web pages on World Wide Web?

97 / 100

9. Software to use the Internet:

98 / 100

8. specifies the correct format of IP address:

99 / 100

3. The idea of stored program was given by:

100 / 100

8. A computer drives its basic strength from:

Your score is

The average score is 70%

0%

BIG SALE! FLAT 50% OFF

MDCAT Best Book 2025

Protected