Computer Sciences Practice Test 3




Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

173

Computer Practice Test 3

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

8. The functions used for input and output are stored in header file:

2 / 100

1. The function getch() is defined in:

3 / 100

18. is used with format specifier to display output left-justified:

4 / 100

22. All nodes are connected to a single cable in a:

5 / 100

Which one is dedicated server?

6 / 100

4. The larger computer to which the terminal or PC is attached is called:

7 / 100

I. A LAN is a combination of:

8 / 100

16. standards were developed without any formal planning:

9 / 100

17. Which one is an example of De-Facto standard?

10 / 100

FDD1 is a:

11 / 100

7. The currently selected cell where data can be entered or edited is called:

12 / 100

5. A cell at third column and 15 rows has a cell address:

13 / 100

19. If the custom format is 00000 then the number 420 will be displayed as:

14 / 100

18. The default number format assigned to a cell is the:

15 / 100

9. The electromagnetic or light waves representing data are called:

16 / 100

19. coding schemes uses 4 bit code:

17 / 100

Microwave transmission, coaxial cables and fiber optic are examples of:

18 / 100

8. The is the physical path over which a message travels:

19 / 100

14. The height of wave within a given period of time is called:

20 / 100

is category software:

21 / 100

For the input of image data:

22 / 100

12. is not an example of packaged software:

23 / 100

Data processing is also called:

24 / 100

20. languages is different for different computers:

25 / 100

9. is not a low-level language:

26 / 100

13. The symbols used to write instructions in assembly language are called:

27 / 100

16. Which of the following requires no translator to execute the program?

28 / 100

18. A common font size used in business documents is:

29 / 100

14. The insertion point in the document is also called:

30 / 100

15. How many typing modes are provided by word processor?

31 / 100

3. A word processor includes the process of

32 / 100

5. is the object of MS-Access database file:

33 / 100

6. In a relational database, a single piece of information is called:

34 / 100

16. menus in MS-Access contains commands that can be used to switch between table views?

35 / 100

13. The structure of table is designed in:

36 / 100

9. The manipulated and processed data is called:

37 / 100

15. Which is not an example of a control element placed on the form

38 / 100

5. Forms are designed for:

39 / 100

2. How many basic layouts of forms are here in Microsoft Access.

40 / 100

20. In addition to navigate records can be used for

41 / 100

7.function is used to write a string to a file:

42 / 100

10. A logical interface to a file is called

43 / 100

4. An array subscript should be a) int c) double

44 / 100

8. To store data for future use it must be stored on

45 / 100

13. function is used as formatted output file function:

46 / 100

14. Which of the following characters cannot be used as first character of a variable name?

47 / 100

. A quantity whose value may change during execution of program is called:

48 / 100

11. Which of the operator has lowest presidence

49 / 100

10. The symbol = represents:

50 / 100

4. When the result of the computation of two very small numbers is too small to be represented, this phenomenon is called:

51 / 100

18. is the fundamental property of relational database:

52 / 100

5. represents of wizard of DBMS:

53 / 100

15. A step by step procedure to perform a task easily available in a software is called

54 / 100

16. Using you can create tables, forms, reports and queries in very short time

55 / 100

6. The selection statement is also known as:

56 / 100

3. How many basic control structures are there?

57 / 100

14. is used for making two-way decision:

58 / 100

10. structures is a selection structure:

59 / 100

1. Functions prototype for built-in functions are specified in:

60 / 100

0. Which of the following looks for the prototype of functions used in a program:

61 / 100

11. The body of I comes er the test condition in:

62 / 100

3. The loop which never ends is called:

63 / 100

9. In while loop, the increment / decrement statement are placed

64 / 100

12. The while loop is also called: (a) conditional loop (b) (c) counter loop (d)
while Both (b) and (c)
wend loop Attribute

65 / 100

6. Which one is not a loop structure

66 / 100

I I. CPU is an example of:

67 / 100

13. Types of software that can be freely distributed without violating copyright laws are called:

68 / 100

1. A virus program usually hidden in:

69 / 100

12. is cause of virus:

70 / 100

16. A secret word or number to be typed by a keyboard before an activity can take place are called:

71 / 100

15. Security Protection for personal computer include:

72 / 100

7. virus is activated on the basis of a logical condition:

73 / 100

10. is not an anti-virus program:

74 / 100

13. services is provided by Internet:

75 / 100

19. represents URL address:

76 / 100

17. A technique for physically arranging the records of a file on secondary storage device is called

77 / 100

4. In activities, the possible inputs for the database are collected:

78 / 100

5. In activities, the cost factors are taken into consideration:

79 / 100

17. If a relation is in INF and the key consists of a single attributes then the relation is called.

80 / 100

19. A process in which it is being ensured that attributes are stored from where they belong

81 / 100

3. The constraint states that in a relation no primary key value can have a null value.

82 / 100

8. problems occurs when same name is used for two different attributes:

83 / 100

18. If the value of a non-key attribute can be obtained simply by knowing the values of another non-key attribute, the relation is not in: (

84 / 100

15. In which of the following normal forms, any repeating group from the table is removed?

85 / 100

8. The columns of a relation correspond to:

86 / 100

is used to identify records of a relation uniquely:

87 / 100

9. The rows of a table or relation are known as:

88 / 100

18. Which of the following is responsible for designing the database system.

89 / 100

2. The foreign key is found in

90 / 100

is not related to business:

91 / 100

17. Computer at home can be used for:

92 / 100

9. Computer at home can be used

93 / 100

19. CAT stands for

94 / 100

13. The benefit of CAD may be summed up as:

95 / 100

6. The benefit of CAD may be summed up as

96 / 100

12. The maximum number of primary partitions that can be created on a disk is

97 / 100

20. By default, Windows save the documents created in MS-Word in the folder:

98 / 100

10. What type of operating system MS-DOS is?

99 / 100

An Operating System is a

100 / 100

15. involves the processing on multiple processors in a computer:

Your score is

The average score is 70%

0%

BIG SALE! FLAT 50% OFF

Protected