Computer Sciences Practice Test 3




Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

173

Computer Practice Test 3

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

5. Most common crimes are committed by:

2 / 100

12. is cause of virus:

3 / 100

20. media is used for backup:

4 / 100

10. is not an anti-virus program:

5 / 100

18. Format C is an example of:

6 / 100

17. .exe file is produced by the:

7 / 100

5. The computer program is written in:

8 / 100

18. The program written in assembly language is translated to the machine code with the help of translator program called:

9 / 100

2. Turbo C-H- can compile

10 / 100

9. is not a low-level language:

11 / 100

14. A key that consists of two or more than two attributes of a table is called

12 / 100

9. The rows of a table or relation are known as:

13 / 100

6. A table is also known as

14 / 100

2. The foreign key is found in

15 / 100

8. In a worksheet, a bold rectangle border indicates (n):

16 / 100

15. menus contains the ‘Cells’ command:

17 / 100

14. The 0.0000000001 is displayed in default column width as:

18 / 100

10. A series of actions that are performed on raw data achieve the required objective and results are called:

19 / 100

7. Which of the following is not related to data manipulation?

20 / 100

4. Which of the following may be a temporary file?

21 / 100

In activity data is collected and recorded:

22 / 100

16. A set of related files that represent a unit of data is called

23 / 100

4. The predefined functions that are part of C-language are called: (

24 / 100

I I. The name of actual and formal parameters:

25 / 100

14. The actual body of the function is defined in:

26 / 100

2. Global variables are created in

27 / 100

19. In C-language, subprograms are referred to as:

28 / 100

12. Formal arguments are also called

29 / 100

5. The functions that are defined by programmer are called:

30 / 100

7. A function is called with the reference of its:

31 / 100

9. The actual values are passed to the function in:

32 / 100

6. The selection statement is also known as:

33 / 100

10. structures is a selection structure:

34 / 100

19. What will be the output of (7 > 8) ?printf(“ABC”):printf(“XYZ”);

35 / 100

1. Which of the following is not a decision making statement

36 / 100

18. Which operator in C language is called ternary operator?

37 / 100

8. To store data for future use it must be stored on

38 / 100

2. Which of the following function is used to write a string to a file?

39 / 100

12. function is used to read a single character from a file at a time:

40 / 100

11. As compared to command line operating system, a GUI operating system is:

41 / 100

13. is based on the NT technology:

42 / 100

16. is the entering point in Windows:

43 / 100

8. GUI stands for:

44 / 100

19. contains the files and folders that are deleted from the hard disk:

45 / 100

14. A query is a more flexible way of

46 / 100

5. represents of wizard of DBMS:

47 / 100

to automate repeated tasks — are used

48 / 100

is a collection of related data organized in rows and columns:

49 / 100

18. is the fundamental property of relational database:

50 / 100

The software used for workgroup computing is called:

51 / 100

5. The process of sharing information among various members of workgroup through computer network is called:

52 / 100

FDD1 is a:

53 / 100

19. Which one represents the shape of network?

54 / 100

17. The bold text specifies the: (

55 / 100

16. keys of keyboard in conjunction with arrow keys is used for selecting text:

56 / 100

20. In addition to navigate records can be used for

57 / 100

7. A auto form displays one record at a time.

58 / 100

2. How many basic layouts of forms are here in Microsoft Access.

59 / 100

12. Relational operators are used to

60 / 100

5. The predefined words of the programming language that are used for special purposes in the source program are called:

61 / 100

10. The symbol = represents:

62 / 100

13. The benefit of CAD may be summed up as:

63 / 100

The fly-by-wire system is used in:

64 / 100

devices is used in departmental store:

65 / 100

20. A process of analyzing the dependencies of attributes with in entities is called

66 / 100

5. Different attributes in two different tables having same name are referred to as (

67 / 100

3. The constraint states that in a relation no primary key value can have a null value.

68 / 100

2. How many types of data integrity are there?

69 / 100

15. In which of the following normal forms, any repeating group from the table is removed?

70 / 100

1. In 3NF, which form of dependency is removed? (

71 / 100

6. Referential integrity is applied on

72 / 100

17. The cells of memory are logically organized into group of

73 / 100

2. An entity related to itself in an ERD model refers to

74 / 100

6. is not component of data communication:

75 / 100

17. The music and speech represent the: (a) Image data (b) Audio data (c) Video data (d) Text data

76 / 100

19. coding schemes uses 4 bit code:

77 / 100

14. The height of wave within a given period of time is called:

78 / 100

Microwave transmission, coaxial cables and fiber optic are examples of:

79 / 100

16. The computers on the Internet that contain the web sites are called:

80 / 100

19. represents URL address:

81 / 100

3. The globe has become a global village, due to:

82 / 100

13. services is provided by Internet:

83 / 100

14. Which of service of Internet is used to transfer files:

84 / 100

3. The loop which never ends is called:

85 / 100

17. The of for loop executed only once in the first iteration

86 / 100

18. is related to loop structures:

87 / 100

16. The loop will execute at least even the condition is false

88 / 100

11. The body of I comes er the test condition in:

89 / 100

8. In while loop, the loop control variable always initialized

90 / 100

13. The body of loop comes before the test condition in:

91 / 100

11. The escape sequence for carriage return is

92 / 100

15. format specifiers is used for float type data:

93 / 100

14. format specifiers is used for integer type data:

94 / 100

7 . is control suing in the statement prinf(“Result = %d”,r);:

95 / 100

1. The function getch() is defined in:

96 / 100

11. is an example of packaged software:

97 / 100

10. The number of records (or row) in a table or relation is called:

98 / 100

19. is the default data e in MS-Access:

99 / 100

20. is th efault field size of Text data type in MS-Access:

100 / 100

2. The rule that a record from a table cannot be deleted if its associated record exists in a related table is called rule

Your score is

The average score is 70%

0%

BIG SALE! FLAT 50% OFF

Protected