Computer Sciences Practice Test 3




Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

173

Computer Practice Test 3

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

6. Referential integrity is applied on

2 / 100

1. In 3NF, which form of dependency is removed? (

3 / 100

14. A foreign key constraint is also called

4 / 100

16. A relation is in second normal form if and only if:

5 / 100

12. Data integrity is another form of data

6 / 100

17. If a relation is in INF and the key consists of a single attributes then the relation is called.

7 / 100

20. A process of analyzing the dependencies of attributes with in entities is called

8 / 100

The software used for workgroup computing is called:

9 / 100

20. Which one is not a network topology?

10 / 100

7. Cabling on a linear bus topology can be extended using which of following:

11 / 100

14. The media Access Control Sub-layer resides in which layer:

12 / 100

12. In which network model all computers have equal status?

13 / 100

21. One or more computers connected to a hub is a:

14 / 100

An Operating System is a

15 / 100

organizes and controls the hardware and software:

16 / 100

15. involves the processing on multiple processors in a computer:

17 / 100

20. By default, Windows save the documents created in MS-Word in the folder:

18 / 100

3. function is used to display output on screen:

19 / 100

20. Which of the following format specifier is used for string type data?

20 / 100

7 . is control suing in the statement prinf(“Result = %d”,r);:

21 / 100

12. Which of the following forma specifier is used for character type data

22 / 100

14. format specifiers is used for integer type data:

23 / 100

14. The height of wave within a given period of time is called:

24 / 100

17. The music and speech represent the: (a) Image data (b) Audio data (c) Video data (d) Text data

25 / 100

12. Light, sound, and radio waves are examples of:

26 / 100

20. is th efault field size of Text data type in MS-Access:

27 / 100

18. is not an example of data type in MS-Access:

28 / 100

9. As in design view, you can move from field to field in the table window in datasheet view using button.

29 / 100

4. The actual data of database is stored in:

30 / 100

17. A place where we can see all the tables and their relationship

31 / 100

4. MS-Access is a:

32 / 100

2. Which of the following object is used to retrieve data from database and present in a formatted way?

33 / 100

15. A step by step procedure to perform a task easily available in a software is called

34 / 100

19. The words used to write the statements of a program are called

35 / 100

11. Which of the operator has lowest presidence

36 / 100

. A quantity whose value may change during execution of program is called:

37 / 100

4. When the result of the computation of two very small numbers is too small to be represented, this phenomenon is called:

38 / 100

17. A technique for physically arranging the records of a file on secondary storage device is called

39 / 100

5. control structures executes program statements one after another:

40 / 100

13. Which of the following operators is used as decision-making statement?

41 / 100

14. is used for making two-way decision:

42 / 100

16. The conditional operator is an alternative of:

43 / 100

10. structures is a selection structure:

44 / 100

8. A computer drives its basic strength from:

45 / 100

16. The computers on the Internet that contain the web sites are called:

46 / 100

8. specifies the correct format of IP address:

47 / 100

1. Insert command is used to insert.

48 / 100

19. serves as a bridge between end users and database administrator:

49 / 100

is used to identify records of a relation uniquely:

50 / 100

A table is also known as: (

51 / 100

represents an entity

52 / 100

13. A table must have:

53 / 100

12. is cause of virus:

54 / 100

19. What is the most common computer crime of these listed below?

55 / 100

16. A secret word or number to be typed by a keyboard before an activity can take place are called:

56 / 100

6. viruses infects the first sector of disk:

57 / 100

11. is an anti-virus program:

58 / 100

2. A virus is just a:

59 / 100

14. A set of related fields that represent a unit of data is called

60 / 100

12. In a school the record of cricket and hockey team organized into two groups is referred as

61 / 100

19. In a college, organizing the record of Science and Arts students into two groups, this activity is referred to as

62 / 100

17. Which of the following refers to the correctness and consistency of data?

63 / 100

8. represents an object:

64 / 100

16. A set of related files that represent a unit of data is called

65 / 100

5. A cell at third column and 15 rows has a cell address:

66 / 100

15. menus contains the ‘Cells’ command:

67 / 100

10. The actual working area in Microsoft Excel is

68 / 100

7. features of word processor allows to specify margins of the documents:

69 / 100

17. The bold text specifies the: (

70 / 100

6. features of word processor allows to insert text from one file into another file:

71 / 100

19. Font size is measure in:

72 / 100

8. In MS Word, the data that is being copied or moved is

73 / 100

6. The benefit of CAD may be summed up as

74 / 100

17. Computer at home can be used for:

75 / 100

3. device is used in banks to read cheque of customer:

76 / 100

12. Form with in a form is called

77 / 100

1. A form that contains the sub form is called

78 / 100

5. Forms are designed for:

79 / 100

18. The name of actual and formal parameters:

80 / 100

8. A function:

81 / 100

0. Which of the following looks for the prototype of functions used in a program:

82 / 100

1. A file is stored in

83 / 100

18. In binary stream bytes have correspondence

84 / 100

20. is true about a stream:

85 / 100

12. function is used to read a single character from a file at a time:

86 / 100

17. In text stream characters have correspondence

87 / 100

II. A stream is associated with a file using and operaton

88 / 100

17. .exe file is produced by the:

89 / 100

20. languages is different for different computers:

90 / 100

13. The symbols used to write instructions in assembly language are called:

91 / 100

4. A set of instruction given to the computer is called:

92 / 100

C is a:

93 / 100

9. is not a low-level language:

94 / 100

12. The while loop is also called: (a) conditional loop (b) (c) counter loop (d)
while Both (b) and (c)
wend loop Attribute

95 / 100

2. is a loop statement:

96 / 100

8. In while loop, the loop control variable always initialized

97 / 100

13. The body of loop comes before the test condition in:

98 / 100

20. Loop with in a loop is called

99 / 100

19. structure is used when programmer does not know is advance the number of repetition of loop?

100 / 100

6. Which one is not a loop structure

Your score is

The average score is 70%

0%

BIG SALE! FLAT 50% OFF

Protected