Computer Sciences Practice Test 3




Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

173

Computer Practice Test 3

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

8. The programming language that are very close to machine code are called:

2 / 100

language is known as fundamental computer language:

3 / 100

3. Debug is the process of:

4 / 100

20. languages is different for different computers:

5 / 100

14. C was designed to write programs for

6 / 100

9. is not a low-level language:

7 / 100

16. Which of the following requires no translator to execute the program?

8 / 100

20. The predefined functions that are part of the programming language and can be used for different purposes are called:

9 / 100

5. The functions that are defined by programmer are called:

10 / 100

17. In a C program two functions can have:

11 / 100

12. Which one represents the top level domain?

12 / 100

17. A place where we can see all the tables and their relationship

13 / 100

13. In a table each column represents

14 / 100

14. A query is a more flexible way of

15 / 100

8. A record is a complete set of

16 / 100

The actual data of Is stored in:

17 / 100

scanners is used in hospitals:

18 / 100

15. Typically, and ATM can be used to

19 / 100

15. In C, the maximum length of variable name is:

20 / 100

2. Which of the following is a valid character constant?

21 / 100

17. The logical not (!) operator is denoted as:

22 / 100

5. The predefined words of the programming language that are used for special purposes in the source program are called:

23 / 100

10. The symbol = represents:

24 / 100

13. is valid variable name

25 / 100

is not a valid variable

26 / 100

. A quantity whose value may change during execution of program is called:

27 / 100

4. When the result of the computation of two very small numbers is too small to be represented, this phenomenon is called:

28 / 100

18. An index may be created on

29 / 100

17. A technique for physically arranging the records of a file on secondary storage device is called

30 / 100

I I. In hybrid distribution which kind of fragments are stored at only one site

31 / 100

3. is called the preliminary investigation of the required database:

32 / 100

6. A table is also known as

33 / 100

10. The column of relation is known as

34 / 100

9. The rows of a table or relation are known as:

35 / 100

represents an entity

36 / 100

19. serves as a bridge between end users and database administrator:

37 / 100

12. The data in table is entered in:

38 / 100

7. The number of fields in a relation or table is called:

39 / 100

6. In a relational database, a single piece of information is called:

40 / 100

14. Semicolon is placed at the end of condition in:

41 / 100

12. The while loop is also called: (a) conditional loop (b) (c) counter loop (d)
while Both (b) and (c)
wend loop Attribute

42 / 100

18. is related to loop structures:

43 / 100

13. Which of the following operators is used as decision-making statement?

44 / 100

is category software:

45 / 100

15. An inkjet printer is an example of a(n):

46 / 100

The computing and communication technologies arc combined together for

47 / 100

13. is not an application software:

48 / 100

12. is not an example of packaged software:

49 / 100

Collection of raw facts and figures is called:

50 / 100

4. In 3NF, a non-key attribute must not depend on a(n)

51 / 100

10. The process of converting complex data structure into simple and stable data structure is called: a –

52 / 100

7. problems occurs when two different names are used for the same information?

53 / 100

15. In which of the following normal forms, any repeating group from the table is removed?

54 / 100

19. In a college, organizing the record of Science and Arts students into two groups, this activity is referred to as

55 / 100

20. The process of arranging data in a proper order is called:

56 / 100

18. Which of the following database model has the shape like and organizational chart?

57 / 100

20. Which of the following format specifier is used for string type data?

58 / 100

7 . is control suing in the statement prinf(“Result = %d”,r);:

59 / 100

12. Which of the following forma specifier is used for character type data

60 / 100

10. is not an anti-virus program:

61 / 100

18. Format C is an example of:

62 / 100

12. is cause of virus:

63 / 100

15. Security Protection for personal computer include:

64 / 100

4. Viruses are transferred from one computer to another due to:

65 / 100

19. What is the most common computer crime of these listed below?

66 / 100

16. A secret word or number to be typed by a keyboard before an activity can take place are called:

67 / 100

13. Types of software that can be freely distributed without violating copyright laws are called:

68 / 100

6. What layer of OSI does data compression:

69 / 100

The software used for workgroup computing is called:

70 / 100

I. A LAN is a combination of:

71 / 100

FDD1 is a:

72 / 100

18. is a governing body that approve the network standard:

73 / 100

10. Which network model consists of many clients and one or more central computers?

74 / 100

19. If there are small fmite number of values for a certain field on a form which object will be suitable

75 / 100

17. A Form within another form is called:

76 / 100

14. The different design elements placed on form are called

77 / 100

13. A form with multiple tabs and each tab consisting a page of information

78 / 100

10. BIT stands for

79 / 100

15. Which type of data consists of words, sentences, and paragraphs?

80 / 100

3. The process of transferring data from one location to another is called:

81 / 100

The infonnation that is to be transferred from one location to another is called:

82 / 100

16. The charts, graphs and pictures are examples of:

83 / 100

9. The electromagnetic or light waves representing data are called:

84 / 100

10. What type of operating system MS-DOS is?

85 / 100

16. is the entering point in Windows:

86 / 100

19. contains the files and folders that are deleted from the hard disk:

87 / 100

An Operating System is a

88 / 100

6. The component of computer that stores data and program while these are being executed is called:

89 / 100

12. Which of the following can be used to launch the WordArt?

90 / 100

3. A word processor includes the process of

91 / 100

5. During text entering process into document. the cursor automatically shifts to the next line when it reaches to the right margin. This feature of word processor is called:

92 / 100

8. In MS Word, the data that is being copied or moved is

93 / 100

3. The intersection of a row and column form a:

94 / 100

9. is not a feature of spreadsheet program:

95 / 100

19. If the custom format is 00000 then the number 420 will be displayed as:

96 / 100

5. A cell at third column and 15 rows has a cell address:

97 / 100

13. represents a label:

98 / 100

7. The currently selected cell where data can be entered or edited is called:

99 / 100

16. Which of the following is an absolute address?

100 / 100

a spreadsheet:

Your score is

The average score is 70%

0%

BIG SALE! FLAT 50% OFF

Protected