Computer Sciences Practice Test 3




Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

173

Computer Practice Test 3

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

15. menus contains the ‘Cells’ command:

2 / 100

1. Which of the following is a spreadsheet 2.

3 / 100

19. If the custom format is 00000 then the number 420 will be displayed as:

4 / 100

12. cell addresses is correct:

5 / 100

16. Which of the following is an absolute address?

6 / 100

6. A collection of related worksheets is called:

7 / 100

5. A cell at third column and 15 rows has a cell address:

8 / 100

In activity data is collected and recorded:

9 / 100

3. Which of the following type of file require largest processing time?

10 / 100

17. Which of the following refers to the correctness and consistency of data?

11 / 100

15. A set of related records that represent a unit of data is called

12 / 100

11. How may table view are available in MS-Access?

13 / 100

5. is the object of MS-Access database file:

14 / 100

8. Which of the following buttons of Find and Replace dialog box is clicked to start he search process?

15 / 100

4. In 3NF, a non-key attribute must not depend on a(n)

16 / 100

8. problems occurs when same name is used for two different attributes:

17 / 100

12. Data integrity is another form of data

18 / 100

10. The process of converting complex data structure into simple and stable data structure is called: a –

19 / 100

7. problems occurs when two different names are used for the same information?

20 / 100

2. How many types of data integrity are there?

21 / 100

2. Which of the following is a valid character constant?

22 / 100

is not a valid variable

23 / 100

is secondary storage device:

24 / 100

For the input of image data:

25 / 100

The processed data is called:

26 / 100

12. is not an example of packaged software:

27 / 100

Collection of raw facts and figures is called:

28 / 100

5. is not used in control or format string in a prindo function:

29 / 100

3. function is used to display output on screen:

30 / 100

16. The %x is a format specifier for:

31 / 100

8. The functions used for input and output are stored in header file:

32 / 100

14. format specifiers is used for integer type data:

33 / 100

12. Which of the following forma specifier is used for character type data

34 / 100

5. Which component of a computer decodes and executes program consuvetions?

35 / 100

10. Which component of CPU is responsible for performing arithmetic and logical operations on numeric data?

36 / 100

12. Which is a storage device?

37 / 100

3. Which of the following is true about a function call?

38 / 100

9. The actual values are passed to the function in:

39 / 100

0. Which of the following looks for the prototype of functions used in a program:

40 / 100

19. In C-language, subprograms are referred to as:

41 / 100

2. Global variables are created in

42 / 100

17. In a C program two functions can have:

43 / 100

8. specifies the correct format of IP address:

44 / 100

10. If “Yahoo.com” is a domain name, then what will be the top level domain?

45 / 100

Who owns the Internet?

46 / 100

9. Software to use the Internet:

47 / 100

14. The different design elements placed on form are called

48 / 100

5. Forms are designed for:

49 / 100

The infonnation that is to be transferred from one location to another is called:

50 / 100

21. One or more computers connected to a hub is a:

51 / 100

16. standards were developed without any formal planning:

52 / 100

14. The media Access Control Sub-layer resides in which layer:

53 / 100

I. A LAN is a combination of:

54 / 100

3. Central computer in the network is called:

55 / 100

7. Cabling on a linear bus topology can be extended using which of following:

56 / 100

16. Modern computer can perform calculations or process at high speed

57 / 100

scanners is used in hospitals:

58 / 100

15. Typically, and ATM can be used to

59 / 100

The fly-by-wire system is used in:

60 / 100

10. A word processor can be used to

61 / 100

20. is true about a stream:

62 / 100

17. In text stream characters have correspondence

63 / 100

14. If programs get input data from data file and also send output into data file. It is called:

64 / 100

18. In binary stream bytes have correspondence

65 / 100

20. is responsible for designing, coordinating and monitoring the database system: (

66 / 100

17. SQL is used for

67 / 100

8. The columns of a relation correspond to:

68 / 100

15. An attribute is also known as:

69 / 100

5. Most common crimes are committed by:

70 / 100

15. Security Protection for personal computer include:

71 / 100

10. is not an anti-virus program:

72 / 100

11. is an anti-virus program:

73 / 100

16. A secret word or number to be typed by a keyboard before an activity can take place are called:

74 / 100

I. Which of the following keys does not hold uniqueness property

75 / 100

6. Database development process involve mapping of conceptual data model into

76 / 100

20. is not related to an entity:

77 / 100

19. represents entity:

78 / 100

1. Which of the following is not a decision making statement

79 / 100

19. What will be the output of (7 > 8) ?printf(“ABC”):printf(“XYZ”);

80 / 100

2. Which of the following operator is used as decision making statement

81 / 100

18. Which operator in C language is called ternary operator?

82 / 100

13. Which of the following operators is used as decision-making statement?

83 / 100

I. A database consists of various components called the

84 / 100

2. Which of the following object is used to retrieve data from database and present in a formatted way?

85 / 100

18. is the fundamental property of relational database:

86 / 100

17. A place where we can see all the tables and their relationship

87 / 100

5. represents of wizard of DBMS:

88 / 100

16. Which of the following requires no translator to execute the program?

89 / 100

14. C was designed to write programs for

90 / 100

C is a:

91 / 100

6. The programming languages that are close to human language are called:

92 / 100

19. The instructions written in machine language are in the form of:

93 / 100

organizes and controls the hardware and software:

94 / 100

10. What type of operating system MS-DOS is?

95 / 100

16. The loop will execute at least even the condition is false

96 / 100

7. A variable whose value controls the number of iterations is known as

97 / 100

8. In MS Word, the data that is being copied or moved is

98 / 100

13. shows the margins, position of tabs, and indents etc:

99 / 100

. Which of the following is a word processor (

100 / 100

5. During text entering process into document. the cursor automatically shifts to the next line when it reaches to the right margin. This feature of word processor is called:

Your score is

The average score is 70%

0%

BIG SALE! FLAT 50% OFF

Protected