Computer Sciences Practice Test 4




Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

140

Computer Practice Test 4

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

The infonnation that is to be transferred from one location to another is called:

2 / 100

14. The height of wave within a given period of time is called:

3 / 100

6. is not component of data communication:

4 / 100

3. The process of transferring data from one location to another is called:

5 / 100

I I. Communication between a computer and a keyboard involves transmission:

6 / 100

16. menus in MS-Access contains commands that can be used to switch between table views?

7 / 100

12. The data in table is entered in:

8 / 100

8. Which of the following buttons of Find and Replace dialog box is clicked to start he search process?

9 / 100

10. The number of records (or row) in a table or relation is called:

10 / 100

6. The component of computer that stores data and program while these are being executed is called:

11 / 100

1. Data and programs that are not being use by computer are stored in:

12 / 100

16. CPU includes all of the following components except?

13 / 100

5. Which component of a computer decodes and executes program consuvetions?

14 / 100

17. The cells of memory are logically organized into group of

15 / 100

14. Which component of computer is responsible for comparison of two numbers?

16 / 100

16. A relation is in second normal form if and only if:

17 / 100

19. A process in which it is being ensured that attributes are stored from where they belong

18 / 100

12. Data integrity is another form of data

19 / 100

20. A process of analyzing the dependencies of attributes with in entities is called

20 / 100

18. If the value of a non-key attribute can be obtained simply by knowing the values of another non-key attribute, the relation is not in: (

21 / 100

10. structures is a selection structure:

22 / 100

4. Which one is a control structure?

23 / 100

8. Which of the following keywords is not used in switch statement?

24 / 100

11. selection structures is the simplest form of decision making structure:

25 / 100

19. What will be the output of (7 > 8) ?printf(“ABC”):printf(“XYZ”);

26 / 100

12. is not decision-making statement:

27 / 100

10. A logical interface to a file is called

28 / 100

is most necessary to interact with the computer:

29 / 100

13. is based on the NT technology:

30 / 100

5. Ctrl + Alt + Del is

31 / 100

An Operating System is a

32 / 100

16. Each of the following is a form layout except.

33 / 100

4. CAL stands for

34 / 100

9. Computer at home can be used

35 / 100

is not related to document management system:

36 / 100

6. The benefit of CAD may be summed up as

37 / 100

16. Modern computer can perform calculations or process at high speed

38 / 100

scanners is used in hospitals:

39 / 100

is not relevant to office automation:

40 / 100

9. is not a low-level language:

41 / 100

19. The instructions written in machine language are in the form of:

42 / 100

16. Which of the following requires no translator to execute the program?

43 / 100

12. A program written in language runs directly on the computer.

44 / 100

14. C was designed to write programs for

45 / 100

5. The computer program is written in:

46 / 100

II. A cell of worksheet, which is not active is called:

47 / 100

19. If the custom format is 00000 then the number 420 will be displayed as:

48 / 100

20. is not secondary storage device:

49 / 100

12. is not an example of packaged software:

50 / 100

1. Insert command is used to insert.

51 / 100

20. is responsible for designing, coordinating and monitoring the database system: (

52 / 100

FDD1 is a:

53 / 100

19. Which one represents the shape of network?

54 / 100

7. Cabling on a linear bus topology can be extended using which of following:

55 / 100

21. One or more computers connected to a hub is a:

56 / 100

3. Central computer in the network is called:

57 / 100

I. Which of the following keys does not hold uniqueness property

58 / 100

16. In E-R diagram, a diamond shape is used to represent a(n):

59 / 100

8. tools in involved to the Data Analysis:

60 / 100

18. A common font size used in business documents is:

61 / 100

2. is most commonly used word processing package:

62 / 100

6. features of word processor allows to insert text from one file into another file:

63 / 100

15. How many typing modes are provided by word processor?

64 / 100

is not a feature of simple word processor or text editor:

65 / 100

17. The bold text specifies the: (

66 / 100

18. is used with format specifier to display output left-justified:

67 / 100

11. The escape sequence for carriage return is

68 / 100

14. format specifiers is used for integer type data:

69 / 100

13. What will be the output of printf(“%d”,’a’);

70 / 100

2. The escape sequence for backslash is:

71 / 100

1. The function getch() is defined in:

72 / 100

16. The %x is a format specifier for:

73 / 100

20. Which of the following format specifier is used for string type data?

74 / 100

20. media is used for backup:

75 / 100

10. is not an anti-virus program:

76 / 100

5. Most common crimes are committed by:

77 / 100

11. is an anti-virus program:

78 / 100

8. Format C is an example of virus:

79 / 100

7. virus is activated on the basis of a logical condition:

80 / 100

16. A secret word or number to be typed by a keyboard before an activity can take place are called:

81 / 100

10. A series of actions that are performed on raw data achieve the required objective and results are called:

82 / 100

3. Which of the following type of file require largest processing time?

83 / 100

9. The manipulated and processed data is called:

84 / 100

2. Which of the following data model is more flexible?

85 / 100

12. In a school the record of cricket and hockey team organized into two groups is referred as

86 / 100

19. In C-language, subprograms are referred to as:

87 / 100

0. Which of the following looks for the prototype of functions used in a program:

88 / 100

2. Global variables are created in

89 / 100

13. services is provided by Internet:

90 / 100

16. The computers on the Internet that contain the web sites are called:

91 / 100

12. Which one represents the top level domain?

92 / 100

to automate repeated tasks — are used

93 / 100

16. Using you can create tables, forms, reports and queries in very short time

94 / 100

8. In while loop, the loop control variable always initialized

95 / 100

13. The body of loop comes before the test condition in:

96 / 100

2. is a loop statement:

97 / 100

3. The loop which never ends is called:

98 / 100

14. Which of the following characters cannot be used as first character of a variable name?

99 / 100

10. The symbol = represents:

100 / 100

5. The predefined words of the programming language that are used for special purposes in the source program are called:

Your score is

The average score is 71%

0%

BIG SALE! FLAT 50% OFF

Protected

Open chat
Salam
Can we help you?