Computer Sciences Practice Test 5




Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

198

Computer Practice Test 5

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

Data processing is also called:

2 / 100

20. is not secondary storage device:

3 / 100

is secondary storage device:

4 / 100

11. is an example of packaged software:

5 / 100

2. Turbo C-H- can compile

6 / 100

6. Referential integrity is applied on

7 / 100

11. A functional dependency between two or more non-key attributes in a relation is called

8 / 100

13. Integrity is concerned with the (

9 / 100

10. The process of converting complex data structure into simple and stable data structure is called: a –

10 / 100

20. A process of analyzing the dependencies of attributes with in entities is called

11 / 100

1. In 3NF, which form of dependency is removed? (

12 / 100

18. If the value of a non-key attribute can be obtained simply by knowing the values of another non-key attribute, the relation is not in: (

13 / 100

16. A relation is in second normal form if and only if:

14 / 100

7. problems occurs when two different names are used for the same information?

15 / 100

I I. The name of actual and formal parameters:

16 / 100

6. Mother name for built-in function is:

17 / 100

14. The actual body of the function is defined in:

18 / 100

12. Formal arguments are also called

19 / 100

2. Global variables are created in

20 / 100

17. In a C program two functions can have:

21 / 100

4. Which of the following may be a temporary file?

22 / 100

18. Which of the following database model has the shape like and organizational chart?

23 / 100

5. SQL is a(n)

24 / 100

In activity data is collected and recorded:

25 / 100

7. Which of the following is not related to data manipulation?

26 / 100

17. Which of the following refers to the correctness and consistency of data?

27 / 100

14. The 0.0000000001 is displayed in default column width as:

28 / 100

8. In a worksheet, a bold rectangle border indicates (n):

29 / 100

3. The process of transferring data from one location to another is called:

30 / 100

13. is valid variable name

31 / 100

15. In C, the maximum length of variable name is:

32 / 100

14. Which of the following characters cannot be used as first character of a variable name?

33 / 100

10. The symbol = represents:

34 / 100

12. Relational operators are used to

35 / 100

2. Which of the following is a valid character constant?

36 / 100

16. C is a strongly typed language, this means that:

37 / 100

. A quantity whose value may change during execution of program is called:

38 / 100

8. GUI stands for:

39 / 100

19. contains the files and folders that are deleted from the hard disk:

40 / 100

5. Ctrl + Alt + Del is

41 / 100

16. is the entering point in Windows:

42 / 100

organizes and controls the hardware and software:

43 / 100

12. function is used to read a single character from a file at a time:

44 / 100

13. function is used as formatted output file function:

45 / 100

20. is true about a stream:

46 / 100

17. In text stream characters have correspondence

47 / 100

II. A stream is associated with a file using and operaton

48 / 100

6. features of word processor allows to insert text from one file into another file:

49 / 100

8. In MS Word, the data that is being copied or moved is

50 / 100

20. A group of sentences is called: (

51 / 100

17. The bold text specifies the: (

52 / 100

13. shows the margins, position of tabs, and indents etc:

53 / 100

I. A database consists of various components called the

54 / 100

7. Microsoft Access saves the database with the extension
a) .mdb c) .madb

55 / 100

17. A place where we can see all the tables and their relationship

56 / 100

2. Which of the following object is used to retrieve data from database and present in a formatted way?

57 / 100

13. In a table each column represents

58 / 100

is a collection of related data organized in rows and columns:

59 / 100

17. A technique for physically arranging the records of a file on secondary storage device is called

60 / 100

In E-R diagram, a rectangular box is used to represent a(n):

61 / 100

11. selection structures is the simplest form of decision making structure:

62 / 100

7. Another name of conditional operator is

63 / 100

15. is not used for making two-way decision:

64 / 100

19. What will be the output of (7 > 8) ?printf(“ABC”):printf(“XYZ”);

65 / 100

16. The conditional operator is an alternative of:

66 / 100

14. views can be used to add, edit, and delete records to and from the table:

67 / 100

4. The actual data of database is stored in:

68 / 100

20. is th efault field size of Text data type in MS-Access:

69 / 100

15. The relationship between countries and their capitals is an example of relationships.

70 / 100

15. Typically, and ATM can be used to

71 / 100

19. CAT stands for

72 / 100

10. A word processor can be used to

73 / 100

20. Computer based weather forecasting depends on accurate collection of data from

74 / 100

10. How many are the layouts of Form in MS-Access?

75 / 100

8. The functions used for input and output are stored in header file:

76 / 100

19. represents URL address:

77 / 100

14. Which of service of Internet is used to transfer files:

78 / 100

12. Which one represents the top level domain?

79 / 100

7. How many types of addressing schemes?

80 / 100

II. Which of the following protocol is used to access web pages on World Wide Web?

81 / 100

4. When DARPA established a small computer network?

82 / 100

FDD1 is a:

83 / 100

4. The larger computer to which the terminal or PC is attached is called:

84 / 100

22. All nodes are connected to a single cable in a:

85 / 100

6. What layer of OSI does data compression:

86 / 100

18. is a governing body that approve the network standard:

87 / 100

10. Which network model consists of many clients and one or more central computers?

88 / 100

12. In which network model all computers have equal status?

89 / 100

17. Which one is an example of De-Facto standard?

90 / 100

2. is a loop statement:

91 / 100

9. In while loop, the increment / decrement statement are placed

92 / 100

18. is related to loop structures:

93 / 100

1. How many types of loop structur are in C?

94 / 100

20. media is used for backup:

95 / 100

2. A virus is just a:

96 / 100

9. Software that is used to detect and remove the viruses from the computer is called:

97 / 100

10. is not an anti-virus program:

98 / 100

18. Format C is an example of:

99 / 100

7. A tuple in a table is also known as

100 / 100

2. The foreign key is found in

Your score is

The average score is 70%

0%

BIG SALE! FLAT 50% OFF

Protected