Computer Sciences Practice Test 5




Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

198

Computer Practice Test 5

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

20. is responsible for designing, coordinating and monitoring the database system: (

2 / 100

16. is known as control key:

3 / 100

1. Insert command is used to insert.

4 / 100

10. What type of operating system MS-DOS is?

5 / 100

is an example of command line operating system:

6 / 100

14. The capability of an operating system to load multiple program into memory at a time and to perform two or more processes concurrently, is called:

7 / 100

5. Ctrl + Alt + Del is

8 / 100

15. involves the processing on multiple processors in a computer:

9 / 100

An Operating System is a

10 / 100

10. is an example of system software:

11 / 100

The computing and communication technologies arc combined together for

12 / 100

is secondary storage device:

13 / 100

2. is most commonly used word processing package:

14 / 100

9. The bar that displays the name of program and the name of documents is called:

15 / 100

18. A common font size used in business documents is:

16 / 100

20. A group of sentences is called: (

17 / 100

12. Which of the following can be used to launch the WordArt?

18 / 100

The infonnation that is to be transferred from one location to another is called:

19 / 100

19. coding schemes uses 4 bit code:

20 / 100

17. The music and speech represent the: (a) Image data (b) Audio data (c) Video data (d) Text data

21 / 100

I I. Communication between a computer and a keyboard involves transmission:

22 / 100

4. Viruses are transferred from one computer to another due to:

23 / 100

13. Types of software that can be freely distributed without violating copyright laws are called:

24 / 100

19. What is the most common computer crime of these listed below?

25 / 100

2. A virus is just a:

26 / 100

15. Security Protection for personal computer include:

27 / 100

6. viruses infects the first sector of disk:

28 / 100

5. Most common crimes are committed by:

29 / 100

20. The predefined functions that are part of the programming language and can be used for different purposes are called:

30 / 100

14. The actual body of the function is defined in:

31 / 100

15. The last statement of the body of the fimction is:

32 / 100

7. A function is called with the reference of its:

33 / 100

13. Which of the following operators is used as decision-making statement?

34 / 100

4. Which one is a control structure?

35 / 100

19. What will be the output of (7 > 8) ?printf(“ABC”):printf(“XYZ”);

36 / 100

17. The conditional operator takes expression.

37 / 100

3. Central computer in the network is called:

38 / 100

16. standards were developed without any formal planning:

39 / 100

13. standards were properly researched, designed and finally published as a standard:

40 / 100

Which one is dedicated server?

41 / 100

11. The escape sequence for carriage return is

42 / 100

14. format specifiers is used for integer type data:

43 / 100

0. The format specifier %u is used for:

44 / 100

8. The functions used for input and output are stored in header file:

45 / 100

2. The escape sequence for backslash is:

46 / 100

20. The process of arranging data in a proper order is called:

47 / 100

5. SQL is a(n)

48 / 100

15. A set of related records that represent a unit of data is called

49 / 100

is a collection of related data organized in rows and columns:

50 / 100

17. A place where we can see all the tables and their relationship

51 / 100

13. In a table each column represents

52 / 100

15. A step by step procedure to perform a task easily available in a software is called

53 / 100

7. Microsoft Access saves the database with the extension
a) .mdb c) .madb

54 / 100

10. The relationship between the entities is represented graphically by using:

55 / 100

is the ingredient of data modeling:

56 / 100

6. Database development process involve mapping of conceptual data model into

57 / 100

15. In C, the maximum length of variable name is:

58 / 100

20. elements of program in not token:

59 / 100

A quantity whose value cannot change during execution of

60 / 100

18. a b is equivalent to

61 / 100

9. Computer at home can be used

62 / 100

scanners is used in hospitals:

63 / 100

15. Typically, and ATM can be used to

64 / 100

20. If the custom format is If it, it N N then the number 23349 will be displayed as:

65 / 100

14. The 0.0000000001 is displayed in default column width as:

66 / 100

4. The actual working area in Microsoft Excel is:

67 / 100

9. In while loop, the increment / decrement statement are placed

68 / 100

4. loop structures are available in C language:

69 / 100

15. The do-while loop ends with a

70 / 100

17. The of for loop executed only once in the first iteration

71 / 100

8. In while loop, the loop control variable always initialized

72 / 100

12. The while loop is also called: (a) conditional loop (b) (c) counter loop (d)
while Both (b) and (c)
wend loop Attribute

73 / 100

7. is not a high level language:

74 / 100

10. The computer understands the instructions only in:

75 / 100

14. C was designed to write programs for

76 / 100

20. languages is different for different computers:

77 / 100

19. is the default data e in MS-Access:

78 / 100

16. menus in MS-Access contains commands that can be used to switch between table views?

79 / 100

13. The structure of table is designed in:

80 / 100

11. How may table view are available in MS-Access?

81 / 100

5. is the object of MS-Access database file:

82 / 100

10. The number of records (or row) in a table or relation is called:

83 / 100

10. If “Yahoo.com” is a domain name, then what will be the top level domain?

84 / 100

17. The process of launching web pages is called:

85 / 100

3. The globe has become a global village, due to:

86 / 100

17. The cells of memory are logically organized into group of

87 / 100

9. The program that contains instructions to operate a device is called:

88 / 100

5. Which component of a computer decodes and executes program consuvetions?

89 / 100

2. A set of instructions that run the computer arc:

90 / 100

8. A computer drives its basic strength from:

91 / 100

14. If programs get input data from data file and also send output into data file. It is called:

92 / 100

9. A collection of related records is called

93 / 100

8. Which of the following is used to retrieve data from one or more tables of database and to present it to the user in a formatted way.

94 / 100

4. A form is an object of

95 / 100

19. If there are small fmite number of values for a certain field on a form which object will be suitable

96 / 100

14. The different design elements placed on form are called

97 / 100

1. In 3NF, which form of dependency is removed? (

98 / 100

9. problems occurs when same information is stored in two different ways:

99 / 100

12. Data integrity is another form of data

100 / 100

5. Different attributes in two different tables having same name are referred to as (

Your score is

The average score is 70%

0%

BIG SALE! FLAT 50% OFF

Protected