Computer Sciences Practice Test 5





Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

165

Computer Practice Test 5

1 / 100

18. A Word processor can be used to:

2 / 100

10. A word processor can be used to

3 / 100

is not related to business:

4 / 100

1. Which of the following is not a decision making statement

5 / 100

13. Which of the following operators is used as decision-making statement?

6 / 100

2. Which of the following operator is used as decision making statement

7 / 100

16. The conditional operator is an alternative of:

8 / 100

5. control structures executes program statements one after another:

9 / 100

14. The capability of an operating system to load multiple program into memory at a time and to perform two or more processes concurrently, is called:

10 / 100

17. Windows explorer is used to

11 / 100

12. The maximum number of primary partitions that can be created on a disk is

12 / 100

11. As compared to command line operating system, a GUI operating system is:

13 / 100

0. The format specifier %u is used for:

14 / 100

17. How many digits are printed to the right of the decimal point in real number?

15 / 100

19. The escape sequence to insert horizontal tab is

16 / 100

13. In a table each column represents

17 / 100

4. MS-Access is a:

18 / 100

is a collection of related data organized in rows and columns:

19 / 100

7. Microsoft Access saves the database with the extension
a) .mdb c) .madb

20 / 100

18. is the fundamental property of relational database:

21 / 100

19. is a statement that extracts specific information database.

22 / 100

14. A query is a more flexible way of

23 / 100

8. Format C is an example of virus:

24 / 100

5. Most common crimes are committed by:

25 / 100

16. A secret word or number to be typed by a keyboard before an activity can take place are called:

26 / 100

15. Security Protection for personal computer include:

27 / 100

13. Types of software that can be freely distributed without violating copyright laws are called:

28 / 100

13. represents a label:

29 / 100

7. The currently selected cell where data can be entered or edited is called:

30 / 100

II. A cell of worksheet, which is not active is called:

31 / 100

3. The intersection of a row and column form a:

32 / 100

5. A cell at third column and 15 rows has a cell address:

33 / 100

14. The 0.0000000001 is displayed in default column width as:

34 / 100

20. is not related to an entity:

35 / 100

16. A relation is in second normal form if and only if:

36 / 100

6. Referential integrity is applied on

37 / 100

2. Which of the following function is used to write a string to a file?

38 / 100

16. In file handling sequence of characters refers to

39 / 100

Which of the following mode open only an existing file for both reading and writing?

40 / 100

16. A built-in function:

41 / 100

14. The actual body of the function is defined in:

42 / 100

3. Which of the following is true about a function call?

43 / 100

17. A Form within another form is called:

44 / 100

7. A auto form displays one record at a time.

45 / 100

14. The different design elements placed on form are called

46 / 100

6. What layer of OSI does data compression:

47 / 100

17. Which one is an example of De-Facto standard?

48 / 100

Which one is dedicated server?

49 / 100

20. Loop with in a loop is called

50 / 100

17. The maximum length of text type field is:

51 / 100

9. As in design view, you can move from field to field in the table window in datasheet view using button.

52 / 100

The data in table is entered in

53 / 100

15. The relationship between countries and their capitals is an example of relationships.

54 / 100

15. An attribute is also known as:

55 / 100

9. The rows of a table or relation are known as:

56 / 100

A table is also known as: (

57 / 100

11. is used to create data view

58 / 100

is secondary storage device:

59 / 100

11. is an example of packaged software:

60 / 100

For the input of image data:

61 / 100

20. is not secondary storage device:

62 / 100

is category software:

63 / 100

4. Which of the following may be a temporary file?

64 / 100

17. Which of the following refers to the correctness and consistency of data?

65 / 100

5. SQL is a(n)

66 / 100

15. A set of related records that represent a unit of data is called

67 / 100

12. In a school the record of cricket and hockey team organized into two groups is referred as

68 / 100

9. The manipulated and processed data is called:

69 / 100

4. Which one is the brain of computer?

70 / 100

12. Which is a storage device?

71 / 100

14. Which component of computer is responsible for comparison of two numbers?

72 / 100

1. Data and programs that are not being use by computer are stored in:

73 / 100

3. Debug is the process of:

74 / 100

2. Turbo C-H- can compile

75 / 100

4. A set of instruction given to the computer is called:

76 / 100

8. The programming language that are very close to machine code are called:

77 / 100

10. The computer understands the instructions only in:

78 / 100

5. The computer program is written in:

79 / 100

Microwave transmission, coaxial cables and fiber optic are examples of:

80 / 100

9. The electromagnetic or light waves representing data are called:

81 / 100

15. Which type of data consists of words, sentences, and paragraphs?

82 / 100

6. is not component of data communication:

83 / 100

13. The number of times a wave repeats during a specific time interval is called:

84 / 100

16. The charts, graphs and pictures are examples of:

85 / 100

15. How many typing modes are provided by word processor?

86 / 100

7. features of word processor allows to specify margins of the documents:

87 / 100

2. is most commonly used word processing package:

88 / 100

6. features of word processor allows to insert text from one file into another file:

89 / 100

12. Which one represents the top level domain?

90 / 100

17. The process of launching web pages is called:

91 / 100

Who owns the Internet?

92 / 100

9. Software to use the Internet:

93 / 100

15. FTP stands for:

94 / 100

4. When DARPA established a small computer network?

95 / 100

1. Variables are created in

96 / 100

4. When the result of the computation of two very small numbers is too small to be represented, this phenomenon is called:

97 / 100

is not a valid variable

98 / 100

13. is valid variable name

99 / 100

20. elements of program in not token:

100 / 100

2. Which of the following is a valid character constant?

Your score is

The average score is 70%

0%

,

Protected

Open chat
Salam
Can we help you?