Computer Sciences Practice Test 5




Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

198

Computer Practice Test 5

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

9. is used for flag:

2 / 100

8. The functions used for input and output are stored in header file:

3 / 100

5. is not used in control or format string in a prindo function:

4 / 100

18. is used with format specifier to display output left-justified:

5 / 100

FDD1 is a:

6 / 100

14. The media Access Control Sub-layer resides in which layer:

7 / 100

4. The larger computer to which the terminal or PC is attached is called:

8 / 100

12. In a school the record of cricket and hockey team organized into two groups is referred as

9 / 100

Q2. Select the correct option I. Which of the following represents a collection of concepts that arc used to describe the structure of a database?

10 / 100

10. A series of actions that are performed on raw data achieve the required objective and results are called:

11 / 100

9. The manipulated and processed data is called:

12 / 100

2. is a loop statement:

13 / 100

8. In while loop, the loop control variable always initialized

14 / 100

12. The while loop is also called: (a) conditional loop (b) (c) counter loop (d)
while Both (b) and (c)
wend loop Attribute

15 / 100

5. is called counter loop:

16 / 100

16. The loop will execute at least even the condition is false

17 / 100

16. The conditional operator is an alternative of:

18 / 100

18. A common font size used in business documents is:

19 / 100

17. The bold text specifies the: (

20 / 100

10. The bar that contains the group of commands is called:

21 / 100

3. The idea of stored program was given by:

22 / 100

17. The cells of memory are logically organized into group of

23 / 100

2. A set of instructions that run the computer arc:

24 / 100

is used to identify records of a relation uniquely:

25 / 100

16. is known as control key:

26 / 100

4. A set of instruction given to the computer is called:

27 / 100

19. The instructions written in machine language are in the form of:

28 / 100

7. A auto form displays one record at a time.

29 / 100

16. Each of the following is a form layout except.

30 / 100

3. objects is not used to enter data into database:

31 / 100

14. The different design elements placed on form are called

32 / 100

9. Tables are the 1 of our database in Microsoft Access

33 / 100

10. How many are the layouts of Form in MS-Access?

34 / 100

is an example of command line operating system:

35 / 100

16. is the entering point in Windows:

36 / 100

An Operating System is a

37 / 100

17. Windows explorer is used to

38 / 100

6. viruses infects the first sector of disk:

39 / 100

8. Format C is an example of virus:

40 / 100

16. A secret word or number to be typed by a keyboard before an activity can take place are called:

41 / 100

20. media is used for backup:

42 / 100

12. is cause of virus:

43 / 100

1. A virus program usually hidden in:

44 / 100

5. is component of data communication:

45 / 100

10. BIT stands for

46 / 100

18. data type represents actions and movements:

47 / 100

17. The music and speech represent the: (a) Image data (b) Audio data (c) Video data (d) Text data

48 / 100

Microwave transmission, coaxial cables and fiber optic are examples of:

49 / 100

19. coding schemes uses 4 bit code:

50 / 100

9. The electromagnetic or light waves representing data are called:

51 / 100

2. Data communication requires only a:

52 / 100

17. In a C program two functions can have:

53 / 100

20. The predefined functions that are part of the programming language and can be used for different purposes are called:

54 / 100

7. A function is called with the reference of its:

55 / 100

19. In C-language, subprograms are referred to as:

56 / 100

20. If the custom format is If it, it N N then the number 23349 will be displayed as:

57 / 100

II. A cell of worksheet, which is not active is called:

58 / 100

1. Which of the following is a spreadsheet 2.

59 / 100

12. cell addresses is correct:

60 / 100

10. The actual working area in Microsoft Excel is

61 / 100

15. menus contains the ‘Cells’ command:

62 / 100

4. The actual working area in Microsoft Excel is:

63 / 100

17. The maximum length of text type field is:

64 / 100

14. views can be used to add, edit, and delete records to and from the table:

65 / 100

11. How may table view are available in MS-Access?

66 / 100

3. The fundamental concept of relational database is:

67 / 100

5. is the object of MS-Access database file:

68 / 100

8. specifies the correct format of IP address:

69 / 100

2. A collection of millions of computers interlink to one another is called:

70 / 100

Who owns the Internet?

71 / 100

15. FTP stands for:

72 / 100

A computer can be linked to the Internet through

73 / 100

15. In E-R diagram, an oval shape is used to represent a(n):

74 / 100

7. In ERD model, the relationship between two entities is represented by a

75 / 100

9. The process to identify the data objects and the relationships between them is:

76 / 100

8. tools in involved to the Data Analysis:

77 / 100

17. The logical not (!) operator is denoted as:

78 / 100

3. Which of the data type offers the highest precision?

79 / 100

8. A record is a complete set of

80 / 100

The actual data of Is stored in:

81 / 100

17. A place where we can see all the tables and their relationship

82 / 100

14. A query is a more flexible way of

83 / 100

2. How many types of data integrity are there?

84 / 100

14. A foreign key constraint is also called

85 / 100

12. Data integrity is another form of data

86 / 100

devices is used in departmental store:

87 / 100

I. CBT stand for

88 / 100

13. The benefit of CAD may be summed up as:

89 / 100

15. Typically, and ATM can be used to

90 / 100

is not related to business:

91 / 100

is not related to document management system:

92 / 100

19. CAT stands for

93 / 100

20. Computer based weather forecasting depends on accurate collection of data from

94 / 100

Collection of raw facts and figures is called:

95 / 100

18. The data and program are stored permanently on the:

96 / 100

11. is an example of packaged software:

97 / 100

13. is not an application software:

98 / 100

15. An inkjet printer is an example of a(n):

99 / 100

13. function is used as formatted output file function:

100 / 100

15. There are types of streams

Your score is

The average score is 70%

0%

BIG SALE! FLAT 50% OFF

Protected