Computer Sciences Practice Test 5




Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

198

Computer Practice Test 5

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

17. A technique for physically arranging the records of a file on secondary storage device is called

2 / 100

18. An index may be created on

3 / 100

20. is not related to an entity:

4 / 100

4. In activities, the possible inputs for the database are collected:

5 / 100

In E-R diagram, a rectangular box is used to represent a(n):

6 / 100

7. Microsoft Access saves the database with the extension
a) .mdb c) .madb

7 / 100

4. MS-Access is a:

8 / 100

I. A database consists of various components called the

9 / 100

16. Using you can create tables, forms, reports and queries in very short time

10 / 100

6. is element MS-Access application window:

11 / 100

2. Which of the following object is used to retrieve data from database and present in a formatted way?

12 / 100

18. is the fundamental property of relational database:

13 / 100

16. The conditional operator is an alternative of:

14 / 100

3. How many basic control structures are there?

15 / 100

5. control structures executes program statements one after another:

16 / 100

11. selection structures is the simplest form of decision making structure:

17 / 100

15. is not used for making two-way decision:

18 / 100

14. A foreign key constraint is also called

19 / 100

5. Different attributes in two different tables having same name are referred to as (

20 / 100

9. problems occurs when same information is stored in two different ways:

21 / 100

2. How many types of data integrity are there?

22 / 100

18. If the value of a non-key attribute can be obtained simply by knowing the values of another non-key attribute, the relation is not in: (

23 / 100

17. If a relation is in INF and the key consists of a single attributes then the relation is called.

24 / 100

13. A table must have:

25 / 100

16. is known as control key:

26 / 100

is used to identify records of a relation uniquely:

27 / 100

20. is responsible for designing, coordinating and monitoring the database system: (

28 / 100

A table is also known as: (

29 / 100

19. Font size is measure in:

30 / 100

20. A group of sentences is called: (

31 / 100

2. A set of instructions that run the computer arc:

32 / 100

16. CPU includes all of the following components except?

33 / 100

3. The idea of stored program was given by:

34 / 100

10. Which component of CPU is responsible for performing arithmetic and logical operations on numeric data?

35 / 100

20. Computer based weather forecasting depends on accurate collection of data from

36 / 100

is not related to document management system:

37 / 100

3. device is used in banks to read cheque of customer:

38 / 100

The fly-by-wire system is used in:

39 / 100

6. The benefit of CAD may be summed up as

40 / 100

I. CBT stand for

41 / 100

15. Typically, and ATM can be used to

42 / 100

15. There are types of streams

43 / 100

18. is not an example of data type in MS-Access:

44 / 100

16. menus in MS-Access contains commands that can be used to switch between table views?

45 / 100

2. The rule that a record from a table cannot be deleted if its associated record exists in a related table is called rule

46 / 100

7. The number of fields in a relation or table is called:

47 / 100

22. All nodes are connected to a single cable in a:

48 / 100

12. In which network model all computers have equal status?

49 / 100

3. Central computer in the network is called:

50 / 100

14. The media Access Control Sub-layer resides in which layer:

51 / 100

10. BIT stands for

52 / 100

13. The number of times a wave repeats during a specific time interval is called:

53 / 100

16. The charts, graphs and pictures are examples of:

54 / 100

10. A series of actions that are performed on raw data achieve the required objective and results are called:

55 / 100

16. A set of related files that represent a unit of data is called

56 / 100

18. Which of the following database model has the shape like and organizational chart?

57 / 100

7. Which of the following is not related to data manipulation?

58 / 100

16. The %x is a format specifier for:

59 / 100

11. The escape sequence for carriage return is

60 / 100

18. is used with format specifier to display output left-justified:

61 / 100

6. How many variables can be used in one printf() function?

62 / 100

17. How many digits are printed to the right of the decimal point in real number?

63 / 100

0. The format specifier %u is used for:

64 / 100

13. What will be the output of printf(“%d”,’a’);

65 / 100

16. A secret word or number to be typed by a keyboard before an activity can take place are called:

66 / 100

17. Which is not an antivirus program?

67 / 100

14. Another name for antivirus is:

68 / 100

20. elements of program in not token:

69 / 100

19. The words used to write the statements of a program are called

70 / 100

4. loop structures are available in C language:

71 / 100

1. How many types of loop structur are in C?

72 / 100

6. Which one is not a loop structure

73 / 100

12. The while loop is also called: (a) conditional loop (b) (c) counter loop (d)
while Both (b) and (c)
wend loop Attribute

74 / 100

17. Each number format consists of part:

75 / 100

14. The 0.0000000001 is displayed in default column width as:

76 / 100

II. A cell of worksheet, which is not active is called:

77 / 100

7. is not a high level language:

78 / 100

17. .exe file is produced by the:

79 / 100

C is a:

80 / 100

5. The computer program is written in:

81 / 100

10. The computer understands the instructions only in:

82 / 100

18. The name of actual and formal parameters:

83 / 100

20. The predefined functions that are part of the programming language and can be used for different purposes are called:

84 / 100

14. The actual body of the function is defined in:

85 / 100

15. The last statement of the body of the fimction is:

86 / 100

5. The functions that are defined by programmer are called:

87 / 100

Collection of raw facts and figures is called:

88 / 100

is secondary storage device:

89 / 100

The processed data is called:

90 / 100

Data processing is also called:

91 / 100

18. The data and program are stored permanently on the:

92 / 100

13. is not an application software:

93 / 100

9. Software to use the Internet:

94 / 100

6. is a high speed communication line:

95 / 100

15. FTP stands for:

96 / 100

10. What type of operating system MS-DOS is?

97 / 100

15. involves the processing on multiple processors in a computer:

98 / 100

17. Windows explorer is used to

99 / 100

12. The maximum number of primary partitions that can be created on a disk is

100 / 100

16. is the entering point in Windows:

Your score is

The average score is 70%

0%

BIG SALE! FLAT 50% OFF

Protected