Computer Sciences Practice Test 5




Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

198

Computer Practice Test 5

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

20. Loop with in a loop is called

2 / 100

16. The loop will execute at least even the condition is false

3 / 100

11. The body of I comes er the test condition in:

4 / 100

12. The while loop is also called: (a) conditional loop (b) (c) counter loop (d)
while Both (b) and (c)
wend loop Attribute

5 / 100

3. The loop which never ends is called:

6 / 100

15. The do-while loop ends with a

7 / 100

10. The relationship between the entities is represented graphically by using:

8 / 100

I I. In hybrid distribution which kind of fragments are stored at only one site

9 / 100

17. A technique for physically arranging the records of a file on secondary storage device is called

10 / 100

16. In E-R diagram, a diamond shape is used to represent a(n):

11 / 100

8. tools in involved to the Data Analysis:

12 / 100

10. structures is a selection structure:

13 / 100

11. selection structures is the simplest form of decision making structure:

14 / 100

17. The conditional operator takes expression.

15 / 100

18. The name of actual and formal parameters:

16 / 100

9. The actual values are passed to the function in:

17 / 100

1. Functions prototype for built-in functions are specified in:

18 / 100

16. A built-in function:

19 / 100

I I. The name of actual and formal parameters:

20 / 100

15. The last statement of the body of the fimction is:

21 / 100

4. The predefined functions that are part of C-language are called: (

22 / 100

is not a valid variable

23 / 100

16. C is a strongly typed language, this means that:

24 / 100

A quantity whose value cannot change during execution of

25 / 100

1. A form that contains the sub form is called

26 / 100

8. Which of the following is used to retrieve data from one or more tables of database and to present it to the user in a formatted way.

27 / 100

13. A form with multiple tabs and each tab consisting a page of information

28 / 100

12. Form with in a form is called

29 / 100

3. A virus can destroy: (

30 / 100

6. viruses infects the first sector of disk:

31 / 100

11. is an anti-virus program:

32 / 100

5. Most common crimes are committed by:

33 / 100

9. The rows of a table or relation are known as:

34 / 100

16. is known as control key:

35 / 100

8. The columns of a relation correspond to:

36 / 100

13. A table must have:

37 / 100

represents an entity

38 / 100

17. SQL is used for

39 / 100

19. serves as a bridge between end users and database administrator:

40 / 100

7 . is control suing in the statement prinf(“Result = %d”,r);:

41 / 100

0. The format specifier %u is used for:

42 / 100

4. The printf() function is used to display:

43 / 100

16. The %x is a format specifier for:

44 / 100

17. Windows explorer is used to

45 / 100

13. is based on the NT technology:

46 / 100

8. GUI stands for:

47 / 100

16. The charts, graphs and pictures are examples of:

48 / 100

13. The number of times a wave repeats during a specific time interval is called:

49 / 100

18. data type represents actions and movements:

50 / 100

I I. Communication between a computer and a keyboard involves transmission:

51 / 100

The infonnation that is to be transferred from one location to another is called:

52 / 100

6. is not component of data communication:

53 / 100

3. The process of transferring data from one location to another is called:

54 / 100

3. The idea of stored program was given by:

55 / 100

4. Which one is the brain of computer?

56 / 100

3. is the most popular and powerful DBMS:

57 / 100

12. In a table each row represents

58 / 100

17. A place where we can see all the tables and their relationship

59 / 100

2. Which of the following function is used to write a string to a file?

60 / 100

17. In text stream characters have correspondence

61 / 100

19. In text file, data is stored in:

62 / 100

3. On successfully closing a file , the fclose( ) returns:

63 / 100

16. In file handling sequence of characters refers to

64 / 100

10. The number of records (or row) in a table or relation is called:

65 / 100

5. is the object of MS-Access database file:

66 / 100

7. is not a high level language:

67 / 100

language is known as fundamental computer language:

68 / 100

9. is not a low-level language:

69 / 100

6. The programming languages that are close to human language are called:

70 / 100

8. The programming language that are very close to machine code are called:

71 / 100

17. Computer at home can be used for:

72 / 100

is not related to business:

73 / 100

16. Modern computer can perform calculations or process at high speed

74 / 100

15. Typically, and ATM can be used to

75 / 100

2. A collection of millions of computers interlink to one another is called:

76 / 100

8. specifies the correct format of IP address:

77 / 100

14. Which of service of Internet is used to transfer files:

78 / 100

12. Which one represents the top level domain?

79 / 100

22. All nodes are connected to a single cable in a:

80 / 100

6. features of word processor allows to insert text from one file into another file:

81 / 100

5. During text entering process into document. the cursor automatically shifts to the next line when it reaches to the right margin. This feature of word processor is called:

82 / 100

18. A common font size used in business documents is:

83 / 100

8. In MS Word, the data that is being copied or moved is

84 / 100

19. Font size is measure in:

85 / 100

3. A word processor includes the process of

86 / 100

is not a feature of simple word processor or text editor:

87 / 100

7. Which of the following is not related to data manipulation?

88 / 100

18. Which of the following database model has the shape like and organizational chart?

89 / 100

20. is not secondary storage device:

90 / 100

Another word for pointer:

91 / 100

Data processing is also called:

92 / 100

11. is an example of packaged software:

93 / 100

11. A functional dependency between two or more non-key attributes in a relation is called

94 / 100

3. The constraint states that in a relation no primary key value can have a null value.

95 / 100

8. problems occurs when same name is used for two different attributes:

96 / 100

1. In 3NF, which form of dependency is removed? (

97 / 100

18. If the value of a non-key attribute can be obtained simply by knowing the values of another non-key attribute, the relation is not in: (

98 / 100

6. Referential integrity is applied on

99 / 100

10. The actual working area in Microsoft Excel is

100 / 100

4. The actual working area in Microsoft Excel is:

Your score is

The average score is 70%

0%

BIG SALE! FLAT 50% OFF

Protected