Computer Sciences Practice Test 5




Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

198

Computer Practice Test 5

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

13. Types of software that can be freely distributed without violating copyright laws are called:

2 / 100

9. Software that is used to detect and remove the viruses from the computer is called:

3 / 100

8. Format C is an example of virus:

4 / 100

14. format specifiers is used for integer type data:

5 / 100

11. The escape sequence for carriage return is

6 / 100

8. The functions used for input and output are stored in header file:

7 / 100

is not a valid variable

8 / 100

13. is valid variable name

9 / 100

How many keywords are in C?

10 / 100

I I. The name of actual and formal parameters:

11 / 100

5. The functions that are defined by programmer are called:

12 / 100

13. A form with multiple tabs and each tab consisting a page of information

13 / 100

7. A auto form displays one record at a time.

14 / 100

1. A form that contains the sub form is called

15 / 100

17. A Form within another form is called:

16 / 100

2. How many types of data integrity are there?

17 / 100

10. The process of converting complex data structure into simple and stable data structure is called: a –

18 / 100

4. In 3NF, a non-key attribute must not depend on a(n)

19 / 100

14. A foreign key constraint is also called

20 / 100

6. Referential integrity is applied on

21 / 100

16. A relation is in second normal form if and only if:

22 / 100

5. The process of sharing information among various members of workgroup through computer network is called:

23 / 100

6. What layer of OSI does data compression:

24 / 100

19. Which one represents the shape of network?

25 / 100

21. One or more computers connected to a hub is a:

26 / 100

18. An index may be created on

27 / 100

6. Database development process involve mapping of conceptual data model into

28 / 100

17. A technique for physically arranging the records of a file on secondary storage device is called

29 / 100

9. The process to identify the data objects and the relationships between them is:

30 / 100

5. In activities, the cost factors are taken into consideration:

31 / 100

In E-R diagram, a rectangular box is used to represent a(n):

32 / 100

I I. In hybrid distribution which kind of fragments are stored at only one site

33 / 100

15. In E-R diagram, an oval shape is used to represent a(n):

34 / 100

14. A key that consists of two or more than two attributes of a table is called

35 / 100

19. serves as a bridge between end users and database administrator:

36 / 100

17. SQL is used for

37 / 100

13. A table must have:

38 / 100

8. To store data for future use it must be stored on

39 / 100

17. In text stream characters have correspondence

40 / 100

7.function is used to write a string to a file:

41 / 100

1. A file is stored in

42 / 100

19. represents URL address:

43 / 100

7. Which of the following is not related to data manipulation?

44 / 100

3. Which of the following type of file require largest processing time?

45 / 100

18. Which of the following database model has the shape like and organizational chart?

46 / 100

20. The process of arranging data in a proper order is called:

47 / 100

3. is the most popular and powerful DBMS:

48 / 100

to automate repeated tasks — are used

49 / 100

19. is a statement that extracts specific information database.

50 / 100

13. In a table each column represents

51 / 100

12. In a table each row represents

52 / 100

12. Light, sound, and radio waves are examples of:

53 / 100

18. data type represents actions and movements:

54 / 100

14. The height of wave within a given period of time is called:

55 / 100

19. coding schemes uses 4 bit code:

56 / 100

16. The charts, graphs and pictures are examples of:

57 / 100

17. The music and speech represent the: (a) Image data (b) Audio data (c) Video data (d) Text data

58 / 100

15. An inkjet printer is an example of a(n):

59 / 100

The processed data is called:

60 / 100

An electronic device that accepts, processes data and products information is called: (a) Input device (b) Computer (c) Output devices (d) Operating system

61 / 100

Another word for pointer:

62 / 100

CPU stands for:

63 / 100

11. is an example of packaged software:

64 / 100

15. Typically, and ATM can be used to

65 / 100

is not relevant to office automation:

66 / 100

scanners is used in hospitals:

67 / 100

3. device is used in banks to read cheque of customer:

68 / 100

is not related to document management system:

69 / 100

15. is not used for making two-way decision:

70 / 100

1. Which of the following is not a decision making statement

71 / 100

5. control structures executes program statements one after another:

72 / 100

13. Which of the following operators is used as decision-making statement?

73 / 100

. Which of the following is a word processor (

74 / 100

5. During text entering process into document. the cursor automatically shifts to the next line when it reaches to the right margin. This feature of word processor is called:

75 / 100

organizes and controls the hardware and software:

76 / 100

12. The maximum number of primary partitions that can be created on a disk is

77 / 100

14. The capability of an operating system to load multiple program into memory at a time and to perform two or more processes concurrently, is called:

78 / 100

20. By default, Windows save the documents created in MS-Word in the folder:

79 / 100

3. Debug is the process of:

80 / 100

C is a:

81 / 100

5. The computer program is written in:

82 / 100

2. A set of instructions that run the computer arc:

83 / 100

15. is the component of CPU:

84 / 100

3. The idea of stored program was given by:

85 / 100

RAM is a:

86 / 100

17. The of for loop executed only once in the first iteration

87 / 100

8. In while loop, the loop control variable always initialized

88 / 100

13. The body of loop comes before the test condition in:

89 / 100

12. The while loop is also called: (a) conditional loop (b) (c) counter loop (d)
while Both (b) and (c)
wend loop Attribute

90 / 100

9. In while loop, the increment / decrement statement are placed

91 / 100

13. The structure of table is designed in:

92 / 100

10. The number of records (or row) in a table or relation is called:

93 / 100

12. The data in table is entered in:

94 / 100

3. The intersection of a row and column form a:

95 / 100

8. In a worksheet, a bold rectangle border indicates (n):

96 / 100

1. Which of the following is a spreadsheet 2.

97 / 100

16. Which of the following is an absolute address?

98 / 100

9. is not a feature of spreadsheet program:

99 / 100

5. A cell at third column and 15 rows has a cell address:

100 / 100

18. The default number format assigned to a cell is the:

Your score is

The average score is 70%

0%

BIG SALE! FLAT 50% OFF

Protected