Computer Sciences Practice Test 5




Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

198

Computer Practice Test 5

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

15. A step by step procedure to perform a task easily available in a software is called

2 / 100

4. MS-Access is a:

3 / 100

13. In a table each column represents

4 / 100

19. What is the most common computer crime of these listed below?

5 / 100

15. Security Protection for personal computer include:

6 / 100

11. is an anti-virus program:

7 / 100

7. virus is activated on the basis of a logical condition:

8 / 100

18. Format C is an example of:

9 / 100

13. Types of software that can be freely distributed without violating copyright laws are called:

10 / 100

The computing and communication technologies arc combined together for

11 / 100

The name for the screen clarity:

12 / 100

is category software:

13 / 100

3. A word processor includes the process of

14 / 100

10. The bar that contains the group of commands is called:

15 / 100

14. The insertion point in the document is also called:

16 / 100

7. features of word processor allows to specify margins of the documents:

17 / 100

. Which of the following is a word processor (

18 / 100

3. The loop which never ends is called:

19 / 100

1. How many types of loop structur are in C?

20 / 100

11. The body of I comes er the test condition in:

21 / 100

10. The column of relation is known as

22 / 100

20. is responsible for designing, coordinating and monitoring the database system: (

23 / 100

I. CBT stand for

24 / 100

scanners is used in hospitals:

25 / 100

17. Computer at home can be used for:

26 / 100

4. In activities, the possible inputs for the database are collected:

27 / 100

10. The relationship between the entities is represented graphically by using:

28 / 100

I. Which of the following keys does not hold uniqueness property

29 / 100

9. As in design view, you can move from field to field in the table window in datasheet view using button.

30 / 100

19. is the default data e in MS-Access:

31 / 100

20. is th efault field size of Text data type in MS-Access:

32 / 100

The data in table is entered in

33 / 100

4. The actual data of database is stored in:

34 / 100

3. The fundamental concept of relational database is:

35 / 100

7. Another name of conditional operator is

36 / 100

18. Which operator in C language is called ternary operator?

37 / 100

17. The conditional operator takes expression.

38 / 100

15. is not used for making two-way decision:

39 / 100

11. selection structures is the simplest form of decision making structure:

40 / 100

6. The selection statement is also known as:

41 / 100

3. Which of the following is true about a function call?

42 / 100

15. The last statement of the body of the fimction is:

43 / 100

9. The actual values are passed to the function in:

44 / 100

6. Mother name for built-in function is:

45 / 100

18. The name of actual and formal parameters:

46 / 100

8. A function:

47 / 100

13. The printf() is a:

48 / 100

3. Which of the following type of file require largest processing time?

49 / 100

8. represents an object:

50 / 100

18. Which of the following database model has the shape like and organizational chart?

51 / 100

18. The default number format assigned to a cell is the:

52 / 100

10. The actual working area in Microsoft Excel is

53 / 100

12. cell addresses is correct:

54 / 100

II. A cell of worksheet, which is not active is called:

55 / 100

19. If the custom format is 00000 then the number 420 will be displayed as:

56 / 100

5. Different attributes in two different tables having same name are referred to as (

57 / 100

7. problems occurs when two different names are used for the same information?

58 / 100

4. In 3NF, a non-key attribute must not depend on a(n)

59 / 100

19. A process in which it is being ensured that attributes are stored from where they belong

60 / 100

8. problems occurs when same name is used for two different attributes:

61 / 100

15. In which of the following normal forms, any repeating group from the table is removed?

62 / 100

4. An array subscript should be a) int c) double

63 / 100

18. In binary stream bytes have correspondence

64 / 100

7.function is used to write a string to a file:

65 / 100

12. function is used to read a single character from a file at a time:

66 / 100

14. If programs get input data from data file and also send output into data file. It is called:

67 / 100

. A quantity whose value may change during execution of program is called:

68 / 100

3. Which of the data type offers the highest precision?

69 / 100

The address of instruction under

70 / 100

RAM is a:

71 / 100

6. The programming languages that are close to human language are called:

72 / 100

8. The programming language that are very close to machine code are called:

73 / 100

14. C was designed to write programs for

74 / 100

13. A form with multiple tabs and each tab consisting a page of information

75 / 100

4. A form is an object of

76 / 100

19. If there are small fmite number of values for a certain field on a form which object will be suitable

77 / 100

11. Which form layout displays multiple records at a time?

78 / 100

20. In addition to navigate records can be used for

79 / 100

10. How many are the layouts of Form in MS-Access?

80 / 100

5. Forms are designed for:

81 / 100

8. Which of the following is used to retrieve data from one or more tables of database and to present it to the user in a formatted way.

82 / 100

14. The capability of an operating system to load multiple program into memory at a time and to perform two or more processes concurrently, is called:

83 / 100

12. The maximum number of primary partitions that can be created on a disk is

84 / 100

14. format specifiers is used for integer type data:

85 / 100

7 . is control suing in the statement prinf(“Result = %d”,r);:

86 / 100

1. The function getch() is defined in:

87 / 100

12. Which of the following forma specifier is used for character type data

88 / 100

13. services is provided by Internet:

89 / 100

8. specifies the correct format of IP address:

90 / 100

10. If “Yahoo.com” is a domain name, then what will be the top level domain?

91 / 100

19. represents URL address:

92 / 100

A computer can be linked to the Internet through

93 / 100

Who owns the Internet?

94 / 100

16. The computers on the Internet that contain the web sites are called:

95 / 100

19. coding schemes uses 4 bit code:

96 / 100

10. BIT stands for

97 / 100

18. is a governing body that approve the network standard:

98 / 100

10. Which network model consists of many clients and one or more central computers?

99 / 100

7. Cabling on a linear bus topology can be extended using which of following:

100 / 100

4. The larger computer to which the terminal or PC is attached is called:

Your score is

The average score is 70%

0%

BIG SALE! FLAT 50% OFF

Protected