Computer Sciences Practice Test 5




Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

198

Computer Practice Test 5

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

14. Another name for antivirus is:

2 / 100

6. viruses infects the first sector of disk:

3 / 100

13. The symbols used to write instructions in assembly language are called:

4 / 100

6. The programming languages that are close to human language are called:

5 / 100

language is known as fundamental computer language:

6 / 100

C is a:

7 / 100

14. format specifiers is used for integer type data:

8 / 100

17. A Form within another form is called:

9 / 100

20. In addition to navigate records can be used for

10 / 100

7. A auto form displays one record at a time.

11 / 100

6. The forms are the end of our database in Microsoft Access

12 / 100

15. Which is not an example of a control element placed on the form

13 / 100

9. Tables are the 1 of our database in Microsoft Access

14 / 100

8. specifies the correct format of IP address:

15 / 100

20. protocol is used by news services:

16 / 100

12. Which one represents the top level domain?

17 / 100

2. A collection of millions of computers interlink to one another is called:

18 / 100

4. An array subscript should be a) int c) double

19 / 100

Which of the following mode open only an existing file for both reading and writing?

20 / 100

II. A stream is associated with a file using and operaton

21 / 100

is not related to business:

22 / 100

I. CBT stand for

23 / 100

is not related to document management system:

24 / 100

The fly-by-wire system is used in:

25 / 100

is not relevant to office automation:

26 / 100

10. Which network model consists of many clients and one or more central computers?

27 / 100

17. Which one is an example of De-Facto standard?

28 / 100

2. A collection of computers connected together is called:

29 / 100

21. One or more computers connected to a hub is a:

30 / 100

I. A LAN is a combination of:

31 / 100

3. Anything in the real world that has a set of different attributes or properties is called:

32 / 100

9. The rows of a table or relation are known as:

33 / 100

18. Which of the following is responsible for designing the database system.

34 / 100

20. is responsible for designing, coordinating and monitoring the database system: (

35 / 100

A table is also known as: (

36 / 100

1. Which of the following is a spreadsheet 2.

37 / 100

15. menus contains the ‘Cells’ command:

38 / 100

3. The intersection of a row and column form a:

39 / 100

7. In ERD model, the relationship between two entities is represented by a

40 / 100

6. Database development process involve mapping of conceptual data model into

41 / 100

9. The process to identify the data objects and the relationships between them is:

42 / 100

is the ingredient of data modeling:

43 / 100

10. The relationship between the entities is represented graphically by using:

44 / 100

17. The conditional operator takes expression.

45 / 100

3. How many basic control structures are there?

46 / 100

16. The conditional operator is an alternative of:

47 / 100

19. What will be the output of (7 > 8) ?printf(“ABC”):printf(“XYZ”);

48 / 100

6. The component of computer that stores data and program while these are being executed is called:

49 / 100

5. Which component of a computer decodes and executes program consuvetions?

50 / 100

8. A computer drives its basic strength from:

51 / 100

1. Data and programs that are not being use by computer are stored in:

52 / 100

8. Which of the following buttons of Find and Replace dialog box is clicked to start he search process?

53 / 100

10. The number of records (or row) in a table or relation is called:

54 / 100

4. The actual data of database is stored in:

55 / 100

17. The maximum length of text type field is:

56 / 100

9. As in design view, you can move from field to field in the table window in datasheet view using button.

57 / 100

18. If the value of a non-key attribute can be obtained simply by knowing the values of another non-key attribute, the relation is not in: (

58 / 100

14. A foreign key constraint is also called

59 / 100

11. A functional dependency between two or more non-key attributes in a relation is called

60 / 100

6. Referential integrity is applied on

61 / 100

17. If a relation is in INF and the key consists of a single attributes then the relation is called.

62 / 100

16. A relation is in second normal form if and only if:

63 / 100

2. How many types of data integrity are there?

64 / 100

5. represents of wizard of DBMS:

65 / 100

14. A query is a more flexible way of

66 / 100

17. A place where we can see all the tables and their relationship

67 / 100

7. Microsoft Access saves the database with the extension
a) .mdb c) .madb

68 / 100

I. A database consists of various components called the

69 / 100

2. Which of the following is a valid character constant?

70 / 100

20. elements of program in not token:

71 / 100

4. When the result of the computation of two very small numbers is too small to be represented, this phenomenon is called:

72 / 100

15. In C, the maximum length of variable name is:

73 / 100

10. What type of operating system MS-DOS is?

74 / 100

is an example of command line operating system:

75 / 100

18. acts as file manager for Windows: (

76 / 100

An Operating System is a

77 / 100

20. The process of arranging data in a proper order is called:

78 / 100

Q2. Select the correct option I. Which of the following represents a collection of concepts that arc used to describe the structure of a database?

79 / 100

4. Which of the following may be a temporary file?

80 / 100

Collection of raw facts and figures is called:

81 / 100

is category software:

82 / 100

An electronic device that accepts, processes data and products information is called: (a) Input device (b) Computer (c) Output devices (d) Operating system

83 / 100

11. is an example of packaged software:

84 / 100

is secondary storage device:

85 / 100

The name for the screen clarity:

86 / 100

20. coding schemes is used by IBM:

87 / 100

5. is component of data communication:

88 / 100

15. Which type of data consists of words, sentences, and paragraphs?

89 / 100

9. The electromagnetic or light waves representing data are called:

90 / 100

10. BIT stands for

91 / 100

8. In MS Word, the data that is being copied or moved is

92 / 100

14. The insertion point in the document is also called:

93 / 100

17. In a C program two functions can have:

94 / 100

5. The functions that are defined by programmer are called:

95 / 100

9. The actual values are passed to the function in:

96 / 100

12. Formal arguments are also called

97 / 100

11. The body of I comes er the test condition in:

98 / 100

10. structure executes the body of loop at least once:

99 / 100

7. A variable whose value controls the number of iterations is known as

100 / 100

6. Which one is not a loop structure

Your score is

The average score is 70%

0%

BIG SALE! FLAT 50% OFF

Protected