Computer Sciences Practice Test 1

Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations




PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

929

Computer Practice Test 1

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

The computing and communication technologies arc combined together for

2 / 100

Data processing is also called:

3 / 100

The name for the screen clarity:

4 / 100

9. Computer at home can be used

5 / 100

The fly-by-wire system is used in:

6 / 100

13. The benefit of CAD may be summed up as:

7 / 100

8. Which of the following keywords is not used in switch statement?

8 / 100

17. The conditional operator takes expression.

9 / 100

16. The conditional operator is an alternative of:

10 / 100

15. is not used for making two-way decision:

11 / 100

20. The last statement of each case in switch statement must be a:

12 / 100

7. Microsoft Access saves the database with the extension
a) .mdb c) .madb

13 / 100

is a collection of related data organized in rows and columns:

14 / 100

18. is the fundamental property of relational database:

15 / 100

4. MS-Access is a:

16 / 100

8. represents an object:

17 / 100

20. The process of arranging data in a proper order is called:

18 / 100

13. Which component of computer coordinates all activities in the computer?

19 / 100

18. CPU is an example of:

20 / 100

17. The cells of memory are logically organized into group of

21 / 100

12. Relational operators are used to

22 / 100

2. Which of the following is a valid character constant?

23 / 100

How many keywords are in C?

24 / 100

3. Which of the data type offers the highest precision?

25 / 100

18. a b is equivalent to

26 / 100

is not a valid variable

27 / 100

14. A foreign key constraint is also called

28 / 100

9. problems occurs when same information is stored in two different ways:

29 / 100

4. In 3NF, a non-key attribute must not depend on a(n)

30 / 100

7. problems occurs when two different names are used for the same information?

31 / 100

15. The last statement of the body of the fimction is:

32 / 100

19. In C-language, subprograms are referred to as:

33 / 100

17. In a C program two functions can have:

34 / 100

18. The name of actual and formal parameters:

35 / 100

14. A key that consists of two or more than two attributes of a table is called

36 / 100

18. Which of the following is responsible for designing the database system.

37 / 100

15. An attribute is also known as:

38 / 100

A table is also known as: (

39 / 100

5. Ctrl + Alt + Del is

40 / 100

18. acts as file manager for Windows: (

41 / 100

FDD1 is a:

42 / 100

18. is a governing body that approve the network standard:

43 / 100

14. The media Access Control Sub-layer resides in which layer:

44 / 100

20. Which one is not a network topology?

45 / 100

3. Central computer in the network is called:

46 / 100

4. The larger computer to which the terminal or PC is attached is called:

47 / 100

Which one is dedicated server?

48 / 100

5. Forms are designed for:

49 / 100

18. The form which contains the subform is known as:

50 / 100

1. A form that contains the sub form is called

51 / 100

9. Tables are the 1 of our database in Microsoft Access

52 / 100

19. is the default data e in MS-Access:

53 / 100

10. The number of records (or row) in a table or relation is called:

54 / 100

7. The number of fields in a relation or table is called:

55 / 100

16. menus in MS-Access contains commands that can be used to switch between table views?

56 / 100

9. Software to use the Internet:

57 / 100

12. Which one represents the top level domain?

58 / 100

Who owns the Internet?

59 / 100

7. features of word processor allows to specify margins of the documents:

60 / 100

15. How many typing modes are provided by word processor?

61 / 100

19. Font size is measure in:

62 / 100

3. A word processor includes the process of

63 / 100

2. is most commonly used word processing package:

64 / 100

13. shows the margins, position of tabs, and indents etc:

65 / 100

II. A stream is associated with a file using and operaton

66 / 100

1. A file is stored in

67 / 100

5. A data file a stored in:

68 / 100

7.function is used to write a string to a file:

69 / 100

2. The escape sequence for backslash is:

70 / 100

20. Which of the following format specifier is used for string type data?

71 / 100

11. The escape sequence for carriage return is

72 / 100

9. The process to identify the data objects and the relationships between them is:

73 / 100

4. In activities, the possible inputs for the database are collected:

74 / 100

19. represents entity:

75 / 100

16. In E-R diagram, a diamond shape is used to represent a(n):

76 / 100

1. How many types of loop structur are in C?

77 / 100

10. structure executes the body of loop at least once:

78 / 100

20. Loop with in a loop is called

79 / 100

18. is related to loop structures:

80 / 100

17. The of for loop executed only once in the first iteration

81 / 100

13. The symbols used to write instructions in assembly language are called:

82 / 100

17. .exe file is produced by the:

83 / 100

20. languages is different for different computers:

84 / 100

8. The programming language that are very close to machine code are called:

85 / 100

Microwave transmission, coaxial cables and fiber optic are examples of:

86 / 100

12. Light, sound, and radio waves are examples of:

87 / 100

9. The electromagnetic or light waves representing data are called:

88 / 100

15. Which type of data consists of words, sentences, and paragraphs?

89 / 100

2. Data communication requires only a:

90 / 100

4. Viruses are transferred from one computer to another due to:

91 / 100

1. A virus program usually hidden in:

92 / 100

5. Most common crimes are committed by:

93 / 100

2. A virus is just a:

94 / 100

12. cell addresses is correct:

95 / 100

9. is not a feature of spreadsheet program:

96 / 100

8. In a worksheet, a bold rectangle border indicates (n):

97 / 100

14. The 0.0000000001 is displayed in default column width as:

98 / 100

1. Which of the following is a spreadsheet 2.

99 / 100

7. The currently selected cell where data can be entered or edited is called:

100 / 100

4. The actual working area in Microsoft Excel is:

Your score is

The average score is 59%

0%

BIG SALE! FLAT 50% OFF

Open chat
Salam
Can we help you?