Computer Sciences Practice Test 1

Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations




PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

978

Computer Practice Test 1

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

1. How many types of loop structur are in C?

2 / 100

19. structure is used when programmer does not know is advance the number of repetition of loop?

3 / 100

15. The do-while loop ends with a

4 / 100

14. Semicolon is placed at the end of condition in:

5 / 100

15. In C, the maximum length of variable name is:

6 / 100

13. is valid variable name

7 / 100

A quantity whose value cannot change during execution of

8 / 100

17. The logical not (!) operator is denoted as:

9 / 100

16. The charts, graphs and pictures are examples of:

10 / 100

14. The height of wave within a given period of time is called:

11 / 100

6. is not component of data communication:

12 / 100

10. BIT stands for

13 / 100

Microwave transmission, coaxial cables and fiber optic are examples of:

14 / 100

6. Referential integrity is applied on

15 / 100

4. In 3NF, a non-key attribute must not depend on a(n)

16 / 100

1. In 3NF, which form of dependency is removed? (

17 / 100

14. A foreign key constraint is also called

18 / 100

9. problems occurs when same information is stored in two different ways:

19 / 100

18. If the value of a non-key attribute can be obtained simply by knowing the values of another non-key attribute, the relation is not in: (

20 / 100

11. A functional dependency between two or more non-key attributes in a relation is called

21 / 100

19. Which one represents the shape of network?

22 / 100

FDD1 is a:

23 / 100

In activity data is collected and recorded:

24 / 100

15. A set of related records that represent a unit of data is called

25 / 100

4. Which of the following may be a temporary file?

26 / 100

7. The currently selected cell where data can be entered or edited is called:

27 / 100

14. The 0.0000000001 is displayed in default column width as:

28 / 100

15. menus contains the ‘Cells’ command:

29 / 100

5. A cell at third column and 15 rows has a cell address:

30 / 100

9. is used for flag:

31 / 100

18. is used with format specifier to display output left-justified:

32 / 100

1. The function getch() is defined in:

33 / 100

3. A word processor includes the process of

34 / 100

16. keys of keyboard in conjunction with arrow keys is used for selecting text:

35 / 100

The computing and communication technologies arc combined together for

36 / 100

15. An inkjet printer is an example of a(n):

37 / 100

is secondary storage device:

38 / 100

18. acts as file manager for Windows: (

39 / 100

16. Modern computer can perform calculations or process at high speed

40 / 100

20. Computer based weather forecasting depends on accurate collection of data from

41 / 100

is not related to business:

42 / 100

3. device is used in banks to read cheque of customer:

43 / 100

15. Typically, and ATM can be used to

44 / 100

17. Computer at home can be used for:

45 / 100

I. CBT stand for

46 / 100

4. A form is an object of

47 / 100

2. How many basic layouts of forms are here in Microsoft Access.

48 / 100

18. The form which contains the subform is known as:

49 / 100

19. If there are small fmite number of values for a certain field on a form which object will be suitable

50 / 100

9. Tables are the 1 of our database in Microsoft Access

51 / 100

10. is not an anti-virus program:

52 / 100

13. Types of software that can be freely distributed without violating copyright laws are called:

53 / 100

20. media is used for backup:

54 / 100

17. Which is not an antivirus program?

55 / 100

10. The relationship between the entities is represented graphically by using:

56 / 100

is the ingredient of data modeling:

57 / 100

16. In E-R diagram, a diamond shape is used to represent a(n):

58 / 100

19. represents entity:

59 / 100

I. Which of the following keys does not hold uniqueness property

60 / 100

11. is used to create data view

61 / 100

is used to identify records of a relation uniquely:

62 / 100

8. A computer drives its basic strength from:

63 / 100

10. Which component of CPU is responsible for performing arithmetic and logical operations on numeric data?

64 / 100

13. Which component of computer coordinates all activities in the computer?

65 / 100

The address of instruction under

66 / 100

17. The cells of memory are logically organized into group of

67 / 100

15. is the component of CPU:

68 / 100

II. Which of the following protocol is used to access web pages on World Wide Web?

69 / 100

18. Web pages are linked together using?

70 / 100

12. Which one represents the top level domain?

71 / 100

4. When DARPA established a small computer network?

72 / 100

15. The relationship between countries and their capitals is an example of relationships.

73 / 100

17. The maximum length of text type field is:

74 / 100

13. The structure of table is designed in:

75 / 100

5. is the object of MS-Access database file:

76 / 100

6. In a relational database, a single piece of information is called:

77 / 100

The data in table is entered in

78 / 100

16. Using you can create tables, forms, reports and queries in very short time

79 / 100

I. A database consists of various components called the

80 / 100

19. is a statement that extracts specific information database.

81 / 100

2. Which of the following object is used to retrieve data from database and present in a formatted way?

82 / 100

3. is the most popular and powerful DBMS:

83 / 100

The actual data of Is stored in:

84 / 100

16. Which of the following requires no translator to execute the program?

85 / 100

6. The programming languages that are close to human language are called:

86 / 100

15. Preprocessor directives are commands for

87 / 100

12. A program written in language runs directly on the computer.

88 / 100

5. The computer program is written in:

89 / 100

3. Which of the following is true about a function call?

90 / 100

19. In C-language, subprograms are referred to as:

91 / 100

20. The predefined functions that are part of the programming language and can be used for different purposes are called:

92 / 100

14. If programs get input data from data file and also send output into data file. It is called:

93 / 100

9. A collection of related records is called

94 / 100

12. function is used to read a single character from a file at a time:

95 / 100

1. A file is stored in

96 / 100

8. To store data for future use it must be stored on

97 / 100

4. An array subscript should be a) int c) double

98 / 100

II. A stream is associated with a file using and operaton

99 / 100

5. control structures executes program statements one after another:

100 / 100

11. selection structures is the simplest form of decision making structure:

Your score is

The average score is 59%

0%

BIG SALE! FLAT 50% OFF

Protected