Computer Sciences Practice Test 1


Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations




PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

889

Computer Practice Test 1

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

17. In text stream characters have correspondence

2 / 100

14. If programs get input data from data file and also send output into data file. It is called:

3 / 100

is a collection of related data organized in rows and columns:

4 / 100

16. Using you can create tables, forms, reports and queries in very short time

5 / 100

15. A step by step procedure to perform a task easily available in a software is called

6 / 100

13. In a table each column represents

7 / 100

7. A variable whose value controls the number of iterations is known as

8 / 100

20. Loop with in a loop is called

9 / 100

13. The body of loop comes before the test condition in:

10 / 100

10. structure executes the body of loop at least once:

11 / 100

6. Referential integrity is applied on

12 / 100

14. A foreign key constraint is also called

13 / 100

3. The constraint states that in a relation no primary key value can have a null value.

14 / 100

8. problems occurs when same name is used for two different attributes:

15 / 100

10. The process of converting complex data structure into simple and stable data structure is called: a –

16 / 100

16. A relation is in second normal form if and only if:

17 / 100

4. CAL stands for

18 / 100

18. A Word processor can be used to:

19 / 100

9. Computer at home can be used

20 / 100

16. Modern computer can perform calculations or process at high speed

21 / 100

The fly-by-wire system is used in:

22 / 100

15. The last statement of the body of the fimction is:

23 / 100

14. The actual body of the function is defined in:

24 / 100

17. In a C program two functions can have:

25 / 100

19. In C-language, subprograms are referred to as:

26 / 100

7. Another name of conditional operator is

27 / 100

3. How many basic control structures are there?

28 / 100

17. The conditional operator takes expression.

29 / 100

14. is used for making two-way decision:

30 / 100

18. Which operator in C language is called ternary operator?

31 / 100

15. FTP stands for:

32 / 100

A computer can be linked to the Internet through

33 / 100

Who owns the Internet?

34 / 100

16. The computers on the Internet that contain the web sites are called:

35 / 100

is not a feature of simple word processor or text editor:

36 / 100

10. The bar that contains the group of commands is called:

37 / 100

15. How many typing modes are provided by word processor?

38 / 100

18. The default number format assigned to a cell is the:

39 / 100

4. The actual working area in Microsoft Excel is:

40 / 100

14. views can be used to add, edit, and delete records to and from the table:

41 / 100

17. The maximum length of text type field is:

42 / 100

5. is the object of MS-Access database file:

43 / 100

18. is not an example of data type in MS-Access:

44 / 100

15. The relationship between countries and their capitals is an example of relationships.

45 / 100

12. What indicates the connection between entites

46 / 100

16. In E-R diagram, a diamond shape is used to represent a(n):

47 / 100

I. Which of the following keys does not hold uniqueness property

48 / 100

20. is not related to an entity:

49 / 100

11. Which of the operator has lowest presidence

50 / 100

is not a valid variable

51 / 100

. A quantity whose value may change during execution of program is called:

52 / 100

4. When the result of the computation of two very small numbers is too small to be represented, this phenomenon is called:

53 / 100

2. Which of the following is a valid character constant?

54 / 100

13. is valid variable name

55 / 100

Data processing is also called:

56 / 100

Another word for pointer:

57 / 100

The name for the screen clarity:

58 / 100

12. is not an example of packaged software:

59 / 100

An electronic device that accepts, processes data and products information is called: (a) Input device (b) Computer (c) Output devices (d) Operating system

60 / 100

A device used for optical character recognition is a:

61 / 100

10. is an example of system software:

62 / 100

6. A table is also known as

63 / 100

represents an entity

64 / 100

A table is also known as: (

65 / 100

The address of instruction under

66 / 100

RAM is a:

67 / 100

15. is the component of CPU:

68 / 100

18. Format C is an example of:

69 / 100

13. Types of software that can be freely distributed without violating copyright laws are called:

70 / 100

16. A secret word or number to be typed by a keyboard before an activity can take place are called:

71 / 100

19. What is the most common computer crime of these listed below?

72 / 100

12. In which network model all computers have equal status?

73 / 100

The software used for workgroup computing is called:

74 / 100

10. Which network model consists of many clients and one or more central computers?

75 / 100

13. standards were properly researched, designed and finally published as a standard:

76 / 100

Which one is dedicated server?

77 / 100

8. represents an object:

78 / 100

10. A series of actions that are performed on raw data achieve the required objective and results are called:

79 / 100

6. A collection of raw facts and figures is called:

80 / 100

2. Turbo C-H- can compile

81 / 100

20. languages is different for different computers:

82 / 100

8. The programming language that are very close to machine code are called:

83 / 100

8. The functions used for input and output are stored in header file:

84 / 100

14. format specifiers is used for integer type data:

85 / 100

11. The escape sequence for carriage return is

86 / 100

1. The function getch() is defined in:

87 / 100

9. is used for flag:

88 / 100

14. The height of wave within a given period of time is called:

89 / 100

2. Data communication requires only a:

90 / 100

6. is not component of data communication:

91 / 100

8. The is the physical path over which a message travels:

92 / 100

18. acts as file manager for Windows: (

93 / 100

is most necessary to interact with the computer:

94 / 100

organizes and controls the hardware and software:

95 / 100

14. The capability of an operating system to load multiple program into memory at a time and to perform two or more processes concurrently, is called:

96 / 100

19. contains the files and folders that are deleted from the hard disk:

97 / 100

20. In addition to navigate records can be used for

98 / 100

16. Each of the following is a form layout except.

99 / 100

5. Forms are designed for:

100 / 100

2. How many basic layouts of forms are here in Microsoft Access.

Your score is

The average score is 59%

0%

,

Protected

Open chat
Salam
Can we help you?