Computer Sciences Practice Test 1

Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations




PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

974

Computer Practice Test 1

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

5. control structures executes program statements one after another:

2 / 100

6. The selection statement is also known as:

3 / 100

16. The conditional operator is an alternative of:

4 / 100

11. selection structures is the simplest form of decision making structure:

5 / 100

13. Which of the following operators is used as decision-making statement?

6 / 100

13. Types of software that can be freely distributed without violating copyright laws are called:

7 / 100

12. is cause of virus:

8 / 100

3. A virus can destroy: (

9 / 100

7. virus is activated on the basis of a logical condition:

10 / 100

15. Preprocessor directives are commands for

11 / 100

13. The symbols used to write instructions in assembly language are called:

12 / 100

6. The programming languages that are close to human language are called:

13 / 100

14. C was designed to write programs for

14 / 100

18. The program written in assembly language is translated to the machine code with the help of translator program called:

15 / 100

12. Which one represents the top level domain?

16 / 100

4. When DARPA established a small computer network?

17 / 100

20. protocol is used by news services:

18 / 100

19. represents URL address:

19 / 100

II. Which of the following protocol is used to access web pages on World Wide Web?

20 / 100

3. function is used to display output on screen:

21 / 100

is secondary storage device:

22 / 100

A device used for optical character recognition is a:

23 / 100

The processed data is called:

24 / 100

10. is an example of system software:

25 / 100

3. A word processor includes the process of

26 / 100

14. The insertion point in the document is also called:

27 / 100

10. The bar that contains the group of commands is called:

28 / 100

6. features of word processor allows to insert text from one file into another file:

29 / 100

17. The music and speech represent the: (a) Image data (b) Audio data (c) Video data (d) Text data

30 / 100

10. BIT stands for

31 / 100

9. The electromagnetic or light waves representing data are called:

32 / 100

14. The height of wave within a given period of time is called:

33 / 100

2. The rule that a record from a table cannot be deleted if its associated record exists in a related table is called rule

34 / 100

15. The relationship between countries and their capitals is an example of relationships.

35 / 100

7. The number of fields in a relation or table is called:

36 / 100

9. As in design view, you can move from field to field in the table window in datasheet view using button.

37 / 100

12. function is used to read a single character from a file at a time:

38 / 100

13. function is used as formatted output file function:

39 / 100

5. A data file a stored in:

40 / 100

16. In file handling sequence of characters refers to

41 / 100

II. A stream is associated with a file using and operaton

42 / 100

11. Which form layout displays multiple records at a time?

43 / 100

7. A auto form displays one record at a time.

44 / 100

15. Which is not an example of a control element placed on the form

45 / 100

18. The form which contains the subform is known as:

46 / 100

4. A form is an object of

47 / 100

12. Form with in a form is called

48 / 100

14. The capability of an operating system to load multiple program into memory at a time and to perform two or more processes concurrently, is called:

49 / 100

is an example of command line operating system:

50 / 100

13. is based on the NT technology:

51 / 100

16. is the entering point in Windows:

52 / 100

19. contains the files and folders that are deleted from the hard disk:

53 / 100

13. standards were properly researched, designed and finally published as a standard:

54 / 100

19. Which one represents the shape of network?

55 / 100

8. A computer drives its basic strength from:

56 / 100

5. Which component of a computer decodes and executes program consuvetions?

57 / 100

The address of instruction under

58 / 100

I I. CPU is an example of:

59 / 100

18. CPU is an example of:

60 / 100

17. The cells of memory are logically organized into group of

61 / 100

3. is called the preliminary investigation of the required database:

62 / 100

9. The process to identify the data objects and the relationships between them is:

63 / 100

6. Database development process involve mapping of conceptual data model into

64 / 100

2. An entity related to itself in an ERD model refers to

65 / 100

8. tools in involved to the Data Analysis:

66 / 100

9. In while loop, the increment / decrement statement are placed

67 / 100

15. The do-while loop ends with a

68 / 100

20. Loop with in a loop is called

69 / 100

The fly-by-wire system is used in:

70 / 100

13. The benefit of CAD may be summed up as:

71 / 100

19. The words used to write the statements of a program are called

72 / 100

15. In C, the maximum length of variable name is:

73 / 100

is not a valid variable

74 / 100

2. Which of the following is a valid character constant?

75 / 100

16. C is a strongly typed language, this means that:

76 / 100

18. If the value of a non-key attribute can be obtained simply by knowing the values of another non-key attribute, the relation is not in: (

77 / 100

19. A process in which it is being ensured that attributes are stored from where they belong

78 / 100

2. How many types of data integrity are there?

79 / 100

17. In a C program two functions can have:

80 / 100

6. Mother name for built-in function is:

81 / 100

14. The actual body of the function is defined in:

82 / 100

16. Using you can create tables, forms, reports and queries in very short time

83 / 100

4. MS-Access is a:

84 / 100

13. In a table each column represents

85 / 100

I. A database consists of various components called the

86 / 100

2. Which of the following object is used to retrieve data from database and present in a formatted way?

87 / 100

5. represents of wizard of DBMS:

88 / 100

is used to identify records of a relation uniquely:

89 / 100

7. A tuple in a table is also known as

90 / 100

6. A table is also known as

91 / 100

12. In a school the record of cricket and hockey team organized into two groups is referred as

92 / 100

5. SQL is a(n)

93 / 100

Q2. Select the correct option I. Which of the following represents a collection of concepts that arc used to describe the structure of a database?

94 / 100

16. A set of related files that represent a unit of data is called

95 / 100

10. A series of actions that are performed on raw data achieve the required objective and results are called:

96 / 100

15. menus contains the ‘Cells’ command:

97 / 100

8. In a worksheet, a bold rectangle border indicates (n):

98 / 100

18. The default number format assigned to a cell is the:

99 / 100

4. The actual working area in Microsoft Excel is:

100 / 100

a spreadsheet:

Your score is

The average score is 59%

0%

BIG SALE! FLAT 50% OFF

Protected