Computer Sciences Practice Test 1


Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations




PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

862

Computer Practice Test 1

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

18. is a governing body that approve the network standard:

2 / 100

14. The media Access Control Sub-layer resides in which layer:

3 / 100

19. Which one represents the shape of network?

4 / 100

12. In which network model all computers have equal status?

5 / 100

3. The intersection of a row and column form a:

6 / 100

a spreadsheet:

7 / 100

19. If the custom format is 00000 then the number 420 will be displayed as:

8 / 100

17. Each number format consists of part:

9 / 100

14. Semicolon is placed at the end of condition in:

10 / 100

19. structure is used when programmer does not know is advance the number of repetition of loop?

11 / 100

17. The of for loop executed only once in the first iteration

12 / 100

15. The do-while loop ends with a

13 / 100

7. A function is called with the reference of its:

14 / 100

0. Which of the following looks for the prototype of functions used in a program:

15 / 100

15. The last statement of the body of the fimction is:

16 / 100

14. The actual body of the function is defined in:

17 / 100

17. In a C program two functions can have:

18 / 100

15. In C, the maximum length of variable name is:

19 / 100

2. Which of the following is a valid character constant?

20 / 100

16. C is a strongly typed language, this means that:

21 / 100

13. function is used as formatted output file function:

22 / 100

12. function is used to read a single character from a file at a time:

23 / 100

8. To store data for future use it must be stored on

24 / 100

18. In binary stream bytes have correspondence

25 / 100

20. is true about a stream:

26 / 100

4. An array subscript should be a) int c) double

27 / 100

17. Computer at home can be used for:

28 / 100

4. CAL stands for

29 / 100

20. Computer based weather forecasting depends on accurate collection of data from

30 / 100

16. Modern computer can perform calculations or process at high speed

31 / 100

is not relevant to office automation:

32 / 100

scanners is used in hospitals:

33 / 100

9. Computer at home can be used

34 / 100

18. The data and program are stored permanently on the:

35 / 100

The processed data is called:

36 / 100

The name for the screen clarity:

37 / 100

For the input of image data:

38 / 100

3. is the most popular and powerful DBMS:

39 / 100

2. Which of the following object is used to retrieve data from database and present in a formatted way?

40 / 100

12. The data in table is entered in:

41 / 100

18. is not an example of data type in MS-Access:

42 / 100

4. The actual data of database is stored in:

43 / 100

7. virus is activated on the basis of a logical condition:

44 / 100

1. A virus program usually hidden in:

45 / 100

11. is an anti-virus program:

46 / 100

14. Another name for antivirus is:

47 / 100

6. viruses infects the first sector of disk:

48 / 100

3. The idea of stored program was given by:

49 / 100

I I. CPU is an example of:

50 / 100

10. What type of operating system MS-DOS is?

51 / 100

14. The capability of an operating system to load multiple program into memory at a time and to perform two or more processes concurrently, is called:

52 / 100

8. GUI stands for:

53 / 100

organizes and controls the hardware and software:

54 / 100

An Operating System is a

55 / 100

14. C was designed to write programs for

56 / 100

3. Debug is the process of:

57 / 100

4. A set of instruction given to the computer is called:

58 / 100

9. is not a low-level language:

59 / 100

18. The program written in assembly language is translated to the machine code with the help of translator program called:

60 / 100

6. features of word processor allows to insert text from one file into another file:

61 / 100

is not a feature of simple word processor or text editor:

62 / 100

7. features of word processor allows to specify margins of the documents:

63 / 100

5. During text entering process into document. the cursor automatically shifts to the next line when it reaches to the right margin. This feature of word processor is called:

64 / 100

20. A group of sentences is called: (

65 / 100

8. In MS Word, the data that is being copied or moved is

66 / 100

2. How many basic layouts of forms are here in Microsoft Access.

67 / 100

15. Which is not an example of a control element placed on the form

68 / 100

19. If there are small fmite number of values for a certain field on a form which object will be suitable

69 / 100

6. A table is also known as

70 / 100

20. is responsible for designing, coordinating and monitoring the database system: (

71 / 100

18. data type represents actions and movements:

72 / 100

The infonnation that is to be transferred from one location to another is called:

73 / 100

15. Which type of data consists of words, sentences, and paragraphs?

74 / 100

7. A device that receives messages is called:

75 / 100

7. Another name of conditional operator is

76 / 100

1. Which of the following is not a decision making statement

77 / 100

8. tools in involved to the Data Analysis:

78 / 100

16. In E-R diagram, a diamond shape is used to represent a(n):

79 / 100

13. services is provided by Internet:

80 / 100

14. Which of service of Internet is used to transfer files:

81 / 100

3. The globe has become a global village, due to:

82 / 100

A computer can be linked to the Internet through

83 / 100

10. If “Yahoo.com” is a domain name, then what will be the top level domain?

84 / 100

2. A collection of millions of computers interlink to one another is called:

85 / 100

5. is not used in control or format string in a prindo function:

86 / 100

6. How many variables can be used in one printf() function?

87 / 100

17. How many digits are printed to the right of the decimal point in real number?

88 / 100

13. What will be the output of printf(“%d”,’a’);

89 / 100

15. format specifiers is used for float type data:

90 / 100

20. Which of the following format specifier is used for string type data?

91 / 100

1. The function getch() is defined in:

92 / 100

13. Integrity is concerned with the (

93 / 100

12. Data integrity is another form of data

94 / 100

14. A foreign key constraint is also called

95 / 100

4. In 3NF, a non-key attribute must not depend on a(n)

96 / 100

16. A relation is in second normal form if and only if:

97 / 100

20. A process of analyzing the dependencies of attributes with in entities is called

98 / 100

15. In which of the following normal forms, any repeating group from the table is removed?

99 / 100

5. SQL is a(n)

100 / 100

13. A set of related characters that represent a unit of data is called

Your score is

The average score is 59%

0%

,

Protected

Open chat
Salam
Can we help you?