Computer Sciences Practice Test 2




Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

359

Computer Practice Test 2

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

11. As compared to command line operating system, a GUI operating system is:

2 / 100

3. Which of the following type of file require largest processing time?

3 / 100

16. A set of related files that represent a unit of data is called

4 / 100

5. SQL is a(n)

5 / 100

10. Which network model consists of many clients and one or more central computers?

6 / 100

14. The media Access Control Sub-layer resides in which layer:

7 / 100

7. A device that receives messages is called:

8 / 100

The infonnation that is to be transferred from one location to another is called:

9 / 100

8. The is the physical path over which a message travels:

10 / 100

6. is not component of data communication:

11 / 100

I I. Communication between a computer and a keyboard involves transmission:

12 / 100

17. In a C program two functions can have:

13 / 100

20. The predefined functions that are part of the programming language and can be used for different purposes are called:

14 / 100

12. Formal arguments are also called

15 / 100

5. The functions that are defined by programmer are called:

16 / 100

5. represents of wizard of DBMS:

17 / 100

8. A record is a complete set of

18 / 100

14. A query is a more flexible way of

19 / 100

13. In a table each column represents

20 / 100

15. Preprocessor directives are commands for

21 / 100

10. The computer understands the instructions only in:

22 / 100

7. is not a high level language:

23 / 100

2. Turbo C-H- can compile

24 / 100

19. The instructions written in machine language are in the form of:

25 / 100

18. The program written in assembly language is translated to the machine code with the help of translator program called:

26 / 100

17. A technique for physically arranging the records of a file on secondary storage device is called

27 / 100

8. tools in involved to the Data Analysis:

28 / 100

6. Database development process involve mapping of conceptual data model into

29 / 100

I. Which of the following keys does not hold uniqueness property

30 / 100

10. The relationship between the entities is represented graphically by using:

31 / 100

5. In activities, the cost factors are taken into consideration:

32 / 100

4. CAL stands for

33 / 100

is not related to business:

34 / 100

15. Typically, and ATM can be used to

35 / 100

2. is a loop statement:

36 / 100

10. structure executes the body of loop at least once:

37 / 100

13. The body of loop comes before the test condition in:

38 / 100

3. The loop which never ends is called:

39 / 100

17. The of for loop executed only once in the first iteration

40 / 100

5. is called counter loop:

41 / 100

19. In text file, data is stored in:

42 / 100

1. A file is stored in

43 / 100

10. A logical interface to a file is called

44 / 100

2. Which of the following function is used to write a string to a file?

45 / 100

2. Which of the following is a valid character constant?

46 / 100

20. elements of program in not token:

47 / 100

. A quantity whose value may change during execution of program is called:

48 / 100

A quantity whose value cannot change during execution of

49 / 100

1. A virus program usually hidden in:

50 / 100

8. Format C is an example of virus:

51 / 100

4. Viruses are transferred from one computer to another due to:

52 / 100

18. Format C is an example of:

53 / 100

17. Which is not an antivirus program?

54 / 100

16. A secret word or number to be typed by a keyboard before an activity can take place are called:

55 / 100

9. Software that is used to detect and remove the viruses from the computer is called:

56 / 100

9. The bar that displays the name of program and the name of documents is called:

57 / 100

19. Font size is measure in:

58 / 100

15. How many typing modes are provided by word processor?

59 / 100

10. The actual working area in Microsoft Excel is

60 / 100

12. Which one represents the top level domain?

61 / 100

12. is not an example of packaged software:

62 / 100

The computing and communication technologies arc combined together for

63 / 100

An electronic device that accepts, processes data and products information is called: (a) Input device (b) Computer (c) Output devices (d) Operating system

64 / 100

13. is not an application software:

65 / 100

Another word for pointer:

66 / 100

13. What will be the output of printf(“%d”,’a’);

67 / 100

1. The function getch() is defined in:

68 / 100

16. The %x is a format specifier for:

69 / 100

14. A key that consists of two or more than two attributes of a table is called

70 / 100

8. The columns of a relation correspond to:

71 / 100

13. A table must have:

72 / 100

20. is responsible for designing, coordinating and monitoring the database system: (

73 / 100

represents an entity

74 / 100

A table is also known as: (

75 / 100

8. A computer drives its basic strength from:

76 / 100

The address of instruction under

77 / 100

9. The program that contains instructions to operate a device is called:

78 / 100

12. Which is a storage device?

79 / 100

4. Which one is the brain of computer?

80 / 100

15. is the component of CPU:

81 / 100

10. Which component of CPU is responsible for performing arithmetic and logical operations on numeric data?

82 / 100

17. A Form within another form is called:

83 / 100

3. objects is not used to enter data into database:

84 / 100

8. Which of the following is used to retrieve data from one or more tables of database and to present it to the user in a formatted way.

85 / 100

7. problems occurs when two different names are used for the same information?

86 / 100

2. How many types of data integrity are there?

87 / 100

10. The process of converting complex data structure into simple and stable data structure is called: a –

88 / 100

12. Data integrity is another form of data

89 / 100

8. problems occurs when same name is used for two different attributes:

90 / 100

17. If a relation is in INF and the key consists of a single attributes then the relation is called.

91 / 100

2. The rule that a record from a table cannot be deleted if its associated record exists in a related table is called rule

92 / 100

17. The maximum length of text type field is:

93 / 100

7. The number of fields in a relation or table is called:

94 / 100

18. is not an example of data type in MS-Access:

95 / 100

3. The fundamental concept of relational database is:

96 / 100

11. How may table view are available in MS-Access?

97 / 100

19. What will be the output of (7 > 8) ?printf(“ABC”):printf(“XYZ”);

98 / 100

18. Which operator in C language is called ternary operator?

99 / 100

5. control structures executes program statements one after another:

100 / 100

17. The conditional operator takes expression.

Your score is

The average score is 61%

0%

BIG SALE! FLAT 50% OFF

MDCAT Best Book 2025

Protected