Computer Sciences Practice Test 2





Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

344

Computer Practice Test 2

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

13. The printf() is a:

2 / 100

3. Which of the following is true about a function call?

3 / 100

5. The functions that are defined by programmer are called:

4 / 100

9. The actual values are passed to the function in:

5 / 100

6. Mother name for built-in function is:

6 / 100

7. A function is called with the reference of its:

7 / 100

9. is not a feature of spreadsheet program:

8 / 100

14. The 0.0000000001 is displayed in default column width as:

9 / 100

C is a:

10 / 100

18. acts as file manager for Windows: (

11 / 100

An Operating System is a

12 / 100

is most necessary to interact with the computer:

13 / 100

is an example of command line operating system:

14 / 100

13. is based on the NT technology:

15 / 100

11. As compared to command line operating system, a GUI operating system is:

16 / 100

14. format specifiers is used for integer type data:

17 / 100

II. A stream is associated with a file using and operaton

18 / 100

14. If programs get input data from data file and also send output into data file. It is called:

19 / 100

18. In binary stream bytes have correspondence

20 / 100

8. To store data for future use it must be stored on

21 / 100

12. function is used to read a single character from a file at a time:

22 / 100

4. Viruses are transferred from one computer to another due to:

23 / 100

18. Format C is an example of:

24 / 100

11. is an anti-virus program:

25 / 100

15. Security Protection for personal computer include:

26 / 100

20. media is used for backup:

27 / 100

8. Format C is an example of virus:

28 / 100

12. is cause of virus:

29 / 100

2. A virus is just a:

30 / 100

16. Each of the following is a form layout except.

31 / 100

19. If there are small fmite number of values for a certain field on a form which object will be suitable

32 / 100

6. The forms are the end of our database in Microsoft Access

33 / 100

14. The different design elements placed on form are called

34 / 100

5. Forms are designed for:

35 / 100

8. Which of the following is used to retrieve data from one or more tables of database and to present it to the user in a formatted way.

36 / 100

15. Which is not an example of a control element placed on the form

37 / 100

13. A table must have:

38 / 100

A table is also known as: (

39 / 100

8. The columns of a relation correspond to:

40 / 100

8. specifies the correct format of IP address:

41 / 100

10. If “Yahoo.com” is a domain name, then what will be the top level domain?

42 / 100

9. Software to use the Internet:

43 / 100

20. protocol is used by news services:

44 / 100

7. How many types of addressing schemes?

45 / 100

10. structures is a selection structure:

46 / 100

16. The conditional operator is an alternative of:

47 / 100

15. is not used for making two-way decision:

48 / 100

1. Which of the following is not a decision making statement

49 / 100

6. The selection statement is also known as:

50 / 100

The data in table is entered in

51 / 100

13. The structure of table is designed in:

52 / 100

11. How may table view are available in MS-Access?

53 / 100

The fly-by-wire system is used in:

54 / 100

4. CAL stands for

55 / 100

I. CBT stand for

56 / 100

7. In ERD model, the relationship between two entities is represented by a

57 / 100

4. In activities, the possible inputs for the database are collected:

58 / 100

5. In activities, the cost factors are taken into consideration:

59 / 100

In E-R diagram, a rectangular box is used to represent a(n):

60 / 100

12. Which of the following can be used to launch the WordArt?

61 / 100

16. keys of keyboard in conjunction with arrow keys is used for selecting text:

62 / 100

13. shows the margins, position of tabs, and indents etc:

63 / 100

10. The bar that contains the group of commands is called:

64 / 100

3. A word processor includes the process of

65 / 100

9. The bar that displays the name of program and the name of documents is called:

66 / 100

is not a feature of simple word processor or text editor:

67 / 100

14. A query is a more flexible way of

68 / 100

6. Which one is not a loop structure

69 / 100

20. Loop with in a loop is called

70 / 100

5. is called counter loop:

71 / 100

4. loop structures are available in C language:

72 / 100

10. structure executes the body of loop at least once:

73 / 100

2. How many types of data integrity are there?

74 / 100

4. In 3NF, a non-key attribute must not depend on a(n)

75 / 100

15. In which of the following normal forms, any repeating group from the table is removed?

76 / 100

7. problems occurs when two different names are used for the same information?

77 / 100

19. A process in which it is being ensured that attributes are stored from where they belong

78 / 100

13. Integrity is concerned with the (

79 / 100

13. standards were properly researched, designed and finally published as a standard:

80 / 100

14. The media Access Control Sub-layer resides in which layer:

81 / 100

22. All nodes are connected to a single cable in a:

82 / 100

6. What layer of OSI does data compression:

83 / 100

Which one is dedicated server?

84 / 100

10. Which network model consists of many clients and one or more central computers?

85 / 100

10. is an example of system software:

86 / 100

18. The data and program are stored permanently on the:

87 / 100

14. Which component of computer is responsible for comparison of two numbers?

88 / 100

18. CPU is an example of:

89 / 100

14. Which of the following characters cannot be used as first character of a variable name?

90 / 100

. A quantity whose value may change during execution of program is called:

91 / 100

2. Which of the following is a valid character constant?

92 / 100

is not a valid variable

93 / 100

13. is valid variable name

94 / 100

How many keywords are in C?

95 / 100

2. Which of the following data model is more flexible?

96 / 100

3. Which of the following type of file require largest processing time?

97 / 100

14. The height of wave within a given period of time is called:

98 / 100

The infonnation that is to be transferred from one location to another is called:

99 / 100

9. The electromagnetic or light waves representing data are called:

100 / 100

5. is component of data communication:

Your score is

The average score is 61%

0%

,

Protected

Open chat
Salam
Can we help you?