Computer Sciences Practice Test 2




Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

350

Computer Practice Test 2

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

5. A data file a stored in:

2 / 100

12. function is used to read a single character from a file at a time:

3 / 100

9. A collection of related records is called

4 / 100

18. If the value of a non-key attribute can be obtained simply by knowing the values of another non-key attribute, the relation is not in: (

5 / 100

10. The process of converting complex data structure into simple and stable data structure is called: a –

6 / 100

19. A process in which it is being ensured that attributes are stored from where they belong

7 / 100

7. problems occurs when two different names are used for the same information?

8 / 100

15. In which of the following normal forms, any repeating group from the table is removed?

9 / 100

16. A relation is in second normal form if and only if:

10 / 100

1. The function getch() is defined in:

11 / 100

14. format specifiers is used for integer type data:

12 / 100

11. The escape sequence for carriage return is

13 / 100

10. is not an anti-virus program:

14 / 100

6. viruses infects the first sector of disk:

15 / 100

14. Another name for antivirus is:

16 / 100

8. Format C is an example of virus:

17 / 100

17. Which is not an antivirus program?

18 / 100

3. A virus can destroy: (

19 / 100

19. What is the most common computer crime of these listed below?

20 / 100

11. is an anti-virus program:

21 / 100

4. Viruses are transferred from one computer to another due to:

22 / 100

17. The music and speech represent the: (a) Image data (b) Audio data (c) Video data (d) Text data

23 / 100

15. Which type of data consists of words, sentences, and paragraphs?

24 / 100

13. The number of times a wave repeats during a specific time interval is called:

25 / 100

14. C was designed to write programs for

26 / 100

5. The computer program is written in:

27 / 100

17. SQL is used for

28 / 100

15. An attribute is also known as:

29 / 100

14. A key that consists of two or more than two attributes of a table is called

30 / 100

11. Which of the operator has lowest presidence

31 / 100

4. When the result of the computation of two very small numbers is too small to be represented, this phenomenon is called:

32 / 100

is not a valid variable

33 / 100

1. Variables are created in

34 / 100

18. a b is equivalent to

35 / 100

20. elements of program in not token:

36 / 100

14. Which of the following characters cannot be used as first character of a variable name?

37 / 100

4. A form is an object of

38 / 100

3. objects is not used to enter data into database:

39 / 100

10. How many are the layouts of Form in MS-Access?

40 / 100

13. The benefit of CAD may be summed up as:

41 / 100

scanners is used in hospitals:

42 / 100

6. The benefit of CAD may be summed up as

43 / 100

4. CAL stands for

44 / 100

20. Computer based weather forecasting depends on accurate collection of data from

45 / 100

is not relevant to office automation:

46 / 100

6. The selection statement is also known as:

47 / 100

18. Which operator in C language is called ternary operator?

48 / 100

14. is used for making two-way decision:

49 / 100

2. Which of the following operator is used as decision making statement

50 / 100

9. The manipulated and processed data is called:

51 / 100

13. A set of related characters that represent a unit of data is called

52 / 100

12. In a school the record of cricket and hockey team organized into two groups is referred as

53 / 100

14. A set of related fields that represent a unit of data is called

54 / 100

10. Which component of CPU is responsible for performing arithmetic and logical operations on numeric data?

55 / 100

18. CPU is an example of:

56 / 100

5. Which component of a computer decodes and executes program consuvetions?

57 / 100

15. is the component of CPU:

58 / 100

The address of instruction under

59 / 100

FDD1 is a:

60 / 100

The software used for workgroup computing is called:

61 / 100

21. One or more computers connected to a hub is a:

62 / 100

1. Functions prototype for built-in functions are specified in:

63 / 100

12. Formal arguments are also called

64 / 100

16. A built-in function:

65 / 100

9. is not a feature of spreadsheet program:

66 / 100

12. cell addresses is correct:

67 / 100

10. The actual working area in Microsoft Excel is

68 / 100

5. A cell at third column and 15 rows has a cell address:

69 / 100

II. A cell of worksheet, which is not active is called:

70 / 100

12. The maximum number of primary partitions that can be created on a disk is

71 / 100

organizes and controls the hardware and software:

72 / 100

5. Ctrl + Alt + Del is

73 / 100

14. views can be used to add, edit, and delete records to and from the table:

74 / 100

6. In a relational database, a single piece of information is called:

75 / 100

10. The number of records (or row) in a table or relation is called:

76 / 100

7. Microsoft Access saves the database with the extension
a) .mdb c) .madb

77 / 100

18. is the fundamental property of relational database:

78 / 100

19. is a statement that extracts specific information database.

79 / 100

A computer can be linked to the Internet through

80 / 100

7. How many types of addressing schemes?

81 / 100

18. Web pages are linked together using?

82 / 100

10. If “Yahoo.com” is a domain name, then what will be the top level domain?

83 / 100

20. protocol is used by news services:

84 / 100

1. How many types of loop structur are in C?

85 / 100

20. Loop with in a loop is called

86 / 100

2. is a loop statement:

87 / 100

6. features of word processor allows to insert text from one file into another file:

88 / 100

13. shows the margins, position of tabs, and indents etc:

89 / 100

7. features of word processor allows to specify margins of the documents:

90 / 100

20. A group of sentences is called: (

91 / 100

10. The bar that contains the group of commands is called:

92 / 100

3. A word processor includes the process of

93 / 100

6. Database development process involve mapping of conceptual data model into

94 / 100

5. In activities, the cost factors are taken into consideration:

95 / 100

In E-R diagram, a rectangular box is used to represent a(n):

96 / 100

7. In ERD model, the relationship between two entities is represented by a

97 / 100

3. is called the preliminary investigation of the required database:

98 / 100

10. is an example of system software:

99 / 100

18. The data and program are stored permanently on the:

100 / 100

The processed data is called:

Your score is

The average score is 61%

0%

BIG SALE! FLAT 50% OFF

Open chat
Salam
Can we help you?