Computer Sciences Practice Test 2





Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

338

Computer Practice Test 2

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

10. If “Yahoo.com” is a domain name, then what will be the top level domain?

2 / 100

16. The computers on the Internet that contain the web sites are called:

3 / 100

20. protocol is used by news services:

4 / 100

A computer can be linked to the Internet through

5 / 100

2. A collection of millions of computers interlink to one another is called:

6 / 100

12. function is used to read a single character from a file at a time:

7 / 100

2. Which of the following function is used to write a string to a file?

8 / 100

13. function is used as formatted output file function:

9 / 100

II. A stream is associated with a file using and operaton

10 / 100

3. On successfully closing a file , the fclose( ) returns:

11 / 100

Which of the following mode open only an existing file for both reading and writing?

12 / 100

5. A data file a stored in:

13 / 100

10. The computer understands the instructions only in:

14 / 100

15. In C, the maximum length of variable name is:

15 / 100

10. The symbol = represents:

16 / 100

16. The conditional operator is an alternative of:

17 / 100

20. The last statement of each case in switch statement must be a:

18 / 100

14. is used for making two-way decision:

19 / 100

12. is not decision-making statement:

20 / 100

3. How many basic control structures are there?

21 / 100

4. Which one is a control structure?

22 / 100

18. Which operator in C language is called ternary operator?

23 / 100

16. A set of related files that represent a unit of data is called

24 / 100

19. represents entity:

25 / 100

6. Database development process involve mapping of conceptual data model into

26 / 100

16. In E-R diagram, a diamond shape is used to represent a(n):

27 / 100

12. What indicates the connection between entites

28 / 100

9. The process to identify the data objects and the relationships between them is:

29 / 100

3. is called the preliminary investigation of the required database:

30 / 100

4. In activities, the possible inputs for the database are collected:

31 / 100

11. A functional dependency between two or more non-key attributes in a relation is called

32 / 100

1. In 3NF, which form of dependency is removed? (

33 / 100

6. Referential integrity is applied on

34 / 100

13. is based on the NT technology:

35 / 100

An Operating System is a

36 / 100

is an example of command line operating system:

37 / 100

19. contains the files and folders that are deleted from the hard disk:

38 / 100

10. What type of operating system MS-DOS is?

39 / 100

18. acts as file manager for Windows: (

40 / 100

17. Windows explorer is used to

41 / 100

16. A built-in function:

42 / 100

I I. The name of actual and formal parameters:

43 / 100

20. The predefined functions that are part of the programming language and can be used for different purposes are called:

44 / 100

2. Global variables are created in

45 / 100

18. The name of actual and formal parameters:

46 / 100

The name for the screen clarity:

47 / 100

18. The data and program are stored permanently on the:

48 / 100

FDD1 is a:

49 / 100

14. The media Access Control Sub-layer resides in which layer:

50 / 100

21. One or more computers connected to a hub is a:

51 / 100

18. is a governing body that approve the network standard:

52 / 100

2. A collection of computers connected together is called:

53 / 100

3. Central computer in the network is called:

54 / 100

4. The larger computer to which the terminal or PC is attached is called:

55 / 100

20. Which one is not a network topology?

56 / 100

I. A database consists of various components called the

57 / 100

to automate repeated tasks — are used

58 / 100

15. A step by step procedure to perform a task easily available in a software is called

59 / 100

18. is the fundamental property of relational database:

60 / 100

5. represents of wizard of DBMS:

61 / 100

10. BIT stands for

62 / 100

5. is component of data communication:

63 / 100

9. The electromagnetic or light waves representing data are called:

64 / 100

The infonnation that is to be transferred from one location to another is called:

65 / 100

2. The escape sequence for backslash is:

66 / 100

1. The function getch() is defined in:

67 / 100

4. The printf() function is used to display:

68 / 100

12. Which of the following forma specifier is used for character type data

69 / 100

9. The program that contains instructions to operate a device is called:

70 / 100

6. The component of computer that stores data and program while these are being executed is called:

71 / 100

18. is related to loop structures:

72 / 100

4. loop structures are available in C language:

73 / 100

11. The body of I comes er the test condition in:

74 / 100

2. is a loop statement:

75 / 100

2. The rule that a record from a table cannot be deleted if its associated record exists in a related table is called rule

76 / 100

13. The structure of table is designed in:

77 / 100

17. The maximum length of text type field is:

78 / 100

9. As in design view, you can move from field to field in the table window in datasheet view using button.

79 / 100

20. is th efault field size of Text data type in MS-Access:

80 / 100

17. The bold text specifies the: (

81 / 100

5. During text entering process into document. the cursor automatically shifts to the next line when it reaches to the right margin. This feature of word processor is called:

82 / 100

16. keys of keyboard in conjunction with arrow keys is used for selecting text:

83 / 100

9. The bar that displays the name of program and the name of documents is called:

84 / 100

10. is not an anti-virus program:

85 / 100

14. Another name for antivirus is:

86 / 100

2. A virus is just a:

87 / 100

13. Types of software that can be freely distributed without violating copyright laws are called:

88 / 100

is not relevant to office automation:

89 / 100

12. cell addresses is correct:

90 / 100

6. A collection of related worksheets is called:

91 / 100

10. The actual working area in Microsoft Excel is

92 / 100

3. The intersection of a row and column form a:

93 / 100

3. objects is not used to enter data into database:

94 / 100

6. The forms are the end of our database in Microsoft Access

95 / 100

13. A form with multiple tabs and each tab consisting a page of information

96 / 100

is used to identify records of a relation uniquely:

97 / 100

1. Insert command is used to insert.

98 / 100

15. An attribute is also known as:

99 / 100

16. is known as control key:

100 / 100

8. The columns of a relation correspond to:

Your score is

The average score is 61%

0%

,

Protected

Open chat
Salam
Can we help you?