Computer Sciences Practice Test 2





Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

348

Computer Practice Test 2

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

14. Which of the following characters cannot be used as first character of a variable name?

2 / 100

5. The predefined words of the programming language that are used for special purposes in the source program are called:

3 / 100

12. Relational operators are used to

4 / 100

How many keywords are in C?

5 / 100

11. Which of the operator has lowest presidence

6 / 100

16. C is a strongly typed language, this means that:

7 / 100

12. Which is a storage device?

8 / 100

14. Which component of computer is responsible for comparison of two numbers?

9 / 100

13. Which component of computer coordinates all activities in the computer?

10 / 100

15. An attribute is also known as:

11 / 100

9. The rows of a table or relation are known as:

12 / 100

13. A table must have:

13 / 100

14. A key that consists of two or more than two attributes of a table is called

14 / 100

A table is also known as: (

15 / 100

represents an entity

16 / 100

7. virus is activated on the basis of a logical condition:

17 / 100

6. viruses infects the first sector of disk:

18 / 100

8. Format C is an example of virus:

19 / 100

16. A secret word or number to be typed by a keyboard before an activity can take place are called:

20 / 100

11. is an example of packaged software:

21 / 100

Collection of raw facts and figures is called:

22 / 100

The computing and communication technologies arc combined together for

23 / 100

15. Which is not an example of a control element placed on the form

24 / 100

9. Tables are the 1 of our database in Microsoft Access

25 / 100

8. Which of the following is used to retrieve data from one or more tables of database and to present it to the user in a formatted way.

26 / 100

8. The functions used for input and output are stored in header file:

27 / 100

2. The escape sequence for backslash is:

28 / 100

6. How many variables can be used in one printf() function?

29 / 100

5. is not used in control or format string in a prindo function:

30 / 100

19. The escape sequence to insert horizontal tab is

31 / 100

devices is used in departmental store:

32 / 100

3. device is used in banks to read cheque of customer:

33 / 100

9. Computer at home can be used

34 / 100

4. CAL stands for

35 / 100

3. is called the preliminary investigation of the required database:

36 / 100

18. An index may be created on

37 / 100

16. In E-R diagram, a diamond shape is used to represent a(n):

38 / 100

20. is not related to an entity:

39 / 100

5. In activities, the cost factors are taken into consideration:

40 / 100

I. Which of the following keys does not hold uniqueness property

41 / 100

Q2. Select the correct option I. Which of the following represents a collection of concepts that arc used to describe the structure of a database?

42 / 100

9. The manipulated and processed data is called:

43 / 100

18. Which of the following database model has the shape like and organizational chart?

44 / 100

10. structures is a selection structure:

45 / 100

16. The conditional operator is an alternative of:

46 / 100

5. control structures executes program statements one after another:

47 / 100

6. Referential integrity is applied on

48 / 100

3. The constraint states that in a relation no primary key value can have a null value.

49 / 100

7. problems occurs when two different names are used for the same information?

50 / 100

8. To store data for future use it must be stored on

51 / 100

5. A data file a stored in:

52 / 100

8. The programming language that are very close to machine code are called:

53 / 100

9. is not a low-level language:

54 / 100

C is a:

55 / 100

9. The electromagnetic or light waves representing data are called:

56 / 100

14. The height of wave within a given period of time is called:

57 / 100

15. Which type of data consists of words, sentences, and paragraphs?

58 / 100

19. coding schemes uses 4 bit code:

59 / 100

16. standards were developed without any formal planning:

60 / 100

21. One or more computers connected to a hub is a:

61 / 100

20. Which one is not a network topology?

62 / 100

4. The larger computer to which the terminal or PC is attached is called:

63 / 100

1. How many types of loop structur are in C?

64 / 100

19. structure is used when programmer does not know is advance the number of repetition of loop?

65 / 100

16. The loop will execute at least even the condition is false

66 / 100

8. A record is a complete set of

67 / 100

The actual data of Is stored in:

68 / 100

18. is the fundamental property of relational database:

69 / 100

2. is most commonly used word processing package:

70 / 100

20. A group of sentences is called: (

71 / 100

14. The insertion point in the document is also called:

72 / 100

12. cell addresses is correct:

73 / 100

14. The 0.0000000001 is displayed in default column width as:

74 / 100

9. is not a feature of spreadsheet program:

75 / 100

II. A cell of worksheet, which is not active is called:

76 / 100

8. In a worksheet, a bold rectangle border indicates (n):

77 / 100

4. The actual working area in Microsoft Excel is:

78 / 100

10. The actual working area in Microsoft Excel is

79 / 100

An Operating System is a

80 / 100

15. involves the processing on multiple processors in a computer:

81 / 100

8. GUI stands for:

82 / 100

7. The number of fields in a relation or table is called:

83 / 100

12. The data in table is entered in:

84 / 100

8. Which of the following buttons of Find and Replace dialog box is clicked to start he search process?

85 / 100

16. menus in MS-Access contains commands that can be used to switch between table views?

86 / 100

10. The number of records (or row) in a table or relation is called:

87 / 100

A computer can be linked to the Internet through

88 / 100

8. specifies the correct format of IP address:

89 / 100

9. Software to use the Internet:

90 / 100

16. The computers on the Internet that contain the web sites are called:

91 / 100

6. is a high speed communication line:

92 / 100

7. How many types of addressing schemes?

93 / 100

II. Which of the following protocol is used to access web pages on World Wide Web?

94 / 100

6. Mother name for built-in function is:

95 / 100

20. The predefined functions that are part of the programming language and can be used for different purposes are called:

96 / 100

16. A built-in function:

97 / 100

17. In a C program two functions can have:

98 / 100

1. Functions prototype for built-in functions are specified in:

99 / 100

18. The name of actual and formal parameters:

100 / 100

14. The actual body of the function is defined in:

Your score is

The average score is 61%

0%

,

EID SALE! FLAT 60% OFF

<p>Protected</p>
Open chat
Salam
Can we help you?