Computer Sciences Practice Test 2




Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

358

Computer Practice Test 2

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

16. Which of the following is an absolute address?

2 / 100

5. A cell at third column and 15 rows has a cell address:

3 / 100

7. The currently selected cell where data can be entered or edited is called:

4 / 100

II. A cell of worksheet, which is not active is called:

5 / 100

17. Which of the following refers to the correctness and consistency of data?

6 / 100

In activity data is collected and recorded:

7 / 100

10. A series of actions that are performed on raw data achieve the required objective and results are called:

8 / 100

8. represents an object:

9 / 100

9. The manipulated and processed data is called:

10 / 100

6. The component of computer that stores data and program while these are being executed is called:

11 / 100

18. An index may be created on

12 / 100

8. tools in involved to the Data Analysis:

13 / 100

9. Software that is used to detect and remove the viruses from the computer is called:

14 / 100

4. Viruses are transferred from one computer to another due to:

15 / 100

6. viruses infects the first sector of disk:

16 / 100

14. Another name for antivirus is:

17 / 100

5. Most common crimes are committed by:

18 / 100

10. structure executes the body of loop at least once:

19 / 100

17. The of for loop executed only once in the first iteration

20 / 100

9. In while loop, the increment / decrement statement are placed

21 / 100

5. is called counter loop:

22 / 100

6. Which one is not a loop structure

23 / 100

14. Semicolon is placed at the end of condition in:

24 / 100

3. The loop which never ends is called:

25 / 100

1. A form that contains the sub form is called

26 / 100

15. Which is not an example of a control element placed on the form

27 / 100

2. How many basic layouts of forms are here in Microsoft Access.

28 / 100

10. How many are the layouts of Form in MS-Access?

29 / 100

13. A form with multiple tabs and each tab consisting a page of information

30 / 100

is not related to document management system:

31 / 100

17. Computer at home can be used for:

32 / 100

10. A word processor can be used to

33 / 100

13. The benefit of CAD may be summed up as:

34 / 100

The fly-by-wire system is used in:

35 / 100

19. CAT stands for

36 / 100

16. Modern computer can perform calculations or process at high speed

37 / 100

19. In text file, data is stored in:

38 / 100

9. A collection of related records is called

39 / 100

1. A file is stored in

40 / 100

17. .exe file is produced by the:

41 / 100

6. The programming languages that are close to human language are called:

42 / 100

4. A set of instruction given to the computer is called:

43 / 100

16. Which of the following requires no translator to execute the program?

44 / 100

2. Which of the following operator is used as decision making statement

45 / 100

16. The conditional operator is an alternative of:

46 / 100

6. The selection statement is also known as:

47 / 100

7. Another name of conditional operator is

48 / 100

FDD1 is a:

49 / 100

7. Cabling on a linear bus topology can be extended using which of following:

50 / 100

21. One or more computers connected to a hub is a:

51 / 100

13. standards were properly researched, designed and finally published as a standard:

52 / 100

19. Which one represents the shape of network?

53 / 100

14. The media Access Control Sub-layer resides in which layer:

54 / 100

16. standards were developed without any formal planning:

55 / 100

6. What layer of OSI does data compression:

56 / 100

15. Which type of data consists of words, sentences, and paragraphs?

57 / 100

14. The height of wave within a given period of time is called:

58 / 100

3. The process of transferring data from one location to another is called:

59 / 100

is not a feature of simple word processor or text editor:

60 / 100

8. In MS Word, the data that is being copied or moved is

61 / 100

10. The bar that contains the group of commands is called:

62 / 100

2. Which of the following object is used to retrieve data from database and present in a formatted way?

63 / 100

is a collection of related data organized in rows and columns:

64 / 100

6. is element MS-Access application window:

65 / 100

12. Relational operators are used to

66 / 100

15. In C, the maximum length of variable name is:

67 / 100

is not a valid variable

68 / 100

11. Which of the operator has lowest presidence

69 / 100

20. elements of program in not token:

70 / 100

18. is not an example of data type in MS-Access:

71 / 100

8. Which of the following buttons of Find and Replace dialog box is clicked to start he search process?

72 / 100

The data in table is entered in

73 / 100

12. The data in table is entered in:

74 / 100

7. The number of fields in a relation or table is called:

75 / 100

5. is the object of MS-Access database file:

76 / 100

12. The maximum number of primary partitions that can be created on a disk is

77 / 100

18. acts as file manager for Windows: (

78 / 100

11. As compared to command line operating system, a GUI operating system is:

79 / 100

An Operating System is a

80 / 100

is most necessary to interact with the computer:

81 / 100

4. When DARPA established a small computer network?

82 / 100

5. Different attributes in two different tables having same name are referred to as (

83 / 100

16. A relation is in second normal form if and only if:

84 / 100

18. If the value of a non-key attribute can be obtained simply by knowing the values of another non-key attribute, the relation is not in: (

85 / 100

20. A process of analyzing the dependencies of attributes with in entities is called

86 / 100

13. Integrity is concerned with the (

87 / 100

Data processing is also called:

88 / 100

For the input of image data:

89 / 100

20. The predefined functions that are part of the programming language and can be used for different purposes are called:

90 / 100

12. Formal arguments are also called

91 / 100

4. The predefined functions that are part of C-language are called: (

92 / 100

11. is used to create data view

93 / 100

9. The rows of a table or relation are known as:

94 / 100

18. Which of the following is responsible for designing the database system.

95 / 100

3. Anything in the real world that has a set of different attributes or properties is called:

96 / 100

20. is responsible for designing, coordinating and monitoring the database system: (

97 / 100

1. The function getch() is defined in:

98 / 100

20. Which of the following format specifier is used for string type data?

99 / 100

12. Which of the following forma specifier is used for character type data

100 / 100

4. The printf() function is used to display:

Your score is

The average score is 61%

0%

BIG SALE! FLAT 50% OFF

Protected

Open chat
Salam
Can we help you?