FSC Computer Full Book MCQs Test 2





Entry test 2023 contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT 2023, ECAT 2023, NTS NAT 2023, and NUST NET 2023. PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

234

Computer Practice Test 2

1 / 100

7. problems occurs when two different names are used for the same information?

2 / 100

17. If a relation is in INF and the key consists of a single attributes then the relation is called.

3 / 100

13. Integrity is concerned with the (

4 / 100

12. Data integrity is another form of data

5 / 100

II. A stream is associated with a file using and operaton

6 / 100

17. In text stream characters have correspondence

7 / 100

2. Which of the following function is used to write a string to a file?

8 / 100

5. A data file a stored in:

9 / 100

14. If programs get input data from data file and also send output into data file. It is called:

10 / 100

16. In file handling sequence of characters refers to

11 / 100

19. is the default data e in MS-Access:

12 / 100

14. views can be used to add, edit, and delete records to and from the table:

13 / 100

2. The rule that a record from a table cannot be deleted if its associated record exists in a related table is called rule

14 / 100

12. The data in table is entered in:

15 / 100

20. is th efault field size of Text data type in MS-Access:

16 / 100

16. menus in MS-Access contains commands that can be used to switch between table views?

17 / 100

3. is called the preliminary investigation of the required database:

18 / 100

16. In E-R diagram, a diamond shape is used to represent a(n):

19 / 100

10. The relationship between the entities is represented graphically by using:

20 / 100

6. Database development process involve mapping of conceptual data model into

21 / 100

1. A virus program usually hidden in:

22 / 100

7. virus is activated on the basis of a logical condition:

23 / 100

6. viruses infects the first sector of disk:

24 / 100

5. represents of wizard of DBMS:

25 / 100

I. A database consists of various components called the

26 / 100

15. FTP stands for:

27 / 100

14. Which of service of Internet is used to transfer files:

28 / 100

10. If “Yahoo.com” is a domain name, then what will be the top level domain?

29 / 100

II. Which of the following protocol is used to access web pages on World Wide Web?

30 / 100

15. involves the processing on multiple processors in a computer:

31 / 100

is most necessary to interact with the computer:

32 / 100

5. Ctrl + Alt + Del is

33 / 100

14. The capability of an operating system to load multiple program into memory at a time and to perform two or more processes concurrently, is called:

34 / 100

is an example of command line operating system:

35 / 100

3. The process of transferring data from one location to another is called:

36 / 100

2. Data communication requires only a:

37 / 100

5. is component of data communication:

38 / 100

14. The height of wave within a given period of time is called:

39 / 100

7. A device that receives messages is called:

40 / 100

16. Modern computer can perform calculations or process at high speed

41 / 100

9. Computer at home can be used

42 / 100

scanners is used in hospitals:

43 / 100

The fly-by-wire system is used in:

44 / 100

6. The benefit of CAD may be summed up as

45 / 100

17. SQL is used for

46 / 100

3. Anything in the real world that has a set of different attributes or properties is called:

47 / 100

represents an entity

48 / 100

14. Which component of computer is responsible for comparison of two numbers?

49 / 100

13. Which component of computer coordinates all activities in the computer?

50 / 100

18. CPU is an example of:

51 / 100

16. CPU includes all of the following components except?

52 / 100

20. The last statement of each case in switch statement must be a:

53 / 100

6. The selection statement is also known as:

54 / 100

9. Which of the following is an optional part in switch statement?

55 / 100

1. Which of the following is not a decision making statement

56 / 100

17. The conditional operator takes expression.

57 / 100

16. The conditional operator is an alternative of:

58 / 100

2. Which of the following operator is used as decision making statement

59 / 100

18. The data and program are stored permanently on the:

60 / 100

A device used for optical character recognition is a:

61 / 100

Data processing is also called:

62 / 100

7. The currently selected cell where data can be entered or edited is called:

63 / 100

3. The intersection of a row and column form a:

64 / 100

18. The default number format assigned to a cell is the:

65 / 100

20. If the custom format is If it, it N N then the number 23349 will be displayed as:

66 / 100

2. is most commonly used word processing package:

67 / 100

5. During text entering process into document. the cursor automatically shifts to the next line when it reaches to the right margin. This feature of word processor is called:

68 / 100

7. features of word processor allows to specify margins of the documents:

69 / 100

9. The bar that displays the name of program and the name of documents is called:

70 / 100

is not a valid variable

71 / 100

13. is valid variable name

72 / 100

A quantity whose value cannot change during execution of

73 / 100

10. The symbol = represents:

74 / 100

3. Which of the data type offers the highest precision?

75 / 100

18. a b is equivalent to

76 / 100

5. The computer program is written in:

77 / 100

2. Turbo C-H- can compile

78 / 100

7. is not a high level language:

79 / 100

15. The do-while loop ends with a

80 / 100

18. is related to loop structures:

81 / 100

6. Which one is not a loop structure

82 / 100

4. loop structures are available in C language:

83 / 100

14. Semicolon is placed at the end of condition in:

84 / 100

8. In while loop, the loop control variable always initialized

85 / 100

12. The while loop is also called: (a) conditional loop (b) (c) counter loop (d)
while Both (b) and (c)
wend loop Attribute

86 / 100

13. The printf() is a:

87 / 100

16. A built-in function:

88 / 100

18. The name of actual and formal parameters:

89 / 100

12. Formal arguments are also called

90 / 100

2. Global variables are created in

91 / 100

17. How many digits are printed to the right of the decimal point in real number?

92 / 100

7 . is control suing in the statement prinf(“Result = %d”,r);:

93 / 100

12. In a school the record of cricket and hockey team organized into two groups is referred as

94 / 100

7. Which of the following is not related to data manipulation?

95 / 100

In activity data is collected and recorded:

96 / 100

2. Which of the following data model is more flexible?

97 / 100

8. represents an object:

98 / 100

2. A collection of computers connected together is called:

99 / 100

I. A LAN is a combination of:

100 / 100

6. What layer of OSI does data compression:

Your score is

The average score is 58%

0%




Learn Anytime Anywhere

PakLearningSpot

Download PLS Mobile App from Google Play Store

,

error: Content is protected !!
Open chat
Salam
Can we help you?