Computer Sciences Practice Test 2





Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

348

Computer Practice Test 2

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

16. The charts, graphs and pictures are examples of:

2 / 100

18. data type represents actions and movements:

3 / 100

15. Which type of data consists of words, sentences, and paragraphs?

4 / 100

14. The height of wave within a given period of time is called:

5 / 100

7. A device that receives messages is called:

6 / 100

10. A series of actions that are performed on raw data achieve the required objective and results are called:

7 / 100

Q2. Select the correct option I. Which of the following represents a collection of concepts that arc used to describe the structure of a database?

8 / 100

In activity data is collected and recorded:

9 / 100

15. A set of related records that represent a unit of data is called

10 / 100

Who owns the Internet?

11 / 100

II. Which of the following protocol is used to access web pages on World Wide Web?

12 / 100

19. represents URL address:

13 / 100

10. structures is a selection structure:

14 / 100

18. Which operator in C language is called ternary operator?

15 / 100

12. is not decision-making statement:

16 / 100

1. Which of the following is not a decision making statement

17 / 100

13. Which of the following operators is used as decision-making statement?

18 / 100

20. is true about a stream:

19 / 100

19. In text file, data is stored in:

20 / 100

Which of the following mode open only an existing file for both reading and writing?

21 / 100

4. An array subscript should be a) int c) double

22 / 100

1. A file is stored in

23 / 100

3. device is used in banks to read cheque of customer:

24 / 100

20. Computer based weather forecasting depends on accurate collection of data from

25 / 100

19. CAT stands for

26 / 100

6. The benefit of CAD may be summed up as

27 / 100

18. Which of the following is responsible for designing the database system.

28 / 100

2. The foreign key is found in

29 / 100

11. is used to create data view

30 / 100

4. MS-Access is a:

31 / 100

The actual data of Is stored in:

32 / 100

to automate repeated tasks — are used

33 / 100

6. is element MS-Access application window:

34 / 100

1. Data and programs that are not being use by computer are stored in:

35 / 100

8. A computer drives its basic strength from:

36 / 100

18. CPU is an example of:

37 / 100

6. The component of computer that stores data and program while these are being executed is called:

38 / 100

13. Types of software that can be freely distributed without violating copyright laws are called:

39 / 100

2. A virus is just a:

40 / 100

16. A secret word or number to be typed by a keyboard before an activity can take place are called:

41 / 100

6. viruses infects the first sector of disk:

42 / 100

8. In while loop, the loop control variable always initialized

43 / 100

6. Which one is not a loop structure

44 / 100

11. The body of I comes er the test condition in:

45 / 100

9. The actual values are passed to the function in:

46 / 100

16. A built-in function:

47 / 100

8. A function:

48 / 100

4. The predefined functions that are part of C-language are called: (

49 / 100

15. The last statement of the body of the fimction is:

50 / 100

19. In C-language, subprograms are referred to as:

51 / 100

7 . is control suing in the statement prinf(“Result = %d”,r);:

52 / 100

0. The format specifier %u is used for:

53 / 100

12. Which of the following forma specifier is used for character type data

54 / 100

16. The %x is a format specifier for:

55 / 100

I. Which of the following keys does not hold uniqueness property

56 / 100

19. represents entity:

57 / 100

4. In activities, the possible inputs for the database are collected:

58 / 100

8. tools in involved to the Data Analysis:

59 / 100

I I. In hybrid distribution which kind of fragments are stored at only one site

60 / 100

is the ingredient of data modeling:

61 / 100

7. In ERD model, the relationship between two entities is represented by a

62 / 100

16. standards were developed without any formal planning:

63 / 100

22. All nodes are connected to a single cable in a:

64 / 100

20. Which one is not a network topology?

65 / 100

5. The process of sharing information among various members of workgroup through computer network is called:

66 / 100

9. Tables are the 1 of our database in Microsoft Access

67 / 100

10. How many are the layouts of Form in MS-Access?

68 / 100

5. Forms are designed for:

69 / 100

20. In addition to navigate records can be used for

70 / 100

18. The data and program are stored permanently on the:

71 / 100

The name for the screen clarity:

72 / 100

A device used for optical character recognition is a:

73 / 100

20. If the custom format is If it, it N N then the number 23349 will be displayed as:

74 / 100

II. A cell of worksheet, which is not active is called:

75 / 100

7. The currently selected cell where data can be entered or edited is called:

76 / 100

16. Which of the following is an absolute address?

77 / 100

organizes and controls the hardware and software:

78 / 100

8. GUI stands for:

79 / 100

15. involves the processing on multiple processors in a computer:

80 / 100

. Which of the following is a word processor (

81 / 100

15. How many typing modes are provided by word processor?

82 / 100

14. The insertion point in the document is also called:

83 / 100

20. A group of sentences is called: (

84 / 100

17. The bold text specifies the: (

85 / 100

II. The bar that shows the total pages of document, position of cursor etc. is called:

86 / 100

2. is most commonly used word processing package:

87 / 100

7. features of word processor allows to specify margins of the documents:

88 / 100

15. In C, the maximum length of variable name is:

89 / 100

17. The logical not (!) operator is denoted as:

90 / 100

14. views can be used to add, edit, and delete records to and from the table:

91 / 100

3. The fundamental concept of relational database is:

92 / 100

13. The structure of table is designed in:

93 / 100

19. A process in which it is being ensured that attributes are stored from where they belong

94 / 100

5. Different attributes in two different tables having same name are referred to as (

95 / 100

2. How many types of data integrity are there?

96 / 100

6. Referential integrity is applied on

97 / 100

4. In 3NF, a non-key attribute must not depend on a(n)

98 / 100

7. problems occurs when two different names are used for the same information?

99 / 100

6. The programming languages that are close to human language are called:

100 / 100

19. The instructions written in machine language are in the form of:

Your score is

The average score is 61%

0%

,

EID SALE! FLAT 60% OFF

Protected

Open chat
Salam
Can we help you?