FSC Computer Full Book MCQs Test 2


Entry test 2023 contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT 2023, ECAT 2023, NTS NAT 2023, and NUST NET 2023. PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

116

Computer Practice Test 2

1 / 100

5. The functions that are defined by programmer are called:

2 / 100

18. The name of actual and formal parameters:

3 / 100

2. A virus is just a:

4 / 100

20. media is used for backup:

5 / 100

13. Types of software that can be freely distributed without violating copyright laws are called:

6 / 100

12. is cause of virus:

7 / 100

14. Another name for antivirus is:

8 / 100

19. What is the most common computer crime of these listed below?

9 / 100

17. Which is not an antivirus program?

10 / 100

13. A form with multiple tabs and each tab consisting a page of information

11 / 100

17. A Form within another form is called:

12 / 100

7. A auto form displays one record at a time.

13 / 100

15. Which is not an example of a control element placed on the form

14 / 100

12. Form with in a form is called

15 / 100

6. The forms are the end of our database in Microsoft Access

16 / 100

13. A table must have:

17 / 100

15. Preprocessor directives are commands for

18 / 100

7. is not a high level language:

19 / 100

18. is related to loop structures:

20 / 100

1. How many types of loop structur are in C?

21 / 100

6. Which one is not a loop structure

22 / 100

15. The do-while loop ends with a

23 / 100

20. Loop with in a loop is called

24 / 100

8. tools in involved to the Data Analysis:

25 / 100

5. In activities, the cost factors are taken into consideration:

26 / 100

18. An index may be created on

27 / 100

19. represents entity:

28 / 100

7. In ERD model, the relationship between two entities is represented by a

29 / 100

10. The relationship between the entities is represented graphically by using:

30 / 100

6. Database development process involve mapping of conceptual data model into

31 / 100

9. The process to identify the data objects and the relationships between them is:

32 / 100

The address of instruction under

33 / 100

12. Which is a storage device?

34 / 100

6. The component of computer that stores data and program while these are being executed is called:

35 / 100

5. Which component of a computer decodes and executes program consuvetions?

36 / 100

18. The data and program are stored permanently on the:

37 / 100

Another word for pointer:

38 / 100

For the input of image data:

39 / 100

20. is not secondary storage device:

40 / 100

Data processing is also called:

41 / 100

The infonnation that is to be transferred from one location to another is called:

42 / 100

3. The process of transferring data from one location to another is called:

43 / 100

19. coding schemes uses 4 bit code:

44 / 100

9. The electromagnetic or light waves representing data are called:

45 / 100

16. The charts, graphs and pictures are examples of:

46 / 100

2. is most commonly used word processing package:

47 / 100

18. A common font size used in business documents is:

48 / 100

20. A group of sentences is called: (

49 / 100

13. represents a label:

50 / 100

9. is not a feature of spreadsheet program:

51 / 100

17. Each number format consists of part:

52 / 100

12. cell addresses is correct:

53 / 100

1. Which of the following is a spreadsheet 2.

54 / 100

17. In text stream characters have correspondence

55 / 100

5. A data file a stored in:

56 / 100

16. The conditional operator is an alternative of:

57 / 100

9. Which of the following is an optional part in switch statement?

58 / 100

8. The functions used for input and output are stored in header file:

59 / 100

9. is used for flag:

60 / 100

15. format specifiers is used for float type data:

61 / 100

12. Which of the following forma specifier is used for character type data

62 / 100

13. What will be the output of printf(“%d”,’a’);

63 / 100

The actual data of Is stored in:

64 / 100

to automate repeated tasks — are used

65 / 100

14. Which of service of Internet is used to transfer files:

66 / 100

19. represents URL address:

67 / 100

16. The computers on the Internet that contain the web sites are called:

68 / 100

8. specifies the correct format of IP address:

69 / 100

7. How many types of addressing schemes?

70 / 100

14. A set of related fields that represent a unit of data is called

71 / 100

16. A set of related files that represent a unit of data is called

72 / 100

Q2. Select the correct option I. Which of the following represents a collection of concepts that arc used to describe the structure of a database?

73 / 100

6. The benefit of CAD may be summed up as

74 / 100

15. Typically, and ATM can be used to

75 / 100

is not related to document management system:

76 / 100

is not relevant to office automation:

77 / 100

14. A foreign key constraint is also called

78 / 100

2. How many types of data integrity are there?

79 / 100

18. If the value of a non-key attribute can be obtained simply by knowing the values of another non-key attribute, the relation is not in: (

80 / 100

11. As compared to command line operating system, a GUI operating system is:

81 / 100

5. Ctrl + Alt + Del is

82 / 100

8. GUI stands for:

83 / 100

2. The rule that a record from a table cannot be deleted if its associated record exists in a related table is called rule

84 / 100

8. Which of the following buttons of Find and Replace dialog box is clicked to start he search process?

85 / 100

11. How may table view are available in MS-Access?

86 / 100

14. views can be used to add, edit, and delete records to and from the table:

87 / 100

A quantity whose value cannot change during execution of

88 / 100

13. is valid variable name

89 / 100

15. In C, the maximum length of variable name is:

90 / 100

14. Which of the following characters cannot be used as first character of a variable name?

91 / 100

How many keywords are in C?

92 / 100

11. Which of the operator has lowest presidence

93 / 100

17. The logical not (!) operator is denoted as:

94 / 100

4. When the result of the computation of two very small numbers is too small to be represented, this phenomenon is called:

95 / 100

21. One or more computers connected to a hub is a:

96 / 100

18. is a governing body that approve the network standard:

97 / 100

13. standards were properly researched, designed and finally published as a standard:

98 / 100

17. Which one is an example of De-Facto standard?

99 / 100

7. Cabling on a linear bus topology can be extended using which of following:

100 / 100

12. In which network model all computers have equal status?

Your score is

The average score is 52%

0%




Learn Anytime Anywhere

PakLearningSpot

Download PLS Mobile App from Google Play Store

,

Kindly share MCQs & Explanations Here

Open chat
Salam
Can we help you?