Computer Sciences Practice Test 2




Computer Science Practice Tests Overview

Computer Science Practice Tests are an important resource for students preparing for NUST, FAST, UET, ECAT, NTS, and FSC board exams. These tests focus on essential topics such as programming, data structures, algorithms, databases, and computer fundamentals. Regular practice helps students strengthen technical knowledge, improve problem-solving skills, and gain confidence in solving exam-style questions.

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

363

Computer Practice Test 2

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

3. A word processor includes the process of

2 / 100

10. The bar that contains the group of commands is called:

3 / 100

2. is most commonly used word processing package:

4 / 100

19. Font size is measure in:

5 / 100

6. features of word processor allows to insert text from one file into another file:

6 / 100

14. The insertion point in the document is also called:

7 / 100

18. A common font size used in business documents is:

8 / 100

is the ingredient of data modeling:

9 / 100

16. In E-R diagram, a diamond shape is used to represent a(n):

10 / 100

4. In activities, the possible inputs for the database are collected:

11 / 100

18. An index may be created on

12 / 100

10. The column of relation is known as

13 / 100

16. is known as control key:

14 / 100

6. A table is also known as

15 / 100

14. A query is a more flexible way of

16 / 100

15. A step by step procedure to perform a task easily available in a software is called

17 / 100

16. Using you can create tables, forms, reports and queries in very short time

18 / 100

2. Which of the following object is used to retrieve data from database and present in a formatted way?

19 / 100

8. GUI stands for:

20 / 100

19. contains the files and folders that are deleted from the hard disk:

21 / 100

15. involves the processing on multiple processors in a computer:

22 / 100

is an example of command line operating system:

23 / 100

16. is the entering point in Windows:

24 / 100

13. function is used as formatted output file function:

25 / 100

7.function is used to write a string to a file:

26 / 100

3. Debug is the process of:

27 / 100

6. The programming languages that are close to human language are called:

28 / 100

4. A set of instruction given to the computer is called:

29 / 100

20. languages is different for different computers:

30 / 100

9. Software that is used to detect and remove the viruses from the computer is called:

31 / 100

3. A virus can destroy: (

32 / 100

13. standards were properly researched, designed and finally published as a standard:

33 / 100

6. What layer of OSI does data compression:

34 / 100

11. The body of I comes er the test condition in:

35 / 100

3. The loop which never ends is called:

36 / 100

5. is called counter loop:

37 / 100

2. is a loop statement:

38 / 100

8. In while loop, the loop control variable always initialized

39 / 100

7. A variable whose value controls the number of iterations is known as

40 / 100

The infonnation that is to be transferred from one location to another is called:

41 / 100

I I. Communication between a computer and a keyboard involves transmission:

42 / 100

3. The process of transferring data from one location to another is called:

43 / 100

19. coding schemes uses 4 bit code:

44 / 100

7. A device that receives messages is called:

45 / 100

Who owns the Internet?

46 / 100

12. Which one represents the top level domain?

47 / 100

II. Which of the following protocol is used to access web pages on World Wide Web?

48 / 100

13. Integrity is concerned with the (

49 / 100

11. A functional dependency between two or more non-key attributes in a relation is called

50 / 100

9. problems occurs when same information is stored in two different ways:

51 / 100

20. A process of analyzing the dependencies of attributes with in entities is called

52 / 100

is category software:

53 / 100

Data processing is also called:

54 / 100

16. CPU is also referred to as:

55 / 100

20. Computer based weather forecasting depends on accurate collection of data from

56 / 100

17. Computer at home can be used for:

57 / 100

is not relevant to office automation:

58 / 100

19. CAT stands for

59 / 100

11. selection structures is the simplest form of decision making structure:

60 / 100

18. Which operator in C language is called ternary operator?

61 / 100

7. Another name of conditional operator is

62 / 100

15. is not used for making two-way decision:

63 / 100

3. function is used to display output on screen:

64 / 100

15. format specifiers is used for float type data:

65 / 100

11. The escape sequence for carriage return is

66 / 100

1. The function getch() is defined in:

67 / 100

0. The format specifier %u is used for:

68 / 100

12. Which of the following forma specifier is used for character type data

69 / 100

2. The escape sequence for backslash is:

70 / 100

13. What will be the output of printf(“%d”,’a’);

71 / 100

is not a valid variable

72 / 100

19. The words used to write the statements of a program are called

73 / 100

17. The logical not (!) operator is denoted as:

74 / 100

3. The intersection of a row and column form a:

75 / 100

9. is not a feature of spreadsheet program:

76 / 100

19. If the custom format is 00000 then the number 420 will be displayed as:

77 / 100

9. The program that contains instructions to operate a device is called:

78 / 100

13. Which component of computer coordinates all activities in the computer?

79 / 100

4. Which one is the brain of computer?

80 / 100

8. Which of the following is used to retrieve data from one or more tables of database and to present it to the user in a formatted way.

81 / 100

5. Forms are designed for:

82 / 100

9. Tables are the 1 of our database in Microsoft Access

83 / 100

2. How many basic layouts of forms are here in Microsoft Access.

84 / 100

12. Form with in a form is called

85 / 100

4. A form is an object of

86 / 100

19. If there are small fmite number of values for a certain field on a form which object will be suitable

87 / 100

15. Which is not an example of a control element placed on the form

88 / 100

3. Which of the following is true about a function call?

89 / 100

5. The functions that are defined by programmer are called:

90 / 100

9. The actual values are passed to the function in:

91 / 100

13. The printf() is a:

92 / 100

9. The manipulated and processed data is called:

93 / 100

18. Which of the following database model has the shape like and organizational chart?

94 / 100

13. A set of related characters that represent a unit of data is called

95 / 100

In activity data is collected and recorded:

96 / 100

17. Which of the following refers to the correctness and consistency of data?

97 / 100

14. A set of related fields that represent a unit of data is called

98 / 100

5. is the object of MS-Access database file:

99 / 100

15. The relationship between countries and their capitals is an example of relationships.

100 / 100

17. The maximum length of text type field is:

Your score is

The average score is 61%

0%

Importance of Practicing Computer Science Tests

Consistent practice of Computer Science tests enhances logical reasoning, analytical thinking, and coding abilities. Topic-wise and full-length tests allow students to identify weak areas, revise important concepts, and minimize errors. Timed practice also helps students manage exam pressure and solve questions efficiently within the allotted time.

PLS Academy Computer Science Test Preparation

PLS Academy offers well-designed Computer Science Practice Tests with exam-focused MCQs, detailed solutions, and full syllabus coverage. With expert guidance and structured practice material, PLS Academy helps students master computer science concepts and achieve top scores in entry tests and FSC board exams.

JazakAllah

BIG SALE! FLAT 50% OFF

Protected