Computer Sciences Practice Test 2





Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

323

Computer Practice Test 2

1 / 100

20. Computer based weather forecasting depends on accurate collection of data from

2 / 100

is not related to document management system:

3 / 100

scanners is used in hospitals:

4 / 100

10. A word processor can be used to

5 / 100

19. CAT stands for

6 / 100

15. Typically, and ATM can be used to

7 / 100

The fly-by-wire system is used in:

8 / 100

13. A set of related characters that represent a unit of data is called

9 / 100

3. Which of the following type of file require largest processing time?

10 / 100

Q2. Select the correct option I. Which of the following represents a collection of concepts that arc used to describe the structure of a database?

11 / 100

2. Which of the following data model is more flexible?

12 / 100

10. Which network model consists of many clients and one or more central computers?

13 / 100

22. All nodes are connected to a single cable in a:

14 / 100

4. The larger computer to which the terminal or PC is attached is called:

15 / 100

13. standards were properly researched, designed and finally published as a standard:

16 / 100

7. Cabling on a linear bus topology can be extended using which of following:

17 / 100

FDD1 is a:

18 / 100

16. Which of the following requires no translator to execute the program?

19 / 100

5. control structures executes program statements one after another:

20 / 100

7. Another name of conditional operator is

21 / 100

15. is not used for making two-way decision:

22 / 100

4. Which one is a control structure?

23 / 100

20. The last statement of each case in switch statement must be a:

24 / 100

15. is the component of CPU:

25 / 100

14. Which component of computer is responsible for comparison of two numbers?

26 / 100

17. The cells of memory are logically organized into group of

27 / 100

12. Which is a storage device?

28 / 100

RAM is a:

29 / 100

II. Which of the following protocol is used to access web pages on World Wide Web?

30 / 100

19. represents URL address:

31 / 100

4. MS-Access is a:

32 / 100

19. is a statement that extracts specific information database.

33 / 100

13. In a table each column represents

34 / 100

For the input of image data:

35 / 100

13. is not an application software:

36 / 100

Data processing is also called:

37 / 100

The name for the screen clarity:

38 / 100

2. The escape sequence for backslash is:

39 / 100

4. The printf() function is used to display:

40 / 100

8. The functions used for input and output are stored in header file:

41 / 100

5. is not used in control or format string in a prindo function:

42 / 100

1. The function getch() is defined in:

43 / 100

3. function is used to display output on screen:

44 / 100

18. is used with format specifier to display output left-justified:

45 / 100

7 . is control suing in the statement prinf(“Result = %d”,r);:

46 / 100

6. The forms are the end of our database in Microsoft Access

47 / 100

14. views can be used to add, edit, and delete records to and from the table:

48 / 100

8. Which of the following buttons of Find and Replace dialog box is clicked to start he search process?

49 / 100

7. The number of fields in a relation or table is called:

50 / 100

3. The fundamental concept of relational database is:

51 / 100

20. is not related to an entity:

52 / 100

7. In ERD model, the relationship between two entities is represented by a

53 / 100

How many keywords are in C?

54 / 100

16. C is a strongly typed language, this means that:

55 / 100

18. a b is equivalent to

56 / 100

3. Which of the data type offers the highest precision?

57 / 100

15. menus contains the ‘Cells’ command:

58 / 100

4. The actual working area in Microsoft Excel is:

59 / 100

13. represents a label:

60 / 100

18. The default number format assigned to a cell is the:

61 / 100

20. If the custom format is If it, it N N then the number 23349 will be displayed as:

62 / 100

8. In a worksheet, a bold rectangle border indicates (n):

63 / 100

14. The insertion point in the document is also called:

64 / 100

16. keys of keyboard in conjunction with arrow keys is used for selecting text:

65 / 100

II. The bar that shows the total pages of document, position of cursor etc. is called:

66 / 100

19. contains the files and folders that are deleted from the hard disk:

67 / 100

13. is based on the NT technology:

68 / 100

is most necessary to interact with the computer:

69 / 100

11. As compared to command line operating system, a GUI operating system is:

70 / 100

15. Which type of data consists of words, sentences, and paragraphs?

71 / 100

17. The music and speech represent the: (a) Image data (b) Audio data (c) Video data (d) Text data

72 / 100

12. Light, sound, and radio waves are examples of:

73 / 100

6. is not component of data communication:

74 / 100

9. The rows of a table or relation are known as:

75 / 100

11. is used to create data view

76 / 100

16. is known as control key:

77 / 100

14. A key that consists of two or more than two attributes of a table is called

78 / 100

6. A table is also known as

79 / 100

9. The actual values are passed to the function in:

80 / 100

12. Formal arguments are also called

81 / 100

2. Global variables are created in

82 / 100

15. The last statement of the body of the fimction is:

83 / 100

7. A function is called with the reference of its:

84 / 100

15. Security Protection for personal computer include:

85 / 100

13. Types of software that can be freely distributed without violating copyright laws are called:

86 / 100

12. is cause of virus:

87 / 100

17. Which is not an antivirus program?

88 / 100

5. Most common crimes are committed by:

89 / 100

8. Format C is an example of virus:

90 / 100

12. The while loop is also called: (a) conditional loop (b) (c) counter loop (d)
while Both (b) and (c)
wend loop Attribute

91 / 100

16. The loop will execute at least even the condition is false

92 / 100

8. In while loop, the loop control variable always initialized

93 / 100

5. is called counter loop:

94 / 100

17. If a relation is in INF and the key consists of a single attributes then the relation is called.

95 / 100

4. In 3NF, a non-key attribute must not depend on a(n)

96 / 100

20. A process of analyzing the dependencies of attributes with in entities is called

97 / 100

19. A process in which it is being ensured that attributes are stored from where they belong

98 / 100

14. A foreign key constraint is also called

99 / 100

5. Different attributes in two different tables having same name are referred to as (

100 / 100

13. Integrity is concerned with the (

Your score is

The average score is 60%

0%

,

Protected

Open chat
Salam
Can we help you?