Computer Sciences Practice Test 3





Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

162

Computer Practice Test 3

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

13. In a table each column represents

2 / 100

16. Using you can create tables, forms, reports and queries in very short time

3 / 100

The actual data of Is stored in:

4 / 100

14. A query is a more flexible way of

5 / 100

to automate repeated tasks — are used

6 / 100

13. standards were properly researched, designed and finally published as a standard:

7 / 100

3. Central computer in the network is called:

8 / 100

4. The larger computer to which the terminal or PC is attached is called:

9 / 100

FDD1 is a:

10 / 100

3. How many basic control structures are there?

11 / 100

6. The selection statement is also known as:

12 / 100

10. structures is a selection structure:

13 / 100

19. What will be the output of (7 > 8) ?printf(“ABC”):printf(“XYZ”);

14 / 100

11. selection structures is the simplest form of decision making structure:

15 / 100

17. The bold text specifies the: (

16 / 100

19. Font size is measure in:

17 / 100

12. Which of the following can be used to launch the WordArt?

18 / 100

15. How many typing modes are provided by word processor?

19 / 100

9. Software that is used to detect and remove the viruses from the computer is called:

20 / 100

7. virus is activated on the basis of a logical condition:

21 / 100

1. A virus program usually hidden in:

22 / 100

15. Security Protection for personal computer include:

23 / 100

4. The actual working area in Microsoft Excel is:

24 / 100

13. represents a label:

25 / 100

language is known as fundamental computer language:

26 / 100

2. Turbo C-H- can compile

27 / 100

19. The instructions written in machine language are in the form of:

28 / 100

C is a:

29 / 100

8. The programming language that are very close to machine code are called:

30 / 100

9. is not a low-level language:

31 / 100

16. Which of the following requires no translator to execute the program?

32 / 100

15. There are types of streams

33 / 100

16. In file handling sequence of characters refers to

34 / 100

9. A collection of related records is called

35 / 100

20. is true about a stream:

36 / 100

19. The escape sequence to insert horizontal tab is

37 / 100

6. How many variables can be used in one printf() function?

38 / 100

20. Which of the following format specifier is used for string type data?

39 / 100

17. How many digits are printed to the right of the decimal point in real number?

40 / 100

13. What will be the output of printf(“%d”,’a’);

41 / 100

Q2. Select the correct option I. Which of the following represents a collection of concepts that arc used to describe the structure of a database?

42 / 100

15. A set of related records that represent a unit of data is called

43 / 100

7. Which of the following is not related to data manipulation?

44 / 100

In activity data is collected and recorded:

45 / 100

13. A set of related characters that represent a unit of data is called

46 / 100

12. In a school the record of cricket and hockey team organized into two groups is referred as

47 / 100

9. The manipulated and processed data is called:

48 / 100

2. A set of instructions that run the computer arc:

49 / 100

I I. CPU is an example of:

50 / 100

13. Which component of computer coordinates all activities in the computer?

51 / 100

5. Which component of a computer decodes and executes program consuvetions?

52 / 100

Data processing is also called:

53 / 100

The name for the screen clarity:

54 / 100

20. is not secondary storage device:

55 / 100

17. The logical not (!) operator is denoted as:

56 / 100

. A quantity whose value may change during execution of program is called:

57 / 100

19. The words used to write the statements of a program are called

58 / 100

17. Computer at home can be used for:

59 / 100

3. device is used in banks to read cheque of customer:

60 / 100

is not related to business:

61 / 100

20. Computer based weather forecasting depends on accurate collection of data from

62 / 100

is not relevant to office automation:

63 / 100

7. problems occurs when two different names are used for the same information?

64 / 100

2. How many types of data integrity are there?

65 / 100

19. structure is used when programmer does not know is advance the number of repetition of loop?

66 / 100

11. The body of I comes er the test condition in:

67 / 100

18. is related to loop structures:

68 / 100

16. The loop will execute at least even the condition is false

69 / 100

20. coding schemes is used by IBM:

70 / 100

10. BIT stands for

71 / 100

14. views can be used to add, edit, and delete records to and from the table:

72 / 100

9. As in design view, you can move from field to field in the table window in datasheet view using button.

73 / 100

13. The structure of table is designed in:

74 / 100

5. is the object of MS-Access database file:

75 / 100

19. represents entity:

76 / 100

9. The process to identify the data objects and the relationships between them is:

77 / 100

10. The relationship between the entities is represented graphically by using:

78 / 100

17. A technique for physically arranging the records of a file on secondary storage device is called

79 / 100

In E-R diagram, a rectangular box is used to represent a(n):

80 / 100

Who owns the Internet?

81 / 100

18. Web pages are linked together using?

82 / 100

2. A collection of millions of computers interlink to one another is called:

83 / 100

19. represents URL address:

84 / 100

13. services is provided by Internet:

85 / 100

6. Mother name for built-in function is:

86 / 100

3. Which of the following is true about a function call?

87 / 100

9. The actual values are passed to the function in:

88 / 100

7. A function is called with the reference of its:

89 / 100

1. Functions prototype for built-in functions are specified in:

90 / 100

13. The printf() is a:

91 / 100

19. If there are small fmite number of values for a certain field on a form which object will be suitable

92 / 100

1. A form that contains the sub form is called

93 / 100

7. A auto form displays one record at a time.

94 / 100

8. Which of the following is used to retrieve data from one or more tables of database and to present it to the user in a formatted way.

95 / 100

5. Forms are designed for:

96 / 100

organizes and controls the hardware and software:

97 / 100

11. As compared to command line operating system, a GUI operating system is:

98 / 100

1. Insert command is used to insert.

99 / 100

13. A table must have:

100 / 100

3. Anything in the real world that has a set of different attributes or properties is called:

Your score is

The average score is 70%

0%

,

BIG SALE! FLAT 40% OFF

<p>Protected</p>
Open chat
Salam
Can we help you?