Computer Sciences Practice Test 3




Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

172

Computer Practice Test 3

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

17. If a relation is in INF and the key consists of a single attributes then the relation is called.

2 / 100

8. problems occurs when same name is used for two different attributes:

3 / 100

7. problems occurs when two different names are used for the same information?

4 / 100

15. In which of the following normal forms, any repeating group from the table is removed?

5 / 100

18. If the value of a non-key attribute can be obtained simply by knowing the values of another non-key attribute, the relation is not in: (

6 / 100

1. In 3NF, which form of dependency is removed? (

7 / 100

3. The constraint states that in a relation no primary key value can have a null value.

8 / 100

15. In E-R diagram, an oval shape is used to represent a(n):

9 / 100

3. On successfully closing a file , the fclose( ) returns:

10 / 100

15. There are types of streams

11 / 100

1. A file is stored in

12 / 100

15. An inkjet printer is an example of a(n):

13 / 100

is secondary storage device:

14 / 100

CPU stands for:

15 / 100

18. The data and program are stored permanently on the:

16 / 100

is category software:

17 / 100

18. is the fundamental property of relational database:

18 / 100

17. A place where we can see all the tables and their relationship

19 / 100

13. In a table each column represents

20 / 100

19. is a statement that extracts specific information database.

21 / 100

17. Windows explorer is used to

22 / 100

16. is the entering point in Windows:

23 / 100

18. The form which contains the subform is known as:

24 / 100

9. is not a low-level language:

25 / 100

13. The symbols used to write instructions in assembly language are called:

26 / 100

4. A set of instruction given to the computer is called:

27 / 100

6. The programming languages that are close to human language are called:

28 / 100

10. The computer understands the instructions only in:

29 / 100

18. A Word processor can be used to:

30 / 100

scanners is used in hospitals:

31 / 100

15. Typically, and ATM can be used to

32 / 100

8. In while loop, the loop control variable always initialized

33 / 100

14. Semicolon is placed at the end of condition in:

34 / 100

12. The while loop is also called: (a) conditional loop (b) (c) counter loop (d)
while Both (b) and (c)
wend loop Attribute

35 / 100

1. How many types of loop structur are in C?

36 / 100

3. The loop which never ends is called:

37 / 100

8. In a worksheet, a bold rectangle border indicates (n):

38 / 100

7. The currently selected cell where data can be entered or edited is called:

39 / 100

14. The 0.0000000001 is displayed in default column width as:

40 / 100

5. A cell at third column and 15 rows has a cell address:

41 / 100

a spreadsheet:

42 / 100

4. When the result of the computation of two very small numbers is too small to be represented, this phenomenon is called:

43 / 100

15. In C, the maximum length of variable name is:

44 / 100

A quantity whose value cannot change during execution of

45 / 100

10. The symbol = represents:

46 / 100

16. C is a strongly typed language, this means that:

47 / 100

12. Relational operators are used to

48 / 100

Which one is dedicated server?

49 / 100

19. Which one represents the shape of network?

50 / 100

17. Which one is an example of De-Facto standard?

51 / 100

12. In which network model all computers have equal status?

52 / 100

11. How may table view are available in MS-Access?

53 / 100

8. Which of the following buttons of Find and Replace dialog box is clicked to start he search process?

54 / 100

13. The structure of table is designed in:

55 / 100

The data in table is entered in

56 / 100

12. The data in table is entered in:

57 / 100

4. The actual data of database is stored in:

58 / 100

12. Formal arguments are also called

59 / 100

9. The actual values are passed to the function in:

60 / 100

16. A built-in function:

61 / 100

7. A function is called with the reference of its:

62 / 100

2. Global variables are created in

63 / 100

14. The insertion point in the document is also called:

64 / 100

2. Data communication requires only a:

65 / 100

17. The music and speech represent the: (a) Image data (b) Audio data (c) Video data (d) Text data

66 / 100

16. The charts, graphs and pictures are examples of:

67 / 100

6. is not component of data communication:

68 / 100

3. The process of transferring data from one location to another is called:

69 / 100

Microwave transmission, coaxial cables and fiber optic are examples of:

70 / 100

9. The electromagnetic or light waves representing data are called:

71 / 100

7. virus is activated on the basis of a logical condition:

72 / 100

4. Viruses are transferred from one computer to another due to:

73 / 100

1. A virus program usually hidden in:

74 / 100

19. What is the most common computer crime of these listed below?

75 / 100

12. is cause of virus:

76 / 100

5. Most common crimes are committed by:

77 / 100

12. In a school the record of cricket and hockey team organized into two groups is referred as

78 / 100

4. Which of the following may be a temporary file?

79 / 100

19. In a college, organizing the record of Science and Arts students into two groups, this activity is referred to as

80 / 100

8. represents an object:

81 / 100

20. The process of arranging data in a proper order is called:

82 / 100

10. A series of actions that are performed on raw data achieve the required objective and results are called:

83 / 100

5. control structures executes program statements one after another:

84 / 100

4. Which one is a control structure?

85 / 100

20. protocol is used by news services:

86 / 100

17. The process of launching web pages is called:

87 / 100

13. Which component of computer coordinates all activities in the computer?

88 / 100

The address of instruction under

89 / 100

RAM is a:

90 / 100

I I. CPU is an example of:

91 / 100

3. The idea of stored program was given by:

92 / 100

1. Data and programs that are not being use by computer are stored in:

93 / 100

12. Which is a storage device?

94 / 100

18. CPU is an example of:

95 / 100

19. serves as a bridge between end users and database administrator:

96 / 100

14. A key that consists of two or more than two attributes of a table is called

97 / 100

1. Insert command is used to insert.

98 / 100

13. What will be the output of printf(“%d”,’a’);

99 / 100

14. format specifiers is used for integer type data:

100 / 100

8. The functions used for input and output are stored in header file:

Your score is

The average score is 70%

0%

BIG SALE! FLAT 50% OFF

MDCAT Best Book 2025

Protected