Computer Sciences Practice Test 3





Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

158

Computer Practice Test 3

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

0. Which of the following looks for the prototype of functions used in a program:

2 / 100

4. The predefined functions that are part of C-language are called: (

3 / 100

14. The actual body of the function is defined in:

4 / 100

15. The last statement of the body of the fimction is:

5 / 100

1. Functions prototype for built-in functions are specified in:

6 / 100

8. A function:

7 / 100

10. structure executes the body of loop at least once:

8 / 100

5. is called counter loop:

9 / 100

18. is related to loop structures:

10 / 100

18. A Word processor can be used to:

11 / 100

16. Modern computer can perform calculations or process at high speed

12 / 100

is not related to business:

13 / 100

3. is the most popular and powerful DBMS:

14 / 100

2. Which of the following object is used to retrieve data from database and present in a formatted way?

15 / 100

4. A set of instruction given to the computer is called:

16 / 100

13. The symbols used to write instructions in assembly language are called:

17 / 100

14. C was designed to write programs for

18 / 100

2. Turbo C-H- can compile

19 / 100

6. The programming languages that are close to human language are called:

20 / 100

3. Central computer in the network is called:

21 / 100

21. One or more computers connected to a hub is a:

22 / 100

FDD1 is a:

23 / 100

2. A collection of computers connected together is called:

24 / 100

5. In activities, the cost factors are taken into consideration:

25 / 100

In E-R diagram, a rectangular box is used to represent a(n):

26 / 100

15. In E-R diagram, an oval shape is used to represent a(n):

27 / 100

15. How many typing modes are provided by word processor?

28 / 100

7. features of word processor allows to specify margins of the documents:

29 / 100

17. The bold text specifies the: (

30 / 100

6. features of word processor allows to insert text from one file into another file:

31 / 100

9. The bar that displays the name of program and the name of documents is called:

32 / 100

14. The insertion point in the document is also called:

33 / 100

15. There are types of streams

34 / 100

14. If programs get input data from data file and also send output into data file. It is called:

35 / 100

10. A logical interface to a file is called

36 / 100

8. To store data for future use it must be stored on

37 / 100

16. In file handling sequence of characters refers to

38 / 100

8. represents an object:

39 / 100

4. Which of the following may be a temporary file?

40 / 100

20. The process of arranging data in a proper order is called:

41 / 100

16. A set of related files that represent a unit of data is called

42 / 100

12. The maximum number of primary partitions that can be created on a disk is

43 / 100

An Operating System is a

44 / 100

18. acts as file manager for Windows: (

45 / 100

19. contains the files and folders that are deleted from the hard disk:

46 / 100

organizes and controls the hardware and software:

47 / 100

5. Ctrl + Alt + Del is

48 / 100

20. protocol is used by news services:

49 / 100

Who owns the Internet?

50 / 100

For the input of image data:

51 / 100

Collection of raw facts and figures is called:

52 / 100

An electronic device that accepts, processes data and products information is called: (a) Input device (b) Computer (c) Output devices (d) Operating system

53 / 100

10. is an example of system software:

54 / 100

10. The symbol = represents:

55 / 100

14. Which of the following characters cannot be used as first character of a variable name?

56 / 100

13. is valid variable name

57 / 100

20. The last statement of each case in switch statement must be a:

58 / 100

18. Which operator in C language is called ternary operator?

59 / 100

13. Which of the following operators is used as decision-making statement?

60 / 100

2. Which of the following operator is used as decision making statement

61 / 100

5. control structures executes program statements one after another:

62 / 100

6. The selection statement is also known as:

63 / 100

7. Another name of conditional operator is

64 / 100

9. Which of the following is an optional part in switch statement?

65 / 100

15. is not used for making two-way decision:

66 / 100

19. If the custom format is 00000 then the number 420 will be displayed as:

67 / 100

10. The actual working area in Microsoft Excel is

68 / 100

20. If the custom format is If it, it N N then the number 23349 will be displayed as:

69 / 100

19. coding schemes uses 4 bit code:

70 / 100

17. The music and speech represent the: (a) Image data (b) Audio data (c) Video data (d) Text data

71 / 100

Microwave transmission, coaxial cables and fiber optic are examples of:

72 / 100

6. The forms are the end of our database in Microsoft Access

73 / 100

12. Form with in a form is called

74 / 100

20. In addition to navigate records can be used for

75 / 100

14. The different design elements placed on form are called

76 / 100

3. Anything in the real world that has a set of different attributes or properties is called:

77 / 100

2. The foreign key is found in

78 / 100

1. Insert command is used to insert.

79 / 100

11. is used to create data view

80 / 100

20. is responsible for designing, coordinating and monitoring the database system: (

81 / 100

represents an entity

82 / 100

18. Which of the following is responsible for designing the database system.

83 / 100

17. SQL is used for

84 / 100

is used to identify records of a relation uniquely:

85 / 100

20. A process of analyzing the dependencies of attributes with in entities is called

86 / 100

4. In 3NF, a non-key attribute must not depend on a(n)

87 / 100

4. The printf() function is used to display:

88 / 100

7. virus is activated on the basis of a logical condition:

89 / 100

5. Most common crimes are committed by:

90 / 100

14. Another name for antivirus is:

91 / 100

15. Security Protection for personal computer include:

92 / 100

19. What is the most common computer crime of these listed below?

93 / 100

8. Format C is an example of virus:

94 / 100

7. The number of fields in a relation or table is called:

95 / 100

4. The actual data of database is stored in:

96 / 100

3. The fundamental concept of relational database is:

97 / 100

19. is the default data e in MS-Access:

98 / 100

12. The data in table is entered in:

99 / 100

RAM is a:

100 / 100

15. is the component of CPU:

Your score is

The average score is 70%

0%

,

Protected

Open chat
Salam
Can we help you?