Computer Sciences Practice Test 4





Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

131

Computer Practice Test 4

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

20. A process of analyzing the dependencies of attributes with in entities is called

2 / 100

2. How many types of data integrity are there?

3 / 100

10. The process of converting complex data structure into simple and stable data structure is called: a –

4 / 100

17. The music and speech represent the: (a) Image data (b) Audio data (c) Video data (d) Text data

5 / 100

12. Which of the following forma specifier is used for character type data

6 / 100

4. The printf() function is used to display:

7 / 100

16. The %x is a format specifier for:

8 / 100

6. How many variables can be used in one printf() function?

9 / 100

3. function is used to display output on screen:

10 / 100

0. The format specifier %u is used for:

11 / 100

20. Which of the following format specifier is used for string type data?

12 / 100

18. acts as file manager for Windows: (

13 / 100

20. By default, Windows save the documents created in MS-Word in the folder:

14 / 100

is not related to document management system:

15 / 100

3. device is used in banks to read cheque of customer:

16 / 100

18. A Word processor can be used to:

17 / 100

6. The benefit of CAD may be summed up as

18 / 100

10. Which component of CPU is responsible for performing arithmetic and logical operations on numeric data?

19 / 100

2. A set of instructions that run the computer arc:

20 / 100

I I. CPU is an example of:

21 / 100

12. Which is a storage device?

22 / 100

The address of instruction under

23 / 100

17. The cells of memory are logically organized into group of

24 / 100

The actual data of Is stored in:

25 / 100

13. In a table each column represents

26 / 100

5. represents of wizard of DBMS:

27 / 100

17. A place where we can see all the tables and their relationship

28 / 100

8. A record is a complete set of

29 / 100

4. In activities, the possible inputs for the database are collected:

30 / 100

I I. In hybrid distribution which kind of fragments are stored at only one site

31 / 100

20. is not related to an entity:

32 / 100

19. represents entity:

33 / 100

5. In activities, the cost factors are taken into consideration:

34 / 100

12. What indicates the connection between entites

35 / 100

In E-R diagram, a rectangular box is used to represent a(n):

36 / 100

6. Database development process involve mapping of conceptual data model into

37 / 100

11. is used to create data view

38 / 100

13. A table must have:

39 / 100

8. The columns of a relation correspond to:

40 / 100

5. During text entering process into document. the cursor automatically shifts to the next line when it reaches to the right margin. This feature of word processor is called:

41 / 100

7. features of word processor allows to specify margins of the documents:

42 / 100

9. The bar that displays the name of program and the name of documents is called:

43 / 100

18. A common font size used in business documents is:

44 / 100

15. The relationship between countries and their capitals is an example of relationships.

45 / 100

8. Which of the following buttons of Find and Replace dialog box is clicked to start he search process?

46 / 100

13. The structure of table is designed in:

47 / 100

11. How may table view are available in MS-Access?

48 / 100

5. control structures executes program statements one after another:

49 / 100

18. Which operator in C language is called ternary operator?

50 / 100

6. The selection statement is also known as:

51 / 100

2. Which of the following operator is used as decision making statement

52 / 100

7. A auto form displays one record at a time.

53 / 100

4. A form is an object of

54 / 100

17. A Form within another form is called:

55 / 100

9. Tables are the 1 of our database in Microsoft Access

56 / 100

4. Which of the following may be a temporary file?

57 / 100

13. A set of related characters that represent a unit of data is called

58 / 100

3. Which of the following type of file require largest processing time?

59 / 100

19. In a college, organizing the record of Science and Arts students into two groups, this activity is referred to as

60 / 100

8. represents an object:

61 / 100

8. To store data for future use it must be stored on

62 / 100

20. is true about a stream:

63 / 100

10. A logical interface to a file is called

64 / 100

14. If programs get input data from data file and also send output into data file. It is called:

65 / 100

19. In text file, data is stored in:

66 / 100

20. The predefined functions that are part of the programming language and can be used for different purposes are called:

67 / 100

1. Functions prototype for built-in functions are specified in:

68 / 100

6. Mother name for built-in function is:

69 / 100

15. The last statement of the body of the fimction is:

70 / 100

10. is not an anti-virus program:

71 / 100

5. Most common crimes are committed by:

72 / 100

13. Types of software that can be freely distributed without violating copyright laws are called:

73 / 100

16. A secret word or number to be typed by a keyboard before an activity can take place are called:

74 / 100

15. Security Protection for personal computer include:

75 / 100

19. What is the most common computer crime of these listed below?

76 / 100

1. A virus program usually hidden in:

77 / 100

4. Viruses are transferred from one computer to another due to:

78 / 100

14. Another name for antivirus is:

79 / 100

8. In while loop, the loop control variable always initialized

80 / 100

4. loop structures are available in C language:

81 / 100

17. The of for loop executed only once in the first iteration

82 / 100

3. The loop which never ends is called:

83 / 100

10. The computer understands the instructions only in:

84 / 100

language is known as fundamental computer language:

85 / 100

2. Turbo C-H- can compile

86 / 100

8. specifies the correct format of IP address:

87 / 100

19. represents URL address:

88 / 100

11. Which of the operator has lowest presidence

89 / 100

14. Which of the following characters cannot be used as first character of a variable name?

90 / 100

4. When the result of the computation of two very small numbers is too small to be represented, this phenomenon is called:

91 / 100

5. A cell at third column and 15 rows has a cell address:

92 / 100

15. menus contains the ‘Cells’ command:

93 / 100

8. In a worksheet, a bold rectangle border indicates (n):

94 / 100

14. The media Access Control Sub-layer resides in which layer:

95 / 100

13. standards were properly researched, designed and finally published as a standard:

96 / 100

CPU stands for:

97 / 100

10. is an example of system software:

98 / 100

is category software:

99 / 100

Collection of raw facts and figures is called:

100 / 100

18. The data and program are stored permanently on the:

Your score is

The average score is 70%

0%

,

Protected

Open chat
Salam
Can we help you?