Computer Sciences Practice Test 4




Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

153

Computer Practice Test 4

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

2. How many basic layouts of forms are here in Microsoft Access.

2 / 100

1. A form that contains the sub form is called

3 / 100

9. Tables are the 1 of our database in Microsoft Access

4 / 100

15. Which is not an example of a control element placed on the form

5 / 100

8. Which of the following is used to retrieve data from one or more tables of database and to present it to the user in a formatted way.

6 / 100

7. Another name of conditional operator is

7 / 100

8. Which of the following keywords is not used in switch statement?

8 / 100

5. control structures executes program statements one after another:

9 / 100

20. The predefined functions that are part of the programming language and can be used for different purposes are called:

10 / 100

3. Which of the following is true about a function call?

11 / 100

2. Global variables are created in

12 / 100

0. Which of the following looks for the prototype of functions used in a program:

13 / 100

17. In a C program two functions can have:

14 / 100

18. The name of actual and formal parameters:

15 / 100

14. The media Access Control Sub-layer resides in which layer:

16 / 100

10. Which network model consists of many clients and one or more central computers?

17 / 100

3. Central computer in the network is called:

18 / 100

15. In E-R diagram, an oval shape is used to represent a(n):

19 / 100

9. The process to identify the data objects and the relationships between them is:

20 / 100

5. In activities, the cost factors are taken into consideration:

21 / 100

4. In activities, the possible inputs for the database are collected:

22 / 100

15. In which of the following normal forms, any repeating group from the table is removed?

23 / 100

17. If a relation is in INF and the key consists of a single attributes then the relation is called.

24 / 100

1. In 3NF, which form of dependency is removed? (

25 / 100

4. In 3NF, a non-key attribute must not depend on a(n)

26 / 100

8. problems occurs when same name is used for two different attributes:

27 / 100

13. What will be the output of printf(“%d”,’a’);

28 / 100

19. The escape sequence to insert horizontal tab is

29 / 100

9. is used for flag:

30 / 100

7 . is control suing in the statement prinf(“Result = %d”,r);:

31 / 100

20. Which of the following format specifier is used for string type data?

32 / 100

14. C was designed to write programs for

33 / 100

C is a:

34 / 100

13. The symbols used to write instructions in assembly language are called:

35 / 100

6. The benefit of CAD may be summed up as

36 / 100

13. The benefit of CAD may be summed up as:

37 / 100

18. A Word processor can be used to:

38 / 100

a spreadsheet:

39 / 100

13. represents a label:

40 / 100

17. Each number format consists of part:

41 / 100

8. In a worksheet, a bold rectangle border indicates (n):

42 / 100

7. Which of the following is not related to data manipulation?

43 / 100

16. A set of related files that represent a unit of data is called

44 / 100

13. A set of related characters that represent a unit of data is called

45 / 100

15. A set of related records that represent a unit of data is called

46 / 100

18. Which of the following database model has the shape like and organizational chart?

47 / 100

4. Which of the following may be a temporary file?

48 / 100

10. The number of records (or row) in a table or relation is called:

49 / 100

19. is the default data e in MS-Access:

50 / 100

The data in table is entered in

51 / 100

7. A tuple in a table is also known as

52 / 100

8. The columns of a relation correspond to:

53 / 100

2. The foreign key is found in

54 / 100

19. serves as a bridge between end users and database administrator:

55 / 100

4. Which one is the brain of computer?

56 / 100

I I. CPU is an example of:

57 / 100

17. The cells of memory are logically organized into group of

58 / 100

2. A set of instructions that run the computer arc:

59 / 100

RAM is a:

60 / 100

4. When the result of the computation of two very small numbers is too small to be represented, this phenomenon is called:

61 / 100

10. The symbol = represents:

62 / 100

15. In C, the maximum length of variable name is:

63 / 100

1. Variables are created in

64 / 100

5. Most common crimes are committed by:

65 / 100

7. virus is activated on the basis of a logical condition:

66 / 100

4. Viruses are transferred from one computer to another due to:

67 / 100

20. media is used for backup:

68 / 100

13. Types of software that can be freely distributed without violating copyright laws are called:

69 / 100

14. A query is a more flexible way of

70 / 100

7. Microsoft Access saves the database with the extension
a) .mdb c) .madb

71 / 100

13. In a table each column represents

72 / 100

to automate repeated tasks — are used

73 / 100

The actual data of Is stored in:

74 / 100

I. A database consists of various components called the

75 / 100

3. is the most popular and powerful DBMS:

76 / 100

17. The bold text specifies the: (

77 / 100

6. features of word processor allows to insert text from one file into another file:

78 / 100

is not a feature of simple word processor or text editor:

79 / 100

13. is based on the NT technology:

80 / 100

is most necessary to interact with the computer:

81 / 100

10. What type of operating system MS-DOS is?

82 / 100

7. How many types of addressing schemes?

83 / 100

4. When DARPA established a small computer network?

84 / 100

3. The globe has become a global village, due to:

85 / 100

8. specifies the correct format of IP address:

86 / 100

14. Which of service of Internet is used to transfer files:

87 / 100

17. The process of launching web pages is called:

88 / 100

3. The process of transferring data from one location to another is called:

89 / 100

6. is not component of data communication:

90 / 100

5. A data file a stored in:

91 / 100

7.function is used to write a string to a file:

92 / 100

14. If programs get input data from data file and also send output into data file. It is called:

93 / 100

16. In file handling sequence of characters refers to

94 / 100

17. In text stream characters have correspondence

95 / 100

Which of the following mode open only an existing file for both reading and writing?

96 / 100

15. An inkjet printer is an example of a(n):

97 / 100

11. is an example of packaged software:

98 / 100

The processed data is called:

99 / 100

13. is not an application software:

100 / 100

An electronic device that accepts, processes data and products information is called: (a) Input device (b) Computer (c) Output devices (d) Operating system

Your score is

The average score is 71%

0%

BIG SALE! FLAT 50% OFF

Protected