Computer Sciences Practice Test 4





Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

139

Computer Practice Test 4

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

10. structure executes the body of loop at least once:

2 / 100

9. In while loop, the increment / decrement statement are placed

3 / 100

2. is a loop statement:

4 / 100

20. Loop with in a loop is called

5 / 100

12. The while loop is also called: (a) conditional loop (b) (c) counter loop (d)
while Both (b) and (c)
wend loop Attribute

6 / 100

2. The foreign key is found in

7 / 100

14. A key that consists of two or more than two attributes of a table is called

8 / 100

10. The computer understands the instructions only in:

9 / 100

15. Preprocessor directives are commands for

10 / 100

13. The symbols used to write instructions in assembly language are called:

11 / 100

12. A program written in language runs directly on the computer.

12 / 100

6. features of word processor allows to insert text from one file into another file:

13 / 100

II. The bar that shows the total pages of document, position of cursor etc. is called:

14 / 100

15. How many typing modes are provided by word processor?

15 / 100

7. features of word processor allows to specify margins of the documents:

16 / 100

16. keys of keyboard in conjunction with arrow keys is used for selecting text:

17 / 100

3. A word processor includes the process of

18 / 100

5. Ctrl + Alt + Del is

19 / 100

is an example of command line operating system:

20 / 100

19. contains the files and folders that are deleted from the hard disk:

21 / 100

12. The maximum number of primary partitions that can be created on a disk is

22 / 100

18. acts as file manager for Windows: (

23 / 100

6. The benefit of CAD may be summed up as

24 / 100

scanners is used in hospitals:

25 / 100

19. CAT stands for

26 / 100

devices is used in departmental store:

27 / 100

13. represents a label:

28 / 100

II. A cell of worksheet, which is not active is called:

29 / 100

8. In a worksheet, a bold rectangle border indicates (n):

30 / 100

18. The default number format assigned to a cell is the:

31 / 100

15. menus contains the ‘Cells’ command:

32 / 100

19. If the custom format is 00000 then the number 420 will be displayed as:

33 / 100

3. The intersection of a row and column form a:

34 / 100

5. The predefined words of the programming language that are used for special purposes in the source program are called:

35 / 100

15. In C, the maximum length of variable name is:

36 / 100

. A quantity whose value may change during execution of program is called:

37 / 100

16. C is a strongly typed language, this means that:

38 / 100

7. Which of the following is not related to data manipulation?

39 / 100

10. A series of actions that are performed on raw data achieve the required objective and results are called:

40 / 100

3. Which of the following type of file require largest processing time?

41 / 100

8. represents an object:

42 / 100

15. A set of related records that represent a unit of data is called

43 / 100

13. A set of related characters that represent a unit of data is called

44 / 100

5. SQL is a(n)

45 / 100

11. A functional dependency between two or more non-key attributes in a relation is called

46 / 100

9. problems occurs when same information is stored in two different ways:

47 / 100

12. Data integrity is another form of data

48 / 100

20. A process of analyzing the dependencies of attributes with in entities is called

49 / 100

5. Different attributes in two different tables having same name are referred to as (

50 / 100

2. How many types of data integrity are there?

51 / 100

16. A relation is in second normal form if and only if:

52 / 100

7. problems occurs when two different names are used for the same information?

53 / 100

19. is a statement that extracts specific information database.

54 / 100

18. is the fundamental property of relational database:

55 / 100

For the input of image data:

56 / 100

12. is not an example of packaged software:

57 / 100

The computing and communication technologies arc combined together for

58 / 100

18. The name of actual and formal parameters:

59 / 100

20. The predefined functions that are part of the programming language and can be used for different purposes are called:

60 / 100

15. The last statement of the body of the fimction is:

61 / 100

12. Formal arguments are also called

62 / 100

0. Which of the following looks for the prototype of functions used in a program:

63 / 100

8. A function:

64 / 100

14. The actual body of the function is defined in:

65 / 100

4. The predefined functions that are part of C-language are called: (

66 / 100

19. In C-language, subprograms are referred to as:

67 / 100

0. The format specifier %u is used for:

68 / 100

3. function is used to display output on screen:

69 / 100

8. The functions used for input and output are stored in header file:

70 / 100

13. What will be the output of printf(“%d”,’a’);

71 / 100

15. format specifiers is used for float type data:

72 / 100

15. Which is not an example of a control element placed on the form

73 / 100

18. The form which contains the subform is known as:

74 / 100

16. Each of the following is a form layout except.

75 / 100

14. The different design elements placed on form are called

76 / 100

2. How many basic layouts of forms are here in Microsoft Access.

77 / 100

12. is cause of virus:

78 / 100

9. Software that is used to detect and remove the viruses from the computer is called:

79 / 100

9. As in design view, you can move from field to field in the table window in datasheet view using button.

80 / 100

17. The maximum length of text type field is:

81 / 100

2. The rule that a record from a table cannot be deleted if its associated record exists in a related table is called rule

82 / 100

1. A file is stored in

83 / 100

15. There are types of streams

84 / 100

18. In binary stream bytes have correspondence

85 / 100

5. is component of data communication:

86 / 100

7. A device that receives messages is called:

87 / 100

9. The electromagnetic or light waves representing data are called:

88 / 100

2. A collection of millions of computers interlink to one another is called:

89 / 100

16. The computers on the Internet that contain the web sites are called:

90 / 100

19. represents URL address:

91 / 100

12. In which network model all computers have equal status?

92 / 100

13. standards were properly researched, designed and finally published as a standard:

93 / 100

2. An entity related to itself in an ERD model refers to

94 / 100

9. The process to identify the data objects and the relationships between them is:

95 / 100

I I. In hybrid distribution which kind of fragments are stored at only one site

96 / 100

17. A technique for physically arranging the records of a file on secondary storage device is called

97 / 100

16. CPU includes all of the following components except?

98 / 100

15. is the component of CPU:

99 / 100

The address of instruction under

100 / 100

18. CPU is an example of:

Your score is

The average score is 71%

0%

,

Big Sale! 40% OFF

Protected

Open chat
Salam
Can we help you?