Computer Sciences Practice Test 5




Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

184

Computer Practice Test 5

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

18. A common font size used in business documents is:

2 / 100

7. features of word processor allows to specify margins of the documents:

3 / 100

16. keys of keyboard in conjunction with arrow keys is used for selecting text:

4 / 100

2. is most commonly used word processing package:

5 / 100

20. The last statement of each case in switch statement must be a:

6 / 100

6. The selection statement is also known as:

7 / 100

11. selection structures is the simplest form of decision making structure:

8 / 100

7. Another name of conditional operator is

9 / 100

6. What layer of OSI does data compression:

10 / 100

I. A LAN is a combination of:

11 / 100

14. The media Access Control Sub-layer resides in which layer:

12 / 100

12. In which network model all computers have equal status?

13 / 100

15. Preprocessor directives are commands for

14 / 100

17. .exe file is produced by the:

15 / 100

12. A program written in language runs directly on the computer.

16 / 100

The actual data of Is stored in:

17 / 100

13. In a table each column represents

18 / 100

16. Using you can create tables, forms, reports and queries in very short time

19 / 100

19. contains the files and folders that are deleted from the hard disk:

20 / 100

15. involves the processing on multiple processors in a computer:

21 / 100

17. Windows explorer is used to

22 / 100

An Operating System is a

23 / 100

12. The maximum number of primary partitions that can be created on a disk is

24 / 100

14. The capability of an operating system to load multiple program into memory at a time and to perform two or more processes concurrently, is called:

25 / 100

is most necessary to interact with the computer:

26 / 100

18. acts as file manager for Windows: (

27 / 100

14. Which of the following characters cannot be used as first character of a variable name?

28 / 100

17. The logical not (!) operator is denoted as:

29 / 100

1. The function getch() is defined in:

30 / 100

6. How many variables can be used in one printf() function?

31 / 100

5. is not used in control or format string in a prindo function:

32 / 100

17. How many digits are printed to the right of the decimal point in real number?

33 / 100

a spreadsheet:

34 / 100

3. The intersection of a row and column form a:

35 / 100

8. In a worksheet, a bold rectangle border indicates (n):

36 / 100

5. A cell at third column and 15 rows has a cell address:

37 / 100

17. Each number format consists of part:

38 / 100

7. The currently selected cell where data can be entered or edited is called:

39 / 100

10. is an example of system software:

40 / 100

is category software:

41 / 100

Collection of raw facts and figures is called:

42 / 100

For the input of image data:

43 / 100

4. A form is an object of

44 / 100

16. Each of the following is a form layout except.

45 / 100

20. In addition to navigate records can be used for

46 / 100

5. Forms are designed for:

47 / 100

11. Which form layout displays multiple records at a time?

48 / 100

13. The body of loop comes before the test condition in:

49 / 100

10. structure executes the body of loop at least once:

50 / 100

11. The body of I comes er the test condition in:

51 / 100

2. is a loop statement:

52 / 100

12. The while loop is also called: (a) conditional loop (b) (c) counter loop (d)
while Both (b) and (c)
wend loop Attribute

53 / 100

17. The of for loop executed only once in the first iteration

54 / 100

3. The loop which never ends is called:

55 / 100

2. The foreign key is found in

56 / 100

9. The rows of a table or relation are known as:

57 / 100

18. Which of the following is responsible for designing the database system.

58 / 100

17. SQL is used for

59 / 100

14. A key that consists of two or more than two attributes of a table is called

60 / 100

15. Security Protection for personal computer include:

61 / 100

10. is not an anti-virus program:

62 / 100

13. Types of software that can be freely distributed without violating copyright laws are called:

63 / 100

4. CAL stands for

64 / 100

scanners is used in hospitals:

65 / 100

13. The benefit of CAD may be summed up as:

66 / 100

19. CAT stands for

67 / 100

15. Typically, and ATM can be used to

68 / 100

The address of instruction under

69 / 100

RAM is a:

70 / 100

4. In activities, the possible inputs for the database are collected:

71 / 100

19. represents entity:

72 / 100

3. The process of transferring data from one location to another is called:

73 / 100

Microwave transmission, coaxial cables and fiber optic are examples of:

74 / 100

The infonnation that is to be transferred from one location to another is called:

75 / 100

I I. Communication between a computer and a keyboard involves transmission:

76 / 100

10. A series of actions that are performed on raw data achieve the required objective and results are called:

77 / 100

12. In a school the record of cricket and hockey team organized into two groups is referred as

78 / 100

8. represents an object:

79 / 100

2. Which of the following data model is more flexible?

80 / 100

5. SQL is a(n)

81 / 100

15. A set of related records that represent a unit of data is called

82 / 100

13. A set of related characters that represent a unit of data is called

83 / 100

14. A foreign key constraint is also called

84 / 100

6. Referential integrity is applied on

85 / 100

12. Data integrity is another form of data

86 / 100

7. How many types of addressing schemes?

87 / 100

13. services is provided by Internet:

88 / 100

A computer can be linked to the Internet through

89 / 100

15. FTP stands for:

90 / 100

20. protocol is used by news services:

91 / 100

13. The printf() is a:

92 / 100

19. In C-language, subprograms are referred to as:

93 / 100

9. The actual values are passed to the function in:

94 / 100

3. Which of the following is true about a function call?

95 / 100

1. Functions prototype for built-in functions are specified in:

96 / 100

8. To store data for future use it must be stored on

97 / 100

10. A logical interface to a file is called

98 / 100

19. In text file, data is stored in:

99 / 100

4. An array subscript should be a) int c) double

100 / 100

3. On successfully closing a file , the fclose( ) returns:

Your score is

The average score is 70%

0%

BIG SALE! FLAT 50% OFF

Protected

Open chat
Salam
Can we help you?