Computer Sciences Practice Test 5




Entry test contains most of the Computer MCQs. FSC ICS Part 2 Computer book MCQs. HSSC Computer questions MCQs. Solved Chapterwise Computer MCQs for first-year 12 class MCQs and 11 class MCQs. Second-year and first-year Computer textbooks chapter-wise MCQs with the answer are provided here. The Computer portion is helpful in MDCAT , ECAT , NTS NAT , and NUST NET . PakLearningSpot PLS MCQs Bank website for FREE Entry test preparations

PLS Boost Bundle

Get Access to 20 thousands+ MCQs Including Topical MCQs, Practice Tests, Mock Tests, Solved Past Papers, Flashcards, Notes, FLPS, and Much More.

196

Computer Practice Test 5

This is the Free Access to Limited MCQs. Enroll to PLS Boost Premium Bundle to Get More MCQs HERE

1 / 100

14. The actual body of the function is defined in:

2 / 100

8. A function:

3 / 100

13. The printf() is a:

4 / 100

6. Mother name for built-in function is:

5 / 100

13. The benefit of CAD may be summed up as:

6 / 100

16. Modern computer can perform calculations or process at high speed

7 / 100

19. CAT stands for

8 / 100

is not relevant to office automation:

9 / 100

11. Which form layout displays multiple records at a time?

10 / 100

7. A auto form displays one record at a time.

11 / 100

17. The conditional operator takes expression.

12 / 100

7. Another name of conditional operator is

13 / 100

17. How many digits are printed to the right of the decimal point in real number?

14 / 100

9. is used for flag:

15 / 100

2. The escape sequence for backslash is:

16 / 100

16. The loop will execute at least even the condition is false

17 / 100

4. loop structures are available in C language:

18 / 100

11. The body of I comes er the test condition in:

19 / 100

12. The while loop is also called: (a) conditional loop (b) (c) counter loop (d)
while Both (b) and (c)
wend loop Attribute

20 / 100

6. Which one is not a loop structure

21 / 100

8. In while loop, the loop control variable always initialized

22 / 100

15. The do-while loop ends with a

23 / 100

3. Anything in the real world that has a set of different attributes or properties is called:

24 / 100

A table is also known as: (

25 / 100

17. SQL is used for

26 / 100

1. Insert command is used to insert.

27 / 100

6. A table is also known as

28 / 100

I I. Communication between a computer and a keyboard involves transmission:

29 / 100

9. The electromagnetic or light waves representing data are called:

30 / 100

15. Which type of data consists of words, sentences, and paragraphs?

31 / 100

13. The number of times a wave repeats during a specific time interval is called:

32 / 100

The actual data of Is stored in:

33 / 100

9. Software to use the Internet:

34 / 100

4. When DARPA established a small computer network?

35 / 100

2. A collection of millions of computers interlink to one another is called:

36 / 100

Who owns the Internet?

37 / 100

16. The computers on the Internet that contain the web sites are called:

38 / 100

is most necessary to interact with the computer:

39 / 100

16. is the entering point in Windows:

40 / 100

15. involves the processing on multiple processors in a computer:

41 / 100

is an example of command line operating system:

42 / 100

10. What type of operating system MS-DOS is?

43 / 100

8. GUI stands for:

44 / 100

18. acts as file manager for Windows: (

45 / 100

19. contains the files and folders that are deleted from the hard disk:

46 / 100

2. How many types of data integrity are there?

47 / 100

4. In 3NF, a non-key attribute must not depend on a(n)

48 / 100

17. Which of the following refers to the correctness and consistency of data?

49 / 100

14. A set of related fields that represent a unit of data is called

50 / 100

In activity data is collected and recorded:

51 / 100

16. A set of related files that represent a unit of data is called

52 / 100

9. The manipulated and processed data is called:

53 / 100

15. Security Protection for personal computer include:

54 / 100

1. A virus program usually hidden in:

55 / 100

6. viruses infects the first sector of disk:

56 / 100

17. Which is not an antivirus program?

57 / 100

9. Software that is used to detect and remove the viruses from the computer is called:

58 / 100

12. is cause of virus:

59 / 100

12. A program written in language runs directly on the computer.

60 / 100

20. languages is different for different computers:

61 / 100

3. Debug is the process of:

62 / 100

19. The instructions written in machine language are in the form of:

63 / 100

8. To store data for future use it must be stored on

64 / 100

9. A collection of related records is called

65 / 100

10. A logical interface to a file is called

66 / 100

17. The bold text specifies the: (

67 / 100

6. features of word processor allows to insert text from one file into another file:

68 / 100

10. The bar that contains the group of commands is called:

69 / 100

2. is most commonly used word processing package:

70 / 100

3. A word processor includes the process of

71 / 100

15. How many typing modes are provided by word processor?

72 / 100

5. In activities, the cost factors are taken into consideration:

73 / 100

3. is called the preliminary investigation of the required database:

74 / 100

I. Which of the following keys does not hold uniqueness property

75 / 100

17. A technique for physically arranging the records of a file on secondary storage device is called

76 / 100

9. The process to identify the data objects and the relationships between them is:

77 / 100

19. represents entity:

78 / 100

10. The relationship between the entities is represented graphically by using:

79 / 100

3. Central computer in the network is called:

80 / 100

19. Which one represents the shape of network?

81 / 100

21. One or more computers connected to a hub is a:

82 / 100

16. standards were developed without any formal planning:

83 / 100

13. standards were properly researched, designed and finally published as a standard:

84 / 100

20. Which one is not a network topology?

85 / 100

3. The idea of stored program was given by:

86 / 100

14. Which component of computer is responsible for comparison of two numbers?

87 / 100

17. The cells of memory are logically organized into group of

88 / 100

is category software:

89 / 100

10. is an example of system software:

90 / 100

13. is not an application software:

91 / 100

11. is an example of packaged software:

92 / 100

19. If the custom format is 00000 then the number 420 will be displayed as:

93 / 100

20. If the custom format is If it, it N N then the number 23349 will be displayed as:

94 / 100

13. represents a label:

95 / 100

10. The actual working area in Microsoft Excel is

96 / 100

12. cell addresses is correct:

97 / 100

14. The 0.0000000001 is displayed in default column width as:

98 / 100

2. Which of the following is a valid character constant?

99 / 100

4. When the result of the computation of two very small numbers is too small to be represented, this phenomenon is called:

100 / 100

19. The words used to write the statements of a program are called

Your score is

The average score is 70%

0%

BIG SALE! FLAT 50% OFF

MDCAT Best Book 2025

Protected