Home / General Knowledge / Most Repeated MCQS / mcqs for ppsc, nts , pcs, ajkpcs related to computer science g.k
mcqs for ajkpcs 
mcqs for nts

mcqs for ppsc, nts , pcs, ajkpcs related to computer science g.k

mcqs for ppsc, nts , pcs, ajkpcs related to computer science g.k

post no. 6

>> A primary key that consists of more than one

attribute is called a Composite key.

>> An attribute in database is also known as Field.

>> C language was developed by Dennis Ritchie.

>> A space in computer’s memory set aside for

some data that can be changed is calle

Variable.

>> Queries are the database object allows

extracting specific information from tables.

>> The instructions that are given to the compiler

before the beginning of actual program are

Preprocessor directive.

>> Ctrl+F9 key combination is used to run C

program.

>> Different attributes in two different tables

having same name are referred to as

Homonym.

>> SQL is a structured language.

>> The loop which never ends is called Infinite

loop.

mcqs for ajkpcs 




>> Ternary is another term for a conditional

operator.

>> The total numbers of keywords in C language

are 32.

>> CIM stand for Computer Integrated

Manufacturing.

>> Access time for most of memories is measured

in Nanoseconds.

>> A database consists of various components

called Objects.

>> Referential integrity term is related to the

features of cascading deletion.

>> ATM stands for Automatic Teller Machine.

nts mcqs 

>> Charles Babbage is known as “Father of

Computer Science”

>> One of the first recognized calculating device

was Abacus.

>> Pentium II is a Fourth generation computer.

>> The first computer that used vacuum tubes was

ENIAC.

>> The numbers of read/write heads for a hard

disk of four platters are 8.

>> Unicode is a 16-bit.

>> Boolean algebra is also known as switching

algebra.

>> First generation language uses Binary code.

>> In BASIC LOG function refers to natural

logarithm have Base ‘e’.

>> An 8-bit address bus can address a memory of

256 Bytes.

>> The programs which are permanent and stored

in ROM are known as Firmware.

>> UNIVAC stands for Universal Automatic

Computer.

>> All of the following are examples of real security

and privacy risks EXCEPT Spam.

>> A process known as data mining is used by large

retailers to study trends.

>> Point-of-sale (POS) terminals (formerly known

as cash registers) are often connecte to

complex inventory and sales computer systems.

>> Surgeons can perform delicate operations by

manipulating devices through computers

instead of manually. This technology is known

as robotics.

physics mcqs

most repeated mcqs for ajkpcs 




nts past papers 

General knowledge 

About admin

Check Also

PPSC past paper of FIELD ASSISTANT Crop Reporter 2018

PPSC past paper of FIELD ASSISTANT Crop Reporter 2018

PPSC past paper of FIELD ASSISTANT Crop Reporter 2018 Papers held on 15 July 2018 When …

Leave a Reply

Your email address will not be published.

error: Content is protected !!