0% found this document useful (0 votes)
88 views25 pages

12 Computer Guess 2022 - Nauman Sadaf - Compressed

12 computer Guess 2022_Nauman Sadaf_compressed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
88 views25 pages

12 Computer Guess 2022 - Nauman Sadaf - Compressed

12 computer Guess 2022_Nauman Sadaf_compressed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 25
The Most Exclusive Guess Paners PD ‘Fy WA ou Massy: Ri: GCcae ae (ey CONTACT US © 03024741124, fils # 03024741124 Q Aeasirsin Mallian Kalan we Pre Guess Paper Computer inter -I Al-Qadir Jinnah Science Academy Mallian Kalan Q.NO. 1 M.C.Q 1_| Aset of related records that represents a unit of data is: i} File (8) Record (c Field (o) Database ‘The manipulated and processed data is called: me Object (8) Information «© Data (0) “The process af arranging data in a logical sequence is called: Sorting (@)] summarizing _[(Q)] Data capturing _ | (0), Storage and retrieval of data is related to: : Managing output Data capturin, 8) | Data manipulation | (C) turing (8) ip (1) ecute ‘Acallection af raw facts and figures is called: Data (8) | information [(C)] __Processiat “The smallest meaningful unit of data in a database is called: = Byte (8) Record © Chatgéters ‘Which of the following type of file require largest processing time? =." Indexed sequential Sequentialfle | (B)] _Rardomfile __[¢c) | < .. Tite Direct access file ‘Which of the following may be a temporary file? 7 Master file 18) | Transaction file ‘Backup file None of these ‘A collection of related fields is: File 8 Record P= =Batabase None “aun type requires largest processing time. Random file (8) | Direct access'tte Sequential file [()| Index sequential file ‘Which of the following may be temporaryfle?) = ) Waster file (8) Datafile® Transaction file __| (D) Program file ‘Alogical grouping of characters is s (a) Filed (e) Retord File (0) al 13 . canstore text only, 2-7 « Binary tei]. Textile Exe file (0) Object file 14 | intext file, data is stored in: r a) Asciicode | (8) -~..Biiary code © Octal code. (0) Text code 15 | Which one of the following tyse offile requires largest processing time? : fl Indexed sequential “ Sequentiaifile.. | (B)} _Randomfile | (¢) file (0) | _ Direct access file 16 | inrelational database, a single:piece of information is called: ® Field (6) Record a Entity (©) Attribute 17_| Data can be recavered in case of loss by using: my Master file (8)] Transaction file [(c) Backup file (0) Data file 18 | A database containing all students in a class would store basic data of students in: a) Record” (8) Filed ) Cell (0) File 19.-] whict'file is used to store information that remains constant for a long time: (8) [site fle ()] Masterfile [(Q)] transaction file | (0) Backup fle 20 _| The'extension of image file is: a) exl (8) doc a) bmp (0) ppt ‘Which of the following represents a collection of concepts that are used to describe the structure of a 21 | database? tay | datawarehouse _[(8)] _Datemodel__[(c)] Data structure | (0) Data type 22_[ which of the following data model is more flexible? Prepared by: M.Qadir Rafique Cell # 03024741124, Whatsapp # 03024741124 Page 2 Guess Paper Computer inter -I Al-Qadir Jinnah Science Academy Mallian Kalan Frerarchical data Relational date model (2) model 23 | A database is an organized collection of....... related data. @) Logically (8) Physically ) Loosely (0) Badly 24 _| Which of the following database model is also referred an inverted tree? ‘ « Hierarchal (8) Network (| __ Relational ©) Abiegt 25_| Which one refers to the correctness and consistency of data? ial? _Z (a) | bata independence | (8)[ data integration [(c)] Data integrity | (0) sDatamodel Data Inconsistency Is a caused by: Organized data [ (6) integrated data Independent data_[ (D):J™._ Recundant data Multiple copies of the same data is referred to as: cal Data integrity (8) | Deta inconsistency Data redundancy -[.(0) |. “Data isolation SQL is a(n): i = (a) | Network dats model | (8) {0) | Object data model ‘Object oriented Unstructured language_| (8) | structured Ienguage language 4D) Software SQ stands for: > So Self- Quantifying. Structurédauery Self Quantative Sort-Query-List ©) to) Language language. language Insert command is used to insert: . y ‘Anew table (@)] Anewr Ceaviews [10 Dependencies CREATE command is used to create a: Table ®) 1) ‘Query ‘An attribute Is also known as a : Table (8) Relation i (0) Field ‘A category of data or information that describes an entity's called a(n} Attribute 8 Data itetn d Record (0) Tuple The row of relation can be of. order! *_ any (8) Sorte. Sorted (0) Constant 35_| Arelation is analogous to a: "te Os ny Table (8) | wield Record () Row 36 [Which of the following is degree of a table? Total gumhber of Total number of Total number of foreign (A) | Total number of rows | (B) ‘eolkimns cells (0) keys 37_| The row of table is also-talled:™ * ny Entity Tei[e~awbues 0 call (0) Record 38 | Arelation is also known ast, ay Table”, (8) Tuple (G__ Relationship] (0) Attribute 39 | The columns of a table cortespiond to: (a) Table,” (s) Record ( Field {o) Cell ‘Which of the following is not included in the definition of entity? Persons 8) Object (C) Concept (0) ‘Action Which 6f'the fallowing is used to associate entities with one another? «batty (8) ‘Attribute © Identifier (0) Relationship M5 Access, table contains: Sah, Fields (8) Record (O] Character [toy File SQL is used for: Data definition (@)] detameriuation [09] AAT OMIT T oT searching records Views are also called. ‘Complex tables (8) _simpietables [(Q)] _virtualtables | (0) ‘Actual tables Prepared by: M.Qadir Rafique Cell # 03024741124, Whatsapp # 03024741124 Page 3 Guess Paper Computer inter -I Al-Qadir Jinnah Science Academy Mallian Kalan 45 | To find all names start with M from student table, the criteria is: a) Uke "M2" 8 like "M—” ©) ike “Mi” like “Mi” 46 | A virtual table that is constructed form other tables is called: ® Tuple (8) Table © View 0) Report 47 | The foreign key is found & ) Parent table 1) |_vependenttabie (| pwottable | (m) dex able 48 | A table must have: ee Z a) Primary key te) | secondarykey [(c)| composite key | (0) Sssortkey, 49 | Akey that consists more than one attributes is called: « Foreign key ()] Composite key (| Primarykey | (D)]. , Control key 50_| The selected candidate key is called: = EY Foreign key (8) | Composite key _| (c) Primary key }{6)} =. Sort key 51_| Which of the following is also known as control key? a ww Sort key ()] composite key [(Q)] Candidate key JI)? Primary key 52 _|....... key does not hold uniqueness property. a) Foreign (8) Candidate © Primary (b) Secondary, 53 | Atable must have a: Primary key (8) Secondarykey [(Q)] Composite key, Sort key 54 | Foreign key is found in: i * Parent table (8) [Dependent table _| (c) bivat table Index table How many primary keys can a relation have? Atleast once, (8) Only one C) | iB6 limit Three Which of the following keys does not hold uniqueness property? Foreign key t8)| Composite key _| (FJ. Primary key Secondary key All the hardware costs are considered during: Requirements? b=]. €) analysis “st {) 58 | An entity related to itself in an ERD niodel refers to: ‘Qne-toemnany Many-lomany (A) Recursive relationshig (8) |.“ _telationshi (C) relationshit (D) | One-to-one relationshi 59_| In ERD model, the relationship between two entities is represented by a: Diamond symbol] (8) J. Rectarigularbox | (¢)| Oval symbol__| (0) Line 60 | inan E-R diagram, a rectangle represents a(n): Entity 0) | pateribute (Q[ Relationship [(0) None 61 used to define characteristics of an entity/object. Object.” *>.] (8) Attributes (c) Records (0) Files 62 | inanE-R diagram, a diamdnd represents a(n): (a) “Attributes, (8)] Relationship | (C) Entity ©) Modality 63 [in ERD model, the relationships between two entities are represented by: @ Rectangle... (8) Oval ©) Square (0) Diamond) 64 _| Custorners; cars and parts are examples of: ta) ‘Entities (8) Attribute ©. Cardinals (0) Relationships 65 -| Whiehr one's not related to an entity? Person 8) Concept 2) Action {o) Object 66_| Color.of car is an example of: Entity ()] — Atributes 0) Relation (0) Relationship 67_| Which one of the following is used to associate entities with each other? ‘tributes (8)] Relationship [(C) Entities (0) | _Cardinals/iéentifier ‘An entity related to itself in an ERD model refers to relationship: Recursive 8) One to mam ()] Many tomary —[i0) ‘One to ane, Prepared by: M.Qadir Rafique Cell # 03024741124, Whatsapp # 03024741124 Page 4 Project planning, (8) Feasibility study Data analysis Guess Paper Computer inter -I Al-Qadir Jinnah Science 6 ‘Arelationship between countries and capitals is an example of relationship: Academy Mallian Kalan (A) 70 ‘One-to-one. 8) One-to-Mani CV] Many-to-Mar ‘Which of the following defines the nature of the relationship? Many-to-One (a) Modality (| Decisiontree [teh] Both A&B Nene a 4) Which of the following keys does not hold uniqueness property? candidate key ()] —Foreignkey [(Q)] Primary key 2 In hybrid distribution which kind of fragments are stored at only one site: ‘seceridany key (a) Non-critical fragments Critical and non- critical fragments Critical fragments: (8) () oniylaite.frapments 3 ‘Which of the following is not a basic data distribution strategy? 1a) Centralized te] Partitiones (cy _Replicated Duplicated 4 Database development process involve mapping of conceptual data model into «4 75, Object oriented data Network data Implementation? model e) model © model In 3NF, which form of dependency is removed? g Higiarchical data model fa) Trans 76 Functional 18)] Non-functionat [(c)] Associative’ In relational database, a table is also called a: . A A) Tuple (8) Relation © (0) Schema 7 fa) In 3NF, a non-key attribute must not depend on a(n}: Non-key tribute | (B)| Key attribute | (c) | *.Coiriposite key (0) Sort key 8 Different attributes in two different tables having same name afe'referred to as: a) (0) Mutually exclusive 79 @& Synonym ()] Homonym [Ae] “Acronym Every relation must have r Primary key (@)] Candidate key PC) [>.. secondary key 10) Composite key a1 80_| Transitive dependency is removed in: ™ a) astnormalform | (B)[_2ndrormalforrs [(c)| 3rd normal form [(p) | _ath normal form ‘The goal of normalization is to: oS 82 Increase... Increase (8) | inconsisteitey Get stable redundancy. “Two or more attributes having différént names but same meaning is called: Increasing anomalies dara structure (A) 83 Homonyms iT. Aliages ) Synonyms Alternate attributes (a) In 2NF, which form of dependency.is removed? Functional (1B) P=. Partial (] Associative (0) Transitive 84, 4) Referential integrity is abplied ofi:~ Foreign key.wm, [(8)] composite key [(C)| Primary key (2) Sort key 85, ‘A primary key that consists of wo or more attributes of a relation is called (a) Sort Key, (By Candidate key | (c) Sub key (0) Composite key 36 Microsoft access Saves'the database with the extension: «a mab (8) sdb © mad (0) None of them 87_| Which shortcut Keyis used to open an existing database in MS Access? (a) Cel FN, (8) cerl+s c) Ctrl +0 (o) Ctl +2 38. t-makés very simple to create a database: tay Samplediatabase | (8) Wizard ‘Common standard (0) | __ Easier programming IMS Aécess saves the database eT mbdg (8) ppt In relational database, a table is called: (0) mdb Tuple (8) Relation File (0) ‘Asset of related files created and managed by a DBMSis called: Field (8) Record [cl Database (0) Prepared by: M.Qadir Rafique Cell # 03024741124, Whatsapp # 03024741124 Guess Paper Computer inter -I Al-Qadir Jinnah Science Academy Mallian Kalan 92 | A database consists of various components called the: a) Tool 8 Properties ©) Entities D) Object 93 | Which of the following object of database is used to retrieve data from database? @ Queries (8) Forms a) Reports ©) Tables 94 | The output of a query is in the form of a: 5 4) Table (8) Form a Report ©) 95. | Which of the following object is used to retrieve data from database and present in 2 formatted away? (a) Report (8) Form cl Table (0) SsQuery 96 _| Arecord is a complete set of... field. « Distinct (e) Related © Designed (OV. , Alletthem 97_| inaccess, the structure of a table is created in... view. >, «a Design view (e)] Datesheetview [()] Botha&s }1B)]. = None of them 98 | Which object is the output of a database application? a a) Form (8) Query () Table (Eee Report 99 | A database consists of various components called: = . “a Tools [Properties 1) entities J (b) ‘Objects 100 | Which object is used to store data in database? a a Macro 8) Table © Forts = _[10) Report 101 | The output of the query is in the form of: iy a) Table 18) Foe al .ReRO 1) Query 102 | A request for information form a database in database terminology s called: (a) Report 8) Letter Ch] iTable (0) Quer 103 | Which of the following isnot a database object? (a) Table (8) Query (ch Report (0) MS Word 104 | The example of popular DBMS E 8) Ms Word )] Msateés) LQ) MS Excel (0)] Ms PowerPoint 105 | The graphical query tool is known as: |. (a) Query grid (8) Desig grid. | (C) Query form (0) Design form 105 | ina relational database, a single piece-of information is called: «a Field (8) fo Record () Entity (0) Attribute 107 | The degree af relation refers‘te the, number of: a) Rows (e) [., “Tables © Field (0) Columns 108 | Each set of related items in.a tables called: w Table Liev] Record (© Field (0) Query 109 | The data in table is entered.in: «8 Design view =. JAB] Normal view [(C)] Datasheet view | (0) Layout view 110 | How many tablé views are available in Microsoft access? a) 4 (8) 3 ) 2 (0) 111 | As in design view, Yu can move fram field to field in the table window in datasheet view using ...... button. ® ae 2 Te) Ese © Enter ©) Spacebar 112 | table views are available in Microsoft Access. (a) Fe (e) 2 () 3 (0) 113 | To.find.afour-character name that starts with H, the criteria is specified as: fay [Ha (8) Hea () HI??? (0) 114 | What is the default field size of a Text data type in MS-Access? ® 2 (8) 3 ao 20 (©) 115 | Which data type is default type in Access? fa) Memo (8) Number () Text (0) Auto number 116 | Create command is used to create: Prepared by: M.Qadir Rafique Cell # 03024741124, Whatsapp # 03024741124 Page 6 Guess Paper Computer inter -I Al-Qadir Jinnah Science Academy Mallian Kalan 8) Table ®) View © Report 0) ‘Query 117 | Every table must have a: fa) Foreign key (8) Compositekey [(c)|__Primarykey _| (0) Sort key 4118 | Which data type can be used to define a field that consists of only numbers to be used in calculations? «a Text (8) Meme © Number (0) Dateftime 119 | Which of the following buttons of find and replace dislog box is clicked to start the search propéss? , a) Find 8) Find next © Search (0) Next 120 | Which view is used to add, edit or delete record from table? =e 5 “ Record view te) Datasheetview [tC] designview _[ 10) “Editview 121 | The column of a table corresponds to: x @ (8) Field e Record (9) Tell 122 hat you are editing a record? Pe ., a) (8)] —Blackarrow _[(C) Key (0) [asterisk 123 | Which key is used to move field to field in table window in datasheet view? @ Teo (8) Esc © Enter = (07 Spaceber 124 | How many types of relationship? 3 a) 2 (8) 3 cl an (0) 5 The rule that a record from a table cannot be deleted if it’s associated record, exits ina related table is called 125 | nnn flee ‘ (A) | Referentialintegrity [(B)] Entity-relationship [()] “Narwalation | (0) Allofthem 126 | The relationship between countries and their capitals is-an exainple Of ... relationships. 8 ‘One-to-one () | Gnetomany [ey] _Manyrtomany | (0) None of them 127 | What command is required to actually execute a filter on‘ table?_ “ Remove filter (8) Apply filter (o. Clear grid (o) Find next 128 | Which filtering method allows you to use datain.a field as criterion for filtering? «) Filter by form t8)] Avoiyfireer, Lc) Clear grid (0) Find next 129 | Which of the following is an example of A filtér by form expression? a) ‘Abdullah (8) fas TQ) 40RS (0) None 130 | what is Zto A order called? = w Ascending te) | descéncin’ (cy [condescending [(0) ‘Alphabetical 131 | The Sort Ascending button will ‘ Grae all records Order allrecords funn]. geverse Filter out selected “4 alphabetically alphabetically | (C) records (0) | delete selected records 132 | The wildcard ...... Sallet|mia: Saleema >] (8) Salima (] Bothaas [10 None of them 135 | The graphically query toolis known as: Query erid 48)] _Designarid [(C)] _Queryform | (0) View form 136 | How many quéry views are available in MS Access? a) 2 8 3 () 4 (0) 5 137 | To find.a flame that start with s, the criteria is written as: «) Sap (8) SH (©) 28 (0) 138 | "Sur3.isused to retrieve data from one or more tables. (Macro (8) Table © Query ©) Form 139 | Forms are designed for: (a) Input data (8)] Manipulate data_[(c)] Accepting change | (0) All of them 140 | How many are basic layouts of forms in Microsoft access? «a 2 8) 3 © (0) 141 | The forms are the ..... end of our database in Microsoft access. (a) Back (8) Front ] sothaae io) None of these Prepared by: M.Qadir Rafique Cell # 03024741124, Whatsapp # 03024741124 Page 7 Guess Paper Computer inter -II Al-Qadir Jinnah Science Academy Mallian Kalan 142 [A...., auto form displays one record ata time, (A) Tabular (8) Columnar Datasheet Justified 143 auto form displays one record at a time. @) Columnar (8) Tabular e) Datasheet Justified 124 |The forms are designed to: % (a) | Data cepturing _[(@)| bata manipulation [() “analysis Managing output result 145 | How many form layouts are provided by MS Access? 0 (a) z (8) 3 © ‘ 146 | A form that contains a sub form is called: «A Form (8) Main form, ) Report Chil¢' form 147 | A form within another form is called: eel A) ‘Sub-form. (8) Main form, () Multiform None 148 | A sub form can be created using: _ Drag and drop a ye 4a) The form wizard (8) method (C) | __ Sub form wizard»... | (D) All of these 149 | Which of the following is a one-to-many relation? = * Person-Daté ot] (a) |__ student-reg ro. (8) | Mother-Daughter_| (c) Birth (0) | Country-Capital 150 | A report may be based on: E 2 Ay Table (8) Relationship [ty]. Form" to) Attributes 151 | How many reports layouts are? ; «a 2 (e) 3 ea, 4 (0) 5 152 | Which of the following is used to retrieve data from databiase. and'represent it to the user in a formatted way? ®) Form (8) ‘Query i) Table 1) Report 153 | A form that contains the sub form is called: a) Form (8) Main form. | (C) Report (0) None of them ‘You can drag the bar to move the property sheet window around on your screen. Title bar (8) Statys bar =. | (C) Scroll bar (0) Allof them A report provides a column for each field.of the retords in rows under the column header is known as: Tabular 8) Ls cotumtog” 1) Datasheet 0) Justified .. can be previewed on the screen before printin; Report (8) fs. Form (cy Sub form (0) None of them ‘Which of the following is used to retrieve data from one ar more tables of database and to present it to the user in a formatted way? Report i a © Query 10) Table How many are the tayaut of re 7 Cisa: High level ishguage® -[ (8) | Low level language ‘Assembly language Machine language ‘C was designed to wiite programs for: WingoWws opetating Solaris operating Unix operating “System, (8) system syste 05/2 operating system Tlanglade wal developed in: 1552 8 1969 1970 1972 Turbo.C++ can compile: Turbo € programs Turbo CH programs C+ programs only | (B) | Cand G+ programs only oaly -exe file is produced by the: Linker 8 Loader Compiler Interpreter ‘Which of the following key is used to save a file? Prepared by: M.Qadir Rafique Cell # 03024741124, Whatsapp # 03024741124 Guess Paper Computer inter -I Al-Qadir Jinnah Science Academy Mallian Kalan ®) 2 (8) 3 a 5 ©) 9 165 | The extension of C source program is: ta) bh (8) © () .obj (0) exe. 166 | The process of converting source code into object code is knows as: A Compiling (8) Executing (c) Linking. (0) Seving. 167 | C statement end with a: ae a) Period (e) Comma © Colon (0) ‘Semnicalon” 168 | C-Language programs are divided into units called: ‘ ‘ ww Section (8) Syntax (c) Function (0) Debug 169 | The statements written by programmer are called: « Source code we) | object code T() syntex ae 170 | The target code produced by the compiler is: i — } Object code (8) Source code (c) Library code (0) _tinked code 171 | The output of the compiler is called: a @) Library code (8) Source code [cy Linked code] (by ‘Object code 172]. a loop statement. f a) if (8) ifelse © Swittte | (0) For 173 | Preprocessor directives are commands fc . (a) | Microprocessor [(8) | Languase processor [(C)| {Gpreprotessor | (0) Loader 174 | The expression in define directive: 7 Can only be changed at Cannot be changed Cannot be assigned a (2) | the ond of the program | (8) | Cannot be changed } (ce) but can be redefine | (D) value 175 | Void occupies how many bytes in memory? a @) Zero (e) ‘One (eh. Twa (0) Four 176 | Which of the following is used to donate preprocessor directives? a) % 8) Lo (0) @ 177 | Header files in Ccontal = Header information (4) |_ compiler commands | (8)|_ioratyfuiietions” | (c)| of Cprograms | (0) | _ operators for files 178 | Which header file contains information about standard input/output functions? (a) Stdio.h (ef cenip.h Gl String.h (0) Math.h 179 | The name of header file is written between: «) Ou aT 0 © (0) 180 | The extension of the haader file is. ) a) © Te. txt [e) if (0) 181 | A table |s a two.dimensional.structure that consists of: (a) | xand¥ coordifiates [ay] Matrixetements[¢c) | Rows and columns [(D) [intersection of data 182 | stdio.h stands for: ‘Symbolic input (A) | standard input outbut output Simple input outout String input output 183 | Debigis the process of Ccealing Bugs in Teentifying and @) | “proeriin t8)|_ removingerrors | (C) | ieentifyingerrors_| (0) | __ Removing errors 184 | program syntax error is detected by: ta) [Linker (8) Compiler © Loader (0) Debugger Whici’of the following language requires no translator to execute the program: c (8) Cs (©) | Machine language [ (0) | Assembly language The lowest level of programming language is: Java B) | Assembly language | (C Pascal cH ‘Which of the following is not a low level language? Prepared by: M.Qadir Rafique Cell # 03024741124, Whatsapp # 03024741124 Guess Paper Computer inter -I Al-Qadir Jinnah Science Academy Mallian Kalan ®) BASIC (8) Machine a ‘Assembly ©) None of these 188 | Which of the following language requires no translator to execute the program? fa) c (8) CH (c)|_Machine language |(D)| Assembly language 189 | Which of the following is also known as control key? A) Foreign key (8) Composite key (c) Primary key (0) Sottkey 190 | Variables are created in: a. a) RAM (8) ROM (OT Hardeisk [10) Gane 191 | Variable and constant names cannot contain a(n): ‘ ‘ a) Number (8) Uncerscore __[(€) Letter (0) Patiod 192 | The total number of keywords in Cis: x (4) 30 (2) 32 cs} 34 sey] 36 193 | In C, the maximum length of text name is: i — } 25 characters (8) 255 characters (c) 4155 character (0) 53 characters 194 | Amemory location with some data that can be changed is called: 2 «) Constant (8) Variable (C)|_ Named constant™] (by None 195 | Which of the following is a valid character constant? fy (a) A (e) 8 ( os To = 196 | Which isa valid character constant? ee « A (8) “Fell” o) (0) 197 | The maximum length of text type field in MS Access is: , ® 50 characters (8) | z50characters [(C)]s, Wsscharacter [(o)[ 255 character 198 | Which of the following data type offers the highest precision? ~... a) Float (8) Long int NGF tong double [toy] Unsigned tong int ‘When the result of the computation of two very small nurabérs is too small to be represented, this 199 | phenomenon is called: ° Arithoretie, 1]. (A) | Arithmetic overflows _| (B) underflow’ | (€) Truncation (0) Round off 200 | How many bytes the float data type takes in'memory? ny z (8) “2 a 4 (0) 8 201 | Which term describes the kind gf values that a.variable can store? a) VariableName | (B)f"_ Datatype (| Variable type | (0) Variable size 202 | The number of bytes used by int data type in Cis? « 8 jaa] 6 © (0) 203 | Number of bytes used by Tong daublé data type is: (a) 4 (e). 8 © 10 10) 2 204 | The data type in that’can handle fractional values ts called: ww Long ‘Fess Char © Flot (0) nt 205 | Which is numeri, data type with decimal point? “ Float (8) Int © Char (0) ton 206 [int isn A) ‘Speclal.word” (8) key word © ‘Cut word (0) First word 207 | The symbol'=.rebresents: ~ Assignment (ah “Gariparison operator_| (8) operator (c)|_Equal to operator_| (D) None of these 208 | Which of the following operators has lowest precedence? “ ! 2) + ) = (0) 209 | Relational operator is used to’ Construct Establish a relationship Compare two compound Perform arithmetic ta) | among variables | (8) values (Co conditions (0) operations Prepared by: M.Qadir Rafique Cell # 03024741124, Whatsapp # 03024741124 Page 10 Guess Paper Computer inter -I Al-Qadir Jinnah Science Academy Mallian Kalan 210 | The logical not operator denoted by |, is a: (®) [Ternary operator] (8) | _Uniary operator Binary operator Biiwise operator 211 | a += bis equivalent to: @) be 8) a=tb © 212 | The only binary operator in the following is: (4) 2 (8) 4 © 213 | Which operators are used to join two or more conditions? (a) Relational 8) Logical (] Assignment 214 | Relational operators allow you to ......... values. A Compare (8) Add ) Multiply. 215 | When a relational expression is false, it has the value: (a) Zero (8) (One (Q]tessthan zero 216 | a+=b is equivalent to: A be=a (8) a+b (c) ara+b 217 | The symbols that perform operations on data are called: = . A Syntax (8) Operand, ) OpeFators.. Operation code 218 | The symbol “=” represents: io 1A) ‘Comparison (©) | Asienment [10 Equalte Togical 219 | All of the following are logical operators except? ) Nor, 8) AND a 220 | The value of the C expression 5/9°2 a) 027 e iit 221 | Which of the following is equivalent to (p>-a)? ‘ a) Peq (8) pea) (ch 222 | Which operator has lowest precedence? (a) ! (8) ae he 223 | This means to increase a value by one: a a) Modulus te) [increment [()] Decrement None of these 224 | The value of logical operator OR wit bed if «a A=0 & B=1, (8) fr" Asa & 8-0 () A=1&B=1 All of these 225 | Logical operators are: a! (a) NOT (s) | *s. ANo © OR All 226 | For A= 4 and B =4 which expression evaluates as true? ADB Ley are © 1B 227 | The expression p= =qis equivalent to: ” LB) peg-1 () 228 | An expression that uses a felational operator is known as: ) Operational (8)] —Secuential —_[(C) Seria Relational 229 | An expression constant of ® Sperstors (18) Operané (Q] Bothazs [io Nene 230 | The escape sequence for backslash is: (A) fen (8) \b () \\ (0) a 231.| This formatspecifier %u is used for: (a) [Integer (8)] Unsigned short [(C)] Unsigned float [ (0) | __ unsigned long int 232 | inC program, the number of columns that are printed are specified in: (8) [Format specifier | (B) | Field wicth specifier | (C) | Formatting integers | (0) Both A&E 233 | Escape sequence \\ is used to print: fa) New line (8) Backslash () Space (0) Tab 234 | ASCII code for a character is displayed using format specifier: Prepared by: M.Qadir Rafique Cell # 03024741124, Whatsapp # 03024741124 Guess Paper Computer inter -I Al-Qadir Jinnah Science Academy Mallian Kalan ®) vd (8) x a we ©) mx 235 | The escape sequence for carriage return is: ta) \a (8) \c () \ (0) \t 236 | The function that is used to display output on screen is called: A) Printt (8) Scant ) Pow {D) Déspley 237 | How many variables can be used in one printf function? ae WA) One (8) Two (9 (0) 238 | Format specifier starts with symbol: a) % (8) $ © (0) 7239 | Which escape sequence can be used to begin a new line in C? (4) \ 2) \b [e} \m 1) 240 | Which of the following is not a valid escape code? , a (a) ve (8) \ ey i (0) 241 | Which of the following format specifier is used for float data type? = @) te (8) a © xt (oF 242 | Printf() is a: ma" a) Keyword (8) | suiltinfunction [(c)]__Locétfuretion | (0) |_User defined function 243 | The format specifier % is used for: “a, (a) Integer (8) Unsigned short [(C)] { unsignéeiost [(D)] Unsigned long int 244 | Which of the following format specifier is used for string? he a) F (8) ed. rc) c (0) as 245 | Which of the following things are determined by formnat spetifier?.” A) Data type (8) Field width roi EFortiat of a value | (D) All of these The function used for input and output is stored in: 2 Stdiosh 8) Conioat © Math.h (0) Tan.h ‘Seanf function is used to input: FierI= Numeric value B)]string'vajies” [0 Both A&B (0) [|_None of the above ‘Scanf function stores input value into. 2 ttn Position of Signature of a variable_| (B) |". -~Corisyant- (3) variable (0) | Address of a variabie 249 | in statement scanf{°36F,& kilaméter);, kilometer is aln): “) Integer variable B) [= Foatyariable [()] string variable 10) Double variable 250 | Function which used ta.get input from the user: ® printfl) PLL 7 scanty) [) cirser() 8) pars) 251 | The function getchel) is defined in: «) stdioh? A (8) stringh e math. (0) coniosh 252 | Getch( )is apart of: a) sti 6 Conio Math All of above 253 | The function getch(}.is defined 1a) Stdio.h (8) Coniosh a Stringh (0) Math. 254 | The ASCII cole for escape key: w |. wh (8) 28 © 29 (0) 30. 255 rogramming structure executes program statements in order? (a) [Relation (8) Decision (c) Sequence (0) Repetition, 256 | which programming structure makes a comparison? “ Relation (8) Decision © Sequence (0) Repetition 257 | Another term for a computer making a decision is: «8 Sequential 8) Selection (CT Repetition J (0) Iteration 258 | inif statement, true is represented by: Prepared by: M.Qadir Rafique Cell # 03024741124, Whatsapp # 03024741124 Page 12 Guess Paper Computer inter -I Al-Qadir Jinnah Science Academy Mallian Kalan @ 0 ®) 1 © 0) 3 259 | What is the simplest selection structure? (a) if (8) ‘switch (a) e (0) Nested if 260 | inif statement, false is represented by: « 0 (8) 1 © (0) 261 | which of the following is used for making two way decisions? i a if (8) else © Nested if (0) Switch 262 | Which keyword is not used in switch statement? ‘ 5 “ Default (e) if i) Case (0) ‘Switch 263 | Switch statement is an alternative of @ if 8) it else (OL Nested—it_ [oy], nested —it— else 264 | The last statement of each case block in switch () structure must be: ire. « Default 8) else Gl) Break (0) 7 Else 265 | The case block in switch () structure ends with: Z « End select (8) Break © End case’ o Case else 266 | Which of the following is called counter loop? if Nested f—else | (6) it—else ( For léop. While loop) The conditional operator is used as alternative ta: a, if (8) = else (| Sihmeiseitelse Switch ‘Another term for a conditional operator is: dF Ternary (8) Binary © byte Treration Conditional operator takes: OF Vin ‘One operand (8) | Twooperands “Y.(ey | thiteée operators: Four operands Which operator is called a ternary operator? if 8) He © How many types of loop structures are prdadnt iim, 1 (8) ‘> = Ta One execution of a loop is known as a(n}! : Test 8) iteration Duration Integer ‘Aloop that never ends is called!" Infinite loop (8h] = Running loop Nested loop Continuous loop One iteration of loop is known asi. Iteration |B) f=... Duration Cycle Repetition In while loop, the loop conto! variable is always initi Inside the loop Outside the body of Outside the program “} (B) body (C)|__Afterloopends | (D) loop While loop is algo called: Conditional 169 6 Wend loo) Counter 100) None Joop structure always executes at least once? Nested (e) FOR whi Do While In which 1oop-the condition comes after the body of the loop? ‘fort (8) While () © Do-while () Nested for () ‘| which 6¢ the following loop is available in C language? Ss while-wend (e) For-next (© Sequence Do-while ‘Serncofon is placed at the end of condition tn: Switch (6) For loop | white joop Do-while loop “The Do-while loop structure always ends with: Comma 8) semicolon] (C) Colon Brace Tterates at least once if condition is false. Prepared by: M.Qadir Rafique Cell # 03024741124, Whatsapp # 03024741124 Page 13 Guess Paper Computer inter -I Al-Qadir Jinnah Science Academy Mallian Kalan 8) ‘Wihile loop () | do-while loop | (2) For loop ©) All of these, 283 | in for statement, the expression is executed only once: ta) Validation (8)]—initistization [ted Test (0) Concition 284 | What is the final value of x after executing the following code for (int x=0; x<,10; x+#]? «a 8 (8) 3 © 10 (0) 285 | if you want a user to enter exactly 20 values which loop would be the best to use? a) while (8) Do-while © Infinite (0) 286 | Which one is the loop structure? a i ®) ielse i) Switch (0) 287 | What is the final value of | after executing the following code for (int i=4; ic5; i#=2)? a) z (2) 5 é 19) 288 | Aloop within a loop is called: ae a) ‘Complex (8) Nested © Infinite’ 10) 289 | Which is a loop statement? @ if (8) iFelse © Switch 230 | Printt() isa: fi User-defined 7 Built-in function function Local function, Keyword Abbuilt-in function: Z ead "Gannat return & Cannot be redefined | (B)| Canberedefined | (| _%, “sive Should be redefined ‘Another name for built-in function is oe } User-defined ty Livrary function | (8) function __"4C) [:Aritfimetic function | (0) Allof these A type of function written by the programmer is known as: User-defined 18) |__ sub progesms Subroutines [(p) | __ Built-in function ‘The first line of user-defined function is: | ‘Arguments (8) g Prototype | (0) Caling Function prototypes for built-in functions are siecified in: Source files te) | rWeaderties [(C)[ Object files (0) Image files InaC program, two functions can haves, ssennnie toh} seinptsmeters | ch] ee caraneter |! | cteren prcmeters Multiple arguments to 4 function are separated by: Period Lie" colon iG Commas (0) Semicolon Tn C-Language, the first line of function definition is known as Function header-., “E(@}] Function body [(C)] Arguments (0) Parameters 299 | A function that does not retueri any thing has return type: (a) Nothing.” (8) Float © Void (0) ‘ull '300_| Which statement is ustd by a function to return a value? @) Give 3 16) Send) G) Return (0) Call 301 | Function declacation is also known as function wn A) |. “Detinitién (8) Header [el Prototype (0) Parameters 3021 | Which of the following looks for the prototypes of functions used ina program? Cs (8) Loader ch Compiler (0) Parser 303 | Which of the following is true about a function call? Stops the execution of Transfers contralto Transfers control to Resumes the execution (9) | the program (8) | the called function || the main function |) | of the arogram 304 | Memory is allocated to a local variable at the time of its: @) Declaration (8) Destruction | (c) Definition 1) First reference Prepared by: M.Qadir Rafique Cell # 03024741124, Whatsapp # 03024741124 Page 14 Guess Paper Computer inter -I Al-Qadir Jinnah Science Academy Mallian Kalan "305 | Local variable are also called: (A) Automatic variable (8) Static variable Register variable Run time variable 306 | The scope of a variable refers to its: « Length (8) Name ‘Accessibility Data type 307 | Memory allocated to a local variable at the time of its 2% 4) Declaration (8) Destruction Definition First reference 308 | Global variables are created in: a (a) RAM. (8) ROM Hard Disk Ss.Cache” 309 | A function can return... value. be A 1 (8) 2 310 | The name of actual and formed parameters: =, ae” May or may not be a 4 same (8) Must be same. Must be different Miust-be in lowercase 311 | Formal arguments are also called: mae? (a) | Actual arguments _[ (8) | Dummy arguments Original argumefits. Referenced arguments 312 | Afile is stored = «@ RAM (8) Hard Disk © ‘ROM. oO. Cache 313 | The character conversion may occur in: ™ a Text stream t)]__ inary stream [| ingiatstxegin” _[ (0) | __ output stream 314 | A sequence of characters from an input device to computer is:cailled: ~ w Input stream te) [Textstream [Qf Binary stream [t0) | outout stream 315 | Which of the follawing mode open only an existing file for.bbth réading and writing: a) “we 8) pie “re {0) 316 | fopeni) function takes........ parameters. : 4) 1 (8) 2 : (0) 317 | On successfully dosing a file, the fclose() rétuf “ NULL (8) (zero fone) (0) FILE pointer 318 | On successful closing a file, the fclosel) returns:, (a) Null (8) 9 (Zero) 1(One) (0) File pointer 319 | Which mode opens only an existing file fox both reading and writing? (a) “we wer we ic a (0) fae” 320 | Which of the following functions is used to read character from a file? 8) getel) Tey tute) © fputs() (0) fgets) 321 | Which of the following Functigns used to write string to a file? “a getel) 48) putel) ) fputst) (0) fgets() 322 | An array subscript should be: @ Int 6 Float © double (0) ‘An array 323 | which of the following character is used to mark the end of the string? a) \o 8 Jo c) \e 324 | Which ofthe following functions is used to write a string to a file? a) “Puts (8) Putel) () Fouts() QUESTION NO. 2 1._Define data Define information: 2._Describe data capturing '3._Describe data manipulation, Prepared by: M.Qadir Rafique Cell # 03024741124, Whatsapp # 03024741124 Guess Paper Computer inter -II 6. _ list the file types from usage point of view. 4.__Whatis meant by reproduction? Whats filer Al-Qadir Jinnah Science Academy Mallian Kalan 7. What is master file? B,__ List the file types from function point of view. 9.__Define program file with example. 10. What is meant by file organization? 14. Define deta integration. 32, Define database, 33, st diferent objectives of the databate 11. Differentiate between master file end transaction file. 15._Define date integrity 16._ Enlist different types of database models, 17,_Describe network model 8. Write any two objectives of database management system. 19. Write any two advantage of database management system, 20._List cown any two features of DEMS. Whatis the purpose of backup and recovery? 22._State the use of query language. 23._Why is report generator used jn tatabase system? 21, Define data dictionary. 25._Define field a Define the term table or relation, 27. Enlist 4 different properties ofiatétion. Define entity 29. Giveexampleofantity. 7 7 Differentiate between parent table and child table. 31 Write down.the atic purpose of using views Define indexes 33, What is key? List cifferent types of keys. 35._ Define primnary-key. Define secondary key. 37._Definé alterhate key. Define composite key. 39._Define foreign key Differentiate betwee Distinguish between primary key anc foreign Key. ;condary key and primary key. “@1._Differeitiate Between Cendidate Key and Primary Key. ,_ Detling énd user. Who isa date administrator? Whoijsia Gatabase administrator? Write the purpose of feasibility study. fifje the term analysis. ‘What is the importance of project planning? Which activities are involved in data analysis? What is meant by data modeling? Bk, Define entity or object. Define an attribute. Give an example. Define relationship. What isthe difference between relation and relationship? * . How relation is formed in database? Name of any two types of relationship, Give one examples of one-to-one relationship, Define cardinality, Define macality Differentiate between cardinality aha meealiva. |. Write the use of ER diagram. ‘Whatis meant by entity integrity? ._ How is entity integrity attained? What is meant by referential integri Define synonym. = Explain normalization, Define homonym, _Describe partial dependency. How second normal ford leach aveus. ._ Write types of anomalies. = 3]B)B/E)/B/8 818) SI8/S Ble R/S) S |BIS SIS S/R ls Define insertion anomaly 72. Define 3rdnormalform, ._ Describe transitive dependency. 74,_What is meant by referent) integrity? 5. What is Microsoft Access? ._List Gown any two advantuges oF Microsoft Access. 78._Define the term RDBMS,. State the use OF MS, Access. 79,_Lst advantages of RDBMS. ‘80. List any four propertigs.of relational database management system. B1. Whats sample database? Whatiswatabase wizard? 83,_Define the term redundancy, ._ Name anp.for patés of MS Access application window. 85. Describe menu bar. 5. Define serol bar. is the tise of title bar in MS Access? Define database object 87. |. Ust different buttons available on Access database window. Differentiate between menu bar and toolbar. Define two database objects. Whatis the role of query indatabase? How is 2 query written? |_Define a form 5. Write two advantages of form ._ Write definition of reports, Differentiate between query and report. ._ List any two uses of reports 99, Define the term degree of relation. Prepared by: M.Qadir Rafique Cell # 03024741124, Whatsapp # 03024741124 Guess Paper Computer inter -II Al-Qadir Jinnah Science Academy Mallian Kalan 200, Difference between degree of relation and cardinal |] 40) ocfine oe of relation, 103. List two disadvantages of integrated development 1102. List some advantages of IDE. environment. 1104, Name two table views available in Access. 105. What s the use of datasheet view in MS Access? 1106. What is OLE object in MS Access? 107. List any four field properties. Z 108. What isthe use of field size property? 109, What isthe use of input mask? > 115. Write a query to display all the revords.from a table Employee. 116. List some advantage of query. 1117. List any two types of forms used In MS Access, 1118, Write use of columnar farm in MS Access 119, What is auto form3-" = 120. Discuss the use of éesign view in MS Access 121. Define listbox; ; 122. Define combo box 123. Differentiate between combobox and list box 124, State the purpose of radio button’ 125. List any two.tathods of treating sub forms. guish between form and sub form. 127, Define reports, WS Access? 129, Write tietise af switchboard QUESTION NO. 8 2, Write the syntax of while loop, both for 1. What is control structure? |:"--single'statement and for multiple Statement. 4:.Write the syntax of do-while loop, both 3. List types of control structure. : for single statement and for multiple oy ek, statement. 5. Describe sequence structure. o"'6. Rewrite the following code using do-while loop. int x=10; while (x>=1) 7. Describer selection structure... { printf (“%d”, x 62); 114. Discuss the use of design view in MS Access. x} 8. How are instructiéits.executed in repetition structure? fh 9. Convert while into do-while. 10. Define compound statément. int i=1; 11. Explain “if” statement. while (i<=15) 12. Find,6ut.errors:", {printf ("/n", 1); #include'20) then isi+1)} print .(“islamic Country”); getch( )] 13:.Find error from the following int y;2! if (y==z) printf (“yes”) » 14. Define “for” loop? Prepared by: M.Qadir Rafique Cell # 03024741124, Whatsapp # 03024741124 Guess Paper Computer inter -I 15. Trace the output. void main () { int marks; printf (“\n enter your marks”); scant (“%d”, & marks); if (marks>=40) printf (“\n congratulation”); } Al-Qadir Jinnah Science Academy Mallian Kalan 16. Convert following loop code into for loop code i=3; do { printf ("96d\n", i); i#=3; } while (i<=21); 17. What will be output of the following? int x=5, y=10; if (x>y) 19. Trace the output of the following code. int a=4, b=2, c=5; if (a>b) hp 18. What is the finat'vatue Of x after executing the following code? for(int X20; x<10; xt), ne’ 20. Predict thé output from the following coded S47 int n; clrscr-(i; for (n25}.n3=1;n--) printf (“96d\n”,n); | getchths...* |. Tracé the output. init, 10; for (i=1; is=5; i++) printf("\nPakistan”); } 22, Trace the errors of the falloy Void main () ) Print f ("%d\t", x); } 24. Convert the following do-while loop in for loop. int c=2; do printf ("%C”, c); {ae while (c++ <=5); Prepared by: M.Qadir Rafique Cell # 03024741124, Whatsapp # 03024741124 Guess Paper Computer inter -I Al-Qadir Jinnah Science Academy Mallian Kalan 25. Trace error. void main () print? ("ok"); 26. Define nested loop. else printf (“cancel”); getch(); } 27. Trace errors from the following code. if (7!=10 printf (“hello”); else-do printf(“welcome”); Predict the output of the following code. if (4%2==0) printf (“Programming makes the life interesting \n"); else printf (“Programming is difficult to learn” 29. Find the output of the following code. ” #include void main () 30. What is sentinel controlled loop? printf (“Fail”); else printf (“Pass”); } 31. Trace the errars.” 32. Define the term function. printf (*hello”); 34. List some benefits of using functions. else printf (“correct it”); Prepared by: M.Qadir Rafique Cell # 03024741124, Whatsapp # 03024741124 Guess Paper Computer inter -I 35. Predict the output for the following code. int a, b, c; printf (“%d”, c) Al-Qadir Jinnah Science Academy Mallian Kalan 36. List different types of functiorisin.C. 37. Trace error in the following code. void main (void) { int x=10; if (x1=10); xt; else (x==10) oy } int m,n; m=0; n=m; if (m==n) printf (“BWP”); else printf(“LHR"); Show output. int p=10; if (p!=10) p=0; else p=5; 41. Find errors. ; void main() if (a=y); printf (“xis largest”); else printf (“y is largest”); getch(); Trace the output. int a=5, b=10; if a>b; printf (“Low Triangle”); else printf (“Huge Triangle”); 47. Write output. intp, qr; q=2; if(p%q==3) else r=1; / printf (“%6d”, r) : 48. Define function body. 49. Write down output of the following code. voidmain() f° {int x=10; if (x!=10) printf (“Hello”); else (Rs, printf (“World”): } fate 50. Write the use of function prototype. Prepared by: M.Qadir Rafique Cell # 03024741124, Whatsapp # 03024741124 Guess Paper Computer inter -I 51. Trace the error from following code segments. void main (); {int x=10; int y=15; if (x=y) printf (“x is equal”); else printf (“x is not equal”) } Al-Qadir Jinnah Science Academy Mallian Kalan 52. What is meant by a function ¢all? 53. Write use of “if-else-if” statement. 54. Define local variable... 55. Define nested-if-statement. 57. Why a default label is used in switch statements? 56. What is meant/by scope of variable? 58. Differentiate betweendacal and global variable. ‘ 59. Write two rules of using switch case in C program. 60. What i thefifetimé of local variable? 61. Why break statement is used ina switch statement? 62. How long the global variable exists in the memory? 63. What happens if break is missed in case block? 64, Wiite down the scope of global variables. 65. Write three advantages of switch statement. |.66.. How'does a function return value? 67. syntax. What is conditional operator? Write its, 68. Describe the purpose of file handling. 69. Write any two uses of loop. “|-70. Define a stream. 71. Define “while” loop. 73. Convert the following code iritowhile” loop. cS for (int { i210; 144) printf (“\nPakistan’); a Convert the following loop céde into while loop code. for (i=10; i>0; i- { printé (“i } Define program. 72. Write the name of two types of stream used in files in C Language. 74, What do you mean by text steam? 75. What is library stream? 76. Compare binary and text stream. 77. Define EOF marker in file. 78. What is a text file? 79. Define a pointer. 2. What do you know about C statement? Who is programmer? 4._ What are keywords? List out two advantages or characteristic of C language. 6. Define variables. Prepared by: M.Qadir Rafique Cell # 03024741124, Whatsapp # 03024741124 Guess Paper Computer inter -I 7. What is the use of Turbo C++? Al-Qadir Jinnah Science Academy Mallian Kalan |. Why important to assign a data type toa variable? 9. Define object code. 10. Why is it important to assign a data type toa variable? 11, Define source code. 12. Differentiate between declaring and defining a variable. AP 13. Why source code cannot be executed directly? 14. What is variable initialization” 15. Distinguish between source code and object code. 17. What Is the process of linking in C programs? 16. Write down two rules for dedating naming variables in.C, TB. Give some examples of valig variable names. f a 19. What is the role of linker in Clanguage? 21. Differentiate between linking anc loading. 20. Differentiate betweer function definition. ahd declaration. 22. Define-tenstant>.. 23. Define structured programming. 25. How program logic is implemented in unstructured programming language? }£2-memne structures programming Ah memmesaracter constant_| 24, Define'character constant 26. Differentiate between string constant and.tharactér constant. 27. What is #define directives? 28.,Define data type. Give example. 29. What are preprocessor directives? |°30, List any four types of integer data in C # Janguage. 31. What is header file? 33. Differentiate between preprocessor directives and header file. //34. List any four types of operators in C. 32. Write C statement to print the value of unsigned long x. 35. Explain constant macro with example. 36. What is a relational operator? 37. What is the use of main() function. in C? programs? 38. What is the use of AND logical operator? 39. What do you mean by actions?! i 40. What is assignment operator? What is statement terminator? 42, What is use of assignment operator? 43. State the purpose of fieader file ‘44, What is increment operator? 45. Define bug. 47. Define the term debug. 46. Differentiate between increment and decrement operators. 48. Which operators have been used to evaluate compound condition? 49. What.are different types of errors in C programiming?...” 51. Write:dawa any two causes of syntax rrors:-* 50. What is compound assignment operator? 52. Define compound assignment statement. 53. What aré run-time errors? 54. What is meant by operator's precedence? 55. Differentiate between syntax error and logical error. 57. Why the logical error is the most error to find? icult 56. Differentiate between unary and binary operator. 58. Define expression with example. Prepared by: M.Qadir Rafique Cell # 03024741124, Whatsapp # 03024741124 Guess Paper Computer inter -I 59. What are programming languages? 61. Name two main categories of programming language. Al-Qadir Jinnah Science Academy Mallian Kalan 60. What is arithmetic expression? 62. Describe single comments in C. 63. Define low level language 64, What is control string in printf function? 65. What is machine language? 66. List some important functions for output j 67. Why does machine language program executes faster that high level language? 69. Define assembly language 68, What is the use printf() functi Tan? 70. Write the syntax of aint = statement. 71. What is the difference between machine language and assembly language? 73. What Is an assembler? 72. Discuss the purpose of %c format specifier. no Ta. What is the use Of feldwldth specifier? 75. What is a compiler? 76. Define escape sequetives. 77. Define high level language. 78. Name four escape character provided by & i Si 79, List any four commonly used high level languages, 81. Distinguish between low level and high level language. 80. Write down:-output of the following pisice-of.code.’printf(“*\n **\n***"); } 82. Predic# the-output of the following code. pring (*\n *4\n *\n"4\n); 83. Differentiate between compiler and interpreter [84 Find the output of the following code pprintf("Programming \t is \n very \t ~. ititeresting”); 85. What is an identifier? 86. Define standard input. 87. List two types of identifiers in C. “f'88. Why the ampersand (&) used in scanf function? 89, Write the legal characters of an identifier: 91. Differentiate between standard iderttifier and use-defined identifier. A 90. List some input functions in C language. 92. What is the use of “scanf” function? 88. What do youl mean by cat sensitive in C language? 94. Describe getch() function. LONG QUESTIONS NO. 5 Describe differerit steps involved in designing a database with the help of diagram. Define database systein. Explain three major components of database system. management.system. Explain database mmianagement system. Discuss any three advantages of database Whats data distribution? Explain three data distribution strategies. 5. __.Whatis.data modeling? Explain ingredients of data modeling. 6a ‘What is E-R diagram? Give an example of E-R diagram. 7.__Explain components of lo, ical database model. '8.__ What elements are combined to produce physical database design? Explain. 9. Briefly describe basic data distribution strategies. LONG QUESTIONS NO. Prepared by: M.Qadir Rafique Cell # 03024741124, Whatsapp # 03024741124 Guess Paper Computer inter -I Al-Qadir Jinnah Science Academy Mallian Kalan Explain different data types available in MS Access. What is field property? Discuss different field properties in detail What is referential integrity? Give example. Explain cascade update and cascade delete options in referential integrity What is filter? Discuss different types of filter used in MS Access. What are queries? Explain types of queries. Discuss different types of forms in MS Access. What are reports? Explain any two types of reports, LONG QUESTIONS NO. a : ._ Write down step wise procedure for writing a C program. ._ Write any four steps for writing and executing a C program. Explain the basic structure of C language program with example. |. What is an Error? Explain different types of errors in C language. ._ What is bug and debugging? Explain types of errors in.C program. |. What is computer language? Discuss one type of computer language. Define high level language. Write down the characteristics of C language. LONG QUESTIONS NO. 8 . Write 2 program in C-Language to accept-a, year from the keyboard. Find out it is “Leap Year” OR “Not Leap Year”. . Write a program in C that inputs the’tiumber of the month of the year and display the number of days of the correspondiig month, using if-else-if statement. (e.g. if user enters 2, it will display 28 or 29) " Write program in that inputs anumbér by the user and checks whether itis even or odd. . . Write a program which Tague Td numbers and tells whether these numbers are equal or not equal. ad Write a program inG-Language-which inputs two numbers and check whether they are equal or different. m . Write a program that inputs a character from user and checks whether it is a vowel or not. ‘ . Write a program in'C-Language that inputs a character from user and finds whether its vowel or constants,” LONG QUESTIONS NO. 9 What is'dd-while loop? Write its syntax. Explain its working with example and flowchart. Define forloop. Write its syntax and flowchart. Explain its working with example. Explain the working of for loop with syntax and flowchart. Defitie’For-Next loop. Give its syntax and flowchart. Also explain its working using an example. Define nested loop. Write its syntax. Explain its working with the help of example Define GOTO statement. Explain its working with the help of an example. Prepared by: M.Qadir Rafique Cell # 03024741124, Whatsapp # 03024741124

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy