November 18, 2025

Rawalpindi Board First year Computer Science all past papers MCQS.

By | Published | No Comments
Spread the love
9
Created on By admin

Rawalpindi Board CS past paper

Rawalpindi Board CS past paper

1 / 119

layer that is responsible for transferring frames in OSI model is

2 / 119

one or more network connected to hub is called;

3 / 119

The device uses parallel transmission:

4 / 119

how many types of language translator are there?

5 / 119

The function that is used to get the maximum value in MS excel is called

6 / 119

Which function key is used for checking spelling and grammar in MS word

7 / 119

A small image that represents a program folder or file is called

8 / 119

Which one is a faster memory?

9 / 119

How many bits are there in 4-bytes?

10 / 119

The microphone converts the sound into

11 / 119

Communication between computer and keyboard involve the transmission:

12 / 119

How many types of addressing scheme are there :

13 / 119

which of the following techniques uses modulation?

14 / 119

The program that contains the instructions to operate a device is called

15 / 119

The process of producing multiple copies of a document is called

16 / 119

The process of transferring a file from remote computer to our local computer is

17 / 119

CBT software is used in

18 / 119

How many characters ASCII-7bit code represents?

19 / 119

one or more computer connected to a hub is called:

20 / 119

common font size used in business document is:

21 / 119

Moving up or down in word processing document is called

22 / 119

The extension of Ms-Word is :

23 / 119

The software which is used to control all part of manufacturing process is called :

24 / 119

The actual working area in micro soft excel is

25 / 119

A person who gains illegal access to a computer system is called

26 / 119

The process of converting digital signals into analog signals via modem is

27 / 119

Which of the following technique is used for modulation

28 / 119

The keyboard format that is most commonly used

29 / 119

RAM usually has ——types

30 / 119

which of the following can be used to launch the word art :

31 / 119

Which of the following is an example of system software?

32 / 119

The fly-by-wire system is called used in

33 / 119

CPU sends commands signals through

34 / 119

Clipboard stores—– in word processing.

35 / 119

DSL stands for

36 / 119

The operating system based on NT technology is:

37 / 119

BIT stands for:

38 / 119

The number of argument in SQRT() function in MS-excel is are

39 / 119

the minimum number of primary partitions that can be created on a basic disk are

40 / 119

Which one is a an Automatic programmable machine:

41 / 119

OSI model consists of

42 / 119

Making illegal copies of copyrighted software is called

43 / 119

A communication signal in the form of a continuous wave is called:

44 / 119

Temporary storage area within CPU is called:

45 / 119

Trojan Horse is an example of

46 / 119

Formula of instructions that run the computer is

47 / 119

A set of instruction that run the computer are

48 / 119

in spread-sheet,by default rows are labeled by:

49 / 119

Dejure means

50 / 119

Which is a communication device

51 / 119

Television and radio broadcasts are example of

52 / 119

The keyboard layout that is most commonly used is the

53 / 119

A collection of related web pages is called

54 / 119

The communicational channels can be divided into

55 / 119

Digital signals are commonly known as

56 / 119

XGA resolution is:

57 / 119

Temporary storage are within CPU is called

58 / 119

Electronic banking is also known as?

59 / 119

The component of CPU which responsible for interacting with RAM is

60 / 119

Web pages are written in which type of language is

61 / 119

The microphone converts the sound into

62 / 119

The folder which contains administrator tools is

63 / 119

A work book is a collection of

64 / 119

Terminators are used in——topology

65 / 119

Which of the following is used to get voice output

66 / 119

Default name of first sheet in any work book is

67 / 119

The extension of an executable file is

68 / 119

Testing all program components together in SDLC is called

69 / 119

Which is not a bio metric technique for person identification

70 / 119

Another word for pointer is:

71 / 119

The devices that are automatically detected by windows are called

72 / 119

Data processing is also known as:

73 / 119

which of following coding scheme used by IBM

74 / 119

How many characters ASCII-7bit code represents?

75 / 119

Which one is the fastest

76 / 119

The term that refers to all input, output and secondary storage devices is called:

77 / 119

Software that is available free for a limited period is called

78 / 119

Which of the following is not a type of bus in computer?

79 / 119

which of following is not a type of network :

80 / 119

GUI stands for?

81 / 119

World wide web was established in:

82 / 119

physical path that connects the source and receiver is known as;

83 / 119

Which of the following is not an example of system software

84 / 119

The length of IP address is

85 / 119

Which of the following keyboard shortcuts is used to change the case:

86 / 119

The output of the compiler is called

87 / 119

A device that connect multiple networks using similar or different protocol;

88 / 119

In MS-Excel, formula begins with:

89 / 119

The program that contain instruction to operate a device is called :

90 / 119

Which is a type of RAM:

91 / 119

Most applications of robotics are in which area

92 / 119

Which is not an output device

93 / 119

The register holds the address of the next instruction to be fetched for execution

94 / 119

Trojan Horse is a type of

95 / 119

Which of the following is an Antivirus ?

96 / 119

Data shown on display unit or played through audio is called

97 / 119

A device that connect multiple network using similar or different protocol is a :

98 / 119

Soft copy refers to

99 / 119

Analog signals are measured into

100 / 119

Another name of antivirus is:

101 / 119

The top most layer of OSI model is

102 / 119

Which of the following is not an Antivirus program :

103 / 119

physical path that connects the source and receiver is known as:

104 / 119

We press enter key in Ms word to create a

105 / 119

A virus that replicate itself is called

106 / 119

Which components is used to connect different parts of the computer together?

107 / 119

Printed images can be converted into digital form using

108 / 119

Which of the following contains the administrative tools in operating system :

109 / 119

The secret word or number used for computer security is called:

110 / 119

Electronic circuits that executes computer instructions is called

111 / 119

Format C is an example of

112 / 119

The topology used for a small number of computer is called

113 / 119

Each computer on a network is called

114 / 119

Which devices connects each computer to a network?

115 / 119

Which technology is used to read data on cheques

116 / 119

The computers or internet that contain website are called

117 / 119

Transferring information from computer to internet is called

118 / 119

Which communication medium requires line-of-sight

119 / 119

Which one of the following is not a cause of virus

Your score is

The average score is 54%

0%