Spread the love 9 Created on January 21, 2022 By adminRawalpindi Board CS past paperRawalpindi Board CS past paper 1 / 119 A small image that represents a program folder or file is called a) command b) ICON c) GUI d) menue 2 / 119 Trojan Horse is a type of a) antivirus b) horse c) hacker d) virus 3 / 119 Digital signals are commonly known as a) band b) broadband c) narrowband d) Baseband 4 / 119 The folder which contains administrator tools is a) control panel b) installer c) linker d) debugger 5 / 119 A device that connect multiple networks using similar or different protocol; a) router b) bridge c) gateway d) repeater 6 / 119 A device that connect multiple network using similar or different protocol is a : a) bridge b) gateway c) repeater d) router 7 / 119 Printed images can be converted into digital form using a) joy stick b) Scanner c) mouse d) stylus 8 / 119 World wide web was established in: a) 1992 b) 1985 c) 1980 d) 1989 9 / 119 A virus that replicate itself is called a) Trojan horse b) bug c) worm d) boot sector virus 10 / 119 Television and radio broadcasts are example of a) half duplex transmission b) full duplex transmission c) simplex transmission d) duplex transmission 11 / 119 The device uses parallel transmission: a) Printer b) keyboard c) mouse d) light pen 12 / 119 Which components is used to connect different parts of the computer together? a) I/O unit b) buses c) main memory d) control unit 13 / 119 in spread-sheet,by default rows are labeled by: a) letters b) numbers c) underscore sign d) special symbols 14 / 119 Making illegal copies of copyrighted software is called a) software hacking b) software distribution c) software piracy d) software browsing 15 / 119 Formula of instructions that run the computer is a) Hardware b) Document c) Software d) CUPs 16 / 119 Each computer on a network is called a) Link b) Code c) Node d) Mode 17 / 119 Which of the following is not an Antivirus program : a) Dr.Solomon b) McAfee c) Nod 32 d) Redlof 18 / 119 Most applications of robotics are in which area a) manufacturing b) cooking c) farming d) technique 19 / 119 How many types of addressing scheme are there : a) 2 b) 4 c) 3 d) 5 20 / 119 Which is not an output device a) Monitor b) Printer c) Scanner d) Speaker 21 / 119 Which of the following is used to get voice output a) Speaker b) printer c) plotter d) mic 22 / 119 layer that is responsible for transferring frames in OSI model is a) presentation layer b) application layer c) session layer d) data link layer 23 / 119 The process of converting digital signals into analog signals via modem is a) Demodulation b) Modulation c) Mixing d) Merging 24 / 119 Another name of antivirus is: a) worm b) Trojan Horse c) Vaccine d) DES 25 / 119 the minimum number of primary partitions that can be created on a basic disk are a) 6 b) 2 c) 4 d) 8 26 / 119 Data processing is also known as: a) merging b) procedure c) knowledge d) computing 27 / 119 The microphone converts the sound into a) Mechanical signals b) Electrical signal c) Software d) Computer file 28 / 119 We press enter key in Ms word to create a a) paragragh b) document c) Line d) sentence 29 / 119 Which devices connects each computer to a network? a) router b) bridge c) gateway d) Network interface Card 30 / 119 The operating system based on NT technology is: a) Windows 2000 b) Windows 95 c) windows 98 d) windows 97 31 / 119 The keyboard layout that is most commonly used is the a) inriter b) qinerty c) QWERTY d) splitter 32 / 119 how many types of language translator are there? a) 1 b) 3 c) 4 d) 2 33 / 119 which of following is not a type of network : a) MAN b) LAN c) WAN d) NAN 34 / 119 The top most layer of OSI model is a) presentation b) session c) transport d) Application 35 / 119 Moving up or down in word processing document is called a) word-wrap b) pull-down c) Scrolling d) line movement 36 / 119 Which of the following is an Antivirus ? a) NOD32 b) Logic bomb c) Trojan horse d) Redlof 37 / 119 Which is not a bio metric technique for person identification a) badge b) retina c) pam print d) face 38 / 119 The secret word or number used for computer security is called: a) Biometric data b) safe words c) Passwords d) private words 39 / 119 The communicational channels can be divided into a) 4 types b) two types c) 5 types d) 3 types 40 / 119 which of following coding scheme used by IBM a) MICR b) CAM c) BCD d) ATM 41 / 119 physical path that connects the source and receiver is known as; a) communication channel b) decoder c) encoder d) NIC card 42 / 119 BIT stands for: a) binary tree b) binary integer c) binary interval d) binary digit 43 / 119 A communication signal in the form of a continuous wave is called: a) digital signal b) Analog signal c) discontinuous electrical signal d) binary signal 44 / 119 Transferring information from computer to internet is called a) Uploading b) Downsizing c) Pasting d) Downloading 45 / 119 Which communication medium requires line-of-sight a) twisted pair b) fiber optic c) microwave d) coaxial 46 / 119 Which of the following is an example of system software? a) text editor b) MS-word c) spread-sheet d) operating system 47 / 119 which of the following techniques uses modulation? a) Broad band b) base band c) bus-width d) bandwidth 48 / 119 Format C is an example of a) Trojan horse b) worm c) bomb d) Redlof 49 / 119 The keyboard format that is most commonly used a) SPLITTER b) ASDFGH c) QWERTY d) TWITTERY 50 / 119 CBT software is used in a) business b) industry c) E-commerce d) education 51 / 119 Analog signals are measured into a) volt b) digits c) watts d) Herts 52 / 119 DSL stands for a) Digital subscribe line b) Direct service Lease c) Distance service d) Domain server 53 / 119 Which one is a an Automatic programmable machine: a) mouse b) Robot c) Cd-drive d) keyboard 54 / 119 Which one is a faster memory? a) ROM b) RAM c) Register d) cache 55 / 119 The register holds the address of the next instruction to be fetched for execution a) Program counter b) Counter register c) Base register d) Instruction register 56 / 119 Electronic banking is also known as? a) Global banking b) Cyber banking c) Offline banking d) Interactive banking 57 / 119 The component of CPU which responsible for interacting with RAM is a) register b) ALU c) Control unit d) hard disk 58 / 119 Which technology is used to read data on cheques a) OCR b) OMR c) CAT d) MICR 59 / 119 How many characters ASCII-7bit code represents? a) 128 b) 512 c) 1024 d) 256 60 / 119 A person who gains illegal access to a computer system is called a) computer consultant b) hacker c) network d) computer operator 61 / 119 Terminators are used in——topology a) star b) ring c) mesh d) Bus 62 / 119 OSI model consists of a) 7 layers b) 11 layers c) 5 layers d) 9 layers 63 / 119 Which of the following is not a type of bus in computer? a) control bus b) timer bus c) data bus d) address bus 64 / 119 Data shown on display unit or played through audio is called a) photo copy b) shared copy c) Hardcopy d) Soft copy 65 / 119 which of the following can be used to launch the word art : a) drawing tool bar b) status bar c) standard toolbar d) ruler 66 / 119 Which of the following keyboard shortcuts is used to change the case: a) shift+F3 b) Ctrl+F3 c) Ctrl+F2 d) alt+F3 67 / 119 The number of argument in SQRT() function in MS-excel is are a) equal to range b) one c) equal to column number d) two 68 / 119 The program that contain instruction to operate a device is called : a) Device driver b) device system c) device linking d) device operator 69 / 119 Trojan Horse is an example of a) system software b) hardware c) Virus d) antivirus 70 / 119 RAM usually has ——types a) 5 b) 3 c) 4 d) 2 71 / 119 The fly-by-wire system is called used in a) Airline b) medical c) industry d) edcation 72 / 119 A work book is a collection of a) functions b) sheets c) formula d) table 73 / 119 The actual working area in micro soft excel is a) work book b) lotus-123 c) worksheet d) data base 74 / 119 Web pages are written in which type of language is a) Assembly b) Pascal c) HTML d) SQL 75 / 119 Communication between computer and keyboard involve the transmission: a) Full-Duplex b) Automatic c) Half-Duplex d) Simplex 76 / 119 one or more computer connected to a hub is called: a) star network b) bus network c) ring network d) mesh network 77 / 119 How many bits are there in 4-bytes? a) 16 b) 8 c) 32 d) 64 78 / 119 Which of the following is not an example of system software a) drives b) operating system c) Microsoft office d) utility program 79 / 119 The software which is used to control all part of manufacturing process is called : a) CAD b) ATM c) MICR d) CAM 80 / 119 The process of producing multiple copies of a document is called a) image processing b) desktop publishing c) reprographics d) data management 81 / 119 GUI stands for? a) Graphical user interface b) Graphical usage interface c) General user interface d) Graphical user icons 82 / 119 Electronic circuits that executes computer instructions is called a) Keyboard b) hard disk c) CPU d) Monitor 83 / 119 The microphone converts the sound into a) Mechanical signals b) Computer file c) Electrical signal d) Signals 84 / 119 The term that refers to all input, output and secondary storage devices is called: a) internal memory b) network point c) peripheral d) port 85 / 119 Which of the following contains the administrative tools in operating system : a) recycle bin b) control panel c) internet explorer d) my document folder 86 / 119 one or more network connected to hub is called; a) star network b) ring network c) mesh network d) bus network 87 / 119 Another word for pointer is: a) pixel b) cursor c) monochrome d) director 88 / 119 The function that is used to get the maximum value in MS excel is called a) MAXIMUMO b) GREATERO c) HIGHESTO d) MAX 89 / 119 In MS-Excel, formula begins with: a) < b) = c) == d) > 90 / 119 Default name of first sheet in any work book is a) first sheet b) sheet I c) sheet one d) one 91 / 119 Which one of the following is not a cause of virus a) E-mail b) pirated software c) network d) logic bomb 92 / 119 Which function key is used for checking spelling and grammar in MS word a) F2 b) F4 c) F7 d) F1 93 / 119 The topology used for a small number of computer is called a) star b) Bus c) ring d) mesh 94 / 119 The program that contains the instructions to operate a device is called a) device operating system b) device system c) device operator d) Device driver 95 / 119 Which of the following technique is used for modulation a) band with b) broad band c) bit band d) base band 96 / 119 A collection of related web pages is called a) Web site b) internet c) web portal d) web link 97 / 119 common font size used in business document is: a) 12-points b) 14-points c) 10-points d) 16-points 98 / 119 The extension of an executable file is a) .exe b) .xis c) .doc d) .ext 99 / 119 Temporary storage are within CPU is called a) ROM b) cache c) registers d) RAM 100 / 119 Which is a communication device a) USB b) Router c) Ethernet d) UTP 101 / 119 The process of transferring a file from remote computer to our local computer is a) Uploading b) copy c) forward d) Downloading 102 / 119 Dejure means a) By law b) By default c) By nature d) By fact 103 / 119 The devices that are automatically detected by windows are called a) installed devices b) plug and play devices c) serial devices d) Automatic devices 104 / 119 Soft copy refers to a) screen output b) peripheral device c) presentation d) application 105 / 119 Which one is the fastest a) register b) hard disk c) RAM d) cache 106 / 119 A set of instruction that run the computer are a) Software b) Documents c) Hardware d) CUPs 107 / 119 Testing all program components together in SDLC is called a) volume testing b) composite testing c) system testing d) group testing 108 / 119 physical path that connects the source and receiver is known as: a) NIC card b) encoder c) communication channel d) decoder 109 / 119 Which is a type of RAM: a) FRAM b) CRAM c) SRAM d) ERAM 110 / 119 Clipboard stores—– in word processing. a) copied text b) deleted text c) entered text d) repeated text 111 / 119 The extension of Ms-Word is : a) .bmp b) .mp3 c) .wrd d) .doc 112 / 119 The length of IP address is a) 32 bits b) 8 bits c) 16 bits d) 24 bits 113 / 119 XGA resolution is: a) 1024*768 b) 640*480 c) 640*860 d) 640*580 114 / 119 Software that is available free for a limited period is called a) Net ware b) Share ware c) Group ware d) Free ware 115 / 119 Temporary storage area within CPU is called: a) RAM b) registers c) ROM d) hard disk 116 / 119 How many characters ASCII-7bit code represents? a) 256 b) 512 c) 128 d) 64 117 / 119 The computers or internet that contain website are called a) web servers b) site computer c) central computer d) clients 118 / 119 CPU sends commands signals through a) data bus b) address bus c) expention bus d) control 119 / 119 The output of the compiler is called a) Source code b) Linked code c) The program d) Object code Your score is The average score is 54% LinkedIn Facebook Twitter 0% Restart quiz Post Views: 1,290 Post navigation Aiou Workshop 5403| Full Test Rawalpindi Board 2nd year all Computer Science MCQS.