Spread the love 9 Created on January 21, 2022 By adminRawalpindi Board CS past paperRawalpindi Board CS past paper 1 / 119 The process of converting digital signals into analog signals via modem is a) Mixing b) Modulation c) Demodulation d) Merging 2 / 119 Trojan Horse is a type of a) hacker b) antivirus c) horse d) virus 3 / 119 The operating system based on NT technology is: a) windows 97 b) Windows 95 c) windows 98 d) Windows 2000 4 / 119 Which of the following technique is used for modulation a) bit band b) base band c) band with d) broad band 5 / 119 Trojan Horse is an example of a) hardware b) system software c) antivirus d) Virus 6 / 119 Which of the following is used to get voice output a) printer b) Speaker c) mic d) plotter 7 / 119 CBT software is used in a) E-commerce b) industry c) business d) education 8 / 119 Which is a communication device a) UTP b) Router c) Ethernet d) USB 9 / 119 the minimum number of primary partitions that can be created on a basic disk are a) 6 b) 2 c) 8 d) 4 10 / 119 World wide web was established in: a) 1980 b) 1985 c) 1992 d) 1989 11 / 119 Which of the following contains the administrative tools in operating system : a) internet explorer b) my document folder c) recycle bin d) control panel 12 / 119 The function that is used to get the maximum value in MS excel is called a) MAX b) GREATERO c) HIGHESTO d) MAXIMUMO 13 / 119 Default name of first sheet in any work book is a) sheet I b) one c) sheet one d) first sheet 14 / 119 Formula of instructions that run the computer is a) Document b) Software c) Hardware d) CUPs 15 / 119 Which of the following is not an Antivirus program : a) McAfee b) Nod 32 c) Dr.Solomon d) Redlof 16 / 119 The microphone converts the sound into a) Electrical signal b) Software c) Mechanical signals d) Computer file 17 / 119 The microphone converts the sound into a) Electrical signal b) Signals c) Computer file d) Mechanical signals 18 / 119 A person who gains illegal access to a computer system is called a) hacker b) network c) computer consultant d) computer operator 19 / 119 Printed images can be converted into digital form using a) mouse b) stylus c) Scanner d) joy stick 20 / 119 The keyboard format that is most commonly used a) QWERTY b) SPLITTER c) ASDFGH d) TWITTERY 21 / 119 The program that contain instruction to operate a device is called : a) Device driver b) device system c) device operator d) device linking 22 / 119 The devices that are automatically detected by windows are called a) installed devices b) serial devices c) plug and play devices d) Automatic devices 23 / 119 The output of the compiler is called a) Object code b) Linked code c) The program d) Source code 24 / 119 Which is a type of RAM: a) CRAM b) SRAM c) FRAM d) ERAM 25 / 119 one or more network connected to hub is called; a) mesh network b) ring network c) bus network d) star network 26 / 119 A small image that represents a program folder or file is called a) menue b) command c) GUI d) ICON 27 / 119 Which one is a faster memory? a) Register b) cache c) RAM d) ROM 28 / 119 Web pages are written in which type of language is a) SQL b) HTML c) Assembly d) Pascal 29 / 119 Which of the following is not an example of system software a) drives b) utility program c) Microsoft office d) operating system 30 / 119 BIT stands for: a) binary digit b) binary integer c) binary tree d) binary interval 31 / 119 which of the following techniques uses modulation? a) bandwidth b) base band c) Broad band d) bus-width 32 / 119 How many characters ASCII-7bit code represents? a) 512 b) 128 c) 256 d) 1024 33 / 119 Analog signals are measured into a) watts b) digits c) volt d) Herts 34 / 119 Transferring information from computer to internet is called a) Pasting b) Uploading c) Downloading d) Downsizing 35 / 119 A device that connect multiple network using similar or different protocol is a : a) bridge b) repeater c) router d) gateway 36 / 119 The number of argument in SQRT() function in MS-excel is are a) equal to column number b) two c) equal to range d) one 37 / 119 in spread-sheet,by default rows are labeled by: a) numbers b) letters c) underscore sign d) special symbols 38 / 119 physical path that connects the source and receiver is known as: a) NIC card b) decoder c) communication channel d) encoder 39 / 119 Clipboard stores—– in word processing. a) repeated text b) entered text c) deleted text d) copied text 40 / 119 physical path that connects the source and receiver is known as; a) decoder b) communication channel c) NIC card d) encoder 41 / 119 Which technology is used to read data on cheques a) MICR b) OCR c) OMR d) CAT 42 / 119 Dejure means a) By nature b) By default c) By law d) By fact 43 / 119 which of following is not a type of network : a) LAN b) MAN c) WAN d) NAN 44 / 119 A virus that replicate itself is called a) bug b) boot sector virus c) Trojan horse d) worm 45 / 119 Testing all program components together in SDLC is called a) system testing b) volume testing c) composite testing d) group testing 46 / 119 A communication signal in the form of a continuous wave is called: a) digital signal b) discontinuous electrical signal c) Analog signal d) binary signal 47 / 119 DSL stands for a) Domain server b) Digital subscribe line c) Direct service Lease d) Distance service 48 / 119 Which components is used to connect different parts of the computer together? a) main memory b) I/O unit c) control unit d) buses 49 / 119 The register holds the address of the next instruction to be fetched for execution a) Counter register b) Instruction register c) Program counter d) Base register 50 / 119 which of following coding scheme used by IBM a) BCD b) MICR c) ATM d) CAM 51 / 119 Television and radio broadcasts are example of a) duplex transmission b) half duplex transmission c) simplex transmission d) full duplex transmission 52 / 119 How many types of addressing scheme are there : a) 5 b) 2 c) 3 d) 4 53 / 119 The computers or internet that contain website are called a) site computer b) clients c) central computer d) web servers 54 / 119 The software which is used to control all part of manufacturing process is called : a) MICR b) CAM c) ATM d) CAD 55 / 119 Which function key is used for checking spelling and grammar in MS word a) F4 b) F1 c) F2 d) F7 56 / 119 Which of the following is an Antivirus ? a) Trojan horse b) NOD32 c) Redlof d) Logic bomb 57 / 119 Data processing is also known as: a) knowledge b) computing c) merging d) procedure 58 / 119 Temporary storage are within CPU is called a) RAM b) registers c) cache d) ROM 59 / 119 Electronic banking is also known as? a) Global banking b) Offline banking c) Interactive banking d) Cyber banking 60 / 119 one or more computer connected to a hub is called: a) bus network b) star network c) mesh network d) ring network 61 / 119 Soft copy refers to a) peripheral device b) application c) screen output d) presentation 62 / 119 The secret word or number used for computer security is called: a) Passwords b) safe words c) private words d) Biometric data 63 / 119 Each computer on a network is called a) Link b) Mode c) Code d) Node 64 / 119 How many characters ASCII-7bit code represents? a) 64 b) 256 c) 128 d) 512 65 / 119 Another word for pointer is: a) director b) cursor c) monochrome d) pixel 66 / 119 layer that is responsible for transferring frames in OSI model is a) session layer b) data link layer c) presentation layer d) application layer 67 / 119 The top most layer of OSI model is a) presentation b) Application c) session d) transport 68 / 119 Which one is a an Automatic programmable machine: a) Robot b) mouse c) keyboard d) Cd-drive 69 / 119 Software that is available free for a limited period is called a) Net ware b) Share ware c) Group ware d) Free ware 70 / 119 Another name of antivirus is: a) Trojan Horse b) DES c) Vaccine d) worm 71 / 119 The extension of Ms-Word is : a) .doc b) .wrd c) .mp3 d) .bmp 72 / 119 A collection of related web pages is called a) web portal b) Web site c) internet d) web link 73 / 119 The device uses parallel transmission: a) mouse b) light pen c) Printer d) keyboard 74 / 119 Making illegal copies of copyrighted software is called a) software piracy b) software distribution c) software browsing d) software hacking 75 / 119 XGA resolution is: a) 1024*768 b) 640*580 c) 640*860 d) 640*480 76 / 119 The extension of an executable file is a) .exe b) .xis c) .doc d) .ext 77 / 119 Which of the following is not a type of bus in computer? a) address bus b) timer bus c) data bus d) control bus 78 / 119 how many types of language translator are there? a) 3 b) 4 c) 1 d) 2 79 / 119 The term that refers to all input, output and secondary storage devices is called: a) network point b) peripheral c) port d) internal memory 80 / 119 which of the following can be used to launch the word art : a) status bar b) drawing tool bar c) ruler d) standard toolbar 81 / 119 Moving up or down in word processing document is called a) Scrolling b) pull-down c) word-wrap d) line movement 82 / 119 The actual working area in micro soft excel is a) data base b) work book c) worksheet d) lotus-123 83 / 119 The length of IP address is a) 32 bits b) 16 bits c) 8 bits d) 24 bits 84 / 119 The program that contains the instructions to operate a device is called a) device operating system b) device operator c) Device driver d) device system 85 / 119 The process of producing multiple copies of a document is called a) image processing b) desktop publishing c) data management d) reprographics 86 / 119 Which of the following is an example of system software? a) operating system b) text editor c) MS-word d) spread-sheet 87 / 119 The keyboard layout that is most commonly used is the a) inriter b) qinerty c) splitter d) QWERTY 88 / 119 common font size used in business document is: a) 12-points b) 16-points c) 10-points d) 14-points 89 / 119 Which is not an output device a) Speaker b) Monitor c) Printer d) Scanner 90 / 119 The folder which contains administrator tools is a) linker b) control panel c) installer d) debugger 91 / 119 The component of CPU which responsible for interacting with RAM is a) register b) Control unit c) ALU d) hard disk 92 / 119 Which one of the following is not a cause of virus a) logic bomb b) pirated software c) network d) E-mail 93 / 119 Format C is an example of a) Trojan horse b) Redlof c) worm d) bomb 94 / 119 Which of the following keyboard shortcuts is used to change the case: a) Ctrl+F3 b) shift+F3 c) alt+F3 d) Ctrl+F2 95 / 119 Digital signals are commonly known as a) narrowband b) band c) broadband d) Baseband 96 / 119 The process of transferring a file from remote computer to our local computer is a) forward b) Downloading c) copy d) Uploading 97 / 119 Which one is the fastest a) RAM b) hard disk c) register d) cache 98 / 119 A set of instruction that run the computer are a) CUPs b) Hardware c) Documents d) Software 99 / 119 Which is not a bio metric technique for person identification a) retina b) pam print c) face d) badge 100 / 119 Communication between computer and keyboard involve the transmission: a) Simplex b) Full-Duplex c) Half-Duplex d) Automatic 101 / 119 Electronic circuits that executes computer instructions is called a) Keyboard b) CPU c) hard disk d) Monitor 102 / 119 How many bits are there in 4-bytes? a) 16 b) 64 c) 32 d) 8 103 / 119 CPU sends commands signals through a) data bus b) expention bus c) control d) address bus 104 / 119 Terminators are used in——topology a) star b) mesh c) Bus d) ring 105 / 119 In MS-Excel, formula begins with: a) = b) > c) < d) == 106 / 119 OSI model consists of a) 7 layers b) 9 layers c) 5 layers d) 11 layers 107 / 119 The topology used for a small number of computer is called a) Bus b) star c) mesh d) ring 108 / 119 Which devices connects each computer to a network? a) Network interface Card b) router c) gateway d) bridge 109 / 119 The communicational channels can be divided into a) 3 types b) two types c) 4 types d) 5 types 110 / 119 RAM usually has ——types a) 5 b) 4 c) 2 d) 3 111 / 119 Which communication medium requires line-of-sight a) coaxial b) microwave c) twisted pair d) fiber optic 112 / 119 A device that connect multiple networks using similar or different protocol; a) bridge b) gateway c) repeater d) router 113 / 119 We press enter key in Ms word to create a a) document b) paragragh c) Line d) sentence 114 / 119 Data shown on display unit or played through audio is called a) Soft copy b) photo copy c) Hardcopy d) shared copy 115 / 119 Temporary storage area within CPU is called: a) ROM b) hard disk c) registers d) RAM 116 / 119 The fly-by-wire system is called used in a) Airline b) edcation c) medical d) industry 117 / 119 GUI stands for? a) Graphical usage interface b) Graphical user interface c) Graphical user icons d) General user interface 118 / 119 A work book is a collection of a) functions b) sheets c) formula d) table 119 / 119 Most applications of robotics are in which area a) cooking b) manufacturing c) technique d) farming Your score is The average score is 54% LinkedIn Facebook Twitter 0% Restart quiz Post Views: 1,204 Post navigation Aiou Workshop 5403| Full Test Rawalpindi Board 2nd year all Computer Science MCQS.