Spread the love 9 Created on January 21, 2022 By adminRawalpindi Board CS past paperRawalpindi Board CS past paper 1 / 119 A communication signal in the form of a continuous wave is called: a) digital signal b) discontinuous electrical signal c) binary signal d) Analog signal 2 / 119 Making illegal copies of copyrighted software is called a) software hacking b) software browsing c) software piracy d) software distribution 3 / 119 Another name of antivirus is: a) DES b) Vaccine c) worm d) Trojan Horse 4 / 119 The communicational channels can be divided into a) 3 types b) 4 types c) 5 types d) two types 5 / 119 A set of instruction that run the computer are a) Software b) Documents c) CUPs d) Hardware 6 / 119 Television and radio broadcasts are example of a) simplex transmission b) half duplex transmission c) full duplex transmission d) duplex transmission 7 / 119 Electronic circuits that executes computer instructions is called a) Keyboard b) Monitor c) hard disk d) CPU 8 / 119 The folder which contains administrator tools is a) installer b) linker c) control panel d) debugger 9 / 119 Communication between computer and keyboard involve the transmission: a) Automatic b) Half-Duplex c) Simplex d) Full-Duplex 10 / 119 Which devices connects each computer to a network? a) bridge b) router c) Network interface Card d) gateway 11 / 119 Default name of first sheet in any work book is a) sheet one b) one c) first sheet d) sheet I 12 / 119 A device that connect multiple networks using similar or different protocol; a) router b) bridge c) gateway d) repeater 13 / 119 which of following is not a type of network : a) LAN b) NAN c) WAN d) MAN 14 / 119 Moving up or down in word processing document is called a) line movement b) word-wrap c) Scrolling d) pull-down 15 / 119 Which of the following is not an Antivirus program : a) Nod 32 b) Dr.Solomon c) McAfee d) Redlof 16 / 119 Temporary storage are within CPU is called a) RAM b) ROM c) registers d) cache 17 / 119 Trojan Horse is a type of a) virus b) hacker c) antivirus d) horse 18 / 119 Which of the following is an example of system software? a) operating system b) text editor c) MS-word d) spread-sheet 19 / 119 physical path that connects the source and receiver is known as; a) NIC card b) communication channel c) encoder d) decoder 20 / 119 Dejure means a) By fact b) By default c) By nature d) By law 21 / 119 in spread-sheet,by default rows are labeled by: a) underscore sign b) special symbols c) numbers d) letters 22 / 119 How many bits are there in 4-bytes? a) 32 b) 64 c) 8 d) 16 23 / 119 The topology used for a small number of computer is called a) ring b) Bus c) mesh d) star 24 / 119 The extension of Ms-Word is : a) .mp3 b) .bmp c) .doc d) .wrd 25 / 119 Which one is the fastest a) hard disk b) cache c) register d) RAM 26 / 119 The output of the compiler is called a) Source code b) Linked code c) Object code d) The program 27 / 119 one or more network connected to hub is called; a) ring network b) mesh network c) star network d) bus network 28 / 119 XGA resolution is: a) 1024*768 b) 640*580 c) 640*860 d) 640*480 29 / 119 The computers or internet that contain website are called a) clients b) central computer c) site computer d) web servers 30 / 119 How many characters ASCII-7bit code represents? a) 256 b) 512 c) 1024 d) 128 31 / 119 The length of IP address is a) 24 bits b) 32 bits c) 16 bits d) 8 bits 32 / 119 DSL stands for a) Distance service b) Digital subscribe line c) Domain server d) Direct service Lease 33 / 119 Which is a type of RAM: a) CRAM b) SRAM c) ERAM d) FRAM 34 / 119 which of the following can be used to launch the word art : a) ruler b) drawing tool bar c) standard toolbar d) status bar 35 / 119 BIT stands for: a) binary digit b) binary integer c) binary interval d) binary tree 36 / 119 The microphone converts the sound into a) Computer file b) Mechanical signals c) Electrical signal d) Signals 37 / 119 Formula of instructions that run the computer is a) CUPs b) Software c) Hardware d) Document 38 / 119 Transferring information from computer to internet is called a) Pasting b) Downsizing c) Uploading d) Downloading 39 / 119 CBT software is used in a) E-commerce b) business c) industry d) education 40 / 119 Data processing is also known as: a) procedure b) merging c) computing d) knowledge 41 / 119 Which of the following is an Antivirus ? a) Redlof b) NOD32 c) Logic bomb d) Trojan horse 42 / 119 Most applications of robotics are in which area a) manufacturing b) technique c) cooking d) farming 43 / 119 A person who gains illegal access to a computer system is called a) network b) computer consultant c) computer operator d) hacker 44 / 119 Which of the following is not a type of bus in computer? a) timer bus b) control bus c) data bus d) address bus 45 / 119 The process of producing multiple copies of a document is called a) reprographics b) data management c) image processing d) desktop publishing 46 / 119 physical path that connects the source and receiver is known as: a) encoder b) NIC card c) communication channel d) decoder 47 / 119 How many types of addressing scheme are there : a) 3 b) 5 c) 4 d) 2 48 / 119 which of following coding scheme used by IBM a) CAM b) ATM c) MICR d) BCD 49 / 119 Which of the following is not an example of system software a) utility program b) drives c) operating system d) Microsoft office 50 / 119 The fly-by-wire system is called used in a) industry b) Airline c) edcation d) medical 51 / 119 Testing all program components together in SDLC is called a) composite testing b) group testing c) system testing d) volume testing 52 / 119 The actual working area in micro soft excel is a) work book b) data base c) lotus-123 d) worksheet 53 / 119 Clipboard stores—– in word processing. a) deleted text b) copied text c) entered text d) repeated text 54 / 119 The component of CPU which responsible for interacting with RAM is a) hard disk b) Control unit c) register d) ALU 55 / 119 In MS-Excel, formula begins with: a) < b) > c) == d) = 56 / 119 layer that is responsible for transferring frames in OSI model is a) application layer b) data link layer c) presentation layer d) session layer 57 / 119 The process of converting digital signals into analog signals via modem is a) Merging b) Mixing c) Modulation d) Demodulation 58 / 119 Soft copy refers to a) peripheral device b) application c) screen output d) presentation 59 / 119 The term that refers to all input, output and secondary storage devices is called: a) network point b) port c) peripheral d) internal memory 60 / 119 The device uses parallel transmission: a) mouse b) keyboard c) Printer d) light pen 61 / 119 CPU sends commands signals through a) control b) address bus c) expention bus d) data bus 62 / 119 World wide web was established in: a) 1980 b) 1989 c) 1985 d) 1992 63 / 119 Which of the following technique is used for modulation a) band with b) bit band c) base band d) broad band 64 / 119 Which is a communication device a) Ethernet b) USB c) UTP d) Router 65 / 119 Terminators are used in——topology a) mesh b) star c) Bus d) ring 66 / 119 The number of argument in SQRT() function in MS-excel is are a) equal to range b) two c) one d) equal to column number 67 / 119 Which of the following is used to get voice output a) plotter b) mic c) Speaker d) printer 68 / 119 A small image that represents a program folder or file is called a) GUI b) command c) ICON d) menue 69 / 119 one or more computer connected to a hub is called: a) mesh network b) ring network c) bus network d) star network 70 / 119 how many types of language translator are there? a) 3 b) 1 c) 4 d) 2 71 / 119 How many characters ASCII-7bit code represents? a) 64 b) 256 c) 512 d) 128 72 / 119 The microphone converts the sound into a) Mechanical signals b) Software c) Computer file d) Electrical signal 73 / 119 Electronic banking is also known as? a) Offline banking b) Global banking c) Interactive banking d) Cyber banking 74 / 119 Which is not an output device a) Printer b) Speaker c) Scanner d) Monitor 75 / 119 Data shown on display unit or played through audio is called a) shared copy b) Soft copy c) photo copy d) Hardcopy 76 / 119 We press enter key in Ms word to create a a) paragragh b) document c) Line d) sentence 77 / 119 Web pages are written in which type of language is a) SQL b) Pascal c) HTML d) Assembly 78 / 119 A device that connect multiple network using similar or different protocol is a : a) gateway b) router c) bridge d) repeater 79 / 119 common font size used in business document is: a) 14-points b) 12-points c) 10-points d) 16-points 80 / 119 Which components is used to connect different parts of the computer together? a) control unit b) I/O unit c) main memory d) buses 81 / 119 Software that is available free for a limited period is called a) Free ware b) Share ware c) Net ware d) Group ware 82 / 119 The program that contains the instructions to operate a device is called a) device operator b) Device driver c) device operating system d) device system 83 / 119 which of the following techniques uses modulation? a) bandwidth b) base band c) Broad band d) bus-width 84 / 119 Which one is a an Automatic programmable machine: a) Cd-drive b) mouse c) Robot d) keyboard 85 / 119 A virus that replicate itself is called a) worm b) boot sector virus c) Trojan horse d) bug 86 / 119 The program that contain instruction to operate a device is called : a) device system b) Device driver c) device operator d) device linking 87 / 119 A work book is a collection of a) formula b) table c) sheets d) functions 88 / 119 The top most layer of OSI model is a) session b) Application c) transport d) presentation 89 / 119 The software which is used to control all part of manufacturing process is called : a) CAD b) MICR c) CAM d) ATM 90 / 119 Which of the following keyboard shortcuts is used to change the case: a) Ctrl+F3 b) shift+F3 c) alt+F3 d) Ctrl+F2 91 / 119 RAM usually has ——types a) 3 b) 2 c) 4 d) 5 92 / 119 Which of the following contains the administrative tools in operating system : a) control panel b) internet explorer c) my document folder d) recycle bin 93 / 119 The keyboard layout that is most commonly used is the a) splitter b) inriter c) qinerty d) QWERTY 94 / 119 Analog signals are measured into a) Herts b) watts c) volt d) digits 95 / 119 GUI stands for? a) Graphical usage interface b) Graphical user icons c) General user interface d) Graphical user interface 96 / 119 The operating system based on NT technology is: a) windows 98 b) Windows 2000 c) Windows 95 d) windows 97 97 / 119 The secret word or number used for computer security is called: a) safe words b) Biometric data c) Passwords d) private words 98 / 119 Which is not a bio metric technique for person identification a) pam print b) badge c) face d) retina 99 / 119 the minimum number of primary partitions that can be created on a basic disk are a) 4 b) 8 c) 2 d) 6 100 / 119 Printed images can be converted into digital form using a) stylus b) mouse c) joy stick d) Scanner 101 / 119 Trojan Horse is an example of a) hardware b) antivirus c) system software d) Virus 102 / 119 The extension of an executable file is a) .doc b) .xis c) .exe d) .ext 103 / 119 Temporary storage area within CPU is called: a) hard disk b) RAM c) ROM d) registers 104 / 119 Which function key is used for checking spelling and grammar in MS word a) F2 b) F1 c) F7 d) F4 105 / 119 Which communication medium requires line-of-sight a) twisted pair b) coaxial c) microwave d) fiber optic 106 / 119 Format C is an example of a) Redlof b) bomb c) Trojan horse d) worm 107 / 119 Another word for pointer is: a) pixel b) monochrome c) director d) cursor 108 / 119 Which one is a faster memory? a) ROM b) cache c) RAM d) Register 109 / 119 The devices that are automatically detected by windows are called a) serial devices b) installed devices c) Automatic devices d) plug and play devices 110 / 119 The keyboard format that is most commonly used a) QWERTY b) ASDFGH c) TWITTERY d) SPLITTER 111 / 119 A collection of related web pages is called a) Web site b) web link c) internet d) web portal 112 / 119 The process of transferring a file from remote computer to our local computer is a) forward b) Uploading c) copy d) Downloading 113 / 119 OSI model consists of a) 9 layers b) 11 layers c) 7 layers d) 5 layers 114 / 119 The function that is used to get the maximum value in MS excel is called a) MAX b) GREATERO c) MAXIMUMO d) HIGHESTO 115 / 119 Digital signals are commonly known as a) narrowband b) Baseband c) band d) broadband 116 / 119 Which one of the following is not a cause of virus a) logic bomb b) E-mail c) pirated software d) network 117 / 119 Each computer on a network is called a) Link b) Code c) Node d) Mode 118 / 119 Which technology is used to read data on cheques a) CAT b) MICR c) OMR d) OCR 119 / 119 The register holds the address of the next instruction to be fetched for execution a) Instruction register b) Program counter c) Base register d) Counter register Your score is The average score is 54% LinkedIn Facebook Twitter 0% Restart quiz Post Views: 1,143 Post navigation Aiou Workshop 5403| Full Test Rawalpindi Board 2nd year all Computer Science MCQS.