Express Pakistan
provide latest news and update
Rawalpindi Board CS past paper
1 / 119
layer that is responsible for transferring frames in OSI model is
2 / 119
one or more network connected to hub is called;
3 / 119
The device uses parallel transmission:
4 / 119
how many types of language translator are there?
5 / 119
The function that is used to get the maximum value in MS excel is called
6 / 119
Which function key is used for checking spelling and grammar in MS word
7 / 119
A small image that represents a program folder or file is called
8 / 119
Which one is a faster memory?
9 / 119
How many bits are there in 4-bytes?
10 / 119
The microphone converts the sound into
11 / 119
Communication between computer and keyboard involve the transmission:
12 / 119
How many types of addressing scheme are there :
13 / 119
which of the following techniques uses modulation?
14 / 119
The program that contains the instructions to operate a device is called
15 / 119
The process of producing multiple copies of a document is called
16 / 119
The process of transferring a file from remote computer to our local computer is
17 / 119
CBT software is used in
18 / 119
How many characters ASCII-7bit code represents?
19 / 119
one or more computer connected to a hub is called:
20 / 119
common font size used in business document is:
21 / 119
Moving up or down in word processing document is called
22 / 119
The extension of Ms-Word is :
23 / 119
The software which is used to control all part of manufacturing process is called :
24 / 119
The actual working area in micro soft excel is
25 / 119
A person who gains illegal access to a computer system is called
26 / 119
The process of converting digital signals into analog signals via modem is
27 / 119
Which of the following technique is used for modulation
28 / 119
The keyboard format that is most commonly used
29 / 119
RAM usually has ——types
30 / 119
which of the following can be used to launch the word art :
31 / 119
Which of the following is an example of system software?
32 / 119
The fly-by-wire system is called used in
33 / 119
CPU sends commands signals through
34 / 119
Clipboard stores—– in word processing.
35 / 119
DSL stands for
36 / 119
The operating system based on NT technology is:
37 / 119
BIT stands for:
38 / 119
The number of argument in SQRT() function in MS-excel is are
39 / 119
the minimum number of primary partitions that can be created on a basic disk are
40 / 119
Which one is a an Automatic programmable machine:
41 / 119
OSI model consists of
42 / 119
Making illegal copies of copyrighted software is called
43 / 119
A communication signal in the form of a continuous wave is called:
44 / 119
Temporary storage area within CPU is called:
45 / 119
Trojan Horse is an example of
46 / 119
Formula of instructions that run the computer is
47 / 119
A set of instruction that run the computer are
48 / 119
in spread-sheet,by default rows are labeled by:
49 / 119
Dejure means
50 / 119
Which is a communication device
51 / 119
Television and radio broadcasts are example of
52 / 119
The keyboard layout that is most commonly used is the
53 / 119
A collection of related web pages is called
54 / 119
The communicational channels can be divided into
55 / 119
Digital signals are commonly known as
56 / 119
XGA resolution is:
57 / 119
Temporary storage are within CPU is called
58 / 119
Electronic banking is also known as?
59 / 119
The component of CPU which responsible for interacting with RAM is
60 / 119
Web pages are written in which type of language is
61 / 119
62 / 119
The folder which contains administrator tools is
63 / 119
A work book is a collection of
64 / 119
Terminators are used in——topology
65 / 119
Which of the following is used to get voice output
66 / 119
Default name of first sheet in any work book is
67 / 119
The extension of an executable file is
68 / 119
Testing all program components together in SDLC is called
69 / 119
Which is not a bio metric technique for person identification
70 / 119
Another word for pointer is:
71 / 119
The devices that are automatically detected by windows are called
72 / 119
Data processing is also known as:
73 / 119
which of following coding scheme used by IBM
74 / 119
75 / 119
Which one is the fastest
76 / 119
The term that refers to all input, output and secondary storage devices is called:
77 / 119
Software that is available free for a limited period is called
78 / 119
Which of the following is not a type of bus in computer?
79 / 119
which of following is not a type of network :
80 / 119
GUI stands for?
81 / 119
World wide web was established in:
82 / 119
physical path that connects the source and receiver is known as;
83 / 119
Which of the following is not an example of system software
84 / 119
The length of IP address is
85 / 119
Which of the following keyboard shortcuts is used to change the case:
86 / 119
The output of the compiler is called
87 / 119
A device that connect multiple networks using similar or different protocol;
88 / 119
In MS-Excel, formula begins with:
89 / 119
The program that contain instruction to operate a device is called :
90 / 119
Which is a type of RAM:
91 / 119
Most applications of robotics are in which area
92 / 119
Which is not an output device
93 / 119
The register holds the address of the next instruction to be fetched for execution
94 / 119
Trojan Horse is a type of
95 / 119
Which of the following is an Antivirus ?
96 / 119
Data shown on display unit or played through audio is called
97 / 119
A device that connect multiple network using similar or different protocol is a :
98 / 119
Soft copy refers to
99 / 119
Analog signals are measured into
100 / 119
Another name of antivirus is:
101 / 119
The top most layer of OSI model is
102 / 119
Which of the following is not an Antivirus program :
103 / 119
physical path that connects the source and receiver is known as:
104 / 119
We press enter key in Ms word to create a
105 / 119
A virus that replicate itself is called
106 / 119
Which components is used to connect different parts of the computer together?
107 / 119
Printed images can be converted into digital form using
108 / 119
Which of the following contains the administrative tools in operating system :
109 / 119
The secret word or number used for computer security is called:
110 / 119
Electronic circuits that executes computer instructions is called
111 / 119
Format C is an example of
112 / 119
The topology used for a small number of computer is called
113 / 119
Each computer on a network is called
114 / 119
Which devices connects each computer to a network?
115 / 119
Which technology is used to read data on cheques
116 / 119
The computers or internet that contain website are called
117 / 119
Transferring information from computer to internet is called
118 / 119
Which communication medium requires line-of-sight
119 / 119
Which one of the following is not a cause of virus
Your score is
The average score is 54%
Restart quiz