Spread the love 9 Created on January 21, 2022 By adminRawalpindi Board CS past paperRawalpindi Board CS past paper 1 / 119 CPU sends commands signals through a) address bus b) expention bus c) control d) data bus 2 / 119 Web pages are written in which type of language is a) HTML b) SQL c) Pascal d) Assembly 3 / 119 The microphone converts the sound into a) Mechanical signals b) Software c) Electrical signal d) Computer file 4 / 119 The keyboard layout that is most commonly used is the a) qinerty b) inriter c) QWERTY d) splitter 5 / 119 The communicational channels can be divided into a) 4 types b) 5 types c) two types d) 3 types 6 / 119 A virus that replicate itself is called a) worm b) bug c) Trojan horse d) boot sector virus 7 / 119 Electronic banking is also known as? a) Interactive banking b) Cyber banking c) Offline banking d) Global banking 8 / 119 Which of the following keyboard shortcuts is used to change the case: a) Ctrl+F3 b) Ctrl+F2 c) alt+F3 d) shift+F3 9 / 119 The fly-by-wire system is called used in a) industry b) edcation c) Airline d) medical 10 / 119 The actual working area in micro soft excel is a) worksheet b) lotus-123 c) data base d) work book 11 / 119 The secret word or number used for computer security is called: a) Biometric data b) safe words c) Passwords d) private words 12 / 119 A communication signal in the form of a continuous wave is called: a) binary signal b) discontinuous electrical signal c) digital signal d) Analog signal 13 / 119 Which of the following is an Antivirus ? a) Trojan horse b) Logic bomb c) NOD32 d) Redlof 14 / 119 Trojan Horse is an example of a) system software b) hardware c) Virus d) antivirus 15 / 119 Clipboard stores—– in word processing. a) entered text b) repeated text c) copied text d) deleted text 16 / 119 A device that connect multiple networks using similar or different protocol; a) router b) repeater c) bridge d) gateway 17 / 119 layer that is responsible for transferring frames in OSI model is a) presentation layer b) data link layer c) application layer d) session layer 18 / 119 The keyboard format that is most commonly used a) SPLITTER b) QWERTY c) TWITTERY d) ASDFGH 19 / 119 The function that is used to get the maximum value in MS excel is called a) MAX b) GREATERO c) HIGHESTO d) MAXIMUMO 20 / 119 Which devices connects each computer to a network? a) bridge b) gateway c) router d) Network interface Card 21 / 119 The extension of Ms-Word is : a) .wrd b) .mp3 c) .doc d) .bmp 22 / 119 Temporary storage are within CPU is called a) registers b) RAM c) ROM d) cache 23 / 119 Communication between computer and keyboard involve the transmission: a) Simplex b) Half-Duplex c) Automatic d) Full-Duplex 24 / 119 one or more network connected to hub is called; a) bus network b) mesh network c) star network d) ring network 25 / 119 How many characters ASCII-7bit code represents? a) 512 b) 256 c) 1024 d) 128 26 / 119 Analog signals are measured into a) volt b) digits c) Herts d) watts 27 / 119 Transferring information from computer to internet is called a) Downloading b) Uploading c) Downsizing d) Pasting 28 / 119 Which is not an output device a) Speaker b) Scanner c) Monitor d) Printer 29 / 119 The topology used for a small number of computer is called a) ring b) Bus c) mesh d) star 30 / 119 Printed images can be converted into digital form using a) Scanner b) stylus c) joy stick d) mouse 31 / 119 which of the following can be used to launch the word art : a) ruler b) status bar c) standard toolbar d) drawing tool bar 32 / 119 The microphone converts the sound into a) Mechanical signals b) Computer file c) Signals d) Electrical signal 33 / 119 Terminators are used in——topology a) Bus b) ring c) star d) mesh 34 / 119 OSI model consists of a) 7 layers b) 9 layers c) 11 layers d) 5 layers 35 / 119 The software which is used to control all part of manufacturing process is called : a) MICR b) CAM c) CAD d) ATM 36 / 119 Testing all program components together in SDLC is called a) system testing b) volume testing c) group testing d) composite testing 37 / 119 A device that connect multiple network using similar or different protocol is a : a) router b) bridge c) repeater d) gateway 38 / 119 Formula of instructions that run the computer is a) Hardware b) CUPs c) Software d) Document 39 / 119 Which function key is used for checking spelling and grammar in MS word a) F1 b) F2 c) F7 d) F4 40 / 119 Which of the following contains the administrative tools in operating system : a) my document folder b) control panel c) recycle bin d) internet explorer 41 / 119 how many types of language translator are there? a) 3 b) 1 c) 2 d) 4 42 / 119 physical path that connects the source and receiver is known as: a) communication channel b) decoder c) encoder d) NIC card 43 / 119 Which one is the fastest a) register b) RAM c) hard disk d) cache 44 / 119 XGA resolution is: a) 640*480 b) 640*860 c) 640*580 d) 1024*768 45 / 119 Which of the following technique is used for modulation a) bit band b) base band c) band with d) broad band 46 / 119 RAM usually has ——types a) 2 b) 5 c) 4 d) 3 47 / 119 The operating system based on NT technology is: a) Windows 95 b) windows 97 c) Windows 2000 d) windows 98 48 / 119 Television and radio broadcasts are example of a) full duplex transmission b) duplex transmission c) half duplex transmission d) simplex transmission 49 / 119 which of the following techniques uses modulation? a) bandwidth b) base band c) bus-width d) Broad band 50 / 119 How many types of addressing scheme are there : a) 5 b) 3 c) 2 d) 4 51 / 119 Trojan Horse is a type of a) horse b) antivirus c) virus d) hacker 52 / 119 A set of instruction that run the computer are a) Hardware b) Documents c) CUPs d) Software 53 / 119 Default name of first sheet in any work book is a) sheet one b) sheet I c) first sheet d) one 54 / 119 The device uses parallel transmission: a) Printer b) light pen c) mouse d) keyboard 55 / 119 The process of converting digital signals into analog signals via modem is a) Modulation b) Merging c) Demodulation d) Mixing 56 / 119 which of following coding scheme used by IBM a) CAM b) ATM c) BCD d) MICR 57 / 119 How many bits are there in 4-bytes? a) 32 b) 16 c) 64 d) 8 58 / 119 The extension of an executable file is a) .xis b) .doc c) .ext d) .exe 59 / 119 Which one is a faster memory? a) ROM b) Register c) RAM d) cache 60 / 119 Making illegal copies of copyrighted software is called a) software piracy b) software browsing c) software hacking d) software distribution 61 / 119 the minimum number of primary partitions that can be created on a basic disk are a) 4 b) 8 c) 2 d) 6 62 / 119 Which components is used to connect different parts of the computer together? a) main memory b) buses c) control unit d) I/O unit 63 / 119 World wide web was established in: a) 1992 b) 1985 c) 1989 d) 1980 64 / 119 Which communication medium requires line-of-sight a) coaxial b) fiber optic c) microwave d) twisted pair 65 / 119 common font size used in business document is: a) 12-points b) 14-points c) 10-points d) 16-points 66 / 119 Which one is a an Automatic programmable machine: a) Cd-drive b) keyboard c) mouse d) Robot 67 / 119 The term that refers to all input, output and secondary storage devices is called: a) port b) internal memory c) peripheral d) network point 68 / 119 The computers or internet that contain website are called a) clients b) site computer c) central computer d) web servers 69 / 119 Data shown on display unit or played through audio is called a) Soft copy b) shared copy c) photo copy d) Hardcopy 70 / 119 A work book is a collection of a) sheets b) formula c) functions d) table 71 / 119 Which of the following is not a type of bus in computer? a) control bus b) data bus c) timer bus d) address bus 72 / 119 A small image that represents a program folder or file is called a) GUI b) menue c) command d) ICON 73 / 119 Which technology is used to read data on cheques a) OCR b) OMR c) MICR d) CAT 74 / 119 DSL stands for a) Direct service Lease b) Domain server c) Distance service d) Digital subscribe line 75 / 119 Most applications of robotics are in which area a) manufacturing b) farming c) cooking d) technique 76 / 119 Which is a communication device a) UTP b) Router c) USB d) Ethernet 77 / 119 Which of the following is not an Antivirus program : a) Redlof b) Dr.Solomon c) Nod 32 d) McAfee 78 / 119 Each computer on a network is called a) Link b) Mode c) Code d) Node 79 / 119 Dejure means a) By law b) By default c) By fact d) By nature 80 / 119 The output of the compiler is called a) Object code b) Linked code c) Source code d) The program 81 / 119 A collection of related web pages is called a) internet b) web portal c) web link d) Web site 82 / 119 The devices that are automatically detected by windows are called a) plug and play devices b) Automatic devices c) serial devices d) installed devices 83 / 119 Temporary storage area within CPU is called: a) ROM b) registers c) RAM d) hard disk 84 / 119 Format C is an example of a) Trojan horse b) Redlof c) worm d) bomb 85 / 119 Data processing is also known as: a) knowledge b) merging c) computing d) procedure 86 / 119 Which is a type of RAM: a) SRAM b) ERAM c) FRAM d) CRAM 87 / 119 Which of the following is an example of system software? a) operating system b) spread-sheet c) text editor d) MS-word 88 / 119 The top most layer of OSI model is a) transport b) session c) Application d) presentation 89 / 119 The process of transferring a file from remote computer to our local computer is a) forward b) Uploading c) Downloading d) copy 90 / 119 CBT software is used in a) industry b) E-commerce c) education d) business 91 / 119 in spread-sheet,by default rows are labeled by: a) underscore sign b) numbers c) letters d) special symbols 92 / 119 The folder which contains administrator tools is a) installer b) debugger c) control panel d) linker 93 / 119 Soft copy refers to a) presentation b) peripheral device c) application d) screen output 94 / 119 In MS-Excel, formula begins with: a) == b) > c) < d) = 95 / 119 Digital signals are commonly known as a) narrowband b) Baseband c) band d) broadband 96 / 119 Electronic circuits that executes computer instructions is called a) hard disk b) Keyboard c) Monitor d) CPU 97 / 119 The length of IP address is a) 32 bits b) 16 bits c) 8 bits d) 24 bits 98 / 119 How many characters ASCII-7bit code represents? a) 512 b) 64 c) 128 d) 256 99 / 119 We press enter key in Ms word to create a a) sentence b) Line c) document d) paragragh 100 / 119 The process of producing multiple copies of a document is called a) image processing b) data management c) desktop publishing d) reprographics 101 / 119 physical path that connects the source and receiver is known as; a) communication channel b) NIC card c) encoder d) decoder 102 / 119 The number of argument in SQRT() function in MS-excel is are a) two b) one c) equal to column number d) equal to range 103 / 119 Which of the following is not an example of system software a) Microsoft office b) operating system c) drives d) utility program 104 / 119 The register holds the address of the next instruction to be fetched for execution a) Base register b) Counter register c) Program counter d) Instruction register 105 / 119 The program that contain instruction to operate a device is called : a) Device driver b) device operator c) device linking d) device system 106 / 119 BIT stands for: a) binary tree b) binary digit c) binary integer d) binary interval 107 / 119 Which one of the following is not a cause of virus a) network b) E-mail c) logic bomb d) pirated software 108 / 119 GUI stands for? a) Graphical user interface b) Graphical usage interface c) Graphical user icons d) General user interface 109 / 119 The component of CPU which responsible for interacting with RAM is a) hard disk b) Control unit c) ALU d) register 110 / 119 A person who gains illegal access to a computer system is called a) network b) computer consultant c) computer operator d) hacker 111 / 119 The program that contains the instructions to operate a device is called a) device system b) device operator c) device operating system d) Device driver 112 / 119 Software that is available free for a limited period is called a) Group ware b) Free ware c) Share ware d) Net ware 113 / 119 Another word for pointer is: a) monochrome b) cursor c) director d) pixel 114 / 119 Another name of antivirus is: a) Trojan Horse b) worm c) Vaccine d) DES 115 / 119 Which is not a bio metric technique for person identification a) retina b) pam print c) face d) badge 116 / 119 one or more computer connected to a hub is called: a) mesh network b) ring network c) star network d) bus network 117 / 119 Moving up or down in word processing document is called a) line movement b) word-wrap c) pull-down d) Scrolling 118 / 119 which of following is not a type of network : a) WAN b) MAN c) LAN d) NAN 119 / 119 Which of the following is used to get voice output a) printer b) mic c) plotter d) Speaker Your score is The average score is 54% LinkedIn Facebook Twitter 0% Restart quiz Post Views: 1,170 Post navigation Aiou Workshop 5403| Full Test Rawalpindi Board 2nd year all Computer Science MCQS.