Spread the love 9 Created on January 21, 2022 By adminRawalpindi Board CS past paperRawalpindi Board CS past paper 1 / 119 A small image that represents a program folder or file is called a) menue b) GUI c) ICON d) command 2 / 119 Temporary storage are within CPU is called a) RAM b) ROM c) cache d) registers 3 / 119 Soft copy refers to a) application b) presentation c) peripheral device d) screen output 4 / 119 DSL stands for a) Direct service Lease b) Distance service c) Domain server d) Digital subscribe line 5 / 119 RAM usually has ——types a) 3 b) 5 c) 2 d) 4 6 / 119 Default name of first sheet in any work book is a) first sheet b) sheet I c) one d) sheet one 7 / 119 World wide web was established in: a) 1980 b) 1989 c) 1985 d) 1992 8 / 119 The process of transferring a file from remote computer to our local computer is a) Downloading b) forward c) Uploading d) copy 9 / 119 Which is not an output device a) Scanner b) Monitor c) Printer d) Speaker 10 / 119 The device uses parallel transmission: a) light pen b) mouse c) Printer d) keyboard 11 / 119 Trojan Horse is a type of a) virus b) horse c) antivirus d) hacker 12 / 119 Another word for pointer is: a) pixel b) cursor c) monochrome d) director 13 / 119 GUI stands for? a) Graphical user interface b) General user interface c) Graphical usage interface d) Graphical user icons 14 / 119 Temporary storage area within CPU is called: a) hard disk b) RAM c) ROM d) registers 15 / 119 Which communication medium requires line-of-sight a) fiber optic b) microwave c) twisted pair d) coaxial 16 / 119 in spread-sheet,by default rows are labeled by: a) letters b) underscore sign c) numbers d) special symbols 17 / 119 The software which is used to control all part of manufacturing process is called : a) CAD b) CAM c) ATM d) MICR 18 / 119 A set of instruction that run the computer are a) Hardware b) CUPs c) Documents d) Software 19 / 119 Terminators are used in——topology a) mesh b) star c) ring d) Bus 20 / 119 The keyboard layout that is most commonly used is the a) qinerty b) inriter c) QWERTY d) splitter 21 / 119 The component of CPU which responsible for interacting with RAM is a) ALU b) register c) hard disk d) Control unit 22 / 119 OSI model consists of a) 9 layers b) 5 layers c) 7 layers d) 11 layers 23 / 119 The program that contains the instructions to operate a device is called a) device operating system b) Device driver c) device operator d) device system 24 / 119 Making illegal copies of copyrighted software is called a) software piracy b) software browsing c) software hacking d) software distribution 25 / 119 Printed images can be converted into digital form using a) stylus b) Scanner c) joy stick d) mouse 26 / 119 Which is a type of RAM: a) CRAM b) FRAM c) SRAM d) ERAM 27 / 119 Which one is the fastest a) hard disk b) cache c) register d) RAM 28 / 119 the minimum number of primary partitions that can be created on a basic disk are a) 2 b) 8 c) 6 d) 4 29 / 119 Electronic circuits that executes computer instructions is called a) Keyboard b) Monitor c) hard disk d) CPU 30 / 119 The extension of Ms-Word is : a) .bmp b) .mp3 c) .doc d) .wrd 31 / 119 The process of producing multiple copies of a document is called a) data management b) desktop publishing c) reprographics d) image processing 32 / 119 Clipboard stores—– in word processing. a) repeated text b) deleted text c) copied text d) entered text 33 / 119 The term that refers to all input, output and secondary storage devices is called: a) port b) peripheral c) network point d) internal memory 34 / 119 Which of the following is not an Antivirus program : a) McAfee b) Redlof c) Dr.Solomon d) Nod 32 35 / 119 Which of the following contains the administrative tools in operating system : a) my document folder b) internet explorer c) recycle bin d) control panel 36 / 119 Which of the following is used to get voice output a) mic b) printer c) plotter d) Speaker 37 / 119 A person who gains illegal access to a computer system is called a) computer operator b) computer consultant c) hacker d) network 38 / 119 Another name of antivirus is: a) worm b) DES c) Trojan Horse d) Vaccine 39 / 119 The devices that are automatically detected by windows are called a) plug and play devices b) serial devices c) installed devices d) Automatic devices 40 / 119 Format C is an example of a) worm b) Trojan horse c) bomb d) Redlof 41 / 119 The operating system based on NT technology is: a) windows 98 b) Windows 2000 c) windows 97 d) Windows 95 42 / 119 The folder which contains administrator tools is a) debugger b) control panel c) linker d) installer 43 / 119 Data shown on display unit or played through audio is called a) shared copy b) Hardcopy c) photo copy d) Soft copy 44 / 119 Each computer on a network is called a) Mode b) Code c) Node d) Link 45 / 119 Which one is a an Automatic programmable machine: a) keyboard b) Robot c) mouse d) Cd-drive 46 / 119 The function that is used to get the maximum value in MS excel is called a) MAX b) GREATERO c) MAXIMUMO d) HIGHESTO 47 / 119 Television and radio broadcasts are example of a) full duplex transmission b) duplex transmission c) simplex transmission d) half duplex transmission 48 / 119 The microphone converts the sound into a) Computer file b) Electrical signal c) Mechanical signals d) Software 49 / 119 Which one of the following is not a cause of virus a) E-mail b) pirated software c) network d) logic bomb 50 / 119 A device that connect multiple networks using similar or different protocol; a) bridge b) router c) gateway d) repeater 51 / 119 CBT software is used in a) E-commerce b) industry c) business d) education 52 / 119 Which technology is used to read data on cheques a) MICR b) OMR c) CAT d) OCR 53 / 119 which of the following can be used to launch the word art : a) ruler b) status bar c) drawing tool bar d) standard toolbar 54 / 119 Which function key is used for checking spelling and grammar in MS word a) F4 b) F2 c) F1 d) F7 55 / 119 The output of the compiler is called a) Object code b) Linked code c) The program d) Source code 56 / 119 A work book is a collection of a) sheets b) formula c) table d) functions 57 / 119 which of the following techniques uses modulation? a) base band b) Broad band c) bandwidth d) bus-width 58 / 119 We press enter key in Ms word to create a a) sentence b) Line c) paragragh d) document 59 / 119 The microphone converts the sound into a) Computer file b) Mechanical signals c) Signals d) Electrical signal 60 / 119 Most applications of robotics are in which area a) cooking b) technique c) manufacturing d) farming 61 / 119 Which components is used to connect different parts of the computer together? a) main memory b) control unit c) I/O unit d) buses 62 / 119 BIT stands for: a) binary interval b) binary digit c) binary tree d) binary integer 63 / 119 Which is not a bio metric technique for person identification a) pam print b) face c) badge d) retina 64 / 119 Which of the following is not an example of system software a) Microsoft office b) drives c) utility program d) operating system 65 / 119 one or more computer connected to a hub is called: a) bus network b) star network c) mesh network d) ring network 66 / 119 Which of the following is an Antivirus ? a) NOD32 b) Redlof c) Trojan horse d) Logic bomb 67 / 119 A device that connect multiple network using similar or different protocol is a : a) gateway b) router c) repeater d) bridge 68 / 119 The computers or internet that contain website are called a) site computer b) central computer c) clients d) web servers 69 / 119 How many types of addressing scheme are there : a) 2 b) 3 c) 4 d) 5 70 / 119 The top most layer of OSI model is a) Application b) transport c) presentation d) session 71 / 119 The process of converting digital signals into analog signals via modem is a) Demodulation b) Modulation c) Mixing d) Merging 72 / 119 Which one is a faster memory? a) RAM b) ROM c) cache d) Register 73 / 119 The secret word or number used for computer security is called: a) safe words b) Passwords c) private words d) Biometric data 74 / 119 Which of the following keyboard shortcuts is used to change the case: a) alt+F3 b) shift+F3 c) Ctrl+F3 d) Ctrl+F2 75 / 119 Data processing is also known as: a) procedure b) knowledge c) merging d) computing 76 / 119 Which of the following is an example of system software? a) MS-word b) spread-sheet c) operating system d) text editor 77 / 119 The length of IP address is a) 32 bits b) 16 bits c) 24 bits d) 8 bits 78 / 119 physical path that connects the source and receiver is known as; a) communication channel b) NIC card c) decoder d) encoder 79 / 119 The topology used for a small number of computer is called a) Bus b) star c) ring d) mesh 80 / 119 XGA resolution is: a) 640*580 b) 1024*768 c) 640*480 d) 640*860 81 / 119 A collection of related web pages is called a) Web site b) internet c) web portal d) web link 82 / 119 The communicational channels can be divided into a) two types b) 4 types c) 3 types d) 5 types 83 / 119 one or more network connected to hub is called; a) mesh network b) bus network c) ring network d) star network 84 / 119 Which of the following technique is used for modulation a) base band b) band with c) broad band d) bit band 85 / 119 Dejure means a) By default b) By fact c) By law d) By nature 86 / 119 common font size used in business document is: a) 16-points b) 14-points c) 12-points d) 10-points 87 / 119 Software that is available free for a limited period is called a) Group ware b) Net ware c) Share ware d) Free ware 88 / 119 Which is a communication device a) Ethernet b) Router c) USB d) UTP 89 / 119 A communication signal in the form of a continuous wave is called: a) digital signal b) Analog signal c) binary signal d) discontinuous electrical signal 90 / 119 Testing all program components together in SDLC is called a) composite testing b) group testing c) volume testing d) system testing 91 / 119 The fly-by-wire system is called used in a) medical b) industry c) Airline d) edcation 92 / 119 Digital signals are commonly known as a) narrowband b) Baseband c) band d) broadband 93 / 119 A virus that replicate itself is called a) worm b) Trojan horse c) boot sector virus d) bug 94 / 119 which of following is not a type of network : a) WAN b) NAN c) LAN d) MAN 95 / 119 Communication between computer and keyboard involve the transmission: a) Automatic b) Full-Duplex c) Half-Duplex d) Simplex 96 / 119 Trojan Horse is an example of a) system software b) Virus c) antivirus d) hardware 97 / 119 The register holds the address of the next instruction to be fetched for execution a) Base register b) Instruction register c) Counter register d) Program counter 98 / 119 Transferring information from computer to internet is called a) Downloading b) Downsizing c) Pasting d) Uploading 99 / 119 Which devices connects each computer to a network? a) gateway b) router c) Network interface Card d) bridge 100 / 119 which of following coding scheme used by IBM a) MICR b) BCD c) ATM d) CAM 101 / 119 how many types of language translator are there? a) 1 b) 3 c) 4 d) 2 102 / 119 Moving up or down in word processing document is called a) Scrolling b) word-wrap c) line movement d) pull-down 103 / 119 The keyboard format that is most commonly used a) QWERTY b) ASDFGH c) TWITTERY d) SPLITTER 104 / 119 Analog signals are measured into a) digits b) Herts c) watts d) volt 105 / 119 Formula of instructions that run the computer is a) Software b) Document c) CUPs d) Hardware 106 / 119 Electronic banking is also known as? a) Global banking b) Cyber banking c) Interactive banking d) Offline banking 107 / 119 In MS-Excel, formula begins with: a) > b) < c) = d) == 108 / 119 How many characters ASCII-7bit code represents? a) 256 b) 64 c) 512 d) 128 109 / 119 physical path that connects the source and receiver is known as: a) communication channel b) encoder c) NIC card d) decoder 110 / 119 How many characters ASCII-7bit code represents? a) 256 b) 1024 c) 128 d) 512 111 / 119 CPU sends commands signals through a) address bus b) data bus c) control d) expention bus 112 / 119 The program that contain instruction to operate a device is called : a) device system b) device linking c) Device driver d) device operator 113 / 119 Web pages are written in which type of language is a) HTML b) SQL c) Assembly d) Pascal 114 / 119 The number of argument in SQRT() function in MS-excel is are a) equal to range b) one c) two d) equal to column number 115 / 119 The extension of an executable file is a) .exe b) .doc c) .xis d) .ext 116 / 119 How many bits are there in 4-bytes? a) 16 b) 64 c) 32 d) 8 117 / 119 Which of the following is not a type of bus in computer? a) control bus b) address bus c) timer bus d) data bus 118 / 119 The actual working area in micro soft excel is a) data base b) worksheet c) lotus-123 d) work book 119 / 119 layer that is responsible for transferring frames in OSI model is a) presentation layer b) data link layer c) application layer d) session layer Your score is The average score is 54% LinkedIn Facebook Twitter 0% Restart quiz Post Views: 1,125 Post navigation Aiou Workshop 5403| Full Test Rawalpindi Board 2nd year all Computer Science MCQS.