Spread the love 9 Created on January 21, 2022 By adminRawalpindi Board CS past paperRawalpindi Board CS past paper 1 / 119 Temporary storage are within CPU is called a) registers b) RAM c) cache d) ROM 2 / 119 Which of the following is an example of system software? a) text editor b) MS-word c) operating system d) spread-sheet 3 / 119 BIT stands for: a) binary interval b) binary integer c) binary tree d) binary digit 4 / 119 Which devices connects each computer to a network? a) gateway b) bridge c) router d) Network interface Card 5 / 119 Data processing is also known as: a) knowledge b) merging c) computing d) procedure 6 / 119 how many types of language translator are there? a) 1 b) 3 c) 2 d) 4 7 / 119 The operating system based on NT technology is: a) Windows 95 b) windows 98 c) windows 97 d) Windows 2000 8 / 119 The keyboard format that is most commonly used a) TWITTERY b) ASDFGH c) SPLITTER d) QWERTY 9 / 119 Electronic banking is also known as? a) Interactive banking b) Global banking c) Cyber banking d) Offline banking 10 / 119 Software that is available free for a limited period is called a) Net ware b) Free ware c) Group ware d) Share ware 11 / 119 Which one is a faster memory? a) RAM b) cache c) ROM d) Register 12 / 119 Television and radio broadcasts are example of a) simplex transmission b) half duplex transmission c) full duplex transmission d) duplex transmission 13 / 119 the minimum number of primary partitions that can be created on a basic disk are a) 2 b) 4 c) 8 d) 6 14 / 119 The register holds the address of the next instruction to be fetched for execution a) Program counter b) Base register c) Instruction register d) Counter register 15 / 119 The process of transferring a file from remote computer to our local computer is a) copy b) Downloading c) forward d) Uploading 16 / 119 The topology used for a small number of computer is called a) ring b) mesh c) star d) Bus 17 / 119 Which is not a bio metric technique for person identification a) badge b) retina c) pam print d) face 18 / 119 Which of the following is not a type of bus in computer? a) data bus b) timer bus c) control bus d) address bus 19 / 119 The extension of Ms-Word is : a) .wrd b) .doc c) .mp3 d) .bmp 20 / 119 Which of the following contains the administrative tools in operating system : a) recycle bin b) internet explorer c) control panel d) my document folder 21 / 119 Moving up or down in word processing document is called a) word-wrap b) Scrolling c) line movement d) pull-down 22 / 119 The process of converting digital signals into analog signals via modem is a) Demodulation b) Mixing c) Modulation d) Merging 23 / 119 Trojan Horse is an example of a) system software b) antivirus c) Virus d) hardware 24 / 119 Communication between computer and keyboard involve the transmission: a) Simplex b) Automatic c) Full-Duplex d) Half-Duplex 25 / 119 A work book is a collection of a) sheets b) formula c) functions d) table 26 / 119 Trojan Horse is a type of a) antivirus b) horse c) hacker d) virus 27 / 119 Which of the following is not an Antivirus program : a) Nod 32 b) Redlof c) Dr.Solomon d) McAfee 28 / 119 The keyboard layout that is most commonly used is the a) QWERTY b) splitter c) qinerty d) inriter 29 / 119 The microphone converts the sound into a) Mechanical signals b) Computer file c) Software d) Electrical signal 30 / 119 A virus that replicate itself is called a) boot sector virus b) Trojan horse c) worm d) bug 31 / 119 layer that is responsible for transferring frames in OSI model is a) application layer b) data link layer c) presentation layer d) session layer 32 / 119 one or more network connected to hub is called; a) ring network b) mesh network c) star network d) bus network 33 / 119 Testing all program components together in SDLC is called a) system testing b) volume testing c) composite testing d) group testing 34 / 119 The software which is used to control all part of manufacturing process is called : a) CAM b) ATM c) MICR d) CAD 35 / 119 Which components is used to connect different parts of the computer together? a) main memory b) I/O unit c) buses d) control unit 36 / 119 Soft copy refers to a) screen output b) peripheral device c) presentation d) application 37 / 119 The number of argument in SQRT() function in MS-excel is are a) equal to range b) one c) two d) equal to column number 38 / 119 The top most layer of OSI model is a) Application b) transport c) presentation d) session 39 / 119 A collection of related web pages is called a) Web site b) internet c) web portal d) web link 40 / 119 The length of IP address is a) 32 bits b) 16 bits c) 8 bits d) 24 bits 41 / 119 The device uses parallel transmission: a) light pen b) mouse c) Printer d) keyboard 42 / 119 Most applications of robotics are in which area a) manufacturing b) technique c) farming d) cooking 43 / 119 GUI stands for? a) General user interface b) Graphical user icons c) Graphical user interface d) Graphical usage interface 44 / 119 Format C is an example of a) Redlof b) bomb c) worm d) Trojan horse 45 / 119 A person who gains illegal access to a computer system is called a) computer consultant b) network c) computer operator d) hacker 46 / 119 The process of producing multiple copies of a document is called a) data management b) reprographics c) desktop publishing d) image processing 47 / 119 Which one is a an Automatic programmable machine: a) mouse b) Robot c) keyboard d) Cd-drive 48 / 119 CPU sends commands signals through a) address bus b) control c) data bus d) expention bus 49 / 119 Which of the following is not an example of system software a) Microsoft office b) operating system c) utility program d) drives 50 / 119 Which one of the following is not a cause of virus a) logic bomb b) E-mail c) network d) pirated software 51 / 119 Digital signals are commonly known as a) narrowband b) broadband c) band d) Baseband 52 / 119 Which technology is used to read data on cheques a) CAT b) OMR c) MICR d) OCR 53 / 119 The term that refers to all input, output and secondary storage devices is called: a) network point b) port c) internal memory d) peripheral 54 / 119 A communication signal in the form of a continuous wave is called: a) digital signal b) Analog signal c) discontinuous electrical signal d) binary signal 55 / 119 common font size used in business document is: a) 16-points b) 10-points c) 12-points d) 14-points 56 / 119 Temporary storage area within CPU is called: a) RAM b) ROM c) hard disk d) registers 57 / 119 Another word for pointer is: a) pixel b) director c) monochrome d) cursor 58 / 119 The microphone converts the sound into a) Mechanical signals b) Signals c) Electrical signal d) Computer file 59 / 119 A device that connect multiple network using similar or different protocol is a : a) bridge b) gateway c) router d) repeater 60 / 119 The actual working area in micro soft excel is a) data base b) work book c) lotus-123 d) worksheet 61 / 119 CBT software is used in a) industry b) education c) business d) E-commerce 62 / 119 The folder which contains administrator tools is a) control panel b) linker c) installer d) debugger 63 / 119 The extension of an executable file is a) .xis b) .doc c) .ext d) .exe 64 / 119 Printed images can be converted into digital form using a) stylus b) mouse c) joy stick d) Scanner 65 / 119 Web pages are written in which type of language is a) SQL b) Pascal c) HTML d) Assembly 66 / 119 physical path that connects the source and receiver is known as: a) decoder b) encoder c) communication channel d) NIC card 67 / 119 DSL stands for a) Distance service b) Direct service Lease c) Domain server d) Digital subscribe line 68 / 119 Transferring information from computer to internet is called a) Uploading b) Pasting c) Downsizing d) Downloading 69 / 119 The secret word or number used for computer security is called: a) Biometric data b) safe words c) Passwords d) private words 70 / 119 Which is not an output device a) Printer b) Speaker c) Scanner d) Monitor 71 / 119 OSI model consists of a) 5 layers b) 9 layers c) 11 layers d) 7 layers 72 / 119 The program that contains the instructions to operate a device is called a) Device driver b) device operating system c) device system d) device operator 73 / 119 one or more computer connected to a hub is called: a) star network b) mesh network c) ring network d) bus network 74 / 119 Which communication medium requires line-of-sight a) twisted pair b) coaxial c) microwave d) fiber optic 75 / 119 in spread-sheet,by default rows are labeled by: a) underscore sign b) special symbols c) letters d) numbers 76 / 119 Default name of first sheet in any work book is a) first sheet b) sheet I c) sheet one d) one 77 / 119 Each computer on a network is called a) Link b) Mode c) Code d) Node 78 / 119 Which of the following technique is used for modulation a) broad band b) base band c) band with d) bit band 79 / 119 Dejure means a) By default b) By fact c) By law d) By nature 80 / 119 How many characters ASCII-7bit code represents? a) 1024 b) 128 c) 512 d) 256 81 / 119 Which function key is used for checking spelling and grammar in MS word a) F4 b) F2 c) F7 d) F1 82 / 119 Analog signals are measured into a) digits b) volt c) Herts d) watts 83 / 119 A set of instruction that run the computer are a) Documents b) CUPs c) Software d) Hardware 84 / 119 A device that connect multiple networks using similar or different protocol; a) router b) gateway c) bridge d) repeater 85 / 119 Which one is the fastest a) register b) cache c) RAM d) hard disk 86 / 119 In MS-Excel, formula begins with: a) < b) == c) = d) > 87 / 119 World wide web was established in: a) 1992 b) 1985 c) 1980 d) 1989 88 / 119 Which of the following keyboard shortcuts is used to change the case: a) Ctrl+F3 b) alt+F3 c) shift+F3 d) Ctrl+F2 89 / 119 Data shown on display unit or played through audio is called a) Hardcopy b) photo copy c) Soft copy d) shared copy 90 / 119 The component of CPU which responsible for interacting with RAM is a) hard disk b) ALU c) register d) Control unit 91 / 119 Which is a communication device a) USB b) UTP c) Router d) Ethernet 92 / 119 How many bits are there in 4-bytes? a) 32 b) 64 c) 16 d) 8 93 / 119 RAM usually has ——types a) 3 b) 5 c) 2 d) 4 94 / 119 which of following is not a type of network : a) WAN b) MAN c) NAN d) LAN 95 / 119 We press enter key in Ms word to create a a) sentence b) document c) paragragh d) Line 96 / 119 which of the following techniques uses modulation? a) base band b) Broad band c) bandwidth d) bus-width 97 / 119 Which is a type of RAM: a) ERAM b) FRAM c) CRAM d) SRAM 98 / 119 The output of the compiler is called a) Linked code b) Source code c) Object code d) The program 99 / 119 which of the following can be used to launch the word art : a) standard toolbar b) status bar c) ruler d) drawing tool bar 100 / 119 Which of the following is used to get voice output a) printer b) plotter c) mic d) Speaker 101 / 119 Formula of instructions that run the computer is a) Hardware b) CUPs c) Document d) Software 102 / 119 How many types of addressing scheme are there : a) 4 b) 3 c) 2 d) 5 103 / 119 The communicational channels can be divided into a) 5 types b) 4 types c) two types d) 3 types 104 / 119 which of following coding scheme used by IBM a) CAM b) BCD c) MICR d) ATM 105 / 119 Which of the following is an Antivirus ? a) Trojan horse b) Redlof c) Logic bomb d) NOD32 106 / 119 The computers or internet that contain website are called a) site computer b) clients c) central computer d) web servers 107 / 119 Electronic circuits that executes computer instructions is called a) hard disk b) CPU c) Monitor d) Keyboard 108 / 119 The program that contain instruction to operate a device is called : a) device system b) device operator c) device linking d) Device driver 109 / 119 A small image that represents a program folder or file is called a) ICON b) menue c) command d) GUI 110 / 119 The fly-by-wire system is called used in a) medical b) industry c) Airline d) edcation 111 / 119 XGA resolution is: a) 640*480 b) 640*580 c) 1024*768 d) 640*860 112 / 119 Terminators are used in——topology a) mesh b) star c) ring d) Bus 113 / 119 Making illegal copies of copyrighted software is called a) software browsing b) software distribution c) software piracy d) software hacking 114 / 119 Another name of antivirus is: a) DES b) worm c) Vaccine d) Trojan Horse 115 / 119 physical path that connects the source and receiver is known as; a) decoder b) NIC card c) communication channel d) encoder 116 / 119 Clipboard stores—– in word processing. a) repeated text b) entered text c) copied text d) deleted text 117 / 119 The devices that are automatically detected by windows are called a) serial devices b) Automatic devices c) installed devices d) plug and play devices 118 / 119 The function that is used to get the maximum value in MS excel is called a) GREATERO b) HIGHESTO c) MAXIMUMO d) MAX 119 / 119 How many characters ASCII-7bit code represents? a) 64 b) 256 c) 128 d) 512 Your score is The average score is 54% LinkedIn Facebook Twitter 0% Restart quiz Post Views: 1,213 Post navigation Aiou Workshop 5403| Full Test Rawalpindi Board 2nd year all Computer Science MCQS.