1 Created on January 21, 2022 By adminRawalpindi Board CS past paperRawalpindi Board CS past paper 1 / 119 The topology used for a small number of computer is called a) star b) ring c) Bus d) mesh 2 / 119 CBT software is used in a) industry b) E-commerce c) business d) education 3 / 119 World wide web was established in: a) 1992 b) 1980 c) 1985 d) 1989 4 / 119 Soft copy refers to a) peripheral device b) presentation c) screen output d) application 5 / 119 We press enter key in Ms word to create a a) sentence b) Line c) paragragh d) document 6 / 119 Which of the following is used to get voice output a) plotter b) printer c) mic d) Speaker 7 / 119 Electronic banking is also known as? a) Interactive banking b) Global banking c) Cyber banking d) Offline banking 8 / 119 Software that is available free for a limited period is called a) Group ware b) Net ware c) Share ware d) Free ware 9 / 119 Which of the following is an example of system software? a) MS-word b) operating system c) spread-sheet d) text editor 10 / 119 CPU sends commands signals through a) data bus b) control c) expention bus d) address bus 11 / 119 The microphone converts the sound into a) Computer file b) Mechanical signals c) Electrical signal d) Software 12 / 119 The devices that are automatically detected by windows are called a) installed devices b) plug and play devices c) serial devices d) Automatic devices 13 / 119 Which one is a an Automatic programmable machine: a) Robot b) mouse c) keyboard d) Cd-drive 14 / 119 The software which is used to control all part of manufacturing process is called : a) CAD b) CAM c) ATM d) MICR 15 / 119 Each computer on a network is called a) Node b) Mode c) Code d) Link 16 / 119 BIT stands for: a) binary integer b) binary digit c) binary tree d) binary interval 17 / 119 The computers or internet that contain website are called a) web servers b) site computer c) clients d) central computer 18 / 119 The keyboard layout that is most commonly used is the a) splitter b) QWERTY c) qinerty d) inriter 19 / 119 Which of the following is not an Antivirus program : a) McAfee b) Redlof c) Nod 32 d) Dr.Solomon 20 / 119 which of the following can be used to launch the word art : a) ruler b) drawing tool bar c) standard toolbar d) status bar 21 / 119 The microphone converts the sound into a) Electrical signal b) Mechanical signals c) Computer file d) Signals 22 / 119 which of following coding scheme used by IBM a) MICR b) BCD c) CAM d) ATM 23 / 119 the minimum number of primary partitions that can be created on a basic disk are a) 6 b) 8 c) 4 d) 2 24 / 119 XGA resolution is: a) 640*480 b) 640*580 c) 1024*768 d) 640*860 25 / 119 how many types of language translator are there? a) 3 b) 1 c) 4 d) 2 26 / 119 The extension of an executable file is a) .exe b) .ext c) .xis d) .doc 27 / 119 Which of the following keyboard shortcuts is used to change the case: a) alt+F3 b) Ctrl+F3 c) Ctrl+F2 d) shift+F3 28 / 119 one or more network connected to hub is called; a) mesh network b) ring network c) bus network d) star network 29 / 119 Television and radio broadcasts are example of a) half duplex transmission b) full duplex transmission c) duplex transmission d) simplex transmission 30 / 119 DSL stands for a) Digital subscribe line b) Domain server c) Distance service d) Direct service Lease 31 / 119 Formula of instructions that run the computer is a) Document b) CUPs c) Software d) Hardware 32 / 119 Which function key is used for checking spelling and grammar in MS word a) F4 b) F7 c) F2 d) F1 33 / 119 A small image that represents a program folder or file is called a) ICON b) command c) GUI d) menue 34 / 119 physical path that connects the source and receiver is known as; a) decoder b) encoder c) communication channel d) NIC card 35 / 119 Data processing is also known as: a) merging b) computing c) procedure d) knowledge 36 / 119 The keyboard format that is most commonly used a) SPLITTER b) TWITTERY c) ASDFGH d) QWERTY 37 / 119 How many characters ASCII-7bit code represents? a) 256 b) 128 c) 512 d) 64 38 / 119 RAM usually has ——types a) 5 b) 2 c) 3 d) 4 39 / 119 The extension of Ms-Word is : a) .doc b) .bmp c) .wrd d) .mp3 40 / 119 The actual working area in micro soft excel is a) data base b) worksheet c) work book d) lotus-123 41 / 119 How many bits are there in 4-bytes? a) 32 b) 64 c) 16 d) 8 42 / 119 The number of argument in SQRT() function in MS-excel is are a) one b) equal to column number c) equal to range d) two 43 / 119 Temporary storage are within CPU is called a) registers b) RAM c) ROM d) cache 44 / 119 The process of transferring a file from remote computer to our local computer is a) copy b) Downloading c) forward d) Uploading 45 / 119 GUI stands for? a) Graphical usage interface b) General user interface c) Graphical user interface d) Graphical user icons 46 / 119 The communicational channels can be divided into a) 5 types b) 3 types c) 4 types d) two types 47 / 119 A communication signal in the form of a continuous wave is called: a) digital signal b) discontinuous electrical signal c) Analog signal d) binary signal 48 / 119 In MS-Excel, formula begins with: a) == b) < c) = d) > 49 / 119 Dejure means a) By nature b) By law c) By fact d) By default 50 / 119 OSI model consists of a) 9 layers b) 7 layers c) 5 layers d) 11 layers 51 / 119 The program that contains the instructions to operate a device is called a) device operator b) Device driver c) device operating system d) device system 52 / 119 The operating system based on NT technology is: a) windows 98 b) Windows 95 c) Windows 2000 d) windows 97 53 / 119 Which of the following is not a type of bus in computer? a) timer bus b) control bus c) data bus d) address bus 54 / 119 Which communication medium requires line-of-sight a) fiber optic b) coaxial c) microwave d) twisted pair 55 / 119 The device uses parallel transmission: a) light pen b) Printer c) keyboard d) mouse 56 / 119 one or more computer connected to a hub is called: a) star network b) ring network c) mesh network d) bus network 57 / 119 Web pages are written in which type of language is a) HTML b) Pascal c) SQL d) Assembly 58 / 119 Which technology is used to read data on cheques a) OCR b) MICR c) OMR d) CAT 59 / 119 The length of IP address is a) 32 bits b) 16 bits c) 24 bits d) 8 bits 60 / 119 Which is not a bio metric technique for person identification a) pam print b) retina c) badge d) face 61 / 119 Which one of the following is not a cause of virus a) network b) logic bomb c) E-mail d) pirated software 62 / 119 Default name of first sheet in any work book is a) one b) first sheet c) sheet one d) sheet I 63 / 119 The term that refers to all input, output and secondary storage devices is called: a) peripheral b) internal memory c) network point d) port 64 / 119 How many characters ASCII-7bit code represents? a) 256 b) 1024 c) 512 d) 128 65 / 119 Clipboard stores—– in word processing. a) deleted text b) repeated text c) copied text d) entered text 66 / 119 Analog signals are measured into a) volt b) watts c) digits d) Herts 67 / 119 A set of instruction that run the computer are a) CUPs b) Software c) Hardware d) Documents 68 / 119 The program that contain instruction to operate a device is called : a) device system b) device linking c) Device driver d) device operator 69 / 119 The secret word or number used for computer security is called: a) Passwords b) Biometric data c) private words d) safe words 70 / 119 The process of converting digital signals into analog signals via modem is a) Merging b) Modulation c) Demodulation d) Mixing 71 / 119 Which of the following technique is used for modulation a) bit band b) broad band c) band with d) base band 72 / 119 The process of producing multiple copies of a document is called a) desktop publishing b) data management c) image processing d) reprographics 73 / 119 The output of the compiler is called a) Source code b) Object code c) Linked code d) The program 74 / 119 Which one is the fastest a) RAM b) cache c) register d) hard disk 75 / 119 Which is not an output device a) Scanner b) Monitor c) Printer d) Speaker 76 / 119 Another word for pointer is: a) cursor b) pixel c) director d) monochrome 77 / 119 The folder which contains administrator tools is a) installer b) control panel c) debugger d) linker 78 / 119 The register holds the address of the next instruction to be fetched for execution a) Instruction register b) Counter register c) Base register d) Program counter 79 / 119 A device that connect multiple networks using similar or different protocol; a) router b) repeater c) bridge d) gateway 80 / 119 Terminators are used in——topology a) ring b) mesh c) Bus d) star 81 / 119 Trojan Horse is a type of a) antivirus b) horse c) hacker d) virus 82 / 119 Temporary storage area within CPU is called: a) registers b) hard disk c) ROM d) RAM 83 / 119 A person who gains illegal access to a computer system is called a) computer operator b) hacker c) network d) computer consultant 84 / 119 physical path that connects the source and receiver is known as: a) NIC card b) encoder c) decoder d) communication channel 85 / 119 Data shown on display unit or played through audio is called a) Soft copy b) Hardcopy c) shared copy d) photo copy 86 / 119 Digital signals are commonly known as a) narrowband b) band c) Baseband d) broadband 87 / 119 which of following is not a type of network : a) LAN b) WAN c) MAN d) NAN 88 / 119 Which of the following is an Antivirus ? a) Redlof b) NOD32 c) Trojan horse d) Logic bomb 89 / 119 A device that connect multiple network using similar or different protocol is a : a) gateway b) repeater c) router d) bridge 90 / 119 Most applications of robotics are in which area a) cooking b) technique c) farming d) manufacturing 91 / 119 A work book is a collection of a) sheets b) functions c) table d) formula 92 / 119 Which of the following is not an example of system software a) drives b) utility program c) operating system d) Microsoft office 93 / 119 Which one is a faster memory? a) RAM b) Register c) ROM d) cache 94 / 119 The fly-by-wire system is called used in a) Airline b) medical c) industry d) edcation 95 / 119 Electronic circuits that executes computer instructions is called a) CPU b) Keyboard c) Monitor d) hard disk 96 / 119 Printed images can be converted into digital form using a) Scanner b) stylus c) mouse d) joy stick 97 / 119 in spread-sheet,by default rows are labeled by: a) special symbols b) underscore sign c) letters d) numbers 98 / 119 Trojan Horse is an example of a) antivirus b) hardware c) Virus d) system software 99 / 119 How many types of addressing scheme are there : a) 3 b) 5 c) 4 d) 2 100 / 119 Format C is an example of a) Redlof b) worm c) Trojan horse d) bomb 101 / 119 Communication between computer and keyboard involve the transmission: a) Simplex b) Full-Duplex c) Automatic d) Half-Duplex 102 / 119 Transferring information from computer to internet is called a) Pasting b) Uploading c) Downsizing d) Downloading 103 / 119 Which is a communication device a) UTP b) Router c) USB d) Ethernet 104 / 119 Which is a type of RAM: a) FRAM b) ERAM c) CRAM d) SRAM 105 / 119 The function that is used to get the maximum value in MS excel is called a) MAXIMUMO b) GREATERO c) HIGHESTO d) MAX 106 / 119 Which devices connects each computer to a network? a) gateway b) router c) bridge d) Network interface Card 107 / 119 common font size used in business document is: a) 12-points b) 16-points c) 10-points d) 14-points 108 / 119 layer that is responsible for transferring frames in OSI model is a) session layer b) presentation layer c) application layer d) data link layer 109 / 119 which of the following techniques uses modulation? a) bandwidth b) Broad band c) bus-width d) base band 110 / 119 The top most layer of OSI model is a) Application b) presentation c) session d) transport 111 / 119 The component of CPU which responsible for interacting with RAM is a) hard disk b) ALU c) register d) Control unit 112 / 119 Testing all program components together in SDLC is called a) system testing b) volume testing c) group testing d) composite testing 113 / 119 Another name of antivirus is: a) worm b) Trojan Horse c) Vaccine d) DES 114 / 119 A virus that replicate itself is called a) boot sector virus b) bug c) worm d) Trojan horse 115 / 119 A collection of related web pages is called a) internet b) web link c) Web site d) web portal 116 / 119 Making illegal copies of copyrighted software is called a) software hacking b) software browsing c) software piracy d) software distribution 117 / 119 Moving up or down in word processing document is called a) word-wrap b) pull-down c) line movement d) Scrolling 118 / 119 Which of the following contains the administrative tools in operating system : a) recycle bin b) my document folder c) internet explorer d) control panel 119 / 119 Which components is used to connect different parts of the computer together? a) main memory b) control unit c) buses d) I/O unit Your score is The average score is 80% LinkedIn Facebook Twitter 0% Restart quiz Post Views: 617 Post navigation Rawalpindi Board 2nd year all Computer Science MCQS.