5 Created on January 21, 2022 By adminRawalpindi Board CS past paperRawalpindi Board CS past paper 1 / 119 Terminators are used in——topology a) star b) Bus c) mesh d) ring 2 / 119 Printed images can be converted into digital form using a) joy stick b) mouse c) Scanner d) stylus 3 / 119 Which one is the fastest a) register b) cache c) RAM d) hard disk 4 / 119 The number of argument in SQRT() function in MS-excel is are a) one b) equal to column number c) two d) equal to range 5 / 119 The folder which contains administrator tools is a) control panel b) linker c) debugger d) installer 6 / 119 A work book is a collection of a) functions b) table c) formula d) sheets 7 / 119 one or more computer connected to a hub is called: a) star network b) bus network c) ring network d) mesh network 8 / 119 Which components is used to connect different parts of the computer together? a) main memory b) buses c) control unit d) I/O unit 9 / 119 OSI model consists of a) 11 layers b) 9 layers c) 7 layers d) 5 layers 10 / 119 The device uses parallel transmission: a) Printer b) keyboard c) light pen d) mouse 11 / 119 A set of instruction that run the computer are a) Documents b) Software c) CUPs d) Hardware 12 / 119 Which of the following contains the administrative tools in operating system : a) my document folder b) internet explorer c) control panel d) recycle bin 13 / 119 The microphone converts the sound into a) Mechanical signals b) Electrical signal c) Software d) Computer file 14 / 119 Electronic banking is also known as? a) Global banking b) Interactive banking c) Cyber banking d) Offline banking 15 / 119 The communicational channels can be divided into a) 4 types b) 3 types c) two types d) 5 types 16 / 119 Data shown on display unit or played through audio is called a) photo copy b) Soft copy c) Hardcopy d) shared copy 17 / 119 Which one of the following is not a cause of virus a) E-mail b) pirated software c) logic bomb d) network 18 / 119 one or more network connected to hub is called; a) mesh network b) bus network c) star network d) ring network 19 / 119 Format C is an example of a) Redlof b) Trojan horse c) worm d) bomb 20 / 119 in spread-sheet,by default rows are labeled by: a) numbers b) underscore sign c) special symbols d) letters 21 / 119 The keyboard format that is most commonly used a) TWITTERY b) ASDFGH c) QWERTY d) SPLITTER 22 / 119 The process of producing multiple copies of a document is called a) image processing b) desktop publishing c) data management d) reprographics 23 / 119 A communication signal in the form of a continuous wave is called: a) digital signal b) discontinuous electrical signal c) binary signal d) Analog signal 24 / 119 The program that contains the instructions to operate a device is called a) device operator b) device operating system c) device system d) Device driver 25 / 119 A small image that represents a program folder or file is called a) GUI b) command c) ICON d) menue 26 / 119 Most applications of robotics are in which area a) manufacturing b) cooking c) technique d) farming 27 / 119 Which of the following is not an Antivirus program : a) Nod 32 b) Dr.Solomon c) McAfee d) Redlof 28 / 119 layer that is responsible for transferring frames in OSI model is a) presentation layer b) session layer c) data link layer d) application layer 29 / 119 How many bits are there in 4-bytes? a) 32 b) 8 c) 16 d) 64 30 / 119 The extension of Ms-Word is : a) .doc b) .mp3 c) .wrd d) .bmp 31 / 119 Which of the following keyboard shortcuts is used to change the case: a) alt+F3 b) Ctrl+F2 c) shift+F3 d) Ctrl+F3 32 / 119 which of the following techniques uses modulation? a) bandwidth b) base band c) bus-width d) Broad band 33 / 119 physical path that connects the source and receiver is known as: a) encoder b) communication channel c) NIC card d) decoder 34 / 119 Each computer on a network is called a) Code b) Mode c) Node d) Link 35 / 119 Another word for pointer is: a) cursor b) director c) pixel d) monochrome 36 / 119 The fly-by-wire system is called used in a) industry b) Airline c) edcation d) medical 37 / 119 how many types of language translator are there? a) 1 b) 4 c) 2 d) 3 38 / 119 Web pages are written in which type of language is a) HTML b) Assembly c) Pascal d) SQL 39 / 119 The topology used for a small number of computer is called a) mesh b) star c) Bus d) ring 40 / 119 Soft copy refers to a) screen output b) peripheral device c) application d) presentation 41 / 119 The term that refers to all input, output and secondary storage devices is called: a) port b) network point c) internal memory d) peripheral 42 / 119 Moving up or down in word processing document is called a) line movement b) word-wrap c) Scrolling d) pull-down 43 / 119 Which of the following is used to get voice output a) printer b) mic c) plotter d) Speaker 44 / 119 The component of CPU which responsible for interacting with RAM is a) Control unit b) ALU c) register d) hard disk 45 / 119 The operating system based on NT technology is: a) Windows 95 b) windows 98 c) windows 97 d) Windows 2000 46 / 119 Which one is a an Automatic programmable machine: a) Cd-drive b) Robot c) mouse d) keyboard 47 / 119 XGA resolution is: a) 640*860 b) 1024*768 c) 640*580 d) 640*480 48 / 119 The secret word or number used for computer security is called: a) Passwords b) Biometric data c) safe words d) private words 49 / 119 Which communication medium requires line-of-sight a) fiber optic b) microwave c) coaxial d) twisted pair 50 / 119 Which is not a bio metric technique for person identification a) retina b) badge c) pam print d) face 51 / 119 Which is a type of RAM: a) FRAM b) CRAM c) SRAM d) ERAM 52 / 119 A virus that replicate itself is called a) Trojan horse b) worm c) boot sector virus d) bug 53 / 119 The top most layer of OSI model is a) transport b) session c) Application d) presentation 54 / 119 The output of the compiler is called a) The program b) Linked code c) Source code d) Object code 55 / 119 BIT stands for: a) binary interval b) binary integer c) binary digit d) binary tree 56 / 119 Formula of instructions that run the computer is a) Software b) Hardware c) CUPs d) Document 57 / 119 Software that is available free for a limited period is called a) Net ware b) Free ware c) Group ware d) Share ware 58 / 119 Default name of first sheet in any work book is a) first sheet b) sheet one c) one d) sheet I 59 / 119 Dejure means a) By fact b) By law c) By default d) By nature 60 / 119 How many types of addressing scheme are there : a) 5 b) 3 c) 4 d) 2 61 / 119 How many characters ASCII-7bit code represents? a) 128 b) 64 c) 256 d) 512 62 / 119 The computers or internet that contain website are called a) site computer b) clients c) web servers d) central computer 63 / 119 World wide web was established in: a) 1985 b) 1992 c) 1980 d) 1989 64 / 119 CPU sends commands signals through a) expention bus b) data bus c) control d) address bus 65 / 119 Which devices connects each computer to a network? a) bridge b) router c) gateway d) Network interface Card 66 / 119 Testing all program components together in SDLC is called a) volume testing b) composite testing c) group testing d) system testing 67 / 119 How many characters ASCII-7bit code represents? a) 512 b) 256 c) 1024 d) 128 68 / 119 The keyboard layout that is most commonly used is the a) QWERTY b) qinerty c) splitter d) inriter 69 / 119 CBT software is used in a) education b) E-commerce c) industry d) business 70 / 119 which of following is not a type of network : a) MAN b) LAN c) NAN d) WAN 71 / 119 Which of the following is an example of system software? a) text editor b) MS-word c) operating system d) spread-sheet 72 / 119 The register holds the address of the next instruction to be fetched for execution a) Counter register b) Instruction register c) Program counter d) Base register 73 / 119 DSL stands for a) Domain server b) Distance service c) Digital subscribe line d) Direct service Lease 74 / 119 Trojan Horse is a type of a) antivirus b) horse c) virus d) hacker 75 / 119 We press enter key in Ms word to create a a) document b) paragragh c) Line d) sentence 76 / 119 Electronic circuits that executes computer instructions is called a) Keyboard b) Monitor c) CPU d) hard disk 77 / 119 The function that is used to get the maximum value in MS excel is called a) HIGHESTO b) MAXIMUMO c) GREATERO d) MAX 78 / 119 The microphone converts the sound into a) Computer file b) Electrical signal c) Signals d) Mechanical signals 79 / 119 The process of converting digital signals into analog signals via modem is a) Mixing b) Merging c) Demodulation d) Modulation 80 / 119 The program that contain instruction to operate a device is called : a) device system b) device linking c) Device driver d) device operator 81 / 119 Which of the following is not a type of bus in computer? a) control bus b) timer bus c) data bus d) address bus 82 / 119 Trojan Horse is an example of a) Virus b) system software c) antivirus d) hardware 83 / 119 A person who gains illegal access to a computer system is called a) hacker b) computer consultant c) computer operator d) network 84 / 119 Digital signals are commonly known as a) broadband b) narrowband c) Baseband d) band 85 / 119 Another name of antivirus is: a) DES b) Trojan Horse c) worm d) Vaccine 86 / 119 The actual working area in micro soft excel is a) work book b) data base c) worksheet d) lotus-123 87 / 119 GUI stands for? a) General user interface b) Graphical user icons c) Graphical usage interface d) Graphical user interface 88 / 119 The extension of an executable file is a) .exe b) .xis c) .doc d) .ext 89 / 119 The software which is used to control all part of manufacturing process is called : a) MICR b) ATM c) CAM d) CAD 90 / 119 the minimum number of primary partitions that can be created on a basic disk are a) 6 b) 4 c) 8 d) 2 91 / 119 Which of the following is an Antivirus ? a) Logic bomb b) Redlof c) NOD32 d) Trojan horse 92 / 119 Transferring information from computer to internet is called a) Downloading b) Uploading c) Downsizing d) Pasting 93 / 119 Which of the following is not an example of system software a) Microsoft office b) utility program c) drives d) operating system 94 / 119 A collection of related web pages is called a) web portal b) web link c) internet d) Web site 95 / 119 Communication between computer and keyboard involve the transmission: a) Simplex b) Automatic c) Full-Duplex d) Half-Duplex 96 / 119 The process of transferring a file from remote computer to our local computer is a) Downloading b) Uploading c) copy d) forward 97 / 119 A device that connect multiple networks using similar or different protocol; a) router b) gateway c) repeater d) bridge 98 / 119 Making illegal copies of copyrighted software is called a) software distribution b) software browsing c) software hacking d) software piracy 99 / 119 Temporary storage area within CPU is called: a) hard disk b) registers c) RAM d) ROM 100 / 119 Which is not an output device a) Printer b) Scanner c) Speaker d) Monitor 101 / 119 Which function key is used for checking spelling and grammar in MS word a) F4 b) F7 c) F2 d) F1 102 / 119 Which technology is used to read data on cheques a) OCR b) CAT c) OMR d) MICR 103 / 119 which of the following can be used to launch the word art : a) drawing tool bar b) standard toolbar c) status bar d) ruler 104 / 119 A device that connect multiple network using similar or different protocol is a : a) bridge b) gateway c) repeater d) router 105 / 119 Temporary storage are within CPU is called a) registers b) cache c) ROM d) RAM 106 / 119 RAM usually has ——types a) 3 b) 5 c) 2 d) 4 107 / 119 The devices that are automatically detected by windows are called a) serial devices b) plug and play devices c) installed devices d) Automatic devices 108 / 119 Which one is a faster memory? a) RAM b) cache c) Register d) ROM 109 / 119 In MS-Excel, formula begins with: a) > b) == c) = d) < 110 / 119 Clipboard stores—– in word processing. a) repeated text b) copied text c) deleted text d) entered text 111 / 119 which of following coding scheme used by IBM a) MICR b) CAM c) BCD d) ATM 112 / 119 Data processing is also known as: a) procedure b) merging c) computing d) knowledge 113 / 119 Television and radio broadcasts are example of a) duplex transmission b) half duplex transmission c) full duplex transmission d) simplex transmission 114 / 119 Which is a communication device a) Ethernet b) UTP c) USB d) Router 115 / 119 physical path that connects the source and receiver is known as; a) communication channel b) encoder c) decoder d) NIC card 116 / 119 The length of IP address is a) 32 bits b) 8 bits c) 16 bits d) 24 bits 117 / 119 Analog signals are measured into a) digits b) volt c) Herts d) watts 118 / 119 common font size used in business document is: a) 10-points b) 16-points c) 12-points d) 14-points 119 / 119 Which of the following technique is used for modulation a) band with b) bit band c) base band d) broad band Your score is The average score is 54% LinkedIn Facebook Twitter 0% Restart quiz Post Views: 751 Post navigation Aiou Workshop 5403| Full Test Rawalpindi Board 2nd year all Computer Science MCQS.
How are you