9 Created on January 21, 2022 By adminRawalpindi Board CS past paperRawalpindi Board CS past paper 1 / 119 Which technology is used to read data on cheques a) OCR b) CAT c) MICR d) OMR 2 / 119 which of following coding scheme used by IBM a) MICR b) CAM c) ATM d) BCD 3 / 119 The extension of Ms-Word is : a) .wrd b) .doc c) .bmp d) .mp3 4 / 119 RAM usually has ——types a) 5 b) 3 c) 4 d) 2 5 / 119 physical path that connects the source and receiver is known as: a) encoder b) decoder c) NIC card d) communication channel 6 / 119 Format C is an example of a) bomb b) worm c) Trojan horse d) Redlof 7 / 119 A person who gains illegal access to a computer system is called a) network b) hacker c) computer operator d) computer consultant 8 / 119 How many types of addressing scheme are there : a) 5 b) 3 c) 2 d) 4 9 / 119 Testing all program components together in SDLC is called a) system testing b) composite testing c) volume testing d) group testing 10 / 119 The keyboard layout that is most commonly used is the a) splitter b) QWERTY c) qinerty d) inriter 11 / 119 The number of argument in SQRT() function in MS-excel is are a) one b) two c) equal to range d) equal to column number 12 / 119 The process of transferring a file from remote computer to our local computer is a) forward b) Uploading c) Downloading d) copy 13 / 119 Which of the following keyboard shortcuts is used to change the case: a) alt+F3 b) Ctrl+F2 c) shift+F3 d) Ctrl+F3 14 / 119 How many characters ASCII-7bit code represents? a) 64 b) 128 c) 256 d) 512 15 / 119 Which of the following is an Antivirus ? a) Redlof b) Logic bomb c) NOD32 d) Trojan horse 16 / 119 Electronic circuits that executes computer instructions is called a) Keyboard b) Monitor c) CPU d) hard disk 17 / 119 Trojan Horse is an example of a) hardware b) antivirus c) Virus d) system software 18 / 119 Which one is a an Automatic programmable machine: a) keyboard b) mouse c) Robot d) Cd-drive 19 / 119 The keyboard format that is most commonly used a) QWERTY b) SPLITTER c) TWITTERY d) ASDFGH 20 / 119 The software which is used to control all part of manufacturing process is called : a) ATM b) CAM c) CAD d) MICR 21 / 119 Which of the following is not an Antivirus program : a) Nod 32 b) McAfee c) Redlof d) Dr.Solomon 22 / 119 A device that connect multiple networks using similar or different protocol; a) bridge b) gateway c) repeater d) router 23 / 119 The function that is used to get the maximum value in MS excel is called a) GREATERO b) MAXIMUMO c) MAX d) HIGHESTO 24 / 119 Communication between computer and keyboard involve the transmission: a) Automatic b) Simplex c) Half-Duplex d) Full-Duplex 25 / 119 how many types of language translator are there? a) 3 b) 1 c) 2 d) 4 26 / 119 which of the following can be used to launch the word art : a) ruler b) status bar c) drawing tool bar d) standard toolbar 27 / 119 Analog signals are measured into a) volt b) digits c) watts d) Herts 28 / 119 A communication signal in the form of a continuous wave is called: a) binary signal b) digital signal c) Analog signal d) discontinuous electrical signal 29 / 119 The computers or internet that contain website are called a) web servers b) site computer c) central computer d) clients 30 / 119 Temporary storage are within CPU is called a) registers b) ROM c) RAM d) cache 31 / 119 the minimum number of primary partitions that can be created on a basic disk are a) 4 b) 6 c) 2 d) 8 32 / 119 The output of the compiler is called a) The program b) Linked code c) Source code d) Object code 33 / 119 The microphone converts the sound into a) Mechanical signals b) Electrical signal c) Computer file d) Signals 34 / 119 Which communication medium requires line-of-sight a) coaxial b) twisted pair c) microwave d) fiber optic 35 / 119 Which of the following is an example of system software? a) spread-sheet b) operating system c) MS-word d) text editor 36 / 119 Data shown on display unit or played through audio is called a) Soft copy b) photo copy c) shared copy d) Hardcopy 37 / 119 Web pages are written in which type of language is a) HTML b) Pascal c) SQL d) Assembly 38 / 119 How many bits are there in 4-bytes? a) 8 b) 32 c) 16 d) 64 39 / 119 The program that contain instruction to operate a device is called : a) device linking b) device operator c) device system d) Device driver 40 / 119 in spread-sheet,by default rows are labeled by: a) numbers b) special symbols c) underscore sign d) letters 41 / 119 The topology used for a small number of computer is called a) Bus b) ring c) star d) mesh 42 / 119 Clipboard stores—– in word processing. a) copied text b) entered text c) repeated text d) deleted text 43 / 119 CPU sends commands signals through a) control b) expention bus c) data bus d) address bus 44 / 119 Soft copy refers to a) peripheral device b) presentation c) screen output d) application 45 / 119 layer that is responsible for transferring frames in OSI model is a) presentation layer b) data link layer c) application layer d) session layer 46 / 119 Television and radio broadcasts are example of a) half duplex transmission b) duplex transmission c) full duplex transmission d) simplex transmission 47 / 119 Which components is used to connect different parts of the computer together? a) main memory b) I/O unit c) buses d) control unit 48 / 119 The device uses parallel transmission: a) light pen b) Printer c) keyboard d) mouse 49 / 119 Printed images can be converted into digital form using a) joy stick b) stylus c) mouse d) Scanner 50 / 119 one or more computer connected to a hub is called: a) ring network b) star network c) bus network d) mesh network 51 / 119 A collection of related web pages is called a) internet b) web link c) web portal d) Web site 52 / 119 The process of converting digital signals into analog signals via modem is a) Merging b) Modulation c) Mixing d) Demodulation 53 / 119 Default name of first sheet in any work book is a) sheet I b) one c) sheet one d) first sheet 54 / 119 The top most layer of OSI model is a) Application b) transport c) session d) presentation 55 / 119 The term that refers to all input, output and secondary storage devices is called: a) port b) network point c) internal memory d) peripheral 56 / 119 Transferring information from computer to internet is called a) Uploading b) Downloading c) Pasting d) Downsizing 57 / 119 Which is not a bio metric technique for person identification a) pam print b) face c) retina d) badge 58 / 119 physical path that connects the source and receiver is known as; a) NIC card b) communication channel c) encoder d) decoder 59 / 119 The devices that are automatically detected by windows are called a) plug and play devices b) installed devices c) Automatic devices d) serial devices 60 / 119 Trojan Horse is a type of a) antivirus b) hacker c) virus d) horse 61 / 119 Dejure means a) By fact b) By nature c) By default d) By law 62 / 119 The fly-by-wire system is called used in a) edcation b) industry c) Airline d) medical 63 / 119 The program that contains the instructions to operate a device is called a) Device driver b) device system c) device operating system d) device operator 64 / 119 Which function key is used for checking spelling and grammar in MS word a) F7 b) F1 c) F2 d) F4 65 / 119 Another word for pointer is: a) director b) monochrome c) pixel d) cursor 66 / 119 The secret word or number used for computer security is called: a) Passwords b) Biometric data c) safe words d) private words 67 / 119 Which of the following is used to get voice output a) plotter b) Speaker c) printer d) mic 68 / 119 Which of the following technique is used for modulation a) bit band b) broad band c) base band d) band with 69 / 119 DSL stands for a) Digital subscribe line b) Distance service c) Domain server d) Direct service Lease 70 / 119 Which devices connects each computer to a network? a) Network interface Card b) bridge c) router d) gateway 71 / 119 Data processing is also known as: a) merging b) computing c) knowledge d) procedure 72 / 119 Terminators are used in——topology a) star b) mesh c) Bus d) ring 73 / 119 Moving up or down in word processing document is called a) word-wrap b) Scrolling c) pull-down d) line movement 74 / 119 one or more network connected to hub is called; a) bus network b) ring network c) star network d) mesh network 75 / 119 The process of producing multiple copies of a document is called a) reprographics b) image processing c) desktop publishing d) data management 76 / 119 How many characters ASCII-7bit code represents? a) 512 b) 1024 c) 128 d) 256 77 / 119 The actual working area in micro soft excel is a) data base b) worksheet c) work book d) lotus-123 78 / 119 Which is not an output device a) Speaker b) Scanner c) Printer d) Monitor 79 / 119 The length of IP address is a) 32 bits b) 16 bits c) 8 bits d) 24 bits 80 / 119 Electronic banking is also known as? a) Interactive banking b) Cyber banking c) Global banking d) Offline banking 81 / 119 XGA resolution is: a) 640*580 b) 640*480 c) 640*860 d) 1024*768 82 / 119 The operating system based on NT technology is: a) windows 98 b) Windows 2000 c) Windows 95 d) windows 97 83 / 119 Which one of the following is not a cause of virus a) logic bomb b) network c) E-mail d) pirated software 84 / 119 Which is a type of RAM: a) CRAM b) SRAM c) ERAM d) FRAM 85 / 119 Most applications of robotics are in which area a) farming b) cooking c) manufacturing d) technique 86 / 119 Which one is the fastest a) hard disk b) register c) cache d) RAM 87 / 119 Each computer on a network is called a) Code b) Node c) Mode d) Link 88 / 119 The communicational channels can be divided into a) 5 types b) 3 types c) 4 types d) two types 89 / 119 Temporary storage area within CPU is called: a) registers b) RAM c) hard disk d) ROM 90 / 119 Another name of antivirus is: a) Trojan Horse b) worm c) Vaccine d) DES 91 / 119 GUI stands for? a) Graphical usage interface b) Graphical user icons c) General user interface d) Graphical user interface 92 / 119 Which of the following is not an example of system software a) drives b) utility program c) operating system d) Microsoft office 93 / 119 Which of the following contains the administrative tools in operating system : a) recycle bin b) control panel c) my document folder d) internet explorer 94 / 119 A set of instruction that run the computer are a) Hardware b) Software c) Documents d) CUPs 95 / 119 which of following is not a type of network : a) WAN b) LAN c) MAN d) NAN 96 / 119 The folder which contains administrator tools is a) linker b) installer c) control panel d) debugger 97 / 119 We press enter key in Ms word to create a a) paragragh b) Line c) sentence d) document 98 / 119 Which is a communication device a) Router b) UTP c) USB d) Ethernet 99 / 119 The register holds the address of the next instruction to be fetched for execution a) Base register b) Program counter c) Counter register d) Instruction register 100 / 119 OSI model consists of a) 11 layers b) 9 layers c) 5 layers d) 7 layers 101 / 119 Which one is a faster memory? a) ROM b) cache c) Register d) RAM 102 / 119 Digital signals are commonly known as a) Baseband b) narrowband c) band d) broadband 103 / 119 Making illegal copies of copyrighted software is called a) software distribution b) software piracy c) software browsing d) software hacking 104 / 119 common font size used in business document is: a) 12-points b) 14-points c) 10-points d) 16-points 105 / 119 which of the following techniques uses modulation? a) bus-width b) bandwidth c) base band d) Broad band 106 / 119 Software that is available free for a limited period is called a) Share ware b) Free ware c) Group ware d) Net ware 107 / 119 Which of the following is not a type of bus in computer? a) timer bus b) address bus c) control bus d) data bus 108 / 119 Formula of instructions that run the computer is a) Software b) CUPs c) Hardware d) Document 109 / 119 A small image that represents a program folder or file is called a) command b) ICON c) menue d) GUI 110 / 119 In MS-Excel, formula begins with: a) < b) = c) == d) > 111 / 119 CBT software is used in a) education b) E-commerce c) business d) industry 112 / 119 The microphone converts the sound into a) Computer file b) Mechanical signals c) Electrical signal d) Software 113 / 119 The extension of an executable file is a) .exe b) .doc c) .xis d) .ext 114 / 119 A device that connect multiple network using similar or different protocol is a : a) bridge b) gateway c) repeater d) router 115 / 119 World wide web was established in: a) 1985 b) 1989 c) 1980 d) 1992 116 / 119 A work book is a collection of a) table b) sheets c) formula d) functions 117 / 119 A virus that replicate itself is called a) boot sector virus b) Trojan horse c) worm d) bug 118 / 119 BIT stands for: a) binary integer b) binary digit c) binary interval d) binary tree 119 / 119 The component of CPU which responsible for interacting with RAM is a) ALU b) hard disk c) register d) Control unit Your score is The average score is 54% LinkedIn Facebook Twitter 0% Restart quiz Post Views: 898 Post navigation Aiou Workshop 5403| Full Test Rawalpindi Board 2nd year all Computer Science MCQS.