Spread the love 9 Created on January 21, 2022 By adminRawalpindi Board CS past paperRawalpindi Board CS past paper 1 / 119 Data shown on display unit or played through audio is called a) photo copy b) shared copy c) Hardcopy d) Soft copy 2 / 119 The length of IP address is a) 24 bits b) 32 bits c) 16 bits d) 8 bits 3 / 119 one or more computer connected to a hub is called: a) mesh network b) ring network c) star network d) bus network 4 / 119 Dejure means a) By law b) By nature c) By default d) By fact 5 / 119 Trojan Horse is a type of a) hacker b) antivirus c) horse d) virus 6 / 119 The microphone converts the sound into a) Electrical signal b) Mechanical signals c) Software d) Computer file 7 / 119 Trojan Horse is an example of a) system software b) Virus c) antivirus d) hardware 8 / 119 Moving up or down in word processing document is called a) Scrolling b) line movement c) pull-down d) word-wrap 9 / 119 one or more network connected to hub is called; a) star network b) ring network c) mesh network d) bus network 10 / 119 The communicational channels can be divided into a) two types b) 4 types c) 3 types d) 5 types 11 / 119 Clipboard stores—– in word processing. a) entered text b) deleted text c) copied text d) repeated text 12 / 119 Soft copy refers to a) peripheral device b) presentation c) screen output d) application 13 / 119 which of following coding scheme used by IBM a) ATM b) CAM c) MICR d) BCD 14 / 119 Which of the following contains the administrative tools in operating system : a) my document folder b) recycle bin c) internet explorer d) control panel 15 / 119 Default name of first sheet in any work book is a) one b) sheet I c) sheet one d) first sheet 16 / 119 The computers or internet that contain website are called a) site computer b) web servers c) clients d) central computer 17 / 119 DSL stands for a) Direct service Lease b) Distance service c) Digital subscribe line d) Domain server 18 / 119 Which of the following keyboard shortcuts is used to change the case: a) shift+F3 b) alt+F3 c) Ctrl+F2 d) Ctrl+F3 19 / 119 The top most layer of OSI model is a) presentation b) Application c) session d) transport 20 / 119 Data processing is also known as: a) knowledge b) computing c) merging d) procedure 21 / 119 the minimum number of primary partitions that can be created on a basic disk are a) 6 b) 2 c) 8 d) 4 22 / 119 Which of the following technique is used for modulation a) band with b) base band c) broad band d) bit band 23 / 119 The function that is used to get the maximum value in MS excel is called a) GREATERO b) HIGHESTO c) MAX d) MAXIMUMO 24 / 119 Which technology is used to read data on cheques a) MICR b) CAT c) OCR d) OMR 25 / 119 RAM usually has ——types a) 2 b) 5 c) 4 d) 3 26 / 119 Which of the following is not an Antivirus program : a) Nod 32 b) Redlof c) McAfee d) Dr.Solomon 27 / 119 Which function key is used for checking spelling and grammar in MS word a) F4 b) F1 c) F7 d) F2 28 / 119 The component of CPU which responsible for interacting with RAM is a) ALU b) hard disk c) Control unit d) register 29 / 119 Testing all program components together in SDLC is called a) composite testing b) group testing c) volume testing d) system testing 30 / 119 The device uses parallel transmission: a) light pen b) mouse c) Printer d) keyboard 31 / 119 layer that is responsible for transferring frames in OSI model is a) data link layer b) presentation layer c) session layer d) application layer 32 / 119 A communication signal in the form of a continuous wave is called: a) discontinuous electrical signal b) binary signal c) digital signal d) Analog signal 33 / 119 The actual working area in micro soft excel is a) work book b) lotus-123 c) data base d) worksheet 34 / 119 A virus that replicate itself is called a) bug b) boot sector virus c) worm d) Trojan horse 35 / 119 The keyboard layout that is most commonly used is the a) QWERTY b) qinerty c) inriter d) splitter 36 / 119 Temporary storage are within CPU is called a) RAM b) ROM c) cache d) registers 37 / 119 The register holds the address of the next instruction to be fetched for execution a) Instruction register b) Base register c) Program counter d) Counter register 38 / 119 How many bits are there in 4-bytes? a) 16 b) 64 c) 32 d) 8 39 / 119 how many types of language translator are there? a) 2 b) 3 c) 1 d) 4 40 / 119 The extension of an executable file is a) .doc b) .ext c) .exe d) .xis 41 / 119 The program that contains the instructions to operate a device is called a) Device driver b) device operating system c) device system d) device operator 42 / 119 Which is not a bio metric technique for person identification a) badge b) face c) retina d) pam print 43 / 119 The process of producing multiple copies of a document is called a) reprographics b) desktop publishing c) image processing d) data management 44 / 119 Which of the following is used to get voice output a) mic b) Speaker c) plotter d) printer 45 / 119 A device that connect multiple networks using similar or different protocol; a) router b) bridge c) repeater d) gateway 46 / 119 The process of transferring a file from remote computer to our local computer is a) copy b) Uploading c) Downloading d) forward 47 / 119 Making illegal copies of copyrighted software is called a) software hacking b) software piracy c) software distribution d) software browsing 48 / 119 which of the following can be used to launch the word art : a) status bar b) drawing tool bar c) ruler d) standard toolbar 49 / 119 A set of instruction that run the computer are a) Documents b) Hardware c) CUPs d) Software 50 / 119 Which of the following is not a type of bus in computer? a) timer bus b) data bus c) control bus d) address bus 51 / 119 We press enter key in Ms word to create a a) sentence b) paragragh c) document d) Line 52 / 119 The topology used for a small number of computer is called a) mesh b) Bus c) star d) ring 53 / 119 The number of argument in SQRT() function in MS-excel is are a) equal to range b) two c) equal to column number d) one 54 / 119 Another name of antivirus is: a) DES b) Trojan Horse c) worm d) Vaccine 55 / 119 Which one is the fastest a) hard disk b) cache c) register d) RAM 56 / 119 How many characters ASCII-7bit code represents? a) 64 b) 128 c) 256 d) 512 57 / 119 which of following is not a type of network : a) MAN b) NAN c) LAN d) WAN 58 / 119 Which of the following is not an example of system software a) Microsoft office b) utility program c) operating system d) drives 59 / 119 Which is a communication device a) Ethernet b) Router c) USB d) UTP 60 / 119 Software that is available free for a limited period is called a) Net ware b) Share ware c) Group ware d) Free ware 61 / 119 Temporary storage area within CPU is called: a) registers b) RAM c) ROM d) hard disk 62 / 119 CPU sends commands signals through a) expention bus b) address bus c) control d) data bus 63 / 119 Which components is used to connect different parts of the computer together? a) buses b) I/O unit c) main memory d) control unit 64 / 119 Analog signals are measured into a) digits b) watts c) Herts d) volt 65 / 119 The secret word or number used for computer security is called: a) Passwords b) Biometric data c) private words d) safe words 66 / 119 A collection of related web pages is called a) internet b) web portal c) web link d) Web site 67 / 119 Digital signals are commonly known as a) broadband b) Baseband c) narrowband d) band 68 / 119 The microphone converts the sound into a) Signals b) Electrical signal c) Mechanical signals d) Computer file 69 / 119 The keyboard format that is most commonly used a) ASDFGH b) TWITTERY c) QWERTY d) SPLITTER 70 / 119 Each computer on a network is called a) Link b) Code c) Mode d) Node 71 / 119 Transferring information from computer to internet is called a) Downloading b) Pasting c) Downsizing d) Uploading 72 / 119 Which of the following is an example of system software? a) text editor b) MS-word c) operating system d) spread-sheet 73 / 119 in spread-sheet,by default rows are labeled by: a) special symbols b) numbers c) letters d) underscore sign 74 / 119 BIT stands for: a) binary interval b) binary integer c) binary digit d) binary tree 75 / 119 Which devices connects each computer to a network? a) bridge b) Network interface Card c) router d) gateway 76 / 119 OSI model consists of a) 7 layers b) 11 layers c) 5 layers d) 9 layers 77 / 119 Formula of instructions that run the computer is a) CUPs b) Software c) Hardware d) Document 78 / 119 How many types of addressing scheme are there : a) 3 b) 2 c) 5 d) 4 79 / 119 Electronic circuits that executes computer instructions is called a) CPU b) hard disk c) Monitor d) Keyboard 80 / 119 Television and radio broadcasts are example of a) full duplex transmission b) duplex transmission c) half duplex transmission d) simplex transmission 81 / 119 A work book is a collection of a) table b) functions c) formula d) sheets 82 / 119 Which one of the following is not a cause of virus a) network b) logic bomb c) pirated software d) E-mail 83 / 119 common font size used in business document is: a) 14-points b) 16-points c) 10-points d) 12-points 84 / 119 The term that refers to all input, output and secondary storage devices is called: a) port b) internal memory c) network point d) peripheral 85 / 119 Which communication medium requires line-of-sight a) twisted pair b) microwave c) fiber optic d) coaxial 86 / 119 Printed images can be converted into digital form using a) Scanner b) joy stick c) mouse d) stylus 87 / 119 Which of the following is an Antivirus ? a) Logic bomb b) Redlof c) NOD32 d) Trojan horse 88 / 119 Which one is a faster memory? a) RAM b) ROM c) Register d) cache 89 / 119 Communication between computer and keyboard involve the transmission: a) Half-Duplex b) Automatic c) Full-Duplex d) Simplex 90 / 119 XGA resolution is: a) 640*580 b) 640*480 c) 640*860 d) 1024*768 91 / 119 The process of converting digital signals into analog signals via modem is a) Modulation b) Mixing c) Merging d) Demodulation 92 / 119 The output of the compiler is called a) Linked code b) Object code c) Source code d) The program 93 / 119 Web pages are written in which type of language is a) Pascal b) Assembly c) HTML d) SQL 94 / 119 World wide web was established in: a) 1980 b) 1985 c) 1989 d) 1992 95 / 119 Terminators are used in——topology a) ring b) mesh c) Bus d) star 96 / 119 The devices that are automatically detected by windows are called a) installed devices b) serial devices c) plug and play devices d) Automatic devices 97 / 119 GUI stands for? a) Graphical user icons b) General user interface c) Graphical usage interface d) Graphical user interface 98 / 119 Most applications of robotics are in which area a) farming b) cooking c) technique d) manufacturing 99 / 119 Which is not an output device a) Monitor b) Printer c) Speaker d) Scanner 100 / 119 which of the following techniques uses modulation? a) base band b) bandwidth c) Broad band d) bus-width 101 / 119 CBT software is used in a) business b) education c) industry d) E-commerce 102 / 119 The operating system based on NT technology is: a) windows 97 b) Windows 95 c) Windows 2000 d) windows 98 103 / 119 How many characters ASCII-7bit code represents? a) 256 b) 1024 c) 128 d) 512 104 / 119 Electronic banking is also known as? a) Global banking b) Offline banking c) Cyber banking d) Interactive banking 105 / 119 A device that connect multiple network using similar or different protocol is a : a) gateway b) router c) bridge d) repeater 106 / 119 In MS-Excel, formula begins with: a) == b) < c) > d) = 107 / 119 Which one is a an Automatic programmable machine: a) mouse b) keyboard c) Robot d) Cd-drive 108 / 119 Another word for pointer is: a) pixel b) monochrome c) cursor d) director 109 / 119 A person who gains illegal access to a computer system is called a) computer operator b) hacker c) network d) computer consultant 110 / 119 physical path that connects the source and receiver is known as: a) communication channel b) NIC card c) decoder d) encoder 111 / 119 Format C is an example of a) Trojan horse b) worm c) Redlof d) bomb 112 / 119 The extension of Ms-Word is : a) .doc b) .mp3 c) .wrd d) .bmp 113 / 119 A small image that represents a program folder or file is called a) GUI b) ICON c) command d) menue 114 / 119 The fly-by-wire system is called used in a) edcation b) Airline c) medical d) industry 115 / 119 physical path that connects the source and receiver is known as; a) decoder b) communication channel c) encoder d) NIC card 116 / 119 The software which is used to control all part of manufacturing process is called : a) CAM b) MICR c) CAD d) ATM 117 / 119 The folder which contains administrator tools is a) installer b) linker c) debugger d) control panel 118 / 119 Which is a type of RAM: a) SRAM b) ERAM c) FRAM d) CRAM 119 / 119 The program that contain instruction to operate a device is called : a) device linking b) device system c) device operator d) Device driver Your score is The average score is 54% LinkedIn Facebook Twitter 0% Restart quiz Post Views: 1,116 Post navigation Aiou Workshop 5403| Full Test Rawalpindi Board 2nd year all Computer Science MCQS.