Rawalpindi Board First year Computer Science all past papers MCQS. admin 4 years ago Spread the love 9 Created on January 21, 2022 By admin Rawalpindi Board CS past paper Rawalpindi Board CS past paper 1 / 119 The process of transferring a file from remote computer to our local computer is a) Downloading b) Uploading c) copy d) forward 2 / 119 Testing all program components together in SDLC is called a) group testing b) volume testing c) composite testing d) system testing 3 / 119 Soft copy refers to a) peripheral device b) application c) screen output d) presentation 4 / 119 The folder which contains administrator tools is a) installer b) debugger c) linker d) control panel 5 / 119 Which of the following contains the administrative tools in operating system : a) my document folder b) control panel c) recycle bin d) internet explorer 6 / 119 A virus that replicate itself is called a) bug b) boot sector virus c) Trojan horse d) worm 7 / 119 The output of the compiler is called a) Linked code b) Object code c) The program d) Source code 8 / 119 Default name of first sheet in any work book is a) first sheet b) sheet one c) sheet I d) one 9 / 119 The fly-by-wire system is called used in a) medical b) industry c) Airline d) edcation 10 / 119 Digital signals are commonly known as a) broadband b) Baseband c) narrowband d) band 11 / 119 Which one is a faster memory? a) RAM b) Register c) cache d) ROM 12 / 119 Terminators are used in——topology a) Bus b) ring c) star d) mesh 13 / 119 Temporary storage are within CPU is called a) registers b) ROM c) cache d) RAM 14 / 119 The actual working area in micro soft excel is a) work book b) data base c) lotus-123 d) worksheet 15 / 119 Software that is available free for a limited period is called a) Group ware b) Share ware c) Free ware d) Net ware 16 / 119 CPU sends commands signals through a) address bus b) expention bus c) data bus d) control 17 / 119 The topology used for a small number of computer is called a) star b) ring c) Bus d) mesh 18 / 119 The secret word or number used for computer security is called: a) Passwords b) Biometric data c) private words d) safe words 19 / 119 The length of IP address is a) 8 bits b) 32 bits c) 16 bits d) 24 bits 20 / 119 The program that contain instruction to operate a device is called : a) Device driver b) device linking c) device operator d) device system 21 / 119 which of the following techniques uses modulation? a) bandwidth b) bus-width c) Broad band d) base band 22 / 119 BIT stands for: a) binary interval b) binary tree c) binary integer d) binary digit 23 / 119 Which is a communication device a) USB b) Router c) UTP d) Ethernet 24 / 119 The function that is used to get the maximum value in MS excel is called a) MAX b) HIGHESTO c) MAXIMUMO d) GREATERO 25 / 119 How many bits are there in 4-bytes? a) 64 b) 16 c) 8 d) 32 26 / 119 A device that connect multiple network using similar or different protocol is a : a) router b) bridge c) repeater d) gateway 27 / 119 The keyboard layout that is most commonly used is the a) qinerty b) inriter c) splitter d) QWERTY 28 / 119 Trojan Horse is a type of a) virus b) horse c) antivirus d) hacker 29 / 119 Which of the following is not a type of bus in computer? a) address bus b) timer bus c) data bus d) control bus 30 / 119 The microphone converts the sound into a) Mechanical signals b) Software c) Electrical signal d) Computer file 31 / 119 The process of producing multiple copies of a document is called a) data management b) image processing c) desktop publishing d) reprographics 32 / 119 Electronic circuits that executes computer instructions is called a) Keyboard b) Monitor c) CPU d) hard disk 33 / 119 The extension of an executable file is a) .exe b) .doc c) .ext d) .xis 34 / 119 The process of converting digital signals into analog signals via modem is a) Merging b) Demodulation c) Mixing d) Modulation 35 / 119 How many types of addressing scheme are there : a) 4 b) 2 c) 3 d) 5 36 / 119 GUI stands for? a) Graphical user interface b) Graphical user icons c) Graphical usage interface d) General user interface 37 / 119 The term that refers to all input, output and secondary storage devices is called: a) peripheral b) port c) network point d) internal memory 38 / 119 Which of the following is not an example of system software a) drives b) operating system c) utility program d) Microsoft office 39 / 119 Which is a type of RAM: a) FRAM b) ERAM c) CRAM d) SRAM 40 / 119 the minimum number of primary partitions that can be created on a basic disk are a) 4 b) 6 c) 8 d) 2 41 / 119 Which function key is used for checking spelling and grammar in MS word a) F2 b) F1 c) F4 d) F7 42 / 119 Which is not a bio metric technique for person identification a) retina b) face c) pam print d) badge 43 / 119 Printed images can be converted into digital form using a) joy stick b) stylus c) mouse d) Scanner 44 / 119 Communication between computer and keyboard involve the transmission: a) Simplex b) Automatic c) Full-Duplex d) Half-Duplex 45 / 119 A communication signal in the form of a continuous wave is called: a) discontinuous electrical signal b) binary signal c) digital signal d) Analog signal 46 / 119 Most applications of robotics are in which area a) cooking b) farming c) technique d) manufacturing 47 / 119 The program that contains the instructions to operate a device is called a) Device driver b) device operating system c) device system d) device operator 48 / 119 Which components is used to connect different parts of the computer together? a) control unit b) I/O unit c) buses d) main memory 49 / 119 which of following is not a type of network : a) NAN b) LAN c) MAN d) WAN 50 / 119 The keyboard format that is most commonly used a) ASDFGH b) SPLITTER c) QWERTY d) TWITTERY 51 / 119 A work book is a collection of a) formula b) functions c) table d) sheets 52 / 119 A device that connect multiple networks using similar or different protocol; a) router b) gateway c) bridge d) repeater 53 / 119 The operating system based on NT technology is: a) windows 97 b) Windows 2000 c) windows 98 d) Windows 95 54 / 119 Which devices connects each computer to a network? a) router b) bridge c) Network interface Card d) gateway 55 / 119 Which of the following is not an Antivirus program : a) McAfee b) Nod 32 c) Dr.Solomon d) Redlof 56 / 119 Which one is a an Automatic programmable machine: a) Robot b) mouse c) keyboard d) Cd-drive 57 / 119 Which of the following is an Antivirus ? a) Logic bomb b) Redlof c) Trojan horse d) NOD32 58 / 119 OSI model consists of a) 11 layers b) 9 layers c) 5 layers d) 7 layers 59 / 119 The microphone converts the sound into a) Mechanical signals b) Electrical signal c) Computer file d) Signals 60 / 119 Which is not an output device a) Monitor b) Printer c) Scanner d) Speaker 61 / 119 Electronic banking is also known as? a) Cyber banking b) Interactive banking c) Global banking d) Offline banking 62 / 119 Data shown on display unit or played through audio is called a) Soft copy b) shared copy c) photo copy d) Hardcopy 63 / 119 CBT software is used in a) education b) business c) industry d) E-commerce 64 / 119 Format C is an example of a) bomb b) worm c) Trojan horse d) Redlof 65 / 119 Each computer on a network is called a) Mode b) Link c) Node d) Code 66 / 119 DSL stands for a) Domain server b) Direct service Lease c) Distance service d) Digital subscribe line 67 / 119 The extension of Ms-Word is : a) .wrd b) .doc c) .mp3 d) .bmp 68 / 119 How many characters ASCII-7bit code represents? a) 128 b) 512 c) 256 d) 1024 69 / 119 The devices that are automatically detected by windows are called a) plug and play devices b) Automatic devices c) installed devices d) serial devices 70 / 119 Clipboard stores—– in word processing. a) repeated text b) copied text c) entered text d) deleted text 71 / 119 Data processing is also known as: a) merging b) computing c) knowledge d) procedure 72 / 119 Which of the following technique is used for modulation a) bit band b) broad band c) band with d) base band 73 / 119 The top most layer of OSI model is a) session b) transport c) Application d) presentation 74 / 119 Television and radio broadcasts are example of a) full duplex transmission b) simplex transmission c) half duplex transmission d) duplex transmission 75 / 119 A small image that represents a program folder or file is called a) GUI b) command c) ICON d) menue 76 / 119 Another name of antivirus is: a) DES b) Trojan Horse c) Vaccine d) worm 77 / 119 Which one is the fastest a) cache b) hard disk c) register d) RAM 78 / 119 The computers or internet that contain website are called a) web servers b) site computer c) clients d) central computer 79 / 119 RAM usually has ——types a) 5 b) 4 c) 3 d) 2 80 / 119 Transferring information from computer to internet is called a) Uploading b) Pasting c) Downloading d) Downsizing 81 / 119 The number of argument in SQRT() function in MS-excel is are a) equal to range b) one c) equal to column number d) two 82 / 119 World wide web was established in: a) 1992 b) 1980 c) 1985 d) 1989 83 / 119 Web pages are written in which type of language is a) SQL b) Pascal c) HTML d) Assembly 84 / 119 The register holds the address of the next instruction to be fetched for execution a) Program counter b) Base register c) Instruction register d) Counter register 85 / 119 physical path that connects the source and receiver is known as: a) encoder b) decoder c) NIC card d) communication channel 86 / 119 Analog signals are measured into a) watts b) digits c) volt d) Herts 87 / 119 How many characters ASCII-7bit code represents? a) 256 b) 512 c) 64 d) 128 88 / 119 A collection of related web pages is called a) internet b) web link c) Web site d) web portal 89 / 119 We press enter key in Ms word to create a a) Line b) paragragh c) document d) sentence 90 / 119 Trojan Horse is an example of a) hardware b) Virus c) system software d) antivirus 91 / 119 In MS-Excel, formula begins with: a) = b) < c) > d) == 92 / 119 Which one of the following is not a cause of virus a) network b) logic bomb c) E-mail d) pirated software 93 / 119 The software which is used to control all part of manufacturing process is called : a) ATM b) MICR c) CAM d) CAD 94 / 119 Which communication medium requires line-of-sight a) coaxial b) twisted pair c) microwave d) fiber optic 95 / 119 Temporary storage area within CPU is called: a) registers b) ROM c) hard disk d) RAM 96 / 119 Formula of instructions that run the computer is a) Software b) CUPs c) Hardware d) Document 97 / 119 Which of the following is used to get voice output a) plotter b) printer c) Speaker d) mic 98 / 119 Moving up or down in word processing document is called a) Scrolling b) line movement c) word-wrap d) pull-down 99 / 119 A person who gains illegal access to a computer system is called a) computer operator b) network c) computer consultant d) hacker 100 / 119 Dejure means a) By default b) By fact c) By law d) By nature 101 / 119 Another word for pointer is: a) monochrome b) cursor c) pixel d) director 102 / 119 common font size used in business document is: a) 12-points b) 10-points c) 16-points d) 14-points 103 / 119 Making illegal copies of copyrighted software is called a) software browsing b) software piracy c) software distribution d) software hacking 104 / 119 The communicational channels can be divided into a) 4 types b) two types c) 5 types d) 3 types 105 / 119 Which technology is used to read data on cheques a) OCR b) MICR c) OMR d) CAT 106 / 119 Which of the following is an example of system software? a) MS-word b) operating system c) text editor d) spread-sheet 107 / 119 which of the following can be used to launch the word art : a) standard toolbar b) drawing tool bar c) ruler d) status bar 108 / 119 physical path that connects the source and receiver is known as; a) NIC card b) decoder c) encoder d) communication channel 109 / 119 one or more network connected to hub is called; a) bus network b) ring network c) mesh network d) star network 110 / 119 A set of instruction that run the computer are a) Software b) Documents c) CUPs d) Hardware 111 / 119 XGA resolution is: a) 640*480 b) 640*580 c) 640*860 d) 1024*768 112 / 119 how many types of language translator are there? a) 4 b) 3 c) 2 d) 1 113 / 119 The component of CPU which responsible for interacting with RAM is a) register b) hard disk c) ALU d) Control unit 114 / 119 The device uses parallel transmission: a) mouse b) Printer c) keyboard d) light pen 115 / 119 one or more computer connected to a hub is called: a) ring network b) mesh network c) bus network d) star network 116 / 119 in spread-sheet,by default rows are labeled by: a) numbers b) special symbols c) underscore sign d) letters 117 / 119 Which of the following keyboard shortcuts is used to change the case: a) shift+F3 b) Ctrl+F3 c) Ctrl+F2 d) alt+F3 118 / 119 which of following coding scheme used by IBM a) CAM b) MICR c) BCD d) ATM 119 / 119 layer that is responsible for transferring frames in OSI model is a) application layer b) session layer c) presentation layer d) data link layer Your score is The average score is 54% LinkedIn Facebook Twitter 0% Restart quiz {{#message}}{{{message}}}{{/message}}{{^message}}Your submission failed. The server responded with {{status_text}} (code {{status_code}}). Please contact the developer of this form processor to improve this message. Learn More{{/message}}{{#message}}{{{message}}}{{/message}}{{^message}}It appears your submission was successful. Even though the server responded OK, it is possible the submission was not processed. Please contact the developer of this form processor to improve this message. Learn More{{/message}}Submitting…