Rawalpindi Board First year Computer Science all past papers MCQS. admin 4 years ago Spread the love 9 Created on January 21, 2022 By admin Rawalpindi Board CS past paper Rawalpindi Board CS past paper 1 / 119 Most applications of robotics are in which area a) technique b) cooking c) farming d) manufacturing 2 / 119 How many bits are there in 4-bytes? a) 16 b) 8 c) 64 d) 32 3 / 119 Television and radio broadcasts are example of a) duplex transmission b) half duplex transmission c) simplex transmission d) full duplex transmission 4 / 119 Which of the following is not an example of system software a) utility program b) operating system c) drives d) Microsoft office 5 / 119 Which is a communication device a) UTP b) Router c) USB d) Ethernet 6 / 119 one or more computer connected to a hub is called: a) ring network b) bus network c) mesh network d) star network 7 / 119 The component of CPU which responsible for interacting with RAM is a) Control unit b) hard disk c) ALU d) register 8 / 119 The term that refers to all input, output and secondary storage devices is called: a) peripheral b) port c) internal memory d) network point 9 / 119 Format C is an example of a) worm b) Redlof c) Trojan horse d) bomb 10 / 119 Electronic banking is also known as? a) Cyber banking b) Offline banking c) Interactive banking d) Global banking 11 / 119 The top most layer of OSI model is a) transport b) presentation c) session d) Application 12 / 119 Trojan Horse is an example of a) Virus b) antivirus c) system software d) hardware 13 / 119 The folder which contains administrator tools is a) control panel b) installer c) debugger d) linker 14 / 119 How many characters ASCII-7bit code represents? a) 512 b) 128 c) 256 d) 64 15 / 119 In MS-Excel, formula begins with: a) = b) > c) == d) < 16 / 119 Which components is used to connect different parts of the computer together? a) buses b) I/O unit c) control unit d) main memory 17 / 119 The software which is used to control all part of manufacturing process is called : a) MICR b) CAD c) ATM d) CAM 18 / 119 Which of the following technique is used for modulation a) base band b) broad band c) bit band d) band with 19 / 119 Which of the following is not an Antivirus program : a) Dr.Solomon b) McAfee c) Nod 32 d) Redlof 20 / 119 Which function key is used for checking spelling and grammar in MS word a) F1 b) F7 c) F2 d) F4 21 / 119 The process of transferring a file from remote computer to our local computer is a) copy b) Downloading c) Uploading d) forward 22 / 119 Which communication medium requires line-of-sight a) coaxial b) twisted pair c) fiber optic d) microwave 23 / 119 DSL stands for a) Digital subscribe line b) Domain server c) Distance service d) Direct service Lease 24 / 119 The extension of Ms-Word is : a) .doc b) .bmp c) .mp3 d) .wrd 25 / 119 We press enter key in Ms word to create a a) paragragh b) Line c) document d) sentence 26 / 119 physical path that connects the source and receiver is known as; a) communication channel b) encoder c) NIC card d) decoder 27 / 119 Which one is a an Automatic programmable machine: a) Cd-drive b) Robot c) keyboard d) mouse 28 / 119 The secret word or number used for computer security is called: a) Biometric data b) private words c) Passwords d) safe words 29 / 119 A device that connect multiple network using similar or different protocol is a : a) gateway b) repeater c) router d) bridge 30 / 119 Printed images can be converted into digital form using a) stylus b) mouse c) joy stick d) Scanner 31 / 119 Another word for pointer is: a) director b) cursor c) pixel d) monochrome 32 / 119 how many types of language translator are there? a) 3 b) 4 c) 2 d) 1 33 / 119 Data shown on display unit or played through audio is called a) photo copy b) Hardcopy c) shared copy d) Soft copy 34 / 119 Making illegal copies of copyrighted software is called a) software browsing b) software distribution c) software hacking d) software piracy 35 / 119 Which of the following is an example of system software? a) MS-word b) operating system c) text editor d) spread-sheet 36 / 119 The microphone converts the sound into a) Computer file b) Mechanical signals c) Software d) Electrical signal 37 / 119 The length of IP address is a) 24 bits b) 32 bits c) 8 bits d) 16 bits 38 / 119 Analog signals are measured into a) watts b) Herts c) digits d) volt 39 / 119 Data processing is also known as: a) procedure b) knowledge c) computing d) merging 40 / 119 Formula of instructions that run the computer is a) CUPs b) Hardware c) Document d) Software 41 / 119 The actual working area in micro soft excel is a) work book b) data base c) worksheet d) lotus-123 42 / 119 CPU sends commands signals through a) control b) address bus c) data bus d) expention bus 43 / 119 The fly-by-wire system is called used in a) edcation b) medical c) Airline d) industry 44 / 119 The device uses parallel transmission: a) Printer b) mouse c) light pen d) keyboard 45 / 119 Which of the following is an Antivirus ? a) NOD32 b) Trojan horse c) Redlof d) Logic bomb 46 / 119 The extension of an executable file is a) .exe b) .doc c) .xis d) .ext 47 / 119 A set of instruction that run the computer are a) CUPs b) Hardware c) Documents d) Software 48 / 119 A virus that replicate itself is called a) worm b) boot sector virus c) bug d) Trojan horse 49 / 119 Moving up or down in word processing document is called a) word-wrap b) pull-down c) Scrolling d) line movement 50 / 119 Which one is the fastest a) register b) cache c) RAM d) hard disk 51 / 119 Dejure means a) By nature b) By law c) By fact d) By default 52 / 119 Communication between computer and keyboard involve the transmission: a) Half-Duplex b) Automatic c) Full-Duplex d) Simplex 53 / 119 Which one of the following is not a cause of virus a) logic bomb b) network c) E-mail d) pirated software 54 / 119 The output of the compiler is called a) The program b) Source code c) Linked code d) Object code 55 / 119 A person who gains illegal access to a computer system is called a) computer operator b) computer consultant c) hacker d) network 56 / 119 Trojan Horse is a type of a) horse b) virus c) hacker d) antivirus 57 / 119 which of following coding scheme used by IBM a) ATM b) BCD c) MICR d) CAM 58 / 119 physical path that connects the source and receiver is known as: a) decoder b) encoder c) NIC card d) communication channel 59 / 119 The keyboard layout that is most commonly used is the a) inriter b) qinerty c) QWERTY d) splitter 60 / 119 Which one is a faster memory? a) cache b) ROM c) Register d) RAM 61 / 119 which of the following techniques uses modulation? a) Broad band b) bandwidth c) base band d) bus-width 62 / 119 one or more network connected to hub is called; a) mesh network b) star network c) ring network d) bus network 63 / 119 which of following is not a type of network : a) WAN b) MAN c) LAN d) NAN 64 / 119 layer that is responsible for transferring frames in OSI model is a) session layer b) presentation layer c) application layer d) data link layer 65 / 119 A work book is a collection of a) table b) sheets c) formula d) functions 66 / 119 RAM usually has ——types a) 4 b) 3 c) 2 d) 5 67 / 119 The program that contains the instructions to operate a device is called a) device operating system b) Device driver c) device system d) device operator 68 / 119 A communication signal in the form of a continuous wave is called: a) Analog signal b) binary signal c) discontinuous electrical signal d) digital signal 69 / 119 The topology used for a small number of computer is called a) ring b) star c) mesh d) Bus 70 / 119 The computers or internet that contain website are called a) clients b) site computer c) central computer d) web servers 71 / 119 The keyboard format that is most commonly used a) SPLITTER b) TWITTERY c) ASDFGH d) QWERTY 72 / 119 which of the following can be used to launch the word art : a) standard toolbar b) drawing tool bar c) ruler d) status bar 73 / 119 The process of converting digital signals into analog signals via modem is a) Mixing b) Modulation c) Merging d) Demodulation 74 / 119 Web pages are written in which type of language is a) HTML b) Pascal c) SQL d) Assembly 75 / 119 Which technology is used to read data on cheques a) CAT b) MICR c) OMR d) OCR 76 / 119 Electronic circuits that executes computer instructions is called a) Keyboard b) Monitor c) hard disk d) CPU 77 / 119 Which devices connects each computer to a network? a) bridge b) Network interface Card c) gateway d) router 78 / 119 Which of the following is not a type of bus in computer? a) timer bus b) control bus c) address bus d) data bus 79 / 119 common font size used in business document is: a) 14-points b) 12-points c) 16-points d) 10-points 80 / 119 XGA resolution is: a) 640*580 b) 640*480 c) 640*860 d) 1024*768 81 / 119 in spread-sheet,by default rows are labeled by: a) numbers b) letters c) underscore sign d) special symbols 82 / 119 World wide web was established in: a) 1980 b) 1992 c) 1989 d) 1985 83 / 119 The program that contain instruction to operate a device is called : a) device operator b) device linking c) device system d) Device driver 84 / 119 The microphone converts the sound into a) Electrical signal b) Mechanical signals c) Signals d) Computer file 85 / 119 Which of the following keyboard shortcuts is used to change the case: a) alt+F3 b) Ctrl+F3 c) Ctrl+F2 d) shift+F3 86 / 119 Temporary storage area within CPU is called: a) RAM b) hard disk c) ROM d) registers 87 / 119 Clipboard stores—– in word processing. a) deleted text b) entered text c) copied text d) repeated text 88 / 119 Testing all program components together in SDLC is called a) system testing b) group testing c) composite testing d) volume testing 89 / 119 A small image that represents a program folder or file is called a) command b) menue c) GUI d) ICON 90 / 119 Digital signals are commonly known as a) Baseband b) band c) narrowband d) broadband 91 / 119 Terminators are used in——topology a) ring b) mesh c) star d) Bus 92 / 119 A collection of related web pages is called a) web link b) web portal c) Web site d) internet 93 / 119 Temporary storage are within CPU is called a) cache b) RAM c) ROM d) registers 94 / 119 Which is not a bio metric technique for person identification a) badge b) pam print c) face d) retina 95 / 119 The operating system based on NT technology is: a) Windows 2000 b) windows 97 c) Windows 95 d) windows 98 96 / 119 Default name of first sheet in any work book is a) one b) sheet I c) sheet one d) first sheet 97 / 119 Which of the following is used to get voice output a) Speaker b) printer c) mic d) plotter 98 / 119 Transferring information from computer to internet is called a) Pasting b) Uploading c) Downloading d) Downsizing 99 / 119 Soft copy refers to a) application b) screen output c) presentation d) peripheral device 100 / 119 The communicational channels can be divided into a) 3 types b) two types c) 5 types d) 4 types 101 / 119 GUI stands for? a) Graphical user interface b) Graphical usage interface c) Graphical user icons d) General user interface 102 / 119 How many characters ASCII-7bit code represents? a) 1024 b) 128 c) 256 d) 512 103 / 119 OSI model consists of a) 11 layers b) 9 layers c) 5 layers d) 7 layers 104 / 119 CBT software is used in a) industry b) business c) E-commerce d) education 105 / 119 Which is a type of RAM: a) ERAM b) CRAM c) FRAM d) SRAM 106 / 119 The number of argument in SQRT() function in MS-excel is are a) one b) two c) equal to column number d) equal to range 107 / 119 The function that is used to get the maximum value in MS excel is called a) MAXIMUMO b) MAX c) GREATERO d) HIGHESTO 108 / 119 Another name of antivirus is: a) worm b) DES c) Trojan Horse d) Vaccine 109 / 119 Software that is available free for a limited period is called a) Net ware b) Group ware c) Free ware d) Share ware 110 / 119 The devices that are automatically detected by windows are called a) installed devices b) plug and play devices c) Automatic devices d) serial devices 111 / 119 The register holds the address of the next instruction to be fetched for execution a) Instruction register b) Counter register c) Program counter d) Base register 112 / 119 The process of producing multiple copies of a document is called a) desktop publishing b) image processing c) reprographics d) data management 113 / 119 Each computer on a network is called a) Mode b) Code c) Node d) Link 114 / 119 BIT stands for: a) binary tree b) binary integer c) binary digit d) binary interval 115 / 119 Which of the following contains the administrative tools in operating system : a) recycle bin b) internet explorer c) control panel d) my document folder 116 / 119 How many types of addressing scheme are there : a) 2 b) 5 c) 4 d) 3 117 / 119 the minimum number of primary partitions that can be created on a basic disk are a) 8 b) 2 c) 6 d) 4 118 / 119 Which is not an output device a) Printer b) Monitor c) Scanner d) Speaker 119 / 119 A device that connect multiple networks using similar or different protocol; a) router b) gateway c) repeater d) bridge Your score is The average score is 54% LinkedIn Facebook Twitter 0% Restart quiz {{#message}}{{{message}}}{{/message}}{{^message}}Your submission failed. The server responded with {{status_text}} (code {{status_code}}). Please contact the developer of this form processor to improve this message. Learn More{{/message}}{{#message}}{{{message}}}{{/message}}{{^message}}It appears your submission was successful. Even though the server responded OK, it is possible the submission was not processed. Please contact the developer of this form processor to improve this message. Learn More{{/message}}Submitting…