Express Pakistan
provide latest news and update
Rawalpindi Board CS past paper
1 / 119
Which technology is used to read data on cheques
2 / 119
Communication between computer and keyboard involve the transmission:
3 / 119
The device uses parallel transmission:
4 / 119
OSI model consists of
5 / 119
The number of argument in SQRT() function in MS-excel is are
6 / 119
How many characters ASCII-7bit code represents?
7 / 119
The function that is used to get the maximum value in MS excel is called
8 / 119
The devices that are automatically detected by windows are called
9 / 119
which of following is not a type of network :
10 / 119
physical path that connects the source and receiver is known as:
11 / 119
The software which is used to control all part of manufacturing process is called :
12 / 119
The microphone converts the sound into
13 / 119
Dejure means
14 / 119
Which devices connects each computer to a network?
15 / 119
Temporary storage are within CPU is called
16 / 119
Which is a type of RAM:
17 / 119
Another name of antivirus is:
18 / 119
Soft copy refers to
19 / 119
Which of the following keyboard shortcuts is used to change the case:
20 / 119
which of the following techniques uses modulation?
21 / 119
Printed images can be converted into digital form using
22 / 119
Temporary storage area within CPU is called:
23 / 119
Electronic banking is also known as?
24 / 119
A person who gains illegal access to a computer system is called
25 / 119
Which is a communication device
26 / 119
27 / 119
Which communication medium requires line-of-sight
28 / 119
one or more network connected to hub is called;
29 / 119
A device that connect multiple network using similar or different protocol is a :
30 / 119
which of the following can be used to launch the word art :
31 / 119
Electronic circuits that executes computer instructions is called
32 / 119
A small image that represents a program folder or file is called
33 / 119
RAM usually has ——types
34 / 119
common font size used in business document is:
35 / 119
BIT stands for:
36 / 119
The extension of an executable file is
37 / 119
The topology used for a small number of computer is called
38 / 119
Which function key is used for checking spelling and grammar in MS word
39 / 119
Which one is a an Automatic programmable machine:
40 / 119
one or more computer connected to a hub is called:
41 / 119
Making illegal copies of copyrighted software is called
42 / 119
The register holds the address of the next instruction to be fetched for execution
43 / 119
Transferring information from computer to internet is called
44 / 119
Which one of the following is not a cause of virus
45 / 119
which of following coding scheme used by IBM
46 / 119
XGA resolution is:
47 / 119
The program that contains the instructions to operate a device is called
48 / 119
The computers or internet that contain website are called
49 / 119
A device that connect multiple networks using similar or different protocol;
50 / 119
The term that refers to all input, output and secondary storage devices is called:
51 / 119
Web pages are written in which type of language is
52 / 119
Software that is available free for a limited period is called
53 / 119
The secret word or number used for computer security is called:
54 / 119
The program that contain instruction to operate a device is called :
55 / 119
The output of the compiler is called
56 / 119
Which one is a faster memory?
57 / 119
The extension of Ms-Word is :
58 / 119
The fly-by-wire system is called used in
59 / 119
Data processing is also known as:
60 / 119
A communication signal in the form of a continuous wave is called:
61 / 119
World wide web was established in:
62 / 119
Moving up or down in word processing document is called
63 / 119
How many types of addressing scheme are there :
64 / 119
We press enter key in Ms word to create a
65 / 119
Which of the following is not an Antivirus program :
66 / 119
Data shown on display unit or played through audio is called
67 / 119
Which of the following technique is used for modulation
68 / 119
Format C is an example of
69 / 119
how many types of language translator are there?
70 / 119
physical path that connects the source and receiver is known as;
71 / 119
Trojan Horse is an example of
72 / 119
73 / 119
The actual working area in micro soft excel is
74 / 119
Which one is the fastest
75 / 119
The communicational channels can be divided into
76 / 119
The process of converting digital signals into analog signals via modem is
77 / 119
A collection of related web pages is called
78 / 119
DSL stands for
79 / 119
Default name of first sheet in any work book is
80 / 119
Clipboard stores—– in word processing.
81 / 119
The keyboard layout that is most commonly used is the
82 / 119
The process of transferring a file from remote computer to our local computer is
83 / 119
CBT software is used in
84 / 119
Each computer on a network is called
85 / 119
How many bits are there in 4-bytes?
86 / 119
Which is not an output device
87 / 119
The top most layer of OSI model is
88 / 119
layer that is responsible for transferring frames in OSI model is
89 / 119
The component of CPU which responsible for interacting with RAM is
90 / 119
the minimum number of primary partitions that can be created on a basic disk are
91 / 119
Which of the following is not an example of system software
92 / 119
The keyboard format that is most commonly used
93 / 119
Most applications of robotics are in which area
94 / 119
Which of the following is an Antivirus ?
95 / 119
Digital signals are commonly known as
96 / 119
Which of the following is used to get voice output
97 / 119
Which of the following is not a type of bus in computer?
98 / 119
In MS-Excel, formula begins with:
99 / 119
Terminators are used in——topology
100 / 119
Television and radio broadcasts are example of
101 / 119
Testing all program components together in SDLC is called
102 / 119
The folder which contains administrator tools is
103 / 119
Which of the following is an example of system software?
104 / 119
Analog signals are measured into
105 / 119
GUI stands for?
106 / 119
A virus that replicate itself is called
107 / 119
Which is not a bio metric technique for person identification
108 / 119
The length of IP address is
109 / 119
A set of instruction that run the computer are
110 / 119
Which components is used to connect different parts of the computer together?
111 / 119
in spread-sheet,by default rows are labeled by:
112 / 119
A work book is a collection of
113 / 119
Another word for pointer is:
114 / 119
Formula of instructions that run the computer is
115 / 119
Trojan Horse is a type of
116 / 119
The process of producing multiple copies of a document is called
117 / 119
The operating system based on NT technology is:
118 / 119
CPU sends commands signals through
119 / 119
Which of the following contains the administrative tools in operating system :
Your score is
The average score is 54%
Restart quiz