Rawalpindi Board CS past paper
1 / 119
common font size used in business document is:
2 / 119
OSI model consists of
3 / 119
The computers or internet that contain website are called
4 / 119
A device that connect multiple network using similar or different protocol is a :
5 / 119
Analog signals are measured into
6 / 119
Digital signals are commonly known as
7 / 119
We press enter key in Ms word to create a
8 / 119
The folder which contains administrator tools is
9 / 119
Which of the following is an Antivirus ?
10 / 119
Which one is the fastest
11 / 119
A small image that represents a program folder or file is called
12 / 119
Another word for pointer is:
13 / 119
Communication between computer and keyboard involve the transmission:
14 / 119
A virus that replicate itself is called
15 / 119
The function that is used to get the maximum value in MS excel is called
16 / 119
Printed images can be converted into digital form using
17 / 119
Which function key is used for checking spelling and grammar in MS word
18 / 119
which of following coding scheme used by IBM
19 / 119
Data processing is also known as:
20 / 119
The secret word or number used for computer security is called:
21 / 119
How many characters ASCII-7bit code represents?
22 / 119
Temporary storage area within CPU is called:
23 / 119
Dejure means
24 / 119
Which of the following contains the administrative tools in operating system :
25 / 119
Which of the following is not an Antivirus program :
26 / 119
Another name of antivirus is:
27 / 119
The length of IP address is
28 / 119
RAM usually has ——types
29 / 119
A work book is a collection of
30 / 119
CBT software is used in
31 / 119
A device that connect multiple networks using similar or different protocol;
32 / 119
The component of CPU which responsible for interacting with RAM is
33 / 119
The device uses parallel transmission:
34 / 119
A collection of related web pages is called
35 / 119
A set of instruction that run the computer are
36 / 119
A communication signal in the form of a continuous wave is called:
37 / 119
How many types of addressing scheme are there :
38 / 119
The program that contain instruction to operate a device is called :
39 / 119
GUI stands for?
40 / 119
DSL stands for
41 / 119
one or more computer connected to a hub is called:
42 / 119
Television and radio broadcasts are example of
43 / 119
Which of the following is used to get voice output
44 / 119
The process of converting digital signals into analog signals via modem is
45 / 119
Which one is a faster memory?
46 / 119
which of the following can be used to launch the word art :
47 / 119
The term that refers to all input, output and secondary storage devices is called:
48 / 119
Which devices connects each computer to a network?
49 / 119
The top most layer of OSI model is
50 / 119
The microphone converts the sound into
51 / 119
The software which is used to control all part of manufacturing process is called :
52 / 119
Trojan Horse is a type of
53 / 119
Default name of first sheet in any work book is
54 / 119
Clipboard stores—– in word processing.
55 / 119
Which is not a bio metric technique for person identification
56 / 119
Making illegal copies of copyrighted software is called
57 / 119
in spread-sheet,by default rows are labeled by:
58 / 119
Format C is an example of
59 / 119
Which communication medium requires line-of-sight
60 / 119
Testing all program components together in SDLC is called
61 / 119
Which technology is used to read data on cheques
62 / 119
The program that contains the instructions to operate a device is called
63 / 119
The keyboard format that is most commonly used
64 / 119
World wide web was established in:
65 / 119
66 / 119
Which of the following is not an example of system software
67 / 119
Electronic banking is also known as?
68 / 119
Terminators are used in——topology
69 / 119
Temporary storage are within CPU is called
70 / 119
CPU sends commands signals through
71 / 119
In MS-Excel, formula begins with:
72 / 119
The extension of Ms-Word is :
73 / 119
how many types of language translator are there?
74 / 119
Which is not an output device
75 / 119
The devices that are automatically detected by windows are called
76 / 119
physical path that connects the source and receiver is known as:
77 / 119
Soft copy refers to
78 / 119
A person who gains illegal access to a computer system is called
79 / 119
Data shown on display unit or played through audio is called
80 / 119
The number of argument in SQRT() function in MS-excel is are
81 / 119
Which of the following is not a type of bus in computer?
82 / 119
Which components is used to connect different parts of the computer together?
83 / 119
The topology used for a small number of computer is called
84 / 119
The register holds the address of the next instruction to be fetched for execution
85 / 119
86 / 119
How many bits are there in 4-bytes?
87 / 119
Moving up or down in word processing document is called
88 / 119
Which of the following keyboard shortcuts is used to change the case:
89 / 119
Electronic circuits that executes computer instructions is called
90 / 119
one or more network connected to hub is called;
91 / 119
which of following is not a type of network :
92 / 119
Web pages are written in which type of language is
93 / 119
Which one is a an Automatic programmable machine:
94 / 119
which of the following techniques uses modulation?
95 / 119
Which is a type of RAM:
96 / 119
The process of producing multiple copies of a document is called
97 / 119
The process of transferring a file from remote computer to our local computer is
98 / 119
The actual working area in micro soft excel is
99 / 119
XGA resolution is:
100 / 119
layer that is responsible for transferring frames in OSI model is
101 / 119
Transferring information from computer to internet is called
102 / 119
The output of the compiler is called
103 / 119
Each computer on a network is called
104 / 119
Trojan Horse is an example of
105 / 119
BIT stands for:
106 / 119
the minimum number of primary partitions that can be created on a basic disk are
107 / 119
The operating system based on NT technology is:
108 / 119
The fly-by-wire system is called used in
109 / 119
Software that is available free for a limited period is called
110 / 119
The communicational channels can be divided into
111 / 119
Most applications of robotics are in which area
112 / 119
Formula of instructions that run the computer is
113 / 119
Which of the following is an example of system software?
114 / 119
The extension of an executable file is
115 / 119
The keyboard layout that is most commonly used is the
116 / 119
physical path that connects the source and receiver is known as;
117 / 119
Which one of the following is not a cause of virus
118 / 119
Which of the following technique is used for modulation
119 / 119
Which is a communication device
Your score is
The average score is 54%
Restart quiz
{{#message}}{{{message}}}{{/message}}{{^message}}Your submission failed. The server responded with {{status_text}} (code {{status_code}}). Please contact the developer of this form processor to improve this message. Learn More{{/message}}
{{#message}}{{{message}}}{{/message}}{{^message}}It appears your submission was successful. Even though the server responded OK, it is possible the submission was not processed. Please contact the developer of this form processor to improve this message. Learn More{{/message}}
Submitting…