Student Roll Class Paper
Name Num Name 9T Code
H
Subject Name Time Total Exam Date
Computer Allowed Marks 21 15-Aug-2024
3
Q1. Choose the correct answer. 1X47=47 ہ ۔ćدا2 در ر ا ت1. الx
1. Total steps of problem solving :ffi اç Sc ¸Lz .1
are:
(C) (B)
7
(D) 5 3 2 (A)
2. A well-defined problem does not
:ť ¸Lz و اĢ2. ا
contain: Ambiguities
(D) مUا (C) (B)
Clear goal ل½ وا Clear solution وا Clear concept وا م (A)
3.........is used to transfer control to certain step of an : P ƯĢSc ť ولç 2صAS ا لا رd 3
algorithm:
(D) (B) (A)
else else
goto goto flowchart رٹ algorithm ر ا
U
(C)
4. Before jumping into the solution of the problem, it is
important to: ا1 ورىpc c Mc zٔ .4
(D) (C) (B)
:
Use Guess ć ţ ازہńا
Draw a picture ć :à Define a problem ć Ư ¸Lzٔ ć Ø¸Lzٔ (A)
Understand a
problem
5. This strategy divides a complex problem into smaller
problems: ں ؟c zٔ M¸Lzٔ ہ/. Ģ5 . ‡ا
check and improve ى اور (D) check and balance لť (C) 4 ‡ 4 ا ور (B) hide and seek (A)
divide and
conquer
6. In which strategy, the designer defines the list of "to-
do" task: ۔ť ن4 ‡ اMĢSc ½ ں رrda6. ڈ2ا
Prototype y (C)
(D) out it Act ا اِ ٹآوٹ ť Gues ازہń ا و ‡وا ور (A)
(B) Divide and
7. Which word refers to something Conquer
unplanned:
unlimited ودt limited ود: دJاr dىD; J D¢نM .7
candid ( ڈD) t (B) outdid ťd( دA)
(C)
8. The process of solving difficult and complex problems is
called: :ffi MJSc M F 8. ہ وا ر
out it Act ا اِ ٹآؤٹ (D) ť guesses Use ا لMازوںń ا (C) Defining a problem ť نEM (B) Problem solving ť F (A)
9. Before problem solving, we need to first
problem. ۔ ورتM c c، M c p 9.
Planning ىD; (D) (C) (B)
Un-understaging Determine ť Analysis (A)
10....... helps to save time.
۔ť دs c ÷و...... .10
Start ( ز”آD) Analyses ť
Candid solution lِڈ Prototype ťc2( وA)
(C) (B)
11.What strategies should we use if the problem is not well-
defined? ؟5 ںا لy Ư ِƯنE اÉ ™ ا11.
all the strategies ںƯِ مÙ (D) draw a picture ť :Ã (C) use guesses ť ل اd از ےńا (B) ť bتlP (A) gain
background knowledge
12.It is not necessary that the candid solution is the
solution of a ۔ l J ٔd ¸Lz ڈ1 ورىp
problem:
actual (D) (C) (B) (A)
immediate رى last ‡ first t
Ctrl + F is the keyboard short-cut to a word, name or
13.text is: ۔ť ĢSc ..........M ţمť،D JCtrl+F رٹ رڈE .13
think x (D) (C)
write find شG (B) see ( دA)
14. This technique draw a pictorial representation of
the solution:
؟ y ى:Ãd J‡ 4نM
.14
multi-type ť (D) (B) (A)
out it act ا ا ِ ٹآوٹ monotype ťEr prototype ťc2و
(C)
15. The process of repeating itself over and over (loop) is
known as: : ť ťاy رد رMJJ .15
mid-process J5Ę ( درD)
iterative process J ( ارىC) alternative process J ( دلB) check process Jd (A)
4
16. We can analyze a problem by
indentifying: (C) :ffi4 dc zٔ Ģا .16
5Ws 4Ws (B) 3Cs 3ws(A)
7Cs 7ws (D)
5ws 4ws
17. Red traffic light represents a/an: : 46ßخ/ c .17
happening s ( وD) (B) problem ¸Lzٔ (A)
solution (C) analysis
18. The best strategy is to plan a ى ‡ ۔D; .18
solution is...
(D) (C)
Prototype y
out it Act ا ا ٹآؤٹ ا ور ازہń( اB) 4 ‡ 4 ا ور (A)
Guessa and Divide and
improve conquer
19. Which symbol in the flowchart is used to either
؟ ا لĢSآ ”زاورا مsf4نM رٹU .19
start or end the flowchart?
Decision ڈا
(D) Process 2( وC) Connector / (B) Terminal c(A)
20. In a flow chart, rectangle symbol .
represents ...... ,F r : y رٹU .20
.
connector / , (C) (B)
(D) processing decision زى¢ input / output ان/( آ وٹA)
F. , M 2
21. Which of the following symbol is used for flow of
flowchart? ؟ (ا لĢS‡ٔو, . US ) رٹUsf4نM ر ذn 21 .
flowlines (D) connector / (C) (B) (A)
UU processing 2و terminal c
, F. , M
22. To determine whether a statement is true or
false is called: : Aţ ، ť ندرEĢ اţ آd 1ťاس ت .22
problem (D) solution ( ) processing 2و decison making زى¢
¸Lzٔ l (C) (B) (A)
23. Which of the following symbol is used to
.23
؟ ا لsf4نM د رجذĢSc ڑMںAS رٹU
connect parts of flowchart?
Input / (D) (B) (A)
Output t آؤٹt / ُ Decision Connector / Terminal c
.
ُ اِن ,F r
(C) .24
24. In a flowchart, the special shapes used to represent
: ƯM ťصا لA و اc ا لĢSJń ٔ ‡ امñ ا رٹU
different steps are known as:
icons تť symbols تlf figures ت images تt, r. ¸. tx
(D) (C) 4 (B) (A)
25. Flowchart is also a good way to communicate the
solution of a problem to other: اĢ اdc رے تĢ zٔ Sc Sا ے/ رٹدوU .25
: A
(A) ABC all مÙABC users رb (C) programmers زçاÉ2( وB) peoples ںỨf
(D)
26. Taking data from the user
.26is called: ۔ť رف ڈb
(A) (D) (B)
flow of data ٔ ‡و, . output آوٹ processing 2و input t ُ ان
d ڈ (C)
27. The steps for performing calculations such as adding, .27
۔ƯM ťباور و ہŤ1،A ،p امñ اSc بBبF
multiplying, dividing etc are known as:
storing رىd ہ ذ accounting E processing 2و output آوٹ
(D) بF (C) (B) (A)
28. Every algorithm must begin with
notations: : ť Ư ;وعø¢S EM ر اy .28
else (D) star got (B) input (A)
t o
(C) .29
29. The notation used to display values or results of
processing is: : ť Ư ل اĢScdدM Gţ م رS 21و E
end (C)
(A) (D) (B) got outp input
30. The disadvantage of a flowchart is that o ut
.30it requires: : رdد رĢSاس1 نd رٹU
(D)
(A) ABC all مÙABC (B) (C)
no time ÷ وM more time ÷دہوţز less time ÷{و
31. If an algorithm takes less number of steps to reach
: Øť ا د در { اç ا رĢ اÉ ا31.
a result, it is considered:
more efficient 2r دہţ better (C) worst : good ا
ز (D) (B) (A)
v
32. An efficient algorithm uses less space in
computer: : ť{ ا ل c ا ر2rĢا .32
system (D)
memory رى processor Lو disk Zڈ
j
4 2
(C) (B) (A)
.33
33. The difference between an algorithm and a flowchart
: حA ن) قĘد رS فpنĘد رS رٹUا ر وا رĢا
is just like a different between:
none of these M ان Ģ5 ا وراƯĢ( اC) a c ڈراĢ5 ا وراƯĢ( اB) a Ģ5 ا وراƯĢ( اA) a
(D) story and a story and a play story and a movie
painting
34........is written in a natural language, so it is easily
understandable: : ťآ ¢5 آĢ س، اD ť ىز ن...... §
.34
Algorithm ( ر اD) (C)
Diagram مɾ
ڈا ا Flowchart رٹ Program مÉ ا2و
U
(B) (A)
.35
35. Arabic writer and scientist Muhammad-Ibn-Musa al-
Khawarizmi developed:
Ư: رc4ا ”ارز4r ا3 د ان¢وا ر )
computer c algorithm ر ا algebra ¾c mathematics رٹU
(D) (C) L. r (B) (A)
.36
36. Usually a computer programmer first
writes an ...... : : c wçاÉ2c Ģر2 اPمL
idea ţ آ
(D) program مÉ ا2( وC) flowchart رٹU (B) algorithm ( ر اA)
37. The word "notation" means:
: adnotationD .37
sample word D دہ¢ (D) key word ورڈ (C) code word رڈورڈM (B) password ( سورڈA)
38. Testing helps in improving a:
: ددs c .38
solving Mfifx (D) checking M solutin M (B) problem M¸Lz (A)
39. Space shuttle challanger STS-51L : ہSTS-51Lç .39
crashed in:
199 (C) 1986 (B) 1976 (A)
188 (D) 6
.40 6 : ⎛ ڈĢا درجذ
(C)
(A) (B)a type of
40. One of the following is NOT (C)
test data:
(D)
absent data بڈ مد
valid test data در ڈ invalid test data در ڈť numeric data كڈDo
41. After solving a problem, we
need to ...... ۔ť Ư ........M اسSc M™Ģ41. ا
All of these مÙ (D)
(A) Output ( آؤٹC) Test
(B) Process 2و
42. Types of test data
.42is: ۔ffiمÚ ڈ ا
Four ر Three Two ( دوA)
Five (D)
(C) (B)
43........means to test if the required solution is .43
there. ! ţ دr ;Pţ1 آad......
Flowchart ( رٹD)
Validation ƒ و Algorithm ر ا Verification و:ى
U (C) (B) (A)
44. To test if the solution is solving the same problem for .44
:B Ư ڈ ا2اĢS ™ و رţ1 آĢS
which it was designed is known as:
(D) (C) (B) (A)
testing ¸
.
identification ń validation ƒ و verification ى:و
x.tF.
45. Displays each column in the
trace table. ۔ť y )dy c .45
All of these مÙ (C) (B)
(D) Mistakes of data Values of data Names of data مťd (ڈA)
46. Displays each row in the ڈ ڈ
trace table. ۔ y رy c .46
Names of data مťd (ڈA)
All of these مÙ (D) Mistakes of data Values of data
ڈ ڈ .47
(C) (B)
47. We can identify logical
errors using: ۔ń ffi4 رز: اUć ا ل
all of these مÙ (D) (C) (B) (A)
trace table algorithm ر ا flowchart رٹU
c
Q2. Choose the correct answer. 1X40=40 ہ ۔ćدا2 در ر ا ت2. الx
1. Number "17" is equal to. .in binary : ť cاc S ......17 j 1 . ;ى
system.
(C) (B)
10100
(D) 1000 1011 10000 (A)
2. Hexadecimal system has total 1 0 .r
numbers. :ffi ............. › ڈtz . x .2
17 (A)
15 (D)
18 16
(C) (B)
3. The base of binary system is:
۔ دى م 3
16 (D) (C)
2 (B) 0,1 (A)
10
4. The number system that we use in our daily
life is: : و ہffi ا لJń ہ زç ا ر وزj 4.
ں مÙ (D) all ¸x. r ¸x. r . x
the three systems j ›. ( ڈC) j ›. ڈاx . , (B) j ( ;ىA)
decimal number hexadecimal number binary number
system system system
5. The system for representaiton of numeric data is
known as: ۔ƯM ť مSJűU رG ا دا و5.
real system م (D) both A & B ںE ( دوC) number system j (B) numeral system م دى (A)
AB
6. The decimal number system uses ten digits
from: ť :ffi1 تا لlf ا رى دى مد س6.
0 - 10 (C)
(D) 0-1 0 - 9 (B) 0 - F (A)
¸x. r . x
: cاc S...... د رى ا,A ›. ڈاx . .7
7. Hexadecimal "A" is equal to decimal
number:
(C)
19 11 (B) 10 (A)
20 (D)
¸x. r . x
8. Hexadecimal "F" is equal to decimal
: cاc S...... د رى ا,F ›. ڈاx . .8
number: 16 15 (B) 14 (A)
17 (D)
(C)
9. In mathematics, decimal number system is also
known as: ۔M Ư ťا رى مS ا دا ţ ر9.
ر4 م دىť (D)
( م دى روC) Roman ( ÷م دى ىB) ( ) م دىA)
Persian number
number system Hindi number Arabic number
system
system system
.10
10. To convert (11000001)2 to hexadecimal number ¸x. r
system, we find ...... ،Ģ Sc j ›. ڈtz . x, M(11000001)2
......
E1 D1 C1 B1
(D) (C) (B) (A)
11. Convert the binary number (1110000)2
into decimal: :4 ›.¸x. rڈM(1110000) 2 ............. 11
(112)16 (C)
(D) (112)10 (108)10 (B) (222)10 (A)
12. (C921)16 in binary is:
۔ (C921)16 .12
11001001 (D)
11000001 10001101 (B) 11011001 (A)
13. Secondary memory stores
.13data ...... ۔ رnM ڈ رى4رى
Temporarily Expensive (B) Important ( اA)
Permanently (D)
رL
.14
(C)
14. A device which holds data as long as it has
power supply connected to it is called:
: Ưť ا ” اس1 ڈ رJ آĢا
ROM روم Secondary storage رى4رى 4 رىťUنووť (B) Volatile memory 4 رىťUوو
(D) (C) Non-volatile (A)
memory
15. Temporary memory is volatile and permanent
memory is ......: رى ۔4 رى وا ر4 رLĢ اťUوو .15
(A) RAM ( رD) (C) (B)
Memory 4رى Semi-volatile ťUوو Non-volatile ťUنووť
16. RAM is an example
.16of: ل ۔ ر
indirect memory 4 رىć ( انڈاC) 4 رىťUنووť (B) Volatile memory 4 رىťU( ووA)
semi memory 4( رىD) non-volatile
memory
17. Keyboard characters has an associated
code in:
: ť ڈMĢ اdوفsمÙ دr2رڈE .17
.
octal J( آC) hexadecimal ›. ¸x. r ڈاx (B) decimal رى ا (A)
binary ( ;ىD)
.x
(C) : ASCII .18
18.ASCII (es-k) stands for:
(B) (A)
(D)
AmericanServiceCodes AmericanStandingCodes AmericanStandardCodes AmericanStylesCodes
for for for for
InformationInterchang InformationInterchange InformationInterchange InformationInterchan
e American Service American Standing Codes American Standard Codes ge American Styles
Codes for Information for Information for Information Codes for Information
Interchange Interchange Interchange Interchange
An external storage device is a
19............................................................... : اĘ رجڈn5½و
device. .19
(D)
start and play Y رٹا
pick and play Y plug and play Y take and play Y ا
اG ”ا
(C) (B) (A)
The best example of internal storage
20.device is: : ل اĘ رجڈy nا
.20
RAM RAM (D)
Hard Disk Z رڈ USB USB CD CD
ڈ
(C) (B) (A)
21. The best example of
: ل اĘ رجڈn ا21.
external storage device is:
(D) CPU Ę 4 (C) ROM روم (B) RAM ( رA)
USB اĘ
22. Any physical device capable of storing data : ť ، ÷رc ظdM ڈJ دىآl ا .22
is called:
(D) (C) (B)
RAM ر memory 4رى device اĘڈ hardware ½ ( رڈوA)
23.Volatile : d ťUوو .23
means:
durable :( دD) permanent (C) unstable ÷ر
( اB) stable ÷ر
( اA)
24. 1 petabyte is equal
to ...... ۔ť cاc S ....... .24
(C) (B)
(1024)5 bytes (1024)6 bytes (1024)4 bytes (A)
(1024)7 (D)
25.bytes 1 Megabyte is ť cاc S ...... 1 .25
(C) (B)
1024 KB 1024 MB 1024 GB (A)
equal to ......
1024 TB (D) : Ęť wd 4رى .26
bit file ť (B) word D (A)
26.The smallest unit of
memory: : MB .27
number (D) Mega base Mega bit (B) Mega byte (A)
27. MB stands for: : cاc MBĢ ا.28
(D)
t 10244 bytes 10243 bytes 10242 bytes (A)
Magnetic byte
28.One MB is equal to: (C) : JűU .29
10245 bytes (D) Base digit Z . Byte digit Z . . Binary digit Z ( ;ىڈA)
.ڈ ڈ
29.Bit stands for: (C) (B) .30
Basic digit Z (D)
.....................ڈY
(C) (B)
Expression (A+B).(A+C) is equal to
30....... ۔ cاc S .......(A+C).(A+B)ƒ ا
(D) (B) (A)
A+(B+C)
A.(B.C) A.B+A.C A+(B.C)
(C)
Every preposition takes one of the two values "true or
31.
false". Thes values are called:
: ƯM ť ارñ ۔ا نا Ģ "Aţ " ا روںñد وƒزEى2y 31.
true values ز ُووc wrong values ز وfi رو false values (ز وť truth values ز وøوc
(D) (C) (B) (A)
...... is the type of Boolean proposition that consists of two .32
32. ۔ 2 زEى2دہţ زţ و ہ⎛ د وƒزEىE...... 2
or more propositions.
truth value وøوc ƒزE ہ2( ىC) ƒزE2 ىd (B) basic proposition ƒزE2ىY
(D) complex common (A)
proposition proposition
(C)
33. If both propositions are
.33 c :éاcSاسffi، P.Q ز د رEى2ںEد وÉا
true, then P.Q will be equal to: P = I live in
nاD نQ = ، ن ر ¼ ںP =
Punjab , Q = My country is
(B) (C)
Pakistan
(A)Identity Law نEť ذا اورp (D) Negation Ä True در False A
34. Total number of logical
.34operators are: دا ۔ 2 واU
4 3 1 (A)
2 (D) (C) (B)
.35 ţ: ا ا™رف واE
35. Who developed Boolean
Charles Baggage ( George Boole E رج Von Newmann o( وونA)
Algebra? Dennis Ritchie
(D) (C) (B)
.36
Tر ڈ
36. Which one of the following sentences is a : ƒزEى2 ¢نM درجذ
proposition:
(C)
I play Chess ں
(D) Sit down و‰ How are U? ؟ffi ( آپB) door the Close وD( دروازہA)
37. In Boolean algebra, P and Q is
written as: : ť DMPANDQ اE .37
P.Q P-Q P + Q (A)
P ^ (D)
Q (C) (B) .38
38. This law states that in Boolean Algebra, "the order of : "۔ ا: وں2 " دوا ا، ا اE1 نEť
two separate propositions is not imp. ortant." It is:
¸xãr
Distributive law +. ِ ( نD) Commutative law JدEِ ( نC) Associative law زمGِ ( نB) Identity law نEť ذا اورp (A)
Eť Eť Eť
39. A proposition is a sentence that can
either be: : ™ ţ ĢاƒزE 2ىĢا
.39
none of these M ( انD)
B B & A bothا ورAںEدو false true در
A
(C) (B) (A)
40. By negating a negative preposition, we get a ……
preposition: ۔ bƒزE 2ى.…… c ƒ2 واNOT2ƒزE 2§ىJ
.40
None of these M ( انD) (C) (B) (A)
Both ںE د و Positive Negative §
Q3. Choose the correct answer. 1X40=40
xدا2 ر ا ت در3. الćہ ۔
1. E-mail stands for: : d ....... 1. اى
. tr
Electronic message $. ”( وD) Electronic medium ”و ا Electronic mail ”و ا Electrical mail (اA)
ا (C) (B)
2. Caeser used this method of for sending messages to his
۔Ư ا لĢS Ad تM l ںnںاور اc ½ر2.
soldiers and generals.
Patent زĘورا وور/ d (C) Confidentiality رازدارى Encyption رىd
(D) (B) (A)
Client server over
use
3. The most well-known example of network of
networks is: : ر ل " و ركd " و ر3.
Computers Network ورك (D) ( ورك نC) Internet y(اB) ورك:ţ اf )A(
Telephone Local Area
Network Ne twork
. ¸
4. system
How many
are?basic components of communication
x. tF. ,
6 5 3
(D) (C)
؟ffi اءn دىاTSj .4
1
(B) (A)
5. Devices in a computer network are connected to each
ffi: ے/د وĢ د اs تU و رك آc 5.
other with the help of ......
Server ور/ Client Address را Channel
(D) d (C) (B) (A)
6. In our daily life, we use
computers to: ffi: ا لJń Mc ہزç ا ر وز6.
ABC all مÙABC (D) .
ĢS زدĘ وU ( آنC) ĢSc لPو/ãx . ( اىB) ĢSc y( اA)
watch online send / receive browse the
videos emails internet
7. Networking of computers helps a network user to
share: : دc s ا;اكMرفbSو رك ور زc 7.
ABC all ںABC (D) r (C) (B) (A)
devices ux اĘ files ť hardware ½ رڈو
ڈ
8. The computer that is providing that storage space is
called: : ť ، ť )ر اĢS رn1 c .8
DropBox ( ڈراپD)
workstation ( وركC) Server ور/ (B) LAN نU (A)
9. A computer that get services from a server is
known as:
: ťƯ اť bتl ور/ c Ģ9. ا
client d (D) (C) (B) (A)
website ¢ و guest host A
10. A client is a process that accesses services
provided by a: : ;1 / وf ا2وĢ اd .10
server ور/ (D)
website ¢ و host internet yا
A
(C) (B) (A)
11. Networks are connected together to make a
large ...... ffi: اĢا و ر آ11.
(A) None of these M ان
(D) Network ( وركC) System j
(B)
Group وپÉ
12. The example of ATM
.12 : ل اßاے
machine is: Internet sharing
(D) fi ƒ ( اC) Hardware sharing fi ½ ( رڈوB) File sharing fi ť (A)
Application
fi yا
sharing
۔ffiمÚ اf .13
13. The types of topology is: Two دو One Ģ( اA)
Four ( رD) Three (C)
(B)
14. In Star topology, all devices are connected to a
س، اffi ے اç E1ذرĢ S تاU مآf Ù ر.14
common point via a cable, this common point is called:
: ť ƯM اE 1
Cable (D) Server ور/ (C) Hub ÷ (A)
Button (B)
.
15. A topology connects all devices with each other ،ffi ىçذرSرťø¢Sے/د وĢ اہر ا ا/cاĘ مڈĢ f Ù ا.15
through a direct link is called: :ffi
Mesh topology f (D) Ring topology f fi ( رC) Star topology f ( رB) Bus topology f (A)
16. A topology that can send data either clockwise or
: ، ™ JM ڈ f ا .16
anticlockwise is knows as:
. ¸r . ¸r . ¸r . ¸r
.
f fi رx ć ( ڈاD) f fi رx ć ( ڈاC) f fi رx ć5ڈاĘ (B) f fi رx ć ( ڈاA)
single-directional ring multidirectional ring unidirectional ring bidirectional ring
topology topology topology topology
17. Exchange of data between sending and receiving
d ڈć ا لJ MنĘد رSتU آLو اc لP اوروã ڈ.17
devices through some communication medium is
: ť Jد
termed as:
¸. (B) (A)
.
data communication (D) data sending fi ( ڈC) data storing fiرn data processing ڈ2و
x. tF. , ڈ
18. A device that receives a message
is called: : Ư ť اť لPrم J آĢا
.18
packer ‰ (C) Both of these ںE ( د وB)
(D) reciever U واc لPو sender U واã
19. Sink is another name of:
system j(D) message $. (C) sender U واã
. tr
20. The medium can be a:
ABC all ںABC (D) (C) (B)
fiber optic cable Zِ آ
21. How many parts of message? microwaves زĘ ووl ½ť
Four ( رD) (C) (B)
Three Two دو
22. Control information of message is
called: None of these (D)
M ان (C) (B)
Header ر mess receiver U واc لPو One Ģا
(B) (A)
.22 age $. : ™ Ģا : d ťم ولا ر.20
. tr
(A) copper wire ć2واd Play load ڈfY (A)
.19 : مťا/د وd ؟ť 2ںA $ .21. . tr
.23
23.........A is a formal agreement between two : ť ( ہk رĢ ناĘد رSںỨfدو
parties is called:
(C) (B)
Protocol لMc2و
(D) Information را Header ر Message ( مA)
24............................TCP/IP
model has ۔ffi .......... ڈلlTCP/IP .24
(C) (B)
layers. 4 3 2 (A)
5 (D)
25.FTP is an abbreviation of: : FTP .25
File Tele-Protocol لMc2و ť(D) لMcا¢2وc ť (C) لMcا¢2وc ť (B) لMc2و ť (A)
File Transfer File Transport File Testing
26.What is SMTP? Protocol Protocol Protocol
لMcا¢2وc ł (D) ؟ƯSMTP .26
Smile Mail Transfer
لMcا¢2وc l (C) لMcا¢2وc لł (B) ِ¥
لMcا¢2وc (A)
Protocol
Slow Mail Transfer Small Mail Transfer Simple Mail Transfer
Protocol Protocol Protocol
.27
27. Transport layer establishes connection between a
server and a: : ťƒ(نĘد رĢ S ½ وراورا/ا رٹc
client (D) (C) (B) (A)
dealer 4ڈ agent ا customer Q
d
The unit of data sent from one device to another is
28.called: : Ęd ť ڈLو اM c اĘ ےڈ/د و اĘ ڈĢا
.28
address ( ر اD) (C) (B) (A)
. tr
packet information ƒر ا message $.
29. If an IP address is fixed in a network, it
is called: : Ư ť ا ر ‡ اIP و ركJÉا .29
solid IP address ر اIPß ِ (D) (B) (A)
ر اIP ( ڈاC) frozen IP address ر اIP )وزن static IP address ر اIP
x dynamic IP
address
30............................................The IPv4 address is
made up of..........................................binary bits. ۔T ;ى ا رIPv4 .30
30 (D) (C) 29 (B) 31 (A)
32 ۔ d......DHCP .31
31. DHCP stands for ......
None of
(D) (C) (B) (A)
these
Dynamic host configuration Dynamic host computer Data hosting computer
protocol protocol protocol
32. Bits required to
store w hole IP address in : ورتp ĢSc ہ ذM ر اIP IPv4
IPv4: .32
(C)
128 bits ß. ِ 128
(D) 64 bits ß. ِ 32 bits ß. ِ (B) 16 bits ß. ِ 16 (A)
64 32
33. 172.16.54.1 is an example of ...... لĢ172.16.54.1 ا.33
......
Protocol لMc2(A)
و
DNS ڈىا ا IPv4 Address ر اIPv4 Domain ڈو (D)
(C) (B) .34
34. Maximum bits required to store each
group of IPv6: ورت ۔p دہţز دہţ زĢSc ذ ہMوپÉySIPv6
16 bits ß. ِ (D) 8 bits ß. ِ 6 bits ß. ِ 4 bits ß. ِ 4
16 8 6
(C) (B) (A)
35. In order to an easy access the www,
we use: :ffi ل ا،Ģ S ¢آ¢ ”نرwww .35
web address ر ا و (D) web software ½ و¢ ( وC) web browsers اؤزرزc ( وB) web servers و/( ورزA)
36. It is a unique
identifier: : ہfi÷ §دĢا .36
DHCP Router IP (A)
Server (D)
(C) (B)
37. Routing is process of taking data from one device and
ML 2 ےآ/د وSL ڈL آĢ ا J رو ا .37
sending it to another device in different ......
۔ť
Area ţ:ا Path ø (C) Network ( وركB)
(A) (D) Channel
38....................................Routers
.38connect multiple ۔ffi ڑø¢Ģا دnزcراؤ
. .r
together. addresses / Ix ( اC)
ر channels (B) networks ( ورA)
protocols Mc2( وD) : dISP .39
39. ISP is an abbreviation of: وس2ر َوا و/ y( اC) وس2ر َوا و/ y( اB) ½ ا/وس2( ر َوا وA)
Internet Service Internal Service Interior Service
وس2ر َوا و/ƒ( ر اD) Provider Provider Provider
Information Service Provider
40. A networking device that forwards data packets from
one network to another is called:
2ے و رك/ و رك د وĢ اM ا ڈĘ و ر ڈĢ ا.40
: ťƯ ا
router c( راؤD) thrower َور وø (C) sender ر (B) rounder ر راؤ (A)
Q4. Choose the correct answer. 1X46=46 ہ ۔ćدا2 ر ا ت در4. الx
1. Which of the following doesn't includes the types of ؟ مÚ ½ اƯ ¢ درجذ1.
software piracy?
Online piracy ½ U آن .
(A) (D) (B) زĘورا وور/ d (C) Liability ذ3دارى Softlifting G t9 ¢
Client server
2. Which of the following is not a overuse
cybercrime? ؟ ( ا¢¢½نM درجذ2.
(D)
(A) Decryption (B)
ڈ Identity theft رى ÷ Phishing crime ( اG Hacking
. ¸
(C) x
¸.
3. Which of the following is not the characteristics of phishing ؟ n ا ىJ¢ x GنM درجذ3 .
emails?
(C)
و ا¢ ( ڈوD) Similar
IT reminder 5 ددţß آ ا پڈ ؤd( ا اىB) عPا فورزى رىڈd/ (A)
domain of actual website
Email account Official data breach
update notification
4. Which of the following is not characteristics of phishing ¸.
website? ۔ n ¢ وx G درجذ4 .
ا پڈ ؤd( ا اىD)
ا ادr ( وC) ل اd رمťĢSc ŤM ć ( زاB) و ا¢ ( ڈوA) Similar
Email account
Actual link to web Using of forms to collect domain of actual website
updates
content visitors
5. Which of the following is not a characteristics of good
password? ؟ n ا سو رڈ4نM درجذ5.
2مťS فآپp ( سورڈD)
2وفs( ےC) y 2 رĘ (B) EاP sø( آA)
Password is your name
Contains uppercase Doesn't contains Is eight characters
only
letters username long
6........is a serious attack on a computer
system. : ƒĢ2jc
ا.................6
Sabotage رىd / (D) Patient Copyright راd (B) Trade secrets راز رfi (A)
(C)
7. Protecting data from malicious users is .
called: : ڈb ť زرز ڈĘLو اc3رp 7 .
Data saving ہ ذd ( ڈD) (C) (B) ´ (A)
Data hiding J E ڈ privacy Data ڈ رازدارى Data security ßرc ڈ
8. Illegal copying, distribution or usage of software is
termed as: : ť وا را ل،ť و ½ ل ر¢ 8.
Data piracy ć ( ڈD)
Draft piracy ć دہ Software piracy ć ½ و¢ Illegal piracy ć 5Eť
(C) (B) (A)
9. One of the following is NOT a types of
piracy: ؛ مÚ اĢ ć ا درجذ9.
Online piracy ć U ( آنD) .
Data piracy ć ڈ Fraud and misuse ل اA ) ڈا ا ور Soft lifting G t9 ¢
(C) (B) (A)
10.Borrowing and installing a copy of a software from a : ť ť ا لd و ½ وا راس¢ ţ ¢$ د وJ .10
colleague is know as:
Online piracy ć U ( آنD) .
Soft lifting G t9 (C) Hard disk loading fiڈfZ (رڈڈB) زĘورا وور/ d (A)
¢ Client-server
overuse
11.Downloading illegal software from internet is
called: : ť ť ڈf و ½ڈ اؤنy ¢5Eť ا11.
ل اA ( ) ڈا ا ورD) . (B) (A)
Fraud and G t9 ¢5Eť Online piracy ć U آن Hard disk loading fiڈfZرڈڈ
misuse (C) Illegal
soft lifting
.12
12.Some software companies sell software with a
:ffi ........ ،ffi ÷)وø¢S M½ ں ½و¢ و¢
confidential text, called the:
Description ½ و¢ (C) Encryption رىd Password سورڈ
½E (D) Key of that (B) (A)
software
...... means making illegal and unauthorized copies of the
13. ر ہ زU ،5Eť ½ و¢ S زت اMl1 ad...... .13
software without owner's permission.
:ť
Privacy 2ا Piracy ½ (C) Browsing fi اؤزc (B) Right ( راA)
(D)
14. The way that is used to protect an idea is
: ť Ad÷ دMţ آJ .14
called: Prohibited idea ĩfع
(D) Patent (C) Trade marks رl c (B) Copyright ‡ راd (A)
15.Installing more copies of the software than you have : ť ť ںا لGd ½ و¢دہţ ز U سS آ پ .15
licence for is called:
Online piracy ć نU آن . (C)
(D) Counter felting G Hard disk loading fiڈfZرڈڈ زF. ُ ورا وور/ d (A)
t . y ؤd (B) Client server over
16....... is the process of encoding use
data: Availability
(D) د : Jdc fiڈ“اM ڈ...... .16
(C) Patent
Confidentially رازدارى (B) Sabotage رىd / (A)
17........is responsibe for the protection of your د ارى ۔3 ذ S ڈ5اńASآ پ......
family data. .17
(C)
(A) NADRA دراť
(D) (B) DPO ڈى او FIA ا آ ا ے Army 4 آر
18. Open source software have
.18 no: ffi: ½2 و¢رسx وا
.. Safety rights ‡ را Piracy rights ‡ راć (B) Copy rights ‡ راd (A)
Selling rights ‡( )را وD)
(C)
The law which says that a product cannot be copied, is .19
19.called: : ť ، ر ڈاB 2J1ن ر وEť ا
Restriction law نEťع (D) Copyright law U راd (C) Trade law U (B) patent law U (A)
c
Most of the software products are
20.copyright: :ffi ر اdتL ½ و¢ .20
´
Secured رڈc (D) Listed راńا Protected Bound D
ظd
(C) (B) (A)
21. Nadra keeps a huge data records of all the
citizens of: ؟ ڈرţ ہدرţ زdںĘ مÙ دراť 21.
China S (D) (C) (B) (A)
Pakistan Sن Australia America S çا
SG;آ
22. CCTV stands for:
. t› : CCTV .22
ن و/ItF (D) J
Compact circuit زڈ/ ن وP (C) ن و/ (B) ن و/ (A) Clear
television Closed circuit Complete circuit circuit television
television television
.23
The foundation of all security system is
23.formed on: : (ť2دT ßرc ´ مÙ
Ethical principles ا ( اD) ´
Moral laws Security laws اßرc Social laws اł
5b رو
(C) (B) (A)
. . t .r .24
24. It is the responsibility of my bank not to share my
: ےy ƒäاc G .tF . ىD1 ے ذ3د ارىD
banking transaction with my:
Relatives M داروں;ر .
(D) Employees M زA (C) Competitors Mں¤ . s( رB) Family ٍMyA ( اA)
25.The example of piracy is:
ى رd : ل ½ .25
All of these مÙ (D)
Software ½ و¢ (C) (B) Book بB (A)
26.Patent is a way to protect an
...... Poem )ى : AĢاd ...............J .26
Copy d (B) Software ½ و¢ (A)
None of these M ( انD)
(C)
Idea ţ آ .27
27. The information that is stored with web surfers is (C)
called: : ، ذ ہø¢S ز/) ت وlPوہ
Patient of IT school education ƒ رڈآفا ٹا/لاE (C) Board
(D) Information را
of institute and school
28.BISE is an abbreviation of: education
ƒ كاxß رڈآفآE (D) Board
Cookies M ƒ ا رىاyرڈآفاE (B) Board ƒ ا رىاyرڈآفاE (A) Board
(A)
Data ڈ
of intermediate and of inter and second
secondary education : BISE education
.28
Integrity means that we want to keep .29
29.our data: :ffi÷ 1 ر ڈ ا d÷اP
Correct ( درD)
Confidential رازدارى Secret ہE Secure ظd
(C) (B) (A)
Companies store some piece of information with the web .30
30. : ، g ظرdø¢Sرفb توlP ں
surferm it is called:
Testing Mind reading Ø ذ Cookies Storage وزىń ذ ہا
(D) (C) n (B) (A)
31. Using "cookies", companies are able
to gather:
:ffi ťSc ںاć ل اM .31
Business date رىڈ روd (D)
Personal data ڈ ذا (C) Computer data ڈc (B) Marketing data ر ڈl (A)
32. The process of encoding data in such a way that only
: ffi4، ťزا )اد ا ھUفpSť رىd حAڈ اس .32
authorized person, can read it, it is called:
Authorization ƒaاøا ¸ ¸ ¸
. . . . .
(D) Decryption ( ڈىC) Description (B) Encryption ان
(A)
33............................................Vige ¸ .
۔............ ,a. ,¢/. , t. É و.33
.
nere Cipher table consist of /ڈ روں2
rows.
25 (C) (B) 36 (A)
24 (D)
26 .34
34. "Experience is the teacher of all things." It is the
famous quote of: : ر لdا ™د ۔"اسy; d "
Aristotle nِ (رD) . ¸
ا Plato
(C)
Alexander ا ر Julius Caesar ر/ . ut .
cG (B) (A)
¸ .35
35.....................................................................M : ...... ť ڑMتl ½ć ل اS,a. ,¢½ر
essages encrypted with the Caeser cipher are very
to
crack.
None of these M ان (C) (B)
(A) (D) Complex ہ Difficult Easy آ¢ن
36. The Roman politician and military
.36general was: B: د اناور ى½ لĢdروم
(D)
(A) Aristotle (B) (C) ¸
b وا Alexander ا ر Caeser ½ر Cipher ,a. ,¢
37.........is used to protect sensitive data, including .37
personal : تlP سڈ ÷ ا )اد ذ ا......F
information for individuals.
Password رڈx (D) (A)
Patient ( زB) Encryption رىd
(C) Protection from
hackers
.¸
38. 'PAK' "three characters substitution to the right" : و ا¢¢ دل" ½رdوفs ÷ 'داPAK' " .38
result caesar cipher return:
(A) RST (D) (B) DBO (C) SDN OPQ
39................................................A good
.39password should be at least...............characters : ť { وفsا سو رڈ{ ا زĢا
long: 12 8 8(B) 4 4 (A)
12
16 (D) .40
16
(C)
40. A crime in which computer network or devices
are used is called.....
: Ư ť اƯ ťتا لU آţ و ركc مnĢا
None of these M ان Virus سć وا Cyber crime (½ ا¢ Hacking
(D) (C) (B) (A)
41. A crime in which computer network or devices are
used is called: : Ư ť و ركا لc مn 41.
Cyber crime (½ ا¢ (D)
Web-crime (و ( اC) Online-crime ( اU آن Net-crime (ا
(B) (A)
42........is a cyber attack to make machine or network
resources ťSا لSرفbM ¢ و ركوJ ţ ا¢½ ا...... .42
unavailable for a user: : د
Piracy ć 43. FIA is an اyرلا internet agency
(D) abbreviation of: (D) Federal
Hacking (C)
Phishing (B) Federal investigation
. ¸ agency DOS ( ڈاسA)
G x (B)
: FIA .43
( ا رلاC) Federal
interior agency ¸ اƒ( ر رلاA)
. x. tÉ
ا Eرلا Federal information
agency
.44
44. A cyber-attack to make machine or network resources
unavailable is known as:
: ť ť مťS اy ½¢ĢScد بM ¢ وS و ركţ
web attack ا و virus attack ساć وا DOS attack ڈاسا cybercrime ½ ام¢
(D) (C) (B) (A)
45.................................Hackers may use fake .45
to trap someone to give passwords ۔ffi ا لb fiĢSc dتlP ؤd رڈاوراx ز
and account information.
All of these مÙ (D) (C) (B) . (A)
Accounts ؤdا Passwords رڈزx E-mails x . اى
46. Illegally accessing someone else's computer
is called:
۔ť ť b ¢”رc S د و/ےJ2رP5Eť
.46
All of these مÙ (C) (B) (A)
(D) Piracy ć Hacking Theft رى
Q5. Choose the correct answer. 1X40=40
xدا2 ر ا ت در5. الćہ ۔
1. HTML is not a ۔..................ĢاڈMHTML .1
language.
Both ںE دو Markup ركاپl Programming ½اÉ2(وA)
None of above (D)
M
(C) (B)
2. Webpages can be created and modified by
using ...... ۔ť Ư ţţ ć ل اd ..................M 2. و
All of (D) (C) (B) (A)
above Text edit Notepad Notepad ++
3. An HTML element usually consists of a
tags. ۔ť 2Ć ..............2رPمL§HTMLĢ3. ا
None of (D)
Start and End Start
these
End
(C) (B) (A)
4. The......element is a container for metadata (data
about data). ر ڈ ر ۔ń ا ا4.
<html> (D) (C) (B) (A)
<title> <head> <body>
5. To save the HTML page, you can use. .as file
extension. ۔ffi ا ل ا............. ĢSc ظdM HTMLĢ5. ا
both ںE دو
(D) A & B B ا ورA (C) html (B) htm htm(A)
6. HTML document starts with html
tag: : ť ; وع................ ڈ ا HTML .6
</ (B) <htm>
(A)
<hr>(D) html> <html
>
(C)
7. HTML document primarily consists of .
sections: ؟ť 2Ć . 2رP دىT ڈ اHTML .7
Four ( رD) (C) (B)
Three Two دو One Ģ( اA)
8. Head section ends with:
: ť م اdƒ .8
</head> (D) </body> </html> </tittle> (A)
<head/> <body/> <html/> <tittle/>
(C) (B)
9. By clicking on.....we can move from one webpage to
another: ؛ffi4 2 ےو/د و وĢ ا ð2 c 9
Image ( اD) (C) (B)
Hypertext Hyperlinks Markup ركاپl (A)
10. To learn about the web page designing following .10
language is required to learn ......
ورى ۔M pد رجذ ز نĢS رےS ا2 ڈ و
JAVA GW BASIC HTML C++(A)
(D) (C) (B)
11................<p ۔............Ģ<اp> .11
> is a
tag. (C) (B)
Ending fi ا double
(D)
(D) Singular f½ Closing fiزP
12..............<br> is
tag.
single singular
(A)
Opening او ۔ <br> paired
(A)
.12
...................
(C) (B) .13
13. To specify a title of the page
we use: :ffi ل اĢSc و انSØ
<h1> tag
(D) <head> tag (C) <tr> tag (B) <title> tag
(A)
14. General structure of paired tags .
is: : ;½لdĆ . ڈ.14
<p> </p> (C) </p> </p> (B) </p> <p> (A)
<p> <p> (D)
.15
15. Which one of the following is a : ڈ¢نM ر ذn
paired tag: <br> (C) <href> (B) <p> (A)
.
<hr> (D) :ffiمÚ اĆ . .16
. . .
16. The two types of tags are: Ć . ( ا ورڈC) Ć . ڈ ا ورf½ Ć . رل وا رf½
. Single/double (B) Singular / (A) Singular/ plural
Ć . ا ور
tags paired tags tags
(D) Single/
multiple tangs
. .
17. The tag which do not have closing tags are :ffi ، Ć . fiزPS Ć . ا
known as:
. (D) . (C) . (B) . (A)
Multiple tangs Ć . Double tags Ć . Singular tags Ć . Paired tags Ć . .17
ڈ
ڈ f½
18. Which oen of the following symbol is used as
opening tag: : ا ل2رPS واsf نM درجذ
.18
{ } {}
(D) < > <> (C) </> () () (A)
19.WWW is an abbreviation </> (B)
: WWW .19
of: Wide web world ور و وا (D)
World wide web و وا ور (C) Working work web و ور ور (A)
20. HTML is an abbreviation is: World wide web و وا ور (B)
: HTML .20
رl (D) Hyper
ركاپl (C) ركاپl ½ (A) Higer
text marking language
Hyper text mark up ركاپl ( ½ىB) text markup language
21. The term hypertext is language Heavy text mark up
derived from: language ۔ حاBا 21
HTML (A)
All of these(D)
Hyper link (C)
CSS (B) .22
22. Which of the following tag is used for the most
important heading: : ť ا لfi ĢS اw ¢نM ر ذn
<h4> <h4> (C)
(D) <h3> <h2> (B) (A)
<h1> <h1>
23. To make text bold, we <h3> <h2>
use tag: : ť ل اĢSc EM .23
(B) (A)
<bi> <bi>
(D)
<bd> <bd>
<b> <b> <br>
<br> .24
(C)
24. Which tag is used to bold in
HTML? ؟ť ل اÚMĢSc E HTML
<v> (C) (B)
(D) <c <i <b> (A)
25. The latest version of > >
HTML is: : ورژن:v dHTML .25
HTML (A)
HTML5 (D)
HTML4 HTML2
(C) (B) .26
26........tag is used to Italic the
text. ۔ffi ل اĢSc MťاM ......
<tr> (D) (C) (B) (A)
<a> <t> <i>
27. The <font> tag
specifies the: : ť Ư ل اĢSc y <fon> .27
All of these مÙ
(D) Color of text ٍPd (C) Font size a¢ (B) Font styles (A)
28. The number of heading tags .
is: : داĆ . fi .28
Four ( رC) Two ( دوB) One Ģ( اA)
Six ø (D)
29. What kind of list will <ol> tag ؟éć ½ ⎛ <ol> .29
blank list A (C) ordered list وار: x. t(A)
r
create? inordered list :
(D) nested list
(B)
.30
30. The tag for unordered list is: : d نا آ رڈر
<ul> <tr>
None of these(D) <ol> (A)
(C) (B)
31. Which tag is used to insert image into the
webpage? ؟ť ا ل¢نMĢSc د اÃ: و31.
IMG (D) (C) (B) (A)
SCR PIC
IM
32. Tag used for images in a
web page: : Ư ť ا ل:ĢSو و .32
<bg> (D)
<backgroun <image> <img>
d>
(C) (B) (A)
33........attribute provides an altenate text for an
image: : ٹfi÷ا ىĢS دل د Ã:
.33
All of (D) (B) (A)
text attr alt
these
(C)
34.......can improve the design and the appearance of a
webpage? : U ™ى ىy وا راورaڈ اS و...... .34
Images :( وD)
Figures ( ل اC) Text (B) Colors زP(A)
.
35. <a> and <a/> tags are :ffi ل اĢS اسĆ . </a> < وا رa>
used for: .35
(D) (A)
formating text ĢS رť
ĢSc U( اC) ĢSc d Ģ( اB) adding image ť :Ã
alignment create a link to
text page
36. A link that allows you to go from one part of the
ا زتدR cے/ د وRĢ اĢ S اMآ پ Ģ ا.36
same page to another part is called:
: ť
page link (D) anchor ( اC) weblink (B) (A)
hyperlink
و
37. The icon, graphic or text in a webpage that when
2 ےو/د وJMآ پ،ţ™ 1 Ưð ćاÉ،آ نd و.37
clicked , takes to you some other webpage is called:
: ť ، ťţL
Hyper link (C) (B)
(D) Next link High link Q link (A)
38. The tag for creating table in
HTML is:
: ĢSc HTML .38
<table> (C) <td> (B) <tr> (A)
<li>(D)
: dc رS .39
39. The table row tag is: (C) (B)
<row> (C) <tr> (B) <td> (A)
<hr>(D)
: d رS .40
40. Table header tag is:
<header> <td> <tr> (A)
<th>(D)