0% found this document useful (0 votes)
99 views27 pages

9th MCQ Notes

Uploaded by

owaisali0057
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
99 views27 pages

9th MCQ Notes

Uploaded by

owaisali0057
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 27

Student Roll Class Paper

Name Num Name 9T Code


H
Subject Name Time Total Exam Date
Computer Allowed Marks 21 15-Aug-2024
3

Q1. Choose the correct answer. 1X47=47 ‫ہ ۔‬ć‫دا‬2 ‫در‬ ‫ ر ا ت‬1. ‫ال‬x
1. Total steps of problem solving :ffi ‫ا‬ç Sc ¸Lz .1
are:
(C) (B)
7
(D) 5 3 2 (A)
2. A well-defined problem does not
:ť ¸Lz ‫و ا‬Ģ2. ‫ا‬
contain: Ambiguities
(D) ‫م‬U‫ا‬ (C) (B)
Clear goal ‫ل½ وا‬ Clear solution ‫وا‬ Clear concept ‫وا‬ ‫م‬ (A)
3.........is used to transfer control to certain step of an : P ƯĢSc ť‫ ول‬ç 2‫ص‬AS ‫ا لا ر‬d 3
algorithm:
(D) (B) (A)
else else
goto goto flowchart ‫رٹ‬ algorithm ‫ر ا‬
U
(C)
4. Before jumping into the solution of the problem, it is
important to: ‫ا‬1 ‫ورى‬pc c Mc zٔ .4
(D) (C) (B)
:
Use Guess ć ţ ‫ازہ‬ń‫ا‬
Draw a picture ć :à Define a problem ć Ư ¸Lzٔ ć Ø¸Lzٔ (A)
Understand a
problem

5. This strategy divides a complex problem into smaller


problems: ‫ں‬ ‫؟‬c zٔ M¸Lzٔ ‫ہ‬/. Ģ5 . ‡‫ا‬
check and improve ‫ى اور‬ (D) check and balance ‫ل‬ť (C) 4 ‡ 4 ‫ا ور‬ (B) hide and seek (A)
divide and
conquer

6. In which strategy, the designer defines the list of "to-


do" task: ‫ ۔‬ť ‫ن‬4 ‡ ‫ا‬MĢSc ‫½ ں‬ ‫ر‬rda6. ‫ڈ‬2‫ا‬
Prototype y (C)
(D) out it Act ‫ا اِ ٹآوٹ‬ ť Gues ‫ازہ‬ń ‫ا‬ ‫و ‡وا ور‬ (A)
(B) Divide and
7. Which word refers to something Conquer
unplanned:
unlimited ‫ود‬t limited ‫ ود‬: ‫د‬J‫ا‬r d‫ى‬D; J D¢‫ن‬M .7
candid ‫( ڈ‬D) t (B) outdid ťd‫( د‬A)
(C)
8. The process of solving difficult and complex problems is
called: :ffi MJSc M F 8. ‫ہ وا ر‬
out it Act ‫ا اِ ٹآؤٹ‬ (D) ť guesses Use ‫ا ل‬M‫ازوں‬ń ‫ا‬ (C) Defining a problem ť ‫ن‬EM (B) Problem solving ť F (A)

9. Before problem solving, we need to first


problem. ‫۔‬ ‫ورت‬M c c، M c p 9.
Planning ‫ى‬D; (D) (C) (B)
Un-understaging Determine ť Analysis (A)
10....... helps to save time.
‫ ۔‬ť ‫د‬s c ÷‫و‬...... .10
Start ‫( ز”آ‬D) Analyses ť
Candid solution lِ‫ڈ‬ Prototype ťc2‫( و‬A)
(C) (B)
11.What strategies should we use if the problem is not well-
defined? ‫ ؟‬5 ‫ںا ل‬y Ư ِƯ‫ن‬E ‫ا‬É ™‫ ا‬11.
all the strategies ‫ں‬Ưِ ‫م‬Ù (D) draw a picture ť :Ã (C) use guesses ť ‫ل ا‬d ‫از ے‬ń‫ا‬ (B) ť b‫ت‬lP (A) gain
background knowledge

12.It is not necessary that the candid solution is the


solution of a ‫۔‬ l J ٔd ¸Lz ‫ ڈ‬1 ‫ورى‬p
problem:
actual (D) (C) (B) (A)
immediate ‫رى‬ last ‡ first t

Ctrl + F is the keyboard short-cut to a word, name or


13.text is: ‫ ۔‬ť ĢSc ..........M ţ‫م‬ť،D JCtrl+F ‫رٹ رڈ‬E .13
think x (D) (C)
write find ‫ش‬G (B) see ‫( د‬A)
14. This technique draw a pictorial representation of
the solution:
‫؟‬ y ‫ى‬:Ãd J‡ 4‫ن‬M
.14
multi-type ť (D) (B) (A)
out it act ‫ا ا ِ ٹآوٹ‬ monotype ťEr prototype ťc2‫و‬
(C)
15. The process of repeating itself over and over (loop) is
known as: : ť ť‫ا‬y‫ رد ر‬MJJ .15
mid-process J5Ę ‫( در‬D)
iterative process J ‫( ارى‬C) alternative process J ‫( دل‬B) check process Jd (A)
4
16. We can analyze a problem by
indentifying: (C) :ffi4 dc zٔ Ģ‫ا‬ .16
5Ws 4Ws (B) 3Cs 3ws(A)
7Cs 7ws (D)
5ws 4ws
17. Red traffic light represents a/an: : 46ß‫خ‬/ c .17
happening s ‫( و‬D) (B) problem ¸Lzٔ (A)
solution (C) analysis
18. The best strategy is to plan a ‫ى‬ ‡ ‫۔‬D; .18
solution is...
(D) (C)
Prototype y
out it Act ‫ا ا ٹآؤٹ‬ ‫ا ور ازہ‬ń‫( ا‬B) 4 ‡ 4 ‫ا ور‬ (A)
Guessa and Divide and
improve conquer

19. Which symbol in the flowchart is used to either


‫؟‬ ‫ا ل‬ĢS‫آ ”زاورا م‬sf4‫ن‬M ‫ رٹ‬U .19
start or end the flowchart?

Decision ‫ڈا‬
(D) Process 2‫( و‬C) Connector / (B) Terminal c(A)
20. In a flow chart, rectangle symbol .
represents ...... ,F r : y ‫ رٹ‬U .20
.
connector / , (C) (B)
(D) processing decision ‫زى‬¢ input / output ‫ ان‬/‫( آ وٹ‬A)
F. , M 2

21. Which of the following symbol is used for flow of


flowchart? ‫؟‬ ‫(ا ل‬ĢS‫‡ٔو‬, . US )‫ رٹ‬Usf4‫ن‬M ‫ر ذ‬n 21 .
flowlines (D) connector / (C) (B) (A)
UU processing 2‫و‬ terminal c
, F. , M

22. To determine whether a statement is true or


false is called: : Aţ ، ť ‫ندر‬EĢ ‫ا‬ţ ‫آ‬d 1ť‫اس ت‬ .22
problem (D) solution ( ) processing 2‫و‬ decison making ‫زى‬¢
¸Lzٔ l (C) (B) (A)
23. Which of the following symbol is used to
.23
‫؟‬ ‫ا ل‬sf4‫ن‬M ‫د رجذ‬ĢSc‫ ڑ‬M‫ں‬AS‫ رٹ‬U
connect parts of flowchart?

Input / (D) (B) (A)


Output t ‫آؤٹ‬t / ُ Decision Connector / Terminal c
.
ُ ‫اِن‬ ,F r
(C) .24
24. In a flowchart, the special shapes used to represent
: ƯM ť‫صا ل‬A ‫و ا‬c ‫ا ل‬ĢSJń ٔ ‡ ‫ام‬ñ ‫ا‬ ‫ رٹ‬U
different steps are known as:
icons ‫ت‬ť symbols ‫ت‬lf figures ‫ت‬ images ‫ت‬t, r. ¸. tx
(D) (C) 4 (B) (A)

25. Flowchart is also a good way to communicate the


solution of a problem to other: ‫ا‬Ģ ‫ ا‬dc ‫ رے ت‬Ģ zٔ Sc S‫ا‬ ‫ے‬/‫ رٹدو‬U .25
: A
(A) ABC all ‫م‬ÙABC users ‫ر‬b (C) programmers ‫ز‬ç‫ا‬É2‫( و‬B) peoples ‫ں‬Ứf
(D)
26. Taking data from the user
.26is called: ‫ ۔‬ť ‫رف ڈ‬b
(A) (D) (B)
flow of data ٔ ‫‡و‬, . output ‫آوٹ‬ processing 2‫و‬ input t ُ ‫ان‬
d ‫ڈ‬ (C)
27. The steps for performing calculations such as adding, .27
‫ ۔‬ƯM ť‫باور و ہ‬Ť1،A ،p ‫ام‬ñ ‫ا‬Sc ‫ب‬B‫ب‬F
multiplying, dividing etc are known as:
storing ‫رى‬d ‫ہ ذ‬ accounting E processing 2‫و‬ output ‫آوٹ‬
(D) ‫ب‬F (C) (B) (A)

28. Every algorithm must begin with


notations: : ť Ư ‫;وع‬ø¢S EM ‫ر ا‬y .28
else (D) star got (B) input (A)
t o
(C) .29
29. The notation used to display values or results of
processing is: : ť Ư ‫ل ا‬ĢScd‫د‬M Gţ ‫م ر‬S 21‫و‬ E
end (C)
(A) (D) (B) got outp input
30. The disadvantage of a flowchart is that o ut
.30it requires: : ‫ر‬d‫د ر‬ĢS‫اس‬1 ‫ ن‬d‫ رٹ‬U
(D)
(A) ABC all ‫م‬ÙABC (B) (C)
no time ÷‫ و‬M more time ÷‫دہو‬ţ‫ز‬ less time ÷‫{و‬
31. If an algorithm takes less number of steps to reach
: Øť ‫ا‬ ‫د‬ ‫در‬ ‫{ ا‬ç ‫ا ر‬Ģ ‫ا‬É‫ ا‬31.
a result, it is considered:
more efficient 2r ‫دہ‬ţ better (C) worst : good ‫ا‬
‫ز‬ (D) (B) (A)
v

32. An efficient algorithm uses less space in


computer: : ť‫{ ا ل‬ c ‫ا ر‬2rĢ‫ا‬ .32
system (D)
memory ‫رى‬ processor L‫و‬ disk Z‫ڈ‬
j
4 2
(C) (B) (A)
.33
33. The difference between an algorithm and a flowchart
: ‫ح‬A ‫ن) ق‬Ę‫د ر‬S ‫ف‬p‫ن‬Ę‫د ر‬S‫ رٹ‬U‫ا ر وا ر‬Ģ‫ا‬
is just like a different between:
none of these M ‫ان‬ Ģ5 ‫ا ورا‬ƯĢ‫( ا‬C) a c ‫ڈرا‬Ģ5 ‫ا ورا‬ƯĢ‫( ا‬B) a Ģ5 ‫ا ورا‬ƯĢ‫( ا‬A) a
(D) story and a story and a play story and a movie
painting

34........is written in a natural language, so it is easily


understandable: : ť‫آ‬ ¢5 ‫ آ‬Ģ‫ س‬،‫ ا‬D ť ‫ىز ن‬...... §
.34
Algorithm ‫( ر ا‬D) (C)
Diagram ‫م‬ɾ
‫ڈا ا‬ Flowchart ‫رٹ‬ Program ‫م‬É‫ ا‬2‫و‬
U
(B) (A)
.35
35. Arabic writer and scientist Muhammad-Ibn-Musa al-
Khawarizmi developed:
Ư:‫ ر‬c4‫ا ”ارز‬4r ‫ا‬3‫ د ان‬¢‫وا ر‬ )
computer c algorithm ‫ر ا‬ algebra ¾c mathematics ‫ رٹ‬U
(D) (C) L. r (B) (A)
.36
36. Usually a computer programmer first
writes an ...... : : c wç‫ا‬É2c Ģ‫ر‬2 ‫ا‬P‫م‬L
idea ţ ‫آ‬
(D) program ‫م‬É‫ ا‬2‫( و‬C) flowchart ‫ رٹ‬U (B) algorithm ‫( ر ا‬A)
37. The word "notation" means:
: adnotationD .37
sample word D ‫دہ‬¢ (D) key word ‫ورڈ‬ (C) code word ‫رڈورڈ‬M (B) password ‫( سورڈ‬A)
38. Testing helps in improving a:
: ‫دد‬s c .38
solving Mfifx (D) checking M solutin M (B) problem M¸Lz (A)
39. Space shuttle challanger STS-51L : ‫ ہ‬STS-51Lç .39
crashed in:
199 (C) 1986 (B) 1976 (A)
188 (D) 6
.40 6 : ⎛ ‫ ڈ‬Ģ‫ا‬ ‫درجذ‬
(C)
(A) (B)a type of
40. One of the following is NOT (C)
test data:
(D)
absent data ‫بڈ مد‬
valid test data ‫در‬ ‫ڈ‬ invalid test data ‫در‬ ‫ڈ‬ť numeric data ‫كڈ‬Do

41. After solving a problem, we


need to ...... ‫ ۔‬ť Ư ........M ‫ اس‬Sc M™Ģ41. ‫ا‬
All of these ‫م‬Ù (D)
(A) Output ‫( آؤٹ‬C) Test
(B) Process 2‫و‬
42. Types of test data
.42is: ‫۔‬ffi‫م‬Ú ‫ڈ ا‬
Four ‫ر‬ Three Two ‫( دو‬A)
Five (D)
(C) (B)
43........means to test if the required solution is .43
there. ! ţ ‫ د‬r ;Pţ1 ‫ آ‬ad......
Flowchart ‫( رٹ‬D)
Validation ƒ ‫و‬ Algorithm ‫ر ا‬ Verification ‫و‬:‫ى‬
U (C) (B) (A)
44. To test if the solution is solving the same problem for .44
:B Ư ‫ڈ ا‬2‫ا‬ĢS ‫™ و‬ ‫ ر‬ţ1 ‫آ‬ĢS
which it was designed is known as:

(D) (C) (B) (A)


testing ¸
.
identification ń validation ƒ ‫و‬ verification ‫ى‬:‫و‬
x.tF.

45. Displays each column in the


trace table. ‫ ۔‬ť y )dy c .45
All of these ‫م‬Ù (C) (B)
(D) Mistakes of data Values of data Names of data ‫م‬ťd ‫(ڈ‬A)
46. Displays each row in the ‫ڈ‬ ‫ڈ‬
trace table. ‫۔‬ y‫ ر‬y c .46
Names of data ‫م‬ťd ‫(ڈ‬A)
All of these ‫م‬Ù (D) Mistakes of data Values of data
‫ڈ‬ ‫ڈ‬ .47
(C) (B)
47. We can identify logical
errors using: ‫۔‬ń ffi4 ‫رز‬:‫ ا‬Uć ‫ا ل‬
all of these ‫م‬Ù (D) (C) (B) (A)
trace table algorithm ‫ر ا‬ flowchart ‫ رٹ‬U
c
Q2. Choose the correct answer. 1X40=40 ‫ہ ۔‬ć‫دا‬2 ‫در‬ ‫ ر ا ت‬2. ‫ال‬x
1. Number "17" is equal to. .in binary : ť c‫ا‬c S ......17 j 1 . ;‫ى‬
system.
(C) (B)
10100
(D) 1000 1011 10000 (A)
2. Hexadecimal system has total 1 0 .r
numbers. :ffi ............. › ‫ڈ‬tz . x .2
17 (A)
15 (D)
18 16
(C) (B)
3. The base of binary system is:
‫۔‬ ‫دى م‬ 3
16 (D) (C)
2 (B) 0,1 (A)
10

4. The number system that we use in our daily


life is: : ‫و ہ‬ffi ‫ ا ل‬Jń ‫ہ ز‬ç‫ ا ر وز‬j 4.
‫ں م‬Ù (D) all ¸x. r ¸x. r . x
the three systems j ›. ‫( ڈ‬C) j ›. ‫ڈا‬x . , (B) j ‫( ;ى‬A)
decimal number hexadecimal number binary number
system system system

5. The system for representaiton of numeric data is


known as: ‫ ۔‬ƯM ť‫ م‬SJűU ‫ر‬G‫ ا دا و‬5.
real system ‫م‬ (D) both A & B ‫ں‬E ‫( دو‬C) number system j (B) numeral system ‫م دى‬ (A)
AB

6. The decimal number system uses ten digits


from: ť :ffi1 ‫تا ل‬lf‫ ا رى دى مد س‬6.
0 - 10 (C)
(D) 0-1 0 - 9 (B) 0 - F (A)
¸x. r . x
: c‫ا‬c S...... ‫د رى ا‬,A ›. ‫ڈا‬x . .7
7. Hexadecimal "A" is equal to decimal
number:
(C)
19 11 (B) 10 (A)
20 (D)
¸x. r . x
8. Hexadecimal "F" is equal to decimal
: c‫ا‬c S...... ‫د رى ا‬,F ›. ‫ڈا‬x . .8
number: 16 15 (B) 14 (A)
17 (D)
(C)
9. In mathematics, decimal number system is also
known as: ‫ ۔‬M Ư ť‫ا رى م‬S ‫ا دا‬ ţ ‫ ر‬9.
‫ر‬4 ‫م دى‬ť (D)
‫( م دى رو‬C) Roman ‫( ÷م دى ى‬B) ‫( ) م دى‬A)
Persian number
number system Hindi number Arabic number
system
system system
.10
10. To convert (11000001)2 to hexadecimal number ¸x. r
system, we find ...... ،Ģ Sc j ›. ‫ڈ‬tz . x, M(11000001)2
......
E1 D1 C1 B1
(D) (C) (B) (A)
11. Convert the binary number (1110000)2
into decimal: :4 ›.¸x. r‫ڈ‬M(1110000) 2 ............. 11
(112)16 (C)
(D) (112)10 (108)10 (B) (222)10 (A)
12. (C921)16 in binary is:
‫۔‬ (C921)16 .12
11001001 (D)
11000001 10001101 (B) 11011001 (A)
13. Secondary memory stores
.13data ...... ‫۔‬ ‫ر‬nM ‫ڈ‬ ‫رى‬4‫رى‬
Temporarily Expensive (B) Important ‫( ا‬A)
Permanently (D)
‫ر‬L
.14
(C)
14. A device which holds data as long as it has
power supply connected to it is called:
: Ưť ‫ا‬ ‫” اس‬1 ‫ ڈ ر‬J ‫آ‬Ģ‫ا‬
ROM ‫روم‬ Secondary storage ‫رى‬4‫رى‬ 4‫ رى‬ťU‫نوو‬ť (B) Volatile memory 4‫ رى‬ťU‫وو‬
(D) (C) Non-volatile (A)
memory

15. Temporary memory is volatile and permanent


memory is ......: ‫رى ۔‬4 ‫رى وا ر‬4 ‫ر‬LĢ ‫ ا‬ťU‫وو‬ .15
(A) RAM ‫( ر‬D) (C) (B)
Memory 4‫رى‬ Semi-volatile ťU‫وو‬ Non-volatile ťU‫نوو‬ť
16. RAM is an example
.16of: ‫ل ۔‬ ‫ر‬
indirect memory 4‫ رى‬ć ‫( انڈا‬C) 4‫ رى‬ťU‫نوو‬ť (B) Volatile memory 4‫ رى‬ťU‫( وو‬A)
semi memory 4‫( رى‬D) non-volatile
memory
17. Keyboard characters has an associated
code in:
: ť ‫ڈ‬MĢ ‫ا‬d‫وف‬s‫م‬Ù‫ د‬r2‫رڈ‬E .17
.
octal J‫( آ‬C) hexadecimal ›. ¸x. r ‫ڈا‬x (B) decimal ‫رى ا‬ (A)
binary ‫( ;ى‬D)
.x
(C) : ASCII .18
18.ASCII (es-k) stands for:
(B) (A)
(D)
AmericanServiceCodes AmericanStandingCodes AmericanStandardCodes AmericanStylesCodes
for for for for
InformationInterchang InformationInterchange InformationInterchange InformationInterchan
e American Service American Standing Codes American Standard Codes ge American Styles
Codes for Information for Information for Information Codes for Information
Interchange Interchange Interchange Interchange

An external storage device is a


19............................................................... : ‫ا‬Ę ‫رجڈ‬n5‫½و‬
device. .19
(D)
start and play Y ‫رٹا‬
pick and play Y plug and play Y take and play Y ‫ا‬
‫ا‬G ‫”ا‬
(C) (B) (A)
The best example of internal storage
20.device is: : ‫ل‬ ‫ا‬Ę ‫رجڈ‬y n‫ا‬
.20
RAM RAM (D)
Hard Disk Z ‫رڈ‬ USB USB CD CD
‫ڈ‬
(C) (B) (A)
21. The best example of
: ‫ل‬ ‫ا‬Ę ‫رجڈ‬n ‫ ا‬21.
external storage device is:
(D) CPU Ę 4 (C) ROM ‫روم‬ (B) RAM ‫( ر‬A)
USB ‫ا‬Ę
22. Any physical device capable of storing data : ť ، ‫ ÷ر‬c ‫ظ‬dM ‫ ڈ‬J ‫دىآ‬l ‫ا‬ .22
is called:
(D) (C) (B)
RAM ‫ر‬ memory 4‫رى‬ device ‫ا‬Ę‫ڈ‬ hardware ½ ‫( رڈو‬A)
23.Volatile : d ťU‫وو‬ .23
means:
durable :‫( د‬D) permanent (C) unstable ‫÷ر‬
‫( ا‬B) stable ‫÷ر‬
‫( ا‬A)

24. 1 petabyte is equal


to ...... ‫ ۔‬ť c‫ا‬c S ....... .24
(C) (B)
(1024)5 bytes (1024)6 bytes (1024)4 bytes (A)
(1024)7 (D)

25.bytes 1 Megabyte is ť c‫ا‬c S ...... 1 .25


(C) (B)
1024 KB 1024 MB 1024 GB (A)
equal to ......

1024 TB (D) : Ęť wd 4‫رى‬ .26


bit file ť (B) word D (A)
26.The smallest unit of
memory: : MB .27
number (D) Mega base Mega bit (B) Mega byte (A)
27. MB stands for: : c‫ا‬c MBĢ‫ ا‬.28
(D)
t 10244 bytes 10243 bytes 10242 bytes (A)
Magnetic byte

28.One MB is equal to: (C) : JűU .29


10245 bytes (D) Base digit Z . Byte digit Z . . Binary digit Z ‫( ;ىڈ‬A)
.‫ڈ‬ ‫ڈ‬
29.Bit stands for: (C) (B) .30

Basic digit Z (D)


.....................‫ڈ‬Y
(C) (B)
Expression (A+B).(A+C) is equal to
30....... ‫۔‬ c‫ا‬c S .......(A+C).(A+B)ƒ ‫ا‬
(D) (B) (A)
A+(B+C)
A.(B.C) A.B+A.C A+(B.C)
(C)
Every preposition takes one of the two values "true or
31.
false". Thes values are called:
: ƯM ť ‫ار‬ñ ‫۔ا نا‬ Ģ "Aţ " ‫ا‬ ‫روں‬ñ‫د و‬ƒ‫ز‬E‫ى‬2y 31.
true values ‫ز ُوو‬c wrong values ‫ز و‬fi ‫رو‬ false values ‫(ز و‬ť truth values ‫ز و‬ø‫و‬c
(D) (C) (B) (A)
...... is the type of Boolean proposition that consists of two .32
32. ‫۔‬ 2 ‫ز‬E‫ى‬2‫دہ‬ţ ‫ز‬ţ‫ و ہ⎛ د و‬ƒ‫ز‬E‫ى‬E...... 2
or more propositions.
truth value ‫و‬ø‫و‬c ƒ‫ز‬E ‫ہ‬2‫( ى‬C) ƒ‫ز‬E2‫ ى‬d (B) basic proposition ƒ‫ز‬E2‫ى‬Y
(D) complex common (A)
proposition proposition

(C)
33. If both propositions are
.33 c :é‫ا‬cS‫اس‬ffi، P.Q ‫ز د ر‬E‫ى‬2‫ں‬E‫د و‬É‫ا‬
true, then P.Q will be equal to: P = I live in
n‫ا‬D‫ ن‬Q = ، ‫ ن ر ¼ ں‬P =
Punjab , Q = My country is
(B) (C)
Pakistan

(A)Identity Law ‫ن‬Eť ‫ ذا اور‬p (D) Negation Ä True ‫در‬ False A


34. Total number of logical
.34operators are: ‫دا ۔‬ 2 ‫ وا‬U
4 3 1 (A)
2 (D) (C) (B)
.35 ţ:‫ ا ا™رف وا‬E
35. Who developed Boolean
Charles Baggage ( George Boole E ‫رج‬ Von Newmann o‫( وون‬A)
Algebra? Dennis Ritchie
(D) (C) (B)
.36
T‫ر ڈ‬
36. Which one of the following sentences is a : ƒ‫ز‬E‫ى‬2 ¢‫ن‬M ‫درجذ‬
proposition:
(C)
I play Chess ‫ں‬
(D) Sit down ‫ و‬‰ How are U? ‫؟‬ffi ‫( آپ‬B) door the Close ‫ و‬D‫( دروازہ‬A)
37. In Boolean algebra, P and Q is
written as: : ť DMPANDQ ‫ ا‬E .37
P.Q P-Q P + Q (A)
P ^ (D)
Q (C) (B) .38
38. This law states that in Boolean Algebra, "the order of : "‫۔‬ ‫ ا‬: ‫وں‬2 ‫" دوا ا‬، ‫ ا ا‬E1 ‫ن‬Eť
two separate propositions is not imp. ortant." It is:
¸xãr
Distributive law +. ِ ‫( ن‬D) Commutative law J‫د‬Eِ ‫( ن‬C) Associative law ‫زم‬Gِ ‫( ن‬B) Identity law ‫ن‬Eť ‫ ذا اور‬p (A)
Eť Eť Eť

39. A proposition is a sentence that can


either be: : ™ ţ Ģ‫ا‬ƒ‫ز‬E 2‫ى‬Ģ‫ا‬
.39
none of these M ‫( ان‬D)
B B & A both‫ا ور‬A‫ں‬E‫دو‬ false true ‫در‬
A
(C) (B) (A)
40. By negating a negative preposition, we get a ……
preposition: ‫۔‬ bƒ‫ز‬E 2‫ى‬.…… c ƒ2 ‫وا‬NOT2ƒ‫ز‬E 2‫§ى‬J
.40
None of these M ‫( ان‬D) (C) (B) (A)
Both ‫ں‬E ‫د و‬ Positive Negative §

Q3. Choose the correct answer. 1X40=40


x‫دا‬2 ‫ ر ا ت در‬3. ‫ال‬ć‫ہ ۔‬
1. E-mail stands for: : d ....... 1. ‫اى‬
. tr
Electronic message $. ”‫( و‬D) Electronic medium ”‫و ا‬ Electronic mail ”‫و ا‬ Electrical mail ‫(ا‬A)
‫ا‬ (C) (B)
2. Caeser used this method of for sending messages to his
‫۔‬Ư‫ ا ل‬ĢS Ad ‫ت‬M l‫ ں‬n‫ںاور‬ ‫ا‬c‫ ½ر‬2.
soldiers and generals.
Patent ‫ز‬Ę‫ورا وور‬/ d (C) Confidentiality ‫رازدارى‬ Encyption ‫رى‬d
(D) (B) (A)
Client server over
use

3. The most well-known example of network of


networks is: : ‫ر ل‬ "‫ و رك‬d ‫ " و ر‬3.
Computers Network ‫ورك‬ (D) ‫( ورك ن‬C) Internet y‫(ا‬B) ‫ ورك‬:ţ ‫ ا‬f )A(
Telephone Local Area
Network Ne twork
. ¸
4. system
How many
are?basic components of communication
x. tF. ,

6 5 3
(D) (C)
‫؟‬ffi ‫اء‬n ‫دىا‬TSj .4
1
(B) (A)

5. Devices in a computer network are connected to each


ffi: ‫ے‬/‫د و‬Ģ ‫د ا‬s ‫ت‬U ‫ و رك آ‬c 5.
other with the help of ......
Server ‫ور‬/ Client Address ‫را‬ Channel
(D) d (C) (B) (A)

6. In our daily life, we use


computers to: ffi: ‫ا ل‬Jń Mc ‫ہز‬ç‫ ا ر وز‬6.
ABC all ‫م‬ÙABC (D) .
ĢS ‫زد‬Ę ‫ و‬U ‫( آن‬C) ĢSc ‫ل‬P‫و‬/ãx . ‫( اى‬B) ĢSc y‫( ا‬A)
watch online send / receive browse the
videos emails internet

7. Networking of computers helps a network user to


share: : ‫د‬c s ‫ا;اك‬M‫رف‬bS‫و رك‬ ‫ور‬ ‫ز‬c 7.
ABC all ‫ ں‬ABC (D) r (C) (B) (A)
devices ux ‫ا‬Ę files ť hardware ½ ‫رڈو‬
‫ڈ‬

8. The computer that is providing that storage space is


called: : ť ، ť ‫ )ر ا‬ĢS ‫ر‬n1 c .8
DropBox ‫( ڈراپ‬D)
workstation ‫( ورك‬C) Server ‫ور‬/ (B) LAN ‫ن‬U (A)
9. A computer that get services from a server is
known as:
: ťƯ ‫ ا‬ť b‫ت‬l ‫ور‬/ c Ģ9. ‫ا‬
client d (D) (C) (B) (A)
website ¢ ‫و‬ guest host A

10. A client is a process that accesses services


provided by a: : ;1 /‫ و‬f‫ ا‬2‫و‬Ģ‫ ا‬d .10
server ‫ور‬/ (D)
website ¢ ‫و‬ host internet y‫ا‬
A
(C) (B) (A)
11. Networks are connected together to make a
large ...... ffi: ‫ ا‬Ģ‫ا‬ ‫ و ر آ‬11.
(A) None of these M ‫ان‬
(D) Network ‫( ورك‬C) System j
(B)
Group ‫وپ‬É
12. The example of ATM
.12 : ‫ل‬ ‫ا‬ß‫اے‬
machine is: Internet sharing
(D) fi ƒ ‫( ا‬C) Hardware sharing fi ½ ‫( رڈو‬B) File sharing fi ť (A)
Application
fi y‫ا‬
sharing
‫۔‬ffi‫م‬Ú‫ ا‬f .13
13. The types of topology is: Two ‫دو‬ One Ģ‫( ا‬A)
Four ‫( ر‬D) Three (C)
(B)
14. In Star topology, all devices are connected to a
‫ س‬،‫ ا‬ffi ‫ے‬ ‫ا‬ç E1‫ذر‬Ģ S ‫تا‬U ‫مآ‬f Ù ‫ ر‬.14
common point via a cable, this common point is called:
: ť ƯM ‫ا‬E 1
Cable (D) Server ‫ور‬/ (C) Hub ÷ (A)
Button (B)
.
15. A topology connects all devices with each other ،ffi ‫ ى‬ç‫ذر‬S‫ر‬ťø¢S‫ے‬/‫د و‬Ģ ‫اہر ا ا‬/c‫ا‬Ę ‫مڈ‬Ģ f Ù‫ ا‬.15
through a direct link is called: :ffi
Mesh topology f (D) Ring topology f fi ‫( ر‬C) Star topology f ‫( ر‬B) Bus topology f (A)

16. A topology that can send data either clockwise or


: ، ™ JM ‫ڈ‬ f ‫ا‬ .16
anticlockwise is knows as:
. ¸r . ¸r . ¸r . ¸r
.
f fi‫ ر‬x ć ‫( ڈا‬D) f fi‫ ر‬x ć ‫( ڈا‬C) f fi‫ ر‬x ć5‫ڈا‬Ę (B) f fi‫ ر‬x ć ‫( ڈا‬A)
single-directional ring multidirectional ring unidirectional ring bidirectional ring
topology topology topology topology

17. Exchange of data between sending and receiving


d ‫ڈ‬ć ‫ا ل‬J M‫ن‬Ę‫د ر‬S‫ت‬U ‫آ‬L‫و ا‬c ‫ل‬P ‫اورو‬ã ‫ ڈ‬.17
devices through some communication medium is
: ť J‫د‬
termed as:
¸. (B) (A)
.
data communication (D) data sending fi ‫( ڈ‬C) data storing fi‫ر‬n data processing ‫ ڈ‬2‫و‬
x. tF. , ‫ڈ‬

18. A device that receives a message


is called: : Ư ť ‫ ا‬ť ‫ل‬Pr‫م‬ J ‫آ‬Ģ‫ا‬
.18
packer ‰ (C) Both of these ‫ں‬E ‫( د و‬B)
(D) reciever U ‫وا‬c ‫ل‬P‫و‬ sender U ‫وا‬ã
19. Sink is another name of:

system j(D) message $. (C) sender U ‫وا‬ã


. tr
20. The medium can be a:

ABC all ‫ ں‬ABC (D) (C) (B)


fiber optic cable Zِ ‫آ‬
21. How many parts of message? microwaves ‫ز‬Ę‫ وو‬l ½ť

Four ‫( ر‬D) (C) (B)


Three Two ‫دو‬
22. Control information of message is

called: None of these (D)


M ‫ان‬ (C) (B)
Header ‫ر‬ mess receiver U ‫وا‬c ‫ل‬P‫و‬ One Ģ‫ا‬
(B) (A)
.22 age $. : ™ Ģ‫ا‬ : d ť‫م‬ ‫ ولا ر‬.20
. tr
(A) copper wire ć2‫وا‬d Play load ‫ڈ‬fY (A)

.19 : ‫م‬ť‫ا‬/‫د و‬d ‫ ؟‬ť 2‫ں‬A $ .21. . tr


.23
23.........A is a formal agreement between two : ť ‫( ہ‬k ‫ر‬Ģ ‫نا‬Ę‫د ر‬S‫ں‬Ứf‫دو‬
parties is called:
(C) (B)
Protocol ‫ل‬Mc2‫و‬
(D) Information ‫را‬ Header ‫ر‬ Message ‫( م‬A)
24............................TCP/IP
model has ‫۔‬ffi .......... ‫ڈل‬lTCP/IP .24
(C) (B)
layers. 4 3 2 (A)
5 (D)
25.FTP is an abbreviation of: : FTP .25
File Tele-Protocol ‫ل‬Mc2‫و‬ ť(D) ‫ل‬Mc‫ا‬¢2‫و‬c ť (C) ‫ل‬Mc‫ا‬¢2‫و‬c ť (B) ‫ل‬Mc2‫و‬ ť (A)
File Transfer File Transport File Testing
26.What is SMTP? Protocol Protocol Protocol

‫ل‬Mc‫ا‬¢2‫و‬c ł (D) ‫ ؟‬ƯSMTP .26


Smile Mail Transfer
‫ل‬Mc‫ا‬¢2‫و‬c l (C) ‫ل‬Mc‫ا‬¢2‫و‬c ‫ل‬ł (B) ِ¥
‫ل‬Mc‫ا‬¢2‫و‬c (A)
Protocol
Slow Mail Transfer Small Mail Transfer Simple Mail Transfer
Protocol Protocol Protocol
.27
27. Transport layer establishes connection between a
server and a: : ťƒ(‫ن‬Ę‫د ر‬Ģ S ‫ ½ وراورا‬/‫ا رٹ‬c
client (D) (C) (B) (A)
dealer 4‫ڈ‬ agent ‫ا‬ customer Q
d

The unit of data sent from one device to another is


28.called: : Ęd ť ‫ڈ‬L‫و ا‬M c ‫ا‬Ę ‫ےڈ‬/‫د و‬ ‫ا‬Ę ‫ڈ‬Ģ‫ا‬
.28
address ‫( ر ا‬D) (C) (B) (A)
. tr
packet information ƒ‫ر ا‬ message $.

29. If an IP address is fixed in a network, it


is called: : Ư ť ‫ا ر ‡ ا‬IP ‫ و رك‬JÉ‫ا‬ .29
solid IP address ‫ر ا‬IPß ِ (D) (B) (A)
‫ر ا‬IP ‫( ڈا‬C) frozen IP address ‫ر ا‬IP ‫)وزن‬ static IP address ‫ر ا‬IP
x dynamic IP
address

30............................................The IPv4 address is


made up of..........................................binary bits. ‫ ۔‬T ‫;ى‬ ‫ا ر‬IPv4 .30
30 (D) (C) 29 (B) 31 (A)

32 ‫۔‬ d......DHCP .31

31. DHCP stands for ......


None of
(D) (C) (B) (A)
these
Dynamic host configuration Dynamic host computer Data hosting computer
protocol protocol protocol

32. Bits required to


store w hole IP address in : ‫ورت‬p ĢSc ‫ہ ذ‬M ‫ر ا‬IP IPv4
IPv4: .32
(C)
128 bits ß. ِ 128
(D) 64 bits ß. ِ 32 bits ß. ِ (B) 16 bits ß. ِ 16 (A)
64 32
33. 172.16.54.1 is an example of ...... ‫ ل‬Ģ172.16.54.1 ‫ ا‬.33
......
Protocol ‫ل‬Mc2(A)
‫و‬
DNS ‫ڈىا ا‬ IPv4 Address ‫ر ا‬IPv4 Domain ‫ڈو‬ (D)
(C) (B) .34
34. Maximum bits required to store each
group of IPv6: ‫ورت ۔‬p ‫دہ‬ţ‫ز‬ ‫دہ‬ţ ‫ز‬ĢSc ‫ذ ہ‬M‫وپ‬ÉySIPv6
16 bits ß. ِ (D) 8 bits ß. ِ 6 bits ß. ِ 4 bits ß. ِ 4
16 8 6
(C) (B) (A)
35. In order to an easy access the www,
we use: :ffi ‫ ل ا‬،Ģ S ¢‫آ‬¢ ‫”نر‬www .35
web address ‫ر ا و‬ (D) web software ½‫ و‬¢ ‫( و‬C) web browsers ‫اؤزرز‬c ‫( و‬B) web servers ‫ و‬/‫( ورز‬A)
36. It is a unique
identifier: : ‫ہ‬fi÷ ‫§د‬Ģ‫ا‬ .36
DHCP Router IP (A)
Server (D)
(C) (B)
37. Routing is process of taking data from one device and
ML 2 ‫ےآ‬/‫د و‬SL ‫ ڈ‬L ‫آ‬Ģ ‫ا‬ J ‫رو ا‬ .37
sending it to another device in different ......
‫۔‬ť
Area ţ:‫ا‬ Path ø (C) Network ‫( ورك‬B)
(A) (D) Channel
38....................................Routers
.38connect multiple ‫۔‬ffi ‫ ڑ‬ø¢Ģ‫ا‬ ‫د‬n‫ز‬c‫راؤ‬
. .r
together. addresses / Ix ‫( ا‬C)
‫ر‬ channels (B) networks ‫( ور‬A)
protocols Mc2‫( و‬D) : dISP .39
39. ISP is an abbreviation of: ‫وس‬2‫ر َوا و‬/ y‫( ا‬C) ‫وس‬2‫ر َوا و‬/ y‫( ا‬B) ‫½ ا‬/‫وس‬2‫( ر َوا و‬A)
Internet Service Internal Service Interior Service
‫وس‬2‫ر َوا و‬/ƒ‫( ر ا‬D) Provider Provider Provider
Information Service Provider

40. A networking device that forwards data packets from


one network to another is called:
2‫ے و رك‬/‫ و رك د و‬Ģ ‫ا‬M ‫ا ڈ‬Ę ‫ و ر ڈ‬Ģ‫ ا‬.40
: ťƯ ‫ا‬
router c‫( راؤ‬D) thrower َ‫ور و‬ø (C) sender ‫ر‬ (B) rounder ‫ر راؤ‬ (A)
Q4. Choose the correct answer. 1X46=46 ‫ہ ۔‬ć‫دا‬2 ‫ ر ا ت در‬4. ‫ال‬x
1. Which of the following doesn't includes the types of ‫؟‬ ‫م‬Ú ‫ ½ ا‬Ư ¢ ‫ درجذ‬1.
software piracy?
Online piracy ½ U ‫آن‬ .
(A) (D) (B) ‫ز‬Ę‫ورا وور‬/ d (C) Liability ‫ذ‬3‫دارى‬ Softlifting G t9 ¢
Client server
2. Which of the following is not a overuse
cybercrime? ‫؟‬ (‫ ا‬¢¢½‫ن‬M ‫ درجذ‬2.
(D)
(A) Decryption (B)
‫ڈ‬ Identity theft ‫رى‬ ÷ Phishing crime (‫ ا‬G Hacking
. ¸
(C) x
¸.
3. Which of the following is not the characteristics of phishing ‫؟‬ n ‫ا ى‬J¢ x G‫ن‬M ‫ درجذ‬3 .
emails?
(C)
‫ و ا‬¢ ‫( ڈو‬D) Similar
IT reminder 5 ‫دد‬ţß ‫آ‬ ‫ا پڈ ؤ‬d‫( ا اى‬B) ‫ع‬P‫ا فورزى رىڈ‬d/ (A)
domain of actual website
Email account Official data breach
update notification

4. Which of the following is not characteristics of phishing ¸.


website? ‫۔‬ n ¢ ‫و‬x G ‫ درجذ‬4 .
‫ا پڈ ؤ‬d‫( ا اى‬D)
‫ا اد‬r ‫( و‬C) ‫ل ا‬d ‫رم‬ťĢSc ŤM ć ‫( زا‬B) ‫ و ا‬¢ ‫( ڈو‬A) Similar
Email account
Actual link to web Using of forms to collect domain of actual website
updates
content visitors

5. Which of the following is not a characteristics of good


password? ‫؟‬ n ‫ا سو رڈ‬4‫ن‬M ‫ درجذ‬5.
2‫م‬ťS ‫فآپ‬p ‫( سورڈ‬D)
2‫وف‬s‫( ے‬C) y 2 ‫ر‬Ę (B) E‫ا‬P sø‫( آ‬A)
Password is your name
Contains uppercase Doesn't contains Is eight characters
only
letters username long

6........is a serious attack on a computer


system. : ƒĢ2jc
‫ ا‬.................6
Sabotage ‫رى‬d / (D) Patient Copyright ‫ را‬d (B) Trade secrets ‫راز ر‬fi (A)
(C)
7. Protecting data from malicious users is .
called: : ‫ڈ‬b ť ‫زرز ڈ‬ĘL‫و ا‬c3‫ر‬p 7 .
Data saving ‫ہ ذ‬d ‫( ڈ‬D) (C) (B) ´ (A)
Data hiding J E ‫ڈ‬ privacy Data ‫ڈ رازدارى‬ Data security ß‫ر‬c ‫ڈ‬

8. Illegal copying, distribution or usage of software is


termed as: : ť ‫ وا را ل‬،ť ‫ و ½ ل ر‬¢ 8.
Data piracy ć ‫( ڈ‬D)
Draft piracy ć ‫دہ‬ Software piracy ć ½‫ و‬¢ Illegal piracy ć 5Eť
(C) (B) (A)
9. One of the following is NOT a types of
piracy: ‫؛‬ ‫م‬Ú ‫ ا‬Ģ ć ‫ا‬ ‫ درجذ‬9.
Online piracy ć U ‫( آن‬D) .
Data piracy ć ‫ڈ‬ Fraud and misuse ‫ل ا‬A ‫) ڈا ا ور‬ Soft lifting G t9 ¢
(C) (B) (A)

10.Borrowing and installing a copy of a software from a : ť ť ‫ ا ل‬d ‫ و ½ وا راس‬¢ ţ ¢$ ‫د و‬J .10
colleague is know as:
Online piracy ć U ‫( آن‬D) .
Soft lifting G t9 (C) Hard disk loading fi‫ڈ‬fZ ‫(رڈڈ‬B) ‫ز‬Ę‫ورا وور‬/ d (A)
¢ Client-server
overuse

11.Downloading illegal software from internet is


called: : ť ť ‫ڈ‬f‫ و ½ڈ اؤن‬y ¢5Eť‫ ا‬11.
‫ل ا‬A ‫( ) ڈا ا ور‬D) . (B) (A)
Fraud and G t9 ¢5Eť Online piracy ć U ‫آن‬ Hard disk loading fi‫ڈ‬fZ‫رڈڈ‬
misuse (C) Illegal
soft lifting
.12
12.Some software companies sell software with a
:ffi ........ ،ffi ÷‫)و‬ø¢S M½‫ ں ½و‬¢ ‫ و‬¢
confidential text, called the:
Description ½‫ و‬¢ (C) Encryption ‫رى‬d Password ‫سورڈ‬
½E (D) Key of that (B) (A)
software

...... means making illegal and unauthorized copies of the


13. ‫ر ہ ز‬U ،5Eť ½‫ و‬¢ S ‫ زت ا‬Ml1 ad...... .13
software without owner's permission.

Privacy 2‫ا‬ Piracy ½ (C) Browsing fi ‫اؤز‬c (B) Right ‫( را‬A)
(D)
14. The way that is used to protect an idea is
: ť Ad÷‫ د‬Mţ ‫آ‬J .14
called: Prohibited idea ĩf‫ع‬
(D) Patent (C) Trade marks ‫ر‬l c (B) Copyright ‡ ‫ را‬d (A)
15.Installing more copies of the software than you have : ť ť ‫ںا ل‬Gd ½ ‫ و‬¢‫دہ‬ţ ‫ز‬ U‫ س‬S ‫آ پ‬ .15
licence for is called:
Online piracy ć ‫ن‬U ‫آن‬ . (C)
(D) Counter felting G Hard disk loading fi‫ڈ‬fZ‫رڈڈ‬ ‫ز‬F. ُ ‫ورا وور‬/ d (A)
t . y ‫ؤ‬d (B) Client server over
16....... is the process of encoding use
data: Availability
(D) ‫د‬ : Jdc fi‫ڈ“ا‬M ‫ڈ‬...... .16
(C) Patent
Confidentially ‫رازدارى‬ (B) Sabotage ‫رى‬d / (A)
17........is responsibe for the protection of your ‫د ارى ۔‬3 ‫ذ‬ S ‫ڈ‬5‫ا‬ńAS‫آ پ‬......
family data. .17
(C)
(A) NADRA ‫درا‬ť
(D) (B) DPO ‫ڈى او‬ FIA ‫ا آ ا ے‬ Army 4 ‫آر‬
18. Open source software have
.18 no: ffi: ½2 ‫ و‬¢‫رس‬x ‫وا‬
.. Safety rights ‡ ‫را‬ Piracy rights ‡ ‫ را‬ć (B) Copy rights ‡ ‫ را‬d (A)
Selling rights ‡‫( )را و‬D)
(C)
The law which says that a product cannot be copied, is .19
19.called: : ť ، ‫ر‬ ‫ ڈا‬B 2J1‫ن ر و‬Eť ‫ا‬
Restriction law ‫ن‬Eť‫ع‬ (D) Copyright law U ‫ را‬d (C) Trade law U (B) patent law U (A)
c

Most of the software products are


20.copyright: :ffi ‫ ر ا‬d‫ت‬L ½‫ و‬¢ .20
´
Secured ‫رڈ‬c (D) Listed ‫را‬ń‫ا‬ Protected Bound D
‫ظ‬d
(C) (B) (A)
21. Nadra keeps a huge data records of all the
citizens of: ‫؟‬ ‫ ڈر‬ţ‫ ہدر‬ţ‫ ز‬d‫ں‬Ę ‫م‬Ù ‫درا‬ť 21.
China S (D) (C) (B) (A)
Pakistan S‫ن‬ Australia America S ç‫ا‬
SG;‫آ‬

22. CCTV stands for:


. t› : CCTV .22
‫ ن و‬/ItF (D) J
Compact circuit ‫زڈ‬/ ‫ن و‬P (C) ‫ ن و‬/ (B) ‫ ن و‬/ (A) Clear
television Closed circuit Complete circuit circuit television
television television
.23
The foundation of all security system is
23.formed on: : (ť2‫د‬T ß‫ر‬c ´ ‫م‬Ù
Ethical principles ‫ا‬ ‫( ا‬D) ´
Moral laws Security laws ‫ ا‬ß‫ر‬c Social laws ‫ ا‬ł
5b ‫رو‬
(C) (B) (A)
. . t .r .24
24. It is the responsibility of my bank not to share my
:‫ ے‬y ƒä‫ا‬c G .tF . ‫ى‬D1 ‫ے‬ ‫ذ‬3‫د ارى‬D
banking transaction with my:

Relatives M ‫داروں;ر‬ .
(D) Employees M ‫ز‬A (C) Competitors M‫ں‬¤ . s‫( ر‬B) Family ٍMyA ‫( ا‬A)
25.The example of piracy is:
‫ى ر‬d : ‫ل‬ ½ .25
All of these ‫م‬Ù (D)
Software ½‫ و‬¢ (C) (B) Book ‫ب‬B (A)
26.Patent is a way to protect an
...... Poem ‫)ى‬ : AĢ‫ا‬d ...............J .26
Copy d (B) Software ½‫ و‬¢ (A)
None of these M ‫( ان‬D)

(C)
Idea ţ ‫آ‬ .27
27. The information that is stored with web surfers is (C)
called: : ، ‫ذ ہ‬ø¢S‫ ز‬/) ‫ت و‬lP‫وہ‬
Patient of IT school education ƒ ‫ رڈآفا ٹا‬/‫لا‬E (C) Board
(D) Information ‫را‬
of institute and school
28.BISE is an abbreviation of: education
ƒ ‫كا‬xß ‫رڈآفآ‬E (D) Board
Cookies M ƒ ‫ا‬ ‫ رىا‬y‫رڈآفا‬E (B) Board ƒ ‫ا‬ ‫رىا‬y‫رڈآفا‬E (A) Board
(A)
Data ‫ڈ‬
of intermediate and of inter and second
secondary education : BISE education
.28
Integrity means that we want to keep .29
29.our data: :ffi÷ 1 ‫ر ڈ ا‬ d÷‫ا‬P
Correct ‫( در‬D)
Confidential ‫رازدارى‬ Secret ‫ ہ‬E Secure ‫ظ‬d
(C) (B) (A)
Companies store some piece of information with the web .30
30. : ، g ‫ظر‬dø¢S‫رف‬b ‫تو‬lP ‫ں‬
surferm it is called:
Testing Mind reading Ø ‫ذ‬ Cookies Storage ‫وزى‬ń ‫ذ ہا‬
(D) (C) n (B) (A)
31. Using "cookies", companies are able
to gather:
:ffi ťSc ‫ ںا‬ć ‫ ل ا‬M .31
Business date ‫رىڈ رو‬d (D)
Personal data ‫ڈ ذا‬ (C) Computer data ‫ڈ‬c (B) Marketing data ‫ر‬ ‫ڈ‬l (A)
32. The process of encoding data in such a way that only
: ffi4، ť‫زا )اد ا ھ‬U‫ف‬pSť ‫رى‬d ‫ح‬A‫ڈ اس‬ .32
authorized person, can read it, it is called:

Authorization ƒa‫ا‬ø‫ا‬ ¸ ¸ ¸
. . . . .
(D) Decryption ‫( ڈى‬C) Description (B) Encryption ‫ان‬
(A)
33............................................Vige ¸ .
‫ ۔‬............ ,a. ,¢/. , t. É‫ و‬.33
.
nere Cipher table consist of /‫ڈ‬ ‫روں‬2
rows.
25 (C) (B) 36 (A)
24 (D)
26 .34
34. "Experience is the teacher of all things." It is the
famous quote of: : ‫ ر ل‬d‫ا ™د ۔"اس‬y; d "
Aristotle nِ ‫(ر‬D) . ¸
‫ا‬ Plato
(C)
Alexander ‫ا‬ ‫ر‬ Julius Caesar ‫ ر‬/ . ut .
cG (B) (A)
¸ .35
35.....................................................................M : ...... ť‫ ڑ‬M‫ت‬l ½ć ‫ل ا‬S,a. ,¢‫½ر‬
essages encrypted with the Caeser cipher are very
to
crack.
None of these M ‫ان‬ (C) (B)
(A) (D) Complex ‫ہ‬ Difficult Easy ‫آ‬¢‫ن‬
36. The Roman politician and military
.36general was: B:‫ د اناور ى½ ل‬Ģd‫روم‬
(D)
(A) Aristotle (B) (C) ¸
b ‫وا‬ Alexander ‫ا‬ ‫ر‬ Caeser ‫½ر‬ Cipher ,a. ,¢

37.........is used to protect sensitive data, including .37


personal : ‫ت‬lP ‫سڈ ÷ ا )اد ذ ا‬......F
information for individuals.
Password ‫رڈ‬x (D) (A)
Patient ‫( ز‬B) Encryption ‫رى‬d
(C) Protection from
hackers

38. 'PAK' "three characters substitution to the right" : ‫ و ا‬¢¢‫ دل" ½ر‬d‫وف‬s ÷ ‫'دا‬PAK' " .38
result caesar cipher return:

(A) RST (D) (B) DBO (C) SDN OPQ


39................................................A good
.39password should be at least...............characters : ť ‫{ وف‬s‫ا سو رڈ{ ا ز‬Ģ‫ا‬
long: 12 8 8(B) 4 4 (A)
12
16 (D) .40
16
(C)
40. A crime in which computer network or devices
are used is called.....
: Ư ť ‫ ا‬Ư ť‫تا ل‬U ‫آ‬ţ‫ و رك‬c ‫م‬nĢ‫ا‬
None of these M ‫ان‬ Virus ‫س‬ć ‫وا‬ Cyber crime (‫½ ا‬¢ Hacking
(D) (C) (B) (A)
41. A crime in which computer network or devices are
used is called: : Ư ť‫ و ركا ل‬c ‫م‬n 41.
Cyber crime (‫½ ا‬¢ (D)
Web-crime (‫و‬ ‫( ا‬C) Online-crime (‫ ا‬U ‫آن‬ Net-crime (‫ا‬
(B) (A)
42........is a cyber attack to make machine or network
resources ťS‫ا ل‬S‫رف‬bM ¢ ‫ و ركو‬J ţ ‫ ا‬¢½ ‫ ا‬...... .42
unavailable for a user: : ‫د‬
Piracy ć 43. FIA is an ‫ ا‬y‫رلا‬ internet agency
(D) abbreviation of: (D) Federal
Hacking (C)
Phishing (B) Federal investigation
. ¸ agency DOS ‫( ڈاس‬A)
G x (B)
: FIA .43
‫( ا رلا‬C) Federal
interior agency ¸ ‫ا‬ƒ‫( ر رلا‬A)
. x. tÉ
‫ا‬ E‫رلا‬ Federal information
agency
.44
44. A cyber-attack to make machine or network resources
unavailable is known as:
: ť ť ‫م‬ťS ‫ا‬y ½¢ĢSc‫د ب‬M ¢ ‫و‬S‫ و رك‬ţ
web attack ‫ا و‬ virus attack ‫سا‬ć ‫وا‬ DOS attack ‫ڈاسا‬ cybercrime ‫½ ام‬¢
(D) (C) (B) (A)
45.................................Hackers may use fake .45
to trap someone to give passwords ‫۔‬ffi ‫ا ل‬b fiĢSc d‫ت‬lP ‫ؤ‬d ‫رڈاورا‬x ‫ز‬
and account information.
All of these ‫م‬Ù (D) (C) (B) . (A)
Accounts ‫ؤ‬d‫ا‬ Passwords ‫رڈز‬x E-mails x . ‫اى‬
46. Illegally accessing someone else's computer
is called:
‫ ۔‬ť ť b ¢‫”ر‬c S ‫د و‬/‫ے‬J2‫ر‬P5Eť
.46

All of these ‫م‬Ù (C) (B) (A)


(D) Piracy ć Hacking Theft ‫رى‬

Q5. Choose the correct answer. 1X40=40


x‫دا‬2 ‫ ر ا ت در‬5. ‫ال‬ć‫ہ ۔‬
1. HTML is not a ‫ ۔‬..................Ģ‫اڈ‬MHTML .1
language.
Both ‫ں‬E ‫دو‬ Markup ‫ركاپ‬l Programming ½‫ا‬É2‫(و‬A)
None of above (D)
M
(C) (B)
2. Webpages can be created and modified by
using ...... ‫ ۔‬ť Ư ţţ ć ‫ل ا‬d ..................M 2. ‫و‬
All of (D) (C) (B) (A)
above Text edit Notepad Notepad ++

3. An HTML element usually consists of a


tags. ‫ ۔‬ť 2Ć ..............2‫ر‬P‫م‬L§HTMLĢ3. ‫ا‬
None of (D)
Start and End Start
these
End
(C) (B) (A)
4. The......element is a container for metadata (data
about data). ‫ر ڈ ر ۔‬ń ‫ ا ا‬4.
<html> (D) (C) (B) (A)
<title> <head> <body>

5. To save the HTML page, you can use. .as file


extension. ‫۔‬ffi ‫ا‬ ‫ ل ا‬............. ĢSc ‫ظ‬dM HTMLĢ5. ‫ا‬
both ‫ں‬E ‫دو‬
(D) A & B B ‫ا ور‬A (C) html (B) htm htm(A)
6. HTML document starts with html
tag: : ť ;‫ وع‬................ ‫ڈ ا‬ HTML .6
</ (B) <htm>
(A)
<hr>(D) html> <html
>
(C)
7. HTML document primarily consists of .
sections: ‫ ؟‬ť 2Ć . 2‫ر‬P ‫دى‬T ‫ڈ ا‬HTML .7
Four ‫( ر‬D) (C) (B)
Three Two ‫دو‬ One Ģ‫( ا‬A)
8. Head section ends with:
: ť ‫م ا‬dƒ .8
</head> (D) </body> </html> </tittle> (A)
<head/> <body/> <html/> <tittle/>
(C) (B)
9. By clicking on.....we can move from one webpage to
another: ‫؛‬ffi4 2 ‫ےو‬/‫د و‬ ‫و‬Ģ ‫ا‬ ð2 c 9
Image ‫( ا‬D) (C) (B)
Hypertext Hyperlinks Markup ‫ركاپ‬l (A)

10. To learn about the web page designing following .10


language is required to learn ......
‫ورى ۔‬M p‫د رجذ ز ن‬ĢS ‫ رے‬S ‫ا‬2 ‫ڈ‬ ‫و‬
JAVA GW BASIC HTML C++(A)
(D) (C) (B)
11................<p ‫ ۔‬............Ģ‫<ا‬p> .11
> is a
tag. (C) (B)
Ending fi ‫ا‬ double
(D)
(D) Singular f½ Closing fi‫ز‬P
12..............<br> is
tag.
single singular
(A)
Opening ‫او‬ ‫۔‬ <br> paired
(A)
.12
...................
(C) (B) .13
13. To specify a title of the page
we use: :ffi ‫ ل ا‬ĢSc ‫ و ان‬SØ
<h1> tag
(D) <head> tag (C) <tr> tag (B) <title> tag
(A)
14. General structure of paired tags .
is: : ;‫½ل‬dĆ . ‫ ڈ‬.14
<p> </p> (C) </p> </p> (B) </p> <p> (A)
<p> <p> (D)
.15
15. Which one of the following is a : ‫ ڈ‬¢‫ن‬M ‫ر ذ‬n
paired tag: <br> (C) <href> (B) <p> (A)
.
<hr> (D) :ffi‫م‬Ú‫ ا‬Ć . .16
. . .
16. The two types of tags are: Ć . ‫( ا ورڈ‬C) Ć . ‫ڈ ا ور‬f½ Ć . ‫رل وا ر‬f½
. Single/double (B) Singular / (A) Singular/ plural
Ć . ‫ا ور‬
tags paired tags tags
(D) Single/
multiple tangs
. .
17. The tag which do not have closing tags are :ffi ، Ć . fi‫ز‬PS Ć . ‫ا‬
known as:
. (D) . (C) . (B) . (A)
Multiple tangs Ć . Double tags Ć . Singular tags Ć . Paired tags Ć . .17
‫ڈ‬
‫ڈ‬ f½

18. Which oen of the following symbol is used as


opening tag: : ‫ا ل‬2‫ر‬PS ‫ وا‬sf ‫ن‬M ‫درجذ‬
.18
{ } {}
(D) < > <> (C) </> () () (A)
19.WWW is an abbreviation </> (B)
: WWW .19
of: Wide web world ‫ور و وا‬ (D)
World wide web ‫و وا ور‬ (C) Working work web ‫و ور ور‬ (A)
20. HTML is an abbreviation is: World wide web ‫و وا ور‬ (B)
: HTML .20
‫ر‬l (D) Hyper
‫ركاپ‬l (C) ‫ركاپ‬l ½ (A) Higer
text marking language
Hyper text mark up ‫ركاپ‬l ‫( ½ى‬B) text markup language
21. The term hypertext is language Heavy text mark up
derived from: language ‫۔‬ ‫حا‬B‫ا‬ 21
HTML (A)
All of these(D)
Hyper link (C)
CSS (B) .22
22. Which of the following tag is used for the most
important heading: : ť ‫ا ل‬fi ĢS ‫ ا‬w ¢‫ن‬M ‫ر ذ‬n
<h4> <h4> (C)
(D) <h3> <h2> (B) (A)
<h1> <h1>
23. To make text bold, we <h3> <h2>
use tag: : ť ‫ل ا‬ĢSc EM .23
(B) (A)
<bi> <bi>
(D)
<bd> <bd>
<b> <b> <br>
<br> .24
(C)
24. Which tag is used to bold in
HTML? ‫ ؟‬ť ‫ ل ا‬ÚMĢSc E HTML
<v> (C) (B)
(D) <c <i <b> (A)
25. The latest version of > >
HTML is: : ‫ ورژن‬:v dHTML .25
HTML (A)
HTML5 (D)
HTML4 HTML2
(C) (B) .26
26........tag is used to Italic the
text. ‫۔‬ffi ‫ل ا‬ĢSc Mť‫ا‬M ......
<tr> (D) (C) (B) (A)
<a> <t> <i>

27. The <font> tag


specifies the: : ť Ư ‫ل ا‬ĢSc y <fon> .27
All of these ‫م‬Ù
(D) Color of text ٍPd (C) Font size a¢ (B) Font styles (A)
28. The number of heading tags .
is: : ‫ دا‬Ć . fi .28
Four ‫( ر‬C) Two ‫( دو‬B) One Ģ‫( ا‬A)
Six ø (D)

29. What kind of list will <ol> tag ‫؟‬éć ½ ⎛ <ol> .29
blank list A (C) ordered list ‫ وار‬: x. t(A)
r
create? inordered list :
(D) nested list
(B)
.30
30. The tag for unordered list is: : d ‫نا آ رڈر‬
<ul> <tr>
None of these(D) <ol> (A)
(C) (B)
31. Which tag is used to insert image into the
webpage? ‫ ؟‬ť ‫ ا ل‬¢‫ن‬MĢSc ‫د ا‬Ã: ‫ و‬31.
IMG (D) (C) (B) (A)
SCR PIC
IM

32. Tag used for images in a


web page: : Ư ť‫ ا ل‬:ĢS‫و‬ ‫و‬ .32
<bg> (D)
<backgroun <image> <img>
d>
(C) (B) (A)
33........attribute provides an altenate text for an
image: : ‫ٹ‬fi‫÷ا ى‬ĢS ‫دل د‬ Ã:
.33
All of (D) (B) (A)
text attr alt
these
(C)
34.......can improve the design and the appearance of a
webpage? : U ™‫ى‬ ‫ى‬y ‫ وا راور‬a‫ڈ ا‬S ‫و‬...... .34
Images :‫( و‬D)
Figures ‫( ل ا‬C) Text (B) Colors ‫ز‬P(A)
.
35. <a> and <a/> tags are :ffi ‫ل ا‬ĢS ‫اس‬Ć . </a> ‫< وا ر‬a>
used for: .35
(D) (A)
formating text ĢS ‫ر‬ť
ĢSc U‫( ا‬C) ĢSc d Ģ‫( ا‬B) adding image ť :Ã
alignment create a link to
text page

36. A link that allows you to go from one part of the


‫ ا زتد‬R c‫ے‬/‫ د و‬RĢ ‫ا‬Ģ S ‫ا‬M‫آ پ‬ Ģ‫ ا‬.36
same page to another part is called:
: ť
page link (D) anchor ‫( ا‬C) weblink (B) (A)
hyperlink
‫و‬

37. The icon, graphic or text in a webpage that when


2 ‫ےو‬/‫د و‬JM‫آ پ‬،ţ™ 1 Ưð ć‫ا‬É،‫آ ن‬d ‫ و‬.37
clicked , takes to you some other webpage is called:
: ť ، ťţL
Hyper link (C) (B)
(D) Next link High link Q link (A)
38. The tag for creating table in
HTML is:
: ĢSc HTML .38
<table> (C) <td> (B) <tr> (A)
<li>(D)
: dc ‫ ر‬S .39
39. The table row tag is: (C) (B)
<row> (C) <tr> (B) <td> (A)
<hr>(D)
: d‫ ر‬S .40
40. Table header tag is:
<header> <td> <tr> (A)
<th>(D)

You might also like