Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

INTERNATIONAL ISLAMIC UNIVERSITY ISLAMABAD SCHOOLS

MORGAH CAMPUS
End Of Year Examination 2023-2024
Name: Class:
Date: Time Duration: 03:00 hours
Subject: COMPUTER SCIENCE SSC - I Marks: /55
Section A (Marks 12)
Question 1: Choose the correct answers & fill the relevant bubble. /12
Questions A B C D A B C D
Which of the following authentication methodology is Username Personal Access
Biometrics
used to draw cash from ATM? & Identificati Card
password on Number
Which of the following authentication method is most Username Personal Access
Biometrics
Reliable? & Identificati Card
password on Number
Which of the following network provides centralized Point-to- Peer-to-
Client/ Local area
security? Point peer
server network
network
network
In which of the following network topology, switch is Star
Ring Bus Mesh
required?
Point to
Which of the following network is used to provide
LAN WAN MAN Point
Cable TV and Internet services?
network
In which type of data transmission start/stop bits Synchrono Satellite Asynchron Microwave
are used? us transmissio ous transmission
transmissio n transmissio
n n
Which of the following transmission media uses Coaxial Telephone Twisted Fibre optic
light waves for transmitting information? cable line pair cable cable

In which of the following impairment, the strength of Distortion Cross talk Attenuation Noise
signal falls off with distance?

What is used for creating decorative effects in Word? Paragraph Page Text WordArt
formatting formatting formatting

Which of the following command in Excel allows the Data Conditional Data Data
user to view only certain data in a worksheet based on validation formatting filtering manipulation
a condition?

Which of the following user interface is the easiest CLI Menu GUI DOS
one to learn and use? driven
interface
Who is responsible for protecting information and System Network Information Hardware
information systems from unauthorized people in an Analyst Administra Security Engineer
organization? tor Analyst
Who invented logarithm? Blaise Charles John Herman
Pascal Babbage Napeir Hollerith
INTERNATIONAL ISLAMIC UNIVERSITY ISLAMABAD SCHOOLS

MORGAH CAMPUS
End Of Year Examination 2023-2024
Name: Class:

Time allowed: 2:45 minutes Total Marks section B & C: 43


SECTION-B (Marks 27)
Question 2: Attempt all questions. (9 x 3=27)

Describe any five symptoms of malware. Compare 1st and 3rd generations of computer.
i. 1x3 OR
What is ISDN? What is meant by managing data and why is it
ii. 1x3 OR
important?
What are the tasks performed by Operating Differentiate between hacker and cracker.
iii. System?
1x3 OR
Differentiate between Half-Duplex and Full- Differentiate between attenuation and
iv. Duplex transmission modes. 1x3 OR distortion.
Give any three objectives of Operating System? What is meant by resources of computer?
v. 1x3 OR
Differentiate between systems and application Define UNIX and Windows operating system.
vi. software. 1x3 OR
Give any three drawbacks of software piracy? Describe the following types of
application software.
vii. 1x3 OR 1. Business software
2. Education software
3. Productivity software
viii. What is cross talk? 1x3 OR What is CDMA Technology?
Why digital signals are used in computer systems? Compare LAN & WAN.
ix. 1x3 OR

SECTION-C (Marks 16)


Note: Attempt any 2 questions. (2 x 8=16)
a. Describe any three types of guided media. Writes a note on Mainframe,
1. b. Explains the basic operations of a computer. 1 x 8 OR minicomputers and microcomputer.

a. Describe the components of communication Explain the main Functions of operating


system with the help of diagram. system.
2. 1x 8 OR
b. Explain how malware spreads.

a. Define malware and describes its types. a. Differentiate between hacker and
b. Describe the following types of operating cracker.
system. b. Write a note on Dial up and DSL
3. 1x8 OR internet connections.
i. Batch Processing System
ii. Time Sharing System
iii. Real time System

You might also like