computer 9TH
computer 9TH
tag ends with:
gta SB 2
93 . EI A
Pair tags consist of start tag and... tag: aL hi few Pips 94
None of these
94 eo |p End 2! Content» |B Mid ox» A
The tag used to write the paragraph is: gral Se Laivtig 95
‘
The tag used to break the line is: rgb Ge LES LSS0 96
96 B A
HTML document starts with... tag: HIML ¢tsts to Gurls: 97
7 EI
<> D c
“au attribute provides an altenate text for an
image: rgd Lee FG hier 106
Alof these All of
106 these D text text c attr attr 8 alt alt
Used to move from one page to another page: pte Lib Beye BS 107
107 | Allofthese ?, |p List = c Table B Hyperlink 6 <4
The tag for hyperlink is: tg PKG At 4108
108 D
A
Table header tag is: ig POLE 114
114 header c =td> 8 A
eee, LEM LB Me LIL
Attribute are used to spread a row to mote than,_| ‘Y°O**#d# a Lie Mi
‘one row: ie 412
112 | None ofthese [D expand: c Towspan. El colspan A
‘A computer network 8 @w.
systems. etn Like hal dak Pn Sonseied | 113
113. | Allofthese 7. |p Device “1x3 c Group —+/ Hi System 7 A
Networks are connected together to make a large
= Lb See HEAT oe 114
None of these
14 Str] | Network rez System ¢~ A
‘The example of hardware sharing is:
415 | Allofthese-@ |p Data c File Fe
The example of ATM machine is: rgubet fides 116
intemet sharing Application sharing Hardware sharing
16] D HRA A
The computer provides space for storing data,
called: 417
None of these
a7| fdtew | Both u c A
118 The example of server is: 118
CTT Lael
whtA server is a system that...... services: gy Sag Whos 119
None of these uur
119 wir D Both Wie cc] Provices > Gets o A
The client is: ighneet 120
None of these ver
420 fy D Both Wine Sofware zi |p| Hardware a4 | A
The types of connection i ap Bibee® 421
424 Four D Three oF c Two » H One fi A
The direct link between the two devices is an
example of: gl bLMoenLeotly 122
None of these Multi point connection Point fo point connection
122 ihe D| Both of these c eta B
The example of multi point connection i eSy 423
123 | Alotthese. [p Wifi Sedu Remote sic, [Bp A
The of topology is: ai 124
424 Four "a Three c Two B One ~£i A
In Star topology, all devices are conneciedtoa | Fie. 3. seyspa sl Mien ae eENe
common point via a cable, this common point is
called: tet Sety SP uit 4125
tas| CableZ [pb ‘Server 47 Cc Button B Hub —: | |
BBL rte Le pw LeicAny Otay
csuuau topology connects all devices with each | * Lp wir ABOPEH
other through adirect link: tdans2 126
Mesh topology
126 Ring topology &ov£ | ¢ | Star topology yt |p| Bus topology cave? | a
In which topology data exchange is faster? Sete sy Isto” 427
127 Ring topology ev) | B| Bus topology 3, A
The compotients of communication system is: awn rh 428
128 Five & Four 4e c Three = B Two» A
Sender is called: ig tlh k7 129
None ofthese
429 eoee D| Both of these urs». B| Transmitter “7 | a
The example of reciever is: ge hUrrsrlg 130
130 | Alotthese?. |p] Intemet c B Printer ¢ H
Ina data communication system, a message is
sent in the form o
CTT La eC
Severo ts
an MuridNone of these
edits D Information c Internet 2 #1 B Packet 5 rN
How many parts of message? tet gue TE 432
132 Four ip 5 Three c Two.» H One =i A
Control information of message is called: seth eye iy 133
None of these
433 biter p| Bothofthese uv». Jo Header .i: Play load s/ A
A wns 18 @ formal agreement between two parties
is called: tether oleoL ufo» 434
434 | Protocol Uv: Information 81 | ¢ Header ic B Message /s,, A
The example of transmission medium is: edhe 135
Fibre optical cable <
1435 | __Intenet 2 D et Printer 2 B Message A
How many layers in TCPIIP protocol? TOPIP Se rH 43 74F Sing 136
136 Sig D Five & 8 Four ay B Two» A
“nn protocol is used for the purpose of
transferring files from one computer to another: rete te SP bine LIFE
137 www D SMTP C HTTP. B FTP [A |
We can use transfer webpages between a client
and a web server are: mL OP Se owrEar mets | 138
138 Www. D SMTP c HTTP EI FIP A
Fixed IP address is called: re tw EGS 139
439 | Allofthese ?- |p Fixed 6 c B Static | |
Itis a unique identifier? igrchesty HL 140
140 Server, D DHCP c Router B iP [A |
The standars of IP addressing is: IP aude fad: 444
144 Four D Three F c Two H One fi A
172,16:54.1 is an example of: 172.16.54.1 ¢-t: 442
142 Pvi0. D IPve c PV B Pv LAI
The IPv4 is divided into how many groups? va tere tue ZS 143
143 Eight 27 |b Sixg c Four Twos A
The maximum bits are required for every group of
IPv4 is: Pv4 ¢-Bmenr 144
144, agit AW Siz c Four iy A
How many bits in IPv6?, IPV6 te tn gt 145
145 256 256 D 128 128 6464 8 32.32 A
How many groups in IPv6? IPv6 Supt nes SEE 146
146 Eight 37 a Sixg c Four B Twos A
CTT Lael
an MuridThe example of networking device is: ted Sighhinee 447
447 | Allofthese 7, | p Router #, Browser B Intemet A
“nis usually placed at the meeting point of two y
networks. SOYA HE A tyngd oh 148
44g | Allofthese -@. |p Cable c| Connection” [pe Router 25, | |
We get the internet service from....: eeu dees 149
149 SMPT D HT c ISP EI www A
The example of piracy is: teed dy 150
150 | Allof these Bo Software 2 [¢| —Poemgr? —[B Book 0° A
‘Sometimes, some malicious user disguises LS pear tt tel eA ot
himself as our friend and tries to get some PAL Silber S ne gibt
confidential information. This is called: batt SPIEL roe 454
151 | Allofthese [D Copy C Piracy B Phishing Hi
Patent is a way to protect an... 4g PLhes 66% 452
None ofthese
12] fete | Copy av c Idea (ict Software 2. A
Copyright law says that some idea or product
cannot be... Pen Sari de LomLenge | 153
453 | Allotthese?. |p Sercret 3, c Copy Gv Patient A
is a serious attack on a computer system. sede Ligh def 154
154 | Sabotage? FY Pationt =, c| Copyright | Trade secrets A
There are certain companies, caled ia. that [2 feu fduone rey uu
solely exist to collect, aggregate, buy and sell im
‘comsumer information. wpard Li Sess Sok 155
None of these
155 ise D NADRA wt | Data brokers +4. Hackers A
Primarily, how many aspects do we want fo Keep .
our data safe? Sure phe Sete Ae Lie EA rou 156
156 Four D Three 8 Two» B ‘One i A
The information that is stored with web surfers is 5
called: gbihe de ALi poten 457
457 | Patient p| information #21 [oc] Cookies <7 BY Data 3 A
Enoryption is the process of... data. eS nn Shera bg PIF 158
None of these ver
158 a D| Bothofthese uv». || Decoding #5: |B Encoding £341
Encoding means conversion of data to an
unreadable format which is called: WES ght EP UE eztibeKLfor | 159
4159 | Ciphertext 2% Enerypt=A [| Passwords; |p] Decoding fs [a
“uuu 8 UBed fo protect sensitive data, including To .
160 personal information for individuals. tg eso Cor dificertiue—— 160
CTT Lael
whtProtection from
Password it |p | hackers a. B
was a Roman politician and military general. B25 vier 161
None of these
464 ui dhiter D Caesar Vigenere -~' B Cipher ,
2 SEK BP PAKISTAN Soe LE AM,
Within caesar cipher substitution scheme, the Soa Wel 3LE} Hee
plaintext "PAKISTAN" would be encrypted int Megabit 162
162 |" None ofthese _[D NATSIKAP c{osiTuso EN ozsuRsz
6... LiS La ties
Vigenere cipher uses a........ for substituting the ie Li Abehs 2 ated
letters of plaintext. sete ier 163
163 Table Method 34 c Symbols de’ B Book 0" A
Vigenere Cipher table consists of... rows and
columns. we gual hb EES 164
164 32,32 D 26,26 22,22 8 16.16 A
Messages encrypted with the Caeser cipher are
Very «un... to crack. gee Le rel Mie | 165
None of hese
165 tifa D Complex saz c Difficult 2" B Easy wi-T
Most common letter used in the english language. PLU me eomisz4i 166
166 $s D oO C E EI A A
-vouns Keys are used to read an encrypted .
messages. sg tered Lari F 167
Cryptographic «, /
1467 | Allofthese p| Encryption ve | as Password 5, A
‘A good password must contain at least how many 7
characters? Sebel eZ he Surpgiti 168
1s | conta Sk c Four 4p B Two» A
‘Kcrime in which computer network or devices are
used is'called... sgthate hYUeMueterzrzti | 169
None of these
169 ut tn D Virus u/s |} Cybercrime A“ Hacking A
Jee. PELL Poo Sot atbirt,
Hackers may use fake....... to trap someone to ‘
give passwords and account information. ae 170
470 | All ofthese pt D Accounts .*s¥i c| Passwords it | B E-mails i OH
This is @........ i the cardholder claims
chargeback. ee tI KL Ags toi A im
None of these Transactional fruad
474 iter D Pane B Fruad A
Iilegallyaccessing someone else's computer is
CTT Lael
whtAll ofthese Piracy 2/4 Hacking
“onthe fraudulentattempt by sending emalls |e poy o us Sivek Toibry
to obtain sensitive information such as password : , ¢
and credit card details: PIA PLS os 173,
473| Alottheseé. [p] Phishing Software 42% [pl] Hacking [a
In computing, nus acyberattack to make a | SY# Ebel Sra abet
machine or network resource unavailable. 4 WHA Sng 474
174{ Allotthese ¢. |p] Network ¢ DOS AY Hackinguce fa
Draw the flowchart for the following vr Zu, Ry ria
problem: Input two numbers nt and n2. cAENDOIN Ane She fh ie Lie»
4 | Determine whether n1 divides n2 or not. Hit Yaz te| 4
Draw the flowchart for the following bbc Las the AY Pac toe
problem: Input a year and determine UME vibe tie atoge Lobioe
2__| whether it is a leap year or not. Pehle Ste] 2
Draw the flowchart for the following Witawle SPL feet L bee
problem: Input a number and calculate its Manche sient) thighs Lib %
3_| factorial. aL | 3
Draw the flowchart for the following
4_| problem: Find LCM of two numbers. We hisattirty teri Lbseo | 4
Draw the flowchart for the following nh. Lach ateeshdLbion
problem: Input a number and display its WA Gertie hlargh fierihe Lib
5_| factors. atfpmini£y| 5
6 _| What is meant by problem? Seale | 6
7_| What is meant by problem solving? teivet Le] 7
8 _| Write the names of steps for problem solving. LF REPVEEA P| 8
Why is it important to understand the problem in ; :
9 | solving the problem? Setar fetes ie | 9
Write the importance of planning for problem ;
10_| solving bot FtE Se | 10
11_| What do'you know about candid solution? SHEL THe tse] 11
12_| What is meant by selecting the best solution? sethed SF tan| 12
43_| Define flowchart. harbors | 13
Describe the importance of flowchart for
14_| problem solving. stops Se bel Ee | 14
15_| Describe the flowchart requirements. aabbobr Seis | 15
16_| Write a flow chart to find even and odd numbers. ter Ag WSFA Hester | 16
Define a flowchart to show the largest number of oy ;
17_| the three numbers. steer iere ture | 17
18_| What is meant by algorithm? see Pufi| 16
CTT Lael
M coe
rate49_| Write an algorithm for making tea. atte f Ptucrsey| 19
20_| Write the role of algorithms in problem solving, Apu KeP Et EL | 20
Describe the use of symbols in the preparation
24_| of algorithms. LE srvene 25rd F uf | 21
Write the steps of the algorithm to find the
22_| volume of the cube. AAP LP MLLESjwhiLeL£| 22
What should be taken care of to make an
23 _| algorithm effective? setabinle cerrefP Go| 23
24 _| Differentiate between flowchart and algorithm. bet P Sioscnigh | 24
25_| Write the advantages of flowcharts. af siLens| 25
26_| Write the disadvantages of flowcharts. Uhpendeoigs| 26
27_| Write the limitations of flowchart. th frsebers| 27
28 | Write the advantages of algorithms. Ute fsbl PH! 28
29 _| Write the disadvantages of an algorithms. ufens£P Hl 29
30_| Describe the limitations of an algorithms. ahorabotenlP | 30
31_| What is meant by test data? feivewted| 34
32_| Describe the importance of testing. ~tfoboosiS BE | 32
33_| Write the types of test data, uff Bidet | 33
34_| What is meant by verification? teiVedaoo|_ 34
35_| What do you know about validation? SWE ten Lett | 35
36_| Differentiate between verification and validation. wbusnetwndsso| 36
What is meant by identification and correction of
37_| errors? tet pve Famese fou | 37
38_| What do you know about trace table? tue tence? | 39
39_| Write a short note on structure of trace table. the fesP corbFE?| 39
What is the use of valid and invalid data for ;
40_| testing? teUHitisenutulend LAE | 40
44 | Convert into binary. _(ABCD)16 be tur | at
Convert into
42_| hexadecimal: _(0010110010001101001)2 abe esti! a2
43 | Convert into hexadecimal. (69610)10 Abe teak | 4
Pet: X= atl eA LK ANDY
Write the truth table for X AND Y where: X=It veer Battie,
44 |is sunny. _Y=Today is Monday. sere +g | ah
How client and server communicate with each
45 | other? sateen rytine wes] 45
What are the main components of we
46_| communication? tucuhevlapletd| ag
How telephone addressing relate with network
47_| addressing? sale pe fe Snse ft | ar
CTT Lael
PereRt tr ena re Ros tnaWhat are the difference between static and
48_| dynamic IP? IAEA STASI | 48
49_| Define communication channel horn BSL] ag
50_| Describe the working of web browser. aefertftLasinces | 50
Differentiate between point-to-point and aa
51_| multipoint connection. tt esiyd nesghesiy 51
What is application sharing? Answer with the oe
52_| help of an example. at horine suf eile tPA | 52
What is the advantanges and disadvantages of .
53_| star topology over bus topology? alert GL iWte er Sow | 53
welt baa afl
In aclient server model, is client software or PO Lota BMG ME ABE So AES
54_| hardware? Give reasons to support your answer. iss | 54
55 | What is meant by network? Seipve See | 55
56_| Why the need for a computer network? Wi tule rSSoszint | 56
51_| Differentiate between client and server. Ewiituy est | 57
What is meant by the physical structure of the
58_| network? Sete Ebi L Sine | 58
59 | Write the types names of connection, wf rls” | 59
60_| Write the types names of network topology. Le FtLSENSnee | 60
61_| Write a short note on bus topology, a efed PF ganr| 64
62_| What do you know about star topology? SUE TeenLowse | 62
63_| Write a short note on ring topology. itcfesPgeN£ | 63
64_| What do you know about mesh topology? Suey Tene | 64
65_| What is meant by data communication? teaver afes| 65
66_| What do you know about sender and reciever? SWE Teen atuaiide | 66
67_| Write a short note on protocol. apes lire | 67
68_| What do you know abdut transmission medium? ae teALee | 68
Write the names.of computers network models .
69 | layers. tf thi SI Snsciel | 69
70_| Write a short note on computer network models. ae feie JitSosrzied | 70
71_| What is meant by TCPIIP protocol? Sete SSZTCPIIP | 74
Differentiate between application layer and a; Fy, 59
72_| transport layer. Wb wiptemiranchde|
Differentiate between network layer and physical _ i
73_| layer. LCi LAK ASoce | 73
74_| Write a short note on FTP. at foie FTP | 74
75_| Write the difference between HTTP and SMTP. LES 2 SMTP HTTP | 75,
76_| What is meant by “the need for addressing"? See" eurttor" | 76
CTT Lael
re
erent SerenaWhy is there a need for addressing in file
77_| sharing? sedi tdenrStuetei| 7
7a | addressing ofeatacommuntcaton, whpeiPceastomedids| 1
Write a short note on sending HTTP request on
73 | internet. fei P ef enHTTPgeert| 79
What do you know about receiving HTTP
80_| response? SUE TRALEE Ar HTTP | 80
81_| What is meant by IP address? tele tus | gt
82_| Write a short note on IP addressing standards. apes? gute Luu | 92
83_| What is a router? tetnis| a3
84_| Write a short note on routing on internet. Ut feIP wll biee| Bh
85_| What do you know about routing process? Sue ee nL VLG | 35
86_| Define cypher text. apfortnfe Bt | 96
Why do we need an installation key whereas a tory dr So ti fig diiben ASSP aE
87_| software can be protected witha a password? te Puyo 2 | 87
88_| Define DOS attack. apfortnSiD0S | 9g
89 | Give a reason to add captcha on websites. SeeergeArcas captcha | 89
What is patent and why do we need to register
90 | it? SeutenASi reiting Ves | 90
91_| Define data security. aa Sbikes| on
92_| Define ethical issues related to security. shorts IE-Lbnkts| 92
oa | i meant by privacy end confdogayn teanfedopisionedale| wa
94_| What is meant by softlifting? Sepa Sei | 94
95_| What do you know about fraud and misuse? SHEL TEE L ub SP | 95
96_| Write a short note on pattent. wWefei Pert | 96
97 | Describe therfole of copyright in security. stolen Aesarshtdu | 97
98_| What is meant by trade secrets? Senpvendy | 98
99 | What do you know about sabotage? SUL Te NL KF | 99
100 | Write the importance of data privacy. at FohposiEwinSes | 100
401 | What is meant by confidentiality’? Senpvesun| 101
102 | What do you know about integrity? SUE ten Lctie | 402
103 | What is meant by availability? Series | 103
4104 | Write a short note on encryption. : apes she |_104
sos [entre tmemen nomen or eveneay ahobeosSchPgeepttsnr: | 105
106 | Define substitution cipher method. LIASEP LSS | 106
CTT Lael
PereRt tr ena re Ros tna107 | What is meant by caeser cipher? Seiya eux | 107
108 | Define vigenere cipher and also write its method. afew tar ices | 108
Write weaknesses and security flaws of 7
109 | substitution ciphers. tf SCLAIE | 109
110 | What do you know about cryptographic keys? SME eA L LAE | 110
111 | Write properties of good password. ateforert Soria | 4141
112 | What do you know about cybercrime? Tube tent Sar| 142
413 | In what ways is cybercrime carried out? Seber yreua sl Aler | 113
114 | Write the characteristics of a phishing attack. tif eeF SIL | 114
145 | What do you know about phishing attack? SHED tener | 115
116 | Differentiate between ordered and unordered list. LIP AM ae 7b? | 116
117 | Describe the basic text formatting tags. ate Bow Bei | 447
What is difference between hyperlink and . ,
118 | anchor? sO thunsa| 118
lO presse neta Le Li
Create a basic table with following U8 aM Pas phere Buia fakL
119 | attributes: “colspan™ “rowspan" "au" « "oF | 119
Explain the steps involved to create a HTML
120 | page. it ferloSPi,ZLtGHTMe | 120
121_| What is meant by number system? seared | 424
What numerical system do we use in our daily
122 | lives? Tae pese evens | 422
123 | What do you know about decimal system?, SULT te AL ican | 123
What is meant by binary system and write its :
124 | base. wef Bbigirvepude | 124
Write the base of decimal system and binary .
125 | system. Sf Sed obb oii Sin | 125
Which system is used to store data in digital . .
126 | computers? Tete LLL A Avi tut | 126
Write the binary and decimal value of the letter . .
127 | A. ef SE NSESKS7 |_ 127
What is meant by hexadecimal system and also
128 | write its base. whip tbwigive sk | 128
Write the value of A.B,C,D.E,F in hexadecimal .
129 | system. tLe F BSABC,D.EF EIA 429
What do you know about number system 7
130 | conversion? Tae tel ele“ | 130
Write the method for convert’s decimal number
131 | into binary number. Wf PELL LASS AA | 191
132 | Convert the following into binary. 15610 19610 Abr tdehbene | 132
133 | Convert the following into decimal. _(1000004)2 1000001) wAbrtsenifitses | 133
Write the method for convert’s binary into .
134 | hexadecimal. wtf PS bet whe en | 134
CTT Lael
PereRt tr ena re Ros tna135 | Convert the following into decimal. (C921)10 (C921)10 Abeta | 135
136 | Convert the following into binary. (A23)16 (A236 Abe tdi bee | 136
137 | Convert the following into binary. _(70€558)16 (7055816 Abr debe | 137
Convert the following into
138 | hexadecimal. (11000001)2 11000001)2 Abr tuts bene | 138
Convert the following into
139 | hexadecimal. (110101111)2 010111192 br teh bee | 139
140 | What do you know about computer memory? SEL Te nLite ded | 149
141_| What do you know about volatile memory? Sue T ten lye Fen | 444
142 | Write a short note on non-volatile memory. fos 2 gust Fetch | 142
Differentiate between volatile and non-volatile ~
143 | memory. Oud tee Ftumctn Feu | 143
144 | What is meant by ASCII codes? Sesipe BASCI | 444
4145 | Write the abbreviation of ASCII. Le f POSEN | 145
146 | What do you know about De-facto standard? SUE TEAL bee | 148
What is meant by storage device and also write ,
147 | its two examples. WE tovtenphe dG | 147
148 | Differentiate between memory and storage. 148.
What is meant by bit and how much data is
149 | stored in it? Setar OM tized ver | 149
How many bytes are there in one kilobyte and
150 | one megabyte? Sala EZ tert tioerXti | 150
151 _| What is meant by preposition? Seatplectiyte | 151
152 | What do you know about truth values? Sue TteALidedy) | 152
153 | What is meant by compound preposition? Seale cigs et | 153
4154 | Write a short note on AND operator. USef PERE RYIAND | 154
155 | What do you know about OR operator? SUE TnL AgiOR | 155
What is meant by NOT operator and also write its
156 | example. PE SAize ie pg sNOT | 156
157 | Write a short note oh truth table. hefes hari! 157
158 | Make a truth table for AND operator. -ufhad# Hut L pgsAND | 158
159 | What is meant by Boolean expression? Sete tices | 159
160_| Write a short note on commutative law. epi A dieot | 160
161 | Elaborate the associative law with example. thre vetifprgi | 161
162 | Elaborate the distributive law with example. bre deLie oie | 162
163 | What do you know about logical expression? Suen tencetefiey| 163
164 | Write abbreviation of HTML. cf IOHTML | 164
165 | Write a short note on hypertext. al efei efi | 165
CTT Lael
PereRt tr ena re Ros tnaSME TAAL ISA
166 | What do you know about markup language? 166
167 | What is meant by case sensitive in HTML? fteapve tS HTML | 167
Which software is required to create a web : i
168 | page? Sebnenr Site LLivGus | 168
How many types of tags in HTML and also write .
169 | its names. lef Spread nhLUAF ZHTML | 169
170 | Write three attributes of HTML tags. lifer fSPHTML | 170
Write an example of showing a paragraph in the ;
174 | middle of a page. whip eS Libdev£ehihia | 11
172_| What do you know about head section of HTML? SUE TIP LAER CHTML | 172
173 | What do you know about body section of HTML? SHER AIM LAL GHLHTML | 173
How many types of headings tags and also write
174 | its uses. fof SPW Ad LEAF LE 4 | 174
175 | Write the uses of tag. Ff Sew Btont> | 175
176 | What do you know about tag? SET te nL Kir | 476
177 | What do you know about tag? Sue TtenL Beur | 177
178 | Write a short not eon unordered list. fei yest! 178
179 | What do you know about You might also like