( Part-I ) Lahore Board 2012
Computer Science 
Paper I (Objective Type)

Time allowed: 20 Minutes 
Max. Marks: 15

 
Note: Four possible answers A, B, C and D to each question are given. The choice which you think is correct, fill that circle in front of that question with Marker or Pen ink. Cutting or filling two or more circles will result in zero mark in that question. Write the letter A, B, C or D in the column  (write correct option) against each question also. If there is a contradiction in the bubble and hand written answer, bubble option will be considered correct.

Q1

(A) Hard copy
(B) Graphics
(C) Multimedia
(D) Soft copy

(A) SDLC
(B) Network
(C) Processing
(D) System

(A) Bus
(B) Terminator
(C) Node
(D) Connection

(A) WAN
(B) LAN
(C) MAN
(D) NAN

(A) Simplex
(B) Half Duplex
(C) Full Duplex
(D) Reverse Duple

(A) Communication channel
(B) Decoder
(C) Encoder
(D) Self –Testing

(A) Education
(B) Forecasting
(C) Manufacturing
(D) Electronic Shopping

(A) CAD
(B) CAM
(C) CBT
(D) ROBOT

(A) Control Unit
(B) Cache Unit
(C) Calculating Unit
(D) Communication unit

(A) Compiler
(B) Linker
(C) Interpreter
(D) Operating system

(A) Redlof 
(B) Norton
(C) Dr. Solomon
(D) McAfee

(A) Control Panel
(B) Start Button
(C) Internet Explorer
(D) Recycle Bin

(A) Arrow
(B) Vertical line
(C) Horizontal line
(D) Large circle

(A) Field
(B) Record
(C) Row
(D) Column

(A) http
(B) .com
(C) HTML
(D) URL

Inter ( Part-I )
Lahore Board 2012

Computer Science 
Paper I (Essay Type)

Time allowed: 2.10 Hours
Max. Marks: 60

Section-I

2. Write short answers to any SIX(6) questions : 12

3. Write short answers to any SIX (6) questions: 

4. Write short answers to any SIX (6) questions:   12

 (Section-II)

Note: Attempt any three questions.

5. What are mark and character recognition devices? Describe any three in detail.  8

6. What is network standard? Discuss different types of network standards.  8

7. What is data transmission mode? Explain its types.  8

8. Define language processor or translators and their use. Explain different types of language processors.   8

9. Describe different security threats to data security. Give solutions to these threats. 8