Inter (Part-I)
Lahore Board 2016
Computer Science Part-I
(Objective Type)
Time Allowed: 20 Minutes
Max. Marks: 15
Note: Four possible answers A, B, C and D to each question are given. The choice which you think is correct, fill that circle in front of that question with Marker or Pen ink in the answer-book. Cutting or filling two or more circles will result in zero mark in that question.
Q1.
a. CAM
b. CAD
c. CAL
d. CAT
a. PC
b. IR
c. MAR
d. MBR
a. Boot Sector
b. Chernobal
c. Logic Bomb
d. Trojan Horse
a. Broadband
b. Baseband
c. Narrowband
d. Frequencyband
a. CRT monitor
b. Plotter
c. LCD monitor
d. Multimedia Projector
a. TCP/IP
b. UDP
c. Ethernet
d. HTTP
a. Desktop
b. My Computer
c. Control Panel
d. Windows Explorer
a. Named Ranges
b. Labeling
c. Relative Referencing
d. Absolute Referencing
a. Computing and mechanical technology
b. Computing and electrical technology
c. Computing and mechatronics technology
d. Computing and communication technology
a. Disk
b. RAM
c. ROM
d. Cache
a. Indents
b. Paragraph spacing
c. Line spacing
d. Alignment
a. User
b. LAN administrator
c. Internet Service Provider
d. Organization obtaining the data
a. Client
b. Server
c. User
d. NIC
a. Asynchronous transmission
b. Synchronous transmission
c. Isochronous transmission
d. Monochronous transmission
a. Network Interface Card
b. Router
c. Gateway
d. Bridge
Inter (Part-I)
Lahore Board 2016
Computer Science Part-I
(Subjective Type)
Time Allowed: 2.10 Hours
Max. Marks: 60
Section I
Q2. Write short answers to any SIX (6) questions: 12
Q3. Write short answers to any SIX (6) questions: 12
Q4. Write short answers to any SIX (6) questions: 12
Section II
Note: Attempt any THREE questions.
Q5. What are source data-entry devices? Explain three mark and character recognition devices. 2,2,2,2
Q6. Define star topology. Explain its working with diagrams. Also discuss its two disadvantages. 2,3,1,2
Q7. Why we need to encode our data in computer systems? Also define and explain EBCDIC code and Unicode in detail. 2,3,3
Q8. Define bus. Explain three different types of system buses. 2,2,2,2
Q9. Discuss two security threats to data security. Write any four solutions to these threats 2,2,1,1,1,1