Search This Blog

Monday 7 June 2021

Computer Science For Class XI / HSC/FSC part 1 /1st Year (Science Group) - Past Paper 2012

Go To Index
Computer Science
For Class XI (Science Group)
Past Paper 2012


COMPUTER SCIENCE   2012

Time: 20 Minutes     Max. Marks: 15

SECTION "A" (MULTIPLE CHOICE QUESTIONS)
1. Choose the correct answer for each from the given options:

(i) Coaxial Cable, Fiber optic, Microwave and Satellite refers to:
  • Communication Media ✓
  • Topology
  • Communication Mode
  • none of these

(ii) ISP stands for:
  • International Service Provider
  • Internet Switching Protocol
  • Internet Service Provider ✓
  • Internal Service Provider

(iii) This is the standardized set of rules of Data communication:
  • HTML
  • www
  • DHTML
  • TCP/IP ✓

(iv) 1 Terabyte is equal to:
  • 1024 MB
  • 1024 KB
  • 1024 GB ✓
  • 1024 Bytes

(v) This is related to downloading a computer file:
  • File Transmission Protocol
  • File Transfer Protocol ✓
  • File Service Provider
  • File server provider

(vi) Illegal copy of a copyright software is called:
  • Hacking
  • Software Piracy ✓
  • Theft of services
  • Theft of Hardware

(vii) This is not related to optical media:
  • CD-R
  • Magnetic Disk ✓
  • DVD
  • CD-RW

(viii) Transmission that allows flow of data in both directions at once is:
  • Half-duplex
  • Simplex
  • Full-duplex ✓
  • none of these

(ix) USB stands for:
  • Universal Serial Bus ✓
  • Unified Serial Bus
  • Undefines Serial Bus
  • Universal sequential Bus

(x) This is not an operating system:
  • Windows
  • Compiler ✓
  • MS-DOS
  • UNIX

(xi) This is the fastest Data communication cable:
  • Co-axil Cable
  • Twisted Pair Cable
  • Fiber Optic Cable ✓
  • none of these

(xii) OSI stands for:
  • Open System Interconnection ✓
  • Operating System Interface
  • Open Service Interconnection
  • Operating System interconnection

(xiii) A Secondary storage device is:
  • RAM
  • ROM
  • Cache
  • Flash Memory ✓

(xiv) Daisy Wheel Printer is an example of:
  • Character printer
  • Line printer ✓
  • Ink-jet printer
  • none of these

(xv) The Capacity of memory may be measured in:
  • MHz
  • Microseconds
  • Megabytes ✓
  • none of these

COMPUTER SCIENCE   2012

Time: 2 Hours 40 Minutes     Marks: 60

SECTION-B SHORT ANSWER QUESTIONS ) (36)
NOTE: Answer any 6 part questions from this section. No answer should exceed 6 to 7 lines

2.(i) What is an Operating System? Write any four of its functions.
(ii) What are the main components of LAN?
(iii) Differentiate between Synchronous transmission and Asynchronous transmission.
(iv) Define ROM. What are its types?
(v) What main functions of MS-EXCEL are not available in MS-WORD?
(vi) Draw the layer cake of an 051 model. Define any two of its layers.
(vii) Write any six abuses of Internet.
(viii) Define WAN. Discuss its main objectives.
(ix) Write the full forms of the following abbreviations. www, ISO, LED, BIOS, MBR, IBM.

SECTION-C (DETAILED- ANSWER QUESTIONS) (24)
NOTE: Answer questions from this section.
3.(a) What is an Secondary Memory? Discuss its three types.
(b) What are I/O devices? Describe any three output devices?

4.(a) What is Internet Browser? Describe any three.
(b) What is an Impact Printer? Describe any two types.

5.(a) What is meant by Topology? Describe any three network topologies with diagram.
(b) What is C.P.U? Define its various components with diagram.


Saturday 5 June 2021

Computer Science For Class XI / HSC/FSC part 1 /1st Year (Science Group) - Past Paper 2013

Go To Index
Computer Science
For Class XI (Science Group)
Past Paper 2013


COMPUTER SCIENCE   2013

Time: 20 Minutes     Max. Marks: 15

SECTION "A" (MULTIPLE CHOICE QUESTIONS)
1. Choose the correct answer for each from the given options:

(i) ASCII is an abbreviation of:
  • Application Software Code for Information Interchange
  • American Standard Code for Information Interchange ✓
  • American System Code for Information Interchange
  • American Symbolic Code for Information Interchange

(ii) Compiler is a / an:
  • Operating System
  • Language Translator ✓
  • Debugger
  • Linker

(iii) The component of CPU that manages all operations is called:
  • Control Unit ✓
  • Memory Unit
  • Arithmetic and Logic Unit
  • None of these

(iv) This is a computer crime:
  • Backup
  • Restoring
  • Hacking ✓
  • Formatting

(v) This is not a computer virus:
  • Time Bomb
  • worm
  • Trojan Horse
  • CD Rom ✓

(vi) OSI model has:
  • 6 Layers
  • 5 Layers
  • 7 Layers ✓
  • 8 Layers

(vii) The internal process of starting up a computer is known as:
  • Booting ✓
  • Self start
  • Warm up
  • Start up

(viii) Accumulator is a type of register found in:
  • Control Unit
  • Memory Unit
  • Hard disk
  • Arithmetic and Logic Unit ✓

(ix) The electrical path used to transfer data in CPU is called:
  • Wire
  • Cable
  • Bus ✓
  • All of these

(x) A mathematical expression that is used to perform calculation on worksheet is known as:
  • Cell
  • Formula ✓
  • Format
  • Address Bar

(xi) The most reliable topology is:
  • Star ✓
  • Bus
  • Ring
  • Tree

(xii) The common Language of internet to develop a web page is:
  • WWW
  • HTTP
  • HTML ✓
  • BASIC

(xiii) The method of communication that allows data to travel in only one direction is called:
  • Simplex ✓
  • Half duplex
  • Half simplex
  • Full duplex

(xiv) Laser beam technology is used in:
  • Optical disk ✓
  • Magnetic disk
  • Floppy disk
  • Hard disk

(xv) An operating system falls in the category of a / an:
  • Application Software
  • System Software ✓
  • Network Software
  • None of these

COMPUTER SCIENCE   2013

Time: 2 Hours 40 Minutes   Marks: 60

SECTION 'B' (SHORT-ANSWER QUESTIONS) (36)
NOTE: Answer any 6 part questions from this section. No answer should exceed 6 to 7 lines.

2.(i) Define Star Topology with diagram.
(ii) What is Internet? Name its components.
(iii) What does Network Protocol mean? Name any three protocols with their abbreviations.
(iv) What is Modem? Why is it necessary for internet?
(v) Write the full forms of the following abbreviations: DPI, USB, DIMM, GAN, TCP, CRT.
(vi) What is Information Technology? Describe any three fields of IT.
(vii) State Copyright Law. Give its advantages.
(viii) Define the term Bus. Describe the functions of any two Buses.
(ix) State four points to show that e-commerce is advantageous in modern business.

SECTION'C' (DETAILED- ANSWER QUESTIONS)
NOTE: Answer any Two questions from this section. All questions carry equal marks. (24)
3.(a) What is Software? Explain its different types.
(b) What is e-mail? Write its advantages and disadvantages.

4.(a) What is Communication Media? Discuss the various medias used in data Communication.
(b) Define CPU Registers. Discuss their various type.

5.(a) Define OSI model. Describe the functions of each layer of OSI model with diagram.
(b) What is a Computer Virus? How can we protect our Computer from it?


Computer Science For Class XI / HSC/FSC part 1 /1st Year (Science Group) - Past Paper 2014

Go To Index
Computer Science
For Class XI (Science Group)
Past Paper 2014


COMPUTER SCIENCE   2014

Time: 20 Minutes    Max. Marks: 15

SECTION "A" (MULTIPLE CHOICE QUESTIONS)
1. Choose the correct answer for each from the given options:

(i) One Kilobyte is equal to:
  • 1000 bytes
  • 1024 bytes ✓
  • 1MB
  • none of these

(ii) A microprocessor contains:
  • ALU and CU ✓
  • ALU and MU
  • RAM and ROM
  • none of these

(iii) OSI model has:
  • six layers
  • Two layers
  • seven layers ✓
  • no layers

(iv) Dos, Unix, and Linux are the type of:
  • Operating systems ✓
  • Computer games
  • Translators
  • Viruses

(v) A Computer virus is a:
  • Bacteria
  • Hardware
  • Signal
  • Program ✓

(vi) The shortcut key in Ms Word for saving a file is:
  • ctrl-s ✓
  • ctri-z
  • ctrl-v
  • ctrl-c

(vii) In full duplex transmission, data travels in:
  • one direction
  • Parallel direction
  • two directions simultaneously ✓
  • two directions but not simultaneously

(viii) The physical layout of a LAN is called:
  • Link
  • Topology ✓
  • Ethernet
  • Router

(ix) A dot-matrix is an example of:
  • Plotter
  • Impact printer ✓
  • Non impact printer
  • none of these

(x) Extension of Microsoft Word document is:
  • .ppt
  • .xls
  • .bmp
  • .doc ✓

(xi) This software is used to detect and remove viruses:
  • Utilities
  • System software
  • Application software
  • Antivirus ✓

(xii) Another name of Secondary storage is:
  • Memory
  • Auxiliary ✓
  • Density
  • Main memory

(xiii) The software that enable to view web pages on internet is called:
  • Browser ✓
  • HTML
  • Ms Word
  • e-mail

(xiv) This is a volatile memory:
  • Rom
  • Hard disk
  • Buffer
  • Ram ✓

(xv) UPS stands for:
  • Universal Power Supply
  • Un-interrupted power supply ✓
  • Universal Power Socket
  • None of these

COMPUTER SCIENCE     2014

Time: 2 Hours 40 Minutes     Marks: 60

SECTION 'B' (SHORT-ANSWER QUESTIONS) (36)
NOTE: Answer any 6 part questions from this section. No answer should exceed 6 to 7 lines.

2.(i) Define Bus topology with diagram.
(ii) Differentiate between Application software v/s System software.
(iii) Define Impact and Non-Impact printers.
(iv) Define different types of System Software.
(v) What are the benefits of LAN?
(vi) What are the main steps of System development? Define them.
OR Define social media. What are its uses and abuses?
(vii) How are computer useful in the field of education?
OR Define CPU registers.
(viii) What are the main functions of Ms Excel and Ms Word.
(ix) Write the full forms of the following abbreviations: BIT, EEPROM, BMP, DPI, DHTML, VGA.

SECTION'C' (DETAILED- ANSWER QUESTIONS)
NOTE: Answer any Two questions from this section. All questions carry equal marks. (24)
3.(a) Discuss the role of CPU. Also describe its components.
(b) What do you know about Modulation and Demodulation?

4.(a) Describe OSI reference model with diagram.
(b) What is Data communication? Define any three Communication media.

5(a) What is Computer Security? What security techniques are use to reduce risks?
(b) What is Internet Browser? Describe the different properties of a browser.


Computer Science For Class XI / HSC/FSC part 1 /1st Year (Science Group) - Past Paper 2015

Go To Index
Computer Science
For Class XI (Science Group)
Past Paper 2015


Computer Science Paper I 2015
 Time: 20 MinutesSECTION 'A' (Max. Marks: 15) 
(Multiple Choice Questions) - (M.C.Qs.)
Note:
(i) This section consists of 15 part questions and all are to be answered. Each question cairies one mark.
(ii) Do not copy down the part questions in your answerbook. Write only the answer in full against the proper number of the question and its part.
(iii) The code number of your question paper is to be written in bold letter in the beginning of the answerscript.

1. Choose the correct answer for each from the given options:
i) A Network Topology that always uses central server is:
  • Bus
  • Star ✓
  • Ring
  • Hybrid

ii) FM stands for:
  • Frequent Modulation
  • Functional Module
  • Frequency Modification
  • Frequency Modulation ✓

iii) Daisy wheel is a type of:
  • Tape
  • Printer ✓
  • Scanner
  • Disk

iv) I Giga Byte (GB) is equivalent to:
  • 1024 Bytes
  • 1024 KB
  • 1024 MB ✓
  • 1024 TB

v) The full farm of SIMM is:
  • Single Interfacing Memory Module
  • Simple Inline Memory Module
  • Single Inline Memory Module ✓
  • Simple Inline Memory Mode

vi) The set of rides to send and receive data is called:
  • Ethernet
  • Register
  • Protocol ✓
  • Bus

vii) The electrical path that carries data from one place to another place is called:
  • Bus ✓
  • Modem
  • SIMM
  • DIMM

viii) Co-axial cable and fibre optics are the examples of:
  • Router
  • Communication Media ✓
  • Modem
  • Communication Mode

ix) The process of converting analog signal into digital signal is called:
  • Modulation ✓
  • Demodulation
  • Telecommunication
  • Compilation

x) A mode of communication that allows two way communication but not simultaneously is called:
  • Full duplex
  • Half duplex ✓
  • Half simplex
  • Simplex

xi) Extension of Microsoft Excel file is:
  • .doc
  • .xls ✓
  • .bmp
  • .ppt

xii) This is an antivirus program:
  • Internet Explorer
  • Torjan
  • Worm
  • McAfee ✓

xiii) This part of CPU performs all arithmetic and logic operations:
  • CU
  • MU
  • ALU ✓
  • ROM

xiv) A software that enables user to interact with computer hardware is called:
  • Operating system ✓
  • Application software
  • Database
  • Firmware

xv) This MS-Excel formula adds the contents of given cells Al, A2, A3, A4, and AS:
  • =Count (A1:A5)
  • =AVG (A1:A25)
  • =SUM (A1:A5) ✓
  • =A1+A5

 Time: 2 Hours 40 Minutes SECTION 'B' and 'C'  (Total Marks: 15) 


Section "B" (Short-Answer Questions) (Max. Marks 36)
Note: Answer any Six part questions from this section. All questions carry equal marks.
2.i) What is the function of MODEM? Define different types of MODEM.
ii) What is Computer Virus? Define different types of Virus.
iii) What are the functions of Router and Gateway in Data Communication?
iv) What is Internet? Define its components.
v) Write the full form of the following: HTML, ISO, IEEE, WAN, HTTP, ASCII.
vi) Define the following: Bus, Cache Memory, Bar Code Reader.
vii) Differentiate between Volatile Memory and Non-volatile Memory.
viii) Define Simplex, Half-duplex and Full-duplex modes of Data Communication.
ix) What is Operating System? Why is it necessary for a computer system?

SECTION "C (Detailed-Answer Questions) (Max. Marks 24)
Note: Answer any Two questions from this section. All questions carry equal marks.
3.a) Explain any four LAN Topologies.
b) What do you mean by Protocol? Define any two types of Protocol.

4.a) What are Registers? Write the functions of any three Registers.
b) Explain Synchronous Transmission and Asynchronous Transmission.

5.a) Explain the different types of Impact Printers.
b) Describe the advantages and disadvantages of Fiber Optic Cable.


Computer Science For Class XI / HSC/FSC part 1 /1st Year (Science Group) - Past Paper 2016

Go To Index
Computer Science
For Class XI (Science Group)
Past Paper 2016


COMPUTER SCIENCE    2016

Time: 20 Minutes     Max. Marks: 15

SECTION "A" (MULTIPLE CHOICE QUESTIONS)
1. Choose the correct answer for each from the given options:

(i) A Compiler is a / an:
  • Part of a computer
  • Language translator program ✓
  • Source program
  • Object program

(ii) Data transmission, in both directions simultaneously, is:
  • Simplex
  • Full duplex ✓
  • Half duplex
  • Synchronous

(iii) This term is used to describe the data handling capacity of a given media:
  • buffer
  • routing
  • bandwidth ✓
  • cache

(iv) Bar code reader is an example of:
  • Processing device
  • Input device ✓
  • Output device
  • storage device

(v) A software, which enables users and applications to interact with the computer hardware, is called:
  • Operating system ✓
  • Application softWare
  • Browser
  • Data base management system

(vi) This MS-Excel function computes the average of given cells: Al, A2, A3, A4
  • Sum (Al : A4)
  • Average (Al, A4) ✓
  • Min (Al, A4)
  • Count (Al: A4)

(vii) In a fiber optic cable, the core is surrounded by a second layer of glass called:
  • yoke
  • cladding ✓
  • cap
  • outer pipe

(viii) This register holds the instruction awaiting execution:
  • MBR ✓
  • MAR
  • AC register
  • Program counter

(ix) The intersection of a row and a column, in an Excel spread sheet, is called:
  • Formula
  • Cell ✓
  • Macro
  • Function

(x) The special software, needed to view the webpage, is called:
  • Newsgroup
  • Web browser ✓
  • Firewall
  • Antivirus

(xi) Daisy wheel is a type of:
  • Scanner
  • Printer ✓
  • Plotter
  • Tape

(xii) The shortcut key in MS-Word, for saving a document, is:
  • Ctrl + S ✓
  • Ctrl + C
  • Ctrl + P
  • Ctrl + B

(xiii) Illegal copy of copyright software is called:
  • Hacking
  • Software privacy ✓
  • Theft of services
  • Theft of hardware

(xiv) Memory, which stays unaffected when the computer system is powered off, is:
  • ROM ✓
  • RAM
  • Cache
  • Register

(xv) This is not an operating system:
  • Unix
  • DOS
  • Compiler ✓
  • Windows

COMPUTER SCIENCE     2016

Time: 2 Hours 40 Minutes     Marks: 60

SECTION 'B' (SHORT-ANSWER QUESTIONS)(36)
NOTE: Answer 6 part questions from this section.

2.(i) Define the following terms related to screen display: CRT, Pixel, Resolution.
(ii) List the various functions normally performed by the Operating system.
(iii) Define Ring topology and give, its advantages and disadvantages.
(iv) Define Search Engine.
(v) State the uses and abuses of Internet.
(vi) What are the benefits of developing a Computer network?
(vii) Define ROM and its types.
(viii) What are the full forms of: EEPROM, GUI, DHTML, BIOS, OSI, BMP
(ix) Define the main components of CPU.

SECTION C (DETAILED- ANSWER QUEST1ONS)(24)
NOTE: Answer Two questions from this section.
3.(a) Describe the OSI model with diagram.
(b) What is System Software? Define its different types.

4.(a) What is Secondary memory? Define its types.
(b) Define different types of Scanning devices.

5.(a) Define Antivirus and its different types.
(b) Define Microwave system. How can it be useful in communication system?


Computer Science For Class XI / HSC/FSC part 1 /1st Year (Science Group) - Past Paper 2017

Go To Index
Computer Science
For Class XI (Science Group)
Past Paper 2017


COMPUTER    2017

Time: 20 Minutes     Max. Marks: 15

SECTION "A" (MULTIPLE CHOICE QUESTION)
1. Choose the correct answer for each from the given options:

(i) Sound / Voice is a kind of:
  • Hard Copy
  • Soft Copy ✓
  • Light Copy
  • Photo copy

(ii) Bit is the short form of:
  • Binary decimal
  • Binary Density
  • Binary Digit ✓
  • Binary Disk

(iii) This transmission mode allows only one way communication:
  • Simplex ✓
  • Half Simplex
  • Full Duplex
  • Half Duplex

(iv) BIOS stand for:
  • Basic Instructions Out System
  • Booting In Operating System
  • Basic Input Output System ✓
  • Booting In output System

(v) It is a kind of System Software:
  • Operating System ✓
  • MS Excel
  • MS Word
  • Database

(vi) Computer Virus is a / an:
  • Program ✓
  • Hardware
  • Silicon Chip
  • Amoeba

(vii) This is wireless communication media:
  • Twisted Pair
  • Microwave ✓
  • Coaxial
  • Fiber Optic

(viii) This is the fastest communication medium:
  • Coaxial Cable
  • Shielded Twisted Pair
  • Un-shielded Twisted Pair
  • Fiber Optic ✓

(ix) This is a Scanning device:
  • Bar Code Reader ✓
  • Plotter
  • Mouse
  • LCD

(x) This is an internet protocol:
  • WNW
  • TCP/IP ✓
  • ASCII
  • ISO

(xi) Bus, star and ring are types of:
  • Network topologies ✓
  • Operating Systems
  • Protocols
  • Viruses

(xii) CPU is linked to every hardware device in the computer system by:
  • Bus ✓
  • ROM
  • Printer
  • Operating System

(xiii) A software program that enable you to display web pages is:
  • MS Excel
  • Browser ✓
  • Windows
  • MS Word

(xiv) This type of printer produces highest quality print:
  • Laser printer ✓
  • Inkjet printer
  • Drum printer
  • Dot matrix printer

(xv) The device used to convert digital signals into analog signals and vice versa is:
  • modem ✓
  • gateway
  • router
  • bridge

COMPUTER    2017

Time: 2 Hours 40 Minutes     Marks: 60

SECTION 'B' (SHORT-ANSWER QUESTIONS)(36)
NOTE: Answer any 12 questions from this section.

2.(i) What is Data Processing Cycle? Show its steps with the help of a diagram.
(ii) Enlist any six features of an Operating System.
(iii) What will happen, if RAM is not available in a Computer System?
(iv) What is Protocol? Enlist four different protocols.
(v) What is Application Software? Name at least five Application Softwares.
(vi) What measures can be taken to save computer system from virus attacks?
(vii) Why is cache memory used in Computer System?
(viii) What is port? Enlist its types.
(ix) Write Full forms of the following: FTP, HTTP, USB.
(x) Draw labeled diagram of OSI Model.
(xi) How is secondary storage different from primary storage?
(xii) Define bit, byte and word.
(xiii) Why is ROM called non-volatile memory?
(xiv) What is network topology? Name any three.
(xv) Which layer of OSI model is responsible for routing information between computers?
(xvi) Define the term Bandwidth.
(xvii) List the benefits of LAN.
(xviii) Write the input device or output device in the given column.

Hardware Input / Output
 Joystick Input device
 Scanner Input device
 Mouse Input device
 Touch Screen Input device
 LED Output device
 Inkjet Printer  Output device


SECTION'C' (DETAILED- ANSWER QUESTIONS)
NOTE: Answer any Two questions from this section.
3.(a) Explain different types of Impact printers.
(b) What is System Software? Discuss its types.
(c) Discuss the major components of Computer System.

4.(a) Discuss the modes of transmission with examples.
(b) Differentiate between Asynchronous and Synchronous transmission methods.
(c) Describe instruction Fetch cycle.

5.(a) What is the use of Buses in computer system? Discuss the functions of any two buses.
(b) What is computer crime? How is the computer being used as tool of crime?
(c) Discuss the characteristics of Computer.


Computer Science For Class XI / HSC/FSC part 1 /1st Year (Science Group) - Past Paper 2018

Go To Index
Computer Science
For Class XI (Science Group)
Past Paper 2018


COMPUTER    2018

Time: 20 Minutes   Max. Marks: 15

SECTION "A" (MULTIPLE CHOICE QUESTION)
1. Choose the correct answer for each from the given options:

(i) This is the sequence of instructions:
  • Stack
  • Process
  • Program ✓
  • Flowchart

(ii) The network of networks is called:
  • intranet
  • Internet ✓
  • Extranet
  • instanct

(iii) In the word e-mail, 'e' stands for:
  • Extra
  • External
  • Electronic ✓
  • Easy

(iv) This technology is used in compact disks:
  • Mechanical
  • Electrical
  • Electro Magnetic
  • Laser ✓

(v) The transport layer on OSI model is:
  • Layer 3
  • Laver 4 ✓
  • Layer 5
  • Layer 6

(vi) The register holds the instruction for waiting execution:
  • MBR ✓
  • MAR
  • AC Register
  • Program Counter

(vii) This data transmission transmit data only in one direction:
  • Full Duplex
  • Half duplex
  • simplex ✓
  • Synchronous

(viii) Coaxial cable and Fiber optic cable are examples of:
  • Communication mode
  • Topology
  • Communication media ✓
  • storage device

(ix) CPU is linked to every hardware device in the computer system with:
  • ROM
  • BUS ✓
  • printer
  • operating system

(x) Ribbin is used in:
  • Laser printer
  • plotter
  • ink-jet-printer
  • Dot matrix printer ✓

(xi) During the normal PC boot process, his activates first:
  • RAM BIOS
  • CMOS
  • ROM BIOS ✓
  • Hard disk information

(xii) Sequence control register is also known as:
  • Program counter ✓
  • instruction counter
  • sequence register
  • controlling register

(xiii) Two dissimilar networks are connected with:
  • Server
  • Bridge
  • Router
  • Gateway ✓

(xiv) Computer data is transmitted block by block in this transmission:
  • Synchronous ✓
  • Full duplex
  • Asynchronous
  • Parallel

(xv) The network topology always uses central server:
  • Ring
  • Hybrid
  • Star ✓
  • Bus

COMPUTER   2018

Time: 2 Hours 40 Minutes     Marks: 60

SECTION 'B' (SHORT-ANSWER QUESTIONS)(36)
NOTE: Answer any 12 questions from this section.

2.(i) Write any three abuses of Internet.
(ii) What is a Search Engine? Name any three Search Engines.
(iii) Define control unit of CPU.
(iv) What are the peripheral devices? Name any three.
(v) List the three benefits of copyright
(vi) Give three main objectives of LAN.
(vii) Why is the data-bus called bi-directional bus?
(viii) Define Memory word.
(ix) Define Fetch cycte.
(x) Why is Modern called Moderator and Demodulator?
(xi) How is computer beneficial in Banks?
(xii) How is virus transferred from one Computer to another?
(xiii) What is the difference between command line interface and GUI?
(xiv) Write the full forms of the following: HTML, LED, OMR.
(xv) What is website address? Name any two websites.
(xvi) What are the elements of Data communication?
(xvii) Why is ROM called non-volatile memory?
(xviii) Write the input or output device in the given column:

HARDWARE INPUT / OUTPUT
 Monitor Output
 Keyboard Input
 Plotter Output
 OMR Output
 Touch Pad Input
 Drum Printer Output


SECTION 'C' (DETAILED - ANSWER QUESTIONS)
NOTE: Answer any Two questions from this section.
3.(a) What are scanning input devices? Explain any two scanning devices.
(b) What is a computer register? Define its four types.
(c) Define data communication modes with diagram.

4.(a) What are the different types of Non-impact printers?
(b) Explain the OSI model with diagram.
(c) What is software piracy? Explain.

5.(a) Describe the various types of communication media used for data communication.
(b) Explain LAN topologies with diagram.
(c) What is language translator? Define its different types?

Computer Science For Class XI / HSC/FSC part 1 /1st Year (Science Group) - Past Paper 2019

Go To Index
Computer Science
For Class XI (Science Group)
Past Paper 2019


COMPUTER   2019

Time: 20 Minutes        Max. Marks: 15

SECTION "A" (MULTIPLE CHOICE QUESTION)
1. Choose the correct answer for each from the given options:

(i) Dot Matrix is a type of:
  • Impact Printer ✓
  • Non- Impact Printer
  • Scanner
  • Plotter

(ii) DOS Linux and Unix are the types of:
  • Operating Systems ✓
  • Viruses
  • Translators

(iii) This is a computer crime:
  • Formatting
  • Backup
  • Restoring
  • Hacking ✓

(iv) This software is stored permanently on the ROM chip by the manufacturer:
  • Spyware
  • Firmware ✓
  • Hardware
  • software

(v) Telephone line is an example of:
  • Simplex Mode
  • Half-duplex Mode
  • Half-simplex Mode
  • Full-duplex Mode ✓

(vi) This software enables the user to interact with computer hardware:
  • Operating System ✓
  • Application Software
  • Firmware
  • Malware

(vii) A bar-code Reader is an example of:
  • Input Unit ✓
  • Output Unit
  • Storage Unit
  • Processing Unit

(viii) This number of bits or bytes that a microprocessor can manipulate as a unit is called:
  • Word ✓
  • unit
  • byte
  • string

(ix) It is used to transmit data from memory to microprocessor and vice versa:
  • data bus ✓
  • address bus
  • control bus
  • central bus

(x) It is also known as Memory Data Register:
  • Memory Address Register
  • Memory Buffer Register ✓
  • Instruction Register
  • Program counter

(xi) FM stands for:
  • Frequency modification
  • Frequency modulation ✓
  • Functional module

(xii) It is the most common network used to connect two or more computers which are lying in the same office or building:
  • GAN
  • MAN
  • LAN ✓
  • WAN

(xiii) The physical layout of a LAN is called:
  • link
  • layer cake
  • contention
  • topology ✓

(xiv) This is the fastest data communication media:
  • Coaxial Cable
  • Twisted Pair
  • Microwave
  • Fiber Optic ✓

COMPUTER     2019

Time: 2 Hours 40 Minutes       Marks: 60

SECTION 'B' (SHORT-ANSWER QUESTIONS)(36)
NOTE: Answer any 12 questions from this section.

2.(i) Define Protocol and name any three.
(ii) Define any two of the following: * Bridge * Router * Gateway
(iii) Which mode of Data transmission is suitable for communication from a computer to a printer?
(iv) Write the full forms of the following: * HTTP * URL * SIMM
(v) Define Ring topology and give its advantages.
(vi) Differentiate between Volatile memory and Non-Volatile So memory.
(vii) Define Impact Printer and Non-Impact Printer.
(viii) Define Analog Signal and Digital Signal.
(ix) Draw the block diagram of a Digital Computer.
(x) How is Internet useful in the field of education?
(xi) Why is an Address Bus called unidirectional?
(xii) Why is an operating System necessary for a computer?
(xiii) What are the components of LAN?
(xiv) What are the basic hardware needs for internet?
(xv) Name any two Full-duplex devices.
(xvi) What is Computer crime?
(xvii) Draw the layer cake of OSI model.
(xviii) Match the terms of column A with those of column B.

COLUMN 'A' COLUMN 'B'
 Keyboard Operating System
 Non-Volatile Firmware
 Byte LAN
 DOS ROM
 BIOS 8 bus
 Local Area Netware Input device


SECTION'C' (DETAILED- ANSWER QUESTIONS)
NOTE: Answer any Two questions from this section.
3.(a) What is Internet Browser? Describe its various types.
(b) What is a Computer Virus? What preventive measures can be taken to protect our computer from its attacks?
(c) Define the term Bus. Describe the functions of any two Buses.

4.(a) State Copyright law. Give its advantages.
(b) What is Stack? Explain its operations with examples.
(c) Define System Software and explain its three categories.

5.(a) Define Synchronous and Asyndronous transmissions with diagrams.
(b) Explain the important features of an Operating System.
(c) Who is meant by Primary and Secondary Storages? Define any three types of secondary storage.

Wednesday 2 June 2021

Computer Science (New) - For Class IX - UNIT. 5. Computer Security and Ethics - Text Book Exercise And Activity

GO TO INDEX

Chapter No.5: Computer Security and Ethics
Short Questions Answers And Text Book Exercise

Text Book Exercise


B. Respond the following:
1. Why is computer security important? Write any three reasons.
Ans: COMPUTER SECURITY:
"Computer security is the protection against theft or damage to our computer hardware, software and information present on them from threat of viruses or unauthorized use."
Explanation:
The computer has become an important part of our life. We store important data on our computers in the shape of documents, pictures, programs, etc. Therefore, we expect that all our information must remain safe and our computer runs properly without any problem.
Few threats can cause problems for our computers. These threats may be different types of viruses or unauthorized use of a computer. To prevent our computer from such threats, we need to abide by computer security.

Reason Of Importance of Computer Security:
  1. Prevent from viruses and malware:
    ► Computer security is important for our computer's overall health.
    ► It keeps our information protected and helps prevent viruses and malware, which allows programs to run quicker and smoother.

  2. Secure Private Information:  
    ► It safeguards confidential and sensitive information.
    ► The advancement in science and technology has changed day to day activities. We rely on computers and mobile phones, where we access a lot of information which we do not want to share with others. This information may include our passwords, banking details, contacts, pictures, etc. To protect this information we need to make our devices secured that no one can damage or access this information without our consent.

  3. Provide Safe Environment:
    ► Computer Security is important as it enables people to perform their work in safe environments.
    ►It helps in the execution of essential business processes.

2. Explain Cyber Bullying with an example.
Ans: Cyber Bullying or Harassment:
Cyber bullying or harassment is a type of cyber-crime in which electronic means like a computer, mobile phone or internet are used for online bullying or harassment.
Example:
Harmful bullying behavior can include:
  • Posting rumors
  • Threats
  • Passing inappropriate remarks
  • Leaking personal information
  • Blackmailing and
  • Committing hate speech

Effect Of Cyber Bullying or Harassment On Victim:
  • The perpetrator does it with the intent to cause harm to the victim.
  • Victims may experience lower self-esteem, intent to commit suicide and a variety of negative emotional responses, including being scared, frustrated, angry and depressed.

3. Why is information accuracy important?
Ans: INFORMATION ACCURACY:
The information accuracy is the type of measurement that assures the information is correct and true.
Importance Of Information Accuracy:
  • Information accuracy is important because inaccurate information is harmful in different fields like medical history, Business records, Government data, etc.
  • It is necessary that the information should not be generated from the malicious data.
  • For information accuracy, the data must be from reputable sources.
  • In the era of information explosion, we need to be more careful while using or disseminating information. The use of unreliable sources results in inaccurate information.
  • Especially, the accuracy of information shared on social media is often questionable.

4. What is Ethical Hacking?
Ans: Ethical Hacking:
Ethical Hacking sometimes called as Penetration Testing is an act of intruding / penetrating into system or networks to find out threats, vulnerabilities in those systems which a malicious attacker may find and exploit causing loss of data, financial loss or other major damages. The purpose of ethical hacking is to improve the security of the network or systems by fixing the vulnerabilities found during testing. Ethical hackers may use the same methods and tools used, by the malicious hackers but with the permission of the authorized person for the purpose of improving the security and defending the systems from attacks by malicious users.
Ethical hackers are expected to report all the vulnerabilities and weakness found during the process to the management.

5. Your friend has become a victim of cyber harassment. What two advices will you give him or her?
Ans: Pakistan is in the list of the fastest-growing countries that are using the internet. This opens the doors for the fact that cyber bullying is increasing as well but yet there is no legislation for cyber-crimes in Pakistan.
If my friend becomes the victim of cyber harassment, I will give him advice that:
(i) Report To Trusted People:
First thing is to report such incidents to the trusted people that are highly likely parents and teachers.
(ii) Complaint To Government Authorities:
Write down an application (in English or in Urdu), describe complete problem, provide as much evidences, details as he/she can and send it to FIA National Response Center for Cyber Crimes. OR send an online complaint through the form available on the website or by calling helpline 1991 which is available 24/7.

6. Write any two measures to avoid email account hacking.
Ans: Email attachments have been a popular medium to spread viruses and hack email accounts.
To avoid email account hacking, we should take following measures:

Do not open email attachments or click on hyperlinks from unknown senders:
  • The infected emails may come from an unknown or fake email address.
  • Users must check the origin of the email before opening the attached files or clicking any link that is given in the email.
  • People in our contact list may also send us infected files as they may not be aware of it themselves.

Spam or junk mails must be checked carefully before clicking on its attachment:
  • Use spam blocking or filtering tools to block unsolicited emails, instant messages and pop-ups.
  • Do not click on internet links which have unusual labels, images or captions in spasm emails.
  • Only download attachments from trusted sources.

7. How is software piracy harmful for software developers?
Ans: Software Piracy:
Software piracy is referred to the illegal use, copying or distribution of copyrighted software.

Impact Of Software Piracy On Software Industry and developers:
Software piracy is a huge threat to the software industry and developers..
  • It causes a significant loss of revenue for developers and vendors.
  • Because of piracy, vendors have fewer resources to devote to research and development of new products.
  • Since they earn less profit, they are forced to pass these costs on to their customers.
  • Software companies have tried various techniques to stop software piracy but most of them have remained unsuccessful.
  • They applied for copy- protection which demands the user to enter certain keys or credentials. Today, most software require registration which is mainly online. However, these measures could not stop software piracy.

8. Give two examples of phishing.
Ans: Example Of Phishing:
1. False Emails: In Phishing, perpetrators contact the target person through email, telephone or text message and pose as a legitimate and trusted individual. He or she asks the target to provide sensitive data such as personally identifiable information, banking and credit card details and passwords for different reasons.

2. Fake Websites:
In Phishing, perpetrators send phishing emails that include links to fake websites, such as the mobile account login page or for a known mail provider, asking the victim to enter their credentials or other information into the fake site’s interface.
In both cases, the information is then used to access different accounts and can result in identity theft and financial loss.

9. What is an Intellectual Property Right?
Ans: Intellectual Property:
When any person develops software, writes a book or research paper or invents any method or the machine, it becomes the intellectual property of that person. Thus Intellectual property is intangible creations of the human intellect.

Intellectual Property Right:
Just like other property the intellectual property can be stolen. To prevent theft or illegal use or spread of intellectual property, Intellectual Property Right is exercised.
  • Through these rights, intellectual property is protected with the help of copyrights, patents, and trademarks.
  • They allow creators or owners of patents, trademarks or copyrighted works to benefit from their work or investment. 
  • Under these rights, no other person or organization can copy or reproduce any other's intellectual property.
  • Intellectual property rights are acclaimed worldwide.
  • In Pakistan, Intellectual Property Organization ( IPO ) regulates the matters regarding intellectual property rights.

10. Differentiate the following on the given criteria. OR Define and differentiate various types of viruses: Malware , Virus, Worm, Adware and Spyware.

Criteria Virus Worm Adware Spyware
Level of danger Viruses are harmful.
 They can range from displaying irritating messages to make all the documents inaccessible or even delete them.
 Harmful as It can do several malicious tasks to cause damage Normally, these are not as dangerous as other malware.
 
 Poses high-risk threats.
 can completely shut down computer, or
 permanently erase or damage files.
How is it initiated? Viruses generally latch on a host file and when they execute they infect other files or programs. A worm can replicate itself without any human interaction. It does not need to attach itself to a file or program to cause damage. Adware is advertising-supported software or programs include games, desktop toolbars or utilities.
 Commonly, adware is web-based and collects web browser data to target advertisements, especially pop-ups.
 Spyware can come through cookies or even when we install software without reading its terms and conditions. 
Damage that can be done to data and hardware It can also modify other computer programs, insert its own code and change computer settings. It can do several malicious tasks, such as dropping other malware, copying itself onto devices physically attached to the affected system, deleting files, and consuming internal storage and memory resources. They present endless ads and pop-up windows that could potentially consume memory and processing resources. Adware can also change the different settings of internet browsers like homepage and default search engine. Spyware takes control over a mobile phone or computer without the user's knowledge.
 They capture information like web browsing history, e-mail messages, usernames and passwords and online payment information.
Effect on computer speed Slower operating speed Slow down computer performance Adware annoys the user and slows down the processing. Slowing down computer performance, even shut down system
Means to spread 
A computer virus is a computer program that can spread across computers and networks by making copies of itself, usually without the user's knowledge.
Boot Sector, Resident, Macro Viruses and File Infector are some examples of viruses.
 A computer worm spreads copies of itself from computer to computer. Adware is advertising-supported software.
 The advertisements produced by adware are sometimes in the form of a pop-up or sometimes in little windows that may not be closed.
 Spyware can come through cookies or even when we install software without reading its terms and conditions.
 System monitors, cookies trackers, rootkits and key-loggers are few examples of Spyware.


C. Match the columns:
S.NO. A S.NO. B C
(i) Presenting someone's ideas as your own without acknowledging the author.(a) Adware(i) (e)
(ii) An advertising software that presents ads and pop-up windows to spread virus.(b) Cracker(ii) (a)
(iii) Crime that is committed through a computer system.(c) PIN(iii) (f)
(iv) A secretive security code that verifies user's identity.(d) Antivirus(iv) (c)
(v) A person that gains unauthorized access to other computers by bypassing passwords.(e) Plagiarism(v) (b)
(vi) A utility software that prevents threats and data loss from a computer.(f) Cybercrime(vi) (d)


Short Answers

Q.1: Explain how to seek help against Cyber-Crime
Ans: Seek Help In Case of Becoming a Victim
  1. Report To Trusted People:
    First thing is to report such incidents to the trusted people that are highly likely parents and teachers.
  2. Complaint To Government Authorities:
    The government has also taken measures to curb cyber crimes especially cyber bullying and harassment.
    In Pakistan, the National Response Center for Cyber Crimes has been set up to help the victims of cyber crimes. An online complaint can be launched through the form available on the website or help may be sought by calling helpline 1991 which is available 24/7.

Q.2: Identify that a virus, worm, adware, spyware and Malware can spread through different ways?
Ans: Virus:
A computer virus is a computer program that can spread across computers and networks by making copies of itself, usually without the user's knowledge.

Worm:
A computer worm spreads copies of itself from computer to computer.

Spyware:
Spyware can come through cookies or even when we install software without reading its terms and conditions.

Adware:
Adware is advertising-supported software. The advertisements produced by adware are sometimes in the form of a pop-up or sometimes in little windows that may not be closed.

Activity

Activity 1:
Organize a poster exhibition in which students suggest measures to the audience how to use the computer and the internet safely. Some focused topics may be:
  • Prevent your computers from Viruses and Malware.
  • Say no to cyber bullying and harassment.
  • Say no to piracy and plagiarism.
  • How to cope with cyber crimes?

Activity 2:
During classroom discussion put the following situations before students and discuss what will they do in such a situation? And why?
  • You receive a phone call. The caller claims that you have won a huge prize and for delivering the prize they need an advance payment.
  • You receive a file from an unknown email address which asks your bank account details or user Email ID and Password.
  • While surfing an unknown website, the website demands to access content by providing your Facebook or Gmail account's credentials.

Activity 3:
Make a list of the services that free antivirus software does not offer.

Activity 4:
Search newspapers or internet to nd any news about a cyber crime. Specially in which the criminal was caught and punished.

Activity 5:
Thesis and research articles are generally checked through Turnitin which is an Internet-based paid plagiarism detection service.
There are other free online services where students can check the plagiarism in their document. Some are:
www.duplichecker.com
www.quetext.com
www.plagscan.com

Write an essay on any topic, and copy and paste some text from internet websites in your essay. Then check plagiarism of your document.


Monday 31 May 2021