100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

computer science

Beoordeling
-
Verkocht
-
Pagina's
33
Cijfer
A+
Geüpload op
11-01-2026
Geschreven in
2025/2026

the concept of computer program in detail in the form of questions and answers. only accurate answers are listed.

Instelling
Junior / 11th Grade
Vak
Computer science











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
Junior / 11th grade
Vak
Computer science
School jaar
3

Documentinformatie

Geüpload op
11 januari 2026
Aantal pagina's
33
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Voorbeeld van de inhoud

ICS Part 1 Computer Science FBISE Papers 2024-25




Unit 01: Computer Systems
Section A Section B Section C Total
02 marks 21 marks (7 Questions) 10 marks (2 Questions) 33 marks

SECTION A
1. Which of the following is a method used to prevent unauthorized access to a network?
a. Worm
b. Virus
c. Firewall
d. Spyware
2. What is the hexadecimal representation of the binary number 10101110?
a. 6F
b. AE
c. 9C
d. B4
3. Which gate produces a HIGH output when at least one input is LOW?
a. NOR gate
b. AND gate
c. NAND gate
d. OR gate
4. Which type of feasibility study in SDLC involves evaluating whether the proposed system can be
developed with available technology?
a. Economic feasibility
b. Legal feasibility
c. Schedule feasibility
d. Technical feasibility

SECTION B (Short Questions)
Q1. A city healthcare provider is in the process of upgrading its software to improve patient care and enhance
data security. Using this case study, recommend the most suitable implementation method of SDLC. Justify
your recommendation by outlining any two considerations. (1+2)
Implementation method
• The Phased implementation is recommended for upgrading the healthcare provider's software.
• It allows gradual implementation, minimizing disruptions to patient care.
• This method also enables continuous testing and validation, ensuring security and compliance
with healthcare regulations at each stage of the upgrade process.
Q2. Compare star and ring topologies with respect to scalability, reliability and architecture.
Feature Star Topology Ring Topology
Scalability It is moderately scalable as more devices can It is moderately scalable because adding
be connected to a hub or switch. more devices can be possible to a ring.



Prof Sajid Riaz
1
youtube.com/@smartcomputing

,ICS Part 1 Computer Science FBISE Papers 2024-25


Feature Star Topology Ring Topology
Reliability It is a reliable topology because adding or It can be reliable because data can travel
removing devices does not affect the entire in both directions that reduces single
network. point failure.
Architecture The devices are directly connected to a central The devices are connected in a circular
hub. loop.

Q3. Consider the following examples of scenarios and identify whether the waterfall or agile model would be
most suitable for development. (0.5x6)
a. Building construction
b. Developing web applications
c. Digital marketing campaign
d. Automobile production
e. Public works projects
f. Research projects
Waterfall Model is suitable for:
• Building construction
• Automobile production
• Public works projects
Agile Model is suitable for:
• Developing web applications
• Digital marketing campaign
• Research projects
Q4. Draw OR and NAND gates with their truth tables. (1.5+1.5)
OR Gate
OR gate produces a 1 output when any input is 1. The mathematical expression is F=x+y where ‘+’ stands for
OR operation. It performs logical addition on Boolean variables.




NAND Gate
NAND gate is a combination of AND and NOT gates. The output will be 0 when all inputs are 1. The
mathematical expression is F=𝒙𝒚
̅̅̅̅.




Prof Sajid Riaz
2
youtube.com/@smartcomputing

,ICS Part 1 Computer Science FBISE Papers 2024-25


Q5. How logic gates are useful in daily life? Give any three applications. (3)
Uses of Logic Gates
• Logic gates are used in memory circuits to store data such as flip-flops and latches.
• They are used in clock synchronization and signal processing in digital systems.
• They are used in complex mathematical operations of computer like multiplication and division.

Q6. Convert the following Boolean expression to logic circuit. F=xyz+x𝐲̅z+𝐱̅z (3)
x
y xyz
z



F
xy z




x z




Q7. Why does feasibility study an essential step in SDLC? In what ways can a technical feasibility study help to
identify challenges related to the infrastructure, or compatibility requirements of a software project? (1+2)
Feasibility Study
It determines whether the project is feasible with the current technology, budget and time. It also identifies
major issues and risks associated with the project.
Technical Feasibility
• It identifies infrastructure challenges like hardware, network and system requirements.
• It helps to assess compatibility with existing software and platforms.
• It estimates costs associated with technical requirements.
Q8. Write down three comparisons between Symmetric and Asymmetric encryption.
Symmetric Encryption Asymmetric Encryption
It uses a single shared key for both encryption It uses a pair of public and private keys for
and decryption. encryption and decryption.
It is more suitable for encrypting large amount It is suitable for processing smaller amount of
of data. data.
It provides better performance in terms of speed It is slower due to the complexity of
and efficiency. mathematical operations involved.

Q9. Write down three differences between Blackbox and Whitebox testing methods.
Black Box Testing White Box Testing
Software tester does not need to know the Software tester must know and understand the
internal code. internal code.
It focuses on input and output of the software. It focuses on the internal logic and structure of
the code.


Prof Sajid Riaz
3
youtube.com/@smartcomputing

, ICS Part 1 Computer Science FBISE Papers 2024-25


Black Box Testing White Box Testing
It is usually done by Software testers. It is usually done by developers or programmers.

Q10. Why is two-factor authentication (2FA) important? Also give example.
Two-Factor Authentication (2FA)
• 2FA increases security by adding an extra layer of protection beyond just a password.
• It prevents unauthorized access even if someone knows your password, they can't log in without
the second factor.
• For example, logging into Facebook requires a password and a code sent to your mobile.

Q11. Compare Bus and Mesh network topologies with respect to design, scalability and reliability.
Bus Topology
• Design: It is a network topology in which devices are connected to one cable running through the
entire network.
• Scalability: Bus topology is not highly scalable; adding more computers can result weak signals, and
extending the bus may need repeaters or switches.
• Reliability: Bus topology is less reliable because a single break in the main cable can disturb the entire
network.
Mesh Topology
• Design: It is a network topology in which each node connects with all other nodes within the network.
• Scalability: It offers high scalability. More devices can be added easily and each device has multiple
paths to communicate with others.
• Reliability: Mesh topology is highly reliable. The redundancy of multiple paths minimizes downtime.
Q12. Draw truth table for the Boolean function. F=𝑿 ̅ 𝒀𝒁 + 𝑿𝒀̅𝒁

X Y Z ̅
𝑿 ̅
𝒀 ̅ YZ
𝑿 ̅Z
X𝒀 F
0 0 0 1 1 0 0 0
0 0 1 1 1 0 0 0
0 1 0 1 0 0 0 0
0 1 1 1 0 1 0 1
1 0 0 0 1 0 0 0
1 0 1 0 1 0 1 1
1 1 0 0 0 0 0 0
1 1 1 0 0 0 0 0

Q13. Why is horizontal scalability considered more suitable for cloud-based applications? Give three reasons.
Horizontal Scalability
• Horizontal scalability provides high availability and zero downtime.
• It allows adding more servers easily to handle increased load.
• It provides better fault tolerance; if one server fails, others keep working.

Prof Sajid Riaz
4
youtube.com/@smartcomputing
$15.99
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten

Maak kennis met de verkoper
Seller avatar
hamnamusharaf

Maak kennis met de verkoper

Seller avatar
hamnamusharaf
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
Nieuw op Stuvia
Lid sinds
5 dagen
Aantal volgers
0
Documenten
10
Laatst verkocht
-

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen