100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

computer science

Rating
-
Sold
-
Pages
33
Grade
A+
Uploaded on
11-01-2026
Written in
2025/2026

the concept of computer program in detail in the form of questions and answers. only accurate answers are listed.

Institution
Junior / 11th Grade
Course
Computer science











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Junior / 11th grade
Course
Computer science
School year
3

Document information

Uploaded on
January 11, 2026
Number of pages
33
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

ICS Part 1 Computer Science FBISE Papers 2024-25




Unit 01: Computer Systems
Section A Section B Section C Total
02 marks 21 marks (7 Questions) 10 marks (2 Questions) 33 marks

SECTION A
1. Which of the following is a method used to prevent unauthorized access to a network?
a. Worm
b. Virus
c. Firewall
d. Spyware
2. What is the hexadecimal representation of the binary number 10101110?
a. 6F
b. AE
c. 9C
d. B4
3. Which gate produces a HIGH output when at least one input is LOW?
a. NOR gate
b. AND gate
c. NAND gate
d. OR gate
4. Which type of feasibility study in SDLC involves evaluating whether the proposed system can be
developed with available technology?
a. Economic feasibility
b. Legal feasibility
c. Schedule feasibility
d. Technical feasibility

SECTION B (Short Questions)
Q1. A city healthcare provider is in the process of upgrading its software to improve patient care and enhance
data security. Using this case study, recommend the most suitable implementation method of SDLC. Justify
your recommendation by outlining any two considerations. (1+2)
Implementation method
• The Phased implementation is recommended for upgrading the healthcare provider's software.
• It allows gradual implementation, minimizing disruptions to patient care.
• This method also enables continuous testing and validation, ensuring security and compliance
with healthcare regulations at each stage of the upgrade process.
Q2. Compare star and ring topologies with respect to scalability, reliability and architecture.
Feature Star Topology Ring Topology
Scalability It is moderately scalable as more devices can It is moderately scalable because adding
be connected to a hub or switch. more devices can be possible to a ring.



Prof Sajid Riaz
1
youtube.com/@smartcomputing

,ICS Part 1 Computer Science FBISE Papers 2024-25


Feature Star Topology Ring Topology
Reliability It is a reliable topology because adding or It can be reliable because data can travel
removing devices does not affect the entire in both directions that reduces single
network. point failure.
Architecture The devices are directly connected to a central The devices are connected in a circular
hub. loop.

Q3. Consider the following examples of scenarios and identify whether the waterfall or agile model would be
most suitable for development. (0.5x6)
a. Building construction
b. Developing web applications
c. Digital marketing campaign
d. Automobile production
e. Public works projects
f. Research projects
Waterfall Model is suitable for:
• Building construction
• Automobile production
• Public works projects
Agile Model is suitable for:
• Developing web applications
• Digital marketing campaign
• Research projects
Q4. Draw OR and NAND gates with their truth tables. (1.5+1.5)
OR Gate
OR gate produces a 1 output when any input is 1. The mathematical expression is F=x+y where ‘+’ stands for
OR operation. It performs logical addition on Boolean variables.




NAND Gate
NAND gate is a combination of AND and NOT gates. The output will be 0 when all inputs are 1. The
mathematical expression is F=𝒙𝒚
̅̅̅̅.




Prof Sajid Riaz
2
youtube.com/@smartcomputing

,ICS Part 1 Computer Science FBISE Papers 2024-25


Q5. How logic gates are useful in daily life? Give any three applications. (3)
Uses of Logic Gates
• Logic gates are used in memory circuits to store data such as flip-flops and latches.
• They are used in clock synchronization and signal processing in digital systems.
• They are used in complex mathematical operations of computer like multiplication and division.

Q6. Convert the following Boolean expression to logic circuit. F=xyz+x𝐲̅z+𝐱̅z (3)
x
y xyz
z



F
xy z




x z




Q7. Why does feasibility study an essential step in SDLC? In what ways can a technical feasibility study help to
identify challenges related to the infrastructure, or compatibility requirements of a software project? (1+2)
Feasibility Study
It determines whether the project is feasible with the current technology, budget and time. It also identifies
major issues and risks associated with the project.
Technical Feasibility
• It identifies infrastructure challenges like hardware, network and system requirements.
• It helps to assess compatibility with existing software and platforms.
• It estimates costs associated with technical requirements.
Q8. Write down three comparisons between Symmetric and Asymmetric encryption.
Symmetric Encryption Asymmetric Encryption
It uses a single shared key for both encryption It uses a pair of public and private keys for
and decryption. encryption and decryption.
It is more suitable for encrypting large amount It is suitable for processing smaller amount of
of data. data.
It provides better performance in terms of speed It is slower due to the complexity of
and efficiency. mathematical operations involved.

Q9. Write down three differences between Blackbox and Whitebox testing methods.
Black Box Testing White Box Testing
Software tester does not need to know the Software tester must know and understand the
internal code. internal code.
It focuses on input and output of the software. It focuses on the internal logic and structure of
the code.


Prof Sajid Riaz
3
youtube.com/@smartcomputing

, ICS Part 1 Computer Science FBISE Papers 2024-25


Black Box Testing White Box Testing
It is usually done by Software testers. It is usually done by developers or programmers.

Q10. Why is two-factor authentication (2FA) important? Also give example.
Two-Factor Authentication (2FA)
• 2FA increases security by adding an extra layer of protection beyond just a password.
• It prevents unauthorized access even if someone knows your password, they can't log in without
the second factor.
• For example, logging into Facebook requires a password and a code sent to your mobile.

Q11. Compare Bus and Mesh network topologies with respect to design, scalability and reliability.
Bus Topology
• Design: It is a network topology in which devices are connected to one cable running through the
entire network.
• Scalability: Bus topology is not highly scalable; adding more computers can result weak signals, and
extending the bus may need repeaters or switches.
• Reliability: Bus topology is less reliable because a single break in the main cable can disturb the entire
network.
Mesh Topology
• Design: It is a network topology in which each node connects with all other nodes within the network.
• Scalability: It offers high scalability. More devices can be added easily and each device has multiple
paths to communicate with others.
• Reliability: Mesh topology is highly reliable. The redundancy of multiple paths minimizes downtime.
Q12. Draw truth table for the Boolean function. F=𝑿 ̅ 𝒀𝒁 + 𝑿𝒀̅𝒁

X Y Z ̅
𝑿 ̅
𝒀 ̅ YZ
𝑿 ̅Z
X𝒀 F
0 0 0 1 1 0 0 0
0 0 1 1 1 0 0 0
0 1 0 1 0 0 0 0
0 1 1 1 0 1 0 1
1 0 0 0 1 0 0 0
1 0 1 0 1 0 1 1
1 1 0 0 0 0 0 0
1 1 1 0 0 0 0 0

Q13. Why is horizontal scalability considered more suitable for cloud-based applications? Give three reasons.
Horizontal Scalability
• Horizontal scalability provides high availability and zero downtime.
• It allows adding more servers easily to handle increased load.
• It provides better fault tolerance; if one server fails, others keep working.

Prof Sajid Riaz
4
youtube.com/@smartcomputing
$15.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
hamnamusharaf

Get to know the seller

Seller avatar
hamnamusharaf
View profile
Follow You need to be logged in order to follow users or courses
Sold
New on Stuvia
Member since
5 days
Number of followers
0
Documents
10
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions