Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien 4,6 TrustPilot
logo-home
Examen

computer science

Note
-
Vendu
-
Pages
33
Qualité
A+
Publié le
11-01-2026
Écrit en
2025/2026

the concept of computer program in detail in the form of questions and answers. only accurate answers are listed.

Établissement
Junior / 11th Grade
Cours
Computer science











Oups ! Impossible de charger votre document. Réessayez ou contactez le support.

École, étude et sujet

Établissement
Junior / 11th grade
Cours
Computer science
Année scolaire
3

Infos sur le Document

Publié le
11 janvier 2026
Nombre de pages
33
Écrit en
2025/2026
Type
Examen
Contenu
Questions et réponses

Sujets

Aperçu du contenu

ICS Part 1 Computer Science FBISE Papers 2024-25




Unit 01: Computer Systems
Section A Section B Section C Total
02 marks 21 marks (7 Questions) 10 marks (2 Questions) 33 marks

SECTION A
1. Which of the following is a method used to prevent unauthorized access to a network?
a. Worm
b. Virus
c. Firewall
d. Spyware
2. What is the hexadecimal representation of the binary number 10101110?
a. 6F
b. AE
c. 9C
d. B4
3. Which gate produces a HIGH output when at least one input is LOW?
a. NOR gate
b. AND gate
c. NAND gate
d. OR gate
4. Which type of feasibility study in SDLC involves evaluating whether the proposed system can be
developed with available technology?
a. Economic feasibility
b. Legal feasibility
c. Schedule feasibility
d. Technical feasibility

SECTION B (Short Questions)
Q1. A city healthcare provider is in the process of upgrading its software to improve patient care and enhance
data security. Using this case study, recommend the most suitable implementation method of SDLC. Justify
your recommendation by outlining any two considerations. (1+2)
Implementation method
• The Phased implementation is recommended for upgrading the healthcare provider's software.
• It allows gradual implementation, minimizing disruptions to patient care.
• This method also enables continuous testing and validation, ensuring security and compliance
with healthcare regulations at each stage of the upgrade process.
Q2. Compare star and ring topologies with respect to scalability, reliability and architecture.
Feature Star Topology Ring Topology
Scalability It is moderately scalable as more devices can It is moderately scalable because adding
be connected to a hub or switch. more devices can be possible to a ring.



Prof Sajid Riaz
1
youtube.com/@smartcomputing

,ICS Part 1 Computer Science FBISE Papers 2024-25


Feature Star Topology Ring Topology
Reliability It is a reliable topology because adding or It can be reliable because data can travel
removing devices does not affect the entire in both directions that reduces single
network. point failure.
Architecture The devices are directly connected to a central The devices are connected in a circular
hub. loop.

Q3. Consider the following examples of scenarios and identify whether the waterfall or agile model would be
most suitable for development. (0.5x6)
a. Building construction
b. Developing web applications
c. Digital marketing campaign
d. Automobile production
e. Public works projects
f. Research projects
Waterfall Model is suitable for:
• Building construction
• Automobile production
• Public works projects
Agile Model is suitable for:
• Developing web applications
• Digital marketing campaign
• Research projects
Q4. Draw OR and NAND gates with their truth tables. (1.5+1.5)
OR Gate
OR gate produces a 1 output when any input is 1. The mathematical expression is F=x+y where ‘+’ stands for
OR operation. It performs logical addition on Boolean variables.




NAND Gate
NAND gate is a combination of AND and NOT gates. The output will be 0 when all inputs are 1. The
mathematical expression is F=𝒙𝒚
̅̅̅̅.




Prof Sajid Riaz
2
youtube.com/@smartcomputing

,ICS Part 1 Computer Science FBISE Papers 2024-25


Q5. How logic gates are useful in daily life? Give any three applications. (3)
Uses of Logic Gates
• Logic gates are used in memory circuits to store data such as flip-flops and latches.
• They are used in clock synchronization and signal processing in digital systems.
• They are used in complex mathematical operations of computer like multiplication and division.

Q6. Convert the following Boolean expression to logic circuit. F=xyz+x𝐲̅z+𝐱̅z (3)
x
y xyz
z



F
xy z




x z




Q7. Why does feasibility study an essential step in SDLC? In what ways can a technical feasibility study help to
identify challenges related to the infrastructure, or compatibility requirements of a software project? (1+2)
Feasibility Study
It determines whether the project is feasible with the current technology, budget and time. It also identifies
major issues and risks associated with the project.
Technical Feasibility
• It identifies infrastructure challenges like hardware, network and system requirements.
• It helps to assess compatibility with existing software and platforms.
• It estimates costs associated with technical requirements.
Q8. Write down three comparisons between Symmetric and Asymmetric encryption.
Symmetric Encryption Asymmetric Encryption
It uses a single shared key for both encryption It uses a pair of public and private keys for
and decryption. encryption and decryption.
It is more suitable for encrypting large amount It is suitable for processing smaller amount of
of data. data.
It provides better performance in terms of speed It is slower due to the complexity of
and efficiency. mathematical operations involved.

Q9. Write down three differences between Blackbox and Whitebox testing methods.
Black Box Testing White Box Testing
Software tester does not need to know the Software tester must know and understand the
internal code. internal code.
It focuses on input and output of the software. It focuses on the internal logic and structure of
the code.


Prof Sajid Riaz
3
youtube.com/@smartcomputing

, ICS Part 1 Computer Science FBISE Papers 2024-25


Black Box Testing White Box Testing
It is usually done by Software testers. It is usually done by developers or programmers.

Q10. Why is two-factor authentication (2FA) important? Also give example.
Two-Factor Authentication (2FA)
• 2FA increases security by adding an extra layer of protection beyond just a password.
• It prevents unauthorized access even if someone knows your password, they can't log in without
the second factor.
• For example, logging into Facebook requires a password and a code sent to your mobile.

Q11. Compare Bus and Mesh network topologies with respect to design, scalability and reliability.
Bus Topology
• Design: It is a network topology in which devices are connected to one cable running through the
entire network.
• Scalability: Bus topology is not highly scalable; adding more computers can result weak signals, and
extending the bus may need repeaters or switches.
• Reliability: Bus topology is less reliable because a single break in the main cable can disturb the entire
network.
Mesh Topology
• Design: It is a network topology in which each node connects with all other nodes within the network.
• Scalability: It offers high scalability. More devices can be added easily and each device has multiple
paths to communicate with others.
• Reliability: Mesh topology is highly reliable. The redundancy of multiple paths minimizes downtime.
Q12. Draw truth table for the Boolean function. F=𝑿 ̅ 𝒀𝒁 + 𝑿𝒀̅𝒁

X Y Z ̅
𝑿 ̅
𝒀 ̅ YZ
𝑿 ̅Z
X𝒀 F
0 0 0 1 1 0 0 0
0 0 1 1 1 0 0 0
0 1 0 1 0 0 0 0
0 1 1 1 0 1 0 1
1 0 0 0 1 0 0 0
1 0 1 0 1 0 1 1
1 1 0 0 0 0 0 0
1 1 1 0 0 0 0 0

Q13. Why is horizontal scalability considered more suitable for cloud-based applications? Give three reasons.
Horizontal Scalability
• Horizontal scalability provides high availability and zero downtime.
• It allows adding more servers easily to handle increased load.
• It provides better fault tolerance; if one server fails, others keep working.

Prof Sajid Riaz
4
youtube.com/@smartcomputing
14,20 €
Accéder à l'intégralité du document:

Garantie de satisfaction à 100%
Disponible immédiatement après paiement
En ligne et en PDF
Tu n'es attaché à rien

Faites connaissance avec le vendeur
Seller avatar
hamnamusharaf

Faites connaissance avec le vendeur

Seller avatar
hamnamusharaf
S'abonner Vous devez être connecté afin de pouvoir suivre les étudiants ou les formations
Vendu
Nouveau sur Stuvia
Membre depuis
5 jours
Nombre de followers
0
Documents
10
Dernière vente
-

0,0

0 revues

5
0
4
0
3
0
2
0
1
0

Récemment consulté par vous

Pourquoi les étudiants choisissent Stuvia

Créé par d'autres étudiants, vérifié par les avis

Une qualité sur laquelle compter : rédigé par des étudiants qui ont réussi et évalué par d'autres qui ont utilisé ce document.

Le document ne convient pas ? Choisis un autre document

Aucun souci ! Tu peux sélectionner directement un autre document qui correspond mieux à ce que tu cherches.

Paye comme tu veux, apprends aussitôt

Aucun abonnement, aucun engagement. Paye selon tes habitudes par carte de crédit et télécharge ton document PDF instantanément.

Student with book image

“Acheté, téléchargé et réussi. C'est aussi simple que ça.”

Alisha Student

Foire aux questions