Computer Science HSSC-I Solution of 2nd Set Model Paper
Computer Science HSSC-I Solution of 2nd Set Model Paper
ROLL NUMBER
⓪ ⓪ ⓪ ⓪ ⓪ ⓪ ⓪ ⓪ ⓪ ⓪ ⓪
① ① ① ① ① ① ① ① ① ① ①
② ② ② ② ② ② ② ② ② ② ②
Answer Sheet No.____________
③ ③ ③ ③ ③ ③ ③ ③ ③ ③ ③
④ ④ ④ ④ ④ ④ ④ ④ ④ ④ ④
⑤ ⑤ ⑤ ⑤ ⑤ ⑤ ⑤ ⑤ ⑤ ⑤ ⑤
⑥ ⑥ ⑥ ⑥ ⑥ ⑥ ⑥ ⑥ ⑥ ⑥ ⑥ Sign. of Candidate ___________
⑦ ⑦ ⑦ ⑦ ⑦ ⑦ ⑦ ⑦ ⑦ ⑦ ⑦
⑧ ⑧ ⑧ ⑧ ⑧ ⑧ ⑧ ⑧ ⑧ ⑧ ⑧ Sign. of Invigilator ___________
⑨ ⑨ ⑨ ⑨ ⑨ ⑨ ⑨ ⑨ ⑨ ⑨ ⑨
Section – A is compulsory. All parts of this section are to be answered on this page and handed
over to the Centre Superintendent. Deleting/overwriting is not allowed. Do not use lead pencil.
Q.1 Fill the relevant bubble for each part. Each part carries one mark.
(1) Which pointing device is popular with ATM machines?
A. Touch Pad ⃝ B. Trackball ⃝
C. Touch Screen D. Light Pen ⃝
(2) Which device reads the information of owner from Credit Card?
A. Bar Code Reader ⃝ B. Magnetic Card Reader
C. Optical Scanner ⃝ D. Handheld Scanner ⃝
(4) Which one of the following Orbits is at the distance of 22,000 miles from the
surface of the Earth?
A. GEO B. MEO ⃝
C. LEO ⃝ D. HEO ⃝
(7) Which device have instructions to load operating system from hard disk to RAM?
A. RAM ⃝ B. Cache ⃝
C. ROM D. Register ⃝
Page 1 of 2
(8) Which theoretical foundation of a data base determines that how data is stored,
organized, and manipulated?
A. Database Model B. Database Structure ⃝
C. Database Design ⃝ D. Database Architecture ⃝
(13) Which one of the following Network devices is used to forward data packets
across similar or different networks?
A. Server ⃝ B. Router
C. Modem ⃝ D. Gateway ⃝
(15) Which one of the following port is Not replaced by USB port?
A. Serial ⃝ B. Firewire
C. Parallel ⃝ D. PS/2 ⃝
_____________
Page 2 of 2
Federal Board HSSC-I Examination
Computer Science Model Question Paper
(Curriculum 2009)
Note: Answer any twelve parts from Section ‘B’ and attempt any three questions from Section
‘C’ on the separately provided answer book. Write your answers neatly and legibly.
Ans. LCD (Liquid crystal display) is much better and more commonly used now-a-
days because of the following reasons:
It produces sharper and better image as compared to CRT monitors.
It consumes less power.
It emits less radiation as compared to CRT monitors.
It weighs less.
ii. Write down one example of each Productivity Software, Open-Source Software
and Device Driver.
iii. Which pointing device is available in laptop? How it differs from a mouse? Give
two reasons.
iv. What are the two basic components of CPU? Illustrate with diagram.
Ans. The two basic components of the CPU are ALU (Arithmetic and Logic
Unit) and CU (Control Unit).
ALU: It is the part of CPU where actual programming takes place.
CU: It controls and coordinate the activities of the entire computer system.
CPU
v. What is Memory Word? How size of Memory word affects the speed of
computer?
Ans. The smallest size of data processed by the CPU is called memory word. It is
number of bits transferred during read or write operation. So, larger the size of
memory word, means the more bits transferred or processed at one time and it
will increase the speed of computer.
Ans. EPROM: It stands for Electrically EPROM. No need to remove it from the
computer for reprogramming. It can be reprogrammed many times using electric
current. It needs special software for programming.
EEPROM: It stands for Erasable PROM. It must be removed from the computer
for reprogramming. It can be reprogrammed many times using ultraviolet rays. It
needs special equipment for reprogramming.
vii. Which port is plug and play? Why is it called plug and play? Give two reasons.
Ans. USB port is a plug n’ play port, and the mostly used port in a computer. It is
called a plug and play port because it automatically detects what type of
device is attached to a computer. After detecting it automatically installs the
driver for it. Hence, as the name suggests you can plug in a device in this port
and start using it without having to install its driver.
viii. Write down the functions of Memory Address Register and Program Counter?
How are they linked?
It utilizes more than one cycle to execute the It utilizes only one cycle to execute an
instruction. instruction.
It reduces the length of the code. It increases the length of the code.
It requires little RAM to store instruction. It requires more RAM to store instruction.
xiii. What is Wireless Network? Give one advantage and one disadvantage.
Ans.
It is a network in which nodes are connected wirelessly using any wireless
technology like Wi-Fi, Bluetooth etc.
(any one valid advantage/disadvantage)
Advantage: Easily add users without changing the physical connections
Disadvantage: Its speed is slower than wired network.
xiv. In an organization, an employee assigned a single login and he work under only
one department. Draw ER diagram of given scenario.
Ans.
xv. Determine the type of database language by the commands given of each type:
Ans.
Q.3 a. What is an Instruction? Briefly explain three types of instructions with example. (4)
Ans. INSTRUCTION
It is also called instruction code. It is a group of bits that instruct the computer to
perform a specific task. They are stored in a continuous location and are executed in sequence.
Types:
b. Read the given description carefully and complete the following grid: (4)
1 2 3
Description Name of Storage Category of Storage:
Device Primary/Secondary
Volatile memory that is used as
cache memory and does not need
to be recharged
Volatile memory that uses laser
beam to read/write data and have
smaller and very densely packed
bumps due to which it has largest
storage capacity
Non-volatile memory that uses
electric current to rewrite data and
work like flash memory
Non-volatile memory in which
data is accessed sequentially and
mostly used for backing purpose
Ans.
1 2 3
Name of Storage Category of Storage:
Description
Device Primary/Secondary
Volatile memory that is used as
cache memory and does not need to SRAM Primary
be recharged
Volatile memory that uses laser
beam to read/write data and have
smaller and very densely packed Blu Ray Disk Secondary
bumps due to which it has largest
storage capacity
Non-volatile memory that uses
electric current to rewrite data and EEPROM Primary
work like flash memory
Non-volatile memory in which data
is accessed sequentially and mostly Magnetic Tape Secondary
used for backing purpose
Q.4 Describe the following classification of computers with their applications in daily life:
i. Supercomputer ii. Mainframe Computer (2+2+2+2)
iii. Microcomputer iv. Mobile Computing
Ans. i. Supercomputer
It is used to process large amount of data. It is used to process complex calculation. It is
used to design and control the complicate machine i.e., rockets. It is big in size. It is very costly.
It has very large memory. It has very high processing speed. Example: Cray-1
ii. Mainframe Computer
It is used as server computer. It can also handle large amount of data. It can handle
thousands of users at the same time. It is less costly and smaller than supercomputer. It can
process trillion of instructions per Second (TIPS). Example: IBM SYSTEM 360
iii. Microcomputer
It uses LSI (Large Scale Integration) or VLSI (Very Large-Scale Integration) technology.
It is used in Homes, Business, Hospitals etc. It can process millions of instructions per Second
(MIPS) Example: IBM ThinkPad, HP Envy Series
Q.5 Discuss the Ring and Mesh topologies, with respect to advantages and disadvantages.
Illustrate with the help of diagram. (4+4)
Ans.
Ring Topology:
In this topology, all nodes are attached in such a way that they make a closed loop. The
last computer is attached to the first computer to make a ring. Each node receives data from
previous computer and send to next computer. The data passed through ring until it reaches to
destination.
Advantages:
o It is simple and easy to install.
o It is very cheap.
o It is a collision free topology.
o It is suitable for small network.
Disadvantages:
o If ring breaks, the entire network goes down.
o It is not suitable for large network as increase the number of nodes and it will slow down
the network.
o Difficult to locate a problem if networks go down.
Mesh Topology:
In this topology, all nodes relate to each other through
direct and dedicated link. Each node sends and receives data
through dedicated link.
Advantages:
o Easy to locate a problem if network goes down
o Provide high security and privacy.
o It is suitable for high traffic.
o It is most reliable topology.
Disadvantages:
o It is the most expensive topology.
o It is difficult to maintain.
o It is not suitable for large network.
Q.6 a. What is Primary Key, Foreign Key, Alternate and Candidate Key? (4)
Ans.
Primary keys:
o An attribute or set of attributes that is used to identify a record in a relation is known as
primary key. It should be unique and not null.
o Example: A student table contains different attributes such as Roll No. Name, DOB,
Address and phone. The attribute Roll No. uniquely identifies each student in the relation so it
can be used as primary key.
Candidate Key:
o An attribute or set of attributes that can be used as primary key are called candidate keys.
o Example: A student table contains different attributes such as Reg no, Roll No. Name,
DOB, Address and phone. The attribute Reg no. and roll no. can be used to identify each
student in the relation. Both attributes are known as candidate keys.
Alternate Key:
o The candidate keys that are not selected as primary key are known as alternate keys.
o Example: A student table contains different attributes such as Reg no, Roll No. Name,
DOB, Address and phone. The attribute Reg no. and roll no. can be used to identify each
student in the relation. If Roll No. is selected as primary key, then Reg no. becomes an alternate
key.
Foreign Key:
A foreign key is an attribute or set of attributes whose values match with a primary key in
another relation.
Example: The Roll no. attribute in parent relation is used as primary key. Same Roll No.
Attribute in Child relation is used as foreign key.
b. Also identifies them in the following ER-diagram. Mention the cardinality and modality
of given entities in the diagram. (2+2)
Ans. Primary Key:
StudentStudent_Id
DepartmentDepartment_Id
CourseCourse_Id
Candidate Key:
StudentStudent_Id, CNIC
Foreign Key:
DepartmentStudent_Id, Faculty_Id
CourseStudent_Id, Department_Id
Alternate Key:
StudentCNIC
*Cardinality C
Modality M
*****
NOTE: This is suggested (proposed) solution to the questions given in SECTION-B and C.
Students can write any valid alternate answers.