Exit Exam
Exit Exam
M. Akbar Momand
Dalwa 24, 2024
Page 1 of 59
Network Security
1. What is network security, and why is it important?
Network security involves implementing policies, technologies, and practices to protect the
integrity, confidentiality, and availability of data and systems on a network. It is essential to
safeguard sensitive information, prevent unauthorized access, and ensure seamless business
operations.
2. What are the primary goals of network security?
The primary goals are:
Confidentiality: Protecting data from unauthorized access.
Integrity: Ensuring data is not altered during transmission.
Availability: Ensuring authorized users can access resources when needed.
Page 2 of 59
Answer:
Packet-filtering firewalls: Analyze packets based on IP, port, and protocol.
Stateful inspection firewalls: Monitor active connections and their states.
Next-generation firewalls (NGFWs): Offer advanced features like deep packet inspection and
application filtering.
Page 3 of 59
Host-based IDS (HIDS): Monitors a specific device or host.
Network-based IDS (NIDS): Monitors network traffic for malicious patterns.
A DMZ is a buffer zone that hosts public-facing services (e.g., web servers) while isolating them
from the internal network. It minimizes the risk of external threats reaching sensitive systems.
17. How do modern firewalls handle encrypted traffic?
Modern firewalls use features like SSL/TLS decryption to inspect encrypted traffic for threats.
They temporarily decrypt packets, analyze their content, and re-encrypt them before forwarding.
18. What are some best practices for securing VPNs?
Use strong encryption protocols (e.g., AES-256, IPSec).
Implement MFA for VPN access.
Regularly update VPN software.
Monitor VPN logs for unusual activities.
Page 4 of 59
19. What are common challenges in intrusion detection systems (IDS)?
False positives: Legitimate traffic flagged as malicious.
False negatives: Threats not detected by the IDS.
High volume of alerts requiring manual analysis.
20. How can organizations defend against network attacks?
Regularly update and patch systems.
Implement firewalls and IDS/IPS systems.
Train employees on cybersecurity awareness.
Conduct regular security audits and penetration testing.
Page 6 of 59
8. What is a VLAN, and how does it enhance network performance?
Answer:
A VLAN (Virtual Local Area Network) logically segments a physical network into isolated
networks based on devices' roles or departments. This reduces broadcast domains, enhances
security, and improves performance by isolating traffic.
11. What are the VTP modes, and what does each mode do?
Answer:
Server mode: Creates, modifies, and propagates VLAN configurations.
Client mode: Receives VLAN updates but cannot create or modify VLANs.
Transparent mode: Forwards VTP updates but does not process or synchronize them.
Page 7 of 59
Answer:
Data Link Connection Identifier (DLCI): Identifies virtual circuits.
PVCs (Permanent Virtual Circuits): Persistent logical connections.
FRAD (Frame Relay Access Device): Connects end devices to the Frame Relay network.
14. What is the difference between DLCI and PVC in Frame Relay?
Answer:
DLCI: A unique identifier for virtual circuits on a Frame Relay network.
PVC: A permanent logical connection identified by a DLCI, always available for data
transmission.
Page 8 of 59
18. How does OSPF ensure link reliability in a network?
Answer:
OSPF uses hello packets to monitor neighbor relationships and detects link failures quickly. It
recalculates routes using the Dijkstra algorithm to find an alternative path.
19. What are the main differences between VLANs and VTP?
Answer:
VLANs: Create logical network segments to isolate traffic.
VTP: Manages and propagates VLAN information across switches in a domain.
Project Management
1. What is IT Project Management?
Answer:
IT project management is the application of knowledge, skills, tools, and techniques to plan,
execute, monitor, and complete IT-specific projects. It involves managing project scope, budget,
timeline, and resources to achieve predefined goals.
Page 9 of 59
Answer:
Stakeholder management ensures that the needs and expectations of individuals or groups
affected by the project are addressed. This fosters collaboration, reduces conflicts, and increases
the likelihood of project success.
Page 11 of 59
Answer:
Resource management involves planning, allocating, and monitoring resources such as
personnel, hardware, software, and budget to ensure project efficiency.
Page 12 of 59
Routing and Switching
1. What is IP Addressing?
Answer:
IP addressing is the method of assigning a unique identifier (IP address) to each device on a
network. An IP address enables devices to communicate with each other over the internet or
local networks. It consists of a network portion and a host portion.
Page 13 of 59
6. How do you configure an IP address on a Cisco router?
Answer:
To configure an IP address on a Cisco router, access the device in Global Configuration Mode
and use the following commands:
Router> enable
Router# configure terminal
Router(config)# interface GigabitEthernet0/0
Router(config-if)# ip address 192.168.1.1 255.255.255.0
Router(config-if)# no shutdown
12. What is the difference between RSTP (Rapid Spanning Tree Protocol) and STP?
Answer:
RSTP is an enhanced version of STP that provides faster convergence times. While STP can take
up to 50 seconds to converge, RSTP can do so in a few seconds, making the network more
resilient.
15. What is the difference between Static Routing and Dynamic Routing?
Answer:
Static Routing: Routes are manually configured and do not change unless manually updated.
Page 15 of 59
Dynamic Routing: Uses protocols to automatically adjust routes based on network changes (e.g.,
RIP, OSPF).
18. What is the maximum hop count in RIP, and why is it important?
Answer:
The maximum hop count in RIP is 15, which limits the protocol to smaller networks. A hop
count of 16 is considered unreachable, making RIP unsuitable for large or complex networks.
Page 16 of 59
Limitations: Slow convergence, limited scalability (due to hop count limit), and no support for
Variable Length Subnet Masking (VLSM).
Page 17 of 59
Wireless Network
1. What is a Wireless Network?
Answer:
A wireless network allows devices to communicate and share data without the use of physical
cables. It uses radio frequency (RF) signals to transmit data over the air, providing flexibility and
mobility to users.
5. What is the difference between 2.4 GHz and 5 GHz frequency bands?
Answer:
2.4 GHz: Offers longer range but is more susceptible to interference from other devices like
microwaves, Bluetooth, and cordless phones.
5 GHz: Provides higher speeds and less interference but has a shorter range compared to 2.4
GHz.
Page 20 of 59
Using the 5 GHz band (less congested).
Adjusting the placement of Access Points to avoid physical obstructions.
Choosing non-overlapping channels for Wi-Fi networks.
Using advanced technologies like beamforming to direct signals.
Page 21 of 59
Answer:
An SSID (Service Set Identifier) is a unique name that identifies a wireless network. It is used by
wireless devices to locate and connect to the correct network.
Page 22 of 59
Hardware
What is an input device?
An input device is hardware that allows users to enter data and commands into a computer for
processing.
Give three examples of input devices and their functions.
Keyboard (used for typing and entering commands), Mouse (used for pointing and clicking on
graphical interfaces), and Scanner (used for digitizing printed documents or images).
How does a touchpad differ from a mouse?
A touchpad is a built-in input device found in laptops, allowing users to control the cursor using
finger gestures, while a mouse is an external device that requires a surface to operate.
What is the function of a barcode scanner?
A barcode scanner reads barcodes from products or documents and converts them into digital
data for inventory or identification purposes.
What is an output device?
An output device is hardware that displays, prints, or transmits processed data from a computer
to the user.
What are three common types of output devices?
Monitor (displays visual output), Printer (produces hard copies of documents), and Speakers
(output sound from a computer).
What is the difference between an LED and an LCD monitor?
LED (Light Emitting Diode) monitors use light-emitting diodes for better brightness and energy
efficiency, while LCD (Liquid Crystal Display) monitors use fluorescent backlighting.
How does a laser printer work?
A laser printer uses a laser beam to create an electrostatic image on a drum, which attracts toner
powder and transfers it onto paper, producing high-quality prints.
What is a system unit in a computer?
The system unit is the main part of a computer that houses the motherboard, processor, memory,
power supply, and storage devices.
What are the main components inside a system unit?
The motherboard, central processing unit (CPU), memory (RAM), power supply unit (PSU),
hard drive (HDD/SSD), and cooling fans.
What is the function of the motherboard?
Page 23 of 59
The motherboard connects and allows communication between all hardware components,
including the processor, memory, and peripheral devices.
How does a power supply unit (PSU) work?
A PSU converts electrical power from an outlet into the appropriate voltage and current required
to power the computer’s internal components.
What is a processor (CPU)?
The CPU (Central Processing Unit) is the brain of the computer that performs calculations,
executes instructions, and processes data.
What are the main components of a CPU?
Arithmetic Logic Unit (ALU) (performs calculations), Control Unit (CU) (manages instruction
execution), and Registers (store temporary data).
What is the difference between a dual-core and a quad-core processor?
A dual-core processor has two processing units, while a quad-core processor has four, allowing
for better multitasking and performance.
What is the difference between primary and secondary memory?
Primary memory (RAM, cache) is fast and volatile, while secondary memory (HDD, SSD) is
non-volatile and stores data permanently.
What is computer memory?
Computer memory stores data and instructions temporarily or permanently for processing and
execution by the CPU.
What is the difference between RAM and ROM?
RAM (Random Access Memory) is temporary, volatile memory used for running applications,
while ROM (Read-Only Memory) is non-volatile memory that stores essential firmware or BIOS
settings.
What is an instruction cycle in a CPU?
An instruction cycle is the process in which the CPU fetches, decodes, executes, and stores
instructions.
Why is cache memory important?
Cache memory is a small, high-speed memory located close to the CPU, storing frequently used
data and instructions to improve processing speed.
Page 24 of 59
Office
What is Microsoft Word?
Microsoft Word is a word processing application used to create, edit, format, and print text
documents.
What is the purpose of the Ribbon in MS Word?
The Ribbon is a toolbar at the top of MS Word that contains tabs and commands for formatting,
inserting, and editing documents.
How can you insert a table in Word?
Go to the Insert tab → Click Table → Choose the number of rows and columns.
What is the function of the ‘Find and Replace’ feature?
It allows users to quickly locate specific words or phrases and replace them with new text.
How do you insert a header or footer in Word?
Go to the Insert tab → Click Header or Footer → Choose a style and enter text.
What is the difference between ‘Save’ and ‘Save As’?
Save updates the existing document, while Save As allows saving the document with a new
name or format.
How do you add page numbers to a document?
Go to the Insert tab → Click Page Number → Choose a position and style.
What is a template in MS Word?
A template is a pre-designed document layout that users can customize to create new documents
quickly.
How do you change the page orientation in Word?
Go to the Layout tab → Click Orientation → Select Portrait or Landscape.
What are the different types of breaks in MS Word?
Page Break (moves text to a new page), Section Break (divides the document into sections with
different formatting), and Column Break (moves text to the next column).
What is Microsoft Excel used for?
Microsoft Excel is a spreadsheet program used for data organization, calculations, graphing, and
financial analysis.
What is a cell in Excel?
A cell is the intersection of a row and a column in a worksheet, where data is entered.
Page 25 of 59
What is the difference between a workbook and a worksheet?
A workbook is an Excel file containing multiple worksheets (individual spreadsheets).
How do you apply a formula in Excel?
Click on a cell → Type = followed by the formula (e.g., =SUM(A1:A5)) → Press Enter.
What is the AutoSum function used for?
AutoSum automatically calculates the sum of selected numbers using the SUM function.
How do you freeze rows and columns in Excel?
Go to the View tab → Click Freeze Panes → Choose Freeze Top Row or Freeze First Column.
What is the difference between relative and absolute cell references?
Relative reference (A1) changes when copied, while absolute reference ($A$1) remains fixed.
What is Conditional Formatting?
Conditional Formatting changes the appearance of cells based on specific conditions, such as
highlighting values above a certain number.
How do you create a chart in Excel?
Select data → Go to the Insert tab → Click Chart → Choose a chart type.
What is the purpose of PivotTables in Excel?
PivotTables summarize large amounts of data, allowing users to analyze and organize
information efficiently.
Page 26 of 59
Windows
What is Windows 10?
Windows 10 is an operating system developed by Microsoft, designed for PCs, laptops, tablets,
and other devices.
What is the purpose of the Start Menu in Windows 10?
The Start Menu provides quick access to installed applications, settings, and frequently used
files.
What are the different editions of Windows 10?
Windows 10 Home, Windows 10 Pro, Windows 10 Enterprise, and Windows 10 Education.
What is Cortana in Windows 10?
Cortana is Microsoft’s built-in virtual assistant that helps users with voice commands, reminders,
and searches.
How do you check system specifications in Windows 10?
Right-click This PC → Click Properties → View system details like processor, RAM, and
Windows version.
What is File Explorer in Windows 10?
File Explorer is the built-in tool for managing files, folders, and drives on a computer.
How do you create a new folder in Windows 10?
Right-click on the desktop or inside a folder → Click New → Select Folder → Enter a name.
What is the purpose of the Recycle Bin?
The Recycle Bin temporarily stores deleted files, allowing users to restore them if needed.
How do you empty the Recycle Bin?
Right-click the Recycle Bin icon → Click Empty Recycle Bin → Confirm deletion.
How do you adjust display settings in Windows 10?
Right-click on the desktop → Click Display settings → Adjust resolution, brightness, and other
display preferences.
What is the purpose of Task Manager?
Task Manager monitors running applications, processes, system performance, and allows users
to close unresponsive programs.
How do you open Task Manager?
Press Ctrl + Shift + Esc or Ctrl + Alt + Delete and select Task Manager.
Page 27 of 59
What is the Action Center in Windows 10?
The Action Center is a notification panel that provides quick access to system alerts and settings
like Wi-Fi, Bluetooth, and Focus Assist.
How do you take a screenshot in Windows 10?
Press PrtScn (Print Screen) to capture the whole screen or Win + Shift + S to select a portion of
the screen.
What is the purpose of Virtual Desktops in Windows 10?
Virtual Desktops allow users to create multiple workspaces to organize different tasks separately.
What is Windows Defender?
Windows Defender is the built-in antivirus and security system that protects against malware,
viruses, and cyber threats.
How do you update Windows 10?
Go to Settings → Update & Security → Windows Update → Click Check for updates.
What is BitLocker in Windows 10?
BitLocker is an encryption tool that secures files and data on a drive from unauthorized access.
How do you reset Windows 10 to factory settings?
Go to Settings → Update & Security → Recovery → Reset this PC → Choose Keep my files or
Remove everything.
What is Safe Mode in Windows 10?
Safe Mode is a diagnostic startup mode that helps troubleshoot system issues by loading only
essential drivers and services.
Page 28 of 59
Java Questions
Page 29 of 59
Write a program to check if a number is Armstrong or not.
Write a program to implement a stack using an array.
Write a program to create and traverse a binary search tree.
Write a program to demonstrate method overloading and overriding.
Write a program to implement a priority queue in Java.
C++ Questions
Conceptual (15 Questions)
What are the basic differences between C++ and C?
Explain the concept of classes and objects in C++.
What is the purpose of a virtual function in C++?
What is the difference between public, private, and protected access specifiers?
What are templates in C++? How are they used for generic programming?
Explain the concept of operator overloading with an example.
What is a friend function in C++? Provide an example.
Explain the difference between shallow copy and deep copy in C++.
What is the purpose of the this pointer in C++?
Explain the concept of namespaces in C++. Why are they used?
What is the role of the new and delete operators in dynamic memory allocation?
What is polymorphism in C++? How is it implemented?
What are inline functions, and when should they be used?
What is the difference between stack memory and heap memory?
Explain the concept of multiple inheritance and its issues in C++.
Database Questions
Page 33 of 59
System Administration 2
1. What is Linux Operating System?
Linux is an open-source operating system (OS). An operating system is the software that directly
manages a system's hardware and resources, like CPU, memory, and storage.
4. How many kernels and shells are available in the UNIX environment?
There can be multiple shells available, but there is only one kernel in the UNIX environment.
Page 34 of 59
Ifconfig
9. What is a DNS server?
A DNS server is a server that stores DNS records and is responsible for resolving DNS queries.
10. Explain the main difference between Linux and Windows DNS servers?
Windows DNS servers support Active Directory integration, while Linux DNS servers do not.
This means that Windows DNS servers can be used to provide DNS services for an Active
Directory domain, while Linux DNS servers cannot. Additionally, Windows DNS servers
support a wider range of record types than Linux DNS servers.
Page 35 of 59
Reverse lookup zone helps to resolve IP Address (104.211.37.48) to name (www.example.com).
PTR record creates in Reverse Lookup Zone.
Page 37 of 59
36. How to check the installed software(rpm’s) on red hat Linux?
Answer: rpm -qa package name (or) rpm -qa |grep package name*
37. How to install specific software package using rpm command on red hat Linux?
Answer: rpm –ivh package name
38.What is yum?
Answer: yum is yellow update manager which is a front-end tool for package management.
All the rpm commands activity can be carried out using yum command in automated way.
Yum mechanism will automatically resolve the dependencies unlike rpm commands.
39.How to install packages using yum?
yum install package name
40.How to update the package using yum?
yum update package_ name
Advance Switching
1: what is Multi-Layer Switch?
Multi-layer switches are devices that can perform both switching and routing operations.
Page 38 of 59
6: how many types of hierarchical network design?
There are three types of hierarchical network design
Access layer
Distribution layer
Core layer
7: what is core layer in network design?
This layer performs requested operations in large networks. This layer is also called backbone.
8: Explain Modular network design?
Network design based on the Cisco Enterprise Architecture model separates large networks into
functional parts known as modules.
The ability to divide the network into modules allows the network design to be flexible and
makes network adaptation and troubleshooting easy.
9: what is SSH?
SSH is a protocol for secure remote access to a machine over untrusted networks.
Uses Encryption.
SSH is not a shell-like Unix Bourn shell and C shell
10: Explain TELNET?
TELNET allows the user to log on to a remote computer. After logging on, user can use the
services available on the remote computer and transfer the results back to the local computer.
11: what is etherchannel?
The ability to bundle ports together to achieve higher bandwidth is described as link aggregation.
Aggregation ports on Ethernet switches is referenced under EtherChannel configuration and
operation.
12: number of types to configure etherchannel?
Manual (static etherchannel)
PAgP (Port Aggregation protocol)
LACP (Link Aggregation Control Protocol)
13: different between PAgP and LACP?
PAgP: Cisco proprietary
LACP: Open standard
Page 39 of 59
14: what is etherchannel load-balancing
EtherChannel loads shares (load balances) across all the physical ports in the EtherChannel
group.
15: What is STP?
Spanning Tree Protocol (STP) is a switching protocol that prevents layer 2 loops created by the
redundant links. STP enables switches to become well-informed of each other so that they can
negotiate a Loop-Free path through the network.
Page 42 of 59
Linux
1. what is Linux?
Linux is a Unix-like, free open-source operating system, developed by Linus Torvalds. Mainly it
is designed for systems, servers, embedded devices, mobile devices, and mainframes.
Page 43 of 59
6. Elaborate all the file permission in Linux.
There are three types of file permissions in Linux:
Read: Users open and read files with this permission.
Write: Users can open and modify the files.
Execute: Users can run the file.
8. Explain LILO
LILO, i.e., Linux Loader and is a Linux Boot loader. It loads the Linux operating system into
memory and starts the execution. Most operating systems like Windows and macOS come with a
bootloader.
12. How do you list files in a directory using the Linux command line?
Page 44 of 59
You can list files in a directory on the Linux command line by using the ls command. This
command will show all the files and directories within the specified location.
15. What command could you use to display the contents of a text file in the Linux terminal?
The contents of a text file in the Linux terminal can be displayed by using the cat command
followed by the file name. For example, cat file.txt will show the content of “file.txt”.
16. How could you search for a specific string within a file using the Linux command line?
You can search for a specific string within a file using the grep command in the Linux command
line.
Network Fundamental
1: What is a network?
A network is a collection of two or more devices connected by communication channels that
allow them to share data and resources.
2: What is a switch?
A switch is a network device that connects multiple devices or networks together. It provides the
ability to share data or resources between them.
3: What is a router?
A router is a networking device that forwards data packets between computer networks. Routers
are used to connect networks of different sizes, such as local area networks (LANs) and wide
area networks (WANs).
4: What is a gateway?
A gateway is a network node that connects two networks using different communication
protocols. It acts as a bridge between two networks and enables data and information to be
exchanged between them.
5: What is a firewall?
A firewall is a security system that monitors and controls incoming and outgoing network traffic
based on predetermined security rules.
6: What is a subnet?
A subnet is a logical subdivision of an IP network. It is typically used to divide an IP network
into two or smaller networks.
7: What is a broadcast domain?
A broadcast domain is a logical division of a computer network in which all nodes can reach
each other by broadcast at the data link layer.
8: What is a collision domain?
A collision domain is a network segment in which data packets can collide with each other when
they are sent on a shared network segment.
9: What is a LAN?
Page 46 of 59
A LAN (Local Area Network) is a network of computers and other devices that are connected to
each other and share resources within a relatively small area, such as a home, office, school, or
building.
10: What is a WAN?
A WAN (Wide Area Network) is a type of computer network that covers large geographic areas
such as countries, states, or provinces.
11: What is an IP address?
An IP address (Internet Protocol address) is a numerical label assigned to each device connected
to a computer network that uses the Internet Protocol for communication.
12: What is a subnet mask?
A subnet mask is a number that separates the host portion of an IP address from the network
portion.
13: What is a default gateway?
A default gateway is a device on a network that acts as an access point or gateway for other
devices in the network to communicate with the wider Internet.
14: What is a port?
A port is a communication endpoint used in networks for sending and receiving data. It is a
logical construct that acts as a portal for allowing communication to and from a computer.
15: What is a packet?
A packet is a unit of data sent over a network. It contains a header that includes source and
destination addresses and other data, such as sequencing information and error-checking data.
16: What is a protocol?
A protocol is a set of rules and conventions that govern the communication between two or more
devices on a network, such as computers, routers, and servers.
17: What is a topology?
Physical structure of a network is called topology. As a general rule, it is a way of describing the
connectivity of a network, including the physical and logical connections between the nodes of
the network.
18: What is a hub?
Technically, a hub is a networking device that allows multiple devices to connect to a single
network.
19: What is a NIC?
Page 47 of 59
The term NIC stands for Network Interface Card, which is technically a computer hardware
component that allows a computer to connect to a network.
20: What is a MAC address?
A MAC (Media Access Control) address is a unique identifier assigned to a network interface
controller (NIC) for communications on the physical network segment.
Page 48 of 59
A range of IP address that the DHCP server can assign to clients that are on one subnet.
9. What is a DHCP lease?
Answer: A DHCP lease is the amount of time that the DHCP server grants to the DHCP client
permission to use a particular IP address. A typical server allows its administrator to set the lease
time.
10. What is DORA Process in DHCP Server?
DORA Stand for Discover, Offer, request and acknowledgement. it is used to assign IP address
automatically to client systems.
11. What is Authorizing DHCP Servers in Active Directory?
If a DHCP server is to operate within an Active Directory domain (and is not running on a
domain controller) it must first be authorized to Active directory.
12. Define DNS.
Domain Name System, DNS is an Internet service that translates domain names into IP
addresses. Two types of lookups in DNS. Forward lookup: it converts Domain name to IP
address. Reverse lookup: it converts IP address to Domain name.
13. What is the port Number of DNS?
Use UDP protocol and port number – 53.
14. What is NSlookup?
Answer: Nslookup.exe is a command-line administrative tool for testing and troubleshooting
DNS servers.
15. What Is Group Policy.
Group Policy is a feature of the Microsoft Windows NT family of operating systems that control
the working environment of user accounts and computer accounts. Group Policy provides the
centralized management and configuration of operating systems, applications, and users’ settings
in an Active Directory environment.
16. Where are group policies stored?
C:\Windows\System32\GroupPolicy.
17. Where is the Active Directory stored?
The AD data base is stored in c:\windows\ntds\NTDS.DIT.
18. What is a web server?
A web server is a computer system that hosts websites. When a user tries to access a website,
their computer will contact the web server and request the files that make up the website. The
Page 49 of 59
web server will then send these files to the user’s computer, which will allow them to view the
website.
?19. What is a file server
A file server is a computer system that stores files and makes them available to users over a
network. A file server can be a dedicated computer system or a computer system that provides
other services, such as a web server or database server.
?20. What is FTP server
FTP, or File Transfer Protocol, is a standard network protocol used for the transfer of computer
files between a client and server on a computer network. It is commonly used to upload and
download files from web servers, such as HTML pages and
اسالمي ثقافت
:۱سوال :داسالم ټولنیز نظام تعریف کړئ؟
ځواب :داسالم په رڼا کې ټولنیز نظام دهغې شرعي اصولو مجموعه ده چې اسالم دیوی ټولنې د ټولنیز ژوند لپاره وضع
کړي اوپر اساس یی د دوی ترمنځ اړیکې ټینګوي.
۲سوال :داسالم دټولنیز نظام ځانګړتیاوې ولیکئ؟
ځواب ۱:داسالم ټولنیز نظام دهللا ج له لورې رالیږل شوی نظام دی ۲.داسالم ټولنیز نظام دیو رب بنده ګی ته انسان رابولي.
۳داسالم ټولنیز نظام د ټولو افرادو ترمنځ مساوات په نظر کې نیسي.
.٤داسالم ټولنیز نظام د یوبل مرستی ته انسان رابولي.
۳سوال :تقوا څه ته ویل کیږی ؟
ځواب :تقوادی ته ویل کیږی چې یو بنده دهللا تعالی د قهر او غذاب څخه د ځان ساتنی په خاطر د هغه د حکم له مخالفت
څخه ځان ساتي او اوامرو ته یی غاړه ګدي .
۴سوال :داسالم ټولنیز نظام بنسټونه ولیکئ؟
ځواب .۱ :اسالمي عقیده .۲تقواء .۳ټولنیز عدالت .
۵سوال :داسالم ټولنیز نظام اهداف ولیکئ ؟
ځواب ۱ :سکون او ډاډ نه ډک چاپیریال رامنځته کوي ۲ .دافرادو ترمنځ د مینې او محبت نه ډکه فضاء رامنځته کوي ۳ .
دافرادو ترمنځ د رحمت خپرول ۴ .د حق اقامه کول ۵ .دافرادو ترمنځ د ټولنیز تکافل رامنځته کول .
۶سوال :مسلمانه ټولنه تعریف کړئ ؟
ځواب :مسلمانه ټولنه هغه خدای پرسته انسانی با اخالقه او متوازینه ټولنه ده چې افراد یی د اسالمی عقیدی ،دینی ورور
ګلوی ،مینی محبت ،عدل او رحمت په رڼا کې ژوند تیروي .
۷سوال :دمسلمانی ټولنې مواصفات ولیکئ ؟
ځواب ۱ :د ژوند په ټولو برخو کې دینی احکامو ته التزام ۲امر بالمعروف او نهی عن المنکر دنده ترسره کول ۳ .په
کریمو اخالقو التزام ۴ .له غیر مسلمو سره غوره چلند ۵.د امن ساتنه .
۸سوال :د الندی ایات شریف ژباړه ولیکئ؟
ٱَّلل َال یُغ َِی ُر َما ِبقَوۡم َحتَّى یُغ َِی ُروا َما ِبأَنفُ ِس ِهمۡۡ۱۱ ..........
ِإ َّن َّ َ
ځواب :ژباړه حقیت دادی چې هللا ج د هیڅ قوم حالت نه بدلوی ترڅو پوری چې هغوی خپل صفات نه وی بدل کړی .
Page 50 of 59
ځواب ۱ :دینداري ۲د نسب غوره والی ۳ښکال او د میړه طاعت ۴اوالد راوړل ۵پیغلتوب .
:۱۱سوال :خطبه تعریف کړی ؟
ځواب :خطبه د خ په زیر سره د یوی میرمنې یا دهغې کورنی ته دنکاح وړاندیز ته وویل کیږي چې شرعي موانع ونه لری.
۱۲سوال :محرمات په څو ډوله دي نومونه یي ولیکئ ؟
ځواب :محرمات په دوه ډوله دي ۱دایمي محرمات ۲موقتي محرمات .
۱۳سوال :دالندی ایات ژباړه ولیکئ :
ت ُ َ ُ ُ َ ُ ُ
ع َّمتكمۡ َو َخلتكمۡ َوبَنَاتُ ٱلۡأخِ َوبَنَاتُ ٱلۡأخۡ ِ علَيۡ ُكمۡ أ ُ َّم َهت ُ ُكمۡ َوبَنَاتكمۡ َوأخ ََوتكمۡ َو َ
ُ ُ َ ُ ُ ُ ……. ۲۳ح ِر َمتۡ َ
ځواب :ژباړه پر تاسو حرام کړی شوی دی ستاسی میندی ،لوړنی ،خویندی ،تریندی،توړی ګاني ،وریری او خورزی.
۱۴سوال :له فروعو څخه څوک هدف دی ؟
ځواب :له فروعو څخه هدف لور ،لمسئ ،کړوسئ اوداسی نور دی....
۱۵سوال :مصاحرت څه ته ویل کیږی ؟
ځواب :دنکاح په سبب رامنتځه شوی خپلوالۍ ته مصاحرت ویل کیږي .
۱۶سوال :دحنفي فقهاوو په نزد د نکاح ارکان کوم دی ویي لیکئ ؟
ځواب :دحنفي فقهاوو په نزد د نکاح ارکان دوه دی ۱ :ایجاب ۲قبول .
۱۷سوال :دنکاح شرایط په څو ډوله ویشل کیږي؟
ځواب :دنکاح شرایط په څلورو ډولو ویشل کیږی .
۱۸سوال :په میرمین د میړه حقوق کوم دی ویي لیکئ ؟
ځواب ۱ :شریعت په چوکات کې د میړه احترام او اطاعت کول لکه رسول هللا ص فرمایلی دی هر هغه میرمن چې مړه شی
او میړه ورڅخه حوښ او حوشحاله وی جنت ته به داخلیږی .
۱۹سوال :دتولد څخه مخکی د اوالد حقوق ولیکئ ؟
ځواب ۱ :دیو ښه مور انتخاب ۲په ازدواجی ژوند کې د سنتو اتباع او صالح اوالد غوښتنه ۳د جنین له سقط څخه ځان ساتل
۲۰.سوال :په موقت ډول د کومو میرمنو سره نکاح حرامه ده ؟
ځواب ۱ :دوه محرمی ښځی په یوځای نکاح کول ۲د عدت په حالت کې د خپلی طالقی کړی ښځي خور په نکاح کول ۳
میړوښی ښځی په نکاح کول ۴ .د معتدی ښځې نکاح ۵په درې طالقو طالقه شوی ښځه .
۲۱سوال :طالق تعریف کړی ؟
ځواب :طالق په لغت کې خوشې کول ته ویل کیږي اوپه فقهي اصطالح کې سمدستی یا په راتلونکي وخت کې دنکاح د قید
له منځه وړلو ته طالق ویل کیږي .
۲۲سوال :د طالق د مخنیوي الرې چارې ولیکئ ؟
ځواب ۱ :توصیه ۲دبسترې بیلتون ۳د تادیب لپاره وهل ۴تحکیم ۵دیو رجعي طالق واقع کیدل .
۲۳سوال :په اعتبار د اغیز صریحي او کنایي طالق په څو ډوله دی ؟
ځواب :په دوه ډوله دی ۱ :رجعي طالق ۲بایین طالق .
:۲۴سوال :ایالء تعریف کړئ ؟
ځواب :ایالء هغه قسم ته ویل کیږی چې یوسړی یی د څلورو میاشتو یا زیات وخت لپاره خپلی ښځې ته د نه ورنږدې کیدو
په خاطر یاد کړي.
۲۵سوال :دقسم کفاره څه شی ده ویی لیکئ؟
ځواب :د قسم کفاره په لمړی قدم کې د غالم ازدول دي او که توان یی نه وي بیا لسو مسکینانو ته دوه وخته ډوډی ورکول
دي که دایي هم په توان کې نه وی بیا درې ورځې روژی نیول دی .
۲۶سوال :خلع تعریف کړئ؟
ځواب :خلع د احنافو په نیزد د نکاح د ملکیت له منځه وړل دي چې د ښځې تراجازی موقوف وي .
۲۷سوال :لعان تعریف کړی ؟
ځواب :لعان شړلو ته ویل کیږی اوپه اصطالح کې د قسم سره مل څلور ځل ګواهي ده چې میړه او میرمن یی د قاضی په
وړاندې ترسره کوي په هغه وخت کې چې میړه خپله ښځه په زنا تورنه او یایي له نسب څخه انکار وکړي .
۲۸سوال :دکومو عیبونو په ثابتیدلو سره ښځه کولی شي له میړه څخه دبیلتون غوښتنه وکړي؟
ځواب ۱ :د تناسلي الې نشتوالی ۲د جنسي قوت نشتوالی ۳لیونتوب ۴جذام ۵ابرص یا برګی مرض .
Page 51 of 59
۲۹سوال :دظهار شرطونه ولیکئ؟
ځواب :د ظهار شرطونه دوه دي ۱ :ظهار کوونکې باید بالغ ،عاقل او مسلمان وي ۲ښځه باید په حقیقي یا حکمي توګه د
سړي په نکاح کې وی .
۳۰سوال :ګاونډیان په څوډولونو ویشل شوی دي ؟
ځواب :ګاونډیان په درې ډولونو ویشل شوي دي ۱یو حق لرونکی ۲دوه حقه لرونکی ۳دری حقه لرونکی .
۳۱سوال :د ټولنیز مسؤلیت عناصر ولیکئ ؟
ځواب :د ټولنیز مسؤلیت عناصر درې دی ۱پر ټولنیزو چاروکې اهتمام اود بیوزلو الس نیوی ۲پوهه ۳مشارکت .
۳۲سوال :د ګډ ژوند (معاشرات ) اداب ولیکئ ؟
ځواب ۱ :ښه اخالق ۲بښنه کول ۳له اختالف کولو څخه ځان ساتل ۴حسد نه کول ۵دیوبل په غم او خوښی کې ځان
شریک ګڼل .
۳۳سوال :د خوراک او څښاک اداب ولیکئ ؟
ځواب :له خوراک څخه د مخه السونه مینځل ۲په بسم هللا د خوراک او څښاک پیل کول ۳له خپلې مخې څخه خوراک کول
۴په ښي الس خوراک کول ۵د خوراک په وخت درې ګوتې استعمالول .
۳۴سوال :مفقود څه شي ته ویل کیږي او حکم یی ولیکئ؟
ځواب :هغه سړی چې له کور څخه تری تم ورک شی ،د مړي او ژوندي معلومات یی نه کیږي د مفقود په نوم یادیږي ،نو
تر څو چې د مفقود سړي مړی یقیني نه وي ښځه تری نشی جال کیدای.
۳۵سوال :دلعان حکم ولیکې ؟
ځواب :په لعان سره بیلتون ابدي حرمت منځته رواړي .
۳۶سوال :د اوالد په بشارت د خوشحالی کولو لپاره یو قرآني ایات ولیکئ ؟
ظ َّل َوجۡهُهۥُ ُمسۡ َو ّٗدا َوه َُو َكظِ یم ٥۸ ځواب َ :و ِإذَا بُش َِر أ َ َحدُهُم بِٱلۡأُنثَى َ
سا ٓ َء َما یَحۡ ُك ُمونَ ٥۹ بۡ أَ َال َ علَى هُون أَمۡ یَدُ ُّ
سهۥُ فِي ٱلتُّ َرا ِ س ٓوءِ َما بُش َِر بِ ِهۦۡٓ ۡ أَیُمۡ ِس ُكهۥُ َیَت ََو َرى مِ نَ ٱلۡقَوۡ ِم مِ ن ُ
۳۷سوال :دمور او پالر حقوق ولیکئ ؟
ځواب ۱ :د مور او پالر احترام او خدمت کول ۲د هغوی له خوښی پرته په سفر نه تلل ۳په عاجزی او نرمی ورسره
خبرې کول ۴د مور او پالر څخه مخکې په الره نه تلل ۵مور او پالر په نامه نه رابلل .
۳۸سوال :د مور او پالر د حقوقو په باره کې یو قرآني ایات ولیکئ ؟
سنًاۡ ِإ َّما َیبۡلُغ ََّن عِندَكَ ٱلۡ ِك َب َر أَ َحدُهُ َما ٓ أَوۡ ك َِالهُ َما فَ َال تَقُل ال ِإیَّاهُ َو ِبٱلۡ َو ِلدَيۡ ِن ِإحۡ َ ضى َربُّكَ أ َ َّال تَعۡبُد ُٓوا ِإ َّ ٓ
ځواب َ ۞ :وقَ َ
لَّ ُه َما ٓ أُف َو َال ت َنۡهَرۡهُ َما َوقُل ل ُه َما قَوۡ ّٗال ك َِر ّٗیما ۲۳
َّ
۳۹سوال :دایمي محرمات تعریف کړئ ؟
ځواب :دایمي محرامات هغه ښځې دي چې د حرام والي سبب یی دایمي او ترمرګه زوال نلري.
۴۰سوال :نسبي محرمات په څو ډوله دي ویی لیکئ ؟
ځواب :نسبي محرمات په څلور ډوله دي ۱اوصول ۲ .فروع ۳ .د والدینو فروع ۴ .د نیکونو او نیاګانو فروع.
Online Skills
Page 52 of 59
created for different purposes, such as sharing information, selling products, or providing
services.
4. What are the differences between the web and the internet?
The internet is a global network of computers that are connected to each other. It allows
people to share information and communicate with each other. On the other hand, the
web is a part of the internet that consists of websites and web pages. The web uses
specific protocols and technologies to access and display information over the internet.
a) Communication: You can send emails, chat with friends, make video calls, and
connect with people around the world through social media platforms.
b) Information and research: You can search for information on any topic, read news
articles, access online libraries, and find educational resources.
c) Entertainment: You can watch videos, listen to music, play online games, and
stream movies and TV shows.
d) Online shopping: You can buy products and services from websites, compare
prices, and have items delivered to your doorstep.
e) Online banking and finance: You can manage your bank accounts, pay bills,
transfer money, and invest in stocks and cryptocurrencies.
f) Education and e-learning: You can take online courses, participate in virtual
classrooms, and access educational materials.
g) Social networking: You can connect with friends, share updates and photos, join
online communities, and express yourself through platforms like Facebook,
Instagram, and Twitter.
7. What is a hyperlink?
A hyperlink, often called a link, is a clickable element on a web page that connects to
another web page or a different section of the same page. It is usually displayed as text or
an image with an underline or a different color. When you click on a hyperlink, it takes
Page 53 of 59
you to the linked web page or location, allowing you to navigate between different
websites and web pages.
a) Spam and junk mail: Emails can be susceptible to spam, unsolicited messages,
and phishing attempts, which can clutter your inbox and pose security risks.
b) Lack of personal touch: Email lacks the personal touch of face-to-face or voice
communication, making it sometimes difficult to convey emotions or tone
accurately.
Page 54 of 59
c) Overload: With the ease of sending emails, it's possible to receive a large volume
of messages, leading to information overload and difficulty in managing and
responding to all of them.
d) Security risks: Emails can be intercepted or hacked, potentially exposing sensitive
information or leading to identity theft if proper security measures are not taken.
e) Dependence on the internet: Email requires an internet connection to send and
receive messages, so if you don't have internet access, you won't be able to use
email.
Computer Fundamentals
1. Define computer.
A computer is an electronic device that accepts input, process it and gives output and can
store output for future.
2. Write a brief history of the computer.
Computers have a long history that started in the mid-20th century. The first electronic
computers were large and used vacuum tubes for processing. Over time, computers became
smaller, faster, and more powerful. The invention of transistors and integrated circuits played
a crucial role in this advancement. In the 1970s and 1980s, personal computers became
popular, leading to the development of user-friendly interfaces and software. The following
decades witnessed the rise of laptops, smartphones, and other portable devices, bringing
computing power to individuals worldwide.
Page 55 of 59
4. Write the usages of a computer.
Computers have various usages, including:
a. Processing and analyzing data.
b. Creating documents, presentations, and spreadsheets.
c. Internet browsing and communication.
d. Gaming and entertainment.
e. Graphic design and multimedia production.
f. Scientific research.
g. Programming and software development.
h. Business and financial management.
i. Education and e-learning.
Page 56 of 59
d. Navigation Keys: They allow users to move the cursor or navigate within
documents, such as arrow keys and the Enter key.
8. What is a mouse?
A mouse is an input device that is used to move a cursor on the computer screen. It typically
has two buttons and a scroll wheel. By moving the mouse, users can control the cursor's
position and perform actions like selecting, dragging, and clicking on items.
9. What are output devices?
Output devices are components that display or present information to the user. Some examples
include:
a. Monitor or Display: It shows visual output like text, images, and videos.
b. Printer: It produces hard copies of documents and images.
c. Speakers or Headphones: They provide audio output, allowing users to hear
sounds and music.
10. What is a processor?
A processor, also known as a central processing unit (CPU), is the main component
responsible for executing instructions and performing calculations in a computer. It
carries out tasks such as data processing, mathematical operations, and controlling the
flow of information within the computer.
Page 58 of 59
HDMI (High-Definition Multimedia Interface) Port: It transmits high-quality audio and video
signals between the computer and external displays.
Ethernet Port: It enables a wired connection to a network or the internet.
Audio Jack: It allows the connection of headphones, speakers, and microphones.
18. Define software and name its types.
Software refers to the programs and instructions that tell a computer what to do. There are two main
types of software:
System Software: It manages and controls the computer's hardware and provides a platform for
running other software. Examples include operating systems like Windows and macOS, device
drivers, and utility programs.
Application Software: These are programs designed for specific tasks or applications, such as word
processors, web browsers, games, and multimedia editing software.
Page 59 of 59