Unit-05: Applications of Computer Science - MCQs
Unit-05: Applications of Computer Science - MCQs
Chapter
01 Computer System
MULTIPLE CHOICE QUESTIONS
1. What does the acronym IoT stand for?
1|Page
Computer Science Federal Board Class-11
2|Page
Computer Science Federal Board Class-11
14. 14. What does the term "thing" in "Internet of Things" refer to?
a. Only computers and smartphones
b. Any physical object embedded with electronics, software, and sensors
c. Only non-electronic objects d. Only objects found in an office
15. The main goal of IoT is to create a world where physical objects are linked to
the virtual world and can:
a. Operate independently without any network.
b. Communicate with each other and people in real-time.
c. Only be used for entertainment purposes.
d. Replace all human labor.
16. What is the first and most crucial step in designing any IoT-based application?
a. Choosing the sensors
b. Selecting the programming language
c. Defining the problem statement and objective
d. Buying the most expensive hardware
17. In the design flow of an IoT application, what happens immediately after the
problem has been identified?
a. Deployment b. Data Visualization
c. Specifying the requirements d. Cloud Selection
18. When specifying inputs for a "Smart Plant Watering System," what would be
the primary input?
a. Actuator to turn on a motor b. A buzzer to make sound
c. Soil Moisture Sensor data d. An LCD display
19. For the same "Smart Plant Watering System," what would be the primary
output?
a. Sending an email b. Turning on a water
c. Displaying moisture level d. Storing data in a cloud database
3|Page
Computer Science Federal Board Class-11
20. Which of these is a critical factor when selecting sensors and hardware for an
IoT application?
a. Their color
b. Cost, accuracy, power consumption, and compatibility
c. The country of manufacture d. Their weight
21. If an IoT device needs to operate for months on a battery in a remote field,
which connectivity protocol would be most suitable?
a. Wi-Fi b. Ethernet
c. LoRaWAN (Long Range Wide Area Network)
d. USB
22. What is the primary purpose of the "Data Processing" stage in an IoT
application?
a. To convert physical quantities into electrical signals
b. To analyze raw sensor data and make decisions (e.g., "IF soil is dry, THEN
start pump")
c. To provide a physical internet connection
d. To house the sensors and actuators
23. Where can the data processing logic for a simple, low-cost IoT device typically
be implemented?
a. Only in a large cloud server b. Only on a smartphone
c. On a microcontroller (like Arduino) or a microcomputer (like Raspberry Pi)
d. It does not require processing
24. What is the purpose of the "User Interface/User Experience (UI/UX)"
component in an IoT application?
a. To connect the device to the internet
b. To allow users to interact with the system
c. To power the sensors d. To process the sensor data
25. The final step in the design flow of an IoT application is:
a. Buying Components b. Testing and Deployment
c. Problem Identification d. Writing the code
26. When designing an IoT-based "Smart Home Security System," which of the
4|Page
Computer Science Federal Board Class-11
5|Page
Computer Science Federal Board Class-11
31. Which of the following is the MOST impactful application of IoT for Pakistan's
agricultural sector, which is a major part of its economy?
a. Smart Home Lighting b. Industrial Robot Control
c. Precision Agriculture for water and fertilizer management
d. In-car entertainment systems
32. A major problem in Pakistani cities is water scarcity and inefficient
distribution. How can IoT help?
a. By creating virtual water in the cloud.
b. By using Smart Water Meters to detect leaks, monitor usage, and manage
supply.
c. By replacing all water pipes.
d. By stopping agricultural use of water.
33. The "Smart Grid" is a potential IoT application in Pakistan. What is its primary
goal?
a. To make power lines look more modern.
b. To reduce electricity theft and manage load distribution efficiently.
c. To increase the number of power plants.
d. To provide free electricity to everyone.
34. Which IoT application can directly help improve patient care in remote villages
of Pakistan where doctors are scarce?
a. Online gaming platforms
b. Telemedicine and remote health monitoring devices
c. Smart Refrigerators d. Automated Teller Machines (ATMs)
35. In the context of Pakistani manufacturing (e.g., textiles, sports goods), which
IoT application can boost productivity?
a. Predictive Maintenance of machinery to prevent unexpected breakdowns
b. Social Media Integration on the factory floor
c. Smart Mirrors d. Using more manual labor
6|Page
Computer Science Federal Board Class-11
36. For a country like Pakistan with a large youth population, how can IoT
contribute to education?
a. By replacing all teachers with robots.
b. By using Smart Attendance Systems that only take roll calls.
c. By enabling connected smart classrooms and providing access to digital
learning resources even in remote areas.
d. By stopping the use of physical books entirely.
37. Which IoT-based solution can help address the critical issue of traffic
congestion in cities like Karachi and Lahore?
a. Building more roads without planning.
b. Smart Traffic Management Systems using sensors and cameras to
optimize signal timing.
c. Installing louder horns in cars. d. Banning all cars from the roads.
38. How can IoT support the growing e-commerce and logistics industry in
Pakistan?
a. Through Smart Asset Tracking, allowing customers and companies to
track shipments in real-time.
b. By eliminating the need for delivery personnel.
c. By making websites more colorful. d. By only using bicycles for delivery.
39. What is a significant challenge for implementing widespread IoT solutions in
Pakistan?
a. Lack of internet connectivity and reliable power in some areas.
b. People not liking technology.
c. Sensors are too colorful. d. IoT devices use too little electricity.
40. Which IoT application could help Pakistani farmers get better prices for their
crops?
a. Smart Drip Irrigation
b. Supply Chain Monitoring to track produce from farm to market, reducing
spoilage and ensuring quality.
c. Drone-based crop spraying d. Soil moisture sensors
7|Page
Computer Science Federal Board Class-11
8|Page
Computer Science Federal Board Class-11
9|Page
Computer Science Federal Board Class-11
52. The process by which new transactions are validated and added to the
blockchain is called:
a. Compiling b. Mining (in Proof-of-Work systems)
c. Downloading d. Encrypting
53. What is the primary purpose of "consensus mechanisms" like Proof-of-Work
(PoW) in a blockchain?
a. To make the network use as much electricity as possible.
b. To ensure all participants in the decentralized network agree on the
validity of transactions.
c. To speed up internet connectivity for all users.
d. To create new cryptocurrencies every day.
54. Which of the following is the most well-known application of blockchain
technology?
a. Web Browsers b. Cryptocurrencies
c. Word Processing Software d. Computer Games
55. A "Smart Contract" is best defined as:
a. A legally binding document written by a lawyer.
b. A computer program that automatically executes the terms of an
agreement when predefined conditions are met.
c. A friendly agreement between two people.
d. A type of blockchain miner.
56. Which of these is a key feature of a Public Blockchain?
a. It is permissioned and controlled by a single organization.
b. It is open for anyone to join, read, and write transactions.
c. It is faster and more private than all other systems.
d. It does not use cryptography.
57. How does blockchain technology provide transparency?
a. By keeping all data secret.
b. By allowing all participants to have a copy of the ledger and view all
transactions.
c. By using transparent computer screens.
d. By only showing data to the government.
10 | P a g e
Computer Science Federal Board Class-11
58. Beyond cryptocurrency, a potential use case for blockchain in supply chain
management is:
a. To make products heavier.
b. To track the origin and journey of a product from manufacturer to
consumer, ensuring authenticity.
c. To replace all trucks with drones. d. To hide the product's source.
59. What is a major challenge associated with blockchain technology?
a. It is too easy to change past records.
b. Scalability - processing a high number of transactions quickly can be
difficult.
c. It requires no electricity to run. d. It is controlled by too few people.
60. What is the relationship between a cryptocurrency and a blockchain?
a. They are the same thing.
b. The blockchain is the underlying technology that enables the existence of
cryptocurrency.
c. Cryptocurrency is a hardware required to run a blockchain.
d. Blockchain is a type of cryptocurrency.
61. How can blockchain technology help combat corruption in government
departments in Pakistan?
a. By making all data secret and inaccessible.
b. By creating a transparent and tamper-proof record of transactions, such
as land registry entries and procurement deals.
c. By replacing all government employees with software.
d. By using faster internet connections.
62. Which of the following is a major application of blockchain for Pakistan's
agricultural sector?
a. Designing new types of fertilizers.
b. Creating a transparent supply chain to verify the origin and quality of
crops like Kinnow oranges and Basmati rice for export.
c. Replacing tractors with automated robots.
d. Controlling the weather.
11 | P a g e
Computer Science Federal Board Class-11
63. The State Bank of Pakistan is exploring a digital currency. How could
blockchain be central to this?
a. By printing more physical currency notes.
b. By launching a Central Bank Digital Currency (CBDc. for secure,
transparent, and efficient digital payments.
c. By shutting down all private banks.
d. By removing all ATMs from the country.
64. A significant portion of Pakistan's population lacks formal identification. How
can blockchain help?
a. By giving everyone the same ID number.
b. By creating secure, self-sovereign digital identities that individuals can
control and use to access services like banking and voting.
c. By using facial recognition only. d. By removing the need for any ID.
65. For the millions of overseas Pakistanis sending remittances, blockchain can
make the process:
a. Slower and more expensive.
b. Faster, cheaper, and more transparent by reducing the need for
intermediary banks.
c. Dependent on a single company. d. Only possible in US dollars.
66. In Pakistan's pharmaceutical industry, a key application of blockchain would
be:
a. Tracking drugs from manufacturer to patient to eliminate the problem of
counterfeit medicine.
b. Replacing doctors with automated systems.
c. Making medicines taste better. d. Inventing new diseases.
67. How can blockchain bring transparency to the Zakat distribution system in
Pakistan?
a. By stopping the collection of Zakat.
b. By creating an immutable record from donor to beneficiary, ensuring
funds are used as intended.
c. By giving all the funds to one person.
d. By making the process completely secret.
12 | P a g e
Computer Science Federal Board Class-11
68. For the electoral process in Pakistan, blockchain could be used to:
a. Allow only one political party to run.
b. Develop a secure and verifiable e-voting system to reduce disputes and
increase voter trust.
c. Announce results before voting starts.
d. Force everyone to vote for the same candidate.
69. In the context of education, how can a blockchain benefit a Pakistani
university?
a. By automatically passing all students.
b. By issuing tamper-proof digital degrees and certificates that can be
instantly verified by employers.
c. By replacing all teachers with online videos.
d. By making education free without any records.
70. What is a significant challenge for implementing blockchain solutions in
Pakistan?
a. Unreliable internet connectivity and a need for greater technical
expertise and regulatory frameworks.
b. Blockchain technology is too simple for Pakistan's needs.
c. Sensors are too expensive. d. Lack of interest in technology.
71. For a Pakistani small business owner wanting to get a loan, how could
blockchain help?
a. By forcing banks to give loans without any checks.
b. By creating a transparent and verifiable record of their business
transactions, helping them build a credit history.
c. By hiding their financial records from the bank.
d. By printing more money for the business.
72. In the energy sector, blockchain could enable a system where:
a. All power plants are shut down.
b. Consumers with solar panels can securely sell their excess electricity to
neighbors (peer-to-peer energy trading).
c. Electricity bills are eliminated. d. Load-shedding is increased.
13 | P a g e
Computer Science Federal Board Class-11
14 | P a g e
Computer Science Federal Board Class-11
79. If a company uses Microsoft Office 365 directly through its web browser, it is
using which cloud service model?
a. Infrastructure-as-a-Service (IaaS) b. Platform-as-a-Service (PaaS)
c. Software-as-a-Service (SaaS) d. Network-as-a-Service (NaaS)
80. A developer who wants to build a web application without managing the
underlying operating system or servers would use:
a. IaaS b. PaaS
c. SaaS d. Hard Drive
81. Which of the following is an example of a Public Cloud?
a. A company's own data center used only by its employees.
b. A cloud infrastructure shared by multiple organizations, like Amazon Web
Services (AWS) or Microsoft Azure.
c. A private network within a single home.
d. A server under an employee's desk.
82. What is the main advantage of the cloud's "Rapid Elasticity" feature?
a. It makes the internet faster for everyone.
b. It allows a business to quickly scale its resources up or down based on
demand.
c. It automatically fixes errors in the user's code.
d. It makes hardware cheaper to manufacture.
83. Which cloud deployment model would a bank most likely use for its sensitive
customer data due to security concerns?
a. Public Cloud b. Hybrid Cloud
c. Private Cloud d. Community Cloud
84. What is "virtualization" in the context of cloud computing?
a. The process of making something more real.
b. The creation of a virtual version of something, like a server or operating
system, allowing multiple virtual machines to run on a single physical
machine.
c. A type of computer virus. d. The same as the internet.
15 | P a g e
Computer Science Federal Board Class-11
85. Which of these is a major benefit of cloud computing for a startup company?
a. High initial capital investment in hardware.
b. Reduced IT costs and the ability to focus on core business instead of
managing infrastructure.
c. Guaranteed 100% uptime with no outages.
d. d. Complete control over the physical servers.
86. What is a potential disadvantage or risk of using cloud computing?
a. It requires a large team of system administrators.
b. Dependency on the service provider and potential for vendor lock-in.
c. Inability to access data from anywhere.
d. Resources cannot be scaled down.
87. Which term describes a cloud model that combines on-premises infrastructure
(private cloud. with public cloud services?
a. Public Cloud b. Private Cloud
c. Hybrid Cloud d. Multi Cloud
88. Google Drive, Dropbox, and OneDrive are common examples of which cloud
service?
a. Infrastructure-as-a-Service b. Cloud Storage Service
c. Platform-as-a-Service d. Security-as-a-Service
89. The "pay-as-you-go" model in cloud computing means that users:
a. Pay a large, fixed fee upfront.
b. Only pay for the IT resources they actually use.
c. Get all services for free.
d. Must sign a long-term contract.
90. Which task is the responsibility of the customer in the Software-as-a-Service
(SaaS) model?
a. Managing the underlying infrastructure and network.
b. Controlling the operating system.
c. Managing the data and user access for their own account.
d. Patching the server software.
16 | P a g e
Computer Science Federal Board Class-11
17 | P a g e
Computer Science Federal Board Class-11
97. Which of these is a key advantage of deep learning over traditional machine
learning?
a. It automatically discovers the features to be used for classification from
raw data.
b. It is easier to understand and interpret.
c. It runs faster on simple calculators. d. It requires less data.
98. A neural network architecture particularly well-suited for image recognition is:
a. Recurrent Neural Network (RNN)
b. Convolutional Neural Network (CNN)
c. Single-Layer Perceptron d. Long Short-Term Memory (LSTM)
99. Which type of neural network is designed to handle sequential data, like time
series or language?
a. Convolutional Neural Network (CNN)
b. Recurrent Neural Network (RNN)
c. Feedforward Neural Network d. Perceptron
100. The "deep" in deep learning refers to:
a. The complex mathematics involved.
b. The number of hidden layers in the neural network.
c. The profound insights it provides. d. The depth of the data storage.
101. What is a common application of deep learning in everyday life?
a. Word processing
b. Facial recognition on social media and smartphones.
c. Sending emails d. Creating spreadsheets
102. During training, what does the "loss function" measure?
a. The speed of the computer.
b. The amount of data lost during processing.
c. The difference between the network's predicted output and the actual
target output.
d. The number of neurons in the network.
18 | P a g e
Computer Science Federal Board Class-11
103. The algorithm commonly used to train neural networks by propagating the
error backwards to adjust weights is called:
a. Forward Propagation b. Backpropagation
c. Linear Regression d. Data Mining
104. Which of the following is a challenge associated with deep learning?
a. It requires very little computational power.
b. It needs a large amount of labeled data for training.
c. The models are very simple and easy to build.
d. It cannot be used for complex tasks.
105. An AI that can generate realistic human-like text is most likely built using:
a. A large deep learning model trained on a massive text dataset.
b. A fixed set of rules written by programmers.
c. A simple linear model. d. A single-layer perceptron.
106. What is "personal data"?
a. Data about a company's profits.
b. Any information that can be used to identify a specific individual.
c. Weather data collected by a station.
d. Anonymous website traffic statistics.
107. Which of the following is an example of personal data?
a. The average height of students in a class.
b. A person's full name, mobile number, and home address.
c. The total population of a city.
d. The temperature recorded in Lahore yesterday.
108. What is the primary goal of data privacy?
a. To give individuals control over how their personal information is
collected, used, and shared.
b. To hide all data from the government.
c. To share all data publicly. d. To make data processing faster.
19 | P a g e
Computer Science Federal Board Class-11
109. When you use a free social media app, how do companies often make money?
a. By selling the physical phones of their users.
b. By charging users a high monthly subscription fee.
c. By collecting user data and using it for targeted advertising.
d. By manufacturing their own internet cables.
110. What is "informed consent" in the context of data sharing?
a. Being forced to agree to terms and conditions.
b. A user's explicit permission given after they understand what data is
being collected and why.
c. A government law for data protection.
d. Sharing data without telling the user.
111. What is a "data breach"?
a. An intentional sale of data to another company.
b. An incident where sensitive or confidential data is viewed, stolen, or used
by an unauthorized individual.
c. The process of backing up data. d. A planned data sharing event.
112. Which of these is a strong password practice?
a. Using a long, complex combination of letters, numbers, and symbols.
b. Using the same password for all your accounts.
c. Using your name and birth year. d. Using "password123"
113. What does "Two-Factor Authentication (2Fa. " add to the login process?
a. It makes your password shorter.
b. It removes the need for a password.
c. It adds an extra layer of security by requiring a second step, like a code
sent to your phone.
d. It shares your password with a friend.
114. What is "encryption"?
a. The process of hiding a file on your computer.
b. The process of converting data into a secret code to prevent unauthorized
access.
c. The process of deleting data permanently.
d. The process of printing data on paper.
20 | P a g e
Computer Science Federal Board Class-11
21 | P a g e
Computer Science Federal Board Class-11
22 | P a g e