[go: up one dir, main page]

0% found this document useful (0 votes)
2 views22 pages

Unit-05: Applications of Computer Science - MCQs

The document contains multiple-choice questions related to the Internet of Things (IoT) and blockchain technology, aimed at Class-11 Computer Science students. It covers various aspects of IoT, including its components, applications, challenges, and benefits, particularly in the context of Pakistan. Additionally, it introduces blockchain fundamentals, such as its structure, decentralization, and consensus mechanisms.

Uploaded by

shahzad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
0% found this document useful (0 votes)
2 views22 pages

Unit-05: Applications of Computer Science - MCQs

The document contains multiple-choice questions related to the Internet of Things (IoT) and blockchain technology, aimed at Class-11 Computer Science students. It covers various aspects of IoT, including its components, applications, challenges, and benefits, particularly in the context of Pakistan. Additionally, it introduces blockchain fundamentals, such as its structure, decentralization, and consensus mechanisms.

Uploaded by

shahzad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
You are on page 1/ 22

Computer Science Federal Board Class-11

Chapter
01 Computer System
MULTIPLE CHOICE QUESTIONS
1. What does the acronym IoT stand for?

a. Internet of Technology b. Integration of Things


c. Internet of Things d. Intelligent Object Technology
2. The core concept of IoT is to connect physical devices to the internet
and to each other to enable them to:
a. Become more expensive
b. Collect, share, and act on data with minimal human intervention
c. Only be controlled from a remote computer
d. Replace personal computers entirely

3. Which of the following is NOT a fundamental component of an IoT


system?

a. Sensors/Actuators b. Connectivity (Internet)


c. Data Processing d. Human Manual Control Unit
4. In an IoT system, what is the primary function of a 'sensor'?
a. To send data to the cloud
b. To perform complex computations
c. To convert a physical parameter (temperature) into an electrical signal
d. To provide power to the device
5. What is the role of an 'actuator' in an IoT device?
a. It connects the device to Wi-Fi.
b. It processes the data collected by the sensor.
c. It converts an electrical signal into a physical action.
d. It only stores data.
6. Which communication protocol is most commonly associated with short-
range, low-power IoT devices like wearables?
a. Ethernet b. Bluetooth Low Energy (BLE)
c. 4G/LTE d. Satellite

1|Page
Computer Science Federal Board Class-11

7. The term "Smart Home" is a classic example of IoT. Which of these is a


potential security risk in a Smart Home?
a. Devices using too much electricity
b. Unauthorized access and control of home appliances
c. The color of the devices d. Devices making minimal sound
8. In which application domain is IoT used for monitoring soil moisture, crop
health, and automating irrigation?
a. Smart Cities b. Healthcare
c. Precision Agriculture d. Industrial Automation
9. What is a major challenge faced by the widespread adoption of IoT?
a. Lack of available sensors b. Devices are too large
c. Security and Privacy concerns d. Inability to connect to the internet
10. Which component of an IoT architecture is responsible for analyzing the raw
data collected from sensors?
a. The Sensor itself b. The Connectivity Layer
c. The Data Processing Layer d. The User Interface
11. An RFID (Radio-Frequency Identification) tag used in a supply chain to track
packages is an example of:
a. A Sensor b. An Actuator
c. A Power Source d. A Connectivity Method
12. The concept where a large number of physical devices are connected to the
internet, generating vast amounts of data, is a key driver for:
a. Big Data Analytics b. Decreased internet speeds
c. Manual data entry jobs d. Smaller databases
13. Which of these is an example of an IoT device in the healthcare sector?
a. A smart TV
b. A wearable fitness tracker that monitors heart rate
c. A desktop computer d. A digital camera

2|Page
Computer Science Federal Board Class-11

14. 14. What does the term "thing" in "Internet of Things" refer to?
a. Only computers and smartphones
b. Any physical object embedded with electronics, software, and sensors
c. Only non-electronic objects d. Only objects found in an office
15. The main goal of IoT is to create a world where physical objects are linked to
the virtual world and can:
a. Operate independently without any network.
b. Communicate with each other and people in real-time.
c. Only be used for entertainment purposes.
d. Replace all human labor.
16. What is the first and most crucial step in designing any IoT-based application?
a. Choosing the sensors
b. Selecting the programming language
c. Defining the problem statement and objective
d. Buying the most expensive hardware
17. In the design flow of an IoT application, what happens immediately after the
problem has been identified?
a. Deployment b. Data Visualization
c. Specifying the requirements d. Cloud Selection
18. When specifying inputs for a "Smart Plant Watering System," what would be
the primary input?
a. Actuator to turn on a motor b. A buzzer to make sound
c. Soil Moisture Sensor data d. An LCD display
19. For the same "Smart Plant Watering System," what would be the primary
output?
a. Sending an email b. Turning on a water
c. Displaying moisture level d. Storing data in a cloud database

3|Page
Computer Science Federal Board Class-11

20. Which of these is a critical factor when selecting sensors and hardware for an
IoT application?
a. Their color
b. Cost, accuracy, power consumption, and compatibility
c. The country of manufacture d. Their weight
21. If an IoT device needs to operate for months on a battery in a remote field,
which connectivity protocol would be most suitable?
a. Wi-Fi b. Ethernet
c. LoRaWAN (Long Range Wide Area Network)
d. USB
22. What is the primary purpose of the "Data Processing" stage in an IoT
application?
a. To convert physical quantities into electrical signals
b. To analyze raw sensor data and make decisions (e.g., "IF soil is dry, THEN
start pump")
c. To provide a physical internet connection
d. To house the sensors and actuators
23. Where can the data processing logic for a simple, low-cost IoT device typically
be implemented?
a. Only in a large cloud server b. Only on a smartphone
c. On a microcontroller (like Arduino) or a microcomputer (like Raspberry Pi)
d. It does not require processing
24. What is the purpose of the "User Interface/User Experience (UI/UX)"
component in an IoT application?
a. To connect the device to the internet
b. To allow users to interact with the system
c. To power the sensors d. To process the sensor data
25. The final step in the design flow of an IoT application is:
a. Buying Components b. Testing and Deployment
c. Problem Identification d. Writing the code
26. When designing an IoT-based "Smart Home Security System," which of the

4|Page
Computer Science Federal Board Class-11

following would be a functional requirement?


a. The system should have a blue casing.
b. The system should send an alert to the owner's phone when a motion
sensor is triggered.
c. The system should be the cheapest on the market.
d. The system should use Wi-Fi.
27. A "block diagram" in IoT design is primarily used to:
a. Write the final code for the microcontroller.
b. Show the detailed circuit connections.
c. Visually represent the system's components and the flow of data
between them.
d. List the cost of each component.
28. In a block diagram for a weather monitoring station, an arrow pointing from a
"Temperature Sensor" block to a "Microcontroller" block represents:
a. Power supply b. Flow of temperature data
c. The physical mounting of the sensor d. Internet connection
29. Why is power management a critical consideration in designing IoT
applications?
a. Because all IoT devices must be powered by solar energy.
b. Because many IoT devices are portable or deployed in remote locations
and need to operate for long periods on batteries.
c. Because it makes the device look more professional.
d. Because it is the cheapest option.
30. Scalability in IoT design refers to:
a. The physical weight of the device.
b. The ability of the system to handle an increasing number of devices and
data volume without performance loss.
c. The size of the screen on the user interface.
d. The range of the sensors.

5|Page
Computer Science Federal Board Class-11

31. Which of the following is the MOST impactful application of IoT for Pakistan's
agricultural sector, which is a major part of its economy?
a. Smart Home Lighting b. Industrial Robot Control
c. Precision Agriculture for water and fertilizer management
d. In-car entertainment systems
32. A major problem in Pakistani cities is water scarcity and inefficient
distribution. How can IoT help?
a. By creating virtual water in the cloud.
b. By using Smart Water Meters to detect leaks, monitor usage, and manage
supply.
c. By replacing all water pipes.
d. By stopping agricultural use of water.
33. The "Smart Grid" is a potential IoT application in Pakistan. What is its primary
goal?
a. To make power lines look more modern.
b. To reduce electricity theft and manage load distribution efficiently.
c. To increase the number of power plants.
d. To provide free electricity to everyone.
34. Which IoT application can directly help improve patient care in remote villages
of Pakistan where doctors are scarce?
a. Online gaming platforms
b. Telemedicine and remote health monitoring devices
c. Smart Refrigerators d. Automated Teller Machines (ATMs)
35. In the context of Pakistani manufacturing (e.g., textiles, sports goods), which
IoT application can boost productivity?
a. Predictive Maintenance of machinery to prevent unexpected breakdowns
b. Social Media Integration on the factory floor
c. Smart Mirrors d. Using more manual labor

6|Page
Computer Science Federal Board Class-11

36. For a country like Pakistan with a large youth population, how can IoT
contribute to education?
a. By replacing all teachers with robots.
b. By using Smart Attendance Systems that only take roll calls.
c. By enabling connected smart classrooms and providing access to digital
learning resources even in remote areas.
d. By stopping the use of physical books entirely.
37. Which IoT-based solution can help address the critical issue of traffic
congestion in cities like Karachi and Lahore?
a. Building more roads without planning.
b. Smart Traffic Management Systems using sensors and cameras to
optimize signal timing.
c. Installing louder horns in cars. d. Banning all cars from the roads.
38. How can IoT support the growing e-commerce and logistics industry in
Pakistan?
a. Through Smart Asset Tracking, allowing customers and companies to
track shipments in real-time.
b. By eliminating the need for delivery personnel.
c. By making websites more colorful. d. By only using bicycles for delivery.
39. What is a significant challenge for implementing widespread IoT solutions in
Pakistan?
a. Lack of internet connectivity and reliable power in some areas.
b. People not liking technology.
c. Sensors are too colorful. d. IoT devices use too little electricity.
40. Which IoT application could help Pakistani farmers get better prices for their
crops?
a. Smart Drip Irrigation
b. Supply Chain Monitoring to track produce from farm to market, reducing
spoilage and ensuring quality.
c. Drone-based crop spraying d. Soil moisture sensors

7|Page
Computer Science Federal Board Class-11

41. For a Pakistani household facing frequent power outages (load-shedding),


which IoT application would be most directly beneficial?
a. A smart coffee maker
b. A Smart Home Energy Manager that automatically switches to a backup
UPS/inverter and optimizes power usage.
c. A voice-controlled speaker d. A smart television
42. In the context of Pakistan's livestock sector, how can IoT be applied?
a. By designing fashionable saddles for animals.
b. Through Animal Health Monitoring using wearable sensors to track
location and vital signs.
c. By building smarter barns only. d. By replacing livestock with robots.
43. Which of these is an example of a Smart City initiative using IoT that could be
piloted in a Pakistani city like Islamabad?
a. Smart Waste Management with sensors to notify when bins are full for
efficient collection.
b. Building higher walls around the city.
c. Planting more trees only. d. Removing all garbage bins.
44. What is a potential benefit of using IoT in Pakistan's retail sector (e.g., local
kiryana stores or large malls)?
a. Increasing the number of shopkeepers.
b. Smart Inventory Systems that automatically track stock levels and reduce
human error.
c. Removing all price tags. d. Stopping the use of cash.
45. Despite the benefits, a major concern for adopting IoT in Pakistan, especially
for individuals, is:
a. Data Privacy and Security, fearing personal data could be misused.
b. Devices are not available in the market.
c. Devices are too lightweight. d. The technology is too simple.

8|Page
Computer Science Federal Board Class-11

46. What is the best definition of a blockchain?


a. A cloud storage service for large files.
b. A type of cryptocurrency like Bitcoin.
c. A decentralized, distributed digital ledger that records transactions across
many computers.
d. A new programming language for financial apps.
47. The data structure used in a blockchain can be described as:
a. collection of tables with rows and columns
b. A linked list where each block points to the previous one
c. A centralized database d. A standalone document
48. What is a "block" in a blockchain?
a. A physical computer server
b. A container that holds a list of transactions, a timestamp, and the hash of
the previous block
c. A type of digital wallet d. An obstacle in the network
49. The cryptographic technique that links each block to the previous one,
ensuring data integrity, is called:
a. Symmetric Encryption b. A Hash Pointer
c. A Firewall d. A Private Key
50. Why is a blockchain considered "tamper-evident"?
a. Because it is stored on a single, highly secure computer.
b. Because if data in one block is altered, its hash changes, breaking the
chain and alerting the network.
c. Because it requires government permission to change.
d. Because it is written in permanent ink.
51. What does "decentralization" mean in the context of blockchain?
a. The network is controlled by one central authority like a bank.
b. The ledger is copied and distributed across all participants in the network,
with no single owner.
c. The data is stored in one central location.
d. The system becomes slower as more users join.

9|Page
Computer Science Federal Board Class-11

52. The process by which new transactions are validated and added to the
blockchain is called:
a. Compiling b. Mining (in Proof-of-Work systems)
c. Downloading d. Encrypting
53. What is the primary purpose of "consensus mechanisms" like Proof-of-Work
(PoW) in a blockchain?
a. To make the network use as much electricity as possible.
b. To ensure all participants in the decentralized network agree on the
validity of transactions.
c. To speed up internet connectivity for all users.
d. To create new cryptocurrencies every day.
54. Which of the following is the most well-known application of blockchain
technology?
a. Web Browsers b. Cryptocurrencies
c. Word Processing Software d. Computer Games
55. A "Smart Contract" is best defined as:
a. A legally binding document written by a lawyer.
b. A computer program that automatically executes the terms of an
agreement when predefined conditions are met.
c. A friendly agreement between two people.
d. A type of blockchain miner.
56. Which of these is a key feature of a Public Blockchain?
a. It is permissioned and controlled by a single organization.
b. It is open for anyone to join, read, and write transactions.
c. It is faster and more private than all other systems.
d. It does not use cryptography.
57. How does blockchain technology provide transparency?
a. By keeping all data secret.
b. By allowing all participants to have a copy of the ledger and view all
transactions.
c. By using transparent computer screens.
d. By only showing data to the government.

10 | P a g e
Computer Science Federal Board Class-11

58. Beyond cryptocurrency, a potential use case for blockchain in supply chain
management is:
a. To make products heavier.
b. To track the origin and journey of a product from manufacturer to
consumer, ensuring authenticity.
c. To replace all trucks with drones. d. To hide the product's source.
59. What is a major challenge associated with blockchain technology?
a. It is too easy to change past records.
b. Scalability - processing a high number of transactions quickly can be
difficult.
c. It requires no electricity to run. d. It is controlled by too few people.
60. What is the relationship between a cryptocurrency and a blockchain?
a. They are the same thing.
b. The blockchain is the underlying technology that enables the existence of
cryptocurrency.
c. Cryptocurrency is a hardware required to run a blockchain.
d. Blockchain is a type of cryptocurrency.
61. How can blockchain technology help combat corruption in government
departments in Pakistan?
a. By making all data secret and inaccessible.
b. By creating a transparent and tamper-proof record of transactions, such
as land registry entries and procurement deals.
c. By replacing all government employees with software.
d. By using faster internet connections.
62. Which of the following is a major application of blockchain for Pakistan's
agricultural sector?
a. Designing new types of fertilizers.
b. Creating a transparent supply chain to verify the origin and quality of
crops like Kinnow oranges and Basmati rice for export.
c. Replacing tractors with automated robots.
d. Controlling the weather.

11 | P a g e
Computer Science Federal Board Class-11

63. The State Bank of Pakistan is exploring a digital currency. How could
blockchain be central to this?
a. By printing more physical currency notes.
b. By launching a Central Bank Digital Currency (CBDc. for secure,
transparent, and efficient digital payments.
c. By shutting down all private banks.
d. By removing all ATMs from the country.
64. A significant portion of Pakistan's population lacks formal identification. How
can blockchain help?
a. By giving everyone the same ID number.
b. By creating secure, self-sovereign digital identities that individuals can
control and use to access services like banking and voting.
c. By using facial recognition only. d. By removing the need for any ID.
65. For the millions of overseas Pakistanis sending remittances, blockchain can
make the process:
a. Slower and more expensive.
b. Faster, cheaper, and more transparent by reducing the need for
intermediary banks.
c. Dependent on a single company. d. Only possible in US dollars.
66. In Pakistan's pharmaceutical industry, a key application of blockchain would
be:
a. Tracking drugs from manufacturer to patient to eliminate the problem of
counterfeit medicine.
b. Replacing doctors with automated systems.
c. Making medicines taste better. d. Inventing new diseases.
67. How can blockchain bring transparency to the Zakat distribution system in
Pakistan?
a. By stopping the collection of Zakat.
b. By creating an immutable record from donor to beneficiary, ensuring
funds are used as intended.
c. By giving all the funds to one person.
d. By making the process completely secret.

12 | P a g e
Computer Science Federal Board Class-11

68. For the electoral process in Pakistan, blockchain could be used to:
a. Allow only one political party to run.
b. Develop a secure and verifiable e-voting system to reduce disputes and
increase voter trust.
c. Announce results before voting starts.
d. Force everyone to vote for the same candidate.
69. In the context of education, how can a blockchain benefit a Pakistani
university?
a. By automatically passing all students.
b. By issuing tamper-proof digital degrees and certificates that can be
instantly verified by employers.
c. By replacing all teachers with online videos.
d. By making education free without any records.
70. What is a significant challenge for implementing blockchain solutions in
Pakistan?
a. Unreliable internet connectivity and a need for greater technical
expertise and regulatory frameworks.
b. Blockchain technology is too simple for Pakistan's needs.
c. Sensors are too expensive. d. Lack of interest in technology.
71. For a Pakistani small business owner wanting to get a loan, how could
blockchain help?
a. By forcing banks to give loans without any checks.
b. By creating a transparent and verifiable record of their business
transactions, helping them build a credit history.
c. By hiding their financial records from the bank.
d. By printing more money for the business.
72. In the energy sector, blockchain could enable a system where:
a. All power plants are shut down.
b. Consumers with solar panels can securely sell their excess electricity to
neighbors (peer-to-peer energy trading).
c. Electricity bills are eliminated. d. Load-shedding is increased.

13 | P a g e
Computer Science Federal Board Class-11

73. The "Ehsaas" program could use blockchain to:


a. Remove all beneficiaries from the list.
b. Distribute funds directly to verified beneficiaries with reduced leakage
and corruption.
c. Make the application process more complicated.
d. Only help people in urban areas.
74. What is a potential benefit of using blockchain for Pakistan's tea import
industry?
a. Providing verifiable proof of the tea's origin and quality, ensuring
consumers get what they pay for.
b. Stopping the import of tea entirely.
c. Making tea taste like coffee. d. Using tea leaves as currency.
75. Despite the benefits, a major hurdle for blockchain adoption in Pakistan's
public sector is:
a. The technology is too colorful.
b. Resistance to change and the need for a significant shift in mindset
towards transparency and digitization.
c. Blockchain requires no internet. d. It is too easy to implement.
76. What is the best definition of Cloud Computing?
a. A weather forecasting technology.
b. Storing data on your personal computer's hard drive.
c. The delivery of computing services—including servers, storage,
databases, networking, software—over the internet ("the cloud").
d. A network of computers in a single room.
77. Which of these is a key characteristic of cloud computing?
a. On-demand self-service, where a user can provision resources without
human interaction.
b. Resources are permanently assigned to one user.
c. It requires the user to buy and maintain all the hardware.
d. It only works with a wired internet connection.
78. What does "IaaS" stand for in cloud computing?
a. Internet-as-a-Software b. Infrastructure-as-a-Service
c. Internal-as-a-System d. Integration-as-a-Service

14 | P a g e
Computer Science Federal Board Class-11

79. If a company uses Microsoft Office 365 directly through its web browser, it is
using which cloud service model?
a. Infrastructure-as-a-Service (IaaS) b. Platform-as-a-Service (PaaS)
c. Software-as-a-Service (SaaS) d. Network-as-a-Service (NaaS)
80. A developer who wants to build a web application without managing the
underlying operating system or servers would use:
a. IaaS b. PaaS
c. SaaS d. Hard Drive
81. Which of the following is an example of a Public Cloud?
a. A company's own data center used only by its employees.
b. A cloud infrastructure shared by multiple organizations, like Amazon Web
Services (AWS) or Microsoft Azure.
c. A private network within a single home.
d. A server under an employee's desk.
82. What is the main advantage of the cloud's "Rapid Elasticity" feature?
a. It makes the internet faster for everyone.
b. It allows a business to quickly scale its resources up or down based on
demand.
c. It automatically fixes errors in the user's code.
d. It makes hardware cheaper to manufacture.
83. Which cloud deployment model would a bank most likely use for its sensitive
customer data due to security concerns?
a. Public Cloud b. Hybrid Cloud
c. Private Cloud d. Community Cloud
84. What is "virtualization" in the context of cloud computing?
a. The process of making something more real.
b. The creation of a virtual version of something, like a server or operating
system, allowing multiple virtual machines to run on a single physical
machine.
c. A type of computer virus. d. The same as the internet.

15 | P a g e
Computer Science Federal Board Class-11

85. Which of these is a major benefit of cloud computing for a startup company?
a. High initial capital investment in hardware.
b. Reduced IT costs and the ability to focus on core business instead of
managing infrastructure.
c. Guaranteed 100% uptime with no outages.
d. d. Complete control over the physical servers.
86. What is a potential disadvantage or risk of using cloud computing?
a. It requires a large team of system administrators.
b. Dependency on the service provider and potential for vendor lock-in.
c. Inability to access data from anywhere.
d. Resources cannot be scaled down.
87. Which term describes a cloud model that combines on-premises infrastructure
(private cloud. with public cloud services?
a. Public Cloud b. Private Cloud
c. Hybrid Cloud d. Multi Cloud
88. Google Drive, Dropbox, and OneDrive are common examples of which cloud
service?
a. Infrastructure-as-a-Service b. Cloud Storage Service
c. Platform-as-a-Service d. Security-as-a-Service
89. The "pay-as-you-go" model in cloud computing means that users:
a. Pay a large, fixed fee upfront.
b. Only pay for the IT resources they actually use.
c. Get all services for free.
d. Must sign a long-term contract.
90. Which task is the responsibility of the customer in the Software-as-a-Service
(SaaS) model?
a. Managing the underlying infrastructure and network.
b. Controlling the operating system.
c. Managing the data and user access for their own account.
d. Patching the server software.

16 | P a g e
Computer Science Federal Board Class-11

91. What is the fundamental building block of an artificial neural network?


a. Algorithm b. Neuron
c. Dataset d. Processor
92. In a biological neuron, what do dendrites do?
a. They send signals to other neurons.
b. They receive signals from other neurons.
c. They store the memory. d. They process the information.
93. What is the function of an "activation function" in an artificial neuron?
a. To determine the output of a neuron, introducing non-linearity into the
network.
b. To connect the neuron to the internet.
c. To power the computer. d. To initialize the weights randomly.
94. Which of the following is a common activation function used in neural
networks?
a. Sigmoid Function b. Sorting Function
c. Printing Function d. Linear Function
95. The process of adjusting the weights of a neural network to minimize error is
called:
a. Forward Propagation b. Testing
c. Training or Learning d. Data Collection
96. What is "Deep Learning"?
a. Learning difficult subjects from books.
b. A subfield of machine learning based on artificial neural networks with
many layers (deep networks).
c. A programming language for AI.
d. Storing data in deep storage servers.

17 | P a g e
Computer Science Federal Board Class-11

97. Which of these is a key advantage of deep learning over traditional machine
learning?
a. It automatically discovers the features to be used for classification from
raw data.
b. It is easier to understand and interpret.
c. It runs faster on simple calculators. d. It requires less data.
98. A neural network architecture particularly well-suited for image recognition is:
a. Recurrent Neural Network (RNN)
b. Convolutional Neural Network (CNN)
c. Single-Layer Perceptron d. Long Short-Term Memory (LSTM)
99. Which type of neural network is designed to handle sequential data, like time
series or language?
a. Convolutional Neural Network (CNN)
b. Recurrent Neural Network (RNN)
c. Feedforward Neural Network d. Perceptron
100. The "deep" in deep learning refers to:
a. The complex mathematics involved.
b. The number of hidden layers in the neural network.
c. The profound insights it provides. d. The depth of the data storage.
101. What is a common application of deep learning in everyday life?
a. Word processing
b. Facial recognition on social media and smartphones.
c. Sending emails d. Creating spreadsheets
102. During training, what does the "loss function" measure?
a. The speed of the computer.
b. The amount of data lost during processing.
c. The difference between the network's predicted output and the actual
target output.
d. The number of neurons in the network.

18 | P a g e
Computer Science Federal Board Class-11

103. The algorithm commonly used to train neural networks by propagating the
error backwards to adjust weights is called:
a. Forward Propagation b. Backpropagation
c. Linear Regression d. Data Mining
104. Which of the following is a challenge associated with deep learning?
a. It requires very little computational power.
b. It needs a large amount of labeled data for training.
c. The models are very simple and easy to build.
d. It cannot be used for complex tasks.
105. An AI that can generate realistic human-like text is most likely built using:
a. A large deep learning model trained on a massive text dataset.
b. A fixed set of rules written by programmers.
c. A simple linear model. d. A single-layer perceptron.
106. What is "personal data"?
a. Data about a company's profits.
b. Any information that can be used to identify a specific individual.
c. Weather data collected by a station.
d. Anonymous website traffic statistics.
107. Which of the following is an example of personal data?
a. The average height of students in a class.
b. A person's full name, mobile number, and home address.
c. The total population of a city.
d. The temperature recorded in Lahore yesterday.
108. What is the primary goal of data privacy?
a. To give individuals control over how their personal information is
collected, used, and shared.
b. To hide all data from the government.
c. To share all data publicly. d. To make data processing faster.

19 | P a g e
Computer Science Federal Board Class-11

109. When you use a free social media app, how do companies often make money?
a. By selling the physical phones of their users.
b. By charging users a high monthly subscription fee.
c. By collecting user data and using it for targeted advertising.
d. By manufacturing their own internet cables.
110. What is "informed consent" in the context of data sharing?
a. Being forced to agree to terms and conditions.
b. A user's explicit permission given after they understand what data is
being collected and why.
c. A government law for data protection.
d. Sharing data without telling the user.
111. What is a "data breach"?
a. An intentional sale of data to another company.
b. An incident where sensitive or confidential data is viewed, stolen, or used
by an unauthorized individual.
c. The process of backing up data. d. A planned data sharing event.
112. Which of these is a strong password practice?
a. Using a long, complex combination of letters, numbers, and symbols.
b. Using the same password for all your accounts.
c. Using your name and birth year. d. Using "password123"
113. What does "Two-Factor Authentication (2Fa. " add to the login process?
a. It makes your password shorter.
b. It removes the need for a password.
c. It adds an extra layer of security by requiring a second step, like a code
sent to your phone.
d. It shares your password with a friend.
114. What is "encryption"?
a. The process of hiding a file on your computer.
b. The process of converting data into a secret code to prevent unauthorized
access.
c. The process of deleting data permanently.
d. The process of printing data on paper.

20 | P a g e
Computer Science Federal Board Class-11

115. Which of these is a potential risk of oversharing on social media?


a. Identity theft or physical security risks if location and personal routines
are shared.
b. Improving your programming skills.
c. Getting more followers. d. Making your internet faster.
116. What is the purpose of a "Privacy Policy" on a website or app?
a. To guarantee that your data will never be stolen.
b. To explain to users how their data will be collected, used, and protected.
c. To serve as a legal document that allows the company to do anything with
your data.
d. To improve the website's design.
117. "Location Tracking" on your smartphone is an example of:
a. A hardware feature that cannot be controlled.
b. Personal data collection that can often be managed in the phone's
settings.
c. A feature that has no privacy implications.
d. A tool that only the government can use.
118. What is "data anonymization"?
a. Making data more accurate.
b. The process of removing or modifying personal identifiers so that data
can no longer be linked to a specific individual.
c. Creating multiple copies of data. d. Selling data to the highest bidder.
119. Why should you be cautious about using public Wi-Fi for sensitive transactions
(like online banking)?
a. It is always slower than mobile data.
b. Public Wi-Fi networks are often unsecured, making it easier for hackers to
intercept your data.
c. It uses more battery power. d. It is illegal in many countries.
120. The concept that individuals should have the right to have their personal data
deleted is known as:
a. The Right to Data Sharing b. The Right to be Forgotten
c. The Right to Encryption d. The Right to Publicity

21 | P a g e
Computer Science Federal Board Class-11

22 | P a g e

You might also like