ICS part 2 Computer past papers A-PLUS according to alp new syllabus. 12th class computer Azeem 10 Boards chapter-wise solved papers of all Punjab Boards.
These papers of computer science are collected from the following Punjab Boards.
- Lahore
- Multan
- Gujranwala
- Sahiwal
- Bahawalpur
- D.G Khan
- Faisalabad
- Rawalpindi
- Federal Board
- Sargodha
ICS PART 2 Past Papers:
Each and every chapter of the Ics computer is given with solved MCQs. Chapter-wise solved short questions from past papers. Important long questions from past papers.
All notes of ics computer part 2 are followed by alp smart syllabus 2021. ICS Computer solved original papers from 2012 to 2019. A Plus solved papers with answer keys 2021.
past papers Table of Contents:
- Data Basics MCQs, short and long questions
- Basic Concepts and Terminology of Databases
- Database design process
- Data integrity and normalization
- Introduction to Microsoft Access
- Table and Query
- Microsoft Access Forms and Reports
- Getting started with C
- Elements of C
- Input/Output
- Decision constructs
- Functions in C
- File Handling in C
Note: Objective and Subjective type should be given from the retained topics and exercise questions.
Computer Sample MCQs:
- This is not a biometric technique:
a) Badge
b) b) Retina
c) c) Face
d) d) Palm print - A virus that replicates itself is called:
a) Bug
b) Bomb
c) Worm
d) Vaccine - Which program is not an antivirus program?
a) McAfee
b) b) Logic Bomb
c) c) Norton
d) d) Dr. Solomon - Which is harmful to the computer?
Antivirus
b) Virus
c) Freeware
d) Shareware - Software that is available freely for a limited of time is called_____.
a) Freeware
b) Shareware
c) Groupware
d) Relative - Types of software that can be freely distributed freely without violating copyright laws are called:
a) Shareware
b) Public domain
c) Copy-protected
d) a & b Both - A secret word or numbers to be typed in on a keyboard before any activity can take place are called:
a) Biometric data
b) Password
c) Private word
d) All of these - Making illegal copies of copyrighted software is called:
a) Software hacking
b) Software distribution
(c) Software pirating
d) None of these - Illegal copy of software is known as:
a) Pirated software
b) System software
c) Customized software
d) None of these - A person who gains illegal access to access to a computer system is called:
a) Hacker
b) Worm
c) Developer
d) Programer
A Plus solved original Board papers can be downloaded from the below link.
2nd-Year Computer Azeem 10 Boards:
I.CS Computer part 2 Azeem past papers according to alp smart syllabus.