PAST PAPER Assistant Director (IT) Web Development PPSC [SOLVED]
1. What is the primary function of a Database Management System (DBMS)?
A) Data manipulation
B) Data storage
C) Data retrieval
D) All of the above
Answer: D) All of the above
2. Which of the following is a relational database management system (RDBMS)?
A) Oracle
B) MongoDB
C) Redis
D) Neo4j
Answer: A) Oracle
3. In networking, what does the term ‘bandwidth’ refer to?
A) The number of users connected
B) The amount of data that can be transmitted in a given time
C) The type of network protocol used
D) The physical distance between devices
Answer: B) The amount of data that can be transmitted in a given time
4. Which layer of the OSI model is responsible for end-to-end communication?
A) Transport Layer
B) Network Layer
C) Data Link Layer
D) Application Layer
Answer: A) Transport Layer
5. What is the purpose of normalization in databases?
A) To reduce redundancy
B) To increase data retrieval speed
C) To improve security
D) To enforce data integrity
Answer: A) To reduce redundancy
6. Which programming language is primarily used for web development?
A) C++
B) Java
C) JavaScript
D) Python
Answer: C) JavaScript
7. What does SQL stand for?
A) Structured Query Language
B) Simple Query Language
C) Standard Query Language
D) Secure Query Language
Answer: A) Structured Query Language
8. Which of the following is an example of an operating system?
A) Microsoft Word
B) Linux
C) Adobe Photoshop
D) MySQL
Answer: B) Linux
9. What is the primary purpose of a firewall in a network?
A) To block malware
B) To monitor network traffic
C) To prevent unauthorized access
D) To improve network speed
Answer: C) To prevent unauthorized access
10. In GIS, what does the term ‘layer’ refer to?
A) A single map
B) A collection of geographic data
C) A visual representation of data
D) A database
Answer: B) A collection of geographic data
11. What is the default port number for HTTP?
A) 80
B) 443
C) 21
D) 25
Answer: A) 80
12. Which of the following is NOT a type of software testing?
A) Unit testing
B) Integration testing
C) System testing
D) Component testing
Answer: D) Component testing
13. What is a primary key in a database?
A) A unique identifier for a record
B) A reference to another table
C) A column that can have duplicate values
D) A type of foreign key
Answer: A) A unique identifier for a record
14. Which command is used to retrieve data from a database?
A) INSERT
B) SELECT
C) UPDATE
D) DELETE
Answer: B) SELECT
15. What does VPN stand for in networking?
A) Virtual Private Network
B) Virtual Public Network
C) Verified Private Network
D) Verified Public Network
Answer: A) Virtual Private Network
16. Which data structure uses a Last In First Out (LIFO) method?
A) Queue
B) Array
C) Stack
D) Linked List
Answer: C) Stack
17. In programming, what does ‘debugging’ refer to?
A) Writing new code
B) Finding and fixing errors
C) Compiling code
D) Documenting code
Answer: B) Finding and fixing errors
18. Which of the following is a type of NoSQL database?
A) MySQL
B) PostgreSQL
C) MongoDB
D) SQLite
Answer: C) MongoDB
19. What is the main function of the Network Interface Card (NIC)?
A) To connect to the internet
B) To manage network traffic
C) To provide a physical connection to a network
D) To protect against malware
Answer: C) To provide a physical connection to a network
20. Which of the following is an example of a programming paradigm?
A) Object-oriented programming
B) Data modeling
C) Network topology
D) User interface design
Answer: A) Object-oriented programming
21. In which language is the Android operating system primarily developed?
A) Java
B) C++
C) Swift
D) Python
Answer: A) Java
22. Which of the following is a common protocol used for email transmission?
A) FTP
B) HTTP
C) SMTP
D) SNMP
Answer: C) SMTP
23. What is a subnet mask used for?
A) To identify the network portion of an IP address
B) To encrypt data
C) To block unauthorized access
D) To convert domain names to IP addresses
Answer: A) To identify the network portion of an IP address
24. What type of attack involves overwhelming a server with traffic?
A) Phishing
B) Denial of Service (DoS)
C) SQL Injection
D) Man-in-the-Middle
Answer: B) Denial of Service (DoS)
25. Which of the following is a disadvantage of cloud computing?
A) Accessibility
B) Cost
C) Data security concerns
D) Scalability
Answer: C) Data security concerns
26. In system analysis, what does the term ‘requirements gathering’ refer to?
A) Identifying user needs and expectations
B) Analyzing existing systems
C) Testing system functionality
D) Implementing system solutions
Answer: A) Identifying user needs and expectations
27. What does the term ‘algorithm’ mean in computer science?
A) A programming language
B) A step-by-step procedure for solving a problem
C) A type of database
D) A hardware component
Answer: B) A step-by-step procedure for solving a problem
28. Which of the following is NOT an example of a programming language?
A) Python
B) HTML
C) SQL
D) CSS
Answer: B) HTML
29. What is the primary purpose of data encryption?
A) To increase data storage capacity
B) To improve data retrieval speed
C) To protect data from unauthorized access
D) To simplify data formatting
Answer: C) To protect data from unauthorized access
30. Which of the following is a feature of a relational database?
A) Hierarchical structure
B) Flat file structure
C) Tables with relationships
D) Unstructured data storage
Answer: C) Tables with relationships
31. Which command is used to update existing data in a database?
A) INSERT
B) SELECT
C) UPDATE
D) DELETE
Answer: C) UPDATE
32. In networking, what does DHCP stand for?
A) Dynamic Host Configuration Protocol
B) Data Host Control Protocol
C) Domain Host Configuration Protocol
D) Dynamic Hardware Control Protocol
Answer: A) Dynamic Host Configuration Protocol
33. Which of the following topologies connects all devices to a central hub?
A) Star topology
B) Ring topology
C) Bus topology
D) Mesh topology
Answer: A) Star topology
34. What is the purpose of an operating system?
A) To manage hardware and software resources
B) To write code
C) To design databases
D) To create graphics
Answer: A) To manage hardware and software resources
35. What does GIS stand for?
A) Geographic Information Systems
B) Global Information Systems
C) Generalized Information Systems
D) Graphical Information Systems
Answer: A) Geographic Information Systems
36. Which of the following is a commonly used markup language?
A) HTML
B) Java
C) C++
D) PHP
Answer: A) HTML
37. What is the function of an API (Application Programming Interface)?
A) To provide a user interface
B) To allow different software programs to communicate
C) To manage database connections
D) To perform network routing
Answer: B) To allow different software programs to communicate
38. What is the output of the expression 3 + 5 * 2?
A) 10
B) 16
C) 13
D) 8
Answer: C) 13
39. Which of the following is a characteristic of cloud computing?
A) Local storage
B) On-demand self-service
C) Limited access
D) High maintenance costs
Answer: B) On-demand self-service
40. What does HTML stand for?
A) Hypertext Markup Language
B) Hyperlink and Text Markup Language
C) High-Level Markup Language
D) Hypertext Multi-language
Answer: A) Hypertext Markup Language
41. Which of the following is an example of a version control system?
A) Git
B) FTP
C) HTTP
D) SMTP
Answer: A) Git
42. In a network, what does NAT stand for?
A) Network Address Translation
B) Network Access Technology
C) Network Authentication Technique
D) Network Allocation Table
Answer: A) Network Address Translation
43. Which protocol is used to securely transmit data over a network?
A) HTTP
B) FTP
C) HTTPS
D) SMTP
Answer: C) HTTPS
44. What is the main advantage of using indexes in databases?
A) To reduce data redundancy
B) To speed up data retrieval
C) To simplify queries
D) To enforce data integrity
Answer: B) To speed up data retrieval
45. Which type of software is used to manage network resources?
A) Application software
B) System software
C) Database software
D) Middleware
Answer: B) System software
46. In project management, what does ‘scope creep’ refer to?
A) The project’s initial goals
B) The expansion of project scope without proper control
C) The risk assessment process
D) The timeline of project phases
Answer: B) The expansion of project scope without proper control
47. Which of the following is a method for backing up data?
A) Cloud backup
B) USB storage
C) Tape backup
D) All of the above
Answer: D) All of the above
48. What does the acronym ‘ITIL’ stand for?
A) Information Technology Infrastructure Library
B) Internet Technology Information Library
C) Integrated Technology Information Language
D) Information Technology Implementation Language
Answer: A) Information Technology Infrastructure Library
49. In programming, what does ‘syntax’ refer to?
A) The meaning of code
B) The rules for writing code
C) The performance of code
D) The efficiency of algorithms
Answer: B) The rules for writing code
50. Which of the following is a widely used version of SQL?
A) SQL Server
B) PL/SQL
C) T-SQL
D) All of the above
Answer: D) All of the above
51. What does ‘IoT’ stand for?
A) Internet of Technology
B) Internet of Things
C) Internet of Transactions
D) Internet of Time
Answer: B) Internet of Things
52. Which of the following programming languages is primarily used for data science?
A) Java
B) Python
C) C#
D) PHP
Answer: B) Python
53. What is the role of a database administrator (DBA)?
A) To write code
B) To manage and maintain databases
C) To design user interfaces
D) To perform network administration
Answer: B) To manage and maintain databases
54. In networking, what does the acronym ‘SSL’ stand for?
A) Secure Sockets Layer
B) Standard Security Layer
C) System Security Link
D) Secure System Layer
Answer: A) Secure Sockets Layer
55. Which of the following is a data visualization tool?
A) Tableau
B) MySQL
C) Python
D) Java
Answer: A) Tableau
56. What does ‘virtualization’ refer to in computing?
A) Creating virtual machines to run multiple operating systems
B) The process of encrypting data
C) A type of network protocol
D) A method of data backup
Answer: A) Creating virtual machines to run multiple operating systems
57. Which type of data structure is a tree?
A) Linear
B) Hierarchical
C) Non-linear
D) Both B and C
Answer: D) Both B and C
58. What is a primary function of IT operations?
A) Software development
B) Network maintenance
C) User support
D) All of the above
Answer: D) All of the above
59. Which of the following is a type of malware?
A) Antivirus
B) Worm
C) Firewall
D) None of the above
Answer: B) Worm
60. What is the purpose of a data warehouse?
A) To store operational data
B) To store historical data for analysis
C) To manage real-time transactions
D) To host applications
Answer: B) To store historical data for analysis
61. In which type of testing do you assess a system as a whole?
A) Unit testing
B) Integration testing
C) System testing
D) User acceptance testing
Answer: C) System testing
62. What is the primary purpose of a content management system (CMS)?
A) To manage hardware resources
B) To manage website content
C) To analyze data
D) To perform backups
Answer: B) To manage website content
63. Which of the following best describes ‘agile methodology’?
A) A linear project management approach
B) An iterative and incremental approach
C) A fixed-scope project management approach
D) A traditional project management approach
Answer: B) An iterative and incremental approach
64. What is the purpose of the TCP/IP model?
A) To manage database connections
B) To define networking protocols
C) To create user interfaces
D) To perform data analysis
Answer: B) To define networking protocols
65. Which of the following is a cloud service model?
A) IaaS
B) PaaS
C) SaaS
D) All of the above
Answer: D) All of the above
66. What is the main advantage of using a framework in programming?
A) It restricts functionality
B) It provides structure and reusable components
C) It requires more code
D) It eliminates the need for testing
Answer: B) It provides structure and reusable components
67. In database terminology, what does ‘foreign key’ refer to?
A) A unique identifier for a record
B) A reference to a primary key in another table
C) A key used for data encryption
D) A type of index
Answer: B) A reference to a primary key in another table
68. Which of the following is a characteristic of a good user interface (UI)?
A) Complex and detailed
B) Intuitive and user-friendly
C) Overloaded with options
D) Requires extensive training
Answer: B) Intuitive and user-friendly
69. In GIS, what is a ‘shapefile’?
A) A type of database
B) A format for storing geospatial data
C) A method for data encryption
D) A type of software
Answer: B) A format for storing geospatial data
70. What does ‘Big Data’ refer to?
A) Small datasets
B) Data sets that are too large or complex for traditional data-processing software
C) A new programming language
D) A type of cloud storage
Answer: B) Data sets that are too large or complex for traditional data-processing software
71. Which of the following is used for network security?
A) VPN
B) Firewall
C) Antivirus
D) All of the above
Answer: D) All of the above
72. What is the purpose of an audit trail in database management?
A) To store backup copies
B) To track changes and access to data
C) To encrypt sensitive data
D) To improve data retrieval speed
Answer: B) To track changes and access to data
73. In programming, what is ‘inheritance’?
A) A method to write secure code
B) A feature that allows a new class to inherit properties and methods from an existing class
C) A type of data structure
D) A technique for data storage
Answer: B) A feature that allows a new class to inherit properties and methods from an existing class
74. What does the acronym ‘DBMS’ stand for?
A) Data Backup Management System
B) Database Management System
C) Data Base Maintenance System
D) Data Block Management System
Answer: B) Database Management System
75. Which of the following is an example of an open-source operating system?
A) Windows
B) macOS
C) Linux
D) iOS
Answer: C) Linux
76. What is the role of an IT manager?
A) To develop software
B) To oversee IT projects and teams
C) To write documentation
D) To manage hardware purchases
Answer: B) To oversee IT projects and teams
77. What is the purpose of a web server?
A) To store applications
B) To host websites and serve web pages
C) To manage databases
D) To perform network analysis
Answer: B) To host websites and serve web pages
78. Which of the following is an essential component of a network?
A) Switch
B) Router
C) Hub
D) All of the above
Answer: D) All of the above
79. What is the main purpose of system analysis?
A) To improve software performance
B) To understand and specify user requirements
C) To design user interfaces
D) To develop algorithms
Answer: B) To understand and specify user requirements
80. Which programming paradigm is based on the concept of objects?
A) Procedural programming
B) Object-oriented programming
C) Functional programming
D) Logic programming
Answer: B) Object-oriented programming
81. What is the capital of Pakistan?
A) Lahore
B) Karachi
C) Islamabad
D) Peshawar
Answer: C) Islamabad
82. Which language is recognized as the national language of Pakistan?
A) English
B) Urdu
C) Punjabi
D) Sindhi
Answer: B) Urdu
83. Who was the founder of Pakistan?
A) Allama Iqbal
B) Liaquat Ali Khan
C) Muhammad Ali Jinnah
D) Zulfikar Ali Bhutto
Answer: C) Muhammad Ali Jinnah
84. Which river is the longest river in Pakistan?
A) Ravi
B) Chenab
C) Indus
D) Jhelum
Answer: C) Indus
85. In which year did Pakistan become a republic?
A) 1956
B) 1947
C) 1962
D) 1973
Answer: A) 1956
86. What is the main source of revenue for the government of Pakistan?
A) Agriculture
B) Industry
C) Services
D) Tourism
Answer: A) Agriculture
87. Which of the following is the highest peak in Pakistan?
A) K2
B) Nanga Parbat
C) Gasherbrum
D) Broad Peak
Answer: A) K2
88. What is the national animal of Pakistan?
A) Markhor
B) Lion
C) Tiger
D) Eagle
Answer: A) Markhor
89. Which city is known as the City of Lights in Pakistan?
A) Islamabad
B) Karachi
C) Lahore
D) Peshawar
Answer: B) Karachi
90. What is the currency of Pakistan?
A) Dollar
B) Rupee
C) Euro
D) Taka
Answer: B) Rupee
91. Who is known as the “Quaid-e-Azam” of Pakistan?
A) Liaquat Ali Khan
B) Allama Iqbal
C) Muhammad Ali Jinnah
D) Benazir Bhutto
Answer: C) Muhammad Ali Jinnah
92. Which day is celebrated as Pakistan Day?
A) March 23
B) August 14
C) December 16
D) November 5
Answer: A) March 23
93. What is the population of Pakistan approximately as of 2023?
A) 200 million
B) 250 million
C) 300 million
D) 150 million
Answer: B) 250 million
94. What is the boiling point of water in Celsius?
A) 50°C
B) 100°C
C) 150°C
D) 200°C
Answer: B) 100°C
95. Which gas is known as the “laughing gas”?
A) Nitrous oxide
B) Carbon dioxide
C) Oxygen
D) Hydrogen
Answer: A) Nitrous oxide
96. What is the chemical formula for water?
A) CO2
B) H2O
C) O2
D) H2
Answer: B) H2O
97. What is the capital city of the United States?
A) New York
B) Washington, D.C.
C) Los Angeles
D) Chicago
Answer: B) Washington, D.C.
98. What is the sum of angles in a triangle?
A) 90 degrees
B) 180 degrees
C) 360 degrees
D) 270 degrees
Answer: B) 180 degrees
99. Which continent is known as the “Dark Continent”?
A) Asia
B) Africa
C) South America
D) Australia
Answer: B) Africa
100. Which organ is responsible for pumping blood in the human body?
A) Lungs
B) Liver
C) Heart
D) Kidney
Answer: C) Heart