PAST PAPER Assistant Director (IT) Web Development PPSC [SOLVED]

1. What is the primary function of a Database Management System (DBMS)?
A) Data manipulation
B) Data storage
C) Data retrieval
D) All of the above
Answer: D) All of the above

2. Which of the following is a relational database management system (RDBMS)?
A) Oracle
B) MongoDB
C) Redis
D) Neo4j
Answer: A) Oracle

3. In networking, what does the term ‘bandwidth’ refer to?
A) The number of users connected
B) The amount of data that can be transmitted in a given time
C) The type of network protocol used
D) The physical distance between devices
Answer: B) The amount of data that can be transmitted in a given time

4. Which layer of the OSI model is responsible for end-to-end communication?
A) Transport Layer
B) Network Layer
C) Data Link Layer
D) Application Layer
Answer: A) Transport Layer

5. What is the purpose of normalization in databases?
A) To reduce redundancy
B) To increase data retrieval speed
C) To improve security
D) To enforce data integrity
Answer: A) To reduce redundancy

6. Which programming language is primarily used for web development?
A) C++
B) Java
C) JavaScript
D) Python
Answer: C) JavaScript

7. What does SQL stand for?
A) Structured Query Language
B) Simple Query Language
C) Standard Query Language
D) Secure Query Language
Answer: A) Structured Query Language

8. Which of the following is an example of an operating system?
A) Microsoft Word
B) Linux
C) Adobe Photoshop
D) MySQL
Answer: B) Linux

9. What is the primary purpose of a firewall in a network?
A) To block malware
B) To monitor network traffic
C) To prevent unauthorized access
D) To improve network speed
Answer: C) To prevent unauthorized access

10. In GIS, what does the term ‘layer’ refer to?
A) A single map
B) A collection of geographic data
C) A visual representation of data
D) A database
Answer: B) A collection of geographic data

11. What is the default port number for HTTP?
A) 80
B) 443
C) 21
D) 25
Answer: A) 80

12. Which of the following is NOT a type of software testing?
A) Unit testing
B) Integration testing
C) System testing
D) Component testing
Answer: D) Component testing

13. What is a primary key in a database?
A) A unique identifier for a record
B) A reference to another table
C) A column that can have duplicate values
D) A type of foreign key
Answer: A) A unique identifier for a record

14. Which command is used to retrieve data from a database?
A) INSERT
B) SELECT
C) UPDATE
D) DELETE
Answer: B) SELECT

15. What does VPN stand for in networking?
A) Virtual Private Network
B) Virtual Public Network
C) Verified Private Network
D) Verified Public Network
Answer: A) Virtual Private Network

16. Which data structure uses a Last In First Out (LIFO) method?
A) Queue
B) Array
C) Stack
D) Linked List
Answer: C) Stack

17. In programming, what does ‘debugging’ refer to?
A) Writing new code
B) Finding and fixing errors
C) Compiling code
D) Documenting code
Answer: B) Finding and fixing errors

18. Which of the following is a type of NoSQL database?
A) MySQL
B) PostgreSQL
C) MongoDB
D) SQLite
Answer: C) MongoDB

19. What is the main function of the Network Interface Card (NIC)?
A) To connect to the internet
B) To manage network traffic
C) To provide a physical connection to a network
D) To protect against malware
Answer: C) To provide a physical connection to a network

20. Which of the following is an example of a programming paradigm?
A) Object-oriented programming
B) Data modeling
C) Network topology
D) User interface design
Answer: A) Object-oriented programming

21. In which language is the Android operating system primarily developed?
A) Java
B) C++
C) Swift
D) Python
Answer: A) Java

22. Which of the following is a common protocol used for email transmission?
A) FTP
B) HTTP
C) SMTP
D) SNMP
Answer: C) SMTP

23. What is a subnet mask used for?
A) To identify the network portion of an IP address
B) To encrypt data
C) To block unauthorized access
D) To convert domain names to IP addresses
Answer: A) To identify the network portion of an IP address

24. What type of attack involves overwhelming a server with traffic?
A) Phishing
B) Denial of Service (DoS)
C) SQL Injection
D) Man-in-the-Middle
Answer: B) Denial of Service (DoS)

25. Which of the following is a disadvantage of cloud computing?
A) Accessibility
B) Cost
C) Data security concerns
D) Scalability
Answer: C) Data security concerns

26. In system analysis, what does the term ‘requirements gathering’ refer to?
A) Identifying user needs and expectations
B) Analyzing existing systems
C) Testing system functionality
D) Implementing system solutions
Answer: A) Identifying user needs and expectations

27. What does the term ‘algorithm’ mean in computer science?
A) A programming language
B) A step-by-step procedure for solving a problem
C) A type of database
D) A hardware component
Answer: B) A step-by-step procedure for solving a problem

28. Which of the following is NOT an example of a programming language?
A) Python
B) HTML
C) SQL
D) CSS
Answer: B) HTML

29. What is the primary purpose of data encryption?
A) To increase data storage capacity
B) To improve data retrieval speed
C) To protect data from unauthorized access
D) To simplify data formatting
Answer: C) To protect data from unauthorized access

30. Which of the following is a feature of a relational database?
A) Hierarchical structure
B) Flat file structure
C) Tables with relationships
D) Unstructured data storage
Answer: C) Tables with relationships

31. Which command is used to update existing data in a database?
A) INSERT
B) SELECT
C) UPDATE
D) DELETE
Answer: C) UPDATE

32. In networking, what does DHCP stand for?
A) Dynamic Host Configuration Protocol
B) Data Host Control Protocol
C) Domain Host Configuration Protocol
D) Dynamic Hardware Control Protocol
Answer: A) Dynamic Host Configuration Protocol

33. Which of the following topologies connects all devices to a central hub?
A) Star topology
B) Ring topology
C) Bus topology
D) Mesh topology
Answer: A) Star topology

34. What is the purpose of an operating system?
A) To manage hardware and software resources
B) To write code
C) To design databases
D) To create graphics
Answer: A) To manage hardware and software resources

35. What does GIS stand for?
A) Geographic Information Systems
B) Global Information Systems
C) Generalized Information Systems
D) Graphical Information Systems
Answer: A) Geographic Information Systems

36. Which of the following is a commonly used markup language?
A) HTML
B) Java
C) C++
D) PHP
Answer: A) HTML

37. What is the function of an API (Application Programming Interface)?
A) To provide a user interface
B) To allow different software programs to communicate
C) To manage database connections
D) To perform network routing
Answer: B) To allow different software programs to communicate

38. What is the output of the expression 3 + 5 * 2?
A) 10
B) 16
C) 13
D) 8
Answer: C) 13

39. Which of the following is a characteristic of cloud computing?
A) Local storage
B) On-demand self-service
C) Limited access
D) High maintenance costs
Answer: B) On-demand self-service

40. What does HTML stand for?
A) Hypertext Markup Language
B) Hyperlink and Text Markup Language
C) High-Level Markup Language
D) Hypertext Multi-language
Answer: A) Hypertext Markup Language

41. Which of the following is an example of a version control system?
A) Git
B) FTP
C) HTTP
D) SMTP
Answer: A) Git

42. In a network, what does NAT stand for?
A) Network Address Translation
B) Network Access Technology
C) Network Authentication Technique
D) Network Allocation Table
Answer: A) Network Address Translation

43. Which protocol is used to securely transmit data over a network?
A) HTTP
B) FTP
C) HTTPS
D) SMTP
Answer: C) HTTPS

44. What is the main advantage of using indexes in databases?
A) To reduce data redundancy
B) To speed up data retrieval
C) To simplify queries
D) To enforce data integrity
Answer: B) To speed up data retrieval

45. Which type of software is used to manage network resources?
A) Application software
B) System software
C) Database software
D) Middleware
Answer: B) System software

46. In project management, what does ‘scope creep’ refer to?
A) The project’s initial goals
B) The expansion of project scope without proper control
C) The risk assessment process
D) The timeline of project phases
Answer: B) The expansion of project scope without proper control

47. Which of the following is a method for backing up data?
A) Cloud backup
B) USB storage
C) Tape backup
D) All of the above
Answer: D) All of the above

48. What does the acronym ‘ITIL’ stand for?
A) Information Technology Infrastructure Library
B) Internet Technology Information Library
C) Integrated Technology Information Language
D) Information Technology Implementation Language
Answer: A) Information Technology Infrastructure Library

49. In programming, what does ‘syntax’ refer to?
A) The meaning of code
B) The rules for writing code
C) The performance of code
D) The efficiency of algorithms
Answer: B) The rules for writing code

50. Which of the following is a widely used version of SQL?
A) SQL Server
B) PL/SQL
C) T-SQL
D) All of the above
Answer: D) All of the above

51. What does ‘IoT’ stand for?
A) Internet of Technology
B) Internet of Things
C) Internet of Transactions
D) Internet of Time
Answer: B) Internet of Things

52. Which of the following programming languages is primarily used for data science?
A) Java
B) Python
C) C#
D) PHP
Answer: B) Python

53. What is the role of a database administrator (DBA)?
A) To write code
B) To manage and maintain databases
C) To design user interfaces
D) To perform network administration
Answer: B) To manage and maintain databases

54. In networking, what does the acronym ‘SSL’ stand for?
A) Secure Sockets Layer
B) Standard Security Layer
C) System Security Link
D) Secure System Layer
Answer: A) Secure Sockets Layer

55. Which of the following is a data visualization tool?
A) Tableau
B) MySQL
C) Python
D) Java
Answer: A) Tableau

56. What does ‘virtualization’ refer to in computing?
A) Creating virtual machines to run multiple operating systems
B) The process of encrypting data
C) A type of network protocol
D) A method of data backup
Answer: A) Creating virtual machines to run multiple operating systems

57. Which type of data structure is a tree?
A) Linear
B) Hierarchical
C) Non-linear
D) Both B and C
Answer: D) Both B and C

58. What is a primary function of IT operations?
A) Software development
B) Network maintenance
C) User support
D) All of the above
Answer: D) All of the above

59. Which of the following is a type of malware?
A) Antivirus
B) Worm
C) Firewall
D) None of the above
Answer: B) Worm

60. What is the purpose of a data warehouse?
A) To store operational data
B) To store historical data for analysis
C) To manage real-time transactions
D) To host applications
Answer: B) To store historical data for analysis

61. In which type of testing do you assess a system as a whole?
A) Unit testing
B) Integration testing
C) System testing
D) User acceptance testing
Answer: C) System testing

62. What is the primary purpose of a content management system (CMS)?
A) To manage hardware resources
B) To manage website content
C) To analyze data
D) To perform backups
Answer: B) To manage website content

63. Which of the following best describes ‘agile methodology’?
A) A linear project management approach
B) An iterative and incremental approach
C) A fixed-scope project management approach
D) A traditional project management approach
Answer: B) An iterative and incremental approach

64. What is the purpose of the TCP/IP model?
A) To manage database connections
B) To define networking protocols
C) To create user interfaces
D) To perform data analysis
Answer: B) To define networking protocols

65. Which of the following is a cloud service model?
A) IaaS
B) PaaS
C) SaaS
D) All of the above
Answer: D) All of the above

66. What is the main advantage of using a framework in programming?
A) It restricts functionality
B) It provides structure and reusable components
C) It requires more code
D) It eliminates the need for testing
Answer: B) It provides structure and reusable components

67. In database terminology, what does ‘foreign key’ refer to?
A) A unique identifier for a record
B) A reference to a primary key in another table
C) A key used for data encryption
D) A type of index
Answer: B) A reference to a primary key in another table

68. Which of the following is a characteristic of a good user interface (UI)?
A) Complex and detailed
B) Intuitive and user-friendly
C) Overloaded with options
D) Requires extensive training
Answer: B) Intuitive and user-friendly

69. In GIS, what is a ‘shapefile’?
A) A type of database
B) A format for storing geospatial data
C) A method for data encryption
D) A type of software
Answer: B) A format for storing geospatial data

70. What does ‘Big Data’ refer to?
A) Small datasets
B) Data sets that are too large or complex for traditional data-processing software
C) A new programming language
D) A type of cloud storage
Answer: B) Data sets that are too large or complex for traditional data-processing software

71. Which of the following is used for network security?
A) VPN
B) Firewall
C) Antivirus
D) All of the above
Answer: D) All of the above

72. What is the purpose of an audit trail in database management?
A) To store backup copies
B) To track changes and access to data
C) To encrypt sensitive data
D) To improve data retrieval speed
Answer: B) To track changes and access to data

73. In programming, what is ‘inheritance’?
A) A method to write secure code
B) A feature that allows a new class to inherit properties and methods from an existing class
C) A type of data structure
D) A technique for data storage
Answer: B) A feature that allows a new class to inherit properties and methods from an existing class

74. What does the acronym ‘DBMS’ stand for?
A) Data Backup Management System
B) Database Management System
C) Data Base Maintenance System
D) Data Block Management System
Answer: B) Database Management System

75. Which of the following is an example of an open-source operating system?
A) Windows
B) macOS
C) Linux
D) iOS
Answer: C) Linux

76. What is the role of an IT manager?
A) To develop software
B) To oversee IT projects and teams
C) To write documentation
D) To manage hardware purchases
Answer: B) To oversee IT projects and teams

77. What is the purpose of a web server?
A) To store applications
B) To host websites and serve web pages
C) To manage databases
D) To perform network analysis
Answer: B) To host websites and serve web pages

78. Which of the following is an essential component of a network?
A) Switch
B) Router
C) Hub
D) All of the above
Answer: D) All of the above

79. What is the main purpose of system analysis?
A) To improve software performance
B) To understand and specify user requirements
C) To design user interfaces
D) To develop algorithms
Answer: B) To understand and specify user requirements

80. Which programming paradigm is based on the concept of objects?
A) Procedural programming
B) Object-oriented programming
C) Functional programming
D) Logic programming
Answer: B) Object-oriented programming

81. What is the capital of Pakistan?
A) Lahore
B) Karachi
C) Islamabad
D) Peshawar
Answer: C) Islamabad

82. Which language is recognized as the national language of Pakistan?
A) English
B) Urdu
C) Punjabi
D) Sindhi
Answer: B) Urdu

83. Who was the founder of Pakistan?
A) Allama Iqbal
B) Liaquat Ali Khan
C) Muhammad Ali Jinnah
D) Zulfikar Ali Bhutto
Answer: C) Muhammad Ali Jinnah

84. Which river is the longest river in Pakistan?
A) Ravi
B) Chenab
C) Indus
D) Jhelum
Answer: C) Indus

85. In which year did Pakistan become a republic?
A) 1956
B) 1947
C) 1962
D) 1973
Answer: A) 1956

86. What is the main source of revenue for the government of Pakistan?
A) Agriculture
B) Industry
C) Services
D) Tourism
Answer: A) Agriculture

87. Which of the following is the highest peak in Pakistan?
A) K2
B) Nanga Parbat
C) Gasherbrum
D) Broad Peak
Answer: A) K2

88. What is the national animal of Pakistan?
A) Markhor
B) Lion
C) Tiger
D) Eagle
Answer: A) Markhor

89. Which city is known as the City of Lights in Pakistan?
A) Islamabad
B) Karachi
C) Lahore
D) Peshawar
Answer: B) Karachi

90. What is the currency of Pakistan?
A) Dollar
B) Rupee
C) Euro
D) Taka
Answer: B) Rupee

91. Who is known as the “Quaid-e-Azam” of Pakistan?
A) Liaquat Ali Khan
B) Allama Iqbal
C) Muhammad Ali Jinnah
D) Benazir Bhutto
Answer: C) Muhammad Ali Jinnah

92. Which day is celebrated as Pakistan Day?
A) March 23
B) August 14
C) December 16
D) November 5
Answer: A) March 23

93. What is the population of Pakistan approximately as of 2023?
A) 200 million
B) 250 million
C) 300 million
D) 150 million
Answer: B) 250 million

94. What is the boiling point of water in Celsius?
A) 50°C
B) 100°C
C) 150°C
D) 200°C
Answer: B) 100°C

95. Which gas is known as the “laughing gas”?
A) Nitrous oxide
B) Carbon dioxide
C) Oxygen
D) Hydrogen
Answer: A) Nitrous oxide

96. What is the chemical formula for water?
A) CO2
B) H2O
C) O2
D) H2
Answer: B) H2O

97. What is the capital city of the United States?
A) New York
B) Washington, D.C.
C) Los Angeles
D) Chicago
Answer: B) Washington, D.C.

98. What is the sum of angles in a triangle?
A) 90 degrees
B) 180 degrees
C) 360 degrees
D) 270 degrees
Answer: B) 180 degrees

99. Which continent is known as the “Dark Continent”?
A) Asia
B) Africa
C) South America
D) Australia
Answer: B) Africa

100. Which organ is responsible for pumping blood in the human body?
A) Lungs
B) Liver
C) Heart
D) Kidney
Answer: C) Heart