MOD UDC Past Paper 2022

Firewalls are used to protect against ___
  1. Fire attacks
  2. data driven stacks
  3. virus attacks
  4. unauthorized attacks
Where are data and programs stored when the processor uses them?
  1. Program memory
  2. disk memory
  3. secondary memory
  4. main memory
____ is called a C++ instruction that tells the computer to do something.
  1. Open sentence
  2. word
  3. information
  4. statement
____ provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously
  1. Multi computing
  2. multi-processing
  3. multi-threading
  4. multi-tasking
find the pair of words: TREE: LEAF
  1. pencil: pen
  2. student: teacher
  3. book: page
  4. reading: writing
to make one's mark means:
  1. To defame
  2. To gain distinction
  3. To recover dead debt
  4. To plunder
Yousaf ___ in the garden the whole day yesterday.
  1. has dug
  2. was digging
  3. dug
  4. had dug.
He is zealous —— the popularity of games:
  1. with
  2. for
  3. in
  4. after.
Which of the following quality of the SRS document ensures the comparison of the results of a phase with another phase?
  1. Concise
  2. traceable
  3. verifiable
  4. structured
Application software is designed to accomplish ____
  1. Operating system tasks
  2. gaming tasks
  3. computer-centric tasks
  4. real-world tasks

Leave a Comment

× PPSC FPSC NTS WhatsApp Group