NSCT PAST PAPERS AND SYLLABUS
فری تیاری کیلے وٹس ایپ
گروپ جوائن کریں
Click here
چار آپشن میں سے کسی ایک پر کلک کرنے سے جواب سرخ ہو جائے گا۔
اخلاقی ڈیٹا کے استعمال کی مثال کون سی ہے؟
- Sharing user data without consent
- Selling personal data
- Protecting user information
- Hacking accounts
اس سوال کو وضاحت کے ساتھ پڑھیں
Explanation
- Ethical data use means respecting users' privacy and keeping their information safe.
- Protecting user information prevents misuse, theft, or unauthorized access.
- It ensures that data is only used for its intended and approved purpose.
- Organizations build trust with users by handling data responsibly.
- It follows legal and moral guidelines related to data protection and security.
- Data is compressed
- Data is encrypted
- Data is from a valid source
- Data is deleted
اس سوال کو وضاحت کے ساتھ پڑھیں
Explanation
- Data authentication is the process of verifying the origin and integrity of data,
- Ensuring that it comes from a legitimate sender and has not been tampered with or altered during transmission.
- Data origin authentication proves that the stated sender is the source of the data.
- Data integrity ensures the data has not been modified.
- Data encryption (Option B) is a separate mechanism used for confidentiality, not for direct authentication.
بائنری سرچ کس پر کام کرتی ہے؟
- Unsorted data
- Sorted data
- Random data
- Linked list only
اس سوال کو وضاحت کے ساتھ پڑھیں
Explanation
- Binary search is faster than linear search except for small arrays.
- However, the array must be sorted first to apply binary search.
پروگرامنگ میں، بولین ویلیو فالس کو کس کے طور پر سمجھا جاتا ہے؟
- 1
- -1
- 0
- Undefined
اس سوال کو وضاحت کے ساتھ پڑھیں
Explanation
In most programming languages like C++, Java, and Python:
-
false is internally stored as 0
-
true is stored as 1
That’s why false behaves like 0 in mathematical operations.
- Public Information Index
- Personal Identifiable Information
- Private Internet Identity
- Protected Internal Information
اس سوال کو وضاحت کے ساتھ پڑھیں
Explanation
PII means any information that can identify a person
Examples include:
-
Name
-
CNIC / ID number
-
Phone number
-
Email address
کوڈنگ اور پروگرامنگ کے لیے عام طور پر کون سا آپریٹنگ سسٹم استعمال ہوتا ہے؟
- Windows
- Linux
- macOS
- All of the above
اس سوال کو وضاحت کے ساتھ پڑھیں
Explanation
Windows: Supports many programming languages and development tools (like Visual Studio, Python, Java, etc.).
Linux: Very popular among developers, especially for open-source, server-side, and system-level programming.
macOS: Preferred for iOS/macOS development (using Swift, Xcode), and also supports general-purpose programming.
ترجیحی قطار بنانے کے لئے مندرجہ ذیل میں سے کون سا ڈیٹا ڈھانچہ بہترین ہے؟
- Array
- Linked List
- Binary Heap
- None of these
اس سوال کو وضاحت کے ساتھ پڑھیں
Explanation
A priority queue processes elements based on priority, not arrival order.
A heap allows efficient insertion and removal of the highest (or lowest) priority element.
Min-Heap gives quick access to the smallest element, Max-Heap to the largest.
مشین لرننگ ماڈلز میں اوور فٹنگ کو روکنے کے لیے کون سا طریقہ استعمال کیا جاتا ہے؟
- Regularization
- Clustering
- Gradient Descent
- None of these
اس سوال کو وضاحت کے ساتھ پڑھیں
Explanation
Regularization adds a penalty to large model weights to prevent overfitting.
It helps the model generalize better on unseen data.
Common techniques include L1 (Lasso) and L2 (Ridge) regularization.