NSCT PAST PAPERS AND SYLLABUS
فری تیاری کیلے وٹس ایپ
گروپ جوائن کریں
Click here
چار آپشن میں سے کسی ایک پر کلک کرنے سے جواب سرخ ہو جائے گا۔
- Image classification
- Object detection
- Image filtering
- Edge enhancement
اس سوال کو وضاحت کے ساتھ پڑھیں
Explanation
Image classification assigns each pixel or region in an image to a specific category.
In satellite imagery, categories could include roads, mountains, and houses.
Object detection identifies objects and their locations but may not label all pixels.
Image filtering and edge enhancement improve image quality but don’t classify content.
- Higher true positives
- Lower true positives
- Higher false positives
- No effect on model performance
اس سوال کو وضاحت کے ساتھ پڑھیں
Explanation
False negatives (FN) occur when the model misses positive cases.
Reducing FN usually means the model is more likely to predict positive.
This increases true positives (TP) but also can increase false positives (FP).
- To write code faster
- To provide guidance for users and developers
- To compile the program
- To secure software
اس سوال کو وضاحت کے ساتھ پڑھیں
Explanation
Software documentation explains how a program works and how to use it.
It helps developers understand the code for maintenance or updates.
It guides end-users on using software features effectively.
- Agile
- Waterfall
- Spiral
- Incremental
اس سوال کو وضاحت کے ساتھ پڑھیں
Explanation
- The Waterfall model is a sequential SDLC approach.
- Each phase (requirements, design, implementation, testing, deployment) is completed before the next begins.
- It works best when requirements are clear and unlikely to change.
- Agile and Incremental models are better for changing or evolving requirements.
- Spiral focuses on risk management and iterative development.
- RSA
- AES
- SHA-256
- Diffie-Hellman
اس سوال کو وضاحت کے ساتھ پڑھیں
Explanation
- AES (Advanced Encryption Standard) is a symmetric encryption algorithm.
- Symmetric encryption uses the same key for encryption and decryption.
- RSA and Diffie-Hellman are asymmetric algorithms using public/private keys.
- SHA-256 is a hash function, not an encryption algorithm.
- Confidentiality
- Integrity
- Availability
- Authentication
اس سوال کو وضاحت کے ساتھ پڑھیں
Explanation
Integrity ensures that data is accurate and unaltered.
It protects against unauthorized modifications or tampering.
- Undefined
- Empty string ("")
- []
- 0
اس سوال کو وضاحت کے ساتھ پڑھیں
Explanation
In JavaScript, the + operator performs string concatenation if any operand is a string.
[] (an empty array) is converted to an empty string when used with +.
So [] + [] becomes "" + "" → "" (empty string).
This is due to type coercion in JavaScript.
The result is not undefined, [], or 0—it’s an empty string.
- 'hello'
- Undefined
- ['h', 'e', 'l', 'l', 'o']
- 'lo'
اس سوال کو وضاحت کے ساتھ پڑھیں
Explanation
The spread operator ... in JavaScript expands iterable objects like strings or arrays.
"hello" is a string, which is iterable.
[..."hello"] spreads each character into a new array.
Resulting array: ['h', 'e', 'l', 'l', 'o'].
It is not a single string or 'lo', and definitely not undefined.
- Program runs successfully
- Compile-time syntax error
- Undefined reference (linker error)
- Infinite loop
اس سوال کو وضاحت کے ساتھ پڑھیں
Explanation
The extern keyword declares a function without providing its definition.
display() is called in main, but the compiler cannot find its actual implementation.
Compilation passes the syntax check, but linking fails.
The linker reports an undefined reference error.
- Default values are not allowed in functions
- Default parameters must be declared from right to left
- Parameters must be initialized to zero
- Function syntax is invalid
اس سوال کو وضاحت کے ساتھ پڑھیں
Explanation
In C++, default arguments must be assigned from right to left.
If a parameter has a default value, all parameters to its right must also have defaults.
The rule ensures unambiguous function calls.