Sunday 24 November 2013

Solved SLC Computer Science 2072


Solved SLC Computer Science 2072

2072(2016)
(Computer fundamentals)
1. Answer the following questions.


a) Define LAN topology. Draw star topology.
Ans: The arrangement or connection pattern of nodes or computers and other devices of the network is called LAN topology.




Star Topology


b) Give any two symptoms of virus attacks.
Ans: The symptoms of virus attacks are:
i) Program takes a long time to load.
ii) Corrupting the system’s data.


c) Write one advantage and one disadvantage of multimedia.
Ans: The advantage of multimedia is:
i) It makes teaching learning easier in the classroom.
The disadvantage of multimedia is:
i) Acquisition or rental of equipments to produce multimedia can be costly.


d) Write any two ways of protecting computer software.
Ans: The two ways of protecting computer software are:
i)Password
ii)Backup


e) Write any two services of internet.
Ans: The two services of internet are:
i)E-mail
ii)IRC


2. a)Convert as indicated:


i)(208)10 into Binary


Converting decimal to binary,



2
208



2
104
0

2
52
0

2
26
0

2
13
0

2
6
1

2
3
0



1
1



(208)10=(11010000)2


ii)(104)8 into decimal


Converting octal to decimal,
=1*82+0*81+4*80
=1*64+0*8+4*1
=64+0+4
=68


(104)8=(68)10


b) Perform the binary calculations:


i)1011+1101
1011
+ 1101
11000


1011+1101=11000


ii)110*11


110
*11
110

+ 110X
10010


110*11=10010


3. Match the following:
Answers:
a) Microwave : Unguided media
b) UTP : Guided media
c) UPS : Power protection device
d) SMTP : Protocol


4. State whether the following statements are true or false:
a) Walky-talky is an example of full duplex mode.
Ans: False
b) Data transfer rate is higher in optical fiber cable than in co-axial cable.
Ans: True
c) The computer security refers to hardware security only.
Ans: False
d) Sound Card is one of the components of multimedia.
Ans:True


5. Write the appropriate technical terms of the following:


a) A program that can disinfect a file from virus.
Ans: Antivirus software
b) A person who steals or destroys other’s data, information, files and program.
Ans: Hacker
c) A company which provides the internet facilities.
Ans: ISP
d) A computer which provides services to other computers in a network.
Ans: Server


6. Write the full forms of:
i)URL :Uniform Resource Locator
ii)HTTP :Hyper Text Transfer Protocol
iii)LAN :Local Area Network
iv)MODEM :Modulator-Demodulator


(Database)
7. Answer the following questions:
a) Write any four data types used in Ms-ACCESS.
Ans: Four data types used in Ms-ACCESS are:
i) Text
ii) Memo
iii) Currency
iv) OLE


b) Define database with example.
Ans: The collection of organized and related information that can be used for different purposes is called database. For example: dictionary and telephone directory.


c) What is query?
Ans: The object of MS-ACCESS that extracts and arranges information from a table is called query.


8. State whether the following statements are true or false:


a) A query is used to select fields and records from only one table.
Ans: False
b) MS-ACCESS is DBMS software.
Ans: True
c) Index decreases the speed of query and sort operations.
Ans: False
d) Data in primary key has to be unique and not null.
Ans: True


9. Match the following:
a) OLE : Data type
b) Validation Rule : Limits the value
c) Form : Data Entry
d) Indexing : Easy to search




( Programming)
10. a) What is procedure?
Ans: The separate block of statements used by the module level code and called by any number of times is called procedure.


b) Write any two data types used in ‘c’ language.
Ans: The two data types used in the ‘c” language are:
i) char
ii) int


c) Write down the functions of the following statements:


i) OPEN: It opens a sequential file for one of the three possible operations i.e. reading, writing or appending.


ii) MKDIR: It makes or creates a new directory on the specified disk.


11. Re-write the following program after correcting the bugs:


FUNCTION SUM(m,n)
Rem to print sum of two numbers
a=6
b=7
DISPLAY SUM(a,b)
END


FUNCTION SUM(m,n)
S=m+n
S=SUM
END SUM


Debugged program:
DECLARE FUNCTION SUM(m,n)
Rem to print sum of two numbers
a=6
b=7
PRINT SUM(a,b)
END


FUNCTION SUM(m,n)
S=m+n
SUM=S
END FUNCTION




12. Write the output of the following program:


DECLARE FUNCTION Interest(p,t,r)
CLS
LET p=100
LET t=2
LET r=5
LET d=Interest(p,t,r)
PRINT “The simple interest=”;d
END


FUNCTION Interest (p,t,r)
Interest=(p*t*r)/100
End FUNCTION


OUTPUT
The simple interest=10
(Error message will be displayed if the sub program is missing.)


13. Study the following program and answer the following questions:


DECLARE FUNCTION Prod(N)
INPUT “Any number”;N
X=Prod(N)
PRINT X
END


FUNCTION Prod(N)
F=1
FOR K=1 TO N
F=F*K
NEXT K
Prod=F
END FUNCTION


a) Write the name of the user defined function used in the above program.
Ans: The name of the user defined function used in the above program is Prod.


b) Name the loop in the above program.
Ans: The loop in the program is FOR…NEXT.


14. a) Write a program using SUB…..END SUB to display reverse of input-string.

DECLARE SUB REV(A$)
CLS
INPUT “ENTER ANY STRING”;A$
CALL REV(A$)
END


SUB REV(A$)
FOR I= LEN(A$) TO 1 STEP -1
B$=MID$(A$,I,1)
W$=W$+B$
NEXT I
PRINT “REVERSED STRING=”W$
END SUB


b) Write a program using FUNCTION…END FUNCTION to find area of the triangle.


DECLARE FUNCTION AREA(B,H)
CLS
INPUT “ENTER BASE”;B
INPUT “ENTER HEIGHT”;H
PRINT “AREA OF TRIANGLE”;AREA(B,H)
END


FUNCTION AREA(B,H)
AREA=(1/2)*B*H
END FUNCTION


c) A sequential data file called “Marks.dat” contains NAME, AGE, CITY, and TELEPHONE fields. Write a program to display all the contents of the data file.


OPEN “Marks.dat” FOR INPUT AS #1
CLS
WHILE NOT EOF(1)
INPUT #1, N$, A, C$, T#
PRINT N$, A, C$, T#
WEND
CLOSE #1
END

Solved SLC Computer Science 2071

Solved SLC Computer Science 2071


SLC 2071
1.      Answer the following questions:
a.       Give two-two difference between peer-to-peer and client/server network architecture.
Ans: The difference between peer-to-peer and client/server network architecture are as follows:
Peer-to-peer network
Client/server network
·      A group of computers that acts both as client and server in order to share hardware, software and other resources on the network is known as peer-to-peer network.
·The network architecture which consist of at least one server and one or more client are known as client/server network.
·      Resource sharing, processing and communication control are centralized upon the server.
·  Resource sharing, processing and communication control are completely decentralized.

b.      What is the function of file transfer protocol (FTP)?
Ans: The functions of FTP are:
·         Enables to transfer files between two or more than two computers.
·         Makes communication possible between computers on the internet.
c.       What is cybercrime? Give any two examples.
Ans: Cybercrime refers to any illegal act involved in computer, computer system or over all computer networks like internet.
Any two examples of cybercrime are:
·         Cyber stalking
·         Phishing
d.      Write any four preventive measures for computer hardware security.
Ans: Any four preventive measures for computer hardware security are:
·         Regular maintenance
·         Insurance policy
·         Power protection device
·         Protection from theft
e.       Write any two medium for transmission of computer virus.
Ans: Any two medium for transmission of computer virus are:
·         Sharing infected internal portable disk like floppy disk, pen drive, CDs, etc.
·         Exchanging data and information over a network.
2.      a. Convert as indicated:
i.      (108)10 into binary
Ans:



ii.    (765)8 into decimal
Ans:

b. Perform the following binary calculations:
                                i.       111*11
Ans



                              ii.       Divide 1101 by 11



Ans:
3.      Match the following:
a.       E-commerce                      Power protection device
b.      Volt guard                          Online shopping
c.       Satellite link                       WAN
d.      Sound card                                    Optical fiber
Multimedia
Ans:
a.       E-commerce    à        Online shopping
b.      Volt guard        à        Power protection device         
c.       Satellite link     à        WAN
d.      Sound card      à        Multimedia
4.      Choose the best answer:
a.       Which of the following is remote login service?
i. Video conferencing          ii. FTP              iii. Telnet         iv. TCP/IP
Ans: Telnet
b.      Process of arranging the scattered parts of file into a contiguous manner is _______.
i. debugging           ii. Backup        iii.Defragmentation      iv. Scandisk
Ans: Defragmentation
c.       Which of the following is an audio input device?
i. Printer     ii. Microphone             iii. Head phone                        iv. Speaker
Ans: Microphone
d.      Virus is a type of ___________.
i. System program  ii.Package program    iii.Destructive program   iv. Web program
Ans: destructive program
5.      Technical terms:
a.       The data carrying capacity of communication channel.
Ans: Bandwidth
b.      The moral principles that control cybercrime.
Ans: Computer ethics
c.       Buying and selling product and services online.
Ans: E-commerce
d.      An integration of text, audio, graphics and video.
Ans: Multimedia
6.      Write down the full forms:
a.       LAN : Local Area Network
b.      VOIP : Voice Over Internet Protocol
c.       Gbps : Giga bits per second
d.      DVD : Digital Versatile Disk
7.      Answer the following question:
a.       Write any two advantages of computerized database.
Ans: The two advantages of computerized database are:
·         It can store large volume of data for longer period of time.
·         Searching of data is easier as it stores data in ascending or descending order.
b.      Name any four objects of MS-Access database.
Ans: The four object of MS-Access are:
·         Table
·         Form
·         Query
·         Report
c.       What is data sorting?
Ans: Data sorting refers to grouping all the records either in ascending or descending order based on a key field of a record.
8.      State whether the following are true or false:
a.       Graphics can also be stored in MS-Access database.  True
b.      Maximum field size of memo field is 256 characters. False
c.       A form is an object of MS-Access used for entering data. True
d.      An action query makes changes in a table. True
9.      Match the following:
a.       Indexing data                     Final output
b.      Report                                View data
c.       Yes/No                              Searching fast
d.      Select query                       Picture
Data type
Ans:
a.       Indexing data   à        Searching fast
b.      Report              à        Final output
c.       Yes/No                        à        Data type
d.      Select query     à        View data
10.  Answer the following:
a.       Mention the types of procedures used in QBasic.
Ans: The types of procedure used in QBasic are:
·         Sub procedure
·         Function procedure
b.      Write two characteristics of C language.
Ans: The two characteristics of C language are:
·         It has got rich and powerful set of operators.
·         It is used to prepare system software.
c.       Write down the function of:
i.      SHARED
Ans: The function of SHARED is to declare a variable globally.
ii.    CALL
Ans: The function of CALL statement is to call sub procedure for performing specific task.
11.  Re-write the following correcting the bugs:
DECLARE SUB CUBE(N)
CLS
FOR I = 1 TO 5
READ
CALL CUBE(No)
NEXT X
DATA 3, 5, 2, 6, 4
END
SUB CUBE( )
DISPLAY N^3
END SUB
Ans:
DECLARE SUB CUBE(N)
CLS
FOR I = 1 TO 5
READ No
CALL CUBE(No)
NEXT I
DATA 3, 5, 2, 6, 4
END
SUB CUBE(N)
PRINT N^3
END SUB
12.  Write down the output:
DECLARE FUNCTION AVGE(A,B,C)
X=10
Y=5
Z=15
AV= AVGE(X,Y,Z)
RPINT “Average of three numbers”; AV
END
FUNCTION AVGE(A, B, C)
S=A+B+C
AVGE = S/3
END FUNCTION
Ans:
The output will be:
Average of three numbers 10

13.  Study the following program and answer the following:
DECLARE SUB Stde(N$U)
FOR Loop = 1 TO 5
READ NM$(Loop)
NEXT Loop
DATA RAMA, PRATIMA, PRASANT
DATA NISHA, RUDHRA
CALL Stde(NM$U)
END
SUB Stde(N$U)
PRINT “Name starting from P”
FOR J = 1 TO 5
C$=MID$(N$,(J),1,1)
IF C$=”P” THEN
PRINT N$(J)
END IF
NEXT J
END SUB
a.       List the library function used in the above program.
Ans: The library function used in the above program is MID$.
b.      List the conditional statement used in the above program.
Ans: The conditional statement used in the above program is:
IF C$=”P” THEN

14.  a. Write a program using FUNCTION….END FUNCTION to input a string and count the total number of consonants.
Ans: DECLARE FUNCTION COUNT(N$)
CLS
INPUT "Enter a string"; N$
PRINT "The total numebr of consonant is"; COUNT(N$)
END
FUNCTION COUNT (N$)
C = 0
FOR I = 1 TO LEN(N$)
    B$ = MID$(N$, I, 1)
    C$ = UCASE$(B$)
    IF C$ <> "A" AND C$ <> "E" AND C$ <> "I" AND C$ <> "O" AND C$ <> "U" THEN C = C + 1
NEXT I
COUNT = C
END FUNCTION
b. Write a program using SUB……END SUB to find the area of circle.
Ans: DECLARE SUB AREA(R)
CLS
INPUT “Enter radius”; R
CONST PI=3.14
CALL AREA(R)
END
SUB AREA(A)
A=PI*R^2
PRINT “The area of circle=”; A
END SUB
c. A data file “Salary.Dat” contains the information of employee regarding their name, post and salary. Write a program to display all the information of employee whose salary is greater than 15000 and less than 40000.
Ans: OPEN “Salary.Dat” FOR INPUT AS #1
CLS
WHILE NOT EOF(1)
INPUT #1, N$, P$, S
IF S>15000 AND S<40000 THEN PRINT N$, P$, S
WEND
CLOSE #1
END

MCQ Question Bank Microsoft PowerPoint