Solved SLC Computer Science 2071
SLC 2071
1. Answer the following questions:
a. Give two-two difference between peer-to-peer and client/server network architecture.
Ans: The difference between peer-to-peer and client/server network architecture are as follows:
Peer-to-peer network
|
Client/server network
|
· A group of computers that acts both as client and server in order to share hardware, software and other resources on the network is known as peer-to-peer network.
|
·The network architecture which consist of at least one server and one or more client are known as client/server network.
|
· Resource sharing, processing and communication control are centralized upon the server.
|
· Resource sharing, processing and communication control are completely decentralized.
|
b. What is the function of file transfer protocol (FTP)?
Ans: The functions of FTP are:
· Enables to transfer files between two or more than two computers.
· Makes communication possible between computers on the internet.
c. What is cybercrime? Give any two examples.
Ans: Cybercrime refers to any illegal act involved in computer, computer system or over all computer networks like internet.
Any two examples of cybercrime are:
· Cyber stalking
· Phishing
d. Write any four preventive measures for computer hardware security.
Ans: Any four preventive measures for computer hardware security are:
· Regular maintenance
· Insurance policy
· Power protection device
· Protection from theft
e. Write any two medium for transmission of computer virus.
Ans: Any two medium for transmission of computer virus are:
· Sharing infected internal portable disk like floppy disk, pen drive, CDs, etc.
· Exchanging data and information over a network.
2. a. Convert as indicated:
i. (108)10 into binary
ii. (765)8 into decimal
b. Perform the following binary calculations:
i. 111*11
Ans:
3. Match the following:
a. E-commerce Power protection device
b. Volt guard Online shopping
c. Satellite link WAN
d. Sound card Optical fiber
Multimedia
Ans:
a. E-commerce à Online shopping
b. Volt guard à Power protection device
c. Satellite link à WAN
d. Sound card à Multimedia
4. Choose the best answer:
a. Which of the following is remote login service?
i. Video conferencing ii. FTP iii. Telnet iv. TCP/IP
Ans: Telnet
b. Process of arranging the scattered parts of file into a contiguous manner is _______.
i. debugging ii. Backup iii.Defragmentation iv. Scandisk
Ans: Defragmentation
c. Which of the following is an audio input device?
i. Printer ii. Microphone iii. Head phone iv. Speaker
Ans: Microphone
d. Virus is a type of ___________.
i. System program ii.Package program iii.Destructive program iv. Web program
Ans: destructive program
5. Technical terms:
a. The data carrying capacity of communication channel.
Ans: Bandwidth
b. The moral principles that control cybercrime.
Ans: Computer ethics
c. Buying and selling product and services online.
Ans: E-commerce
d. An integration of text, audio, graphics and video.
Ans: Multimedia
6. Write down the full forms:
a. LAN : Local Area Network
b. VOIP : Voice Over Internet Protocol
c. Gbps : Giga bits per second
d. DVD : Digital Versatile Disk
7. Answer the following question:
a. Write any two advantages of computerized database.
Ans: The two advantages of computerized database are:
· It can store large volume of data for longer period of time.
· Searching of data is easier as it stores data in ascending or descending order.
b. Name any four objects of MS-Access database.
Ans: The four object of MS-Access are:
· Table
· Form
· Query
· Report
c. What is data sorting?
Ans: Data sorting refers to grouping all the records either in ascending or descending order based on a key field of a record.
8. State whether the following are true or false:
a. Graphics can also be stored in MS-Access database. True
b. Maximum field size of memo field is 256 characters. False
c. A form is an object of MS-Access used for entering data. True
d. An action query makes changes in a table. True
9. Match the following:
a. Indexing data Final output
b. Report View data
c. Yes/No Searching fast
d. Select query Picture
Data type
Ans:
a. Indexing data à Searching fast
b. Report à Final output
c. Yes/No à Data type
d. Select query à View data
10. Answer the following:
a. Mention the types of procedures used in QBasic.
Ans: The types of procedure used in QBasic are:
· Sub procedure
· Function procedure
b. Write two characteristics of C language.
Ans: The two characteristics of C language are:
· It has got rich and powerful set of operators.
· It is used to prepare system software.
c. Write down the function of:
i. SHARED
Ans: The function of SHARED is to declare a variable globally.
ii. CALL
Ans: The function of CALL statement is to call sub procedure for performing specific task.
11. Re-write the following correcting the bugs:
DECLARE SUB CUBE(N)
CLS
FOR I = 1 TO 5
READ
CALL CUBE(No)
NEXT X
DATA 3, 5, 2, 6, 4
END
SUB CUBE( )
DISPLAY N^3
END SUB
Ans:
DECLARE SUB CUBE(N)
CLS
FOR I = 1 TO 5
READ No
CALL CUBE(No)
NEXT I
DATA 3, 5, 2, 6, 4
END
SUB CUBE(N)
PRINT N^3
END SUB
12. Write down the output:
DECLARE FUNCTION AVGE(A,B,C)
X=10
Y=5
Z=15
AV= AVGE(X,Y,Z)
RPINT “Average of three numbers”; AV
END
FUNCTION AVGE(A, B, C)
S=A+B+C
AVGE = S/3
END FUNCTION
Ans:
The output will be:
Average of three numbers 10
13. Study the following program and answer the following:
DECLARE SUB Stde(N$U)
FOR Loop = 1 TO 5
READ NM$(Loop)
NEXT Loop
DATA RAMA, PRATIMA, PRASANT
DATA NISHA, RUDHRA
CALL Stde(NM$U)
END
SUB Stde(N$U)
PRINT “Name starting from P”
FOR J = 1 TO 5
C$=MID$(N$,(J),1,1)
IF C$=”P” THEN
PRINT N$(J)
END IF
NEXT J
END SUB
a. List the library function used in the above program.
Ans: The library function used in the above program is MID$.
b. List the conditional statement used in the above program.
Ans: The conditional statement used in the above program is:
IF C$=”P” THEN
14. a. Write a program using FUNCTION….END FUNCTION to input a string and count the total number of consonants.
Ans: DECLARE FUNCTION COUNT(N$)
CLS
INPUT "Enter a string"; N$
PRINT "The total numebr of consonant is"; COUNT(N$)
END
FUNCTION COUNT (N$)
C = 0
FOR I = 1 TO LEN(N$)
B$ = MID$(N$, I, 1)
C$ = UCASE$(B$)
IF C$ <> "A" AND C$ <> "E" AND C$ <> "I" AND C$ <> "O" AND C$ <> "U" THEN C = C + 1
NEXT I
COUNT = C
END FUNCTION
b. Write a program using SUB……END SUB to find the area of circle.
Ans: DECLARE SUB AREA(R)
CLS
INPUT “Enter radius”; R
CONST PI=3.14
CALL AREA(R)
END
SUB AREA(A)
A=PI*R^2
PRINT “The area of circle=”; A
END SUB
c. A data file “Salary.Dat” contains the information of employee regarding their name, post and salary. Write a program to display all the information of employee whose salary is greater than 15000 and less than 40000.
Ans: OPEN “Salary.Dat” FOR INPUT AS #1
CLS
WHILE NOT EOF(1)
INPUT #1, N$, P$, S
IF S>15000 AND S<40000 THEN PRINT N$, P$, S
WEND
CLOSE #1
END
No comments:
Post a Comment