Tuesday 7 April 2020

SEE Computer Science Solution

COMPUTER SCIENCE

Computer Science - SEE Model Question (Set-I)

Time: 1:30 hours                                                                             F.M.: 75

Group A

1.       Answer the following questions:                                                                     [5x2=10]

  1. What is a data transmission mode? Differentiate between peer to peer and client server network architecture.

Ans:- A data transmission mode defines how the data travels from sender to receiver. The different between peer to peer and client server network architecture are:-

                                         Peer to Peer

Client/Server

All the computers on the network are capable of communicating independently with any other computer on the network without using a server.

The server is a computer that manages shared resources: hardware as well as software data.

Any computer on the network can access data and program stored on any other computer

The network has a number of microcomputer, called client, the request the server for services.

 

  1. What are search engines? List any two services provided by the Internet. 

Search engines are the tools which can be used to search a content or an object or web sites on www or a particular content within a particular website. Google, Yahoo, MSN etc are example of search engine.  Two internet services providers are:-

·         Mercantile Communication

·         World link communication Pvt Ltd.

(Others are:- Infocom Pvt Ltd, Vianet Communication, Subisu Cable Network, Boradlink Network and Communication Pvt Ltd etc)

  1. What is a computer Crime? List any two disadvantages of multimedia.

Ans:- Computer crime refer to any crime such as tampering, physical danger and unwanted disclosure of data that involves a computer and a computer networks. Two disadvantage of multimedia are:-

·         Use multimedia technology for the wrong purpose.

·         Requires expensive cost for hardware and software.

  1. Define Software Piracy. List out any hardware security measures.

Privacy software is software built to protect the privacy of its users. The software typically works in conjunction with Internet usage to control or limit the amount of information made available to third parties. There are various ways by which we can protect hardware,

·         Regular maintenance

·         Dust free environment

·         Air condition system

·         Protection from fire

·         Use of power protection devices etc.

  1. Define boot sector virus. Mention any two precaution methods to avoid virus infection.

Boot sector viruses infect diskettes and hard disks and become active when an infected disk is used to start the computer.

Two precaution method are:-

·         Keep your anti-virus software up to date.

·         Run regularly scheduled scans with your antivirus software


3.       Match the following pairs:                                                                              [4x0.5=2]

Group A                                       Group B

a.        RJ-45                                     (b) Work station

b.       Node                                      (c) Protocol

c.        HTTP                                     ( ) Coaxial cable

d.       Server                                     (a) Connector

(d) Host computer

4.       Select the correct answer:                                                                               [4x0.5=2]

  1. Online medium of communication is ………..

(i) Chatting           (ii) email              (iii) e-fax               (iv) all of the above

  1. Which of the following terms defines a meaningful speech in any language?

(i) Video                (ii) sound               (iii) text                                 (iv) animation

  1. The activity of breaking into a computer system to gain an unauthorized access is………

(i) Password                                         (ii) hacking         

(iii) Ethics                                            (iv) None of the above

  1. Any electrical or electronic device that maintains the voltage of a power source within acceptable limits.

(i) Voltage stabilizer           (ii) Surge suppressor

(iii) UPS                                (iv) Voltage regulator

5.       Give appropriate technical terms of the following:                                 [4x0.5=2]

  1. A network computer that shares resources with and responds to requests from other network computer, including other servers.

Ans:- Server

  1. A device that connects two computer network that use different protocols.

Ans:- HUB

  1. A set of rules and procedures that govern transmission of messages.

Ans:- Protocol

  1. The physical layout of local area network.

Ans:- LAN TOPOLOGY

6.       Write full forms:                                                                                                [4x0.5=2]

a) Modem           (b) GPL                (c) DNS                    (d) IRC  

Ans:-

MODEM             :-                           Modulator/Demodulator

GPL                      :-                           General Public License

DNS                      :-                           Domain Name System

IRC                      :-                           Internet Relay Chat

Group  'B'

Database [10 marks]

7.       Answer the following questions.                                                                       [3x2=6]

  1. What is data redundancy? List any two uses of form.

Ans:- Data redundancy is defined as the storing of the same data in multiple locations.

Two uses of form are:-

1.       Data entry forms to database table

2.       Forms can retrieve data from one or more tables, and display the output on the screen.

  1.  Mention any four data types that can be used in MS-access.

Four data types are:-


1.       Text

2.       Numbers

3.       Date/Time

4.       Currency


 

  1. What is a validation rule and referential integrity?

Ans:- Validation rules specific requirement for the data entered in the worksheet. A customized message can be display to the user when data that violates the rule setting is entered.

Referential integrity:- Referential integrity check, both applicable to database tables or individual columns, file metadata or any relevant metadata item.

8.       State whether the following statements are TRUE or FALSE.                         [2]

  1. Graphics can also be stored in ms-access database. True
  2. A form is object of ms-access used entering data. False
  3. Validation rule is used to set data entry criteria. True
  4. The data filter selects the required records and displays the result. True

9.       Match the following pairs:                                                                              [4x0.5=2]

Group A                                                               Group B

a.        Primary key                                          () single entry

b.       Records                                                 (d) reference key

c.        Report                                                    (a) unique and not null

d.       Foreign key                                          (b) a complete information

(c) Final output

                                                                               

Group 'C'

Programming [18 marks]

10.    Answer the following questions in short.                                                      [3X1=3]

  1. What is global variable?

Ans:- Any variable which is declare before main function is called global variable. The fact that a global variable can be used in any part of the program means that is can be corrupted in any part of the program.

  1. Write any two features of c language.

Ans: - The features of c programming language are:-

1.       It is a strong structural language having powerful data definition methods.

2.       It has small size.

  1. What is user-defined function?

Ans: - User defined function is not always available to all the program. User define function have to be created before they are used in the program.

11.    Write the output of the given program:                                                                   [2]

DECLARE SUB result()

CALL result

END

SUB result ()

Input(n)

Count c<=5

Print n

Process (n=n*10+5)

Count Process(c=c+1)

5

1

5

5*10+5=55

C=1+1=2

 

2

55

55*10+5=555

C=2+1

 

3

555

555*10+5=5555

C=3+1

 

4

5555

5555*10+5

C=4+1

 

5

55555

55555*10+5

C=5+1

 

6 , condition is false

Program end

 

 

N=5

C=1

WHILE C<=5

PRINT N

N=N*10+5

C=C+1

WEND

END SUB

Ans:-

Output in this program :-

 

5

55

555

5555

55555

 

 

12.    Re-write the given program after correcting the bugs:                                       [2]

REM to find square root of the first five natural numbers

CLS

DECLARE FUNCTION SQROOT(D)

FOR K=1 TO 5

A= SQROOT(K)

PRINT “SQUARE ROOT”;K;”=”;K

NEXT LOOP

END

FUNCTION SQROOT(D)

SQROOT=SQR(K)

END

Ans: -

REM To find square root of the first five natural numbers.

DECLARE FUNCTION sqroot(d)

CLS

FOR k= 1 to 5

A= sqroot(k)

PRINT “Square Root”;k”=”;a

NEXT

END

FUNCTION sqroot (d)

Sqroot = sqr(d)

END FUNCTION

13.    Study the following program and answer the given questions:                                                                       [2x1=2]

OPEN “record.dat” for INPUT AS #1

WHILE NOT EOF(1)

  INPUT #1,N$,AD$,PH#

  PRINT N$,AD$,PH#

WEND

CLOSE #1

END

  1. What is the purpose of EOF(1) in the above program?

Ans: - this function use to test for end of file position in the data file.  It is very much useful while the numbers of record are unknown in the data file.

  1. What happens if we are not using open statement in the above program?

Ans:- If you not use the OPEN statement in this program then not to open in this file.

14. a. Write a program using SUB procedure to input any number and find whether an entered number is prime or composite.                                                                                                                                       (3)

              Ans:-

              QBASIC program

              DECALER SUB check(n)

              CLS

              INPUT “Enter any Number”;n

              CALL(n)

              END

               SUB check(n)

              C=0

              FOR i = 1 TO n

              IF n MOD i= 0 THEN c=c+1

              NEXT i

              IF c = 2 THEN

              PRINT “Number is prime”

              ELSE

              PRINT “ Number is COMPOSITE”

              END IF

              END SUB

b. Write a program using FUNCTION. END FUNCTION procedure to check whether an input word is palindrome or not.                                                                                                                                (3)

Ans:-

              QBASIC program

DECLARE FUNCTION pal$ (w$, n$)

CLS

INPUT “Enter word”;w$

IF w$=pal$(w$, n$) THEN

PRINT “Palindrome”

ELSE

PRINT “Not Palindrome”

END IF

END

FUNCTION pal$ (w$, n$)

FOR X= LEN(w$) TO 1 STEP-1

N$= n$ + MID$(w$, X, 1)

NEXT X

Pal$ = n$

END FUNCTION

 

 

c. Write a program in APPEND mode to add some more records in a data file “abc.dat” having following fields: patient’s name, age and address.                                                                                                                              (3)

Ans:-

              QBASIC program

OPEN "ABC.DAT" FOR APPEND AS #1
DO
CLS
INPUT "ENTER NAME";N$
INPUT "ENTER ADDRESS";A$
INPUT "ENTER AGE";A
WRITE #1, N$, A$, A
INPUT"DO YOU WANT TO CONTINUE?"; CH$
LOOP WHILE UCASE$ (CH$)="Y"
CLOSE #1
END


No comments:

Post a Comment

MCQ Question Bank Microsoft PowerPoint