COMPUTER SCIENCE
Computer
Science - SEE Model Question (Set-I)
Time: 1:30 hours F.M.:
75
Group A
1. Answer the following questions: [5x2=10]
- What is a data transmission mode? Differentiate between
peer to peer and client server network architecture.
Ans:-
A data transmission mode defines how the data travels from sender to receiver.
The different between peer to peer and client server network architecture are:-
Peer to Peer |
Client/Server |
All the computers on the network are capable
of communicating independently with any other computer on the network without
using a server. |
The server is a computer that manages
shared resources: hardware as well as software data. |
Any computer on the network can access data
and program stored on any other computer |
The network has a number of microcomputer,
called client, the request the server for services. |
- What are search engines? List any two services provided
by the Internet.
Search
engines are the tools which can be used to search a content or an object or web
sites on www or a particular content within a particular website. Google,
Yahoo, MSN etc are example of search engine.
Two internet services providers are:-
·
Mercantile
Communication
·
World
link communication Pvt Ltd.
(Others are:- Infocom Pvt Ltd, Vianet
Communication, Subisu Cable Network, Boradlink Network and Communication Pvt
Ltd etc)
- What is a computer Crime? List any two disadvantages of
multimedia.
Ans:-
Computer crime refer to any crime such as tampering, physical danger and
unwanted disclosure of data that involves a computer and a computer networks.
Two disadvantage of multimedia are:-
·
Use multimedia technology
for the wrong purpose.
·
Requires expensive cost
for hardware and software.
- Define Software Piracy. List out any hardware security
measures.
Privacy software is software built to protect the privacy of its users. The software typically works in
conjunction with Internet usage to control or limit the amount of information
made available to third parties. There are various ways by which we can protect
hardware,
·
Regular maintenance
·
Dust free environment
·
Air condition system
·
Protection from fire
·
Use of power protection
devices etc.
- Define boot sector virus. Mention any two precaution
methods to avoid virus infection.
Boot
sector viruses infect diskettes and hard disks and become active when an
infected disk is used to start the computer.
Two
precaution method are:-
·
Keep
your anti-virus software up to date.
·
Run
regularly scheduled scans with your antivirus software
3. Match the following pairs: [4x0.5=2]
Group
A Group
B
a.
RJ-45 (b) Work
station
b. Node (c) Protocol
c.
HTTP ( ) Coaxial
cable
d. Server (a) Connector
(d)
Host computer
4. Select the correct answer: [4x0.5=2]
- Online medium of communication
is ………..
(i)
Chatting (ii) email (iii) e-fax (iv) all of the
above
- Which of the following terms
defines a meaningful speech in any language?
(i)
Video (ii) sound (iii) text (iv) animation
- The activity of breaking into a
computer system to gain an unauthorized access is………
(i)
Password (ii)
hacking
(iii)
Ethics (iv) None of the
above
- Any electrical or electronic
device that maintains the voltage of a power source within acceptable
limits.
(i)
Voltage stabilizer (ii) Surge suppressor
(iii)
UPS (iv)
Voltage regulator
5. Give appropriate technical terms of the following: [4x0.5=2]
- A network computer that shares resources
with and responds to requests from other network computer, including other
servers.
Ans:- Server
- A device that connects two
computer network that use different protocols.
Ans:- HUB
- A set of rules and procedures
that govern transmission of messages.
Ans:- Protocol
- The physical layout of local
area network.
Ans:- LAN TOPOLOGY
6. Write full forms: [4x0.5=2]
a) Modem (b)
GPL (c) DNS (d) IRC
Ans:-
MODEM :- Modulator/Demodulator
GPL :- General Public
License
DNS :- Domain Name System
IRC :- Internet Relay Chat
Group
'B'
Database
[10 marks]
7. Answer the following questions. [3x2=6]
- What is data redundancy? List
any two uses of form.
Ans:- Data redundancy
is defined as the storing of the same data in multiple locations.
Two
uses of form are:-
1. Data entry forms to
database table
2. Forms can retrieve data
from one or more tables, and display the output on the screen.
- Mention any four data types that can be
used in MS-access.
Four
data types are:-
1. Text
2. Numbers
3. Date/Time
4. Currency
- What is a validation rule and
referential integrity?
Ans:- Validation rules
specific requirement for the data entered in the worksheet. A customized
message can be display to the user when data that violates the rule setting is
entered.
Referential integrity:- Referential integrity
check, both applicable to database tables or individual columns, file metadata
or any relevant metadata item.
8. State whether the following statements are TRUE or
FALSE. [2]
- Graphics can also be stored in
ms-access database. True
- A form is object of ms-access
used entering data. False
- Validation rule is used to set
data entry criteria. True
- The data filter selects the
required records and displays the result. True
9. Match the following pairs: [4x0.5=2]
Group
A Group
B
a.
Primary
key ()
single entry
b. Records (d)
reference key
c.
Report (a)
unique and not null
d. Foreign key (b) a
complete information
(c)
Final output
Group 'C'
Programming [18 marks]
10. Answer the following questions in short. [3X1=3]
- What is global variable?
Ans:- Any variable which is
declare before main function is called global variable. The fact that a global
variable can be used in any part of the program means that is can be corrupted
in any part of the program.
- Write any two features of c
language.
Ans: - The features of c
programming language are:-
1. It is a strong structural
language having powerful data definition methods.
2. It has small size.
- What is user-defined function?
Ans: - User defined function is
not always available to all the program. User define function have to be
created before they are used in the program.
11. Write the output of the given program: [2]
DECLARE
SUB result()
CALL
result
END
SUB
result ()
Input(n) |
Count c<=5 |
Print n |
Process (n=n*10+5) |
Count Process(c=c+1) |
5 |
1 |
5 |
5*10+5=55 |
C=1+1=2 |
|
2 |
55 |
55*10+5=555 |
C=2+1 |
|
3 |
555 |
555*10+5=5555 |
C=3+1 |
|
4 |
5555 |
5555*10+5 |
C=4+1 |
|
5 |
55555 |
55555*10+5 |
C=5+1 |
|
6
, condition is false |
Program
end |
|
|
N=5
C=1
WHILE
C<=5
PRINT
N
N=N*10+5
C=C+1
WEND
END
SUB
Ans:-
Output
in this program :-
5
55
555
5555
55555
12. Re-write the given program after correcting the
bugs: [2]
REM to find square root of the first five natural numbers
CLS
DECLARE FUNCTION SQROOT(D)
FOR
K=1 TO 5
A=
SQROOT(K)
PRINT
“SQUARE ROOT”;K;”=”;K
NEXT
LOOP
END
FUNCTION
SQROOT(D)
SQROOT=SQR(K)
END
Ans: -
REM
To find square root of the first five natural numbers.
DECLARE
FUNCTION sqroot(d)
CLS
FOR
k= 1 to 5
A=
sqroot(k)
PRINT
“Square Root”;k”=”;a
NEXT
END
FUNCTION
sqroot (d)
Sqroot
= sqr(d)
END
FUNCTION
13.
Study the following program and answer the given
questions: [2x1=2]
OPEN
“record.dat” for INPUT AS #1
WHILE
NOT EOF(1)
INPUT #1,N$,AD$,PH#
PRINT N$,AD$,PH#
WEND
CLOSE
#1
END
- What is the purpose of EOF(1)
in the above program?
Ans: - this function use to test
for end of file position in the data file.
It is very much useful while the numbers of record are unknown in the
data file.
- What
happens if we are not using open statement in the above program?
Ans:- If you not use the OPEN
statement in this program then not to open in this file.
14.
a. Write a
program using SUB procedure to input any number and find whether an entered
number is prime or composite. (3)
Ans:-
QBASIC program
DECALER SUB check(n)
CLS
INPUT “Enter any Number”;n
CALL(n)
END
SUB check(n)
C=0
FOR i = 1 TO n
IF n MOD i= 0 THEN c=c+1
NEXT i
IF c = 2 THEN
PRINT “Number is prime”
ELSE
PRINT “ Number is COMPOSITE”
END IF
END SUB
b. Write a program
using FUNCTION. END FUNCTION procedure to check whether an input word is
palindrome or not. (3)
Ans:-
QBASIC program
DECLARE FUNCTION pal$ (w$, n$)
CLS
INPUT “Enter word”;w$
IF w$=pal$(w$, n$) THEN
PRINT “Palindrome”
ELSE
PRINT “Not Palindrome”
END IF
END
FUNCTION pal$ (w$, n$)
FOR X= LEN(w$) TO 1 STEP-1
N$= n$ + MID$(w$, X, 1)
NEXT X
Pal$ = n$
END FUNCTION
c. Write a program in
APPEND mode to add some more records in a data file “abc.dat” having following
fields: patient’s name, age and address. (3)
Ans:-
QBASIC program
OPEN
"ABC.DAT" FOR APPEND AS #1
DO
CLS
INPUT "ENTER NAME";N$
INPUT "ENTER ADDRESS";A$
INPUT "ENTER AGE";A
WRITE #1, N$, A$, A
INPUT"DO YOU WANT TO CONTINUE?"; CH$
LOOP WHILE UCASE$ (CH$)="Y"
CLOSE #1
END
No comments:
Post a Comment