Sunday 12 April 2020

SEE MODEL QUESTION SET 5 Solution

MODEL QUESTION SET 5

1.      Answer the following questions:

a.      What do you understand by network architecture? Mention its different types.

Ans: Computer network is the connection of several computers in order to share the resources. The types of computer network, where network defines how the data and instruction controls within the network is called network architecture. It define the working system of the computer network. Classification of computer network according to the way of working system is called computer architecture

1. Centralized Computer network

2. Peer to peer architeture

3. Client Server architecture

b.      Internet is also called information super highway. Why? justify your answer.

Ans: Internet is the network of networks. The largest computer network in the world where millions of computer network and billions of computers are connected with each other to share the information. The distance doesn't matter hence Internet is also called information super highway.

c.       Define Multimedia Technology. Highlight any two benefits of it.

Ans: The technology where multimedia hardware, software and components are used to present the information in digital way is called Multimedia Technology.

1. It is easy to share information

2. It is easy to teach and learn the education

d.      Data and software are valnerable. Mention different alternatives to secure tham with brief explanation on any two.

Ans: To secure data and information we can use many methods

1. Backup: Backup is the process to create the extra copies of software/data/information. It is the easy way to secure the data and information for the future use.

2. Antivirus: Antivirus is a software which is used to check the virus from your computer and remove it. This is the method to secure the data and information where illegal activities are strongly probihated and the data and information remain secure.

e.      In what way can you secure your computer system from the effect of computer virus? Describe any four points.

Ans: The computer system can be secure from the effect of virus by applying following way

1. Using Antivirus: Antivirus is a software which is used to check the virus from your computer and remove it. This is the method to secure the data and information where illegal activities are strongly probihated and the data and information remain secure.

2. By not using pirated software

3. By not using the infected pen drive or hard disk.

4. By not downloading the program from the untrusted websites.

 

2.      a. Perform the binary operation as indicated:

                                            i.      10110+10111           ii. 101010-10101

b.      Convert the value as indicated:

                                            i.      (235)8 = (?)2              ii. (D2A)16 = (?)8

3.      Write the full forms of the following:

a.      CDMA-Colliation Detection Multiple Access

b.      FTP-File Transfer Protocol

c.       TCP/IP -Transmission Control Protocol

d.      ARPA-American Research Project Agency

4.      Match the following:

a.      optical fiber         i. A high speed communication channels base on line of sight

b.      WAN                    (a)A high speed transmission media where                            data transmission will take place in light pulses.

c.       Microwave          (c)A transmission media which has relatively low band-width and used for setting the LAN relatively low cost.

d.      LAN                      (b)Data communication network designed to

serve an area of hundreds of thousands of miles.

(d)Hardware and software systems that undertake the hob of interdevice communications within limited distances.

5.      Give the appropriate technical terms of the following:

a.      A system which enables voice communication through internet.(Video Conferencing)

b.      A type of computer network where two or more components are connected together via cable connecation.(LAN)

c.       The moral dilemmas caused by the use of computer.(Computer Ethics)

d.      The universe of environments, such as the internet, in which people interact by means of connected computers. (Cyber zone)

6.      Choose the correct answer:

a.      The legal status to electronic transaction through electronic media and a provision of panalty for those who misuse data/information.

                                            i.      Cyber crime              iii. Cyber ethics

                                           ii.      Cyber Law                iv. None of above

b.      A computer on a network that can function as both a client and a server

                                            i.      dedicated server                  iii. workstation

                                           ii.      Non-dedicated server         iv. node

c.       Connection to a data communication network (e.g. internet) through a public switched telephone network rather than a dedicated circuit

                                            i.      cable network                      iii. dial-up network

                                           ii.      satellite network                  iv. wireless network

d.      A disk service which increases the speed of disk access arranging all the data stored randomly in the sequential manner along with correcting

                                            i.      scandisk                                iii. format

                                           ii.      defragmentation                iv. disk cleanup

7.      Answer the following questions:

a.      What is DBMS? List its any two advantages.

Ans: The Database Management System is a software which is used to manage the database digitally. eg ORACLE, MSACCESS

b.      What is a primary key? Highlight its any two features.

Ans: The unique field of the table which is used to store the unique data and used to create a relationship among the table is called primary key

1. Store unique data.

2. Cant not store null value.

c.       Show the difference between SELECT query and UPDATE query.

Ans: Select Query is used to display the data from a table or tables according to specific condition in a separate table whereas update query is used to make the changes in the main table.

Select query does not make any changes in the main table whereas update query is used to make the direct change in the main table.

8.      choose the correct answer:

a.      is an example of RDBMS

                                            i.      MS-EXCEL                             iii. MS-WORD

                                           ii.      ORACLE                                iv. ADOBE PAGE-MAKER

b.      is an interface between user and database to enhance data entry, edition in effective way

                                            i.      table                                                 iii. report

                                           ii.      form                                                 iv. query

c.       The data of birth of a person stored in a table as a data/time type of data occupies the space of

                                            i.      4 bytes                                 iii. 8 bytes

                                           ii.      10 bytes                               iv. 2 bytes

d.      in general, if you do not specify primary key during the table design time the database table wizard will automatically assign a primary key with description "ID". what will be its data type?

                                            i.      text                                       iii. number

                                           ii.      autonumber                         iv. currency

9.      Match the following:

a.      OLE                      (b)is the suitable data type to store relatively large textual information.

b.      Memo                  (d)is the default numeric data type

c.       hyperlink              ( c)is the suitable data type to store address of website or e-mail as data.

d.      long integer         (a)is the suitable data type to store store

document prepared using another application as data.

10.  Answer the following questions:

a.      Show the major difference between BASIC SUB AND FUNCTION PROCEDURE

Ans: The function return a single value the sub does not returen a value. Function are of two type numeric or string, sub does not have it's types.

b.      Write any four data types of C.

Ans: int and float

c.       show the difference between INPUT # ans INPUT statement.

ans: Input # is used to extract the record from data file into a string variable in file handling programs whereas input is used to store the value in the variable during runtime of the program.

11.  Debug the given program:

REM to count total number of word existing in a sentence input by a user.

DECLARE FUNCTION wordcount (w$)

CLS

LINE INPUT "Enter a sentence:"; s$

N= wordcount (w$)

PRINT "total number of word existing:";s$

END

FUNCTION wordcoung (w$)

FOR C = LEN (W$) TO1

CH$ = MID$ (s$, C, 1)

IF CH$ = " "THEN CNT = CNT +1

NEXT

CNT = wordcount

END FUNCTION

 

 

 

The correct program is

REM to count total number of word existing in a sentence input by a user.

DECLARE FUNCTION wordcount (w$)

CLS

INPUT "Enter a sentence:"; s$

N= wordcount (w$)

PRINT "total number of word existing:";N

END

FUNCTION wordcoung (w$)

FOR C = LEN (W$) TO 1 STEP -1

CH$ = MID$ (W$, C, 1)

IF CH$ = " "THEN CNT = CNT +1

NEXT

wordcount=CNT+1

END FUNCTION

 

12.  Find the output of the following program showing the necessary rough: (Question is not complete)

READ M,N

CALL NUMCAL (M,N,S$)

PRINT S$

END

SUB NUMCAL (x, y, s$)

a=x

DO WHILE a<> 0

R= a MOD y

s$ = str$ (R) + s$

a= (a-R) /y

LOOP

END SUB

13.  Read the given program and answer the given question:

DELLARE SUB STRIN (X$)

X$="COMPUTER'

END

SUB STRIN (X$)

L=LEN (X$)

FOR I = L TO 1 STEP -2

PRINT MID$ (X$,I,1)

NEXT I

END SUB

a.      what will be the value of L if x$ = "NEPAL"?

Ans:

L

P

N

b.      List out numeric and string variable used in the program.

Numeric variable-L,I

String variable-X$

 

14.  Write the following programs:

a.      To calculate the area of a triangle through a BASIC SUB named areatriangle () on basis of its three sides which lengths are input by the user.

DECLARE SUB AREATRIANGLE(A,B,C)

INPUT "THREE SIDES";A,B,C

CALL AREATRIANGLE(A,B,C)

END

SUB AREATRIANGLE(A,B,C)

S=(A+B+C)/2

AREA=(S*(S-A)*(S-B)*(S-C))^0.5

PRINT "AREA ";AREA

END SUB

 

b.      To concatenate (link) three different strings input by a user as illustrated below in the hint given using a user-defined function named strconc().

            [HINT: if the input strings are"FIRST" "SECOND"  AND          "THIRD" than the OUTPUT should be "FIRSTSECONDTHIRD"]

 

DECLARE FUNCTION STRCONC$(A$,B$,C$)

CLS

INPUT "THREE STRINGS";A$,B$,C$

PRINT STRCONC(A$,B$,C$)

END

FUNCTION STRCONC(A$,B$.C$)

E$=A$+B$+C$

STRCONC$=E$

END FUNCTION

 

 

c.       To count and display all the records existing in a sequential data file which name is input by the user.

OPEN "FILE.TXT" FOR INPUT AS #1

WHILE NOT EOF(1)

LINE INPUT #1,A$

C=C+1

PRINT A$

WEND

PRINT "TOTAL RECORDS";C

CLOSE #1

END


No comments:

Post a Comment

MCQ Question Bank Microsoft PowerPoint