MODEL QUESTION SET 5
1.
Answer
the following questions:
a. What do you understand by network
architecture? Mention its different types.
Ans:
Computer network is the connection of several computers in order to share the
resources. The types of computer network, where network defines how the data
and instruction controls within the network is called network architecture. It
define the working system of the computer network. Classification of computer
network according to the way of working system is called computer architecture
1.
Centralized Computer network
2. Peer
to peer architeture
3.
Client Server architecture
b. Internet is also called information
super highway. Why? justify your answer.
Ans:
Internet is the network of networks. The largest computer network in the world
where millions of computer network and billions of computers are connected with
each other to share the information. The distance doesn't matter hence Internet
is also called information super highway.
c. Define Multimedia Technology.
Highlight any two benefits of it.
Ans: The
technology where multimedia hardware, software and components are used to
present the information in digital way is called Multimedia Technology.
1. It is
easy to share information
2. It is
easy to teach and learn the education
d. Data and software are valnerable.
Mention different alternatives to secure tham with brief explanation on any
two.
Ans: To
secure data and information we can use many methods
1.
Backup: Backup is the process to create the extra copies of
software/data/information. It is the easy way to secure the data and
information for the future use.
2.
Antivirus: Antivirus is a software which is used to check the virus from your
computer and remove it. This is the method to secure the data and information
where illegal activities are strongly probihated and the data and information
remain secure.
e. In what way can you secure your
computer system from the effect of computer virus? Describe any four points.
Ans: The
computer system can be secure from the effect of virus by applying following
way
1. Using
Antivirus: Antivirus is a software which is used to check the virus from your
computer and remove it. This is the method to secure the data and information
where illegal activities are strongly probihated and the data and information
remain secure.
2. By
not using pirated software
3. By
not using the infected pen drive or hard disk.
4. By
not downloading the program from the untrusted websites.
2.
a.
Perform the binary operation as indicated:
i.
10110+10111
ii. 101010-10101
b. Convert the value as indicated:
i.
(235)8
= (?)2 ii.
(D2A)16 = (?)8
3.
Write
the full forms of the following:
a. CDMA-Colliation Detection Multiple
Access
b. FTP-File Transfer Protocol
c. TCP/IP -Transmission Control Protocol
d. ARPA-American Research Project Agency
4.
Match
the following:
a. optical fiber i. A high speed communication channels base on line of sight
b. WAN (a)A
high speed transmission media where
data transmission
will take place in light pulses.
c. Microwave (c)A transmission media which has relatively low band-width
and used for setting the LAN relatively low cost.
d. LAN (b)Data
communication network designed to
serve an
area of hundreds of thousands of miles.
(d)Hardware
and software systems that undertake the hob of interdevice communications
within limited distances.
5.
Give
the appropriate technical terms of the following:
a. A system which enables voice
communication through internet.(Video Conferencing)
b. A type of computer network where two
or more components are connected together via cable connecation.(LAN)
c. The moral dilemmas caused by the use
of computer.(Computer Ethics)
d. The universe of environments, such as
the internet, in which people interact by means of connected computers. (Cyber
zone)
6.
Choose
the correct answer:
a. The legal status to electronic
transaction through electronic media and a provision of panalty for those who
misuse data/information.
i.
Cyber
crime iii. Cyber ethics
ii.
Cyber Law iv.
None of above
b. A computer on a network that can
function as both a client and a server
i.
dedicated
server iii. workstation
ii.
Non-dedicated server iv. node
c. Connection to a data communication
network (e.g. internet) through a public switched telephone network rather than
a dedicated circuit
i.
cable
network iii. dial-up
network
ii.
satellite
network iv. wireless
network
d. A disk service which increases the
speed of disk access arranging all the data stored randomly in the sequential
manner along with correcting
i.
scandisk
iii. format
ii.
defragmentation iv. disk cleanup
7.
Answer
the following questions:
a. What is DBMS? List its any two
advantages.
Ans: The
Database Management System is a software which is used to manage the database
digitally. eg ORACLE, MSACCESS
b. What is a primary key? Highlight its
any two features.
Ans: The
unique field of the table which is used to store the unique data and used to
create a relationship among the table is called primary key
1. Store
unique data.
2. Cant
not store null value.
c. Show the difference between SELECT
query and UPDATE query.
Ans:
Select Query is used to display the data from a table or tables according to
specific condition in a separate table whereas update query is used to make the
changes in the main table.
Select
query does not make any changes in the main table whereas update query is used
to make the direct change in the main table.
8.
choose
the correct answer:
a. is an example of RDBMS
i.
MS-EXCEL
iii. MS-WORD
ii.
ORACLE iv. ADOBE
PAGE-MAKER
b. is an interface between user and
database to enhance data entry, edition in effective way
i.
table
iii.
report
ii.
form iv. query
c. The data of birth of a person stored
in a table as a data/time type of data occupies the space of
i.
4 bytes iii.
8 bytes
ii.
10
bytes iv. 2
bytes
d. in general, if you do not specify
primary key during the table design time the database table wizard will
automatically assign a primary key with description "ID". what will
be its data type?
i.
text
iii. number
ii.
autonumber
iv. currency
9.
Match
the following:
a. OLE (b)is
the suitable data type to store relatively large textual information.
b. Memo (d)is
the default numeric data type
c. hyperlink ( c)is the suitable data type to store address of website
or e-mail as data.
d. long integer (a)is the suitable data type to store store
document
prepared using another application as data.
10. Answer the following questions:
a. Show the major difference between
BASIC SUB AND FUNCTION PROCEDURE
Ans: The
function return a single value the sub does not returen a value. Function are
of two type numeric or string, sub does not have it's types.
b. Write any four data types of C.
Ans: int
and float
c. show the difference between INPUT #
ans INPUT statement.
ans:
Input # is used to extract the record from data file into a string variable in
file handling programs whereas input is used to store the value in the variable
during runtime of the program.
11. Debug the given program:
REM to count total number of word
existing in a sentence input by a user.
DECLARE FUNCTION wordcount (w$)
CLS
LINE INPUT "Enter a
sentence:"; s$
N= wordcount (w$)
PRINT "total number of word
existing:";s$
END
FUNCTION wordcoung (w$)
FOR C = LEN (W$) TO1
CH$ = MID$ (s$, C, 1)
IF CH$ = " "THEN CNT = CNT
+1
NEXT
CNT = wordcount
END FUNCTION
The correct program is
REM to count total number of word
existing in a sentence input by a user.
DECLARE FUNCTION wordcount (w$)
CLS
INPUT "Enter a sentence:";
s$
N= wordcount (w$)
PRINT "total number of word
existing:";N
END
FUNCTION wordcoung (w$)
FOR C = LEN (W$) TO 1 STEP -1
CH$ = MID$ (W$, C, 1)
IF CH$ = " "THEN CNT = CNT
+1
NEXT
wordcount=CNT+1
END FUNCTION
12. Find the output of the following
program showing the necessary rough: (Question is not complete)
READ M,N
CALL NUMCAL (M,N,S$)
PRINT S$
END
SUB NUMCAL (x, y, s$)
a=x
DO WHILE a<> 0
R= a MOD y
s$ = str$ (R) + s$
a= (a-R) /y
LOOP
END SUB
13. Read the given program and answer the
given question:
DELLARE SUB STRIN (X$)
X$="COMPUTER'
END
SUB STRIN (X$)
L=LEN (X$)
FOR I = L TO 1 STEP -2
PRINT MID$ (X$,I,1)
NEXT I
END SUB
a. what will be the value of L if x$ =
"NEPAL"?
Ans:
L
P
N
b. List out numeric and string variable
used in the program.
Numeric
variable-L,I
String
variable-X$
14. Write the following programs:
a. To calculate the area of a triangle through a BASIC SUB named areatriangle () on basis of its three sides which lengths are input by the user.
DECLARE
SUB AREATRIANGLE(A,B,C)
INPUT
"THREE SIDES";A,B,C
CALL
AREATRIANGLE(A,B,C)
END
SUB
AREATRIANGLE(A,B,C)
S=(A+B+C)/2
AREA=(S*(S-A)*(S-B)*(S-C))^0.5
PRINT
"AREA ";AREA
END
SUB
b. To concatenate (link) three different
strings input by a user as illustrated below in the hint given using a
user-defined function named strconc().
[HINT:
if the input strings are"FIRST" "SECOND" AND "THIRD"
than the OUTPUT should be "FIRSTSECONDTHIRD"]
DECLARE
FUNCTION STRCONC$(A$,B$,C$)
CLS
INPUT
"THREE STRINGS";A$,B$,C$
PRINT
STRCONC(A$,B$,C$)
END
FUNCTION
STRCONC(A$,B$.C$)
E$=A$+B$+C$
STRCONC$=E$
END
FUNCTION
c. To count and display all the records
existing in a sequential data file which name is input by the user.
OPEN
"FILE.TXT" FOR INPUT AS #1
WHILE
NOT EOF(1)
LINE
INPUT #1,A$
C=C+1
PRINT A$
WEND
PRINT "TOTAL
RECORDS";C
CLOSE #1
END
No comments:
Post a Comment