MODEL QUESTION SET 10
1. Answer the following questions:
a. “Computer network needs grater
security than in Stand Alone system.” Clarify the statement.
: Computer network needs greater
security than in stand alone system because in computer network many computers
are interconnected and share the data and information easily. By sharing the
programs, there are more chances to share the virus and other illegal programs
so they need more security.
b. Write one example each of web
browser, URL, domain type and search engine.
As:
Web browser- Internet Explorer
URL: https://www.Facebook.com
Domain type: in the above url domain
is .com
Search engine: google.com
c. What is multimedia? Why the
importance of multimedia is ever increasing?
Ans: Multimedia is the collection of
many media such as text, image, graphics, audio, video and animation to deliver
the information . The importance of multimedia is increasing ever because with
the help of multimedia it is easy to deliver the information in any form and it
is easy to understand.
d. Write the importance of back up and
password for data security.
Ans: With the backup we can create
the duplicate of necessary software, data and programs and get easily back even
in deletion of such programs in the future. Password is used to protect the
file, folder, programs from being used by unauthorized users.
e. How do you identify your computer
infected from viruses?
Ans:
These are the following symptoms to know about computer virus inffection
1.
Computer will be hang.
2.. The
size of the files and folders are changed.
3. The
computer will show you unneccessary errors/ messages.
4.
Computer's files will be deleted automatically.
2. a. perform the following binary
calculations:
i.
(11000-1101)x(11)
ii. (453)8 into
hexadecimal
b. Convert the following as indicated:
i.
(81)10into
binary ii. (453)8into
hexadecimal
3. Match the following pairs:
a. Repeater c. Network model
b. Internet explorer d. Multimedia
c. Peer to peer a. Network component
d. DVD b.
Web browser
Google
.com
4. Replace the following definitions
with a technical term:
a. Viruses which infect both application
and boot sector of a disk. Boot sector virus
b. The moving images of real
environment. animation
c. Duplicate copy of data and program.
backup
d. A (n) port to connect external
device. Ethernet port
5. Write the full forms:
a. SIM - Subsciber Identity Module/
Subsciber Identification Module
b. PDF- Portable Document Format
c. UTP- Unsheilded Twisted Paie
d. MBR - Master Boot Record
6. Choose the best answer.
a. Computer virus is a type if
……………………... program.
i.
System
ii.
Operating system
iii. Packaged iv. Destructive
b. Which of the following is not the component
of multimedia?
i.
Pixel ii. Text
iii. Audio iv. Animation
c. A www is a …………………………
i.
Language
of internet ii. Service
of internet
iii.
Protocol
of internet iv. None of the above
d. Which one is not a data security
method?
i.
Encryption
ii. insurance
iii.
Defragmentation
iv. Password
7. Answer the following questions:
a. What does data type refer to? write
any four data types used in Microsoft Access.
Ans: Data type tells the dbms that
what type of data is going to store in declare field name. Any four data types
are text, memo, number, ole
b. What is table? Write any one reason
for opening table in design view.
Ans: Table is the object of database
and used to create, edit, manage the table in dbms. In design view we can
create table, define their data type, set their properties easily.
c. What is report? Differentiate between
form and report.
Ans:
Form is the object of database used to edit, add, the records of the table but report is used to get the output of
the table in printed form.
Form
display the records in monitor as a softcopy format but report is used to get the records in hard copy format.
8. Select the best alternatives for the
following:
a. Column heading of database is
……………………
i.
Data
ii. Record iii. Field iv. File
b. Space used by a currency data type is
…………………
i.
1
byte ii. 2 bytes iii. 4 bytes iv. 8 bytes
c. Field name can be up to …………..
Characters long.
i.
64
ii. 16 iii. 128 iv. 40
d. Which is a not MS- Access object?
i.
From
ii. Table iii. Query iv. Caption
9. Match the following pairs:
OLE
object b. Field property
Indexing
a- Documents
Database
d. Action query
Updating
data a. Data type
- Telephone directory
10. Answer the following questions:
a. Differentiate between global and
local variable.
local variable is declared and used
withing a sub module whereas global variable is used to declare in main module
and can be used in any sub module.
b. Write any two characteristics of C
language.
1. It is a stuructured programming
language.
2. It is used to create system and application
software.
c. Write down function of:
i.
CALL-
It is used to call/run the sub module in the main module.
ii.
EOF-
It is used to check the last record or end of the file in file handing
11. Write the output of the following
program:
DECLARE SUB result (n$)
N$ = “NEWNEPAL”
CALL result (n$)
END
SUB result (n$)
B = LEN (n$)
C = 1
WHILE C<=B
X$= X$ +MID$ (N$, C, 1)
C = C+2
WEND
PRINT X$
END SUB
The output of the program NWEA
12. Rewrite the following program
correction the bugs:
REM to print record of the student
whose score
are adove 200
OPEN “EMP, dat” FOR APPEND AS # 1
DO WHILE EOF (1)
INPUT # 1, N$ , ADD$, SC
SELECT CASE SC
CASE IS > 200 THEN
PRINT N$, ADD$, SC
The
correct program is
REM to print record of the student
whose score
are adove 200
OPEN “EMP.dat” FOR INPUT
AS # 1
DO WHILE EOF (1)
INPUT # 1, N$ , ADD$, SC
SELECT CASE SC
CASE IS > 200 THEN
PRINT N$, ADD$, SC
END SELECT
WEND
No comments:
Post a Comment