Sunday 12 April 2020

SEE Model Set 10 Solution

MODEL QUESTION SET 10

1.      Answer the following questions:

a.      “Computer network needs grater security than in Stand Alone system.” Clarify the statement.

: Computer network needs greater security than in stand alone system because in computer network many computers are interconnected and share the data and information easily. By sharing the programs, there are more chances to share the virus and other illegal programs so they need more security.

b.      Write one example each of web browser, URL, domain type and search engine.

As:

Web browser-  Internet Explorer

URL: https://www.Facebook.com

Domain type: in the above url domain is .com

Search engine: google.com

c.       What is multimedia? Why the importance of multimedia is ever increasing?

Ans: Multimedia is the collection of many media such as text, image, graphics, audio, video and animation to deliver the information . The importance of multimedia is increasing ever because with the help of multimedia it is easy to deliver the information in any form and it is easy to understand.

d.      Write the importance of back up and password for data security.

Ans: With the backup we can create the duplicate of necessary software, data and programs and get easily back even in deletion of such programs in the future. Password is used to protect the file, folder, programs from being used by unauthorized users.

 

e.      How do you identify your computer infected from viruses?

Ans: These are the following symptoms to know about computer virus inffection

1. Computer will be hang.

2.. The size of the files and folders are changed.

3. The computer will show you unneccessary errors/ messages.

4. Computer's files will be deleted automatically.

 

2.      a. perform the following binary calculations:

                                            i.      (11000-1101)x(11)               ii. (453)8 into hexadecimal

b.      Convert the following as indicated:

                                            i.      (81)10into binary                  ii. (453)8into hexadecimal

3.      Match the following pairs:

a.      Repeater                                 c. Network model

b.      Internet explorer                    d. Multimedia

c.       Peer to peer                            a. Network component

d.      DVD                                         b. Web browser

Google .com

4.      Replace the following definitions with a technical term:

a.      Viruses which infect both application and boot sector of a disk. Boot sector virus

b.      The moving images of real environment. animation

c.       Duplicate copy of data and program. backup

d.      A (n) port to connect external device. Ethernet port

5.      Write the full forms:

a.      SIM - Subsciber Identity Module/ Subsciber Identification Module 

b.       PDF- Portable Document Format                 

c.       UTP- Unsheilded Twisted Paie                       

d.      MBR - Master Boot Record

6.      Choose the best answer.

a.      Computer virus is a type if ……………………... program.

                                            i.      System                                 ii. Operating system

iii.    Packaged                              iv. Destructive

b.      Which of the following is not the component of multimedia?

                                            i.      Pixel                                     ii. Text

iii.     Audio                                    iv. Animation

c.       A www is a …………………………

                                            i.      Language of internet                       ii. Service of internet

iii.        Protocol of internet                        iv. None of the above

d.      Which one is not a data security method?

                                            i.      Encryption                             ii. insurance  

iii.        Defragmentation                iv. Password

7.      Answer the following questions:

a.      What does data type refer to? write any four data types used in Microsoft Access.

Ans: Data type tells the dbms that what type of data is going to store in declare field name. Any four data types are text, memo, number, ole

b.      What is table? Write any one reason for opening table in design view.

Ans: Table is the object of database and used to create, edit, manage the table in dbms. In design view we can create table, define their data type, set their properties easily.

c.       What is report? Differentiate between form and report.

            Ans: Form is the object of database used to edit, add, the records of the table       but report is used to get the output of the table in printed form.

            Form display the records in monitor as a softcopy format but report is used to      get the records in hard copy format.

 

8.      Select the best alternatives for the following:

a.      Column heading of database is ……………………

                                            i.      Data              ii. Record         iii. Field            iv. File

b.      Space used by a currency data type is …………………

                                            i.      1 byte           ii. 2 bytes         iii. 4 bytes        iv. 8 bytes

c.       Field name can be up to ………….. Characters long.

                                            i.      64                 ii. 16                iii. 128             iv. 40

d.      Which is a not MS- Access object?

                                            i.      From                         ii. Table              iii. Query           iv. Caption

9.      Match the following pairs:

OLE object                   b. Field property

Indexing                      a- Documents

Database                     d. Action query

Updating data a. Data type

 - Telephone directory

10.  Answer the following questions:

a.      Differentiate between global and local variable.

local variable is declared and used withing a sub module whereas global variable is used to declare in main module and can be used in any sub module.

b.      Write any two characteristics of C language.

1. It is a stuructured programming language.

2. It is used to create system and application software.

c.       Write down function of:

                                            i.      CALL- It is used to call/run the sub module in the main module.              

                                           ii.      EOF- It is used to check the last record or end of the file in file handing

 

11.  Write the output of the following program:

DECLARE SUB result (n$)

N$ = “NEWNEPAL”

CALL result (n$)

END

SUB result (n$)

B = LEN (n$)

C = 1

WHILE C<=B

X$= X$ +MID$ (N$, C, 1)

C = C+2

WEND

PRINT X$

END SUB

The output of the program    NWEA

12.  Rewrite the following program correction the bugs:

REM to print record of the student whose score

are adove 200

OPEN “EMP, dat” FOR APPEND AS # 1

DO WHILE EOF (1)

INPUT # 1, N$ , ADD$, SC

SELECT CASE SC

CASE IS > 200 THEN

PRINT N$, ADD$, SC

                The correct program is

REM to print record of the student whose score

are adove 200

OPEN “EMP.dat” FOR INPUT AS # 1

DO WHILE EOF (1)

INPUT # 1, N$ , ADD$, SC

SELECT CASE SC

CASE IS > 200 THEN

PRINT N$, ADD$, SC

END SELECT

WEND


No comments:

Post a Comment

MCQ Question Bank Microsoft PowerPoint