Model question 7
1. answer
the following questions:
a.
differentiate between guided and unguided media
with examples.
Ans: guided media are the physical pathway to transmit
the data whereas unguided media are the wave pathway to transmit the data in a
computer network.
guided media are the pathway to transmit the data in the
fixed path direction whereas unguided media can not transmit the data in a
fixed path.
b.
mention the metion the methods of protection
from computer virus.
Ans: The methods to protect the computer from computer
virus are as follows
1. Use antivirus programs.
2. Don't use pirated software.
3. Update the antivirus regularly.
4. Don't open any attachments without scanning.
c.
what are the main policies of IT policy -2002?
d.
write down the disadvantages of multimedia
technology.
Ans: The disadvantages of multimedia technology are as
follows
1. It makes user lazy and ideal without knowledge of
technology.
2. Required skilled manpower is needed.
3. Expensive to implement and use.
4. Latest updates resquired for the related software and
hardware.
e.
what is computer security? How it can be
maintained?
Ans: The methods to protect the computer hardware and
software from being damage is called computer security.Computer security can be
maintain by using the software and harware measures.
2. a.
convert as insteucted:
i.
(333)10into hexadecimal
ii.
(FEE)16into decimal
b.
perform blnary calculation:
i.
1011-111+101 ii.
multiply 1001 to 111 and divided by 11
3. Match
the following:
Group A Group
B
a.
Telephone line c
communication media
b.
Infrared d.
Type of network
c.
Newspaper a.
Two-way communication
d.
MAN b.
Transmission media
v. Line
4. State
whether the statement is true/false:
a.
computer based training is more effective than
normal classes. T
b.
Sending and receiving massages through internet
is called Email. T
c.
computer viruses can affect only software but
not hardware. F
d.
cyber law is used to stop cyber crime. T
5. Give
the appropriate technical terms of the following:
a.
The process of collecting all the scattered
files to contiguous sectors on a hard
disk to inscrease the speed of computer.Defragmentation
b.
To supply regulated power to computer even at
the time of power cut. Power protection devices
c.
A set of Programs. Software
d.
Plan formulated by the government for
development of IF sector. Cyber law
6. Write
the full forms of the following:
a.
BPS- Bits Per Second
b.
DNS- Domain Name Server
c.
ASCII- American Standard Code for Information
Interchange
d.
MBR- Master Boot Record
7. Answer
the followings questions:
a.
Differentiate between 'format' and 'input mask'
field.
Ans: Format and input mask both are the property of a
field. Format is used to set the data types value whereas input mask is used to
set the pattern of the value.
b.
Why is report created? Explain.
Ans: Report is the object of ms access to get the
hardcopy output of the records.
c.
What are the advantages of database?
Ans: The main advantage of database is to arrange the
data in a systematic manner. Database is the collection of logically related
data which gives complete information.
8. Fill
in the blanks:
a.
Access is a DBMS.
b.
Primary key values must not be Unique
c.
Default value of field size of text field is 50
d.
Primary key is used for
non-repeating of data.
9. Match
the following:
Group A Group
B
a.
Primary Key b.
Picture
b.
OLE c.
Data type
c.
MEmo d. Easy to search
d.
Sort query a.
Unique identification of record
v. Query
10. Answer
the following questions:
a.
Differentiate between function and procedure
with example.
Function return a single value whereas procedure does't
return any value.
b.
int a, b, c, How many bytes of data they can
store?
Ans: It will store 8 bytes each it means altogether 24
bytes.
c.
Write the function of following statements:
i.
PRINT # ii.
PRINT
Print is used to print the message of value of a variable but
print # is used to print the record from a data file.
11. Write
the output of the giaven program:
CLS
LET L 1 = 20
LET B1 = 30
CALL AREA (L1, B1)
END
SUB AREA
(L, B)
A=
L*B
PRINT
A
END SUB
Ans: The output of the program is 600
12. Rewrite
the given program after correcting the bugs:
REM to delete a record from a data file.
OPEN "STD.DAT" FOR INPUT AS #1
OPEN "TEMP.DAT" FOR OUTPUT AS #2
INPUT "ENTER ROLL NUMBER TO
DELETE:-";R
DO WHILE NOT EOF (1)
INPUT
# 1,R, N$, C
IF
R <> RN THEN
WRITE
#2, N$, C
END
IF
LOOP
CLOSE #1
KILL "STD.DAT"
NAME "TEMP.DAT" AS
"SECRET.DAT"
END
Ans:
REM to delete a record from a data file.
OPEN "STD.DAT" FOR INPUT AS #1
OPEN "TEMP.DAT" FOR OUTPUT AS #2
INPUT "ENTER ROLL NUMBER TO
DELETE:-";RN
DO WHILE NOT EOF (1)
INPUT
# 1,R, N$, C
IF
R =RN THEN
WRITE
#2, N$, C
END
IF
LOOP
CLOSE #1
KILL "STD.DAT"
NAME "TEMP.DAT" AS
"SECRET.DAT"
END
13. Study
the following programs and answer the given question:
DECLARE
FUNCTON PALINDROME$ (W$, N$)
INPUT "Enter a string" : W$
IF W$=
PALINDROME $(W$,N$) THENE
PRINT
W$; "IS A PALINDROME"
ELSE
PRINT
W$;"IS NOT A PALINDROME"
END IF
END
FUNCTION PALINDROME$ (W$, N$)
FOR I = LEN (W$) Too 1 step -1
NEXT I
PALINDROME$ = N$
ENDFUNCTION
a.
How many times the loop repeated if the calue of
w$ ="EYE"?
Ans: 3 times
b.
For what purpose the variable w$ and n$ are
used?
Ans: W$ is used to store any string data whereas N$ is
used to store the reverse of the string data.
14. a.
write a program to find maxium nunber among N different number using FUNCTION
………… END FUNCTION.
b.
Write a program to generate the following series
1,8,27,64,125 ……… up to 10th terms using SUB …………. END SUB.
DECLARE SUB SER
CLS
CALL SER
END
SUB SER
FOR I=1 TO 10
PRINT I^3
NEXT I
END SUB
c.
Write a program to create a data file named
publisher. dat which stores the book number, Book name, Author name, Price and
ISBN number Add the data according to the user.
OPEN "PUBLISHER.DAT" FOR APPEND AS #1
TOP:
INPUT B$,A$,INO
WRITE #1,B$,A$,INO
INPUT "DO YOU WANT TO ADD MORE(Y/N)";C$
IF C$=UCASE$("y") THEN GOTO TOP
CLOSE #1
END
No comments:
Post a Comment