Sunday 12 April 2020

SEE Model Set 7 Solution

Model question 7

1.       answer the following questions:

a.       differentiate between guided and unguided media with examples.

Ans: guided media are the physical pathway to transmit the data whereas unguided media are the wave pathway to transmit the data in a computer network.

guided media are the pathway to transmit the data in the fixed path direction whereas unguided media can not transmit the data in a fixed path.

b.       mention the metion the methods of protection from computer virus.

Ans: The methods to protect the computer from computer virus are as follows

1. Use antivirus programs.

2. Don't use pirated software.

3. Update the antivirus regularly.                                                                           

4. Don't open any attachments without scanning.

 

c.       what are the main policies of IT policy -2002?

d.       write down the disadvantages of multimedia technology.

Ans: The disadvantages of multimedia technology are as follows

1. It makes user lazy and ideal without knowledge of technology.

2. Required skilled manpower is needed.

3. Expensive to implement and use.

4. Latest updates resquired for the related software and hardware.

e.       what is computer security? How it can be maintained?

Ans: The methods to protect the computer hardware and software from being damage is called computer security.Computer security can be maintain by using the software and harware measures.

2.       a. convert as insteucted:

                                                   i.      (333)10into hexadecimal

                                                 ii.      (FEE)16into decimal

b.       perform blnary calculation:

                                                   i.      1011-111+101           ii. multiply 1001 to 111 and divided by 11

3.       Match the following:

Group A                               Group B

a.       Telephone line                  c communication media

b.       Infrared                                d. Type of network

c.       Newspaper                         a. Two-way communication

d.       MAN                                      b. Transmission media

v. Line

4.       State whether the statement is true/false:

a.       computer based training is more effective than normal classes. T

b.       Sending and receiving massages through internet is called Email. T

c.       computer viruses can affect only software but not hardware. F

d.       cyber law is used to stop cyber crime. T

5.       Give the appropriate technical terms of the following:

a.       The process of collecting all the scattered files to contiguous sectors on  a hard disk to inscrease the speed of computer.Defragmentation

b.       To supply regulated power to computer even at the time of power cut. Power protection devices

c.       A set of Programs. Software

d.       Plan formulated by the government for development of IF sector. Cyber law

6.       Write the full forms of the following:

a.       BPS- Bits Per Second      

b.       DNS- Domain Name Server                         

c.       ASCII- American Standard Code for Information Interchange

d.       MBR- Master Boot Record

7.       Answer the followings questions:

a.       Differentiate between 'format' and 'input mask' field.

Ans: Format and input mask both are the property of a field. Format is used to set the data types value whereas input mask is used to set the pattern of the value.

b.       Why is report created? Explain.

Ans: Report is the object of ms access to get the hardcopy output of the records.

c.       What are the advantages of database?

Ans: The main advantage of database is to arrange the data in a systematic manner. Database is the collection of logically related data which gives complete information.

8.       Fill in the blanks:

a.       Access is a DBMS.

b.       Primary key values must not be Unique

c.       Default value of field size of text field is 50

d.       Primary key is used for non-repeating of data.

9.       Match the following:

Group A                               Group B

a.       Primary Key                        b. Picture

b.       OLE                                        c.  Data type

c.       MEmo                                    d. Easy to search

d.       Sort query                           a.  Unique identification of record

v. Query

10.   Answer the following questions:

a.       Differentiate between function and procedure with example.

Function return a single value whereas procedure does't return any value.

b.       int a, b, c, How many bytes of data they can store?

Ans: It will store 8 bytes each it means altogether 24 bytes.

c.       Write the function of following statements:

                                                   i.      PRINT #                        ii. PRINT

 

Print is used to print the message of value of a variable but print # is used to print the record from a data file.

 

11.   Write the output of the giaven program:

CLS

LET L 1 = 20

LET B1 = 30

CALL AREA (L1, B1)

END

SUB        AREA (L, B)

                A= L*B

                PRINT A

END SUB

 

Ans: The output of the program is 600

12.   Rewrite the given program after correcting the bugs:

REM to delete a record from a data file.

OPEN "STD.DAT" FOR INPUT AS #1

OPEN "TEMP.DAT" FOR OUTPUT AS #2

INPUT "ENTER ROLL NUMBER TO DELETE:-";R

DO WHILE NOT EOF (1)

                INPUT # 1,R, N$, C

                IF R <> RN THEN

                WRITE #2, N$, C

                END IF

LOOP

CLOSE #1

KILL "STD.DAT"

NAME "TEMP.DAT" AS "SECRET.DAT"

END

Ans:

REM to delete a record from a data file.

OPEN "STD.DAT" FOR INPUT AS #1

OPEN "TEMP.DAT" FOR OUTPUT AS #2

INPUT "ENTER ROLL NUMBER TO DELETE:-";RN

DO WHILE NOT EOF (1)

                INPUT # 1,R, N$, C

                IF R =RN THEN

                WRITE #2, N$, C

                END IF

LOOP

CLOSE #1

KILL "STD.DAT"

NAME "TEMP.DAT" AS "SECRET.DAT"

END

 

 

13.   Study the following programs and answer the given question:

DECLARE  FUNCTON  PALINDROME$ (W$, N$)

INPUT "Enter a string" : W$

IF            W$= PALINDROME $(W$,N$) THENE

                PRINT W$; "IS A PALINDROME"

ELSE

                PRINT W$;"IS NOT A PALINDROME"

END       IF

END

FUNCTION PALINDROME$ (W$, N$)

FOR I = LEN (W$) Too 1 step -1

NEXT I

PALINDROME$ = N$

ENDFUNCTION

a.       How many times the loop repeated if the calue of w$ ="EYE"?

Ans: 3 times

b.       For what purpose the variable w$ and n$ are used?

Ans: W$ is used to store any string data whereas N$ is used to store the reverse of the string data.

14.   a. write a program to find maxium nunber among N different number using FUNCTION ………… END FUNCTION.

b.       Write a program to generate the following series 1,8,27,64,125 ……… up to 10th terms using SUB …………. END SUB.

DECLARE SUB SER

CLS

CALL SER

END

SUB SER

FOR I=1 TO 10

PRINT I^3

NEXT I

END SUB

c.       Write a program to create a data file named publisher. dat which stores the book number, Book name, Author name, Price and ISBN number Add the data according to the user.

OPEN "PUBLISHER.DAT" FOR APPEND AS #1

TOP:

INPUT B$,A$,INO

WRITE #1,B$,A$,INO

INPUT "DO YOU WANT TO ADD MORE(Y/N)";C$

IF C$=UCASE$("y") THEN GOTO TOP

CLOSE #1

END

 

 


No comments:

Post a Comment

MCQ Question Bank Microsoft PowerPoint