Sunday, 12 April 2020

SEE Model Set 8 Solution

MODEL QUESTION SET 8

1.      Answer the following questions:

a.      Mention any two advantage and disadvantage of star topology.

Advantages:

1.It provide more security to the network.

2.It is easy to add, delete and maintain the node in the network.

Disadvantages:

1. It is expensive.

2. It needed skill manpower to run the network.

b.      Differentiate between internet with example.

c.       Why do we keep computer dust free?

We can keep computer dust free because dust contains the iron particles which can make damage the computer hardware parts and it is necessary to clean the computer regularly.

d.      What do you know about computer crime? Explain.

Ans: The illegal work like fraud, molestation, haking, phishing etc. by using the computer and internet are called computer crime.

e.      What is mean by computer animation?

2.      a.  Convert as instructed:

                                i.      (234)8 into binary

                               ii.      (CD)16 into decimal

b.      Perform binary calculation:

                                i.      10001*1001+101                        ii. Add 111 to 101 and multiply by 10

3.      Match the following pairs:

a.      Microphone

b.      Network device

c.       Password

d.      Netscape navigator

 

4.      Select correct answer :

a.      Device that connects two networks with different protocols.

                                i.      NIC   ii. Hub   iii. Switch   iv. Gateway

b.      Visual communication between two different computers.

                                i.      Virtual reality     iii. Touch screen

                               ii.      Animation          iv. Videoconference

c.       Computers connected within an organization, which is control by single organization.

                                i.      WAL        ii. MAN                        iii. LAN            iv. None of them

d.      Which of the following is not cyber ethics?

                                i.      Should not use computer to harm people.

                               ii.      Should not use computer to steal.

                             iii.      Should destroy data of other people.

                             iv.      All of the above.

5.      Give the appropriate technical terms of the following:

a.      A technology that makes teaching- learning easier in a classroom. Multimedia

b.      A device that boosts up weak signal and forward them. Repeater

c.       Visual communication of parties around the world. Video conferencing

d.      The pattern of network formed by the connection of devices on LAN. LAN Topology

6.      Write the full forms of the following:

a.      ISDN- Integratted Services Digital Network        

b.      ADSL - Asymmetric Digital Subscriber Line         

c.       EMI-Electro Megnetic Induction

7.      Answer the questions:

a.      Show any two differences between the objects FORM and REPORT of MS-ACCESS database.

Ans: Form is the object of database used to edit, add, the records of the table but report is used to get the output of the table in printed form.

Form display the records in monitor as a softcopy format but report is used to get the records in hard copy format.

 

b.      Differentiate between Database and DBMS with any two examples of each.

Ans: Database is the collection of logically related data whereas DBMS is the software which is used to manage the database electronically.

Database: Mark ledger, Telephone dictionary

DBMS: MS Access, Oracle

c.       Mention any four different types of data supported by the database of MS-ACCESS.

Text, Memo, OLE, Number

8.      Select the correct answer:

a.      Record of the table is also called ……………………

                                i.      Tuple                  ii. Entity           iii. Attribute     iv. Field

b.      ……………….. is not a field property of MS-Access.

                                i.      Required                        ii. Index            iii. Format        IV. Search

c.       The field size of Yes/No data type is…………………….

                                i.      1 Bytes               ii. 1 Nibble       iii. 1 word        iv. None of them

d.      ………………… is not DBMS.

                                i.      MS – Excel          ii. NS- SQL Server iii. Oracle   iv. Foxpro

9.      Match the following:

Group A                       Group B

                                i.      Record                            ( ii) Title of the content

                               ii.      Field                               ( ) DBMS

                             iii.      Yes/No                           (i) piece of information

                             iv.      Lookup wizard                (iii) Logical data type

(iv) picture, sound etc.

10.  Answer the following questions:

a.      What is meant by module? Explain it.

Ans: Module is a small program to perform the specific task in modular programming.

b.      Write any two names of keywords as you know.

Ans: int, char

c.       Differentiate between OUTPUT and INPUT in open statement.:

Output mode is used to create a new datafile whereas input mode is used to open an existing data file in file handling in qbasic.

11.  Write the output of the given program:

DECLARE FUNCTION ESUM ( )

PRINT ESUM

END

 

FUNCTION ESUM ( )

FOR A= 2 TO 100 STEP 2

LET S=S+A

NEXT A

ESUM=S

END FUNCTION

Output is

12.  Rewrite the given program after correction the bugs:

OPEN “XYZ. REC” FOR INPUT AS #4

CLS

INPUT “Enter post to be searched”; s$

FLAG=0

WHILE NOT EOF (1)

INPUT 1, N$, P$, D$, S

IF UCASE (S$) = UCASE$(P$) THEN

PRINT N$, P$, D$, S

FLAG=1

END IF

WEND

correct program

 

OPEN “XYZ. REC” FOR INPUT AS #1

CLS

INPUT “Enter post to be searched”; s$

FLAG=0

WHILE NOT EOF (1)

INPUT #1, N$, P$, D$, S

IF UCASE$ (S$) = UCASE$(P$) THEN

PRINT N$, P$, D$, S

FLAG=1

END IF

WEND

 

IF FLAG=O THEN PRINT “Data not found”

CLOSE#1

END

13.  Study the following programs and answer the given question:

DECLARE FUNCTION STRING (S$)

CLS

            INPUT “Enter any string = “;s

            PRINT “Total number of alphabet a = “; STRING (S$)

            END

            FUNCTION STRING (S$)

            FOR I = 1 TO LEN (S$)

            C$ = UCASE$ (MID (S$, I, 1))

            IF C$ = “A” THEN

            COUNT = COUNT +1

            END IF

NEXT I

STRING = COUNT

END FUNCTION

a.      For what purpose UCASE$ is used?

Ans: It is used to make the character in uppercase.

b.      If the input sting is “Education”, than what will be output?

Ans: The output is  Total number of alphabet a=1

14.  a. write a program to count total number of digits, find sum of the digits using SUB ……….. END SUB.

DECLARE SUB DIGIT(N)

CLS

INPUT N

CALL DIGIT(N)

END

SUB DIGIT(N)

WHILE N<>0

R=N MOD 10

C=C+1

S=S+R

N=N\10

WEND

PRINT "TOTAL NUMBER OF DIGIT";C

PRINT "SUM OF DIGIT";S

END SUB

a.       Write a program to enter the value of any number of digits, Find sum of the digits using SUB……….END SUB.

           

A sequential data file "SALARY.DAT" contains the information, Employee Code, Emplouee Name Post, and Basic Salary. Write a program display those records whose Basic Salary is in between 10000 to 15000 and post is "OFFICER".

OPEN "SALARY.DAT" FOR INPUT AS #1

WHILE NOT EOF(1)

INPUT #1, ECODE$,ENAME$,P$,S

IF S>=10000 AND S<=15000 AND P$="OFFICER" THEN

PRINT ECODE$,ENAME$,P$,S

ENDIF

WEND

CLOSE #1

END


No comments:

Post a Comment

MCQ Question Bank Microsoft PowerPoint