Computer Science - SEE Model Question (Set-I)
Time: 1:30 hours F.M.:
75
Group A
1.
Answer the
following questions: [5x2=10]
- What is a data transmission mode? Differentiate between
peer to peer and client server network architecture.
- What are search engines? List any two services provided
by the Internet.
- What is a computer Crime? List any two disadvantages of
multimedia.
- Define Software Piracy. List out any hardware security
measures.
- Define boot sector virus. Mention any two precaution
methods to avoid virus infection.
2. a.
Convert as instructed: [2x1=2]
(i) (101)8
into binary (ii) (CAB)16
into decimal
b. Perform binary operation. [2x1=2]
(i)
(101*11)÷10 (ii)
10110 -1011
3.
Match the following pairs: [4x0.5=2]
Group A Group
B
RJ-45 work
station
Node Protocol
HTTP Coaxial
cable
Server connector
Host computer
4.
Select the correct
answer: [4x0.5=2]
- Online medium of communication is ………..
(i) Chatting
(ii) email (iii) efax (iv) all of the above
- Which of the following terms defines a meaningful
speech in any language?
(i) Video (ii)
sound (iii) text (iv)
animation
- The activity of breaking into a computer system to gain
an unauthorized access is………
(i) Password
(ii)
hacking
(iii) Ethics
(iv) None
of the above
- Any electrical or electronic device that maintains the
voltage of a power source within acceptable limits.
(i) Voltage stabilizer
(ii) Surge suppressor
(iii) UPS (iv)
Voltage regulator
5.
Give appropriate
technical terms of the following: [4x0.5=2]
- A network computer that shares resources with and
responds to requests from other network computer, including other servers.
- A device that connects two computer network that use different
protocols.
- A set of rules and procedures that govern transmission
of messages.
- The physical layout of local area network.
6.
Write full forms: [4x0.5=2]
a) Modem (b)
GPL (c) DNS (d) IRC
Group 'B'
Database [10 marks]
7.
Answer the
following questions. [3x2=6]
- What is data redundancy? List any two uses of form.
- Mention any four
data types that can be used in MS-access.
- What is a validation rule and referential integrity?
8.
State whether the
following statements are TRUE or FALSE. [2]
- Graphics can also be stored in ms-access database.
- A form is object of ms-access used entering data
- Validation rule is used to set data entry criteria.
- The data filter selects the required records and
displays the result.
9.
Match the
following pairs: [4x0.5=2]
Group A Group
B
Primary key single
entry
Records reference key
Report unique
and not null
Foreign key a
complete information
Final
output
Group 'C'
Programming [18 marks]
10.
Answer the
following questions in short. [3X1=3]
- What is global variable?
- Write any two features of c language.
- What is user-defined function?
11.
Write the output
of the given program: [2]
DECLARE SUB result()
CALL result
END
SUB result ()
N=5
C=1
WHILE C<=5
PRINT N
N=N*10+5
C=C+1
WEND
END SUB
12.
Re-write the given
program after correcting the bugs: [2]
REM
to find square root of the first five natural numbers
CLS
DECLARE
FUNCTION SQROOT(D)
FOR K=1 TO 5
A= SQROOT(K)
PRINT “SQUARE ROOT”;K;”=”;K
NEXT LOOP
END
FUNCTION SQROOT(D)
SQROOT=SQR(K)
END
13. Study the
following program and answer the given questions: [2x1=2]
OPEN “record.dat” for INPUT
AS #1
WHILE NOT EOF(1)
INPUT #1,N$,AD$,PH#
PRINT N$,AD$,PH#
WEND
CLOSE #1
END
- What is the purpose of EOF(1) in the above program?
- What happens if we are not
using open statement in the above program?
14.
a. Write a
program using SUB procedure to input any number and find whether an entered
number is prime or composite. (3)
b. Write a program using FUNCTION..END FUNCTION procedure
to check whether an input word is palindrome or not. (3)
c. Write a program in APPEND mode to add some more
records in a data file “abc.dat” having following fields: patient’s name,
age and address. (3)
No comments:
Post a Comment