Wednesday 26 May 2021

Computer Science - SEE Model Question (Set-I)

COMPUTER SCIENCE

Computer Science - SEE Model Question (Set-I)

Time: 1:30 hours                                                                             F.M.: 75

Group A

1.       Answer the following questions:                                                                     [5x2=10]

  1. What is a data transmission mode? Differentiate between peer to peer and client server network architecture.
  2. What are search engines? List any two services provided by the Internet. 
  3. What is a computer Crime? List any two disadvantages of multimedia.
  4. Define Software Piracy. List out any hardware security measures.
  5. Define boot sector virus. Mention any two precaution methods to avoid virus infection.

2.       a. Convert as instructed:                                                                                     [2x1=2]

(i) (101)8   into binary           (ii) (CAB)16 into decimal

b. Perform binary operation.                                                                             [2x1=2]

(i) (101*11)÷10                     (ii) 10110 -1011

3.       Match the following pairs:                                                                              [4x0.5=2]

Group A                                       Group B

RJ-45                                             work station

Node                                              Protocol

HTTP                                             Coaxial cable

Server                                             connector

Host computer

4.       Select the correct answer:                                                                               [4x0.5=2]

  1. Online medium of communication is ………..

(i) Chatting           (ii) email              (iii) efax                (iv) all of the above

  1. Which of the following terms defines a meaningful speech in any language?

(i) Video                (ii) sound               (iii) text                 (iv) animation

  1. The activity of breaking into a computer system to gain an unauthorized access is………

(i) Password                                         (ii) hacking          

(iii) Ethics                                            (iv) None of the above

  1. Any electrical or electronic device that maintains the voltage of a power source within acceptable limits.

(i) Voltage stabilizer           (ii) Surge suppressor

(iii) UPS                                (iv) Voltage regulator

5.       Give appropriate technical terms of the following:                                 [4x0.5=2]

  1. A network computer that shares resources with and responds to requests from other network computer, including other servers.
  2. A device that connects two computer network that use different protocols.
  3. A set of rules and procedures that govern transmission of messages.
  4. The physical layout of local area network.

6.       Write full forms:                                                                                                [4x0.5=2]

a) Modem           (b) GPL                (c) DNS                    (d) IRC  

Group  'B'

Database [10 marks]

7.       Answer the following questions.                                                                       [3x2=6]

  1. What is data redundancy? List any two uses of form.
  2.  Mention any four data types that can be used in MS-access.
  3. What is a validation rule and referential integrity?

8.       State whether the following statements are TRUE or FALSE.                         [2]

  1. Graphics can also be stored in ms-access database.
  2. A form is object of ms-access used entering data
  3. Validation rule is used to set data entry criteria.
  4. The data filter selects the required records and displays the result.

9.       Match the following pairs:                                                                              [4x0.5=2]

Group A                                                               Group B

Primary key                                                          single entry

Records                                                                 reference key

Report                                                                    unique and not null

Foreign key                                                          a complete information

                                                                                Final output

                                                                               

Group 'C'

Programming [18 marks]

10.    Answer the following questions in short.                                                      [3X1=3]

  1. What is global variable?
  2. Write any two features of c language.
  3. What is user-defined function?

11.    Write the output of the given program:                                                                   [2]

DECLARE SUB result()

CALL result

END

SUB result ()

N=5

C=1

WHILE C<=5

PRINT N

N=N*10+5

C=C+1

WEND

END SUB

12.    Re-write the given program after correcting the bugs:                                       [2]

REM to find square root of the first five natural numbers

CLS

DECLARE FUNCTION SQROOT(D)

FOR K=1 TO 5

A= SQROOT(K)

PRINT “SQUARE ROOT”;K;”=”;K

NEXT LOOP

END

FUNCTION SQROOT(D)

SQROOT=SQR(K)

END

13.    Study the following program and answer the given questions:                  [2x1=2]

OPEN “record.dat” for INPUT AS #1

WHILE NOT EOF(1)

  INPUT #1,N$,AD$,PH#

  PRINT N$,AD$,PH#

WEND

CLOSE #1

END

  1. What is the purpose of EOF(1) in the above program?
  2. What happens if we are not using open statement in the above program?

14. a. Write a program using SUB procedure to input any number and find whether an entered number is prime or composite. (3)

b. Write a program using FUNCTION..END FUNCTION procedure to check whether an input word is palindrome or not.                                                                                                                                       (3)

c. Write a program in APPEND mode to add some more records in a data file “abc.dat” having following fields: patient’s name, age and address.                                                                                                         (3)

No comments:

Post a Comment

MCQ Question Bank Microsoft PowerPoint