Tuesday, October 18, 2016

Solved SLC Practice Test Bkt Pabson 2071


SLC Practice Test-2071(2015)
1.      Answer the following questions:
a.       Differentiate between guided and unguided media.
è The differences between guided and unguided media are:
Guided media
Unguided media
·     It is the transmission medium in which data signal flows through specified path.
·      It is the transmission medium in which data signal flows through air.
·     Data or signals sent through guided medium propagate in the form of voltage, current or photons.
·      Data or signals send through unguided medium propagates in the form of electromagnetic waves.
·     It is mainly suited for point to point line configuration.
·      It is mainly suited for broadcasting purposes.
·     Example: twisted pair cable, co-axial cable, fiber optics, etc.
·      Example: radio wave, microwaves, infrared waves, etc.

b.      “Membership of library reduces day by day because of Internet.” Justify the statement.
è “Membership of library reduces day by day because of Internet.” Yes, it is true as internet is the interconnection of several thousands of computers of different types belonging to various networks all over the world which allows user to share information about various topics easily and also get to read different kinds of interesting books which may not be found in library. Internet has made reading easier because of which students prefer internet rather than library.
c.       What is computer virus? How does virus spread in your computer?
è Computer viruses are the computer programs written by the computer programmer with the intent of damaging and destroying the data and information residing in the computer’s memory.
A virus usually spread from one computer to another by the following ways:
·         Sharing infected internal portable disk like floppy disk, pen drive, CDs, etc.
·         Opening a virus infected emails, messages and attachments.
·         Downloading files and programs from the websites which are not secure.
·         Exchanging data and information over a network.
d.      What is software security? List out any two measures to protect computer software.
è The security given to the computer software’s and programs from being lost or damaged due to accidental or intentional harm is known as software security.
The two measures to protect computer software are:
·         Backup
·         Password
e.       List any four software required for multimedia computer.
è The four software required for multimedia computer are:
·         Maya
·         Adobe Photoshop
·         Animator Pro
·         Macromedia flash player
2.      a. Convert as instructed:


i.               (416)8 into decimal






ii.              (A5B)16 into binary



b. Perform the following binary calculations:
                                     i.            (1100)2 x (11+11)2



                                   ii.            Divide (101101) by 11


3.      Match the following:
Encryption                   connects computer with a network
Defragmentation          the process of making a file or message unreadable
NIC                              Device that regenerates signals.
UPS                             The process of consolidating fragmented files and folders
                                    Power protection device
Ans:
Encryption                   à        the process of making a file or message unreadable
Defragmentation          à        The process of consolidating fragmented files and folders
NIC                              à        connects computer with a network
UPS                             à        Power protection device
4.      Choose the best answer:
a.    The process of transferring a copy of a file from a remote server to the requesting computer is
i. Uploading           ii. Downloading                       iii. FTP             iv. Net surfing
Ans:  Downloading
b.   Which is the internet service?
i. FTP         ii. Telnet          iii. Both i and ii            iv. ISP
Ans: Both i and ii
c.    Which one is the best way for protecting the software?
i. Backup               ii. Password                 iii. Virus Scanning                   iv. All 
Ans:  All
d.   Which is not the Anti-Virus program?
i. AVG                   ii. NAV                        iii. Kaspersky               iv. None of them
Ans:  None of them
5.      Give appropriate technical terms for:
i.      A virus that infects executable file or program. Program virus
ii.    A person who seeks and exploits weakness in a computer system or computer network Hacker
iii.  An artificial environment that is created with software and presented to the user in such a way that the user suspends belief and accepts it as a real environment. Virtual Reality
iv.  A communication mode where data transmit only in one direction. Simplex mode
6.      Write the full form of the following:
i.                    PDF                 Portable Document Format
ii.                  ISP                   Internet Service Provider
iii.                DNS                 Domain Name System
iv.                POP                 Post Office Protocol
7.      Answer the following questions:
a.       Define DBMS with any two advantages.
Ans: Database Management System (DBMS) is a software which is used to manage data, manipulate them and provide information to the user. 
Any two advantages of DBMS are:
i. It controls redundancy, which means duplication of data.
ii. Large volume of data can be stored and updated easily.
b.      Write the appropriate data type of the following filed name.
Salary:                   CurrencyDate of Birth:         Date/ TimeName:                    TextGender:                  Yes/ No
c.       What is a query? List its types.
Ans: A query is an object of MS-Access which displays the selected information on screen, creating datasheet of selected fields and records from one or more tables.
There are two types of query. They are:
i. Select Query
ii. Action Query
8.      Select the best answer
a.       A data type TEXT can store ____
i. Alphabets                       ii. Date and Time         iii. Both Alphabets and Numbers         iv. None of them
Ans: Both Alphabets and Numbers
b.      Which object of MS-Access helps in entering data?
i. Form       ii. Query          iii. Report         iv. None
Ans:Form
c.       A field name of MS-Access can have maximum ____ characters.
i. 40           ii. 64    iii. 44   iv. None
Ans: 64
d.      Process of arranging data either in ascending or descending order is:
i. Filtering  ii. Sorting         iii. Both i and ii            iv. None of them
Ans: Sorting
9.      Match the following
OLE object                  FOXPRO
Database                      MS-Access
Default value               Data Type
RDBMS                       Dictionary
                                    Field Property
Ans
OLE object      à        Data type
Database          à        Dictionary
Default value   à        Field Property
RDBMS           à        MS-Access
10.   
a.       What are different modes in file handling?
Ans: The different modes in file handling are:
i. Input       ii. Output         iii. Append
b.      Write the name of any two operators used in C with example.
Ans: Any two operators used in C language are:
i. Arithmetic Operators. Eg: +
ii. Unary Operators. Eg: ++
c.       Write down the function of the following statements:
i. CALL:
The CALL statement is used to execute or call a sub procedure.
ii. INPUT #
The INPUT # statement is used to read the data from a sequential data file.
11.  Write the output of the given program:
DECLARE SUB SER()
CALL SER
END
SUB SER
A=1
B=1
FOR I = 1 TO 10 STEP 2
PRINT A*B
A=A*10+1
B=B+1
NEXT I
END SUB
Ouput
1
22
333
4444
55555

12.  Re-write the given program after correcting the bugs
REM to display those records whose name starts from “A”
OPEN “Employee.dat” FOR OUPUT AS #1
CLS
WHILE NOT EOF(1)
INPUT #,N$, P$,S#
C$= MID$(N$,1,1)
IF C$=”A” THEN
PRINT #1, N$, P$, S#
END IF
LOOP
CLOSE #1
END
Correct Program

REM to display those records whose name starts from “A”
OPEN “Employee.dat” FOR INPUT AS #1
CLS
WHILE NOT EOF(1)
INPUT #1,N$, P$,S#
C$= MID$(N$,1,1)
IF UCASE$(C$)=”A” THEN
PRINT N$, P$, S#
END IF
WEND
CLOSE #1
END
13.  Study the following program and answer the given questions:
DECLARE FUNCTION AB(n)
CLS
INPUT “Enter any number”; x
            PRINT “Result=”; AB(x)
END
FUNCTION AB(n)
            WHILE n<>0
            r= n mod 10
            s=s*10+r
            n=n\10
            WEND
AB=s
END FUNCTION
a.       What output will be displayed by the computer if you enter 54.
Ans:The output will be as:
Output:
Result= 45

b.      List the arithmetic operators used in the above program.
Ans:The arithmetic operators used in the above program are: MOD, * , + , \
14.   
a.       Write a program using Function procedure to input radius and print total area of circle.
Ans:
DECLARE FUNCTION AREA(R)
CLS
CONST PI= 3.14
INPUT “ENTER THE RADIUS OF CIRCLE”; R
PRINT “ THE AREA OF CIRCLE IS:”;AREA(R)
END
FUNCTION AREA(R)
AREA= PI * R^2
END FUNCTION
b.      Write a program using SUB_END SUB to get any string form the user and print total number of vowels.
Ans:
DECLARE SUB COUNT(N$)
CLS
INPUT “ENTER ANY STRING”;N$
CALL COUNT (N$)
END
SUB COUNT (N$)
C=0
FOR I = 1 TO LEN(N$)
C$=UCASE$(MID$(N$,I,1))
SELECT CASE C$
CASE “A”,”E”,”I”,”O”,”U”
C=C+1
END SELECT
NEXT I
PRINT “TOTAL NUMBER OF VOWELS=”;C
END SUB
c.       A sequential data file “STD.TXT” contains name and marks in three different subjects of some students. Write a program to display only fail students records assuming the pass marks is 40.
OPEN “STD.TXT” FOR INPUT AS#1
CLS
WHILE NOT EOF (1)
INPUT #1, N$, E, N, C
IF E < 40 AND N < 40 AND C < 40 THEN PRINT N$, E, N, C
WEND
CLOSE #1
END

 Solved By : Sarika Shrestha

No comments:

Post a Comment