SLC Practice Test-2071(2015)
1. Answer the following questions:
a. Differentiate between guided and unguided media.
è The differences between guided and unguided media are:
Guided media
|
Unguided media
|
· It is the transmission medium in which data signal flows through specified path.
|
· It is the transmission medium in which data signal flows through air.
|
· Data or signals sent through guided medium propagate in the form of voltage, current or photons.
|
· Data or signals send through unguided medium propagates in the form of electromagnetic waves.
|
· It is mainly suited for point to point line configuration.
|
· It is mainly suited for broadcasting purposes.
|
· Example: twisted pair cable, co-axial cable, fiber optics, etc.
|
· Example: radio wave, microwaves, infrared waves, etc.
|
b. “Membership of library reduces day by day because of Internet.” Justify the statement.
è “Membership of library reduces day by day because of Internet.” Yes, it is true as internet is the interconnection of several thousands of computers of different types belonging to various networks all over the world which allows user to share information about various topics easily and also get to read different kinds of interesting books which may not be found in library. Internet has made reading easier because of which students prefer internet rather than library.
c. What is computer virus? How does virus spread in your computer?
è Computer viruses are the computer programs written by the computer programmer with the intent of damaging and destroying the data and information residing in the computer’s memory.
A virus usually spread from one computer to another by the following ways:
· Sharing infected internal portable disk like floppy disk, pen drive, CDs, etc.
· Opening a virus infected emails, messages and attachments.
· Downloading files and programs from the websites which are not secure.
· Exchanging data and information over a network.
d. What is software security? List out any two measures to protect computer software.
è The security given to the computer software’s and programs from being lost or damaged due to accidental or intentional harm is known as software security.
The two measures to protect computer software are:
· Backup
· Password
e. List any four software required for multimedia computer.
è The four software required for multimedia computer are:
· Maya
· Adobe Photoshop
· Animator Pro
· Macromedia flash player
2. a. Convert as instructed:
i. (416)8 into decimal
ii. (A5B)16 into binary
b. Perform the following binary calculations:
i. (1100)2 x (11+11)2
ii. Divide (101101) by 11
3. Match the following:
Encryption connects computer with a network
Defragmentation the process of making a file or message unreadable
NIC Device that regenerates signals.
UPS The process of consolidating fragmented files and folders
Power protection device
Ans:
Encryption à the process of making a file or message unreadable
Defragmentation à The process of consolidating fragmented files and folders
NIC à connects computer with a network
UPS à Power protection device
4. Choose the best answer:
a. The process of transferring a copy of a file from a remote server to the requesting computer is
i. Uploading ii. Downloading iii. FTP iv. Net surfing
Ans: Downloading
i. Uploading ii. Downloading iii. FTP iv. Net surfing
Ans: Downloading
b. Which is the internet service?
i. FTP ii. Telnet iii. Both i and ii iv. ISP
Ans: Both i and ii
i. FTP ii. Telnet iii. Both i and ii iv. ISP
Ans: Both i and ii
c. Which one is the best way for protecting the software?
i. Backup ii. Password iii. Virus Scanning iv. All
Ans: All
i. Backup ii. Password iii. Virus Scanning iv. All
Ans: All
d. Which is not the Anti-Virus program?
i. AVG ii. NAV iii. Kaspersky iv. None of them
Ans: None of them
i. AVG ii. NAV iii. Kaspersky iv. None of them
Ans: None of them
5. Give appropriate technical terms for:
i. A virus that infects executable file or program. Program virus
ii. A person who seeks and exploits weakness in a computer system or computer network Hacker
iii. An artificial environment that is created with software and presented to the user in such a way that the user suspends belief and accepts it as a real environment. Virtual Reality
iv. A communication mode where data transmit only in one direction. Simplex mode
6. Write the full form of the following:
i. PDF Portable Document Format
ii. ISP Internet Service Provider
iii. DNS Domain Name System
iv. POP Post Office Protocol
7. Answer the following questions:
a. Define DBMS with any two advantages.
Ans: Database Management System (DBMS) is a software which is used to manage data, manipulate them and provide information to the user.
Any two advantages of DBMS are:
i. It controls redundancy, which means duplication of data.
ii. Large volume of data can be stored and updated easily.
Ans: Database Management System (DBMS) is a software which is used to manage data, manipulate them and provide information to the user.
Any two advantages of DBMS are:
i. It controls redundancy, which means duplication of data.
ii. Large volume of data can be stored and updated easily.
b. Write the appropriate data type of the following filed name.
Salary: CurrencyDate of Birth: Date/ TimeName: TextGender: Yes/ No
Salary: CurrencyDate of Birth: Date/ TimeName: TextGender: Yes/ No
c. What is a query? List its types.
Ans: A query is an object of MS-Access which displays the selected information on screen, creating datasheet of selected fields and records from one or more tables.
There are two types of query. They are:
i. Select Query
ii. Action Query
Ans: A query is an object of MS-Access which displays the selected information on screen, creating datasheet of selected fields and records from one or more tables.
There are two types of query. They are:
i. Select Query
ii. Action Query
8. Select the best answer
a. A data type TEXT can store ____
i. Alphabets ii. Date and Time iii. Both Alphabets and Numbers iv. None of them
Ans: Both Alphabets and Numbers
i. Alphabets ii. Date and Time iii. Both Alphabets and Numbers iv. None of them
Ans: Both Alphabets and Numbers
b. Which object of MS-Access helps in entering data?
i. Form ii. Query iii. Report iv. None
Ans:Form
i. Form ii. Query iii. Report iv. None
Ans:Form
c. A field name of MS-Access can have maximum ____ characters.
i. 40 ii. 64 iii. 44 iv. None
Ans: 64
i. 40 ii. 64 iii. 44 iv. None
Ans: 64
d. Process of arranging data either in ascending or descending order is:
i. Filtering ii. Sorting iii. Both i and ii iv. None of them
Ans: Sorting
i. Filtering ii. Sorting iii. Both i and ii iv. None of them
Ans: Sorting
9. Match the following
OLE object FOXPRO
Database MS-Access
Default value Data Type
RDBMS Dictionary
Field Property
Ans
OLE object à Data type
Database à Dictionary
Default value à Field Property
RDBMS à MS-Access
10.
a. What are different modes in file handling?
Ans: The different modes in file handling are:
i. Input ii. Output iii. Append
Ans: The different modes in file handling are:
i. Input ii. Output iii. Append
b. Write the name of any two operators used in C with example.
Ans: Any two operators used in C language are:
i. Arithmetic Operators. Eg: +
ii. Unary Operators. Eg: ++
Ans: Any two operators used in C language are:
i. Arithmetic Operators. Eg: +
ii. Unary Operators. Eg: ++
c. Write down the function of the following statements:
i. CALL:
The CALL statement is used to execute or call a sub procedure.
ii. INPUT #
The INPUT # statement is used to read the data from a sequential data file.
i. CALL:
The CALL statement is used to execute or call a sub procedure.
ii. INPUT #
The INPUT # statement is used to read the data from a sequential data file.
11. Write the output of the given program:
DECLARE SUB SER()
CALL SER
END
SUB SER
A=1
B=1
FOR I = 1 TO 10 STEP 2
PRINT A*B
A=A*10+1
B=B+1
NEXT I
END SUB
Ouput
1
22
333
4444
55555
12. Re-write the given program after correcting the bugs
REM to display those records whose name starts from “A”
OPEN “Employee.dat” FOR OUPUT AS #1
CLS
WHILE NOT EOF(1)
INPUT #,N$, P$,S#
C$= MID$(N$,1,1)
IF C$=”A” THEN
PRINT #1, N$, P$, S#
END IF
LOOP
CLOSE #1
END
Correct Program
REM to display those records whose name starts from “A”
OPEN “Employee.dat” FOR INPUT AS #1
CLS
WHILE NOT EOF(1)
INPUT #1,N$, P$,S#
C$= MID$(N$,1,1)
IF UCASE$(C$)=”A” THEN
PRINT N$, P$, S#
END IF
WEND
CLOSE #1
END
13. Study the following program and answer the given questions:
DECLARE FUNCTION AB(n)
CLS
INPUT “Enter any number”; x
PRINT “Result=”; AB(x)
END
FUNCTION AB(n)
WHILE n<>0
r= n mod 10
s=s*10+r
n=n\10
WEND
AB=s
END FUNCTION
a. What output will be displayed by the computer if you enter 54.
Ans:The output will be as:
Ans:The output will be as:
Output:
Result= 45
b. List the arithmetic operators used in the above program.
Ans:The arithmetic operators used in the above program are: MOD, * , + , \
Ans:The arithmetic operators used in the above program are: MOD, * , + , \
14.
a. Write a program using Function procedure to input radius and print total area of circle.
Ans:
DECLARE FUNCTION AREA(R)
CLS
CONST PI= 3.14
Ans:
DECLARE FUNCTION AREA(R)
CLS
CONST PI= 3.14
INPUT “ENTER THE RADIUS OF CIRCLE”; R
PRINT “ THE AREA OF CIRCLE IS:”;AREA(R)
END
FUNCTION AREA(R)
AREA= PI * R^2
END FUNCTION
PRINT “ THE AREA OF CIRCLE IS:”;AREA(R)
END
FUNCTION AREA(R)
AREA= PI * R^2
END FUNCTION
b. Write a program using SUB_END SUB to get any string form the user and print total number of vowels.
Ans:
DECLARE SUB COUNT(N$)
CLS
INPUT “ENTER ANY STRING”;N$
CALL COUNT (N$)
END
SUB COUNT (N$)
C=0
FOR I = 1 TO LEN(N$)
C$=UCASE$(MID$(N$,I,1))
SELECT CASE C$
CASE “A”,”E”,”I”,”O”,”U”
C=C+1
END SELECT
NEXT I
PRINT “TOTAL NUMBER OF VOWELS=”;C
END SUB
Ans:
DECLARE SUB COUNT(N$)
CLS
INPUT “ENTER ANY STRING”;N$
CALL COUNT (N$)
END
SUB COUNT (N$)
C=0
FOR I = 1 TO LEN(N$)
C$=UCASE$(MID$(N$,I,1))
SELECT CASE C$
CASE “A”,”E”,”I”,”O”,”U”
C=C+1
END SELECT
NEXT I
PRINT “TOTAL NUMBER OF VOWELS=”;C
END SUB
c. A sequential data file “STD.TXT” contains name and marks in three different subjects of some students. Write a program to display only fail students records assuming the pass marks is 40.
OPEN “STD.TXT” FOR INPUT AS#1
CLS
WHILE NOT EOF (1)
INPUT #1, N$, E, N, C
IF E < 40 AND N < 40 AND C < 40 THEN PRINT N$, E, N, C
WEND
CLOSE #1
END
Solved By : Sarika Shrestha
No comments:
Post a Comment