Tuesday, October 18, 2016

Solved SLC Practice Test Ktm Pabson 2071


SLC PRACTISE TEST PABSON 2071
Group ‘A’ (Fundamental- 22 marks)
1.      Answer the following questions:
a.       What are the major networking hardware components? Explain about server.
Ans: The major networking hardware components are:
·         Servers
·         Clients
·         MODEM
·         NIC
·         Cable
·         Connector
·         HUB
·         Switch
·         Router
A computer that is dedicated to provide information or services in response to external requests is called network server. In other words, it is a central computer of a network; used for sharing storage. A server may store software, applications, databases, and data files for the network users. Depending on the way a server is used, it also may be called a file server, application server or server.

b.      Explain the importance of internet in business.
Ans: The importance of internet in business are as follows:
                                            i.     It helps in marketing and advertising goods.
                                          ii.     It provides better way to interact with employees and board of directors.
                                        iii.     It helps companies to establish a vast network and image in the society by the use of social media and web sites.
                                        iv.     Doing business at remote places becomes easier.
c.       What benefits can interactive multimedia bring to education?
Ans: The benefits that interactive multimedia brings to education are as follows:
                                            i.    It makes presentation of related subject matter attractive.
                                          ii.    It makes teaching-learning easier.
                                        iii.    Presentation can be done in a big screen, so that many students can see it.
                                        iv.    Interactive multimedia programs bring concept to life and help students integrate critical thinking and problem solving skills.
d.      Why do we create backup of important documents? List any two other hardware security measures.
Ans:  Backup of important documents is created in order to save the important data and files from accidental or intentional harm. When the data or software’s get lost or corrupted then backup system helps to recover it from the backup copy.
The two hardware security measures are:
                                                i.     Insurance policy
                                              ii.     Power protection device
e.       What is anti-virus program? Why should we update it regularly?
Ans: Anti-virus program is a program that is designed to detect and remove viruses from the computer system and ensure a virus free environment.
We need to update it regularly in order to update the virus definitions as old virus definitions cannot detect new type of viruses. So to detect and remove new type of viruses, antivirus program should be updated.
2.      a. Perform the following binary calculations:
i.                    (10011-1001)*(101)   
Ans:

         
ii.                  ii. (100110/110)+(110)
Ans:
b. Convert the following as indicated:
                                i.            (81)10 into binary
Ans:
                              ii.            (1000110)2 into hexadecimal
Ans:
3.      Match the following:
First web browser                                Dr Tim Berners Lee
WWW                                                  NCSA Mosaic
E-commerce                                        Search engine
Alta-vista                                             Online shopping
                                                            Opera
Ans:
First web browser        Ã                     NCSA Mosaic
WWW                          Ã                     Dr Tim Berners Lee
E-commerce                Ã                     Online shopping
Alta-vista                     Ã                     Search engine
4.      Replace the following definitions with a technical term.
a.       A type of computer virus that infects user’s documents.
è Macro virus
b.      Security measures in which eye vision is used in authentication.
è Biometrics
c.       The amount of data transmitted per second through a communication channel.
è Bandwidth
d.      The moral principle related to cyber space.
è Computer ethics
5.      Write down the full forms:
a.       ICT
b.      AVI
c.       DHCP
d.      BNC
Ans:
i. ICT: Information and Communication Technology
ii.    AVI: Audio Video Interleaved
iii.  DHCP: Dynamic Host Configuration Protocol
iv.  BNC: British Naval Connector
6.      Choose the best answer:
a.       Which is the computer virus?
i. W32.Tufik.E       ii. Spyware.SpMan       iii.Trojan.Cymdos        iv. All of them
è All of them
b.      CU-SeeMe is an example of:
i. Teleconferencing            ii. NOS iii. Videoconferencing             iv. All
è Video conferencing
c.       Which device is used for data transmission in dial-up internet?
i. MODEM ii. Network Interface Card       iii. Satellite       iv. Telephone line
è MODEM
d.      3D titles in games and movies are made using __________ technique.
i. MS-Word            ii. MS-Excel     iii. Multimedia             iv. Internet
è Multimedia
Group B (DBMS-10 marks)
7.      Answer the following questions:
a.       List any four advantages of DBMS.
Ans: Any four advantages of DBMS are:
i.         It controls redundancy, which means duplication of data.
ii.       Large volume of data can be stored and updated easily.
iii.     It allows sharing the existing database by different programs.
iv.     It provides high security as well as maintains accurate database.
b.      What is a form? Mention any two usage of report in MS-Access.
Ans: Form is an object of Ms-Access that provides user friendly interface to enter data in a table or multiple linked tables.
Any two usage of Ms-Access are:
i.          It presents data and information from table and query in flexible layout.
ii.        It helps to present data in printable format.
c.       Differentiate between select query and update query.
Ans: The difference between select query and update query are as follows:
Select Query
Update Query
·      Select query is used to select required fields and records from the table or another query
·      Update query is used to change data in one or more fields of all or selected records of the table.
·      Opening a Select Query does not make any change in the data of the table.
·      Opening an Update Query makes changes in the data of the table.
8.      State whether the following statements are true or false:
a.       Afield name refers to the category of information about a subject. True
b.      To insert picture or graph in a database we use OLE data type.True
c.       A database can be managed manually.True
d.      A person’s first name is often used as primary key.False
9.      Match the following:
Input mask                   specifies the range for entering data
Format                         specifies the alert message to be displayed
Validation Rule            specifies a pattern for all data
Validation Text            speeds up searching and sorting records
                                    specifies the appearance of the value
Ans:
Input mask                                Ã         specifies the appearance of the value
Format                                      Ã         specifies a pattern for all data
Validation Rule                        Ã         specifies the range for entering data
Validation Text                        Ã         specifies the alert message to be displayed

10.  Answer the following questions:
a.       What is a procedure? List its type.
è A block of statements which is used to divide a program into well-defined structures and fulfils the objective of the program.
Its types are:
·         FUNCTION procedure
·         SUB procedure
b.      What is C language?
è C is a middle level structured programming language that divided a program into many functions.
c.       Write down the function of: i) PRINT#     ii)EOF()
è The functions of:
i.      PRINT# : To write the data to the datafile.
ii.    EOF() : To detect the end of file marker reading from an open sequential file.
11.  Write the output of the following program:
DECLARE SUB PICTURE(ST$)
CLS
X$=”SCIENCE”
CALL PICTURE(ST$)
END
SUB PICTURE(S$)
T=20
P=4
N=1
FOR A=1 TO 4
PRINT TAB(T); MID$(ST$,P,N)
P=P-1
N=N+2
T=T-1
NEXT A
END SUB
Ans:
Output:
                             E
                            IEN
                         CIENC
                       SCIENCE
12.  Re-write the following program correcting the bugs:
REM to display records from 2nd position to 6th position
OPEN record.txt FOR INPUT AS #2
DO WHILE EOF(2)
INPUT #1, N, Add$, DOB$
C=C+1
IF C<=2 AND C>=6 THEN
PRINT N$, Add$, DOB$
END IF
LOOP
CLOSE #2
END
Ans:
REM to display records from 2nd position to 6th position
OPEN “record.txt” FOR INPUT AS #2
DO WHILE NOT EOF(2)
INPUT #2, N$, Add$, DOB$
C=C+1
IF C>=2 AND C<=6 THEN
PRINT N$, Add$, DOB$
END IF
LOOP
CLOSE #2
END
13.  Read the following program and answer the following questions:
DECLARE FUNCTION ADD(N)
CLS
FOR CNT= 1 TO 3
READ NUM
PRINT ADD(NUM)
NEXT CNT
DATA 8, 7, 3
END
FUNCTION ADD(N)
S=0
FOR G= 1 TO N
S=S+G
NEXT G
ADD=S
END FUNCTION
Questions:
a.       Name the actual and formal parameter used in above program.
è The actual parameter used in the above program is NUM and formal parameter used in the above program is N.
b.      What is the value of NUM when the value of CNT is 2?
è The value of NUM when the value of CNT is 2 is 7.
14.  Programming:
a.      WAP to accept length, breadth and height of a room in main module and calculate its area and volume using FUNCTION…..END FUNCTION.
è 
DECLARE FUNCTION AREA(L,B,H)
DECLARE FUNCTION VOLUME (L,B,H)
CLS
INPUT “ENTER LENGTH, BREADTH AND HEIGHT OF ROOM”; L,B,H
PRINT “THE AREA OF ROOM:”;AREA(L,B,H)
PRINT “THE VOLUME OF ROOM:”;VOLUME(L,B,H)
END
FUNCTION AREA(L,B,H)
A=2*(L*B+B*H+H*L)
AREA=A
END FUNCTION

FUNCTION VOLUME(L,B,H)
V=L*B*H
VOLUME=V
END FUNCTION
b.      Write a program that displays factorial of an input number using SUB….END SUB.
è 
DECLARE SUB FACT(N)
CLS
INPUT “ENTER ANY NUMBER”;N
CALL FACT(N)
END
SUB FACT(N)
F=1
FOR I = 1 TO N
F=F*I
NEXT I
PRINT “FACTORIAL OF”;N;”=”;F
END SUB
c.       A sequential data file “Nabil.txt” contains records of clients of a bank including depositor’s name, deposited amount, time and rate of interest. WAP to display detail of all depositors including simple interest.
è 
OPEN “Nabil.txt” FOR INPUT AS #1
CLS
PRINT “Name”, ”Amount”, ”Time”, ”Rate”, ”Simple Interest”
WHILE NOT EOF(1)
INPUT #1, N$,P,T,R
SI= P*T*R/100
PRINT N$, P,T, R, SI
WEND
CLOSE #1
END
BY : SARIKA SHRESTHA
JAGAT MANDIR HIGHER SECONDARY SCHOOL

No comments:

Post a Comment