Send-up Examination solved- 2066
PABSON
Send-up Examination-2066
Group A
Computer Fundamental (22 marks)
Send-up Examination-2066
Group A
Computer Fundamental (22 marks)
1. Answer the following questions:
a) What is LAN? What are its main objectives?
Ans:
A Local Area Network(LAN) is a small network of computers that are relatively near with each other within a small area like a room, building or within a short distance through wire or wireless media. Its main objectives are :
· To share the hardware resources, data as well as softwares.
· To reduce or control costs.
b) What is file transfer protocol? Why it is important?
Ans:
File Transfer Protocol is an Internet tool that allows the user to transfer file on one computer to another computer.
It is important because it is most commonly used to download a file from a server using the Internet or to upload a file to a server.
c) Multimedia technology makes classroom presentation more interactive. Explain
Ans:
Multimedia technology is very much useful in classroom. It helps to present the information about various topics in more interesting and interactive way which makes the learner easy to understand. It helps to give better ideas and concept to the students with good vocabulary.
d) What is a backup? Why is backup vital to computer security system.
Ans:
Backup is the system of copying data and programs into other location or creating duplicate copies of it’s in a secured place.
Backups are vital to computer security system to save the important data and programs from the accidental or intentional harm. When data and software are damaged or lost, we can recover from the backup copy. So, backup is vital to computer security system.
e) Write any four symptoms of computer virus. Ans: The four symptoms of computer virus are as follows:
§ Program takes long time to load.
§ Corrupts the system’s data.
§ Programs open automatically without getting instructions.
§ Renames the files with different names.
3. Match the following
Group A Group Ba) Duplex i) Online business
b) E-commerce ii) A network component
c) Router iii) Two way communication
d) Virus iv) One way communication
Group A Group Ba) Duplex i) Online business
b) E-commerce ii) A network component
c) Router iii) Two way communication
d) Virus iv) One way communication
Ans:
Group A Group B
i) Duplex - a) two way communication
ii) E-commerce - b) Online business
iii) Router - c) A network component
iv) Virus - d) Destructive Program
4. Choose the best answer:a) A …………… is the main line of defense between a local network, or intranet, and the Internet.
i) USB Port ii) Fire wall iii) Encryption key iv) None of the aboveAns: Firewall
i) USB Port ii) Fire wall iii) Encryption key iv) None of the aboveAns: Firewall
b) A ……………… is a someone who uses a computer and a network Internet connection to include to intrude into another computer or system to perform an illegal act.
i) hacker ii) Programmer iii) Terrorist iv) SpammerAns: Hacker
i) hacker ii) Programmer iii) Terrorist iv) SpammerAns: Hacker
c) ………… means any kind of multi way communication carried out in real time using telecommunications or computer network equipment.
i) Videoconferencing ii) Data-conferencing iii) Teleconferencing iv) Serial conferencing
i) Videoconferencing ii) Data-conferencing iii) Teleconferencing iv) Serial conferencing
Ans: Videoconferencing
d) Each computer on the Internet has a unique numeric address called a ………..
i) domain address ii) protocol address iii) IP addressAns: IP address
i) domain address ii) protocol address iii) IP addressAns: IP address
5. Give appropriate technical terms for the following:a) Device which boots the strength of the received signal and retransmits it.Ans: Repeater
b) Number of bits transfer per second using network.Ans: Bandwidth
c) The artificial environment created by computer technology to entertain user.Ans: Virtual Reality
d) Type of network architecture that doesn’t specify a server and workstation.Ans: Peer-to-Peer Network
6. Write the full forms of:a)VSAT- Very Small Aperture Terminal
b) VOIP- Voice Over Internet Protocol
c) NAT - Network Address Translation
d) BBS- Bulletin Board System
Group B
Database (10 marks)
Database (10 marks)
7. Answer the following questions:
a) Define database. Give an example of database.
Ans:
Database is a collection of related and organized information that is used to store, organize and extract data. Example: Telephone directory, dictionary etc.
b) Define primary key. Give its types.
Ans:
Primary key is a field that uniquely identifies the record, it is needed because it neither accepts duplicate value nor null value. Its types are:
1. Composite key
2. Foreign key
c) What is query? Mention its types.
Ans:
Query is an object of MS-Access which allows selecting specific data from one or more tables. Its types are:
3. Select query
4. Action Query
8. Select the best answer:a) Record of the table is also known as:
i) Tuple ii) Field iii) Text iv) AllAns: Tuple
i) Tuple ii) Field iii) Text iv) AllAns: Tuple
b) The column in access table is ……….
i) Field ii) Record iii) Query iv) NoneAns: Field
i) Field ii) Record iii) Query iv) NoneAns: Field
c) The logical data types of Access is
i) Yes/No ii) Record iii) Query iv) NoneAns: Yes/No
i) Yes/No ii) Record iii) Query iv) NoneAns: Yes/No
d) …………… accelerates the Query and sort operations.
i) Index ii) Sort iii) Number iv) FilterAns: Index
i) Index ii) Sort iii) Number iv) FilterAns: Index
9. Match the following:
Group A Group Ba) Data Integrity i) Smart tag
b) Automatic ii) Validation Rule
c) Field Properties iii) Caption
d) Label for field iv) Indexed
v) Default Value
Group A Group Ba) Data Integrity i) Smart tag
b) Automatic ii) Validation Rule
c) Field Properties iii) Caption
d) Label for field iv) Indexed
v) Default Value
Ans:
Group A Group Ba) Data Integrity - Validation Rule
b) Automatic - Default value
c) Field properties - Indexed
d) Label for field - Caption
b) Automatic - Default value
c) Field properties - Indexed
d) Label for field - Caption
Group C
Programming (18 marks)
Programming (18 marks)
10. a) What do you mean by parameter?
Ans: Variables in sub module or a procedure declaration which accept data or variables passed to them from the calling module are known as parameters.
b) Mention two characteristics of ‘C’ language.
Ans: The characteristics of C language are:
· It is simple and easy to use.
· It occupies less memory space.
c) Write down the function of the following statements:
i) COMMON SHARED ii) KILL
i) COMMON SHARED ii) KILL
Ans: The function of:
i. COMMON SHARED : It is used to declare global variable in main module.
ii. KILL: It deletes the file or files from the specified drive and directory.
11. Write the output of the given program: DECLARE SUB RESULT()
CLS
CALL RESULT
END
SUB RESULT()
W$=”SCIENCE”
L=LEN(W$)
X=1: Y=3
FOR I = 1 TO L STEP 2
PRINT TAB(Y) ; MID$(W$,X,L)
X=X+1
L=L-2
Y=Y+1
CLS
CALL RESULT
END
SUB RESULT()
W$=”SCIENCE”
L=LEN(W$)
X=1: Y=3
FOR I = 1 TO L STEP 2
PRINT TAB(Y) ; MID$(W$,X,L)
X=X+1
L=L-2
Y=Y+1
NEXT I
END SUB
END SUB
12. Rewrite the following program after correcting the bugs:DECLARE SUB RESULT()
DIM N(10)
CLS
FOR J = 1 TO 10
INPUT “Enter any number”; X(J)
LOOP
PINT “Sum of Even numbers”; SUMEVEN(())
END
FUNCTION SUMEVEN(N())
S=0
FOR K = 1 TO 10
IF N(K) MOD 2=0 THEN
S=S+N(K)
END
NEXT K
S=SUMEVEN
ENDFUNCTION
DIM N(10)
CLS
FOR J = 1 TO 10
INPUT “Enter any number”; X(J)
LOOP
PINT “Sum of Even numbers”; SUMEVEN(())
END
FUNCTION SUMEVEN(N())
S=0
FOR K = 1 TO 10
IF N(K) MOD 2=0 THEN
S=S+N(K)
END
NEXT K
S=SUMEVEN
ENDFUNCTION
Ans:
DECLARE SUB RESULT()
DIM N(10)
CLS
FOR J = 1 TO 10
INPUT "Enter any number"; X(J)
NEXT J
PRINT "Sum of Even numbers"; SUMEVEN(N())
END
FUNCTION SUMEVEN (N())
S = 0
FOR K = 1 TO 10
IF N(K) MOD 2 = 0 THEN
S = S + N(K)
END IF
NEXT K
SUMEVEN = S
END FUNCTION
13. Study the following program and answer the following questions:
13. Study the following program and answer the following questions:
OPEN “DETAIL.DAT” FOR INPUT AS #1
OPEN “TEMP.DAT” FOR OUTPUT AS #2
INPUT “Name of the student”; NM$
FOR I = 1 TO 10
INPUT #1, N$,C,A
NEXT I
CLOSE #1,#2
KILL “DETAIL.DAT”
NAME “TEMP.DAT” AS “DETAIL.DAT”
END
OPEN “TEMP.DAT” FOR OUTPUT AS #2
INPUT “Name of the student”; NM$
FOR I = 1 TO 10
INPUT #1, N$,C,A
NEXT I
CLOSE #1,#2
KILL “DETAIL.DAT”
NAME “TEMP.DAT” AS “DETAIL.DAT”
END
a) What is the main objective of the above program?
Ans: The main objective of above program is to delete the record of supplied name of student.
b) If the data file “DETAIL.DAT” contains only 8 record, then the program will run? If not then what will be the error message?
Ans: The error message will be displayed as “INPUT PAST END OF FILE”.
14. a) Write a program to input age of the voters and check whether they can cast the vote or not. Using SUB-END SUB.
Ans:
DECLARE SUB CHECK(N)
CLS
INPUT ”Enter age of voter”; N
CALL CHECK(N)
END
SUB CHECK(N)
IF N> = 18 THEN
PRINT “You can cast vote.”
ELSE
PRINT “You cannot cast vote.”
END IF
END SUB
b) Write a program to create a user defined function to input a number and check if it is multiple of 5 or not.
Ans:
DECLARE FUNCTION CHECK$(N)
CLS
INPUT “Enter any number”; N
PRINT N; “is” ; CHECK$(N)
END
FUNCTION CHECK$(N)
IF N MOD 5 = 0 THEN
CHECK$ = “multiple of 5”
ELSE
CHECK$ = “not multiple of 5”
END IF
END FUNCTION
c) ) Write a program to create a sequential data file “RESULT.DAT” to store name, address and marks obtained in 3 different subjects of students.Ans:
OPEN “LIB.TXT” FOR OUTPUT AS #1
DO
CLS
INPUT “Enter name”; N$
INPUT “Enter address”; A$
INPUT “Enter marks in three subjects”; M1, M2, M3
WRITE #1, N$, A$, M1, M2, M3
INPUT “Do you want to continue?”; CH$
LOOP WHILE UCASE$(CH$) = “Y “
CLOSE #1
END
***
No comments:
Post a Comment