SEE 2073
Computer Science
1. Answer the following questions.
a) Write any two
advantages of BUS topology.
Ans: The advantages of bus topology are:
It is easy to set up computers and other devices in bus
topology, because all the devices are connected through a single wire.
It requires fewer cable media, so it is cheaper than
other topologies.
b) Define computer
security.
Ans: The security given
to the computer for the protection of hardware, software and data from being
lost or damaged due to accidental or intentional harm is known as computer
security.
c) Write any two
preventive measures to protect computer system from computer virus.
Ans: Any two preventive
measures are:
i) Do not install
pirated software, especially computer games
ii) Scan the mail or
unknown files of internet before opening in your computers.
d) What is multimedia?
Ans: Multimedia is the integration of multiple forms of
media, which presents information in more interesting and understandable way.
e) Write the
use/function of File Transfer Protocol.
Ans: The use of File
Transfer Protocol is to transfer the file from one computer to another
computer. It helps to upload and download the files.
2. a) Perform the conversion as per
the direction:
i) (BAD)16 into binary
Soln:
Converting Hexadecimal to Binary
B = 1011
A = 1010
D = 1101
(BAD)16 = (101110101101)2
ii)
(1111001)2 into octal
Soln:
Converting
Binary to octal
001
= 1
111
= 7
001
= 1
(1111001)2
= (171)8
b) Perform the binary calculations:
i) 11 × 10 + 11
1
|
1
|
|
×
|
1
|
0
|
0
|
0
|
|
1
|
1
|
×
|
1
|
1
|
0
|
Now,
Adding with 11
1
|
0
|
||
+
|
1
|
1
|
|
1
|
0
|
0
|
1
|
11 × 10 + 11 = 1001
ii) 110 ¸ 10
10)
|
110 (
|
11
|
-10
|
||
10
|
||
10
|
||
00
|
Quotient = 11
Remainder = 00
3. Match the following:
a) Malicious
software i) UPS
b) Primary storage
device ii) virus
c) Power protection Device iii)
copyright
d) Intellectual
property law iv) RAM
v) CD-ROM
Answer
a) Malicious
software virus
b) Primary storage
device RAM
c) Power protection
Device UPS
d) Intellectual
property law copyright
4. State whether the following
statements are true or false:
a) Computer Network
reduces the cost. True
b) WWW is an
organization which controls Internet. False
c) Microwave
transmission is an example of bound media. False
d) The parts of the
computer which can be seen and touched are called hardware. True
5. Write the appropriate technical
terms of the following:
a) A type of network in
which every computer works as both client and server.
Ans: Peer-to-peer
network
b) Protocol used to
receive email from the mail server.
Ans: POP( post office
protocol)
c) The moving graphics
images.
Ans: Animation
d) The law that
controls cyber crimes.
Ans:
Cyber Law
6. Write the full forms:
a) LAN: Local Area
Network.
b)ROM: Read Only
Memory.
c) SMTP: Simple Mail
Transfer Protocol.
d)NOS: Network
Operating System.
7. Answer the following questions.
a) Define data and
database.
Ans: Data can be numbers, letters or symbols representing
facts and figures which may or may not give any sense. Database is a collection
of related and organized information that can be used for different purpose.
b) What is primary key?
Write its importance.
Ans: Primary key is a
field that uniquely identifies the record. It is needed because it neither
accepts duplicate values nor permit null values.
The importance of
Primary key are:
i) To reduce and control duplication of record in a table.
ii) To set the relationship between tables.
i) To reduce and control duplication of record in a table.
ii) To set the relationship between tables.
c)
Name any four data types used in MS-Access.
Ans: Any four data types of MS-Access are:
i) Text
ii) Number
iii) Memo
iv) Currency
i) Text
ii) Number
iii) Memo
iv) Currency
8. Select the correct answer:
a) The columns in a
database table are called………………………
Ans: Field
b) Which is the
suitable data type to store video?
Ans: OLE object
c) …………… object of
MS-Access is used to print formatted data.
Ans: Report
d) Which is not a type
of query?
Ans: Search
9. Match the following:
a) Query i)
Printed format
b) Form ii) Stores data
c) Table iii) Allows view, edit,
input data
d) Report iv)
Extracts selected record for view
v) DBMS
Answer
a) Query Extracts
selected record for view
b) Form Allows view, edit, input
data
c) Table Stores data
d) Report Printed
format
10.
a) What is a loop?
Ans: Loop can de
defined as repeating the statement of statement blocks for a number of times.
b) Write the functions of NAME and CLOSE statements.
Ans: The function of NAME statement is to renames a file on a diskette. The function of CLOSE statement is to close
one or all open files.
c)
What is variable?
Ans:
The data item whose value changes during the execution of a program is called
variable.
11. Re-write the given program
after correcting the bugs:
DECLARE SUB SUM(N)
INPUT “Any Number”; N
PRINT SUM(N)
END
SUB SUM (N)
S=0
WHILE N=0
R= R MOD 10
S=S+R
N=N/10
WEND
PRINT “Sum of digits”;S
END
Debugged Program
DECLARE SUB SUM(N)
INPUT “Any Number”; N
CALL
SUM(N)
END
SUB SUM (N)
S=0
WHILE N< >0
R= N MOD 10
S=S + R
N=N \ 10
WEND
PRINT “Sum of digits”;S
END
12. Write the output of the
following program.
DECLARE FUNCTION AREA
(L, B)
CLS
LET L = 50
LET B = 10
LET ans = “; ans
PRINT “The area=”; ans
END
FUNCTION AREA (L, B)
Ar=L*B
AREA=ar
END FUNCTION
Output
The area = 500
13. State the following program and
answer the given questions:
DECLARE FUNCTION
Diff(A, B)
CLS
INPUT “Enter first
number”; A
INPUT “Enter second
number”; B
PRINT “The difference”;
Diff(A, B)
END
FUNCTION Diff(A, B)
Difference= A – B
Diff = difference
END FUNCTION
List
all the numeric variables used in the above program.
Ans: The numeric
variables used in the above program are A, B and Difference
List
the local variables used in the above program.
Ans: The local
variables used in the above program is A, B and Difference
14
a) Write a program to calculate the
area of four walls using Sub….End Sub. [Hint: Area=2H(L+B)
DECLARE SUB AREA (L, B, H)
CLS
INPUT “ENTER LENGTH”; L
INPUT “ENTER BREADTH”; B
INPUT “ENTER HEIGHT”; H
CALL AREA (L, B, H)
END
SUB AREA (L, B, H)
A = 2 * H * (L + B)
PRINT “AREA OF FOUR WALLS”; A
END SUB
b) Write a program to input a word
in the main module and count the total number of vowel characters present in
the word using FUNCTION…END FUNCTION.
DECLARE FUNCTION COUNT (S$)
CLS
INPUT "ENTER ANY STRING"; S$
PRINT "TOTAL NO. OF VOWELS= "; COUNT(S$)
END
FUNCTION COUNT (S$)
VC = 0
FOR I = 1 TO LEN(S$)
B$ = MID$(S$, I, 1)
C$ = UCASE$(B$)
IF C$ = "A" OR C$ = "E" OR C$ =
"I" OR C$ = "O" OR C$ = "U" THEN
VC = VC + 1
END IF
NEXT I
COUNT = VC
END FUNCTION
c) Create a data file to store the
records of few employees having Name, Address, Post, Gender and Salary fields.
OPEN “std.rec” FOR OUTPUT AS #1
DO
CLS
INPUT “Enter Name”; N$
INPUT “Enter Address”; A$
INPUT “Enter Post”; P$
INPUT “Enter gender”; G$
INPUT “Enter Salary”; S
WRITE #1, N$, A$, P$, G$, S
INPUT “Do you want to continue”; CH$
LOOP WHILE UCASE$(CH$)=”Y”
CLOSE #1
END