Wednesday, April 10, 2019

SEE 2075 (2019) [State 2] Computer Science Solved


SEE 2075 (2019) [State 2]
Computer Science Solved
Group A
Computer Fundamentals (22 Marks)
1. Answer the following questions:
a) Write any two advantage and disadvantage of computer network.
Advantages of  Computer Network
a)    Computer in a network can access the network-connected hardware devices like printers, disk drives, etc.
b)    Data in a network environment can be updated from any computer. Updated data can be accessed by all computers on the network.
Disadvantages of  Computer Network
a)    The sharing of information may leak the privacy of other clients.
If any computer system in a network gets affected by computer virus, there is a big chance of spreading computer viruses on other computers on the network.
b) Define E-mail.
E-mail (Electronic mail) is one of the most popular services provided by the internet which sends and receives mail through the internet. 
c) What is cyber law?
The law which governs the legal issues in the cyber space regarding the internet or WWW for digital data processing and transaction is called cyber law.
d) What is computer security? List any two ways of software security.
The security given to the computer for the protection of hardware, software and data from being lost or damaged due to accidental or intentional harm is known as computer security.
Any two software security measures are:
i) Backup
ii) Scandisk
d) How password secure the data?
Password secures the data by giving access to the authorized person only.
e) Write any two ways in which computer virus gets transmitted.
Any two ways in which computer virus gets transmitted
i) Sharing infected internal portable disk like floppy disk, pen drive, CDs, etc.
ii) Opening a virus infected email, messages and attached files
2. a) Perform the conversion  as per the direction:
i) (FA)16 into binary
Soln:
Converting hexadecimal to binary
F = 1111
A = 1010

(FA)16 = (11111010)2


ii) (420)10 into octal
Soln:
Converting decimal to octal
8
420
Rem
8
52
4
8
6
4

0
6

(420)10 =(644)8

b) Perform the binary calculation:
i) 111×10
Soln:

1
1
1


×
1
0


0
0
0

1
1
1
x

1
1
1
0


111×10 = 1110
ii) 1101 ÷ 101
Soln:
101)
 1101(
10

-101


     11


    -  0


     11


Q=10
R=11
3. Match the following:
Group A                          Group B
a)    Back up                 i) online shopping
b)    Microphone           ii) duplicate
c)    Web browser         iii) damage of corrupt data
d)    E-Commerce          iv) multimedia
                                        v) display of web pages
Answers
Group A                          Group B
a)    Back up                 i) duplicate
b)    Microphone           ii) multimedia
c)    Web browser         iii) display of web pages
d)    E-Commerce          iv) online shopping
                                         
                                       
4. State whether the following statements are true or false:
a) Router provides power backup if there is power cut in the network system. False
b) Boot sector virus infects the program files. False
c) In BUS network topology, nodes are connected in a single wire. True
d) Sound card in one of the component of multimedia. True
         

5. Write the appropriate technical terms of the following:
a) The device which is used to connect two dissimilar network topology. Gateway
b) Committing crime using computer and internet. Cyber Crime
c) The process of sending file from user’s computer to web server. Upload
d) The integration of text, audio and animation. Multimedia
6. Write the full form:
i) ADSL – Asymmetric Digital Subscriber Line
ii) WAN – Wide Area Network
iii) HTTP  – Hyper Text Transfer Protocol
iv) ICT  – Information and Communication Technology
Group B
Database
7a. Differentiate between fields and records with an example.
Field
Record
i) A column in a table is called field, and it contains a specific piece of information within a record.
i) Record is a collection of multiple related fields in a row which gives complete information about a person or thing.
ii) E.g.: Name, Address, Telephone
ii)E.g.: Ram Chabahil 4468790
b. Define data type. Name any two data types used in MS-Access.
Data type is an attribute for a field that determines what type of data it can contain.
Ans: Any two  data types of MS-Access are:
i) Text
ii) Number
c. What is a query?
Query is an object of Ms-Access which extracts and arranges information from a table in a manner that is specified.

8.  Select the correct answer.
a) Record of the table is also known as …….
          i) Tuple       ii) Field        iii) Number            iv) All
b) ……accelerated the data and makes the search operation fast.
          i) Index       ii) sort          iii) Number            iv) Filter
c) MS-Access is a ……………software.
          i) Word Processing          ii) DBMS    iii) Spreadsheet      iv) Web
d) The default field size of “Auto Number” data type is ………
          i) Byte          ii) Integer     iii) Long Integer   iv) Double
9. Match the following:
Group A                          Group B
a)    Table                     i) Printed Format
b)    Primary Key           ii) Allows viewing, editing and inputting data
c)    Form                      iii) uniquely defined
d)    Report                    iv) stores data
v) Extracts selected record for view
Answers:
Group A                          Group B
a)    Table                     i) stores data
b)    Primary Key           ii) uniquely defined
c)    Form                      iii) Allows viewing, editing and inputting data
d)    Report                    iv) Printed Format


Group C
Programming (18 Marks)
10 a. Define global and local variables.
Ans: Variables which are declared outside the procedure and can be accessed from any procedure or module are called global variables. Variables which are declared inside the procedure and  its value is protected from outside interference and has no effect on the variables outside the procedures are called local variables
b. Write any two characteristics of ‘C’ Language.
Ans: The two characteristics of ‘C’ language are:
i) It is a high level language with some features of low level language.
ii) It is mostly used to prepare system software.
.  
c. Write the function of the following command / statements:
i) INPUIT#: It reads data from the sequential data file.
ii) EOF ( ): It detects the end of the file marker reading the data from an open sequential file.

11. Write the output of the following program:
DECLARE FUNCTION SQD(N)
CLS
S = 0
FOR L = 1 TO 3
    READ NUM
    S = S + SQD(NUM)
NEXT L
PRINT "Sum"; S
DATA 2,4,6
END
FUNCTION SQD (N)
SQD = N ^ 2
END FUNCTION


OUTPUT
Sum 56
13. Study the following program and answer the given questions:
DECLARE SUB TRIM(W$)
CLS
INPUT "Enter word"; WO$
CALL TRIM(WO$)
END
SUB TRIM (W$)
FOR I = 1 TO LEN(W$)
    PRINT LEFT$(W$, I)
NEXT I
END SUB

a)    What will be the maximum value of I if input string is “SEE” in the above program?
Ans: The maximum value of I will be 1 to 3 if input string is “SEE” in the above program.
b)    List the real parameter used in the above program.
Ans: The real parameter used in the above program is WO$.
14a. Write a program to calculate and return total surface area of a box  using FUNCTION – END FUNCTION. [Hint: A = 2(lb+lh+bh)
DECLARE FUNCTION TSAREA (L, B, H)
CLS
INPUT “ENTER LENGTH”; L
INPUT “ENTER BREADTH”; B
INPUT “ENTER HEIGHT”; H
PRINT “TOTAL SURFACE AREA OF BOX”; TSAREA(L, B, H)
END

FUNCTION TSAREA (L, B, H)
TSAREA = 2 * (L * B + B * H + H * L)
END FUNCTION

   

b. Write a program using a SUB procedure module to print the multiplication table of any input number up to 10th term.
DECLARE SUB MUL (N)
CLS
INPUT "ENTER ANY NUMBER"; N
CALL MUL (N)
END
SUB MUL (N)
FOR I = 1 TO 10
PRINT N; "X"; I; "="; N * I
NEXT I
END SUB

c. Write a program to create a sequential data file “salary.data” to store programmer’s Name, salary and post according to the need of the user.
OPEN “SALARY.dat” FOR OUTPUT AS #1
DO
CLS
INPUT “Enter Name”; N$
INPUT “Enter salary”; S
INPUT “Enter Post”; P$
WRITE #1, N$, S, P$
INPUT “Do you want to continue(Y/N)”; CH$
LOOP WHILE UCASE$(CH$)=”Y”
CLOSE #1
END


***

2 comments: