Sunday, May 9, 2021

COMPUTER SCIENCE - TRITON SEE Model Question (Set-I) Solved

 

COMPUTER SCIENCE

TRITON - SEE Model Question (Set-I) Solved

Time: 1:30 hours F.M.: 75

Group A

1. Answer the following questions:               [5x2=10]

 

a. What is a data transmission mode? Differentiate between peer to peer and client server network architecture.

Ans: Transmission mode refers to the mechanism of transferring of data between two devices connected over a network.

Client-Server Network

Peer-to-Peer Network

It consists of at least one server

 and one or more client.

It is a group of computers which function 

both as server and workstation.

It provides high security of 

data and other resources.

It provides no reliable security and 

might put data under risk.

 

b. What are search engines? List any two services provided by the Internet.

Ans: A search engine is a website through which users can search internet content.

Any two services provided by the Internet are E-Commerce and E-mail.

 

c. What is a computer Crime? List any two disadvantages of multimedia.

Ans: Computer crime is a criminal activity done by using computers and the internet.

Any two disadvantages of multimedia are:

·       Multimedia requires electricity to run, which adds to the cost of its use.

·       Creating multimedia requires more time.

 

d. Define Software Piracy. List out any hardware security measures.

Ans: Software piracy is the unauthorized use, copying or distribution of copyrighted software.

Any two hardware security measures are insurance and Regular Maintenance

 

e. Define boot sector virus. Mention any two precaution methods to avoid virus infection.

Ans: A boot sector virus is a type of virus that infects the boot sector of floppy disks or the Master Boot Record (MBR) of hard disks

Any two precaution methods to avoid virus infection are

·       Scan the mail or unknown files of internet before opening in your computers.

·       Use a good antivirus program to scan floppy disk, CD, etc. before copying.

2. a. Convert as instructed:                          [2x1=2]

(i) (101)8 into binary             (ii) (CAB)16 into decimal

b. Perform binary operation.                        [2x1=2]

(i) (101*11)÷10                                  (ii) 10110 1011

 




3. Match the following pairs:                        [4x0.5=2]

Group A                           Group B

a)     RJ-45                          b) work station

b)     Node                           c) Protocol

c)     HTTP                          Coaxial cable

d)     Server                         a) connector

d) Host computer

           

4. Select the correct answer:                        [4x0.5=2]

a. Online medium of communication is ………..

(i) Chatting                 (ii) email                     (iii) efax                      (iv) all of the above

b. Which of the following terms defines a meaningful speech in any language?

(i) Video                     (ii) sound                    (iii) text                      (iv) animation

c. The activity of breaking into a computer system to gain an unauthorized access

is………

(i) Password                (ii) hacking                 (iii) Ethics                  (iv) None of the above

d. Any electrical or electronic device that maintains the voltage of a power source

within acceptable limits.

(i) Voltage stabilizer (ii) Surge suppressor  (iii) UPS                     (iv) Voltage regulator

 

5. Give appropriate technical terms of the following: [4x0.5=2]

a. A network computer that shares resources with and responds to requests from other network computer, including other servers. Server

b. A device that connects two computer network that use different protocols. Gateway

c. A set of rules and procedures that govern transmission of messages. Protocol

d. The physical layout of local area network. LAN Topology

 

6. Write full forms:                                        [4x0.5=2]

(a) Modem – Modulator - Demodulator

(b) GPL - General Public License

(c) DNS - Domain Name System

(d) IRC – Internet Relay Chat

 

Group 'B'

Database [10 marks]

 

7. Answer the following questions.               [3x2=6]

 

a. What is data redundancy? List any two uses of form.

Ans: Data redundancy is defined as the storing of the same data in multiple locations.

Any two uses of form are:

·       It provides an interactive platform for input of data into the database.

·       It helps to display data in more presentable form than a datasheet.

 

b. Mention any four data types that can be used in MS-access.

Ans: Any four data types that can be used in MS-access are text, memo, number and Yes/No.

 

c. What is a validation rule and referential integrity?

Ans: A field property which enables to limit values that can be accepted into a field is known as validation rule.

Referential integrity is a set of rules used by RDBMS to make sure that the relationships between tables are valid and that the related data is not accidentally changed or deleted.

 

8. State whether the following statements are TRUE or FALSE. [2]

a. Graphics can also be stored in ms-access database. True

b. A form is object of ms-access used entering data. True

c. Validation rule is used to set data entry criteria. True

d. The data filter selects the required records and displays the result. True

 

9. Match the following pairs: [4x0.5=2]

Group A                             Group B

a)     Primary key                  single entry

b)     Records                        d) reference key

c)     Report                          a) unique and not null

d)     Foreign key                  b) a complete information

c) Final output

Group 'C'

Programming [18 marks]

 

10. Answer the following questions in short. [3X1=3]

 

a. What is global variable?

Ans: A global variable is a variable whose values can be accessed from any procedure or module.

 

b. Write any two features of c language.

Ans: Any two features of c language are:

·       It is a high level language with some features of low level language.

·       It is mostly used to prepare system software.

c. What is user-defined function?

Ans: Function which is defined by the user according to the need is called user defined function.

 

11. Write the output of the given program: [2]

DECLARE SUB result()

CALL result

END

SUB result ()

N=5

C=1

WHILE C<=5

PRINT N

N=N*10+5

C=C+1

WEND

END SUB

 

Dry Run

Variable

Variable

Condition Check

Output

N

C

C<=5

 

5

1

1<=5 Yes

5

55

2

2<=5 Yes

55

555

3

3<=5 Yes

555

5555

4

4<=5 Yes

5555

55555

5

5<=5 Yes

55555

555555

6

6<=5 No Loop Exits

 

 

 

Output

5

55

555

5555

55555

 

 

 

 

 

 

 

12. Re-write the given program after correcting the bugs: [2]

REM to find square root of the first five natural numbers

CLS

DECLARE FUNCTION SQROOT(D)

FOR K=1 TO 5

A= SQROOT(K)

PRINT “SQUARE ROOT”;K;”=”;K

NEXT LOOP

END

 

FUNCTION SQROOT(D)

SQROOT=SQR(K)

END

 

Debugged

REM to find square root of the first five natural numbers

CLS

DECLARE FUNCTION SQROOT(D)

FOR K=1 TO 5

A= SQROOT(K)

PRINT “SQUARE ROOT”;K;”=”;A

NEXT K

END

 

FUNCTION SQROOT(D)

SQROOT=SQR(D)

END FUNCTION

 

13. Study the following program and answer the given questions: [2x1=2]

OPEN “record.dat” for INPUT AS #1

WHILE NOT EOF(1)

INPUT #1,N$,AD$,PH#

PRINT N$,AD$,PH#

WEND

CLOSE #1

END

 

a. What is the purpose of EOF(1) in the above program?

Ans: The purpose of EOF(1) in the above program to detect the end of the file marker reading the data from an open sequential file.

 

b. What happens if we are not using open statement in the above program?

Ans: If we are not using open statement in the above program then it displays error message as “Bad file name or number Continue?”

 

14. a. Write a program using SUB procedure to input any number and find whether an entered number is prime or composite. (3)

 

DECLARE SUB PRIME (N)

INPUT "Enter any number"; N

CALL PRIME (N)

END

 

SUB PRIME (N)

C = 0

FOR I = 1 TO N

IF N MOD I = 0 THEN C = C + 1

NEXT I

IF C = 2 THEN

PRINT “The given number is prime number"

ELSE

PRINT “The given number is composite number"

END IF

END SUB

 

b. Write a program using FUNCTION..END FUNCTION procedure to check whether an input word is palindrome or not. (3)

 

DECLARE FUNCTION REV$ (S$)

CLS

INPUT "Enter any word"; S$

C$ = REV$(S$)

IF S$ = C$ THEN

PRINT  “The input word in palindrome”

ELSE

PRINT “The input word in not palindrome”

END IF

END

 

FUNCTION REV$ (S$)

FOR I = LEN(S$) TO 1 STEP -1

B$ = MID$(S$, I, 1)

W$ = W$ + B$

NEXT I

REV$ = W$

END FUNCTION

 

c. Write a program in APPEND mode to add some more records in a data file “abc.dat” having following fields: patient’s name, age and address. (3)

 

            OPEN “abc.dat”  FOR APPEND AS #1

DO

CLS

INPUT “Enter patient’s name”; N$

INPUT “Enter age”; A

INPUT “Enter address”; C$

WRITE #1, N$, A, C$

INPUT “Do you want to add more records(Y/N)”; D$

LOOP WHILE UCASE$(D$)=”Y”

CLOSE #1

END

 

 

***

 





1 comment: