SOLVED PABSON SEE PRE QUALIFYING EXAMINATION 2082
(Group ‘A' 10×1=10)
1.
Answer the
following questions in one sentence: (6×1=6)
a) Define
network protocol.
A set of
rules followed for interconnection and communication between computers in a
network is called a protocol.
b) List
some areas where AI can help us.
Some areas
where AI can help us are:
v Healthcare - Medical diagnosis and
treatment planning
v Finance - Fraud detection and
prevention
c) What is
the size of YES/NO field in MS-Access?
The size of
YES/NO field in MS-Access is 1 bit.
d) Write
any two examples database management system?
Any two
examples database management system are MS Access and Oracle.
e) What is
the use of EOF( ) function?
The use of
EOF( ) function to check whether the record pointer reaches at end of file or
not.
f) Write
any two format specifier used in C language.
Any two format
specifier used in C language are :
%d (int) and
%f (float)
2. Write appropriate technical term for the following: (2×1=2)
a) A device
that connects two dissimilar networks. Gateway
b) Delivery
of different services through the internet. Cloud Computing
3. Write the full form of the following: (2×1=2)
a) G2B=Government
to Business
b) TCP/IP =Transmission
Control Protocol/Internet Protocol
(Group ‘B' 12×2=24)
4. Answer the following questions: (9×2=18)
a) Differentiate
between LAN and WAN (any two points).
The
difference between LAN and WAN are:
|
LAN |
WAN |
|
A LAN (Local Area Network) is a
network that connects computers and devices within a small area, like a home,
office, or school. |
Wide Area Network is a network that is extended to a large
area i.e. world in which computers are connected through wireless technology
or media as satellite communication. |
|
Computer lab networking and cyber networking are examples
of LAN. |
nternet, 4G Mobile Broadband Systems and satellite
communication are the best examples of WAN. |
b) What is
cybercrime? Write two examples of cybercrime.
Cybercrime
refers to illegal activities carried out using computers, networks, or the
internet, such as hacking, identity theft, online fraud, and spreading
malicious software.
Any two
examples of cybercrime are: phishing and hacking.
c) What is
firewall? Why is it important in network security?
A firewall is
a security system that monitors and controls incoming and outgoing network
traffic to protect systems from unauthorized access and cyber threats.
It is
important in network security because
v Prevents
unauthorized users from accessing a network or computer system.
v Controls
and filters incoming and outgoing network traffic based on security rules.
d) Mention
any two benefits and any two limitations of e-commerce.
Any two benefits of E-commerce
·
E-commerce allows to shop 24/7 from anywhere
with an internet connection.
·
Quickly compare products, prices, and reviews
before buying.
Any two limitations of E-commerce
·
Lack of personal touch. We cannot touch the
goods physically.
·
We cannot do any transaction without Internet
access device. So, it is heavily dependent on Internet technologies
e) What is
virtual reality? List any two advantages of it.
Virtual
reality (VR) is a technology that creates a simulated environment, allowing
users to immerse themselves in a three-dimensional (3D) world that they can
interact with.
Any two advantages of Virtual Reality:
v VR makes
playing games and exploring places more exciting because it feels real.
v VR helps
students learn by letting them explore virtual ancient cities or cells.
f) What
are field properties? Name any four of them.
Field
properties are settings or attributes that allow users to control various
aspects of data entry, validation, formatting, and behavior within the
database.
Any four
field properties are:
Validation rule,
Validation text, Caption, Format
g) What
are validation text and validation rules?
Validation Text is a field
property which displays an error message that appears if the data entered is
invalid according to the specified validation rule.
h) What is
query? List the different type of query.
Query is an
object of database that is used to view, retrieve, change and analyze records
from a table or multiple linked tables based on specified condition.
Its
types are select query and action query.
Select query
Action
query - Append Query, Update Query, Delete Query, - Make Table Query
i)
What is the importance of forms and reports in
MS-Access.
The importance of form is to provide
graphical interface to view, modify and add data in a table or multiple linked
tables.
The importance of report is to present information in an effective and
organized format that is ready for printing.
5. Write
down the output of the given program.\Show with dry run in table. (2)
DECLARE SUB
Show (ABC$)
CLS
ABC$=”MAZNEGBT”
CALL Show
(ABC$)
END
SUB Show
(ABC$)
Y=48
FOR I=1 TO 4
N=Y MOD 7
PRINT
MID$(ABC$, N, 1)
Y = Y – 1
NEXT I
END SUB
|
ABC$ Y=48
I N OUTPUT MAZNEGBT 47 1 6 G 46 2 5 E 45 3 4 N 44 4 3 Z |
The output of the program is
G
E
N
Z
6. Re-write the given program after correcting the bugs: (2)
REM to count
total no. of passed student
WHILE NOT
EOF( )
OPEN
“pab.txt” FOR OUTPUT AS#1
INPUT#2,ID,M1,M2,M3
IF M1>=32,
M2>=32, M3>=32 THEN
X=X+1
END IF
WEND
PRINT
"TOTAL RECORD";X
END
Debugged Program
REM to count total no. of passed student
OPEN
“pab.txt” FOR INPUT AS#1
WHILE NOT EOF(1)
INPUT#1,ID,M1,M2,M3
IF M1>=32
AND M2>=32 AND M3>=32 THEN
X=X+1
END IF
WEND
PRINT
"TOTAL RECORD";X
CLOSE
#1
END
7. Study the following program and answer the given questions:
(2×1=2)
DECLARE
FUNCTION TOT(N$)
INPUT
"Enter a word"; R$
X=TOT(R$)
PRINT X
END
FUNCTION
TOT(N$)
FOR K=1 TO
LEN(N$)
Y$=MID$(N$,K,1)
IF
UCASE$(Y$)="A" THEN
X=X+1
ENDIF
NEXT K
TOT=X
END FUNCTION
Questions:
a) List any
two library functions used in above program.
Two library
functions used in above program are UCASE$( ) and MID$( ).
b) Write the
use of variable "X" in line 3 [i.e. X=TOT(R$)]
The use of variable "X" in line
3 [i.e. X=TOT(R$)] is to store the value (occurrence of character “A” returned
by TOT(R$) function.
(Group
‘C 4×4=16)
8. Convert / calculate as per the instruction:
i) (101011 +
1101 ) - ( 10011 )
ii) ( 11011 × 11 )
iii) ( 235 )10 into octal
iv) ( 9A5 )16
into binary
Ans: i)
100101 ii) 10000 R-1
iii) 353 in octal iv) 1001 1010
0101 in binary
9. a)
Write a program in QBASIC that asks two
numbers to find sum of squares of two numbers using SUB….END SUB program and
average of two numbers using FUNCTION…END FUNCTION
DECLARE
SUB SSQ (A, B)
DECLARE
FUNCTION AVERAGE (A, B)
CLS
INPUT “ENTER FIRST NUMBER”; A
INPUT “ENTER SECOND NUMBER”; B
PRINT “AVERAGE
OF TWO NUMBERS”; AVERAGE (A, B)
CALL SSQ(A,B)
END
FUNCTION
AVERAGE (A, B)
AVERAGE = (A +
B) / 2
END FUNCTION
SUB SSQ (A, B)
SUM=A^2+B^2
PRINT
"SUM OF SQUARE OF TWO NUMBERS ARE:"SUM
END SUB
b)
Write a program to open data file
detail.dat which may contain name, address, gender and salary. The program
should allow user to add few records on it.
OPEN " detail.dat " FOR APPEND AS#1
TOP:
INPUT “Enter
name”; N$
INPUT “Enter
Address”; Ad$
INPUT “Enter
gender”; G$
INPUT “Enter
salary”; S
WRITE #1, N$,
Ad$, G$, S
INPUT "DO
YOU WANT TO ADD RECORDS";Y$
IF
UCASE$(Y$)="Y" THEN GOTO TOP
CLOSE #1
END
10. Write a program in 'C' to check whether
a number is odd or even.
#include<stdio.h>
#include<conio.h>
int main( )
{
int a;
printf(“Enter any number”);
scanf(“%d”, &a);
if (a %2==0)
printf("It is EVEN");
else
printf("It is ODD");
getch();
}
Or
Write a program in ‘C' language to display
the series with their sum. 2,4,6,8,….., up to 10th terms.
#include<stdio.h>
#include<conio.h>
int main( )
{
int a=2, s=0,
i;
for ( i=1;i<=10;i++)
{
printf("%d",a);
s=s+a;
a=a+2;
}
printf("%d",s);
getch();
}

No comments:
Post a Comment