Friday, March 8, 2024

SOLVED Computer Science BOOST UP EXAMINATION - 2080






BOOST UP EXAMINATION - 2080

Grade : X             Subject: Opt. II Computer Science           F.M.: 50

Time: 2 hrs.

 

Candidates are required to write their answers according to the instructions given.

(Group 'A' 10×1=10)

 

1. Answer the following questions in one sentence:                       6×1=6

a)     Which type of cable typically uses RJ-45 connector?

-Twisted pair cable

b)    Write the name of the protocol used for sending email messages.

-Simple Mail Transfer Protocol (SMTP)

c)     What is the primary component of a database that organizes data into rows and columns?

-Table

d)    What data type is commonly represented as Boolean in MS - Access?

-Yes/No

e)     Which mode is used to read and display data from an existing sequential data file?

-Input Mode

f)      How many keywords does the C programming language have?

-32

 

2. Write appropriate technical term for the following:                 2×1=2

a)     The conversion of encrypted data into its original form.

-Decryption

b)    A process of performing a variety of tech-enabled activities via virtual communities and network.

-Social Media

 

3. Write the full form of the following:                                           2×1=2

a)     EFT - Electronic Funds Transfer

b)     MAN - Metropolitan Area Network

 

(Group 'B')

 

4. Answer the following questions:                                                  9×2=18

a)     What is communication media? Draw a well labeled diagram of ring topology.

A channel or path through which data and information are transmitted between connected devices in a network environment is called communication media.






 

 

 

a)     Define digital citizenship. Write any two examples of cyber bullying.

Digital citizenship refers to the responsible and ethical use of technology and the internet which involves understanding, practicing, and promoting appropriate behavior when using digital tools and resources.

Any two examples of cyber bullying are:

·       Sending rude emails, texts or instant messages online or on the phone

·       Posting hurtful things about someone on social media

 

b)    What is information security? Write any four hardware security measures.

Information security is the practice of preventing unauthorized access, use, disclosure, modification, recording or destruction of information.

Any four hardware security measures are:

a)     Regular Maintenance

b)     Insurance

c)     Dust free environment

d)     Power Protection device (Volt guard, Spike guard, UPS)

 

c)     Differentiate between E-Commerce and Traditional Commerce

The difference between E-Commerce and Traditional Commerce are:

Traditional Commerce

E-commerce

Traditional commerce refers to the commercial transactions or exchange of information, buying or selling product/services from person to person without use of internet.

E-commerce refers to the commercial transactions or exchange of information, buying or selling product/services electronically with the help of internet.

In traditional commerce delivery of goods is instant.

In e-commerce delivery of goods takes time.

 

d)    What is Internet of Things? Write any two applications areas of virtual reality.

IoT is a system of interrelated computing device to exchange information over a network without human-to-human or human to computer interaction.

Any two applications areas of virtual reality are:

Gaming-  VR Gaming allows players to immerse (dip) themselves in virtual world and interact with environment

Health care - VR can help people to learn how to manage their anxiety and stress.

e)     What is database? Give any four examples of DBMS.

A collection of systematically organized inter-related data is called a database. The purpose of data base is to store, organize and retrieve data.

Any four examples of DBMS are:

E.g. MS-Access, Oracle,  MySQL, Fox Pro etc.

 

f)      What is validation rule? Write any two importance of primary key.

Validation Rule is a field property which is used to limit the values that can be entered into a field.

Any two importance of primary key are:

It sets the relationship between tables.

It reduces and controls duplication of record in a table

 

 

 

g)     Define record. Write any two advantages of sorting.

A record is a row in a table which contains information about single items in a database. Record is complete set of information.

Any two advantages of sorting are:

·       Sorting helps to organize data and make it easier to find and retrieve specific information.

·       Sorting can save time and improve efficiency by allowing users to quickly access the data they need.

 

h)    List any two major differences between query and report.

 

Query

Report

Query is an object of database that is used to view, retrieve, change and analyze records from a table or multiple linked tables based on specified condition

Report is one of the MS-Access database objects used to present information in an effective and organized format that is ready for printing

Queries help filter large amounts of data into more manageable quantities.

Reports present data in meaningful formats so that conclusions and information about the data can be more easily seen.

 

5. Write the output of the given program: Show with dry run in table.                                     2

DECLARE SUB DISPLAY ( )

CLS

CALL DISPLAY

END

 

SUB DISPLAY

    I = 10

    N = 32

    DO

        IF N MOD 2 = 0 THEN PRINT N

        I = I + 2

        N = N + 1

    LOOP UNTIL I > 19

END SUB

I

N

IS N MOD 2=0 ?

PRINT N

I=I+2

N=N+1

I>19

10

32

32 MOD 2=0?

0=0 YES

32

10+2=12

32+1=33

12>19 NO

12

33

33 MOD 10=0?

3=0

 

12+2=14

33+1=34

14>19 NO

14

34

34 MOD 2=0? YES

34

14+2=16

34+1=35

16>19 NO

16

35

35 MOD2=0?

NO

 

16+2=18

35+1=36

18>19 NO

18

36

36 MOD2=0?

YES

36

18+2=20

36+1=37

20>19 YES

LOOP EXITS

The output of the program is:

32

34

36

6.  Re-Write the given program after correcting the bug:            2

 

REM TO READ RECORDS FROM DATA FILE

OPEN “STUD.DAT” FOR OUTPUT AS #1

WHILE NOT EOF(“STUD.DAT”)

LINE INPUT #1, REC$

PRINT #1, REC$

LOOP

CLOSE #1

END

 

Debugged Program

 

REM TO READ RECORDS FROM DATA FILE

OPEN “STUD.DAT” FOR INPUT AS #1

WHILE NOT EOF(1)

LINE INPUT #1, REC$

PRINT REC$

WEND

CLOSE #1

END

 

7. Study the following program and answer the given questions: 2×1=2

 

DECLARE SUB CHECK(A,B)
INPUT ”Enter three different numbers”; X, Y
CALL CHECK (X,Y)
END

SUB CHECK (A,B)
            IF A>B THEN
                        T=A+B
            ELSE
                        T=A*B
            END IF
PRINT T
END SUB

a) What is the name of sub procedure used in the above program.

- CHECK ( )
b) List the real parameters and formal parameters in the above program.

- Real parameters - X, Y

- Formal paramet - A, B

 

8. Convert/Calculate as per the instruction:                                  4×1=4

i) (816)10 - (?)8                                    ii) (FEED)16 – ( ? )2

iii) (101010) × (101) - (1010)             iv) (10110111) ¸ (101)

 

 

 

 

 

 

i) (816)10 - (?)8           

Divide by the base 8 to get the digits from the remainders:

Division
by 8

Quotient

Remainder

(Digit)

(816)/8

102

0

(102)/8

12

6

(12)/8

1

4

(1)/8

0

1

= (1460)8

(816)10 = (1460)8

           

ii) (FEED)16 – ( ? )2

 

Convert each hex digit to 4 binary digits (see conversion table below):

FEED

= F E E D

F = 1111

E = 1110

E = 1110

D = 1101

= 1111111011101101

(FEED)16 – ( 1111111011101101 )2

 

(101010) × (101) - (1010)     

 

 

 

 

 

1

0

1

0

1

0

 

 

 

 

 

 

×

1

0

1

 

 

 

 

1

0

1

0

1

0

 

 

 

0

0

0

0

0

0

x

 

+

1

0

1

0

1

0

x

x

 

 

1

1

0

1

0

0

1

0

 

 

 

 

 

-

1

0

1

0

 

 

1

1

0

0

1

0

0

0

 

(101010) × (101) - (1010) = (11001000)       

 

iv) (10110111) ¸ (101)

 

101)

1

0

1

1

0

1

1

1

(100100

-

1

0

1

 

 

 

 

 

 

 

0

0

0

1

0

1

 

 

 

 

 

 

-

1

0

1

 

 

 

 

 

 

 

0

0

0

1

1

 

 

 

 

 

 

 

 

 

0

 

 

 

 

 

 

 

 

1

1

 

 

 

 

 

 

 

 

 

 

 

 

Q = 100100

R = 11

 9 a) Write a program in QBASIC that asks radius of a circle and calculate its Total Surface Area and Volume of sphere. Create a sub procedure to calculate volume of sphere and user - defined function to calculate Total Surface Area.                                           4

DECLARE SUB VOL(R)

DECLARE FUNCTION TSA(R)

CLS

INPUT “Enter radius”; R

CALL VOL(R)

PRINT “Total Surface Area of Sphere=”; TSA(R)

END

SUB VOL(R)

V=4/3*22/7*R^3

PRINT “Volume of Sphere=”; V

END SUB

 

FUNCTION TSA(R)

TSA=4*22/7*R^2

END FUNCTION

b) A sequential data file “SALARY.DAT” contains the information, Employee-Code, Employee-Name, Post, Basic-Salary. Write a program to display those records whose Basic-salary is between 25000 to 40000 and Post is ‘Manager’.                                                                         4

 

OPEN “SALARY.DAT” FOR INPUT AS #1

CLS

WHILE NOT EOF(1)

PRINT “Ecode”, “Name” “Post” “Salary”

WHILE NOT EOF(1)

INPUT #1, E, N$, P$, S

IF UCASE$(P$)=”MANAGER” AND S>=25000 AND S<=40000 THEN

PRINT E, N$, P$, S

END IF

WEND

CLOSE #1

END

 10. Write a program in C language to ask a number and check whether it is divisible by 10 or not.                                                                                                                                               4

#include<stdio.h>

int main( )

{

            int n;

            printf(“Enter any number”):

            scanf(“%d”, &n);

            if(n % 10 = = 0)

            {

                        printf(“%d is divisible by 10”, n);

            }

            else

            {

                        printf(“%d is not divisible by 10”, n);

            }

return 0;

}


Write a program in ‘C’ language to display the series : 22,11,34,17,52,26,13,40,20,10.                                              4         

#include <stdio.h>

 

int main()

{

    int n=22,i;

    for(i=1;i<=10;i++)

    {

        printf("%d ",n);

        if(n%2==0)

        {

            n=n/2;

        }

        else

        {

            n=n*3+1;

        }

  }

    return 0;

}