BOOST UP
EXAMINATION - 2080
Grade : X Subject: Opt. II Computer Science
F.M.: 50
Time: 2 hrs.
Candidates are required to write their answers
according to the instructions given.
(Group 'A'
10×1=10)
1. Answer the following questions in one sentence: 6×1=6
a)
Which type of
cable typically uses RJ-45 connector?
-Twisted
pair cable
b) Write the name of the protocol used for sending email
messages.
-Simple
Mail Transfer Protocol (SMTP)
c)
What is the primary
component of a database that organizes data
into rows and columns?
-Table
d)
What data type is commonly represented as Boolean in MS
- Access?
-Yes/No
e)
Which mode is used to read and display data from an
existing sequential data file?
-Input Mode
f)
How many keywords does the C programming language have?
-32
2. Write appropriate technical term for the following:
2×1=2
a)
The conversion of encrypted data
into its original form.
-Decryption
b)
A process of performing
a variety of tech-enabled activities via virtual communities and network.
-Social Media
3. Write the full form of the following: 2×1=2
a)
EFT - Electronic Funds Transfer
b)
MAN - Metropolitan Area Network
(Group 'B')
4. Answer the following questions: 9×2=18
a)
What is communication media? Draw a well labeled
diagram of ring topology.
A
channel or path through which data and information are transmitted between
connected devices in a network environment is called communication media.
a)
Define digital citizenship. Write any two examples of
cyber bullying.
Digital citizenship
refers to the responsible and ethical use of technology and the internet which
involves understanding, practicing, and promoting appropriate behavior when
using digital tools and resources.
Any
two examples of cyber bullying are:
·
Sending rude emails, texts or instant messages online or
on the phone
·
Posting hurtful things about someone on social media
b)
What is information security? Write any four hardware
security measures.
Information
security is the practice of preventing unauthorized access, use, disclosure,
modification, recording or destruction of information.
Any
four hardware security measures are:
a)
Regular
Maintenance
b)
Insurance
c)
Dust
free environment
d)
Power
Protection device (Volt guard, Spike guard, UPS)
c)
Differentiate between E-Commerce and Traditional Commerce
The
difference between E-Commerce and Traditional Commerce are:
Traditional Commerce |
E-commerce |
Traditional commerce refers to the commercial
transactions or exchange of information, buying or selling product/services
from person to person without use of internet. |
E-commerce
refers to the commercial transactions or exchange of information, buying or
selling product/services electronically with the help of internet. |
In
traditional commerce delivery of goods is instant. |
In
e-commerce delivery of goods takes time. |
d)
What is Internet of Things? Write any two applications
areas of virtual reality.
IoT
is a system of interrelated computing device to exchange information over a
network without human-to-human or human to computer interaction.
Any two applications areas of virtual reality are:
Gaming- VR Gaming allows players to immerse (dip)
themselves in virtual world and interact with environment
Health care - VR can
help people to learn how to manage their anxiety and stress.
e)
What is database? Give any four examples of DBMS.
A
collection of systematically organized inter-related data is called a database.
The purpose of data base is to store, organize and retrieve data.
Any four examples of DBMS are:
E.g.
MS-Access, Oracle, MySQL, Fox Pro etc.
f)
What is validation rule? Write any two importance of
primary key.
Validation
Rule is a field property which is used to limit the values that can be entered
into a field.
Any two importance of primary key are:
It sets the
relationship between tables.
It reduces and
controls duplication of record in a table
g)
Define record. Write any two advantages of sorting.
A
record is a row in a table which contains information about single items in a
database. Record is complete set of information.
Any
two advantages of sorting are:
· Sorting helps to organize
data and make it easier to find and retrieve specific information.
· Sorting can save
time and improve efficiency by allowing users to quickly access the data they
need.
h)
List any two major differences between query and
report.
Query |
Report |
Query
is an object of database that is used to view, retrieve, change and analyze
records from a table or multiple linked tables based on specified condition |
Report
is one of the MS-Access database objects used to present information in an
effective and organized format that is ready for printing |
Queries help filter large amounts of data
into more manageable quantities. |
Reports present data in meaningful formats so
that conclusions and information about the data can be more easily seen. |
5. Write
the output of the given program: Show with dry run in table. 2
DECLARE SUB DISPLAY ( )
CLS
CALL DISPLAY
END
SUB DISPLAY
I = 10
N = 32
DO
IF N MOD
2 = 0 THEN PRINT N
I = I +
2
N = N +
1
LOOP UNTIL I
> 19
END SUB
I |
N |
IS N MOD 2=0 ? |
PRINT N |
I=I+2 |
N=N+1 |
I>19 |
10 |
32 |
32 MOD 2=0? 0=0 YES |
32 |
10+2=12 |
32+1=33 |
12>19 NO |
12 |
33 |
33 MOD 10=0? 3=0 |
|
12+2=14 |
33+1=34 |
14>19 NO |
14 |
34 |
34 MOD 2=0? YES |
34 |
14+2=16 |
34+1=35 |
16>19 NO |
16 |
35 |
35 MOD2=0? NO |
|
16+2=18 |
35+1=36 |
18>19 NO |
18 |
36 |
36 MOD2=0? YES |
36 |
18+2=20 |
36+1=37 |
20>19 YES LOOP EXITS |
The output of the
program is:
32
34
36
6. Re-Write the given program after correcting
the bug: 2
REM TO READ RECORDS FROM DATA FILE
OPEN “STUD.DAT” FOR OUTPUT AS #1
WHILE NOT EOF(“STUD.DAT”)
LINE INPUT #1, REC$
PRINT #1, REC$
LOOP
CLOSE #1
END
Debugged Program
REM TO READ RECORDS FROM DATA FILE
OPEN “STUD.DAT” FOR INPUT AS
#1
WHILE NOT EOF(1)
LINE INPUT #1, REC$
PRINT REC$
WEND
CLOSE #1
END
7. Study the
following program and answer the given questions: 2×1=2
DECLARE
SUB CHECK(A,B)
INPUT ”Enter three different numbers”; X, Y
CALL CHECK (X,Y)
END
SUB CHECK (A,B)
IF A>B THEN
T=A+B
ELSE
T=A*B
END IF
PRINT T
END SUB
a)
What is the name of sub procedure used in the above program.
-
CHECK ( )
b) List the real parameters and formal parameters in the above program.
-
Real parameters - X, Y
-
Formal paramet - A, B
8.
Convert/Calculate as per the instruction: 4×1=4
i) (816)10
- (?)8 ii) (FEED)16 – ( ? )2
iii) (101010) ×
(101) - (1010) iv) (10110111) ¸ (101)
i)
(816)10 - (?)8
Divide by the base 8 to get the digits
from the remainders:
Division |
Quotient |
Remainder (Digit) |
(816)/8 |
102 |
0 |
(102)/8 |
12 |
6 |
(12)/8 |
1 |
4 |
(1)/8 |
0 |
1 |
= (1460)8
(816)10 = (1460)8
ii) (FEED)16
– ( ? )2
Convert
each hex digit to 4 binary digits (see conversion table below):
FEED
= F
E E D
F =
1111
E = 1110
E = 1110
D = 1101
=
1111111011101101
(FEED)16
– ( 1111111011101101 )2
(101010)
× (101) - (1010)
|
|
|
|
1 |
0 |
1 |
0 |
1 |
0 |
|
|
|
|
|
|
× |
1 |
0 |
1 |
|
|
|
|
1 |
0 |
1 |
0 |
1 |
0 |
|
|
|
0 |
0 |
0 |
0 |
0 |
0 |
x |
|
+ |
1 |
0 |
1 |
0 |
1 |
0 |
x |
x |
|
|
1 |
1 |
0 |
1 |
0 |
0 |
1 |
0 |
|
|
|
|
|
- |
1 |
0 |
1 |
0 |
|
|
1 |
1 |
0 |
0 |
1 |
0 |
0 |
0 |
(101010)
× (101) - (1010) = (11001000)
iv) (10110111) ¸ (101)
101) |
1 |
0 |
1 |
1 |
0 |
1 |
1 |
1 |
(100100 |
- |
1 |
0 |
1 |
|
|
|
|
|
|
|
0 |
0 |
0 |
1 |
0 |
1 |
|
|
|
|
|
|
- |
1 |
0 |
1 |
|
|
|
|
|
|
|
0 |
0 |
0 |
1 |
1 |
|
|
|
|
|
|
|
|
|
0 |
|
|
|
|
|
|
|
|
1 |
1 |
|
|
|
|
|
|
|
|
|
|
|
Q =
100100
R =
11
9 a) Write a program in QBASIC that asks radius of a circle and calculate its Total Surface Area and Volume of sphere. Create a sub procedure to calculate volume of sphere and user - defined function to calculate Total Surface Area. 4
DECLARE
SUB VOL(R)
DECLARE
FUNCTION TSA(R)
CLS
INPUT
“Enter radius”; R
CALL
VOL(R)
PRINT
“Total Surface Area of Sphere=”; TSA(R)
END
SUB
VOL(R)
V=4/3*22/7*R^3
PRINT
“Volume of Sphere=”; V
END
SUB
FUNCTION
TSA(R)
TSA=4*22/7*R^2
END
FUNCTION
b)
A
sequential data file “SALARY.DAT” contains the information, Employee-Code,
Employee-Name, Post, Basic-Salary. Write a program to display those records
whose Basic-salary is between 25000 to 40000 and Post is ‘Manager’. 4
OPEN
“SALARY.DAT” FOR INPUT AS #1
CLS
WHILE
NOT EOF(1)
PRINT
“Ecode”, “Name” “Post” “Salary”
WHILE
NOT EOF(1)
INPUT
#1, E, N$, P$, S
IF
UCASE$(P$)=”MANAGER” AND S>=25000 AND S<=40000 THEN
PRINT
E, N$, P$, S
END
IF
WEND
CLOSE
#1
END
10. Write a program in C language to ask a number and check whether it is divisible by 10 or not. 4
#include<stdio.h>
int main( )
{
int
n;
printf(“Enter
any number”):
scanf(“%d”,
&n);
if(n
% 10 = = 0)
{
printf(“%d
is divisible by 10”, n);
}
else
{
printf(“%d
is not divisible by 10”, n);
}
return 0;
}
Write a program in ‘C’
language to display the series : 22,11,34,17,52,26,13,40,20,10. 4
#include <stdio.h>
int main()
{
int n=22,i;
for(i=1;i<=10;i++)
{
printf("%d ",n);
if(n%2==0)
{
n=n/2;
}
else
{
n=n*3+1;
}
}
return 0;
}